forked from pool/squid
Accepting request 317787 from server:proxy
1 OBS-URL: https://build.opensuse.org/request/show/317787 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/squid?expand=0&rev=27
This commit is contained in:
commit
5c51c5d502
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:23793da6b23871765188becae59a6f4b6c3672c256ba9be90743b46a3c7921cf
|
|
||||||
size 2290016
|
|
@ -1,20 +0,0 @@
|
|||||||
File: squid-3.5.5.tar.xz
|
|
||||||
Date: Thu May 28 11:58:32 UTC 2015
|
|
||||||
Size: 2290016
|
|
||||||
MD5 : 9a323a97753143ddd935aed58a0193ae
|
|
||||||
SHA1: 2c168e8b13251ed8050d9e780127c4de016dcb61
|
|
||||||
Key : 0xFF5CF463 <squid3@treenet.co.nz>
|
|
||||||
fingerprint = EA31 CC5E 9488 E516 8D2D CC5E B268 E706 FF5C F463
|
|
||||||
keyring = http://www.squid-cache.org/pgp.asc
|
|
||||||
keyserver = subkeys.pgp.net
|
|
||||||
-----BEGIN PGP SIGNATURE-----
|
|
||||||
Version: GnuPG v1
|
|
||||||
|
|
||||||
iQEcBAABAgAGBQJVZwTYAAoJELJo5wb/XPRjGGMH/j81al1zE8X0nJdISJFvRt3K
|
|
||||||
/he7046bmlRKavlShiIcVulnAxgIwApV1cBz1sZffWwRB+o8nZ/RWThowwi0urv+
|
|
||||||
ofz6/jwV93VVWFFlXXsNP9Qj8PnZI4Zj4xHWs7ObPCdCLbY4mRx31lUcGyXRTFhI
|
|
||||||
1vXOMb2hE8hFWHwazlSvRLmXfCgt/Y6bRH8VD65G4n4G7u3jHl10nvISiUgB9rkr
|
|
||||||
cddv8zVztM+Ng948hO+eQnnjvtQBrjfKH1QXrJbgPNbKLpG0p97Txq767E3YEPm2
|
|
||||||
ax/mxIPPeV5ZT6g2YSSsTZ1NJvlyni7h9l/p/uxhpDo7kMxunAUrzxzoXnZmE9s=
|
|
||||||
=MtNr
|
|
||||||
-----END PGP SIGNATURE-----
|
|
3
squid-3.5.6.tar.xz
Normal file
3
squid-3.5.6.tar.xz
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:cd080e8d5eaabebf6808792751322bd05f2a9c8fe4377f54c7155682ef6c38d5
|
||||||
|
size 2291152
|
20
squid-3.5.6.tar.xz.asc
Normal file
20
squid-3.5.6.tar.xz.asc
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
File: squid-3.5.6.tar.xz
|
||||||
|
Date: Fri Jul 3 10:16:07 UTC 2015
|
||||||
|
Size: 2291152
|
||||||
|
MD5 : 93e18bd257857e35bb634ddb8a348563
|
||||||
|
SHA1: c5f3ab47e61a08fa6a8767d45befeffd7d26fd9f
|
||||||
|
Key : 0xFF5CF463 <squid3@treenet.co.nz>
|
||||||
|
fingerprint = EA31 CC5E 9488 E516 8D2D CC5E B268 E706 FF5C F463
|
||||||
|
keyring = http://www.squid-cache.org/pgp.asc
|
||||||
|
keyserver = subkeys.pgp.net
|
||||||
|
-----BEGIN PGP SIGNATURE-----
|
||||||
|
Version: GnuPG v1
|
||||||
|
|
||||||
|
iQEcBAABAgAGBQJVlmX5AAoJELJo5wb/XPRj2oMH/0iikz7b90VgI9W82+b20e8F
|
||||||
|
BcMqoSc0RvszVFgaZ1V7WOVDD86AeEMaqGlLsyL1Jvk1+dzHmTj4i5FmqrlSfj3i
|
||||||
|
CdbfLFeL2/dldKYf++FsklALtIySDdbHOHeb/ri8URrOwKcC73DXEkkVq0nr/PJc
|
||||||
|
4QwCNGU9z2xm8teqhHqtC58oRcvnktAFB3L03aiBO1VmMEpT9vhcKRfCIK6v4uYu
|
||||||
|
ZZtcRbVrg301VkWHuo+/Vi9DKTxonQ/Za5g5rXkQRDwcbVcI0e3adeUoXT7znmix
|
||||||
|
lCy9ddqFlLCCkQ/Bq/+qqKrExZ/hQRXIlQM8r/aSELq6X+bbXL6DnggkAdE/DTo=
|
||||||
|
=m7d2
|
||||||
|
-----END PGP SIGNATURE-----
|
@ -1,124 +0,0 @@
|
|||||||
Index: helpers/basic_auth/fake/fake.cc
|
|
||||||
===================================================================
|
|
||||||
--- helpers/basic_auth/fake/fake.cc.orig
