commit:     9eac70cf66bbca67d8a770b6b19c880ecefd9f1d
Author:     Lars Wendler <polynomial-c <AT> gentoo <DOT> org>
AuthorDate: Sat Nov  2 09:54:34 2019 +0000
Commit:     Lars Wendler <polynomial-c <AT> gentoo <DOT> org>
CommitDate: Sat Nov  2 10:17:15 2019 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=9eac70cf

sys-fs/cryptsetup: Bump to version 2.2.2

Package-Manager: Portage-2.3.78, Repoman-2.3.17
Signed-off-by: Lars Wendler <polynomial-c <AT> gentoo.org>

 sys-fs/cryptsetup/Manifest                |   1 +
 sys-fs/cryptsetup/cryptsetup-2.2.2.ebuild | 135 ++++++++++++++++++++++++++++++
 2 files changed, 136 insertions(+)

diff --git a/sys-fs/cryptsetup/Manifest b/sys-fs/cryptsetup/Manifest
index b9bb64d1c54..f38b94aec6a 100644
--- a/sys-fs/cryptsetup/Manifest
+++ b/sys-fs/cryptsetup/Manifest
@@ -1,2 +1,3 @@
 DIST cryptsetup-1.7.5.tar.xz 1232696 BLAKE2B 
1bd62b186564e0b902480d66f623074f8d2f06ea09f11788566e33d58f7d0dc8c79d5827e5966e1a20a5597c2cbdec76da49c8f54c0538a1ac3f869d8ef55456
 SHA512 
d473f7b06d705a3868a70f3767fafc664436b5897ba59025ea1268f815cb80a9076841ff9ff96cc130fb83ba18b03c1eee38cfaf1b471fdd883a3e126b771439
 DIST cryptsetup-2.2.1.tar.xz 10803072 BLAKE2B 
00ee2eff11e3054a40a4d9036c1786422288ff4c61ff497cb7039721dde80ca337cab067faa4f70721de3aded465f612e9328a6b533ff7c9b67d1069fe435bed
 SHA512 
e4b45b24ad63cc4c22cb816f04cf4af71431e15134a8208af1a24e64ded54c07aba6c43521c063f03429304e0610b6cce849332564d69a46934fb7bae8e99718
+DIST cryptsetup-2.2.2.tar.xz 10808684 BLAKE2B 
d8d864d9ec2a5d646706d3ba003a21aa83d2373ca7afed5663c5167172116ea9342704483559f49c06979cbe0f6ac5670f4e9baae88ab908423b793043ba4a68
 SHA512 
d04123a622438ecbee28145cbdc71886b6f13db87df1c67522bff6e6e3cba817e895e2d085bdb08c78f9cafba557b1203177811a0c316ccd9b7c19939f3fc851

