1 |
commit: 7f376dc79d0dd572e9771c03558fd631fd86af1e |
2 |
Author: Mike Gilbert <floppym <AT> gentoo <DOT> org> |
3 |
AuthorDate: Wed Oct 20 17:27:35 2021 +0000 |
4 |
Commit: Mike Gilbert <floppym <AT> gentoo <DOT> org> |
5 |
CommitDate: Wed Oct 20 17:27:35 2021 +0000 |
6 |
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7f376dc7 |
7 |
|
8 |
net-vpn/openconnect: drop 8.09-r3, 8.10 |
9 |
|
10 |
Signed-off-by: Mike Gilbert <floppym <AT> gentoo.org> |
11 |
|
12 |
net-vpn/openconnect/Manifest | 3 - |
13 |
.../files/8.09-gnutls-buffer-overflow.patch | 62 --------- |
14 |
net-vpn/openconnect/files/README.OpenRC.txt | 25 ---- |
15 |
net-vpn/openconnect/files/openconnect.conf.in | 26 ---- |
16 |
net-vpn/openconnect/files/openconnect.init.in-r4 | 88 ------------ |
17 |
net-vpn/openconnect/openconnect-8.09-r3.ebuild | 152 --------------------- |
18 |
net-vpn/openconnect/openconnect-8.10.ebuild | 149 -------------------- |
19 |
7 files changed, 505 deletions(-) |
20 |
|
21 |
diff --git a/net-vpn/openconnect/Manifest b/net-vpn/openconnect/Manifest |
22 |
index 59221ffa774..3938384a696 100644 |
23 |
--- a/net-vpn/openconnect/Manifest |
24 |
+++ b/net-vpn/openconnect/Manifest |
25 |
@@ -1,4 +1 @@ |
26 |
-DIST openconnect-8.09.tar.gz 2083279 BLAKE2B 4588c693a7a641faad271b034e8713f00fda04a872641e45a8ce3e1a236b8d2f4e1b8d973d20e7a9fc656f9460a0e990cbaada008d4ecf9a46353f20c25ac87a SHA512 f6890f5bce4b36b162e4590bce8a61d65fc0ae803d62a3dd408fbb13e96ce41b6443740132808491093032545aea919f9076e34bc11160c503c5e3c46457e7bd |
27 |
DIST openconnect-8.10.tar.gz 2084534 BLAKE2B 98ad0e24e09bc565f359139540f60eb9b6b5ed2239a9c46c56889b8554fc3de3605c10f1bb4fa0b0b206ba35404ae90a389ab8dcee54cf05a24d984529d24c2a SHA512 a36a106cf5c637602fc5bd3cd12df8f6dfe55217c1aae93c66ca33208507f3f8cda15e3a46d75615c7fcea1859d1a04017a07674ad0246876154467305477356 |
28 |
-DIST vpnc-scripts-20200226.tar.gz 21460 BLAKE2B 8f00ce3dc49725758abce27f3688946df1bbd4e92769ef02aa9ee66db8b9f41bef3442eaa5405ab1467476899c6d364dfea898ed924ca83497823a85515d48e5 SHA512 3a1eac4ccfaefb0f837189c8cef696b33ab8b8a68cb50a3ad29206b708d0aa479e8eed0c09bef6f60d056cd98d63cc898a1609d734030a63df3be2cfa6c00f9a |
29 |
-DIST vpnc-scripts-20200930.tar.gz 22305 BLAKE2B 5db809ef674cb3cb8f1c775adc1e83debbda28fdcf47e0b0527efe6d1cea09781ef02b2827d9704140b884a85e7ec51fba497f47f6793520b471a7bba0dde6b6 SHA512 5f42bc7b168b5fdfc3ebd4bae52a42a654f102982852cc74240972e16e77fe0b54d82175e2a067e1d7e408bd14c3f465f7eb82b23b41885cb25a813d9587fd3d |
30 |
|
31 |
diff --git a/net-vpn/openconnect/files/8.09-gnutls-buffer-overflow.patch b/net-vpn/openconnect/files/8.09-gnutls-buffer-overflow.patch |
32 |
deleted file mode 100644 |
33 |
index bf8990ae3d3..00000000000 |
34 |
--- a/net-vpn/openconnect/files/8.09-gnutls-buffer-overflow.patch |
35 |
+++ /dev/null |
36 |
@@ -1,62 +0,0 @@ |
37 |
-From eef4c1f9d24478aa1d2dd9ac7ec32efb2137f474 Mon Sep 17 00:00:00 2001 |
