Commit Graph

17776 Commits

Author SHA1 Message Date
Michael Tremer
4f2a9813c0 make.sh: Add some commands to build Rust packages
This is a small set of commands that will be needed to build Rust
packages.

The idea is to have a couple of macros which do not have to rewritten,
but can be customised across the lfs files.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-01 13:50:32 +00:00
Michael Tremer
c9fb880835 jq: New package
This allows parsing JSON strings on the console

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-01 13:50:32 +00:00
Michael Tremer
c75e90c8dc make.sh: Set a good default for rustc flags
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-02-01 13:48:24 +00:00
Arne Fitzenreiter
6b184642d2 leds: fix R4S sys led name at shutdown
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-30 08:50:22 +00:00
Arne Fitzenreiter
2ebbe5e105 core164: add u-boot and initskript for leds and partresize
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-29 20:36:23 +00:00
Arne Fitzenreiter
75c9d8c20c u-boot: add/fix NanoPi R2S and R4S
-update arm-trusted firmware to 2.6
-fix mac address generation on R2S because the CPUID fuses are not uniqe
-add support for NanoPi R4S

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-29 20:32:02 +00:00
Arne Fitzenreiter
75ccf29897 initskript leds: add NanoPi R4S
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-29 20:31:12 +00:00
Arne Fitzenreiter
b2b4417857 kernel: update to 5.15.17
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-29 20:30:21 +00:00
Peter Müller
15de7a78fe Revert "perl-libwww: Update to version 6.60 and rename from libwww-perl to perl-libwww"
This reverts commit 976b84ccb6.

See: https://bugzilla.ipfire.org/show_bug.cgi?id=12769#c4

Reported-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Cc: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-29 09:40:36 +00:00
Peter Müller
12f867444d Revert "Core Update 164: Ship perl-libwww and delete obsolete files"
This reverts commit e0a904f56a.

See: https://bugzilla.ipfire.org/show_bug.cgi?id=12769#c4

Reported-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Cc: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-29 09:38:56 +00:00
Peter Müller
397050eb22 Merge branch 'next' into temp-c164-development 2022-01-29 09:38:37 +00:00
Arne Fitzenreiter
7ef1698217 Merge branch 'next' of git.ipfire.org:/pub/git/ipfire-2.x into next 2022-01-28 14:49:50 +00:00
Arne Fitzenreiter
d68f875d61 kernel: enable support for compressed firmwares
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-28 14:44:03 +00:00
Arne Fitzenreiter
e385c965fa kernel: aarch64 enable KVM support
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-28 11:24:44 +00:00
Peter Müller
3bd2e49dda Core Update 164: Ship log.dat
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-25 17:34:05 +00:00
Matthias Fischer
8f58e6612b log.dat: Fix an error with 'monit' logging too much data.
Making the regex "non-greedy" fixes an error Jon found.

'monit' logged a whole line from '/var/log/messages' where it should only log the first part.

Reference:
https://www.ultraedit.com/support/tutorials-power-tips/ultraedit/non-greedy-perl-regex.html

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-25 17:33:00 +00:00
Peter Müller
e0a904f56a Core Update 164: Ship perl-libwww and delete obsolete files
Reported-by: Arne Fitzenreiter <arne.fitzenreiter@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-25 16:50:26 +00:00
Peter Müller
e0d7964a6c Core Update 164: Ship Bind
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-25 16:39:13 +00:00
Matthias Fischer
ebbe05695d bind: Update to 9.11.25
For details (v9.16.22-v9.16.25) see:
https://downloads.isc.org/isc/bind9/9.16.25/doc/arm/html/notes.html#notes-for-bind-9-16-25

"Notes for BIND 9.16.25
Feature Changes

    Overall memory use by named has been optimized and reduced,
    especially on systems with many CPU cores. The default memory
    allocator has been switched from internal to external. A new
    command-line option -M internal allows named to be started with the
    old internal memory allocator. [GL #2398]

