Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
0.0.20230223_11,1 09 Aug 2024 06:24:08 |
Ashish SHUKLA (ashish) |
all: Bump after lang/go121 update |
0.0.20230223_10,1 03 Jul 2024 08:29:54 |
Ashish SHUKLA (ashish) |
all: Bump after lang/go121 update |
0.0.20230223_9,1 15 Jun 2024 09:52:17 |
Ashish SHUKLA (ashish) |
all: Bump after lang/go121 update
MFH: 2024Q2 |
0.0.20230223_8,1 13 May 2024 17:56:04 |
Ashish SHUKLA (ashish) |
all: Bump after lang/go121 update
MFH: 2024Q2 |
0.0.20230223_7,1 15 Apr 2024 08:20:04 |
Ashish SHUKLA (ashish) |
all: Bump after lang/go121 update
MFH: 2024Q2 |
0.0.20230223_6,1 24 Mar 2024 14:29:00 |
Muhammad Moinur Rahman (bofh) |
lang/go: Change DEFAULT to 1.21
PR: 277776
Approved by: portmgr (exp-run) |
0.0.20230223_5,1 11 Feb 2024 10:39:17 |
Ashish SHUKLA (ashish) |
all: Bump PORTREVISION after lang/go* update
PR: 276530 |
0.0.20230223_4,1 07 Dec 2023 02:22:10 |
Ashish SHUKLA (ashish) |
all: Bump PORTREVISION after lang/go* update
PR: 274405 |
0.0.20230223_3,1 08 Sep 2023 14:34:56 |
Dmitri Goutnik (dmgk) |
all: Bump PORTREVISION after lang/go* update |
0.0.20230223_2,1 04 Aug 2023 14:24:50 |
Dmitri Goutnik (dmgk) |
all: Bump PORTREVISION after lang/go{119,120} update |
0.0.20230223_1,1 16 Jul 2023 15:17:54 |
Bernhard Froehlich (decke) |
net/wireguard-go: bring back fix to build on riscv64
Bump golang.org/x/{net,sys} dependencies to versions
new enough to support riscv64-freebsd. |
0.0.20230223,1 16 Jul 2023 10:57:03 |
Bernhard Froehlich (decke) |
net/wireguard-go: Update to 0.0.20230223 |
0.0.20220316_13,1 08 Apr 2023 15:13:25 |
Dmitri Goutnik (dmgk) |
all: Bump PORTREVISION after lang/go{119,120} update |
0.0.20220316_12,1 27 Mar 2023 11:24:59 |
Robert Clausecker (fuz) |
net/wireguard-go: fix build on riscv64
Bump golang.org/x/{net,sys} dependencies to versions
new enough to support riscv64-freebsd.
Sponsored by: Berliner Linux User Group e.V.
Approved by: portmgr (build fix blanket) |
0.0.20220316_11,1 09 Mar 2023 19:18:07 |
Dmitri Goutnik (dmgk) |
all: Bump PORTREVISION after Go ports update |
0.0.20220316_10,1 15 Feb 2023 19:06:01 |
Dmitri Goutnik (dmgk) |
all: Bump PORTREVISION after lang/go{119,120} update |
0.0.20220316_9,1 09 Feb 2023 21:55:23 |
Dmitri Goutnik (dmgk) |
all: Bump PORTREVISION after GO_DEFAULT update. |
0.0.20220316_8,1 14 Jan 2023 11:31:17 |
Dmitri Goutnik (dmgk) |
all: Bump PORTVERSION after lang/go{118,119} update |
0.0.20220316_7,1 11 Dec 2022 11:17:27 |
Dmitri Goutnik (dmgk) |
all: Bump PORTREVISION after lang/go{118,119} update |
0.0.20220316_6,1 06 Oct 2022 19:24:26 |
Dmitri Goutnik (dmgk) |
all: Bump PORTREVISION after lang/go{118,119} update |
0.0.20220316_5,1 08 Sep 2022 16:33:18 |
Dmitri Goutnik (dmgk) |
all: Bump PORTREVISION after lang/go{118,119} update |
07 Sep 2022 21:58:51 |
Stefan Eßer (se) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.
