1
0
mirror of https://git.openwrt.org/feed/packages.git synced 2024-06-26 09:37:44 +02:00
Commit Graph

10175 Commits

Author SHA1 Message Date
Philip Prindeville
5476cb9465 beanstalkd: Update to 1.13
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-03-26 17:21:08 -06:00
Sibren Vasse
2c755759df openssh: update to 9.3p1
Signed-off-by: Sibren Vasse <github@sibrenvasse.nl>
2023-03-18 14:09:24 -07:00
Philip Prindeville
14bcf33c2a
Merge pull request #20656 from pprindeville/strongwan-update-5.9.10
strongswan: Update to 5.9.10
2023-03-17 19:51:21 -06:00
Tianling Shen
392a68e247
rclone: Update to 1.62.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-17 13:17:38 +08:00
Michal Vasilek
c6eb1c025c git: update to 2.39.2
GITWEB_* variable values don't work as they should since 2.38, so let's
remove them and add a workaround. This issue was reported in
https://lore.kernel.org/git/80eb3972-4960-5727-ce86-acc3a4425fd4@nic.cz/T/#u

* refresh patches

Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
2023-03-16 13:34:35 -07:00
Toni Uhlig
7833429fd4 udpspeeder: bump to 20230206.0
Signed-off-by: Toni Uhlig <matzeton@googlemail.com>
2023-03-15 18:52:53 -07:00
Oskari Rauta
56f30520f2 zerotier: do not allow executable stack
zerotier as default has executable stack.
[   11.343143] process '/usr/bin/zerotier-one' started with executable stack

executable stacks are not recommend, possibly provide a threat and there
seems to be no advantage of executable stack with zerotier-one - so let's
build it without instead.

Stack is executable on x86_64, but not on all archs, such as ramips.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-15 12:12:19 +08:00
John Audia
cdf5f9b0e9 snort3: update to 3.1.57.0
Upstream bump

Signed-off-by: John Audia <therealgraysky@proton.me>
2023-03-14 15:09:21 +01:00
Florian Eckert
ddb16c7d93
Merge pull request #20621 from banburybill/ddns-mythic-v2
ddns-scripts: Add v2 API for mythic-beasts.com provider
2023-03-14 08:34:07 +01:00
Moritz Warning
b5cde91594 zerotier: update to 1.10.4
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2023-03-14 11:02:01 +08:00
Oskari Rauta
f9e3af87f5 netbird: update to 0.14.3
Bug fixes & refactor

Release notes:
 - Fix: send remote agents updates when peer re-authenticates

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-13 19:45:19 +08:00
Tianling Shen
4dd80ed519
v2ray-geodata: Update to latest version
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-13 16:40:57 +08:00
Tianling Shen
0e96d2f862
xray-core: Update to 1.8.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-13 16:39:10 +08:00
Philip Prindeville
7cf43fabe2 strongswan: Update to 5.9.10
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-03-12 18:32:43 -06:00
Philip Prindeville
1dfb13eaeb
Merge pull request #20261 from pprindeville/strongswan-update-5.9.9
strongswan: Update to 5.9.9
2023-03-12 18:27:50 -06:00
Philip Prindeville
ae0a8072d6 strongswan: Update to 5.9.9
Add patch to remove definition of RNG leaking in from wolfssl.h.

Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-03-12 13:54:32 -06:00
John Audia
0cec657274 snort3: update to 3.1.56.0
Upstream bump

Build system: x86_64
Build-tested: bcm2711/RPi4B
Run-tested: bcm2711/RPi4B

Signed-off-by: John Audia <therealgraysky@proton.me>
2023-03-12 09:17:13 +01:00
Stan Grishin
35f4830de7 simple-adblock: update init file and config
* move network.sh and jshn.sh includes into load_validate_config function
  to prevent errors when adding the package to image with the Image Builder
* add @bongochong compressed domains block-list to the config

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2023-03-11 10:48:34 +00:00
Darryl Sokoloski
68af9ed3ba netifyd: update to v4.4.1
- Explicitly request the C++11 standard (codebase is not C++17 compliant).
- Removed categories.json from conffiles -- it's not a configuration
  file.
- Removed commented-out convenience git hash place-holder -- for some
  reason it irritates people.
- Added radix header file to devel files.
- Removed redundant call to Build/Configure (not needed).

Co-authored-by: Tianling Shen <cnsztl@gmail.com>
Signed-off-by: Darryl Sokoloski <darryl@sokoloski.ca>
2023-03-11 13:36:27 +08:00
Rosen Penev
7accad5643 ksmbd-tools: update to 3.4.7
Remove upstreamed patches.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2023-03-10 18:42:02 -08:00
Dirk Brenken
d8b6e2ca2a
banip: update 0.8.2-2
* fix the auto-detection for pppoe and 6in4 tunnel interfaces
* add the new 'ban_nftpolicy' option to expose the nft set policy, values: memory (default), performance
* add the new 'ban_nftlogevel' option to expose the nft syslog level, values: emerg, alert, crit, err, warn (default),
  notice, info, debug, audit
* status optimizations
* logging optimizations
* update the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-03-10 19:42:41 +01:00
Stijn Tintel
f7c0e413f4 miniupnpd: bump to 2.3.3
Fixes: #19637
Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
2023-03-10 01:59:26 +02:00
Jim Hague
12544affe9 ddns-scripts: Add v2 API for mythic-beasts.com provider
Use USERNAME as the key, PASSWORD as the secret.

