feed/packages.git
6 years agoMerge pull request #5012 from TDT-AG/20171025-luci-app-mwan3-fix-iface_state
champtar [Mon, 11 Dec 2017 19:43:46 +0000 (11:43 -0800)]
Merge pull request #5012 from TDT-AG/20171025-luci-app-mwan3-fix-iface_state

net/mwan3-luci: fix iface_state on on status page for 17.01

6 years agonet/mwan3-luci: fix iface_state on on status page 5012/head
Florian Eckert [Wed, 25 Oct 2017 11:46:15 +0000 (13:46 +0200)]
net/mwan3-luci: fix iface_state on on status page

Since commit 4739584c2434fda6c4f14b0ef3d38fa055352c0e the status of the
interface is not reported correctly anymore. To fix this issue do not test
if the routing table is presented use instead the "/var/run/iface_state/[iface]"
to get the interface state because the routing table will not get deleted
anymore if the interface is offline.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
6 years agoMerge pull request #5228 from commodo/python-2.7.14-17.01
Jo-Philipp Wich [Tue, 5 Dec 2017 13:32:57 +0000 (14:32 +0100)]
Merge pull request #5228 from commodo/python-2.7.14-17.01

python: update to version 2.7.14 for branch 17.01

6 years agopython: update to version 2.7.14 for branch 17.01 5228/head
Alexandru Ardelean [Tue, 5 Dec 2017 13:15:09 +0000 (15:15 +0200)]
python: update to version 2.7.14 for branch 17.01

Bump version and overwrite patches from master,
since those were refreshed (at some point).

I got an email notification about some CVEs
for branch 17.01, so I decided to update Python.

Technically, one seems to be for SolidWorks
from what I can tell, but upgrading should be easy.

```
Hello Alexandru Ardelean,

The package python is vulnerable to the following CVEs:
CVE-2014-4616
  https://nvd.nist.gov/vuln/detail/CVE-2014-4616

CVE-2017-100015
  https://nvd.nist.gov/vuln/detail/CVE-2017-100015

Please consider updating or patching the package.
```

Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
7 years agoattendedsysupgrade-common: add package
Daniel Golle [Mon, 20 Nov 2017 16:49:34 +0000 (17:49 +0100)]
attendedsysupgrade-common: add package

This package provides the UCI config shared by both, the CLI and Web
clients used for attended-sysupgrade.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
7 years agotinc: version bump 1.0.33
Saverio Proto [Sun, 5 Nov 2017 03:00:10 +0000 (04:00 +0100)]
tinc: version bump 1.0.33

Signed-off-by: Saverio Proto <saverio.proto@switch.ch>
7 years agognutls: updated to 3.5.16
Nikos Mavrogiannopoulos [Sat, 21 Oct 2017 18:24:35 +0000 (20:24 +0200)]
gnutls: updated to 3.5.16

Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
7 years agojool: fix PKG_BUILD_DIR to avoid kernel ABI mismatch
Matthias Schiffer [Mon, 23 Oct 2017 02:52:49 +0000 (04:52 +0200)]
jool: fix PKG_BUILD_DIR to avoid kernel ABI mismatch

As jool builds a kernel module, a PKG_BUILD_DIR under KERNEL_BUILD_DIR must
be used to avoid reusing build artifacts when switching to a different
target of the same architecture. Otherwise, kernel ABI mismatches may
result, leading to an unusuable module, or build failures like the
following:

    Package kmod-jool is missing dependencies for the following libraries:
    crypto_hash.ko

Signed-off-by: Matthias Schiffer <mschiffer@universe-factory.net>
7 years agomonit: update to 5.24, use https download url
Etienne Champetier [Mon, 23 Oct 2017 00:49:50 +0000 (17:49 -0700)]
monit: update to 5.24, use https download url

Signed-off-by: Etienne Champetier <champetier.etienne@gmail.com>
7 years agomonit: update to 5.23
Etienne Champetier [Sun, 9 Jul 2017 03:13:40 +0000 (20:13 -0700)]
monit: update to 5.23

Signed-off-by: Etienne Champetier <champetier.etienne@gmail.com>
7 years agomonit: update to 5.20, use PKG_HASH
Etienne CHAMPETIER [Mon, 23 Jan 2017 03:48:23 +0000 (19:48 -0800)]
monit: update to 5.20, use PKG_HASH

this adds zlib as dependency

Signed-off-by: Etienne CHAMPETIER <champetier.etienne@gmail.com>
7 years agosqlite3: update to 3.19.3
Etienne Champetier [Sun, 9 Jul 2017 03:13:27 +0000 (20:13 -0700)]
sqlite3: update to 3.19.3

fix possible database corruption
https://www.sqlite.org/releaselog/3_19_3.html

Signed-off-by: Etienne Champetier <champetier.etienne@gmail.com>
7 years agolibs/sqlite3: Update to 3190200
Daniel Engberg [Wed, 31 May 2017 15:11:02 +0000 (17:11 +0200)]
libs/sqlite3: Update to 3190200

