Commit Graph

25099 Commits

Author SHA1 Message Date
Christian Marangi 006014745c ci: update github actions to v3
Update checkout and upload-artifact action to v3 to mute nodejs
deprecation warning.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
(cherry picked from commit 52570d4242)
2023-03-11 12:02:29 +01:00
Jeffery To e328bb03ec ci: Use openwrt/gh-action-sdk@v5
The previous build errors with v5 have been fixed. This version builds
packages as a normal user instead of as root.

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
(cherry picked from commit 37f9b77b01)
2023-03-11 12:02:29 +01:00
Jeffery To 6df650e909
golang: Fix conditionals not stripped
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
(cherry picked from commit 86fd1ebbe4)
2023-03-09 18:24:44 +01:00
Christian Lachner 8fac9fc114 haproxy: update to v2.2.29
- Update haproxy download URL and hash
- This release fixes a critial flaw known as CVE-2023-25725. See:
  http://git.haproxy.org/?p=haproxy-2.2.git;a=commit;h=4a4c90c2b04444d92c58873cfb19052f20280bc2

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2023-03-08 20:38:07 +08:00
Tianling Shen 477e23e85d
v2raya: drop wrong patches
These patches should not be backported to OpenWrt, otherwise tproxy
won't work for devices connected to br-lan (bypassed by the fw rules).

We have introduced a new compile-time flag for new version (which
is not released yet), but it's unnecessray to backport redudant
patches as here is still at the old version.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 40669c4135)
2023-03-05 14:48:07 +08:00
Tianling Shen 41779b9804
yq: Update to 4.31.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 1343bb5856)
2023-03-05 14:48:02 +08:00
Tianling Shen 48d54a6c92
yq: Update to 4.31.1
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit b76bd94605)
2023-03-05 14:47:58 +08:00
Tianling Shen 8e8c8f3d6f
msgpack-c: Update to 5.0.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 5890d2f2d7)
2023-03-02 16:51:48 +08:00
Alan Swanson a6abd3c010
sed: remove old libpcre dependency
Signed-off-by: Alan Swanson <reiver@improbability.net>
(cherry picked from commit 0a00f0f2a5)
2023-03-02 07:37:39 +01:00
Dengfeng Liu 98cb09953b xfrpc: update to version 2.1.606
Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
(cherry picked from commit db243b31c8)
2023-02-27 10:47:11 +08:00
Dengfeng Liu 4a1401a7f3 xfrpc: Update to 1.11.587
refactor tcp mux

Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
(cherry picked from commit 419c434002)
2023-02-27 10:47:11 +08:00
Dengfeng Liu 72cfe23545 xfrpc: allow server_addr ip and domain
Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
(cherry picked from commit a7e3f28c37)
2023-02-27 10:47:11 +08:00
Dengfeng Liu bf9301311e xfrpc: Update to 1.07.582
Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
(cherry picked from commit 9fbd26f170)
2023-02-27 10:47:11 +08:00
Dengfeng Liu f2b01b7b1b xfrpc: update to 1.06.579
Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
(cherry picked from commit 5615ce33fa)
2023-02-27 10:47:11 +08:00
Dengfeng Liu 557cfeb98b xfrpc: set xfrpc's disabled default value to 0
change this to satisfy luci-app-xfrpc's need

Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
(cherry picked from commit 10a24d4cad)
2023-02-27 10:47:11 +08:00
Dengfeng Liu 8f6d7e8885 xfrpc: fix bug of xfrpc.init
replace xfrpc with xfrp

Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
(cherry picked from commit b3bd24f1af)
2023-02-27 10:47:11 +08:00
Dengfeng Liu 5ef07ad955 xfrpc: update to 1.05.561
support tcp mux and default to turn it on

Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
(cherry picked from commit d4430d2e89)
2023-02-27 10:47:11 +08:00
Dengfeng Liu b6e1d2b6e8 xfrpc: Update to 1.05.548
deprecated xfrps, compatible with frps

Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
(cherry picked from commit 2cb01429b1)
2023-02-27 10:47:11 +08:00
Dengfeng Liu 76b2528f6b xfrpc: fast reverve proxy client in c language
Signed-off-by: Dengfeng Liu <liudf0716@gmail.com>
(cherry picked from commit 9af01c87bf)
2023-02-27 10:47:11 +08:00
Michal Vasilek 90d8dc04be git: update to 2.34.7
Fixes CVE-2023-22490, CVE-2023-23946

