unbound updated; added postgresql15

This commit is contained in:
ziggi
2024-03-08 08:21:10 +02:00
parent 23a58573df
commit 340c8f1d58
35 changed files with 2622 additions and 33 deletions

View File

@@ -0,0 +1,67 @@
#
# $Id$
#
PORTNAME= openvpn
#PORTVERSION= 2.6.8
CATEGORIES= security net
#MASTER_SITES= http://openvpn.net/release/
MASTER_SITES+= http://swupdate.openvpn.net/community/releases/
MASTER_SITES+= http://build.openvpn.net/downloads/releases/
MAINTAINER= homeunix7@gmail.com
COMMENT= Secure IP/Ethernet tunnel daemon
LIB_DEPENDS+= liblzo2.so:arch/liblzo2
DISTVERSION= g20231109
USE_GITLAB= yes
GL_COMMIT= efad93d049c318a3bd9ea5956c6ac8237b8d6d70
WRKSRC= ${WRKDIR}/${PORTNAME}-${GL_COMMIT}
GNU_CONFIGURE= yes
USES+= gmake autoreconf
CONFIGURE_ARGS+= --enable-password-save
#CONFIGURE_ARGS+= --with-crypto-library=openssl
CONFIGURE_ARGS+= --mandir=${PREFIX}/man
CONFIGURE_ARGS+= --program-transform-name=''
CPPFLAGS+= -I${LOCALBASE}/include
LDFLAGS+= -L${LOCALBASE}/lib
SHEBANG_FILES= sample/sample-scripts/verify-cn
SHEBANG_FILES+= sample/sample-scripts/auth-pam.pl
SHEBANG_FILES+= sample/sample-scripts/ucn.pl
CONFIGURE_ARGS+= --enable-strict
CONFIGURE_ENV+= ac_cv_prog_CMAKE= CMAKE=
OPENVPN_RUNDIR= /var/run/openvpn
OPENVPN_LOGDIR= /var/log/openvpn
OPENVPN_CONFDIR= ${PREFIX}/etc/openvpn
SUB_LIST+= OPENVPN_RUNDIR=${OPENVPN_RUNDIR}
SUB_LIST+= OPENVPN_LOGDIR=${OPENVPN_LOGDIR}
SUB_LIST+= OPENVPN_CONFDIR=${OPENVPN_CONFDIR}
USE_RC_SUBR= openvpn.sh
USE_LDCONFIG= ${PREFIX}/lib
SUB_FILES= pkg-message pkg-install
post-build:
# cd ${WRKSRC}/plugin/down-root && ${MAKE}
# cd ${WRKSRC}/plugin/auth-pam && ${CC} ${CPPFLAGS} -I../.. -DDLOPEN_PAM=0 ${CFLAGS} -fPIC -shared -Wl,-soname,openvpn-auth-pam.so -o openvpn-auth-pam.so auth-pam.c pamdl.c -lc -lpam
## @# self-tests here
## cd ${WRKSRC} && ${MAKE} check
post-stage:
${MKDIR} ${STAGEDIR}${EXAMPLESDIR}
${INSTALL_DATA} ${WRKSRC}/sample/sample-config-files/*.conf ${STAGEDIR}${EXAMPLESDIR}
# ${MKDIR} ${PREFIX}/lib
# ${INSTALL_PROGRAM} ${WRKSRC}/plugin/down-root/openvpn-down-root.so ${PREFIX}/lib
# ${INSTALL_PROGRAM} ${WRKSRC}/plugin/auth-pam/openvpn-auth-pam.so ${PREFIX}/lib
.include <bsd.port.mk>
#EOF

View File

@@ -0,0 +1,3 @@
TIMESTAMP = 1707047858
SHA256 (openvpn-openvpn-efad93d049c318a3bd9ea5956c6ac8237b8d6d70_GL0.tar.gz) = db885c742d8753942fdff960bc3a997cbad235790b29a2751cbf691f88cd20e7
SIZE (openvpn-openvpn-efad93d049c318a3bd9ea5956c6ac8237b8d6d70_GL0.tar.gz) = 1194056

