From 3ed7b368659a913e5f37ce90d7822209c775174a Mon Sep 17 00:00:00 2001 From: Wes Date: Thu, 16 Nov 2023 15:45:38 +0000 Subject: [PATCH 01/17] Discard corrupt integration --- salt/kibana/defaults.yaml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/salt/kibana/defaults.yaml b/salt/kibana/defaults.yaml index 282521d12..90b75b8c4 100644 --- a/salt/kibana/defaults.yaml +++ b/salt/kibana/defaults.yaml @@ -21,8 +21,10 @@ kibana: appenders: - default - file + migrations: + discardCorruptObjects: "8.10.4" telemetry: - enabled: False + enabled: False security: showInsecureClusterWarning: False xpack: From d5dd0d88ede1d931916d4c764e780c076a1b7760 Mon Sep 17 00:00:00 2001 From: Josh Brower Date: Thu, 16 Nov 2023 10:58:23 -0500 Subject: [PATCH 02/17] .30 hotfix --- salt/manager/tools/sbin/soup | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/salt/manager/tools/sbin/soup b/salt/manager/tools/sbin/soup index 42ea7e764..9a2ae890d 100755 --- a/salt/manager/tools/sbin/soup +++ b/salt/manager/tools/sbin/soup @@ -735,8 +735,12 @@ apply_hotfix() { . /usr/sbin/so-elastic-fleet-common elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints /usr/sbin/so-elastic-fleet-integration-policy-elastic-defend -# elif [[ "$INSTALLEDVERSION" == "2.3.110" ]] ; then -# 2_3_10_hotfix_1 + elif [[ "$INSTALLEDVERSION" == "2.4.30" ]] ; then + rm -f /opt/so/conf/elastic-fleet/integrations/endpoints-initial/elastic-defend-endpoints.json + so-kibana-restart + . /usr/sbin/so-elastic-fleet-common + elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints + /usr/sbin/so-elastic-fleet-integration-policy-elastic-defend else echo "No actions required. ($INSTALLEDVERSION/$HOTFIXVERSION)" fi From ff8cd194f1f2adc269d7aac2a71039256ea2bd37 Mon Sep 17 00:00:00 2001 From: Josh Brower Date: Thu, 16 Nov 2023 11:21:34 -0500 Subject: [PATCH 03/17] Make sure kibana API is up --- salt/manager/tools/sbin/soup | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/salt/manager/tools/sbin/soup b/salt/manager/tools/sbin/soup index 9a2ae890d..a4bd6a4d5 100755 --- a/salt/manager/tools/sbin/soup +++ b/salt/manager/tools/sbin/soup @@ -737,10 +737,21 @@ apply_hotfix() { /usr/sbin/so-elastic-fleet-integration-policy-elastic-defend elif [[ "$INSTALLEDVERSION" == "2.4.30" ]] ; then rm -f /opt/so/conf/elastic-fleet/integrations/endpoints-initial/elastic-defend-endpoints.json - so-kibana-restart + so-kibana-restart --force . /usr/sbin/so-elastic-fleet-common + + echo "Checking to make sure that Kibana API is up & ready..." + RETURN_CODE=0 + wait_for_web_response "http://localhost:5601/api/fleet/settings" "fleet" 300 "curl -K /opt/so/conf/elasticsearch/curl.config" + RETURN_CODE=$? + if [[ "$RETURN_CODE" != "0" ]]; then + echo "Kibana API not accessible, exiting script..." + exit 1 + fi + elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints /usr/sbin/so-elastic-fleet-integration-policy-elastic-defend + salt-call state.highstate else echo "No actions required. ($INSTALLEDVERSION/$HOTFIXVERSION)" fi From 109ee55d8c6f84ce27a2e44dff3cfb29ad15be87 Mon Sep 17 00:00:00 2001 From: Josh Brower Date: Thu, 16 Nov 2023 11:37:38 -0500 Subject: [PATCH 04/17] Add to pre for .30 soup --- salt/manager/tools/sbin/soup | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/salt/manager/tools/sbin/soup b/salt/manager/tools/sbin/soup index a4bd6a4d5..18a436c01 100755 --- a/salt/manager/tools/sbin/soup +++ b/salt/manager/tools/sbin/soup @@ -529,6 +529,22 @@ up_to_2.4.20() { } up_to_2.4.30() { + rm -f /opt/so/conf/elastic-fleet/integrations/endpoints-initial/elastic-defend-endpoints.json + . /usr/sbin/so-elastic-fleet-common + + echo "Checking to make sure that Kibana API is up & ready..." + RETURN_CODE=0 + wait_for_web_response "http://localhost:5601/api/fleet/settings" "fleet" 300 "curl -K /opt/so/conf/elasticsearch/curl.config" + RETURN_CODE=$? + if [[ "$RETURN_CODE" != "0" ]]; then + echo "Kibana API not accessible, exiting script..." + exit 1 + fi + + elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints + /usr/sbin/so-elastic-fleet-integration-policy-elastic-defend + salt-call state.highstate + determine_elastic_agent_upgrade rm -f /opt/so/state/estemplates*.txt From 6b8e48c973567c775919fcefb7c10e811d4ad0b7 Mon Sep 17 00:00:00 2001 From: Josh Brower Date: Thu, 16 Nov 2023 11:41:20 -0500 Subject: [PATCH 05/17] Remove highstate --- salt/manager/tools/sbin/soup | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/salt/manager/tools/sbin/soup b/salt/manager/tools/sbin/soup index 18a436c01..67b291ddf 100755 --- a/salt/manager/tools/sbin/soup +++ b/salt/manager/tools/sbin/soup @@ -529,6 +529,8 @@ up_to_2.4.20() { } up_to_2.4.30() { + + # Remove older defend integration json rm -f /opt/so/conf/elastic-fleet/integrations/endpoints-initial/elastic-defend-endpoints.json . /usr/sbin/so-elastic-fleet-common @@ -543,8 +545,8 @@ up_to_2.4.30() { elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints /usr/sbin/so-elastic-fleet-integration-policy-elastic-defend - salt-call state.highstate + # Elastic Update for this release, so download Elastic Agent files determine_elastic_agent_upgrade rm -f /opt/so/state/estemplates*.txt From b6e2df45c76860e51f328eb533f7ebe88aeb8b28 Mon Sep 17 00:00:00 2001 From: weslambert Date: Thu, 16 Nov 2023 14:48:00 -0500 Subject: [PATCH 06/17] Update HOTFIX --- HOTFIX | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/HOTFIX b/HOTFIX index d3f5a12fa..57030dc85 100644 --- a/HOTFIX +++ b/HOTFIX @@ -1 +1 @@ - +20231117 From 5920a144788f23d2ae38d92854cf7b541bf9d15f Mon Sep 17 00:00:00 2001 From: Josh Brower Date: Thu, 16 Nov 2023 20:34:01 -0500 Subject: [PATCH 07/17] Move API check logic --- salt/kibana/tools/sbin/so-kibana-api-check | 20 ++++++++++++++++++++ salt/manager/tools/sbin/soup | 19 +------------------ 2 files changed, 21 insertions(+), 18 deletions(-) create mode 100644 salt/kibana/tools/sbin/so-kibana-api-check diff --git a/salt/kibana/tools/sbin/so-kibana-api-check b/salt/kibana/tools/sbin/so-kibana-api-check new file mode 100644 index 000000000..15cd85b19 --- /dev/null +++ b/salt/kibana/tools/sbin/so-kibana-api-check @@ -0,0 +1,20 @@ +#!