Commit Graph

1997 Commits

Author SHA1 Message Date
Sven Eckelmann
696745f1c3 batctl: update to version 2024.1
* (no changes)

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2024-04-05 21:37:54 +02:00
Sven Eckelmann
139fcdb707 alfred: update to version 2024.1
* (no changes)

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2024-04-05 21:37:46 +02:00
Rob White
4af9b69e1b mesh11sd: update to version 3.1.0
Maintainer: Rob White rob@blue-wave.net

Compile tested: All

Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, mips_24kc, aarch64_cortex-a53, x86-64
    On 23.5 and master/snapshot.

Description:
    mesh11sd (3.1.0)
    This release contains new functionality and numerous fixes.
    New functionality includes support of non-mesh segments of backhaul
    with blocking of bridge loops and spanning tree priority settable in the configuration

Details can be found here:
    https://github.com/openNDS/mesh11sd/releases/tag/v3.1.0

Signed-off-by: Rob White <rob@blue-wave.net>
2024-03-24 09:03:32 +01:00
Paul Spooren
da3b77402d ci: set correct arch for rootfs tests
With the commit 01e5cfc "CI: Add target/arch tags (no suffix) for
snapshot images"[1] the os/platform is set for all images, which is usually
different from what the GitHub action runner uses (x86). The Docker
deamon still tries to fetch the x86 version and fails.

This commit explicitly sets the fitting arch.

[1]: 01e5cfccd7

Signed-off-by: Paul Spooren <mail@aparcar.org>
(cherry picked from commit d359fa04eda29638b9326c194490685c1177fd49)
2024-03-23 15:10:02 +01:00
Paul Spooren
10d7b7847f ci: no longer require real name
This goes in accordance with the Linux Kernel:

> using a known identity (sorry, no anonymous contributions.)

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/process/submitting-patches.rst?id=HEAD#n442

Signed-off-by: Paul Spooren <mail@aparcar.org>
(cherry picked from commit 7e6cd98ad481184b1a620a9862aa3713d1ab85cc)
2024-03-23 15:08:58 +01:00
Simon Wunderlich
61f15a76a6 Merge pull request #1045 from ecsv/batadv-2024.0
batman-adv: Provide teardown hook for batadv_vlan proto
2024-02-05 10:54:07 +01:00
Sven Eckelmann
9090aefa69 batman-adv: Provide teardown hook for batadv_vlan proto
The batadv_vlan proto doesn't need to do anything when it gets teared down.
But the scripts are still trying to call the teardown function of this
proto. This results in warnings like:

    daemon.notice netifd: batmesh1 (18940): ./batadv_vlan.sh: eval: line 37: proto_batadv_vlan_teardown: not found

Just providing a stub function avoids this log spam.

Fixes: #1044
Reported-by: Rani Hod <rani.hod@gmail.com>
Fixes: f5205d7d24 ("batman-adv: upgrade package to latest release 2014.2.0")
Signed-off-by: Sven Eckelmann <sven@narfation.org>
2024-02-05 09:04:42 +01:00
Sven Eckelmann
6a7a1a5dab batman-adv: update to version 2024.0
* support latest kernels (4.19 - 6.8)
* coding style cleanups and refactoring
* add stateless multicast packet format support

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2024-02-03 14:13:47 +01:00
Sven Eckelmann
5b1caf1968 batctl: update to version 2024.0
* add stateless multicast packet format support
* bugs squashed:
  - Fix various length checks in tcpdump-like subcommand

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2024-02-03 14:13:47 +01:00
Sven Eckelmann
b40ad195c2 alfred: update to version 2024.0
* (no changes)

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2024-02-03 14:13:47 +01:00
Simon Wunderlich
6f74738b72 Merge pull request #1038 from ecsv/batadv-2023.3
batman-adv: compat: Fix skb_vlan_eth_hdr conflict in stable kernels
2023-12-23 18:05:57 +01:00
Sven Eckelmann
96b5fa139c batman-adv: compat: Fix skb_vlan_eth_hdr conflict in stable kernels
The newest Linux stable kernel releases:

* v5.10.205
* v5.15.144
* v6.1.69

received a backported version of commit 1f5020acb33f ("net: vlan: introduce
skb_vlan_eth_hdr()"). batman-adv must therefore not provide this function
any longer for these kernel versions.

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-12-23 15:33:57 +01:00
Rob White
a5ec54aee3 opennds: update to version 10.2.0
Maintainer: Rob White rob@blue-wave.net

Compile tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64

Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64; on snapshot, 23.05, 22.03

Description:
opennds (10.2.0) - This version is a minor upgrade that introduces some significant additional functionality.
In addition it includes numerous enhancements bug fixes and cosmetic fixes.

