summarylogtreecommitdiffstats
diff options
context:
space:
mode:
authorStanislaw Datskevich2016-06-21 20:10:24 +0300
committerStanislaw Datskevich2016-06-21 20:10:24 +0300
commitb4c495420cef0aed6bf522fbbe2ad285ff2049d8 (patch)
tree171f4a8d57aba4e74f3a1fd5e4b8e7b00d3eb18c
downloadaur-b4c495420cef0aed6bf522fbbe2ad285ff2049d8.tar.gz
Initial commit
-rw-r--r--.SRCINFO104
-rw-r--r--PKGBUILD88
-rw-r--r--configure_ac.patch16
3 files changed, 208 insertions, 0 deletions
diff --git a/.SRCINFO b/.SRCINFO
new file mode 100644
index 000000000000..02a33c7053c8
--- /dev/null
+++ b/.SRCINFO
@@ -0,0 +1,104 @@
+pkgbase = strongswan-pkcs11
+ pkgdesc = The best OpenSource IPsec implementation with PKCS11 support
+ pkgver = 5.4.0
+ pkgrel = 3
+ url = http://www.strongswan.org
+ arch = i686
+ arch = x86_64
+ license = GPL
+ makedepends = curl
+ makedepends = gmp
+ makedepends = iproute2
+ makedepends = openssl
+ makedepends = sqlite
+ makedepends = libcap
+ makedepends = libsystemd
+ makedepends = systemd
+ depends = curl
+ depends = gmp
+ depends = iproute2
+ depends = openssl
+ depends = sqlite
+ depends = libcap
+ depends = libsystemd
+ provides = strongswan=5.4.0-3
+ conflicts = openswan,
+ conflicts = strongswan
+ options = !libtool
+ backup = etc/ipsec.conf
+ backup = etc/swanctl/swanctl.conf
+ backup = etc/strongswan.conf
+ backup = etc/strongswan.d/charon-logging.conf
+ backup = etc/strongswan.d/charon.conf
+ backup = etc/strongswan.d/pki.conf
+ backup = etc/strongswan.d/pool.conf
+ backup = etc/strongswan.d/scepclient.conf
+ backup = etc/strongswan.d/starter.conf
+ backup = etc/strongswan.d/swanctl.conf
+ backup = etc/strongswan.d/charon/aesni.conf
+ backup = etc/strongswan.d/charon/attr-sql.conf
+ backup = etc/strongswan.d/charon/attr.conf
+ backup = etc/strongswan.d/charon/cmac.conf
+ backup = etc/strongswan.d/charon/connmark.conf
+ backup = etc/strongswan.d/charon/constraints.conf
+ backup = etc/strongswan.d/charon/curl.conf
+ backup = etc/strongswan.d/charon/des.conf
+ backup = etc/strongswan.d/charon/dhcp.conf
+ backup = etc/strongswan.d/charon/dnskey.conf
+ backup = etc/strongswan.d/charon/eap-aka-3gpp2.conf
+ backup = etc/strongswan.d/charon/eap-aka.conf
+ backup = etc/strongswan.d/charon/eap-gtc.conf
+ backup = etc/strongswan.d/charon/eap-identity.conf
+ backup = etc/strongswan.d/charon/eap-md5.conf
+ backup = etc/strongswan.d/charon/eap-mschapv2.conf
+ backup = etc/strongswan.d/charon/eap-radius.conf
+ backup = etc/strongswan.d/charon/eap-sim-file.conf
+ backup = etc/strongswan.d/charon/eap-sim.conf
+ backup = etc/strongswan.d/charon/eap-simaka-pseudonym.conf
+ backup = etc/strongswan.d/charon/eap-simaka-reauth.conf
+ backup = etc/strongswan.d/charon/eap-tls.conf
+ backup = etc/strongswan.d/charon/ext-auth.conf
+ backup = etc/strongswan.d/charon/farp.conf
+ backup = etc/strongswan.d/charon/fips-prf.conf
+ backup = etc/strongswan.d/charon/forecast.conf
+ backup = etc/strongswan.d/charon/gmp.conf
+ backup = etc/strongswan.d/charon/ha.conf
+ backup = etc/strongswan.d/charon/hmac.conf
+ backup = etc/strongswan.d/charon/kernel-netlink.conf
+ backup = etc/strongswan.d/charon/md5.conf
+ backup = etc/strongswan.d/charon/nonce.conf
+ backup = etc/strongswan.d/charon/openssl.conf
+ backup = etc/strongswan.d/charon/pem.conf
+ backup = etc/strongswan.d/charon/pgp.conf
+ backup = etc/strongswan.d/charon/pkcs1.conf
+ backup = etc/strongswan.d/charon/pkcs12.conf
+ backup = etc/strongswan.d/charon/pkcs7.conf
+ backup = etc/strongswan.d/charon/pkcs8.conf
+ backup = etc/strongswan.d/charon/pubkey.conf
+ backup = etc/strongswan.d/charon/random.conf
+ backup = etc/strongswan.d/charon/rc2.conf