/bin/bash +# +# Copyright Security Onion Solutions LLC and/or licensed to Security Onion Solutions LLC under one +# or more contributor license agreements. Licensed under the Elastic License 2.0 as shown at +# https://securityonion.net/license; you may not use this file except in compliance with the +# Elastic License 2.0. + +. /usr/sbin/so-common + +echo "Checking to make sure that Kibana API is up & ready..." +RETURN_CODE=0 +wait_for_web_response "http://localhost:5601/api/fleet/settings" "fleet" 300 "curl -K /opt/so/conf/elasticsearch/curl.config" +RETURN_CODE=$? +if [[ "$RETURN_CODE" != "0" ]]; then + echo "Kibana API not accessible, exiting script..." + exit 1 +fi + + + diff --git a/salt/manager/tools/sbin/soup b/salt/manager/tools/sbin/soup index 67b291ddf..0de956da1 100755 --- a/salt/manager/tools/sbin/soup +++ b/salt/manager/tools/sbin/soup @@ -534,15 +534,6 @@ up_to_2.4.30() { rm -f /opt/so/conf/elastic-fleet/integrations/endpoints-initial/elastic-defend-endpoints.json . /usr/sbin/so-elastic-fleet-common - echo "Checking to make sure that Kibana API is up & ready..." - RETURN_CODE=0 - wait_for_web_response "http://localhost:5601/api/fleet/settings" "fleet" 300 "curl -K /opt/so/conf/elasticsearch/curl.config" - RETURN_CODE=$? - if [[ "$RETURN_CODE" != "0" ]]; then - echo "Kibana API not accessible, exiting script..." - exit 1 - fi - elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints /usr/sbin/so-elastic-fleet-integration-policy-elastic-defend @@ -756,17 +747,9 @@ apply_hotfix() { elif [[ "$INSTALLEDVERSION" == "2.4.30" ]] ; then rm -f /opt/so/conf/elastic-fleet/integrations/endpoints-initial/elastic-defend-endpoints.json so-kibana-restart --force + so-kibana-api-check . /usr/sbin/so-elastic-fleet-common - echo "Checking to make sure that Kibana API is up & ready..." - RETURN_CODE=0 - wait_for_web_response "http://localhost:5601/api/fleet/settings" "fleet" 300 "curl -K /opt/so/conf/elasticsearch/curl.config" - RETURN_CODE=$? - if [[ "$RETURN_CODE" != "0" ]]; then - echo "Kibana API not accessible, exiting script..." - exit 1 - fi - elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints /usr/sbin/so-elastic-fleet-integration-policy-elastic-defend salt-call state.highstate From 089a111ae83129503bad90086df960d79a392338 Mon Sep 17 00:00:00 2001 From: Josh Brower Date: Fri, 17 Nov 2023 11:20:13 -0500 Subject: [PATCH 08/17] use updated code --- salt/manager/tools/sbin/soup | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/salt/manager/tools/sbin/soup b/salt/manager/tools/sbin/soup index 0de956da1..7123a36e5 100755 --- a/salt/manager/tools/sbin/soup +++ b/salt/manager/tools/sbin/soup @@ -532,7 +532,8 @@ up_to_2.4.30() { # Remove older defend integration json rm -f /opt/so/conf/elastic-fleet/integrations/endpoints-initial/elastic-defend-endpoints.json - . /usr/sbin/so-elastic-fleet-common + + . $UPDATE_DIR/salt/elasticfleet/tools/sbin/so-elastic-fleet-common elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints /usr/sbin/so-elastic-fleet-integration-policy-elastic-defend From ca1498fca160cebebdaad028566e4c90f7e99e5e Mon Sep 17 00:00:00 2001 From: Josh Brower Date: Fri, 17 Nov 2023 12:19:22 -0500 Subject: [PATCH 09/17] Dont update Defend Integration --- salt/manager/tools/sbin/soup | 1 - 1 file changed, 1 deletion(-) diff --git a/salt/manager/tools/sbin/soup b/salt/manager/tools/sbin/soup index 7123a36e5..5168918d2 100755 --- a/salt/manager/tools/sbin/soup +++ b/salt/manager/tools/sbin/soup @@ -536,7 +536,6 @@ up_to_2.4.30() { . $UPDATE_DIR/salt/elasticfleet/tools/sbin/so-elastic-fleet-common elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints - /usr/sbin/so-elastic-fleet-integration-policy-elastic-defend # Elastic Update for this release, so download Elastic Agent files determine_elastic_agent_upgrade From 7aadc3851f90d0e61a5f13773e9b9c8eb993441f Mon Sep 17 00:00:00 2001 From: Josh Brower Date: Fri, 17 Nov 2023 13:08:15 -0500 Subject: [PATCH 10/17] Remove state file --- salt/manager/tools/sbin/soup | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/salt/manager/tools/sbin/soup b/salt/manager/tools/sbin/soup index 5168918d2..c9d4b1936 100755 --- a/salt/manager/tools/sbin/soup +++ b/salt/manager/tools/sbin/soup @@ -530,13 +530,14 @@ up_to_2.4.20() { up_to_2.4.30() { - # Remove older defend integration json + # Remove older defend integration json & installed integration rm -f /opt/so/conf/elastic-fleet/integrations/endpoints-initial/elastic-defend-endpoints.json . $UPDATE_DIR/salt/elasticfleet/tools/sbin/so-elastic-fleet-common - elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints + rm -f /opt/so/state/eaintegrations.txt + # Elastic Update for this release, so download Elastic Agent files determine_elastic_agent_upgrade rm -f /opt/so/state/estemplates*.txt From e226efa79903d9e257c5a3ba4df76363cc722417 Mon Sep 17 00:00:00 2001 From: Mike Reeves Date: Fri, 17 Nov 2023 16:35:12 -0500 Subject: [PATCH 11/17] Update soup --- salt/manager/tools/sbin/soup | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/salt/manager/tools/sbin/soup b/salt/manager/tools/sbin/soup index c9d4b1936..9b27ec82c 100755 --- a/salt/manager/tools/sbin/soup +++ b/salt/manager/tools/sbin/soup @@ -450,6 +450,8 @@ post_to_2.4.20() { post_to_2.4.30() { echo "Regenerating Elastic Agent Installers" /sbin/so-elastic-agent-gen-installers + stop_salt_minion + systemctl_func "start" "salt-minion" POSTVERSION=2.4.30 } @@ -753,7 +755,13 @@ apply_hotfix() { elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints /usr/sbin/so-elastic-fleet-integration-policy-elastic-defend - salt-call state.highstate + salt-call state.apply ca queue=True + stop_salt_minion + mv /etc/pki/managerssl.crt /etc/pki/managerssl.crt.old + mv /etc/pki/managerssl.key /etc/pki/managerssl.key.old + systemctl_func "start" "salt-minion" + echo "Applying Salt Highstate" + salt-call state.highstate queue=True else echo "No actions required. ($INSTALLEDVERSION/$HOTFIXVERSION)" fi From 4fb9cce41ce34a19136c1d06bcead0a2777c4912 Mon Sep 17 00:00:00 2001 From: Mike Reeves Date: Fri, 17 Nov 2023 16:38:50 -0500 Subject: [PATCH 12/17] Update signing_policies.conf --- salt/ca/files/signing_policies.conf | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/salt/ca/files/signing_policies.conf b/salt/ca/files/signing_policies.conf index cb57cc640..6f1b1f172 100644 --- a/salt/ca/files/signing_policies.conf +++ b/salt/ca/files/signing_policies.conf @@ -37,7 +37,7 @@ x509_signing_policies: - ST: Utah - L: Salt Lake City - basicConstraints: "critical CA:false" - - keyUsage: "critical keyEncipherment" + - keyUsage: "critical keyEncipherment