Commit graph

1077 commits

Author SHA1 Message Date
heil
3ca1051e8f haproxy: fixes from upstream
- BUILD/MINOR: tools: rename popcount to my_popcountl
 - BUG/MAJOR: buffers: make the buffer_slow_realign() function respect output data

Signed-off-by: heil <heil@terminal-consulting.de>
2015-07-03 18:34:01 +02:00
Luka Perkov
2f3ab73ffa squid: drop musl compat patch
Signed-off-by: Luka Perkov <luka@openwrt.org>
2015-07-03 16:51:23 +02:00
Steven Barth
b59187dc62 Merge pull request #1530 from aa65535/master
shadowsocks-libev: add package
2015-07-03 08:40:13 +02:00
aa65535
d1293286a8 shadowsocks-libev: use realname in the maintainer tag
Signed-off-by: aa65535 <aa65535@live.com>
2015-07-03 14:11:30 +08:00
Steven Barth
c5a8ec5aa3 Merge pull request #1015 from aTanW/master
ipsec-tools: racoon uci integration
2015-07-03 07:44:56 +02:00
Steven Barth
a48f4b0603 Merge pull request #1516 from bk138/ola-0.9.6
ola: Update to 0.9.6, tidy up makefile, try to resolve build dependencies
2015-07-03 07:23:15 +02:00
aa65535
024bd84282 shadowsocks-libev: add package
Shadowsocks-libev is a lightweight secured socks5 proxy for embedded devices and low end boxes.

Signed-off-by: aa65535 <aa65535@live.com>
2015-07-03 11:01:32 +08:00
heil
290489d997 haproxy: fixes from upstream
- BUG/MAJOR: buffers: make the buffer_slow_realign() function respect output data

Signed-off-by: heil <heil@terminal-consulting.de>
2015-07-02 21:53:56 +02:00
Christian Beier
8c6edb3def ola: update to 0.9.6, tidy up makefile, try to resolve build dependencies.
Signed-off-by: Christian Beier <dontmind@freeshell.org>
2015-07-02 14:08:20 +02:00
Jo-Philipp Wich
38b1cf314e Merge pull request #1471 from jow-/shadowsocks-fortify-compat
shadowsocks-client: fix fortify source compatibility
2015-07-02 10:01:55 +02:00
Nikos Mavrogiannopoulos
11c9408690 ocserv: updated to 0.10.6
Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
2015-07-02 00:22:33 +02:00
Hauke Mehrtens
2627b0ea50 iotivity: add IoTivity
IoTivity is a Internet of Things framework implementing the Open
Interconnect Consortium Specification.

The current version of IoTivity is still in heavy development and does
not support all its intended features, but I still want to add it to
the packages feed to make it easier for others to extend the OpenWrt
support.

Signed-off-by: Hauke Mehrtens <hauke.mehrtens@lantiq.com>
2015-07-01 22:58:06 +02:00
Marko Ratkaj
6336fe5bce squid: bump version to 3.5.5
Signed-off-by: Marko Ratkaj <marko.ratkaj@sartura.hr>
2015-07-01 16:23:54 +02:00
Steven Barth
47315efe2b Merge pull request #1495 from oskar456/unboundecdsa
unbound: Support for validating ECDSA DNSSEC signatures
2015-07-01 14:35:40 +02:00
Jonas Gorski
d77bf6f1f4 znc: allow setting ssl fingerprints
ZNC 1.6.0 now verifies SSL certificates on connect, and some Servers
do not use a valid one (e.g. freenode).

