1 |
dragonheart 09/04/23 13:37:02 |
2 |
|
3 |
Modified: ChangeLog |
4 |
Added: ipsec-tools-0.7.2.ebuild |
5 |
Log: |
6 |
version bug as per bug #267135 |
7 |
(Portage version: 2.2_rc31/cvs/Linux x86_64) |
8 |
|
9 |
Revision Changes Path |
10 |
1.68 net-firewall/ipsec-tools/ChangeLog |
11 |
|
12 |
file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ChangeLog?rev=1.68&view=markup |
13 |
plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ChangeLog?rev=1.68&content-type=text/plain |
14 |
diff : http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ChangeLog?r1=1.67&r2=1.68 |
15 |
|
16 |
Index: ChangeLog |
17 |
=================================================================== |
18 |
RCS file: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ChangeLog,v |
19 |
retrieving revision 1.67 |
20 |
retrieving revision 1.68 |
21 |
diff -u -r1.67 -r1.68 |
22 |
--- ChangeLog 16 Oct 2008 18:15:57 -0000 1.67 |
23 |
+++ ChangeLog 23 Apr 2009 13:37:02 -0000 1.68 |
24 |
@@ -1,6 +1,12 @@ |
25 |
# ChangeLog for net-firewall/ipsec-tools |
26 |
-# Copyright 2000-2008 Gentoo Foundation; Distributed under the GPL v2 |
27 |
-# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ChangeLog,v 1.67 2008/10/16 18:15:57 dertobi123 Exp $ |
28 |
+# Copyright 2000-2009 Gentoo Foundation; Distributed under the GPL v2 |
29 |
+# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ChangeLog,v 1.68 2009/04/23 13:37:02 dragonheart Exp $ |
30 |
+ |
31 |
+*ipsec-tools-0.7.2 (23 Apr 2009) |
32 |
+ |
33 |
+ 23 Apr 2009; Daniel Black <dragonheart@g.o> |
34 |
+ +ipsec-tools-0.7.2.ebuild: |
35 |
+ version bug as per bug #267135 |
36 |
|
37 |
16 Oct 2008; Tobias Scherbaum <dertobi123@g.o> |
38 |
ipsec-tools-0.7.1.ebuild: |
39 |
|
40 |
|
41 |
|
42 |
1.1 net-firewall/ipsec-tools/ipsec-tools-0.7.2.ebuild |
43 |
|
44 |
file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ipsec-tools-0.7.2.ebuild?rev=1.1&view=markup |
45 |
plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/net-firewall/ipsec-tools/ipsec-tools-0.7.2.ebuild?rev=1.1&content-type=text/plain |
46 |
|
47 |
Index: ipsec-tools-0.7.2.ebuild |
48 |
=================================================================== |
49 |
# Copyright 1999-2009 Gentoo Foundation |
50 |
# Distributed under the terms of the GNU General Public License v2 |
51 |
# $Header: /var/cvsroot/gentoo-x86/net-firewall/ipsec-tools/ipsec-tools-0.7.2.ebuild,v 1.1 2009/04/23 13:37:02 dragonheart Exp $ |
52 |
|
53 |
inherit eutils flag-o-matic autotools linux-info |
54 |
|
55 |
DESCRIPTION="A port of KAME's IPsec utilities to the Linux-2.6 IPsec implementation" |
56 |
HOMEPAGE="http://ipsec-tools.sourceforge.net/" |
57 |
SRC_URI="mirror://sourceforge/${PN}/${P}.tar.bz2" |
58 |
|
59 |
LICENSE="BSD" |
60 |
SLOT="0" |
61 |
KEYWORDS="~amd64 ~ppc ~sparc ~x86" |
62 |
IUSE="idea ipv6 pam rc5 readline selinux ldap kerberos nat hybrid iconv selinux" |
63 |
|
64 |
# FIXME: what is the correct syntax for ~sparc ??? |
65 |
DEPEND="!sparc? ( >=sys-kernel/linux-headers-2.6 ) |
