Gentoo Archives: gentoo-commits

From: "Daniel Black (dragonheart)" <dragonheart@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo-x86 commit in net-firewall/ipsec-tools: ChangeLog ipsec-tools-0.7.2.ebuild
Date: Thu, 23 Apr 2009 13:37:05
Message-Id: E1Lwz6s-00033k-7C@stork.gentoo.org
1 dragonheart 09/04/23 13:37:02
2
3 Modified: ChangeLog
4 Added: ipsec-tools-0.7.2.ebuild
5 Log:
6 version bug as per bug #267135
7 (Portage version: 2.2_rc31/cvs/Linux x86_64)
8
9 Revision Changes Path
10 1.68 net-firewall/ipsec-tools/ChangeLog
11
12 file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ChangeLog?rev=1.68&view=markup
13 plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ChangeLog?rev=1.68&content-type=text/plain
14 diff : http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ChangeLog?r1=1.67&r2=1.68
15
16 Index: ChangeLog
17 ===================================================================
18 RCS file: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ChangeLog,v
19 retrieving revision 1.67
20 retrieving revision 1.68
21 diff -u -r1.67 -r1.68
22 --- ChangeLog 16 Oct 2008 18:15:57 -0000 1.67
23 +++ ChangeLog 23 Apr 2009 13:37:02 -0000 1.68
24 @@ -1,6 +1,12 @@
25 # ChangeLog for net-firewall/ipsec-tools
26 -# Copyright 2000-2008 Gentoo Foundation; Distributed under the GPL v2
27 -# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ChangeLog,v 1.67 2008/10/16 18:15:57 dertobi123 Exp $
28 +# Copyright 2000-2009 Gentoo Foundation; Distributed under the GPL v2
29 +# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ChangeLog,v 1.68 2009/04/23 13:37:02 dragonheart Exp $
30 +
31 +*ipsec-tools-0.7.2 (23 Apr 2009)
32 +
33 + 23 Apr 2009; Daniel Black <dragonheart@g.o>
34 + +ipsec-tools-0.7.2.ebuild:
35 + version bug as per bug #267135
36
37 16 Oct 2008; Tobias Scherbaum <dertobi123@g.o>
38 ipsec-tools-0.7.1.ebuild:
39
40
41
42 1.1 net-firewall/ipsec-tools/ipsec-tools-0.7.2.ebuild
43
44 file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ipsec-tools-0.7.2.ebuild?rev=1.1&view=markup
45 plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ipsec-tools-0.7.2.ebuild?rev=1.1&content-type=text/plain
46
47 Index: ipsec-tools-0.7.2.ebuild
48 ===================================================================
49 # Copyright 1999-2009 Gentoo Foundation
50 # Distributed under the terms of the GNU General Public License v2
51 # $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ipsec-tools-0.7.2.ebuild,v 1.1 2009/04/23 13:37:02 dragonheart Exp $
52
53 inherit eutils flag-o-matic autotools linux-info
54
55 DESCRIPTION="A port of KAME's IPsec utilities to the Linux-2.6 IPsec implementation"
56 HOMEPAGE="http://ipsec-tools.sourceforge.net/"
57 SRC_URI="mirror://sourceforge/${PN}/${P}.tar.bz2"
58
59 LICENSE="BSD"
60 SLOT="0"
61 KEYWORDS="~amd64 ~ppc ~sparc ~x86"
62 IUSE="idea ipv6 pam rc5 readline selinux ldap kerberos nat hybrid iconv selinux"
63
64 # FIXME: what is the correct syntax for ~sparc ???
65 DEPEND="!sparc? ( >=sys-kernel/linux-headers-2.6 )
66 readline? ( sys-libs/readline )
67 pam? ( sys-libs/pam )
68 ldap? ( net-nds/openldap )
69 kerberos? ( virtual/krb5 )
70 >=dev-libs/openssl-0.9.8
71 iconv? ( virtual/libiconv )
72 selinux? ( sys-libs/libselinux )"
73 # radius? ( net-dialup/gnuradius )
74
75 RDEPEND="${DEPEND}
76 selinux? ( sec-policy/selinux-ipsec-tools )"
77
78 # {{{ kernel_check()
79 kernel_check() {
80 get_version
81 if kernel_is 2 6 ; then
82 if test "${KV_PATCH}" -ge 19 ; then
83 # Just for kernel >=2.6.19
84 ebegin "Checking for suitable kernel configuration (Networking | Networking support | Networking options)"
85
86 if use nat ; then
87 if ! { linux_chkconfig_present NETFILTER_XT_MATCH_POLICY; } ; then
88 ewarn "[NETFILTER_XT_MATCH_POLICY] IPsec policy match support is NOT enabled"
89 eerror "${P} won't compile with use nat traversal (USE=nat) until you enable NETFILTER_XT_MATCH_POLICY in your kernel"
90 die
91 else
92 einfo "....[NETFILTER_XT_MATCH_POLICY] IPsec policy match support is enabled :-)"
93 fi
94 fi
95 # {{{ general stuff
96 if ! { linux_chkconfig_present XFRM_USER; }; then
97 ewarn "[XFRM_USER] Transformation user configuration interface is NOT enabled."