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
(cherry picked from commit 06f466cc61)
2023-02-23 15:43:44 +01:00
Peter van Dijk 2a015d5fd7 CI: do not crash during PKG-INFO generation if there are no packages
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
(cherry picked from commit b5132de5cf)
2023-02-23 11:56:03 +01:00
Peter van Dijk b6e1446bee CI: add PKG-INFO metadata file
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
(cherry picked from commit a40c1b3e44)
2023-02-23 11:56:03 +01:00
Peter van Dijk c49acc1fd3 CI: use git commit sha in name
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
(cherry picked from commit bbf983721c)
2023-02-23 11:56:03 +01:00
Eneas U de Queiroz 8c41503549
Merge pull request #20526 from nxhack/2102_node_14213
[21.02] node: bump to v14.21.3
2023-02-20 09:37:44 -03:00
Alexandru Ardelean fae6120882
Merge pull request #20518 from commodo/django-21.02
[21.02] django: bump to version 3.2.18
2023-02-20 11:10:36 +02:00
Hirokazu MORIKAWA d57b35fa83 node: bump to v14.21.3
Thursday February 16 2023 Security Releases

Notable Changes
The following CVEs are fixed in this release:
* CVE-2023-23918: Node.js Permissions policies can be bypassed via process.mainModule (High)
* CVE-2023-23920: Node.js insecure loading of ICU data through ICU_DATA environment variable (Low)
More detailed information on each of the vulnerabilities can be found in February 2023 Security Releases blog post.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-02-19 15:07:45 +09:00
Nick Hainke ee193dffb4 snowflake: update to v2.5.1
Changes in version v2.4.3 - 2023-01-16
- Fix version number in version.go

(Changes for v2.5.1 are missing)

Signed-off-by: Nick Hainke <vincent@systemli.org>
(cherry picked from commit ac9027aebb)
2023-02-18 10:07:06 +01:00
Alexandru Ardelean e7e30dfc8d django: bump to version 3.2.18
Fixes:
  https://nvd.nist.gov/vuln/detail/CVE-2023-23969

Signed-off-by: Alexandru Ardelean <alex@shruggie.ro>
2023-02-17 19:27:10 +02:00
Tianling Shen f9a4173497
xray-core: Update to 1.7.5
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit b4c4b17308)
[Updated geodata to latest version, based on 669357351c]
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-02-14 06:38:35 +08:00
Noah Meyerhans 0e8b663fbc
bind: update to 9.18.11
Fixes CVEs:
      - CVE-2022-3924: Fix serve-stale crash when recursive clients
      soft quota is reached.
      - CVE-2022-3736: Handle RRSIG lookups when serve-stale is
      active.
      - CVE-2022-3094: An UPDATE message flood could cause named to
      exhaust all available memory. This flaw was addressed by adding
      a new "update-quota" statement that controls the number of
      simultaneous UPDATE messages that can be processed or
      forwarded. The default is 100. A stats counter has been added to
      record events when the update quota is exceeded, and the XML and
      JSON statistics version numbers have been updated.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
(cherry picked from commit 47fcec43ab)
2023-02-01 23:19:26 +01:00
Oskari Rauta f8cfcab26c
crun: update to 1.3
Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
(cherry picked from commit 7034d3cbba)
2023-02-01 23:07:04 +01:00
Oskari Rauta 1579bb624e
crun: update to version 1.2
release notes:

0.20.1
 - container: ignore error when resetting the SELinux label for the keyring.

0.21
 - when compiled with krun, automatically use it if the current executable file is called "krun"
 - cgroup: lookup pids controller as well when the memory controller is not available
 - status: add fields for owner and created timestamp
 - honor memory swappiness set to 0

1.0
 - Fix symlink target mangling for tmpcopyup targets.
 - Makefile.am: fix link error when using directly libcrun.
 - cgroup: add support for setting memory.use_hierarchy on cgroup v1.
 - linux: treat pidfd_open failures EINVAL as ESRCH.
 - cgroup: chown the current container cgroup to root in the container.

1.1
 - utils: retry openat2 on EAGAIN. If the openat2 syscall is interrupted, try again.
 - criu: fix save of external descriptors. Now restored containers attach correctly their standard streams.
 - criu: Add support for external PID namespace.
 - container: Set primary process to 1 via LISTEN_PID by default if user configuration is missing.
 - exec: refuse to exec in a paused container/cgroup.
 - cgroup: use cgroup.kill when available. It is faster to kill a container through its cgroup as there is no need to recurse over the cgroup pids and terminate each one of them.

1.2
 - criu: add support for external ipc, uts and time namespaces.
 - exec: fix regression in 1.1 where containers are being wrongly reported as paused.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
(cherry picked from commit 3873a850a5)
2023-02-01 23:06:36 +01:00
Oskari Rauta 7d78b97652
podman: update to v3.4.4
list of changes: https://github.com/containers/podman/releases

Added patch for compiling with musl. Patch can be removed on next
release as it is already merged to podman git but not on this release.
Patch moves definition in source so definition is available before it
is being used.