|
|
||||||
+++ helpers/basic_auth/fake/fake.cc
|
|
||||||
@@ -99,7 +99,7 @@ main(int argc, char *argv[])
|
|
||||||
|
|
||||||
process_options(argc, argv);
|
|
||||||
|
|
||||||
- debug("%s build " __DATE__ ", " __TIME__ " starting up...\n", program_name);
|
|
||||||
+ debug("%s starting up...\n", program_name);
|
|
||||||
|
|
||||||
while (fgets(buf, HELPER_INPUT_BUFFER, stdin) != NULL) {
|
|
||||||
char *p;
|
|
||||||
@@ -115,7 +115,7 @@ main(int argc, char *argv[])
|
|
||||||
/* send 'OK' result back to Squid */
|
|
||||||
SEND_OK("");
|
|
||||||
}
|
|
||||||
- debug("%s build " __DATE__ ", " __TIME__ " shutting down...\n", program_name);
|
|
||||||
+ debug("%s shutting down...\n", program_name);
|
|
||||||
exit(0);
|
|
||||||
}
|
|
||||||
|
|
||||||
Index: helpers/external_acl/AD_group/ext_ad_group_acl.cc
|
|
||||||
===================================================================
|
|
||||||
--- helpers/external_acl/AD_group/ext_ad_group_acl.cc.orig
|
|
||||||
+++ helpers/external_acl/AD_group/ext_ad_group_acl.cc
|
|
||||||
@@ -801,8 +801,7 @@ main(int argc, char *argv[])
|
|
||||||
if (!DefaultDomain)
|
|
||||||
DefaultDomain = xstrdup(machinedomain);
|
|
||||||
}
|
|
||||||
- debug("External ACL win32 group helper build " __DATE__ ", " __TIME__
|
|
||||||
- " starting up...\n");
|
|
||||||
+ debug("External ACL win32 group helper build starting up...\n");
|
|
||||||
if (use_global)
|
|
||||||
debug("Domain Global group mode enabled using '%s' as default domain.\n", DefaultDomain);
|
|
||||||
if (use_case_insensitive_compare)
|
|
||||||
Index: helpers/external_acl/LM_group/ext_lm_group_acl.cc
|
|
||||||
===================================================================
|
|
||||||
--- helpers/external_acl/LM_group/ext_lm_group_acl.cc.orig
|
|
||||||
+++ helpers/external_acl/LM_group/ext_lm_group_acl.cc
|
|
||||||
@@ -540,8 +540,7 @@ main(int argc, char *argv[])
|
|
||||||
if (!DefaultDomain)
|
|
||||||
DefaultDomain = xstrdup(machinedomain);
|
|
||||||
}
|
|
||||||
- debug("External ACL win32 group helper build " __DATE__ ", " __TIME__
|
|
||||||
- " starting up...\n");
|
|
||||||
+ debug("External ACL win32 group helper build starting up...\n");
|
|
||||||
if (use_global) {
|
|
||||||
debug("Domain Global group mode enabled using '%s' as default domain.\n", DefaultDomain);
|
|
||||||
}
|
|
||||||
Index: helpers/negotiate_auth/SSPI/negotiate_sspi_auth.cc
|
|
||||||
===================================================================
|
|
||||||
--- helpers/negotiate_auth/SSPI/negotiate_sspi_auth.cc.orig
|
|
||||||
+++ helpers/negotiate_auth/SSPI/negotiate_sspi_auth.cc
|
|
||||||
@@ -281,7 +281,7 @@ main(int argc, char *argv[])
|
|
||||||
|
|
||||||
process_options(argc, argv);
|
|
||||||
|
|
||||||
- debug("%s build " __DATE__ ", " __TIME__ " starting up...\n", my_program_name);
|
|
||||||
+ debug("%s starting up...\n", my_program_name);
|
|
||||||
|
|
||||||
if (LoadSecurityDll(SSP_NTLM, NEGOTIATE_PACKAGE_NAME) == NULL) {
