Просмотр исходного кода

update to latest upstream version, separate easy-rsa package, add polarssl support

Waldemar Brodkorb 10 лет назад
Родитель
Сommit
2cc570cd27

+ 36 - 0
package/easy-rsa/Makefile

@@ -0,0 +1,36 @@
+# This file is part of the OpenADK project. OpenADK is copyrighted
+# material, please see the LICENCE file in the top-level directory.
+
+include $(TOPDIR)/rules.mk
+
+PKG_NAME:=		easy-rsa
+PKG_VERSION:=		2.0
+PKG_RELEASE:=		1
+PKG_MD5SUM:=		0937fb2f91d534d4fb961e047f714946
+PKG_DESCR:=		openssl ca scripts
+PKG_SECTION:=		crypto
+PKG_DEPENDS:=		openssl-util
+PKG_URL:=		https://github.com/OpenVPN/easy-rsa
+PKG_SITES:=		http://openadk.org/distfiles/
+
+include $(TOPDIR)/mk/package.mk
+
+$(eval $(call PKG_template,EASY_RSA,easy-rsa,$(PKG_VERSION)-${PKG_RELEASE},${PKG_DEPENDS},${PKG_DESCR},${PKG_SECTION}))
+
+CONFIG_STYLE:=		manual
+BUILD_STYLE:=		manual
+INSTALL_STYLE:=		manual
+
+easy-rsa-install:
+	${INSTALL_DIR} $(IDIR_EASY_RSA)/usr/sbin \
+		$(IDIR_EASY_RSA)/etc/easy-rsa/keys
+	touch $(IDIR_EASY_RSA)/etc/easy-rsa/keys/index.txt
+	$(CP) ./files/serial $(IDIR_EASY_RSA)/etc/easy-rsa/keys
+	$(CP) $(WRKBUILD)/easy-rsa/2.0/{build-*,clean-all,inherit-inter,list-crl,pkitool,revoke-full,sign-req,whichopensslcnf} \
+		$(IDIR_EASY_RSA)/usr/sbin
+	${INSTALL_DATA} $(WRKBUILD)/easy-rsa/2.0/openssl-1.0.0.cnf \
+		$(IDIR_EASY_RSA)/etc/easy-rsa/openssl.cnf
+	${INSTALL_DATA} $(WRKBUILD)/easy-rsa/2.0/vars \
+		$(IDIR_EASY_RSA)/etc/easy-rsa/vars
+
+include ${TOPDIR}/mk/pkg-bottom.mk

+ 0 - 0
package/openvpn/files/serial → package/easy-rsa/files/serial


+ 0 - 0
package/openvpn/patches/patch-easy-rsa_2_0_build-dh → package/easy-rsa/patches/patch-easy-rsa_2_0_build-dh


+ 0 - 0
package/openvpn/patches/patch-easy-rsa_2_0_clean-all → package/easy-rsa/patches/patch-easy-rsa_2_0_clean-all


+ 0 - 0
package/openvpn/patches/patch-easy-rsa_2_0_list-crl → package/easy-rsa/patches/patch-easy-rsa_2_0_list-crl


+ 0 - 0
package/openvpn/patches/patch-easy-rsa_2_0_openssl-1_0_0_cnf → package/easy-rsa/patches/patch-easy-rsa_2_0_openssl-1_0_0_cnf


+ 0 - 0
package/openvpn/patches/patch-easy-rsa_2_0_pkitool → package/easy-rsa/patches/patch-easy-rsa_2_0_pkitool


+ 0 - 0
package/openvpn/patches/patch-easy-rsa_2_0_revoke-full → package/easy-rsa/patches/patch-easy-rsa_2_0_revoke-full