Signed-off-by: Jonas Gorski <jogo@openwrt.org>
2015-07-01 12:31:48 +02:00
Jonas Gorski
d665caa851 znc: close Network tags
Signed-off-by: Jonas Gorski <jogo@openwrt.org>
2015-07-01 12:27:49 +02:00
Jo-Philipp Wich
9c6d45f278 Merge pull request #1511 from jow-/davfs2-musl-compat
davfs2: fix musl compatibility
2015-07-01 10:15:26 +02:00
Jonathan McCrohan
d62d28bc0a Merge pull request #1512 from jow-/mtr-disable-ipv6-fix
mtr: fix build with globally disabled IPv6
2015-07-01 01:17:39 +01:00
Jo-Philipp Wich
dceb78b254 Merge pull request #1031 from ionum/master
net-snmp: Enable pass_persist support for snmpd in Makefile
2015-07-01 01:25:52 +02:00
tripolar
5afea09fa7 Merge pull request #1510 from jow-/ctorrent-svn-musl-compat
ctorrent-svn: fix musl compatibility

Signed-off-by: Jo-Philipp Wich jow@openwrt.org
Signed-off-by: tripolar@gmx.at
2015-06-30 20:54:22 +02:00
Jo-Philipp Wich
f17dd769f1 mtr: fix build with globally disabled IPv6
The current mtr does not build if IPv6 is disabled globally, add a patch to
fix the build in this case.

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
2015-06-30 17:32:03 +02:00
Jo-Philipp Wich
2273ff7642 davfs2: fix musl compatibility
- Add header tests for `error.h`, `sys/types.h` and `sys/select.h`
 - Add function tests for `canonicalize_file_name()` and `fopencookie()`
 - Add `compat.h` header to provide replacements for `error()`,
   `error_at_line()` and `canonicalize_file_name()` as well as the
   `_PATH_MOUNTED` and `_PATH_MNTTAB` defines
 - Add missing includes for `sys/select.h` and `sys/types.h`
 - Disable libneon debugging if no `fopencookie()` implementation is
   available

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
2015-06-30 12:57:51 +02:00
Jo-Philipp Wich
0169cbd3a0 ctorrent-svn: fix musl compatibility
Add missing `sys/types.h` include to `strnstr()` replacement code in
`compat.c` in order to declare `ssize_t` type under musl.

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
2015-06-30 11:14:34 +02:00
Daniel Golle
c31e6bb7c0 gnutls: backport upstream --with-ca-path implementation
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2015-06-29 20:34:08 +02:00
Daniel Golle
9ea72dda91 gnurl: fall-back on default system trust store
If no explicit CA file is given, gnurl fails to setup HTTPS connections
as it doesn't looks for certificates in /etc/ssl/certs/ in any way.
Fix that by utilizing GnuTLS' gnutls_certificate_set_x509_system_trust
as a fall-back if neither CA file, CA path nor SRP is declared.

Reported upstream: https://github.com/bagder/curl/issues/330
Fix suggested upstream: https://github.com/bagder/curl/pull/331

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2015-06-29 19:51:08 +02:00
Cezary Jackiewicz
62fff58380 [packages] vsftpd: CVE-2015-1419 Unspecified vulnerability in vsftp 3.0.2 and earlier allows remote attackers to bypass access restrictions via unknown vectors, related to deny_file parsing. 2015-06-28 22:02:08 +02:00
Daniel Golle
b218e8af7c gnunet: update source
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2015-06-28 19:52:25 +02:00
aTanW
f60ca0b30f Merge https://github.com/openwrt/packages
Conflicts:
	net/ipsec-tools/Makefile
2015-06-28 17:58:00 +03:00
Jo-Philipp Wich
9d423ba553 Merge pull request #1492 from tru7/linknx
linknx: fix musl compatibility
2015-06-28 14:58:24 +02:00
Jo-Philipp Wich
90a4712fd8 Merge pull request #1491 from tru7/knxd
knxd: fix musl compatibility
2015-06-28 14:57:24 +02:00
Ondřej Caletka
a8b46fbc80 unbound: Support for validating ECDSA DNSSEC signatures
This patch enables support for validating ECDSA signatures, which
are being deployed more and more in DNSSEC.

