Commit graph

8212 commits

Author SHA1 Message Date
Philip Prindeville
e05e8dc880 isc-dhcp: support hex strings as option arguments
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-02-05 14:20:05 -07:00
Philip Prindeville
6daaac6e30
Merge pull request #14657 from pprindeville/isc-dhcp-gen-A-RRs
isc-dhcp: treat 'config host' like superset of 'config domain'
2021-02-05 14:19:13 -07:00
Rosen Penev
7e6daedf4c
Merge pull request #14636 from neheb/n
netifyd: add reproducibility patch
2021-02-05 01:18:08 -08:00
Rosen Penev
6d1045e3a1
Merge pull request #14653 from lucize/libreup
libreswan: update to 4.2
2021-02-05 00:42:50 -08:00
Philip Prindeville
0c360d1c6b isc-dhcp: treat 'config host' like superset of 'config domain'
Not including an A record mapping will cause nsupdate to balk at
CNAME and MX records (and probably SRV as well) because the target
will be unknown at the time of parsing, until the lease gets
activated.

We need these RR's to be in place well before the servers even
come up.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-02-04 14:58:33 -07:00
Dirk Brenken
cadaedbfb2
banip: release 0.7.0
* major rewrite
* add support for multiple chains
* add mac whitelisting
* add support for multiple ssh daemons in parallel
* add an ipset report engine
* add mail notifications
* add suspend/resume functions
* add a cron wrapper to set an ipset related auto-timer for
  automatic blocklist updates
* add a list wrapper to add/remove blocklist sources
* add 19.x and Turris OS 5.x compatibility code
* sources stored in an external compressed json file
  (/etc/banip/banip.sources.gz)
* change Country/ASN download sources (faster/more reliable)
* fix DHCPv6/icmpv6 issues

Signed-off-by: Dirk Brenken <dev@brenken.org>
2021-02-04 21:18:02 +01:00
Lucian Cristian
73460d8648 libreswan: update to 4.2
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2021-02-04 21:25:50 +02:00
Rosen Penev
a3a96300af
Merge pull request #14642 from 1715173329/xray
xray-core: fix service start / reload
2021-02-03 21:31:50 -08:00
Tianling Shen
ae044501b3
xray-core: fix service start / reload
Fix starting problem:
Starting function should be named 'start_service' instead of 'start_instance'.

Fix reloading problem:
Register reload tigger for uci config itself.
And, xray does not support reload currently, so use legacy restart as reload.

Fixes: 6c9b96352f ("xray-core: add init script")

Signed-off-by: Tianling Shen <cnsztl@project-openwrt.eu.org>
2021-02-04 11:50:40 +08:00
Rosen Penev
c01ce53579
Merge pull request #14640 from neheb/ks
ksmbd(-tools): update to 3.3.4
2021-02-03 17:24:35 -08:00
Rosen Penev
45fd6a92c3
Merge pull request #14610 from mtelka/mini_snmpd
mini_snmpd: Fix minor nit in the init script
2021-02-03 14:53:03 -08:00
Rosen Penev
18ce7b437a
Merge pull request #14579 from neheb/wge
wget: update to 1.21.1
2021-02-03 14:52:22 -08:00
Rosen Penev
f4150da17a
Merge pull request #14639 from 1715173329/xray
xray-core: add example configs and init script
2021-02-03 14:48:17 -08:00
Rosen Penev
1cc951ca4f
ksmbd-tools: update to 3.3.4
Major changes are:

    add "vfs objects = acl_xattr" parameter in configuration.
    fix wrong group domain name in lsarpc response.
    set to SID_TYPE_UNKNOWN if there is no domain sid in server.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-02-03 14:46:12 -08:00
Tianling Shen
6c9b96352f
xray-core: add init script
Add init script so the users could run it with their configs quickly.

Signed-off-by: Tianling Shen <cnsztl@project-openwrt.eu.org>
2021-02-04 06:29:58 +08:00
Tianling Shen
c8c2564012
xray-core: add example configs
Thry're from v2fly/v2ray-core wikis, used as examples.

Signed-off-by: Tianling Shen <cnsztl@project-openwrt.eu.org>
2021-02-04 06:29:48 +08:00
Tianling Shen
87a5328dd4
xray-core: update project url
Use $(AUTORELEASE) to bump PKG_RELEASE automatically.

Signed-off-by: Tianling Shen <cnsztl@project-openwrt.eu.org>
2021-02-04 06:28:36 +08:00
Rosen Penev
d367563230
Merge pull request #14638 from nmeyerhans/iputils-20210202
iputils: bump to 20210202 and fix version reporting
2021-02-03 13:50:54 -08:00
Rosen Penev
1a9d256754
Merge pull request #14627 from gstrauss/lighttpd-1.4.59
lighttpd: update to lighttpd 1.4.59 release hash
2021-02-03 13:38:51 -08:00
Noah Meyerhans
64ed17c88c iputils: Fix version reporting
The iputils build system embeds git tags into the generated binaries
for use by commands like ping -V.  Since openwrt packaging is done in
a different repository from the upstream repo, the tags it finds
aren't particularly meaningful, and we get confusing results like
those described at https://github.com/openwrt/packages/issues/13920

This change removes the git tag inspection in favor of the static
version string that's already known to the upstream build system.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2021-02-03 13:33:06 -08:00
Noah Meyerhans
abb0501e28 iputils: bump to 20200202
Move the tftpd binary from /usr/bin to /usr/sbin per upstream.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2021-02-03 09:03:39 -08:00
Glenn Strauss
d614b4692c lighttpd: update to lighttpd 1.4.59 release hash
update to lighttpd 1.4.59 release hash
add new base module mod_ajp13

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2021-02-03 01:59:04 -05:00
Rosen Penev
b38d4642ba netifyd: add reproducibility patch
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-02-02 22:44:07 -08:00
Rosen Penev
04c911aeb0
Merge pull request #14630 from sartura/sysrepo
Update sysrepo packages
2021-02-02 19:41:08 -08:00
Stan Grishin
182cc9920e simple-adblock: remove dependency on jsonfilter & old code
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-02-02 22:11:06 +00:00
Jakov Smolic
962537c5f9
sysrepo: Bump to 1.4.104
Signed-off-by: Jakov Smolic <jakov.smolic@sartura.hr>
2021-02-02 21:04:23 +01:00
Jakov Smolic
8e1a762edd
netopeer2: Bump to 1.1.53
Signed-off-by: Jakov Smolic <jakov.smolic@sartura.hr>
2021-02-02 20:28:10 +01:00
Tianling Shen
27a29803c1
xray-core: add new package
Signed-off-by: Tianling Shen <cnsztl@project-openwrt.eu.org>
2021-02-02 22:02:42 +08:00
W. Michael Petullo
0f0f8f34dd snort3: update to 3.1.0.0
Signed-off-by: W. Michael Petullo <mike@flyn.org>
2021-01-31 13:39:35 +02:00
Marcel Telka
2e4ac1a9d4 mini_snmpd: Fix minor nit in the init script
This removes extra ] from grep invocation in append_interface().

Signed-off-by: Marcel Telka <marcel@telka.sk>
2021-01-31 00:23:25 +01:00
Rosen Penev
d8c810861c
udpspeeder: add missing libatomic dependency
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-01-29 15:53:54 -08:00
Noah Meyerhans
437e131fe0 bind: bump to 9.17.9
Drop obsolete patches

 - 001-no-tests.patch
 - 002-fix-cross-compilation.patch

Move several user-executable binaries from /usr/sbin to /usr/bin per
upstream.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2021-01-29 09:10:31 -08:00
Philip Prindeville
a138ceec86 isc-dhcp: add support for multi-homing in 'domain' configs
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-01-28 18:12:11 -07:00
Florian Eckert
e00afb6dc9
Merge pull request #14588 from TDT-AG/pr/20210127-keepalived
keepalived: update to version 2.1.1
2021-01-28 08:04:19 +01:00
Rosen Penev
ebba975286
Merge pull request #14592 from dobo90/socat_improvement
socat: allow more complex command line options
2021-01-27 13:32:46 -08:00
Dobroslaw Kijowski
218b7521aa socat: allow more complex command line options
Current implementation of socat's init service doesn't allow to run more
complex configurations. As an example there's no possibility to execute
following command:

  socat TCP-LISTEN:8080,fork,reuseaddr,bind=192.168.1.1 \
    EXEC:"/sbin/ip netns exec somenetns socat STDIO TCP:10.0.0.1:80"

In such command the first line is argv[1] and the second line is
argv[2]. SocatOptions config option is a string. As as a consequence of
this each word will be passed as a separate argv element. Socat won't be
able to parse arguments correctly.

In order to mitigate this issue, we can also accept SocatOptions as a
list of strings. Following config file will work correctly:

config socat 'tunnel_8080_into_somenetns'
	option enable '1'
	list SocatOptions 'TCP-LISTEN:8080,fork,reuseaddr,bind=192.168.1.1'
	list SocatOptions 'EXEC:"/sbin/ip netns exec somenetns socat STDIO TCP:10.0.0.1:80"'

While we're at it, pass stdout and stderr into logread.

