[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Sunday, November 22, 2020 @ 02:01:35 Author: shibumi Revision: 758787 upgpkg: strongswan 5.9.1-1 Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) Modified: PKGBUILD === --- PKGBUILD2020-11-22 02:01:13 UTC (rev 758786) +++ PKGBUILD2020-11-22 02:01:35 UTC (rev 758787) @@ -10,7 +10,7 @@ # Contributor: Thermi pkgname=strongswan -pkgver=5.9.0 +pkgver=5.9.1 pkgrel=1 pkgdesc='Open source IPsec implementation' url='https://www.strongswan.org' @@ -36,7 +36,7 @@ source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"{,.sig} 'configure_ac.patch') validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") -sha512sums=('b982ce7c3e940ad75ab71b02ce3e2813b41c6b098cde5b6f3f3513d095f409fe989ae6e38a31eff51c57423bf452c3610cd5cd8cd7f45ff932581d9859df1821' +sha512sums=('222625e77bd86959da6dd7346cfa9f92569fc396a494bb95ddf2c8e0680b7e8041541e8a14320517a0c735d713ae0fdc0d0c4694215e812817814b0b4efc3497' 'SKIP' '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') install=strongswan.install
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Thursday, August 20, 2020 @ 02:25:49 Author: shibumi Revision: 685259 upgpkg: strongswan 5.9.0-1 Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD |8 1 file changed, 4 insertions(+), 4 deletions(-) Modified: PKGBUILD === --- PKGBUILD2020-08-20 01:42:06 UTC (rev 685258) +++ PKGBUILD2020-08-20 02:25:49 UTC (rev 685259) @@ -10,7 +10,7 @@ # Contributor: Thermi pkgname=strongswan -pkgver=5.8.2 +pkgver=5.9.0 pkgrel=1 pkgdesc='Open source IPsec implementation' url='https://www.strongswan.org' @@ -36,9 +36,9 @@ source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"{,.sig} 'configure_ac.patch') validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") -sha512sums=('423e7924acfe8a03ad7d4359ae9086fd516798fcf5eb948a27b52ea719f4d8954b83ea30ce94191ea1647616611df8a1215cb4d5c7ec48676624df6c41853e1d' - 'SKIP' - '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') +sha512sums=('b982ce7c3e940ad75ab71b02ce3e2813b41c6b098cde5b6f3f3513d095f409fe989ae6e38a31eff51c57423bf452c3610cd5cd8cd7f45ff932581d9859df1821' +'SKIP' + '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') install=strongswan.install # We don't build libipsec because it would get loaded before kernel-netlink and netkey, which
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Monday, December 23, 2019 @ 02:31:48 Author: shibumi Revision: 538947 upgpkg: strongswan 5.8.2-1 Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD | 179 ++--- 1 file changed, 89 insertions(+), 90 deletions(-) Modified: PKGBUILD === --- PKGBUILD2019-12-22 22:36:47 UTC (rev 538946) +++ PKGBUILD2019-12-23 02:31:48 UTC (rev 538947) @@ -10,35 +10,35 @@ # Contributor: Thermi pkgname=strongswan -pkgver=5.8.1 -pkgrel=3 +pkgver=5.8.2 +pkgrel=1 pkgdesc='Open source IPsec implementation' url='https://www.strongswan.org' license=('GPL2') arch=('x86_64') makedepends=('curl' 'gmp' 'libnm' 'iproute2' 'openssl' 'sqlite' 'libcap' 'systemd-libs' -'systemd' 'pam' 'python' 'ruby' 'mariadb' 'python-setuptools') + 'systemd' 'pam' 'python' 'ruby' 'mariadb' 'python-setuptools') depends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'systemd-libs' 'pam') optdepends=('libnm: for networkmanager support' -'mariadb: MySQL support' -'ruby: Ruby support' -'python: Python support' -'resolvconf: Resolveplugin' -'openldap: LDAP support') + 'mariadb: MySQL support' + 'ruby: Ruby support' + 'python: Python support' + 'resolvconf: Resolveplugin' + 'openldap: LDAP support') # TODO: move to package() and use find backup=( -etc/ipsec.conf -etc/ipsec.secrets -etc/swanctl/swanctl.conf -etc/strongswan.conf - etc/strongswan.d/{charon-logging.conf,charon.conf,pki.conf,pool.conf,scepclient.conf,starter.conf,swanctl.conf} - etc/strongswan.d/charon/{aesni.conf,attr-sql.conf,attr.conf,bliss.conf,chapoly.conf,cmac.conf,connmark.conf,constraints.conf,curl.conf,des.conf,dhcp.conf,dnskey.conf,eap-aka-3gpp2.conf,eap-aka.conf,eap-gtc.conf,eap-identity.conf,eap-md5.conf,eap-mschapv2.conf,eap-radius.conf,eap-sim-file.conf,eap-sim.conf,eap-simaka-pseudonym.conf,eap-simaka-reauth.conf,eap-tls.conf,ext-auth.conf,farp.conf,fips-prf.conf,forecast.conf,gmp.conf,ha.conf,hmac.conf,kernel-netlink.conf,md5.conf,mgf1.conf,nonce.conf,newhope.conf,ntru.conf,openssl.conf,pem.conf,pgp.conf,pkcs1.conf,pkcs12.conf,pkcs7.conf,pkcs8.conf,pubkey.conf,random.conf,rc2.conf,resolve.conf,revocation.conf,sha1.conf,sha2.conf,sha3.conf,socket-default.conf,sql.conf,sqlite.conf,sshkey.conf,stroke.conf,updown.conf,vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf,unity.conf,curve25519.conf,bypass-lan.conf}) + etc/ipsec.conf + etc/ipsec.secrets + etc/swanctl/swanctl.conf + etc/strongswan.conf + etc/strongswan.d/{charon-logging.conf,charon.conf,pki.conf,pool.conf,scepclient.conf,starter.conf,swanctl.conf} + etc/strongswan.d/charon/{aesni.conf,attr-sql.conf,attr.conf,bliss.conf,chapoly.conf,cmac.conf,connmark.conf,constraints.conf,curl.conf,des.conf,dhcp.conf,dnskey.conf,eap-aka-3gpp2.conf,eap-aka.conf,eap-gtc.conf,eap-identity.conf,eap-md5.conf,eap-mschapv2.conf,eap-radius.conf,eap-sim-file.conf,eap-sim.conf,eap-simaka-pseudonym.conf,eap-simaka-reauth.conf,eap-tls.conf,ext-auth.conf,farp.conf,fips-prf.conf,forecast.conf,gmp.conf,ha.conf,hmac.conf,kernel-netlink.conf,md5.conf,mgf1.conf,nonce.conf,newhope.conf,ntru.conf,openssl.conf,pem.conf,pgp.conf,pkcs1.conf,pkcs12.conf,pkcs7.conf,pkcs8.conf,pubkey.conf,random.conf,rc2.conf,resolve.conf,revocation.conf,sha1.conf,sha2.conf,sha3.conf,socket-default.conf,sql.conf,sqlite.conf,sshkey.conf,stroke.conf,updown.conf,vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf,unity.conf,curve25519.conf,bypass-lan.conf}) source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"{,.sig} -'configure_ac.patch') + 