1 |
dragonheart 08/09/09 21:22:56 |
2 |
|
3 |
Modified: ChangeLog |
4 |
Added: ipsec-tools-0.7.1.ebuild |
5 |
Log: |
6 |
version bump wrt bug #232831. ebuild cleanup thanks to Craig. |
7 |
(Portage version: 2.2_rc8/cvs/Linux 2.6.22-vs2.2.0.7-gentoo x86_64) |
8 |
|
9 |
Revision Changes Path |
10 |
1.63 net-firewall/ipsec-tools/ChangeLog |
11 |
|
12 |
file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ChangeLog?rev=1.63&view=markup |
13 |
plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ChangeLog?rev=1.63&content-type=text/plain |
14 |
diff : http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ChangeLog?r1=1.62&r2=1.63 |
15 |
|
16 |
Index: ChangeLog |
17 |
=================================================================== |
18 |
RCS file: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ChangeLog,v |
19 |
retrieving revision 1.62 |
20 |
retrieving revision 1.63 |
21 |
diff -u -r1.62 -r1.63 |
22 |
--- ChangeLog 17 Aug 2008 15:57:30 -0000 1.62 |
23 |
+++ ChangeLog 9 Sep 2008 21:22:55 -0000 1.63 |
24 |
@@ -1,6 +1,12 @@ |
25 |
# ChangeLog for net-firewall/ipsec-tools |
26 |
# Copyright 2000-2008 Gentoo Foundation; Distributed under the GPL v2 |
27 |
-# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ChangeLog,v 1.62 2008/08/17 15:57:30 cardoe Exp $ |
28 |
+# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ChangeLog,v 1.63 2008/09/09 21:22:55 dragonheart Exp $ |
29 |
+ |
30 |
+*ipsec-tools-0.7.1 (09 Sep 2008) |
31 |
+ |
32 |
+ 09 Sep 2008; Daniel Black <dragonheart@g.o> |
33 |
+ +ipsec-tools-0.7.1.ebuild: |
34 |
+ version bump wrt bug #232831. ebuild cleanup thanks to Craig. |
35 |
|
36 |
17 Aug 2008; Doug Goldstein <cardoe@g.o> metadata.xml: |
37 |
add GLEP 56 USE flag desc from use.local.desc |
38 |
|
39 |
|
40 |
|
41 |
1.1 net-firewall/ipsec-tools/ipsec-tools-0.7.1.ebuild |
42 |
|
43 |
file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ipsec-tools-0.7.1.ebuild?rev=1.1&view=markup |
44 |
plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ipsec-tools-0.7.1.ebuild?rev=1.1&content-type=text/plain |
45 |
|
46 |
Index: ipsec-tools-0.7.1.ebuild |
47 |
=================================================================== |
48 |
# Copyright 1999-2008 Gentoo Foundation |
49 |
# Distributed under the terms of the GNU General Public License v2 |
50 |
# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ipsec-tools-0.7.1.ebuild,v 1.1 2008/09/09 21:22:55 dragonheart Exp $ |
51 |
|
52 |
inherit eutils flag-o-matic autotools linux-info |
53 |
|
54 |
DESCRIPTION="A port of KAME's IPsec utilities to the Linux-2.6 IPsec implementation" |
55 |
HOMEPAGE="http://ipsec-tools.sourceforge.net/" |
56 |
SRC_URI="mirror://sourceforge/${PN}/${P}.tar.bz2" |
57 |
|
58 |
LICENSE="BSD" |
59 |
SLOT="0" |
60 |
KEYWORDS="~amd64 ~ppc ~sparc ~x86" |
61 |
IUSE="idea ipv6 pam rc5 readline selinux ldap kerberos nat hybrid iconv selinux" |
62 |
|
63 |
# FIXME: what is the correct syntax for ~sparc ??? |
64 |
