1
0
mirror of https://git.openwrt.org/feed/packages.git synced 2024-06-13 19:03:52 +02:00
Commit Graph

29685 Commits

Author SHA1 Message Date
Philip Prindeville
857083c283
Merge pull request #21380 from pprindeville/strongswan-clean-up-parser
strongswan: clean up parser
2023-06-15 22:15:07 -06:00
Philip Prindeville
7f8aea6d86 strongswan: make parsing more consistent
Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
2023-06-15 18:33:08 -06:00
Michael Heimpold
2bdf22cde9
Merge pull request #21368 from mhei/php8-update-to-8.2.7
php8: update to 8.2.7
2023-06-15 21:17:35 +02:00
Florian Eckert
fd63e400ba modemmanager: if an alias name is used do not check sysfs path
If an alias name is used for the modem, then a check if the device exists
in sysfs does not work. To fix this remove the check if the sysfs device
exists. The protocoll handler already checks if the modem is responsible
for this device on the next line.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2023-06-15 15:45:16 +02:00
Florian Eckert
e66fead6d4 modemmanager: do not cache virtual device events
On small systems with many virtual devices, the modem manager sometimes
could not start because it took too long until all devices for the modem
were recognised. This is because all system events that are stored in
the file events.cache have to be processed. To speed up the processing,
all devices under /sys/devices/virtual are now filtered out so that they
do not have to be processed.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2023-06-15 15:09:55 +02:00
Hirokazu MORIKAWA
660556f5bf icu: bump to 73.2
ICU 73.2 updates to CLDR 43.1 locale data. These are maintenance releases for ICU 73 and CLDR 43, with limited sets of bug fixes and no API or structural changes.

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-06-15 12:38:35 +02:00
W. Michael Petullo
4a5dc03ddb krb5: update to 1.21
Signed-off-by: W. Michael Petullo <mike@flyn.org>
2023-06-15 12:37:55 +02:00
Michael Heimpold
1db2070f00 php8: update to 8.2.7
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2023-06-14 08:43:04 +02:00
Michael Heimpold
fdf1f7a85f
Merge pull request #21363 from mhei/revert-php8-riscv64-workaround
php8: revert workaround to fix linking on riscv64 platform
2023-06-14 08:34:38 +02:00
Tianling Shen
27e6796a83 cloudreve: Update to 3.8.0
- Fixed packing web frontend assets
- Enabled build for riscv64

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-06-14 13:46:44 +08:00
Quintin Hill
e7181b3452 python-ble2mqtt: update to 0.1.7
Signed-off-by: Quintin Hill <stuff@quintin.me.uk>
2023-06-14 13:43:45 +08:00
Quintin Hill
76306b1bbb python-bleak: upgrade to 0.20.2
Signed-off-by: Quintin Hill <stuff@quintin.me.uk>
2023-06-14 13:43:45 +08:00
Quintin Hill
4105ce9294 python-dbus-fast: update to 1.86.0
Signed-off-by: Quintin Hill <stuff@quintin.me.uk>
2023-06-14 13:43:45 +08:00
Kuan-Yi Li
ba75322534 treewide: remove COMMITCOUNT
Automatically compute and substitute current values for all
$(COMMITCOUNT) instances as this feature is deprecated and shouldn't be
used.

Based on commit 0c10c224be81:

Change COMMITCOUNT in rules.mk to:
```
COMMITCOUNT = $(if $(DUMP),0,$(shell sed -i "s/\$$(COMMITCOUNT)/$(call commitcount)/" $(CURDIR)/Makefile))
```

then update all affected packages by:
```
for i in $(git -C feeds/packages grep -l COMMITCOUNT | sed 's^.*/\([^/]*\)/Makefile^\1^';);
do
	make package/$i/clean
done
```

Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
2023-06-13 15:55:02 +02:00
Tianling Shen
81d53813d6
Merge pull request #21345 from jefferyto/python-3.11.4
python3: Update to 3.11.4, refresh patches
2023-06-13 11:00:22 +08:00
Michael Heimpold
5779ae4c5d Revert "php8: fix linking on riscv64 platform"
This reverts commit a2e76e4978.

Now that the issue is fixed on gcc side (see openwrt/openwrt@7b4a966),
we can revert this workaround here.

