-
Notifications
You must be signed in to change notification settings - Fork 50
Open
Description
What would you like to be added?
/kind enhancement
Please add mips and mipsel (mipsle) targets for the future builds.
Why is this needed?
I've successfully compiled cs-firewall-bouncer for mipsel and uploaded it to my Keenetic router (Entware/OPKG linux): GOOS=linux GOARCH=mipsle go build, everything works fine.
It would be nice if binaries built automatically for each release to make updates easier.
Here is my config on Keenetic Viva if someone interested:
~ # ps | grep cs-
30841 root 536m S cs-firewall-bouncer -c /opt/etc/crowdsec/crowdsec-firewall-bouncer.yaml
~ # iptables -L
...
Chain @PPPoE0 (1 references)
target prot opt source destination
CROWDSEC_CHAIN all -- anywhere anywhere
ACCEPT icmp -- 172.16.0.0/20 anywhere
ACCEPT icmp -- anywhere anywhere
...
Chain CROWDSEC_CHAIN (1 references)
target prot opt source destination
DROP all -- anywhere anywhere match-set crowdsec-blacklists-4 src
DROP all -- anywhere anywhere match-set crowdsec-blacklists-3 src
DROP all -- anywhere anywhere match-set crowdsec-blacklists-2 src
DROP all -- anywhere anywhere match-set crowdsec-blacklists-1 src
DROP all -- anywhere anywhere match-set crowdsec-blacklists-0 src
...
~ # cat /opt/etc/crowdsec/crowdsec-firewall-bouncer.yaml
mode: iptables
update_frequency: 10s
log_mode: stdout
log_level: info
api_url: https://REDACTED
api_key: REDACTED
insecure_skip_verify: false
disable_ipv6: false
deny_action: DROP
deny_log: false
supported_decisions_types:
- ban
blacklists_ipv4: crowdsec-blacklists
blacklists_ipv6: crowdsec6-blacklists
ipset_type: nethash
iptables_chains:
# - "_NDM_ACL_IN"
- "@PPPoE0"
# important to disable comments, Keenetic doesn't support them
iptables_add_rule_comments: false
prometheus:
enabled: false
listen_addr: 127.0.0.1
listen_port: 60601
Reactions are currently unavailable