Git Product home page Git Product logo

site-ffm's Introduction

Build ffmuc firmware

Dependencies

For convenience, you can find a script to install those dependencies on an Ubuntu-based distribution:
install_build_dependencies.sh

Building

Check out this repository and execute make, i.e. like this:

git clone https://github.com/freifunkMUC/site-ffm.git site-ffm
cd site-ffm
git checkout -b patched && git checkout stable
make

Containerised building

As the CI is using Ubuntu, only the Ubuntu dependencies are being tracked. To simplify building on other distros, containerised building is also possible:

docker build -t site-ffm-stable -f Dockerfile_build .

This will build the build Docker image. With the following export, the Makefile will then use the repo for building but will run inside an Ubuntu container.
Note: If the working directory is a git worktree, add a volume mount for the main git folder.

mkdir -p gluon-build output
docker run --rm -v $(pwd):/site-ffm:ro -v $(pwd)/gluon-build:/site-ffm/gluon-build:rw -v $(pwd)/output:/site-ffm/output:rw -w /site-ffm -u $UID site-ffm-stable make

Example

Full command for a lantiq-xrx200 build:

mkdir -p logs gluon-build output
docker run --rm -v $(pwd):/site-ffm:ro -v $(pwd)/gluon-build:/site-ffm/gluon-build:rw -v $(pwd)/output:/site-ffm/output:rw -w /site-ffm -u $UID site-ffm-stable make V=s GLUON_TARGETS=lantiq-xrx200 |& tee logs/build_lantiq-xrx200_$(date --iso=s).log

Further Resources

This firmware is based on Gluon.

Look at the site configuration related Gluon documentation for information on site configuration options and examples from other communities.

site-ffm's People

Contributors

aiyionprime avatar awlx avatar blocktrron avatar chrisjoki avatar corny avatar dl1com avatar eriu avatar fpletz avatar goliathlabs avatar goligo avatar grische avatar herbetom avatar krombel avatar lotarso avatar lrnzo avatar maurerle avatar midzer avatar mrmadcow avatar oheim avatar ohrensessel avatar rotanid avatar rotzbua avatar ruebezahl avatar saerdnaer avatar spookey avatar t0biii avatar x29a avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

site-ffm's Issues

umland - kein ntp

Hallo,

ntp geht im umland nicht:

root@zzzuml-60e327576e28:~# /usr/sbin/ntpd -n -w -d -p 0.ntp.ffmuc.net -p 1.ntp.ffmuc.net
ntpd: resolved peer 1.ntp.ffmuc.net to fdef:ffc0:4fff::3
ntpd: sending query to fdef:ffc0:4fff::3
ntpd: resolved peer 0.ntp.ffmuc.net to fdef:ffc0:4fff::131
ntpd: sending query to fdef:ffc0:4fff::131
ntpd: timed out waiting for fdef:ffc0:4fff::3, reach 0x00, next query in 1s
ntpd: timed out waiting for fdef:ffc0:4fff::131, reach 0x00, next query in 1s
ntpd: sending query to fdef:ffc0:4fff::3
ntpd: sending query to fdef:ffc0:4fff::131
ntpd: timed out waiting for fdef:ffc0:4fff::3, reach 0x00, next query in 1s
ntpd: timed out waiting for fdef:ffc0:4fff::131, reach 0x00, next query in 2s
ntpd: sending query to fdef:ffc0:4fff::3
ntpd: sending query to fdef:ffc0:4fff::131
ntpd: timed out waiting for fdef:ffc0:4fff::3, reach 0x00, next query in 1s
ntpd: timed out waiting for fdef:ffc0:4fff::131, reach 0x00, next query in 1s
ntpd: sending query to fdef:ffc0:4fff::3
ntpd: sending query to fdef:ffc0:4fff::131
ntpd: timed out waiting for fdef:ffc0:4fff::3, reach 0x00, next query in 2s
ntpd: timed out waiting for fdef:ffc0:4fff::131, reach 0x00, next query in 1s
ntpd: sending query to fdef:ffc0:4fff::3
ntpd: sending query to fdef:ffc0:4fff::131
ntpd: timed out waiting for fdef:ffc0:4fff::3, reach 0x00, next query in 1s
ntpd: timed out waiting for fdef:ffc0:4fff::131, reach 0x00, next query in 2s
ntpd: sending query to fdef:ffc0:4fff::3
ntpd: sending query to fdef:ffc0:4fff::131
ntpd: timed out waiting for fdef:ffc0:4fff::3, reach 0x00, next query in 2s
ntpd: timed out waiting for fdef:ffc0:4fff::131, reach 0x00, next query in 2s
ntpd: sending query to fdef:ffc0:4fff::3
ntpd: sending query to fdef:ffc0:4fff::131
ntpd: timed out waiting for fdef:ffc0:4fff::3, reach 0x00, next query in 1s
ntpd: timed out waiting for fdef:ffc0:4fff::131, reach 0x00, next query in 1s
.
.
.

