Commit Graph

5640 Commits

Author SHA1 Message Date
Sven Eckelmann bbb1ea7345 treewide: Change .*GPL.*+ licenses to SPDX compatible identifier
The CONTRIBUTING.md requests an (or multiple) SPDX identifier for GPL
licenses. But a lot of packages did use a different, non-SPDX style with a
"+" at the end instead of "-or-later".

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2019-09-10 07:45:15 +02:00
Rosen Penev 331201deae
Merge pull request #9947 from eglooca/master
netifyd: Updated to v2.92.
2019-09-09 22:20:05 -07:00
Dirk Brenken 9b18f3ac82
Merge pull request #9948 from dibdot/banIP
banip: update 0.2.0
2019-09-09 21:25:25 +02:00
Dirk Brenken 5f49601e63
banip: update 0.2.0
* remove 'http-only' mode, all sources are now fetched from https sites
* the backup mode is now mandatory ('/tmp' is the default backup
  directory), always create and re-use backups if available.
  To force a re-download take the 'reload' action.
* support 'sshd' in addition to 'dropbear' for logfile parsing
  to detect break-in events
* always update the black-/whitelist with logfile parsing results
  in 'refresh' mode (no new downloads)
* rework the return code handling
* tweak procd trigger
* various small fixes
* (s)hellsheck cosmetics

Signed-off-by: Dirk Brenken <dev@brenken.org>
2019-09-09 21:11:10 +02:00
Darryl Sokoloski 898de0336f netifyd: Updated to v2.92.
Signed-off-by: Darryl Sokoloski <darryl@sokoloski.ca>
2019-09-09 10:22:32 -04:00
Yousong Zhou 20efa32d2d acme: depends on gnu-wget
Fixes openwrt/packages#9456

Ref: https://github.com/openwrt/packages/issues/9456
Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2019-09-09 09:40:34 +02:00
Yousong Zhou 99aed64005 wget: provides gnu-wget
So that packages like acme requiring features from it can depend on it
explicitly, not the more basic "wget" which is also provided by
"uclient-fetch"

Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
2019-09-09 09:40:34 +02:00
Rosen Penev 41fe5a8335 softethervpn: Fix openssl header patch
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-09-06 19:51:59 -07:00
Dirk Brenken 35838f4271
Merge pull request #9929 from dibdot/adblock
adblock: update 3.8.5
2019-09-06 20:53:58 +02:00
Rosen Penev f11cd7e578
Merge pull request #9931 from sebastian-de/ipfix
ulogd2: Build IPFIX module
2019-09-06 11:19:46 -07:00
Rosen Penev e5bab094ae lcdringer: Depend on vala/host instead
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-09-06 10:17:14 -07:00
Sebastian Fleer 3a06581ad7 ulogd2: Build IPFIX module
add ulogd_output_IPFIX.so to ulogd-mod-extra

Signed-off-by: Sebastian Fleer <dev@dwurp.de>
2019-09-06 18:40:59 +02:00
Dirk Brenken 45cb0e1023
adblock: update 3.8.5
* use raw procd interface trigger as last resort, if the
  adblock config is not available during startup
* fix selective subdomain whitelisting for dnsmasq
* fix a kresd restart issue with 'DNS File Reset'
* fix a suspend/resume cornercase
* disable the tld compression, if the number of blocked domains
  is greater than 'adb_maxtld' (default: 100000)
* made the fw portlist configurable (default '53 853 5353')
* preliminary support for inotify-like autoload features
  of dns backends like kresd in future Turris OS. If 'adb_dnsinotify'
  is set to 'true', all adblock related restarts and the
  'DNS File Reset' will be disabled

Signed-off-by: Dirk Brenken <dev@brenken.org>
2019-09-06 11:08:07 +02:00
Rosen Penev 74d1d98e3d
Merge pull request #9922 from neheb/ul
ulogd2: Backport upstream patches
2019-09-05 13:40:15 -07:00
Rosen Penev 79c881200f
ulogd2: Backport upstream patches
IPFIX support was requested.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-09-05 13:06:01 -07:00
Josef Schlehofer b5d7ebc572
Merge pull request #9891 from BKPepe/lighttpd
lighttpd: Update to version 1.4.54
2019-09-05 12:58:38 +02:00
Matthias Schiffer b7ff8b8087
fastd: fix init script for multiple VPN instances
Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
2019-09-04 22:49:12 +02:00
Josef Schlehofer d30a8bd61e
Merge pull request #9919 from ja-pa/samba4-security-fix
samba4: update to version 4.9.13 (security fix)
2019-09-04 19:36:02 +02:00
Jan Pavlinec ad16f2a851
samba4: update to version 4.9.13 (security fix)
Fixes CVE-2019-10197