Signed-off-by: Michael Heimpold <mhei@heimpold.de>
2023-06-12 18:52:39 +02:00
Christian Marangi
9365622f27
nginx: create empty directory for module.d include
Fix a bug on installation of nginx-mod-luci where module.d directory
is not found and luci.module creation fails.
Correctly create empty directory for module.d include for dynamic module
loading by placing file in this directory.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2023-06-12 17:08:40 +02:00
Baptiste Fouques
1ea13ed8a1 ddns: Prevent clearing of desec.io entries
When using both ipv4 and ipv6 entries on the same host, ddns is clearing A
(or AAAA) record depending on the connection (ipv4 or ipv6).

see https://desec.readthedocs.io/en/latest/dyndns/update-api.html#determine-ip-addresses

Signed-off-by: Baptiste Fouques <bateast@duck.com>
Update comment and bump PKG_RELEASE number.
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2023-06-12 16:03:04 +02:00
Nick Hainke
234b435725 gpsd: update to 3.25
Release Information:
https://gitlab.com/gpsd/gpsd/-/blob/release-3.25/NEWS?ref_type=tags

Remove the backport that is now contained in the release:
- 003_sconscript-cross-platform-build-support.patch

Latest olsrd version needs this bump.

Signed-off-by: Nick Hainke <vincent@systemli.org>
2023-06-12 16:01:53 +02:00
Nick Hainke
bd2b4f311a tunneldigger: add package for establishing L2TPv3 tunnels over UDP
In the previous commit we already added tunneldigger-broker. Add the
corresponding client.

This PR is just a refactoring of the already existing opkg package from
wlanslovenija [0].

[0] - https://github.com/wlanslovenija/firmware-packages-opkg/tree/master/net/tunneldigger

Signed-off-by: Nick Hainke <vincent@systemli.org>
2023-06-12 14:54:58 +02:00
Nick Hainke
8298ce8234 tunneldigger-broker: add broker for tunneldigger
In mesh communities, tunneldigger is widely used to create L2TPv3 tunnels
and mesh via them. Since the broker is typically installed on other
distributions, the openwrt broker package has not received any
maintenance in recent years [0]. I  take now care of the further maintaince
of this package. Furthermore, I consulted with the maintainers to ensure
that they were comfortable with the change [1].

This PR is just a refactoring of the already existing opkg package from
wlanslovenija. It fixes config parsing and in general the config, adapts
to the new python syntax and fixes dependency handling.

- [0] https://github.com/wlanslovenija/firmware-packages-opkg/tree/master/net/tunneldigger-broker
- [1] https://github.com/wlanslovenija/firmware-packages-opkg/issues/24

Signed-off-by: Nick Hainke <vincent@systemli.org>
2023-06-12 14:54:58 +02:00
Hirokazu MORIKAWA
8b777d2ec6 libmraa: riscv64 not supported
Addresses buildbot errors

> CMake Error at CMakeLists.txt:193 (message):
>  Only x86, arm, mips, PERIPHERALMAN and mock platforms currently supported

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-06-12 18:25:35 +08:00
Tianling Shen
ce375b0333
Merge pull request #21342 from jefferyto/golang-1.20.5
golang: Update to 1.20.5
2023-06-12 18:21:02 +08:00
Oskari Rauta
da8c4ee3b8 netavark: update to v1.6.0
netavark v1.6.0 was released, so instead of using
git version, use release. Does not contain very
much of changes, but list is available from netavark's
commit log.

Software now comes with additional tool named
netavark-dhcp-proxy-client which is now included
in package.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-06-12 14:15:06 +08:00
Jeffery To
4627ed7c43
python3: Update to 3.11.4, refresh patches
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-06-12 14:10:01 +08:00
Jeffery To
471ef14774
golang: Update to 1.20.5
Includes fixes for:

* CVE-2023-29402: cmd/go: cgo code injection
* CVE-2023-29403: runtime: unexpected behavior of setuid/setgid binaries
* CVE-2023-29404: cmd/go: improper sanitization of LDFLAGS
* CVE-2023-29405: cmd/go: improper sanitization of LDFLAGS