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2021-01-27 21:24:38 +01:00
Florian Eckert
17346bfefa keepalived: use autorelease feature
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2021-01-27 15:37:48 +01:00
Florian Eckert
4a37ef0d7d keepalived: update to version 2.2.1
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2021-01-27 15:37:44 +01:00
Edi Turn
0e4f2b1068 ddns-scripts: make WGET_SSL executable
Signed-off-by: Edi Turn <yyxstter@gmail.com>
2021-01-27 20:40:03 +08:00
Nick Hainke
2220432300 dawn: use autorelease feature
Package version is automatically increased as described here:
https://github.com/openwrt/packages/issues/14537

Signed-off-by: Nick Hainke <vincent@systemli.org>
2021-01-27 12:21:27 +01:00
Rosen Penev
bc2c551d75
wget: update to 1.21.1
Use PKG_INSTALL for consistency between packages.

Use PKG_BUILD_PARALLEL for faster compilation.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-01-26 17:06:37 -08:00
Rosen Penev
341e72d203
Merge pull request #14515 from sartura/sysrepo
netopeer2: merge-config: listen on ipv6 and ipv4
2021-01-26 17:05:38 -08:00
Jakov Smolic
ede1755192
netopeer2: merge-config: listen on ipv6 and ipv4
* The default local-adress makes Netopeer2-server listen on ipv4 only.
We change it to :: in order to listen on ipv6 as well as ipv4.

Signed-off-by: Jakov Smolic <jakov.smolic@sartura.hr>
2021-01-26 23:56:11 +01:00
Rosen Penev
d20012580f
Merge pull request #14494 from neheb/n
nfs-kernel-server: update to 2.5.2
2021-01-26 14:55:11 -08:00
Rosen Penev
ad0469afc1
Merge pull request #14578 from lucize/frrup
frr: update 7.5 to latest backports
2021-01-26 14:54:13 -08:00
Rosen Penev
d2e8582b6e
Merge pull request #14576 from Andy2244/ksmbd-fix-#13758
ksmbd-tools: fix #13758
2021-01-26 14:54:03 -08:00
Lucian Cristian
fabe4c030a frr: update 7.5 to latest backports
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2021-01-26 21:02:28 +02:00
Andy Walsh
4c373ec720 ksmbd-tools: fix #13758
* fix for possible exploit #13758
* sanetize all external template/config inputs
* fix some shellcheck warnings

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
2021-01-26 12:40:08 +01:00
Andy Walsh
35b3a4444e samba4: update to 4.13.4
* update to 4.13.4

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
2021-01-26 12:15:24 +01:00
Gerald Hansen
219b0af28f ddns-scripts: Increase PKG_RELEASE
Signed-off-by: Gerald Hansen <gerald.hansen@posteo.de>
2021-01-26 11:24:08 +01:00
Gerald Hansen
937560417c ddns-scripts: Remove not working ddns provider
I checked the hostname for existing DNS A and AAAA entries and these
ones didn't have an entry.

Signed-off-by: Gerald Hansen <gerald.hansen@cloud.ionos.com>
2021-01-26 11:24:08 +01:00
Gerald Hansen
9787de80e5 ddns-scripts: Change parameter for myonlineportal
As the default uclient-fetch doesn't support authentication header
and the ddns provider myonlineportal.net support also username and
passwort as url parameter this can be changed.

Signed-off-by: Gerald Hansen <gerald.hansen@cloud.ionos.com>
2021-01-26 11:24:08 +01:00
Olivier Poitrey
3575fe6408 nextdns: Update to version 1.10.1
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-01-25 17:55:29 +00:00
Jan Pavlinec
d8f5c577a9
clamav: update to version 0.103.0
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-01-25 15:14:50 +01:00
Rosen Penev
45918150c3
Merge pull request #14555 from fatbob313/umurmur0.2.19
uMurmur: Update to 0.2.19. Patches required for 0.2.17 merged upstream.
2021-01-25 01:42:36 -08:00
Jo-Philipp Wich
82fdb0ed05
Merge pull request #14539 from PolynomialDivision/owipcalc-default-route
owipcalc: fix contains not respect default route
2021-01-25 10:36:15 +01:00
Martin Johansson
268a905630 uMurmur: Update to 0.2.19. Patches required for 0.2.17 merged upstream.
Signed-off-by: Martin Johansson <martin@fatbob.nu>
2021-01-25 09:12:47 +01:00
Hannu Nyman
1059e3cdb8
Merge pull request #14334 from bogdik/master
Add Eoip packege
2021-01-24 19:39:24 +02:00
Bogdan Shatik
64e3fdbdce eoip: Add package
add eoip package,this can create ethernet
tunnels compatible with Mikrotik EoIP tunnel.
At current moment it is easiest way
to create stateless tunnel with Mikrotik.

Signed-off-by: Bogdan Shatik <bogdikxxx@mail.ru>
2021-01-24 16:39:15 +03:00
Josef Schlehofer
14b751cdc4
Merge pull request #14529 from ja-pa/ooniprobe-3.4.0
ooniprobe: update to version 3.4.0
2021-01-24 09:16:38 +01:00
Nick Hainke
e974acaac7 owipcalc: fix contains not respect default route
In IPv4 the default route can be written as
 0.0.0.0/0

In IPv6 the default route can be written as
 ::/0

If u try
  owipcalc 0.0.0.0/0 contains 1.1.1.1
or
  owipcalc ::/0 contains ::1
owipcalc will respond with 0 meaning that the "default prefixes" do not
contain the routes.
That is why we check now for 0 prefix.

Furthermore, if the prefix is 0, i will be 16. We will access a negative
array entry in the line:
 uint8_t net1 = x->s6_addr[15-i] & m;

Divide by % 16 to prevent i becoming 16:
 uint8_t i = ((128 - a->prefix) / 8) % 16;

Signed-off-by: Nick Hainke <vincent@systemli.org>
2021-01-23 17:48:18 +01:00
Rosen Penev
4b4be9d312
Merge pull request #14531 from adschm/calcmove
owipcalc/maccalc: import from base
2021-01-23 03:44:20 -08:00
Rosen Penev
453f7d8cd7
Merge pull request #14530 from TDT-AG/pr/20210122-iperf
iperf: import iperf3 and iperf from base
2021-01-22 22:28:45 -08:00
Rosen Penev
8079f4845f
Merge pull request #14500 from stangri/master-https-dns-proxy
https-dns-proxy: bugfix: high CPU utilization
2021-01-22 17:42:11 -08:00
Adrian Schmutzler
7a07dfc6db maccalc: import from base
This is a helpful utility, but it does not have any dependencies
in base repository. Move it to packages feed.

Signed-off-by: Adrian Schmutzler <freifunk@adrianschmutzler.de>
2021-01-22 17:13:42 +01:00
Adrian Schmutzler
ee75bd5a8f owipcalc: import from base
This is a helpful utility, but it does not have any dependencies
in base repository. Move it to packages feed.

Signed-off-by: Adrian Schmutzler <freifunk@adrianschmutzler.de>
2021-01-22 17:12:53 +01:00
Florian Eckert
2f5a543973 iperf3: import from base
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2021-01-22 16:27:06 +01:00
Florian Eckert
2131f33d08 iperf: import from base
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2021-01-22 16:26:55 +01:00
Jan Pavlinec
3f87d3dcc4
ooniprobe: update to version 3.4.0
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-01-22 16:19:44 +01:00
Jan Pavlinec
fe5c201bdd
tor-hs: fix rpcd
Changes:
- add rpcd dependecy
- handle rpcd in post inst/rm sections

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-01-22 14:10:58 +01:00
Florian Eckert
f21885ec85
Merge pull request #14510 from zhanhb/ddns-scripts
ddns-scripts: fix wget-ssl path
2021-01-22 09:09:48 +01:00
Philip Prindeville
f31c937e94
Merge pull request #14489 from pprindeville/isc-dhcp-add-other-rfc1918-nets
isc-dhcp: support dynamic dns for 10/8 and 172.16/12
2021-01-21 19:49:00 -07:00
Karl Palsson
4149abc29b mosquitto: bump to 2.0.5
Includes 2.0.5 https://mosquitto.org/blog/2021/01/version-2-0-5-released/
Includes 2.0.4 https://mosquitto.org/blog/2020/12/version-2-0-4-released/
Includes 2.0.3 https://mosquitto.org/blog/2020/12/version-2-0-3-released/

Multiple fixes to broker and client and libraries, related the 2.x
changes.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2021-01-21 13:49:27 +00:00
Jan Hak
341fffb8dd knot: update to version 3.0.4
Signed-off-by: Jan Hak <jan.hak@nic.cz>
2021-01-21 09:42:56 +01:00
Gregory L. Dietsche
31fc1cf9b0 safe-search: restart dnsmasq instead of reload
Some users have reported that reloading dnsmasq does not always work. It
sometimes stop responding to DNS lookup requests after being reloaded.
This patch changes "safe-search-maintenance" so that it restarts dnsmasq
instead of reloading it.

Signed-off-by: Gregory L. Dietsche <gregory.dietsche@cuw.edu>
2021-01-20 08:28:22 -10:00
Gregory L. Dietsche
f2837d7470 safe-search: Dynamic Updates
Ensure that the best available IP is always used for all supported
safe-search providers. This is accomplished by periodically checking
DNS for the most recent list of IP addresses associated with each
provider.

