50940cd7d7
491e839262 brcm47xx: sysupgrade: fix device model detection 4acc0db480 kernel: bump 4.14 to 4.14.146 3699327da3 kernel: bump 4.9 to 4.9.194 45a2c0f309 hostapd: Fix AP mode PMF disconnection protection bypass e289a4133c hostapd: SAE/EAP-pwd side-channel attack update a63edb4691 mbedtls: update to 2.16.3 2698157d54 mbedtls: Update to version 2.16.2 952bafa03c openssl: bump to 1.0.2t, add maintainer 7e1db8f27c kernel: bump 4.14 to 4.14.145 d32cf52674 kernel: bump 4.14 to 4.14.144 745292ba10 kernel: bump 4.9 to 4.9.193 5880dd48d5 mac80211: brcmfmac: backport the last 5.4 changes 90f6af5108 ar71xx: fix potential IRQ misses during dispatch for qca953x e545808e89 ar71xx: Fix potentially missed IRQ handling during dispatch 59e42f9e3e kernel: bump 4.14 to 4.14.143 418cf097e7 kernel: bump 4.9 to 4.9.192 6f677d6848 tools: mkimage: fix __u64 typedef conflict with new glibc c5ed9f4344 kernel: bump 4.14 to 4.14.142 556f86bbfd kernel: bump 4.9 to 4.9.191 2d257351f3 ramips: fix duplicate network setup for dlink, dir-615-h1 2a22e41fe4 ramips: fix D-Link DIR-615 H1 switch port mapping f9dec32be7 ramips: remove duplicate case for MAC setup of freestation5 7393ce8d87 mac80211: brcmfmac: backport more kernel 5.4 changes f6de1fa6c6 bzip2: Fix CVE-2019-12900 7ac6044632 ar71xx: WNR2200: remove redundant GPIO for WLAN LED 9d1cd9d098 kernel: bump 4.14 to 4.14.141 4b5c77ca2f ath9k: backport dynack improvements 73bba470a4 kernel: bump 4.14 to 4.14.140 8bc800aa56 kernel: bump 4.9 to 4.9.190 c948a74158 kernel: bump 4.14 to 4.14.139 09d63fb0a6 musl: Fix CVE-2019-14697 564d81e944 iptables: patch CVE-2019-11360 (security fix) 5e3b21c916 musl: ldso/dlsym: fix mips returning undef dlsym 2df2b75208 wolfssl: fixes for CVE-2018-16870 & CVE-2019-13628 09bdc14419 kernel: bump 4.14 to 4.14.138 e058fb3658 kernel: bump 4.9 to 4.9.189 28dc34f249 xfsprogs: Replace valloc with posix_memalign 24967a6c42 libbsd: Fix compilation under ARC 30815d65d2 nftables: Fix compilation with uClibc-ng dc2f2a16d3 tools/patch: apply upstream patch for cve-2019-13638 c99ceb7030 tools/patch: apply upstream patch for CVE-2019-13636 Compile-tested: ar71xx-{generic,tiny}, ramips-rt305x, x86-64 |
||
---|---|---|
.github/ISSUE_TEMPLATE | ||
contrib | ||
docs | ||
package | ||
patches | ||
scripts | ||
targets | ||
.gitignore | ||
.luacheckrc | ||
CONTRIBUTING.md | ||
LICENSE | ||
Makefile | ||
modules | ||
README.md |
Documentation (incomplete at this time, contribute if you can!) may be found at https://gluon.readthedocs.io/.
If you're new to Gluon and ready to get your feet wet, have a look at the Getting Started Guide.
Gluon's developers frequent an IRC chatroom at #gluon on hackint. There is also a webchat that allows for access from within your browser.
Issues & Feature requests
Before opening an issue, make sure to check whether any existing issues (open or closed) match. If you're suggesting a new feature, drop by on IRC or our mailinglist to discuss it first.
We maintain a Roadmap for the future development of Gluon.
Use a release!
Please refrain from using the master
branch for anything else but development purposes!
Use the most recent release instead. You can list all releases by running git tag
and switch to one by running git checkout v2019.1 && make update
.
If you're using the autoupdater, do not autoupdate nodes with anything but releases. If you upgrade using random master commits the nodes will break eventually.
Mailinglist
To subscribe to the list, send a message to:
gluon+subscribe@luebeck.freifunk.net
To remove your address from the list, just send a message to
the address in the List-Unsubscribe
header of any list
message. If you haven't changed addresses since subscribing,
you can also send a message to:
gluon+unsubscribe@luebeck.freifunk.net