Additional functionality includes:

 * Pre-emptive Client Lists
 * Autonomous Block Lists
 * Internet hosted https FAS support for resource limited routers
 * Fair Usage Policy

Details can be found here:
https://github.com/openNDS/openNDS/releases/tag/v10.2.0

Signed-off-by: Rob White <rob@blue-wave.net>
2023-11-28 17:25:33 +01:00
Simon Wunderlich
f0f1b0a33e Merge pull request #1033 from ecsv/batadv-2023.3
batman-adv: update packages to version 2023.3
2023-11-17 22:05:13 +01:00
Sven Eckelmann
28b8a5eafe batman-adv: update to version 2023.3
* support latest kernels (4.14 - 6.7)
* coding style cleanups and refactoring
* only warn about too small MTU when soft interfaces wasn't already reduced
* bugs squashed:
  - Hold rtnl lock during MTU update via netlink

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-11-17 21:31:47 +01:00
Sven Eckelmann
b69c62925f batctl: update to version 2023.3
* (no changes)

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-11-17 21:31:28 +01:00
Sven Eckelmann
1bdab4b1b5 alfred: update to version 2023.3
* (no changes)

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-11-17 21:30:59 +01:00
William Fleurant
601bd6c045 cjdns: always build without ccache prefix
Signed-off-by: William Fleurant <meshnet@protonmail.com>
2023-10-29 10:05:17 +01:00
Moritz Warning
2a725e7cbe nodogsplash: explicit file copy
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2023-10-23 09:28:01 +02:00
Bradford Zhang
49da9e9f46 bird2: bump to version 2.14
Signed-off-by: Bradford Zhang <zyc@zyc.name>
2023-10-16 12:47:09 +02:00
Moritz Warning
fe1c67fb3d nodogsplash: update to version 5.0.2
Fix a buffer overflow in case the
query string is too long.

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2023-10-10 12:26:28 +02:00
Josef Schlehofer
c2124dd2ad luci-app-bmx6: drop this because of security vulnerabilities
DependencyBot, which are using is sending us emails about these CVEs:
CVE-2012-6708
CVE-2020-23064
CVE-2019-11358

This was reported to maintainer in April 2023, but no one stepped it to fix that,
so let's drop this.

Replacement could be luci-app-bmx7.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2023-09-29 10:19:54 +02:00
Josef Schlehofer
9fb9d9343e bmx6: drop package
This package is no longer maintained by us or by upstream developers.
The last version in the GitHub repository is from 2020 with no activity so far.
We are using version 0.1-alpha.

Because LuCI app is vulnerable to several CVEs and DependencyBot still
sends emails about it, let's drop it.

If anyone wants, they can use bmx7.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2023-09-29 10:19:54 +02:00
Rob White
88c98c910a opennds: update to version 10.1.3
Maintainer: Rob White rob@blue-wave.net

Compile tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64

Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64; on snapshot, 23.05, 22.03

Description:
opennds (10.1.3)

Security Advisory. This version contains fixes for multiple potential security vulnerabilities
Credit - Stanislav Dashevskyi - standash.github.io [standash]
It also contains some minor bug fixes

  * Fix - Buffer overflow causing segfault - CVE-2023-41101 [bluewavenet]
  * Fix - Memory leaks due to passing allocated buffer into safe_asprintf() - CVE-2023-41102 [bluewavenet]
  * Fix - Remove deprecated preauth option [bluewavenet]
  * Fix - missing free in show_preauth_page if MHD does not respond [bluewavenet]
  * Fix - more safe_asprintf memory leaks [bluewavenet]
  * Fix - missing free for mark_auth [bluewavenet]
  * Fix - memory leak after starting authmon daemon [bluewavenet]
  * Fix - memory leak in encode_and_redirect_to_splashpage [bluewavenet]
  * Fix - Community themespec, voucher css and logo image [bluewavenet]
  * Fix - ThemeSpec, path to logo in page footer [bluewavenet]
  * Fix - ensure gatewayurl is urldecoded to fix broken css and images in themespec [bluewavenet]
  * Add - set default fas remote fqdn to disabled [bluewavenet]

Signed-off-by: Rob White <rob@blue-wave.net>
2023-08-28 21:09:01 +02:00
Simon Wunderlich
d86c0c24c8 Merge pull request #1015 from ecsv/batman-adv-2023.2
batman-adv: Fix lock assert after fragmentation change
2023-08-23 09:14:28 +02:00
Sven Eckelmann
364379c056 batman-adv: Fix lock assert after fragmentation change
The automatic recalculation of the maximum allowed MTU is usually triggered
by code sections which are already rtnl lock protected by callers outside
of batman-adv. But when the fragmentation setting is changed via
batman-adv's own batadv genl family, then the rtnl lock is not yet taken.