Signed-off-by: Gregory L. Dietsche <gregory.dietsche@cuw.edu>
2021-01-20 08:28:22 -10:00
Nishant Sharma
aa68fa13e4 udpspeeder: Update to version 20210116.0 of upstream
Signed-off-by: Nishant Sharma <codemarauder@gmail.com>
2021-01-20 14:24:11 +05:30
Nicholas Smith
a0fb37f78c modemmanager: bump version
Signed-off-by: Nicholas Smith <nicholas.smith@telcoantennas.com.au>
2021-01-19 08:47:52 +10:00
Stan Grishin
379d97b70c https-dns-proxy: bugfix: high CPU utilization
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-01-18 15:27:42 +00:00
Rosen Penev
d09d428c2e nfs-kernel-server: update to 2.5.2
Remove uClibc-ng patch as it was upstreamed.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-01-17 15:05:19 -08:00
Christian Lachner
066f2049ba haproxy: Update HAProxy to v2.2.8
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2021-01-17 22:50:41 +02:00
Huangbin Zhan
9eab8cceda ddns-scripts: fix wget-ssl path
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2021-01-17 22:28:05 +08:00
Philip Prindeville
cf8526dbb2 isc-dhcp: support dynamic dns for 10/8 and 172.16/12
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-01-15 21:10:22 -07:00
Rosen Penev
16cb5ebca2
Merge pull request #14480 from OpenIoTHub/master
gateway-go: update to 0.1.95
2021-01-14 00:22:35 -08:00
Philip Prindeville
3a07e294a9 isc-dhcp: add dynamic dns integration for local bind server
Start after named is running.

Add support for "cname", "domain", "mxhost", and "srvhost" configs.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2021-01-13 11:43:52 -07:00
Yu Fang
abe5fc79da gateway-go: update to 0.1.95
Signed-off-by: Yu Fang <yu@iotserv.com>
2021-01-14 00:52:48 +08:00
Hannu Nyman
c4b2fbbd43
Merge pull request #14366 from bmork/smartsnmpd
smartsnmpd: remove dysfunctional package
2021-01-12 17:12:20 +02:00
Jan Pavlinec
ec810f1134 ooniprobe: update to version 3.1.0
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-01-12 17:08:28 +02:00
Hannu Nyman
006baf7baf
Merge pull request #14441 from flyn-org/clamav
clamav: allow configuring clamd to use TCP socket
2021-01-12 17:08:11 +02:00
Rosen Penev
954955ea8f
Merge pull request #14470 from neheb/g
gnunet: fix compilation with libdane
2021-01-11 19:59:41 -08:00
Rosen Penev
ed628f3a46
gnunet: fix compilation with libdane
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-01-11 15:25:57 -08:00
Peter Stadler
5cffe853e6 nginx: use UCI configuration provided by nginx-util
* update to version 1.19.6

* remove default configuration files and documentation as
  they are in the package `nginx-util`.

* do not install a `/etc/nginx/nginx.conf` file.

* use the dynamic `/etc/nginx/uci.conf` if the symlink (to
  `/var/lib/nginx/uci.conf`) is not dead after calling
  `nginx-util init_lan` (else try `/etc/nginx/nginx.conf`)

* replace nginx package by a dummy depending on `nginx-ssl`;
  the dummies will be removed after a transition period.

Signed-off-by: Peter Stadler <peter.stadler@student.uibk.ac.at>
2021-01-11 23:08:01 +01:00
Andy Walsh
c8f3cca283 samba4: add proper io_uring kernel detection
* add proper io_uring kernel detection

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
2021-01-11 23:02:26 +02:00
Olivier Poitrey
99fde1ece3 nextdns: Update to version 1.9.6
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2021-01-10 23:25:28 +00:00
Christian Lachner
f7982b7e99 haproxy: Update HAProxy to v2.2.7
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2021-01-10 22:48:21 +02:00
Rosen Penev
09bf45bc3e
Merge pull request #14445 from neheb/ksmbn
ksmbd: update to 3.3.3
2021-01-10 01:20:44 -08:00
Rosen Penev
f9f216a066
tcpreplay: add libdnet support
On Arch Linux, tcpreplay is picking up the host dnet-config and adding
OS paths, thereby breaking compilation. The easiest solution is to add
libdnet support as the previous commit fixes dnet-config on OpenWrt.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-01-09 17:58:11 -08:00
Rosen Penev
f4b63d6f2c
ksmbd-tools: update to 3.3.3
The major change are:

    Fix memleak and invalid memory write issue

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2021-01-09 17:08:31 -08:00
W. Michael Petullo
54016ddaf4 clamav: allow configuration to use TCP socket
Something having to do with passing a file descriptor over spamd's
Unix socket causes the ClamAV milter to fail. The milter says "ERROR:
Unknown reply from clamd," and running strace on spamd reveals "No file
descriptor received. ERROR."

Some work by others can be found on the Internet that suggests using
a TCP socket for the communication between the milter and spamd fixes
this. Lucian Cristian confirmed this on OpenWrt.

I am not sure why the Unix socket does not work. I suspect it is something
related to musl, but I have not yet found evidence of this.

This merge request adds the option to configure spamd to use a TCP
socket, and it uses this as the default. The merge request also adds an
init script for clamav-milter.

Signed-off-by: W. Michael Petullo <mike@flyn.org>
2021-01-09 18:29:46 -06:00
Andy Walsh
97e55a28b3 samba4: update to 4.13.3, enbale io_uring
* update to 4.13.3
* enable vfs io_uring module by default, if kernel supports it
* fix for possible exploit openwrt/packages#13758
* sanetize all external template/config inputs
* fix some shellcheck warnings
* remove old aio modules/deps

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
2021-01-08 17:28:36 +01:00
Rosen Penev
8ede7162e5
Merge pull request #14415 from linosgian/openssh_add_fido2_support
openssh: Add FIDO2 hardware token support
2021-01-08 03:33:34 -08:00
Linos Giannopoulos
855db864b0 openssh: Add FIDO2 hardware token support
Version 8.2[0] added support for two new key types: "ecdsa-sk" and
"ed25519-sk". These two type enable the usage of hardware tokens that
implement the FIDO (or FIDO2) standard, as an authentication method for
SSH.

Since we're already on version 8.4 all we need to do is to explicitly enable
the support for hardware keys when compiling OpenSSH and add all the
missing dependencies OpenSSH requires.

OpenSSH depends on libfido2[1], to communicate with the FIDO devices
over USB. In turn, libfido2 depends on libcbor, a C implementation of
the CBOR protocol[2] and OpenSSL.

[0]: https://lwn.net/Articles/812537/
[1]: https://github.com/Yubico/libfido2
[2]: tools.ietf.org/html/rfc7049

Signed-off-by: Linos Giannopoulos <linosgian00@gmail.com>
2021-01-07 00:53:05 +02:00
Daniel Golle
9ea8cccd35 transmission: add syscalls needed on PPC to seccomp rules
Add fadvise64_64 and fchmod syscalls needed on PowerPC platforms to
seccomp rules of transmission-daemon.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2021-01-06 22:17:40 +00:00
Stan Grishin
e948d41622 https-dns-proxy: update to 2020-11-25: add HTTP auth and DSCP codepoint support
Signed-off-by: Stan Grishin <stangri@melmac.net>
2021-01-06 11:48:07 -10:00
Rosen Penev
b4762c7e6f
Merge pull request #14063 from peter-stadler/etebase
[RFC] etebase: add package
2021-01-06 13:43:27 -08:00
Rosen Penev
67bd007f26
Merge pull request #13405 from peter-stadler/nginx-util-uci
[RFC] nginx-util: use UCI for server configuration
2021-01-06 13:43:12 -08:00
Rosen Penev
fbdab5bb08
Merge pull request #14299 from wulfy23/nftqosinit
nft-qos: silence buildsystem errors
2021-01-05 17:30:27 -08:00
Rosen Penev
e29ef2fc57
Merge pull request #14416 from dobo90/adguardhome_v0.104.3
[v2] adguardhome: upstream upgrade to v0.104.3
2021-01-05 17:16:26 -08:00
Rosen Penev
6b1f0439e8
Merge pull request #14362 from neheb/hwd
hwdata: introduce package and use
2021-01-03 15:17:59 -08:00
Dobroslaw Kijowski
85f8fd69bc adguardhome: upstream upgrade to v0.104.3
Full changelog available at:
 * https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.104.2
 * https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.104.3

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2021-01-03 13:42:31 +01:00
Etienne Champetier
9ef2e619b9
Merge pull request #14413 from aaronjg/bugfix/mwan3-ipv6-regression
mwan3: fix regression in ipv6 routing tables
2021-01-03 05:47:51 -05:00
Aaron Goodman
267b65ad9f mwan3: fix regression in ipv6 routing tables
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2021-01-02 21:37:37 -05:00
Maxim Storchak
40555eebf9 rsync: enable iconv if NLS support is enabled globally
Signed-off-by: Maxim Storchak <m.storchak@gmail.com>
2021-01-02 22:52:52 +02:00
Rosen Penev
33cc6d0990
Merge pull request #14402 from wongsyrone/update-miniupnpc
net/miniupnpc: update to 2.2.1
2021-01-01 11:28:32 -08:00
Syrone Wong
3230f67d3a net/miniupnpc: update to 2.2.1
Signed-off-by: Syrone Wong <wong.syrone@gmail.com>
2021-01-01 22:16:42 +08:00
Syrone Wong
5eb01b5a3e net/miniupnpd: update to 2.2.1
Signed-off-by: Syrone Wong <wong.syrone@gmail.com>
2021-01-01 22:15:37 +08:00
Nikos Mavrogiannopoulos
60e7eee859
Merge pull request #14400 from FrederickGeek8/fix-14287
openconnect: Fix secondary password script overwriting primary
2021-01-01 11:51:56 +01:00
Frederick Morlock
5d85f5af63 openconnect: Fix secondary password script overwriting primary
When specifying a secondary password script, the output should be appended to the temporary password file and shouldn't overwrite it. If you refer to the case where there is a static secondary password, you can see that the secondary password is appended. Without this fix, only the secondary password is passed to the `openconnect` session.