Servus
Christian

Slow initial wireguard connection and gateway switch

The current mechanism to setup the wireguard connection and to switch to a different gateway in case of connection failure is unsatisfactory. The script is run once a minute and then uses a random delay of up to 60 seconds until it is started. So initially it may take up to two minutes, until a connection is established.

In case of a gateway failure, e.g. temporary loss of internet connection to one of our server locations, it is even worse - due to the random gateway selections, several tries to unavailable gateways can occur, before a working gateway is selected. Clients which are currently connected, will not automatically get a new IP address or use the new gateway, but rather try to use the old gateway. The DHCP lease time is set to 10 minutes, so it will take another 8 minutes, until clients will send a new DHCP request and eventually get a new IP address and gateway, which works again.

Improve build times

Is it really necessary to do a full rebuild of an image on every change to site.conf? If not, separate the build processes of the base image and the injection of site.conf.

Mesh-VPN cannot be disabled in config mode

Due to the custom config mode plugin we used for wireguard in the past, there are nodes with a configuration mismatch, where

gluon.mesh_vpn.enabled=0

and

wireguard.mesh_vpn.enabled=1

To address this issue the update script for wireguards currently sets gluon.mesh_vpn.enabled, in case wireguard.mesh_vpn.enabled is 1. This is causing an issue in the config UI - it is currently not possible to disable Mesh-VPN.

In theory all nodes should now be consistent again, as the firmware update containing the migration script has been rolled out, and it can be removed with the next release. In practice there are some routers that still show the mismatch (NanoPi R2S) for reasons yet to be analyzed, and would disable Mesh-VPN (thus causing nodes to get offline), if the script is removed.

https://github.com/freifunkMUC/community-packages/blob/995c77ec03dc54942abb1bca7870fb9d458a7387/gluon-mesh-vpn-wireguard-vxlan/luasrc/lib/gluon/upgrade/400-mesh-vpn-wireguard#L22

Building from scratch fails due to attempt to delete non-existing gluon branch "patched"

Checked out a fresh, clean copy of tag v2019.0.4, then tried to build from scratch, but build fails almost at the beginning:

[user@node001 site-ffm.test2]$ make

#########################
# FFMUC Firmware build
# Building release v2019.0.4 for branch stable

make manifest
make[1]: Entering directory `/home/user/site-ffm.test2'
rm -rf output
(cd gluon-build \
        && git remote set-url origin https://github.com/freifunk-gluon/gluon.git \
        && git fetch origin \
        && git checkout -q v2018.2.1)
ln -sfT .. gluon-build/site
make gluon-patch
make[2]: Entering directory `/home/user/site-ffm.test2'
echo "Applying Patches ..."
Applying Patches ...
(cd gluon-build; git branch -D patched)
error: branch 'patched' not found.
make[2]: *** [gluon-patch] Error 1
make[2]: Leaving directory `/home/user/site-ffm.test2'
make[1]: *** [gluon-prepare] Error 2
make[1]: Leaving directory `/home/user/site-ffm.test2'
make: *** [all] Error 2

Manually creating a branch called "patched" in the repo inside the gluon-build directory works around the issue and allows the build to move forward.

all domains show as ffmuc on map.ffmuc.net

We have 3 domains:

  • ffmuc
  • ffmuc_umland
  • ffmuc_welcome

When running v2019.0-exp~15 only ffmuc is shown on map although the node is correctly configured and working.