Update sqlite to 3190200
Remove obsolete tarball hash variable

Signed-off-by: Daniel Engberg <daniel.engberg.lists@pyret.net>
7 years agosqlite: update to 3.17.0
Ian Leonard [Sun, 19 Feb 2017 05:30:28 +0000 (21:30 -0800)]
sqlite: update to 3.17.0

Signed-off-by: Ian Leonard <antonlacon@gmail.com>
7 years agolibwebsockets: add PROVIDES to both variants
Karl Palsson [Wed, 25 Oct 2017 11:15:12 +0000 (11:15 +0000)]
libwebsockets: add PROVIDES to both variants

Fixed recently in master as part of upgrading, but the same issue
applies to 17.01.  The two variant packages both now PROVIDE
libwebsockets, the virtual package.

Signed-off-by: Karl Palsson <karlp@etactica.com>
7 years agoicu: fix CVE-2017-14952 Double-Free Vulnerability [lede-17.01]
Hirokazu MORIKAWA [Tue, 24 Oct 2017 06:36:29 +0000 (15:36 +0900)]
icu: fix CVE-2017-14952 Double-Free Vulnerability [lede-17.01]

http://www.sourcebrella.com/blog/double-free-vulnerability-international-components-unicode-icu/

https://security-tracker.debian.org/tracker/CVE-2017-14952

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
7 years agoRevert "Provides a way to acquire the list of installed packages without the"
Jo-Philipp Wich [Fri, 20 Oct 2017 13:08:54 +0000 (15:08 +0200)]
Revert "Provides a way to acquire the list of installed packages without the"

This reverts commit 983819f3f01ff27ba72bb0fb7ce6f1bea95bd8d1.

7 years agoRevert "add ubus call to perform a sysupgrade and acl file for the attended"
Jo-Philipp Wich [Fri, 20 Oct 2017 13:08:54 +0000 (15:08 +0200)]
Revert "add ubus call to perform a sysupgrade and acl file for the attended"

This reverts commit f6c287f1ee9ce4817740d537aca024a135b6749c.

7 years agoRevert "due to renaming .rpcd was forgotten in the Makefile"
Jo-Philipp Wich [Fri, 20 Oct 2017 13:08:54 +0000 (15:08 +0200)]
Revert "due to renaming .rpcd was forgotten in the Makefile"

This reverts commit 04cbc70c52fea176b524a5959a24a75701a21a27.

7 years agodue to renaming .rpcd was forgotten in the Makefile
Paul Spooren [Thu, 27 Jul 2017 17:14:24 +0000 (19:14 +0200)]
due to renaming .rpcd was forgotten in the Makefile

Signed-off-by: Paul Spooren <paul@spooren.de>
(cherry picked from commit c98e9f3b18ed0cdc67f5e92efc2210d9d9d160f8)
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
7 years agoadd ubus call to perform a sysupgrade and acl file for the attended
Paul Spooren [Tue, 18 Jul 2017 22:47:40 +0000 (00:47 +0200)]
add ubus call to perform a sysupgrade and acl file for the attended
sysupgrade use case as well uci defaults.
Package is a part of the GSoC 17 project implementing easy
sysupgrade functionality.

Signed-off-by: Paul Spooren <paul@spooren.de>
(cherry picked from commit f9a6c81c116e462e4abfd3973385f426eba70f7b)
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
7 years agoProvides a way to acquire the list of installed packages without the
Paul Spooren [Tue, 18 Jul 2017 22:47:40 +0000 (00:47 +0200)]
Provides a way to acquire the list of installed packages without the
need to have opkg available. It is being used for the GSoC 17 project
implementing easy sysupgrade functionality.

Signed-off-by: Paul Spooren <paul@spooren.de>
(cherry picked from commit 0d2e674aa1c17163a0011090123321ea91bc13e9)
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
7 years agowireguard: drop package
Stijn Tintel [Mon, 16 Oct 2017 11:08:26 +0000 (14:08 +0300)]
wireguard: drop package

WireGuard was added to LEDE core. See discussion at
https://github.com/lede-project/source/pull/1409

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
7 years agoMerge pull request #4914 from zx2c4/lede-17.01
Hannu Nyman [Tue, 10 Oct 2017 14:54:20 +0000 (17:54 +0300)]
Merge pull request #4914 from zx2c4/lede-17.01

wireguard: bump to release 0.0.20171005 for 17.01

7 years agoMerge pull request #4916 from StevenHessing/noddos-lede-17.01
champtar [Sun, 8 Oct 2017 15:45:34 +0000 (08:45 -0700)]
Merge pull request #4916 from StevenHessing/noddos-lede-17.01

noddos: new backport of noddos from master branch

7 years agonoddos: new backport of noddos from master branch 4916/head
Steven Hessing [Sun, 8 Oct 2017 04:24:43 +0000 (21:24 -0700)]
noddos: new backport of noddos from master branch

Signed-off-by: Steven Hessing <steven.hessing@gmail.com>
7 years agowireguard: bump to release 0.0.20171005 for 17.01 4914/head
Jason A. Donenfeld [Sat, 7 Oct 2017 23:20:15 +0000 (01:20 +0200)]
wireguard: bump to release 0.0.20171005 for 17.01

WireGuard is well documented for being an experimental project, not
currently ready to be stabilized. As such, it's important for packagers
to always keep the project up to date in all contexts.