Proper validating can be tested by observing the AD flag in following
query (courtesy of Olafur Gudmundsson, CloudFlare):
 $ dig ds-4.alg-14-nsec.dnssec-test.org

Signed-off-by: Ondřej Caletka <ondrej@caletka.cz>
2015-06-28 11:27:30 +02:00
Nuno Goncalves
87648e8586 Merge pull request #1486 from jow-/ntpd-fortify-source-compat
ntpd: fix fortify source compatibility
2015-06-28 02:32:31 +01:00
Nuno Goncalves
a681ed3daa Merge pull request #1484 from jow-/ntripclient-musl-compat
ntripclient: fix musl comaptibility
2015-06-28 02:32:00 +01:00
Othmar Truniger
3cf6ae0fb1 linknx: fix musl compatibility
Signed-off-by: Othmar Truniger <github@truniger.ch>
2015-06-27 22:55:51 +02:00
Othmar Truniger
77cee81ca0 knxd: fix musl compatibility
Signed-off-by: Othmar Truniger <github@truniger.ch>
2015-06-27 21:49:25 +02:00
Jo-Philipp Wich
572fd1e40b Merge pull request #1439 from mstorchak/iodine
iodine: fix musl compatibility
2015-06-27 13:30:05 +02:00
Nikos Mavrogiannopoulos
3ed70bb772 vpnc-scripts: bumped version
Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
2015-06-27 08:22:07 +02:00
Nikos Mavrogiannopoulos
c70aff2445 Merge pull request #1489 from nmav/dns
vpnc-script: handle multiple servers in INTERNAL_IP_DNS vars
2015-06-27 09:20:37 +03:00
Nikos Mavrogiannopoulos
39ecf00d65 vpnc-script: handle multiple servers in INTERNAL_IP_DNS vars
Resolves #1372

Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
2015-06-27 08:15:29 +02:00
heil
7c0d75e013 haproxy: bugfix release 1.5.13
Released version 1.5.13 with the following main changes :
  - BUG/MINOR: check: fix tcpcheck error message
  - CLEANUP: deinit: remove codes for cleaning p->block_rules
  - DOC: Update doc about weight, act and bck fields in the statistics
  - MINOR: ssl: add a destructor to free allocated SSL ressources
  - BUG/MEDIUM: ssl: fix tune.ssl.default-dh-param value being overwritten
  - MEDIUM: ssl: replace standards DH groups with custom ones
  - BUG/MINOR: debug: display (null) in place of "meth"
  - BUG/MINOR: cfgparse: fix typo in 'option httplog' error message
  - BUG/MEDIUM: cfgparse: segfault when userlist is misused
  - BUG/MEDIUM: stats: properly initialize the scope before dumping stats
  - BUG/MEDIUM: http: don't forward client shutdown without NOLINGER except for tunnels
  - CLEANUP: checks: fix double usage of cur / current_step in tcp-checks
  - BUG/MEDIUM: checks: do not dereference head of a tcp-check at the end
  - CLEANUP: checks: simplify the loop processing of tcp-checks
  - BUG/MAJOR: checks: always check for end of list before proceeding
  - BUG/MEDIUM: checks: do not dereference a list as a tcpcheck struct
  - BUG/MEDIUM: peers: apply a random reconnection timeout
  - BUG/MINOR: ssl: fix smp_fetch_ssl_fc_session_id
  - MEDIUM: init: don't stop proxies in parent process when exiting
  - MINOR: peers: store the pointer to the signal handler
  - MEDIUM: peers: unregister peers that were never started
  - MEDIUM: config: propagate the table's process list to the peers sections
  - MEDIUM: init: stop any peers section not bound to the correct process
  - MEDIUM: config: validate that peers sections are bound to exactly one process
  - MAJOR: peers: allow peers section to be used with nbproc > 1
  - DOC: relax the peers restriction to single-process
  - CLEANUP: config: fix misleading information in error message.
  - MINOR: config: report the number of processes using a peers section in the error case
  - BUG/MEDIUM: config: properly compute the default number of processes for a proxy

Signed-off-by: heil <heil@terminal-consulting.de>
2015-06-26 18:02:49 +02:00
Jo-Philipp Wich
fdde981522 net-snmp: fix musl compatibility
Fixup `iwlib.h` to not consider an musl environment to be an unsupported
platform.

