Commit graph

24770 commits

Author SHA1 Message Date
Alexandru Ardelean
b3d1cd75a4
Merge pull request #18225 from rs/nextdns-1.37.11-openwrt-21.02
[21.02] nextdns: Update to version 1.37.11
2022-04-06 09:08:13 +03:00
James White
bbb13556dc adguardhome: Update adguardhome to v0.107.5
Signed-off-by: James White <james@jmwhite.co.uk>
(cherry picked from commit b08aa72bad)
2022-04-03 09:00:50 +01:00
James White
19e621a432 adguardhome: Bump adguardhome to v0.107.3 stable
Signed-off-by: James White <james@jmwhite.co.uk>
(cherry picked from commit 435733a899)
2022-04-03 09:00:41 +01:00
James White
d86d6d02b4 adguardhome: Update to v0.107.2 stable
Signed-off-by: James White <james@jmwhite.co.uk>
(cherry picked from commit a02d4f646f)
2022-04-03 09:00:31 +01:00
Olivier Poitrey
9fa3942a8d nextdns: Update to version 1.37.11
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2022-04-02 20:59:22 +00:00
Tianling Shen
894f58ceb7 yq: Update to 4.24.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 3cbdc7e422)
2022-04-02 06:54:13 -07:00
Rosen Penev
fbcaa8bce8 ksmbd-tools: revert update to 3.4.4
This reverts commit 362c8c4df3.

This does not work with the kmod in tree.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2022-04-01 12:17:28 -07:00
Moritz Warning
7157e9b4d6 zerotier: revert to 1.8.4
This reverts commit 89cea2a6e7.
Zerotier 1.8.6 is broken on ipq806x.

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-30 19:39:07 -07:00
Josef Schlehofer
3e53f0c881
vala: update to version 0.56.0 (LTS version)
According, to the project website [1], we were not using long-term
version, but stable one. Let's use LTS version.

Changelog can be found on their GitLab [2].

[1] https://wiki.gnome.org/Projects/Vala
[2] https://gitlab.gnome.org/GNOME/vala/raw/0.56/NEWS

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 189f078a35)
2022-03-30 10:46:36 +02:00
Josef Schlehofer
384f983d53
vala: update to version 0.54.8
Changelog:
https://gitlab.gnome.org/GNOME/vala/raw/0.54/NEWS

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 474414dff1)
2022-03-30 10:45:59 +02:00
Rosen Penev
7be116683d
vala: update to 0.54.2
Remove shared libraries. Allows removing rpath hacks.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 575776cfa5)
2022-03-30 10:45:33 +02:00
Rosen Penev
601bee7bf9
vala: update to 0.52.3
Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit f42b5288f9)
2022-03-30 10:45:28 +02:00
Rosen Penev
8359d159fe
vala: update to 0.52.1
Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit d0b93ea224)
2022-03-30 10:45:23 +02:00
Daniel Golle
78aa0f6cac
pynacl: fix build with updated sodium-minimal patch
Commit 3da874371 ("libsodium: include ed25519_core in minimal build")
broke the build of PyNaCl. Add patch to always include all ed25519
functions which are now always covered even if libsodium is built with
the MINIMAL option.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit ccd3b6c0a5)
2022-03-29 20:56:47 +02:00
Jeffery To
e6330a60e7 python3: Update to 3.9.12
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2022-03-27 12:40:55 -07:00
Jonathan Pagel
8142c9baf3 telegraf: Update to version 1.22.0 to openwrt 21.02
Signed-off-by: Jonathan Pagel <jonny_tischbein@systemli.org>
(cherry picked from commit 2c9c485822)
Signed-off-by: Jonathan Pagel <jonny_tischbein@systemli.org>
2022-03-27 12:39:06 -07:00
Tianling Shen
915018e39a rclone: Update to 1.58.0
Added missing call for rclone-config.

Refreshed patches.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 546af5266b)
2022-03-27 21:44:33 +03:00
Daniel Golle
cd3dc69d6b
gnunet-fuse: update to 0.16.0
Only notable change since 0.14.0 is that pthread_mutexattr_setkind_np()
is now no longer used.
pthread_mutexattr_setkind_np() is deprecated and non-standard.
The standard version is called pthread_mutexattr_settype()

