Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2024-11-27 | mod/ssh-keys-import: require RouterOS 7.16routeros-7.16-5 | 2 | -2/+2 | ||
Actually the requirement bumped with the change in commits: * 9c945b1a3283bb352707c69630c579cf82484dcb mod/ssh-keys-import: $SSHKeysImportFile: simplify looping lines * 1f526b356121749991fee69cee5a6c728855c8f2 mod/ssh-keys-import: $SSHKeysImport: split with `:deserialize` | |||||
2024-11-27 | fw-addr-lists: require RouterOS 7.16routeros-7.16-4 | 2 | -2/+2 | ||
Actually the requirement bumped with the change in commit: * 084c246ef0cab329fe981732089277fa8398800b fw-addr-lists: simplify looping lines | |||||
2024-11-22 | fw-addr-lists: spamhaus.org returned to 'GTS Root R4' | 2 | -3/+3 | ||
2024-11-15 | mode-button: do not act on disabled LED | 1 | -1/+2 | ||
2024-11-15 | mode-button: catch runtime errors in executed code | 1 | -1/+5 | ||
2024-11-15 | mode-button: fix the caller parameter to $LogPrint | 1 | -3/+3 | ||
This is inside a function, so use just $0 here. | |||||
2024-11-14 | packages-update: drop check for device-mode downgrade...routeros-7.17beta5-1 | 1 | -6/+0 | ||
... as things have been revised and this specific setting was removed. | |||||
2024-11-13 | hotspot-to-wpa-cleanup: revert display of timeout value... | 3 | -3/+3 | ||
... as the timeout is a time value, and showing "4w00:00:00" (with lots of zeros) is not any better. 😜 This reverts commit f1533b8962bc67d17e9f6b5666ae51ee4d1e1ff4. | |||||
2024-11-13 | hotspot-to-wpa-cleanup: prepare real timeout value in variable... | 3 | -6/+6 | ||
... to make sure it is not re-calculated for every single lease. | |||||
2024-11-12 | hotspot-to-wpa-cleanup: clean up daily only | 3 | -3/+6 | ||
2024-11-12 | hotspot-to-wpa-cleanup: use the timeout in message... | 3 | -3/+3 | ||
... not the actual value. | |||||
2024-11-12 | check-routeros-update: always exit early if up to date... | 1 | -2/+4 | ||
... and just make the output and log dependent on terminal. | |||||
2024-11-12 | check-routeros-update: make invalid version string a warning | 1 | -1/+1 | ||
2024-11-12 | check-routeros-update: add specific message for empty version string | 1 | -0/+5 | ||
2024-11-12 | check-routeros-update: replace hard-coded version | 1 | -1/+1 | ||
2024-11-08 | mod/ssh-keys-import: $SSHKeysImport: split with `:deserialize`routeros-7.16-3 | 1 | -2/+1 | ||
2024-11-08 | mod/ssh-keys-import: $SSHKeysImportFile: let `:deserialize` split the fields | 1 | -6/+3 | ||
2024-11-08 | mod/ssh-keys-import: $SSHKeysImportFile: simplify looping linesrouteros-7.16-2 | 1 | -5/+4 | ||
2024-11-06 | fw-addr-lists: simplify looping linesrouteros-7.16-1 | 1 | -4/+3 | ||
With `:deserialize` the **record** separator is always a new line. The property `delimiter=` is a **field** reparator, so you can parse a lines into an array. We do not want (or need) that, so use new line as field separator. This will result in an array with just one element, and we use that. Also convert the data to line feed explicitly, just to be sure. | |||||
2024-11-02 | doc/netwatch-dns: link to 'certificate name from browser' | 2 | -2/+4 | ||
2024-11-02 | doc/fw-addr-lists: link to 'certificate name from browser' | 2 | -3/+8 | ||
2024-11-02 | doc/mod/notification-ntfy: link to 'certificate name from browser' | 2 | -0/+6 | ||
2024-11-02 | doc/mod/notification-matrix: link to 'certificate name from browser' | 2 | -0/+8 | ||
2024-11-02 | introduce CERTIFICATES, guide to find root certificate | 5 | -0/+74 | ||
2024-10-30 | global-functions: $CertificateAvailable: fail without CommonName | 1 | -0/+5 | ||