'configure_ac.patch') validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") -sha512sums=('630d24643b3d61e931bb25cdd083ad3c55f92fe41f3fcd3198012eee486fb3b1a16dc3f80936162afb7da9e471d45d92b7d183a00153a558babb2a79e5f6813f' -'SKIP' - '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') +sha512sums=('423e7924acfe8a03ad7d4359ae9086fd516798fcf5eb948a27b52ea719f4d8954b83ea30ce94191ea1647616611df8a1215cb4d5c7ec48676624df6c41853e1d' + 'SKIP' + '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') install=strongswan.install # We don't build libipsec because it would get loaded before kernel-netlink and netkey, which @@ -45,83 +45,82 @@ # would case processing to be handled in user space. Also, the plugin is experimental. If you need it, # add --enable-libipsec and --enable-kernel-libipsec prepare() { -cd ${pkgname}-${pkgver} -patch -p1 -l < "${srcdir}/configure_ac.patch" -autoreconf -fiv + cd ${pkgname}-${pkgver} + patch -p1 -l <"${srcdir}/configure_ac.patch" + autoreconf -fiv } build() { -cd ${pkgname}-${pkgver} + cd ${pkgname}-${pkgver} -./configure --prefix=/usr \ -
[arch-commits] Commit in strongswan/trunk (PKGBUILD strongswan.install)
Date: Saturday, November 16, 2019 @ 16:22:53 Author: shibumi Revision: 529565 upgpkg: strongswan 5.8.1-3 quickfix for strongswan install file Modified: strongswan/trunk/PKGBUILD strongswan/trunk/strongswan.install + PKGBUILD |2 +- strongswan.install |4 +++- 2 files changed, 4 insertions(+), 2 deletions(-) Modified: PKGBUILD === --- PKGBUILD2019-11-16 16:22:46 UTC (rev 529564) +++ PKGBUILD2019-11-16 16:22:53 UTC (rev 529565) @@ -11,7 +11,7 @@ pkgname=strongswan pkgver=5.8.1 -pkgrel=2 +pkgrel=3 pkgdesc='Open source IPsec implementation' url='https://www.strongswan.org' license=('GPL2') Modified: strongswan.install === --- strongswan.install 2019-11-16 16:22:46 UTC (rev 529564) +++ strongswan.install 2019-11-16 16:22:53 UTC (rev 529565) @@ -1,6 +1,6 @@ post_upgrade() { if (($(vercmp 5.8.0-1 $2) > 0)); then -cat << EOF +echo " Strongswan 5.8.0-1 introduced new names for the systemd unit files: strongswan.service got renamed to strongswan-starter.service @@ -11,4 +11,6 @@ If you use swanctl, you need to enable strongswan.service from now on. EOF +" + fi }
[arch-commits] Commit in strongswan/trunk (PKGBUILD strongswan.install)
Date: Saturday, November 16, 2019 @ 13:47:31 Author: shibumi Revision: 529522 upgpkg: strongswan 5.8.1-2 add strongswan.install for notifying users about service files changes. This is supposed to fix #62823 Added: strongswan/trunk/strongswan.install Modified: strongswan/trunk/PKGBUILD + PKGBUILD | 13 - strongswan.install | 14 ++ 2 files changed, 18 insertions(+), 9 deletions(-) Modified: PKGBUILD === --- PKGBUILD2019-11-16 11:57:28 UTC (rev 529521) +++ PKGBUILD2019-11-16 13:47:31 UTC (rev 529522) @@ -11,7 +11,7 @@ pkgname=strongswan pkgver=5.8.1 -pkgrel=1 +pkgrel=2 pkgdesc='Open source IPsec implementation' url='https://www.strongswan.org' license=('GPL2') @@ -32,19 +32,14 @@ etc/swanctl/swanctl.conf etc/strongswan.conf etc/strongswan.d/{charon-logging.conf,charon.conf,pki.conf,pool.conf,scepclient.conf,starter.conf,swanctl.conf} - etc/strongswan.d/charon/{aesni.conf,attr-sql.conf,attr.conf,bliss.conf,chapoly.conf,cmac.conf,connmark.conf,constraints.conf,curl.conf,des.conf,dhcp.conf,dnskey.conf,eap-aka-3gpp2.conf,eap-aka.conf,eap-gtc.conf,eap-identity.conf,eap-md5.conf,eap-mschapv2.conf,eap-radius.conf,eap-sim-file.conf,eap-sim.conf,eap-simaka-pseudonym.conf,eap-simaka-reauth.conf,eap-tls.conf,ext-auth.conf,farp.conf,fips-prf.conf,forecast.conf,gmp.conf,ha.conf,hmac.conf,kernel-netlink.conf,md5.conf,mgf1.conf,nonce.conf,newhope.conf,ntru.conf,openssl.conf,pem.conf,pgp.conf,pkcs1.conf,pkcs12.conf,pkcs7.conf,pkcs8.conf,pubkey.conf,random.conf,rc2.conf,resolve.conf,revocation.conf,sha1.conf,sha2.conf,sha3.conf,socket-default.conf,sql.conf,sqlite.conf,sshkey.conf,stroke.conf,updown.conf,vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf,unity.conf,curve25519.conf,bypass-lan.conf} - -) - + etc/strongswan.d/charon/{aesni.conf,attr-sql.conf,attr.conf,bliss.conf,chapoly.conf,cmac.conf,connmark.conf,constraints.conf,curl.conf,des.conf,dhcp.conf,dnskey.conf,eap-aka-3gpp2.conf,eap-aka.conf,eap-gtc.conf,eap-identity.conf,eap-md5.conf,eap-mschapv2.conf,eap-radius.conf,eap-sim-file.conf,eap-sim.conf,eap-simaka-pseudonym.conf,eap-simaka-reauth.conf,eap-tls.conf,ext-auth.conf,farp.conf,fips-prf.conf,forecast.conf,gmp.conf,ha.conf,hmac.conf,kernel-netlink.conf,md5.conf,mgf1.conf,nonce.conf,newhope.conf,ntru.conf,openssl.conf,pem.conf,pgp.conf,pkcs1.conf,pkcs12.conf,pkcs7.conf,pkcs8.conf,pubkey.conf,random.conf,rc2.conf,resolve.conf,revocation.conf,sha1.conf,sha2.conf,sha3.conf,socket-default.conf,sql.conf,sqlite.conf,sshkey.conf,stroke.conf,updown.conf,vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf,unity.conf,curve25519.conf,bypass-lan.conf}) source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"{,.sig} -'configure_ac.patch' -) - +'configure_ac.patch') validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") - sha512sums=('630d24643b3d61e931bb25cdd083ad3c55f92fe41f3fcd3198012eee486fb3b1a16dc3f80936162afb7da9e471d45d92b7d183a00153a558babb2a79e5f6813f' 'SKIP' '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') +install=strongswan.install # We don't build libipsec because it would get loaded before kernel-netlink and netkey, which # would case processing to be handled in user space. Also, the plugin is experimental. If you need it, Added: strongswan.install === --- strongswan.install (rev 0) +++ strongswan.install 2019-11-16 13:47:31 UTC (rev 529522) @@ -0,0 +1,14 @@ +post_upgrade() { + if (($(vercmp 5.8.0-1 $2) > 0)); then +cat << EOF +Strongswan 5.8.0-1 introduced new names for the systemd unit files: + +strongswan.service got renamed to strongswan-starter.service +strongswan-swanctl.service got renamed to strongswan.service + +If you use the legacy ipsec.conf, you need to enable +strongswan-starter.service from now on. + +If you use swanctl, you need to enable strongswan.service from now on. +EOF +}
