diff --git a/net/miniupnpd/Makefile b/net/miniupnpd/Makefile index 988168b9802b..fafefa0ad735 100644 --- a/net/miniupnpd/Makefile +++ b/net/miniupnpd/Makefile @@ -1,7 +1,9 @@ PORTNAME= miniupnpd -DISTVERSION= 2.3.6 +DISTVERSION= 2.3.7 PORTEPOCH= 1 CATEGORIES= net +MASTER_SITES= http://miniupnp.free.fr/files/ \ + https://github.com/miniupnp/miniupnp/releases/download/${PORTNAME}_${DISTVERSION:S|.|_|g}/ MAINTAINER= squat@squat.no COMMENT= Lightweight UPnP IGD & PCP/NAT-PMP daemon which uses pf @@ -9,33 +11,26 @@ WWW= http://miniupnp.free.fr/ LICENSE= BSD3CLAUSE -LIB_DEPENDS= libpfctl.so:net/libpfctl +LIB_DEPENDS= libpfctl.so:net/libpfctl -USES= cpe ssl localbase:ldflags +USES= cpe localbase:ldflags ssl CPE_VENDOR= miniupnp_project -USE_GITHUB= yes -GH_ACCOUNT= miniupnp -GH_PROJECT= miniupnp -GH_TAGNAME= miniupnpd_2_3_6 - -USE_RC_SUBR= miniupnpd +USE_RC_SUBR= ${PORTNAME} HAS_CONFIGURE= yes +# unconditionally use pf, ipfw does not work on FreeBSD +CONFIGURE_ARGS= --firewall=pf --libpfctl + MAKE_JOBS_UNSAFE= yes CFLAGS+= -I${OPENSSLINC} LDFLAGS+= -L${OPENSSLLIB} -lpfctl -WRKSRC_SUBDIR= miniupnpd - PLIST_FILES= etc/miniupnpd.conf.sample \ share/man/man8/miniupnpd.8.gz \ sbin/miniupnpd -# unconditionally use pf, ipfw does not work on FreeBSD -CONFIGURE_ARGS= --firewall=pf - OPTIONS_DEFINE= CHECK_PORTINUSE IPV6 LEASEFILE UPNP_IGDV2 \ UPNP_STRICT CHECK_PORTINUSE_DESC= Check if ports are in use diff --git a/net/miniupnpd/distinfo b/net/miniupnpd/distinfo index 1d7be071d12b..587e74fc7dfd 100644 --- a/net/miniupnpd/distinfo +++ b/net/miniupnpd/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1715155832 -SHA256 (miniupnp-miniupnp-2.3.6-miniupnpd_2_3_6_GH0.tar.gz) = 6e5ee2239030486675f558cc840d154e5e2db9517efc96c5b0ab2b2c34c1a128 -SIZE (miniupnp-miniupnp-2.3.6-miniupnpd_2_3_6_GH0.tar.gz) = 462607 +TIMESTAMP = 1726178413 +SHA256 (miniupnpd-2.3.7.tar.gz) = fbdd5501039730f04a8420ea2f8f54b7df63f9f04cde2dc67fa7371e80477bbe +SIZE (miniupnpd-2.3.7.tar.gz) = 265329 diff --git a/net/miniupnpd/files/patch-pf_obsdrdr.c b/net/miniupnpd/files/patch-pf_obsdrdr.c deleted file mode 100644 index a13e3888ed46..000000000000 --- a/net/miniupnpd/files/patch-pf_obsdrdr.c +++ /dev/null @@ -1,458 +0,0 @@ ---- pf/obsdrdr.c.orig 2024-03-19 23:41:25 UTC -+++ pf/obsdrdr.c -@@ -64,6 +64,8 @@ - #include - #include - -+#include -+ - #include "../macros.h" - #include "config.h" - #include "obsdrdr.h" -@@ -155,7 +157,7 @@ init_redirect(void) - int - init_redirect(void) - { -- struct pf_status status; -+ struct pfctl_status *status; - if(dev>=0) - shutdown_redirect(); - dev = open("/dev/pf", O_RDWR); -@@ -163,14 +165,16 @@ init_redirect(void) - syslog(LOG_ERR, "open(\"/dev/pf\"): %m"); - return -1; - } -- if(ioctl(dev, DIOCGETSTATUS, &status)<0) { -+ if ((status = pfctl_get_status(dev)) == NULL) { - syslog(LOG_ERR, "DIOCGETSTATUS: %m"); - return -1; - } -- if(!status.running) { -+ if(!status->running) { -+ pfctl_free_status(status); - syslog(LOG_ERR, "pf is disabled"); - return -1; - } -+ pfctl_free_status(status); - return 