diff --git a/sys-fs/cryptsetup/cryptsetup-2.2.2.ebuild 
b/sys-fs/cryptsetup/cryptsetup-2.2.2.ebuild
new file mode 100644
index 00000000000..9c8f2b10834
--- /dev/null
+++ b/sys-fs/cryptsetup/cryptsetup-2.2.2.ebuild
@@ -0,0 +1,135 @@
+# Copyright 1999-2019 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit autotools linux-info libtool
+
+DESCRIPTION="Tool to setup encrypted devices with dm-crypt"
+HOMEPAGE="https://gitlab.com/cryptsetup/cryptsetup/blob/master/README.md";
+SRC_URI="https://www.kernel.org/pub/linux/utils/${PN}/v$(ver_cut 
1-2)/${P/_/-}.tar.xz"
+
+LICENSE="GPL-2+"
+SLOT="0/12" # libcryptsetup.so version
+[[ ${PV} != *_rc* ]] && \
+KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh 
~sparc ~x86"
+CRYPTO_BACKENDS="gcrypt kernel nettle +openssl"
+# we don't support nss since it doesn't allow cryptsetup to be built statically
+# and it's missing ripemd160 support so it can't provide full backward 
compatibility
+IUSE="${CRYPTO_BACKENDS} +argon2 libressl +luks1_default nls pwquality 
reencrypt static static-libs +udev urandom"
+REQUIRED_USE="^^ ( ${CRYPTO_BACKENDS//+/} )
+       libressl? ( openssl )
+       static? ( !gcrypt )" #496612
+
+LIB_DEPEND="
+       dev-libs/json-c:=[static-libs(+)]
+       dev-libs/libgpg-error[static-libs(+)]
+       dev-libs/popt[static-libs(+)]
+       >=sys-apps/util-linux-2.31-r1[static-libs(+)]
+       argon2? ( app-crypt/argon2:=[static-libs(+)] )
+       gcrypt? ( dev-libs/libgcrypt:0=[static-libs(+)] )
+       nettle? ( >=dev-libs/nettle-2.4[static-libs(+)] )
+       openssl? (
+               !libressl? ( dev-libs/openssl:0=[static-libs(+)] )
+               libressl? ( dev-libs/libressl:0=[static-libs(+)] )
+       )
+       pwquality? ( dev-libs/libpwquality[static-libs(+)] )
+       sys-fs/lvm2[static-libs(+)]
+       udev? ( virtual/libudev[static-libs(-)] )"
+# We have to always depend on ${LIB_DEPEND} rather than put behind
+# !static? () because we provide a shared library which links against
+# these other packages. #414665
+RDEPEND="static-libs? ( ${LIB_DEPEND} )
+       ${LIB_DEPEND//\[static-libs\([+-]\)\]}"
+DEPEND="${RDEPEND}
+       static? ( ${LIB_DEPEND} )"
+BDEPEND="
+       virtual/pkgconfig
+"
+
+S="${WORKDIR}/${P/_/-}"
+
+PATCHES=( "${FILESDIR}"/${PN}-2.0.4-fix-static-pwquality-build.patch )
+
+pkg_pretend() {
+       if ! use luks1_default ; then
+               ewarn "WARNING! WARNING! WARNING!"
+               ewarn "You have chosen LUKS2 as your default format."
+               ewarn "This can break LUKS1 backwards compatibility."
+               ewarn "Enable \"luks1_default\" USE flag if you need backwards 
compatibility."
+       fi
+}
+
+pkg_setup() {
+       local CONFIG_CHECK="~DM_CRYPT ~CRYPTO ~CRYPTO_CBC ~CRYPTO_SHA256"
+       local WARNING_DM_CRYPT="CONFIG_DM_CRYPT:\tis not set (required for 
cryptsetup)\n"
+       local WARNING_CRYPTO_SHA256="CONFIG_CRYPTO_SHA256:\tis not set 
(required for cryptsetup)\n"
+       local WARNING_CRYPTO_CBC="CONFIG_CRYPTO_CBC:\tis not set (required for 
kernel 2.6.19)\n"
+       local WARNING_CRYPTO="CONFIG_CRYPTO:\tis not set (required for 
cryptsetup)\n"
+       check_extra_config
+}
+
+src_prepare() {
+       sed -i '/^LOOPDEV=/s:$: || exit 0:' tests/{compat,mode}-test || die
+       default
+       eautoreconf
+}
+
+src_configure() {
+       if use kernel ; then
+               ewarn "Note that kernel backend is very slow for this type of 
operation"
+               ewarn "and is provided mainly for embedded systems wanting to 
avoid"
+               ewarn "userspace crypto libraries."
+       fi
+
+       local myeconfargs=(
+               --disable-internal-argon2
+               --enable-shared
+               --sbindir=/sbin
+               # for later use
+               --with-default-luks-format=LUKS$(usex luks1_default 1 2)
+               --with-tmpfilesdir="${EPREFIX}/usr/lib/tmpfiles.d"
+               --with-crypto_backend=$(for x in ${CRYPTO_BACKENDS//+/} ; do 
usev ${x} ; done)
+               $(use_enable argon2 libargon2)
+               $(use_enable nls)
+               $(use_enable pwquality)
+               $(use_enable reencrypt cryptsetup-reencrypt)
+               $(use_enable static static-cryptsetup)
+               $(use_enable static-libs static)
+               $(use_enable udev)
+               $(use_enable !urandom dev-random)
+       )
+       econf "${myeconfargs[@]}"
+}
+
+src_test() {
+       if [[ ! -e /dev/mapper/control ]] ; then
+               ewarn "No /dev/mapper/control found -- skipping tests"
+               return 0
+       fi
+
+       local p
+       for p in /dev/mapper /dev/loop* ; do
+               addwrite ${p}
+       done
+
+       default
+}
+
+src_install() {
+       default
+
+       if use static ; then
+               mv "${ED}"/sbin/cryptsetup{.static,} || die
+               mv "${ED}"/sbin/veritysetup{.static,} || die
+               if use reencrypt ; then
+                       mv "${ED}"/sbin/cryptsetup-reencrypt{.static,} || die
+               fi
+       fi
+       find "${ED}" -type f -name "*.la" -delete || die
+
+       dodoc docs/v*ReleaseNotes
+
+       newconfd "${FILESDIR}"/1.6.7-dmcrypt.confd dmcrypt
+       newinitd "${FILESDIR}"/1.6.7-dmcrypt.rc dmcrypt
+}

Reply via email to