Commit Graph

15 Commits

Author SHA1 Message Date
Florian Eckert 3426baff06 net/stunnel: Remove abdicate maintainer
Update PKG_RELEASE version to 4.
Remove Daniel Engberg from PGK_MAINTANER list.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2018-01-23 14:37:02 +01:00
Florian Eckert 68f6fc25a0 net/stunnel: check if service section is configured to prevent crash loop
If a service section is not presented in the configuration then stunnel will
always start anyway. This ends in a crash loop because the configuration is not
valid.
Checking in "uci" mode if a service section is presented and only then
start the stunnel service will solve this issue.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2018-01-23 14:37:02 +01:00
Florian Eckert 66349b4cd9 net/stunnel: do always stop/start on config change
Do not send a SIGHUP on reload configuration let procd restart the
service with stop/start. This is saver.

Add uci generated stunnel file to procd "file" attribute to
reload/restart the stunnel service.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2018-01-23 11:53:47 +01:00
Florian Eckert 3fc880c2e9 net/stunnel: add enabled config option
Add an enabled option for the service section, so you could keep your
configuration in place without apply this section on startup or service reload.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2017-12-15 08:03:41 +01:00
Florian Eckert 5e0e6e0533 net/stunnel: add uci config support
Add uci config support.

Signed-off-by: Florian Eckert <fe@dev.tdt.de>
2017-12-10 11:13:43 +01:00
Daniel Engberg 6b53b45e07 net/stunnel: Update to 5.44
Update stunnel to 5.44
* Disable FIPS

Signed-off-by: Daniel Engberg <daniel.engberg.lists@pyret.net>
2017-12-09 10:53:35 +01:00
Daniel Engberg 4f3b2f83d8 net/stunnel: Update to 5.41
Update stunnel to 5.41
Add main site as last resort mirror

Signed-off-by: Daniel Engberg <daniel.engberg.lists@pyret.net>
2017-04-02 10:49:49 +02:00
Daniel Engberg bfe17ade44 net/stunnel: Update to version 5.40
Update stunnel to 5.40

Signed-off-by: Daniel Engberg <daniel.engberg.lists@pyret.net>
2017-01-29 08:54:41 +01:00
Daniel Engberg 86257f8550 net/stunnel: Update to 5.38
Updates stunnel to version 5.38

Signed-off-by: Daniel Engberg <daniel.engberg.lists@pyret.net>
2016-11-28 08:56:44 +01:00
Daniel Engberg 169703d3e7 net/stunnel: Update to 5.37
Updates stunnel to version 5.37

Signed-off-by: Daniel Engberg <daniel.engberg.lists@pyret.net>
2016-11-20 22:59:07 +01:00
diizzyy 1c63894670 stunnel: Update to 5.36, use pthreads and SSP.
Updates stunnel to 5.36, changes it from using forking to pthreads and
enables SSP linking. Also changes maintainer to myself.

Regarding pthreads vs forking, http://blog.haproxy.com/2011/09/16/benchmarking_ssl_performance/
SSP is short for Stack Smashing Protector and you can read about it here: http://wiki.osdev.org/Stack_Smashing_Protector

Signed-off-by: Daniel Engberg <daniel.engberg.lists@pyret.net>
2016-10-01 00:04:33 +02:00
Felix Fietkau 0aa77e80f9 stunnel: add missing zlib dependency
Signed-off-by: Felix Fietkau <nbd@nbd.name>
2016-07-24 14:52:50 +02:00
Michael Haas d3a38dc6a8 stunnel: Update from 5.14 to 5.20
* 010_fix_getnameinfo.patch is no longer needed
* 011-cron-without-pthread-fix.patch added, fixes incorrect
  ifdef when building without pthreads

Signed-off-by: Michael Haas <haas@computerlinguist.org>
2015-07-25 17:31:11 +02:00
Michael Haas 0c3713c767 stunnel: Bump from 5.10 to 5.14
Also refresh patches.

Signed-Off-By: Michael Haas <haas@computerlinguist.org>
2015-04-03 10:20:18 +02:00
Michael Haas f6927350e4 stunnel: Bring it back at v5.10
From: Michael Haas <haas@computerlinguist.org>

* init script no longer creates certificates (consider client mode as use
  case)
* patches/010_fix_getnameinfo.patch: Fix getnameinfo signature
* patches/011_disable_ssp_linking.patch: Disable -fstack-protector as it
  is not always available in OpenWRT
* old patches (in oldpackages) no longer necessary
* remove libwrap dependency
* remove libpthread dependency
* respect CONFIG_IPV6
* init script uses procd
* sample stunnel.conf runs in client mode - prevents start failure,
  does not require cert

Possible enhancement: automatically generate certificate as done in
uhttpd. However, as client mode is a possible use case, I'd rather not.
Additionally, stunnel may use several certs with user-defined locations
and we can't easily set a cert location via command-line args.

The package is based on
https://sites.google.com/site/twisteroidambassador/openwrt/stunnel

Signed-off-by: Michael Haas <haas@computerlinguist.org>
2015-03-17 13:47:55 +01:00