From owner-freebsd-ports@FreeBSD.ORG Tue Apr 14 00:33:38 2015 Return-Path: Delivered-To: freebsd-ports@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id F2CBE926 for ; Tue, 14 Apr 2015 00:33:38 +0000 (UTC) Received: from mta1.riverwillow.net.au (mta1.riverwillow.net.au [IPv6:2001:8000:1000:1801::3001]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mta1.riverwillow.net.au", Issuer "Riverwillow 2014 CA Root Certificate" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id ED35F17F for ; Tue, 14 Apr 2015 00:33:37 +0000 (UTC) Received: from mail1.riverwillow.net.au (mail1.riverwillow.net.au [IPv6:2001:8000:1000:1801:0:0:0:4001]) by mta1.riverwillow.net.au (8.15.1/8.15.1) with ESMTPS id t3E0X8Cv047738 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 14 Apr 2015 10:33:08 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=riverwillow.com.au; s=mta1002; t=1428971588; bh=jXQbX6pB0EyIUqeOlfkLb7YpB0qzR9n5SM0TT3S5kJ4=; h=Date:From:To:Cc:Subject:References:In-Reply-To; b=cUpR1SnXhpoPyjXN4dPBEv0o6K/pTwKZexUsIHzNkfHfjcO44b7r2YaBUR/zxNy2Y mcQzyEjEu8ZTskSS61FLrQSmoEG0xHZ0fq2S6YvzxENlnV3BB8/baykvrWmosI59hT Bb3BkpmFn2Ul53tcgx4TGr+Avq4BLEvsqzv1eY04= Received: from rwpc15.gfn.riverwillow.net.au (rwpc15.gfn.riverwillow.net.au [IPv6:2001:8000:1000:18e1:20c:76ff:fe0a:2117]) (authenticated bits=56) by mail1.riverwillow.net.au (8.15.1/8.15.1) with ESMTPSA id t3E0X4pK047733 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 14 Apr 2015 10:33:05 +1000 (AEST) Date: Tue, 14 Apr 2015 10:33:04 +1000 From: John Marshall To: Kurt Jaeger Cc: Pavel Timofeev , ports-list freebsd Subject: Re: Initial squid 3.5 port Message-ID: <20150414003304.GA4595@rwpc15.gfn.riverwillow.net.au> Mail-Followup-To: Kurt Jaeger , Pavel Timofeev , ports-list freebsd References: <4c18dec0d168e393ff5dddfdc65c7ec6@sdf.org> <20150228074951.GD62590@home.opsec.eu> <20150228110834.GF62590@home.opsec.eu> <20150413182810.GI2743@home.opsec.eu> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="OXfL5xGRrasGEqWY" Content-Disposition: inline In-Reply-To: <20150413182810.GI2743@home.opsec.eu> OpenPGP: id=A29A84A2; url=http://pki.riverwillow.com.au/pgp/johnmarshall.asc User-Agent: Mutt/1.5.23 (2014-03-12) X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 14 Apr 2015 00:33:39 -0000 --OXfL5xGRrasGEqWY Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, 13 Apr 2015, 20:28 +0200, Kurt Jaeger wrote: > > The squid35 port has been updated to lastest 3.5.3 release. > > https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D198089 > > This time it's a patch for the existing www/squid. > > Please, test it and write a feed back! > I will update the port in approx. 24 hours if there are no reports > of things breaking. So please test it 8-} I have just tested on the following platforms with good results. I use Kerberos (base system) for client GSSAPI authentication and LDAP groups to control access to destinations for those clients: they were the bits I was nervous about but all is good! r281234 10.1-RELEASE-p9 amd64 r281234 10.1-STABLE i386 Thank you for working on this! --=20 John Marshall --OXfL5xGRrasGEqWY Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iEYEARECAAYFAlUsYEAACgkQw/tAaKKahKKaOgCdGvFpjpWnmxaX+YBnv4dZx3ql ejsAn2i3uRLICicDG9AEoub28WVJOko6 =0o9B -----END PGP SIGNATURE----- --OXfL5xGRrasGEqWY--