Skip to content

Commit 1cef75d

Browse files
authored
Merge pull request #13797 from Security-Onion-Solutions/hotfix/2.4.110
Hotfix 2.4.110
2 parents d5df002 + 0c4cb86 commit 1cef75d

File tree

6 files changed

+33
-12
lines changed

6 files changed

+33
-12
lines changed

DOWNLOAD_AND_VERIFY_ISO.md

+11-11
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
1-
### 2.4.110-20241004 ISO image released on 2024/10/07
1+
### 2.4.110-20241010 ISO image released on 2024/10/10
22

33

44
### Download and Verify
55

6-
2.4.110-20241004 ISO image:
7-
https://download.securityonion.net/file/securityonion/securityonion-2.4.110-20241004.iso
6+
2.4.110-20241010 ISO image:
7+
https://download.securityonion.net/file/securityonion/securityonion-2.4.110-20241010.iso
88

9-
MD5: 1641E4AFD65DB1C218BFAD22E33909C6
10-
SHA1: 131E1115F7CA76302F72625CD80A212B91608114
11-
SHA256: 8598EB03E52B332EF5445520445AD205C68A99BC030F8497F6EBDE1249B8B576
9+
MD5: A8003DEBC4510D538F06238D9DBB86C0
10+
SHA1: 441DE90A192C8FE8BEBAB9ACE1A3CC18F71A2B1F
11+
SHA256: B087A0D12FC2CA3CCD02BD52E52421F4F60DC09BF826337A057E05A04D114CCE
1212

1313
Signature for ISO image:
14-
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.110-20241004.iso.sig
14+
https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.110-20241010.iso.sig
1515

1616
Signing key:
1717
https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS
@@ -25,22 +25,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.
2525

2626
Download the signature file for the ISO:
2727
```
28-
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.110-20241004.iso.sig
28+
wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.110-20241010.iso.sig
2929
```
3030

3131
Download the ISO image:
3232
```
33-
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.110-20241004.iso
33+
wget https://download.securityonion.net/file/securityonion/securityonion-2.4.110-20241010.iso
3434
```
3535

3636
Verify the downloaded ISO image using the signature file:
3737
```
38-
gpg --verify securityonion-2.4.110-20241004.iso.sig securityonion-2.4.110-20241004.iso
38+
gpg --verify securityonion-2.4.110-20241010.iso.sig securityonion-2.4.110-20241010.iso
3939
```
4040

4141
The output should show "Good signature" and the Primary key fingerprint should match what's shown below:
4242
```
43-
gpg: Signature made Sat 05 Oct 2024 09:31:57 AM EDT using RSA key ID FE507013
43+
gpg: Signature made Thu 10 Oct 2024 07:05:30 AM EDT using RSA key ID FE507013
4444
gpg: Good signature from "Security Onion Solutions, LLC <[email protected]>"
4545
gpg: WARNING: This key is not certified with a trusted signature!
4646
gpg: There is no indication that the signature belongs to the owner.

HOTFIX

+1
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
20241010

salt/elasticfleet/tools/sbin/so-elastic-fleet-common

+8
Original file line numberDiff line numberDiff line change
@@ -102,6 +102,14 @@ elastic_fleet_package_is_installed() {
102102
curl -s -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X GET -H 'kbn-xsrf: true' "localhost:5601/api/fleet/epm/packages/$PACKAGE" | jq -r '.item.status'
103103
}
104104

105+
elastic_fleet_agent_policy_ids() {
106+
curl -s -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X GET "localhost:5601/api/fleet/agent_policies" | jq -r .items[].id
107+
if [ $? -ne 0 ]; then
108+
echo "Error: Failed to retrieve agent policies."
109+
exit 1
110+
fi
111+
}
112+
105113
elastic_fleet_agent_policy_names() {
106114
curl -s -K /opt/so/conf/elasticsearch/curl.config -b "sid=$SESSIONCOOKIE" -L -X GET "localhost:5601/api/fleet/agent_policies" | jq -r .items[].name
107115
if [ $? -ne 0 ]; then

salt/elasticfleet/tools/sbin/so-elastic-fleet-integration-upgrade

+1-1
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ if [ $? -ne 0 ]; then
1313
fi
1414

1515
IFS=$'\n'
16-
agent_policies=$(elastic_fleet_agent_policy_names)
16+
agent_policies=$(elastic_fleet_agent_policy_ids)
1717
if [ $? -ne 0 ]; then
1818
echo "Error: Failed to retrieve agent policies."
1919
exit 1

salt/manager/tools/sbin/soup

+12
Original file line numberDiff line numberDiff line change
@@ -402,6 +402,7 @@ preupgrade_changes() {
402402
[[ "$INSTALLEDVERSION" == 2.4.70 ]] && up_to_2.4.80
403403
[[ "$INSTALLEDVERSION" == 2.4.80 ]] && up_to_2.4.90
404404
[[ "$INSTALLEDVERSION" == 2.4.90 ]] && up_to_2.4.100
405+
[[ "$INSTALLEDVERSION" == 2.4.100 ]] && up_to_2.4.110
405406
true
406407
}
407408

@@ -422,6 +423,7 @@ postupgrade_changes() {
422423
[[ "$POSTVERSION" == 2.4.70 ]] && post_to_2.4.80
423424
[[ "$POSTVERSION" == 2.4.80 ]] && post_to_2.4.90
424425
[[ "$POSTVERSION" == 2.4.90 ]] && post_to_2.4.100
426+
[[ "$POSTVERSION" == 2.4.100 ]] && post_to_2.4.110
425427
true
426428
}
427429

@@ -509,6 +511,11 @@ post_to_2.4.100() {
509511
POSTVERSION=2.4.100
510512
}
511513

514+
post_to_2.4.110() {
515+
echo "Nothing to apply"
516+
POSTVERSION=2.4.110
517+
}
518+
512519
repo_sync() {
513520
echo "Sync the local repo."
514521
su socore -c '/usr/sbin/so-repo-sync' || fail "Unable to complete so-repo-sync."
@@ -691,6 +698,11 @@ up_to_2.4.100() {
691698
determine_elastic_agent_upgrade
692699
INSTALLEDVERSION=2.4.100
693700
}
701+
up_to_2.4.110() {
702+
echo "Nothing to do for 2.4.110"
703+
704+
INSTALLEDVERSION=2.4.110
705+
}
694706

695707
add_detection_test_pillars() {
696708
if [[ -n "$SOUP_INTERNAL_TESTING" ]]; then
566 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)