DEPEND="!sparc? ( >=sys-kernel/linux-headers-2.6 ) |
65 |
readline? ( sys-libs/readline ) |
66 |
pam? ( sys-libs/pam ) |
67 |
ldap? ( net-nds/openldap ) |
68 |
kerberos? ( virtual/krb5 ) |
69 |
>=dev-libs/openssl-0.9.8 |
70 |
iconv? ( virtual/libiconv ) |
71 |
selinux? ( sys-libs/libselinux )" |
72 |
# radius? ( net-dialup/gnuradius ) |
73 |
|
74 |
RDEPEND="${DEPEND} |
75 |
selinux? ( sec-policy/selinux-ipsec-tools )" |
76 |
|
77 |
# {{{ kernel_check() |
78 |
kernel_check() { |
79 |
get_version |
80 |
if kernel_is 2 6 ; then |
81 |
if test "${KV_PATCH}" -ge 19 ; then |
82 |
# Just for kernel >=2.6.19 |
83 |
ebegin "Checking for suitable kernel configuration (Networking | Networking support | Networking options)" |
84 |
|
85 |
if use nat ; then |
86 |
if ! { linux_chkconfig_present NETFILTER_XT_MATCH_POLICY; } ; then |
87 |
ewarn "[NETFILTER_XT_MATCH_POLICY] IPsec policy match support is NOT enabled" |
88 |
eerror "${P} won't compile with use nat traversal (USE=nat) until you enable NETFILTER_XT_MATCH_POLICY in your kernel" |
89 |
die |
90 |
else |
91 |
einfo "....[NETFILTER_XT_MATCH_POLICY] IPsec policy match support is enabled :-)" |
92 |
fi |
93 |
fi |
94 |
# {{{ general stuff |
95 |
if ! { linux_chkconfig_present XFRM_USER; }; then |
96 |
ewarn "[XFRM_USER] Transformation user configuration interface is NOT enabled." |
97 |
else |
98 |
einfo "....[XFRM_USER] Transformation user configuration interface is enabled :-)" |
99 |
fi |
100 |
|
101 |
if ! { linux_chkconfig_present NET_KEY; }; then |
102 |
ewarn "[NET_KEY] PF_KEY sockets is NOT enabled." |
103 |
else |
104 |
einfo "....[NET_KEY] PF_KEY sockets is enabled :-)" |
105 |
fi |
106 |
# }}} |
107 |
# {{{ IPv4 stuff |
108 |
if ! { linux_chkconfig_present INET_IPCOMP; }; then |
109 |
ewarn "[INET_IPCOMP] IP: IPComp transformation is NOT enabled" |
110 |
else |
111 |
einfo "....[INET_IPCOMP] IP: IPComp transformation is enabled :-)" |
112 |
fi |
113 |
|
114 |
if ! { linux_chkconfig_present INET_AH; }; then |
115 |
ewarn "[INET_AH] AH Transformation is NOT enabled." |
116 |
else |
117 |
einfo "....[INET_AH] AH Transformation is enabled :-)" |
118 |
fi |
119 |
|
120 |
if ! { linux_chkconfig_present INET_ESP; }; then |
121 |
ewarn "[INET_ESP] ESP Transformation is NOT enabled." |
122 |
else |
123 |
einfo "....[INET_ESP] ESP Transformation is enabled :-)" |
124 |
fi |
125 |
|
126 |
if ! { linux_chkconfig_present INET_XFRM_MODE_TRANSPORT; }; then |
127 |
ewarn "[INET_XFRM_MODE_TRANSPORT] IP: IPsec transport mode is NOT enabled." |
128 |
else |
129 |
einfo "....[INET_XFRM_MODE_TRANSPORT] IP: IPsec transport mode is enabled :-)" |
130 |
fi |
131 |
|
132 |
if ! { linux_chkconfig_present INET_XFRM_MODE_TUNNEL; }; then |
133 |
ewarn "[INET_XFRM_MODE_TUNNEL] IP: IPsec tunnel mode is NOT enabled." |
134 |
else |
135 |
einfo "....[INET_XFRM_MODE_TUNNEL] IP: IPsec tunnel mode is enabled :-)" |
136 |
fi |
137 |
|
138 |
