gurligebis    14/09/13 14:17:42

  Modified:             metadata.xml ChangeLog
  Added:                strongswan-5.2.0-r1.ebuild
  Removed:              strongswan-5.2.0.ebuild
  Log:
  Changing init script to "use logger" instead of "need logger" - fixing bug 
#476514 .
  Adding use flags for more plugins, fixing bugs #481740 and #504942 .
  
  (Portage version: 2.2.12/cvs/Linux x86_64, signed Manifest commit with key 
15AE484C)

Revision  Changes    Path
1.18                 net-misc/strongswan/metadata.xml

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/metadata.xml?rev=1.18&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/metadata.xml?rev=1.18&content-type=text/plain
diff : 
http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/metadata.xml?r1=1.17&r2=1.18

Index: metadata.xml
===================================================================
RCS file: /var/cvsroot/gentoo-x86/net-misc/strongswan/metadata.xml,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -r1.17 -r1.18
--- metadata.xml        18 Apr 2014 18:15:35 -0000      1.17
+++ metadata.xml        13 Sep 2014 14:17:42 -0000      1.18
@@ -51,6 +51,57 @@
       22-24(4.4+)
       <pkg>dev-libs/openssl</pkg> has to be compiled with USE="-bindist".
     </flag>
+    <flag name="pkcs11">
+      Enable pkcs11 support.
+    </flag>
+    <flag name="strongswan_plugins_led">
+      Enable support for the led plugin.
+    </flag>
+    <flag name="strongswan_plugins_lookip">
+      Enable support for the lookip plugin.
+    </flag>
+    <flag name="strongswan_plugins_systime-fix">
+      Enable support for the systime-fix plugin.
+    </flag>
+    <flag name="strongswan_plugins_unity">
+      Enable support for the unity plugin.
+    </flag>
+    <flag name="strongswan_plugins_vici">
+      Enable support for the vici plugin.
+    </flag>
+    <flag name="strongswan_plugins_blowfish">
+      Enable support for the blowfish plugin.
+    </flag>
+    <flag name="strongswan_plugins_ccm">
+      Enable support for the ccm plugin.
+    </flag>
+    <flag name="strongswan_plugins_ctr">
+      Enable support for the ctr plugin.
+    </flag>
+    <flag name="strongswan_plugins_gcm">
+      Enable support for the gcm plugin.
+    </flag>
+    <flag name="strongswan_plugins_ha">
+      Enable support for the ha plugin.
+    </flag>
+    <flag name="strongswan_plugins_ipseckey">
+      Enable support for the ipseckey plugin.
+    </flag>
+    <flag name="strongswan_plugins_ntru">
+      Enable support for the ntru plugin.
+    </flag>
+    <flag name="strongswan_plugins_padlock">
+      Enable support for the padlock plugin.
+    </flag>
+    <flag name="strongswan_plugins_rdrand">
+      Enable support for the rdrand plugin.
+    </flag>
+    <flag name="strongswan_plugins_unbound">
+      Enable support for the unbound plugin.
+    </flag>
+    <flag name="strongswan_plugins_whitelist">
+      Enable support for the whitelist plugin.
+    </flag>
   </use>
   <upstream>
     <remote-id type="cpe">cpe:/a:strongswan:strongswan</remote-id>



1.145                net-misc/strongswan/ChangeLog

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/ChangeLog?rev=1.145&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/ChangeLog?rev=1.145&content-type=text/plain
diff : 
http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/ChangeLog?r1=1.144&r2=1.145

Index: ChangeLog
===================================================================
RCS file: /var/cvsroot/gentoo-x86/net-misc/strongswan/ChangeLog,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -r1.144 -r1.145
--- ChangeLog   10 Jul 2014 08:16:13 -0000      1.144
+++ ChangeLog   13 Sep 2014 14:17:42 -0000      1.145
@@ -1,6 +1,14 @@
 # ChangeLog for net-misc/strongswan
 # Copyright 1999-2014 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/strongswan/ChangeLog,v 1.144 
2014/07/10 08:16:13 gurligebis Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-misc/strongswan/ChangeLog,v 1.145 
2014/09/13 14:17:42 gurligebis Exp $
+
+*strongswan-5.2.0-r1 (13 Sep 2014)
+
+  13 Sep 2014; <gurlige...@gentoo.org> -strongswan-5.2.0.ebuild,
+  +strongswan-5.2.0-r1.ebuild, files/ipsec, metadata.xml:
+  Changing init script to "use logger" instead of "need logger" - fixing bug
+  #476514 .
+  Adding use flags for more plugins, fixing bugs #481740 and #504942 .
 