Bug Fixes

    On FreeBSD, TCP connections leaked a small amount of heap memory,
    leading to an eventual out-of-memory problem. This has been fixed.
    [GL #3051]

    If signatures created by the ZSK were expired and the ZSK private
    key was offline, the signatures were not replaced. This behavior has
    been amended to replace the expired signatures with new signatures
    created using the KSK. [GL #3049]

    Under certain circumstances, the signed version of an inline-signed
    zone could be dumped to disk without the serial number of the
    unsigned version of the zone. This prevented resynchronization
    of the zone contents after named restarted, if the unsigned zone
    file was modified while named was not running. This has been fixed.
    [GL #3071]
...
"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2022-01-25 16:39:02 +00:00
Peter Müller
e975769800 Core Update 164: Ship pciutils
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-25 16:38:23 +00:00
Peter Müller
34a98832ee pciutils: Update to 3.7.0
Please refer to https://git.kernel.org/pub/scm/utils/pciutils/pciutils.git/log/
for a history of this release. Sourcecode retrieved from https://mj.ucw.cz/download/linux/pci/ .

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-25 16:38:09 +00:00
Peter Müller
b0759cc31c Core Update 164: Ship libyang
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-25 16:35:29 +00:00
Michael Tremer
b0fbd41651 frr: Depend on elfutils
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2022-01-25 16:35:12 +00:00
Michael Tremer
853717ba40 libyang: Include in the core distribution
This isn't only a build dependency for FRR, but is required at runtime
as well.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2022-01-25 16:35:05 +00:00
Arne Fitzenreiter
8b4396559b network-aqm: don't set cake for imq/ifb devices
fixes: #12765

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-24 16:19:26 +00:00
Arne Fitzenreiter
e22b42571a libvirt: enabled on aarch64
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-23 08:03:06 +00:00
Arne Fitzenreiter
8d01ff736d qemu: enable on and for all supported architectures
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-22 09:51:03 +00:00
Arne Fitzenreiter
48ec07649f qemu-ga: resolve conflict by using binary from qemu built
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-21 16:23:00 +00:00
Arne Fitzenreiter
0aec7cbf41 core164: add kernel to update
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-21 10:09:22 +00:00
Arne Fitzenreiter
c18dda556b kernel: update to 5.15.16
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-21 10:06:22 +00:00
Peter Müller
9f3f612a5f Core Update 164: Ship and apply sysctl changes
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-19 17:47:19 +00:00
Peter Müller
d21e6d94cb sysctl.conf: Enable Loose Reverse Path Filter according to RFC 3704
For historical reasons, we were always reluctant to reverse path
filtering, since configuration changes were tricky to evaluate for a
larger userbase, IPFire permits a number of complex scenarios, and due
to limited resources.

As a compromise, this patch suggests to enable Loose Reverse Path
Filtering, as specified in RFC 3704 (section 2.4), to gain at least some
security achievement on this end.

To quote from that:

   Loose Reverse Path Forwarding (Loose RPF) is algorithmically similar
   to strict RPF, but differs in that it checks only for the existence
   of a route (even a default route, if applicable), not where the route
   points to.  Practically, this could be considered as a "route
   presence check" ("loose RPF is a misnomer in a sense because there is
   no "reverse path" check in the first place).

   The questionable benefit of Loose RPF is found in asymmetric routing
   situations: a packet is dropped if there is no route at all, such as
   to "Martian addresses" or addresses that are not currently routed,
   but is not dropped if a route exists.

There is no legitimate reason why we cannot enable this: If IPFire
receives a packet on some interface it cannot route on _any_ interface
at all, there is no sense in processing it.

While testing this change, I was unable to produce a situation where it
actually causes any harm. In theory, it shouldn't do so anyways.

In the future, we will hopefully be able to set these sysctl's to "1",
using Strict Reverse Path Filtering, as specified in RFC 3704 (section
2.2). Doing so was found to work fine in my testing environment as well,
but there is no asymmetric routing in place there.

Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-19 17:45:04 +00:00
smooky@v16.de
df0635abb5 New Addons: qemu-ga 6.0.1 second try
>>> https://www.qemu.org/ <<<

source = https://download.qemu.org/qemu-6.0.1.tar.xz

Hi @ all

I have the addon qemu-ga for people who virtualize IPFire and to read the status
without having to install the whole qemu package.
Modified following Michael's suggestions.

Signed-off-by: Marcel Follert (Smooky) <smooky@v16.de>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
2022-01-18 21:26:56 +00:00
Peter Müller
21b0eff643 Core Update 164: Ship shadow
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-18 21:23:59 +00:00
Adolf Belka
5b28df47a5 shadow: Update to version 4.11.1 and fix bug 12762
- Update from 4.2.1 (2015) to 4.11.1 (2021)
- Update rootfile
- Update patch for suppression of groups installation
- Change default hash from sha512 to yescrypt in lfs and logins.def
- Changelog
   * Release 4.11.1
     * build: include lib/shadowlog_internal.h in dist tarballs (Sam James)
   * Release 4.11
     * Handle possible TOCTTOU issues in usermod/userdel (edneville)
       * (CVE-2013-4235)
       * Use O_NOFOLLOW when copying file
       * Kill all user tasks in userdel
     * Fix useradd -D segfault (Xi Ruoyao)
     * Clean up obsolete libc feature-check ifdefs (Alejandro Colomar)
     * Fix -fno-common build breaks due to duplicate Prog declarations
       (Adam Sampson)
     * Have single date_to_str definition (Alejandro Colomar)
     * Fix libsubid SONAME version (Sam James)
     * Clarify licensing info, use SPDX.
   * Release 4.10
      Note: From this release forward, su from this package should be
             considered deprecated. Please replace any users of it with su from
             util-linux. Please open an issue if there is a problem with that.
            We intend to remove it in an upcoming release.
            This release features many fixes expecially to the building of
             libsubid, some SELinux labeling issues, and a few signaling
             issues.
     * libsubid fixes (Xi Ruoyao, Serge Hallyn, Iker Pedrosa, Mike Gilbert,
       GalaxyMaster, and Luís Ferreira)
     * Rename the test program list_subid_ranges to getsubids, write
       a manpage, so distros can ship it. (Iker Pedrosa)
     * Add libeconf dep for new*idmap (Iker Pedrosa)
     * Allow all group types with usermod -G (Iker Pedrosa)
     * Avoid useradd generating empty subid range (Iker Pedrosa)
     * Handle NULL pw_passwd (Jaroslav Jindrak)
     * Fix default value SHA_get_salt_rounds (Mike Gilbert)
     * Use https where possible in README (Paul Menzel)
     * Update content and format of README (Iker Pedrosa)
     * Translation updates (Balint Reczey, Frans Spiesschaert)
     * Switch from xml2po to itstool in 'make dist' (Serge Hallyn)
     * Fix double frees (Michael Vetter)
     * Add LOG_INIT configurable to useradd (Andy Zaugg)
     * Add CREATE_MAIL_SPOOL documentation (Andy Zaugg)
     * Create a security.md
     * Fix su never being SIGKILLd when trapping TERM (Ruihan li)
     * Fix wrong SELinux labels in several possible cases (Iker Pedrosa)
     * Fix missing chmod in chadowtb_move (GalaxyMaster)
     * Handle malformed hushlogins entries (Tobias Stoeckmann)
     * Fix groupdel segv when passwd does not exist (François Rigault)
     * Fix covscan-found newgrp segfault (Iker Pedrosa)
     * Remove trailing slash on hoedir (Ed Neville)
     * Fix passwd -l message - it does not change expirey (Ed Neville)
     * Fix SIGCHLD handling bugs in su and vipw (Tobias Stoeckmann)
     * Remove special case for "" in usermod (Alejandro Colomar)
     * Implement usermod -rG to remove a specific group
       (Andy Zaugg)
     * call pam_end() after fork in child path for su and login
       (Björn Fischer)
     * useradd: In absence of /etc/passwd, assume 0 == root
       (Ludwig Nussel)
     * lib: check NULL before freeing data (Iker Pedrosa)