View File

@@ -0,0 +1,71 @@
#!/bin/sh
#
# $Id$
#
# PROVIDE: openvpn
# REQUIRE: DAEMON
# KEYWORD: shutdown
. /etc/rc.subr
name="openvpn"
rcvar="openvpn_enable"
command="%%PREFIX%%/sbin/${name}"
command_args=""
load_rc_config ${name}
extra_commands="list"
start_cmd="openvpn_start"
stop_cmd="openvpn_stop"
restart_cmd="openvpn_restart"
reload_cmd="openvpn_reload"
list_cmd="openvpn_list"
openvpn_list() {
echo -n "$1 "
}
openvpn_start() {
serv="$1"
conffile="%%PREFIX%%/etc/openvpn/${serv}.conf"
pidfile="/var/run/openvpn/${serv}.pid"
echo "Start openvpn $serv."
$command --config $conf --writepid $pidfile --daemon
}
openvpn_stop() {
serv="$1"
pidfile="/var/run/openvpn/${serv}.pid"
pid=$(check_pidfile $pidfile $command)
test ! -z "$pid" && ( kill "$pid"; echo "Stopping openvpn $serv.")
wait_for_pids $pid && rm -f "$pidfile"
}
openvpn_restart() {
serv="$1"
openvpn_stop $serv
openvpn_start $serv
}
openvpn_reload() {
serv="$1"
pid=$(check_pidfile $pidfile $command)
test ! -z "$pid" && ( kill -HUP "$pid")
}
load_rc_config $name
: ${openvpn_enable=NO}
test -z "$2" && conflist=$(find %%PREFIX%%/etc/openvpn -maxdepth 1 -name '*.conf')
test ! -z "$2" && test -r "%%PREFIX%%/etc/openvpn/${2}.conf" && conflist="%%PREFIX%%/etc/openvpn/${2}.conf"
for conf in $conflist; do
serv="$(basename $conf .conf)"
pidfile="/var/run/openvpn/${serv}.pid"
run_rc_command "$1" "$serv"
done
#EOF

View File

@@ -0,0 +1,91 @@
#!/bin/sh
#
# PROVIDE: openvpn
# REQUIRE: DAEMON
# KEYWORD: shutdown
#
# This script supports running multiple instances of openvpn.
# To run additional instance link this script to something like
# % ln -s openvpn openvpn_foo
# and define additional openvpn_foo_* variables in one of
# /etc/rc.conf, /etc/rc.conf.local or /etc/rc.conf.d/openvpn_foo
#
# Below NAME should be substituted with the name of this script. By default
# it is openvpn, so read as openvpn_enable. If you linked the script to
# openvpn_foo, then read as openvpn_foo_enable etc.
#
# The following variables are supported (defaults are shown).
# You can place them in any of
# /etc/rc.conf, /etc/rc.conf.local or /etc/rc.conf.d/NAME
#
# NAME_enable="NO" # set to YES to enable openvpn
# NAME_if="" # driver(s) to load, set to "tun", "tap" or "tun tap"
#
# # optional:
# NAME_flags="" # additional command line arguments
# NAME_configfile="%%PREFIX%%/etc/openvpn/NAME.conf" # --config file
# NAME_dir="%%PREFIX%%/etc/openvpn" # --cd directory
#
# You also need to set NAME_configfile and NAME_dir, if the configuration
# file and directory where keys and certificates reside differ from the above
# settings.
#
# Note that we deliberately refrain from unloading drivers.
#
# For further documentation, please see openvpn(8).
#
. /etc/rc.subr
name="openvpn"
extra_commands="reload"
pidfile="/var/run/${name}.pid"
command="%%PREFIX%%/sbin/openvpn"
start_precmd="openvpn_start_precmd"
stop_postcmd="openvpn_stop_postcmd"
rcvar="${name}_enable"
openvpn_start_precmd()
{
for i in $interfaces ; do
# FreeBSD <= 5.4 does not know kldstat's -m option
# FreeBSD >= 6.0 does not add debug.* sysctl information
# in the default build - we check both to keep things simple
if ! sysctl debug.if_${i}_debug >/dev/null 2>&1 \
&& ! kldstat -m if_${i} >/dev/null 2>&1 ; then
if ! kldload if_${i} ; then
warn "Could not load $i module."
return 1
fi
fi
done
return 0
}
openvpn_stop_postcmd()
{
rm -f "$pidfile" || warn "Could not remove $pidfile."
}
load_rc_config aaaaa
: ${openvpn_enable="NO"}
: ${openvpn_flags=""}
: ${openvpn_if=""}
: ${openvpn_configfile="%%PREFIX%%/etc/openvpn/openvpn.conf"}
: ${openvpn_dir="%%PREFIX%%/etc/openvpn"}
configfile="${openvpn_configfile}"
dir="${openvpn_dir}"
interfaces="${openvpn_if}"
required_files=${configfile}
command_args="--cd ${dir} --daemon ${name} --config ${configfile} --writepid ${pidfile}"
run_rc_command "$1"
#EOF

View File

@@ -0,0 +1,13 @@
--- sample/sample-config-files/loopback-client.orig 2016-08-23 14:16:22 UTC
+++ sample/sample-config-files/loopback-client
@@ -9,8 +9,8 @@
# ./openvpn --config sample-config-files/loopback-client (In one window)
# ./openvpn --config sample-config-files/loopback-server (Simultaneously in another window)
-rport 16000
-lport 16001
+rport 16100
+lport 16101
remote localhost
local localhost
dev null

