Commit graph

24539 commits

Author SHA1 Message Date
Tianling Shen
5eb1ab8a6d
yq: Update to 4.23.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 8d7b7fbfb4)
2022-03-21 23:32:04 +08:00
David Bauer
762794d143 usteer: add package
This commits adds the new usteer package to the packages feed.

usteer is a daemon for steering wireless clients across frequency
bands as well as between multiple access points on a network.

Signed-off-by: David Bauer <mail@david-bauer.net>
2022-03-21 01:30:58 +01:00
Moritz Warning
89cea2a6e7 zerotier: update to 1.8.6
* remove upstreamed gcc10 and cerrno patches
* disable SSO and OIDC as it needs Rust/Cargo support

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Moritz Warning
f7554858ec zerotier: update to 1.8.4
Also remove patch to fix uClibc-ng,
since it is not in openwrt anymore.

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Moritz Warning
7673192a9c zerotier: update to 1.8.3
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Moritz Warning
56c4570589 zerotier: update to 1.8.2
Update und switch back to release source package.

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Oskari Rauta
614b4e003a zerotier: update to 1.8.1
Release notes:

1.8.0
 - Upgrade json.hpp dependency to version 3.10.2
 - Check if DNS servers need to be applied on macOS
 - Set MAC address before bringing up Linux TAP link
 - Stop binding to temporary IPv6 addresses
 - Fix for mistakenly using v6 source addresses for v4 routes on some platforms
 - Fix for MacOS MTU capping issue on feth devices
 - Implement a workaround for one potential source of a "coma" bug, which can occur if buggy NATs/routers stop allowing the service to communicate on a given port. ZeroTier now reassigns a new secondary port if it's offline for a while unless a secondary port is manually specified in local.conf. Working around crummy buggy routers is an ongoing effort.
 - A completely rewritten desktop UI for Mac and Windows!

1.8.1
 - Fix an issue that could cause clobbering of MacOS IP route settings on restart.
 - Added additional hardening against address impersonation on networks (also in 1.6.6).
 - MacOS IPv6 no longer binds to temporary addresses as these can cause interruptions if they expire.
 - Remove support for REALLY ancient 1.1.6 or earlier network controllers.
 - Fix numerous UI issues from 1.8.0 (never fully released).

Changed to git as source and added $(AUTORELEASE)

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2022-03-21 00:25:10 +01:00
Chao Liu
52fcc9bf62 zerotier: add respawn procd param
Signed-off-by: Chao Liu <git@expiron.dev>
2022-03-21 00:25:10 +01:00
Moritz Warning
1e1d5f5d65 zerotier: add option to copy config
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Liangbin Lian
748d87c88e zerotier: fix cross compile in macOS
zerotier's Makefile use `uname` to detect target when cross compile
uname should always be 'linux'

Signed-off-by: Liangbin Lian <jjm2473@gmail.com>
2022-03-21 00:25:10 +01:00
Josef Schlehofer
921af7fdda
Merge pull request #18103 from BKPepe/21.02-haproxy
haproxy: update to version 2.2.22
2022-03-19 04:02:05 +01:00
Josef Schlehofer
ac99fde549
haproxy: update to version 2.2.22
Fixes:
CVE-2022-0711

Changelog:
https://git.haproxy.org/?p=haproxy-2.2.git;a=blob;f=CHANGELOG;h=bfc5d6495e39ace56581663ce820e6909039a286;hb=bfc5d6495e39ace56581663ce820e6909039a286

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-03-18 21:00:56 +01:00
John Audia
ee4267e97f
tree: bump to 2.0.2
Update to latest upstream release.

Build system: x86_64
Build-tested: bcm2711/RPi4B
Run-tested: bcm2711/RPi4B

Signed-off-by: John Audia <graysky@archlinux.us>
(cherry picked from commit c333a5b8c5)
2022-03-18 20:49:57 +01:00
Chris Osgood
f01cf663b6 curl: Fix compiling curl wolfSSL IPv6 disabled
Fixes #18082

Signed-off-by: Chris Osgood <chris_github@functionalfuture.com>
(cherry picked from commit 4eb08bacf3)
2022-03-18 17:54:32 +01:00
Noah Meyerhans
185c5e365e bind: bump to 9.18.1
Fixes multiple security issues:

 * CVE-2022-0667 -- An assertion could occur in resume_dslookup() if the
                    fetch had been shut down earlier
 * CVE-2022-0635 -- Lookups involving a DNAME could trigger an INSIST when
                    "synth-from-dnssec" was enabled
 * CVE-2022-0396 -- A synchronous call to closehandle_cb() caused
                    isc__nm_process_sock_buffer() to be called recursively,
                    which in turn left TCP connections hanging in the CLOSE_WAIT
                    state blocking indefinitely when out-of-order processing was
                    disabled.
 * CVE-2021-25220 -- The rules for acceptance of records into the cache
                     have been tightened to prevent the possibility of
                     poisoning if forwarders send records outside the
                     configured bailiwick