66 |
readline? ( sys-libs/readline ) |
67 |
pam? ( sys-libs/pam ) |
68 |
ldap? ( net-nds/openldap ) |
69 |
kerberos? ( virtual/krb5 ) |
70 |
>=dev-libs/openssl-0.9.8 |
71 |
iconv? ( virtual/libiconv ) |
72 |
selinux? ( sys-libs/libselinux )" |
73 |
# radius? ( net-dialup/gnuradius ) |
74 |
|
75 |
RDEPEND="${DEPEND} |
76 |
selinux? ( sec-policy/selinux-ipsec-tools )" |
77 |
|
78 |
# {{{ kernel_check() |
79 |
kernel_check() { |
80 |
get_version |
81 |
if kernel_is 2 6 ; then |
82 |
if test "${KV_PATCH}" -ge 19 ; then |
83 |
# Just for kernel >=2.6.19 |
84 |
ebegin "Checking for suitable kernel configuration (Networking | Networking support | Networking options)" |
85 |
|
86 |
if use nat ; then |
87 |
if ! { linux_chkconfig_present NETFILTER_XT_MATCH_POLICY; } ; then |
88 |
ewarn "[NETFILTER_XT_MATCH_POLICY] IPsec policy match support is NOT enabled" |
89 |
eerror "${P} won't compile with use nat traversal (USE=nat) until you enable NETFILTER_XT_MATCH_POLICY in your kernel" |
90 |
die |
91 |
else |
92 |
einfo "....[NETFILTER_XT_MATCH_POLICY] IPsec policy match support is enabled :-)" |
93 |
fi |
94 |
fi |
95 |
# {{{ general stuff |
96 |
if ! { linux_chkconfig_present XFRM_USER; }; then |
97 |
ewarn "[XFRM_USER] Transformation user configuration interface is NOT enabled." |
98 |
else |
99 |
einfo "....[XFRM_USER] Transformation user configuration interface is enabled :-)" |
100 |
fi |
101 |
|
102 |
if ! { linux_chkconfig_present NET_KEY; }; then |
103 |
ewarn "[NET_KEY] PF_KEY sockets is NOT enabled." |
104 |
else |
105 |
einfo "....[NET_KEY] PF_KEY sockets is enabled :-)" |
106 |
fi |
107 |
# }}} |
108 |
# {{{ IPv4 stuff |
109 |
if ! { linux_chkconfig_present INET_IPCOMP; }; then |
110 |
ewarn "[INET_IPCOMP] IP: IPComp transformation is NOT enabled" |
111 |
else |
112 |
einfo "....[INET_IPCOMP] IP: IPComp transformation is enabled :-)" |
113 |
fi |
114 |
|
115 |
if ! { linux_chkconfig_present INET_AH; }; then |
116 |
ewarn "[INET_AH] AH Transformation is NOT enabled." |
117 |
else |
118 |
einfo "....[INET_AH] AH Transformation is enabled :-)" |
119 |
fi |
120 |
|
121 |
if ! { linux_chkconfig_present INET_ESP; }; then |
122 |
ewarn "[INET_ESP] ESP Transformation is NOT enabled." |
123 |
else |
124 |
einfo "....[INET_ESP] ESP Transformation is enabled :-)" |
125 |
fi |
126 |
|
127 |
if ! { linux_chkconfig_present INET_XFRM_MODE_TRANSPORT; }; then |
128 |
ewarn "[INET_XFRM_MODE_TRANSPORT] IP: IPsec transport mode is NOT enabled." |
129 |
else |
130 |
einfo "....[INET_XFRM_MODE_TRANSPORT] IP: IPsec transport mode is enabled :-)" |
131 |
fi |
132 |
|
133 |
if ! { linux_chkconfig_present INET_XFRM_MODE_TUNNEL; }; then |
134 |
ewarn "[INET_XFRM_MODE_TUNNEL] IP: IPsec tunnel mode is NOT enabled." |
135 |
else |
136 |
einfo "....[INET_XFRM_MODE_TUNNEL] IP: IPsec tunnel mode is enabled :-)" |
137 |
fi |
138 |
|
139 |
if ! { linux_chkconfig_present INET_XFRM_MODE_BEET; }; then |
140 |
ewarn "[INET_XFRM_MODE_BEET] IP: IPsec BEET mode is NOT enabled." |
141 |
