aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAge
* python-aio-mqtt-mod: add packageQuintin Hill2023-03-17
| | | | | | This package is a dependency of ble2mqtt. Signed-off-by: Quintin Hill <stuff@quintin.me.uk>
* Revert "libgpiod: update to 2.0"Michael Heimpold2023-03-10
| | | | | | | | | This reverts commit 983835afe6fad074b347a8ff1dc8986d40773de5. I merged the library update to v2.0 to fast, it breaks openocd build due to API change. Signed-off-by: Michael Heimpold <mhei@heimpold.de>
* Revert "libgpiod: introduce libgpiodcxx package for C++ binding"Michael Heimpold2023-03-10
| | | | | | | | | This reverts commit 82ea104b978dcd84919dfe5d1ee630791d85df10. I merged the library update to v2.0 to fast, it breaks openocd build due to API change. Signed-off-by: Michael Heimpold <mhei@heimpold.de>
* Merge pull request #20609 from mhei/libgpiod-update-2.0Michael Heimpold2023-03-10
|\ | | | | libgpiod: update to 2.0 and introduce C++ binding
| * libgpiod: introduce libgpiodcxx package for C++ bindingMichael Heimpold2023-03-09
| | | | | | | | | | | | This adds a new package for the C++ binding. Signed-off-by: Michael Heimpold <mhei@heimpold.de>
| * libgpiod: update to 2.0Michael Heimpold2023-03-09
| | | | | | | | | | | | | | | | | | | | | | | | This updates this library to the latest major version. Since the Python binding build changed in this version, let's switch to the Py3Package infrastructure. Also the older v1 kernel interface is not used anymore, so we can drop this part of the kernel configuration. Signed-off-by: Michael Heimpold <mhei@heimpold.de>
* | banip: update 0.8.2-2Dirk Brenken2023-03-10
| | | | | | | | | | | | | | | | | | | | | | | | * fix the auto-detection for pppoe and 6in4 tunnel interfaces * add the new 'ban_nftpolicy' option to expose the nft set policy, values: memory (default), performance * add the new 'ban_nftlogevel' option to expose the nft syslog level, values: emerg, alert, crit, err, warn (default), notice, info, debug, audit * status optimizations * logging optimizations * update the readme Signed-off-by: Dirk Brenken <dev@brenken.org>
* | rust-lang: Add an Host/Compile helper as wellLuca Barbato2023-03-10
| | | | | | | | Signed-off-by: Luca Barbato <lu_zero@gentoo.org>
* | rust-lang: Apply suggestions from code reviewLuca Barbato2023-03-10
| | | | | | | | | | Co-authored-by: Tianling Shen <cnsztl@gmail.com> Signed-off-by: Luca Barbato <luca.barbato@gmail.com>
* | maturin: Add packageLuca Barbato2023-03-10
| | | | | | | | | | | | Build tool for rust-python packages. Signed-off-by: Luca Barbato <lu_zero@gentoo.org>
* | ripgrep: Add the packageLuca Barbato2023-03-10
| | | | | | | | | | | | | | Based on work from Donald Hoskins <grommish@gmail.com>. Testcase for the rust language support. Signed-off-by: Luca Barbato <lu_zero@gentoo.org>
* | rust-lang: Add the rust language supportLuca Barbato2023-03-10
| | | | | | | | | | | | Based on work from Donald Hoskins <grommish@gmail.com>. Signed-off-by: Luca Barbato <lu_zero@gentoo.org>
* | lua-eco: update to 2.2.0Jianhui Zhao2023-03-10
| | | | | | | | Signed-off-by: Jianhui Zhao <zhaojh329@gmail.com>
* | Merge pull request #20594 from stintel/miniupnpdStijn Tintel2023-03-10
|\ \ | | | | | | miniupnpd: bump to 2.3.3
| * | miniupnpd: bump to 2.3.3Stijn Tintel2023-03-10
|/ / | | | | | | | | Fixes: #19637 Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* | openblas: don't allow ccache useAlexandru Ardelean2023-03-09
| | | | | | | | | | | | Fixes https://github.com/openwrt/packages/issues/20596 Signed-off-by: Alexandru Ardelean <alex@shruggie.ro>
* | udp-broadcast-relay-redux-openwrt: add cgroupsns to jailBackSlasher2023-03-09
| | | | | | | | | | | | | | | | | | | | | | | | | | Added `cgroupsns` to jail, otherwise you get this failure: ``` Mon Mar 6 14:46:05 2023 user.err : jail: Not using namespaces, capabilities or seccomp !!! ``` Error is here, seems to indicate that we're running a jail without using any capability. https://lxr.openwrt.org/source/procd/jail/jail.c#L2847 Decided to use minimal effort approach Signed-off-by: BackSlasher <nitz.raz@gmail.com>
* | cni-protocol: new packageOskari Rauta2023-03-09
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | simple protocol support script for netifd. netifd protocol support for cni networks makes defining network for podman and other similar systems using cni networking much easier and simpler. with cni protocol support, on a cni network, where firewall and portmapper is disabled, you may control firewalling with openwrt's standard firewall configuration. for example, create a container that hosts web content on port 80 with static ip on your cni network, if your network is 10.88.0.0/16, use for eg. 10.88.0.101 as your containers static ip address. Create a zone, cni to your firewall and add your interface to it. Now you can easily set up redirectiong to 10.88.0.101:80 to expose it's port 80 to wan for serving your website. Protocol has only one setting: device, on podman this often is cni-podman0. This protocol may also be used on other equillavents, such as netavark (cni replacement in podman), where device as default is podman0. Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