38 |
-From: Sergei Trofimovich <slyfox@g.o> |
39 |
-Date: Fri, 8 May 2020 10:39:41 -0400 |
40 |
-Subject: [PATCH] gnutls: prevent buffer overflow in get_cert_name |
41 |
- |
42 |
-The test suite for ocserv calls openconnect with a certificate that has |
43 |
-a name that is 84 bytes in length. The buffer passed to get_cert_name is |
44 |
-currently 80 bytes. |
45 |
- |
46 |
-The gnutls_x509_crt_get_dn_by_oid function will update the buffer size |
47 |
-parameter if the buffer is too small. |
48 |
- |
49 |
-http://man7.org/linux/man-pages/man3/gnutls_x509_crt_get_dn_by_oid.3.html |
50 |
- |
51 |
-RETURNS |
52 |
- GNUTLS_E_SHORT_MEMORY_BUFFER if the provided buffer is not long |
53 |
- enough, and in that case the buf_size will be updated with the |
54 |
- required size. GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE if there are no |
55 |
- data in the current index. On success 0 is returned. |
56 |
- |
57 |
-Use a temporary variable to avoid clobbering the namelen variable that is |
58 |
-passed to get_cert_name. |
59 |
- |
60 |
-Bug: https://bugs.gentoo.org/721570 |
61 |
-Signed-off-by: Sergei Trofimovich <slyfox@g.o> |
62 |
-Signed-off-by: Mike Gilbert <floppym@g.o> |
63 |
---- |
64 |
- gnutls.c | 17 ++++++++++++----- |
65 |
- 1 file changed, 12 insertions(+), 5 deletions(-) |
66 |
- |
67 |
-diff --git a/gnutls.c b/gnutls.c |
68 |
-index 36bc82e0..53bf2a43 100644 |
69 |
---- a/gnutls.c |
70 |
-+++ b/gnutls.c |
71 |
-@@ -546,12 +546,19 @@ static int count_x509_certificates(gnutls_datum_t *datum) |
72 |
- |
73 |
- static int get_cert_name(gnutls_x509_crt_t cert, char *name, size_t namelen) |
74 |
- { |
75 |
-+ /* When the name buffer is not big enough, gnutls_x509_crt_get_dn*() will |
76 |
-+ * update the length argument to the required size, and return |
77 |
-+ * GNUTLS_E_SHORT_MEMORY_BUFFER. We need to avoid clobbering the original |
78 |
-+ * length variable. */ |
79 |
-+ size_t nl = namelen; |
80 |
- if (gnutls_x509_crt_get_dn_by_oid(cert, GNUTLS_OID_X520_COMMON_NAME, |
81 |
-- 0, 0, name, &namelen) && |
82 |
-- gnutls_x509_crt_get_dn(cert, name, &namelen)) { |
83 |
-- name[namelen-1] = 0; |
84 |
-- snprintf(name, namelen-1, "<unknown>"); |
85 |
-- return -EINVAL; |
86 |
-+ 0, 0, name, &nl)) { |
87 |
-+ nl = namelen; |
88 |
-+ if (gnutls_x509_crt_get_dn(cert, name, &nl)) { |
89 |
-+ name[namelen-1] = 0; |
90 |
-+ snprintf(name, namelen-1, "<unknown>"); |
91 |
-+ return -EINVAL; |
92 |
-+ } |
93 |
- } |
94 |
- return 0; |
95 |
- } |
96 |
--- |
97 |
-2.26.2 |
98 |
- |
99 |
|
100 |
diff --git a/net-vpn/openconnect/files/README.OpenRC.txt b/net-vpn/openconnect/files/README.OpenRC.txt |
101 |
deleted file mode 100644 |
102 |
index 6bd43e62dfb..00000000000 |
103 |
--- a/net-vpn/openconnect/files/README.OpenRC.txt |
104 |
+++ /dev/null |
105 |
@@ -1,25 +0,0 @@ |
106 |
-The init script for openconnect supports multiple vpn tunnels. |
