Commit Graph

28408 Commits

Author SHA1 Message Date
Stijn Tintel 173146bbd5 dosfstools: fix PKG_SOURCE
Both mirrors provided in the Makefile only serve gzipped tarballs.

Fixes: dcd7fcfa5b ("dosfstools: update to v4.0")
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2022-12-16 20:47:05 -08:00
Javier Marcet 24faf56110 docker-compose: Update to version 2.14.1
Signed-off-by: Javier Marcet <javier@marcet.info>
2022-12-17 08:34:02 +08:00
Alexandru Ardelean 07a72eba59 python3-pytz: bump to version 2022.6
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2022-12-16 07:34:22 +01:00
YiZhen Choo 60ae1e5637 AdGuardHome: update to v0.107.21
Signed-off-by: YiZhen Choo <yizhen.c02@gmail.com>
2022-12-16 07:17:19 +01:00
John Audia 2d4e7d5fd3 OpenAppID: add new package
Traditionally, Snort rules are based upon packet analysis.  OpenAppID
enables detection of applications/cloud applications on the network.

This package provides OpenAppID and signature files used by OpenAppID to detect
network traffic from certain applications can be used to identify rogue
application use, detect malicious applications and implement various
application policies, such as application blacklisting, limiting application
usage, and enforcing conditional controls.

To use, for example, edit /etc/snort/local.lua and add the following section
at a minimum:

appid = {
  app_detector_dir = '/usr/lib/openappid',
  log_stats = true,
  app_stats_period = 60,
}

Signed-off-by: John Audia <therealgraysky@proton.me>
2022-12-16 03:55:34 +08:00
Hannu Nyman 89dc1b17e9 nano: update to 7.1
Update nano editor to version 7.1
* drop the backported upstream fix for 7.0
* drop AUTORELEASE
* disable justify from 'plus'. Rarely needed with OpenWrt

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2022-12-15 17:54:26 +02:00
Peter van Dijk 6e8e2d571e pdns-recursor: update to 4.8.0
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2022-12-15 08:59:24 +08:00
Tianling Shen 3361868edf
Merge pull request #20083 from paper42/miniflux-2.0.41
miniflux: update to 2.0.41
2022-12-15 04:24:29 +08:00
Toke Høiland-Jørgensen 4d698957d0
Merge pull request #20088 from tohojo/acme-paths
acme: Export the canonical paths for certificates and challenges
2022-12-14 16:45:29 +01:00
Toke Høiland-Jørgensen 17691a5a52 acme-acmesh: Provide a 'combined' certificate bundle as well
The haproxy hotplug script creates a 'combined' certificate bundle that
contains both the certificate chain and the private key. However, having a
daemon hotplug script write into CERT_DIR is not great; so let's provide
the bundle as part of the main acme framework, keeping it in $domain_dir
and just linking it into CERT_DIR. That way we can keep CERT_DIR as just a
collection of links for everything, that no consumers should need to write
into.

Also make sure to set the umask correctly so the combined file is not
world-readable (since it contains the private key).

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2022-12-14 16:43:45 +01:00
Toke Høiland-Jørgensen 152a26da57 acme-acmesh: Don't hard-code certificate directory
The acme-acmesh package hardcoded the certificate path in its hook script.
Now that we export it as a variable we can avoid hard-coding and use the
variable version instead. Also factor out the linking of certificates into
a function so it's not repeated.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2022-12-14 15:31:00 +01:00
Toke Høiland-Jørgensen e3d6422dc5 acme-common: Export canonical paths for storing certificates and challenges
The contract between the acme-common framework and consumers and hook
scripts is that certificates can be consumed from /etc/ssl/acme and that
web challenges are stored in /var/run/acme/challenge. Make this explicit by
exporting $CERT_DIR and $CHALLENGE_DIR as environment variables as well,
instead of having knowledge of those paths depend on out-of-band
information. We already exported $challenge_dir, but let's change it to
upper-case to make it clear that it's not a user configuration variable.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2022-12-14 15:28:23 +01:00
Doug Thomson 6db2fe93cd perl: enable threading support for aarch64 by default
Perl threads seem to be supported and working for aarch64, and
including aarch64 here would allow packages like freeswitch-mod-perl
to become available from the standard OpwnWrt package repository for
popular routers such as the Linksys E8450 and Belkin RT3200.