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-06-12 12:04:53 +08:00
Christian Marangi
e182b15eb7
xtables-addons: fix compilation error on kernel 6.1
Fix compilation error on kernel 6.1.
Fix compilation error:
In file included from /mnt/Data/Sources/openwrt/x-wrt/build_dir/target-aarch64_cortex-a72_musl/linux-bcm27xx_bcm2711/xtables-addons-3.24/extensions/LUA/controller.h:24,
                 from /mnt/Data/Sources/openwrt/x-wrt/build_dir/target-aarch64_cortex-a72_musl/linux-bcm27xx_bcm2711/xtables-addons-3.24/extensions/LUA/xt_LUA_target.c:27:
/mnt/Data/Sources/openwrt/x-wrt/build_dir/target-aarch64_cortex-a72_musl/linux-bcm27xx_bcm2711/xtables-addons-3.24/extensions/LUA/lua/lua.h:12:10: fatal error: stddef.h: No such file or directory
   12 | #include <stddef.h>
      |          ^~~~~~~~~~
compilation terminated.

The error is caused by commit 04e85bbf71c9 ("isystem: delete global
-isystem compile option") present upstream from kernel 5.16. This
commit dropped the inclusion of system headers by default and caused
error on LUA module.
Following what is done in the commit for the required code, modify the
LUA Kbuild to include these header and restore correct compilation of
the LUA module.

Fixes: #21294
Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2023-06-11 14:33:50 +02:00
Jitao Lu
68f23a9c33 glib2: disable gnulib printf
A compiler bug (suspiciously) blocks gnulib compilation for
mipsel_24kc_24kf. While we had this patch to disable gnulib, it was
accidentally removed by 5d27631d9f. Add it
back to fix the long broken build for mipsel_24kc_24kf.

Fixes: #19511
Signed-off-by: Jitao Lu <dianlujitao@gmail.com>
2023-06-11 20:55:58 +03:00
Oskari Rauta
4f8c885fb1 podman: update to v4.5.1
Contains several bug fixes.
Package now contains additional tool quadlet.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-06-12 01:14:13 +08:00
Oskari Rauta
b6c2ed0b8d aardvark-dns: update to v1.6.0
aardvark-dns v1.6.0 was released,
so instead of using git version, use release -
similarly like netavark.
Very much hasn't changed but list of changes
is in git commit log of aardvark-dns.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-06-12 00:58:35 +08:00
Tianling Shen
eda669c819
dnsproxy: Update to 0.50.2
Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-06-12 00:55:32 +08:00
Christian Marangi
3f080e484e
nginx: bump to new 1.25.0 release
Bump nginx to new 1.25.0 release.
Changes:

 *) Feature: experimental HTTP/3 support.

Every patch automatically refreshed.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2023-06-11 10:07:43 +02:00
Oskari Rauta
6117fb98cc parted: update to v3.6.0
Lot's of changes, but no online release notes
available, check ChangeLog file once extracted
if necessary

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-06-11 17:34:47 +03:00
Oskari Rauta
6b75cb2860 crun: update v1.8.5
Moved to from git to release version,
but release version does not have submodule
libocispec included, so additional download added.

Release notes: https://github.com/containers/crun/releases

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-06-11 17:32:01 +03:00
Oskari Rauta
f142b1e002 mtools: update to version 4.0.43
Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-06-11 17:29:45 +03:00
Oskari Rauta
232b73ed9a gnu-efi: update to version 3.0.17
update library + add new package containing efi programs
provided by gnu-efi library.

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-06-11 17:29:01 +03:00
Stan Grishin
36799888ca
Merge pull request #21282 from stangri/master-curl
curl: update to 8.1.2
2023-06-11 08:01:38 -06:00
Christian Marangi
add3cbfcd3
nginx: fix problem with migration of uci conf template
Fix some problem with migration of uci conf template and include of
module.d directive.

Fix 2 case:
- uci.conf.template not versioned but with the include module.d
  resulting in double include module.d

- uci.conf.template version 1.1 with the include module.d at the end
  of the config. This is problematic for nginx as modules must be
  included before any http directive.

Handle this 2 case to restore a working uci.conf.template configuration
on migrated config.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2023-06-11 04:36:12 +02:00
Christian Marangi
15271cb467
nginx-util: bump uci conf template version
Bump uci conf template version to 1.2 to sync with nginx version
handling some migration problem.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2023-06-11 04:36:12 +02:00
Leonid Bogdanov
c662aefd9a transmission: Fix env variables passing
It's not possible to configure custom Transmission web home as corresponding
env var gets overwritten by the command that sets CA bundle env var.