2024-10-29 | certs: check cert for matrix.org | 1 | -0/+1 | ||
2024-10-29 | doc/mod/notification-matrix: better document certificate import | 1 | -0/+7 | ||
2024-10-25 | ipv6-update: create a dynamic address-list entry only | 2 | -6/+10 | ||
This should make sure that the script runs once after reboot, even if the prefix does not change. An existing static entry needs to be removed to make this work! https://github.com/eworm-de/routeros-scripts/issues/85 | |||||
2024-10-23 | ipv6-update: ignore if address was acquired | 1 | -0/+6 | ||
https://github.com/eworm-de/routeros-scripts/issues/85 | |||||
2024-10-23 | fw-addr-lists: spamhaus.org requires 'ISRG Root X1' now | 2 | -3/+3 | ||
2024-10-23 | packages-update: check for explicit state...routeros-7.17beta4-2 | 1 | -3/+1 | ||
... as all device-mode properties are given since RouterOS 7.14beta4. Let's assume we do not have to care about RouterOS 7.14beta2 any more... As older versions will not match the check we can now merge right away. | |||||
2024-10-22 | backup-partition: drop warning on lock in device-moderouteros-7.17beta4-1 | 1 | -8/+0 | ||
... as switching partitions is possible again in RouterOS 7.17beta4. | |||||
2024-10-10 | doc/netwatch-notify: fix typo(s) | 1 | -3/+3 | ||
2024-10-10 | doc/netwatch-notify: give an extra example for resolving AAAA records | 1 | -1/+6 | ||
2024-10-10 | doc/netwatch-notify: always give a host... | 1 | -2/+2 | ||
... as that is a required property. Any ip address is fine, it is changed anyway. | |||||
2024-10-09 | backup-partition: log the warning just once | 1 | -1/+2 | ||
2024-10-02 | update list of contributors | 1 | -0/+1 | ||
2024-10-01 | update list of contributors | 1 | -0/+1 | ||
2024-10-01 | mod/notification-ntfy: fix ntfy overrides | 1 | -2/+2 | ||
2024-09-30 | log-forward: get last message from log... | 1 | -2/+3 | ||
... not only from matched massages. | |||||
2024-09-30 | packages-update: give warning on lock in device-moderouteros-7.17beta2-2 | 1 | -0/+8 | ||
RouterOS 7.17beta2 introduced some extra security measures, including some to prevent downgrade attacks for the installation. Detect early and exit with message and error. https://help.mikrotik.com/docs/display/ROS/Device-mode | |||||
2024-09-30 | backup-partition: give warning on lock in device-moderouteros-7.17beta2-1 | 1 | -0/+7 | ||
RouterOS 7.17beta2 introduced some extra security measures, including some to prevent downgrade attacks for the installation. Thus switching partitions (which can hold quite old installations) is denied by device-mode now by default. Warn about that... https://help.mikrotik.com/docs/display/ROS/Device-mode | |||||
2024-09-26 | global-functions: $CertificateDownload: add another check... | 1 | -0/+6 | ||
... that the certificate is really available. Turns out that mkcert.org ships certificates where OU or whatever matches - that's not what we want. | |||||
2024-09-25 | hotspot-to-wpa-cleanup: only match access-list with mac-address | 3 | -3/+3 | ||
2024-09-16 | check-routeros-update: use $VersionToNum to calculate bitmask | 1 | -2/+5 | ||
2024-09-13 | backup-partition: use $VersionToNum to calculate bitmask | 1 | -1/+2 | ||
2024-09-13 | global-functions: $VersionToNum: support "zero"... | 1 | -1/+2 | ||
... to have a clean way to generate bitmasks. [admin@mikrotik] > :put [ $VersionToNum 0.255zero0 ] 16711680 [admin@mikrotik] > :put 0x00ff0000 16711680 Once implemented everywhere the internal calculation could be changed easily. | |||||
2024-09-11 | fw-addr-lists: use lists in JSON format for spamhaus.org | 1 | -1/+3 | ||
