mirror of
https://github.com/novatiq/packages.git
synced 2026-04-30 15:38:40 +01:00
wireguard: bump to release 0.0.20171005 for 17.01
WireGuard is well documented for being an experimental project, not currently ready to be stabilized. As such, it's important for packagers to always keep the project up to date in all contexts. However, it is common for some projects, such as LEDE/OpenWrt to have stable branches, which don't expect a lot of churn or modification. The WireGuard that happened to ship with 17.01 is broken and crufty and shouldn't be used at all. It's highly unlikely that there's anybody out there even using it; it won't work with anything else. So, this commit updates the 17.01 package to the latest upstream version. Because the 17.01 stable branch can't be updated all the time, it's important that this bump here in this commit is a stable one. I believe 0.0.20171005 to be a fairly stable snapshot, which should be suitable for the 17.01 branch. As stated earlier, the 0.0.20170115 currently in this branch is highly problematic. 0.0.20171005 offers extremely important changes. I'll continue to send package bumps for 17.01, but only for snapshot releases that I think fix an important bug or provide a noted increase in stability, or have similar goals to this commit. Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
This commit is contained in:
+14
-8
@@ -1,5 +1,5 @@
|
|||||||
#
|
#
|
||||||
# Copyright (C) 2016 Jason A. Donenfeld <Jason@zx2c4.com>
|
# Copyright (C) 2016-2017 Jason A. Donenfeld <Jason@zx2c4.com>
|
||||||
# Copyright (C) 2016 Baptiste Jonglez <openwrt@bitsofnetworks.org>
|
# Copyright (C) 2016 Baptiste Jonglez <openwrt@bitsofnetworks.org>
|
||||||
# Copyright (C) 2016-2017 Dan Luedtke <mail@danrl.com>
|
# Copyright (C) 2016-2017 Dan Luedtke <mail@danrl.com>
|
||||||
#
|
#
|
||||||
@@ -11,12 +11,12 @@ include $(INCLUDE_DIR)/kernel.mk
|
|||||||
|
|
||||||
PKG_NAME:=wireguard
|
PKG_NAME:=wireguard
|
||||||
|
|
||||||
PKG_VERSION:=0.0.20170115
|
PKG_VERSION:=0.0.20171005
|
||||||
PKG_RELEASE:=1
|
PKG_RELEASE:=1
|
||||||
|
|
||||||
PKG_SOURCE:=WireGuard-$(PKG_VERSION).tar.xz
|
PKG_SOURCE:=WireGuard-$(PKG_VERSION).tar.xz
|
||||||
PKG_SOURCE_URL:=https://git.zx2c4.com/WireGuard/snapshot/
|
PKG_SOURCE_URL:=https://git.zx2c4.com/WireGuard/snapshot/
|
||||||
PKG_MD5SUM:=7e5f9f4699a2d4ace90d0df5d81bf0f67205ee08c45b95e0acc379bedef5ffe8
|
PKG_HASH:=832a3b7cbb510f6986fd0c3a6b2d86bc75fc9f23b6754d8f46bc58ea8e02d608
|
||||||
|
|
||||||
PKG_LICENSE:=GPL-2.0
|
PKG_LICENSE:=GPL-2.0
|
||||||
PKG_LICENSE_FILES:=COPYING
|
PKG_LICENSE_FILES:=COPYING
|
||||||
@@ -33,9 +33,12 @@ include $(INCLUDE_DIR)/package.mk
|
|||||||
define Package/wireguard/Default
|
define Package/wireguard/Default
|
||||||
SECTION:=net
|
SECTION:=net
|
||||||
CATEGORY:=Network
|
CATEGORY:=Network
|
||||||
URL:=https://www.wireguard.io
|
SUBMENU:=VPN
|
||||||
|
URL:=https://www.wireguard.com
|
||||||
MAINTAINER:=Baptiste Jonglez <openwrt@bitsofnetworks.org>, \
|
MAINTAINER:=Baptiste Jonglez <openwrt@bitsofnetworks.org>, \
|
||||||
Dan Luedtke <mail@danrl.com>
|
Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>, \
|
||||||
|
Dan Luedtke <mail@danrl.com>, \
|
||||||
|
Jason A. Donenfeld <Jason@zx2c4.com>
|
||||||
endef
|
endef
|
||||||
|
|
||||||
define Package/wireguard/Default/description
|
define Package/wireguard/Default/description
|
||||||
@@ -44,8 +47,7 @@ define Package/wireguard/Default/description
|
|||||||
more useful than IPSec, while avoiding the massive headache. It intends to
|
more useful than IPSec, while avoiding the massive headache. It intends to
|
||||||
be considerably more performant than OpenVPN. WireGuard is designed as a
|
be considerably more performant than OpenVPN. WireGuard is designed as a
|
||||||
general purpose VPN for running on embedded interfaces and super computers
|
general purpose VPN for running on embedded interfaces and super computers
|
||||||
alike, fit for many different circumstances.