Signed-off-by: Doug Thomson <dwt62f+github@gmail.com>
2022-12-14 22:13:40 +08:00
Tianling Shen 244101df3e
Merge pull request #20082 from paper42/yt-dlp-2022.11.11
yt-dlp: update to 2022.11.11
2022-12-14 22:07:22 +08:00
源 文雨 97ebd8a2b0 base16384: add new package
Encode binary files to printable utf16be.
See more at https://github.com/fumiama/base16384.

Signed-off-by: 源 文雨 <fumiama@foxmail.com>
2022-12-14 22:05:14 +08:00
Toke Høiland-Jørgensen 82558996c9
Merge pull request #20059 from hgl/acme
acme: deprecate state_dir
2022-12-14 15:00:48 +01:00
Alexandru Ardelean 72bdc33e1a
Merge pull request #20067 from dynasticorpheus/master
python-pycares: bump to 4.3.0
2022-12-14 15:47:20 +02:00
Glen Huang c40d7c09b9 acme-acmesh: use $challenge_dir
Signed-off-by: Glen Huang <i@glenhuang.com>
2022-12-14 21:16:57 +08:00
Glen Huang b907223d57 acme: deprecate state_dir
state_dir is actually a hardcoded value in conffiles. Allowing users to
customize it could result in losing certificates after upgrading if they
don't also specify the dir as being preserved. We shouldn't default to
this dangerous behavior.

With the new ACME package, certificates live in the standard location
/etc/ssl/acme, users who need to do certificate customizations should
look for them in that dir instead.

Signed-off-by: Glen Huang <i@glenhuang.com>
2022-12-14 21:15:52 +08:00
Hannu Nyman b3f4cb00fa
Merge pull request #20016 from commodo/stress-ng-update
stress-ng: bump to version 0.15.00
2022-12-13 17:16:02 +02:00
Fabian Lipken 85a4c5978b python-pycares: PKG_RELEASE:=1
Signed-off-by: Fabian Lipken <dynasticorpheus@gmail.com>
2022-12-13 11:08:12 +01:00
Michal Vasilek 1a38ad44d6
miniflux: update to 2.0.41
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2022-12-13 10:28:24 +01:00
Michal Vasilek e398becaa6
yt-dlp: update to 2022.11.11
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2022-12-13 09:57:36 +01:00
Alexandru Ardelean 7921d0b45f stress-ng: bump to version 0.15.00
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
2022-12-13 08:25:38 +02:00
Stan Grishin 582fc64a94
Merge pull request #20062 from stangri/master-pbr
pbr: detect missing iptables
2022-12-12 20:21:12 -07:00
Sibren Vasse ba8cb7c16c openssh: update to 9.1p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2022-12-13 10:04:27 +08:00
Stan Grishin ad6d1b00c1
Merge pull request #20076 from stangri/master-simple-adblock
simple-adblock: bugfix: add dnsmasq.nftset to uci_load_validate
2022-12-12 15:11:10 -07:00
Stan Grishin fff884e67f simple-adblock: bugfix: add dnsmasq.nftset to uci_load_validate
* fixes https://github.com/openwrt/openwrt/issues/11481 thanks to:
* https://github.com/mistepien for reporting
* https://github.com/dave14305 for diagnosing

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-12 21:43:09 +00:00
Tianling Shen f7b73bf000
Merge pull request #19982 from golddranks/master
ddns-scripts: update_gandi_net: improve logging & add timeout
2022-12-13 03:59:46 +08:00
Jan Hák c933a15ceb knot: update to version 3.2.4
Signed-off-by: Jan Hák <jan.hak@nic.cz>
2022-12-13 03:46:46 +08:00
Van Waholtz d22bed1dc3 syncthing: update to 1.22.2
Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2022-12-12 16:32:54 +01:00
Fabian Lipken b0afdf5991 python-pycares: bump to 4.3.0
Signed-off-by: Fabian Lipken <dynasticorpheus@gmail.com>
2022-12-12 15:21:29 +01:00
Josef Schlehofer 4d4c9dd2cf
Merge pull request #20064 from luizluca/ruby-3.1.3
ruby: update to 3.1.3
2022-12-12 05:55:04 +01:00
Luiz Angelo Daros de Luca 3111bc81af
ruby: update to 3.1.3
This release includes a security fix.