Signed-off-by: Frederick Morlock <FrederickGeek8@gmail.com>
2021-01-01 17:18:27 +08:00
Rosen Penev
2dd17b0a79
Merge pull request #14342 from neheb/transmis
transmission: do not use wolfSSL
2020-12-31 22:21:40 -08:00
Rosen Penev
b318690cfe
gitolite: change symlink from absolute to relative
Fixes bad symlink under InstallDev.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-31 18:10:27 -08:00
Rosen Penev
044b05fc04
transmission: do not use wolfSSL
There's some kind of crash internally in wolfSSL. It doesn't seem like
anyone knows how to fix it. Just disable it for now.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-31 18:05:03 -08:00
Rosen Penev
f84c7960f3
freeradius3: add missing libbsd dependency to glibc
Fixes packages generation.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-31 15:38:32 -08:00
Etienne Champetier
423c276409
Merge pull request #14388 from Bloup1net/phantapresolv
phantap: Update to latest commit
2020-12-31 15:11:04 -05:00
Diana Dragusin
ba6453889c phantap: Update to latest commit
a717723 Get resolvfile from configuration

Signed-off-by: Diana Dragusin <diana.dragusin@nccgroup.com>
2020-12-31 11:38:50 -05:00
Toke Høiland-Jørgensen
476e77be6b sqm-scripts: Update PKG_MIRROR_HASH
Forgot to update the MIRROR_HASH

Fixes: 2c652128c5: ("sqm-scripts: Bump to v1.5.0")
Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2020-12-31 17:28:15 +01:00
Toke Høiland-Jørgensen
2c652128c5 sqm-scripts: Bump to v1.5.0
Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2020-12-31 16:18:15 +01:00
Rosen Penev
38913265b7
Merge pull request #14377 from neheb/bfd
bfdd: fix compilation with glibc
2020-12-31 00:20:10 -08:00
Rosen Penev
34a3e9bc09
Merge pull request #14374 from neheb/ksmbdt
ksmbd-tools: fix compilation with glibc
2020-12-30 17:35:24 -08:00
Rosen Penev
c23556c8b0
Merge pull request #14375 from neheb/c
coova-chili: fix compilation with glibc
2020-12-30 17:24:38 -08:00
Rosen Penev
9a7c519f6e
Merge pull request #14379 from neheb/atft
atftp: fix compilation with glibc
2020-12-30 16:57:51 -08:00
Rosen Penev
b90ce88d03
bfdd: fix compilation with glibc
Remove uClibc-ng patch as it's not in the tree anymore.

Also remove the _GNU_SOURCE CFLAG for the same reason.

Refreshed patches.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-30 16:53:53 -08:00
Rosen Penev
9ac737ac80
atftp: fix compilation with glibc
It's defining two functions twice for some reason.

Refreshed patches.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-30 16:37:57 -08:00
Rosen Penev
687dc0cc95
coova-chili: fix compilation with glibc
Disable Werror as it errors on pointless stuff.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-30 16:34:30 -08:00
Rosen Penev
5eeb8f8a79
ksmbd-tools: fix compilation with glibc
Needs to be linked to lpthread.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-30 16:32:58 -08:00
Nick Hainke
2922da5fe6 dawn: bump to latest version
Includes:
  CMakeList: fix compiling with glibc

Signed-off-by: Nick Hainke <vincent@systemli.org>
2020-12-31 00:14:25 +01:00
Dirk Brenken
33ed1eff57
banip: DHCPv6 bugfix
* ignore local DHCPv6 related and local icmpv6 traffic in banIP chain

Signed-off-by: Dirk Brenken <dev@brenken.org>
2020-12-30 20:02:40 +01:00
Bjørn Mork
e62da3eebd
smartsnmpd: remove dysfunctional package
This package has been completely broken on several levels since
commit eadd5abe40 ("smartsnmpd: Update to 2015-02-22 version")

The update changed the configuration file syntax without fixing
the scripts generating this file.  The OpenWrt package would
therefore fail to run.

Worse than that, the last upstream version is completely broken
is unable to generate proper snmp replies even if the
configuration file is fixed, This has been tested and verified
on both OpenWrt/realtek and Debian/amd64.

I considered fixing the package, but dropped it for the following
reasons
 1) upstream has abandoned the project
 2) the upstream fork "smithsnmp" continues to make aribitrary
    changes to configuration files and other packaging challenges
 3) the package is tied to the lua5.1 C API, and further upgrades
    will be non-trivial
 4) there are several other snmp daemons available in OpenWrt,
    without any of these issues
 5) no one is interested in this package

The last point is proven by the lack of testing and feedback.
The last update was not even tested by the person preparing and
commiting the update.

Signed-off-by: Bjørn Mork <bjorn@mork.no>
2020-12-30 13:22:10 +01:00
Rosen Penev
71cb006920
usbip: use new usbids package
It's more consistent since it installs to the same place.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-29 21:16:04 -08:00
Rosen Penev
eb4a86a1bc
Merge pull request #14345 from lucize/frrup
frr: update stable to 2020-12-22
2020-12-28 18:07:31 -08:00
Glenn Strauss
a49dec8a5f lighttpd: update to lighttpd 1.4.58 release hash
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-12-27 23:54:45 -05:00
Lucian Cristian
51a481ff94 frr: update stable to 2020-12-22
Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2020-12-27 22:33:34 +02:00
Rosen Penev
3351568e9c
Merge pull request #14309 from neheb/squid
squid: update to 4.13
2020-12-24 19:18:04 -08:00
Rosen Penev
740740d219
Merge pull request #14318 from zhanhb/wget
wget: fix build
2020-12-23 14:04:34 -08:00
Thiago de Arruda Padilha
864092e073 adblock: fix when PROCD_RELOAD_DELAY is set
Move the "PROCD_RELOAD_DELAY" line to after the "delay" variable is set.

Signed-off-by: Thiago de Arruda Padilha <tpadilha84@gmail.com>
2020-12-23 16:59:32 -03:00
Huangbin Zhan
422360510c wget: fix build
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2020-12-23 23:07:31 +08:00
Rosen Penev
f73287dec1
squid: update to 4.13
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-22 19:23:19 -08:00
Rosen Penev
87177eef75
tcpreplay: fix compilation with Arch Linux
It tries to link to host libraries for some reason. Add autoreconf to
fix. Also remove redundant prefixes.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-22 19:01:12 -08:00
Karel Kočí
0663d8c2f8
wget: rename wget to wget-ssl
The idea behind this is to prevent confusion between "virtual" package
wget and real one. Wget is provided by not just wget packages but also
by uclient-fetch so technically it is better to threat wget as virtual
package.

Signed-off-by: Karel Kočí <karel.koci@nic.cz>
2020-12-22 17:58:30 +01:00
Imran Khan
f88485f572 nft-qos: silence buildsystem errors
add IPKG_INSTROOT to init script to
silence build system errors

Signed-off-by: Imran Khan <gururug@gmail.com>
2020-12-23 02:21:09 +11:00
Florian Eckert
1b1fa35436
Merge pull request #14292 from TDT-AG/pr/20201221-mwan3
mwan3: minor fixes
2020-12-22 11:55:50 +01:00
Florian Eckert
06ce040cbe mwan3: update PKG_VERSION
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-12-22 08:38:30 +01:00
Florian Eckert
2f58865a01 mwan3: fix string check for active_tbls
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-12-22 08:38:30 +01:00
Florian Eckert
0dbbc58cbc mwan3: fix tab
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-12-22 08:38:30 +01:00
Florian Eckert
6133d5a0e9 mwan3: remove unused mwan3_unlock function call
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-12-22 08:38:30 +01:00
Florian Eckert
55051e6c7b mwan3: reinstall missing mwan3.user file
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-12-22 08:38:30 +01:00
Florian Eckert
c085f2648f mwan3: fix MWAN3_STARTUP caller
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-12-22 08:38:30 +01:00
Florian Eckert
8f697b45c8 mwan3: fix whitspace
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-12-22 08:38:30 +01:00
Florian Eckert
8d41e5477f mwan3: fix logger tag in mwan3 init
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-12-22 08:38:25 +01:00
Josef Schlehofer
8dd0b511fa
Merge pull request #14279 from neheb/nod
noddos: remove
2020-12-21 18:46:56 +01:00
Daniel Golle
b212b108ce hs20: patch hostapd to make use of updated dm_ddf
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2020-12-20 21:44:21 +00:00
Peter Stadler
6d20bbf734 etebase: upgrade to 0.6.1
Signed-off-by: Peter Stadler <peter.stadler@student.uibk.ac.at>
2020-12-20 22:00:13 +01:00
Peter Stadler
49e053ac52 etesync-server: rename to etebase
Signed-off-by: Peter Stadler <peter.stadler@student.uibk.ac.at>
2020-12-20 22:00:13 +01:00
Daniel Golle
20c52fc651 transmission: jail: add allow 'getuid' syscall
transmission needs 'getuid', at least on mips_24kc.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2020-12-20 19:09:43 +00:00
Daniel Golle
3421545a2c hs20: some small improvements
* update device description framework to v1.3
 * setup methods in database
 * setup uhttpd to use hs20 cert

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2020-12-20 19:09:43 +00:00
Rosen Penev
de7d02de2d
Merge pull request #14282 from pesintta/uacme-1.6
uacme: Update to 1.6
2020-12-20 09:11:06 -08:00
Dirk Brenken
e3db5016a1
adblock: fix restrictive sort selection
Signed-off-by: Dirk Brenken <dev@brenken.org>
2020-12-20 17:28:00 +01:00
Antti Seppälä
561a6959db uacme: Update to 1.6
Signed-off-by: Antti Seppälä <a.seppala@gmail.com>
2020-12-20 13:25:34 +02:00
Rosen Penev
3622077030
Merge pull request #14277 from neheb/ope
open-iscsi: update to 2.1.3
2020-12-20 01:07:30 -08:00
Rosen Penev
eb9d5bbf39
noddos: remove
According to https://github.com/openwrt/packages/issues/14248 , this
is totally abandoned. The website isn't even up anymore.

