Commit graph

28372 commits

Author SHA1 Message Date
Glen Huang
c40d7c09b9 acme-acmesh: use $challenge_dir
Signed-off-by: Glen Huang <i@glenhuang.com>
2022-12-14 21:16:57 +08:00
Glen Huang
b907223d57 acme: deprecate state_dir
state_dir is actually a hardcoded value in conffiles. Allowing users to
customize it could result in losing certificates after upgrading if they
don't also specify the dir as being preserved. We shouldn't default to
this dangerous behavior.

With the new ACME package, certificates live in the standard location
/etc/ssl/acme, users who need to do certificate customizations should
look for them in that dir instead.

Signed-off-by: Glen Huang <i@glenhuang.com>
2022-12-14 21:15:52 +08:00
Stan Grishin
dd7e606f17
Merge pull request #20052 from stangri/master-https-dns-proxy
https-dns-proxy: fix restart
2022-12-10 20:32:03 -07:00
Stan Grishin
75ac50ca89 https-dns-proxy: fix restart
Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-10 05:32:20 +00:00
Stan Grishin
39ddb15038
Merge pull request #20040 from stangri/master-https-dns-proxy
https-dns-proxy: add mdns service records
2022-12-09 22:02:49 -07:00
Stan Grishin
4f94b407df
Merge pull request #20050 from stangri/master-simple-adblock
simple-adblock: support new OISD dnsmasq config
2022-12-09 22:02:11 -07:00
Stan Grishin
3950f0ce99 simple-adblock: support new OISD dnsmasq config
* OISD dnsmasq config files switched from using address= to server=

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-10 01:57:37 +00:00
Florian Eckert
d03ad5036c
Merge pull request #20018 from cbarrick/gcp_ddns
ddns-scripts: add support for Google Cloud DNS
2022-12-09 15:55:30 +01:00
Josef Schlehofer
f53eb1231a
Merge pull request #20037 from 1715173329/g1194
golang: Update to 1.19.4
2022-12-09 11:53:40 +01:00
Vladimir Ulrich
23e6200e4d zoneinfo: updated to the latest release
Signed-off-by: Vladimir Ulrich <admin@evl.su>
2022-12-09 10:26:55 +02:00
Chris Barrick
cbdc67bd10 ddns-scripts: add support for Google Cloud DNS
The implementation uses a GCP service account. The user is expected to
create and secure a service account and generate a private key. The
"password" field can contain the key inline or be a file path pointing
to the key file on the router.

The GCP project name and Cloud DNS ManagedZone must also be provided.
These are taken as form-urlencoded key-value pairs in param_enc. The TTL
can optionally be supplied in param_opt.

Signed-off-by: Chris Barrick <chrisbarrick@google.com>
2022-12-08 22:04:33 -05:00
Carlo Alberto Ferraris
02e154d3e5 tailscale: preserve tailscaled state file
Fixes #19774 

Signed-off-by: Carlo Alberto Ferraris <cafxx@strayorange.com>
2022-12-09 07:21:33 +08:00
Kuan-Yi Li
cec29e9105 modemmanager: bump to 1.20.2
Drop deprecated AUTORELEASE.

Disable unused tests as its compilation is optional in 1.20.

Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
2022-12-09 06:32:32 +08:00
Kuan-Yi Li
570c549bc6 libqmi: bump to 1.32.2
Drop deprecated AUTORELEASE.

Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
2022-12-09 06:32:32 +08:00
Kuan-Yi Li
b930149e55 libmbim: bump to 1.28.2
Drop deprecated AUTORELEASE.

Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
2022-12-09 06:32:32 +08:00
Kuan-Yi Li
e1a78f0033 libqrtr-glib: drop deprecated AUTORELEASE
Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
2022-12-09 06:32:32 +08:00
Hirokazu MORIKAWA
f141e79455 swig: bump to 4.1.1
update summary
* Add Javascript Node v12-v18 support, remove support prior to v6.
* Octave 6.0 to 6.4 support added.
* Add PHP 8 support.
* PHP wrapping is now done entirely via PHP's C API - no more .php wrapper.
* Perl 5.8.0 is now the oldest version SWIG supports.
* Python 3.3 is now the oldest Python 3 version SWIG supports.
* Python 3.9-3.11 support added.
* Various memory leak fixes in Python generated code.
* Scilab 5.5-6.1 support improved.
* Many improvements for each and every target language.
* Various preprocessor expression handling improvements.
* Improved C99, C++11, C++14, C++17 support. Start adding C++20 standard.
* Make SWIG much more move semantics friendly.
* Add C++ std::unique_ptr support.
* Few minor C++ template handling improvements.
* Various C++ using declaration fixes.
* Few fixes for handling Doxygen comments.
* GitHub Actions is now used instead of Travis CI for continuous integration.
* Add building SWIG using CMake as a secondary build system.
* Update optional SWIG build dependency for regex support from PCRE to PCRE2.
* Couple of stability fixes.
* Stability fix in ccache-swig when calculating hashes of inputs.
* Some template handling improvements.
* R - minor fixes plus deprecation for rtypecheck typemaps being optional.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2022-12-09 06:30:48 +08:00
Alois Klink
18d3c529fa github-ci: error on any shell errors
Enable `errexit` and `nounset` [POSIX shell options][1]
in `.github/workflows/entrypoint.sh` so that the script fails
if any command within the script fails.

[1]: https://pubs.opengroup.org/onlinepubs/9699919799//utilities/V3_chap02.html#set

Reported-by: Marius Dinu <m95d+git@psihoexpert.ro>
Fixes: https://github.com/openwrt/packages/issues/19953
Signed-off-by: Alois Klink <alois@aloisklink.com>
2022-12-08 10:55:52 +01:00
Alois Klink
6703d76230 privoxy: fix preinst/postinst script indentation
Fix the indentation of the preinst/postinst scripts for the privoxy
package.

Because these scripts didn't start with `#!/bin/sh`
(they instead started with the TAB character), `/bin/sh` was not used
to start them.

On x86_64 and i386_pentium-mmx, this seems to be fine, but on
arm_cortex-a15_neon-vfpv4 and aarch64_cortex-a53, running these
scripts fails with a:

```
Installing privoxy (3.0.33-3) to root...
Collected errors:
 * pkg_run_script: package "privoxy" preinst script returned status 1.
 * preinst_configure: Aborting installation of privoxy.
 * opkg_install_cmd: Cannot install package privoxy.
```

Reported-by: Marius Dinu <m95d+git@psihoexpert.ro>
Signed-off-by: Alois Klink <alois@aloisklink.com>
2022-12-08 10:54:55 +01:00
Alexandru Ardelean
d20f2e324d
Merge pull request #20032 from peter-stadler/django
django: bump version 4.1.3
2022-12-08 11:27:05 +02:00
Peter Stadler
d321db6409 django: bump version 4.1.3
fix CVE-2022-41323

Signed-off-by: Peter Stadler <peter.stadler@student.uibk.ac.at>
2022-12-08 08:35:31 +01:00
Stijn Tintel
fbe0e832e1
Merge pull request #19933 from stintel/vallumd
vallumd: updates
2022-12-08 00:02:18 +02:00
Stan Grishin
ee37d0ec86 https-dns-proxy: add mdns service records
* add mdns records for started instances
* Makefile: use $(PKG_VERSION) as a value for PKG_SOURCE_DATE instead of
  hard-coding it

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-07 21:00:08 +00:00
John Audia
d6b712cde6 snort3: unified configs: local.lua and homenet.lua
This commit adds /etc/snort/local.lua and /etc/snort/homenet.lua for user
defined config options which is more simplistic than modifying upstream
files directly. That can be tedious and decisive to maintain in sync with
upstream changes.  The init script has been adjusted accordingly.

Acknowledgment to amish who maintains the Arch Linux snort-nfqueue package[1]
for these ideas and initial code.

Another modification is dropping the following args in the call to
/usr/bin/snort by the init system as these options are provided in
/etc/snort/local.lua:

 * --daq-dir /usr/lib/daq/
 * -A "$alert_module"

Instructions to configure snort3:
1. Edit /etc/snort/homenet.lua and redefine HOME_NET and EXTERNAL_NET, for example:

   HOME_NET = [[ 10.9.8.0/24 192.168.1.0/24 ]]
   EXTERNAL_NET = "!$HOME_NET"

2. Edit /etc/snort/local.lua to setup options unique to your use case of snort.
   The default ones I included should be sane for the role of IDS (alert only),
   but users may easily uncomment some options therein to use IPS (drop) mode.