if ! { linux_chkconfig_present INET_XFRM_MODE_BEET; }; then |
139 |
ewarn "[INET_XFRM_MODE_BEET] IP: IPsec BEET mode is NOT enabled." |
140 |
else |
141 |
einfo "....[INET_XFRM_MODE_BEET] IP: IPsec BEET mode is enabled :-)" |
142 |
fi |
143 |
# }}} |
144 |
# {{{ IPv6 stuff |
145 |
if use ipv6 ; then |
146 |
if ! { linux_chkconfig_present INET6_IPCOMP; }; then |
147 |
ewarn "[INET6_IPCOMP] IPv6: IPComp transformation is NOT enabled" |
148 |
else |
149 |
einfo "....[INET6_IPCOMP] IPv6: IPComp transformation is enabled :-)" |
150 |
fi |
151 |
|
152 |
if ! { linux_chkconfig_present INET6_AH; }; then |
153 |
ewarn "[INET6_AH] IPv6: AH Transformation is NOT enabled." |
154 |
else |
155 |
einfo "....[INET6_AH] IPv6: AH Transformation is enabled :-)" |
156 |
fi |
157 |
|
158 |
if ! { linux_chkconfig_present INET6_ESP; }; then |
159 |
ewarn "[INET6_ESP] IPv6: ESP Transformation is NOT enabled." |
160 |
else |
161 |
einfo "....[INET6_ESP] IPv6: ESP Transformation is enabled :-)" |
162 |
fi |
163 |
|
164 |
if ! { linux_chkconfig_present INET6_XFRM_MODE_TRANSPORT; }; then |
165 |
ewarn "[INET6_XFRM_MODE_TRANSPORT] IPv6: IPsec transport mode is NOT enabled." |
166 |
else |
167 |
einfo "....[INET6_XFRM_MODE_TRANSPORT] IPv6: IPsec transport mode is enabled :-)" |
168 |
fi |
169 |
|
170 |
if ! { linux_chkconfig_present INET6_XFRM_MODE_TUNNEL; }; then |
171 |
ewarn "[INET6_XFRM_MODE_TUNNEL] IPv6: IPsec tunnel mode is NOT enabled." |
172 |
else |
173 |
einfo "....[INET6_XFRM_MODE_TUNNEL] IPv6: IPsec tunnel mode is enabled :-)" |
174 |
fi |
175 |
|
176 |
if ! { linux_chkconfig_present INET6_XFRM_MODE_BEET; }; then |
177 |
ewarn "[INET6_XFRM_MODE_BEET] IPv6: IPsec BEET mode is NOT enabled." |
178 |
else |
179 |
einfo "....[INET6_XFRM_MODE_BEET] IPv6: IPsec BEET mode is enabled :-)" |
180 |
fi |
181 |
fi |
182 |
# }}} |
183 |
|
184 |
eend $? |
185 |
fi |
186 |
fi |
187 |
} |
188 |
# }}} |
189 |
|
190 |
src_unpack() { |
191 |
unpack ${A} |
192 |
cd "${S}" |
193 |
# fix for bug #76741 |
194 |
sed -i 's:#include <sys/sysctl.h>::' src/racoon/pfkey.c src/setkey/setkey.c |
195 |
# fix for bug #124813 |
196 |
sed -i 's:-Werror::g' "${S}"/configure.ac |
197 |
|
198 |
AT_M4DIR="${S}" eautoreconf |
199 |
epunt_cxx |
200 |
} |
201 |
|
202 |
src_compile() { |
203 |
# fix for bug #61025 |
204 |
filter-flags -march=c3 |
205 |
|
206 |
kernel_check |
207 |
|
208 |
myconf="--with-kernel-headers=${KV_DIR}/include \ |
209 |
--enable-dependency-tracking \ |
210 |
--enable-dpd \ |
211 |
--enable-frag \ |
212 |
--enable-stats \ |
213 |
--enable-fastquit \ |
214 |
--enable-stats \ |
215 |
--enable-adminport \ |
216 |
$(use_enable ipv6) \ |
217 |
$(use_enable rc5) \ |
218 |
$(use_enable idea) \ |
219 |
$(use_with readline) |
220 |
$(use_enable kerberos gssapi) \ |
221 |
$(use_with ldap libldap) \ |
222 |
$(use_with pam libpam)" |
223 |
|
224 |
# we do not want broken-natt from the kernel |
225 |
# myconf="${myconf} $(use_enable broken-natt)" |
226 |
