aboutsummaryrefslogtreecommitdiff
path: root/net/miniupnpd/files
Commit message (Collapse)AuthorAge
* miniupnpd: remove uci-defaults and fw4-include files for nftables variantStan Grishin2023-08-25
| | | | | | | | | | * remove firewall4.include file as it is not needed and procuces a firewall error on service miniupnpd restart * remove the uci-defaults file as its sole purpose was to install the firewall include file * modify the Makefile to reflect the deleted files Signed-off-by: Stan Grishin <stangri@melmac.ca>
* miniupnpd: rework firewall4 integrationJo-Philipp Wich2022-09-06
| | | | | | | | | | | | | | | | | | | | | | - Bump to the latest Git version in order to increase the package version for simpler opkg upgrade of the broken version - (Re-)Introduce PKG_RELEASE into the package, omitting it may lead to opkg segmentation faults under certain circumstances - Utilize automatic include hooks to drop the isolated miniupnpd table in favor to chains within the main inet fw4 table, otherwise PCP is unreliable as the upnp table might accept traffic which is later rejected by fw4 - Install a fw4 script hook to restart miniupnpd on fw4 restarts and reloads in order to repopulate the upnp chains with forward rules - Register the used miniupnpd configuration file and the firewall uci configuration as change sources, otherwise `/etc/init.d/miniupnpd reload` has no effect if the firewall or upnpd config was changed Signed-off-by: Jo-Philipp Wich <jo@mein.io>
* miniupnpd: update and fix nftables variantTiago Gaspar2022-08-25
| | | | | | | | | | | | | | | | | | | | | Update the package to a commit that fixes an issue with removing PCP mappings from nftables. This also allows us to fix the nftables miniupnpd implementation on openwrt. In this new implementation, a table is created at the start of miniupnpd and it is dedicated to miniupnpd with a priority above the firewall4 table. This allows miniupnpd to go ahead of the drop rules of firewall4 and forward traffic as needed. There was the possibility of adding a chain inside the firewall4 table, but this would raise an issue where if firewall4 was reloaded the port forwardings would be lost and miniupnpd could be out of sync. When miniupnpd is stopped the table is deleted, taking the port forwardings with it. Some of this commit is based of msylgj's work, mainly the logic of the init/hotplug scripts and the makefile build parameters. Signed-off-by: ZiMing Mo <msylgj@immortalwrt.org> Signed-off-by: Tiago Gaspar <tiagogaspar8@gmail.com>
* Revert "miniupnpd: bump to latest git source"Josef Schlehofer2022-04-22
| | | | | | | | | | | This was reverted because the commit does more things than just "bump to latest git source". Also, it was not properly reviewed/tested. See: https://github.com/openwrt/packages/pull/18133#issuecomment-1106346788 This reverts commit b3b911e99238282a768bce962bc2a271f84229ac. Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
* miniupnpd: bump to latest git sourceZiMing Mo2022-04-14
| | | | Signed-off-by: ZiMing Mo <msylgj@immortalwrt.org>
* miniupnpd: create iptables and nftables variantStijn Tintel2022-01-05
| | | | | | | | | | | The next OpenWrt stable release aims to use firewall4 by default. As this uses nftables as backend, miniupnpd will no longer work. Create an iptables and nftables variant of the miniupnpd package so that miniupnpd can be used with either firewall variant. See #16818 for more info. Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
* Revert "net/miniupnpd: ext_ip_reserved_ignore support"Josef Schlehofer2021-07-19
| | | | | | | | | | | | | | | This patch is causing several issues [1], which then were reported to upstream [2] and it was not accepted by upstream [3]. This results that nobody maintain this custom patch and it is not useful as it is changing addr_is_reserved behavior. [1] https://github.com/openwrt/packages/issues/15258 [2] https://github.com/miniupnp/miniupnp/issues/542 [3] https://github.com/miniupnp/miniupnp/pull/511 This reverts commit b76aa9919489f49b472a8f939f6d46ca33d05f64. Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
* miniupnpd: disable ext_ip_reserved_ignore by default; fix grammarStan Grishin2021-06-02
| | | | Signed-off-by: Stan Grishin <stangri@melmac.net>
* miniupnpd: add patience to firewall includeKevin Darbyshire-Bryant2021-03-20
| | | | | | | | | | Occasionally, mostly at startup, miniupnpd reports "Another app is currently holding the xtables lock. Perhaps you want to use the -w option?" Take iptables' advice and wait up to 1 second before giving up. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* miniupnpd: Don't override ipv6_listening_ipJitao Lu2020-12-07
| | | | | Fixes: https://github.com/openwrt/packages/issues/14145 Signed-off-by: Jitao Lu <dianlujitao@gmail.com>
