Commit Graph

1907 Commits

Author SHA1 Message Date
Rob White
56f7ad1933 mesh11sd: update to version 4.0.1
Maintainer: Rob White rob@blue-wave.net

Compile tested: All

Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, mips_24kc, aarch64_cortex-a53;
    On 23.5 and master/snapshot.

Description:
    mesh11sd (4.0.1)
    This minor bugfix release follows on from the previous major release which introduced
    new functionality that includes autonomous path stabilisation and the support of mesh leechnodes.

Details can be found here:
    https://github.com/openNDS/mesh11sd/releases/tag/v4.0.1

Signed-off-by: Rob White <rob@blue-wave.net>
2024-05-27 06:34:42 +02:00
Bradford Zhang
1d335a9fac bird2: bump to version 2.15.1
Signed-off-by: Bradford Zhang <zyc@zyc.name>
2024-05-20 20:42:40 +02:00
Axel Neumann
b0f316aea2 bmx7: Fix for mbedtls-3.6.0 2024-05-19 16:12:09 +02:00
Florian Eckert
d4e9f920ea luci-app-olsrd2: upgrade uci-defaults for ucitrack handling to use json
Conversion of the 'uci-defaults' script for ucitrack handling to the new
json processing.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2024-04-16 08:53:10 +02:00
Florian Eckert
1c3f6b1599 cjdns: upgrade uci-defaults for ucitrack handling to use json
Conversion of the 'uci-defaults' script for ucitrack handling to the new
json processing.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2024-04-16 08:53:10 +02:00
Robert Marko
0fed081486 treewide: refresh hashes after move to use ZSTD as default
With the recent move to using ZSTD as the default compression format
for packaging git repo clones we must refresh all of the hashes for
the packages feed as well.

Signed-off-by: Robert Marko <robimarko@gmail.com>
2024-04-07 20:04:28 +02:00
Paul Spooren
c80474dd82
cjdns: switch version to be APK compatible (#1060) 2024-04-07 13:46:59 +02:00
Rob White
334058d94d mesh11sd: update to version 3.1.1
Maintainer: Rob White rob@blue-wave.net

Compile tested: All

Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, mips_24kc, aarch64_cortex-a53, x86-64
    On 23.5 and master/snapshot.

Description:
    mesh11sd (3.1.1)
    This release contains several bug fixes.
    These fixes include improved ndp scan and more reliable peer node identification.

Details can be found here:
    https://github.com/openNDS/mesh11sd/releases/tag/v3.1.1

Signed-off-by: Rob White <rob@blue-wave.net>
2024-04-06 12:06:57 +02:00
Simon Wunderlich
5314b3bd56
Merge pull request #1055 from ecsv/batadv-2024.1
batman-adv: update packages to version 2024.1
2024-04-06 10:39:13 +02:00
Sven Eckelmann
0908d7d5a6 batman-adv: update to version 2024.1
* support latest kernels (4.19 - 6.9)
* coding style cleanups and refactoring
* bugs squashed:
  - avoid infinite loop while trying to resize local translation table

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2024-04-05 21:43:16 +02:00
Sven Eckelmann
696745f1c3 batctl: update to version 2024.1
* (no changes)

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2024-04-05 21:37:54 +02:00
Sven Eckelmann
139fcdb707 alfred: update to version 2024.1
* (no changes)

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2024-04-05 21:37:46 +02:00
Rob White
4af9b69e1b mesh11sd: update to version 3.1.0
Maintainer: Rob White rob@blue-wave.net

Compile tested: All

Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, mips_24kc, aarch64_cortex-a53, x86-64
    On 23.5 and master/snapshot.

Description:
    mesh11sd (3.1.0)
    This release contains new functionality and numerous fixes.
    New functionality includes support of non-mesh segments of backhaul
    with blocking of bridge loops and spanning tree priority settable in the configuration

Details can be found here:
    https://github.com/openNDS/mesh11sd/releases/tag/v3.1.0

Signed-off-by: Rob White <rob@blue-wave.net>
2024-03-24 09:03:32 +01:00
Paul Spooren
da3b77402d ci: set correct arch for rootfs tests
With the commit 01e5cfc "CI: Add target/arch tags (no suffix) for
snapshot images"[1] the os/platform is set for all images, which is usually
different from what the GitHub action runner uses (x86). The Docker
deamon still tries to fetch the x86 version and fails.

This commit explicitly sets the fitting arch.

[1]: 01e5cfccd7

Signed-off-by: Paul Spooren <mail@aparcar.org>
(cherry picked from commit d359fa04eda29638b9326c194490685c1177fd49)
2024-03-23 15:10:02 +01:00
Paul Spooren
10d7b7847f ci: no longer require real name
This goes in accordance with the Linux Kernel:

> using a known identity (sorry, no anonymous contributions.)