|
|
||||||
fprintf(stderr, "FATAL: %s: can't initialize SSPI, exiting.\n", argv[0]);
|
|
||||||
Index: helpers/ntlm_auth/SSPI/ntlm_sspi_auth.cc
|
|
||||||
===================================================================
|
|
||||||
--- helpers/ntlm_auth/SSPI/ntlm_sspi_auth.cc.orig
|
|
||||||
+++ helpers/ntlm_auth/SSPI/ntlm_sspi_auth.cc
|
|
||||||
@@ -619,7 +619,7 @@ main(int argc, char *argv[])
|
|
||||||
|
|
||||||
process_options(argc, argv);
|
|
||||||
|
|
||||||
- debug("%s build " __DATE__ ", " __TIME__ " starting up...\n", my_program_name);
|
|
||||||
+ debug("%s starting up...\n", my_program_name);
|
|
||||||
|
|
||||||
if (LoadSecurityDll(SSP_NTLM, NTLM_PACKAGE_NAME) == NULL) {
|
|
||||||
fprintf(stderr, "FATAL, can't initialize SSPI, exiting.\n");
|
|
||||||
Index: helpers/ntlm_auth/fake/ntlm_fake_auth.cc
|
|
||||||
===================================================================
|
|
||||||
--- helpers/ntlm_auth/fake/ntlm_fake_auth.cc.orig
|
|
||||||
+++ helpers/ntlm_auth/fake/ntlm_fake_auth.cc
|
|
||||||
@@ -141,7 +141,7 @@ main(int argc, char *argv[])
|
|
||||||
|
|
||||||
process_options(argc, argv);
|
|
||||||
|
|
||||||
- debug("%s build " __DATE__ ", " __TIME__ " starting up...\n", my_program_name);
|
|
||||||
+ debug("%s starting up...\n", my_program_name);
|
|
||||||
|
|
||||||
while (fgets(buf, HELPER_INPUT_BUFFER, stdin) != NULL) {
|
|
||||||
user[0] = '\0'; /*no user code */
|
|
||||||
Index: helpers/ntlm_auth/smb_lm/ntlm_smb_lm_auth.cc
|
|
||||||
===================================================================
|
|
||||||
--- helpers/ntlm_auth/smb_lm/ntlm_smb_lm_auth.cc.orig
|
|
||||||
+++ helpers/ntlm_auth/smb_lm/ntlm_smb_lm_auth.cc
|
|
||||||
@@ -622,7 +622,7 @@ manage_request()
|
|
||||||
int
|
|
||||||
main(int argc, char *argv[])
|
|
||||||
{
|
|
||||||
- debug("ntlm_auth build " __DATE__ ", " __TIME__ " starting up...\n");
|
|
||||||
+ debug("ntlm_auth build starting up...\n");
|
|
||||||
|
|
||||||
my_program_name = argv[0];
|
|
||||||
process_options(argc, argv);
|
|
||||||
Index: helpers/url_rewrite/fake/fake.cc
|
|
||||||
===================================================================
|
|
||||||
--- helpers/url_rewrite/fake/fake.cc.orig
|
|
||||||
+++ helpers/url_rewrite/fake/fake.cc
|
|
||||||
@@ -104,7 +104,7 @@ main(int argc, char *argv[])
|
|
||||||
|
|
||||||
process_options(argc, argv);
|
|
||||||
|
|
||||||
- debug("%s build " __DATE__ ", " __TIME__ " starting up...\n", my_program_name);
|
|
||||||
+ debug("%s starting up...\n", my_program_name);
|
|
||||||
|
|
||||||
while (fgets(buf, HELPER_INPUT_BUFFER, stdin) != NULL) {
|
|
||||||
char *p;
|
|
||||||
@@ -127,7 +127,7 @@ main(int argc, char *argv[])
|
|
||||||
fprintf(stdout, "%" PRId64 " ERR\n", channelId);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
- debug("%s build " __DATE__ ", " __TIME__ " shutting down...\n", my_program_name);
|
|
||||||
+ debug("%s shutting down...\n", my_program_name);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