But dev_set_mtu requires that the caller holds the rtnl lock because it
uses netdevice notifiers. And this code will then fail the check for this
lock:

  RTNL: assertion failed at net/core/dev.c (1953)

Fixes: e7ee4c55de ("batman-adv: update to version 2023.2")
Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-08-22 18:54:26 +02:00
Simon Wunderlich
6f6bcba663 Merge pull request #1012 from ecsv/batman-adv-2023.2
batman-adv: update packages to version 2023.2
2023-08-18 17:06:22 +02:00
Sven Eckelmann
167d93cc32 alfred: update to version 2023.2
* receive data with valid source on unix sock without active interface

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-08-18 16:02:40 +02:00
Sven Eckelmann
8fd009ed71 batctl: update to version 2023.2
* (no changes)

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-08-18 16:02:16 +02:00
Sven Eckelmann
e7ee4c55de batman-adv: update to version 2023.2
* support latest kernels (4.14 - 6.5)
* bugs squashed:
  - avoid potential invalid memory access when processing ELP/OGM2 packets
  - drop pending DAT worker when interface shuts down
  - inform network stack about automatically adjusted MTUs
  - keep user defined MTU limit when MTU is recalculated
  - fix packet memory leak when sending OGM2 via inactive interfaces
  - fix TT memory leak for roamed back clients

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-08-18 16:02:02 +02:00
Rob White
5beb3be9b8 mesh11sd: Release v2.0.0
Maintainer: Rob White rob@blue-wave.net
Compile tested: All
Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64, on 21.02, 22.03 and snapshot.

Description:
mesh11sd (2.0.0)

This release contains new functionality.

Autonomous portal mode is introduced. This simplifies the rollout of meshnodes allowing a common configuration to be used on all nodes.
Remote administration is introduced, allowing files to be copied and terminal sessions to be opened on established meshnodes, identifying remote nodes by mac address.

 * Add - Update config file [bluewavenet]
 * Add - implementation of remote copy [bluewavenet]
 * Add - implementation of remote connect [bluewavenet]
 * Add - Autonomous portal mode [bluewavenet]

-- Rob White dot@blue-wave.net Mon, 31 Jul 2023 16:59:52 +0000


Signed-off-by: Rob White <rob@blue-wave.net>
2023-08-05 22:27:23 +02:00
Rob White
e4a53c1354 opennds: Release v10.1.2
Reinstate CONFLICTS:=nodogsplash

Signed-off-by: Rob White <rob@blue-wave.net>
2023-07-31 07:46:50 +02:00
Rob White
3eb9aa3056 opennds: Release v10.1.2
Maintainer: Rob White rob@blue-wave.net

Compile tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64

Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64; on snapshot, 23.05, 22.03

Description:
opennds (10.1.2)

Security Advisory. This version contains fixes for multiple potential security vulnerabilities
Credit - Stanislav Dashevskyi - standash.github.io [standash]
It also contains some minor bug fixes
  * Fix - Generate unique sha256 faskey if not set in config - CVE-2023-38324 [bluewavenet]
  * Fix - NULL pointer dereference if user_agent is NULL - CVE-2023-38320, CVE-2023-38322 [bluewavenet]
  * Fix - NULL pointer dereference if authdir is called with an incomplete or missing query string - CVE-2023-38313, CVE-2023-38314, CVE-2023-38315 [bluewavenet]
  * Fix - remove deprecated and non-functioning unescape callback - CVE-2023-38316 [bluewavenet]
  * Fix - prevent potential recursive dependency and detect if conflicting package is installed [bluewavenet]


Signed-off-by: Rob White <rob@blue-wave.net>
2023-07-31 07:46:50 +02:00
Moritz Warning
967dde509b nodogsplash: remove opennds from conflicts
OpenNDS lists nodogsplash a conflict as well.
This causes a circular reference that is not allowed.