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commits
 05eac1796d gnunet-fuse: update to version 0.14.0
 d59731ba61 gnunet-fuse: update to 0.16.0
)
2022-03-26 21:31:54 +00:00
Daniel Golle
add708f030
gnunet: update to version 0.16.2
Sync GNUnet package with master branch.
This is a new major release. It breaks protocol compatibility with the
0.15.x versions. Please be aware that Git master is thus henceforth
(and has been for a while) INCOMPATIBLE with the 0.15.x GNUnet network,
and interactions between old and new peers will result in issues.
0.15.x peers will be able to communicate with Git master or 0.16.x
peers, but some services - in particular GNS - will not be compatible.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commits
 deafd6cf3f gnunet: update to v0.14.1
 746bb95552 gnunet: update to version 0.15.3
 23b5b516ae gnunet: fix compilation with big endian
 c3c6a2ff1d gnunet: several improvements
 23f722f905 gnunet: packaging fixes
 2f8e696189 gnunet: update to 0.16.1
 f951f61005 gnunet: improve init script
 033744ac59 gnunet: update to 0.16.2
 65f5f850f3 gnunet: work-around sysupgrade restore missing file ownerships
)
2022-03-26 21:31:49 +00:00
Damiano Renfer
a62591148b
libsodium: update maintainer email address
Signed-off-by: Damiano Renfer <x9w2n7xnu@relay.firefox.com>
(cherry picked from commit 7c529bab91)
2022-03-26 21:31:41 +00:00
Daniel Golle
4f7fcd9279
libsodium: include ed25519_core in minimal build
Functions from ed25519_core are needed for GNUnet to build.
Include them in the minimal build of libsodium so we don't need to
switch to the full build just for that.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit 3da874371b)
2022-03-26 21:31:32 +00:00
Josef Schlehofer
c04905dd90
Merge pull request #18145 from hauke/samba4
[21.02] Samba4 backports from master (Fix CVEs)
2022-03-26 20:46:04 +01:00
Andy Walsh
7deecb5d9f samba4: update to 4.14.12
* update to 4.14.12
* fixes: CVE-2021-44142, CVE-2022-0336

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
(cherry picked from commit 1fa70d6a3c)
2022-03-25 12:12:07 +01:00
Andy Walsh
71734db270 samba4: update to 4.14.11; fix AD_DC build
* update to 4.14.11
* fix AD_DC build
* add vfs_widelinks to defaults
* refresh patches
* fixes: #16697, #17692
* fixes: CVE-2016-2124, CVE-2020-25717, CVE-2020-25718, CVE-2020-25719, CVE-2020-25721, CVE-2020-25722, CVE-2021-3738, CVE-2021-23192

Signed-off-by: Andy Walsh <andy.walsh44+github@gmail.com>
(cherry picked from commit 7730a65d30)
[Do not add dependency to python3-markdown and python3-dns]
Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
2022-03-25 12:11:03 +01:00
Hannu Nyman
ee69afe6f1 nano: provide nano-full with most features enabled
Provide a new variant, nano-full, that enables almost
all functionality of nano. Only libmagic file type detection
has been left out.

Ship with a minimal /etc/nanorc that the user can modify.
nanorc documentation at
https://www.nano-editor.org/dist/latest/nanorc.5.html

Provide color highlighting for the uci config files.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
(cherry picked from commit 6a51794638)
2022-03-24 20:31:46 +02:00
Daniel Golle
951ef67479
netatalk: update to version 3.1.13
Please update to this latest release as soon as possible as this
releases fixes the following major security issues: CVE-2021-31439,
CVE-2022-23121, CVE-2022-23122, CVE-2022-23123, CVE-2022-23124,
CVE-2022-23125 and CVE-2022-0194.

Local patch '010-gcc10.patch' has been applied upstream and was hence
removed.

For a summary of news and a detailed list of changes see the
ReleaseNotes[1].

[1]: https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2022-03-24 17:50:40 +00:00
Josef Schlehofer
08a442fe9f
Merge pull request #18125 from 1715173329/x2
[openwrt-21.02] xray-core: Update to 1.5.4
2022-03-24 08:40:00 +01:00
Josef Schlehofer
cfb44b1472
Merge pull request #18124 from 1715173329/y2
[openwrt-21.02] yq: Update to 4.23.1
2022-03-24 08:39:51 +01:00
Josef Schlehofer
cfc7069b3f
Merge pull request #18123 from jefferyto/python-3.9.11-openwrt-21.02
[openwrt-21.02] python3: Update to 3.9.11, refresh patches
2022-03-23 09:11:14 +01:00
Tianling Shen
c2aeec5ef1
xray-core: Update to 1.5.4
Updated geodata to latest version while at it.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit f8fa16f40d)
2022-03-21 23:34:07 +08:00
Tianling Shen
5eb1ab8a6d
yq: Update to 4.23.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 8d7b7fbfb4)
2022-03-21 23:32:04 +08:00
Jeffery To
a7a93cfcc8
python3: Update to 3.9.11, refresh patches
Includes fixes for:
* Windows builds updated to bzip2 1.0.8 to mitigate CVE-2016-3189 and
  CVE-2019-12900
* CVE-2022-26488: Escalation of privilege via Windows Installer

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2022-03-21 22:03:05 +08:00
David Bauer
762794d143 usteer: add package
This commits adds the new usteer package to the packages feed.

usteer is a daemon for steering wireless clients across frequency
bands as well as between multiple access points on a network.

Signed-off-by: David Bauer <mail@david-bauer.net>
2022-03-21 01:30:58 +01:00
Moritz Warning
89cea2a6e7 zerotier: update to 1.8.6
* remove upstreamed gcc10 and cerrno patches
* disable SSO and OIDC as it needs Rust/Cargo support

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Moritz Warning
f7554858ec zerotier: update to 1.8.4
Also remove patch to fix uClibc-ng,
since it is not in openwrt anymore.