107 |
- |
108 |
-You need to create a symbolic link to /etc/init.d/openconnect in /etc/init.d |
109 |
-instead of calling it directly: |
110 |
- |
111 |
-ln -s /etc/init.d/openconnect /etc/init.d/openconnect.vpn0 |
112 |
- |
113 |
-You can then start the vpn tunnel like this: |
114 |
- |
115 |
-/etc/init.d/openconnect.vpn0 start |
116 |
- |
117 |
-If you would like to run preup, postup, predown, and/or postdown scripts, |
118 |
-You need to create a directory in /etc/openconnect with the name of the vpn: |
119 |
- |
120 |
-mkdir /etc/openconnect/vpn0 |
121 |
- |
122 |
-Then add executable shell files: |
123 |
- |
124 |
-mkdir /etc/openconnect/vpn0 |
125 |
-cd /etc/openconnect/vpn0 |
126 |
-echo '#!/bin/sh' > preup.sh |
127 |
-cp preup.sh predown.sh |
128 |
-cp preup.sh postup.sh |
129 |
-cp preup.sh postdown.sh |
130 |
-chmod 755 /etc/openconnect/vpn0/* |
131 |
|
132 |
diff --git a/net-vpn/openconnect/files/openconnect.conf.in b/net-vpn/openconnect/files/openconnect.conf.in |
133 |
deleted file mode 100644 |
134 |
index 7e44f569c0c..00000000000 |
135 |
--- a/net-vpn/openconnect/files/openconnect.conf.in |
136 |
+++ /dev/null |
137 |
@@ -1,26 +0,0 @@ |
138 |
-# Variables to configure vpn tunnels where "vpnname" is the name of your vpn tunnel: |
139 |
-# |
140 |
-# server_vpnname |
141 |
-# password_vpnname |
142 |
-# vpnopts_vpnname |
143 |
-# |
144 |
-# The tunnel will need to be started with a symbolic link to openconnect: |
145 |
-# |
146 |
-# ln -s /etc/init.d/openconnect /etc/init.d/openconnect.vpnname |
147 |
-# |
148 |
-# If you'd like to execute a script on preup, postup, predown and postdown of the vpn tunnel, you |
149 |
-# need to create executable scripts in a directory with the same name as |
150 |
-# the vpn tunnel (vpn0 can be replaced with the vpn name): |
151 |
-# |
152 |
-# mkdir /etc/openconnect/vpn0 |
153 |
-# cd /etc/openconnect/vpn0" |
154 |
-# echo '#!/bin/sh' > preup.sh" |
155 |
-# cp preup.sh predown.sh" |
156 |
-# cp preup.sh postup.sh" |
157 |
-# cp preup.sh postdown.sh" |
158 |
-# chmod 755 /etc/openconnect/vpn0/*" |
159 |
- |
160 |
-server_vpn0="vpn.server.tld" |
161 |
-password_vpn0="YOUR_PASSWORD" |
162 |
-# Any OPENCONNECT options my go here (see openconnect --help) |
163 |
-vpnopts_vpn0="-l --passwd-on-stdin --user=YOUR_USERNAME" |
164 |
|
165 |
diff --git a/net-vpn/openconnect/files/openconnect.init.in-r4 b/net-vpn/openconnect/files/openconnect.init.in-r4 |
166 |
deleted file mode 100644 |
167 |
index 040edc76f63..00000000000 |
168 |
--- a/net-vpn/openconnect/files/openconnect.init.in-r4 |
169 |
+++ /dev/null |
170 |
@@ -1,88 +0,0 @@ |
171 |
-#!/sbin/openrc-run |
172 |
-# Copyright 1999-2015 Gentoo Foundation |
173 |
-# Distributed under the terms of the GNU General Public License v2 |
174 |
- |
175 |
-VPN="${RC_SVCNAME#*.}" |
176 |
-VPNDIR="/etc/openconnect/${VPN}" |
177 |
-VPNLOG="/var/log/openconnect/${VPN}" |