* | pdns-recursor: update to 4.8.3Peter van Dijk2023-03-09
| | | | | | | | Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
* | Merge pull request #20584 from mpeleshenko/samba4-4.17.5Tianling Shen2023-03-09
|\ \ | |/ |/| samba4: update to 4.17.5
| * samba4: update to 4.17.5Michael Peleshenko2023-03-08
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * update to 4.17.5 * changelog: https://www.samba.org/samba/history/samba-4.17.5 * refresh patch * CVE-2022-42898: Samba's Kerberos libraries and AD DC failed to guard against integer overflows when parsing a PAC on a 32-bit system, which allowed an attacker with a forged PAC to corrupt the heap. https://www.samba.org/samba/security/CVE-2022-42898.html * CVE-2022-37966: This is the Samba CVE for the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022. A Samba Active Directory DC will issue weak rc4-hmac session keys for use between modern clients and servers despite all modern Kerberos implementations supporting the aes256-cts-hmac-sha1-96 cipher. On Samba Active Directory DCs and members 'kerberos encryption types = legacy' would force rc4-hmac as a client even if the server supports aes128-cts-hmac-sha1-96 and/or aes256-cts-hmac-sha1-96. https://www.samba.org/samba/security/CVE-2022-37966.html * CVE-2022-37967: This is the Samba CVE for the Windows Kerberos Elevation of Privilege Vulnerability disclosed by Microsoft on Nov 8 2022. A service account with the special constrained delegation permission could forge a more powerful ticket than the one it was presented with. https://www.samba.org/samba/security/CVE-2022-37967.html * CVE-2022-38023: The "RC4" protection of the NetLogon Secure channel uses the same algorithms as rc4-hmac cryptography in Kerberos, and so must also be assumed to be weak. https://www.samba.org/samba/security/CVE-2022-38023.html * BUG 15210: synthetic_pathref AFP_AfpInfo failed errors. This resolves errors logged during macOS TimeMachine backups. https://bugzilla.samba.org/show_bug.cgi?id=15210 Signed-off-by: Michael Peleshenko <mpeleshenko@gmail.com>
* | modemmanager: bump to 1.20.6Kuan-Yi Li2023-03-09
| | | | | | | | Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
* | libqmi: bump to 1.32.4Kuan-Yi Li2023-03-09
| | | | | | | | Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
* | libmbim: bump to 1.28.4Kuan-Yi Li2023-03-09
| | | | | | | | Signed-off-by: Kuan-Yi Li <kyli@abysm.org>
* | frp: update to 0.48.0Van Waholtz2023-03-09
| | | | | | | | | | | | Changelog: https://github.com/fatedier/frp/releases/tag/v0.48.0 Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
* | frp: update to 0.47.0Van Waholtz2023-03-09
|/ | | | | | A restart is only required if `$conf_file` has been modified. Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
* lua-eco: update to 2.1.0Jianhui Zhao2023-03-09
| | | | | | | | * updated description * switched default SSL engine to mbedtls * added new network module Signed-off-by: Jianhui Zhao <zhaojh329@gmail.com>
* tmate-ssh-server: fix build against msgpack-c 6.0Tianling Shen2023-03-08
| | | | | | | This patch is taken from https://git.alpinelinux.org/aports/commit/?id=f923597f4bdea424dc28b1d026269df060596fac Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
* tmate: fix build against msgpack-c 6.0Tianling Shen2023-03-08
| | | | | | | This patch is taken from https://git.alpinelinux.org/aports/commit/?id=f923597f4bdea424dc28b1d026269df060596fac Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
* msgpack-c: Update to 6.0.0Tianling Shen2023-03-08
| | | | | | Removed 010-no-gtest.patch as upstream no longer detects it. Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
* banip: release 0.8.2-1Dirk Brenken2023-03-08
| | | | | | | | | * major performance improvements: clean-up/optimize all nft calls * add a new "ban_reportelements" option, to disable the (time consuming) Set element count in the report (enabled by default) * update the readme Signed-off-by: Dirk Brenken <dev@brenken.org>
* yt-dlp: update to 2023.3.4Michal Vasilek2023-03-08
| | | | Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
* adguardhome: bump to 0.107.25Dobroslaw Kijowski2023-03-08
| | | | | | | * Full changelog available at: * https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.25 Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
* adguardhome: enable legacy openssl provider for nodejsDobroslaw Kijowski2023-03-08