However, it is common for some projects, such as LEDE/OpenWrt to have
stable branches, which don't expect a lot of churn or modification.

The WireGuard that happened to ship with 17.01 is broken and crufty and
shouldn't be used at all. It's highly unlikely that there's anybody out
there even using it; it won't work with anything else.

So, this commit updates the 17.01 package to the latest upstream
version. Because the 17.01 stable branch can't be updated all the time,
it's important that this bump here in this commit is a stable one.

I believe 0.0.20171005 to be a fairly stable snapshot, which should be
suitable for the 17.01 branch. As stated earlier, the 0.0.20170115
currently in this branch is highly problematic. 0.0.20171005 offers
extremely important changes.

I'll continue to send package bumps for 17.01, but only for snapshot
releases that I think fix an important bug or provide a noted increase
in stability, or have similar goals to this commit.

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
7 years agoMerge pull request #4879 from nxhack/17_01-CVE-2017-1000250
Hauke Mehrtens [Tue, 3 Oct 2017 09:24:11 +0000 (11:24 +0200)]
Merge pull request #4879 from nxhack/17_01-CVE-2017-1000250

[lede-17.01] bluez: fix CVE-2017-1000250

7 years agobluez: fix CVE-2017-1000250 4879/head
Hirokazu MORIKAWA [Wed, 27 Sep 2017 05:09:45 +0000 (14:09 +0900)]
bluez: fix CVE-2017-1000250

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
bluez: fix CVE-2017-1000250

Signed-off-by: Hirokazu MORIKAWA <morikw2@gmail.com>
7 years agotor: update to version 0.2.9.12
Hauke Mehrtens [Wed, 20 Sep 2017 18:27:34 +0000 (20:27 +0200)]
tor: update to version 0.2.9.12

This fixes the TROVE-2017-008 (CVE-2017-0380) security problem.

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
7 years agotor: update to version 0.2.9.11
Hauke Mehrtens [Mon, 3 Jul 2017 21:00:29 +0000 (23:00 +0200)]
tor: update to version 0.2.9.11

This fixes CVE-2017-0376

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
7 years agoMerge pull request #4862 from luizluca/17.01/ruby-2.4.2
champtar [Sat, 23 Sep 2017 23:52:04 +0000 (16:52 -0700)]
Merge pull request #4862 from luizluca/17.01/ruby-2.4.2

[17.01] ruby: bump to 2.4.2 (backported from master)

7 years agoruby: bump to 2.4.2 4862/head
Luiz Angelo Daros de Luca [Mon, 18 Sep 2017 04:41:53 +0000 (01:41 -0300)]
ruby: bump to 2.4.2

This release contains some security fixes.

 CVE-2017-0898: Buffer underrun vulnerability in Kernel.sprintf
 CVE-2017-10784: Escape sequence injection vulnerability in the Basic authentication of WEBrick
 CVE-2017-14033: Buffer underrun vulnerability in OpenSSL ASN1 decode
 CVE-2017-14064: Heap exposure in generating JSON
 Multiple vulnerabilities in RubyGems
 Update bundled libyaml to version 0.1.7.

And many other bugfix.

Signed-off-by: Luiz Angelo Daros de Luca <luizluca@gmail.com>
(cherry picked from commit 699d9bef30df17272b834a6c6bd8d0c5f8bbf1c9)

7 years agocollectd: uptime plugin: apply fix from upstream
Hannu Nyman [Fri, 15 Sep 2017 16:10:37 +0000 (19:10 +0300)]
collectd: uptime plugin: apply fix from upstream

Backport from master the fix for uptime plugin.
Adjust it for 5.5.3

  Uptime plugin fails to adjust for system time changes after boot.
  As Openwrt/LEDE routers usually do not have a RTC, the system time
  gets adjusted with NTP possibly after collectd has already started.
  But collectd continues to use the initial time set by 'sysfixtime',
  which can lead to incorrect uptime calculations.

  Apply a proposed fix from upstream that uses /proc/uptime

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
7 years agoMerge pull request #4834 from marcin1j/pr/20170911-mwan3-backport-lede17.01-66406f9
Hannu Nyman [Fri, 15 Sep 2017 12:49:40 +0000 (15:49 +0300)]
Merge pull request #4834 from marcin1j/pr/20170911-mwan3-backport-lede17.01-66406f9

mwan3: fix interface-bound traffic when interface is offline

7 years agomwan3: fix interface-bound traffic when interface is offline 4834/head
Marcin Jurkowski [Sat, 2 Sep 2017 22:56:09 +0000 (00:56 +0200)]
mwan3: fix interface-bound traffic when interface is offline

This is a backport of 66406f9 to LEDE 17.01 and replaces hotfix 282e900.

