- Dec 16, 2022
-
-
Javier Marcet authored
This reverts commit 9cdc4a47.
-
Javier Marcet authored
This reverts commit 310d6c96.
-
Javier Marcet authored
This reverts commit 5cffe853.
-
Javier Marcet authored
This reverts commit e9617f55.
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Seccomp variant enables usage of sandboxing inside tor Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
autostart this alleviates the race condition we have with 'netns cleanup_net' Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Javier Marcet authored
Signed-off-by: Javier Marcet <javier@marcet.info>
-
Alexandru Ardelean authored
Signed-off-by: Alexandru Ardelean <ardeleanalex@gmail.com>
-
YiZhen Choo authored
Signed-off-by: YiZhen Choo <yizhen.c02@gmail.com>
-
- Dec 15, 2022
-
-
John Audia authored
Traditionally, Snort rules are based upon packet analysis. OpenAppID enables detection of applications/cloud applications on the network. This package provides OpenAppID and signature files used by OpenAppID to detect network traffic from certain applications can be used to identify rogue application use, detect malicious applications and implement various application policies, such as application blacklisting, limiting application usage, and enforcing conditional controls. To use, for example, edit /etc/snort/local.lua and add the following section at a minimum: appid = { app_detector_dir = '/usr/lib/openappid', log_stats = true, app_stats_period = 60, } Signed-off-by: John Audia <therealgraysky@proton.me>
-
Hannu Nyman authored
Update nano editor to version 7.1 * drop the backported upstream fix for 7.0 * drop AUTORELEASE * disable justify from 'plus'. Rarely needed with OpenWrt Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
-
Peter van Dijk authored
Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
-
- Dec 14, 2022
-
-
Tianling Shen authored
miniflux: update to 2.0.41
-
Toke Høiland-Jørgensen authored
acme: Export the canonical paths for certificates and challenges
-
Toke Høiland-Jørgensen authored
The haproxy hotplug script creates a 'combined' certificate bundle that contains both the certificate chain and the private key. However, having a daemon hotplug script write into CERT_DIR is not great; so let's provide the bundle as part of the main acme framework, keeping it in $domain_dir and just linking it into CERT_DIR. That way we can keep CERT_DIR as just a collection of links for everything, that no consumers should need to write into. Also make sure to set the umask correctly so the combined file is not world-readable (since it contains the private key). Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
-
Toke Høiland-Jørgensen authored
The acme-acmesh package hardcoded the certificate path in its hook script. Now that we export it as a variable we can avoid hard-coding and use the variable version instead. Also factor out the linking of certificates into a function so it's not repeated. Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
-
Toke Høiland-Jørgensen authored
The contract between the acme-common framework and consumers and hook scripts is that certificates can be consumed from /etc/ssl/acme and that web challenges are stored in /var/run/acme/challenge. Make this explicit by exporting $CERT_DIR and $CHALLENGE_DIR as environment variables as well, instead of having knowledge of those paths depend on out-of-band information. We already exported $challenge_dir, but let's change it to upper-case to make it clear that it's not a user configuration variable. Signed-off-by: Toke Høiland-Jørgensen <toke@toke.dk>
-
Doug Thomson authored
Perl threads seem to be supported and working for aarch64, and including aarch64 here would allow packages like freeswitch-mod-perl to become available from the standard OpwnWrt package repository for popular routers such as the Linksys E8450 and Belkin RT3200. Signed-off-by: Doug Thomson <dwt62f+github@gmail.com>
-
Tianling Shen authored
yt-dlp: update to 2022.11.11
-
源 文雨 authored
Encode binary files to printable utf16be. See more at https://github.com/fumiama/base16384 . Signed-off-by: 源 文雨 <fumiama@foxmail.com>
-
Toke Høiland-Jørgensen authored
acme: deprecate state_dir
-
Alexandru Ardelean authored
python-pycares: bump to 4.3.0
-
Glen Huang authored
Signed-off-by: Glen Huang <i@glenhuang.com>
-
Glen Huang authored
state_dir is actually a hardcoded value in conffiles. Allowing users to customize it could result in losing certificates after upgrading if they don't also specify the dir as being preserved. We shouldn't default to this dangerous behavior. With the new ACME package, certificates live in the standard location /etc/ssl/acme, users who need to do certificate customizations should look for them in that dir instead. Signed-off-by: Glen Huang <i@glenhuang.com>
-
- Dec 13, 2022
-
-
Hannu Nyman authored
stress-ng: bump to version 0.15.00
-
Fabian Lipken authored
Signed-off-by: Fabian Lipken <dynasticorpheus@gmail.com>
-
Michal Vasilek authored
Signed-off-by: Michal Vasilek <michal.vasilek@nic.cz>
-