| | | | | | | | | | | | | | | | | | | Currently compilation fails because of: ``` opensslErrorStack: [ 'error:03000086:digital envelope routines::initialization error' ], library: 'digital envelope routines', reason: 'unsupported', code: 'ERR_OSSL_EVP_UNSUPPORTED' ``` What's interesting package gets built but when trying to access UI there's `404: page not found` error. It has been reported in multiple places: * https://github.com/AdguardTeam/AdGuardHome/issues/5559 * https://github.com/AdguardTeam/AdGuardHome/issues/4595 Signed-off-by: Dobroslaw Kijowski <dobo90@gmail.com>
* Merge pull request #20608 from micmac1/tiff-no-deflateJiri Slachta2023-03-08
|\ | | | | tiff: force libdeflate support to off
| * tiff: force libdeflate support to offSebastian Kemper2023-03-07
| | | | | | | | | | | | | | | | | | | | | | | | | | Commit 81d2b72 added a package providing libdeflate. Tiff by default links to it, causing a build error. Package libtiff is missing dependencies for the following libraries: libdeflate.so.0 This commit forces libdeflate use off to avoid this. No revision bump is done because the package is currently not compiling anyway. Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
* | v2raya: switch to use nftablesTianling Shen2023-03-08
| | | | | | | | | | | | | | | | | | | | | | | | Backport a pending PR to add nftables support. Upstream PR: https://github.com/v2rayA/v2rayA/pull/805 As nftables merged ipv4/ipv6 support into a single command, so simply enable ipv6 support by default. While at it, backport a upstreamed fix for simple-obfs plugin. Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
* | perl-ack: Update to 3.7.0Tianling Shen2023-03-08
|/ | | | | Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org> (cherry picked from commit 26b92db22c9a051447ee445acaa11a795fb35a4e)
* netbird: update to 0.14.2Oskari Rauta2023-03-07
| | | | | | | Update from 0.12.0 -> 0.14.2 Release notes: https://github.com/netbirdio/netbird/releases Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
* conmon: update to 2.1.7Oskari Rauta2023-03-07
| | | | | | | - Fix leaking symbolic links in the opt_socket_path directory - cgroup: Stumble on if we can't set up oom handling Signed-off-by: Oskari Rauta <oskari.rauta@gmail.com>
* coremark: bump to 2023-01-25Aleksander Jan Bajkowski2023-03-07
| | | | Signed-off-by: Aleksander Jan Bajkowski <olek2@wp.pl>
* transmission: update to version 4.0.1Daniel Golle2023-03-07
| | | | | | | | | | | | This is a major release, both in numbering and in effort! It's been in active development for over a year and has a huge list of changes -- over a thousand commits -- since Transmission 3.00. For more information about the release see https://github.com/transmission/transmission/releases/tag/4.0.0 https://github.com/transmission/transmission/releases/tag/4.0.1 Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* libutp: add packageDaniel Golle2023-03-07
| | | | | | Add Transmission version of the uTorrent Transport Protocol library. Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* libdht: add packageDaniel Golle2023-03-07
| | | | | | Add Kademlia Distributed Hash Table (DHT) library. Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* libdeflate: add packageDaniel Golle2023-03-07
| | | | | | | Add package for libdeflate which is a library for fast, whole-buffer DEFLATE-based compression and decompression. Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* libb64: add packageDaniel Golle2023-03-07
| | | | | | Add generic base64 encode/decode (static) library. Signed-off-by: Daniel Golle <daniel@makrotopia.org>
* banip: update 0.8.1-3Dirk Brenken2023-03-06
| | | | | | | | | * finalized the LuCI frontend preparation (this is the minmal version to use the forthcoming LuCI frontend) * added a Set survey, to list all elements of a certain set * changed the default logterm for asterisk * update the readme Signed-off-by: Dirk Brenken <dev@brenken.org>
* sing-box: update to 1.1.6Van Waholtz2023-03-06
| | | | Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
* sing-box: add necessary dependencies and cleanup MakefileVan Waholtz2023-03-06
| | | | | | | 1. Add `kmod-inet-diag` as a dependency since it is needed for https://sing-box.sagernet.org/configuration/dns/rule/#process_name 2. Remove redundant `default n` (https://github.com/openwrt/openwrt/commit/8bc72ea7be3976711dacc09f0fdab061d6e5152a) Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
* haproxy: update to v2.6.9Christian Lachner2023-03-05
| | | | | | | | - Update haproxy download URL and hash - This release fixes a critial flaw known as CVE-2023-25725. See: http://git.haproxy.org/?p=haproxy-2.6.git;a=commit;h=73be199c4f5f1ed468161a4c5e10ca77cd5989d8 Signed-off-by: Christian Lachner <gladiac@gmail.com>