Signed-off-by: Marcin Jurkowski <marcin1j@gmail.com>
7 years agohaproxy: update to 1.7.8 and pending patches
Thomas Heil [Wed, 16 Aug 2017 23:07:49 +0000 (01:07 +0200)]
haproxy: update to 1.7.8 and pending patches
 - fixes reload issue with hanging process

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
7 years agopcre: Added fix for CVE-2017-11164 by adding stack recursion limit
Thomas Heil [Sun, 3 Sep 2017 13:03:56 +0000 (15:03 +0200)]
pcre: Added fix for CVE-2017-11164 by adding stack recursion limit

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
7 years agopcre: upgrade to version 8.41
Thomas Heil [Wed, 16 Aug 2017 23:18:45 +0000 (01:18 +0200)]
pcre: upgrade to version 8.41
 - fixes security issues

Signed-off-by: Thomas Heil <heil@terminal-consulting.de>
7 years agostrongswan: fix typo
Stijn Tintel [Tue, 30 May 2017 17:25:04 +0000 (19:25 +0200)]
strongswan: fix typo

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit 4660504c610cc1f4d3d8ef77e7f7fbc6b2fc3d54)

7 years agostrongswan: add curve25519 plugin
Stijn Tintel [Tue, 30 May 2017 13:12:08 +0000 (15:12 +0200)]
strongswan: add curve25519 plugin

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit a268689adca731fe9c500ddf43ba41b5a502a593)

7 years agostrongswan: bump to 5.5.3
Stijn Tintel [Tue, 30 May 2017 12:32:01 +0000 (14:32 +0200)]
strongswan: bump to 5.5.3

Fixes CVE-2017-9022, CVE-2017-9023.

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit 960006be50203ebeaa136ec49229eb286e9de785)

7 years agostrongswan: bump to 5.5.2
Stijn Tintel [Thu, 20 Apr 2017 14:55:51 +0000 (16:55 +0200)]
strongswan: bump to 5.5.2

Signed-off-by: Stijn Tintel <stijn@linux-ipv6.be>
(cherry picked from commit 18b076ab9359d56ff1fc5b89bda378f2e4723e2d)

Conflicts:
net/strongswan/Makefile

7 years agoMerge pull request #4722 from TDT-GmbH/mwan3-fixes
champtar [Fri, 25 Aug 2017 21:10:45 +0000 (14:10 -0700)]
Merge pull request #4722 from TDT-GmbH/mwan3-fixes

net/mwan3: fixes for mwan3 (lede-17.01)

7 years agonet/mwan3: update Makefile 4722/head
Florian Eckert [Fri, 18 Aug 2017 06:54:13 +0000 (08:54 +0200)]
net/mwan3: update Makefile

- Update version
- Update maintainer to me

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
7 years agoMerge pull request #4741 from EricLuehrsen/unbound_1_6_5
Hannu Nyman [Tue, 22 Aug 2017 14:43:53 +0000 (17:43 +0300)]
Merge pull request #4741 from EricLuehrsen/unbound_1_6_5

[LEDE-17.01] unbound: update to 1.6.5

7 years agounbound: update to 1.6.5 4741/head
Eric Luehrsen [Tue, 22 Aug 2017 02:39:28 +0000 (22:39 -0400)]
unbound: update to 1.6.5

This fixes the root.key file if created when unbound is installed between sep11 and oct11 2017

Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
7 years agonet/mwan3: remove lock file on mwan3 stop
Florian Eckert [Thu, 17 Aug 2017 09:57:17 +0000 (11:57 +0200)]
net/mwan3: remove lock file on mwan3 stop

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 5e123852bc2fc6970e9502ca01a697b2fb394e23)

7 years agonet/mwan3: fix ping issue if last interface recovers from failure
Florian Eckert [Mon, 31 Jul 2017 10:04:18 +0000 (12:04 +0200)]
net/mwan3: fix ping issue if last interface recovers from failure

Even though error was fixed the interface checks still fails, if last_resort
was set to blackhole or unreachable.

To fix this issue do not remove failure interface from iptables change on
down event.

Reported-by: Colby Whitney <colby.whitney@luxul.com>
Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 6d99b602fd3425df7b9a3f8d583a2092bb5e1b94)

7 years agonet/mwan3: fix ipset generation in hotplug script with an lock
Florian Eckert [Wed, 2 Aug 2017 12:53:18 +0000 (14:53 +0200)]
net/mwan3: fix ipset generation in hotplug script with an lock

Fix critical section during hotplug events.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit a4fbc7eba670c2622c47ee9fe3d60d89909ea559)

7 years agonet/mwan3: add lock for mwan3 hotplug script
Florian Eckert [Thu, 22 Jun 2017 09:48:01 +0000 (11:48 +0200)]
net/mwan3: add lock for mwan3 hotplug script

If more then one interface get up/down at once mwan3 could be in a
undefined state, because more then one mwan3 hotplug script are running
and editing the iptables.

