diff options
author | Anthony G. Basile <blueness@gentoo.org> | 2015-04-20 21:27:45 +0000 |
---|---|---|
committer | Anthony G. Basile <blueness@gentoo.org> | 2015-04-20 21:27:45 +0000 |
commit | 49999bf2e6aa2901d87a00cfe445dad974f469ed (patch) | |
tree | 11f47ab3ecd640f595a9bde830ce2ebeae0a35a7 /net-misc | |
parent | version bump (diff) | |
download | gentoo-2-49999bf2e6aa2901d87a00cfe445dad974f469ed.tar.gz gentoo-2-49999bf2e6aa2901d87a00cfe445dad974f469ed.tar.bz2 gentoo-2-49999bf2e6aa2901d87a00cfe445dad974f469ed.zip |
Version bump.
(Portage version: 2.2.18/cvs/Linux x86_64, signed Manifest commit with key 0xF52D4BBA)
Diffstat (limited to 'net-misc')
-rw-r--r-- | net-misc/stunnel/ChangeLog | 7 | ||||
-rw-r--r-- | net-misc/stunnel/stunnel-5.16.ebuild | 80 |
2 files changed, 86 insertions, 1 deletions
diff --git a/net-misc/stunnel/ChangeLog b/net-misc/stunnel/ChangeLog index 82d409f002dc..aa8a467d97a3 100644 --- a/net-misc/stunnel/ChangeLog +++ b/net-misc/stunnel/ChangeLog @@ -1,6 +1,11 @@ # ChangeLog for net-misc/stunnel # Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/net-misc/stunnel/ChangeLog,v 1.218 2015/04/19 09:41:41 ago Exp $ +# $Header: /var/cvsroot/gentoo-x86/net-misc/stunnel/ChangeLog,v 1.219 2015/04/20 21:27:45 blueness Exp $ + +*stunnel-5.16 (20 Apr 2015) + + 20 Apr 2015; Anthony G. Basile <blueness@gentoo.org> +stunnel-5.16.ebuild: + Version bump. 19 Apr 2015; Agostino Sarubbo <ago@gentoo.org> stunnel-5.14.ebuild: Stable for x86, wrt bug #546908 diff --git a/net-misc/stunnel/stunnel-5.16.ebuild b/net-misc/stunnel/stunnel-5.16.ebuild new file mode 100644 index 000000000000..77b5c6e4a32a --- /dev/null +++ b/net-misc/stunnel/stunnel-5.16.ebuild @@ -0,0 +1,80 @@ +# Copyright 1999-2015 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/net-misc/stunnel/stunnel-5.16.ebuild,v 1.1 2015/04/20 21:27:45 blueness Exp $ + +EAPI="5" + +inherit ssl-cert eutils systemd user + +DESCRIPTION="TLS/SSL - Port Wrapper" +HOMEPAGE="http://www.stunnel.org/index.html" +SRC_URI="ftp://ftp.stunnel.org/stunnel/archive/${PV%%.*}.x/${P}.tar.gz + http://www.usenix.org.uk/mirrors/stunnel/archive/${PV%%.*}.x/${P}.tar.gz + http://ftp.nluug.nl/pub/networking/stunnel/archive/${PV%%.*}.x/${P}.tar.gz + http://www.namesdir.com/mirrors/stunnel/archive/${PV%%.*}.x/${P}.tar.gz + http://stunnel.cybermirror.org/archive/${PV%%.*}.x/${P}.tar.gz + http://mirrors.zerg.biz/stunnel/archive/${PV%%.*}.x/${P}.tar.gz + ftp://mirrors.go-parts.com/stunnel/archive/${PV%%.*}.x/${P}.tar.gz" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~ppc ~ppc64 ~s390 ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x86-macos" +IUSE="ipv6 selinux tcpd" + +DEPEND="tcpd? ( sys-apps/tcp-wrappers ) + dev-libs/openssl" +RDEPEND="${DEPEND} + selinux? ( sec-policy/selinux-stunnel )" + +pkg_setup() { + enewgroup stunnel + enewuser stunnel -1 -1 -1 stunnel +} + +src_prepare() { + # Hack away generation of certificate + sed -i -e "s/^install-data-local:/do-not-run-this:/" \ + tools/Makefile.in || die "sed failed" +} + +src_configure() { + econf \ + $(use_enable ipv6) \ + $(use_enable tcpd libwrap) \ + --with-ssl="${EPREFIX}"/usr \ + --disable-fips +} + +src_install() { + emake DESTDIR="${D}" install + rm -rf "${ED}"/usr/share/doc/${PN} + rm -f "${ED}"/etc/stunnel/stunnel.conf-sample "${ED}"/usr/bin/stunnel3 \ + "${ED}"/usr/share/man/man8/stunnel.{fr,pl}.8 + + # The binary was moved to /usr/bin with 4.21, + # symlink for backwards compatibility + dosym ../bin/stunnel /usr/sbin/stunnel + + dodoc AUTHORS BUGS CREDITS PORTS README TODO ChangeLog + dohtml doc/stunnel.html doc/en/VNC_StunnelHOWTO.html tools/ca.html \ + tools/importCA.html + + insinto /etc/stunnel + doins "${FILESDIR}"/stunnel.conf + doinitd "${FILESDIR}"/stunnel + + systemd_dounit "${S}/tools/stunnel.service" + systemd_newtmpfilesd "${FILESDIR}"/stunnel.tmpfiles.conf stunnel.conf +} + +pkg_postinst() { + if [ ! -f "${EROOT}"/etc/stunnel/stunnel.key ]; then + install_cert /etc/stunnel/stunnel + chown stunnel:stunnel "${EROOT}"/etc/stunnel/stunnel.{crt,csr,key,pem} + chmod 0640 "${EROOT}"/etc/stunnel/stunnel.{crt,csr,key,pem} + fi + + einfo "If you want to run multiple instances of stunnel, create a new config" + einfo "file ending with .conf in /etc/stunnel/. **Make sure** you change " + einfo "\'pid= \' with a unique filename." +} |