blob: aeb7f67c091dbab9ca5d6c89bf61dee92a98ed04 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
|
# Copyright 1999-2023 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=8
PYTHON_COMPAT=( python3_{10..12} )
VERIFY_SIG_OPENPGP_KEY_PATH="${BROOT}"/usr/share/openpgp-keys/torproject.org.asc
inherit python-any-r1 readme.gentoo-r1 systemd verify-sig
MY_PV="$(ver_rs 4 -)"
MY_PF="${PN}-${MY_PV}"
DESCRIPTION="Anonymizing overlay network for TCP"
HOMEPAGE="https://www.torproject.org/ https://gitlab.torproject.org/tpo/core/tor/"
if [[ ${PV} == 9999 ]] ; then
EGIT_REPO_URI="https://gitlab.torproject.org/tpo/core/tor"
inherit autotools git-r3
else
SRC_URI="
https://www.torproject.org/dist/${MY_PF}.tar.gz
https://archive.torproject.org/tor-package-archive/${MY_PF}.tar.gz
verify-sig? (
https://dist.torproject.org/${MY_PF}.tar.gz.sha256sum
https://dist.torproject.org/${MY_PF}.tar.gz.sha256sum.asc
)
"
S="${WORKDIR}/${MY_PF}"
if [[ ${PV} != *_alpha* && ${PV} != *_beta* && ${PV} != *_rc* ]]; then
KEYWORDS="amd64 ~arm ~arm64 ~hppa ~mips ppc ppc64 ~riscv ~sparc x86 ~ppc-macos"
fi
BDEPEND="verify-sig? ( >=sec-keys/openpgp-keys-tor-20230727 )"
fi
LICENSE="BSD GPL-2"
SLOT="0"
IUSE="caps doc lzma +man scrypt seccomp selinux +server systemd tor-hardening test zstd"
RESTRICT="!test? ( test )"
DEPEND="
>=dev-libs/libevent-2.1.12-r1:=[ssl]
sys-libs/zlib
caps? ( sys-libs/libcap )
man? ( app-text/asciidoc )
dev-libs/openssl:=[-bindist(-)]
lzma? ( app-arch/xz-utils )
scrypt? ( app-crypt/libscrypt )
seccomp? ( >=sys-libs/libseccomp-2.4.1 )
systemd? ( sys-apps/systemd )
zstd? ( app-arch/zstd )
"
RDEPEND="
acct-user/tor
acct-group/tor
${DEPEND}
selinux? ( sec-policy/selinux-tor )
"
DEPEND+="
test? (
${DEPEND}
${PYTHON_DEPS}
)
"
DOCS=()
PATCHES=(
"${FILESDIR}"/${PN}-0.2.7.4-torrc.sample.patch
)
pkg_setup() {
use test && python-any-r1_pkg_setup
}
src_unpack() {
if [[ ${PV} == 9999 ]] ; then
git-r3_src_unpack
else
if use verify-sig; then
cd "${DISTDIR}" || die
verify-sig_verify_detached ${MY_PF}.tar.gz.sha256sum{,.asc}
verify-sig_verify_unsigned_checksums \
${MY_PF}.tar.gz.sha256sum sha256 ${MY_PF}.tar.gz
cd "${WORKDIR}" || die
fi
default
fi
}
src_prepare() {
default
# Running shellcheck automagically isn't useful for ebuild testing.
echo "exit 0" > scripts/maint/checkShellScripts.sh || die
if [[ ${PV} == 9999 ]] ; then
eautoreconf
fi
}
src_configure() {
use doc && DOCS+=( README.md ChangeLog ReleaseNotes doc/HACKING )
export ac_cv_lib_cap_cap_init=$(usex caps)
export tor_cv_PYTHON="${EPYTHON}"
local myeconfargs=(
--localstatedir="${EPREFIX}/var"
--disable-all-bugs-are-fatal
--enable-system-torrc
--disable-android
--disable-coverage
--disable-html-manual
--disable-libfuzzer
--enable-missing-doc-warnings
--disable-module-dirauth
--enable-pic
--disable-restart-debugging
# This option is enabled by default upstream w/ zstd, surprisingly.
# zstd upstream says this shouldn't be relied upon and it may
# break API & ABI at any point, so Tor tries to fake static-linking
# to make it work, but then requires a rebuild on any new zstd version
# even when its standard ABI hasn't changed.
# See bug #727406 and bug #905708.
--disable-zstd-advanced-apis
$(use_enable man asciidoc)
$(use_enable man manpage)
$(use_enable lzma)
$(use_enable scrypt libscrypt)
$(use_enable seccomp)
$(use_enable server module-relay)
$(use_enable systemd)
$(use_enable tor-hardening gcc-hardening)
$(use_enable tor-hardening linker-hardening)
$(use_enable test unittests)
$(use_enable zstd)
)
econf "${myeconfargs[@]}"
}
src_install() {
default
readme.gentoo_create_doc
newconfd "${FILESDIR}"/tor.confd tor
newinitd "${FILESDIR}"/tor.initd-r9 tor
systemd_dounit "${FILESDIR}"/tor.service
keepdir /var/lib/tor
fperms 750 /var/lib/tor
fowners tor:tor /var/lib/tor
insinto /etc/tor/
newins "${FILESDIR}"/torrc-r2 torrc
}
|