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Sunday, September 8, 2019 @ 16:15:44 Author: shibumi Revision: 509002 upgpkg: strongswan 5.8.1-1 replaced libnm-glib for libnm Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD | 12 ++-- 1 file changed, 6 insertions(+), 6 deletions(-) Modified: PKGBUILD === --- PKGBUILD2019-09-08 15:51:27 UTC (rev 509001) +++ PKGBUILD2019-09-08 16:15:44 UTC (rev 509002) @@ -10,16 +10,16 @@ # Contributor: Thermi pkgname=strongswan -pkgver=5.8.0 -pkgrel=2 +pkgver=5.8.1 +pkgrel=1 pkgdesc='Open source IPsec implementation' url='https://www.strongswan.org' license=('GPL2') arch=('x86_64') -makedepends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'systemd-libs' - 'systemd' 'pam' 'libnm-glib' 'python' 'ruby' 'mariadb' 'python-setuptools') +makedepends=('curl' 'gmp' 'libnm' 'iproute2' 'openssl' 'sqlite' 'libcap' 'systemd-libs' + 'systemd' 'pam' 'python' 'ruby' 'mariadb' 'python-setuptools') depends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'systemd-libs' 'pam') -optdepends=('libnm-glib: for networkmanager support' +optdepends=('libnm: for networkmanager support' 'mariadb: MySQL support' 'ruby: Ruby support' 'python: Python support' @@ -48,7 +48,7 @@ validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") -sha512sums=('bf70aa6f9bb3d64d7cf02c7efd9053830efaa51b4cb20bd18dc75b1f0e7532c6217b4074b24dc10bd214484442bc496a57f7ca46bb341c50153feff98cd2bf94' +sha512sums=('630d24643b3d61e931bb25cdd083ad3c55f92fe41f3fcd3198012eee486fb3b1a16dc3f80936162afb7da9e471d45d92b7d183a00153a558babb2a79e5f6813f' 'SKIP' '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74')
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Thursday, June 13, 2019 @ 18:12:02 Author: shibumi Revision: 481291 upgpkg: strongswan 5.8.0-2 Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Modified: PKGBUILD === --- PKGBUILD2019-06-13 18:04:50 UTC (rev 481290) +++ PKGBUILD2019-06-13 18:12:02 UTC (rev 481291) @@ -11,7 +11,7 @@ pkgname=strongswan pkgver=5.8.0 -pkgrel=1 +pkgrel=2 pkgdesc='Open source IPsec implementation' url='https://www.strongswan.org' license=('GPL2')
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Wednesday, June 5, 2019 @ 11:27:51 Author: shibumi Revision: 476969 upgpkg: strongswan 5.8.0-1 Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD |8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) Modified: PKGBUILD === --- PKGBUILD2019-06-05 11:18:30 UTC (rev 476968) +++ PKGBUILD2019-06-05 11:27:51 UTC (rev 476969) @@ -10,8 +10,8 @@ # Contributor: Thermi pkgname=strongswan -pkgver=5.7.2 -pkgrel=2 +pkgver=5.8.0 +pkgrel=1 pkgdesc='Open source IPsec implementation' url='https://www.strongswan.org' license=('GPL2') @@ -48,7 +48,7 @@ validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") -sha512sums=('e2169dbbc0c03737e34af90d7bc07e08c5e2ac1f81764eeccbac8b142b984ce9ed512a89071075a930e0997632267f6912aa5b352eee2edbd551b5a64e7e' +sha512sums=('bf70aa6f9bb3d64d7cf02c7efd9053830efaa51b4cb20bd18dc75b1f0e7532c6217b4074b24dc10bd214484442bc496a57f7ca46bb341c50153feff98cd2bf94' 'SKIP' '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') @@ -131,6 +131,8 @@ make DESTDIR="${pkgdir}" install install -Dm644 "${pkgdir}/etc/dbus-1/system.d/nm-strongswan-service.conf" "${pkgdir}/usr/share/dbus-1/system.d/nm-strongswan-service.conf" rm -v "${pkgdir}/etc/dbus-1/system.d/nm-strongswan-service.conf" + # remove empty directory + rmdir -v "${pkgdir}/etc/dbus-1/system.d" } # vim: ts=2 sw=2 et:
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Saturday, February 9, 2019 @ 14:56:55 Author: shibumi Revision: 430841 upgpkg: strongswan 5.7.2-2 changed dbus-policy path + fixes #59191 Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD |5 - 1 file changed, 4 insertions(+), 1 deletion(-) Modified: PKGBUILD === --- PKGBUILD2019-02-09 14:36:55 UTC (rev 430840) +++ PKGBUILD2019-02-09 14:56:55 UTC (rev 430841) @@ -11,7 +11,7 @@ pkgname=strongswan pkgver=5.7.2 -pkgrel=1 +pkgrel=2 pkgdesc='Open source IPsec implementation' url='https://www.strongswan.org' license=('GPL2') @@ -23,6 +23,7 @@ 'mariadb: MySQL support' 'ruby: Ruby support' 'python: Python support' +'resolvconf: Resolveplugin' 'openldap: LDAP support') # TODO: move to package() and use find backup=( @@ -128,6 +129,8 @@ package() { cd ${pkgname}-${pkgver} make DESTDIR="${pkgdir}" install + install -Dm644 "${pkgdir}/etc/dbus-1/system.d/nm-strongswan-service.conf" "${pkgdir}/usr/share/dbus-1/system.d/nm-strongswan-service.conf" + rm -v "${pkgdir}/etc/dbus-1/system.d/nm-strongswan-service.conf" } # vim: ts=2 sw=2 et:
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Saturday, January 19, 2019 @ 23:34:43 Author: shibumi Revision: 424951 upgpkg: strongswan 5.7.2-1 Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD |6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) Modified: PKGBUILD === --- PKGBUILD2019-01-19 23:19:31 UTC (rev 424950) +++ PKGBUILD2019-01-19 23:34:43 UTC (rev 424951) @@ -10,8 +10,8 @@ # Contributor: Thermi pkgname=strongswan -pkgver=5.7.1 -pkgrel=2 +pkgver=5.7.2 +pkgrel=1 pkgdesc='Open source IPsec implementation' url='https://www.strongswan.org' license=('GPL2') @@ -47,7 +47,7 @@ validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") -sha512sums=('43102814434bee7c27a5956be59099cc4ffb9bb5b0d6382ce4c6a80d1d82ed6639f698f5f5544b9ca563554a344638c953525b0e2d39bc6b71b19055c80e07fc' +sha512sums=('e2169dbbc0c03737e34af90d7bc07e08c5e2ac1f81764eeccbac8b142b984ce9ed512a89071075a930e0997632267f6912aa5b352eee2edbd551b5a64e7e' 'SKIP' '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74')