Lock the critical section should solve this issue.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit b6e9debc1b97f9e4be70fb51404831ed870d844a)

7 years agonet/mwan3: add connected network regardless of mwan3 interface enable state
Florian Eckert [Thu, 27 Apr 2017 07:22:27 +0000 (09:22 +0200)]
net/mwan3: add connected network regardless of mwan3 interface enable state

If netifd set an interface up/down which is not tracked by mwan3 the
connected network of that interface should regardless be added/removed to the
mwan3_connected ipset.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit f94975b71fc80912dd84feb845c2d86aeb82e7b1)

7 years agonet/mwan3: mwan3track interrupt sleep on signal (trap) event
Florian Eckert [Thu, 6 Apr 2017 14:36:46 +0000 (16:36 +0200)]
net/mwan3: mwan3track interrupt sleep on signal (trap) event

Sleep will be aborted if a signal is send to this process.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 7e80e83dfdbfd1408244399ef6af580fff218d4f)

7 years agonet/mwan3: fix hotplug on ACTION ifdown
Florian Eckert [Fri, 17 Mar 2017 10:06:24 +0000 (11:06 +0100)]
net/mwan3: fix hotplug on ACTION ifdown

On dynamic interface proto (dhcp/pppoe) the hotplug will not execude (exit 9)
because the gateway is already released. The check will now only be made
on a ifup ACTION event.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
(cherry picked from commit 28c8b664e471df9adbba5f2b8598b4e95ae36f4b)

7 years agomosquitto: properly use localhost instead of ipv4
Karl Palsson [Wed, 16 Aug 2017 14:54:08 +0000 (14:54 +0000)]
mosquitto: properly use localhost instead of ipv4

On some environments, connecting to localhost was resolving to ::1,
which didn't match the bind to the explicit 127.0.0.1.

Signed-off-by: Karl Palsson <karlp@etactica.com>
7 years agomosquitto: support more config options in UCI
Karl Palsson [Wed, 7 Jun 2017 16:44:36 +0000 (16:44 +0000)]
mosquitto: support more config options in UCI

Added many more UCI config options, particularly for bridge connections

The recently introduced username/password options for bridges are kept,
even though they have been deprecated upstream for a while.  In keeping
with this, while support is kept in UCI, the generated mosquitto.conf
file will always generate the "modern" remote_username/remote_password
options preferred by mosquitto instead.

Likewise for bridge clientid and remote_clientid options.

Signed-off-by: Karl Palsson <karlp@etactica.com>
7 years agoacme: Make sure postrm script doesn't fail
Toke Høiland-Jørgensen [Tue, 15 Aug 2017 23:10:55 +0000 (01:10 +0200)]
acme: Make sure postrm script doesn't fail

Fixes #4716.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
7 years agoacme: Fix for curl linked against mbed TLS. (#4254)
Daniel H [Wed, 12 Apr 2017 20:51:58 +0000 (22:51 +0200)]
acme: Fix for curl linked against mbed TLS. (#4254)

Use newest acme.sh release (2.6.8).
Remove dependency on ca-certificates and add dependency on ca-bundle.
Update environment variable.

Signed-off-by: Daniel Halmschlager <da@halms.at>
Backport to 17.01 for compatibility with 17.01.2, but keep the old envvar so
it'll hopefully keep working for users who haven't upgraded.

Closes #4579, closes #4699.

Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
7 years agonlbwmon: update to latest version
Jo-Philipp Wich [Wed, 2 Aug 2017 15:11:30 +0000 (17:11 +0200)]
nlbwmon: update to latest version

Changes since last update:

32fc092 build: remove extraneous _GNU_SOURCE defines
096aaa3 build: compile with -D_GNU_SOURCE
76487b5 transform to source-only repository

Fixes build with uClibc and eglibc toolchains.

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
7 years agonlbwmon: add package
Jo-Philipp Wich [Fri, 28 Jul 2017 13:30:06 +0000 (15:30 +0200)]
nlbwmon: add package

This commit introduces nlbwmon, the lightweight NetLink BandWidth Montor.

The nlbwmon daemon gathers per-host traffic statistics by querying netlink
accounting data. Due to this approach, the executable is very small and does
not rely on libpcap and CPU intensive raw sockets to monitor traffic.

Besides raw per-host traffic counters, nlbwmon also support rudimentary
traffic classification by observing IP protocols and used port numbers.

Gathered accounting data is stored into a series of database files which
are regularily committed to persistent storage.

Refresh, commit and accounting intervals are freely configurable as well
as the layer7 protocol mapping rules and observed source subnets.

This package also bundles a cli client which can be used to dump the
gathered traffic data as JSON, CSV or plaintext data. A pull request to
add a graphical LuCI frontend for nlbwmon is pending.

