Commit Graph

4535 Commits

Author SHA1 Message Date
CN_SZTL
5b7fa4ea6c
luci-app-diskman: bump to 0.2.7 2020-04-01 23:09:40 +08:00
CN_SZTL
2fda412016
luci-app-clash: sync with upstream source 2020-04-01 23:08:57 +08:00
AmadeusGhost
ed025d9baa config: enable ext4 rootfs and gzip
Also disable for x86 by default
2020-04-01 16:08:54 +08:00
CN_SZTL
b9749d61aa
kernel: bump 4.9 to 4.9.217
Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2020-04-01 07:52:10 +08:00
CN_SZTL
211fbcc199
kernel: bump 4.19 to 4.19.113
Remove upstream patches:
- 600-ipv6-addrconf-call-ipv6_mc_up-for-non-Ethernet-inter.patch

Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2020-04-01 07:37:21 +08:00
CN_SZTL
9a4de1f5a2
kernel: bump 4.14 to 4.14.174
Remove upstream patches:
- 600-ipv6-addrconf-call-ipv6_mc_up-for-non-Ethernet-inter.patch

Signed-off-by: CN_SZTL <cnsztl@project-openwrt.eu.org>
2020-04-01 06:32:54 +08:00
CN_SZTL
33733198bf
openssl: bump to 1.1.1f 2020-04-01 04:37:25 +08:00
CN_SZTL
812d2269a6
treewide: adjust category 2020-04-01 04:22:40 +08:00
CN_SZTL
2e31e7cca1
luci-app-vssr: sync with upstream source 2020-04-01 01:56:58 +08:00
CN_SZTL
bdf61153ef
luci-theme-argonv3: sync with upstream source 2020-04-01 01:56:09 +08:00
CN_SZTL
11acb1c361
Mod 20.04 2020-04-01 00:02:42 +08:00
CN_SZTL
bdbf97d25f
Merge Lean's source 2020-03-31 23:37:48 +08:00
CN_SZTL
b497f1d9f4
Pcap_DNSProxy: update repo link
This solve ElonH/testAction#22
2020-03-31 23:37:15 +08:00
CN_SZTL
f8bd6e09a0
openssl: revert EOF detection change in 1.1.1 (#4127)
This adds patches to avoid possible application breakage caused by a
change in behavior introduced in 1.1.1e.  It affects at least nginx,
which logs error messages such as:
nginx[16652]: [crit] 16675#0: *358 SSL_read() failed (SSL: error:
4095126:SSL routines:ssl3_read_n:unexpected eof while reading) while
keepalive, client: xxxx, server: [::]:443

Openssl commits db943f4 (Detect EOF while reading in libssl), and
22623e0 (Teach more BIOs how to handle BIO_CTRL_EOF) changed the
behavior when encountering an EOF in SSL_read().  Previous behavior was
to return SSL_ERROR_SYSCALL, but errno would still be 0.  The commits
being reverted changed it to SSL_ERRO_SSL, and add an error to the
stack, which is correct.  Unfortunately this affects a number of
applications that counted on the old behavior, including nginx.

The reversion was discussed in openssl/openssl#11378, and implemented as
PR openssl/openssl#11400.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>

Co-authored-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2020-03-31 23:14:35 +08:00
Mattraks
64db0fb90c
luci-app-cpufreq:Add translation (#4130) 2020-03-31 23:07:57 +08:00
CN_SZTL
30392b1872
iptables: xtables-restore: fix for --noflush and empty lines 2020-03-31 20:31:46 +08:00
CN_SZTL
4089bb6699
luci-app-clash: sync with upstream source 2020-03-31 20:09:33 +08:00
CN_SZTL
b641436657
luci-app-koolproxyR: sync with upstram source 2020-03-31 20:09:00 +08:00
CN_SZTL
ed53d6f734
OpenClash: sync with upstream source 2020-03-31 20:08:10 +08:00
Jason A. Donenfeld
0b90b55451
wireguard: bump to 1.0.20200330
* queueing: backport skb_reset_redirect change from 5.6
* version: bump

This release has only one slight change, to put it closer to the 5.6
codebase, but its main purpose is to bump us to a 1.0.y version number.
Now that WireGuard 1.0.0 has been released for Linux 5.6 [1], we can put
the same number on the backport compat codebase.

When OpenWRT bumps to Linux 5.6, we'll be able to drop this package
entirely, which I look forward to seeing.

[1] https://lists.zx2c4.com/pipermail/wireguard/2020-March/005206.html

Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
2020-03-31 19:54:01 +08:00
Álvaro Fernández Rojas
a74c9ca957
bcm27xx-gpu-fw: update to latest version from RPi foundation
Signed-off-by: Álvaro Fernández Rojas <noltari@gmail.com>
2020-03-31 19:54:00 +08:00
AmadeusGhost
cbef9a23e4 treewide: Revert improve sysupgrade support 2020-03-31 18:21:47 +08:00
ElonH
77d245bdfd
linux: config missing
Solarflare SFC9000/SFC9100-family MTD support (SFC_MTD) [Y/n/?] (NEW) aborted!
Solarflare SFC9000/SFC9100-family MCDI logging support (SFC_MCDI_LOGGING) [Y/n/?] (NEW) aborted!
2020-03-31 13:17:00 +08:00
CN_SZTL
d73ca39ef4
Merge Lean's source 2020-03-30 21:14:50 +08:00
lean
427e7ec56f luci-app-airplay2: open to all target 2020-03-30 20:33:09 +08:00
lean
32964d4b71 luci-app-airplay2: open to all target 2020-03-30 20:27:31 +08:00
Kevin Darbyshire-Bryant
9de293c406
jansson: import jansson from packages
Signed-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>
2020-03-30 19:50:14 +08:00
Hans Dedecker
f2f2071969
odhcp6c: update to latest git HEAD
f575351 ra: fix sending router solicitations

Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
2020-03-30 19:50:03 +08:00
Jesus Fernandez Manzano
59752dc5f0
hostapd: Add 802.11r support for WPA3-Enterprise
Signed-off-by: Jesus Fernandez Manzano <jesus.manzano@galgus.net>
2020-03-30 19:49:51 +08:00
DENG Qingfang
f329ca962b
curl: rebuild when libopenssl config changes
When some libopenssl options change curl will have to be rebuild to
adapt to those changes, avoiding undefined reference errors or features
disabled in curl.

Add CONFIG_OPENSSL_ENGINE, CONFIG_OPENSSL_WITH_COMPRESSION and
CONFIG_OPENSSL_WITH_NPN to PKG_CONFIG_DEPENDS so it will trigger
rebuild every time the options are changed.

Signed-off-by: DENG Qingfang <dengqf6@mail2.sysu.edu.cn>
2020-03-30 19:49:41 +08:00
CN_SZTL
fd3c3c8bcb
luci-app-clash: sync with upstream source 2020-03-30 19:47:06 +08:00
CN_SZTL
659c9a3dc9
luci-app-koolproxyR: sync with upstream source 2020-03-30 19:46:04 +08:00
CN_SZTL
2dfbadc21d
OpenClash: sync with upstream source 2020-03-30 19:41:07 +08:00
CN_SZTL
d4c69450b6
Merge Lean's source 2020-03-30 19:38:10 +08:00
AmadeusGhost
3a86ef8c46
mac80211: brcm: backport remaining 5.6 kernel patches (#4070)
* mac80211: brcm: backport remaining 5.6 kernel patches

* mac80211: fix brcmfmac monitor interface crash

This fixes bug in brcmfmac *exposed* by ipv6/addrconf fix.

Fixes: 6e4453aecc ("kernel: backport out-of-memory fix for non-Ethernet devices")
Signed-off-by: Rafał Miłecki <rafal@milecki.pl>

Co-authored-by: Rafał Miłecki <rafal@milecki.pl>
2020-03-30 12:18:10 +08:00
Mattraks
1188a9ffc3
luci-app-ssr-plus:Fix update.lua log output and file checking (#4085) 2020-03-30 12:17:19 +08:00
CN_SZTL
900f5680ed
Merge Lean's source 2020-03-30 01:26:49 +08:00
lean
aad03293fa x86: switch and optimize 4.19 kernel 2020-03-30 01:13:43 +08:00
CN_SZTL
c5f34946fa
base-files: profile: easy to use 2020-03-30 01:05:29 +08:00
CN_SZTL
2d0c9dd527
Merge Lean's source 2020-03-29 23:49:40 +08:00
lean
34f33cfcbe luci-app-airplay2: add audio sample rate setting 2020-03-29 23:08:18 +08:00
lean
c6f47f30df luci-app-airplay2: add audio buffer length setting 2020-03-29 23:03:57 +08:00
ElonH
dd3fdcfe1c
libtar: disable strip when non-x86 arch compile 2020-03-29 20:46:46 +08:00
CN_SZTL
f616ec9119
Merge Lean's source 2020-03-29 19:41:54 +08:00
lean
51fc01f88c luci-app-airplay2: add airplay2 for x86 2020-03-29 19:33:36 +08:00
CN_SZTL
62d313183e
luci-theme-Butterfly-dark: sync with upstream source 2020-03-29 18:02:28 +08:00
CN_SZTL
333e184cc6
luci-theme-Butterfly: sync with upstream source 2020-03-29 18:02:19 +08:00
CN_SZTL
8f0587190b
luci-app-clash: sync with upstream source 2020-03-29 18:00:43 +08:00
CN_SZTL
defee9f95e
luci-app-vssr: sync with upstream source 2020-03-29 17:58:51 +08:00
Eneas U de Queiroz
bf035d50fc
openssl: revert EOF detection change in 1.1.1
This adds patches to avoid possible application breakage caused by a
change in behavior introduced in 1.1.1e.  It affects at least nginx,
which logs error messages such as:
nginx[16652]: [crit] 16675#0: *358 SSL_read() failed (SSL: error:
4095126:SSL routines:ssl3_read_n:unexpected eof while reading) while
keepalive, client: xxxx, server: [::]:443

Openssl commits db943f4 (Detect EOF while reading in libssl), and
22623e0 (Teach more BIOs how to handle BIO_CTRL_EOF) changed the
behavior when encountering an EOF in SSL_read().  Previous behavior was
to return SSL_ERROR_SYSCALL, but errno would still be 0.  The commits
being reverted changed it to SSL_ERRO_SSL, and add an error to the
stack, which is correct.  Unfortunately this affects a number of
applications that counted on the old behavior, including nginx.

The reversion was discussed in openssl/openssl#11378, and implemented as
PR openssl/openssl#11400.

Signed-off-by: Eneas U de Queiroz <cotequeiroz@gmail.com>
2020-03-29 16:17:31 +08:00