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Wednesday, January 16, 2019 @ 15:02:38 Author: felixonmars Revision: 423549 MariaDB 10.3 rebuild Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Modified: PKGBUILD === --- PKGBUILD2019-01-16 15:00:33 UTC (rev 423548) +++ PKGBUILD2019-01-16 15:02:38 UTC (rev 423549) @@ -11,7 +11,7 @@ pkgname=strongswan pkgver=5.7.1 -pkgrel=1 +pkgrel=2 pkgdesc='Open source IPsec implementation' url='https://www.strongswan.org' license=('GPL2')
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Monday, October 1, 2018 @ 21:08:31 Author: shibumi Revision: 388924 upgpkg: strongswan 5.7.1-1 This release fixes CVE-2018-17540. Further information here: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-17540 https://www.strongswan.org/blog/2018/10/01/strongswan-vulnerability-(cve-2018-17540).html Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD |5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) Modified: PKGBUILD === --- PKGBUILD2018-10-01 21:02:50 UTC (rev 388923) +++ PKGBUILD2018-10-01 21:08:31 UTC (rev 388924) @@ -41,8 +41,9 @@ vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf,unity.conf,curve25519.conf,bypass-lan.conf} ) -source=(https://download.strongswan.org/strongswan-${pkgver}.tar.bz2{,.sig} -configure_ac.patch) +source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"{,.sig} +'configure_ac.patch' +) validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77")
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Monday, October 1, 2018 @ 20:35:12 Author: anthraxx Revision: 388920 upgpkg: strongswan 5.7.1-1 (security update) Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD | 143 ++--- 1 file changed, 72 insertions(+), 71 deletions(-) Modified: PKGBUILD === --- PKGBUILD2018-10-01 19:23:06 UTC (rev 388919) +++ PKGBUILD2018-10-01 20:35:12 UTC (rev 388920) @@ -10,14 +10,14 @@ # Contributor: Thermi pkgname=strongswan -pkgver=5.7.0 +pkgver=5.7.1 pkgrel=1 -pkgdesc="open source IPsec implementation" +pkgdesc='Open source IPsec implementation' url='https://www.strongswan.org' -license=("GPL2") +license=('GPL2') arch=('x86_64') makedepends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd' -'systemd' 'pam' 'libnm-glib' 'python' 'ruby' 'mariadb' 'python-setuptools') + 'systemd' 'pam' 'libnm-glib' 'python' 'ruby' 'mariadb' 'python-setuptools') depends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd' 'pam') optdepends=('libnm-glib: for networkmanager support' 'mariadb: MySQL support' @@ -24,6 +24,7 @@ 'ruby: Ruby support' 'python: Python support' 'openldap: LDAP support') +# TODO: move to package() and use find backup=( etc/ipsec.conf etc/ipsec.secrets @@ -40,13 +41,12 @@ vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf,unity.conf,curve25519.conf,bypass-lan.conf} ) -source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2{,.sig}"; -'configure_ac.patch' -) +source=(https://download.strongswan.org/strongswan-${pkgver}.tar.bz2{,.sig} +configure_ac.patch) validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") -sha512sums=('811bfa79aa2b17fcf298c45a2b4109cf4235286e90c4def3e09022ed94c7fa481fc25b8d5054529e4ff4e33011ce6f6ba9874595d16c1a8fe13ef924c4ec6395' +sha512sums=('43102814434bee7c27a5956be59099cc4ffb9bb5b0d6382ce4c6a80d1d82ed6639f698f5f5544b9ca563554a344638c953525b0e2d39bc6b71b19055c80e07fc' 'SKIP' '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') @@ -54,78 +54,79 @@ # would case processing to be handled in user space. Also, the plugin is experimental. If you need it, # add --enable-libipsec and --enable-kernel-libipsec prepare() { -cd "${srcdir}/${pkgname}-${pkgver}" -patch -p1 -l < "${srcdir}/configure_ac.patch" -autoreconf + cd ${pkgname}-${pkgver} + patch -p1 -l < "${srcdir}/configure_ac.patch" + autoreconf -fiv } build() { - cd "${srcdir}/${pkgname}-${pkgver}" + cd ${pkgname}-${pkgver} ./configure --prefix=/usr \ ---sbindir=/usr/bin \ ---sysconfdir=/etc \ ---libexecdir=/usr/lib \ ---with-ipsecdir=/usr/lib/strongswan \ ---with-nm-ca-dir=/etc/ssl/certs \ ---enable-integrity-test \ ---enable-sqlite \ ---enable-pkcs11 \ ---enable-openssl \ ---enable-curl \ ---enable-sql \ ---enable-attr-sql \ ---enable-farp \ ---enable-dhcp \ ---enable-eap-sim \ ---enable-eap-sim-file \ ---enable-eap-simaka-pseudonym \ ---enable-eap-simaka-reauth \ ---enable-eap-identity \ ---enable-eap-md5 \ ---enable-eap-gtc \ ---enable-eap-aka \ ---enable-eap-aka-3gpp2 \ ---enable-eap-mschapv2 \ ---enable-eap-radius \ ---enable-xauth-eap \ ---enable-ha \ ---enable-vici \ ---enable-swanctl \ ---enable-systemd \ ---enable-ext-auth \ ---enable-mysql \ ---enable-ldap \ ---enable-cmd \ ---enable-forecast \ ---enable-connmark \ ---enable-aesni \ ---enable-eap-ttls \ ---enable-radattr \ ---enable-xauth-pam \ ---enable-xauth-noauth \ ---enable-eap-dynamic \ ---enable-eap-peap \ ---enable-eap-tls \ ---enable-chapoly \ ---enable-unity \ ---with-capabilities=libcap \ ---enable-newhope \ ---enable-ntru \ ---enable-mgf1 \ ---enable-sha3 \ ---enable-bliss \ ---enable-dnscert \ ---enable-nm \ ---enable-agent \ ---enable-bypass-lan \ ---enable-ruby-gems \ ---enable-python-eggs +--sbindir=/usr/bin \ +--sysconfdir=/etc \ +--libexecdir=/usr/lib \ +--with-ipsecdir=/usr/lib/strongswan \ +--with-nm-ca-dir=/etc/ssl/certs \ +--enable-integrity-test \ +--enable-sqlite \ +--enable-pkcs11 \ +--enable-openssl \ +--enable-curl \ +--enable-sql \ +--enable-attr-sql \ +--enable-farp \ +--enable-dhcp \ +--enable-eap-sim \ +--enable-eap-sim-file \ +--enable-eap-simaka-pseudonym \ +--enable-eap-simaka-re
[arch-commits] Commit in strongswan/trunk (PKGBUILD cve_2018_5388.patch stdint.patch)
