non port: www/mod_authn_otp/Makefile |
Number of commits found: 14 |
Friday, 3 Mar 2017
|
16:00 mat
Mark the remaining ports depending on Google Code as DEPRECATED, with an
EXPIRATION_DATE at the end of April 2017.
In the past six months, about a third of the ports marked BROKEN because
they were hosted on Google Code have been fixed. The remaining must not
be of use to anyone.
With hat: portmgr
Sponsored by: Absolight
|
Wednesday, 14 Sep 2016
|
15:59 mat
GOOGLE_CODE has gone away.
- If a port has another upstream, remove GOOGLE_CODE
- If a port only has GOOGLE_CODE mark it BROKEN
Some ports have a local mirror configured but for security reasons, it
is not considered upstream.
Sponsored by: Absolight
|
Sunday, 11 Sep 2016
|
19:25 marino
www/mod_authn_otp: Document SSL requirement and set its flags
While here, remove unnecessary options include.
Approved by: SSL blanket
|
Monday, 25 Aug 2014
|
17:14 mat
This version works with apache 2.4.
Sponsored by: Absolight
|
Sunday, 18 May 2014
|
19:53 ohauer
- update to 1.1.6
- add stage support
- add LICENSE
PR: ports/189796
Submitted by: Alexander Hausner <alex@hugo.bmg.gv.at> (maintainer)
|
Friday, 21 Feb 2014
|
13:39 ehaupt
Remove trailing whitespaces from category www
|
Monday, 10 Feb 2014
|
13:54 ehaupt
According to the Porter's Handbook (5.12.2.3.) default options must be added to
OPTIONS_DEFINE. This policy has been implemented only recently that's why we
have many ports violating this policy.
This patch adds the default options specified in the Porter's Handbook to
OPTIONS_DEFINE where they are being used. Ports maintained by
gnome@FreeBSD.org, kde@FreeBSD.org and x11@FreeBSD.org have been excluded.
Approved by: portmgr (bapt)
|
Friday, 20 Sep 2013
|
23:36 bapt
Add NO_STAGE all over the place in preparation for the staging support (cat:
www)
|
Wednesday, 14 Aug 2013
|
22:35 ak
- Remove MAKE_JOBS_SAFE variable
Approved by: portmgr (bdrewery)
|
Monday, 17 Dec 2012
|
22:46 pawel
- Update to version 1.1.5 [1]
- Respect CFLAGS
- Convert to OptionsNG
PR: ports/174112 [1]
Submitted by: Alexander Hausner <alex@hugo.bmg.gv.at> (maintainer)
|
Saturday, 22 Sep 2012
|
21:15 ohauer
- USE_APACHE= s/22+/22/
- adopt new Makefile header
Port build fails on local exp-run with apache24 with
error: 'conn_rec' has no member named 'remote_ip'
or various other apache22 specific functions/parameters
with hat apache@
|
Saturday, 25 Aug 2012
|
22:43 ohauer
- add pkg-plist
|
21:08 ohauer
mod_authn_otp - Apache module for one-time password authentication
mod_authn_otp is an Apache web server module for two-factor authentication
using one-time passwords (OTP) generated via the HOTP/OATH algorithm
defined in RFC 4226. This creates a simple way to protect a web site with
one-time passwords, using any RFC 4226-compliant hardware or software
token device. mod_authn_otp also supports the Mobile-OTP algorithm.
mod_authn_otp supports both event and time based one-time passwords. It
also supports "lingering" which allows the repeated re-use of a previously
used one-time password up to a configurable maximum linger time. This
allows one-time passwords to be used directly in HTTP authentication
without forcing the user to enter a new one-time password for every
page load.
mod_authn_otp supports both basic and digest authentication, and will
auto-synchronize with the user's token within a configurable maximum
offset (auto-synchronization is not supported with digest authentication).
WWW: http://mod-authn-otp.googlecode.com/
- force commit with correct pr number
PR: ports/167964
Submitted by: Alexander Hausner <alex@hugo.bmg.gv.at>
|
21:00 ohauer
mod_authn_otp - Apache module for one-time password authentication
mod_authn_otp is an Apache web server module for two-factor authentication
using one-time passwords (OTP) generated via the HOTP/OATH algorithm
defined in RFC 4226. This creates a simple way to protect a web site with
one-time passwords, using any RFC 4226-compliant hardware or software
token device. mod_authn_otp also supports the Mobile-OTP algorithm.
mod_authn_otp supports both event and time based one-time passwords. It
also supports "lingering" which allows the repeated re-use of a previously
used one-time password up to a configurable maximum linger time. This
allows one-time passwords to be used directly in HTTP authentication
without forcing the user to enter a new one-time password for every
page load.
mod_authn_otp supports both basic and digest authentication, and will
auto-synchronize with the user's token within a configurable maximum
offset (auto-synchronization is not supported with digest authentication).
WWW: http://mod-authn-otp.googlecode.com/
PR: ports/170826
Submitted by: Alexander Hausner <alex@hugo.bmg.gv.at>
|
Number of commits found: 14 |