As the only change seems to be the firmware we will check this first. When needed this will be shifted to the correct place

[IDEA] FFMUC Routed only with B.A.T.M.A.N. inside the local mesh

This is a draft idea how we could switch FFMUC to a routed approach without losing functionality of B.A.T.M.A.N. for local meshes.

Problem statement

We want to switch Freifunk Munich to a routed approach towards the gateways, because large layer2 domains pose too many problems. Also we want to get rid of the overhead of VXLAN and B.A.T.M.A.N. towards the gateways.

Idea

  • Use wireguard to connect to the Freifunk Munich gateways

  • Inside wireguard use a calculated link-local address which is derived from the public key

  • v6

    • Run radvd on nodes which have an established wireguard tunnel to announce the v6 /64 inside the local network
    • the local /64 is assigned via wgkex
    • Default route via the wireguard tunnel
  • v4

    • Use a fixed /20 per segment and set the next-hop to the v6 address of the gateway, also NAT on the node itself.
    • The node runs DHCP thus it becomes the default gateway for the local network. Also set B.A.T.M.A.N. GW Mode to server.
    • We need a transfer network between gateway and node
  • Meshing

    • The node runs B.A.T.M.A.N. for local meshing just the same as on "normal" Gluon
  • Why not babel?

    • We want to stay compatible to old nodes, which can just mesh like before.
    • A routing protocol is not needed in this approach, thus we avoid another failure domain.

What needs to be done?

  • Test setup with that approach (two raspberry PIs or smth)
  • Changes to gluon (dhcp-server, radvd, nat)
  • wgkex needs to get a backend database from which transfer v4 addresses are picked
  • wgkex also needs to have an database for v6 /64

Possible issues

  • Kernel of OpenWRT is too old and doesn't support v6 next-hops for v4
  • Meshing freaks out
  • IP address conflicts while roaming

Known Issues

  • No IPv4 Connectivity between clients which are not in the same local mesh
  • Potential IPv4 collisions in spontaneous meshes

Glossar

  • Nodes => Freifunk Router
  • Gateway => Supernode

Discussion

https://chat.ffmuc.net/freifunk/channels/firmware

Comments welcome! 🚀

use better default mtu 1312

quote from freifunk-gluon/gluon#1210
"It is known that a fastd MTU of 1280 bytes will cause excessive fragmentation for full packets on networks that advertise to transport payloads of 1280 bytes, because it neglects the headers that are being added by the batman-adv encapsulation."
see this link for more info.
we discovered an increase of around 30% in maximum possible speed on each node when we migrated in summer 2017

XML-Verarbeitungsfehler: Nicht übereinstimmendes Tag. Erwartet: </div>

winzerer meldet über chat.ffmuc.net:
"Beim Abspeichern der Konfig vor dem reboot kommt:"

Fehlermeldung: XML-Verarbeitungsfehler: Nicht übereinstimmendes Tag. Erwartet: </div>. Adresse: http://192.168.1.1/cgi-bin/config/wizard Zeile Nr. 36, Spalte 421: <p>Dein Knoten <em>freifunk-asdf</em> startet gerade neu und wird anschließend versuchen, sich mit anderen Freifunk-Knoten in seiner Nähe zu verbinden. [...]

Firmware: v2019-beta1
Gerät: TP-Link TL-WDR4300 v1

Neustartprobleme mit 2015.7-39

Vmlt. bereits seit 2015.7-37, aber erst mit -39 aufgefallen:

Bei vmtl hoherer Last starten meine Router neu. Teilweise alle 2-5min.

841v9: Bei einer VPN-Last von ca. 3-4MBit erfolgt ein Neustart.
Grafna: https://ffmuc.net/stats/dashboard/db/node?var-node_id=e8de27588810 (mittlerweile abgeschaltet, siehe v.a. 24.11.-25.11.)