+ 20 - 0
package/easy-rsa/patches/patch-easy-rsa_2_0_vars

@@ -0,0 +1,20 @@
+--- easy-rsa-2.0.orig/easy-rsa/2.0/vars	2013-08-18 10:11:06.000000000 +0200
++++ easy-rsa-2.0/easy-rsa/2.0/vars	2013-08-18 10:38:50.635782024 +0200
+@@ -12,7 +12,7 @@
+ # This variable should point to
+ # the top level of the easy-rsa
+ # tree.
+-export EASY_RSA="`pwd`"
++export EASY_RSA="/etc/easy-rsa"
+ 
+ #
+ # This variable should point to
+@@ -26,7 +26,7 @@ export GREP="grep"
+ # This variable should point to
+ # the openssl.cnf file included
+ # with easy-rsa.
+-export KEY_CONFIG=`$EASY_RSA/whichopensslcnf $EASY_RSA`
++export KEY_CONFIG=/etc/easy-rsa/openssl.cnf
+ 
+ # Edit this variable to point to
+ # your soon-to-be-created key

+ 24 - 26
package/openvpn/Makefile

@@ -4,17 +4,16 @@
 include $(TOPDIR)/rules.mk
 
 PKG_NAME:=		openvpn
-PKG_VERSION:=		2.2.2
+PKG_VERSION:=		2.3.2
 PKG_RELEASE:=		1
-PKG_MD5SUM:=		c5181e27b7945fa6276d21873329c5c7
+PKG_MD5SUM:=		06e5f93dbf13f2c19647ca15ffc23ac1
 PKG_DESCR:=		Open Source VPN solution using SSL
 PKG_SECTION:=		net/security
-PKG_DEPENDS:=		kmod-tun libopenssl ip
-PKG_BUILDDEP:=		openssl
+PKG_DEPENDS:=		kmod-tun ip
 PKG_URL:=		http://openvpn.net/
 PKG_SITES:=		http://swupdate.openvpn.org/community/releases/
 
-PKG_SUBPKGS:=		OPENVPN OPENVPN_EASY_RSA
+PKG_SUBPKGS:=		OPENVPN
 PKG_FLAVOURS_OPENVPN:=	WITH_LZO WITH_MANAGEMENT WITH_HTTPPROXY WITH_SOCKS SERVER CLIENT
 PKGSS_OPENVPN_EASY_RSA:=openssl-util
 PKGFD_SERVER:=		deliver server example configuration
@@ -26,10 +25,17 @@ PKGFD_WITH_MANAGEMENT:=	enable management server support
 PKGFD_WITH_HTTPPROXY:=	enable http proxy support
 PKGFD_WITH_SOCKS:=	enable socks proxy support
 
+PKG_CHOICES_OPENVPN:=		WITH_OPENSSL WITH_POLARSSL
+PKGCD_WITH_OPENSSL:=		use OpenSSL for crypto
+PKGCS_WITH_OPENSSL:=		libopenssl
+PKGCB_WITH_OPENSSL:=		openssl
+PKGCD_WITH_POLARSSL:=		use PolarSSL for crypto
+PKGCS_WITH_POLARSSL:=		libpolarssl
+PKGCB_WITH_POLARSSL:=		polarssl
+
 include $(TOPDIR)/mk/package.mk
 
 $(eval $(call PKG_template,OPENVPN,${PKG_NAME},$(PKG_VERSION)-${PKG_RELEASE},${PKG_DEPENDS},${PKG_DESCR},${PKG_SECTION}))
-$(eval $(call PKG_template,OPENVPN_EASY_RSA,openvpn-easy-rsa,$(PKG_VERSION)-${PKG_RELEASE},${PKG_DEPENDS},${PKG_DESCR},${PKG_SECTION}))
 
 ifneq ($(ADK_PACKAGE_OPENVPN_WITH_LZO),)
 CONFIGURE_ARGS+=	--enable-lzo
@@ -44,9 +50,9 @@ CONFIGURE_ARGS+=	--disable-management
 endif
 
 ifneq ($(ADK_PACKAGE_OPENVPN_WITH_HTTPPROXY),)
-CONFIGURE_ARGS+=	--enable-http
+CONFIGURE_ARGS+=	--enable-http-proxy
 else
-CONFIGURE_ARGS+=	--disable-http
+CONFIGURE_ARGS+=	--disable-http-proxy
 endif
 
 ifneq ($(ADK_PACKAGE_OPENVPN_WITH_SOCKS),)
@@ -55,13 +61,17 @@ else
 CONFIGURE_ARGS+=	--disable-socks
 endif
 