     * Fix pwck segfault (Iker Pedrosa)
     * Release 4.9
        2021-07-22  Serge Hallyn <serge@hallyn.com>
	 * Updated translations (Björn Esser, Juergen Hoetzel)
     * Major salt updates (Björn Esser)
     * Various coverity and cleanup fixes (Iker Pedrosa)
     * Consistently use 0 to disable PASS_MIN_DAYS  in man (tzccinct)
     * Implement NSS support for subids and a libsubid (Serge Hallyn)
     * setfcap: retain setfcap when mapping uid 0 (Christian Brauner)
     * login.defs: include HMAC_CRYPTO_ALGO key (Iker Pedrosa)
     * selinux fixes (Christian Göttsche)
     * Fix path prefix path handling (Lucas Servén Marín)
     * Manpage updates (tzccinct, Sevan Janiyan, Iker Pedrosa, Geert Ijewski,
		谭九鼎, Jamin W. Collins, towerpark, andydna, Frans Spiesschaert)
     * Treat an empty passwd field as invalid (Haelwenn Monnier)
     * newxidmap: allow running under alternative gid (Martijn de Gouw)
     * usermod: check that  shell is executable (Geert Ijewski)
     * Add yescript support (Rodolphe Bréard)
     * useradd memleak fixes (whzhe)
     * useradd: use built-in settings by default (Ludwig Nussel)
     * getdefs: add foreign (non-shadow-utils) items (Karel Zak)
     * buffer overflow fixes (Tobias Stoeckmann)
     * Adding run-parts style for pre and post useradd/del (ed@s5h.net)
       2020-01-23  Serge Hallyn <serge@hallyn.com>
	* selinux: inclue stdio (Michael Vetter)
	* man: don't suggest making groupmems user-writeable (Michael Weiser)
	* Makefile: bail out on error in for loops (Wolfgang Bumiller)
	* Adding logging of SSH_ORIGINAL_COMMAND to nologin. (ed@s5h.net)
	* add new HOME_MODE login.defs option (Duncan Overbruck)
	* Add tty logging to useradd (ed@s5h.net)
	* Useradd: make non-executable shell check only a warning (Tomas Mraz)
	* Update Dutch translation (Frans-Spiesschaert)
	* user_busy: Do not mistake a regular user process for a namespaced one (Tomas Mraz)
	* Revert "Honor --sbindir and --bindir for binary installation" Patrick McLean)
       2019-12-20  Dave Reisner <dreisner@archlinux.org>
	* Do not auto-enable acct_tools_setuid just because
	  pam is enabled.  NOTE - any distros which are relying
	  on this behavior will need to switch to configure
	  --enable-account-tools-setuid
   * Release 4.8
       2019-12-01  Serge Hallyn <serge@hallyn.com>
	* Initial optional bcrypt support.
	* Make build/install of 'su' optional.
	* Fix for vipw not resuming correctly when suspended
	* Sync password field descriptions in manpages
	* Check for valid shell argument in useradd
	* Allow translation of new strings through POTFILES.in
	* Migrate to itstool for translations
	* Migrate to new SELinux api
	* Support --enable-vendordir
	* pwck: Only check homedir if set and not a system user
	* Support nonstandard usernames
	* sget{pw,gr}ent: check for data at EOL
	* Add YYY-MM-DD support in chage
	* Fix failing chmod calls for suidubins
	* Fix --sbindir and --bindir for binary installations
	* Fix LASTLOG_UID_MAX in login.defs
	* Fix configure error with dash
    * Release 4.7
       2019-06-13  Serge Hallyn <serge@hallyn.com>
	* Spawn: don't loop forever on ECHILD
	* Do not fail locking if there is a stale lockfile Tomas Mraz)
	* Use lckpwdf if prefix not set (Tomas Mraz)
	* Build: check correct DocBook version (Jan Tojnar)
	* Usermod: Print 'no changes' to stdout, not stderr (Serge Hallyn)
	* Add support for btrfs subvolumes for home (Adam Majer)
	* Fix chpasswd long line handling (Nathan Ruiz)
	* Use secure_getenv for gettime (Chris Lamb)
	* Make sp_lstchg reproducible (Chris Lamb)
	* Do not crash commonio_close if db file is not open (Tomas Mraz)
	* Don't flush nscd and sssd cache in read-only mode (Charlie Vuillemez)
	* French manpage update (Alban VIDAL)
	* Fix manpage defaults for SUB_UID/GID_COUNT (Tomas Mraz)
	* Sync po files from shadow.pot (Alban VIDAL)
	* Usermod: guard against unsafe chown of homedir contents (Tomas Mraz)
	* Add LASTLOG_UID_MAX to login.defs (Tomas Mraz)