 *strongswan-5.2.0 (10 Jul 2014)
 



1.1                  net-misc/strongswan/strongswan-5.2.0-r1.ebuild

file : 
http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/strongswan-5.2.0-r1.ebuild?rev=1.1&view=markup
plain: 
http://sources.gentoo.org/viewvc.cgi/gentoo-x86/net-misc/strongswan/strongswan-5.2.0-r1.ebuild?rev=1.1&content-type=text/plain

Index: strongswan-5.2.0-r1.ebuild
===================================================================
# Copyright 1999-2014 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: 
/var/cvsroot/gentoo-x86/net-misc/strongswan/strongswan-5.2.0-r1.ebuild,v 1.1 
2014/09/13 14:17:42 gurligebis Exp $

EAPI=5
inherit eutils linux-info systemd user

DESCRIPTION="IPsec-based VPN solution focused on security and ease of use, 
supporting IKEv1/IKEv2 and MOBIKE"
HOMEPAGE="http://www.strongswan.org/";
SRC_URI="http://download.strongswan.org/${P}.tar.bz2";

LICENSE="GPL-2 RSA DES"
SLOT="0"
KEYWORDS="~amd64 ~arm ~ppc ~ppc64 ~x86"
IUSE="+caps curl +constraints debug dhcp eap farp gcrypt ldap mysql 
networkmanager +non-root +openssl sqlite pam pkcs11"

STRONGSWAN_PLUGINS_STD="led lookip systime-fix unity vici"
STRONGSWAN_PLUGINS_OPT="blowfish ccm ctr gcm ha ipseckey ntru padlock rdrand 
unbound whitelist"
for mod in $STRONGSWAN_PLUGINS_STD; do
        IUSE="${IUSE} +strongswan_plugins_${mod}"
done

for mod in $STRONGSWAN_PLUGINS_OPT; do
        IUSE="${IUSE} strongswan_plugins_${mod}"
done

COMMON_DEPEND="!net-misc/openswan
        >=dev-libs/gmp-4.1.5
        gcrypt? ( dev-libs/libgcrypt:0 )
        caps? ( sys-libs/libcap )
        curl? ( net-misc/curl )
        ldap? ( net-nds/openldap )
        openssl? ( >=dev-libs/openssl-0.9.8[-bindist] )
        mysql? ( virtual/mysql )
        sqlite? ( >=dev-db/sqlite-3.3.1 )
        networkmanager? ( net-misc/networkmanager )
        pam? ( sys-libs/pam )
        strongswan_plugins_unbound? ( net-dns/unbound )"
DEPEND="${COMMON_DEPEND}
        virtual/linux-sources
        sys-kernel/linux-headers"
RDEPEND="${COMMON_DEPEND}
        virtual/logger
        sys-apps/iproute2
        !net-misc/libreswan"

UGID="ipsec"

pkg_setup() {
        linux-info_pkg_setup
        elog "Linux kernel version: ${KV_FULL}"

        if ! kernel_is -ge 2 6 16; then
                eerror
                eerror "This ebuild currently only supports ${PN} with the"
                eerror "native Linux 2.6 IPsec stack on kernels >= 2.6.16."
                eerror
        fi

        if kernel_is -lt 2 6 34; then
                ewarn
                ewarn "IMPORTANT KERNEL NOTES: Please read carefully..."
                ewarn

                if kernel_is -lt 2 6 29; then
                        ewarn "[ < 2.6.29 ] Due to a missing kernel feature, 
you have to"
                        ewarn "include all required IPv6 modules even if you 
just intend"
                        ewarn "to run on IPv4 only."
                        ewarn
                        ewarn "This has been fixed with kernels >= 2.6.29."
                        ewarn
                fi

                if kernel_is -lt 2 6 33; then
                        ewarn "[ < 2.6.33 ] Kernels prior to 2.6.33 include a 
non-standards"
                        ewarn "compliant implementation for SHA-2 HMAC support 
in ESP and"
                        ewarn "miss SHA384 and SHA512 HMAC support altogether."
                        ewarn
                        ewarn "If you need any of those features, please use 
kernel >= 2.6.33."
                        ewarn
                fi