3. Install or symlink rules to /etc/snort/rules/snort.rules and optionally
   edit /etc/snort/local.lua to define extra rules files if not using a unified
   'snort.rules'

References:
1. https://aur.archlinux.org/packages/snort-nfqueue

Signed-off-by: John Audia <therealgraysky@proton.me>
2022-12-08 04:47:38 +08:00
Tianling Shen
6a0ee524b1
golang: Update to 1.19.4
go1.19.4 (released 2022-12-06) includes security fixes to the net/http
and os packages, as well as bug fixes to the compiler, the runtime,
and the crypto/x509, os/exec, and sync/atomic packages.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-12-08 00:43:34 +08:00
Tianling Shen
5c17cd1c81
Merge pull request #20036 from ysc3839/natmap-fix
natmap: merge "ipv4" and "ipv6" options into single "family" option
2022-12-07 22:28:29 +08:00
Linus Lüssing
f22370b1b7 bpfcountd: remove incomplete/broken namespace feature
The original idea of the extra namespace variable was to set up
bpfcountd from other daemons etc. independent of what a user configured
in /etc/config/bpfcountd for instance. Like:

 $ UCI_CONFIG_DIR=/var/run/bpfcountd/gluon-config \
   /etc/init.d/bpfcountd start "" gluon

However there are still issues with this approach:

1) Instance specific stop calls like:

 $ /etc/init.d/bpfcountd stop <instance-name> <namespace>"

will not  stop the according namespaced instance, as the stop() in
/etc/rc.common will call procd_kill() without the namespace prefix.
And we can't overwrite that behaviour. And asking a user to use
"... start <in> <ns>" and "... stop <ns>.<in>" is confusing.
(and currently "... stop <ns>.<in>" would not remove the correct
unix socket).

2) A stop call without an instance/config name would always stop all
instances. So the namespace variable would be ignored.
While start without an instance "works", but:

3) It would stop any process that is not in the currently selected
UCI_CONFIG_DIR.

As all this is not easily fixable without changing OpenWrt internals,
just remove the whole namespace idea for now.

Signed-off-by: Linus Lüssing <linus.luessing@c0d3.blue>
2022-12-07 17:43:03 +08:00
Richard Yu
190e04caf6
natmap: merge "ipv4" and "ipv6" options into single "family" option
Signed-off-by: Richard Yu <yurichard3839@gmail.com>
2022-12-07 15:18:09 +08:00
Tianling Shen
88d33fef91
dnsproxy: Update to 0.46.4
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-12-07 06:58:42 +08:00
Tianling Shen
a1a14c1103
cloudflared: Update to 2022.11.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2022-12-07 06:58:35 +08:00
Josef Schlehofer
ec2f58a2e5
Merge pull request #19613 from wormi4ok/tailscale-version-bump
tailscale: update to v1.32.0
2022-12-05 23:08:33 +01:00
John Audia
eb251c50bb snort3: update to 3.1.48.0-1
Had to add a patch to allow builds of targets containing '+' in their dir name

Build system: x86_64
Build-tested: bcm2711/RPi4B
Run-tested: bcm2711/RPi4B

Signed-off-by: John Audia <therealgraysky@proton.me>
2022-12-06 02:22:55 +08:00
Tianling Shen
02aff4aa77
Merge pull request #19998 from ysc3839/natmap
natmap: add new package
2022-12-06 00:28:53 +08:00
Richard Yu
e691a25cb3
natmap: add new package
NATMap is a program for opening port behind full cone NAT (NAT-1),
without the need for using UPnP or another port forward settings.

More details can be found at original repo: https://github.com/heiher/natmap

Signed-off-by: Richard Yu <yurichard3839@gmail.com>
2022-12-05 16:03:51 +08:00
Daniel Golle
f60f11f927
snowflake: update to version 2.4.1
Changes in version v2.4.1 - 2022-12-01
 - Issue 40224: Bug fix in utls roundtripper

Changes in version v2.4.0 - 2022-11-29
 - Fix proxy command line help output
 - Issue 40123: Reduce multicast DNS candidates
 - Add ICE ephemeral ports range setting
 - Reformat using Go 1.19
 - Update CI tests to include latest and minimum Go versions
 - Issue 40184: Use fixed unit for bandwidth logging
 - Update gorilla/websocket to v1.5.0
 - Issue 40175: Server performance improvements
 - Issue 40183: Change snowflake proxy log verbosity
 - Issue 40117: Display proxy NAT type in logs
 - Issue 40198: Add a `orport-srcaddr` server transport option
 - Add gofmt output to CI test
 - Issue 40185:  Change bandwidth type from int to int64 to prevent overflow
 - Add version output support to snowflake
 - Issue 40229: Change regexes for ipv6 addresses to catch url-encoded addresses
 - Issue 40220: Close stale connections in standalone proxy