0; - } - -@@ -471,6 +475,7 @@ delete_nat_rule(const char * ifname, unsigned short ip - int i, n, r; - unsigned int tnum; - struct pfioc_rule pr; -+ struct pfctl_rule rule; - UNUSED(ifname); - if(dev<0) { - syslog(LOG_ERR, "pf device is not open"); -@@ -486,7 +491,7 @@ delete_nat_rule(const char * ifname, unsigned short ip - #endif - if(ioctl(dev, DIOCGETRULES, &pr) < 0) - { -- syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...): %m"); -+ syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...) (%s:%d): %m", __func__, __LINE__); - return -1; - } - n = pr.nr; -@@ -497,7 +502,7 @@ delete_nat_rule(const char * ifname, unsigned short ip - for(i=0; i 0) - { - #ifdef PFVAR_NEW_STYLE -- if (pr.rule.src.addr.v.a.addr.v4addr.s_addr == 0) -+ if (rule.src.addr.v.a.addr.v4addr.s_addr == 0) - #else -- if (pr.rule.src.addr.v.a.addr.v4.s_addr == 0) -+ if (rule.src.addr.v.a.addr.v4.s_addr == 0) - #endif - { - rhost[0] = '\0'; /* empty string */ -@@ -973,10 +974,10 @@ get_redirect_rule(const char * ifname, unsigned short - else - { - #ifdef PFVAR_NEW_STYLE -- inet_ntop(AF_INET, &pr.rule.src.addr.v.a.addr.v4addr.s_addr, -+ inet_ntop(AF_INET, &rule.src.addr.v.a.addr.v4addr.s_addr, - rhost, rhostlen); - #else -- inet_ntop(AF_INET, &pr.rule.src.addr.v.a.addr.v4.s_addr, -+ inet_ntop(AF_INET, &rule.src.addr.v.a.addr.v4.s_addr, - rhost, rhostlen); - #endif - } -@@ -1010,6 +1011,7 @@ priv_delete_redirect_rule_check_desc(const char * ifna - int i, n, r; - unsigned int tnum; - struct pfioc_rule pr; -+ struct pfctl_rule rule; - UNUSED(ifname); - - if(dev<0) { -@@ -1023,7 +1025,7 @@ priv_delete_redirect_rule_check_desc(const char * ifna - #endif - if(ioctl(dev, DIOCGETRULES, &pr) < 0) - { -- syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...): %m"); -+ syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...) (%s:%d): %m", __func__, __LINE__); - return -1; - } - n = pr.nr; -@@ -1034,24 +1036,24 @@ priv_delete_redirect_rule_check_desc(const char * ifna - for(i=0; i 0) - { - #ifdef PFVAR_NEW_STYLE -- if (pr.rule.src.addr.v.a.addr.v4addr.s_addr == 0) -+ if (rule.src.addr.v.a.addr.v4addr.s_addr == 0) - #else -- if (pr.rule.src.addr.v.a.addr.v4.s_addr == 0) -+ if (rule.src.addr.v.a.addr.v4.s_addr == 0) - #endif - rhost[0] = '\0'; /* empty string */ - else - #ifdef PFVAR_NEW_STYLE -- inet_ntop(AF_INET, &pr.rule.src.addr.v.a.addr.v4addr.s_addr, -+ inet_ntop(AF_INET, &rule.src.addr.v.a.addr.v4addr.s_addr, - rhost, rhostlen); - #else -- inet_ntop(AF_INET, &pr.rule.src.addr.v.a.addr.v4.s_addr, -+ inet_ntop(AF_INET, &rule.src.addr.v.a.addr.v4.s_addr, - rhost, rhostlen); - #endif - } - if(check_desc) { -- if((desc == NULL && pr.rule.label[0] == '\0') || -- (desc && 0 == strcmp(desc, pr.rule.label))) { -+ if((desc == NULL && rule.label[0][0] == '\0') || -+ (desc && 0 == strcmp(desc, rule.label[0]))) { - r = 1; - break; - } -@@ -1175,7 +1177,7 @@ priv_delete_filter_rule(const char * ifname, unsigned - pr.rule.action = PF_PASS; - if(ioctl(dev, DIOCGETRULES, &pr) < 