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
(cherry picked from commit 4c6ea5379c)
2022-03-18 08:25:18 -07:00
Rosen Penev
919dd80130
libnetfilter-log: update to 1.0.2
Remove all patches as they have been upstreamed.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 28c1c0d24c)
2022-03-17 23:29:36 +01:00
Michael Heimpold
56fbb7f85e
Merge pull request #18083 from mhei/21.02-libxml2-update
libxml2: update to 2.9.13
2022-03-17 21:06:52 +01:00
Michael Heimpold
8e9f102235 libxml2: update to 2.9.13
This fixes CVE-2022-23308.

Also switch to GNOME as download source and xz tarball.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit 81fd836f97)
2022-03-17 08:06:45 +01:00
Daniel Golle
793e7ee484 auc: don't segfault on invalid URL
Show error message instead of segfaulting in case of an invalid URL
being read from UCI config.

Fixes: #17971
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit c0d2c82528)
2022-03-14 21:29:50 +00:00
Daniel Golle
31e2e7ccb8 auc: fall back to 'sdcard' image
Fallback to use 'sdcard' image in case there is neither 'sysupgrade'
nor 'combined' image available.
This allows using 'auc' on targets where 'sdcard' image is also used
for sysupgrade (such as some mvebu-based devices with eMMC).

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 6b041752a0)
2022-03-14 21:29:50 +00:00
Daniel Golle
8999b60db9 auc: accept both 'y' and 'Y' as confirmation from user
Accept both 'y' and 'Y' as positive confirmation when asking the user
if auc should proceed with requesting and installing an upgrade.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit d27ecdcc49)
2022-03-14 21:29:50 +00:00
Daniel Golle
1adcda368e auc: add '-n' parameter for dry-run
Add option to allow only requesting an image but not actually download
or sysupgrade anything.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 19c135685f)
2022-03-14 21:29:50 +00:00
Paul Spooren
facfdaca20 attendedsysupgrade-common: update to 2021
* Use SPDX
* Use CA (ucert) public key
* Update repo link
* Update maintainer email
* Format description

Signed-off-by: Paul Spooren <mail@aparcar.org>
(cherry picked from commit a54b9570ad)
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2022-03-14 21:29:50 +00:00
Stan Grishin
44e763c62e
Merge pull request #18010 from stangri/openwrt-21.02-curl
[21.02] curl: update to 7.82.0
2022-03-14 14:29:14 -07:00
Josef Schlehofer
85b7d29c3e
Merge pull request #18037 from M95D/openwrt-21.02
tvheadend: bind to LAN IP by default
2022-03-14 17:57:29 +01:00
Tianling Shen
aa41482d38 yq: Update to 4.22.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit b31615c63c)
2022-03-13 00:01:46 -08:00
Tianling Shen
8518b2d5d4 yq: Update to 4.21.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 5529031602)
2022-03-13 00:01:46 -08:00
Josef Schlehofer
f550d90660
syslog-ng: update to version 3.36.1
- Bump version in config file

Release notes:
https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-3.36.1

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 110d46eb37)
2022-03-12 06:51:24 +01:00
Marius Dinu
b2ec8c84fd tvheadend: bind to LAN IP by default
If config parameter is not set, tvheadend will bind to LAN IP address by default.
Fixes issue #16500 without requiring user modifications to config file. It's also more secure if firewall becomes disabled.

Signed-off-by: Marius Dinu <m95d+git@psihoexpert.ro>
(cherry picked from commit 95cbfe893b)
2022-03-10 10:43:44 +02:00
Liang Yang
e061d8eff4 dockerd: fix compilation with glibc
Signed-off-by: Liang Yang <ggg17226@gmail.com>
2022-03-09 02:15:07 -08:00
Liang Yang
fd30ce33f4 docker: fix compilation with glibc
Signed-off-by: Liang Yang <ggg17226@gmail.com>
2022-03-09 02:14:45 -08:00
George Iv
a11359b889 yggdrasil: bump to 0.4.3
Signed-off-by: George Iv <zhoreeq@users.noreply.github.com>
(cherry picked from commit ed49a0bd3a5b482bf35310c9dfdcbb9bf8cefd26)
2022-03-08 22:02:05 -08:00
R4SAS I2P
1d7d46db04 i2pd: Update package
* Update to 2.41.0
* Added use AUTORELEASE

Signed-off-by: R4SAS I2P <r4sas@i2pmail.org>
(cherry picked from commit c08bb2df62)
2022-03-08 21:59:33 -08:00
R4SAS I2P
c384dbb19b i2pd: add service reload support
Signed-off-by: R4SAS I2P <r4sas@i2pmail.org>
(cherry picked from commit b9000cf231)
2022-03-08 21:59:33 -08:00
Thibaut VARÈNE
938187fa2e coova-chilli: remove kmod dep on binary package
There is no reason for the kmod to depend on the binary package
itself, neither for building nor for installing.