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-09-04 13:29:35 +02:00
Oever González c45974d0a3
samba4: remove double quotes for renice
The double quote thells the shell that the list returned from `pidof` is a
single argument, therefore, `renice` will cry about a malformed input.
With this commit, `renice` will be applied correctly to all the returned PIDs
from `pidof`.

The output of `renice` for the quoted list is as follows:
`renice: invalid number '6592 6587 6586 6574'`
`renice` does not show and does apply the nice value if the list is unquoted.

Signed-off-by: Oever González <notengobattery@gmail.com>
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-09-04 13:29:33 +02:00
Rosen Penev 36c8518e7d
Merge pull request #9845 from ja-pa/fix-aslr-pie
Disable ASLR PIE in selected packages
2019-09-04 00:13:25 -07:00
Jan Pavlinec ff216608a0
usbip: disable ASLR PIE
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-09-04 08:31:07 +02:00
Rosen Penev b80b614f8f
softethervpn: Add missing OpenSSL header
Fixes compilation without OpenSSL deprecated APIs as well as
-Werror=implicit-function-declaration.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-09-03 12:44:51 -07:00
Rosen Penev c24b9417c7
Merge pull request #9902 from neheb/mosh5
mosh: add package
2019-09-03 12:24:54 -07:00
Rosen Penev 8c6373f74e
Merge pull request #9903 from mwarning/zerotier
zerotier: update to 1.4.4
2019-09-03 11:56:16 -07:00
Moritz Warning 966e56fa82 zerotier: update to release 1.4.4
Also allow path to local.conf to be set and enable linker optimisations
to save a few bytes.

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2019-09-03 15:14:27 +02:00
Jakub Tymejczyk 5ac5cf0b98
mosh: add package
Maintainer: Jakub Tymejczyk <jakub@tymejczyk.pl>
Compile tested: ramips, Xiaomi Router 3G, fc54256
Run tested: ramips, Xiaomi Router 3G, 0f54d96

Description:
Mosh is "Remote terminal application that allows roaming, supports
intermittent connectivity, and provides intelligent local echo and line
editing of user keystrokes".

Project's site: https://mosh.org

Makefile and patch taken from: https://github.com/mchwalisz/mosh-openwrt
updated by me

Signed-off-by: Jakub Tymejczyk <jakub@tymejczyk.pl>
(Makefile cleanup and size optimizations)
Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-09-01 18:45:25 -07:00
Rosen Penev 684b7a858f
apinger: Fix PKG_SOURCE_VERSION
Too short

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2019-09-01 17:09:20 -07:00
Rosen Penev f9e5b9f143
Merge pull request #9881 from aparcar/ipsec-tools
remove ipsec-tools and opennhrp
2019-09-01 11:34:33 -07:00
Josef Schlehofer e06086c4ca
lighttpd: Makefile polishing
- Correct SPDX License Identifier
- Move MAINTAINER, SUBMENU to more appropriate place
- Use HTTPS in URL

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2019-09-01 15:40:35 +02:00
Josef Schlehofer 80c721c6ae
lighttpd: Update to version 1.4.54
Fixes CVE-2019-11072

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2019-09-01 15:39:24 +02:00
Dirk Brenken f564008b9d
Merge pull request #9877 from EricLuehrsen/unbound_193
unbound: update to 1.9.3
2019-09-01 07:47:32 +02:00
Paul Spooren 96be603258 ipsec-tools: remove
As discussed on GitHub[0] the package should be removed.

[0]: https://github.com/openwrt/packages/issues/7832

> The package is effectively orphaned upstream and has been for some
  time. Given the security-sensitive nature of the package, an active
  maintainer community is essential for safe usage. Racoon's lack of
  support for IKEv2, despite it being stable for a long time, and the
  availability of next-generation tunneling systems such as wireguard,
  also would seem to limit its future value. Setkey's functionality
  has been subsumed by 'ip xfrm'.