98 else
99 einfo "....[XFRM_USER] Transformation user configuration interface is enabled :-)"
100 fi
101
102 if ! { linux_chkconfig_present NET_KEY; }; then
103 ewarn "[NET_KEY] PF_KEY sockets is NOT enabled."
104 else
105 einfo "....[NET_KEY] PF_KEY sockets is enabled :-)"
106 fi
107 # }}}
108 # {{{ IPv4 stuff
109 if ! { linux_chkconfig_present INET_IPCOMP; }; then
110 ewarn "[INET_IPCOMP] IP: IPComp transformation is NOT enabled"
111 else
112 einfo "....[INET_IPCOMP] IP: IPComp transformation is enabled :-)"
113 fi
114
115 if ! { linux_chkconfig_present INET_AH; }; then
116 ewarn "[INET_AH] AH Transformation is NOT enabled."
117 else
118 einfo "....[INET_AH] AH Transformation is enabled :-)"
119 fi
120
121 if ! { linux_chkconfig_present INET_ESP; }; then
122 ewarn "[INET_ESP] ESP Transformation is NOT enabled."
123 else
124 einfo "....[INET_ESP] ESP Transformation is enabled :-)"
125 fi
126
127 if ! { linux_chkconfig_present INET_XFRM_MODE_TRANSPORT; }; then
128 ewarn "[INET_XFRM_MODE_TRANSPORT] IP: IPsec transport mode is NOT enabled."
129 else
130 einfo "....[INET_XFRM_MODE_TRANSPORT] IP: IPsec transport mode is enabled :-)"
131 fi
132
133 if ! { linux_chkconfig_present INET_XFRM_MODE_TUNNEL; }; then
134 ewarn "[INET_XFRM_MODE_TUNNEL] IP: IPsec tunnel mode is NOT enabled."
135 else
136 einfo "....[INET_XFRM_MODE_TUNNEL] IP: IPsec tunnel mode is enabled :-)"
137 fi
138
139 if ! { linux_chkconfig_present INET_XFRM_MODE_BEET; }; then
140 ewarn "[INET_XFRM_MODE_BEET] IP: IPsec BEET mode is NOT enabled."
141 else
142 einfo "....[INET_XFRM_MODE_BEET] IP: IPsec BEET mode is enabled :-)"
143 fi
144 # }}}
145 # {{{ IPv6 stuff
146 if use ipv6 ; then
147 if ! { linux_chkconfig_present INET6_IPCOMP; }; then
148 ewarn "[INET6_IPCOMP] IPv6: IPComp transformation is NOT enabled"
149 else
150 einfo "....[INET6_IPCOMP] IPv6: IPComp transformation is enabled :-)"
151 fi
152
153 if ! { linux_chkconfig_present INET6_AH; }; then
154 ewarn "[INET6_AH] IPv6: AH Transformation is NOT enabled."
155 else
156 einfo "....[INET6_AH] IPv6: AH Transformation is enabled :-)"
157 fi
158
159 if ! { linux_chkconfig_present INET6_ESP; }; then
160 ewarn "[INET6_ESP] IPv6: ESP Transformation is NOT enabled."
161 else
162 einfo "....[INET6_ESP] IPv6: ESP Transformation is enabled :-)"
163 fi
164
165 if ! { linux_chkconfig_present INET6_XFRM_MODE_TRANSPORT; }; then
166 ewarn "[INET6_XFRM_MODE_TRANSPORT] IPv6: IPsec transport mode is NOT enabled."
167 else
168 einfo "....[INET6_XFRM_MODE_TRANSPORT] IPv6: IPsec transport mode is enabled :-)"
169 fi
170
171 if ! { linux_chkconfig_present INET6_XFRM_MODE_TUNNEL; }; then
172 ewarn "[INET6_XFRM_MODE_TUNNEL] IPv6: IPsec tunnel mode is NOT enabled."
173 else
174 einfo "....[INET6_XFRM_MODE_TUNNEL] IPv6: IPsec tunnel mode is enabled :-)"
175 fi
176
177 if ! { linux_chkconfig_present INET6_XFRM_MODE_BEET; }; then
178 ewarn "[INET6_XFRM_MODE_BEET] IPv6: IPsec BEET mode is NOT enabled."