|
alike, fit for many different circumstances. It uses UDP.
|
||||||
It runs over UDP.
|
|
||||||
endef
|
endef
|
||||||
|
|
||||||
define Package/wireguard
|
define Package/wireguard
|
||||||
@@ -65,6 +67,10 @@ define Build/Compile
|
|||||||
$(call Build/Compile/Default)
|
$(call Build/Compile/Default)
|
||||||
endef
|
endef
|
||||||
|
|
||||||
|
define Package/wireguard/install
|
||||||
|
true
|
||||||
|
endef
|
||||||
|
|
||||||
define Package/wireguard/description
|
define Package/wireguard/description
|
||||||
$(call Package/wireguard/Default/description)
|
$(call Package/wireguard/Default/description)
|
||||||
endef
|
endef
|
||||||
@@ -94,7 +100,7 @@ define KernelPackage/wireguard
|
|||||||
CATEGORY:=Kernel modules
|
CATEGORY:=Kernel modules
|
||||||
SUBMENU:=Network Support
|
SUBMENU:=Network Support
|
||||||
TITLE:=Wireguard kernel module
|
TITLE:=Wireguard kernel module
|
||||||
DEPENDS:=+IPV6:kmod-udptunnel6 +kmod-udptunnel4 +kmod-ipt-hashlimit
|
DEPENDS:=+IPV6:kmod-udptunnel6 +kmod-udptunnel4
|
||||||
FILES:= $(PKG_BUILD_DIR)/src/wireguard.$(LINUX_KMOD_SUFFIX)
|
FILES:= $(PKG_BUILD_DIR)/src/wireguard.$(LINUX_KMOD_SUFFIX)
|
||||||
AUTOLOAD:=$(call AutoProbe,wireguard)
|
AUTOLOAD:=$(call AutoProbe,wireguard)
|
||||||
endef
|
endef
|
||||||
|
|||||||
@@ -21,7 +21,7 @@ proto_wireguard_init_config() {
|
|||||||
proto_config_add_string "private_key"
|
proto_config_add_string "private_key"
|
||||||
proto_config_add_int "listen_port"
|
proto_config_add_int "listen_port"
|
||||||
proto_config_add_int "mtu"
|
proto_config_add_int "mtu"
|
||||||
proto_config_add_string "preshared_key"
|
proto_config_add_string "fwmark"
|
||||||
available=1
|
available=1
|
||||||
no_proto_task=1
|
no_proto_task=1
|
||||||
}
|
}
|
||||||
@@ -31,6 +31,7 @@ proto_wireguard_setup_peer() {
|
|||||||
local peer_config="$1"
|
local peer_config="$1"
|
||||||
|
|
||||||
local public_key
|
local public_key
|
||||||
|
local preshared_key
|
||||||
local allowed_ips
|
local allowed_ips
|
||||||
local route_allowed_ips
|
local route_allowed_ips
|
||||||
local endpoint_host
|
local endpoint_host
|
||||||
@@ -38,6 +39,7 @@ proto_wireguard_setup_peer() {
|
|||||||
local persistent_keepalive
|
local persistent_keepalive
|
||||||
|
|
||||||
config_get public_key "${peer_config}" "public_key"
|
config_get public_key "${peer_config}" "public_key"
|
||||||
|
config_get preshared_key "${peer_config}" "preshared_key"
|
||||||
config_get allowed_ips "${peer_config}" "allowed_ips"
|
config_get allowed_ips "${peer_config}" "allowed_ips"
|
||||||
config_get_bool route_allowed_ips "${peer_config}" "route_allowed_ips" 0
|
config_get_bool route_allowed_ips "${peer_config}" "route_allowed_ips" 0
|
||||||
config_get endpoint_host "${peer_config}" "endpoint_host"
|
config_get endpoint_host "${peer_config}" "endpoint_host"
|
||||||
@@ -47,6 +49,9 @@ proto_wireguard_setup_peer() {
|
|||||||
# peer configuration
|
# peer configuration
|
||||||
echo "[Peer]" >> "${wg_cfg}"
|
echo "[Peer]" >> "${wg_cfg}"
|
||||||
echo "PublicKey=${public_key}" >> "${wg_cfg}"
|
echo "PublicKey=${public_key}" >> "${wg_cfg}"