NanostationM2Loco: Bei mehr als 10 Clients mit etwas Durchsatz (kein VPN!) erfolgt ein Neustart.
Grafna: https://ffmuc.net/stats/dashboard/db/node?var-node_id=24a43ca6c785 (siehe v.a. seit 16.11.)

1043v2.1: Auch hier erfolgt ein Neustart sobald gefuehlt ein bisschen Last aufkommt. Kommt dann Teilweise nichtmal bis zum aufbau der VPN Verbindung vor dem Neustart
Grafna: https://ffmuc.net/stats/dashboard/db/node?var-node_id=30b5c23e9d34 (Siehe v.a. die vielen Luecken seit 20.11. hier bleibt der Router quasi in einer Boot-Loop)

Kann ich irgendwelche Spezifischen Tests durchfuehren?

Anbei ein Ausschnitt aus Grafna von meinem 841 (andznet_01) über einen Zeitraum von ca. 1:15h (24.11. 23:30 - 25.11. 0:45). Man sieht deutlich die häufigen Neustarts sowie die recht hohe Last.

151124_23_20-151125_00_40

B.A.T.M.A.N. connection is one way

For some reason after a DSL disconnect, B.A.T.M.A.N. on the node sees the gateways but not vice versa which leads to no client network at all.

This started for me with v2020.3.4

Maybe it's related to #96.

simplify cut-and-paste of meshviewer coordinates into configmode

  1. provide coordinates in meshviewer (on right click) in '$LAT; $LON' format
  2. allow pasting coordinates in the above format into luci, alternatively to using two fields. If first field contains semicolon and second field is empty the string will be split. This should be documented on the wizard page

radv_filter_simple throws errors, when connection is not available

Mon May 17 21:44:01 2021 daemon.err micrond[1772]: BusyBox v1.33.0 () multi-call binary.
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:
Mon May 17 21:44:01 2021 daemon.err micrond[1772]: Usage: grep [-HhnlLoqvsrRiwFE] [-m N] [-A/B/C N] PATTERN/-e PATTERN.../-f FILE [FILE]...
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:
Mon May 17 21:44:01 2021 daemon.err micrond[1772]: Search for PATTERN in FILEs (or stdin)
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -H      Add 'filename:' prefix
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -h      Do not add 'filename:' prefix
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -n      Add 'line_no:' prefix
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -l      Show only names of files that match
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -L      Show only names of files that don't match
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -c      Show only count of matching lines
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -o      Show only the matching part of line
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -q      Quiet. Return 0 if PATTERN is found, 1 otherwise
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -v      Select non-matching lines
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -s      Suppress open and read errors
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -r      Recurse
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -R      Recurse and dereference symlinks
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -i      Ignore case
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -w      Match whole words only
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -x      Match whole lines only
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -F      PATTERN is a literal (not regexp)
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -E      PATTERN is an extended regexp
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -m N    Match up to N times per file
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -A N    Print N lines of trailing context
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -B N    Print N lines of leading context
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -C N    Same as '-A N -B N'
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -e PTRN Pattern to match
Mon May 17 21:44:01 2021 daemon.err micrond[1772]:      -f FILE Read pattern from file
Mon May 17 21:44:01 2021 user.notice radv_filter_simple: Setting IPv6 Gateway to
Mon May 17 21:44:01 2021 daemon.err micrond[1772]: Problem with specified source mac '-j'.
Mon May 17 21:44:01 2021 user.notice radv_filter_simple: Setting gateway failed failling back to accept all

[IDEA] Broadcast an additional SSID for OWE

We may want to broadcast an additional SSID for OWE (owe.muenchen.freifunk.net). This ensures that traffic between the node and the client is encrypted, making sniffing of muenchen.freifunk.net's wireless traffic between the node and the client useless

https://gluon.readthedocs.io/en/v2021.1.x/releases/v2020.2.html?highlight=owe#owe-on-client-network

"Opportunistic Wireless Encryption (OWE) is a Wi-Fi standard which ensures that the communication between each pair of endpoints is protected from other endpoints. Unlike conventional Wi-Fi, it provides "Individualized Data Protection" such that data traffic between a client and access point is "individualized". Other clients can still sniff and record this traffic, but they can't decrypt it. " (https://en.wikipedia.org/wiki/Opportunistic_Wireless_Encryption)

Default Vorschlag fuer Down/Uplink Begrenzung fuer VPN hochdrehen

Aktuell werden 3000 kbit/s down und 200 kbit/s up als Limits vorgeschlagen.