That dependency prevents phase1 from building the kmod even though
support is enabled in the binary.

Signed-off-by: Thibaut VARÈNE <hacks@slashdirt.org>
(cherry picked from commit 385923321b)
2022-03-08 21:58:59 -08:00
Gerard Ryan
109f2770a1 cache-domains: Fixed hotplug script not running
Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
2022-03-08 21:55:35 -08:00
Stan Grishin
6df8f76efc
Merge pull request #18019 from rs/nextdns-1.37.10-openwrt-21.02
[21.02] nextdns: Update to version 1.37.10
2022-03-07 13:35:41 -08:00
Josef Schlehofer
aef82c58d2
Merge pull request #18012 from jefferyto/golang-1.17.8-openwrt-21.02
[openwrt-21.02] golang: Update to 1.17.8
2022-03-07 21:40:24 +01:00
Olivier Poitrey
5562cef265 nextdns: Update to version 1.37.10
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2022-03-07 19:48:05 +00:00
Jeffery To
5f20a91711
golang: Update to 1.17.8
Includes fix for CVE-2022-24921 (regexp: stack overflow (process exit)
handling deeply nested regexp).

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
(cherry picked from commit 9704e900da)
2022-03-07 15:44:40 +08:00
Stan Grishin
1a0cb5ce4a curl: update to 7.82.0
* changelog: https://curl.se/changes.html#7_82_0

Signed-off-by: Stan Grishin <stangri@melmac.ca>
(cherry picked from commit 38b3a5f857)
2022-03-07 07:16:40 +00:00
Jeffery To
701ca25325
python-twisted: Update to 22.2.0
Includes fix for CVE-2022-21716 (The Twisted SSH client and server
implementation naively accepted an infinite amount of data for the
peer's SSH version identifier.)

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
(cherry picked from commit 630d6800f2)
2022-03-06 23:37:33 +01:00
Jeffery To
4c07483961
python-twisted: Update to 22.1.0, refresh patches
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
(cherry picked from commit 9f3816d1c6)
2022-03-06 23:37:28 +01:00
Maarten Aertsen
3e75dc582e mdnsresponder: Fix nullpointer dereference while parsing interface list
This patch was backported from https://github.com/IETF-Hackathon/mDNSResponder/commit/1fb07b9524b4afed3a826c087db4dc48a7bfdb8

(cherry picked from commit a4b33ab169a3ca60cd12c2eb5155e899779d3570)
Signed-off-by: Maarten Aertsen <spam-github@rtsn.nl>
2022-03-06 13:08:52 +01:00
Josef Schlehofer
17a7ed325c
Merge pull request #17986 from CyberMind-FR/crowdsec-firewall-bouncer-remove-crowdsec-depency
[21.02] crowdsec-firewall-bouncer: remove crowdsec package dependency
2022-03-04 14:12:25 +01:00
Kerma Gérald
9722b1ec0b crowdsec-firewall-bouncer: remove crowdsec package dependency
Remove un-necessary crowdsec package dependency, to be able to use
crowdsec-firewall-bouncer independently from crowdsec local installation.
(with remote API)

Fix issue: https://github.com/openwrt/packages/issues/17406

Description:
  using crowdsec-firewall-bouncer on many OpenWRT devices connected
  with my domain LAPI server (which collect many crowdsec machines,
  mostly nginx), it works great. Actually, crowdsec package is not
  mandatory for that usage, it would be great if it was not a dependency.

Signed-off-by: Kerma Gérald <gandalf@gk2.net>
(cherry picked from commit ffd97e173c)
Signed-off-by: Kerma Gérald <gandalf@gk2.net>
2022-03-04 13:53:47 +01:00
Chao Liu
5b51bb3a5e kcptun: bump to v20210922
Signed-off-by: Chao Liu <git@expiron.dev>
2022-03-02 16:31:47 -08:00
Rosen Penev
81ed00124b samplicator: fix Wformat warning
Wrong type.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 97cbb3d20a)
2022-02-28 11:52:05 +01:00
Nikos Mavrogiannopoulos
da82b8c9c8 ocserv: updated to 1.1.6
Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
2022-02-25 23:53:10 +01:00
Nikos Mavrogiannopoulos
a8b73c2505 openconnect: updated to 8.20
Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
2022-02-25 23:31:00 +01:00