Date: Tuesday, September 25, 2018 @ 14:32:32 Author: shibumi Revision: 384809 cleaned up PKGBUILD and removed unnecessary files Modified: strongswan/trunk/PKGBUILD Deleted: strongswan/trunk/cve_2018_5388.patch strongswan/trunk/stdint.patch -+ PKGBUILD| 70 +- cve_2018_5388.patch | 25 - stdint.patch| 11 --- 3 files changed, 52 insertions(+), 54 deletions(-) Modified: PKGBUILD === --- PKGBUILD2018-09-25 14:27:50 UTC (rev 384808) +++ PKGBUILD2018-09-25 14:32:32 UTC (rev 384809) @@ -13,7 +13,7 @@ pkgver=5.7.0 pkgrel=1 pkgdesc="open source IPsec implementation" -url='http://www.strongswan.org' +url='https://www.strongswan.org' license=("GPL2") arch=('x86_64') makedepends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd' @@ -40,8 +40,7 @@ vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf,unity.conf,curve25519.conf,bypass-lan.conf} ) -source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"; -"https://download.strongswan.org/strongswan-${pkgver}.tar.bz2.sig"; +source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2{,.sig}"; 'configure_ac.patch' ) @@ -72,21 +71,56 @@ --enable-integrity-test \ --enable-sqlite \ --enable-pkcs11 \ ---enable-openssl --enable-curl \ ---enable-sql --enable-attr-sql \ ---enable-farp --enable-dhcp \ ---enable-eap-sim --enable-eap-sim-file --enable-eap-simaka-pseudonym \ ---enable-eap-simaka-reauth --enable-eap-identity --enable-eap-md5 \ ---enable-eap-gtc --enable-eap-aka --enable-eap-aka-3gpp2 \ ---enable-eap-mschapv2 --enable-eap-radius --enable-xauth-eap \ ---enable-ha --enable-vici --enable-swanctl --enable-systemd --enable-ext-auth \ ---enable-mysql --enable-ldap --enable-cmd --enable-forecast --enable-connmark \ ---enable-aesni --enable-eap-ttls --enable-radattr --enable-xauth-pam --enable-xauth-noauth \ ---enable-eap-dynamic --enable-eap-peap --enable-eap-tls --enable-chapoly --enable-unity \ ---with-capabilities=libcap --enable-newhope --enable-ntru --enable-mgf1 --enable-sha3 \ ---enable-bliss --enable-dnscert \ ---enable-nm --enable-agent --enable-bypass-lan \ ---enable-ruby-gems --enable-python-eggs +--enable-openssl \ +--enable-curl \ +--enable-sql \ +--enable-attr-sql \ +--enable-farp \ +--enable-dhcp \ +--enable-eap-sim \ +--enable-eap-sim-file \ +--enable-eap-simaka-pseudonym \ +--enable-eap-simaka-reauth \ +--enable-eap-identity \ +--enable-eap-md5 \ +--enable-eap-gtc \ +--enable-eap-aka \ +--enable-eap-aka-3gpp2 \ +--enable-eap-mschapv2 \ +--enable-eap-radius \ +--enable-xauth-eap \ +--enable-ha \ +--enable-vici \ +--enable-swanctl \ +--enable-systemd \ +--enable-ext-auth \ +--enable-mysql \ +--enable-ldap \ +--enable-cmd \ +--enable-forecast \ +--enable-connmark \ +--enable-aesni \ +--enable-eap-ttls \ +--enable-radattr \ +--enable-xauth-pam \ +--enable-xauth-noauth \ +--enable-eap-dynamic \ +--enable-eap-peap \ +--enable-eap-tls \ +--enable-chapoly \ +--enable-unity \ +--with-capabilities=libcap \ +--enable-newhope \ +--enable-ntru \ +--enable-mgf1 \ +--enable-sha3 \ +--enable-bliss \ +--enable-dnscert \ +--enable-nm \ +--enable-agent \ +--enable-bypass-lan \ +--enable-ruby-gems \ +--enable-python-eggs make } Deleted: cve_2018_5388.patch === --- cve_2018_5388.patch 2018-09-25 14:27:50 UTC (rev 384808) +++ cve_2018_5388.patch 2018-09-25 14:32:32 UTC (rev 384809) @@ -1,25 +0,0 @@ -From: Tobias Brunner -Date: Tue, 13 Mar 2018 17:54:08 + (+0100) -Subject: stroke: Ensure a minimum message length -X-Git-Tag: 5.6.3dr1~28 -X-Git-Url: https://git.strongswan.org/?p=strongswan.git;a=commitdiff_plain;h=0acd1ab4 - -stroke: Ensure a minimum message length - -diff --git a/src/libcharon/plugins/stroke/stroke_socket.c b/src/libcharon/plugins/stroke/stroke_socket.c -index c568440..1e7f210 100644 a/src/libcharon/plugins/stroke/stroke_socket.c -+++ b/src/libcharon/plugins/stroke/stroke_socket.c -@@ -627,6 +627,11 @@ static bool on_accept(private_stroke_socket_t *this, stream_t *stream) - } - return FALSE; - } -+ if (len < offsetof(stroke_msg_t, buffer)) -+ { -+ DBG1(DBG_CFG, "invalid stroke message length %d", len); -+
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Monday, September 24, 2018 @ 16:26:27 Author: shibumi Revision: 384637 upgpkg: strongswan 5.7.0-1 This release fixes following security issues: - CVE-2018-16151 - CVE-2018-16152 Furthermore it enables support for smartcards via: `--enable-pkcs11` This closes: #60094 Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD |5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) Modified: PKGBUILD === --- PKGBUILD2018-09-24 16:25:58 UTC (rev 384636) +++ PKGBUILD2018-09-24 16:26:27 UTC (rev 384637) @@ -10,7 +10,7 @@ # Contributor: Thermi pkgname=strongswan -pkgver=5.6.3 +pkgver=5.7.0 pkgrel=1 pkgdesc="open source IPsec implementation" url='http://www.strongswan.org' @@ -47,7 +47,7 @@ validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") -sha512sums=('080402640952b1a08e95bfe9c7f33c6a7dd01ac401b5e7e2e78257c0f2bf0a4d6078141232ac62abfacef892c493f6824948b3165d54d72b4e436ed564fd2609' +sha512sums=('811bfa79aa2b17fcf298c45a2b4109cf4235286e90c4def3e09022ed94c7fa481fc25b8d5054529e4ff4e33011ce6f6ba9874595d16c1a8fe13ef924c4ec6395' 'SKIP' '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') @@ -71,6 +71,7 @@ --with-nm-ca-dir=/etc/ssl/certs \ --enable-integrity-test \ --enable-sqlite \ +--enable-pkcs11 \ --enable-openssl --enable-curl \ --enable-sql --enable-attr-sql \ --enable-farp --enable-dhcp \
