The set_helper field has to be set by set_helper and not helper.
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
rules.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/rules.c b/rules.c
index ea66771..f6b6044 100644
--- a/rules.c
+++ b/rules.c
@@ -33,7 +33,7 @@
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
helpers.conf | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/helpers.conf b/helpers.conf
index 5591a8f..b8ae857 100644
--- a/helpers.conf
+++ b/helpers.conf
@@ -67,7 +67,7 @@ config helper
option descriptio
description 'SIP VoIP connection tracking'
option module 'nf_conntrack_sip'
option family 'any'
option proto 'tcpudp'
option port '5060'
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
helpers.c
An extra option (AllowedClientIPs:list) is available to allow
specific clients to use this service.
v2: do not create the firewall data if there is no valid interface.
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
.../network/services/dropbear/files/dropbear.init
ment "!fw3: ubus:dropbear[wan] rule 0" -j ACCEPT
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
package/network/services/dropbear/files/dropbear.init | 47
--
1 file changed, 44 insertions(+), 3 deletions(-)
diff --git a/package/network/services/dropb
We should use blobmsg_data() rather than blob_data() and
blobmsg_data_len() rather than blob_len().
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
service/service.c | 20 ++--
1 file changed, 10 insertions(+), 10 deletions(-)
diff --git a/service/service.c b/s
It gives the ability to create firewall rules within the service
itself and independently of the instances.
Changes since v1:
- align coding style
- if no instance is given (within the service), do not write it
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
ubus.
It gives the ability to create data within the service itself.
Change since v1:
- dump the data inside the service rather than in a "*" instance.
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
service/service.c | 44 +---
servic
Use the same approach than the service_triggers for the service_data.
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
package/base-files/files/etc/rc.common | 4
package/system/procd/files/procd.sh| 15 +++
2 files changed, 19 insertions(+)
diff --git a/p
It gives the ability to create firewall rules within the service
itself and independently of the instances.
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
ubus.c | 97 +-
1 file changed, 54 insertions(+), 43 del
est_port": "",
"target": "DROP"
},
{
"type": "rule",
"src": "wan",
The array concerning the "config.change" is __VALIDATE_MAX length,
not __DATA_MAX length.
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
service/service.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/service/service.c b/service/service.c
index
2017-10-04 12:54 GMT+02:00 Mathias Kresin <d...@kresin.me>:
> 2017-10-04 12:49 GMT+02:00 <pme.leb...@gmail.com>:
>> From: Pierre Lebleu <pme.leb...@gmail.com>
>>
>
> ^^^ and here should be an explanation why SERVICE_SET_NAME should be
> used in favour
for this service is called "*".
2017-10-04 12:50 GMT+02:00 <pme.leb...@gmail.com>:
> From: Pierre Lebleu <pme.leb...@gmail.com>
>
> It gives the ability to create firewall data within the
> service itself rather than within an instance.
>
> Signed-off-by: Pierre Lebleu
Hi all,
When I try to compile "openssh-server-without-pam", the build system
tries to compile the "libpam" first and then compile my target without
using this library.
$ make package/openssh/{clean,compile}
make[1] package/openssh/clean
make[2] -C feeds/packages/net/openssh clean
make[2] -C
2017-04-29 3:13 GMT+02:00 Philip Prindeville
<philipp_s...@redfish-solutions.com>:
> Inlineā¦
>
>
>> On Apr 20, 2017, at 10:05 AM, Pierre Lebleu <pme.leb...@gmail.com> wrote:
>>
>> It gives the ability to include scripts via procd
>> services and net
Paul
>>
>>> Op 2 mei 2017, om 18:43 heeft Philip Prindeville
>>> <philipp_s...@redfish-solutions.com> het volgende geschreven:
>>>
>>>
>>>> On May 2, 2017, at 6:15 AM, Pierre Lebleu <pme.leb...@gmail.com> wrote:
>>>>
&
It gives the ability to create redirect rules via
procd services and netifd interface firewall data.
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
main.c |2 +-
redirects.c | 108 ++-
redirects.h | 10 --
3
It gives the ability to include scripts via procd
services and netifd interface firewall data.
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
includes.c | 64 +---
includes.h |9 ++---
main.c |2 +-
3
In the function fw3_load_rules(), warm_elem() used a pointer
to an UCI section which was not valid anymore.
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
rules.c | 31 ---
1 file changed, 16 insertions(+), 15 deletions(-)
diff --git a/rules.c b/r
The return value of fw3_parse_options() should be checked and
when it fails the section should be skipped.
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
defaults.c |6 +-
forwards.c |7 ++-
includes.c |7 ++-
ipsets.c |7 ++-
zones.c
It gives the ability to create forward rules via procd
services and netifd interface firewall data.
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
forwards.c | 68 +++-
forwards.h |9 +---
main.c |2 +-
3
The return value of fw3_parse_options() should be checked and
when it fails the section should be skipped.
Signed-off-by: Pierre Lebleu <pme.leb...@gmail.com>
---
defaults.c |6 +-
forwards.c |7 ++-
includes.c |7 ++-
ipsets.c |7 ++-
zones.c
23 matches
Mail list logo