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Moritz Warning
7673192a9c zerotier: update to 1.8.3
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Moritz Warning
56c4570589 zerotier: update to 1.8.2
Update und switch back to release source package.

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Oskari Rauta
614b4e003a zerotier: update to 1.8.1
Release notes:

1.8.0
 - Upgrade json.hpp dependency to version 3.10.2
 - Check if DNS servers need to be applied on macOS
 - Set MAC address before bringing up Linux TAP link
 - Stop binding to temporary IPv6 addresses
 - Fix for mistakenly using v6 source addresses for v4 routes on some platforms
 - Fix for MacOS MTU capping issue on feth devices
 - Implement a workaround for one potential source of a "coma" bug, which can occur if buggy NATs/routers stop allowing the service to communicate on a given port. ZeroTier now reassigns a new secondary port if it's offline for a while unless a secondary port is manually specified in local.conf. Working around crummy buggy routers is an ongoing effort.
 - A completely rewritten desktop UI for Mac and Windows!

1.8.1
 - Fix an issue that could cause clobbering of MacOS IP route settings on restart.
 - Added additional hardening against address impersonation on networks (also in 1.6.6).
 - MacOS IPv6 no longer binds to temporary addresses as these can cause interruptions if they expire.
 - Remove support for REALLY ancient 1.1.6 or earlier network controllers.
 - Fix numerous UI issues from 1.8.0 (never fully released).

Changed to git as source and added $(AUTORELEASE)

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2022-03-21 00:25:10 +01:00
Chao Liu
52fcc9bf62 zerotier: add respawn procd param
Signed-off-by: Chao Liu <git@expiron.dev>
2022-03-21 00:25:10 +01:00
Moritz Warning
1e1d5f5d65 zerotier: add option to copy config
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2022-03-21 00:25:10 +01:00
Liangbin Lian
748d87c88e zerotier: fix cross compile in macOS
zerotier's Makefile use `uname` to detect target when cross compile
uname should always be 'linux'

Signed-off-by: Liangbin Lian <jjm2473@gmail.com>
2022-03-21 00:25:10 +01:00
Josef Schlehofer
921af7fdda
Merge pull request #18103 from BKPepe/21.02-haproxy
haproxy: update to version 2.2.22
2022-03-19 04:02:05 +01:00
Josef Schlehofer
ac99fde549
haproxy: update to version 2.2.22
Fixes:
CVE-2022-0711

Changelog:
https://git.haproxy.org/?p=haproxy-2.2.git;a=blob;f=CHANGELOG;h=bfc5d6495e39ace56581663ce820e6909039a286;hb=bfc5d6495e39ace56581663ce820e6909039a286

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-03-18 21:00:56 +01:00
John Audia
ee4267e97f
tree: bump to 2.0.2
Update to latest upstream release.

Build system: x86_64
Build-tested: bcm2711/RPi4B
Run-tested: bcm2711/RPi4B

Signed-off-by: John Audia <graysky@archlinux.us>
(cherry picked from commit c333a5b8c5)
2022-03-18 20:49:57 +01:00
Chris Osgood
f01cf663b6 curl: Fix compiling curl wolfSSL IPv6 disabled
Fixes #18082

Signed-off-by: Chris Osgood <chris_github@functionalfuture.com>
(cherry picked from commit 4eb08bacf3)
2022-03-18 17:54:32 +01:00
Noah Meyerhans
185c5e365e bind: bump to 9.18.1
Fixes multiple security issues:

 * CVE-2022-0667 -- An assertion could occur in resume_dslookup() if the
                    fetch had been shut down earlier
 * CVE-2022-0635 -- Lookups involving a DNAME could trigger an INSIST when
                    "synth-from-dnssec" was enabled
 * CVE-2022-0396 -- A synchronous call to closehandle_cb() caused
                    isc__nm_process_sock_buffer() to be called recursively,
                    which in turn left TCP connections hanging in the CLOSE_WAIT
                    state blocking indefinitely when out-of-order processing was
                    disabled.
 * CVE-2021-25220 -- The rules for acceptance of records into the cache
                     have been tightened to prevent the possibility of
                     poisoning if forwarders send records outside the
                     configured bailiwick

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
(cherry picked from commit 4c6ea5379c)
2022-03-18 08:25:18 -07:00
Rosen Penev
919dd80130
libnetfilter-log: update to 1.0.2
Remove all patches as they have been upstreamed.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
(cherry picked from commit 28c1c0d24c)
2022-03-17 23:29:36 +01:00
Michael Heimpold
56fbb7f85e
Merge pull request #18083 from mhei/21.02-libxml2-update
libxml2: update to 2.9.13
2022-03-17 21:06:52 +01:00
Michael Heimpold
8e9f102235 libxml2: update to 2.9.13
This fixes CVE-2022-23308.

Also switch to GNOME as download source and xz tarball.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
(cherry picked from commit 81fd836f97)
2022-03-17 08:06:45 +01:00
Daniel Golle
793e7ee484 auc: don't segfault on invalid URL
Show error message instead of segfaulting in case of an invalid URL
being read from UCI config.

Fixes: #17971
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
(cherry picked from commit c0d2c82528)
2022-03-14 21:29:50 +00:00