From patchwork Thu Dec 17 20:01:59 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 3728 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384 client-signature ECDSA (P-384) client-digest SHA384) (Client CN "mail01.haj.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4CxjZb5TH0z3wgG for ; Thu, 17 Dec 2020 20:02:15 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4CxjZY4W42zmh; Thu, 17 Dec 2020 20:02:13 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4CxjZY3GQJz2yHP; Thu, 17 Dec 2020 20:02:13 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4CxjZX6BbZz2xFP for ; Thu, 17 Dec 2020 20:02:12 +0000 (UTC) Received: from smtpq3.tb.mail.iss.as9143.net (smtpq3.tb.mail.iss.as9143.net [212.54.42.166]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mail01.ipfire.org (Postfix) with ESMTPS id 4CxjZX10Ngzmh for ; Thu, 17 Dec 2020 20:02:12 +0000 (UTC) Received: from [212.54.42.137] (helo=smtp6.tb.mail.iss.as9143.net) by smtpq3.tb.mail.iss.as9143.net with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1kpzTX-0004jO-OS; Thu, 17 Dec 2020 21:02:11 +0100 Received: from j103033.upc-j.chello.nl ([24.132.103.33] helo=rhea.saturn.pimb.org) by smtp6.tb.mail.iss.as9143.net with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1kpzTX-008HSA-E4; Thu, 17 Dec 2020 21:02:11 +0100 Received: from hyperion.saturn.pimb.org (hyperion.saturn.pimb.org [192.168.26.32]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by rhea.saturn.pimb.org (Postfix) with ESMTPSA id 45DEA3EF6; Thu, 17 Dec 2020 21:02:11 +0100 (CET) From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH] bird: Update to 2.0.7 Date: Thu, 17 Dec 2020 21:01:59 +0100 Message-Id: <20201217200159.2656412-1-ahb.ipfire@gmail.com> X-Mailer: git-send-email 2.29.2 MIME-Version: 1.0 X-SourceIP: 24.132.103.33 X-Authenticated-Sender: adolf.belka@ziggo.nl (via SMTP) X-Ziggo-spambar: / X-Ziggo-spamscore: 0.0 X-Ziggo-spamreport: CMAE Analysis: v=2.4 cv=TcEoCTch c=1 sm=1 tr=0 ts=5fdbb943 a=N0UC3/faf55XGTeY5t7zSQ==:17 a=9+rZDBEiDlHhcck0kWbJtElFXBc=:19 a=zTNgK-yGK50A:10 a=x7bEGLp0ZPQA:10 a=6yxbeI8x3IIA:10 a=pGLkceISAAAA:8 a=Pax6OUm-nVPy5o1oMfMA:9 X-Ziggo-Spam-Status: No X-Spam-Status: No X-Spam-Flag: No ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=lists.ipfire.org; s=202003rsa; t=1608235332; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=KyheJRWSdgEBuVpLxKvDi/17BVI7cjPNUTFDX+Yvovw=; b=G0eXgjel23wmn0MEkWijh6ff1BLL7n5ZVek1r1cuohUSqKG3apW7YPw2VioeX0l29uY8p1 B4FKhOrFyC0tu1yehNClXiH96Aa59DOKuR0liJG/sHl74tQOFEbABCXYLa4LNjuY9R3O1x mSdnD6L5UGIqeYS2gESFnFsZQss8rAvwDksw8zqgUVWmq+KNFvf6PNKcPa2DvMFIWQmVpl L+2GM3E4J8xZ4Up17VAHhoN/OtidB0O87tHFQHD0pAW1SMg7zq42QibyE0B7tpSno8k8Ik n+dcVxwbwNFEYxlVXyUUcZuQ4AWexEcWMvofRi5fl6nIA2l332EXki3RK1X3zA== ARC-Authentication-Results: i=1; mail01.ipfire.org; dkim=none; spf=softfail (mail01.ipfire.org: 212.54.42.166 is neither permitted nor denied by domain of ahbipfire@gmail.com) smtp.mailfrom=ahbipfire@gmail.com ARC-Seal: i=1; s=202003rsa; d=lists.ipfire.org; t=1608235332; a=rsa-sha256; cv=none; b=QHa9nMVqm+Ix7xYLnbnZ05chY49eVUtzXCA26G7L/Qn9bdv1SCVvJfmXzclQ0nX2UXXjjJ 0UvOvS+u9N2xVTZM/LN0i5aCJR2PAjAVGtWKYSu9lHvRCVkjC0WgSATA2Mw6nvuSSrvs+i ZfatuPhvkcThghz8KwQ2iJ18WX3Y9q9qxyGFhr1fPoqMuWngSVRfgwpPeXhbeemad8WN+m