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2023-07-29 19:00:42 +02:00
Nick Hainke
eb8978ebf7 babeld: update to 1.13.1
Announcement:
https://alioth-lists.debian.net/pipermail/babel-users/2023-July/004125.html

Remove upstreamed patch:
- 100-local-make-local_kind-function-accessible.patch

Refresh patch:
- 600-add-ubus.patch

Signed-off-by: Nick Hainke <vincent@systemli.org>
2023-07-29 10:43:35 +02:00
Moritz Warning
91e07907fa nodogsplash: update to 5.0.1
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2023-07-23 21:53:27 +02:00
Marek Küthe
0221a2a001 quagga: Remove, as is no longer being developed
Closes https://github.com/openwrt/routing/issues/994

Signed-off-by: Marek Küthe <m.k@mk16.de>
2023-07-22 19:09:10 +02:00
Josef Schlehofer
c7bc308c78 Merge pull request #995 from marek22k/master
bird1: Remove, as EOL has been reached
2023-07-21 20:01:49 +02:00
Marek Küthe
fa136b70df bird1: Remove, as EOL has been reached
Closes https://github.com/openwrt/routing/issues/993

Deprecation:
https://marc.info/?l=bird-users&m=168682998827356&w=2
https://trubka.network.cz/pipermail/bird-users/attachments/20230615/8517953d/attachment.pdf

Signed-off-by: Marek Küthe <m.k@mk16.de>
2023-07-21 15:13:13 +02:00
Nick Hainke
9e13652bbf babeld: update to 1.13
Announcement:
https://alioth-lists.debian.net/pipermail/babel-users/2023-July/004100.html

Babeld removed diversity routing [0], so we need to adjust ubus
bindings. Further. we need to add a patch that makes local_kind
accessible again: "100-local-make-local_kind-function-accessible.patch"

Refresh patches:
- 600-add-ubus.patch

[0] - a081608335

Signed-off-by: Nick Hainke <vincent@systemli.org>
2023-07-19 00:48:52 +02:00
Rob White
26f5f0f812 opennds: Release v10.1.1
Maintainer: Rob White rob@blue-wave.net

Compile tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64

Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64; on snapshot, 23.05, 22.03

opennds (10.1.1)
  * This version contains some minor bug fixes and documentation updates
  * Fix - send only contents of buffer, not entire buffer when serving page511 [bluewavenet]
  * Fix - Set fas_remotefqdn to gw_fqdn when overriding FAS settings [bluewavenet]
  * Fix - use absolute path for css and images in ThemeSpec [bluewavenet]
  * Fix - revert to old option names without underscores [bluewavenet]
  * Fix - FAS URL when fas_remotefqdn is not set [bluewavenet]

Signed-off-by: Rob White <rob@blue-wave.net>
2023-07-15 07:21:14 +02:00
Bradford Zhang
bdf923742a bird2: bump to version 2.13.1
Signed-off-by: Bradford Zhang <zyc@zyc.name>
2023-06-30 01:17:16 +02:00
Tianling Shen
04a287eea0 CI: update build architectures
- armvirt target has been renamed to armsr (Arm SystemReady) [1].
- armsr-armv8 has been switched to aarch64_generic architecture [2].

1. 40b02a2301
2. e0f06ddc23

Signed-off-by: Tianling Shen <cnsztl@immortalwrt.org>
2023-06-26 11:29:59 +02:00
Jeffery To
f165789ced CI: Add build test for riscv64_riscv64
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-06-26 11:29:59 +02:00
Jeffery To
06b7d9b665 CI: Sort build architectures in alphabetical order
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-06-26 11:29:59 +02:00
Christian Marangi
5aa683be13 CI: add concurrency rules to skip redundant build
Add concurrency rules to skip redundant build to skip extra build test
on force push on pull request.

Signed-off-by: Christian Marangi <ansuelsmth@gmail.com>
2023-06-26 11:29:59 +02:00
Jeffery To
299ee2b1cf CI: Do package run-tests only if target packages were built
Currently, the package run-test phase will fail for PRs that only
add/update host-only packages, as no target packages (*.ipk) are built.

This checks if any target packages are built before attempting the
run-tests.

Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-06-26 11:29:59 +02:00
Jeffery To
89cf0d5619 CI: Run "apt-get update" before installing signify-openbsd
Signed-off-by: Jeffery To <jeffery.to@gmail.com>
2023-06-26 11:29:59 +02:00
Van Waholtz
28d204148a CI: Enable runtime_test for mips_24kc
Signed-off-by: Van Waholtz <brvphoenix@gmail.com>
2023-06-26 11:29:59 +02:00
Gerard Ryan
61997c86b0 cache-domains: added pre-test.sh CI step
Some packages variants have conflicting dependencies with the
base packages and the CI test will fail to install before anything
can be done by the packages to setup the system for install.

This change adds a pre-test.sh that runs before the install so things
like the default libustream variant can be swapped out as shown in the
updated cache-domains.

Signed-off-by: Gerard Ryan <G.M0N3Y.2503@gmail.com>
2023-06-26 11:29:59 +02:00