Date: Monday, October 1, 2018 @ 20:35:12
  Author: anthraxx
Revision: 388920

upgpkg: strongswan 5.7.1-1 (security update)

Modified:
  strongswan/trunk/PKGBUILD

----------+
 PKGBUILD |  143 ++++++++++++++++++++++++++++++-------------------------------
 1 file changed, 72 insertions(+), 71 deletions(-)

Modified: PKGBUILD
===================================================================
--- PKGBUILD    2018-10-01 19:23:06 UTC (rev 388919)
+++ PKGBUILD    2018-10-01 20:35:12 UTC (rev 388920)
@@ -10,14 +10,14 @@
 # Contributor: Thermi <noel [at] familie-kuntze dot com>
 
 pkgname=strongswan
-pkgver=5.7.0
+pkgver=5.7.1
 pkgrel=1
-pkgdesc="open source IPsec implementation"
+pkgdesc='Open source IPsec implementation'
 url='https://www.strongswan.org'
-license=("GPL2")
+license=('GPL2')
 arch=('x86_64')
 makedepends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd'
-'systemd' 'pam' 'libnm-glib' 'python' 'ruby' 'mariadb' 'python-setuptools')
+             'systemd' 'pam' 'libnm-glib' 'python' 'ruby' 'mariadb' 
'python-setuptools')
 depends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd' 
'pam')
 optdepends=('libnm-glib: for networkmanager support'
             'mariadb: MySQL support'
@@ -24,6 +24,7 @@
             'ruby: Ruby support'
             'python: Python support'
             'openldap: LDAP support')
+# TODO: move to package() and use find
 backup=(
     etc/ipsec.conf
     etc/ipsec.secrets
@@ -40,13 +41,12 @@
 
vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf,unity.conf,curve25519.conf,bypass-lan.conf}
 )
 
-source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2{,.sig}";
-    'configure_ac.patch'
-    )
+source=(https://download.strongswan.org/strongswan-${pkgver}.tar.bz2{,.sig}
+        configure_ac.patch)
 
 validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77")
 
-sha512sums=('811bfa79aa2b17fcf298c45a2b4109cf4235286e90c4def3e09022ed94c7fa481fc25b8d5054529e4ff4e33011ce6f6ba9874595d16c1a8fe13ef924c4ec6395'
+sha512sums=('43102814434bee7c27a5956be59099cc4ffb9bb5b0d6382ce4c6a80d1d82ed6639f698f5f5544b9ca563554a344638c953525b0e2d39bc6b71b19055c80e07fc'
             'SKIP'
             
'0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74')
 
@@ -54,78 +54,79 @@
 # would case processing to be handled in user space. Also, the plugin is 
experimental. If you need it,
 # add --enable-libipsec and --enable-kernel-libipsec
 prepare() {
-    cd "${srcdir}/${pkgname}-${pkgver}"
-    patch -p1 -l < "${srcdir}/configure_ac.patch"
-    autoreconf
+  cd ${pkgname}-${pkgver}
+  patch -p1 -l < "${srcdir}/configure_ac.patch"
+  autoreconf -fiv
 }
 
 build() {
-  cd "${srcdir}/${pkgname}-${pkgver}"
+  cd ${pkgname}-${pkgver}
 
   ./configure --prefix=/usr \
-        --sbindir=/usr/bin \
-        --sysconfdir=/etc \
-        --libexecdir=/usr/lib \
-        --with-ipsecdir=/usr/lib/strongswan \
-        --with-nm-ca-dir=/etc/ssl/certs \
-        --enable-integrity-test \
-        --enable-sqlite \
-        --enable-pkcs11 \
-        --enable-openssl \
-        --enable-curl \
-        --enable-sql \
-        --enable-attr-sql \
-        --enable-farp \
-        --enable-dhcp \
-        --enable-eap-sim \
-        --enable-eap-sim-file \
-        --enable-eap-simaka-pseudonym \
-        --enable-eap-simaka-reauth \
-        --enable-eap-identity \
-        --enable-eap-md5 \
-        --enable-eap-gtc \
-        --enable-eap-aka \
-        --enable-eap-aka-3gpp2 \
-        --enable-eap-mschapv2 \
-        --enable-eap-radius \
-        --enable-xauth-eap \
-        --enable-ha \
-        --enable-vici \
-        --enable-swanctl \
-        --enable-systemd \
-        --enable-ext-auth \
-        --enable-mysql \
-        --enable-ldap \
-        --enable-cmd \
-        --enable-forecast \
-        --enable-connmark \
-        --enable-aesni \
-        --enable-eap-ttls \
-        --enable-radattr \
-        --enable-xauth-pam \
-        --enable-xauth-noauth \
-        --enable-eap-dynamic \
-        --enable-eap-peap \
-        --enable-eap-tls \
-        --enable-chapoly \
-        --enable-unity \
-        --with-capabilities=libcap \
-        --enable-newhope \
-        --enable-ntru \
-        --enable-mgf1 \
-        --enable-sha3 \
-        --enable-bliss \
-        --enable-dnscert \
-        --enable-nm \
-        --enable-agent \
-        --enable-bypass-lan \
-        --enable-ruby-gems \
-        --enable-python-eggs
+    --sbindir=/usr/bin \
+    --sysconfdir=/etc \
+    --libexecdir=/usr/lib \
+    --with-ipsecdir=/usr/lib/strongswan \
+    --with-nm-ca-dir=/etc/ssl/certs \
+    --enable-integrity-test \
+    --enable-sqlite \
+    --enable-pkcs11 \
+    --enable-openssl \
+    --enable-curl \
+    --enable-sql \
+    --enable-attr-sql \
+    --enable-farp \
+    --enable-dhcp \
+    --enable-eap-sim \
+    --enable-eap-sim-file \
+    --enable-eap-simaka-pseudonym \
+    --enable-eap-simaka-reauth \
+    --enable-eap-identity \
+    --enable-eap-md5 \
+    --enable-eap-gtc \
+    --enable-eap-aka \
+    --enable-eap-aka-3gpp2 \
+    --enable-eap-mschapv2 \
+    --enable-eap-radius \
+    --enable-xauth-eap \
+    --enable-ha \
+    --enable-vici \
+    --enable-swanctl \
+    --enable-systemd \
+    --enable-ext-auth \
+    --enable-mysql \
+    --enable-ldap \
+    --enable-cmd \
+    --enable-forecast \
+    --enable-connmark \
+    --enable-aesni \
+    --enable-eap-ttls \
+    --enable-radattr \
+    --enable-xauth-pam \
+    --enable-xauth-noauth \
+    --enable-eap-dynamic \
+    --enable-eap-peap \
+    --enable-eap-tls \
+    --enable-chapoly \
+    --enable-unity \
+    --with-capabilities=libcap \
+    --enable-newhope \
+    --enable-ntru \
+    --enable-mgf1 \
+    --enable-sha3 \
+    --enable-bliss \
+    --enable-dnscert \
+    --enable-nm \
+    --enable-agent \
+    --enable-bypass-lan \
+    --enable-ruby-gems \
+    --enable-python-eggs
   make
 }
 
 package() {
-  cd "${srcdir}/${pkgname}-${pkgver}"
+  cd ${pkgname}-${pkgver}
   make DESTDIR="${pkgdir}" install
 }
 
+# vim: ts=2 sw=2 et:

Reply via email to