178 |
-VPNLOGFILE="${VPNLOG}/openconnect.log" |
179 |
-VPNERRFILE="${VPNLOG}/openconnect.err" |
180 |
- |
181 |
-command="/usr/sbin/openconnect" |
182 |
-name="OpenConnect: ${VPN}" |
183 |
-pidfile="/run/openconnect/${VPN}.pid" |
184 |
-stopsig="SIGINT" |
185 |
- |
186 |
-depend() { |
187 |
- before netmount |
188 |
-} |
189 |
- |
190 |
-checkconfig() { |
191 |
- if [ $VPN = "openconnect" ]; then |
192 |
- eerror "You cannot call openconnect directly. You must create a symbolic link to it with the vpn name:" |
193 |
- eerror |
194 |
- eerror "ln -s /etc/init.d/openconnect /etc/init.d/openconnect.vpn0" |
195 |
- eerror |
196 |
- eerror "And then call it instead:" |
197 |
- eerror |
198 |
- eerror "/etc/init.d/openconnect.vpn0 start" |
199 |
- return 1 |
200 |
- fi |
201 |
-} |
202 |
- |
203 |
-checktuntap() { |
204 |
- if [ "$RC_UNAME" = "Linux" -a ! -e /dev/net/tun ] ; then |
205 |
- if ! modprobe tun ; then |
206 |
- eerror "TUN/TAP support is not available in this kernel" |
207 |
- return 1 |
208 |
- fi |
209 |
- fi |
210 |
-} |
211 |
- |
212 |
-run_hook() { |
213 |
- if [ -x "$1" ]; then |
214 |
- "$@" |
215 |
- fi |
216 |
-} |
217 |
- |
218 |
-start_pre() { |
219 |
- checkconfig || return |
220 |
- checktuntap || return |
221 |
- checkpath -d "${VPNLOG}" || return |
222 |
- checkpath -d /run/openconnect || return |
223 |
- run_hook "${VPNDIR}/preup.sh" |
224 |
-} |
225 |
- |
226 |
-start() { |
227 |
- local server vpnopts password |
228 |
- eval server=\$server_${VPN} |
229 |
- eval vpnopts=\$vpnopts_${VPN} |
230 |
- eval password=\$password_${VPN} |
231 |
- |
232 |
- ebegin "Starting ${name}" |
233 |
- start-stop-daemon --start --exec "${command}" -- \ |
234 |
- --background \ |
235 |
- --interface="${VPN}" \ |
236 |
- --pid-file="${pidfile}" \ |
237 |
- ${vpnopts} \ |
238 |
- "${server}" \ |
239 |
- >> "${VPNLOGFILE}" \ |
240 |
- 2>> "${VPNERRFILE}" \ |
241 |
- <<EOF |
242 |
-${password} |
243 |
-EOF |
244 |
- eend $? |
245 |
-} |
246 |
- |
247 |
-start_post() { |
248 |
- run_hook "${VPNDIR}/postup.sh" |
249 |
-} |
250 |
- |
251 |
-stop_pre() { |
252 |
- checkconfig || return |
253 |
- run_hook "${VPNDIR}/predown.sh" |
254 |
-} |
255 |
- |
256 |
-stop_post() { |
257 |
- run_hook "${VPNDIR}/postdown.sh" |
258 |
-} |
259 |
|
260 |
diff --git a/net-vpn/openconnect/openconnect-8.09-r3.ebuild b/net-vpn/openconnect/openconnect-8.09-r3.ebuild |
261 |
deleted file mode 100644 |
262 |
index c5c21a23d94..00000000000 |
263 |
--- a/net-vpn/openconnect/openconnect-8.09-r3.ebuild |
264 |
+++ /dev/null |
265 |
@@ -1,152 +0,0 @@ |
266 |
-# Copyright 2011-2021 Gentoo Authors |
267 |
-# Distributed under the terms of the GNU General Public License v2 |
268 |
- |
269 |
-EAPI=7 |
270 |
- |
271 |
-PYTHON_COMPAT=( python{3_7,3_8,3_9} ) |
272 |
-PYTHON_REQ_USE="xml" |
273 |
- |
274 |
-inherit linux-info python-any-r1 |
275 |
- |
276 |
-if [[ ${PV} == 9999 ]]; then |