-CONFIGURE_ARGS+=	--disable-pthread \
-			--disable-plugins \
+ifeq (${ADK_PACKAGE_OPENVPN_WITH_OPENSSL},y)
+CONFIGURE_ARGS+=	--with-crypto-library=openssl
+endif
+ifeq (${ADK_PACKAGE_OPENVPN_WITH_POLARSSL},y)
+CONFIGURE_ARGS+=	--with-crypto-library=polarssl
+endif
+
+CONFIGURE_ARGS+=	--disable-plugins \
 			--enable-small \
-			--enable-iproute2 \
-			--with-iproute-path=/usr/sbin/ip \
-			--without-ifconfig-path \
-			--without-route-path
+			--disable-debug \
+			--enable-iproute2
 
 post-install:
 	${INSTALL_DIR} $(IDIR_OPENVPN)/usr/sbin $(IDIR_OPENVPN)/etc/openvpn
@@ -75,16 +85,4 @@ ifeq ($(ADK_PACKAGE_OPENVPN_CLIENT),y)
 	echo "/etc/openvpn/client.conf" > ./files/openvpn.conffiles
 endif
 
-openvpn-easy-rsa-install:
-	${INSTALL_DIR} $(IDIR_OPENVPN_EASY_RSA)/usr/sbin \
-		$(IDIR_OPENVPN_EASY_RSA)/etc/easy-rsa/keys
-	touch $(IDIR_OPENVPN_EASY_RSA)/etc/easy-rsa/keys/index.txt
-	$(CP) ./files/serial $(IDIR_OPENVPN_EASY_RSA)/etc/easy-rsa/keys
-	$(CP) $(WRKBUILD)/easy-rsa/2.0/{build-*,clean-all,inherit-inter,list-crl,pkitool,revoke-full,sign-req,whichopensslcnf} \
-		$(IDIR_OPENVPN_EASY_RSA)/usr/sbin
-	${INSTALL_DATA} $(WRKBUILD)/easy-rsa/2.0/openssl-1.0.0.cnf \
-		$(IDIR_OPENVPN_EASY_RSA)/etc/easy-rsa/openssl.cnf
-	${INSTALL_DATA} $(WRKBUILD)/easy-rsa/2.0/vars \
-		$(IDIR_OPENVPN_EASY_RSA)/etc/easy-rsa/vars
-
 include ${TOPDIR}/mk/pkg-bottom.mk

+ 0 - 32
package/openvpn/patches/patch-easy-rsa_2_0_vars

@@ -1,32 +0,0 @@
---- openvpn-2.2.1.orig/easy-rsa/2.0/vars	2011-07-01 10:31:26.000000000 +0200
-+++ openvpn-2.2.1/easy-rsa/2.0/vars	2011-12-02 19:44:31.000000000 +0100
-@@ -12,7 +12,7 @@
- # This variable should point to
- # the top level of the easy-rsa
- # tree.
--export EASY_RSA="`pwd`"
-+export EASY_RSA="/etc/easy-rsa"
- 
- #
- # This variable should point to
-@@ -26,7 +26,7 @@ export GREP="grep"
- # This variable should point to
- # the openssl.cnf file included
- # with easy-rsa.
--export KEY_CONFIG=`$EASY_RSA/whichopensslcnf $EASY_RSA`
-+export KEY_CONFIG=/etc/easy-rsa/openssl.cnf
- 
- # Edit this variable to point to
- # your soon-to-be-created key
-@@ -66,9 +66,7 @@ export KEY_PROVINCE="CA"
- export KEY_CITY="SanFrancisco"
- export KEY_ORG="Fort-Funston"
- export KEY_EMAIL="me@myhost.mydomain"
--export KEY_EMAIL=mail@host.domain
--export KEY_CN=changeme
--export KEY_NAME=changeme
--export KEY_OU=changeme
-+export KEY_NAME=VPN
-+export KEY_OU="IT Security"
- export PKCS11_MODULE_PATH=changeme
- export PKCS11_PIN=1234