@ -1,3 +1,26 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Tue Jul 21 06:44:15 UTC 2015 - mpluskal@suse.com
|
||||||
|
|
||||||
|
- Update to 3.5.6
|
||||||
|
* Bug 4274: ssl_crtd.8 not being installed
|
||||||
|
* Bug 4193: memory leak on FTP listings
|
||||||
|
* Bug 4183: segfault when freeing https_port clientca on
|
||||||
|
reconfigure or exit
|
||||||
|
* Bug 3875: bad mimeLoadIconFile error handling
|
||||||
|
* Bug 3483: assertion failed store.cc:1866: 'isEmpty()'
|
||||||
|
* Bug 3329: pinned server connection is not closed properly
|
||||||
|
* TLS: Disable client-initiated renegotiation
|
||||||
|
* ext_edirectory_userip_acl: fix uninitialized variable
|
||||||
|
* Support custom OIDs in *_cert ACLs
|
||||||
|
* Fix CONNECT failover to IPv4 after trying broken IPv6 servers
|
||||||
|
* Use relative-URL in errorpage.css for SN.png
|
||||||
|
* Do not blindly forward cache peer CONNECT responses
|
||||||
|
* Fix assertion String.cc:221: "str"
|
||||||
|
* Fix assertion comm.cc:759: "Comm::IsConnOpen(conn)" in
|
||||||
|
ConnStateData::getSslContextDone
|
||||||
|
* Translations: add Spanish US dialect alias
|
||||||
|
- Drop no longer needed squid-nobuilddates.patch
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Thu Jun 4 22:31:30 UTC 2015 - mpluskal@suse.com
|
Thu Jun 4 22:31:30 UTC 2015 - mpluskal@suse.com
|
||||||
|
|
||||||
|
@ -20,7 +20,7 @@
|
|||||||
%define squidconfdir %{_sysconfdir}/squid
|
%define squidconfdir %{_sysconfdir}/squid
|
||||||
|
|
||||||
Name: squid
|
Name: squid
|
||||||
Version: 3.5.5
|
Version: 3.5.6
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: A fully featured HTTP/1.0 proxy
|
Summary: A fully featured HTTP/1.0 proxy
|
||||||
License: GPL-2.0+
|
License: GPL-2.0+
|
||||||
@ -44,8 +44,6 @@ Source14: squid.init.rh
|
|||||||
Source99: squid-rpmlintrc
|
Source99: squid-rpmlintrc
|
||||||
# some useful defaults for squid
|
# some useful defaults for squid
|
||||||
Patch100: %{name}-config.patch
|
Patch100: %{name}-config.patch
|
||||||
# make build compare happy - remove build dates
|
|
||||||
Patch101: %{name}-nobuilddates.patch
|
|
||||||
# patch fixes kerberos principalname handling (http://bugs.squid-cache.org/show_bug.cgi?id=4042)
|
# patch fixes kerberos principalname handling (http://bugs.squid-cache.org/show_bug.cgi?id=4042)
|
||||||
Patch103: squid-brokenad.patch
|
Patch103: squid-brokenad.patch
|
||||||
#patch fix SLE 11 target... BAD PATCH
|
#patch fix SLE 11 target... BAD PATCH
|
||||||
@ -139,7 +137,6 @@ cp %{SOURCE10} .
|
|||||||
%patch100
|
%patch100
|
||||||
perl -p -i -e 's|%{_prefix}/local/bin/perl|%{_bindir}/perl|' `find -name "*.pl"`
|
perl -p -i -e 's|%{_prefix}/local/bin/perl|%{_bindir}/perl|' `find -name "*.pl"`
|
||||||
chmod a-x CREDITS
|
chmod a-x CREDITS
|
||||||
%patch101
|
|
||||||
%patch103
|
%patch103
|
||||||
%patch104
|
%patch104
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user