Fixes: https://github.com/openwrt/packages/issues/14248

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-19 22:30:59 -08:00
Rosen Penev
9f217ae3f9
open-iscsi: update to 2.1.3
pass CC to configure. host CC flags can leak in the build system,
preventing compilation.

Deleted upstream backports.

Refreshed patches.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-19 21:54:58 -08:00
Dirk Brenken
aa80d082e6
adblock: update 4.0.8
* source changes:
  - add new source 'games_tracking' (https://www.gameindustry.eu)
  - change malwaredomains source mirror
  - remove malwarelist source (source is empty)
  - remove youtube source (does not work at all)
* support multiple firewall zones for dns redirects
* add firewall zone/port housekeeping
* fix dns backend detection in TurrisOS (LuCI change)
* add check for gnu-sort

Signed-off-by: Dirk Brenken <dev@brenken.org>
2020-12-19 21:19:14 +01:00
Stan Grishin
95586689f5 simple-adblock: config update
Signed-off-by: Stan Grishin <stangri@melmac.net>
2020-12-18 22:04:59 -06:00
Philip Prindeville
a8918ba140
Merge pull request #14268 from pprindeville/fix-isc-dhcp-reload-typo
isc-dhcp: fix regression in reloading
2020-12-18 18:32:56 -07:00
Philip Prindeville
7fbcaa75e2 isc-dhcp: fix regression in reloading
Introduced in "isc-dhcp: improve startup performance"

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2020-12-18 18:11:41 -07:00
Rosen Penev
5b2a507b6b
Merge pull request #14223 from tofurky/fwknop_gpgme_deps
fwknop: gpgme: fix build of fwknop with gpg enabled
2020-12-18 15:04:55 -08:00
Philip Prindeville
743f6c84a2
Merge pull request #14233 from pprindeville/issue#14232
bind: start named early enough to be present when isc-dhcp starts
2020-12-18 10:58:21 -07:00
Rosen Penev
22e2968c56
Merge pull request #14263 from neheb/easy
openvpn-easy-rsa: use relative symlinks
2020-12-18 04:41:34 -08:00
Rosen Penev
aa438f550b
Merge pull request #14265 from neheb/olap
protobuf: fix bad CFLAGS in pkgconfig
2020-12-18 01:17:41 -08:00
Rosen Penev
e72192ce2d
Merge pull request #14261 from neheb/cifs2
cifs-utils: link mount utility relative instead of absolute
2020-12-17 23:15:16 -08:00
Rosen Penev
b2989d1c1d
ola: fix compilation with older clang
Werror is normally passed with pkgconfig headers. Remove it.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-17 22:02:44 -08:00
Rosen Penev
2756e72598
openvpn-easy-rsa: use relative symlinks
Fixes dead symlinks under InstallDev.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-17 22:00:20 -08:00
Rosen Penev
35ead3995f
kadnode: link binary relative
Fixes dead symlink in InstallDev

Clean up Makefile for consistency between packages.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-17 21:59:42 -08:00
Rosen Penev
3d5902838c
cifs-utils: link mount utility relative instead of absolute
Fixes InstallDev dead link.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-17 21:59:00 -08:00
Rosen Penev
c12f6762ef
Merge pull request #14257 from zhanhb/alternatives-libexec
treewide: move binaries of alternatives to /usr/libexec
2020-12-17 21:41:04 -08:00
Rosen Penev
d424c2c662
mdnsresponder: bring back LN hack
It turns out that the Makefile of mdnsreponder links to absolute paths
instead of relative ones. This is an issue when compiling.

Fix for InstallDev as well.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-17 15:57:57 -08:00
Rosen Penev
1af05c13a2
Merge pull request #14247 from gstrauss/lighttpd-1.4.57
lighttpd: update to lighttpd 1.4.57
2020-12-17 14:36:33 -08:00
Rosen Penev
17d803e3b3
Merge pull request #14254 from dbermond/miniupnpc-add-installdev
miniupnpc: add InstallDev
2020-12-17 14:35:21 -08:00
Glenn Strauss
a6ca009422 lighttpd: update to lighttpd 1.4.57 release hash
* update to lighttpd 1.4.57 release hash
* remove patches incorporated upstream

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-12-17 05:22:06 -05:00
Glenn Strauss
8f46b79c20 lighttpd: cleaner TLS dependency logic in Makefile
incorporate suggestion from cotequeiroz (Eneas U de Queiroz)
https://github.com/openwrt/packages/issues/14142#issuecomment-739583111

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-12-17 05:22:06 -05:00
Jan Hak
5cd9378653 knot: update to 3.0.3
Signed-off-by: Jan Hak <jan.hak@nic.cz>
2020-12-16 14:02:40 +01:00
Aaron Goodman
85dbb48201 mwan3: update version
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
- Changed version string

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-12-16 09:35:06 +01:00
Aaron Goodman
c6fce89bf7 mwan3: add more error logging to routing functions
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-12-16 09:32:44 +01:00
Aaron Goodman
24e1504b0b mwan3: improve route flushing on mwan3 stop
only attempt to flush routes for the relevant family

Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-12-16 09:32:33 +01:00
Aaron Goodman
21ac1b2c3e mwan3: fix race condition in route loading
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-12-16 09:32:13 +01:00
Aaron Goodman
5691ff247f mwan3: fix linkdown routes not being added
Signed-off-by: Aaron Goodman <aaronjg@stanford.edu>
2020-12-16 09:32:02 +01:00
Rosen Penev
6ccb14a379
Merge pull request #14241 from neheb/mdns
mdnsreponder: use install paths instead of build ones
2020-12-16 00:02:56 -08:00
Rosen Penev
24002cdc38
Merge pull request #10643 from kmcopper/openssh
OpenSSH: Add failsafe support
2020-12-15 19:04:32 -08:00
Rosen Penev
1c573c76c6
Merge pull request #13884 from neheb/conn
conntrack-tools: update to 1.4.6
2020-12-15 18:41:20 -08:00
Rosen Penev
856e23cbab
mdnsreponder: use install paths instead of build ones
For some reason, the build ones do not get generated when compiling in
parallel. PKG_INSTALL_DIR is the correct solution anyway.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-15 18:18:47 -08:00
Philip Prindeville
52c4c84700 bind: start named early enough to be present when isc-dhcp starts
Start named before dhcpd so that dhcpd can prime the local zones at startup.

Restore the empty domain zone for rfc1918 addresses that previously existed.

Create an additional subsidiary named.conf.local file (initially empty)
in /tmp/bind/ that can be seeded with dynamic zones and primed with
"rndc reload", and add it to the watched list of config files for procd.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2020-12-15 14:03:25 -07:00
Philip Prindeville
51b7040ab0
Merge pull request #14184 from pprindeville/issue#14183
bind: add support for the 'rndc' utility
2020-12-15 10:55:47 -07:00
Kyle Copperfield
45863b94ca openssh: add openwrt failsafe support
Adds failsafe support to the openssh package.
Roughly based on an earlier patch.

Ref: https://github.com/openwrt/openwrt/pull/865
Signed-off-by: Jeff Kletsky <git-commits@allycomm.com>
Signed-off-by: Kyle Copperfield <kmcopper@danwin1210.me>
2020-12-15 10:19:32 +00:00
Rosen Penev
6961ba4af9
conntrack-tools: update to 1.4.6
Removed patch as upstream fixed libtirpc support differently.

Switched to normal tarballs for simplicity.

Fixed license information.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-14 19:04:17 -08:00
Rosen Penev
f520c50585
Merge pull request #14212 from stangri/master-simple-adblock
simple-adblock: bugfix - config update
2020-12-14 13:37:13 -08:00
Rosen Penev
018b90192f
Merge pull request #14196 from pprindeville/issue#14195
isc-dhcp: seeing crashes when attempting to update dynamic dns
2020-12-14 13:36:15 -08:00
Karl Palsson
37edb9ed63 mosquitto: bump to 2.0.2
Full changelog: https://mosquitto.org/blog/2020/12/version-2-0-2-released/

* Enables DHE ciphers
* Improved response time with http_dir and websockets

Drops a patch no longer required due to upstream fixes.

Signed-off-by: Karl Palsson <karlp@etactica.com>
2020-12-14 15:13:06 +00:00
Lucian Cristian
8778d5083a libreswan: add xfrm interface depends
ipsec needs xfrmi support

Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2020-12-14 09:16:21 +02:00
Matt Merhar
5f5248be7d fwknop: fix build with gpg support enabled
Along with the accompanying change to gpgme to install gpgme-config,
since libfko is what is actually linked to gpgme, and not
fwknop/fwknopd, an explicit dependency must be added to that package.

menuconfig now allows enabling gpg support if only fwknop is selected
without also selecting fwknopd.