179 else
180 einfo "....[INET6_XFRM_MODE_BEET] IPv6: IPsec BEET mode is enabled :-)"
181 fi
182 if ! { linux_chkconfig_present CRYPTO_NULL; }; then
183 ewarn "[CRYPTO_NULL] Crypto: NULL algorithm is NOT enabled"
184 else
185 einfo "....[CRYPTO_NULL] Cyrpto: Crypto NULL algorithm enabled :-)"
186 fi
187 fi
188 # }}}
189
190 eend $?
191 fi
192 fi
193 }
194 # }}}
195
196 src_unpack() {
197 unpack ${A}
198 cd "${S}"
199 # fix for bug #76741
200 sed -i 's:#include <sys/sysctl.h>::' src/racoon/pfkey.c src/setkey/setkey.c
201 # fix for bug #124813
202 sed -i 's:-Werror::g' "${S}"/configure.ac
203
204 AT_M4DIR="${S}" eautoreconf
205 epunt_cxx
206 }
207
208 src_compile() {
209 # fix for bug #61025
210 filter-flags -march=c3
211
212 kernel_check
213
214 myconf="--with-kernel-headers=${KV_DIR}/include \
215 --enable-dependency-tracking \
216 --enable-dpd \
217 --enable-frag \
218 --enable-stats \
219 --enable-fastquit \
220 --enable-stats \
221 --enable-adminport \
222 $(use_enable ipv6) \
223 $(use_enable rc5) \
224 $(use_enable idea) \
225 $(use_with readline)
226 $(use_enable kerberos gssapi) \
227 $(use_with ldap libldap) \
228 $(use_with pam libpam)"
229
230 # we do not want broken-natt from the kernel
231 # myconf="${myconf} $(use_enable broken-natt)"
232 use nat && myconf="${myconf} --enable-natt --enable-natt-versions=yes"
233
234 # we only need security-context when using selinux
235 myconf="${myconf} $(use_enable selinux security-context)"
236
237 # enable mode-cfg and xauth support
238 if use pam; then
239 myconf="${myconf} --enable-hybrid"
240 else
241 myconf="${myconf} $(use_enable hybrid)"
242 fi
243
244 # dev-libs/libiconv is hard masked
245 #use iconv && myconf="${myconf} $(use_with iconv libiconv)"
246
247 # the default (/usr/include/openssl/) is OK for Gentoo, leave it
248 # myconf="${myconf} $(use_with ssl openssl )"
249
250 # No way to get it compiling with freeradius or gnuradius
251 # We would need libradius which only exists on FreeBSD
252
253 # See bug #77369
254 #myconf="${myconf} --enable-samode-unspec"
255
256 econf ${myconf} || die
257 emake -j1 || die
258 }
259
260 src_install() {
261 emake DESTDIR="${D}" install || die
262 keepdir /var/lib/racoon
263 newconfd "${FILESDIR}"/racoon.conf.d racoon
264 newinitd "${FILESDIR}"/racoon.init.d racoon
265
266 dodoc ChangeLog README NEWS
267 dodoc src/racoon/samples/*
268 dodoc src/racoon/doc/*
269
270 docinto roadwarrior
271 dodoc src/racoon/samples/roadwarrior/*
272
273 docinto roadwarrior/client
274 dodoc src/racoon/samples/roadwarrior/client/*
275 docinto roadwarrior/server
276 dodoc src/racoon/samples/roadwarrior/server/*
277
278 docinto setkey
279 dodoc src/setkey/sample.cf
280
281 dodir /etc/racoon
282
283 # RFC are only available from CVS for the moment, see einfo below
284 #docinto "rfc"
285 #dodoc ${S}/src/racoon/rfc/*
286 }
287
288 pkg_postinst() {
289 if use nat; then
290 elog
291 elog " You have enabled the nat traversal functionnality."
292 elog " Nat versions wich are enabled by default are 00,02,rfc"
293 elog " you can find those drafts in the CVS repository:"
294 elog "cvs -d anoncvs@××××××××××××××.org:/cvsroot co ipsec-tools"
295 elog
296 elog "If you feel brave enough and you know what you are"
297 elog "doing, you can consider emerging this ebuild"
298 elog "with"
299 elog "EXTRA_ECONF=\"--enable-natt-versions=08,07,06\""
300 elog
301 fi;
302
303 if use ldap; then
304 elog
305 elog " You have enabled ldap support with {$PN}."
306 elog " The man page does NOT contain any information on it yet."
307 elog " Consider to use a more recent version or CVS"
308 elog
309 fi;
310
311 elog
312 elog "Please have a look in /usr/share/doc/${P} and visit"
313 elog "http://www.netbsd.org/Documentation/network/ipsec/"
314 elog "to find a lot of information on how to configure this great tool."
315 elog
316 }
317
318 # vim: set foldmethod=marker nowrap :