[arch-commits] Commit in strongswan/trunk (PKGBUILD)
Levente Polyak
anthraxx at archlinux.org
Mon Oct 1 20:35:13 UTC 2018
Date: Monday, October 1, 2018 @ 20:35:12
Author: anthraxx
Revision: 388920
upgpkg: strongswan 5.7.1-1 (security update)
Modified:
strongswan/trunk/PKGBUILD
----------+
PKGBUILD | 143 ++++++++++++++++++++++++++++++-------------------------------
1 file changed, 72 insertions(+), 71 deletions(-)
Modified: PKGBUILD
===================================================================
--- PKGBUILD 2018-10-01 19:23:06 UTC (rev 388919)
+++ PKGBUILD 2018-10-01 20:35:12 UTC (rev 388920)
@@ -10,14 +10,14 @@
# Contributor: Thermi <noel [at] familie-kuntze dot com>
pkgname=strongswan
-pkgver=5.7.0
+pkgver=5.7.1
pkgrel=1
-pkgdesc="open source IPsec implementation"
+pkgdesc='Open source IPsec implementation'
url='https://www.strongswan.org'
-license=("GPL2")
+license=('GPL2')
arch=('x86_64')
makedepends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd'
-'systemd' 'pam' 'libnm-glib' 'python' 'ruby' 'mariadb' 'python-setuptools')
+ 'systemd' 'pam' 'libnm-glib' 'python' 'ruby' 'mariadb' 'python-setuptools')
depends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd' 'pam')
optdepends=('libnm-glib: for networkmanager support'
'mariadb: MySQL support'
@@ -24,6 +24,7 @@
'ruby: Ruby support'
'python: Python support'
'openldap: LDAP support')
+# TODO: move to package() and use find
backup=(
etc/ipsec.conf
etc/ipsec.secrets
@@ -40,13 +41,12 @@
vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf,unity.conf,curve25519.conf,bypass-lan.conf}
)
-source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2{,.sig}"
- 'configure_ac.patch'
- )
+source=(https://download.strongswan.org/strongswan-${pkgver}.tar.bz2{,.sig}
+ configure_ac.patch)
validpgpkeys=("948F158A4E76A27BF3D07532DF42C170B34DBA77")
-sha512sums=('811bfa79aa2b17fcf298c45a2b4109cf4235286e90c4def3e09022ed94c7fa481fc25b8d5054529e4ff4e33011ce6f6ba9874595d16c1a8fe13ef924c4ec6395'
+sha512sums=('43102814434bee7c27a5956be59099cc4ffb9bb5b0d6382ce4c6a80d1d82ed6639f698f5f5544b9ca563554a344638c953525b0e2d39bc6b71b19055c80e07fc'
'SKIP'
'0e2c818f2f620410dda949d9016a4c1a686bf2946acb3b42a729b2376c077f4dad6762fe8d2f736c213c4895c1fbd60c0d654a1c36f72d06f58ba7cff635bc74')
@@ -54,78 +54,79 @@
# would case processing to be handled in user space. Also, the plugin is experimental. If you need it,
# add --enable-libipsec and --enable-kernel-libipsec
prepare() {
- cd "${srcdir}/${pkgname}-${pkgver}"
- patch -p1 -l < "${srcdir}/configure_ac.patch"
- autoreconf
+ cd ${pkgname}-${pkgver}
+ patch -p1 -l < "${srcdir}/configure_ac.patch"
+ autoreconf -fiv
}
build() {
- cd "${srcdir}/${pkgname}-${pkgver}"
+ cd ${pkgname}-${pkgver}
./configure --prefix=/usr \
- --sbindir=/usr/bin \
- --sysconfdir=/etc \
- --libexecdir=/usr/lib \
- --with-ipsecdir=/usr/lib/strongswan \
- --with-nm-ca-dir=/etc/ssl/certs \
- --enable-integrity-test \
- --enable-sqlite \
- --enable-pkcs11 \
- --enable-openssl \
- --enable-curl \
- --enable-sql \
- --enable-attr-sql \
- --enable-farp \
- --enable-dhcp \
- --enable-eap-sim \
- --enable-eap-sim-file \
- --enable-eap-simaka-pseudonym \
- --enable-eap-simaka-reauth \
- --enable-eap-identity \
- --enable-eap-md5 \
- --enable-eap-gtc \
- --enable-eap-aka \
- --enable-eap-aka-3gpp2 \
- --enable-eap-mschapv2 \
- --enable-eap-radius \
- --enable-xauth-eap \
- --enable-ha \
- --enable-vici \
- --enable-swanctl \
- --enable-systemd \
- --enable-ext-auth \
- --enable-mysql \
- --enable-ldap \
- --enable-cmd \
- --enable-forecast \
- --enable-connmark \
- --enable-aesni \
- --enable-eap-ttls \
- --enable-radattr \
- --enable-xauth-pam \
- --enable-xauth-noauth \
- --enable-eap-dynamic \
- --enable-eap-peap \
- --enable-eap-tls \
- --enable-chapoly \
- --enable-unity \
- --with-capabilities=libcap \
- --enable-newhope \
- --enable-ntru \
- --enable-mgf1 \
- --enable-sha3 \
- --enable-bliss \
- --enable-dnscert \
- --enable-nm \
- --enable-agent \
- --enable-bypass-lan \
- --enable-ruby-gems \
- --enable-python-eggs
+ --sbindir=/usr/bin \
+ --sysconfdir=/etc \
+ --libexecdir=/usr/lib \
+ --with-ipsecdir=/usr/lib/strongswan \
+ --with-nm-ca-dir=/etc/ssl/certs \
+ --enable-integrity-test \
+ --enable-sqlite \
+ --enable-pkcs11 \
+ --enable-openssl \
+ --enable-curl \
+ --enable-sql \
+ --enable-attr-sql \
+ --enable-farp \
+ --enable-dhcp \
+ --enable-eap-sim \
+ --enable-eap-sim-file \
+ --enable-eap-simaka-pseudonym \
+ --enable-eap-simaka-reauth \
+ --enable-eap-identity \
+ --enable-eap-md5 \
+ --enable-eap-gtc \
+ --enable-eap-aka \
+ --enable-eap-aka-3gpp2 \
+ --enable-eap-mschapv2 \
+ --enable-eap-radius \
+ --enable-xauth-eap \
+ --enable-ha \
+ --enable-vici \
+ --enable-swanctl \
+ --enable-systemd \
+ --enable-ext-auth \
+ --enable-mysql \
+ --enable-ldap \
+ --enable-cmd \
+ --enable-forecast \
+ --enable-connmark \
+ --enable-aesni \
+ --enable-eap-ttls \
+ --enable-radattr \
+ --enable-xauth-pam \
+ --enable-xauth-noauth \
+ --enable-eap-dynamic \
+ --enable-eap-peap \
+ --enable-eap-tls \
+ --enable-chapoly \
+ --enable-unity \
+ --with-capabilities=libcap \
+ --enable-newhope \
+ --enable-ntru \
+ --enable-mgf1 \
+ --enable-sha3 \
+ --enable-bliss \
+ --enable-dnscert \
+ --enable-nm \
+ --enable-agent \
+ --enable-bypass-lan \
+ --enable-ruby-gems \
+ --enable-python-eggs
make
}
package() {
- cd "${srcdir}/${pkgname}-${pkgver}"
+ cd ${pkgname}-${pkgver}
make DESTDIR="${pkgdir}" install
}
+# vim: ts=2 sw=2 et:
More information about the arch-commits
mailing list