Commit Graph

11 Commits

Author SHA1 Message Date
sthen
1e55a9b592 update to sniproxy-0.6.6, from Renaud Allard (maintainer) 2023-01-30 15:10:36 +00:00
ajacoutot
c4096e6659 Stop using the daemon class in @newuser.
If we need to make an exception we can do it and properly document the
reason but by default we should just use the default login class.
rc.d uses daemon or the login class provided in login.conf.d so this has
no impact there.

discussed with sthen@, tb@ and robert@

praying that my grep/sed skills did not break anything and still
believing in portbump :-)
2022-11-08 11:16:56 +00:00
naddy
3f5796b9fd drop RCS Ids 2022-03-11 19:45:43 +00:00
danj
165924aed6 Remove empty files
ok sthen solene
2021-07-08 01:49:34 +00:00
kmos
a1ecf70fbc Fix build on sparc64 by using ports-gcc rather than base-gcc
"looks fine to me" Renaud Allard  (maintainer)
2021-05-16 17:14:41 +00:00
solene
d1e3405796 Update to sniproxy-0.6.5
Diff from maintainer Renaud Allard
2021-03-13 09:19:41 +00:00
kmos
9b2454d3a4 base-gcc doesn't understand "-Wpedantic". Remove that option to fix the
build on sparc64

ok Renaud Allard (maintainer)
2021-03-08 08:11:15 +00:00
solene
32581995e3 Update to sniproxy-0.6.4
Update from maintainer Renaud Allard

This new version is based on a fork from Renaud Allard because the original
upstream project hasn't merged important patches submitted by the community
for a long time. The new fork imported all the patches and added pledge.
2021-03-02 20:10:51 +00:00
tb
0de7d179ce sniproxy: fix for -fno-common and a compiler warning
-fno-common fix from upstream
https://github.com/dlundquist/sniproxy/pull/349

ok Renaud Allard (maintainer)
2021-02-09 15:06:50 +00:00
denis
7e3d98f862 Remove useless patch since STAILQ_* has been added to base queue.h
Looks fine to maintainer Renaud Allard
2021-01-04 13:04:06 +00:00
bket
56cdc71287 Import sniproxy-0.6.0. From Renaud Allard <renaud@allard.it> who also
takes MAINTAINER.

OK sthen@

Comment:
name-based proxying of HTTPS without decrypting traffic

Description:
Proxies incoming HTTP and TLS connections based on the hostname
contained in the initial request of the TCP session without decrypting
traffic. This enables HTTPS name-based virtual hosting to separate
backend servers without installing the private key on the proxy machine.

- Supports IPv4, IPv6 and Unix domain sockets for both back end
servers and listeners.

- Supports multiple listening sockets per instance.

- Supports HAProxy protocol to propagate original source address to
backend servers.

Homepage:
https://github.com/dlundquist/sniproxy

Maintainer:
Renaud Allard <renaud@allard.it>
2020-04-08 04:56:52 +00:00