Next | Query returned 8 messages, browsing 1 to 10 | previous

History of commit frequency

CVS Commit History:


   2015-04-02 21:36:21 by Jason Bacon | Files touched by this commit (7)
Log message:
Sync with committed package and add improvements for CentOS

   2014-11-27 14:16:20 by Jason Bacon | Files touched by this commit (1)
Log message:
Patch daemon owner for CentOS

   2014-04-29 21:38:51 by Jason Bacon | Files touched by this commit (6)
Log message:
Add LICENSE, BUILD_DEFS, comments to PLIST.*

   2014-04-22 21:52:08 by Jason Bacon | Files touched by this commit (9) | Package updated
Log message:
Import munge-0.5.11nb2 as wip/munge.

MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service
for creating and validating credentials. It is designed to be
highly scalable for use in an HPC cluster environment. It allows
a process to authenticate the UID and GID of another local or
remote process within a group of hosts having common users and
groups. These hosts form a security realm that is defined by a
shared cryptographic key. Clients within this security realm can
create and validate credentials without the use of root
privileges, reserved ports, or platform-specific methods.

This update compensates for a minor difference in the Linux PLIST.

   2013-08-30 22:18:07 by Aleksej Saushev | Files touched by this commit (10) | Package removed
Log message:
Remove munge, used to update security/munge

   2013-08-30 22:08:16 by Aleksej Saushev | Files touched by this commit (1)
Log message:
Depend on libgcrypt unconditionally.
Bump package revision.
   2013-08-30 22:06:57 by Aleksej Saushev | Files touched by this commit (1)
Log message:
Fix packaging: "default" instead of "defaults".
   2013-08-29 04:10:07 by Jason Bacon | Files touched by this commit (10)
Log message:
Import munge-0.5.10nb3 as wip/munge.

Updated to build on CentOS Linux.

MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service
for creating and validating credentials. It is designed to be
highly scalable for use in an HPC cluster environment. It allows
a process to authenticate the UID and GID of another local or
remote process within a group of hosts having common users and
groups. These hosts form a security realm that is defined by a
shared cryptographic key. Clients within this security realm can
create and validate credentials without the use of root
privileges, reserved ports, or platform-specific methods.


Next | Query returned 8 messages, browsing 1 to 10 | previous