aboutsummaryrefslogtreecommitdiff
path: root/net/wireguard
Commit message (Collapse)AuthorAgeFilesLines
* net/wireguard: Mark DEPRECATEDBernhard Froehlich2023-10-011-3/+5
| | | | | | This metaport was only useful when we had multiple wireguard ports in the portstree. With the deprecation of net/wireguard-kmod this metaport is also not needed anymore.
* Remove WWW entries moved into port MakefilesStefan Eßer2022-09-071-2/+0
| | | | | | | | | | Commit b7f05445c00f has added WWW entries to port Makefiles based on WWW: lines in pkg-descr files. This commit removes the WWW: lines of moved-over URLs from these pkg-descr files. Approved by: portmgr (tcberner)
* Add WWW entries to port MakefilesStefan Eßer2022-09-071-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | It has been common practice to have one or more URLs at the end of the ports' pkg-descr files, one per line and prefixed with "WWW:". These URLs should point at a project website or other relevant resources. Access to these URLs required processing of the pkg-descr files, and they have often become stale over time. If more than one such URL was present in a pkg-descr file, only the first one was tarnsfered into the port INDEX, but for many ports only the last line did contain the port specific URL to further information. There have been several proposals to make a project URL available as a macro in the ports' Makefiles, over time. This commit implements such a proposal and moves one of the WWW: entries of each pkg-descr file into the respective port's Makefile. A heuristic attempts to identify the most relevant URL in case there is more than one WWW: entry in some pkg-descr file. URLs that are not moved into the Makefile are prefixed with "See also:" instead of "WWW:" in the pkg-descr files in order to preserve them. There are 1256 ports that had no WWW: entries in pkg-descr files. These ports will not be touched in this commit. The portlint port has been adjusted to expect a WWW entry in each port Makefile, and to flag any remaining "WWW:" lines in pkg-descr files as deprecated. Approved by: portmgr (tcberner)
* cleanup: drop support for EOL FreeBSD 11.XRene Ladan2021-09-301-6/+0
| | | | | | | | | | | | | | | | | Search criteria used: - 11.4 - OSREL* - OSVER* - *_FreeBSD_11 Input from: - adridg: devel/qca-legacy - jbeich: _WITH_DPRINTF, _WITH_GETLINE, GNU bfd workarounds - sunpoet: security/p5-*OpenSSL* Reviewed by: doceng, kde, multimedia, perl, python, ruby, rust Differential Revision: https://reviews.freebsd.org/D32008 Test Plan: make index
* One more small cleanup, forgotten yesterday.Mathieu Arnold2021-04-071-1/+0
| | | | Reported by: lwhsu
* Remove # $FreeBSD$ from Makefiles.Mathieu Arnold2021-04-061-1/+0
|
* net/wireguard: Fix instructions, kernel module is loaded by ifconfig ↵Bernhard Froehlich2021-03-222-10/+8
| | | | | | | automatically (magic?!) Notes: svn path=/head/; revision=568962
* WireGuard is an extremely simple yet fast and modern VPN that utilizesBernhard Froehlich2021-03-223-0/+53
| | | | | | | | | | | | | | | | state-of-the-art cryptography. It aims to be faster, simpler, leaner, and more useful than IPSec, while avoiding the massive headache. It intends to be considerably more performant than OpenVPN. WireGuard is designed as a general purpose VPN for running on embedded interfaces and super computers alike, fit for many different circumstances. This package does not contain anything by itself - it is a "meta-port" that depends on other wireguard packages. WWW: https://www.wireguard.com Notes: svn path=/head/; revision=568954
* net/wireguard-tools: Repocopy from net/wireguard, flavorize and add rc.d ↵Bernhard Froehlich2021-03-225-119/+0
| | | | | | | script for lite flavor Notes: svn path=/head/; revision=568953
* net/wireguard: Update to 1.0.20210315 and drop BASHCOMPLETION optionBernhard Froehlich2021-03-153-14/+9
