Commit Graph

28898 Commits

Author SHA1 Message Date
Michael Heimpold 1f571c011c Revert "libgpiod: update to 2.0"
This reverts commit 983835afe6.

I merged the library update to v2.0 to fast, it breaks openocd build
due to API change.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2023-03-10 22:01:33 +01:00
Michael Heimpold 1749d152a2 Revert "libgpiod: introduce libgpiodcxx package for C++ binding"
This reverts commit 82ea104b97.

I merged the library update to v2.0 to fast, it breaks openocd build
due to API change.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2023-03-10 21:59:33 +01:00
Michael Heimpold 6528bdb0e1
Merge pull request #20609 from mhei/libgpiod-update-2.0
libgpiod: update to 2.0 and introduce C++ binding
2023-03-10 21:46:34 +01:00
Dirk Brenken d8b6e2ca2a
banip: update 0.8.2-2
* fix the auto-detection for pppoe and 6in4 tunnel interfaces
* add the new 'ban_nftpolicy' option to expose the nft set policy, values: memory (default), performance
* add the new 'ban_nftlogevel' option to expose the nft syslog level, values: emerg, alert, crit, err, warn (default),
  notice, info, debug, audit
* status optimizations
* logging optimizations
* update the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-03-10 19:42:41 +01:00
Luca Barbato 2d3e0da711 rust-lang: Add an Host/Compile helper as well
Signed-off-by: Luca Barbato <lu_zero@gentoo.org>
2023-03-10 14:24:16 +00:00
Luca Barbato 44d1d22a16 rust-lang: Apply suggestions from code review
Co-authored-by: Tianling Shen <cnsztl@gmail.com>
Signed-off-by: Luca Barbato <luca.barbato@gmail.com>
2023-03-10 14:24:16 +00:00
Luca Barbato 674bad0559 maturin: Add package
Build tool for rust-python packages.

Signed-off-by: Luca Barbato <lu_zero@gentoo.org>
2023-03-10 14:24:16 +00:00
Luca Barbato bc6dab92f4 ripgrep: Add the package
Based on work from Donald Hoskins <grommish@gmail.com>.
Testcase for the rust language support.

Signed-off-by: Luca Barbato <lu_zero@gentoo.org>
2023-03-10 14:24:16 +00:00
Luca Barbato 83785a7ce0 rust-lang: Add the rust language support
Based on work from Donald Hoskins <grommish@gmail.com>.

Signed-off-by: Luca Barbato <lu_zero@gentoo.org>
2023-03-10 14:24:16 +00:00
Jianhui Zhao 772db8c11b lua-eco: update to 2.2.0
Signed-off-by: Jianhui Zhao <zhaojh329@gmail.com>
2023-03-10 17:15:44 +08:00
Stijn Tintel 681c23ac51
Merge pull request #20594 from stintel/miniupnpd
miniupnpd: bump to 2.3.3
2023-03-10 03:24:17 +02:00
Stijn Tintel f7c0e413f4 miniupnpd: bump to 2.3.3
Fixes: #19637
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2023-03-10 01:59:26 +02:00
Alexandru Ardelean 578166f07f openblas: don't allow ccache use
Fixes https://github.com/openwrt/packages/issues/20596

Signed-off-by: Alexandru Ardelean <alex@shruggie.ro>
2023-03-09 15:32:17 -08:00
BackSlasher 562fb3aa0a udp-broadcast-relay-redux-openwrt: add cgroupsns to jail
Added `cgroupsns` to jail, otherwise you get this failure:
```
Mon Mar  6 14:46:05 2023 user.err : jail: Not using namespaces, capabilities or seccomp !!!
```
Error is here, seems to indicate that we're running a jail without using any capability.
https://lxr.openwrt.org/source/procd/jail/jail.c#L2847

Decided to use minimal effort approach

Signed-off-by: BackSlasher <nitz.raz@gmail.com>
2023-03-09 18:25:03 +08:00
Oskari Rauta 278a6617a0 cni-protocol: new package
simple protocol support script for netifd.

netifd protocol support for cni networks makes
defining network for podman and other similar
systems using cni networking much easier and simpler.

with cni protocol support, on a cni network, where firewall
and portmapper is disabled, you may control firewalling
with openwrt's standard firewall configuration.

for example, create a container that hosts web content on
port 80 with static ip on your cni network, if your
network is 10.88.0.0/16, use for eg. 10.88.0.101 as
your containers static ip address. Create a zone, cni
to your firewall and add your interface to it.

Now you can easily set up redirectiong to 10.88.0.101:80
to expose it's port 80 to wan for serving your website.

