aboutsummaryrefslogtreecommitdiff
path: root/net/miniupnpd/files
Commit message (Collapse)AuthorAge
* Revert "miniupnpd: bump to latest git source"Josef Schlehofer2022-04-22
| | | | | | | | | | | This was reverted because the commit does more things than just "bump to latest git source". Also, it was not properly reviewed/tested. See: https://github.com/openwrt/packages/pull/18133#issuecomment-1106346788 This reverts commit b3b911e99238282a768bce962bc2a271f84229ac. Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
* miniupnpd: bump to latest git sourceZiMing Mo2022-04-14
| | | | Signed-off-by: ZiMing Mo <msylgj@immortalwrt.org>
* miniupnpd: create iptables and nftables variantStijn Tintel2022-01-05
| | | | | | | | | | | The next OpenWrt stable release aims to use firewall4 by default. As this uses nftables as backend, miniupnpd will no longer work. Create an iptables and nftables variant of the miniupnpd package so that miniupnpd can be used with either firewall variant. See #16818 for more info. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* Revert "net/miniupnpd: ext_ip_reserved_ignore support"Josef Schlehofer2021-07-19
| | | | | | | | | | | | | | | This patch is causing several issues [1], which then were reported to upstream [2] and it was not accepted by upstream [3]. This results that nobody maintain this custom patch and it is not useful as it is changing addr_is_reserved behavior. [1] https://github.com/openwrt/packages/issues/15258 [2] https://github.com/miniupnp/miniupnp/issues/542 [3] https://github.com/miniupnp/miniupnp/pull/511 This reverts commit b76aa9919489f49b472a8f939f6d46ca33d05f64. Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
* miniupnpd: disable ext_ip_reserved_ignore by default; fix grammarStan Grishin2021-06-02
| | | | Signed-off-by: Stan Grishin <stangri@melmac.net>
* miniupnpd: add patience to firewall includeKevin Darbyshire-Bryant2021-03-20
| | | | | | | | | | Occasionally, mostly at startup, miniupnpd reports "Another app is currently holding the xtables lock. Perhaps you want to use the -w option?" Take iptables' advice and wait up to 1 second before giving up. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* miniupnpd: Don't override ipv6_listening_ipJitao Lu2020-12-07
| | | | | Fixes: https://github.com/openwrt/packages/issues/14145 Signed-off-by: Jitao Lu <dianlujitao@gmail.com>
* miniupnpd: Pass ipv6 addr to ipv6_listening_ipJitao Lu2020-12-03
| | | | | | | | | Unlike ipv4, this option is supposed to be an IP address, otherwise, an error occurs on startup: can't parse "br-lan" as valid IPv6 listening address Signed-off-by: Jitao Lu <dianlujitao@gmail.com>
* net/miniupnpd: ext_ip_reserved_ignore supportChen Minqiang2020-11-26
| | | | | | | | | This add an option to ignore ext_ip reserved Enable this option in config by default. Fixes: #13773 Signed-off-by: Chen Minqiang <ptpt52@gmail.com>
* miniupnpd: Added chain rule to filter table so udp stun incoming connections ↵Marco Martins2020-11-25
| | | | | | rules works Signed-off-by: Marco Martins <marcomartins86@gmail.com>
* net/miniupnpd: check by /etc/init.d/miniupnpd runningChen Minqiang2020-08-08
| | | | Signed-off-by: Chen Minqiang <ptpt52@gmail.com>
* miniupnpd: default to IGDv1Rosen Penev2020-07-08
| | | | | | | | It seems even modern stuff doesn't support v2 correctly. The miniupnp suite does but other stacks seem to lack support. Default to v1 to avoid the headache. Signed-off-by: Rosen Penev <rosenp@gmail.com>
* miniupnpd: add miniupnpd ipv6_disable option, #11971 closeAlexey Kuznetsov2020-07-02
| | | | Signed-off-by: Alexey Kuznetsov <axet@me.com>
* miniupnpd: suppress grep and uci errorsDavid Ehrmann2020-06-20
| | | | | | | | | | | | | | | | If miniupnpd is installed but disabled or not running, the hotplug script will query uci for keys that don't exist and grep a temporary config file that doesn't exist, resulting in the following errors: uci: Entry not found grep: /var/etc/miniupnd.conf: No such file or directory These would arise when an interface is brought up or down, and are more confusing than helpful, especially when miniupnpd is disabled. Suppress these errors. Signed-off-by: David Ehrmann <ehrmann@gmail.com>
* miniupnpd: improve hotplug & interface handlingKevin Darbyshire-Bryant2020-05-25
| | | | | | | | | | | | | | | | | | The existing interface selection/detection code was incomprehensible at worst and convoluted at best. The uci config file suggested it understood an external ipv6 interface but in reality the init script took no notice. Re-work it so it is at least comprehendible and takes notice of ipv6 interface details if specified. Update the hotplug script to use the same interface selection/detection code as the init script and take note of ipv6 interface selection, only restarting miniupnpd on interface up events and only if that interface isn't already known (for that ip class) by miniupnpd. For me this has solved numerous 'flaky' startup problems, especially with regard to ipv6. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* miniupnpd: make hotplug work againKevin Darbyshire-Bryant2020-05-10
| | | | | | | | | | | | | hotplug scripts are sourced not exec'd so #!/bin/sh /etc/rc.common doesn't pull in the functions defined in /etc/rc.common thus since 'enabled' isn't defined the following sequence always fails: enabled miniupnpd || exit 0 Unfortunately sourcing /etc/rc.common doesn't appear to work so come up with some alternatives. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* miniupnpd: fix sh syntax errorKevin Darbyshire-Bryant2020-03-30
| | | | | | | Add "use_stun" default to prevent sh: out of range error introduced by c61614a84 Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* miniupnpd: convert to procdRosen Penev2020-02-13
| | | | | | Massive cleanup of the shell script. Many issues were fixed. Signed-off-by: Rosen Penev <rosenp@gmail.com>
* miniupnpd: change leasefile locationKevin Darbyshire-Bryant2018-05-09
| | | | | | | Move default leasefile location from /var to /var/run. Also rename from upnp.leases to miniupnpd.leases Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* miniupnpd: Import release 20180422 to repoKevin Darbyshire-Bryant2018-05-04
Import miniupnpd from routing repo and bump to 20180422. Drop 102-ipv6-ext-port.patch as this looks upstreamed in the pinhole code to me. Consolidate all other patches & update with a view to sending upstream. Add support for runtime IGDv1 mode switch (default to IGDv2) (not extensively) Tested-on: ar71xx Archer C7 v2 in IGDv1 compatibility mode. A variety of devices/applications appear to be able to create mappings. Have an attempt at resolving https://github.com/openwrt-routing/packages/issues/286 TL;DR miniupnpd rules get processed before fw3 rules and thus can override existing/intended redirects. Ideally the miniupnpd rules would be last in the relevant chains, unfortunately fw3 can sometimes use the last rule as a REJECT. Put miniupnpd rules as penultimate. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>