void-packages/srcpkgs/strongswan/template

41 lines
1.7 KiB
Bash

# Template file for 'strongswan'
pkgname=strongswan
version=5.9.9
revision=1
build_style=gnu-configure
# tpm support waits on libtss2
configure_args="--disable-static --enable-blowfish --enable-curl --enable-md4
--enable-openssl --enable-eap-radius --enable-eap-mschapv2 --enable-eap-md5
--enable-eap-identity --enable-eap-dynamic --enable-led --enable-ha --enable-dhcp
--enable-mediation --enable-soup --disable-des --enable-chapoly --enable-nm"
hostmakedepends="pkg-config flex bison python3"
makedepends="gmp-devel libsoup-devel libldns-devel unbound-devel libcurl-devel
NetworkManager-devel openssl-devel"
depends="iproute2 sqlite"
conf_files="/etc/*.conf /etc/strongswan.d/*.conf /etc/strongswan.d/charon/*.conf /etc/ipsec.secrets"
short_desc="IPsec-based VPN solution, supporting IKEv1/IKEv2 and MOBIKE"
maintainer="Toyam Cox <Vaelatern@voidlinux.org>"
license="GPL-2.0-or-later"
homepage="https://www.strongswan.org/"
changelog="https://raw.githubusercontent.com/strongswan/strongswan/master/NEWS"
distfiles="https://download.strongswan.org/strongswan-${version}.tar.bz2"
checksum=5e16580998834658c17cebfb31dd637e728669cf2fdd325460234a4643b8d81d
make_dirs="/etc/ipsec.d/ 0755 root root
/etc/ipsec.d/aacerts 0755 root root
/etc/ipsec.d/acerts 0755 root root
/etc/ipsec.d/cacerts 0755 root root
/etc/ipsec.d/oscpcerts 0755 root root
/etc/ipsec.d/certs 0755 root root
/etc/ipsec.d/crls 0755 root root
/etc/ipsec.d/reqs 0755 root root
/etc/ipsec.d/private 0750 root root"
# CI checks are currently disabled due to a number of tests failing either as a
# result of GitHub Actions having a networking setup that is incompatible with
# them, or some other issue that is difficult to reproduce locally.
make_check=ci-skip
post_install() {
vsv strongswan
}