Signed-off-by: Matt Merhar <mattmerhar@protonmail.com>
2020-12-13 23:38:45 -05:00
Philip Prindeville
31a256f0ab bind: add support for the 'rndc' utility
Enable the control port on named that rncd uses to talk to it. Use
rndc to allow for lightweight reloads of some (per-zone) or all of
the database without an interruption of service.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2020-12-13 13:31:13 -07:00
Daniel Bermond
6df09fb08f
miniupnpc: add InstallDev
Commit ef388ff1f3 removed 'CMAKE_INSTALL:=1', and this makes the
development files to be not installed anymore on 'staging_dir'.
Being such, packages that needs to link against libminiupnpc fails
to build, because it cannot find the headers and the library.

Adding an InstallDev fixes this.

Build-tested on: ipq806x (R7800)
Run-tested on: ipq806x (R7800)

Signed-off-by: Daniel Bermond <danielbermond@gmail.com>
2020-12-12 22:23:38 +00:00
Stan Grishin
22722a8095 simple-adblock: bugfix - config update
Signed-off-by: Stan Grishin <stangri@melmac.net>
2020-12-12 15:58:21 -06:00
Rosen Penev
8874c98729
subversion: fix compilation with full NLS
Needs a linker flag.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-11 18:18:40 -08:00
Rosen Penev
1eff28553e
i2pd: backport upstream fix for i386
Fixes compilation.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-11 16:59:52 -08:00
Michal Hrusecky
0830dfa41c
openvpn: Support username and password options
Some VPN providers require username and password for client to connect.
This commit adds an option to specify username, password and
cert_password directly in uci config which then gets expanded during
start of openpvn client.

Signed-off-by: Michal Hrusecky <michal.hrusecky@turris.com>
2020-12-11 17:07:53 +01:00
Jan Pavlinec
9e2dc1e51e
curl: update to version 7.74.0 (security fix)
Fixes:
CVE-2020-8286
CVE-2020-8285
CVE-2020-8284

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-12-11 13:20:52 +01:00
Philip Prindeville
3e8b7f6ecd isc-dhcp: seeing crashes when attempting to update dynamic dns
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2020-12-10 18:25:53 -07:00
Rosen Penev
d42259b148
Merge pull request #14191 from luizluca/easy-rsa-3.0.8
openvpn-easy-rsa: bump to 3.0.8
2020-12-10 14:56:16 -08:00
Rosen Penev
69d934f38b
Merge pull request #14135 from simm42/master
Add support to darkstat to allow multiple local networks to be specified for montioring
2020-12-10 14:55:35 -08:00
Luiz Angelo Daros de Luca
de8b7ddc8c openvpn-easy-rsa: bump to 3.0.8
New easyrsa will look for missing vars and x509-types where easyrsa
is located (following symlink). /usr/bin/easyrsa is now a link
to /usr/lib/easyrsa/easyrsa and /usr/lib/easyrsa/{vars,x509-types} a
link to /etc/easyrsa/{vars,x509-types}. This keeps the same previous
OpenWrt easyrsa behavior which tries to use $PWD/pki and
/etc/easyrsa/{vars,x509-types}, but without patching it.

Easyrsa can also use env vars to set pki root path (instead of
/usr/lib/easyrsa), pki path (instead of $PWD/pki) and vars path.
Those variables are commented in /etc/profile.d/50-openvpn-easy-rsa.sh
as an example of how to make easyrsa run independent of $PWD. That
scriptlet also sets $EASYRSA_TEMP_DIR from $EASYRSA_PKI/tmp to /tmp
in order to avoid writing to persistent media (normally flash). However,
as a profile scriptlet, it will only be used after session is restarted.

The "build" tgz was replaced by the "source" tar. "build" version has a
different file structure, making any patch backports too complex.

I'm also putting myself as maintainer.

Closes openwrt/openwrt#2926, since it moved to openwrt/packages.

Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com>
2020-12-10 15:59:56 -03:00
Rosen Penev
8285806e10
curl: fix host config file
Fix the prefix instead.

Replace custom Compile section with PKG_INSTALL.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-10 01:50:28 -08:00
Rosen Penev
fb521dd79f
gnurl: fix host config file
Fix the prefix instead.

Replace custom Compile section with PKG_INSTALL.

Minor cleanups for consistency between packages.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-10 01:50:28 -08:00
Rosen Penev
7b60ca26c2 iftop: fix compilation with GCC 10
GCC 10 defaults to fno-common, which demands unique defenitions.

Patch taken from buildroot.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-09 23:36:29 -10:00
Paul Spooren
78b22d532a iftop: add package
Moved over from openwrt.git

Signed-off-by: Paul Spooren <mail@aparcar.org>
2020-12-09 23:36:29 -10:00
Stan Grishin
822939f537 https-dns-proxy: update binary to 2020-08-21
Signed-off-by: Stan Grishin <stangri@melmac.net>
2020-12-09 23:32:19 -10:00
Rosen Penev
aca1ee1b67 modemmanager: bump release
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-09 01:40:11 -08:00
Rosen Penev
520a619e58
Merge pull request #13009 from valexi7/master
modemmanager: Added options
2020-12-09 00:55:54 -08:00
Rosen Penev
f64fd72365
Merge pull request #14159 from ja-pa/git-2.29.2
git: update to version 2.29.2
2020-12-08 17:19:14 -08:00
Rosen Penev
a3573cc072
Merge pull request #14175 from Andy2244/samba-4.13.2
samba4: update to 4.13.2
2020-12-08 16:52:23 -08:00
Andy Walsh
219d2ec81a wsdd2: update to git (2020-11-19)
* update to git (2020-11-19)

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
2020-12-08 19:49:57 +01:00
Andy Walsh
2789b91e94 samba4: update to 4.13.2
* update to 4.13.2
* remove outdated option "write cache size"

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
2020-12-08 19:48:00 +01:00
Karl Palsson
7218ff0318 Mosquitto: major update to version 2.0
Major release, full release notes available at:
https://mosquitto.org/blog/2020/12/version-2-0-0-released/

Tested on ath79, ssl full, ssl trimmed and non-ssl builds, and also all
at the same time.
Users may/will run into some of the changes in default
authentication.  Note
https://mosquitto.org/documentation/migrating-to-2-0/ for tips on
migrating.

Patch included has already merged upstream, but didn't make the release:
https://github.com/eclipse/mosquitto/pull/1930

Signed-off-by: Karl Palsson <karlp@etactica.com>
2020-12-08 09:38:34 +00:00
Rosen Penev
465774e9b5
subversion: update to 1.14.0
Remove several configure options. apr-(utils) has been fixed, which
makes them useless. Also removed PKG_BUILD_DEPENDS for that reason.

Simplify NLS with autoreconf_bool.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-08 00:58:28 -08:00
Rosen Penev
f995f4485a
krb5: install krb5-config to host
Helps old packages that don't use pkgconfig.

Fix prefix paths.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-07 20:10:13 -08:00
Rosen Penev
ea80600e3c
Merge pull request #12049 from pprindeville/xtables-addons-preserve-database
xtables-addons: iptgeoip: preserve database across sysupgrade
2020-12-07 15:38:36 -08:00
Rosen Penev
2d7cf6da69
Merge pull request #14038 from TDT-AG/pr/20201127-ddns-scripts
ddns-scripts: add gandi.net provider
2020-12-07 15:20:23 -08:00
Rosen Penev
c0a77cf63c
Merge pull request #14086 from zhanhb/frp
frp: update to 0.34.3
2020-12-07 15:18:25 -08:00
Rosen Penev
db02791759
Merge pull request #14127 from xdarklight/ksmbd-3.3.1
ksmbd and ksmbd-tools 3.3.1
2020-12-07 15:15:43 -08:00
Rosen Penev
2e665ba176
Merge pull request #14153 from gstrauss/lighttpd-1.4.56-5
lighttpd: wolfssl complex preproc logic for SNI
2020-12-07 15:11:43 -08:00
Rosen Penev
f1d81e4126
Merge pull request #14160 from ja-pa/dnstap-0.3.0
dnstap: update to version 0.3.0
2020-12-07 15:08:18 -08:00
Simon Day
be5e1029b9 darkstat: bump package version
Developer's Certificate of Origin 1.1

By making a contribution to this project, I certify that:

(a) The contribution was created in whole or in part by me and I
    have the right to submit it under the open source license
    indicated in the file; or

(b) The contribution is based upon previous work that, to the best
    of my knowledge, is covered under an appropriate open source
    license and I have the right under that license to submit that
    work with modifications, whether created in whole or in part
    by me, under the same open source license (unless I am
    permitted to submit under a different license), as indicated
    in the file; or

(c) The contribution was provided directly to me by some other
    person who certified (a), (b) or (c) and I have not modified
    it.

(d) I understand and agree that this project and the contribution
    are public and that a record of the contribution (including all
    personal information I submit with it, including my sign-off) is
    maintained indefinitely and may be redistributed consistent with
    this project or the open source license(s) involved

Signed-off-by: Simon Day <email@simonday.info>
2020-12-07 17:02:45 +00:00
Jan Pavlinec
8ef96eed18
dnstap: update to version 0.3.0
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-12-07 15:46:48 +01:00
Jan Pavlinec
532147fd50
git: update to version 2.29.2
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-12-07 14:36:45 +01:00
Rosen Penev
e632e189fd
zerotier: add patch to avoid including sys/auxv.h
It seems it's not needed and not supported under uClibc-ng.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-06 23:55:20 -08:00
Glenn Strauss
cc3ab08fde lighttpd: wolfssl complex preproc logic for SNI
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-12-06 23:07:03 -05:00
Jitao Lu
c89a1f3e8b miniupnpd: Don't override ipv6_listening_ip
Fixes: https://github.com/openwrt/packages/issues/14145
Signed-off-by: Jitao Lu <dianlujitao@gmail.com>
2020-12-07 11:53:30 +08:00
Nikos Mavrogiannopoulos
4c045a0260 ocserv: updated to 1.1.2
Signed-off-by: Nikos Mavrogiannopoulos <n.mavrogiannopoulos@gmail.com>
2020-12-06 14:28:13 +01:00
Rosen Penev
a642218951
squid: fix compilation with ccache
Added a patch to remove BUILDCXXFLAGS. For some reason, TARGET_CXXFLAGS
are leaking.