+ backup = etc/strongswan.d/charon/resolve.conf
+ backup = etc/strongswan.d/charon/revocation.conf
+ backup = etc/strongswan.d/charon/sha1.conf
+ backup = etc/strongswan.d/charon/sha2.conf
+ backup = etc/strongswan.d/charon/socket-default.conf
+ backup = etc/strongswan.d/charon/sql.conf
+ backup = etc/strongswan.d/charon/sqlite.conf
+ backup = etc/strongswan.d/charon/sshkey.conf
+ backup = etc/strongswan.d/charon/stroke.conf
+ backup = etc/strongswan.d/charon/updown.conf
+ backup = etc/strongswan.d/charon/vici.conf
+ backup = etc/strongswan.d/charon/x509.conf
+ backup = etc/strongswan.d/charon/xauth-eap.conf
+ backup = etc/strongswan.d/charon/xauth-generic.conf
+ backup = etc/strongswan.d/charon/xcbc.conf
+ backup = etc/strongswan.d/charon/chapoly.conf
+ backup = etc/strongswan.d/charon/unity.conf
+ backup = etc/strongswan.d/charon/pkcs11.conf
+ source = https://download.strongswan.org/strongswan-5.4.0.tar.bz2
+ source = configure_ac.patch
+ sha256sums = f8288faaea6a9cd8a7d413c0b76b7922be5da3dfcd01fd05cb30d2c55d3bbe89
+ sha256sums = 003750d77fa501075f1fdb6f55926dc544407c5dd26e2fd8d5eb4917ddf0b3f7
+
+pkgname = strongswan-pkcs11
+
diff --git a/PKGBUILD b/PKGBUILD
new file mode 100644
index 000000000000..e8a3abae6b88
--- /dev/null
+++ b/PKGBUILD
@@ -0,0 +1,88 @@
+## Contributor: nikicat <develniks at gmail dot com>
+# Contributor: danilo <gezuru at gmail dot com>
+# Contributor: Jason Begley <jayray at digitalgoat dot com>
+# Contributor: Ray Kohler <ataraxia937 at gmail dot com>
+# Contributor: Daniel Riedemann <daniel.riedemann [at] googlemail [dot] com>
+# Contributor: 458italia <svenskaparadox [at] gmail dot com>
+# Contributor: Thermi <noel [at] familie-kuntze dot com>
+# Contributor: dkorzhevin <dkorzhevin at gmail dot com>
+# Contributor: Thermi <noel [at] familie-kuntze dot de>
+# Maintainer: Stanislaw Datskevich < me AT nek0.net >
+
+pkgname=strongswan-pkcs11
+pkgver=5.4.0
+pkgrel=3
+provides=("${pkgname/-pkcs11}=${pkgver}-${pkgrel}")
+pkgdesc="The best OpenSource IPsec implementation with PKCS11 support"
+url='http://www.strongswan.org'
+license=("GPL")
+arch=('i686' 'x86_64')
+depends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd')
+makedepends=('curl' 'gmp' 'iproute2' 'openssl' 'sqlite' 'libcap' 'libsystemd' 'systemd')
+conflicts=('openswan', "${pkgname/-pkcs11}")
+options=(!libtool)
+backup=(
+ etc/ipsec.conf
+ etc/swanctl/swanctl.conf
+ etc/strongswan.conf
+ etc/strongswan.d/{charon-logging.conf,charon.conf,pki.conf,pool.conf,scepclient.conf,starter.conf,swanctl.conf}
+ etc/strongswan.d/charon/{aesni.conf,attr-sql.conf,attr.conf,cmac.conf,connmark.conf,\
+constraints.conf,curl.conf,des.conf,dhcp.conf,dnskey.conf,eap-aka-3gpp2.conf,eap-aka.conf,\
+eap-gtc.conf,eap-identity.conf,eap-md5.conf,eap-mschapv2.conf,eap-radius.conf,eap-sim-file.conf,\
+eap-sim.conf,eap-simaka-pseudonym.conf,eap-simaka-reauth.conf,eap-tls.conf,ext-auth.conf,farp.conf,\
+fips-prf.conf,forecast.conf,gmp.conf,ha.conf,hmac.conf,kernel-netlink.conf,md5.conf,nonce.conf,openssl.conf,\
+pem.conf,pgp.conf,pkcs1.conf,pkcs12.conf,pkcs7.conf,pkcs8.conf,pubkey.conf,random.conf,rc2.conf,resolve.conf,\
+revocation.conf,sha1.conf,sha2.conf,socket-default.conf,sql.conf,sqlite.conf,sshkey.conf,stroke.conf,updown.conf,\
+vici.conf,x509.conf,xauth-eap.conf,xauth-generic.conf,xcbc.conf,chapoly.conf,unity.conf,pkcs11.conf}
+)
+
+source=("https://download.strongswan.org/strongswan-${pkgver}.tar.bz2"
+ "configure_ac.patch"
+ )
+
+# md5 is broken. We use sha256 now. Alternatively, we could check the signature of the file, but that
+# doesn't yield any more security and just increases the work users initially have to invest.