Die wenigsten werden diesen Wert von sich aus veraendern, daher wuerde ich vorschlagen, diese Werte hochzudrehen auf
6000/600
oder sogar
12000/1200

Bei 50.000er Anschluessen sollten die 12.000 nicht weh tun...und fuer Leute mit 16.000ern kann man ja in die FAQ schreiben dass man eher 6.000 nehmen sollte.
Vielleicht hat jemand von euch noch ne durchdachtere Wahl der Werte am Start :) 🎱

site.conf Konsistenz Frage

hallo,

sollte nicht die site.conf der 3 Segmente jeweils so sein?:

#####
ffmuc:
#####

  prefix4 = '10.80.32.0/19',
  prefix6 = 'fdef:ffc0:4fff:0::/64',

  wifi24 = {
    ssid = 'muenchen.freifunk.net',
    channel = 6,
    htmode = 'HT20',
    mesh_ssid = 'mesh.ffmuc',
    mesh_bssid = '02:0E:8E:1E:61:17',
    mesh_mcast_rate = 12000,
  },

  wifi5 = {
    ssid = 'muenchen.freifunk.net',
    channel = 44,
    htmode = 'HT40+',
    mesh_ssid = 'mesh.ffmuc',
    mesh_bssid = '02:0E:8E:1E:61:17',
    mesh_mcast_rate = 12000,
  },

  next_node = {
    ip4 = '10.80.32.1',
    ip6 = 'fdef:ffc0:4fff:0::1',
    mac = '16:41:95:40:f7:dc',
  },



#####
ffmuc-welcome:
#####

  prefix4 = '10.80.64.0/19',
  prefix6 = 'fdef:ffc0:4fff:1::/64',

  wifi24 = {
    ssid = 'muenchen.freifunk.net',
    channel = 6,
    htmode = 'HT20',
    mesh_ssid = 'mesh.ffmuc.welcome',
    mesh_bssid = '02:0E:8E:1E:61:18',
    mesh_mcast_rate = 12000,
  },

  wifi5 = {
    ssid = 'muenchen.freifunk.net',
    channel = 44,
    htmode = 'HT40+',
    mesh_ssid = 'mesh.ffmuc.welcome',
    mesh_bssid = '02:0E:8E:1E:61:18',
    mesh_mcast_rate = 12000,
  },

  next_node = {
    ip4 = '10.80.64.1',
    ip6 = 'fdef:ffc0:4fff:1::1',
    mac = '16:41:95:40:f7:dc',
  },



#####
ffmuc-umland:
#####

  prefix4 = '10.80.96.0/19',
  prefix6 = 'fdef:ffc0:4fff:2::/64',

  wifi24 = {
    ssid = 'muenchen.freifunk.net',
    channel = 6,
    htmode = 'HT20',
    mesh_ssid = 'mesh.ffmuc.umland',
    mesh_bssid = '02:0E:8E:1E:61:19',
    mesh_mcast_rate = 12000,
  },

  wifi5 = {
    ssid = 'muenchen.freifunk.net',
    channel = 44,
    htmode = 'HT40+',
    mesh_ssid = 'mesh.ffmuc.umland',
    mesh_bssid = '02:0E:8E:1E:61:19',
    mesh_mcast_rate = 12000,
  },

  next_node = {
    ip4 = '10.80.96.1',
    ip6 = 'fdef:ffc0:4fff:2::1',
    mac = '16:41:95:40:f7:dc',
  },

Servus
Christian

checkuplink is running multiple times when connection is not available

In case the internet connection is not available, checkuplink tries to setup the tunnel again. When adding the wireguard peer, wireguard retries for about two minutes, to establish the tunnel, before it is giving up. As checkuplink is run once per minute, it will run up to three times in parallel. When the connection comes online again, all three will continue, causing all kind of strange setups, like multiple wireguard tunnels in parallel.