Removed custom Build/Compile section. There's already PKG_INSTALL.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-05 22:46:01 -08:00
Rosen Penev
f4532bd5ee
Merge pull request #14143 from gstrauss/lighttpd-1.4.56-4
lighttpd: wolfssl TLS compat module detection
2020-12-05 16:00:50 -08:00
Philip Prindeville
1bb157401b xtables-addons: iptgeoip: preserve database across sysupgrade
Updating the system image or the package should not obliterate
the downloaded/unpacked geolocation database. If you use xt_geoip
in /etc/firewall.user you don't want the database disappearing
when sysupgrade runs and then reboots your system as you'll be
left exposed.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2020-12-05 10:37:51 -07:00
Glenn Strauss
b575b91553 lighttpd: wolfssl TLS compat module detection
x-ref:
  "[lighttpd] -mod-wolfssl fails (requires dependency on -mod-openssl?)"
  https://github.com/openwrt/packages/issues/14139

github: closes #14139

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-12-05 11:37:19 -05:00
David Yang
61069b82fc i2pd: Update to 2.35.0
Signed-off-by: David Yang <mmyangfl@gmail.com>
2020-12-05 17:17:45 +08:00
Rosen Penev
2aee3b04c0
Merge pull request #14136 from EricLuehrsen/unbound_011300
unbound: update to 1.13.0
2020-12-04 20:50:56 -08:00
Eric Luehrsen
79e3a32656 unbound: update to 1.13.0
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2020-12-04 11:31:34 -05:00
Simon Day
a25fa9fbc7 darkstat: Add support to darkstat to allow multiple local networks to be
specified for montioring

eg allows ipv4 and ipv6 forwarded traffic to be monitored from
both main network and dmz in single graph

Developer's Certificate of Origin 1.1

By making a contribution to this project, I certify that:

(a) The contribution was created in whole or in part by me and I
    have the right to submit it under the open source license
    indicated in the file; or

(b) The contribution is based upon previous work that, to the best
    of my knowledge, is covered under an appropriate open source
    license and I have the right under that license to submit that
    work with modifications, whether created in whole or in part
    by me, under the same open source license (unless I am
    permitted to submit under a different license), as indicated
    in the file; or

(c) The contribution was provided directly to me by some other
    person who certified (a), (b) or (c) and I have not modified
    it.

(d) I understand and agree that this project and the contribution
    are public and that a record of the contribution (including all
    personal information I submit with it, including my sign-off) is
    maintained indefinitely and may be redistributed consistent with
    this project or the open source license(s) involved

Signed-off-by: Simon Day <email@simonday.info>
2020-12-04 13:10:10 +00:00
Simon Day
be50722b69 darkstat: Add support to darkstat to allow multiple local networks to be
specified for montioring

eg allows ipv4 and ipv6 forwarded traffic to be monitored from
both main network and dmz in single graph

Developer's Certificate of Origin 1.1

By making a contribution to this project, I certify that:

(a) The contribution was created in whole or in part by me and I
    have the right to submit it under the open source license
    indicated in the file; or

(b) The contribution is based upon previous work that, to the best
    of my knowledge, is covered under an appropriate open source
    license and I have the right under that license to submit that
    work with modifications, whether created in whole or in part
    by me, under the same open source license (unless I am
    permitted to submit under a different license), as indicated
    in the file; or

(c) The contribution was provided directly to me by some other
    person who certified (a), (b) or (c) and I have not modified
    it.

(d) I understand and agree that this project and the contribution
    are public and that a record of the contribution (including all
    personal information I submit with it, including my sign-off) is
    maintained indefinitely and may be redistributed consistent with
    this project or the open source license(s) involved

Signed-off-by: Simon Day <email@simonday.info>
2020-12-04 12:38:42 +00:00
Lucian Cristian
faac979564 frr: update to 7.5
switch to codeload for latest patches applied to stable branch

Signed-off-by: Lucian Cristian <lucian.cristian@gmail.com>
2020-12-04 14:09:37 +02:00
Rosen Penev
e66d0aa0ae
Merge pull request #14097 from neheb/ovn
openvpn: import from base
2020-12-03 20:59:22 -08:00
Rosen Penev
23c001675a
Merge pull request #14129 from flyn-org/snort
snort: update to 2.9.17
2020-12-03 20:45:40 -08:00
W. Michael Petullo
092cb97588 snort: update to 2.9.17
Signed-off-by: W. Michael Petullo <mike@flyn.org>
2020-12-03 18:06:40 -06:00
Glenn Strauss
6e8aa406f4 lighttpd: meson.build linker fix for TLS modules
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-12-03 17:36:29 -05:00
Martin Blumenstingl
08e1c46e54 ksmbd-tools: update to 3.3.1
Major change for version 3.3.1 are:
* Fix a segfault issue in ksmbd.mountd.
* Reorganize ndr write functions.

Major changes for version 3.3.0 are:
* Add samr and lsarpc RPC support.
* Generate subauth values for domain.
* Add Kerberos support.

Signed-off-by: Martin Blumenstingl <martin.blumenstingl@googlemail.com>
2020-12-03 23:23:53 +01:00
Jitao Lu
7077fd8c79 miniupnpd: Pass ipv6 addr to ipv6_listening_ip
Unlike ipv4, this option is supposed to be an IP address, otherwise, an
error occurs on startup:

    can't parse "br-lan" as valid IPv6 listening address

Signed-off-by: Jitao Lu <dianlujitao@gmail.com>
2020-12-03 23:36:09 +08:00
Rosen Penev
0a86f0e35a
Merge pull request #14099 from neheb/pdnsrrr
pdns-recursor: update to 4.4.1
2020-12-02 15:51:49 -08:00
Rosen Penev
185d3a7526
Merge pull request #14110 from neheb/wavem
wavemon: update to 1.9.2
2020-12-02 15:50:18 -08:00
Christian Lachner
5e7a9a32bd haproxy: Update HAProxy to v2.2.6
- Update haproxy download URL and hash

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2020-12-02 13:07:50 +02:00
Rosen Penev
63d125b109
Merge pull request #14107 from neheb/udpx
udpxy: update to 1.0-25.0
2020-12-01 23:40:33 -08:00
Rosen Penev
faaef50650
wavemon: update to 1.9.2
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-01 16:25:32 -08:00
Rosen Penev
664e8a1c9f
udpxy: update to 1.0-25.0
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-01 16:23:23 -08:00
Rosen Penev
8b0457035e
pdns-recursor: update to 4.4.1
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-01 16:17:42 -08:00
Glenn Strauss
82221622af lighttpd: build and bugfix patches
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-12-01 17:40:10 -05:00
Magnus Kroken
e4376793b4
openvpn: disable LZO support by default
OpenVPN recommends disabling compression, as it may weaken the security
of the connection. For users who need compression, we build with LZ4
support by default. LZO in OpenVPN pulls in liblzo at approx. 32 kB.

OpenWrt users will no longer be able to connect to OpenVPN peers that
require LZO compression, unless they build the OpenVPN package themselves.

Signed-off-by: Magnus Kroken <mkroken@gmail.com>
2020-12-01 13:04:38 -08:00
Magnus Kroken
2e55fc8b2d
openvpn: update to 2.5.0
New features:
* Per client tls-crypt keys
* ChaCha20-Poly1305 can be used to encrypt the data channel
* Routes are added/removed via Netlink instead of ifconfig/route
  (unless iproute2 support is enabled).
* VLAN support when using a TAP device

Significant changes:
* Server support can no longer be disabled.
* Crypto support can no longer be disabled, remove nossl variant.
* Blowfish (BF-CBC) is no longer implicitly the default cipher.
  OpenVPN peers prior to 2.4, or peers with data cipher negotiation
  disabled, will not be able to connect to a 2.5 peer unless
  option data_fallback_ciphers is set on the 2.5 peer and it contains a
  cipher supported by the client.