use nat && myconf="${myconf} --enable-natt --enable-natt-versions=yes" |
227 |
|
228 |
# we only need security-context when using selinux |
229 |
myconf="${myconf} $(use_enable selinux security-context)" |
230 |
|
231 |
# enable mode-cfg and xauth support |
232 |
if use pam; then |
233 |
myconf="${myconf} --enable-hybrid" |
234 |
else |
235 |
myconf="${myconf} $(use_enable hybrid)" |
236 |
fi |
237 |
|
238 |
# dev-libs/libiconv is hard masked |
239 |
#use iconv && myconf="${myconf} $(use_with iconv libiconv)" |
240 |
|
241 |
# the default (/usr/include/openssl/) is OK for Gentoo, leave it |
242 |
# myconf="${myconf} $(use_with ssl openssl )" |
243 |
|
244 |
# No way to get it compiling with freeradius or gnuradius |
245 |
# We would need libradius which only exists on FreeBSD |
246 |
|
247 |
# See bug #77369 |
248 |
#myconf="${myconf} --enable-samode-unspec" |
249 |
|
250 |
econf ${myconf} || die |
251 |
emake -j1 || die |
252 |
} |
253 |
|
254 |
src_install() { |
255 |
emake DESTDIR="${D}" install || die |
256 |
keepdir /var/lib/racoon |
257 |
newconfd "${FILESDIR}"/racoon.conf.d racoon |
258 |
newinitd "${FILESDIR}"/racoon.init.d racoon |
259 |
|
260 |
dodoc ChangeLog README NEWS |
261 |
dodoc src/racoon/samples/* |
262 |
dodoc src/racoon/doc/* |
263 |
|
264 |
docinto roadwarrior |
265 |
dodoc src/racoon/samples/roadwarrior/* |
266 |
|
267 |
docinto roadwarrior/client |
268 |
dodoc src/racoon/samples/roadwarrior/client/* |
269 |
docinto roadwarrior/server |
270 |
dodoc src/racoon/samples/roadwarrior/server/* |
271 |
|
272 |
docinto setkey |
273 |
dodoc src/setkey/sample.cf |
274 |
|
275 |
dodir /etc/racoon |
276 |
|
277 |
# RFC are only available from CVS for the moment, see einfo below |
278 |
#docinto "rfc" |
279 |
#dodoc ${S}/src/racoon/rfc/* |
280 |
} |
281 |
|
282 |
pkg_postinst() { |
283 |
if use nat; then |
284 |
elog |
285 |
elog " You have enabled the nat traversal functionnality." |
286 |
elog " Nat versions wich are enabled by default are 00,02,rfc" |
287 |
elog " you can find those drafts in the CVS repository:" |
288 |
elog "cvs -d anoncvs@××××××××××××××.org:/cvsroot co ipsec-tools" |
289 |
elog |
290 |
elog "If you feel brave enough and you know what you are" |
291 |
elog "doing, you can consider emerging this ebuild" |
292 |
elog "with" |
293 |
elog "EXTRA_ECONF=\"--enable-natt-versions=08,07,06\"" |
294 |
elog |
295 |
fi; |
296 |
|
297 |
if use ldap; then |
298 |
elog |
299 |
elog " You have enabled ldap support with {$PN}." |
300 |
elog " The man page does NOT contain any information on it yet." |
301 |
elog " Consider to use a more recent version or CVS" |
302 |
elog |
303 |
fi; |
304 |
|
305 |
elog |
306 |
elog "Please have a look in /usr/share/doc/${P} and visit" |
307 |
elog "http://www.netbsd.org/Documentation/network/ipsec/" |
308 |
elog "to find a lot of information on how to configure this great tool." |
309 |
elog |
310 |
} |
311 |
|
312 |
# vim: set foldmethod=marker nowrap : |