2024-09-11 | fw-addr-lists: handle JSON format from spamhaus.org | 1 | -1/+6 | ||
Closes: https://github.com/eworm-de/routeros-scripts/issues/79 | |||||
2024-09-05 | netwatch-dns: give warning on CRL use | 1 | -0/+4 | ||
2024-09-04 | certs: add poor man's check 😜 | 1 | -0/+31 | ||
2024-08-28 | certs: drop 'Baltimore CyberTrust Root' | 1 | -28/+0 | ||
2024-08-28 | fw-addr-lists: drop edrop.txt, which does no longer exist | 1 | -2/+0 | ||
2024-08-28 | fw-addr-lists: spamhaus.org requires 'GTS Root R4' now | 1 | -2/+2 | ||
Fixes: https://github.com/eworm-de/routeros-scripts/issues/78 | |||||
2024-08-27 | certs: drop 'DigiCert Global Root CA' | 1 | -29/+0 | ||
2024-08-27 | doc/netwatch-dns: 'DigiCert Global Root G3' for Quad9 | 1 | -1/+1 | ||
2024-08-27 | certs: add 'DigiCert Global Root G3'... | 1 | -0/+22 | ||
... for quad9.net which can be used for DoH: $CertificateAvailable "DigiCert Global Root G3"; /ip/dns/set use-doh-server=https://9.9.9.9/dns-query verify-doh-cert=yes; | |||||
2024-08-20 | check-routeros-update: support switching to stable channel... | 1 | -0/+9 | ||
... with a feature update in testing channel. | |||||
2024-08-19 | netwatch-dns: disable DoH if time not sync... | 1 | -0/+8 | ||
... as it is possible that time is off, DNS via DoH fails (cert invalid), and finally syncing time fails due to failing DNS. | |||||
2024-08-19 | INITIAL-COMMANDS: match the certificate file name from Let's Encrypt website... | 1 | -2/+2 | ||
... and our README. 😜 | |||||
2024-08-19 | README: match the certificate file name from Let's Encrypt website... | 2 | -2/+2 | ||
... so import from manually downloaded and transferred file works out of the box as well. | |||||
2024-08-19 | README: make the QR code a link | 1 | -1/+1 | ||
2024-07-25 | telegram-chat: drop extra conversionrouteros-7.15-3 | 2 | -3/+3 | ||
The JSON parser was actually fixed in RouterOS 7.15beta4, but let's bump the required version to next stable release instead. | |||||
2024-07-25 | daily-psk: drop workaround for old RouterOSrouteros-7.15-2 | 5 | -11/+7 | ||
2024-07-25 | netwatch-notify: do not switch type when resolvingrouteros-7.15-1 | 2 | -3/+4 | ||
This requires RouterOS 7.15beta4, but let's bump the required version to next stable release instead. | |||||
2024-07-25 | INITIAL-COMMANDS: drop command to remove certificate file... | 1 | -1/+0 | ||
... as this is done automatically with RouterOS 7.15rc1 and later. | |||||
2024-07-25 | README: drop command to remove certificate file... | 2 | -2/+1 | ||
... as this is done automatically with RouterOS 7.15rc1 and later. Not bumping the required RouterOS version (badge) here... Worst thing that can happen is a stale certificate file left on storage. | |||||
2024-07-22 | global-functions: $EitherOr: revert... | 1 | -3/+1 | ||
... but leave a comment. | |||||
2024-07-22 | global-functions: $EitherOr: pass boolean value | 1 | -0/+3 | ||
Note that literal "true" or "false" (even without quotes) is converted to string. So you may have to enclose it in parentheses for a boolean value: > :put [ :typeof [ $EitherOr true false ] ]; str > :put [ :typeof [ $EitherOr (true) (false) ] ]; bool | |||||
2024-07-16 | Merge branch 'line-breaks' into nextrouteros-7.14-1 | 123 | -152/+140 | ||
2024-07-16 | bump RouterOS requirement for all scripts and modules... | 116 | -116/+116 | ||
... now that global-functions requires RouterOS 7.14 anyway. | |||||
2024-07-16 | mod/ipcalc: use :tocrlf | 2 | -5/+4 | ||
2024-07-16 | mod/inspectvar: use :tocrlf | 2 | -4/+3 | ||
2024-07-16 | global-functions: $Unix2Dos: use :tocrlf | 1 | -6/+1 | ||
2024-07-16 | global-functions: $PrettyPrint: use :tocrlf | 1 | -5/+1 | ||