Signed-off-by: Jo-Philipp Wich <jo@mein.io>
7 years agomosquitto: update to 1.4.14
Karl Palsson [Tue, 11 Jul 2017 10:12:06 +0000 (10:12 +0000)]
mosquitto: update to 1.4.14

Fixes a regression due to the CVE fix in the recently released 1.4.13.

https://mosquitto.org/2017/07/version-1-4-14-released/

Signed-off-by: Karl Palsson <karlp@etactica.com>
7 years agomosquitto: update to 1.4.13
Karl Palsson [Mon, 10 Jul 2017 14:29:13 +0000 (14:29 +0000)]
mosquitto: update to 1.4.13

Primarily a bugfix release for a CVE that doesn't affect lede/openwrt,
but also includes some websockets perfomance fixes.

Release notes at https://mosquitto.org/2017/07/version-1-4-13-released/

Signed-off-by: Karl Palsson <karlp@etactica.com>
7 years agozabbix: update to 3.2.6
Etienne Champetier [Sat, 8 Jul 2017 18:56:26 +0000 (11:56 -0700)]
zabbix: update to 3.2.6

Signed-off-by: Etienne Champetier <champetier.etienne@gmail.com>
7 years agozabbix: partially fix zabbix-extra-mac80211
Etienne Champetier [Sat, 8 Jul 2017 15:30:14 +0000 (08:30 -0700)]
zabbix: partially fix zabbix-extra-mac80211

In kernel commit f1160434c7658af3f7b0926b88df49a66cb3c3e0 many stats
that we read with zabbix-extra-mac80211 have been renamed
One commit after (c206ca670974cefec7ac3732db5c8156e8081a8d) those renamed
stats have been hidden behind MAC80211_DEBUG_COUNTERS compile flag

For now you have to edit mac80211 Makefile / do a custom build to access
most of these stats

Signed-off-by: Etienne Champetier <champetier.etienne@gmail.com>
7 years agozabbix: update to 3.2.4, use PKG_HASH
Etienne CHAMPETIER [Mon, 23 Jan 2017 03:48:30 +0000 (19:48 -0800)]
zabbix: update to 3.2.4, use PKG_HASH

Signed-off-by: Etienne CHAMPETIER <champetier.etienne@gmail.com>
7 years agolighttpd: backport more mod_cgi fixes queued for 1.4.46
Rafał Miłecki [Thu, 29 Jun 2017 07:24:37 +0000 (09:24 +0200)]
lighttpd: backport more mod_cgi fixes queued for 1.4.46

The most important change is local redirects being disabled by default.
There is an option called cgi.local-redir that allows enabling this
optimization manually back if needed.

Local redirects were initially introduced in 1.4.40 but caused many
problems for *some* web services.

One of problems is breaking Post/Redirect/Get design pattern. With
redirects handled on server side there is no browser redirection making
it "lose" the POST data.

Another possible issue are HTML forms with action="". With CGI local
redirects browser may be sending form data to the wrong URL (the one
that was supposed to redirect the browser).

Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
7 years agocoreutils: stdbuf: fix missing libstdbuf.so
Yousong Zhou [Mon, 19 Jun 2017 01:47:00 +0000 (09:47 +0800)]
coreutils: stdbuf: fix missing libstdbuf.so

Fixes #1674

Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
7 years agognutls: updated to 3.5.13
Nikos Mavrogiannopoulos [Sun, 18 Jun 2017 11:18:44 +0000 (13:18 +0200)]
gnutls: updated to 3.5.13

Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
7 years agolibtasn1: updated to 4.12
Nikos Mavrogiannopoulos [Sun, 18 Jun 2017 11:20:40 +0000 (13:20 +0200)]
libtasn1: updated to 4.12

Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
7 years agoopenconnect: new option mtu
Yousong Zhou [Mon, 8 May 2017 05:07:23 +0000 (13:07 +0800)]
openconnect: new option mtu

According to openconnect --help output:

  -m, --mtu=MTU                   Request MTU from server
      --base-mtu=MTU              Indicate path MTU to/from server

Fixes #2099 by allowing setting tunnel mtu

Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
7 years agoopenconnect: drop stale config: interface
Yousong Zhou [Mon, 8 May 2017 05:06:10 +0000 (13:06 +0800)]
openconnect: drop stale config: interface

It was introduced with 41f8d5465 ("openconnect: fix a couple of minor
things and add an interface option") and not needed since 4083de9d7
("openconnect: use proto_add_host_dependency")

Signed-off-by: Yousong Zhou <yszhou4tech@gmail.com>
7 years agoopenconnect: Bump openconnect to 7.08
Qian [Wed, 26 Apr 2017 23:48:28 +0000 (16:48 -0700)]
openconnect: Bump openconnect to 7.08

Bump openconnect to 7.08. Remove patch as it is included in the
upstream source.

Signed-off-by: Qian Sheng billsq@billsq.me
7 years agominidlna: backport fixes from 1.1.6 and 1.2.0 releases
Rafał Miłecki [Thu, 15 Jun 2017 05:55:23 +0000 (07:55 +0200)]
minidlna: backport fixes from 1.1.6 and 1.2.0 releases

This fixes one or two issues and adds support for few new devices
including Kodi.

