277 Commits

Author SHA1 Message Date
sthen
accef96e34 un-revert previous revert, and add a patch from upstream to fix https tunnels 2014-04-26 12:06:52 +00:00
sthen
01cf8eec5e partially revert upstream commit to fix failures with https CONNECT
introduced in 3.4.4.2

http://bugs.squid-cache.org/show_bug.cgi?id=4051
2014-04-26 10:34:04 +00:00
sthen
441a9c2a35 update squid/stable to 3.4.4.2, move some now-common pieces up into
squid/Makefile.inc, and regen PLISTs with @commented pieces from PLIST-ntlm
to avoid problems with future regens if samba is installed.
2014-04-24 14:26:21 +00:00
sthen
877f724b3e disable ntlm subpackage for now, it depends on samba,ads 2014-04-21 23:37:55 +00:00
sthen
19137831c2 disable kerberos 2014-04-21 20:29:50 +00:00
sthen
08667fdeed remove dead patch files 2014-04-21 19:22:06 +00:00
ajacoutot
cfe4be35c5 No need to explicitely SUBST_VARS LOCALSTATEDIR anymore. 2014-04-15 08:53:04 +00:00
sthen
7fc1244a3e adjust autoconf test to check for working 64-bit atomic ops (which is not the
case on i386 without using -march=i586 or higher), and remove BROKEN-i386
2014-04-13 21:41:00 +00:00
sthen
838bf67e0b update to newer snapshot of squid, and mark BROKEN-i386 for now - stable
version is unaffected. (If atomic ops are available at all, it wants 64-bit
ops; http://permalink.gmane.org/gmane.comp.web.squid.devel/22453)
2014-04-13 12:38:37 +00:00
sthen
8341c987d2 missed a bump when I moved this from snapshots/ to stable/, thanks naddy@ 2014-04-09 19:47:51 +00:00
sthen
5d4f1010d1 switch squid/stable to the 3.4 branch, and update squid/snapshot to a
recent snapshot from the 3.5 branch
2014-04-08 12:22:48 +00:00
sthen
4a6353aec2 test pod2man differently, previous version no good with perl 5.18 2014-03-21 12:46:55 +00:00
sthen
c03c98a5b8 update to squid-3.4.4, security fix for CVE-2014-0128 in HTTPS request
handling affecting users who have enabled the "ssl-bump" MITM feature.

workarounds at
http://www.squid-cache.org/Advisories/SQUID-2014_1.txt

Also includes other fixes, see changelog.
2014-03-16 13:15:12 +00:00
sthen
c9f8aa721c update to squid-3.3.12, security fix for CVE-2014-0128 in HTTPS request
handling, only affects users who have enabled the "ssl-bump" MITM feature.

workarounds at
http://www.squid-cache.org/Advisories/SQUID-2014_1.txt
2014-03-16 12:58:48 +00:00
sthen
8c63d62465 update to squid 3.4.3 2014-03-09 20:56:44 +00:00
sthen
6bc6cc88db Squid 3.4's build process uses -march=native by default; disable to avoid cpu-
specific code in packages. Reported and diagnosed by Aleksandar Lazic, thanks!
2014-01-27 13:38:17 +00:00
sthen
a7da13f462 update to squid 3.4.2
3.4.x is now classed as a stable release upstream, but let's leave 3.3
around for now in squid/stable until we have more experience with 3.4 as
there have been fairly big chances to the tproxy code.
2014-01-10 20:54:27 +00:00
sthen
f5d77ee7cf update squid/snapshot to 3.4.1 2013-12-10 12:09:17 +00:00
sthen
4eef3dbb4f update to squid 3.4.0.3 2013-12-07 10:47:29 +00:00
sthen
0ab0266ef4 update to squid 3.3.11 2013-12-07 10:47:20 +00:00
sthen
3c95359333 oops, forgot to regen PLIST in squid/stable after disabling an auth module,
reported by naddy@.
2013-11-16 19:20:46 +00:00
sthen
85d9a928ff Update to squid-3.3.10 and reorganise the squid ports; retire squid-2.7
(it was kept separately because 3.x didn't build on some arch due to an
incomplete atomic ops autoconf check which has since been repaired) and
replace with 3.4 (devel version). Enable additional helpers and turn on
support for rock cache dirs.
2013-11-15 19:09:17 +00:00
sthen
27f03b1c52 bump REVISION for any ports using route messages. regen some distinfos and
remove unnecessary USE_GROFFs while there.
2013-10-31 21:12:12 +00:00
sthen
f5640e28da update to squid 3.3.9 2013-09-17 16:56:24 +00:00
sthen
15566a655e Fix autoconf check for atomic ops (it needs to attempt linking, not just
compiling); likely to fix arm. Remove BROKEN-* to give this another chance
on hppa/mips64 too.
2013-08-15 11:10:16 +00:00
sthen
05787d260d SECURITY update to Squid 3.3.8, fixes CVE-2013-4115 CVE-2013-4123
"Due to incorrect data validation Squid is vulnerable to a buffer overflow
attack when processing specially crafted HTTP requests."
2013-07-15 08:21:54 +00:00
sthen
a86b09b5d4 update to squid-3.3.6 2013-07-11 14:28:01 +00:00
sthen
ec6bb7d789 squid documentation generally uses the nomenclature "interception proxy"
rather than "transparent proxy"; switch the readme to match. also tweak the
wording to make it clear which firewall reals need to be on which machine
when having a router pass off http traffic to squid on a different machine
configured as an interception proxy.
2013-06-21 21:37:56 +00:00
lteo
5b3395e57b Fix incorrect path of squid.conf in pkg/README-main.
OK sthen@ (maintainer)
2013-06-21 01:54:55 +00:00
ajacoutot
25b3041f91 Unbreak after hx509 and ntlm removal from Kerberos. 2013-06-20 06:54:36 +00:00
ajacoutot
9920238d6f Unbreak with new Heimdal; get rid of self-cooked krb5-config since we
have it in base now.
2013-06-17 19:30:22 +00:00
sthen
fc39912ef2 - add patch from upstream, fixing problem with kqueue and SSL MITM
- s/transparent/intercept/ in README, as I happened to notice in a misc@
post from Rob Sheldon
2013-06-03 11:01:03 +00:00
sthen
50a80c79e5 update to squid 3.3.5 2013-05-25 12:33:05 +00:00
sthen
e429329751 Major update to Squid 3.3.4 (moving the port from the 3.2 branch to 3.3).
New features include:

- SQL Database logging helper
- Time-Quota session helper
- Custom HTTP request headers
- SSL-Bump Server First
- Server Certificate Mimic

While there, add notes to README-main about increasing the number of
file descriptors via login.conf.
2013-04-30 18:41:50 +00:00
sthen
5c7ac6266b minor update to squid 3.2.11 2013-04-30 14:05:51 +00:00
sthen
12454f4e76 update to squid-3.2.10: fixes & rolling in some patches committed upstream 2013-04-27 15:19:48 +00:00
sthen
1a7ed26e74 printf format string fix for long long time_t 2013-04-25 21:29:52 +00:00
ajacoutot
58f1a6f9f6 USE_LIBTOOL=Yes is the default now. 2013-03-21 08:45:11 +00:00
sthen
89bdb97ebe update to Squid 3.2.9, various fixes including DoS affecting 3.2.0.9 and up
(CVE-2013-1839).
2013-03-12 14:58:16 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
espie
c90669c473 fix LIB_DEPENDS for arches that need the gcc4 modules (multi-packages are
fun that way). Bump affected pkgs just in case.

problem noticed by rpe@

okay naddy@, sthen@
2013-02-24 11:18:38 +00:00
sthen
f5a323c546 Don't use ${FLAVOR:L}, we only support lower-case flavours now.
OK ajacoutot@ espie@
2013-02-09 14:49:50 +00:00
ajacoutot
e03c56c9c5 MODGCC4_VERSION default to 4.6 now. 2013-02-07 19:13:49 +00:00
sthen
9c86b4a801 bugfix update to Squid 3.2.7 including memory leak with malformed req's,
unhandled exception when using interception and peers, a division by zero
and others
2013-02-01 17:34:33 +00:00
sthen
659a53af65 build dep on libtool (for libtoolize) 2013-01-23 20:39:57 +00:00
sthen
af9d1f1acc landry@ noticed that www/squid was picking up execinfo.h in bulk causing
#ifdef'd headers to be used and dpb was junking it thus breaking the build;
fix by improving detection for backtrace_symbol_fd / libexecinfo and
explicitly using it.
2013-01-22 14:30:46 +00:00
sthen
26aa57248c bugfix update to squid-3.2.6 2013-01-09 21:41:48 +00:00
sthen
7281799b84 build with gcc 4.6 on ppc to avoid "unrecognizable insn" in src/ipc/StoreMap.cc
breakage reported by aja@
2013-01-02 12:26:58 +00:00
jasper
391025a59a mark broken on mips64 for the same reason hppa fails. 2012-12-20 21:48:41 +00:00
sthen
08607b4d02 squid 3.2.5; minor update, it just rolls in the compat/xstrerror.h diff. 2012-12-17 18:56:56 +00:00