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/process/submitting-patches.rst?id=HEAD#n442

Signed-off-by: Paul Spooren <mail@aparcar.org>
(cherry picked from commit 7e6cd98ad481184b1a620a9862aa3713d1ab85cc)
2024-03-23 15:08:58 +01:00
Simon Wunderlich
61f15a76a6
Merge pull request #1045 from ecsv/batadv-2024.0
batman-adv: Provide teardown hook for batadv_vlan proto
2024-02-05 10:54:07 +01:00
Sven Eckelmann
9090aefa69 batman-adv: Provide teardown hook for batadv_vlan proto
The batadv_vlan proto doesn't need to do anything when it gets teared down.
But the scripts are still trying to call the teardown function of this
proto. This results in warnings like:

    daemon.notice netifd: batmesh1 (18940): ./batadv_vlan.sh: eval: line 37: proto_batadv_vlan_teardown: not found

Just providing a stub function avoids this log spam.

Fixes: #1044
Reported-by: Rani Hod <rani.hod@gmail.com>
Fixes: f5205d7d24 ("batman-adv: upgrade package to latest release 2014.2.0")
Signed-off-by: Sven Eckelmann <sven@narfation.org>
2024-02-05 09:04:42 +01:00
Sven Eckelmann
6a7a1a5dab batman-adv: update to version 2024.0
* support latest kernels (4.19 - 6.8)
* coding style cleanups and refactoring
* add stateless multicast packet format support

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2024-02-03 14:13:47 +01:00
Sven Eckelmann
5b1caf1968 batctl: update to version 2024.0
* add stateless multicast packet format support
* bugs squashed:
  - Fix various length checks in tcpdump-like subcommand

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2024-02-03 14:13:47 +01:00
Sven Eckelmann
b40ad195c2 alfred: update to version 2024.0
* (no changes)

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2024-02-03 14:13:47 +01:00
Simon Wunderlich
6f74738b72
Merge pull request #1038 from ecsv/batadv-2023.3
batman-adv: compat: Fix skb_vlan_eth_hdr conflict in stable kernels
2023-12-23 18:05:57 +01:00
Sven Eckelmann
96b5fa139c batman-adv: compat: Fix skb_vlan_eth_hdr conflict in stable kernels
The newest Linux stable kernel releases:

* v5.10.205
* v5.15.144
* v6.1.69

received a backported version of commit 1f5020acb33f ("net: vlan: introduce
skb_vlan_eth_hdr()"). batman-adv must therefore not provide this function
any longer for these kernel versions.

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-12-23 15:33:57 +01:00
Rob White
a5ec54aee3 opennds: update to version 10.2.0
Maintainer: Rob White rob@blue-wave.net

Compile tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64

Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64; on snapshot, 23.05, 22.03

Description:
opennds (10.2.0) - This version is a minor upgrade that introduces some significant additional functionality.
In addition it includes numerous enhancements bug fixes and cosmetic fixes.

Additional functionality includes:

 * Pre-emptive Client Lists
 * Autonomous Block Lists
 * Internet hosted https FAS support for resource limited routers
 * Fair Usage Policy

Details can be found here:
https://github.com/openNDS/openNDS/releases/tag/v10.2.0

Signed-off-by: Rob White <rob@blue-wave.net>
2023-11-28 17:25:33 +01:00
Simon Wunderlich
f0f1b0a33e
Merge pull request #1033 from ecsv/batadv-2023.3
batman-adv: update packages to version 2023.3
2023-11-17 22:05:13 +01:00
Sven Eckelmann
28b8a5eafe batman-adv: update to version 2023.3
* support latest kernels (4.14 - 6.7)
* coding style cleanups and refactoring
* only warn about too small MTU when soft interfaces wasn't already reduced
* bugs squashed:
  - Hold rtnl lock during MTU update via netlink

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-11-17 21:31:47 +01:00
Sven Eckelmann
b69c62925f batctl: update to version 2023.3
* (no changes)

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-11-17 21:31:28 +01:00
Sven Eckelmann
1bdab4b1b5 alfred: update to version 2023.3
* (no changes)

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-11-17 21:30:59 +01:00
William Fleurant
601bd6c045
cjdns: always build without ccache prefix
Signed-off-by: William Fleurant <meshnet@protonmail.com>
2023-10-29 10:05:17 +01:00
Moritz Warning
2a725e7cbe nodogsplash: explicit file copy
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2023-10-23 09:28:01 +02:00
Bradford Zhang
49da9e9f46 bird2: bump to version 2.14
Signed-off-by: Bradford Zhang <zyc@zyc.name>
2023-10-16 12:47:09 +02:00
Moritz Warning
fe1c67fb3d nodogsplash: update to version 5.0.2
Fix a buffer overflow in case the
query string is too long.