# ps w | grep checkuplink
30280 root      1104 S    /bin/sh /lib/gluon/gluon-mesh-wireguard-vxlan/checkuplink
30897 root      1104 S    /bin/sh /lib/gluon/gluon-mesh-wireguard-vxlan/checkuplink
31520 root      1104 S    /bin/sh /lib/gluon/gluon-mesh-wireguard-vxlan/checkuplink
Mon May 17 21:45:54 2021 daemon.err micrond[1772]: Try again: `gw06.ext.ffmuc.net:40008'. Trying again in 12.84 seconds...
Mon May 17 21:45:54 2021 daemon.err micrond[1772]: Try again: `gw06.ext.ffmuc.net:40008'. Trying again in 7.43 seconds...
Mon May 17 21:45:55 2021 daemon.err micrond[1772]: Try again: `gw07.ext.ffmuc.net:40008'. Trying again in 1.00 seconds...
Mon May 17 21:46:01 2021 daemon.err micrond[1772]: Try again: `gw07.ext.ffmuc.net:40008'. Trying again in 1.20 seconds...
Mon May 17 21:46:07 2021 daemon.err micrond[1772]: Try again: `gw06.ext.ffmuc.net:40008'. Trying again in 8.92 seconds...
Mon May 17 21:46:07 2021 daemon.err micrond[1772]: Try again: `gw07.ext.ffmuc.net:40008'. Trying again in 1.44 seconds...
Mon May 17 21:46:12 2021 daemon.err micrond[1772]: Try again: `gw06.ext.ffmuc.net:40008'
Mon May 17 21:46:14 2021 daemon.err micrond[1772]: Try again: `gw07.ext.ffmuc.net:40008'. Trying again in 1.73 seconds...

In case the setup is broken afterwards, the next run of checkuplink will usually fix it again.

Remove key form notice

As decided in i124, we will not require users to send us their public keys. We will blacklist them on the gateways. Therefore, the notice to the key form and possibly all notices to public/private keys needs to be removed from the web interface.

Configure VLAN for mesh on LAN

One should be able to configure the VLAN that should be used for mesh on LAN.

This should also be integrated into upstream Gluon.

Integration des site-select packages

Habe mal das gluon-config-mode-site-select Paket (https://github.com/freifunk-gcp/v2015.1) in unseren aktuellen Master gebaut.

Damit kann man mehrere site.confs in eine Firmware integrieren und sie im Gluon Luci und per Kommandozeile umschalten.

Bis auf die bekannte Bindestrich-Allergie von lua gab es keine Probleme, allerdings musste ich den site-code von ffmuc-umland in ffmuc_umland aendern damit es reibungslos funktioniert.
Ausserdem gibt es Probleme beim kompilieren, wenn unsere custom gluon-ebtables-filter-... Pakete eingebaut werden sollen.
Es gibt allerdings noch einiges zu testen und fixen bevor man daran denken koennte das zu verwenden:

  • Upgrade von aktueller gluon-ffmuc-v2015.5 Firmware auf Firmware mit site-select (site.conf muss nach Upgrade identisch mit ffmuc.conf sein)

👍 Funktioniert. Die alte site.conf wird mit neuer site.conf mit entsprechendem site-code ersetzt (ffmuc -> ffmuc).

  • Upgrade von aktueller gluon-ffmuc-umland-v2015.6 Firmware auf Firmware mit site-select (site.conf muss nach Upgrade trotz Aenderung von des site-codes von "ffmuc-umland" auf "ffmuc_umland" identisch mit ffmuc_umland.conf sein)

👎 Funktioniert nicht. Landet bei ffmuc.

