Since commit d18692c libxml2 is linked against iconv. Now ices needs
access to iconv as well. Without it the build fails.
checking for ftime... yes
checking for XML configuration
checking for xml2-config... /builder/shared-workdir/build/sdk/staging_dir/target-aarch64_generic_musl/host/bin/xml2-config
checking for xmlParseFile... no
configure: error: Unable to link with libxml
Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
Since commit d18692c libxml2 is linked against iconv. Now libxslt needs
access to iconv as well. Without it the build fails.
Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
Added a check for macOS 11 and newer to resolve a compile error:
*** Unexpected product version 11.2.
Added Internals::getcwd.
Fallback to the built-in getcwd to resolve compile errors on macOS:
Can't locate Errno.pm in @INC
/miniperl not found
Signed-off-by: Georgi Valkov <gvalkov@abv.bg>
The SVN-based version has not changed in years. Many distros use this
fork as evident here: https://github.com/streambinder/vpnc/issues/14
Compile tested against GnuTLS and OpenSSL on ramips target.
Fixes#14119.
Signed-off-by: Ilya Lipnitskiy <ilya.lipnitskiy@gmail.com>
Add a hotplug.d-extension that automatically configures babeld for
meshing via wireguard interfaces.
It checks for "add" and "remove" of a wireguard interface with name
"wg_*". Depending on the action, it removes it from the babeld config
or adds the interface and reloads babeld.
Signed-off-by: Nick Hainke <vincent@systemli.org>
Package oci-runtime-tool itself as well as oci-runtime-tests containing
runtime validation test executables as well as rootfs tarballs used by
the tests.
oci-runtime-tool can be used to generate OCI spec files or validate
OCI bundles.
To validate the OCI runtime (runc, crun, uxc, maybe others) itself,
install the 'oci-runtime-tests' package as well as 'node-npm', use
npm to install node-tap and symlink the tap executable to /usr/bin.
Then
cd /usr/libexec/oci-runtime-tests
tap *.t
Signed-off-by: Daniel Golle <daniel@makrotopia.org>
Instead of hard disabling iconv support, just rely on the global setting.
Signed-off-by: Sebastian Kemper <sebastian_ml@gmx.net>
Signed-off-by: Michael Heimpold <mhei@heimpold.de>
Currently, we called `/usr/libexec/login.sh` as login command, but unfortunately the auth
is disabled by default in it[1], and this is really serious as it could be a free "backdoor"
for any spoiler who has conntectd to the router via LAN or wireless.
In my option, it shouldn't be exposed to anyone without auth, so I set the default login
command to `/bin/login`. And for those who really want that, they can do it themselves.
1. `login.sh` adjusts whether use authentication or not from system config named ttylogin,
which is set to disabled by default. See package/base-files/files/bin/config_generate#L243.
Signed-off-by: Tianling Shen <cnsztl@project-openwrt.eu.org>
3dc6c0af Bump version number to 1.43.0
e8762781 Update AUTHORS
2bf841e2 workflow: Build with UBSAN enabled
7ebab98e Merge pull request #1548 from nghttp2/py3-bindings
23fc6cc9 Bump Linux runner OS to ubuntu 20.04
2e35cdea Update doc
22af8e78 Require python3 for python bindings
c88e9100 Update ax_python_devel.m4
43ba3125 Merge pull request #1547 from nghttp2/sphinx-v3.3
3c17299a Update enum references
a7ecff65 Make doc generation work with sphinx v3.3
79a4f789 Merge pull request #1546 from nghttp2/py3-scripts
28ba0b37 Update document reference
6b7ade9f Require python3 for python scripts
46536729 Bump clang-format to 10
563c1173 Merge pull request #1544 from nghttp2/nghttpx-clear-mcpool
1c04ca80 Merge pull request #1540 from tavrez/patch-1
d32e20bc nghttpx: Make sure that Pool gets cleared when all buffers are returned
8b8ba6b0 Merge pull request #1542 from nghttp2/nghttpx-check-sigalg
81fb0153 nghttpx: Choose ECDSA cert if compatible signature algorithm available
d8c71d5f Added new nghttp2_ksl.c to Windows makefile
fb5b5aef Merge pull request #1537 from nghttp2/nghttpx-allow-colon-in-pattern
6787423e nghttpx: Add workaround to include ':' in backend pattern
ffcdf5df Merge pull request #1533 from LorenzNickel/patch-1
0cdb1738 Fix typo in security.rst
c9d5472f Bump version number to 1.43.0-DEV
15bd71ed Update manual pages
Signed-off-by: Hans Dedecker <dedeckeh@gmail.com>
* add 'ban_extrasources' to handle banIP-unrelated sets for reporting
and queries
* add set timeouts for local sources (maclist, whitelist, blacklist)
Signed-off-by: Dirk Brenken <dev@brenken.org>
This tool can be used to automatically create wireguard tunnels. Using
rpcd a new wireguard interface is created on the server where the client
can connect to.
Wiregurad server automatically installs a user and associated ACL to use
the wireguard-installer-server features. The user is called wginstaller
and so is the password.
Get Usage:
wg-client-installer get_usage --ip 127.0.0.1 --user wginstaller
--password wginstaller
Register Interface:
wg-client-installer register --ip 127.0.0.1 --user wginstaller
--password wginstaller --bandwidth 10 --mtu 1400
Signed-off-by: Nick Hainke <vincent@systemli.org>