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2023-10-10 12:26:28 +02:00
Josef Schlehofer
c2124dd2ad luci-app-bmx6: drop this because of security vulnerabilities
DependencyBot, which are using is sending us emails about these CVEs:
CVE-2012-6708
CVE-2020-23064
CVE-2019-11358

This was reported to maintainer in April 2023, but no one stepped it to fix that,
so let's drop this.

Replacement could be luci-app-bmx7.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2023-09-29 10:19:54 +02:00
Josef Schlehofer
9fb9d9343e bmx6: drop package
This package is no longer maintained by us or by upstream developers.
The last version in the GitHub repository is from 2020 with no activity so far.
We are using version 0.1-alpha.

Because LuCI app is vulnerable to several CVEs and DependencyBot still
sends emails about it, let's drop it.

If anyone wants, they can use bmx7.

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2023-09-29 10:19:54 +02:00
Rob White
88c98c910a opennds: update to version 10.1.3
Maintainer: Rob White rob@blue-wave.net

Compile tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64

Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64; on snapshot, 23.05, 22.03

Description:
opennds (10.1.3)

Security Advisory. This version contains fixes for multiple potential security vulnerabilities
Credit - Stanislav Dashevskyi - standash.github.io [standash]
It also contains some minor bug fixes

  * Fix - Buffer overflow causing segfault - CVE-2023-41101 [bluewavenet]
  * Fix - Memory leaks due to passing allocated buffer into safe_asprintf() - CVE-2023-41102 [bluewavenet]
  * Fix - Remove deprecated preauth option [bluewavenet]
  * Fix - missing free in show_preauth_page if MHD does not respond [bluewavenet]
  * Fix - more safe_asprintf memory leaks [bluewavenet]
  * Fix - missing free for mark_auth [bluewavenet]
  * Fix - memory leak after starting authmon daemon [bluewavenet]
  * Fix - memory leak in encode_and_redirect_to_splashpage [bluewavenet]
  * Fix - Community themespec, voucher css and logo image [bluewavenet]
  * Fix - ThemeSpec, path to logo in page footer [bluewavenet]
  * Fix - ensure gatewayurl is urldecoded to fix broken css and images in themespec [bluewavenet]
  * Add - set default fas remote fqdn to disabled [bluewavenet]

Signed-off-by: Rob White <rob@blue-wave.net>
2023-08-28 21:09:01 +02:00
Simon Wunderlich
d86c0c24c8
Merge pull request #1015 from ecsv/batman-adv-2023.2
batman-adv: Fix lock assert after fragmentation change
2023-08-23 09:14:28 +02:00
Sven Eckelmann
364379c056 batman-adv: Fix lock assert after fragmentation change
The automatic recalculation of the maximum allowed MTU is usually triggered
by code sections which are already rtnl lock protected by callers outside
of batman-adv. But when the fragmentation setting is changed via
batman-adv's own batadv genl family, then the rtnl lock is not yet taken.

But dev_set_mtu requires that the caller holds the rtnl lock because it
uses netdevice notifiers. And this code will then fail the check for this
lock:

  RTNL: assertion failed at net/core/dev.c (1953)

Fixes: e7ee4c55de ("batman-adv: update to version 2023.2")
Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-08-22 18:54:26 +02:00
Simon Wunderlich
6f6bcba663
Merge pull request #1012 from ecsv/batman-adv-2023.2
batman-adv: update packages to version 2023.2
2023-08-18 17:06:22 +02:00
Sven Eckelmann
167d93cc32 alfred: update to version 2023.2
* receive data with valid source on unix sock without active interface

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-08-18 16:02:40 +02:00
Sven Eckelmann
8fd009ed71 batctl: update to version 2023.2
* (no changes)

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-08-18 16:02:16 +02:00
Sven Eckelmann
e7ee4c55de batman-adv: update to version 2023.2
* support latest kernels (4.14 - 6.5)
* bugs squashed:
  - avoid potential invalid memory access when processing ELP/OGM2 packets
  - drop pending DAT worker when interface shuts down
  - inform network stack about automatically adjusted MTUs
  - keep user defined MTU limit when MTU is recalculated
  - fix packet memory leak when sending OGM2 via inactive interfaces
  - fix TT memory leak for roamed back clients

Signed-off-by: Sven Eckelmann <sven@narfation.org>
2023-08-18 16:02:02 +02:00
Rob White
5beb3be9b8 mesh11sd: Release v2.0.0
Maintainer: Rob White rob@blue-wave.net
Compile tested: All
Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64, on 21.02, 22.03 and snapshot.