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2022-12-05 01:21:12 +00:00
Stan Grishin
13a9f1914b
Merge pull request #19763 from stangri/master-pbr
pbr: initial commit
2022-12-04 10:50:59 -07:00
Javier Marcet
37a86626e0 docker-compose: Update to version 2.14.0
Signed-off-by: Javier Marcet <javier@marcet.info>
2022-12-04 22:00:40 +08:00
Hannu Nyman
c122236552 xz: update to 5.2.9
Update xz to version 5.2.9.

Switch back to .bz2 sources, as we already download .bz2 for tools/
No sense to re-download sources as a .xz file.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2022-12-04 11:43:53 +02:00
Marius Dinu
091681e152 tvheadend: Fix github warning about AUTORELEASE
Signed-off-by: Marius Dinu <m95d+git@psihoexpert.ro>
2022-12-03 11:31:55 -08:00
Marius Dinu
1490531981 tvheadend: add conditions for -O3 and LTO optimizations
Building for arc, mips and powerpc platforms fails if -O3 and LTO optimizations are enabled. This patch removes that option for everything other than arm and x86_64. These are known to work.
Fixes issue #19923.
Also fixes a typo in the description.

Signed-off-by: Marius Dinu <m95d+git@psihoexpert.ro>
2022-12-03 11:31:55 -08:00
Stanislav Petrashov
1ffe60bc85
tailscale: Update to version 1.32.3
Signed-off-by: Stanislav Petrashov <s@petrashov.ru>
2022-12-03 19:50:45 +01:00
Stanislav Petrashov
9434a2dfb2
tailscale: update to v1.32.0
Signed-off-by: Stanislav Petrashov <s@petrashov.ru>
2022-12-03 19:50:16 +01:00
Stan Grishin
47eca64cb8 pbr: initial commit
* The makefile produces the nft and iptables capable `pbr` package
  and the `pbr-iptables` package for legacy setups
* This replaces `vpnbypass` and `vpn-policy-routing` packages
* I'm soliciting feedback on this package and my intention is to
  update the version to 1.0.0 before this is merged, but I need the
  feedback on this and luci-app-pbr before then.

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-03 02:30:29 +00:00
Linus Lüssing
865412cd04 bpfcountd: add initial package
bpfcountd was created to obtain packet statistics in larger networks
without stressing the cpu resources. bpfcountd will count the amount
of packages and bytes over time (for each defined rule). The rules
are defined using the tcpdump filter syntax (bpf). The collected
data is provided on a unix socket in plaintext.

Signed-off-by: Linus Lüssing <linus.luessing@c0d3.blue>
2022-12-03 04:08:51 +08:00
Stan Grishin
8d2d6c46d6
Merge pull request #19993 from stangri/master-simple-adblock
simple-adblock: localizable error/warning messages
2022-12-02 12:19:21 -07:00
Paul Spooren
75ff4ba358 ci: only comment AUTORELEASE deprecation if exists
If it doesn't exists, don't confuse the contributors.

Signed-off-by: Paul Spooren <mail@aparcar.org>
2022-12-02 19:59:44 +01:00
Rudy Andram
318e48c6f9 stubby: bump to latest 0.4.2
Maintainer: @neheb (find it by checking history of the package Makefile)
Compile tested: aarch64/ipq8074
Run tested: aarch64/ipq8074

Description: stubby: bump to latest 0.4.2

Signed-off-by: Rudy Andram <rmandrad@gmail.com>
2022-12-02 19:43:36 +02:00
Lucian Cristian
f6e1fc8d8f frr: update to 8.4.1
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2022-12-02 19:42:30 +02:00
Lucian Cristian
50be576b8b nss: update to 3.85
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2022-12-02 18:17:30 +02:00
Glenn Strauss
9cd61fde7b lighttpd: add lighttpd-mod-rrdtool dep on rrdtool1
add lighttpd-mod-rrdtool dependency on rrdtool1

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2022-12-01 19:02:21 -08:00