                if kernel_is -lt 2 6 34; then
                        ewarn "[ < 2.6.34 ] Support for the AES-GMAC 
authentification-only"
                        ewarn "ESP cipher is only included in kernels >= 
2.6.34."
                        ewarn
                        ewarn "If you need it, please use kernel >= 2.6.34."
                        ewarn
                fi
        fi

        if use non-root; then
                enewgroup ${UGID}
                enewuser ${UGID} -1 -1 -1 ${UGID}
        fi
}

src_prepare() {
        epatch_user
}

src_configure() {
        local myconf=""

        if use non-root; then
                myconf="${myconf} --with-user=${UGID} --with-group=${UGID}"
        fi

        # If a user has already enabled db support, those plugins will
        # most likely be desired as well. Besides they don't impose new
        # dependencies and come at no cost (except for space).
        if use mysql || use sqlite; then
                myconf="${myconf} --enable-attr-sql --enable-sql"
        fi

        # strongSwan builds and installs static libs by default which are
        # useless to the user (and to strongSwan for that matter) because no
        # header files or alike get installed... so disabling them is safe.
        if use pam && use eap; then
                myconf="${myconf} --enable-eap-gtc"
        else
                myconf="${myconf} --disable-eap-gtc"
        fi

        for mod in $STRONGSWAN_PLUGINS_STD; do
                if use strongswan_plugins_${mod}; then
                        myconf+=" --enable-${mod}"
                fi
        done

        for mod in $STRONGSWAN_PLUGINS_OPT; do
                if use strongswan_plugins_${mod}; then
                        myconf+=" --enable-${mod}"
                fi
        done

        econf \
                --disable-static \
                --enable-ikev1 \
                --enable-ikev2 \
                --enable-swanctl \
                --enable-socket-dynamic \
                $(use_with caps capabilities libcap) \
                $(use_enable curl) \
                $(use_enable constraints) \
                $(use_enable ldap) \
                $(use_enable debug leak-detective) \
                $(use_enable dhcp) \
                $(use_enable eap eap-sim) \
                $(use_enable eap eap-sim-file) \
                $(use_enable eap eap-simaka-sql) \
                $(use_enable eap eap-simaka-pseudonym) \
                $(use_enable eap eap-simaka-reauth) \
                $(use_enable eap eap-identity) \
                $(use_enable eap eap-md5) \
                $(use_enable eap eap-aka) \
                $(use_enable eap eap-aka-3gpp2) \
                $(use_enable eap md4) \
                $(use_enable eap eap-mschapv2) \
                $(use_enable eap eap-radius) \
                $(use_enable eap eap-tls) \
                $(use_enable eap xauth-eap) \
                $(use_enable farp) \
                $(use_enable gcrypt) \
                $(use_enable mysql) \
                $(use_enable networkmanager nm) \
                $(use_enable openssl) \
                $(use_enable pam xauth-pam) \
                $(use_enable pkcs11) \
                $(use_enable sqlite) \
                "$(systemd_with_unitdir)" \
                ${myconf}
}

src_install() {
        emake DESTDIR="${D}" install

        doinitd "${FILESDIR}"/ipsec

        local dir_ugid
        if use non-root; then
                fowners ${UGID}:${UGID} \
                        /etc/ipsec.conf \
                        /etc/strongswan.conf

                dir_ugid="${UGID}"
        else
                dir_ugid="root"
        fi

        diropts -m 0750 -o ${dir_ugid} -g ${dir_ugid}
        dodir /etc/ipsec.d \
                /etc/ipsec.d/aacerts \
                /etc/ipsec.d/acerts \
                /etc/ipsec.d/cacerts \
                /etc/ipsec.d/certs \
                /etc/ipsec.d/crls \
                /etc/ipsec.d/ocspcerts \
                /etc/ipsec.d/private \
                /etc/ipsec.d/reqs

        dodoc NEWS README TODO || die

        # shared libs are used only internally and there are no static libs,
        # so it's safe to get rid of the .la files
        find "${D}" -name '*.la' -delete || die "Failed to remove .la files."
}

pkg_preinst() {
        has_version "<net-misc/strongswan-4.3.6-r1"
        upgrade_from_leq_4_3_6=$(( !$? ))

