git: f001878b3e06 - main - net/sslh: update to 1.22c
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 26 Jan 2022 07:37:02 UTC
The branch main has been updated by marius:
URL: https://cgit.FreeBSD.org/ports/commit/?id=f001878b3e063b2ceb70c31afeec232960fbc061
commit f001878b3e063b2ceb70c31afeec232960fbc061
Author: Marius Strobl <marius@FreeBSD.org>
AuthorDate: 2022-01-09 19:12:21 +0000
Commit: Marius Strobl <marius@FreeBSD.org>
CommitDate: 2022-01-26 07:36:39 +0000
net/sslh: update to 1.22c
Most notably, sslh now supports UDP and, thus, QUIC and Teamspeak.
For the release announcement see:
https://lists.rutschle.net/mailman/archives/sslh/2021-August/000744.html
While at it:
- Give the sample configuration file @sample treatment.
- Install all remaining example configuration files as EXAMPLES.
- Make the EXAMPLES knob actually work as intended by not installing
corresponding files when it's off.
- Refresh pkg-descr.
PR: 261067
Approved by: maintainer timeout
---
net/sslh/Makefile | 27 +++++++++++----------------
net/sslh/distinfo | 6 +++---
net/sslh/pkg-descr | 23 +++++++++++++++++++----
3 files changed, 33 insertions(+), 23 deletions(-)
diff --git a/net/sslh/Makefile b/net/sslh/Makefile
index 7e4c91b526fd..7d5abec5527e 100644
--- a/net/sslh/Makefile
+++ b/net/sslh/Makefile
@@ -1,7 +1,7 @@
# Created by: Jui-Nan Lin <jnlin@csie.nctu.edu.tw>
PORTNAME= sslh
-PORTVERSION= 1.21c
+PORTVERSION= 1.22c
DISTVERSIONPREFIX= v
CATEGORIES= net
@@ -12,36 +12,29 @@ LICENSE= GPLv2
LICENSE_FILE= ${WRKSRC}/COPYING
LIB_DEPENDS= libconfig.so:devel/libconfig \
- libpcre.so:devel/pcre
-
-USES= gmake perl5
-USE_PERL5= build
+ libpcre2-8.so:devel/pcre2
+USES= gmake
+USE_RC_SUBR= sslh
USE_GITHUB= yes
GH_ACCOUNT= yrutschle
OPTIONS_DEFINE= EXAMPLES LIBWRAP
-OPTIONS_DEFAULT= LIBWRAP
+OPTIONS_DEFAULT=LIBWRAP
+
+LIBWRAP_MAKE_ENV= USELIBWRAP=1
CFLAGS+= -I${LOCALBASE}/include
LDFLAGS+= -L${LOCALBASE}/lib
PLIST_FILES= sbin/sslh-fork \
sbin/sslh-select \
- etc/sslh.conf.sample \
+ "@sample etc/sslh.conf.sample" \
man/man8/sslh.8.gz
-USE_RC_SUBR= sslh
-
-PORTEXAMPLES= example.cfg
-
-MAKE_JOBS_UNSAFE= yes
-
-LIBWRAP_MAKE_ENV= USELIBWRAP=1
+PORTEXAMPLES= example.cfg test.cfg udp.cfg
post-patch:
- @${REINPLACE_CMD} -Ee 's,^(release=)$$,\1${PORTVERSION},' \
- ${WRKSRC}/genver.sh
@${REINPLACE_CMD} -Ee 's,/etc/init.d/(sslh),${PREFIX}/etc/rc.d/\1,g; \
s,/etc/default/(sslh),${PREFIX}/etc/\1.conf,g' \
${WRKSRC}/sslh.pod
@@ -52,6 +45,8 @@ do-install:
${INSTALL_DATA} ${WRKSRC}/basic.cfg \
${STAGEDIR}${PREFIX}/etc/${PORTNAME}.conf.sample
${INSTALL_MAN} ${WRKSRC}/sslh.8.gz ${STAGEDIR}${MANPREFIX}/man/man8
+
+do-install-EXAMPLES-on:
@${MKDIR} ${STAGEDIR}${EXAMPLESDIR}
${INSTALL_DATA} ${PORTEXAMPLES:S,^,${WRKSRC}/,} \
${STAGEDIR}${EXAMPLESDIR}/
diff --git a/net/sslh/distinfo b/net/sslh/distinfo
index 79be7ae47d55..3916f5c1905b 100644
--- a/net/sslh/distinfo
+++ b/net/sslh/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1596492623
-SHA256 (yrutschle-sslh-v1.21c_GH0.tar.gz) = 2e457e59592f8e523cade8d9302b0fdc87f8ea0322beb674dd7f067547a93ea9
-SIZE (yrutschle-sslh-v1.21c_GH0.tar.gz) = 111895
+TIMESTAMP = 1641747765
+SHA256 (yrutschle-sslh-v1.22c_GH0.tar.gz) = ec5f6998f90b2849d113f2617db7ceca5281fbe4ef55fcd185789d390c09eb04
+SIZE (yrutschle-sslh-v1.22c_GH0.tar.gz) = 146954
diff --git a/net/sslh/pkg-descr b/net/sslh/pkg-descr
index dae85d1109a1..c7177fc38ccd 100644
--- a/net/sslh/pkg-descr
+++ b/net/sslh/pkg-descr
@@ -1,5 +1,20 @@
-sslh accepts HTTPS, SSH, OpenVPN, tinc and XMPP connections on the same port.
-This makes it possible to connect to any of these servers on port 443 while
-still serving HTTPS on that port.
+sslh accepts connections on specified ports, and forwards them further based
+on tests performed on the first data packet sent by the remote client.
-WWW: http://www.rutschle.net/tech/sslh.shtml
+Probes for HTTP, TLS/SSL (including SNI and ALPN), SSH, OpenVPN, tinc, XMPP,
+SOCKS5, are implemented, and any other protocol that can be tested using a
+regular expression, can be recognised. A typical use case is to allow serving
+several services on port 443 (e.g. to connect to SSH from inside a corporate
+firewall, which almost never block port 443) while still serving HTTPS on
+that port.
+
+Hence sslh acts as a protocol demultiplexer, or a switchboard. With the SNI
+and ALPN probe, it makes a good front-end to a virtual host farm hosted
+behind a single IP address.
+
+sslh has the bells and whistles expected from a mature daemon: privilege and
+capabilities dropping, inetd support, systemd support, transparent proxying,
+chroot, logging, IPv4 and IPv6, TCP and UDP, a fork-based and a select-based
+model, and more.
+
+WWW: https://www.rutschle.net/tech/sslh.shtml