summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Disable various obsolete mirrorsbwh/disable-obsoleteBen Hutchings2020-09-1187-366/+430
| | | | | | All of these have changed version control system or otherwise become obsolete. Their descriptions have already been set to mark them as such.
* Use https: scheme instead of http: for various archivesbwh/use-httpsBen Hutchings2020-09-1152-53/+53
| | | | | HTTP is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme instead of http: for various repositoriesBen Hutchings2020-09-1111-16/+16
| | | | | HTTP is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for OpenSSHBen Hutchings2020-09-111-1/+1
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for BusyBoxBen Hutchings2020-09-111-1/+1
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for gccBen Hutchings2020-09-111-1/+1
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for ghostpdlBen Hutchings2020-09-111-1/+1
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for gdbmBen Hutchings2020-09-111-1/+1
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for moreutilsBen Hutchings2020-09-111-1/+1
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for muslBen Hutchings2020-09-111-1/+1
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for bareboxBen Hutchings2020-09-111-1/+1
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for PostgreSQLBen Hutchings2020-09-111-1/+1
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for cgitBen Hutchings2020-09-111-1/+1
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for pppBen Hutchings2020-09-111-1/+1
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for FFmpegBen Hutchings2020-09-111-1/+1
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for hostapBen Hutchings2020-09-111-1/+1
| | | | | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this. The documented HTTP path for git access on this server doesn't work, so use cgit's smart HTTP support.
* Use https: scheme for XenBen Hutchings2020-09-111-1/+1
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for mpfrBen Hutchings2020-09-111-1/+1
| | | | | The svn native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for this.
* Use https: scheme for all repositories on git.alsa-project.orgBen Hutchings2020-09-112-2/+2
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories on git.samba.orgBen Hutchings2020-09-112-2/+2
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories on libvirt.orgBen Hutchings2020-09-112-2/+2
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories on git.0pointer.{de,net}Ben Hutchings2020-09-114-4/+4
| | | | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these. Also change git.0pointer.de to git.0pointer.net, which is its canonical hostname and the only name in the TLS certificate.
* Use https: scheme for all repositories on gnupg.orgBen Hutchings2020-09-114-4/+4
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all files in Debian archiveBen Hutchings2020-09-112-2/+2
| | | | | | HTTP is unauthenticated and so subject to man-in-the-middle attacks. Use the deb.debian.org CDN and https for these. (Other mirrors generally don't support https.)
* Use https: scheme for all files on CPANBen Hutchings2020-09-116-70/+70
| | | | | | HTTP is unauthenticated and so subject to man-in-the-middle attacks. Use https for these. Also use the canonical hostname cpan.metacpan.org.
* Use https: scheme for all repositories on git.suckless.orgBen Hutchings2020-09-111-3/+3
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories on repo.or.czBen Hutchings2020-09-113-3/+3
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories on sourceware.orgBen Hutchings2020-09-115-5/+5
| | | | | HTTP and the git native protocol are unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories on git.qemu.orgBen Hutchings2020-09-118-8/+8
| | | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these. Also change the hostname from git.qemu-project.org to the canonical git.qemu.org.
* Use https: scheme for active Git and Subversion repositories on SourceforgeBen Hutchings2020-09-116-6/+6
| | | | | | | | HTTP and the git and svn native protocols are unauthenticated and so subject to man-in-the-middle attacks. Use https for these. Unfortunately we can't do this for Mercurial repositories, as the https service for them currently requires authentication.
* Use https: scheme for all repositories on git.netfilter.orgBen Hutchings2020-09-1110-10/+10
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories on git.openwrt.orgBen Hutchings2020-09-111-5/+5
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories hosted by PepperfishBen Hutchings2020-09-113-22/+22
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories on git.xfce.orgBen Hutchings2020-09-111-16/+16
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories on git.kernel.orgBen Hutchings2020-09-1121-21/+21
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories on SavannahBen Hutchings2020-09-1138-38/+38
| | | | | HTTP and the git native protocol are unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories on code.qt.ioBen Hutchings2020-09-113-40/+40
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories on anongit.freedesktop.orgBen Hutchings2020-09-119-9/+9
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Use https: scheme for all repositories on GitHubBen Hutchings2020-09-11122-265/+265
| | | | | The git native protocol is unauthenticated and so subject to man-in-the-middle attacks. Use https for these.
* Mark navit-svn as obsoletebwh/misc-updatesBen Hutchings2020-09-111-1/+2
| | | | | navit switched from Subversion to Git, and we already have a mirror of the Git repository. Mark the old mirror as obsolete.
* Mark libusbx as obsoleteBen Hutchings2020-09-111-1/+2
| | | | | The libusbx fork was merged back into libusb (which we also mirror) and is no longer being updated.
* Mark eglibc as obsoleteBen Hutchings2020-09-111-1/+2
| | | | | eglibc is no longer developed, as the current GNU C library maintainers are more open to including support for embedded systems.
* Mark distutils2 as obsoleteBen Hutchings2020-09-111-1/+2
| | | | | distutils2 was abandoned in 2012. From its PyPI page: "tl;dr: keep using setuptools and pip for now, don’t use distutils2."
* Update URL for U-BootBen Hutchings2020-09-111-1/+1
| | | | U-Boot's canonical repository is now on gitlab.denx.de.
* Update URL for OpenSSLBen Hutchings2020-09-111-1/+1
| | | | | | OpenSSL's canonical repository is now on GitHub. The repositories on git.openssl.org do not seem to be available over https, which is a bit ironic.
* Update mirroring of neonBen Hutchings2020-09-101-1/+6
| | | | | | neon moved from svn.webdav.org to GitHub. Since it switched from Subversion to Git, use a different name for the new mirror. Mark the old mirror as obsolete.
* Update mirroring of lighttpdBen Hutchings2020-09-101-1/+6
| | | | | lighttpd switched from Subversion to Git.. Add a new mirror for the git repository and mark the old mirror as obsolete.
* Update URLs for tcpdump repositoriesBen Hutchings2020-09-102-2/+2
| | | | The canonical repositories for libpcap and tcpdump are now on GitHub.
* Update URL for Mercurial tarballBen Hutchings2020-09-101-1/+1
| | | | | | | HTTP is unauthenticated and so subject to man-in-the-middle attacks. Use https for this. Also use the hostname mercurial-scm.org; mercurial.selenic.com is still an alias for it but is not included in the server's TLS certificate.
* Update URL for bzip2Ben Hutchings2020-09-101-1/+1
| | | | | | | bzip.org has a minimal Wordpress installation without support for https. Although the tarball is still there, the text refers to Sourceforge for downloads. Sourceforge does suppoort https, so download from there.