	* new[ug]idmap file capabilities support (Giuseppe Scrivano and Christian Brauner)
	* Fix segfault in useradd (Tomas Mraz)
	* Coverity issues (Tomas Mraz)
	* Flush sssd caches (Jakub Hrozek)
	* Log UID in nologin (Vladimir Ivanov)
	* run pam_getenvlist after setup_env in su.c (Michael Vogt)
	* Support systems with only utmpx (A. Wilcox)
	* Fix unguarded ENABLE_SUBIDS code (Jan Chren (rindeal))
	* Update po/zh_CN translation (Lion Yang)
	* Create parent dirs for useradd -m (Michael Vetter)
	* Prevent usermod segv
	* Fix usermod crash (fariouche)
    * Release 4.6
       2018-04-29  Serge Hallyn <serge@hallyn.com>
	* Newgrp: avoid unnecessary lookups
	* Make language less binary
	* Add error when turning off man switch
	* Spelling fixes
	* Make userdel work with -R
	* newgidmap: enforce setgroups=deny if self-mapping a group
	* Norwegian bokmål translation
	* pwck: prevent crash by not passing O_CREAT
	* WITH_TCB fixes from Mandriva
	* Fix pwconv and grpconv entry skips
	* Fix -- slurping in su
	* add --prefix option
       2017-07-16  Serge Hallyn <serge@hallyn.com>
	* Import new Dutch translations.
       2017-07-10  Serge Hallyn <serge@hallyn.com>
	* Expand error codes for groupmod.
       2017-05-17  Serge Hallyn <serge@hallyn.com>
    * Release 4.5
       2017-05-17  Serge Hallyn <serge@hallyn.com>
	* Patch from Tobias Stoeckmann fixing regression in previous CVE fix
	  preventing SIGTERM to su from being propagated to the job.
	* Patch from Chris Lamb making sp_lstchg shadow field reproducible.
	* Merge Russian translation updates from Yuri Kozlov
	* Fix missing close of subuid file on error
       2017-02-23  Serge Hallyn <serge@hallyn.com>
	* Merge patch by Tobias Stoeckmann <tobias@stoeckmann.org> to fix
	  the equivalent of util-linux CVE-2017-2616.
       2017-02-08  Serge Hallyn <serge@hallyn.com>
	* Update Kazakh translations
	* Consult configuration before calculating subuids
	* Remove misplaced semicolon
       2017-01-29  Serge Hallyn <serge@hallyn.com>
	* Patch from Fedora to improve performance with SSSD, Winbind,
	  or nss_ldap. (Tomas Mraz)
	* Make sure knowndef_table is NULL-terminated.  (Bernhard Rosenkränzer)
       2016-12-21  Serge Hallyn <serge@hallyn.com>
	* Drop leading underscore from _COMMONIO_H and _SHADOWIO_H
	* Fix readability in usermod error messages.
	* Reset user in tallylog
	* Add audit support to su
    * Changes since 4.4
       2016-12-02  Serge Hallyn <serge@hallyn.com>
	  - Use sizeof rather than hardcoding snprintf args
	  - Fix useradd improper default loading
	  - Update Vietnamese translations
	  - Update Polish translations
	  - Remove non-POSIX chmod option in Makefile
	  - Fix suidubins assignments
	  - Fix --add-subuids etc spelling in manpages
	  - Audit homedir ownership change.
	  - Print error on selinux file context update failure
	  - Keep original file perms when creating a backup
    * Changes since 4.2.1:
       2016-12-02  Serge Hallyn <serge@hallyn.com>
	  - Documentation, error report and translations updates
	  - Replace path_max with 32
	  - User namespace support fixes/updates including:
	    - Correct sanity checks in newXidmap
	    - Fix building without subuid support
	    - Add /etc/subuid support for UID matching
	    - Support subuid for nonlocal users
	    - Default to 65536 subuid allocations
	    - Respect -r
	    - Check for range overflows
	  - Add tests from svn tree
	  - Use AC_CHECK_SIZEOF for uid_t size checks
	  - Accomodate missing /etc and login.defs
	  - Support FORCE_SHADOW
	  - Be more robust in hostile environment
	  - Allow removing a primary group
	  - Clear passwords on __pw_dup errors
	  - Memory leak fix in commonio_update and get_map_ranges
	  - Fix resource leak in syslog_sg
	  - Fix user busy error at userdel
	  - Support set/clear lastlog record via lastlog command
	  - Add --no-create-home as longopt for -M
	  - Fix signal races
	  - Reduce syslog priority of common usage events