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Wednesday, May 30, 2018 @ 20:10:22 Author: shibumi Revision: 333492 upgpkg: strongswan 5.6.3-1 Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD | 11 --- 1 file changed, 4 insertions(+), 7 deletions(-) Modified: PKGBUILD === --- PKGBUILD2018-05-30 19:47:06 UTC (rev 333491) +++ PKGBUILD2018-05-30 20:10:22 UTC (rev 333492) @@ -10,8 +10,8 @@ # Contributor: Thermi pkgname=strongswan -pkgver=5.6.2 -pkgrel=2 +pkgver=5.6.3 +pkgrel=1 pkgdesc="open source IPsec implementation" url='http://www.strongswan.org' license=("GPL2") @@ -43,15 +43,13 @@ source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"; "https://download.strongswan.org/strongswan-${pkgver}.tar.bz2.sig"; 'configure_ac.patch' -'cve_2018_5388.patch' ) validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") -sha512sums=('cf2d5cb6c45d991fe0ad8eed4ea8628f95a1871e9728ddf0985aa26e78d1e6da1c92c961772aafd3e55cfcfa84516204a15561389d373f78140f05607b248c52' +sha512sums=('080402640952b1a08e95bfe9c7f33c6a7dd01ac401b5e7e2e78257c0f2bf0a4d6078141232ac62abfacef892c493f6824948b3165d54d72b4e436ed564fd2609' 'SKIP' - '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74' - '77cfce88de2cb72d69c93f80f607a2f95cfedac45b40c8e9d60e22df07f0a37a617797e0cfa1b6132eb7a748ec694b6621e0e1ee0e80300431efc1a516713fcf') + '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') # We don't build libipsec because it would get loaded before kernel-netlink and netkey, which # would case processing to be handled in user space. Also, the plugin is experimental. If you need it, @@ -59,7 +57,6 @@ prepare() { cd "${srcdir}/${pkgname}-${pkgver}" patch -p1 -l < "${srcdir}/configure_ac.patch" -patch -p1 -l < "${srcdir}/cve_2018_5388.patch" autoreconf }
[arch-commits] Commit in strongswan/trunk (PKGBUILD cve_2018_5388.patch)
Date: Saturday, May 26, 2018 @ 14:11:50 Author: shibumi Revision: 330093 upgpkg: strongswan 5.6.2-2 Fixed CVE-2018-5388 Bugreport: #58719 Added: strongswan/trunk/cve_2018_5388.patch Modified: strongswan/trunk/PKGBUILD -+ PKGBUILD|7 +-- cve_2018_5388.patch | 25 + 2 files changed, 30 insertions(+), 2 deletions(-) Modified: PKGBUILD === --- PKGBUILD2018-05-26 12:51:13 UTC (rev 330092) +++ PKGBUILD2018-05-26 14:11:50 UTC (rev 330093) @@ -11,7 +11,7 @@ pkgname=strongswan pkgver=5.6.2 -pkgrel=1 +pkgrel=2 pkgdesc="open source IPsec implementation" url='http://www.strongswan.org' license=("GPL2") @@ -43,6 +43,7 @@ source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"; "https://download.strongswan.org/strongswan-${pkgver}.tar.bz2.sig"; 'configure_ac.patch' +'cve_2018_5388.patch' ) validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") @@ -49,7 +50,8 @@ sha512sums=('cf2d5cb6c45d991fe0ad8eed4ea8628f95a1871e9728ddf0985aa26e78d1e6da1c92c961772aafd3e55cfcfa84516204a15561389d373f78140f05607b248c52' 'SKIP' - '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') + '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74' + '77cfce88de2cb72d69c93f80f607a2f95cfedac45b40c8e9d60e22df07f0a37a617797e0cfa1b6132eb7a748ec694b6621e0e1ee0e80300431efc1a516713fcf') # We don't build libipsec because it would get loaded before kernel-netlink and netkey, which # would case processing to be handled in user space. Also, the plugin is experimental. If you need it, @@ -57,6 +59,7 @@ prepare() { cd "${srcdir}/${pkgname}-${pkgver}" patch -p1 -l < "${srcdir}/configure_ac.patch" +patch -p1 -l < "${srcdir}/cve_2018_5388.patch" autoreconf } Added: cve_2018_5388.patch === --- cve_2018_5388.patch (rev 0) +++ cve_2018_5388.patch 2018-05-26 14:11:50 UTC (rev 330093) @@ -0,0 +1,25 @@ +From: Tobias Brunner +Date: Tue, 13 Mar 2018 17:54:08 + (+0100) +Subject: stroke: Ensure a minimum message length +X-Git-Tag: 5.6.3dr1~28 +X-Git-Url: https://git.strongswan.org/?p=strongswan.git;a=commitdiff_plain;h=0acd1ab4 + +stroke: Ensure a minimum message length +--- + +diff --git a/src/libcharon/plugins/stroke/stroke_socket.c b/src/libcharon/plugins/stroke/stroke_socket.c +index c568440..1e7f210 100644 +--- a/src/libcharon/plugins/stroke/stroke_socket.c b/src/libcharon/plugins/stroke/stroke_socket.c +@@ -627,6 +627,11 @@ static bool on_accept(private_stroke_socket_t *this, stream_t *stream) + } + return FALSE; + } ++ if (len < offsetof(stroke_msg_t, buffer)) ++ { ++ DBG1(DBG_CFG, "invalid stroke message length %d", len); ++ return FALSE; ++ } + + /* read message (we need an additional byte to terminate the buffer) */ + msg = malloc(len + 1);
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Wednesday, February 21, 2018 @ 14:43:56 Author: shibumi Revision: 296675 upgpkg: strongswan 5.6.2-1 This fixes CVE-2018-6459. See: #57597 Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD |6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) Modified: PKGBUILD === --- PKGBUILD2018-02-21 14:30:21 UTC (rev 296674) +++ PKGBUILD2018-02-21 14:43:56 UTC (rev 296675) @@ -10,8 +10,8 @@ # Contributor: Thermi pkgname=strongswan -pkgver=5.6.1 -pkgrel=2 +pkgver=5.6.2 +pkgrel=1 pkgdesc="open source IPsec implementation" url='http://www.strongswan.org' license=("GPL2") @@ -47,7 +47,7 @@ validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") -sha512sums=('e4bdcf434739cf18544e18635c0b2e34c8b39e9c6c7a7cab31972bae6b1922da324f47c333fc478fa6177f58a2e59c438c48420c74086da1c0555e9a9361834e' +sha512sums=('cf2d5cb6c45d991fe0ad8eed4ea8628f95a1871e9728ddf0985aa26e78d1e6da1c92c961772aafd3e55cfcfa84516204a15561389d373f78140f05607b248c52' 'SKIP' '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74')
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Thursday, December 14, 2017 @ 15:46:07 Author: shibumi Revision: 274418 upgpkg: strongswan 5.6.1-2 Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) Modified: PKGBUILD === --- PKGBUILD2017-12-14 15:25:00 UTC (rev 274417) +++ PKGBUILD2017-12-14 15:46:07 UTC (rev 274418) @@ -11,7 +11,7 @@ pkgname=strongswan pkgver=5.6.1 -pkgrel=1 +pkgrel=2 pkgdesc="open source IPsec implementation" url='http://www.strongswan.org' license=("GPL2") @@ -37,7 +37,7 @@ fips-prf.conf,forecast.conf,gmp.conf,ha.conf,hmac.conf,kernel-netlink.conf,md5.conf,mgf1.conf,nonce.conf,newhope.conf,ntru.conf,openssl.conf,\ pem.conf,pgp.conf,pkcs1.conf,pkcs12.conf,pkcs7.conf,pkcs8.conf,pubkey.conf,random.conf,rc2.conf,resolve.conf,\ revocation.conf,sha1.conf,sha2.conf,sha3.conf,socket-default.conf,sql.conf,sqlite.conf,sshkey.conf,stroke.conf,updown.conf,\ -vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf,unity.conf,curve25519.conf} +vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf,unity.conf,curve25519.conf,bypass-lan.conf} ) source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2";