277 |
- EGIT_REPO_URI="https://gitlab.com/openconnect/openconnect.git" |
278 |
- inherit git-r3 autotools |
279 |
-else |
280 |
- ARCHIVE_URI="ftp://ftp.infradead.org/pub/${PN}/${P}.tar.gz" |
281 |
- KEYWORDS="amd64 arm arm64 ppc64 x86" |
282 |
-fi |
283 |
-VPNC_VER=20200226 |
284 |
-SRC_URI="${ARCHIVE_URI} |
285 |
- ftp://ftp.infradead.org/pub/vpnc-scripts/vpnc-scripts-${VPNC_VER}.tar.gz" |
286 |
- |
287 |
-DESCRIPTION="Free client for Cisco AnyConnect SSL VPN software" |
288 |
-HOMEPAGE="http://www.infradead.org/openconnect.html" |
289 |
- |
290 |
-LICENSE="LGPL-2.1 GPL-2" |
291 |
-SLOT="0/5" |
292 |
-IUSE="doc +gnutls gssapi libproxy lz4 nls smartcard stoken test" |
293 |
-RESTRICT="!test? ( test )" |
294 |
- |
295 |
-DEPEND=" |
296 |
- dev-libs/libxml2 |
297 |
- sys-libs/zlib |
298 |
- !gnutls? ( |
299 |
- >=dev-libs/openssl-1.0.1h:0= |
300 |
- ) |
301 |
- gnutls? ( |
302 |
- app-crypt/trousers |
303 |
- app-misc/ca-certificates |
304 |
- dev-libs/nettle |
305 |
- >=net-libs/gnutls-3.6.13:0= |
306 |
- dev-libs/libtasn1:0= |
307 |
- app-crypt/tpm2-tss |
308 |
- ) |
309 |
- gssapi? ( virtual/krb5 ) |
310 |
- libproxy? ( net-libs/libproxy ) |
311 |
- lz4? ( app-arch/lz4:= ) |
312 |
- nls? ( virtual/libintl ) |
313 |
- smartcard? ( sys-apps/pcsc-lite:0= ) |
314 |
- stoken? ( app-crypt/stoken ) |
315 |
-" |
316 |
-RDEPEND="${DEPEND} |
317 |
- sys-apps/iproute2 |
318 |
-" |
319 |
-BDEPEND=" |
320 |
- virtual/pkgconfig |
321 |
- doc? ( ${PYTHON_DEPS} sys-apps/groff ) |
322 |
- nls? ( sys-devel/gettext ) |
323 |
- test? ( |
324 |
- net-libs/socket_wrapper |
325 |
- net-vpn/ocserv |
326 |
- sys-libs/uid_wrapper |
327 |
- ) |
328 |
-" |
329 |
- |
330 |
-CONFIG_CHECK="~TUN" |
331 |
- |
332 |
-pkg_pretend() { |
333 |
- check_extra_config |
334 |
-} |
335 |
- |
336 |
-pkg_setup() { |
337 |
- : |
338 |
-} |
339 |
- |
340 |
-src_unpack() { |
341 |
- if [[ ${PV} == 9999 ]]; then |
342 |
- git-r3_src_unpack |
343 |
- fi |
344 |
- default |
345 |
-} |
346 |
- |
347 |
-src_prepare() { |
348 |
- local PATCHES=( |
349 |
- "${FILESDIR}"/8.09-gnutls-buffer-overflow.patch |
350 |
- ) |
351 |
- default |
352 |
- if [[ ${PV} == 9999 ]]; then |
353 |
- eautoreconf |
354 |
- fi |
355 |
-} |
356 |
- |
357 |
-src_configure() { |
358 |
- if use doc; then |
359 |
- python_setup |
360 |
- else |
361 |
- export ac_cv_path_PYTHON= |
362 |
- fi |
363 |
- |
364 |
- # Used by tests if userpriv is disabled |
365 |
- addwrite /run/netns |
366 |
- |
367 |
- local myconf=( |
368 |
- --disable-dsa-tests |
369 |
- $(use_enable nls) |
370 |
- --disable-static |
371 |
- $(use_with !gnutls openssl) |
372 |
- $(use_with gnutls) |
373 |
- $(use_with libproxy) |
374 |
- $(use_with lz4) |
375 |
- $(use_with gssapi) |
376 |
- $(use_with smartcard libpcsclite) |
377 |
- $(use_with stoken) |
378 |
- --with-vpnc-script="${EPREFIX}/etc/openconnect/openconnect.sh" |
379 |
- --without-java |
380 |