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
2015-06-26 17:47:33 +02:00
Jo-Philipp Wich
cbf11196b7 ntpd: fix fortify source compatibility
The ntpd package ships autoconf macros which attempt to test for the C99
compliance of `snprintf()` and `vsnprintf()`.

Those macros unconditionally consider the functions not compliant in a cross
compile setting and therfore break all subsequent configure tests because
the `snprintf` and `vsnprintf` symbols are shadowed with `#define` directives
redirecting them to their respectiv gnulib replacements.

The fortify source headers in turn will `#undef` those defines when wrapping
the associated functions and therfore cause all `conftest` programs to emit
a failure.

Pass the required magic autoconf cache variables via `CONFIGURE_VARS` to let
`./configure` assume C99 compliance of the affected functions, thus fixing
the build.

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
2015-06-26 17:17:13 +02:00
Jo-Philipp Wich
e10abaf165 ntripclient: fix musl comaptibility
Add missing `sys/select.h` include to `ntripclient.c` to provide
declarations for `struct timeval` and `fd_set` under musl.

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
2015-06-26 16:48:26 +02:00
Daniel Golle
2925877e73 gnunet: update source
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2015-06-26 04:20:08 +02:00
Luka Perkov
0983670143 Merge pull request #1469 from jow-/squid-musl-compat
squid: fix musl compatibility
2015-06-25 22:04:35 +02:00
Luka Perkov
c6ffaa34d6 snort: add maintainer and SPDX license info
Signed-off-by: Luka Perkov <luka@openwrt.org>
2015-06-25 22:00:35 +02:00
Luka Perkov
b35efb38d5 Merge pull request #1470 from jow-/snort-hardening-fix
snort: fix build with CONFIG_PKG_CHECK_FORMAT_SECURITY
2015-06-25 21:54:58 +02:00
Maxim Storchak
5d4955c9ff iodine: fix musl compatibility
Signed-off-by: Maxim Storchak <m.storchak@gmail.com>
2015-06-25 19:57:50 +03:00
Jo-Philipp Wich
a89c0cadcf shadowsocks-client: fix fortify source compatibility
The shadowsocks source uses the name `encrypt` which is already reserved by
the `unistd.h` header. Rename the local `encrypt` and `decrypt` functions to
`crypto_encrypt` and `crypto_decrypt` in order to prevent clashes with the
standard headers.

Fixes the following build error oberserved on the buildbot:

    In file included from client.c:19:0:
    crypto.h:18:5: error: conflicting types for 'encrypt'
     int encrypt(int sockfd, struct link *ln);
         ^
    In file included from .../staging_dir/toolchain-mipsel_mips32_gcc-4.8-linaro_musl-1.1.10/include/fortify/unistd.h:20:0,
                     from client.c:12:
    .../staging_dir/toolchain-mipsel_mips32_gcc-4.8-linaro_musl-1.1.10/include/unistd.h:145:6: note: previous declaration of 'encrypt' was here
     void encrypt(char *, int);
          ^
    make[3]: *** [sslocal] Error 1

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
2015-06-25 18:02:37 +02:00
Jo-Philipp Wich
eaf4652760 snort: fix build with CONFIG_PKG_CHECK_FORMAT_SECURITY
The configure script incorrectly mangles `CFLAGS` by attempting to remove
`-Werror` from it, thus turning `-Werror=format-security` into just
`=format-security` which will cause subsequent autoconf tests to fail.

Patch out the custom `CFLAGS` mangling to fix the build.

Signed-off-by: Jo-Philipp Wich <jow@openwrt.org>
2015-06-25 17:29:22 +02:00