digitalSignature" - subjectKeyIdentifier: hash - authorityKeyIdentifier: keyid,issuer:always - extendedKeyUsage: serverAuth From 9c371fc3742196d33065dd229f88ce2e13b31160 Mon Sep 17 00:00:00 2001 From: Josh Brower Date: Fri, 17 Nov 2023 16:52:34 -0500 Subject: [PATCH 13/17] Remove state file --- salt/manager/tools/sbin/soup | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/salt/manager/tools/sbin/soup b/salt/manager/tools/sbin/soup index c9d4b1936..5d98dc453 100755 --- a/salt/manager/tools/sbin/soup +++ b/salt/manager/tools/sbin/soup @@ -752,7 +752,7 @@ apply_hotfix() { . /usr/sbin/so-elastic-fleet-common elastic_fleet_integration_remove endpoints-initial elastic-defend-endpoints - /usr/sbin/so-elastic-fleet-integration-policy-elastic-defend + rm -f /opt/so/state/eaintegrations.txt salt-call state.highstate else echo "No actions required. ($INSTALLEDVERSION/$HOTFIXVERSION)" From d89beefc8cdc65f1ac4d684aba4537da8ce1020b Mon Sep 17 00:00:00 2001 From: Mike Reeves Date: Fri, 17 Nov 2023 16:53:11 -0500 Subject: [PATCH 14/17] Update soup --- salt/manager/tools/sbin/soup | 3 +++ 1 file changed, 3 insertions(+) diff --git a/salt/manager/tools/sbin/soup b/salt/manager/tools/sbin/soup index 9b27ec82c..dc28cffd1 100755 --- a/salt/manager/tools/sbin/soup +++ b/salt/manager/tools/sbin/soup @@ -450,7 +450,10 @@ post_to_2.4.20() { post_to_2.4.30() { echo "Regenerating Elastic Agent Installers" /sbin/so-elastic-agent-gen-installers + salt-call state.apply ca queue=True stop_salt_minion + mv /etc/pki/managerssl.crt /etc/pki/managerssl.crt.old + mv /etc/pki/managerssl.key /etc/pki/managerssl.key.old systemctl_func "start" "salt-minion" POSTVERSION=2.4.30 } From e71ee97717e00d6bfc90d80617b4e206ded24344 Mon Sep 17 00:00:00 2001 From: Jason Ertel Date: Sun, 19 Nov 2023 19:03:23 -0500 Subject: [PATCH 15/17] ignore libwbclient upgrade warning --- setup/so-verify | 3 +++ 1 file changed, 3 insertions(+) diff --git a/setup/so-verify b/setup/so-verify index 8133c0bf1..3c20d22b4 100755 --- a/setup/so-verify +++ b/setup/so-verify @@ -38,6 +38,8 @@ log_has_errors() { # may be requested by dependency only (it is configured to refuse manual start/stop). # Command failed with exit code is output during retry loops. + + # "remove failed" is caused by a warning generated by upgrade of libwbclient grep -E "FAILED|Failed|failed|ERROR|Result: False|Error is not recoverable" "$setup_log" | \ grep -vE "The Salt Master has cached the public key for this node" | \ @@ -53,6 +55,7 @@ log_has_errors() { grep -vE "code: 100" | \ grep -vE "/nsm/rules/sigma*" | \ grep -vE "/nsm/rules/yara*" | \ + grep -vE "remove failed" | \ grep -vE "Failed to restart snapd" | \ grep -vE "Login Failed Details" | \ grep -vE "response from daemon: unauthorized" | \ From 45dc1ce036acbaa2d3e82ffdbed0db230afe953d Mon Sep 17 00:00:00 2001 From: Mike Reeves Date: Mon, 20 Nov 2023 11:32:21 -0500 Subject: [PATCH 16/17] 2.4.30 hotfix --- DOWNLOAD_AND_VERIFY_ISO.md | 22 ++++++++++----------- sigs/securityonion-2.4.30-20231117.iso.sig | Bin 0 -> 566 bytes 2 files changed, 11 insertions(+), 11 deletions(-) create mode 100644 sigs/securityonion-2.4.30-20231117.iso.sig diff --git a/DOWNLOAD_AND_VERIFY_ISO.md