Signed-off-by: Rafał Miłecki <rafal@milecki.pl>
7 years agoMerge pull request #4482 from MikePetullo/lede-17.01
Daniel Golle [Wed, 14 Jun 2017 22:40:54 +0000 (00:40 +0200)]
Merge pull request #4482 from MikePetullo/lede-17.01

openldap: update to 2.4.45

7 years agoopenldap: update to 2.4.45 4482/head
W. Michael Petullo [Wed, 14 Jun 2017 22:17:41 +0000 (18:17 -0400)]
openldap: update to 2.4.45

Fixes CVE-2017-9287

Signed-off-by: W. Michael Petullo <mike@flyn.org>
7 years agomosquitto: fix empty client-nossl package
Karl Palsson [Wed, 7 Jun 2017 15:40:28 +0000 (15:40 +0000)]
mosquitto: fix empty client-nossl package

Fallout of PROVIDES handling.
Fixes: https://github.com/openwrt/packages/issues/4432
Signed-off-by: Karl Palsson <karlp@etactica.com>
7 years agoMerge pull request #4443 from MikePetullo/lede-17.01-libdmapsharing
Hannu Nyman [Tue, 6 Jun 2017 06:50:51 +0000 (09:50 +0300)]
Merge pull request #4443 from MikePetullo/lede-17.01-libdmapsharing

libdmapsharing: update to 2.9.38

7 years agolibdmapsharing: update to 2.9.38 4443/head
W. Michael Petullo [Mon, 5 Jun 2017 21:23:31 +0000 (17:23 -0400)]
libdmapsharing: update to 2.9.38

Signed-off-by: W. Michael Petullo <mike@flyn.org>
7 years agotor: update to version 0.2.9.10
Hauke Mehrtens [Mon, 13 Mar 2017 21:31:21 +0000 (22:31 +0100)]
tor: update to version 0.2.9.10

Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de>
7 years agonet/mosquitto: bump to 1.4.12 for CVE-2017-7650
Karl Palsson [Mon, 29 May 2017 10:49:08 +0000 (10:49 +0000)]
net/mosquitto: bump to 1.4.12 for CVE-2017-7650

Dot release, primarily due to CVE-2017-7650 but also rolls up some
earlier patches.

Signed-off-by: Karl Palsson <karlp@etactica.com>
7 years agocanutils: rework recipe
Yegor Yefremov [Fri, 10 Mar 2017 13:56:40 +0000 (14:56 +0100)]
canutils: rework recipe

Don't group any utilities but just list them all as they are.

Fixes:
https://github.com/openwrt/packages/issues/3695

Signed-off-by: Yegor Yefremov <yegorslists@googlemail.com>
7 years agovsftpd: create directory for extra config files
Hannu Nyman [Tue, 9 May 2017 13:30:05 +0000 (16:30 +0300)]
vsftpd: create directory for extra config files

* create /etc/vsftpd directory for extra config files
  like userlist, certificate and key
* modify config file to use that directory
* include that directory in conffiles for backup

* use PKG_HASH
* update URL

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
(cherry picked from commit 3f390c55097e6d447c9c788d8b836519127fc1de)

7 years agoMerge pull request #4300 from mrnuke/for-17.01-gpsd
Hannu Nyman [Mon, 8 May 2017 07:14:49 +0000 (10:14 +0300)]
Merge pull request #4300 from mrnuke/for-17.01-gpsd

utils/gpsd: Backport ncurses6 support from master

7 years agognutls: updated to 3.5.11
Nikos Mavrogiannopoulos [Mon, 8 May 2017 03:38:19 +0000 (05:38 +0200)]
gnutls: updated to 3.5.11

Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
7 years agoocserv: updated to 0.11.8
Nikos Mavrogiannopoulos [Mon, 8 May 2017 03:36:59 +0000 (05:36 +0200)]
ocserv: updated to 0.11.8

Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
7 years agonet/mosquito: bump to 1.4.11
Karl Palsson [Wed, 5 Apr 2017 14:01:59 +0000 (14:01 +0000)]
net/mosquito: bump to 1.4.11

Full changelog available at:
https://mosquitto.org/2017/02/version-1-4-11-released/

Mostly ipv6 and websockets fixes, but requires a patch (submitted
upstream) to work around an accidental glibc dependency upstream.

Signed-off-by: Karl Palsson <karlp@etactica.com>
7 years agonet/mosquitto: support more config fields in init script
Karl Palsson [Thu, 4 May 2017 11:13:04 +0000 (11:13 +0000)]
net/mosquitto: support more config fields in init script

Adds the "notifications" option which is important when connecting
mosquitto to rabbitmq for instance.