- CVE-2021-33621: HTTP response splitting in CGI

For more details:
- https://www.ruby-lang.org/en/news/2022/11/24/ruby-3-1-3-released/

Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com>
2022-12-12 00:10:09 -03:00
Stan Grishin a86985879f pbr: detect missing iptables
Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-12 02:52:59 +00:00
Peter van Dijk f558461895 pdns: update to 4.7.3
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2022-12-12 05:17:37 +08:00
Hannu Nyman fd7da3333e wget: apply upstream fix to avoid nettle linking in nossl
Replace my own patch with the upstream solution, which they issued
in response to my bug report.
(Two patches as they overlooked something on the first try.
Reference to https://savannah.gnu.org/bugs/index.php?63431 )

The nettle lib evaluation is now conditional to not having "--disable-ntlm".

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2022-12-11 16:36:30 +02:00
Stan Grishin dd7e606f17
Merge pull request #20052 from stangri/master-https-dns-proxy
https-dns-proxy: fix restart
2022-12-10 20:32:03 -07:00
Stan Grishin 75ac50ca89 https-dns-proxy: fix restart
Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-10 05:32:20 +00:00
Stan Grishin 39ddb15038
Merge pull request #20040 from stangri/master-https-dns-proxy
https-dns-proxy: add mdns service records
2022-12-09 22:02:49 -07:00
Stan Grishin 4f94b407df
Merge pull request #20050 from stangri/master-simple-adblock
simple-adblock: support new OISD dnsmasq config
2022-12-09 22:02:11 -07:00
Stan Grishin 3950f0ce99 simple-adblock: support new OISD dnsmasq config
* OISD dnsmasq config files switched from using address= to server=

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2022-12-10 01:57:37 +00:00
Pyry Kontio cefe85250c
ddns-scripts: update_gandi_net: improve logging & add timeout
- Improved logging
  - Log the executed curl command to be able to rerun and test it manually
  - Log the curl exit status
- Added 30 second timeout timeout for clear-cut detection of flaky connections.

Signed-off-by: Pyry Kontio <pyry.kontio@drasa.eu>
2022-12-10 03:37:19 +09:00
Florian Eckert d03ad5036c
Merge pull request #20018 from cbarrick/gcp_ddns
ddns-scripts: add support for Google Cloud DNS
2022-12-09 15:55:30 +01:00
Josef Schlehofer f53eb1231a
Merge pull request #20037 from 1715173329/g1194
golang: Update to 1.19.4
2022-12-09 11:53:40 +01:00
Vladimir Ulrich 23e6200e4d zoneinfo: updated to the latest release
Signed-off-by: Vladimir Ulrich <admin@evl.su>
2022-12-09 10:26:55 +02:00
Chris Barrick cbdc67bd10 ddns-scripts: add support for Google Cloud DNS
The implementation uses a GCP service account. The user is expected to
create and secure a service account and generate a private key. The
"password" field can contain the key inline or be a file path pointing
to the key file on the router.

The GCP project name and Cloud DNS ManagedZone must also be provided.
These are taken as form-urlencoded key-value pairs in param_enc. The TTL
can optionally be supplied in param_opt.

Signed-off-by: Chris Barrick <chrisbarrick@google.com>
2022-12-08 22:04:33 -05:00
Carlo Alberto Ferraris 02e154d3e5 tailscale: preserve tailscaled state file
Fixes #19774 

Signed-off-by: Carlo Alberto Ferraris <cafxx@strayorange.com>
2022-12-09 07:21:33 +08:00
Kuan-Yi Li cec29e9105 modemmanager: bump to 1.20.2
Drop deprecated AUTORELEASE.

Disable unused tests as its compilation is optional in 1.20.

Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
2022-12-09 06:32:32 +08:00
Kuan-Yi Li 570c549bc6 libqmi: bump to 1.32.2
Drop deprecated AUTORELEASE.

Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
2022-12-09 06:32:32 +08:00