  • Was passiert bei einem Upgrade auf eine Firmware, bei der der aktuell ausgewaehlte site-code nicht mehr verfuegbar ist?

Ist der alte site-code nicht mehr in der neuen Firmware, wird auf den default site-code zurueckgefallen. -> Das hilft beim zweiten Testcase! Um von ffmuc-umland auf ffmuc_umland zu kommen, muss dort einfach eine Firmware mit ffmuc_umland als default site.conf verteilt werden.

  • Herausfinden, warum unsere gluon-ebtables-filter Pakete nicht mit eingebaut werden koennen und fixen

🍻

Hinweis: "Default site.conf" ist die site.conf, die nicht nur als ./site-ffm/extras/.conf existiert, sondern auch nochmal explizit als ./site-ffm/site.conf.

MTU für fastd

Hallo,

da wir nun auch IPv6 Adressen bei den gwtest*.ffmuc.net zurückliefern, sollten wir dann aber auch die MTU für IPv6 anpassen. Der Wert 1426 ist für IPv6 zu hoch. Es dürfen maximal 1406 sein.

Servus
Christian

site_config.lua:5: attempt to index a nil value

with current gluon release build with this site config fails with follwoing error:

mode-site-select/ipkg-mips_24kc/gluon-config-mode-site-select/lib/gluon/site-select/ffmuc.json
lua: site_config.lua:9: site_config.lua:5: attempt to index a nil value
stack traceback:
        [C]: ?
        [C]: in function 'load'
        site_config.lua:9: in main chunk
        (command line):1: in main chunk
        [C]: ?
stack traceback:
        [C]: in function 'assert'
        site_config.lua:9: in main chunk
        (command line):1: in main chunk
        [C]: ?

Wifi channel should be configurable by user

In the wifi settings in expert mode, the user should be able to configure the wifi channels for 2.4GHz and 5GHz. This should either be set to "default" (= site.conf setting) or "auto" and all available channels. The underlying wifi settings in uci (/etc/config/network) should be persistent and not be touched after sysupgrades if not set to "default".

Use Cases

  • For installations with meshing over wired connections and many access points in close proximity (due to many clients), it would make sense to disable wireless meshing and use the full wifi spectrum to increase usability.
  • Exclusive mesh nodes without client wifi can be established to bridge distances where no cables can be installed and wouldn't impact regular users on the default channel.

Implementation

A bit of research is needed if this can be achieved with a new package or if the existing gluon-luci-wifi-config package needs adjustments.

Directory "output" with images not created within top level build directory

Working around currently open issue #62 with tag v2019.0.4, the build otherwise seems mostly successful, i.e. image files are generated. However, it seems build process tries to create a directory "output" inside the top level "site-ffm" directory, and to populate it with the images created in some lower level subdirectories. And this fails as a botched path with some extraneous backslash "\" is being used in the attempt, e.g. (same symptom also for other build targets) "openwrt/bin/targets/x86\/generic/openwrt-x86-generic-combined-ext4.img.gz":

 make[6] -C /home/user/site-ffm.test/gluon-build/packages/packages/net/xtables-addons compile
 make[5] package/install
 make[5] target/install
 make[6] -C target/linux install
 make[5] package/index
 make[5] checksum
make[3]: Leaving directory `/home/user/site-ffm.test/gluon-build/openwrt'
cp: cannot stat 'openwrt/bin/targets/x86\\/generic/openwrt-x86-generic-combined-ext4.img.gz': No such file or directory
make[2]: *** [all] Error 1
make[2]: Leaving directory `/home/user/site-ffm.test/gluon-build'
Building target x86-geode
make[2]: Entering directory `/home/user/site-ffm.test/gluon-build'
make[3]: Entering directory `/home/user/site-ffm.test/gluon-build/openwrt'

It seems the script copy_output.sh in site-ffm/gluon-build/scripts is the one trying to use the bad path, so might be an upstream issue. But I am currently not sufficiently familiar with the entire process to track down why the script is using a botched path, whether the script itself is at fault, or whether something else is feeding it bad data.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.