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Wednesday, November 22, 2017 @ 11:04:50 Author: shibumi Revision: 267914 upgpkg: strongswan 5.6.1-1 removed stdint.patch (fixed upstream) Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD | 11 --- 1 file changed, 4 insertions(+), 7 deletions(-) Modified: PKGBUILD === --- PKGBUILD2017-11-22 10:19:36 UTC (rev 267913) +++ PKGBUILD2017-11-22 11:04:50 UTC (rev 267914) @@ -10,8 +10,8 @@ # Contributor: Thermi pkgname=strongswan -pkgver=5.6.0 -pkgrel=2 +pkgver=5.6.1 +pkgrel=1 pkgdesc="open source IPsec implementation" url='http://www.strongswan.org' license=("GPL2") @@ -43,15 +43,13 @@ source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"; "https://download.strongswan.org/strongswan-${pkgver}.tar.bz2.sig"; 'configure_ac.patch' -'stdint.patch' ) validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") -sha512sums=('9362069a01c3642e62864d88fdb409a3c7514bf7c92cbe36e552c6a80915119cf5bb91c39592aab2d15b562684a0628a764e4fa7636d3b5fd2ebaf165c0ce649' +sha512sums=('e4bdcf434739cf18544e18635c0b2e34c8b39e9c6c7a7cab31972bae6b1922da324f47c333fc478fa6177f58a2e59c438c48420c74086da1c0555e9a9361834e' 'SKIP' - '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74' - 'd24ec19bca6faa56c4f29f6d0b785fc70406850d2884b75982b0ca4f285119799f199a9f7dac3e2929a4380fb444d53b939f242c62d0630d5112bf4ac531ca80') + '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') # We don't build libipsec because it would get loaded before kernel-netlink and netkey, which # would case processing to be handled in user space. Also, the plugin is experimental. If you need it, @@ -59,7 +57,6 @@ prepare() { cd "${srcdir}/${pkgname}-${pkgver}" patch -p1 -l < "${srcdir}/configure_ac.patch" -patch -p1 -l < "${srcdir}/stdint.patch" autoreconf }
[arch-commits] Commit in strongswan/trunk (PKGBUILD stdint.patch)
Date: Friday, October 13, 2017 @ 19:18:18 Author: shibumi Revision: 262633 upgpkg: strongswan 5.6.0-2 This Release fixes: https://bugs.archlinux.org/task/55953 (bypass-lan plugin) https://bugs.archlinux.org/task/55904 (ldap and mysql support) https://bugs.archlinux.org/task/54803 (ruby gem and python egg support) Added: strongswan/trunk/stdint.patch Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD | 22 +++--- stdint.patch | 11 +++ 2 files changed, 26 insertions(+), 7 deletions(-) Modified: PKGBUILD === --- PKGBUILD2017-10-13 19:06:33 UTC (rev 262632) +++ PKGBUILD2017-10-13 19:18:18 UTC (rev 262633) @@ -11,14 +11,19 @@ pkgname=strongswan pkgver=5.6.0 -pkgrel=1 +pkgrel=2 pkgdesc="open source IPsec implementation" url='http://www.strongswan.org' license=("GPL2") arch=('i686' 'x86_64') +makedepends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd' +'systemd' 'pam' 'libnm-glib' 'python' 'ruby' 'mariadb' 'python-setuptools') depends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd' 'pam') -makedepends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd' 'systemd' 'pam' 'libnm-glib') -optdepends=('libnm-glib: for networkmanager support') +optdepends=('libnm-glib: for networkmanager support' +'mariadb: MySQL support' +'ruby: Ruby support' +'python: Python support' +'openldap: LDAP support') backup=( etc/ipsec.conf etc/ipsec.secrets @@ -38,6 +43,7 @@ source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"; "https://download.strongswan.org/strongswan-${pkgver}.tar.bz2.sig"; 'configure_ac.patch' +'stdint.patch' ) validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") @@ -44,7 +50,8 @@ sha512sums=('9362069a01c3642e62864d88fdb409a3c7514bf7c92cbe36e552c6a80915119cf5bb91c39592aab2d15b562684a0628a764e4fa7636d3b5fd2ebaf165c0ce649' 'SKIP' - '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') + '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74' + 'd24ec19bca6faa56c4f29f6d0b785fc70406850d2884b75982b0ca4f285119799f199a9f7dac3e2929a4380fb444d53b939f242c62d0630d5112bf4ac531ca80') # We don't build libipsec because it would get loaded before kernel-netlink and netkey, which # would case processing to be handled in user space. Also, the plugin is experimental. If you need it, @@ -52,6 +59,7 @@ prepare() { cd "${srcdir}/${pkgname}-${pkgver}" patch -p1 -l < "${srcdir}/configure_ac.patch" +patch -p1 -l < "${srcdir}/stdint.patch" autoreconf } @@ -74,13 +82,13 @@ --enable-eap-gtc --enable-eap-aka --enable-eap-aka-3gpp2 \ --enable-eap-mschapv2 --enable-eap-radius --enable-xauth-eap \ --enable-ha --enable-vici --enable-swanctl --enable-systemd --enable-ext-auth \ ---disable-mysql --disable-ldap --enable-cmd --enable-forecast --enable-connmark \ +--enable-mysql --enable-ldap --enable-cmd --enable-forecast --enable-connmark \ --enable-aesni --enable-eap-ttls --enable-radattr --enable-xauth-pam --enable-xauth-noauth \ --enable-eap-dynamic --enable-eap-peap --enable-eap-tls --enable-chapoly --enable-unity \ --with-capabilities=libcap --enable-newhope --enable-ntru --enable-mgf1 --enable-sha3 \ --enable-bliss --enable-dnscert \ ---enable-nm --enable-agent -# --enable-ruby-gems --enable-python-eggs +--enable-nm --enable-agent --enable-bypass-lan \ +--enable-ruby-gems --enable-python-eggs make } Added: stdint.patch === --- stdint.patch(rev 0) +++ stdint.patch2017-10-13 19:18:18 UTC (rev 262633) @@ -0,0 +1,11 @@ +--- strongswan-5.6.0-orig/src/libstrongswan/utils/utils/memory.h2017-08-14 02:48:41.0 -0400 strongswan-5.6.0/src/libstrongswan/utils/utils/memory.h2017-09-12 01:15:29.690527667 -0400 +@@ -14,6 +14,8 @@ + * for more details. + */ + ++#include /* for uintptr_t */ ++ + /** + * @defgroup memory_i memory + * @{ @ingroup utils_i