Signed-off-by: Leonid Bogdanov <leonidbogdanov86@gmail.com>
2023-06-11 12:14:17 +01:00
Oskari Rauta
9bc2733f31 netbird: update to 0.21.1
Release notes: https://github.com/netbirdio/netbird/releases

Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
2023-06-11 12:16:47 +02:00
Toke Høiland-Jørgensen
1a9f2b66fe acme-acmesh: Bump to version 3.0.6
Important security fix.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
2023-06-09 19:57:25 +02:00
Gerard Ryan
9d3c3350a6 dockerd: Update to 24.0.2
Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
2023-06-09 21:11:56 +08:00
Gerard Ryan
f4e04022b9 docker: Update to 24.0.2
Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
2023-06-09 21:11:56 +08:00
Gerard Ryan
3513df750d containerd: Update to 1.7.1 for docker 24.0.2
Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
2023-06-09 21:11:56 +08:00
Gerard Ryan
f3118b5350 runc: Update to 1.1.7 for docker 24.0.2
Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
2023-06-09 21:11:56 +08:00
Hirokazu MORIKAWA
779af4d40c avahi: Import patches for security fixes
Imported patches included in debian and other package.

* 200-Fix-NULL-pointer-crashes-from-175.patch
  CVE-2021-3502
   A flaw was found in avahi 0.8-5. A reachable assertion is present in avahi_s_host_name_resolver_start function allowing a local attacker to crash the avahi service by requesting hostname resolutions through the avahi socket or dbus methods for invalid hostnames. The highest threat from this vulnerability is to the service availability.

* 201-Avoid-infinite-loop-in-avahi-daemon-by-handling-HUP-event.patch
  CVE-2021-3468
   A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function, allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service, which becomes unresponsive after this flaw is triggered.

* 202-avahi_dns_packet_consume_uint32-fix-potential-undefined-b.patch
   avahi_dns_packet_consume_uint32 left shifts uint8_t values by 8, 16 and 24 bits to combine them into a 32-bit value. This produces an undefined behavior warning with gcc -fsanitize when fed input values of 128 or 255 however in testing no actual unexpected behavior occurs in practice and the 32-bit uint32_t is always correctly produced as the final value is immediately stored into a uint32_t and the compiler appears to handle this "correctly".
Cast the intermediate values to uint32_t to prevent this warning and ensure the intended result is explicit.

* 203-Do-not-disable-timeout-cleanup-on-watch-cleanup.patch
   This was causing timeouts to never be removed from the linked list that tracks them, resulting in both memory and CPU usage to grow larger over time.

* 204-Emit-error-if-requested-service-is-not-found.patch
   It currently just crashes instead of replying with error. Check return
value and emit error instead of passing NULL pointer to reply.

* 205-conf-file-line-lengths.patch
   Allow avahi-daemon.conf file to have lines longer than 256 characters (new limit 1024).

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
2023-06-09 14:47:07 +03:00
Ivan Pavlov
808f67d615 openvpn: fix ipchange hotplug event
In f8a8b71e26 openvpn introduced new hotplug events.
For server config, ipchange hotplug event produces an error.
So, make ipchange hotplug event for client only

Fixes https://github.com/openwrt/packages/issues/21200

Signed-off-by: Ivan Pavlov <AuthorReflex@gmail.com>
2023-06-09 14:46:03 +03:00
S. Brusch
1813bf2c6e crowdsec: new upstream release version 1.5.2
Update crowdsec to latest upstream release version 1.5.2

Signed-off-by: S. Brusch <ne20002@gmx.ch>

Maintainer: Kerma Gérald <gandalf@gk2.net>
Run tested: ipq40xx/generic, Fritzbox 4040, Openwrt 22.03.5

Description: update to latest version of upstream
2023-06-08 13:11:26 +08:00
Jeffery To
b098f2ac40 python3-asgiref: Update to 3.7.2, rename source package
This renames the source package to python-asgiref to match other Python
packages.

This also updates the package title and URL.

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-06-07 23:19:54 +03:00