Signed-off-by: Jim Hague <jim.hague@acm.org>
2023-03-09 15:39:58 +00:00
BackSlasher
562fb3aa0a udp-broadcast-relay-redux-openwrt: add cgroupsns to jail
Added `cgroupsns` to jail, otherwise you get this failure:
```
Mon Mar  6 14:46:05 2023 user.err : jail: Not using namespaces, capabilities or seccomp !!!
```
Error is here, seems to indicate that we're running a jail without using any capability.
https://lxr.openwrt.org/source/procd/jail/jail.c#L2847

Decided to use minimal effort approach

Signed-off-by: BackSlasher <nitz.raz@gmail.com>
2023-03-09 18:25:03 +08:00
Oskari Rauta
278a6617a0 cni-protocol: new package
simple protocol support script for netifd.

netifd protocol support for cni networks makes
defining network for podman and other similar
systems using cni networking much easier and simpler.

with cni protocol support, on a cni network, where firewall
and portmapper is disabled, you may control firewalling
with openwrt's standard firewall configuration.

for example, create a container that hosts web content on
port 80 with static ip on your cni network, if your
network is 10.88.0.0/16, use for eg. 10.88.0.101 as
your containers static ip address. Create a zone, cni
to your firewall and add your interface to it.

Now you can easily set up redirectiong to 10.88.0.101:80
to expose it's port 80 to wan for serving your website.

Protocol has only one setting: device, on podman this
often is cni-podman0. This protocol may also be used
on other equillavents, such as netavark (cni replacement
in podman), where device as default is podman0.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-09 18:13:16 +08:00
Peter van Dijk
3c08be8fd7 pdns-recursor: update to 4.8.3
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2023-03-09 14:59:11 +08:00
Tianling Shen
dc9dd974dd
Merge pull request #20584 from mpeleshenko/samba4-4.17.5
samba4: update to 4.17.5
2023-03-09 14:58:15 +08:00
Kuan-Yi Li
0c526d09a8 modemmanager: bump to 1.20.6
Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
2023-03-09 14:13:13 +08:00
Van Waholtz
4f8874f636 frp: update to 0.48.0
Changelog: https://github.com/fatedier/frp/releases/tag/v0.48.0

Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-03-09 10:41:17 +08:00
Van Waholtz
8fcc48c339 frp: update to 0.47.0
A restart is only required if `$conf_file` has been modified.

Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-03-09 10:41:17 +08:00
Michael Peleshenko
604604a667
samba4: update to 4.17.5
* update to 4.17.5
* changelog: https://www.samba.org/samba/history/samba-4.17.5
* refresh patch

* CVE-2022-42898: Samba's Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which allowed an attacker with a forged PAC to corrupt the heap.
 https://www.samba.org/samba/security/CVE-2022-42898.html

* CVE-2022-37966: This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

  A Samba Active Directory DC will issue weak rc4-hmac session keys for use between modern clients and servers despite all modern Kerberos implementations supporting the aes256-cts-hmac-sha1-96 cipher.

  On Samba Active Directory DCs and members 'kerberos encryption types = legacy' would force rc4-hmac as a client even if the server supports aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96.
  https://www.samba.org/samba/security/CVE-2022-37966.html

* CVE-2022-37967: This is the Samba CVE for the Windows Kerberos Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022.

  A service account with the special constrained delegation permission could forge a more powerful ticket than the one it was presented with.
  https://www.samba.org/samba/security/CVE-2022-37967.html

* CVE-2022-38023: The "RC4" protection of the NetLogon Secure channel uses the same algorithms as rc4-hmac cryptography in Kerberos, and so must also be assumed to be weak.
  https://www.samba.org/samba/security/CVE-2022-38023.html

* BUG 15210: synthetic_pathref AFP_AfpInfo failed errors.
  This resolves errors logged during macOS TimeMachine backups.
  https://bugzilla.samba.org/show_bug.cgi?id=15210

Signed-off-by: Michael Peleshenko <mpeleshenko@gmail.com>
2023-03-08 20:19:08 -05:00
Tianling Shen
c49a1dad52 tmate-ssh-server: fix build against msgpack-c 6.0
This patch is taken from
https://git.alpinelinux.org/aports/commit/?id=f923597f4bdea424dc28b1d026269df060596fac

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-08 23:49:10 +01:00
Tianling Shen
928710813b tmate: fix build against msgpack-c 6.0
This patch is taken from
https://git.alpinelinux.org/aports/commit/?id=f923597f4bdea424dc28b1d026269df060596fac