- ) |
381 |
- |
382 |
- econf "${myconf[@]}" |
383 |
-} |
384 |
- |
385 |
-src_test() { |
386 |
- local charset |
387 |
- for charset in UTF-8 ISO8859-2; do |
388 |
- if [[ $(LC_ALL=cs_CZ.${charset} locale charmap 2>/dev/null) != ${charset} ]]; then |
389 |
- # If we don't have valid cs_CZ locale data, auth-nonascii will fail. |
390 |
- # Force a test skip by exiting with status 77. |
391 |
- sed -i -e '2i exit 77' tests/auth-nonascii || die |
392 |
- break |
393 |
- fi |
394 |
- done |
395 |
- default |
396 |
-} |
397 |
- |
398 |
-src_install() { |
399 |
- default |
400 |
- |
401 |
- find "${ED}" -name '*.la' -delete || die |
402 |
- |
403 |
- dodoc "${FILESDIR}"/README.OpenRC.txt |
404 |
- |
405 |
- newinitd "${FILESDIR}"/openconnect.init.in-r4 openconnect |
406 |
- insinto /etc/openconnect |
407 |
- |
408 |
- newconfd "${FILESDIR}"/openconnect.conf.in openconnect |
409 |
- |
410 |
- exeinto /etc/openconnect |
411 |
- newexe "${WORKDIR}"/vpnc-scripts-${VPNC_VER}/vpnc-script openconnect.sh |
412 |
- |
413 |
- insinto /etc/logrotate.d |
414 |
- newins "${FILESDIR}"/openconnect.logrotate openconnect |
415 |
- |
416 |
- keepdir /var/log/openconnect |
417 |
-} |
418 |
|
419 |
diff --git a/net-vpn/openconnect/openconnect-8.10.ebuild b/net-vpn/openconnect/openconnect-8.10.ebuild |
420 |
deleted file mode 100644 |
421 |
index ff4f18582c1..00000000000 |
422 |
--- a/net-vpn/openconnect/openconnect-8.10.ebuild |
423 |
+++ /dev/null |
424 |
@@ -1,149 +0,0 @@ |
425 |
-# Copyright 2011-2020 Gentoo Authors |
426 |
-# Distributed under the terms of the GNU General Public License v2 |
427 |
- |
428 |
-EAPI=7 |
429 |
- |
430 |
-PYTHON_COMPAT=( python{3_7,3_8,3_9} ) |
431 |
-PYTHON_REQ_USE="xml" |
432 |
- |
433 |
-inherit linux-info python-any-r1 |
434 |
- |
435 |
-if [[ ${PV} == 9999 ]]; then |
436 |
- EGIT_REPO_URI="https://gitlab.com/openconnect/openconnect.git" |
437 |
- inherit git-r3 autotools |
438 |
-else |
439 |
- ARCHIVE_URI="ftp://ftp.infradead.org/pub/${PN}/${P}.tar.gz" |
440 |
- KEYWORDS="~amd64 ~arm ~arm64 ~ppc64 ~x86" |
441 |
-fi |
442 |
-VPNC_VER=20200930 |
443 |
-SRC_URI="${ARCHIVE_URI} |
444 |
- ftp://ftp.infradead.org/pub/vpnc-scripts/vpnc-scripts-${VPNC_VER}.tar.gz" |
445 |
- |
446 |
-DESCRIPTION="Free client for Cisco AnyConnect SSL VPN software" |
447 |
-HOMEPAGE="http://www.infradead.org/openconnect.html" |
448 |
- |
449 |
-LICENSE="LGPL-2.1 GPL-2" |
450 |
-SLOT="0/5" |
451 |
-IUSE="doc +gnutls gssapi libproxy lz4 nls smartcard stoken test" |
452 |
-RESTRICT="!test? ( test )" |
453 |
- |
454 |
-DEPEND=" |
455 |
- dev-libs/libxml2 |
456 |
- sys-libs/zlib |
457 |
- !gnutls? ( |
458 |
- >=dev-libs/openssl-1.0.1h:0= |
459 |
- ) |
460 |
- gnutls? ( |
461 |
- app-crypt/trousers |
462 |
- app-misc/ca-certificates |
463 |
- dev-libs/nettle |
464 |
- >=net-libs/gnutls-3.6.13:0= |
465 |
- dev-libs/libtasn1:0= |
466 |
- app-crypt/tpm2-tss |
467 |