0) - { -- syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...): %m"); -+ syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...) (%s:%d): %m", __func__, __LINE__); - return -1; - } - n = pr.nr; -@@ -1275,6 +1277,7 @@ get_redirect_rule_by_index(int index, - int n, r; - unsigned int tnum; - struct pfioc_rule pr; -+ struct pfctl_rule rule; - #ifndef PF_NEWSTYLE - struct pfioc_pooladdr pp; - #endif -@@ -1291,7 +1294,7 @@ get_redirect_rule_by_index(int index, - #endif - if(ioctl(dev, DIOCGETRULES, &pr) < 0) - { -- syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...): %m"); -+ syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...) (%s:%d): %m", __func__, __LINE__); - return -1; - } - n = pr.nr; -@@ -1302,36 +1305,36 @@ get_redirect_rule_by_index(int index, - if(index >= n) - goto error; - pr.nr = index; -- if(ioctl(dev, DIOCGETRULE, &pr) < 0) -+ if (pfctl_get_rule(dev, index, pr.ticket, pr.anchor, PF_RDR, &rule, pr.anchor_call) != 0) - { - syslog(LOG_ERR, "ioctl(dev, DIOCGETRULE): %m"); - goto error; - } -- *proto = pr.rule.proto; -+ *proto = rule.proto; - #ifdef __APPLE__ -- *eport = ntohs(pr.rule.dst.xport.range.port[0]); -+ *eport = ntohs(rule.dst.xport.range.port[0]); - #else -- *eport = ntohs(pr.rule.dst.port[0]); -+ *eport = ntohs(rule.dst.port[0]); - #endif - #ifndef PF_NEWSTYLE -- *iport = pr.rule.rpool.proxy_port[0]; -+ *iport = rule.rpool.proxy_port[0]; - #else -- *iport = pr.rule.rdr.proxy_port[0]; -+ *iport = rule.rdr.proxy_port[0]; - #endif - if(ifname) -- strlcpy(ifname, pr.rule.ifname, IFNAMSIZ); -+ strlcpy(ifname, rule.ifname, IFNAMSIZ); - if(desc) -- strlcpy(desc, pr.rule.label, desclen); -+ strlcpy(desc, rule.label[0], desclen); - #ifdef PFRULE_INOUT_COUNTS - if(packets) -- *packets = pr.rule.packets[0] + pr.rule.packets[1]; -+ *packets = rule.packets[0] + rule.packets[1]; - if(bytes) -- *bytes = pr.rule.bytes[0] + pr.rule.bytes[1]; -+ *bytes = rule.bytes[0] + rule.bytes[1]; - #else - if(packets) -- *packets = pr.rule.packets; -+ *packets = rule.packets; - if(bytes) -- *bytes = pr.rule.bytes; -+ *bytes = rule.bytes; - #endif - #ifndef PF_NEWSTYLE - memset(&pp, 0, sizeof(pp)); -@@ -1363,15 +1366,15 @@ get_redirect_rule_by_index(int index, - iaddr, iaddrlen); - #endif - #else -- inet_ntop(AF_INET, &pr.rule.rdr.addr.v.a.addr.v4.s_addr, -+ inet_ntop(AF_INET, &rule.rdr.addr.v.a.addr.v4.s_addr, - iaddr, iaddrlen); - #endif - if(rhost && rhostlen > 0) - { - #ifdef PFVAR_NEW_STYLE -- if (pr.rule.src.addr.v.a.addr.v4addr.s_addr == 0) -+ if (rule.src.addr.v.a.addr.v4addr.s_addr == 0) - #else -- if (pr.rule.src.addr.v.a.addr.v4.s_addr == 0) -+ if (rule.src.addr.v.a.addr.v4.s_addr == 0) - #endif - { - rhost[0] = '\0'; /* empty string */ -@@ -1379,10 +1382,10 @@ get_redirect_rule_by_index(int index, - else - { - #ifdef PFVAR_NEW_STYLE -- inet_ntop(AF_INET, &pr.rule.src.addr.v.a.addr.v4addr.s_addr, -+ inet_ntop(AF_INET, &rule.src.addr.v.a.addr.v4addr.s_addr, - rhost, rhostlen); - #else -- inet_ntop(AF_INET, &pr.rule.src.addr.v.a.addr.v4.s_addr, -+ inet_ntop(AF_INET, &rule.src.addr.v.a.addr.v4.s_addr, - rhost, rhostlen); - #endif - } -@@ -1406,6 +1409,7 @@ get_portmappings_in_range(unsigned short startport, un - int i, n; - unsigned short eport; - struct pfioc_rule pr; -+ struct pfctl_rule rule; - - *number = 0; - if(dev<0) { -@@ -1426,7 +1430,7 @@ get_portmappings_in_range(unsigned short startport, un - #endif - if(ioctl(dev, DIOCGETRULES, &pr) < 0) - { -- syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...): %m"); -+ syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...) (%s:%d): %m", __func__, __LINE__); - free(array); - return NULL; - } -@@ -1437,19 +1441,19 @@ get_portmappings_in_range(unsigned short startport, un - for(i=0; i= capacity) diff --git a/net/miniupnpd/files/patch-pf_pfpinhole.c b/net/miniupnpd/files/patch-pf_pfpinhole.c deleted file mode 100644 index 9c62bd94fdd4..000000000000 --- a/net/miniupnpd/files/patch-pf_pfpinhole.c +++ /dev/null @@ -1,210 +0,0 @@ ---- pf/pfpinhole.c.orig 2024-03-19 23:41:25 UTC -+++ pf/pfpinhole.c -@@ -28,6 +28,7 @@ - #include - #include - #include -+#include - - #include "config.h" - #include "pfpinhole.h" -@@ -171,6 +172,7 @@ int find_pinhole(const char * ifname, - unsigned int ts, tnum; - int i, n; - struct pfioc_rule pr; -+ struct pfctl_rule rule; - struct in6_addr saddr; - struct in6_addr daddr; - UNUSED(ifname); -@@ -191,7 +193,7 @@ int find_pinhole(const char * ifname, - pr.rule.action = PF_PASS; - #endif - if(ioctl(dev, DIOCGETRULES, &pr) < 0) { -- syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...): %m"); -+ syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...) (%s:%d): %m", __func__, __LINE__); - return -1; - } - n = pr.nr; -@@ -200,22 +202,22 @@ int find_pinhole(const char * ifname, - #endif /* PF_RELEASETICKETS */ - for(i=0; i= 0; i--) { - pr.nr = i; -- if(ioctl(dev, DIOCGETRULE, &pr) < 0) { -+ if (pfctl_get_rule(dev, i, pr.ticket, pr.anchor, PF_PASS, &rule, pr.anchor_call) < 0) { - syslog(LOG_ERR, "ioctl(dev, DIOCGETRULE): %m"); - release_ticket(dev, tnum); - return -1; - } -- if(sscanf(pr.rule.label, PINEHOLE_LABEL_FORMAT_SKIPDESC, &uid, &ts) != 2) { -- syslog(LOG_DEBUG, "rule with label '%s' is not a IGD pinhole", pr.rule.label); -+ if(sscanf(rule.label[0], PINEHOLE_LABEL_FORMAT_SKIPDESC, &uid, &ts) != 2) { -+ syslog(LOG_DEBUG, "rule with label '%s' is not a IGD pinhole", rule.label[0]); - continue; - } - if(ts <= (unsigned int)current_time) { -- syslog(LOG_INFO, "removing expired pinhole '%s'", pr.rule.label); -+ syslog(LOG_INFO, "removing expired pinhole '%s'", rule.label[0]); - pr.action = PF_CHANGE_GET_TICKET; - if(ioctl(dev, DIOCCHANGERULE, &pr) < 0) { - syslog(LOG_ERR, "ioctl(dev, DIOCCHANGERULE, ...) PF_CHANGE_GET_TICKET: %m"); -@@ -449,7 +454,7 @@ int clean_pinhole_list(unsigned int * next_timestamp) - #endif - release_ticket(dev, tnum); - if(ioctl(dev, DIOCGETRULES, &pr) < 0) { -- syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...): %m"); -+ syslog(LOG_ERR, "ioctl(dev, DIOCGETRULES, ...) (%s:%d): %m", __func__, __LINE__); - return -1; - } - #ifdef PF_RELEASETICKETS