* miniupnpd: Pass ipv6 addr to ipv6_listening_ipJitao Lu2020-12-03
| | | | | | | | | Unlike ipv4, this option is supposed to be an IP address, otherwise, an error occurs on startup: can't parse "br-lan" as valid IPv6 listening address Signed-off-by: Jitao Lu <dianlujitao@gmail.com>
* net/miniupnpd: ext_ip_reserved_ignore supportChen Minqiang2020-11-26
| | | | | | | | | This add an option to ignore ext_ip reserved Enable this option in config by default. Fixes: #13773 Signed-off-by: Chen Minqiang <ptpt52@gmail.com>
* miniupnpd: Added chain rule to filter table so udp stun incoming connections ↵Marco Martins2020-11-25
| | | | | | rules works Signed-off-by: Marco Martins <marcomartins86@gmail.com>
* net/miniupnpd: check by /etc/init.d/miniupnpd runningChen Minqiang2020-08-08
| | | | Signed-off-by: Chen Minqiang <ptpt52@gmail.com>
* miniupnpd: default to IGDv1Rosen Penev2020-07-08
| | | | | | | | It seems even modern stuff doesn't support v2 correctly. The miniupnp suite does but other stacks seem to lack support. Default to v1 to avoid the headache. Signed-off-by: Rosen Penev <rosenp@gmail.com>
* miniupnpd: add miniupnpd ipv6_disable option, #11971 closeAlexey Kuznetsov2020-07-02
| | | | Signed-off-by: Alexey Kuznetsov <axet@me.com>
* miniupnpd: suppress grep and uci errorsDavid Ehrmann2020-06-20
| | | | | | | | | | | | | | | | If miniupnpd is installed but disabled or not running, the hotplug script will query uci for keys that don't exist and grep a temporary config file that doesn't exist, resulting in the following errors: uci: Entry not found grep: /var/etc/miniupnd.conf: No such file or directory These would arise when an interface is brought up or down, and are more confusing than helpful, especially when miniupnpd is disabled. Suppress these errors. Signed-off-by: David Ehrmann <ehrmann@gmail.com>
* miniupnpd: improve hotplug & interface handlingKevin Darbyshire-Bryant2020-05-25
| | | | | | | | | | | | | | | | | | The existing interface selection/detection code was incomprehensible at worst and convoluted at best. The uci config file suggested it understood an external ipv6 interface but in reality the init script took no notice. Re-work it so it is at least comprehendible and takes notice of ipv6 interface details if specified. Update the hotplug script to use the same interface selection/detection code as the init script and take note of ipv6 interface selection, only restarting miniupnpd on interface up events and only if that interface isn't already known (for that ip class) by miniupnpd. For me this has solved numerous 'flaky' startup problems, especially with regard to ipv6. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* miniupnpd: make hotplug work againKevin Darbyshire-Bryant2020-05-10
| | | | | | | | | | | | | hotplug scripts are sourced not exec'd so #!/bin/sh /etc/rc.common doesn't pull in the functions defined in /etc/rc.common thus since 'enabled' isn't defined the following sequence always fails: enabled miniupnpd || exit 0 Unfortunately sourcing /etc/rc.common doesn't appear to work so come up with some alternatives. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* miniupnpd: fix sh syntax errorKevin Darbyshire-Bryant2020-03-30
| | | | | | | Add "use_stun" default to prevent sh: out of range error introduced by c61614a84 Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* miniupnpd: convert to procdRosen Penev2020-02-13
| | | | | | Massive cleanup of the shell script. Many issues were fixed. Signed-off-by: Rosen Penev <rosenp@gmail.com>
* miniupnpd: change leasefile locationKevin Darbyshire-Bryant2018-05-09
| | | | | | | Move default leasefile location from /var to /var/run. Also rename from upnp.leases to miniupnpd.leases Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
* miniupnpd: Import release 20180422 to repoKevin Darbyshire-Bryant2018-05-04
Import miniupnpd from routing repo and bump to 20180422. Drop 102-ipv6-ext-port.patch as this looks upstreamed in the pinhole code to me. Consolidate all other patches & update with a view to sending upstream. Add support for runtime IGDv1 mode switch (default to IGDv2) (not extensively) Tested-on: ar71xx Archer C7 v2 in IGDv1 compatibility mode. A variety of devices/applications appear to be able to create mappings. Have an attempt at resolving https://github.com/openwrt-routing/packages/issues/286 TL;DR miniupnpd rules get processed before fw3 rules and thus can override existing/intended redirects. Ideally the miniupnpd rules would be last in the relevant chains, unfortunately fw3 can sometimes use the last rule as a REJECT. Put miniupnpd rules as penultimate. Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>