Patch source: https://github.com/containers/podman/pull/12564

Patch re-created with quilt.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
(cherry picked from commit 5ff3b25509)
2023-02-01 23:04:34 +01:00
Oskari Rauta 3b058e762d
podman: update to 3.4.2
Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
(cherry picked from commit b011f3faf8)
2023-02-01 23:03:27 +01:00
Olivier Poitrey 6e4fb5bfb4 nextdns: Update to version 1.39.4
Signed-off-by: Olivier Poitrey <rs@nextdns.io>
2023-01-28 06:38:25 +08:00
Rafał Miłecki a7a3615681 ksmbd: select ASN1 explicitly to reduce dependencies
ksmbd requires ASN.1 grammar compiler so it depends on CONFIG_ASN1. It
should select kmod-asn1-decoder for above reason.

Due to some problems with kmod-asn1-decoder in the past ksmbd was
selecting kmod-nf-nathelper-extra instead. That was affecting network
performance in kernel as each loaded conntrack module adds some overhead
to packets processing.

Fix this unwanted side effect by depending on kmod-asn1-decoder
directly.

Link: http://lists.openwrt.org/pipermail/openwrt-devel/2023-January/040298.html
Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
2023-01-27 11:29:47 +01:00
Dirk Brenken de41f9a0d9
Merge pull request #20406 from realizelol/openwrt-21.02
[21.02] banip: renew tor urls
2023-01-27 11:19:47 +01:00
Chris b08549f9eb banip: renew tor urls as previous ones were death.
Signed-off-by: Chris Schulten <bsw.bsw@gmx.de>
2023-01-27 10:58:06 +01:00
Jan Hák 3e8cc5d1b6
knot: update to version 3.2.4
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit c933a15ceb)
2023-01-26 18:34:04 +01:00
Jan Hák 428c554329
knot: update to version 3.2.3
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit 4370e457c8)
2023-01-26 18:34:00 +01:00
Jan Hák 650ffc592e
knot: update to version 3.2.2
Signed-off-by: Jan Hák <jan.hak@nic.cz>
(cherry picked from commit a5913d51c7)
2023-01-26 18:33:56 +01:00
Michael Heimpold e6b36ce4a3
Merge pull request #20270 from mhei/21.02-php8-update-8.0.27
[21.02] php8: update to 8.0.27
2023-01-22 23:51:56 +01:00
Hannu Nyman a3e312f7ea
Merge pull request #20358 from hnyman/rtty2102
Rtty2102
2023-01-21 22:09:37 +02:00
Josef Schlehofer 5f977fe36b
atlas-sw-probe: add more binaries
They were added in these commits [1] [2] and if they are not included,
the RIPE Atlas SW Probe does not work correctly.

This should also prevent this from happening in the future as it now. We include all
files with .sh extension file type.

[1] 70ced29fc3
[2] 71a4ff0e68

Fixes: https://github.com/openwrt/packages/issues/20338

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
(cherry picked from commit 1a368a5409)
2023-01-21 20:48:04 +01:00
Hannu Nyman 9c66f9c816
Merge pull request #20357 from hnyman/wifidog2102
[21.02] wifidog: fix compilation with more recent wolfssl
2023-01-21 21:37:18 +02:00
Hannu Nyman ff9d4f70f5
Merge pull request #20356 from hnyman/libuhttpd2102
[21.02] fix libuhttpd
2023-01-21 21:30:18 +02:00
Jianhui Zhao d247ca8ef2 rtty: update to 8.0.1
Signed-off-by: Jianhui Zhao <zhaojh329@gmail.com>
(cherry picked from commit 0ea357c164)
(cherry picked from commit 8377e516e9)
2023-01-21 21:20:27 +02:00
Sergey V. Lobanov cda7d2f24c rtty: add compatibility for wolfssl >= 5.0
NTRU support has been removed in wolfssl 5.0 so it is required to
mask NTRU specific code if wolfssl >= 5.0

Signed-off-by: Sergey V. Lobanov <sergey@lobanov.in>
(cherry picked from commit 9913c0899a)
2023-01-21 21:20:05 +02:00
Jianhui Zhao 38f9166dd6 rtty: update to 8.0.0
Signed-off-by: Jianhui Zhao <zhaojh329@gmail.com>
(cherry picked from commit 12c5ed9a4c)
2023-01-21 21:19:54 +02:00
Jianhui Zhao 3a8278b25a rtty: update to 7.4.1
Signed-off-by: Jianhui Zhao <zhaojh329@gmail.com>
(cherry picked from commit 110e24ad9c)
2023-01-21 21:19:36 +02:00