diff --git a/VERIFY_ISO.md b/VERIFY_ISO.md index f14e91122..e07ecf807 100644 --- a/VERIFY_ISO.md +++ b/VERIFY_ISO.md @@ -1,18 +1,18 @@ -### 2.3.180-20221014 ISO image built on 2022/10/14 +### 2.3.181-20221021 ISO image built on 2022/10/21 ### Download and Verify -2.3.180-20221014 ISO image: -https://download.securityonion.net/file/securityonion/securityonion-2.3.180-20221014.iso +2.3.181-20221021 ISO image: +https://download.securityonion.net/file/securityonion/securityonion-2.3.181-20221021.iso -MD5: 83FFF252C70A286860E02B5F2ACE5F16 -SHA1: 27B50B2ECE5B59C2FFF4E60FD10E72589B6D914E -SHA256: 9AE4109C12F3CF77ACD6A9FCFD89CD0AEB4F18C1B72DB7ACE451F9EADA448273 +MD5: 9389B35233DCA42AC5061053D772E922 +SHA1: 83A162756136198CF1FABE7D94BA1D99650379B2 +SHA256: FED4D7B27C16889F9588FE9568B0B10E0DAD551C34619DFED7801F18B1739040 Signature for ISO image: -https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.180-20221014.iso.sig +https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.181-20221021.iso.sig Signing key: https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/master/KEYS @@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/ma Download the signature file for the ISO: ``` -wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.180-20221014.iso.sig +wget https://github.com/Security-Onion-Solutions/securityonion/raw/master/sigs/securityonion-2.3.181-20221021.iso.sig ``` Download the ISO image: ``` -wget https://download.securityonion.net/file/securityonion/securityonion-2.3.180-20221014.iso +wget https://download.securityonion.net/file/securityonion/securityonion-2.3.181-20221021.iso ``` Verify the downloaded ISO image using the signature file: ``` -gpg --verify securityonion-2.3.180-20221014.iso.sig securityonion-2.3.180-20221014.iso +gpg --verify securityonion-2.3.181-20221021.iso.sig securityonion-2.3.181-20221021.iso ``` The output should show "Good signature" and the Primary key fingerprint should match what's shown below: ``` -gpg: Signature made Fri 14 Oct 2022 09:50:51 AM EDT using RSA key ID FE507013 +gpg: Signature made Fri 21 Oct 2022 02:11:18 PM EDT using RSA key ID FE507013 gpg: Good signature from "Security Onion Solutions, LLC " gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. diff --git a/VERSION b/VERSION index 8826786d1..1380e3d15 100644 --- a/VERSION +++ b/VERSION @@ -1 +1 @@ -2.3.180 +2.3.181 diff --git a/salt/common/tools/sbin/soup b/salt/common/tools/sbin/soup index 1f97113a0..c96d4e904 100755 --- a/salt/common/tools/sbin/soup +++ b/salt/common/tools/sbin/soup @@ -548,6 +548,7 @@ preupgrade_changes() { [[ "$INSTALLEDVERSION" == 2.3.150 ]] && up_to_2.3.160 [[ "$INSTALLEDVERSION" == 2.3.160 ]] && up_to_2.3.170 [[ "$INSTALLEDVERSION" == 2.3.170 ]] && up_to_2.3.180 + [[ "$INSTALLEDVERSION" == 2.3.180 ]] && up_to_2.3.181 true } @@ -568,6 +569,7 @@ postupgrade_changes() { [[ "$POSTVERSION" == 2.3.150 ]] && post_to_2.3.160 [[ "$POSTVERSION" == 2.3.160 ]] && post_to_2.3.170 [[ "$POSTVERSION" == 2.3.170 ]] && post_to_2.3.180 + [[ "$POSTVERSION" == 2.3.180 ]] && post_to_2.3.181 true } @@ -667,6 +669,10 @@ post_to_2.3.180() { echo "Nothing to do for .180" } +post_to_2.3.181() { + echo "Nothing to do for .181" +} + stop_salt_master() { # kill all salt jobs across the grid because the hang indefinitely if they are queued and salt-master restarts set +e @@ -961,6 +967,11 @@ up_to_2.3.180() { INSTALLEDVERSION=2.3.180 } +up_to_2.3.181() { + echo "Upgrading to 2.3.181" + INSTALLEDVERSION=2.3.181 +} + verify_upgradespace() { CURRENTSPACE=$(df -BG / | grep -v Avail | awk '{print $4}' | sed 's/.$//') if [ "$CURRENTSPACE" -lt "10" ]; then diff --git a/sigs/securityonion-2.3.181-20221021.iso.sig b/sigs/securityonion-2.3.181-20221021.iso.sig new file mode 100644 index 000000000..b2ba5d0b5 Binary files /dev/null and b/sigs/securityonion-2.3.181-20221021.iso.sig differ