This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.
Approved by: portmgr (tcberner) |
0.0.20220316_4,1 07 Sep 2022 21:10:59 |
Stefan Eßer (se) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above ) |
0.0.20220316_4,1 03 Aug 2022 21:35:13 |
Dmitri Goutnik (dmgk) |
all: Bump PORTREVISION after Go update
Bump Go ports PORTREVISION after GO_DEFAULT and lang/go118 update. |
0.0.20220316_3,1 14 Jul 2022 12:46:05 |
Dmitri Goutnik (dmgk) |
all: Bump PORTREVISION after lang/go{117,118} update |
0.0.20220316_2,1 07 Jun 2022 21:56:10 |
Dmitri Goutnik (dmgk) |
*/*: Bump port revisons after lang/go{117,118} update |
0.0.20220316_1,1 30 Mar 2022 07:01:44 |
Guangyuan Yang (ygy) |
*/*: Bump PORTREVISION after lang/go 1.18 update |
0.0.20220316,1 24 Mar 2022 18:59:15 |
Bernhard Froehlich (decke) |
net/wireguard-go: Update to 0.0.20220316 |
0.0.20220117,1 09 Feb 2022 09:50:53 |
Bernhard Froehlich (decke) |
net/wireguard-go: Update to 0.0.20220117
We cannot use GH_TUPLE anymore because some dependencies are not
available on github so we need to pack and distribute them ourselves. |
0.0.20211016,1 18 Oct 2021 08:10:04 |
Bernhard Froehlich (decke) |
net/wireguard-go: Update to 0.0.20211016 |
0.0.20210424,1 24 Apr 2021 18:11:07 |
Bernhard Froehlich (decke) |
net/wireguard-go: Update to 0.0.20210424 |
0.0.20210323,1 07 Apr 2021 08:09:01 |
Mathieu Arnold (mat) |
One more small cleanup, forgotten yesterday.
Reported by: lwhsu |
0.0.20210323,1 06 Apr 2021 14:31:07 |
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles. |
0.0.20210323,1 23 Mar 2021 19:56:22 |
decke |
net/wireguard-go: Update to 0.0.20210323 |
0.0.20210212,1 25 Feb 2021 20:42:41 |
decke |
net/wireguard-go: Update to 0.0.20210212
Due to a bug which was fixed in this release both net/wireguard
and net/wireguard-go need to be updated or wg-quick will hang at
the next start.
PR: 253537 |
0.0.20201118,1 15 Feb 2021 20:35:14 |
decke |
net/wireguard-go: Downgrade to 0.0.20201118 because it seems to hang for some
people
PR: 253537 |
0.0.20210212 14 Feb 2021 18:33:33 |
decke |
net/wireguard-go: Update to 0.0.20210212 and pass GO_ENV to make to fix Golang
vendoring |
0.0.20201118 18 Nov 2020 20:06:34 |
decke |
net/wireguard-go: Update to 0.0.20201118 |
0.0.20200320 22 Mar 2020 13:08:12 |
decke |
net/wireguard-go: Update to 0.0.20200320 |
0.0.20200121 22 Jan 2020 13:34:25 |
decke |
net/wireguard-go: Update to 0.0.20200121
MFH: 2020Q1 |
0.0.20191012_1 12 Dec 2019 12:09:22 |
dmgk |
net/wireguard-go: Unbreak on aarch64
===> Building for wireguard-go-0.0.20191012
# golang.org/x/sys/unix
vendor/golang.org/x/sys/unix/ztypes_freebsd_arm64.go:400:12: undefined: uint128
http://thunderx1.nyi.freebsd.org/data/head-arm64-default/p518685_s355218/logs/errors/wireguard-go-0.0.20191012.log
Unbreak by updating golang.org/x/sys to 33540a1f6037 and golang.org/x/net to
83d349e8ac1a which adds support for freebsd/arm64.