Ma4ehBd8lBgHbeBtHx+36dYToFYBuxQiNBh8I7dmQo1i0iH++sonb7/2BkOUXHrsFvICDA ohc24Oy7kc+a/kkCY/nzu8dFHwRTvaXuXdUtatg7Eb9nDvFjI3oDZ9jI2nYnkg== X-Rspamd-Queue-Id: 4CxjZX10Ngzmh Authentication-Results: mail01.ipfire.org; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=gmail.com (policy=none); spf=softfail (mail01.ipfire.org: 212.54.42.166 is neither permitted nor denied by domain of ahbipfire@gmail.com) smtp.mailfrom=ahbipfire@gmail.com X-Rspamd-Server: mail01.haj.ipfire.org X-Spamd-Result: default: False [-1.85 / 11.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; TO_DN_SOME(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; R_MISSING_CHARSET(2.50)[]; RWL_MAILSPIKE_GOOD(0.00)[212.54.42.166:from]; IP_REPUTATION_HAM(-1.75)[asn: 33915(-0.25), country: NL(0.00), ip: 212.54.42.166(-0.63)]; BROKEN_CONTENT_TYPE(1.50)[]; R_SPF_SOFTFAIL(0.00)[~all]; ARC_SIGNED(0.00)[lists.ipfire.org:s=202003rsa:i=1]; RCVD_COUNT_THREE(0.00)[4]; RCPT_COUNT_TWO(0.00)[2]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:33915, ipnet:212.54.32.0/20, country:NL]; R_DKIM_NA(0.00)[]; HAS_X_AS(0.00)[]; RCVD_IN_DNSWL_LOW(-0.10)[212.54.42.166:from]; TAGGED_FROM(0.00)[]; ARC_NA(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; FROM_HAS_DN(0.00)[]; BAYES_HAM(-3.00)[99.99%]; TAGGED_RCPT(0.00)[]; MIME_GOOD(-0.10)[text/plain]; RECEIVED_SPAMHAUS_PBL(0.00)[24.132.103.33:received]; TO_MATCH_ENVRCPT_SOME(0.00)[]; NEURAL_HAM(-1.00)[-1.000]; FREEMAIL_CC(0.00)[gmail.com]; RCVD_TLS_ALL(0.00)[]; DMARC_POLICY_SOFTFAIL(0.10)[gmail.com : No valid SPF, No valid DKIM,none] X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" Update bird from 2.0.6 to 2.0.7 Changes from changelog - BGP: Fix reconfiguration with import table *Change of some options requires route refresh, but when import table is active, channel reload is done from it instead of doing full route refresh. So in this case we request it internally. - Doc: Minor documentation fixes - Nest: Handle non-MPLS on MPLS case in recursive route update *When non-MPLS recursive route resolves to MPLS underlying route, then it should get MPLS labels from the the underlying route. - Nest: Handle PtP links in recursive route update *Underlying (IGP) route may lead to PtP link, in this case it does not need gateway. Which is different than direct route without gateway. *When recursive (BGP) route uses PtP route, it should not use recursive next hop as immediate next hop, while for direct routes it should. - Nest: Fix recursive route update *Missing cleanup can lead to dangling pointer to old next hops. Signed-off-by: Adolf Belka --- lfs/bird | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lfs/bird b/lfs/bird index 9b045528f..ee1829907 100644 --- a/lfs/bird +++ b/lfs/bird @@ -24,7 +24,7 @@ include Config -VER = 2.0.6 +VER = 2.0.7 THISAPP = bird-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -32,7 +32,7 @@ DL_FROM = $(URL_IPFIRE) DIR_APP = $(DIR_SRC)/$(THISAPP) TARGET = $(DIR_INFO)/$(THISAPP) PROG = bird -PAK_VER = 6 +PAK_VER = 7 DEPS = @@ -46,7 +46,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_MD5 = bc05f225f4fcb365da1dbb308a7e23cc +$(DL_FILE)_MD5 = dc884bbe5905578e452f28158700527c install : $(TARGET)