FreeBSD Bugzilla – Attachment 165141 Details for
Bug 205948
net/turnserver: Update to 4.5.0.3
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
patch
file_205948.txt (text/plain), 3.81 KB, created by
Bradley T. Hughes
on 2016-01-06 08:33:21 UTC
(
hide
)
Description:
patch
Filename:
MIME Type:
Creator:
Bradley T. Hughes
Created:
2016-01-06 08:33:21 UTC
Size:
3.81 KB
patch
obsolete
>commit 0862a83e479baa74272a62b3854afc63b349c413 >Author: Bradley T. Hughes <bradleythughes@fastmail.fm> >Date: Tue Jan 5 14:09:08 2016 +0000 > > net/turnserver: update to 4.5.0.3 > > Upstream release announcement: > > [RFC5766-TURN-SERVER 2038] coturn-4.5.0.3 is available > > The changes are: > * SSLv3 support removed. That provides extra security and compatibility > with OpenSSL distributions or clones that do not support SSLv3 (like > LibreSSL 2.3.0). This fix is required for fresh FreeBSD and for Debian > unstable. > * Compilation and configuration cleaning. > * Fix for non-interactive shells. > * RPM: Fixed mongo-c-driver include path (by Sergey Safarov). > * RPM: Fixed startup daemon as non root user (by Sergey Safarov). > * RPM: Systemd optimized for high-volume network traffic (by Sergey Safarov). > >diff --git a/net/turnserver/Makefile b/net/turnserver/Makefile >index ab4bc1f..a8c6cbd 100644 >--- a/net/turnserver/Makefile >+++ b/net/turnserver/Makefile >@@ -1,8 +1,7 @@ > # $FreeBSD$ > > PORTNAME= turnserver >-PORTVERSION= 4.5.0.2 >-PORTREVISION= 1 >+PORTVERSION= 4.5.0.3 > CATEGORIES= net > MASTER_SITES= http://turnserver.open-sys.org/downloads/v${PORTVERSION}/:prog \ > http://turnserver.open-sys.org/downloads/extradocs/:xdocs \ >diff --git a/net/turnserver/distinfo b/net/turnserver/distinfo >index b580f39..57e1a14 100644 >--- a/net/turnserver/distinfo >+++ b/net/turnserver/distinfo >@@ -1,4 +1,4 @@ >-SHA256 (turnserver-4.5.0.2.tar.gz) = 435241425002d0fe193090107fb3daa9b6abb138c4f7ed2ad242c4c16c1852ca >-SIZE (turnserver-4.5.0.2.tar.gz) = 383407 >+SHA256 (turnserver-4.5.0.3.tar.gz) = 78726712058dcabb6df670fe02a51f9b30b4d82028d4dfa4f4bb0800c5924f83 >+SIZE (turnserver-4.5.0.3.tar.gz) = 383702 > SHA256 (turn.extra.docs-2.0.0.1.tar.gz) = 3a86600fd0a30ce7aeb547e80402ce68ea9959f7dd58697e5b47fda6e33ab9ce > SIZE (turn.extra.docs-2.0.0.1.tar.gz) = 485379 >diff --git a/net/turnserver/files/patch-src_apps_common_apputils.c b/net/turnserver/files/patch-src_apps_common_apputils.c >deleted file mode 100644 >index da72f8d..0000000 >--- a/net/turnserver/files/patch-src_apps_common_apputils.c >+++ /dev/null >@@ -1,21 +0,0 @@ >---- src/apps/common/apputils.c.orig 2015-09-30 07:05:14 UTC >-+++ src/apps/common/apputils.c >-@@ -1037,13 +1037,15 @@ static const char* turn_get_method(const >- if(!method) >- return mdefault; >- else { >-- >-+#ifndef OPENSSL_NO_SSL3 >- if(method == SSLv3_server_method()) { >- return "SSLv3"; >- } else if(method == SSLv3_client_method()) { >- return "SSLv3"; >-- } else if(method == SSLv23_server_method()) { >-- return "SSLv23"; >-+ } else >-+#endif >-+ if(method == SSLv23_server_method()) { >-+ return "SSLv23"; >- } else if(method == SSLv23_client_method()) { >- return "SSLv23"; >- } else if(method == TLSv1_server_method()) { >diff --git a/net/turnserver/files/patch-src_apps_uclient_mainuclient.c b/net/turnserver/files/patch-src_apps_uclient_mainuclient.c >deleted file mode 100644 >index 09b04d2..0000000 >--- a/net/turnserver/files/patch-src_apps_uclient_mainuclient.c >+++ /dev/null >@@ -1,14 +0,0 @@ >---- src/apps/uclient/mainuclient.c.orig 2015-09-30 07:05:14 UTC >-+++ src/apps/uclient/mainuclient.c >-@@ -483,9 +483,11 @@ int main(int argc, char **argv) >- root_tls_ctx[root_tls_ctx_num] = SSL_CTX_new(SSLv23_client_method()); >- SSL_CTX_set_cipher_list(root_tls_ctx[root_tls_ctx_num], csuite); >- root_tls_ctx_num++; >-+#ifndef OPENSSL_NO_SSL3 >- root_tls_ctx[root_tls_ctx_num] = SSL_CTX_new(SSLv3_client_method()); >- SSL_CTX_set_cipher_list(root_tls_ctx[root_tls_ctx_num], csuite); >- root_tls_ctx_num++; >-+#endif >- root_tls_ctx[root_tls_ctx_num] = SSL_CTX_new(TLSv1_client_method()); >- SSL_CTX_set_cipher_list(root_tls_ctx[root_tls_ctx_num], csuite); >- root_tls_ctx_num++;
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Flags:
vlad-fbsd
:
maintainer-approval+
Actions:
View
Attachments on
bug 205948
: 165141 |
165142