else |
142 |
einfo "....[INET_XFRM_MODE_BEET] IP: IPsec BEET mode is enabled :-)" |
143 |
fi |
144 |
# }}} |
145 |
# {{{ IPv6 stuff |
146 |
if use ipv6 ; then |
147 |
if ! { linux_chkconfig_present INET6_IPCOMP; }; then |
148 |
ewarn "[INET6_IPCOMP] IPv6: IPComp transformation is NOT enabled" |
149 |
else |
150 |
einfo "....[INET6_IPCOMP] IPv6: IPComp transformation is enabled :-)" |
151 |
fi |
152 |
|
153 |
if ! { linux_chkconfig_present INET6_AH; }; then |
154 |
ewarn "[INET6_AH] IPv6: AH Transformation is NOT enabled." |
155 |
else |
156 |
einfo "....[INET6_AH] IPv6: AH Transformation is enabled :-)" |
157 |
fi |
158 |
|
159 |
if ! { linux_chkconfig_present INET6_ESP; }; then |
160 |
ewarn "[INET6_ESP] IPv6: ESP Transformation is NOT enabled." |
161 |
else |
162 |
einfo "....[INET6_ESP] IPv6: ESP Transformation is enabled :-)" |
163 |
fi |
164 |
|
165 |
if ! { linux_chkconfig_present INET6_XFRM_MODE_TRANSPORT; }; then |
166 |
ewarn "[INET6_XFRM_MODE_TRANSPORT] IPv6: IPsec transport mode is NOT enabled." |
167 |
else |
168 |
einfo "....[INET6_XFRM_MODE_TRANSPORT] IPv6: IPsec transport mode is enabled :-)" |
169 |
fi |
170 |
|
171 |
if ! { linux_chkconfig_present INET6_XFRM_MODE_TUNNEL; }; then |
172 |
ewarn "[INET6_XFRM_MODE_TUNNEL] IPv6: IPsec tunnel mode is NOT enabled." |
173 |
else |
174 |
einfo "....[INET6_XFRM_MODE_TUNNEL] IPv6: IPsec tunnel mode is enabled :-)" |
175 |
fi |
176 |
|
177 |
if ! { linux_chkconfig_present INET6_XFRM_MODE_BEET; }; then |
178 |
ewarn "[INET6_XFRM_MODE_BEET] IPv6: IPsec BEET mode is NOT enabled." |
179 |
else |
180 |
einfo "....[INET6_XFRM_MODE_BEET] IPv6: IPsec BEET mode is enabled :-)" |
181 |
fi |
182 |
if ! { linux_chkconfig_present CRYPTO_NULL; }; then |
183 |
ewarn "[CRYPTO_NULL] Crypto: NULL algorithm is NOT enabled" |
184 |
else |
185 |
einfo "....[CRYPTO_NULL] Cyrpto: Crypto NULL algorithm enabled :-)" |
186 |
fi |
187 |
fi |
188 |
# }}} |
189 |
|
190 |
eend $? |
191 |
fi |
192 |
fi |
193 |
} |
194 |
# }}} |
195 |
|
196 |
src_unpack() { |
197 |
unpack ${A} |
198 |
cd "${S}" |
199 |
# fix for bug #76741 |
200 |
sed -i 's:#include <sys/sysctl.h>::' src/racoon/pfkey.c src/setkey/setkey.c |
201 |
# fix for bug #124813 |
202 |
sed -i 's:-Werror::g' "${S}"/configure.ac |
203 |
|
204 |
AT_M4DIR="${S}" eautoreconf |
205 |
epunt_cxx |
206 |
} |
207 |
|
208 |
src_compile() { |
209 |
# fix for bug #61025 |
210 |
filter-flags -march=c3 |
211 |
|
212 |
kernel_check |
213 |
|
214 |
myconf="--with-kernel-headers=${KV_DIR}/include \ |
215 |
--enable-dependency-tracking \ |
216 |
--enable-dpd \ |
217 |
--enable-frag \ |
218 |
--enable-stats \ |
219 |
--enable-fastquit \ |
220 |
--enable-stats \ |
221 |
--enable-adminport \ |
222 |
$(use_enable ipv6) \ |
223 |
$(use_enable rc5) \ |
224 |
$(use_enable idea) \ |
225 |
$(use_with readline) |
226 |
$(use_enable kerberos gssapi) \ |
227 |
$(use_with ldap libldap) \ |
228 |
$(use_with pam libpam)" |
229 |
|
230 |
# we do not want broken-natt from the kernel |
231 |