|
||||||
|
if [ "${preshared_key}" ]; then
|
||||||
|
echo "PresharedKey=${preshared_key}" >> "${wg_cfg}"
|
||||||
|
fi
|
||||||
for allowed_ip in $allowed_ips; do
|
for allowed_ip in $allowed_ips; do
|
||||||
echo "AllowedIPs=${allowed_ip}" >> "${wg_cfg}"
|
echo "AllowedIPs=${allowed_ip}" >> "${wg_cfg}"
|
||||||
done
|
done
|
||||||
@@ -77,9 +82,15 @@ proto_wireguard_setup_peer() {
|
|||||||
*:*/*)
|
*:*/*)
|
||||||
proto_add_ipv6_route "${allowed_ip%%/*}" "${allowed_ip##*/}"
|
proto_add_ipv6_route "${allowed_ip%%/*}" "${allowed_ip##*/}"
|
||||||
;;
|
;;
|
||||||
*/*)
|
*.*/*)
|
||||||
proto_add_ipv4_route "${allowed_ip%%/*}" "${allowed_ip##*/}"
|
proto_add_ipv4_route "${allowed_ip%%/*}" "${allowed_ip##*/}"
|
||||||
;;
|
;;
|
||||||
|
*:*)
|
||||||
|
proto_add_ipv6_route "${allowed_ip%%/*}" "128"
|
||||||
|
;;
|
||||||
|
*.*)
|
||||||
|
proto_add_ipv4_route "${allowed_ip%%/*}" "32"
|
||||||
|
;;
|
||||||
esac
|
esac
|
||||||
done
|
done
|
||||||
fi
|
fi
|
||||||
@@ -94,7 +105,6 @@ proto_wireguard_setup() {
|
|||||||
local private_key
|
local private_key
|
||||||
local listen_port
|
local listen_port
|
||||||
local mtu
|
local mtu
|
||||||
local preshared_key
|
|
||||||
|
|
||||||
# load configuration
|
# load configuration
|
||||||
config_load network
|
config_load network
|
||||||
@@ -102,7 +112,7 @@ proto_wireguard_setup() {
|
|||||||
config_get listen_port "${config}" "listen_port"
|
config_get listen_port "${config}" "listen_port"
|
||||||
config_get addresses "${config}" "addresses"
|
config_get addresses "${config}" "addresses"
|
||||||
config_get mtu "${config}" "mtu"
|
config_get mtu "${config}" "mtu"
|
||||||
config_get preshared_key "${config}" "preshared_key"
|
config_get fwmark "${config}" "fwmark"
|
||||||
|
|
||||||
# create interface
|
# create interface
|
||||||
ip link del dev "${config}" 2>/dev/null
|
ip link del dev "${config}" 2>/dev/null
|
||||||
@@ -122,8 +132,8 @@ proto_wireguard_setup() {
|
|||||||
if [ "${listen_port}" ]; then
|
if [ "${listen_port}" ]; then
|
||||||
echo "ListenPort=${listen_port}" >> "${wg_cfg}"
|
echo "ListenPort=${listen_port}" >> "${wg_cfg}"
|
||||||
fi
|
fi
|
||||||
if [ "${preshared_key}" ]; then
|
if [ "${fwmark}" ]; then
|
||||||
echo "PresharedKey=${preshared_key}" >> "${wg_cfg}"
|
echo "FwMark=${fwmark}" >> "${wg_cfg}"
|
||||||
fi
|
fi
|
||||||
config_foreach proto_wireguard_setup_peer "wireguard_${config}"
|
config_foreach proto_wireguard_setup_peer "wireguard_${config}"
|
||||||
|
|
||||||
@@ -164,7 +174,6 @@ proto_wireguard_setup() {
|
|||||||
sed -E 's/\[?([0-9.:a-f]+)\]?:([0-9]+)/\1 \2/' | \
|
sed -E 's/\[?([0-9.:a-f]+)\]?:([0-9]+)/\1 \2/' | \
|
||||||
while IFS=$'\t ' read -r key address port; do
|
while IFS=$'\t ' read -r key address port; do
|
||||||
[ -n "${port}" ] || continue
|
[ -n "${port}" ] || continue
|
||||||
echo "adding host depedency for ${address} at ${config}"
|
|
||||||
proto_add_host_dependency "${config}" "${address}"
|
proto_add_host_dependency "${config}" "${address}"
|
||||||
done
|
done
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user