From 6104bc0a791c9c9cf30fd716e0b56d69629e557e Mon Sep 17 00:00:00 2001 From: "Jason A. Donenfeld" Date: Thu, 21 Jul 2016 11:45:47 +0200 Subject: net-misc/wireguard: version bump Package-Manager: portage-2.3.0 --- net-misc/wireguard/Manifest | 2 +- net-misc/wireguard/wireguard-0.0.20160711.ebuild | 86 ----------------------- net-misc/wireguard/wireguard-0.0.20160721.ebuild | 87 ++++++++++++++++++++++++ net-misc/wireguard/wireguard-9999.ebuild | 5 +- 4 files changed, 91 insertions(+), 89 deletions(-) delete mode 100644 net-misc/wireguard/wireguard-0.0.20160711.ebuild create mode 100644 net-misc/wireguard/wireguard-0.0.20160721.ebuild (limited to 'net-misc') diff --git a/net-misc/wireguard/Manifest b/net-misc/wireguard/Manifest index d9809bd8bb8f..1ae6f352a9ec 100644 --- a/net-misc/wireguard/Manifest +++ b/net-misc/wireguard/Manifest @@ -1 +1 @@ -DIST WireGuard-experimental-0.0.20160711.tar.xz 105808 SHA256 4ab876642236abcac416f7b75cf5e9e28b8581d5b7741d36a437af08c42d8081 SHA512 7405ab5d6fd176a72813d57cd9d5fc3ff5043ee9d476d86071c287e207ed784a6991457417cc05c930e966da109662c3ee2d6c035c68488c7f623a4f7f8514ad WHIRLPOOL 3a3c7b6a80b09f5d933bbdd9a61c96d56a81927971361628a3f5541b8b3dedf45e4c5cf07559bb0d1dc65fc329b812ed57b74a88a8d37443822c567418b6a0ed +DIST WireGuard-experimental-0.0.20160721.tar.xz 109004 SHA256 af4fc72a8dab1a5f966cc2a2be1f0d329932b32df64c1a5dc226f5c2e31ffa25 SHA512 c45d727d58c5d3ba45215aab13ea4fa44e356eaa5dee113634cd9362e57b70331c3758ddccd97af40008d0e54089b51d5bbd961c303313ff560aa55f093d2ec5 WHIRLPOOL db95e24d2b79a0c63af6d065126cbfcaef93faf466f7c63d605dfb1a57f168589c0bba43a0ffaee1536972be760c946efd431f2c1418f5da7e51d0a1e829b4d7 diff --git a/net-misc/wireguard/wireguard-0.0.20160711.ebuild b/net-misc/wireguard/wireguard-0.0.20160711.ebuild deleted file mode 100644 index ab901cd4639f..000000000000 --- a/net-misc/wireguard/wireguard-0.0.20160711.ebuild +++ /dev/null @@ -1,86 +0,0 @@ -# Copyright 1999-2016 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=6 - -inherit linux-mod - -DESCRIPTION="Simple yet fast and modern VPN that utilizes state-of-the-art cryptography." -HOMEPAGE="https://www.wireguard.io/" - -if [[ ${PV} == 9999 ]]; then - inherit git-r3 - EGIT_REPO_URI="https://git.zx2c4.com/WireGuard" - KEYWORDS="" -else - SRC_URI="https://git.zx2c4.com/WireGuard/snapshot/WireGuard-experimental-${PV}.tar.xz" - S="${WORKDIR}/WireGuard-experimental-${PV}" - KEYWORDS="~amd64 ~x86 ~mips ~arm ~arm64" -fi - -LICENSE="GPL-2" -SLOT="0" -IUSE="" - -DEPEND="net-libs/libmnl" -RDEPEND="${DEPEND}" - -MODULE_NAMES="wireguard(net:src)" -BUILD_PARAMS="KERNELDIR=${KERNEL_DIR} V=1" -CONFIG_CHECK="NET INET NET_UDP_TUNNEL NF_CONNTRACK NETFILTER_XT_MATCH_HASHLIMIT CRYPTO_BLKCIPHER ~PADATA" -WARNING_PADATA="If you're running a multicore system you likely should enable CONFIG_PADATA for improved performance and parallel crypto." - -pkg_setup() { - linux-mod_pkg_setup - kernel_is -lt 4 1 0 && die "This version of ${PN} requires Linux >= 4.1" -} - -src_prepare() { - default - sed -i 's/install -s/install/' src/tools/Makefile -} - -src_compile() { - linux-mod_src_compile - emake -C src/tools -} - -src_install() { - dodoc README.md - dodoc -r contrib/examples - linux-mod_src_install - emake DESTDIR="${D}" PREFIX="${EPREFIX}/usr" -C src/tools install -} - -pkg_postinst() { - linux-mod_pkg_postinst - ewarn - ewarn "This software is experimental and has not yet been released." - ewarn "As such, it may contain significant issues. Please do not file" - ewarn "bug reports with Gentoo, but rather direct them upstream to:" - ewarn - ewarn " team@wireguard.io security@wireguard.io" - ewarn - - einfo - einfo "After installing WireGuard, if you'd like to try sending some packets through" - einfo "WireGuard, you may use, for testing purposes only, the insecure client.sh" - einfo "test example script:" - einfo - einfo " \$ bzcat /usr/share/doc/${PF}/examples/ncat-client-server/client.sh.bz2 | sudo bash -" - einfo - einfo "This will automatically setup interface wg0, through a very insecure transport" - einfo "that is only suitable for demonstration purposes. You can then try loading the" - einfo "hidden website or sending pings:" - einfo - einfo " \$ chromium http://192.168.4.1" - einfo " \$ ping 192.168.4.1" - einfo - einfo "If you'd like to redirect your internet traffic, you can run it with the" - einfo "\"default-route\" argument. You may