+sha256sums=('f8288faaea6a9cd8a7d413c0b76b7922be5da3dfcd01fd05cb30d2c55d3bbe89'
+ '003750d77fa501075f1fdb6f55926dc544407c5dd26e2fd8d5eb4917ddf0b3f7')
+
+# We don't build libipsec because it would get loaded before kernel-netlink and netkey, which
+# would case processing to be handled in user space. Also, the plugin is experimental. If you need it,
+# add --enable-libipsec and --enable-kernel-libipsec
+prepare()
+{
+ cd "${srcdir}/${pkgname/-pkcs11}-${pkgver}"
+ patch -p1 -l < "${srcdir}/configure_ac.patch"
+ autoreconf
+}
+
+build() {
+ cd "${srcdir}/${pkgname/-pkcs11}-${pkgver}"
+
+ ./configure --prefix=/usr \
+ --sbindir=/usr/bin \
+ --sysconfdir=/etc \
+ --libexecdir=/usr/lib \
+ --with-ipsecdir=/usr/lib/strongswan \
+ --enable-sqlite \
+ --enable-openssl --enable-curl \
+ --enable-sql --enable-attr-sql \
+ --enable-farp --enable-dhcp \
+ --enable-eap-sim --enable-eap-sim-file --enable-eap-simaka-pseudonym \
+ --enable-eap-simaka-reauth --enable-eap-identity --enable-eap-md5 \
+ --enable-eap-gtc --enable-eap-aka --enable-eap-aka-3gpp2 \
+ --enable-eap-mschapv2 --enable-eap-radius --enable-xauth-eap \
+ --enable-ha --enable-vici --enable-swanctl --enable-systemd --enable-ext-auth \
+ --disable-mysql --disable-ldap -enable-cmd --enable-forecast --enable-connmark \
+ --enable-aesni --enable-eap-ttls --enable-radattr --enable-xauth-pam --enable-xauth-noauth \
+ --enable-eap-dynamic --enable-eap-peap --enable-eap-tls --enable-chapoly --enable-unity \
+ --with-capabilities=libcap \
+ --enable-pkcs11
+# --enable-ruby-gems --enable-python-eggs
+ make
+}
+
+package() {
+ cd "${srcdir}/${pkgname/-pkcs11}-${pkgver}"
+ make DESTDIR=${pkgdir} install
+}
+
diff --git a/configure_ac.patch b/configure_ac.patch
new file mode 100644
index 000000000000..5299520638ea
--- /dev/null
+++ b/configure_ac.patch
@@ -0,0 +1,16 @@
+--- a/configure.ac 2016-03-22 09:36:03.000000000 +0100
++++ b/configure.ac 2016-03-26 18:35:44.697586161 +0100
+@@ -946,10 +946,10 @@
+ PKG_CHECK_MODULES(systemd, [libsystemd >= 209],
+ [AC_SUBST(systemd_CFLAGS)
+ AC_SUBST(systemd_LIBS)],
+- [PKG_CHECK_MODULES(systemd_daemon, [libsystemd-daemon])
++ [PKG_CHECK_MODULES(systemd_daemon, [libsystemd])
+ AC_SUBST(systemd_daemon_CFLAGS)
+ AC_SUBST(systemd_daemon_LIBS)
+- PKG_CHECK_MODULES(systemd_journal, [libsystemd-journal])
++ PKG_CHECK_MODULES(systemd_journal, [libsystemd])
+ AC_SUBST(systemd_journal_CFLAGS)
+ AC_SUBST(systemd_journal_LIBS)]
+ )
+