        has_version "<net-misc/strongswan-4.3.6-r1[-caps]"
        previous_4_3_6_with_caps=$(( !$? ))
}

pkg_postinst() {
        if ! use openssl && ! use gcrypt; then
                elog
                elog "${PN} has been compiled without both OpenSSL and 
libgcrypt support."
                elog "Please note that this might effect availability and speed 
of some"
                elog "cryptographic features. You are advised to enable the 
OpenSSL plugin."
        elif ! use openssl; then
                elog
                elog "${PN} has been compiled without the OpenSSL plugin. This 
might effect"
                elog "availability and speed of some cryptographic features. 
There will be"
                elog "no support for Elliptic Curve Cryptography 
(Diffie-Hellman groups 19-21,"
                elog "25, 26) and ECDSA."
        fi

        if [[ $upgrade_from_leq_4_3_6 == 1 ]]; then
                chmod 0750 "${ROOT}"/etc/ipsec.d \
                        "${ROOT}"/etc/ipsec.d/aacerts \
                        "${ROOT}"/etc/ipsec.d/acerts \
                        "${ROOT}"/etc/ipsec.d/cacerts \
                        "${ROOT}"/etc/ipsec.d/certs \
                        "${ROOT}"/etc/ipsec.d/crls \
                        "${ROOT}"/etc/ipsec.d/ocspcerts \
                        "${ROOT}"/etc/ipsec.d/private \
                        "${ROOT}"/etc/ipsec.d/reqs

                ewarn
                ewarn "The default permissions for /etc/ipsec.d/* have been 
tightened for"
                ewarn "security reasons. Your system installed directories have 
been"
                ewarn "updated accordingly. Please check if necessary."
                ewarn

                if [[ $previous_4_3_6_with_caps == 1 ]]; then
                        if ! use non-root; then
                                ewarn
                                ewarn "IMPORTANT: You previously had ${PN} 
installed without root"
                                ewarn "privileges because it was implied by the 
'caps' USE flag."
                                ewarn "This has been changed. If you want ${PN} 
with user privileges,"
                                ewarn "you have to re-emerge it with the 
'non-root' USE flag enabled."
                                ewarn
                        fi
                fi
        fi
        if ! use caps && ! use non-root; then
                ewarn
                ewarn "You have decided to run ${PN} with root privileges and 
built it"
                ewarn "without support for POSIX capability dropping. It is 
generally"
                ewarn "strongly suggested that you reconsider- especially if 
you intend"
                ewarn "to run ${PN} as server with a public ip address."
                ewarn
                ewarn "You should re-emerge ${PN} with at least the 'caps' USE 
flag enabled."
                ewarn
        fi
        if use non-root; then
                elog
                elog "${PN} has been installed without superuser privileges 
(USE=non-root)."
                elog "This imposes several limitations mainly to the IKEv1 
daemon 'pluto'"
                elog "but also a few to the IKEv2 daemon 'charon'."
                elog
                elog "Please carefully read: 
http://wiki.strongswan.org/wiki/nonRoot";
                elog
                elog "pluto uses a helper script by default to insert/remove 
routing and"
                elog "policy rules upon connection start/stop which requires 
superuser"
                elog "privileges. charon in contrast does this internally and 
can do so"
                elog "even with reduced (user) privileges."
                elog
                elog "Thus if you require IKEv1 (pluto) or need to specify a 
custom updown"
                elog "script to pluto or charon which requires superuser 
privileges, you"
                elog "can work around this limitation by using sudo to grant 
the"
                elog "user \"ipsec\" the appropriate rights."
                elog "For example (the default case):"
                elog "/etc/sudoers:"
                elog "  ipsec ALL=(ALL) NOPASSWD: SETENV: /usr/sbin/ipsec"
                elog "Under the specific connection block in /etc/ipsec.conf:"
                elog "  leftupdown=\"sudo -E ipsec _updown iptables\""
                elog
        fi
        elog
        elog "Make sure you have _all_ required kernel modules available 
including"
        elog "the appropriate cryptographic algorithms. A list is available at:"
        elog "  
http://wiki.strongswan.org/projects/strongswan/wiki/KernelModules";
        elog
        elog "The up-to-date manual is available online at:"
        elog "  http://wiki.strongswan.org/";
        elog
}




Reply via email to