Signed-off-by: Magnus Kroken <mkroken@gmail.com>
2020-12-01 13:03:51 -08:00
Rosen Penev
4434915571
openvpn: import from base
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-01 12:37:37 -08:00
Rosen Penev
0e77d0264e
openvpn-easy-rsa: import from base
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-12-01 12:37:37 -08:00
Moritz Warning
f49a871c36 zerotier: update to 1.6.2
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2020-12-01 12:39:48 +01:00
Rosen Penev
e5a526e516
Merge pull request #13971 from mwarning/zerotier
zerotier: update to 1.6.1
2020-11-30 13:40:05 -08:00
Rosen Penev
caf8cbb2e7
Merge pull request #13800 from gstrauss/for-lighttpd-1.4.56
lighttpd: revamp Makefile for lighttpd 1.4.56
2020-11-30 13:20:03 -08:00
Rosen Penev
cc88432847
Merge pull request #14057 from newkit/master
wifischedule: Merged ignore_stations patch from user bedaes https://g
2020-11-30 13:15:49 -08:00
Stijn Tintel
5f0918281b strongswan: bump to 5.9.1
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2020-11-30 19:02:57 +02:00
Glenn Strauss
fa1464c3b9 lighttpd: update to lighttpd 1.4.56 release hash
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-11-30 09:27:28 -05:00
Glenn Strauss
59ae734bed lighttpd: lighttpd.conf enable flag for HTTP/2
lighttpd.conf reference server.feature-flags

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-11-30 09:27:28 -05:00
Glenn Strauss
5a374b6a5a lighttpd: lighttpd.init reload gracefully
reload_server() gracefully with SIGUSR1 to lighttpd
relog() to reopen log files with SIGHUP to lighttpd

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-11-30 09:27:28 -05:00
Glenn Strauss
5fb8d5f463 lighttpd: revamp Makefile for lighttpd-1.4.56
* update upstream version to lighttpd-1.4.56
* depend on Nettle for MD5, SHA1, SHA256
* multiple TLS options: gnutls, mbedtls, nss, openssl, wolfssl
* new module mod_authn_dbi
* mod_authn_* depend on mod_auth
* mod_authn_file is included if mod_auth is selected in build
* mod_vhostdb_* depend on mod_vhostdb
* mod_deflate subsumes mod_compress
* remove from Makefile the include of nls.mk (no longer needed)

Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-11-30 09:27:28 -05:00
Glenn Strauss
3ae0d9df1f lighttpd: remove patches incorporated upstream
Signed-off-by: Glenn Strauss <gstrauss@gluelogic.com>
2020-11-30 09:27:28 -05:00
Huangbin Zhan
cc895b6a54 frp: update to 0.34.3
Signed-off-by: Huangbin Zhan <zhanhb88@gmail.com>
2020-11-30 20:16:44 +08:00
Moritz Warning
252b0a60d1 zerotier: update to 1.6.1
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2020-11-30 13:11:00 +01:00
Nils Koenig
36ce3ffbf1 wifischedule: Merged ignore_stations patch from user bedaes https://github.com/newkit/wifischedule/pull/2
Signed-off-by: Nils Koenig <openwrt@newk.it>
2020-11-30 10:05:27 +01:00
Rosen Penev
3010ef22fa
Merge pull request #14032 from ptpt52/p910nd-fix
p910nd: config trigger reload and default disabled
2020-11-30 00:32:19 -08:00
Nicholas Smith
e13d36fa8b modemmanager: bump to 1.14.8
Signed-off-by: Nicholas Smith <nicholas.smith@telcoantennas.com.au>
2020-11-30 10:35:42 +10:00
Dirk Brenken
4fad6e2dc1
Merge pull request #14065 from dibdot/adblock
adblock: reporting fixes/tweaks
2020-11-29 13:45:27 +01:00
Rosen Penev
6f2dc12f44
Merge pull request #14066 from brvphoenix/ariang
ariang: add title and shortcut icons
2020-11-29 04:29:29 -08:00
Rosen Penev
75ddca2962
xtables-addons: fix package installation
Install directory is missing.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2020-11-29 01:37:00 -08:00
Van Waholtz
4916fbd125 ariang: add title and shortcut icons
Signed-off-by: Van Waholtz <vanwaholtz@gmail.com>
2020-11-29 00:31:14 -08:00
Dirk Brenken
6e90c8fa53
adblock: reporting fixes/tweaks
* prevents the creation of an invalid json structure
* add more space to the domain column on cli

Signed-off-by: Dirk Brenken <dev@brenken.org>
2020-11-29 08:46:28 +01:00
Peter Stadler
f62599d27e nginx-util: use UCI for server configuration
**tl;dr:** The functions `{add,del}_ssl` modify a server
section of the UCI config if there is no `.conf` file with
the same name in `/etc/nginx/conf.d/`.

Then `init_lan` creates `/var/lib/nginx/uci.conf` files by
copying the `/etc/nginx/uci.conf.template` and standard
options from the UCI config; additionally the special path
`logd` can be used in `{access,error}_log`.

The init does not change the configuration beside
re-creating self-signed certificates when needed. This is
also the only purpose of the new `check_ssl`, which is
installed as yearly cron job.

**Initialization:**

Invoking `nginx-util init_lan` parses the UCI configuration
for package `nginx`. It creates a server part in
`/var/lib/nginx/uci.conf` for each `section server '$name'`
by copying all UCI options but the following:

* `option uci_manage_ssl` is skipped. It is set to
'self-signed' by `nginx-util add_ssl $name`, removed by
`nginx-util del_ssl $name` and used by
`nginx-util check_ssl` (see below).

* `logd` as path in `error_log` or `access_log` writes them
to STDERR respective STDOUT, which are fowarded by Nginx's
init to the log daemon. Specifically:
`option error_log 'logd'` becomes `error_log stderr;` and
`option access_log 'logd openwrt'` becomes
`access_log /proc/self/fd/1 openwrt;`

Other `[option|list] key 'value'` entries just become
`key value;` directives.

The init.d calls internally also `check_ssl` for rebuilding
self-signed SSL certificates if needed (see below). And it
still sets up `/var/lib/nginx/lan{,_ssl}.listen` files as
it is doing in the current version (so they stay available).

**Defaults:**

The package installs the file `/etc/nginx/restrict_locally`
containing allow/deny directives for restricting the access
to LAN addresses by including it into a server part. The
default server '_lan' includes this file and listens on all
IPs (instead of only the local IPs as it did before; other
servers do not need to listen explicitly on the local IPs
anymore). The default server is contained together with a
server that redirects HTTP requests for inexistent URLs to
HTTPS in the UCI configuration file `/etc/config/nginx`.
Furthermore, the packages installs a
`/etc/nginx/uci.conf.template` containing the current setup
and a marker, which will be replaced by the created UCI
servers when calling `init_lan`.

**Other:**

If there is a file named `/etc/nginx/conf.d/$name.conf` the
functions `init_lan`, `add_ssl $name` and `del_ssl $name`
will use that file instead of a UCI server section (this is
similar to the current version).

Else it selects the UCI `section server $name`, or, when
there is no such section, it searches for the first one
having `option server_name '… $name …'`. For this section:

* `nginx-util add_ssl $name` will add to it:
`option uci_manage_ssl 'self-signed'`
`option ssl_certificate '/etc/nginx/conf.d/$name.crt'`
`option ssl_certificate_key '/etc/nginx/conf.d/$name.key'`
`option ssl_session_cache 'shared:SSL:32k'`
`option ssl_session_timeout '64m'`
If these options are already present, they will stay the
same; just the first option `uci_manage_ssl` will always be
changed to 'self-signed'. The command also changes all
`listen` list items to use port 443 and ssl instead of port
80 (without ssl). If they stated another port than 80
before, they are kept the same. Furthermore, it creates a
self-signed SSL certificate if necessary, i.e., if there is
no *valid* certificate and key at the locations given by
the options `ssl_certificate` and `ssl_certificate_key`.

* `nginx-util del_ssl $name` checks if `uci_manage_ssl` is
set 'self-signed' in the corresponding UCI section. Only
then it removes all of the above options regardless of the
value looking just at the key name. Then, it also changes
all `listen` list items to use port 80 (without ssl)
instead of port 443 with ssl. If stating another port than
443, they are kept the same. Furthermore, it removes the
SSL certificate and key that were indicated by
`ssl_certificate{,_key}`.

* `nginx-util check_ssl` looks through all server sections
of the UCI config for `uci_manage_ssl 'self-signed'`. On
every hit it checks if the SSL certificate-key-pair
indicated by the options `ssl_certificate{,_key}` is
expired. Then it re-creates a self-signed certificate.
If there exists at least one `section server` with
`uci_manage_ssl 'self-signed'`, it will try to install
itself as cron job. If there are no such sections, it
removes that cron job if possible.

For installing a ssl certificate and key managed by
another app, you can call:
`nginx-util add_ssl $name $manager $crtpath $keypath`
Hereby `$name` is as above, `$manager` is an arbitrary
string, and the the ssl certificate and its key are
indicated by their absolute path. If you want to remove
the directives again, then you can use:
`nginx-util del_ssl $name $manager`

Signed-off-by: Peter Stadler <peter.stadler@student.uibk.ac.at>
2020-11-28 18:34:39 +01:00
Florian Eckert
733e6508f3 ddns-scripts: add gandi.net provider
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2020-11-28 11:07:14 +01:00
Oleg Derevenetz
9cf0efc4f6 bwping: update to version 2.2
Signed-off-by: Oleg Derevenetz <oleg-derevenetz@yandex.ru>
2020-11-27 23:12:14 +03:00
Dirk Brenken
84f20951b3
travelmate: fix possible race condition
* prevent possible duplicate script execution due to
  multiple ntp events in parallel

Signed-off-by: Dirk Brenken <dev@brenken.org>
2020-11-26 22:39:15 +01:00
Rosen Penev
6dc567270e
Merge pull request #14031 from ptpt52/ext_ip_reserved_ignore
net/miniupnpd: ext_ip_reserved_ignore support
2020-11-26 10:28:23 -08:00
Chen Minqiang
b76aa99194 net/miniupnpd: ext_ip_reserved_ignore support
This add an option to ignore ext_ip reserved
Enable this option in config by default.

Fixes: #13773

Signed-off-by: Chen Minqiang <ptpt52@gmail.com>
2020-11-26 15:56:20 +08:00