PR: 242578
Approved by: decke (maintainer) |
0.0.20191012 14 Oct 2019 09:13:12 |
decke |
net/wireguard-go: Update to 0.0.20191012
MFH: 2019Q4 |
0.0.20190908 09 Sep 2019 07:03:38 |
decke |
net/wireguard-go: Update to 0.0.20190908 |
0.0.20190805 14 Aug 2019 03:26:09 |
meta |
Implement new virtual category: net-vpn for VPN related ports
based on discussion at ports@ [1]. As VPN softwares are put in different
physical category net and security. This is a little bit confusing. Let's
give them new virtual category net-vpn.
[1] https://lists.freebsd.org/pipermail/freebsd-ports/2019-April/115915.html
PR: 239395
Submitted by: myself
Approved by: portmgr (mat)
Differential Revision: https://reviews.freebsd.org/D21174 |
0.0.20190805 05 Aug 2019 19:59:21 |
decke |
net/wireguard-go: Update to 0.0.20190805 |
0.0.20190517 29 Jun 2019 03:51:14 |
tobik |
Convert all Go ports to USES=go
This allows for port testing with lang/go-devel via GO_PORT, setting
up the Go build environment in a single place, and is step one in
simplifying Go ports that often define too complicated do-build
targets themselves.
USES=go gains new arguments 'run' to add lang/go to RUN_DEPENDS and
'no_targets' for ports with composite builds that call 'go' themselves
and do not need the do-build/do-install targets of USES=go.
PR: 238849
Submitted by: dg@syrec.org (also D20745)
Reviewed by: mat, tobik
Exp-run by: antoine
Differential Revision: https://reviews.freebsd.org/D20746 |
0.0.20190517 19 May 2019 20:06:38 |
decke |
net/wireguard-go: Update to 0.0.20190517 |
0.0.20190409_1 23 Apr 2019 12:33:45 |
decke |
net/wireguard:
work around numerous kernel panics on shutdown in tun(4)
There are numerous race conditions. But even this will crash it:
while true; do ifconfig tun0 create; ifconfig tun0 destroy; done
It seems like LLv6 is related, which we're not using anyway, so
explicitly disable it on the interface.
PR: 233955 |
0.0.20190409 09 Apr 2019 10:01:14 |
decke |
net/wireguard-go:
- Update to 0.0.20190409
- Update LICENSE because upstream moved to MIT |
0.0.20181222 23 Dec 2018 19:13:34 |
decke |
net/wireguard-go: Update to 0.0.20181222 |
0.0.20181018 18 Oct 2018 09:48:40 |
decke |
net/wireguard-go: Remove self generated vendor tarball and pull from GH instead
No PORTREVISION bump because the package does not change. Go dependencies have
the same revision and a binary diff of the wireguard-go binaries have no
relevant
differences (except some 40 byte string which is different with every build). |
0.0.20181018 18 Oct 2018 08:00:37 |
decke |
net/wireguard-go: Update to 0.0.20181018
- Remove dep dependency because upstream switched to Go 1.11 new modules
support. Sadly we still have to enforce oldfashioned vendoring because
otherwise "go build" would automatically download stuff from the internet
before building.
Theoretically it should be possible to get rid of the self generated
vendor distfile but practically I did not get it working (yet). |
0.0.20181001 02 Oct 2018 11:35:39 |
decke |
net/wireguard-go: Update to 0.0.20181001 |
0.0.20180613 21 Jun 2018 08:00:24 |
decke |
net/wireguard-go: Document the script that is used to generate the vendor
tarfile |
0.0.20180613 14 Jun 2018 06:11:32 |
decke |
net/wireguard-go: Update to 0.0.20180613 |
0.0.20180531 31 May 2018 20:44:19 |
decke |
Update to 0.0.20180531 |
0.0.20180524 24 May 2018 08:43:37 |
decke |
This is an implementation of Wireguard in Go.
WireGuard is an extremely simple yet fast and modern VPN that utilizes
state-of-the-art cryptography. It aims to be faster, simpler, leaner,
and more useful than IPSec, while avoiding the massive headache. It
intends to be considerably more performant than OpenVPN. WireGuard is
designed as a general purpose VPN for running on embedded interfaces and
super computers alike, fit for many different circumstances.
WWW: https://www.wireguard.com |