| | | | | | | | | | | | | BASHCOMOPLETION option was dropped but we install shell completion files unconditionally to follow porters handbook. This is the first wireguard-tools version that supports FreeBSD's kernel implementation. It is compatible with if_wg in FreeBSD 14-CURRENT which will likely be backported in the future but incompatible with the if_wg code that was present in stable/13 up to 13.0-RC3. Notes: svn path=/head/; revision=568486
* net/wireguard: Update to 1.0.20210223 and introduce optionsBernhard Froehlich2021-02-253-13/+25
| | | | | | | | | | | Due to a bug which was fixed in this release both net/wireguard and net/wireguard-go need to be updated or wg-quick will hang at the next start. PR: 253537 Notes: svn path=/head/; revision=566557
* net/wireguard: Update to 1.0.20200827Bernhard Froehlich2020-08-302-4/+4
| | | | Notes: svn path=/head/; revision=546996
* net/wireguard: Update to 1.0.20200820Bernhard Froehlich2020-08-212-4/+4
| | | | Notes: svn path=/head/; revision=545622
* net/wireguard: Update to 1.0.20200513Bernhard Froehlich2020-05-152-4/+4
| | | | Notes: svn path=/head/; revision=535323
* net/wireguard: Update to 1.0.20200510Bernhard Froehlich2020-05-112-5/+4
| | | | Notes: svn path=/head/; revision=534933
* net/wireguard: Implement reload command in rc.d script to reload all peerBernhard Froehlich2020-03-302-1/+15
| | | | | | | | | | | | and key settings without restarting the daemon to avoid interface up/down and loosing traffic. This does not work if you change the Address= line in the [Interface] section which needs a real restart. PR: 244862 Submitted by: david@isnic.is Notes: svn path=/head/; revision=529909
* net/wireguard: Introduce general wireguard_env parameter for environmentBernhard Froehlich2020-03-302-6/+5
| | | | | | | | | | | | | | | | | | | | | | | variables which affect wg-quick or the userspace implementation (eg. wireguard-go). The syntax in rc.conf is: wireguard_env="VAR=val VAR2=val2" As a reference wg-quick uses these environment variables WG_QUICK_USERSPACE_IMPLEMENTATION and wireguard-go LOG_LEVEL WG_TUN_FD WG_UAPI_FD WG_PROCESS_FOREGROUND Submitted by: J.R. Oldroyd <fbsd@opal.com> Notes: svn path=/head/; revision=529908
* net/wireguard: Update to 1.0.20200319Bernhard Froehlich2020-03-222-4/+4
| | | | Notes: svn path=/head/; revision=528916
* net/wireguard:Bernhard Froehlich2020-02-062-4/+4
| | | | | | | - Update to 1.0.20200206 Notes: svn path=/head/; revision=525384
* net/wireguard:Bernhard Froehlich2020-01-222-5/+4
| | | | | | | | | | - Update to 1.0.20200121 - Remove ALL_TARGET now since "all" is available MFH: 2020Q1 Notes: svn path=/head/; revision=523809
* net/wireguard: Update to 1.0.20200102Bernhard Froehlich2020-01-072-4/+4
| | | | | | | MFH: 2020Q1 Notes: svn path=/head/; revision=522333
* net/wireguard: Update to 1.0.20191226 and switch to the new wireguard-tools ↵Bernhard Froehlich2019-12-272-7/+7
| | | | | | | | | repository Reported by: Jason A. Donenfeld <jason@wireguard.com> (per email) Notes: svn path=/head/; revision=520984
* net/wireguard: Update to 0.0.20191219Bernhard Froehlich2019-12-192-4/+4
| | | | Notes: svn path=/head/; revision=520434
* net/wireguard: Update to 0.0.20191212Bernhard Froehlich2019-12-132-4/+4
| | | | Notes: svn path=/head/; revision=520035
* net/wireguard: Update to 0.0.20191206Bernhard Froehlich2019-12-072-4/+4
| | | | Notes: svn path=/head/; revision=519206
* net/wireguard: Update to 0.0.20191205Bernhard Froehlich2019-12-062-4/+4
| | | | Notes: svn path=/head/; revision=519135
* net/wireguard: Update to 0.0.20191127Bernhard Froehlich2019-11-282-4/+4
| | | | Notes: svn path=/head/; revision=518568
* net/wireguard: Update to 0.0.20191012Bernhard Froehlich2019-10-142-4/+4
| | | | | | | MFH: 2019Q4 Notes: svn path=/head/; revision=514441