Protocol has only one setting: device, on podman this
often is cni-podman0. This protocol may also be used
on other equillavents, such as netavark (cni replacement
in podman), where device as default is podman0.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-09 18:13:16 +08:00
Peter van Dijk 3c08be8fd7 pdns-recursor: update to 4.8.3
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2023-03-09 14:59:11 +08:00
Tianling Shen dc9dd974dd
Merge pull request #20584 from mpeleshenko/samba4-4.17.5
samba4: update to 4.17.5
2023-03-09 14:58:15 +08:00
Michael Heimpold 82ea104b97 libgpiod: introduce libgpiodcxx package for C++ binding
This adds a new package for the C++ binding.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2023-03-09 07:57:07 +01:00
Michael Heimpold 983835afe6 libgpiod: update to 2.0
This updates this library to the latest major version.

Since the Python binding build changed in this version,
let's switch to the Py3Package infrastructure.

Also the older v1 kernel interface is not used anymore,
so we can drop this part of the kernel configuration.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2023-03-09 07:57:07 +01:00
Kuan-Yi Li 0c526d09a8 modemmanager: bump to 1.20.6
Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
2023-03-09 14:13:13 +08:00
Kuan-Yi Li 4d26fec721 libqmi: bump to 1.32.4
Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
2023-03-09 14:13:13 +08:00
Kuan-Yi Li c15b76750f libmbim: bump to 1.28.4
Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
2023-03-09 14:13:13 +08:00
Van Waholtz 4f8874f636 frp: update to 0.48.0
Changelog: https://github.com/fatedier/frp/releases/tag/v0.48.0

Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-03-09 10:41:17 +08:00
Van Waholtz 8fcc48c339 frp: update to 0.47.0
A restart is only required if `$conf_file` has been modified.

Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-03-09 10:41:17 +08:00
Michael Peleshenko 604604a667
samba4: update to 4.17.5
* update to 4.17.5
* changelog: https://www.samba.org/samba/history/samba-4.17.5
* refresh patch

* CVE-2022-42898: Samba's Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which allowed an attacker with a forged PAC to corrupt the heap.
 https://www.samba.org/samba/security/CVE-2022-42898.html

* CVE-2022-37966: This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

  A Samba Active Directory DC will issue weak rc4-hmac session keys for use between modern clients and servers despite all modern Kerberos implementations supporting the aes256-cts-hmac-sha1-96 cipher.

  On Samba Active Directory DCs and members 'kerberos encryption types = legacy' would force rc4-hmac as a client even if the server supports aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.
  https://www.samba.org/samba/security/CVE-2022-37966.html

* CVE-2022-37967: This is the Samba CVE for the Windows Kerberos Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

  A service account with the special constrained delegation permission could forge a more powerful ticket than the one it was presented with.
  https://www.samba.org/samba/security/CVE-2022-37967.html

* CVE-2022-38023: The "RC4" protection of the NetLogon Secure channel uses the same algorithms as rc4-hmac cryptography in Kerberos, and so must also be assumed to be weak.
  https://www.samba.org/samba/security/CVE-2022-38023.html

* BUG 15210: synthetic_pathref AFP_AfpInfo failed errors.
  This resolves errors logged during macOS TimeMachine backups.
  https://bugzilla.samba.org/show_bug.cgi?id=15210

Signed-off-by: Michael Peleshenko <mpeleshenko@gmail.com>
2023-03-08 20:19:08 -05:00
Jianhui Zhao 926617ec4d lua-eco: update to 2.1.0
* updated description
* switched default SSL engine to mbedtls
* added new network module

Signed-off-by: Jianhui Zhao <zhaojh329@gmail.com>
2023-03-09 08:06:54 +08:00
Tianling Shen c49a1dad52 tmate-ssh-server: fix build against msgpack-c 6.0
This patch is taken from
https://git.alpinelinux.org/aports/commit/?id=f923597f4bdea424dc28b1d026269df060596fac

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-08 23:49:10 +01:00
Tianling Shen 928710813b tmate: fix build against msgpack-c 6.0
This patch is taken from
https://git.alpinelinux.org/aports/commit/?id=f923597f4bdea424dc28b1d026269df060596fac

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-08 23:49:10 +01:00
Tianling Shen 394cc366b3 msgpack-c: Update to 6.0.0
Removed 010-no-gtest.patch as upstream no longer detects it.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-08 23:49:10 +01:00
Dirk Brenken 7c2296c891
banip: release 0.8.2-1
* major performance improvements: clean-up/optimize all nft calls
* add a new "ban_reportelements" option,
  to disable the (time consuming) Set element count in the report (enabled by default)
* update the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-03-08 21:03:34 +01:00
Michal Vasilek 9f0922910e yt-dlp: update to 2023.3.4
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2023-03-08 23:12:40 +08:00
Dobroslaw Kijowski a499a4006a adguardhome: bump to 0.107.25
* Full changelog available at:
  * https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.25

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2023-03-08 23:11:57 +08:00
Dobroslaw Kijowski 2e68b9f515 adguardhome: enable legacy openssl provider for nodejs
Currently compilation fails because of:
```
  opensslErrorStack: [ 'error:03000086:digital envelope routines::initialization error' ],
  library: 'digital envelope routines',
  reason: 'unsupported',
  code: 'ERR_OSSL_EVP_UNSUPPORTED'
```

What's interesting package gets built but when trying to access UI there's
`404: page not found` error.

