firmware/src/packages/fff/fff-network/mips
Fabian Bläse 240a506ee7 fff-network: convert GL-AR150 to TWOPORT
The GL-AR150 has two ethernet ports. One of them is connected directly
to the CPU (labeled "WAN"), while the other one (labeled "LAN") is
connected to the internal switch of the AR9330 platform.

Previously, this device had its own codepath in configurenetwork,
utilizing the ETHPORT variable, so the single physical port of the
switch could be connected to either the CLIENT or BATMAN vlan of the
SWITCHPORT.

When adding support for TWO_PORT devices, this codepath was accidentally
removed, so the LAN-Port was not configured anymore.

Configuring the internal switch is not necessary when only a single
physical port ist connected to it. Instead, leave the switch
unconfigured, so it behaves like an unmanaged vlan-transparent switch.

As we support TWO_PORT devices now, utilize the TWO_PORT codepath
(instead of the ONE_PORT codepath, which would be equivalent to the old
behaviour) to make both ports configureable. To retain the previously
configured mode of the LAN-Port, migrate ETHPORT to LAN1MODE before
executing configurenetwork.

Fixes: #222
Fixes: c22032e254 ("fff-network: support native two-port devices")

Signed-off-by: Fabian Bläse <fabian@blaese.de>
Tested-by: Sebastian Beck <freifunk@beibecks.de>
2022-03-31 19:31:12 +02:00
..
network.glinet,gl-ar150 fff-network: convert GL-AR150 to TWOPORT 2022-03-31 19:31:12 +02:00
network.mode fff-network: Group network files by arch, not by target 2020-06-18 12:47:05 +02:00
network.tplink,archer-c7-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c7-v5 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c25-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c60-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,archer-c60-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,cpe210-v1 fff-network: adapt support for TP-Link CPE210/510 v1 2021-07-09 10:04:12 +02:00
network.tplink,cpe210-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,cpe210-v3 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,cpe510-v1 fff-network: adapt support for TP-Link CPE210/510 v1 2021-07-09 10:04:12 +02:00
network.tplink,tl-wdr3500-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr3600-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr4300-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wdr4310-v1 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043n-v5 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v2 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v3 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.tplink,tl-wr1043nd-v4 treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,nanostation-loco-m-xw treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,unifi treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00
network.ubnt,unifiac-mesh treewide: exploit label MAC address from OpenWrt 2021-06-08 20:08:20 +02:00