> If you disagree that ipsec-tools should be removed from OpenWRT,
  please say so now. If there are still use cases for it that are
  not met by other IKE implmenentations that would be good to
  know. But more importantly, I think you'll need to convince us
  that ipsec-tools is actually safe to operate on today's Internet
  given its current state of development.

Signed-off-by: Paul Spooren <mail@aparcar.org>
2019-08-31 10:26:21 -10:00
Paul Spooren 4dcb01af8d opennhrp: remove
The package requires ipsec-tools which will be removed from packages.git

Signed-off-by: Paul Spooren <mail@aparcar.org>
2019-08-31 10:26:21 -10:00
Noah Meyerhans a8fd5cb7ab net: remove ipsec-tools
As discussed in #7832, ipsec-tools is no longer suitable for inclusion in the
distribution.

Signed-off-by: Noah Meyerhans <frodo@morgul.net>
2019-08-31 08:06:33 -07:00
Eric Luehrsen c36d8a49fd unbound: update to 1.9.3
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2019-08-31 01:12:16 -04:00
Rosen Penev 2676c2dd57
Merge pull request #9732 from dengqf6/ngx
nginx: update to 1.16.1
2019-08-30 10:16:47 -07:00
Rosen Penev 0fe7e4586b
Merge pull request #9853 from neheb/atf
atftp: Update to 0.7.2
2019-08-30 10:14:28 -07:00
Rosen Penev 73801c267a
Merge pull request #9868 from gladiac1337/haproxy-2.0.5
haproxy: Update HAProxy to v2.0.5
2019-08-30 10:11:38 -07:00
Rosen Penev 35c4fd5aba
Merge pull request #9871 from wvdakker/master
Shorewall: Bump to 5.2.3.4
2019-08-30 10:10:56 -07:00
Jo-Philipp Wich 22be9a1c01 cgi-io: require whitelisting upload locations
Introduce further ACL checks to verify that the request-supplied
upload location may be written to. This prevents overwriting things
like /bin/busybox and allows to confine uploads to specific directories.

To setup the required ACLs, the following ubus command may be used
on the command line:

ubus call session grant '{
  "ubus_rpc_session": "d41d8cd98f00b204e9800998ecf8427e",
  "scope": "cgi-io",
  "objects": [
    [ "/etc/certificates/*", "write" ],
    [ "/var/uploads/*", "write" ]
  ]
}'

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
2019-08-30 13:58:50 +02:00
W. van den Akker eaecd26777
Shorewall6: Bump to version 5.2.3.4
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-08-30 13:29:39 +02:00
W. van den Akker 7654150496
Shorewall: Bump to version 5.2.3.4
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-08-30 13:25:14 +02:00
W. van den Akker 6794fef86f
Shorewall6-lite: Bump to version 5.2.3.4
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-08-30 13:22:53 +02:00
W. van den Akker fba1e1d0f3
Shorewall-lite: Bump to version 5.2.3.4
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-08-30 13:19:05 +02:00
W. van den Akker e51db908a1
Shorewall-core: Bump to version 5.2.3.4
Signed-off-by: W. van den Akker <wvdakker@wilsoft.nl>
2019-08-30 13:17:40 +02:00
Christian Lachner 33bc3d877b haproxy: Update HAProxy to v2.0.5
- Update haproxy download URL and hash
- Add new patches

Signed-off-by: Christian Lachner <gladiac@gmail.com>
2019-08-30 07:21:51 +02:00
Dirk Brenken 4f43e9b388
Merge pull request #9863 from dibdot/adblock
adblock: update 3.8.4
2019-08-29 20:03:16 +02:00
Dirk Brenken f385415110
Merge pull request #9862 from dibdot/travelmate
travelmate: update 1.4.12
2019-08-29 20:02:38 +02:00
Dirk Brenken 1d90509b03
travelmate: update 1.4.12
* automatically add open uplinks to your wireless config,
  e.g. hotel captive portals (disabled by default)
* shift net status check in a separate function
* (s)hellcheck cosmetics

Signed-off-by: Dirk Brenken <dev@brenken.org>
2019-08-29 15:45:35 +02:00