2024-07-16 | global-functions: $Dos2Unix: use :tolf | 1 | -5/+1 | ||
2024-07-16 | global-functions: $ScriptInstallUpdate: support storing with CRLF | 1 | -1/+3 | ||
Adding this in `global-config-overlay` make the scripts being stored with CRLF line breaks: :global ScriptUpdatesCRLF true; Handle with care, I do not recommend it. Thus it's just a hidden setting. | |||||
2024-07-16 | ppp-on-up: support scripts with CRLF line breaks | 1 | -1/+1 | ||
2024-07-16 | news-and-changes: support scripts with CRLF line breaks | 1 | -1/+1 | ||
2024-07-16 | capsman-download-packages: support scripts with CRLF line breaks | 3 | -3/+3 | ||
2024-07-16 | global-functions: $ScriptInstallUpdate: allow CRLF on device | 1 | -1/+2 | ||
2024-07-16 | global-functions: $ScriptInstallUpdate: forcibly convert to LF... | 1 | -2/+2 | ||
... to make sure we do not have unintended CRLF line breaks. | |||||
2024-07-16 | README: use :tocrlf to convert global-config-overlay | 1 | -2/+2 | ||
2024-07-16 | doc/mod/ssh-keys-import: drop hint on older RouterOS | 1 | -5/+1 | ||
2024-07-11 | capsman-download-packages: support running several scripts... | 3 | -9/+15 | ||
... as it is possible to have more than just one providing the functionality. | |||||
2024-07-11 | capsman-{download-packages,rolling-upgrade}: run matching script | 6 | -6/+6 | ||
It is possible to run old and new CAPsMAN on one system simultaneously (... since RouterOS 7.13?). Thus it may make sense to have both variants of these scripts installed, and we have to make sure to run the correct one. | |||||
2024-07-10 | update list of contributors | 1 | -0/+1 | ||
2024-07-08 | backup-partition: check that target is inactive | 1 | -2/+2 | ||
2024-07-08 | backup-partition: check the fallback partition actually exists... | 1 | -8/+16 | ||
... and use its id for actions. | |||||
2024-07-05 | backup-partition: rename variable | 1 | -8/+8 | ||
2024-07-04 | packages-update: run backups before package download | 1 | -26/+26 | ||
This reduces memory pressure, especially on device with very limited RAM like mAP with its 64 MB. | |||||
2024-07-04 | global-functions: $MkDir: enable tmpfs if disabled | 1 | -1/+6 | ||
2024-07-02 | global-functions: $GetMacVendor: cert 'GTS Root R4' | 2 | -1/+21 | ||
2024-06-25 | check-certificates: limit scope for $CertNew... | 1 | -4/+3 | ||
... into block where certificate is replaced. This should unbreak renewing with a certificate updated in place. | |||||
2024-06-21 | global-functions: $CertificateDownload: try fallback to mkcert.orgchange-131 | 2 | -11/+31 | ||
There's a nice API that allows to download certificate by exact common name. Let's use that, as a fallback at least. https://mkcert.org/ | |||||
2024-06-21 | Merge branch 'root-certificates' into next | 36 | -2456/+334 | ||
2024-06-21 | notify on changes regarding certificateschange-130 | 2 | -1/+2 | ||
2024-06-21 | certs: DigiCert TLS Hybrid ECC SHA384 2020 CA1 -> DigiCert Global Root CA | 3 | -175/+30 | ||
This is used by Cloudflare DNS Quard9 (9.9.9.9). $CertificateAvailable "DigiCert Global Root CA"; /ip/dns/set use-doh-server=https://9.9.9.9/dns-query verify-doh-cert=yes; | |||||
2024-06-21 | certs: DigiCert Global G2 TLS RSA SHA256 2020 CA1 -> DigiCert Global Root G2 | 3 | -183/+30 | ||
This is used by Cloudflare DNS (1.1.1.1). $CertificateAvailable "DigiCert Global Root G2"; /ip/dns/set use-doh-server=https://1.1.1.1/dns-query verify-doh-cert=yes; | |||||
2024-06-21 | certs: Go Daddy Secure Certificate Authority - G2 -> Go Daddy Root ↵ | 4 | -180/+32 | ||
Certificate Authority - G2 |