While it's nice to constrain this it's also very inflexible.
With fallback disabled we can retain values in tunnel pw and
VLAN ID. Enabling it without these options may be weird, but
not a large problem. Template was rearranged to generate
the most logic outcome.
Some due maintenance sprinkled on top.
* Update Makefile
* Update pkg-descr
* Update security/q-feeds-connector/pkg-descr
Co-authored-by: Franco Fichtner <franco@lastsummer.de>
* Update security/q-feeds-connector/Makefile
Co-authored-by: Franco Fichtner <franco@lastsummer.de>
* Add threat lookup magnifier buttons to events table
- Add magnifier buttons next to source and destination IP addresses in events table
- Buttons open Threat Intelligence Portal in new tab with IP pre-filled
- Automatically triggers search when TIP page loads
- Buttons are right-aligned in their respective columns
- Works for both logged-in and logged-out users (with proper redirect handling)
* Update pkg-descr
* Refactor formatters to use template literals (backticks) for better readability
Addresses reviewer feedback to use template literals instead of string concatenation for HTML generation in JavaScript formatters.
* Update pkg-descr: consolidate all changes into version 1.3
* Use const instead of var for modern JavaScript best practices
Addresses reviewer feedback to use const/let instead of var for better block scoping and to prevent accidental reassignment.
---------
Co-authored-by: Franco Fichtner <franco@lastsummer.de>
1. Use explicit commands here for better tracing even if it requires
spelling out '/usr/local/bin/git' a number of times.
2. Use the functionality that the Shell class has to offer now.
3. Use -C for changing the git working directory.
4. A bit of style left and right.
shell_safe() is better than raw exec() although we do not have any
dynamic shell arguments to handle. This call requires a new explode
extension (true parameter) that will be available in 25.7.8
This can happen when an internal domain has been added, e.g. example.internal. Caddy will then generate a self signed certificate via smallstep CA, and on startup it tries to install a root certificate for it into the FreeBSD trust store.
If running as www user, this causes sudo to appear at boot, because that is baked into smallstep CA.
https://github.com/smallstep/truststore/blob/master/truststore_freebsd.go
Via skip_install_trust, we prevent caddy from trying this.