* net/wireguard: Update to 0.0.20190913Bernhard Froehlich2019-09-142-4/+4
| | | | Notes: svn path=/head/; revision=512039
* net/wireguard: Update to 0.0.20190905Bernhard Froehlich2019-09-062-4/+4
| | | | Notes: svn path=/head/; revision=511287
* Implement new virtual category: net-vpn for VPN related portsKoichiro Iwao2019-08-141-1/+1
| | | | | | | | | | | | | | | | based on discussion at ports@ [1]. As VPN softwares are put in different physical category net and security. This is a little bit confusing. Let's give them new virtual category net-vpn. [1] https://lists.freebsd.org/pipermail/freebsd-ports/2019-April/115915.html PR: 239395 Submitted by: myself Approved by: portmgr (mat) Differential Revision: https://reviews.freebsd.org/D21174 Notes: svn path=/head/; revision=508887
* net/wireguard: Update to 0.0.20190702Bernhard Froehlich2019-07-022-4/+4
| | | | Notes: svn path=/head/; revision=505683
* net/wireguard: Update to 0.0.20190601Bernhard Froehlich2019-06-032-4/+4
| | | | Notes: svn path=/head/; revision=503388
* net/wireguard: Update to 0.0.20190531Bernhard Froehlich2019-05-313-70/+4
| | | | Notes: svn path=/head/; revision=503188
* net/wireguard: workaround SIOCGIFSTATUS race in FreeBSD kernelBernhard Froehlich2019-04-232-0/+66
| | | | | | | PR: 233955 Notes: svn path=/head/; revision=499755
* net/wireguard: Update to 0.0.20190406Bernhard Froehlich2019-04-074-64/+4
| | | | Notes: svn path=/head/; revision=498271
* net/wireguard: Improve rc.d script to support other userspace ↵Bernhard Froehlich2019-03-292-1/+8
| | | | | | | implementations like boringtun Notes: svn path=/head/; revision=497111
* net/wireguard:Bernhard Froehlich2019-03-184-1/+30
| | | | | | | | | - Cherry pick patch that fixes TMPDIR handling and tmp file leaks on / - Fix rc.d script to initialize variable - Bump PORTREVISION Notes: svn path=/head/; revision=496212
* net/wireguard: Revert wg-quick change which broke localhostBernhard Froehlich2019-02-282-0/+32
| | | | | | | | Reported by: Matt Smith <matt.xtaz@gmail.com> Obtained from: https://git.zx2c4.com/WireGuard/patch/?id=cba99f16a4ec9a229358ce1ed96080bd5ae04a7e Notes: svn path=/head/; revision=494184
* net/wireguard: Update to 0.0.20190227Bernhard Froehlich2019-02-282-4/+4
| | | | Notes: svn path=/head/; revision=494130
* net/wireguard: Update to 0.0.20190123Bernhard Froehlich2019-01-262-4/+4
| | | | Notes: svn path=/head/; revision=491295
* net/wireguard: Update to 0.0.20181218Bernhard Froehlich2018-12-182-4/+4
| | | | Notes: svn path=/head/; revision=487766
* net/wireguard: Update to 0.0.20181119Bernhard Froehlich2018-11-202-4/+4
| | | | Notes: svn path=/head/; revision=485419
* net/wireguard: Update to 0.0.20181115Bernhard Froehlich2018-11-162-5/+4
| | | | Notes: svn path=/head/; revision=485064
* net/wireguard: Update rc.d script to let the user define which wg interfaces ↵Bernhard Froehlich2018-10-252-7/+15
| | | | | | | | | | | to manage Most people will likely want to put wireguard_interfaces="wg0" in /etc/rc.conf Reported by: Jason A. Donenfeld <Jason@zx2c4.com> Notes: svn path=/head/; revision=482968
* net/wireguard: Update to 0.0.20181018Bernhard Froehlich2018-10-183-8/+4
| | | | | | | | - Also remove "sleep 1" from startscript because the race condition has been fixed upstream. Notes: svn path=/head/; revision=482341
* net/wireguard: Add rc.d scriptBernhard Froehlich2018-10-112-0/+40
| | | | | | | Submitted by: Steve Hay <hay.steve@gmail.com> Notes: svn path=/head/; revision=481820
* net/wireguard: Update to 0.0.20181007Bernhard Froehlich2018-10-082-4/+4
| | | | Notes: svn path=/head/; revision=481533
* net/wireguard: Update to 0.0.20180925Bernhard Froehlich2018-09-252-4/+4
| | | | Notes: svn path=/head/; revision=480667
* net/wireguard: Update to 0.0.20180918Bernhard Froehlich2018-09-192-4/+4
| | | | Notes: svn path=/head/; revision=480094