+ 0 - 61
package/openvpn/patches/patch-t_client_sh

@@ -1,61 +0,0 @@
---- openvpn-2.2.1.orig/t_client.sh	2011-07-01 11:27:01.000000000 +0200
-+++ openvpn-2.2.1/t_client.sh	2011-12-02 19:33:52.000000000 +0100
-@@ -1,4 +1,4 @@
--#!/bin/sh
-+#!/bin/bash
- #
- # run OpenVPN client against ``test reference'' server
- # - check that ping, http, ... via tunnel works
-@@ -80,12 +80,12 @@ fail()
- get_ifconfig_route()
- {
-     # linux / iproute2? (-> if configure got a path)
--    if [ "/sbin/ip" != "ip" ]
-+    if [ "/usr/sbin/ip" != "ip" ]
-     then
- 	echo "-- linux iproute2 --"
--	/sbin/ip addr show     | grep -v valid_lft
--	/sbin/ip route show
--	/sbin/ip -6 route show | sed -e 's/expires [0-9]*sec //'
-+	/usr/sbin/ip addr show     | grep -v valid_lft
-+	/usr/sbin/ip route show
-+	/usr/sbin/ip -6 route show | sed -e 's/expires [0-9]*sec //'
- 	return
-     fi
- 
-@@ -93,27 +93,27 @@ get_ifconfig_route()
-     case `uname -s` in
- 	Linux)
- 	   echo "-- linux / ifconfig --"
--	   LANG=C /sbin/ifconfig -a |egrep  "( addr:|encap:)"
--	   LANG=C /bin/netstat -rn -4 -6
-+	   LANG=C no -a |egrep  "( addr:|encap:)"
-+	   LANG=C /usr/sbin/netstat -rn -4 -6
- 	   return
- 	   ;;
- 	FreeBSD|NetBSD|Darwin)
- 	   echo "-- FreeBSD/NetBSD/Darwin [MacOS X] --"
--	   /sbin/ifconfig -a | egrep "(flags=|inet)"
--	   /bin/netstat -rn | awk '$3 !~ /^UHL/ { print $1,$2,$3,$NF }'
-+	   no -a | egrep "(flags=|inet)"
-+	   /usr/sbin/netstat -rn | awk '$3 !~ /^UHL/ { print $1,$2,$3,$NF }'
- 	   return
- 	   ;;
- 	OpenBSD)
- 	   echo "-- OpenBSD --"
--	   /sbin/ifconfig -a | egrep "(flags=|inet)" | \
-+	   no -a | egrep "(flags=|inet)" | \
- 		sed -e 's/pltime [0-9]*//' -e 's/vltime [0-9]*//'
--	   /bin/netstat -rn | awk '$3 !~ /^UHL/ { print $1,$2,$3,$NF }'
-+	   /usr/sbin/netstat -rn | awk '$3 !~ /^UHL/ { print $1,$2,$3,$NF }'
- 	   return
- 	   ;;
- 	SunOS)
- 	   echo "-- Solaris --"
--	   /sbin/ifconfig -a | egrep "(flags=|inet)"
--	   /bin/netstat -rn | awk '$3 !~ /^UHL/ { print $1,$2,$3,$6 }'
-+	   no -a | egrep "(flags=|inet)"
-+	   /usr/sbin/netstat -rn | awk '$3 !~ /^UHL/ { print $1,$2,$3,$6 }'
- 	   return
- 	   ;;
-     esac