It has been reported in multiple places:
* https://github.com/AdguardTeam/AdGuardHome/issues/5559
* https://github.com/AdguardTeam/AdGuardHome/issues/4595

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2023-03-08 23:11:57 +08:00
Jiri Slachta d71c26c7af
Merge pull request #20608 from micmac1/tiff-no-deflate
tiff: force libdeflate support to off
2023-03-08 14:35:04 +01:00
Tianling Shen 41987abc84 v2raya: switch to use nftables
Backport a pending PR to add nftables support.
Upstream PR: https://github.com/v2rayA/v2rayA/pull/805

As nftables merged ipv4/ipv6 support into a single command, so simply
enable ipv6 support by default.

While at it, backport a upstreamed fix for simple-obfs plugin.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-08 15:40:52 +08:00
Tianling Shen de085a237a
perl-ack: Update to 3.7.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
(cherry picked from commit 26b92db22c9a051447ee445acaa11a795fb35a4e)
2023-03-08 15:37:07 +08:00
Sebastian Kemper e3c6da4e25 tiff: force libdeflate support to off
Commit 81d2b72 added a package providing libdeflate. Tiff by default
links to it, causing a build error.

Package libtiff is missing dependencies for the following libraries:
libdeflate.so.0

This commit forces libdeflate use off to avoid this. No revision bump is
done because the package is currently not compiling anyway.

Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
2023-03-07 22:31:44 +01:00
Oskari Rauta 58fcaf8fc4 netbird: update to 0.14.2
Update from 0.12.0 -> 0.14.2
Release notes: https://github.com/netbirdio/netbird/releases

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-07 11:35:23 +08:00
Oskari Rauta 665ae34856 conmon: update to 2.1.7
- Fix leaking symbolic links in the opt_socket_path directory
 - cgroup: Stumble on if we can't set up oom handling

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-07 11:35:06 +08:00
Aleksander Jan Bajkowski a3e64cdd1e coremark: bump to 2023-01-25
Signed-off-by: Aleksander Jan Bajkowski <olek2@wp.pl>
2023-03-07 11:27:08 +08:00
Daniel Golle 96fd2dc531 transmission: update to version 4.0.1
This is a major release, both in numbering and in effort! It's been in
active development for over a year and has a huge list of changes --
over a thousand commits -- since Transmission 3.00.

For more information about the release see
https://github.com/transmission/transmission/releases/tag/4.0.0
https://github.com/transmission/transmission/releases/tag/4.0.1

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2023-03-07 01:40:14 +00:00
Daniel Golle 1ecef46f1c libutp: add package
Add Transmission version of the uTorrent Transport Protocol library.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2023-03-07 01:40:14 +00:00
Daniel Golle a281a8af9f libdht: add package
Add Kademlia Distributed Hash Table (DHT) library.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2023-03-07 01:40:14 +00:00
Daniel Golle 81d2b7262e libdeflate: add package
Add package for libdeflate which is a library for fast, whole-buffer
DEFLATE-based compression and decompression.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2023-03-07 01:40:14 +00:00
Daniel Golle 6993b5d945 libb64: add package
Add generic base64 encode/decode (static) library.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2023-03-07 01:40:14 +00:00
Dirk Brenken 0b37036e5a
banip: update 0.8.1-3
* finalized the LuCI frontend preparation (this is the minmal version to use the forthcoming LuCI frontend)
* added a Set survey, to list all elements of a certain set
* changed the default logterm for asterisk
* update the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-03-06 14:21:52 +01:00
Van Waholtz e6ded43570 sing-box: update to 1.1.6
Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-03-06 13:23:06 +08:00
Van Waholtz 5c2bd22cb2 sing-box: add necessary dependencies and cleanup Makefile
1. Add `kmod-inet-diag` as a dependency since it is needed for https://sing-box.sagernet.org/configuration/dns/rule/#process_name
2. Remove redundant `default n` (8bc72ea7be)

Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-03-06 13:23:06 +08:00
Christian Lachner a79df49a5f haproxy: update to v2.6.9
- Update haproxy download URL and hash
- This release fixes a critial flaw known as CVE-2023-25725. See:
  http://git.haproxy.org/?p=haproxy-2.6.git;a=commit;h=73be199c4f5f1ed468161a4c5e10ca77cd5989d8

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2023-03-05 14:51:38 +08:00
Philip Prindeville bf51e33b57
Merge pull request #20570 from pprindeville/isc-dhcp-allow-no-default-route
isc-dhcp: allow no default route
2023-03-04 18:08:07 -07:00