Signed-off-by: Karl Palsson <karlp@etactica.com>
7 years agonet/mosquitto: Added further security configuration options for bridge section
David Thornley [Tue, 2 May 2017 02:08:46 +0000 (12:08 +1000)]
net/mosquitto: Added further security configuration options for bridge section

Signed-off-by: David Thornley <david.thornley@touchstargroup.com>
7 years agonet/mosquitto: use PROVIDES for -client tools also
Karl Palsson [Wed, 5 Apr 2017 13:59:29 +0000 (13:59 +0000)]
net/mosquitto: use PROVIDES for -client tools also

Earlier, PROVIDES handling was clarified for the broker and the library.
Use the same style to properly provide the -client-ssl and -client-nossl
packages.

Signed-off-by: Karl Palsson <karlp@etactica.com>
7 years agoadblock: backport updates to 2.6.2
Dirk Brenken [Sat, 29 Apr 2017 21:01:55 +0000 (00:01 +0300)]
adblock: backport updates to 2.6.2

Backport updates in 2.5.0-2.6.2 from master.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
7 years agocollectd: build cpufreq also for armvirt target
Hannu Nyman [Fri, 28 Apr 2017 16:13:56 +0000 (19:13 +0300)]
collectd: build cpufreq also for armvirt target

Enable collectd-mod-cpufreq also for armvirt to make it
available for ipq806x devices in LEDE buildbot builds.

LEDE phase2 buildbot for arm_cortex-a15_neon-vfpv4 that is
the package arch for ipq806x, uses armvirt SDK instead of
ipq806x SDK.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
7 years agonano: Update to version 2.7.5
Daniel Albers [Fri, 28 Apr 2017 15:29:16 +0000 (18:29 +0300)]
nano: Update to version 2.7.5

Description: fixes a crash with zero-length regex matches and further updates

Signed-off-by: Daniel Albers <Daniel.Albers@public-files.de>
(cherry picked from commit 249ae1f164d18edaa79aa28a2084857aeeacf365)

7 years agoirqbalance: backport package from master
Hannu Nyman [Thu, 27 Apr 2017 20:44:32 +0000 (23:44 +0300)]
irqbalance: backport package from master

The purpose of irqbalance is to distribute hardware interrupts across
processors/cores on a multiprocessor/-core system in order to increase
performance.

Only the cmd-line tool is compiled and installed.

Run-tested with ipq806x / R7800.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
(cherry picked from commit c5913bd12d73c4c781b79c16246a8e9c8d236b8f)
(cherry picked from commit c42ecd05a1c91070bc86b4d8254972562b6e0c67)
(cherry picked from commit a1a96fc9fa8312c87ee997d613e9e9de3f3a82d9)

7 years agoutils/gpsd: Backport ncurses6 support from master 4300/head
Alexandru Gagniuc [Tue, 25 Apr 2017 19:06:39 +0000 (12:06 -0700)]
utils/gpsd: Backport ncurses6 support from master

Because gpsd FTBTS without this patch.

Signed-off-by: Alexandru Gagniuc <mr.nuke.me@gmail.com>
7 years agoMerge pull request #4279 from equinox0815/collectd-fix-gcrypt-include-path
Hannu Nyman [Thu, 20 Apr 2017 06:19:15 +0000 (09:19 +0300)]
Merge pull request #4279 from equinox0815/collectd-fix-gcrypt-include-path

collectd: fix libgcrypt include dir

7 years agocollectd: fix libgcrypt include dir 4279/head
Christian Pointner [Wed, 19 Apr 2017 21:45:38 +0000 (23:45 +0200)]
collectd: fix libgcrypt include dir

Signed-off-by: Christian Pointner <equinox@spreadspace.org>
7 years agosubversion: add unixodbc dependency
Val Kulkov [Wed, 19 Apr 2017 14:19:18 +0000 (17:19 +0300)]
subversion: add unixodbc dependency

Compile tested: LEDE HEAD

If unixodbc package is present in the environment, subversion
fails to compile due to missing dependencies.

Fixes the dependency on unixodbc if unixodbc package is selected.

Signed-off-by: Val Kulkov <val.kulkov@gmail.com>
(cherry picked from commit 06a529df359b6704c383cf4881531f409ebb41b0)

7 years agoMerge pull request #4184 from luizluca/cc/ruby_update
Hannu Nyman [Wed, 19 Apr 2017 12:14:11 +0000 (15:14 +0300)]
Merge pull request #4184 from luizluca/cc/ruby_update

[lede-17.01] ruby: bump to 2.4.1

7 years agocollectd: upstream fix for vulnerabity in network plugin
Hannu Nyman [Wed, 19 Apr 2017 09:20:53 +0000 (12:20 +0300)]
collectd: upstream fix for vulnerabity in network plugin

Backport an upstream fix for a DDoS vulnerability in the
network plugin: CVE-2017-7401

The patch has been adapted from the fix for 5.6 branch,
as 5.5 is already EoL in practice.

Run-tested with R7800/ipq806x.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
7 years agoMerge pull request #4277 from nxhack/cve_2017_7868
Hannu Nyman [Wed, 19 Apr 2017 09:16:26 +0000 (12:16 +0300)]
Merge pull request #4277 from nxhack/cve_2017_7868

[lede-17.01] icu: fix CVE-2017-7867 CVE-2017-7868