mirror of
https://git.freebsd.org/ports.git
synced 2025-04-28 09:36:41 -04:00
security/hidden-lake: update 1.8.2 → 1.8.3
* Improve pkg-descr Changelog: https://github.com/number571/hidden-lake/blob/master/CHANGELOG.md PR: 283994
This commit is contained in:
parent
2db5066136
commit
9a5aee4f95
4 changed files with 22 additions and 8 deletions
|
@ -1,6 +1,6 @@
|
|||
PORTNAME= hidden-lake
|
||||
DISTVERSIONPREFIX= v
|
||||
DISTVERSION= 1.8.2
|
||||
DISTVERSION= 1.8.3
|
||||
CATEGORIES= security net-p2p
|
||||
|
||||
MAINTAINER= alster@vinterdalen.se
|
||||
|
@ -13,10 +13,11 @@ LICENSE_FILE= ${WRKSRC}/LICENSE
|
|||
USES= go:1.23,modules
|
||||
|
||||
GO_MODULE= github.com/number571/hidden-lake
|
||||
GO_TARGET= ./cmd/hla/hla_tcp:hla-tcp \
|
||||
GO_TARGET= ./cmd/hla/hla_tcp:hla_tcp \
|
||||
./cmd/hlc:hlc \
|
||||
./cmd/hlf:hlf \
|
||||
./cmd/hlm:hlm \
|
||||
./cmd/hlm:hlp \
|
||||
./cmd/hlr:hlr \
|
||||
./cmd/hls:hls
|
||||
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
TIMESTAMP = 1734860802
|
||||
SHA256 (go/security_hidden-lake/hidden-lake-v1.8.2/v1.8.2.mod) = ed3357aa38c69af64bcd23253d5277be1832d8c0dbff34f78d8778e9c4475d08
|
||||
SIZE (go/security_hidden-lake/hidden-lake-v1.8.2/v1.8.2.mod) = 339
|
||||
SHA256 (go/security_hidden-lake/hidden-lake-v1.8.2/v1.8.2.zip) = e65497ea0a3ec6ece0f15959a77f5a86d612eb1c97c36875237d87d45229efde
|
||||
SIZE (go/security_hidden-lake/hidden-lake-v1.8.2/v1.8.2.zip) = 10617070
|
||||
TIMESTAMP = 1736592122
|
||||
SHA256 (go/security_hidden-lake/hidden-lake-v1.8.3/v1.8.3.mod) = e72da809c6a002379cb3a21564748b5595e42289d769f5789c2551308d1a5464
|
||||
SIZE (go/security_hidden-lake/hidden-lake-v1.8.3/v1.8.3.mod) = 340
|
||||
SHA256 (go/security_hidden-lake/hidden-lake-v1.8.3/v1.8.3.zip) = ebb6022ff76763c210b2db6e12fb2ef7ae1edc12b5d87128b8a1a530a801ce1b
|
||||
SIZE (go/security_hidden-lake/hidden-lake-v1.8.3/v1.8.3.zip) = 10878399
|
||||
|
|
|
@ -6,3 +6,15 @@ composition of several combined services. The HL is a friend-to-friend (F2F)
|
|||
network, which means building trusted communications. Due to this approach,
|
||||
members of the HL network can avoid spam in their direction, as well as possible
|
||||
attacks if vulnerabilities are found in the code.
|
||||
|
||||
List of applications:
|
||||
|
||||
* Basic:
|
||||
- HLS :: anonymizes traffic using the QB-problem
|
||||
- HLC :: runs many HL services as one application
|
||||
- HLA :: adapts HL traffic to external environments
|
||||
* Applied:
|
||||
- HLM :: messenger with a web interface
|
||||
- HLF :: file sharing with a web interface
|
||||
- HLR :: executes remote access commands
|
||||
- HLP :: ping the node to check the online status
|
||||
|
|
|
@ -1,7 +1,8 @@
|
|||
bin/hla-tcp
|
||||
bin/hla_tcp
|
||||
bin/hlc
|
||||
bin/hlf
|
||||
bin/hlm
|
||||
bin/hlp
|
||||
bin/hlr
|
||||
bin/hls
|
||||
%%PORTDOCS%%%%DOCSDIR%%/CODESTYLE.md
|
||||
|
|
Loading…
Add table
Reference in a new issue