- ) |
468 |
- gssapi? ( virtual/krb5 ) |
469 |
- libproxy? ( net-libs/libproxy ) |
470 |
- lz4? ( app-arch/lz4:= ) |
471 |
- nls? ( virtual/libintl ) |
472 |
- smartcard? ( sys-apps/pcsc-lite:0= ) |
473 |
- stoken? ( app-crypt/stoken ) |
474 |
-" |
475 |
-RDEPEND="${DEPEND} |
476 |
- sys-apps/iproute2 |
477 |
-" |
478 |
-BDEPEND=" |
479 |
- virtual/pkgconfig |
480 |
- doc? ( ${PYTHON_DEPS} sys-apps/groff ) |
481 |
- nls? ( sys-devel/gettext ) |
482 |
- test? ( |
483 |
- net-libs/socket_wrapper |
484 |
- net-vpn/ocserv |
485 |
- sys-libs/uid_wrapper |
486 |
- ) |
487 |
-" |
488 |
- |
489 |
-CONFIG_CHECK="~TUN" |
490 |
- |
491 |
-pkg_pretend() { |
492 |
- check_extra_config |
493 |
-} |
494 |
- |
495 |
-pkg_setup() { |
496 |
- : |
497 |
-} |
498 |
- |
499 |
-src_unpack() { |
500 |
- if [[ ${PV} == 9999 ]]; then |
501 |
- git-r3_src_unpack |
502 |
- fi |
503 |
- default |
504 |
-} |
505 |
- |
506 |
-src_prepare() { |
507 |
- default |
508 |
- if [[ ${PV} == 9999 ]]; then |
509 |
- eautoreconf |
510 |
- fi |
511 |
-} |
512 |
- |
513 |
-src_configure() { |
514 |
- if use doc; then |
515 |
- python_setup |
516 |
- else |
517 |
- export ac_cv_path_PYTHON= |
518 |
- fi |
519 |
- |
520 |
- # Used by tests if userpriv is disabled |
521 |
- addwrite /run/netns |
522 |
- |
523 |
- local myconf=( |
524 |
- --disable-dsa-tests |
525 |
- $(use_enable nls) |
526 |
- --disable-static |
527 |
- $(use_with !gnutls openssl) |
528 |
- $(use_with gnutls) |
529 |
- $(use_with libproxy) |
530 |
- $(use_with lz4) |
531 |
- $(use_with gssapi) |
532 |
- $(use_with smartcard libpcsclite) |
533 |
- $(use_with stoken) |
534 |
- --with-vpnc-script="${EPREFIX}/etc/openconnect/openconnect.sh" |
535 |
- --without-java |
536 |
- ) |
537 |
- |
538 |
- econf "${myconf[@]}" |
539 |
-} |
540 |
- |
541 |
-src_test() { |
542 |
- local charset |
543 |
- for charset in UTF-8 ISO8859-2; do |
544 |
- if [[ $(LC_ALL=cs_CZ.${charset} locale charmap 2>/dev/null) != ${charset} ]]; then |
545 |
- # If we don't have valid cs_CZ locale data, auth-nonascii will fail. |
546 |
- # Force a test skip by exiting with status 77. |
547 |
- sed -i -e '2i exit 77' tests/auth-nonascii || die |
548 |
- break |
549 |
- fi |
550 |
- done |
551 |
- default |
552 |
-} |
553 |
- |
554 |
-src_install() { |
555 |
- default |
556 |
- |
557 |
- find "${ED}" -name '*.la' -delete || die |
558 |
- |
559 |
- dodoc "${FILESDIR}"/README.OpenRC.txt |
560 |
- |
561 |
- newinitd "${FILESDIR}"/openconnect.init.in-r4 openconnect |
562 |
- insinto /etc/openconnect |
563 |
- |
564 |
- newconfd "${FILESDIR}"/openconnect.conf.in openconnect |
565 |
- |
566 |
- exeinto /etc/openconnect |
567 |
- newexe "${WORKDIR}"/vpnc-scripts-${VPNC_VER}/vpnc-script openconnect.sh |
568 |
- |
569 |
- insinto /etc/logrotate.d |
570 |
- newins "${FILESDIR}"/openconnect.logrotate openconnect |
571 |
- |
572 |
- keepdir /var/log/openconnect |
573 |
-} |