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-08 23:49:10 +01:00
Dirk Brenken
7c2296c891
banip: release 0.8.2-1
* major performance improvements: clean-up/optimize all nft calls
* add a new "ban_reportelements" option,
  to disable the (time consuming) Set element count in the report (enabled by default)
* update the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-03-08 21:03:34 +01:00
Dobroslaw Kijowski
a499a4006a adguardhome: bump to 0.107.25
* Full changelog available at:
  * https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.25

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2023-03-08 23:11:57 +08:00
Dobroslaw Kijowski
2e68b9f515 adguardhome: enable legacy openssl provider for nodejs
Currently compilation fails because of:
```
  opensslErrorStack: [ 'error:03000086:digital envelope routines::initialization error' ],
  library: 'digital envelope routines',
  reason: 'unsupported',
  code: 'ERR_OSSL_EVP_UNSUPPORTED'
```

What's interesting package gets built but when trying to access UI there's
`404: page not found` error.

It has been reported in multiple places:
* https://github.com/AdguardTeam/AdGuardHome/issues/5559
* https://github.com/AdguardTeam/AdGuardHome/issues/4595

Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
2023-03-08 23:11:57 +08:00
Tianling Shen
41987abc84 v2raya: switch to use nftables
Backport a pending PR to add nftables support.
Upstream PR: https://github.com/v2rayA/v2rayA/pull/805

As nftables merged ipv4/ipv6 support into a single command, so simply
enable ipv6 support by default.

While at it, backport a upstreamed fix for simple-obfs plugin.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-08 15:40:52 +08:00
Oskari Rauta
58fcaf8fc4 netbird: update to 0.14.2
Update from 0.12.0 -> 0.14.2
Release notes: https://github.com/netbirdio/netbird/releases

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-07 11:35:23 +08:00
Daniel Golle
96fd2dc531 transmission: update to version 4.0.1
This is a major release, both in numbering and in effort! It's been in
active development for over a year and has a huge list of changes --
over a thousand commits -- since Transmission 3.00.

For more information about the release see
https://github.com/transmission/transmission/releases/tag/4.0.0
https://github.com/transmission/transmission/releases/tag/4.0.1

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
2023-03-07 01:40:14 +00:00
Dirk Brenken
0b37036e5a
banip: update 0.8.1-3
* finalized the LuCI frontend preparation (this is the minmal version to use the forthcoming LuCI frontend)
* added a Set survey, to list all elements of a certain set
* changed the default logterm for asterisk
* update the readme

Signed-off-by: Dirk Brenken <dev@brenken.org>
2023-03-06 14:21:52 +01:00
Van Waholtz
e6ded43570 sing-box: update to 1.1.6
Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-03-06 13:23:06 +08:00
Van Waholtz
5c2bd22cb2 sing-box: add necessary dependencies and cleanup Makefile
1. Add `kmod-inet-diag` as a dependency since it is needed for https://sing-box.sagernet.org/configuration/dns/rule/#process_name
2. Remove redundant `default n` (8bc72ea7be)

Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-03-06 13:23:06 +08:00
Christian Lachner
a79df49a5f haproxy: update to v2.6.9
- Update haproxy download URL and hash
- This release fixes a critial flaw known as CVE-2023-25725. See:
  http://git.haproxy.org/?p=haproxy-2.6.git;a=commit;h=73be199c4f5f1ed468161a4c5e10ca77cd5989d8

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2023-03-05 14:51:38 +08:00
Philip Prindeville
bf51e33b57
Merge pull request #20570 from pprindeville/isc-dhcp-allow-no-default-route
isc-dhcp: allow no default route
2023-03-04 18:08:07 -07:00
Oskari Rauta
a4d8d2459a netbird: new package
Netbird is similar vpn service as tailscale and zerotier.

Description:
NetBird is an open-source VPN management platform built on top of WireGuard® making it easy to create secure private networks for your organization or home.
It requires zero configuration effort leaving behind the hassle of opening ports, complex firewall rules, VPN gateways, and so forth.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-03-04 08:42:58 +08:00
Glen Huang
e1f03d7ee4 acme: fix incompatibilty with image builder
Signed-off-by: Glen Huang <i@glenhuang.com>
2023-03-03 23:43:01 +01:00
Josef Schlehofer
82720ba624
Merge pull request #20563 from paper42/clamav-0.104.4
clamav: update to 0.104.4
2023-03-03 07:55:05 +01:00
Tianling Shen
40669c4135
v2raya: drop wrong patches
These patches should not be backported to OpenWrt, otherwise tproxy
won't work for devices connected to br-lan (bypassed by the fw rules).

We have introduced a new compile-time flag for new version (which
is not released yet), but it's unnecessray to backport redudant
patches as here is still at the old version.

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-03 12:08:22 +08:00
Tianling Shen
8e10f5f9a1
cloudflared: Update to 2023.3.0
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-03-03 11:58:33 +08:00
Philip Prindeville
d2dd1bef71 isc-dhcp: allow suppression of default gateway
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-03-01 08:54:34 -07:00