b/DOWNLOAD_AND_VERIFY_ISO.md index a6b5469f0..7f71cd7ac 100644 --- a/DOWNLOAD_AND_VERIFY_ISO.md +++ b/DOWNLOAD_AND_VERIFY_ISO.md @@ -1,18 +1,18 @@ -### 2.4.30-20231113 ISO image released on 2023/11/13 +### 2.4.30-20231117 ISO image released on 2023/11/20 ### Download and Verify -2.4.30-20231113 ISO image: -https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231113.iso +2.4.30-20231117 ISO image: +https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231117.iso -MD5: 15EB5A74782E4C2D5663D29E275839F6 -SHA1: BBD4A7D77ADDA94B866F1EFED846A83DDFD34D73 -SHA256: 4509EB8E11DB49C6CD3905C74C5525BDB1F773488002179A846E00DE8E499988 +MD5: DF7E2540AFF2A233A9B0EEC78B37D0EA +SHA1: 93DB33A46C6F9C7D7CB8031C0A4F8738F4F14E89 +SHA256: 48C7BD1C664F545554490B8F191BCD7808C519488DCC85984760400F4F68E2DA Signature for ISO image: -https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231113.iso.sig +https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231117.iso.sig Signing key: https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2.4/main/KEYS @@ -26,22 +26,22 @@ wget https://raw.githubusercontent.com/Security-Onion-Solutions/securityonion/2. Download the signature file for the ISO: ``` -wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231113.iso.sig +wget https://github.com/Security-Onion-Solutions/securityonion/raw/2.4/main/sigs/securityonion-2.4.30-20231117.iso.sig ``` Download the ISO image: ``` -wget https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231113.iso +wget https://download.securityonion.net/file/securityonion/securityonion-2.4.30-20231117.iso ``` Verify the downloaded ISO image using the signature file: ``` -gpg --verify securityonion-2.4.30-20231113.iso.sig securityonion-2.4.30-20231113.iso +gpg --verify securityonion-2.4.30-20231117.iso.sig securityonion-2.4.30-20231117.iso ``` The output should show "Good signature" and the Primary key fingerprint should match what's shown below: ``` -gpg: Signature made Mon 13 Nov 2023 09:23:21 AM EST using RSA key ID FE507013 +gpg: Signature made Sun 19 Nov 2023 08:11:53 PM EST using RSA key ID FE507013 gpg: Good signature from "Security Onion Solutions, LLC " gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. diff --git a/sigs/securityonion-2.4.30-20231117.iso.sig b/sigs/securityonion-2.4.30-20231117.iso.sig new file mode 100644 index 0000000000000000000000000000000000000000..debbc8364fc1d32819aa51ef4ae7ec401a29dcd6 GIT binary patch literal 566 zcmV-60?GY}0y6{v0SEvc79j-41gSkXz6^6dp_W8^5Ma0dP;e6k0%cmVSpW(N5PT3| zxBgIY6Gz<-|8W@g6Ox7~bt1Y4vT%C@Ct|3Ve%);i7fE8@Bbwe^Og2myTQ@+NB_>Fw zh4yPFq|QrcRBuD^KgN1-jQ5Pe;kY9sTnu+}SSSTnKyCLc&&hVZg~;W(WThaa{kY%R zzDeXLdY-(NEf64tuVq6lW-G5KYMM4NxEH+^yxhn}J~bLvFj`Yt(=ywzEAdLBZZcX1S%8qvxkFBI*J=DOY&LLGl4XOZP_H~&iMdy@$tF9a%^<9^S zvE)le0in{)PU^AnN6TPdTm;SLC)4`Po`3KwDe~-ZV?ef(P@rZD^4vmbfSaK4>)sg* Em78@5>i_@% literal 0 HcmV?d00001 From b2ea7138f31b9ddcfe56ddc3cc72c1b08a2119f5 Mon Sep 17 00:00:00 2001 From: Jason Ertel Date: Mon, 20 Nov 2023 15:28:56 -0500 Subject: [PATCH 17/17] remove hotfix --- HOTFIX | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/HOTFIX b/HOTFIX index 57030dc85..d3f5a12fa 100644 --- a/HOTFIX +++ b/HOTFIX @@ -1 +1 @@ -20231117 +