# myconf="${myconf} $(use_enable broken-natt)" |
232 |
use nat && myconf="${myconf} --enable-natt --enable-natt-versions=yes" |
233 |
|
234 |
# we only need security-context when using selinux |
235 |
myconf="${myconf} $(use_enable selinux security-context)" |
236 |
|
237 |
# enable mode-cfg and xauth support |
238 |
if use pam; then |
239 |
myconf="${myconf} --enable-hybrid" |
240 |
else |
241 |
myconf="${myconf} $(use_enable hybrid)" |
242 |
fi |
243 |
|
244 |
# dev-libs/libiconv is hard masked |
245 |
#use iconv && myconf="${myconf} $(use_with iconv libiconv)" |
246 |
|
247 |
# the default (/usr/include/openssl/) is OK for Gentoo, leave it |
248 |
# myconf="${myconf} $(use_with ssl openssl )" |
249 |
|
250 |
# No way to get it compiling with freeradius or gnuradius |
251 |
# We would need libradius which only exists on FreeBSD |
252 |
|
253 |
# See bug #77369 |
254 |
#myconf="${myconf} --enable-samode-unspec" |
255 |
|
256 |
econf ${myconf} || die |
257 |
emake -j1 || die |
258 |
} |
259 |
|
260 |
src_install() { |
261 |
emake DESTDIR="${D}" install || die |
262 |
keepdir /var/lib/racoon |
263 |
newconfd "${FILESDIR}"/racoon.conf.d racoon |
264 |
newinitd "${FILESDIR}"/racoon.init.d racoon |
265 |
|
266 |
dodoc ChangeLog README NEWS |
267 |
dodoc src/racoon/samples/* |
268 |
dodoc src/racoon/doc/* |
269 |
|
270 |
docinto roadwarrior |
271 |
dodoc src/racoon/samples/roadwarrior/* |
272 |
|
273 |
docinto roadwarrior/client |
274 |
dodoc src/racoon/samples/roadwarrior/client/* |
275 |
docinto roadwarrior/server |
276 |
dodoc src/racoon/samples/roadwarrior/server/* |
277 |
|
278 |
docinto setkey |
279 |
dodoc src/setkey/sample.cf |
280 |
|
281 |
dodir /etc/racoon |
282 |
|
283 |
# RFC are only available from CVS for the moment, see einfo below |
284 |
#docinto "rfc" |
285 |
#dodoc ${S}/src/racoon/rfc/* |
286 |
} |
287 |
|
288 |
pkg_postinst() { |
289 |
if use nat; then |
290 |
elog |
291 |
elog " You have enabled the nat traversal functionnality." |
292 |
elog " Nat versions wich are enabled by default are 00,02,rfc" |
293 |
elog " you can find those drafts in the CVS repository:" |
294 |
elog "cvs -d anoncvs@××××××××××××××.org:/cvsroot co ipsec-tools" |
295 |
elog |
296 |
elog "If you feel brave enough and you know what you are" |
297 |
elog "doing, you can consider emerging this ebuild" |
298 |
elog "with" |
299 |
elog "EXTRA_ECONF=\"--enable-natt-versions=08,07,06\"" |
300 |
elog |
301 |
fi; |
302 |
|
303 |
if use ldap; then |
304 |
elog |
305 |
elog " You have enabled ldap support with {$PN}." |
306 |
elog " The man page does NOT contain any information on it yet." |
307 |
elog " Consider to use a more recent version or CVS" |
308 |
elog |
309 |
fi; |
310 |
|
311 |
elog |
312 |
elog "Please have a look in /usr/share/doc/${P} and visit" |
313 |
elog "http://www.netbsd.org/Documentation/network/ipsec/" |
314 |
elog "to find a lot of information on how to configure this great tool." |
315 |
elog |
316 |
} |
317 |
|
318 |
# vim: set foldmethod=marker nowrap : |