Fixes: Bug 12762
Tested-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-18 21:23:42 +00:00
Michael Tremer
53e52b86df dnsdist: Upgrade to 1.7.0
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
2022-01-18 21:13:51 +00:00
Peter Müller
04581dfb77 Merge branch 'next' into temp-c164-development 2022-01-18 21:12:56 +00:00
Arne Fitzenreiter
99c7fefd7e core163: add missing core-files
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-17 13:26:08 +00:00
Arne Fitzenreiter
43adf2dce9 Merge branch 'cake' into next 2022-01-16 15:32:44 +00:00
Arne Fitzenreiter
b69f054b8d core163: add cake changes to updater
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-16 15:24:28 +00:00
Michael Tremer
f62ea5a998 QoS: Add CAKE profile to commmand line
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-16 15:17:50 +00:00
Michael Tremer
cfa06b67ee network-aqm: Use "conservative" setting for all PPP connections
This should be a better default than using VDSL2 since "conservative"
should work on all connections.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-16 15:17:50 +00:00
Michael Tremer
ca26f73220 qos.cgi: Add control to change link-layer encapsulation
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-16 15:17:50 +00:00
Michael Tremer
2d42f1df3b qos.cgi: Reindent change bandwidth window
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-16 15:17:50 +00:00
Michael Tremer
58d471a4a8 network-hotplug-bridges: Fix warning when address doesn't exist
Some devices do not have an address, which prints an error when reading
it.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-16 15:17:50 +00:00
Michael Tremer
546119da9e QoS: Replace fq_codel by CAKE
This is just swappin the qdisc without any further configuration.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-16 15:17:50 +00:00
Michael Tremer
ec0ba68a15 udev: Rename enable_codel to network-aqm
This is a more generic term since CoDel is no longer being used

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-16 15:17:50 +00:00
Michael Tremer
cfa5f916ea AQM: Use CAKE as default qdisc where appropriate instead of fq_codel
This script configures CAKE as default qdisc where appropriate:

* It is not suitable to use any queue management on bridges/GRE/VTI/tun
  interfaces.
* On Internet-facing interfaces, CAKE is configured in "internet" mode
  whereas on any zones except RED, it is configured in "metro" mode

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-16 15:17:50 +00:00
Arne Fitzenreiter
68a50dd12d installer: add partitions as installation source
This add compatiblity for rufus usb-keys that convert the
iso to fat or ntfs partition.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2022-01-16 13:46:36 +00:00
Peter Müller
7bcff23c61 Fix some more rootfiles
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-01-15 11:28:04 +00:00