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Monday, August 14, 2017 @ 19:07:57 Author: shibumi Revision: 250436 upgpkg: strongswan 5.6.0-1 Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD | 13 - 1 file changed, 4 insertions(+), 9 deletions(-) Modified: PKGBUILD === --- PKGBUILD2017-08-14 18:57:07 UTC (rev 250435) +++ PKGBUILD2017-08-14 19:07:57 UTC (rev 250436) @@ -10,8 +10,8 @@ # Contributor: Thermi pkgname=strongswan -pkgver=5.5.3 -pkgrel=4 +pkgver=5.6.0 +pkgrel=1 pkgdesc="open source IPsec implementation" url='http://www.strongswan.org' license=("GPL2") @@ -38,17 +38,13 @@ source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"; "https://download.strongswan.org/strongswan-${pkgver}.tar.bz2.sig"; 'configure_ac.patch' - 'https://download.strongswan.org/security/CVE-2017-11185/strongswan-4.4.0-5.5.3_gmp_mpz_export.patch' - 'https://download.strongswan.org/security/CVE-2017-11185/strongswan-4.4.0-5.5.3_gmp_mpz_export.patch.sig' ) validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") -sha512sums=('0b0b25d2102c98cda54300dc8c3c3a49a55e64f7c695dda65a24f2194f19bce0b7aab9e4f7486c243b552f9d1a94867d6a8782ee504aad1c9973809706d599ac' +sha512sums=('9362069a01c3642e62864d88fdb409a3c7514bf7c92cbe36e552c6a80915119cf5bb91c39592aab2d15b562684a0628a764e4fa7636d3b5fd2ebaf165c0ce649' 'SKIP' - '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74' - '276bcbd0cd3c550ddd4b3f5dfbcb490bb1e50ec8ed97789944409e3c05232903b99332c653cec9c9cf46eab445fd67113d1babef32156b1a5c77a68d2b83260b' -'SKIP') + '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') # We don't build libipsec because it would get loaded before kernel-netlink and netkey, which # would case processing to be handled in user space. Also, the plugin is experimental. If you need it, @@ -56,7 +52,6 @@ prepare() { cd "${srcdir}/${pkgname}-${pkgver}" patch -p1 -l < "${srcdir}/configure_ac.patch" -patch -p1 -l < "${srcdir}/strongswan-4.4.0-5.5.3_gmp_mpz_export.patch" autoreconf }
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Monday, August 14, 2017 @ 18:40:57 Author: shibumi Revision: 250420 upgpkg: strongswan 5.5.3-4 Security update Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD |9 +++-- 1 file changed, 7 insertions(+), 2 deletions(-) Modified: PKGBUILD === --- PKGBUILD2017-08-14 18:34:28 UTC (rev 250419) +++ PKGBUILD2017-08-14 18:40:57 UTC (rev 250420) @@ -11,7 +11,7 @@ pkgname=strongswan pkgver=5.5.3 -pkgrel=3 +pkgrel=4 pkgdesc="open source IPsec implementation" url='http://www.strongswan.org' license=("GPL2") @@ -38,6 +38,8 @@ source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"; "https://download.strongswan.org/strongswan-${pkgver}.tar.bz2.sig"; 'configure_ac.patch' + 'https://download.strongswan.org/security/CVE-2017-11185/strongswan-4.4.0-5.5.3_gmp_mpz_export.patch' + 'https://download.strongswan.org/security/CVE-2017-11185/strongswan-4.4.0-5.5.3_gmp_mpz_export.patch.sig' ) validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") @@ -44,7 +46,9 @@ sha512sums=('0b0b25d2102c98cda54300dc8c3c3a49a55e64f7c695dda65a24f2194f19bce0b7aab9e4f7486c243b552f9d1a94867d6a8782ee504aad1c9973809706d599ac' 'SKIP' - '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74') + '0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74' + '276bcbd0cd3c550ddd4b3f5dfbcb490bb1e50ec8ed97789944409e3c05232903b99332c653cec9c9cf46eab445fd67113d1babef32156b1a5c77a68d2b83260b' +'SKIP') # We don't build libipsec because it would get loaded before kernel-netlink and netkey, which # would case processing to be handled in user space. Also, the plugin is experimental. If you need it, @@ -52,6 +56,7 @@ prepare() { cd "${srcdir}/${pkgname}-${pkgver}" patch -p1 -l < "${srcdir}/configure_ac.patch" +patch -p1 -l < "${srcdir}/strongswan-4.4.0-5.5.3_gmp_mpz_export.patch" autoreconf }
[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Date: Friday, July 14, 2017 @ 20:28:37 Author: shibumi Revision: 245124 upgpkg: strongswan 5.5.3-3 --enabled-agent + minor PKGBUILD fixes Modified: strongswan/trunk/PKGBUILD --+ PKGBUILD | 15 ++- 1 file changed, 6 insertions(+), 9 deletions(-) Modified: PKGBUILD === --- PKGBUILD2017-07-14 20:23:54 UTC (rev 245123) +++ PKGBUILD2017-07-14 20:28:37 UTC (rev 245124) @@ -11,16 +11,14 @@ pkgname=strongswan pkgver=5.5.3 -pkgrel=2 +pkgrel=3 pkgdesc="open source IPsec implementation" url='http://www.strongswan.org' -license=("GPL") +license=("GPL2") arch=('i686' 'x86_64') depends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd' 'pam') makedepends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd' 'systemd' 'pam' 'libnm-glib') optdepends=('libnm-glib: for networkmanager support') -conflicts=('openswan') -options=(!libtool !strip) backup=( etc/ipsec.conf etc/ipsec.secrets @@ -39,7 +37,7 @@ source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"; "https://download.strongswan.org/strongswan-${pkgver}.tar.bz2.sig"; -"configure_ac.patch" +'configure_ac.patch' ) validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77") @@ -51,8 +49,7 @@ # We don't build libipsec because it would get loaded before kernel-netlink and netkey, which # would case processing to be handled in user space. Also, the plugin is experimental. If you need it, # add --enable-libipsec and --enable-kernel-libipsec -prepare() -{ +prepare() { cd "${srcdir}/${pkgname}-${pkgver}" patch -p1 -l < "${srcdir}/configure_ac.patch" autoreconf @@ -82,7 +79,7 @@ --enable-eap-dynamic --enable-eap-peap --enable-eap-tls --enable-chapoly --enable-unity \ --with-capabilities=libcap --enable-newhope --enable-ntru --enable-mgf1 --enable-sha3 \ --enable-bliss --enable-dnscert \ ---enable-nm +--enable-nm --enable-agent # --enable-ruby-gems --enable-python-eggs make } @@ -89,6 +86,6 @@ package() { cd "${srcdir}/${pkgname}-${pkgver}" - make DESTDIR=${pkgdir} install + make DESTDIR="${pkgdir}" install }