not use this server for any abusive or illegal" - einfo "purposes. It is for quick testing only." - einfo - einfo "More info on getting started can be found at: https://www.wireguard.io/quickstart/" - einfo -} diff --git a/net-misc/wireguard/wireguard-0.0.20160721.ebuild b/net-misc/wireguard/wireguard-0.0.20160721.ebuild new file mode 100644 index 000000000000..ecbf8d17d386 --- /dev/null +++ b/net-misc/wireguard/wireguard-0.0.20160721.ebuild @@ -0,0 +1,87 @@ +# Copyright 1999-2016 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Id$ + +EAPI=6 + +inherit linux-mod + +DESCRIPTION="Simple yet fast and modern VPN that utilizes state-of-the-art cryptography." +HOMEPAGE="https://www.wireguard.io/" + +if [[ ${PV} == 9999 ]]; then + inherit git-r3 + EGIT_REPO_URI="https://git.zx2c4.com/WireGuard" + KEYWORDS="" +else + SRC_URI="https://git.zx2c4.com/WireGuard/snapshot/WireGuard-experimental-${PV}.tar.xz" + S="${WORKDIR}/WireGuard-experimental-${PV}" + KEYWORDS="~amd64 ~x86 ~mips ~arm ~arm64" +fi + +LICENSE="GPL-2" +SLOT="0" +IUSE="" + +DEPEND="net-libs/libmnl" +RDEPEND="${DEPEND}" + +MODULE_NAMES="wireguard(net:src)" +BUILD_PARAMS="KERNELDIR=${KERNEL_DIR} V=1" +CONFIG_CHECK="NET INET NET_UDP_TUNNEL NF_CONNTRACK NETFILTER_XT_MATCH_HASHLIMIT CRYPTO_BLKCIPHER ~PADATA ~IP6_NF_IPTABLES" +WARNING_PADATA="If you're running a multicore system you likely should enable CONFIG_PADATA for improved performance and parallel crypto." +WARNING_IP6_NF_IPTABLES="If your kernel has CONFIG_IPV6, you need CONFIG_IP6_NF_IPTABLES; otherwise WireGuard will not insert." + +pkg_setup() { + linux-mod_pkg_setup + kernel_is -lt 4 1 0 && die "This version of ${PN} requires Linux >= 4.1" +} + +src_prepare() { + default + sed -i 's/install -s/install/' src/tools/Makefile +} + +src_compile() { + linux-mod_src_compile + emake RUNSTATEDIR="${EPREFIX}/run" -C src/tools +} + +src_install() { + dodoc README.md + dodoc -r contrib/examples + linux-mod_src_install + emake DESTDIR="${D}" PREFIX="${EPREFIX}/usr" -C src/tools install +} + +pkg_postinst() { + linux-mod_pkg_postinst + ewarn + ewarn "This software is experimental and has not yet been released." + ewarn "As such, it may contain significant issues. Please do not file" + ewarn "bug reports with Gentoo, but rather direct them upstream to:" + ewarn + ewarn " team@wireguard.io security@wireguard.io" + ewarn + + einfo + einfo "After installing WireGuard, if you'd like to try sending some packets through" + einfo "WireGuard, you may use, for testing purposes only, the insecure client.sh" + einfo "test example script:" + einfo + einfo " \$ bzcat /usr/share/doc/${PF}/examples/ncat-client-server/client.sh.bz2 | sudo bash -" + einfo + einfo "This will automatically setup interface wg0, through a very insecure transport" + einfo "that is only suitable for demonstration purposes. You can then try loading the" + einfo "hidden website or sending pings:" + einfo + einfo " \$ chromium http://192.168.4.1" + einfo " \$ ping 192.168.4.1" + einfo + einfo "If you'd like to redirect your internet traffic, you can run it with the" + einfo "\"default-route\" argument. You may not use this server for any abusive or illegal" + einfo "purposes. It is for quick testing only." + einfo + einfo "More info on getting started can be found at: https://www.wireguard.io/quickstart/" + einfo +} diff --git a/net-misc/wireguard/wireguard-9999.ebuild b/net-misc/wireguard/wireguard-9999.ebuild index ab901cd4639f..ecbf8d17d386 100644 --- a/net-misc/wireguard/wireguard-9999.ebuild +++ b/net-misc/wireguard/wireguard-9999.ebuild @@ -28,8 +28,9 @@ RDEPEND="${DEPEND}" MODULE_NAMES="wireguard(net:src)" BUILD_PARAMS="KERNELDIR=${KERNEL_DIR} V=1" -CONFIG_CHECK="NET INET NET_UDP_TUNNEL NF_CONNTRACK NETFILTER_XT_MATCH_HASHLIMIT CRYPTO_BLKCIPHER ~PADATA" +CONFIG_CHECK="NET INET NET_UDP_TUNNEL NF_CONNTRACK NETFILTER_XT_MATCH_HASHLIMIT CRYPTO_BLKCIPHER ~PADATA ~IP6_NF_IPTABLES" WARNING_PADATA="If you're running a multicore system you likely should enable CONFIG_PADATA for improved performance and parallel crypto." +WARNING_IP6_NF_IPTABLES="If your kernel has CONFIG_IPV6, you need CONFIG_IP6_NF_IPTABLES; otherwise WireGuard will not insert." pkg_setup() { linux-mod_pkg_setup @@ -43,7 +44,7 @@ src_prepare() { src_compile() { linux-mod_src_compile - emake -C src/tools + emake RUNSTATEDIR="${EPREFIX}/run" -C src/tools } src_install() { -- cgit v1.2.3-65-gdbad