Description:
mesh11sd (2.0.0)

This release contains new functionality.

Autonomous portal mode is introduced. This simplifies the rollout of meshnodes allowing a common configuration to be used on all nodes.
Remote administration is introduced, allowing files to be copied and terminal sessions to be opened on established meshnodes, identifying remote nodes by mac address.

 * Add - Update config file [bluewavenet]
 * Add - implementation of remote copy [bluewavenet]
 * Add - implementation of remote connect [bluewavenet]
 * Add - Autonomous portal mode [bluewavenet]

-- Rob White dot@blue-wave.net Mon, 31 Jul 2023 16:59:52 +0000


Signed-off-by: Rob White <rob@blue-wave.net>
2023-08-05 22:27:23 +02:00
Rob White
e4a53c1354 opennds: Release v10.1.2
Reinstate CONFLICTS:=nodogsplash

Signed-off-by: Rob White <rob@blue-wave.net>
2023-07-31 07:46:50 +02:00
Rob White
3eb9aa3056 opennds: Release v10.1.2
Maintainer: Rob White rob@blue-wave.net

Compile tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64

Run tested: arm_cortex-a7_neon-vfpv4, mipsel_24kc, x86-64; on snapshot, 23.05, 22.03

Description:
opennds (10.1.2)

Security Advisory. This version contains fixes for multiple potential security vulnerabilities
Credit - Stanislav Dashevskyi - standash.github.io [standash]
It also contains some minor bug fixes
  * Fix - Generate unique sha256 faskey if not set in config - CVE-2023-38324 [bluewavenet]
  * Fix - NULL pointer dereference if user_agent is NULL - CVE-2023-38320, CVE-2023-38322 [bluewavenet]
  * Fix - NULL pointer dereference if authdir is called with an incomplete or missing query string - CVE-2023-38313, CVE-2023-38314, CVE-2023-38315 [bluewavenet]
  * Fix - remove deprecated and non-functioning unescape callback - CVE-2023-38316 [bluewavenet]
  * Fix - prevent potential recursive dependency and detect if conflicting package is installed [bluewavenet]


Signed-off-by: Rob White <rob@blue-wave.net>
2023-07-31 07:46:50 +02:00
Moritz Warning
967dde509b nodogsplash: remove opennds from conflicts
OpenNDS lists nodogsplash a conflict as well.
This causes a circular reference that is not allowed.

Signed-off-by: Moritz Warning <moritzwarning@web.de>
2023-07-29 19:00:42 +02:00
Nick Hainke
eb8978ebf7 babeld: update to 1.13.1
Announcement:
https://alioth-lists.debian.net/pipermail/babel-users/2023-July/004125.html

Remove upstreamed patch:
- 100-local-make-local_kind-function-accessible.patch

Refresh patch:
- 600-add-ubus.patch

Signed-off-by: Nick Hainke <vincent@systemli.org>
2023-07-29 10:43:35 +02:00
Moritz Warning
91e07907fa nodogsplash: update to 5.0.1
Signed-off-by: Moritz Warning <moritzwarning@web.de>
2023-07-23 21:53:27 +02:00
Marek Küthe
0221a2a001 quagga: Remove, as is no longer being developed
Closes https://github.com/openwrt/routing/issues/994

Signed-off-by: Marek Küthe <m.k@mk16.de>
2023-07-22 19:09:10 +02:00
Josef Schlehofer
c7bc308c78
Merge pull request #995 from marek22k/master
bird1: Remove, as EOL has been reached
2023-07-21 20:01:49 +02:00
Marek Küthe
fa136b70df
bird1: Remove, as EOL has been reached
Closes https://github.com/openwrt/routing/issues/993

Deprecation:
https://marc.info/?l=bird-users&m=168682998827356&w=2
https://trubka.network.cz/pipermail/bird-users/attachments/20230615/8517953d/attachment.pdf

Signed-off-by: Marek Küthe <m.k@mk16.de>
2023-07-21 15:13:13 +02:00
Nick Hainke
9e13652bbf babeld: update to 1.13
Announcement:
https://alioth-lists.debian.net/pipermail/babel-users/2023-July/004100.html

Babeld removed diversity routing [0], so we need to adjust ubus
bindings. Further. we need to add a patch that makes local_kind
accessible again: "100-local-make-local_kind-function-accessible.patch"

Refresh patches:
- 600-add-ubus.patch

[0] - a081608335

Signed-off-by: Nick Hainke <vincent@systemli.org>
2023-07-19 00:48:52 +02:00