View File

@@ -0,0 +1,13 @@
--- sample/sample-config-files/loopback-server.orig 2016-08-23 14:16:22 UTC
+++ sample/sample-config-files/loopback-server
@@ -9,8 +9,8 @@
# ./openvpn --config sample-config-files/loopback-client (In one window)
# ./openvpn --config sample-config-files/loopback-server (Simultaneously in another window)
-rport 16001
-lport 16000
+rport 16101
+lport 16100
remote localhost
local localhost
dev null

View File

@@ -0,0 +1,65 @@
--- tests/t_cltsrv.sh.orig 2016-08-23 13:10:22 UTC
+++ tests/t_cltsrv.sh
@@ -1,7 +1,7 @@
#! /bin/sh
#
# t_cltsrv.sh - script to test OpenVPN's crypto loopback
-# Copyright (C) 2005, 2006, 2008 Matthias Andree
+# Copyright (C) 2005 - 2014 Matthias Andree
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
@@ -22,8 +22,9 @@ set -e
top_srcdir="${top_srcdir:-..}"
top_builddir="${top_builddir:-..}"
openvpn="${openvpn:-${top_builddir}/src/openvpn/openvpn}"
-trap "rm -f log.$$ log.$$.signal ; trap 0 ; exit 77" 1 2 15
-trap "rm -f log.$$ log.$$.signal ; exit 1" 0 3
+root="${top_srcdir}/sample"
+trap "rm -f ${root}/sample-config-files/loopback-*.test log.$$ log.$$.signal ; trap 0 ; exit 77" 1 2 15
+trap "a=\$? ; rm -f ${root}/sample-config-files/loopback-*.test log.$$ log.$$.signal ; test \$a = 0 && exit 1 || exit \$a" 0 3
addopts=
case `uname -s` in
FreeBSD)
@@ -45,18 +46,38 @@ esac
# make sure that the --down script is executable -- fail (rather than
# skip) test if it isn't.
downscript="../tests/t_cltsrv-down.sh"
-root="${top_srcdir}/sample"
test -x "${root}/${downscript}" || chmod +x "${root}/${downscript}" || { echo >&2 "${root}/${downscript} is not executable, failing." ; exit 1 ; }
echo "The following test will take about two minutes." >&2
echo "If the addresses are in use, this test will retry up to two times." >&2
+set -- $(ifconfig lo0 | grep -E '\<inet' | head -n1)
+add=
+if [ "x$1$2" = "x" ] ; then
+ echo >&2 "### NO ADDRESSES ON LOOPBACK INTERFACE lo0, SKIPPING TEST ###"
+ exit 77
+fi
+if [ "inet6" = "$1" ] ; then
+ add='proto udp6 '
+fi
+for i in server client ; do
+ sed -e "s/localhost/$2/" -e "/^remote /a\\
+$add" ${root}/sample-config-files/loopback-$i \
+ >${root}/sample-config-files/loopback-$i.test
+done
+
# go
success=0
for i in 1 2 3 ; do
set +e
(
- "${openvpn}" --script-security 2 --cd "${root}" ${addopts} --setenv role srv --down "${downscript}" --tls-exit --ping-exit 180 --config "sample-config-files/loopback-server" &
- "${openvpn}" --script-security 2 --cd "${top_srcdir}/sample" ${addopts} --setenv role clt --down "${downscript}" --tls-exit --ping-exit 180 --config "sample-config-files/loopback-client"
+ "${openvpn}" --script-security 2 \
+ --cd "${root}" ${addopts} --setenv role srv \
+ --down "${downscript}" --tls-exit --ping-exit 180 \
+ --config "sample-config-files/loopback-server.test" &
+ "${openvpn}" --script-security 2 \
+ --cd "${top_srcdir}/sample" ${addopts} --setenv role clt \
+ --down "${downscript}" --tls-exit --ping-exit 180 \
+ --config "sample-config-files/loopback-client.test"
) 3>log.$$.signal >log.$$ 2>&1
e1=$?
wait $!

View File

@@ -0,0 +1,19 @@
#!/bin/sh
set -x
OPENVPN_RUNDIR="%%OPENVPN_RUNDIR%%"
OPENVPN_LOGDIR="%%OPENVPN_LOGDIR%%"
OPENVPN_CONFDIR="%%OPENVPN_CONFDIR%%"
case $2 in
PRE-INSTALL)
install -d -o root -g wheel -m 0750 ${OPENVPN_RUNDIR}
install -d -o root -g wheel -m 0750 ${OPENVPN_LOGDIR}
install -d -o root -g wheel -m 0750 ${OPENVPN_CONFDIR}
;;
POST-INSTALL)
;;
esac
exit 0
#EOF

View File

@@ -0,0 +1,20 @@
### ------------------------------------------------------------------------
### The OpenVPN FreeBSD port, since v2.0.1, uses rcNG to start OpenVPN.
### Edit /etc/rc.conf to start OpenVPN automatically at system startup.
### See %%PREFIX%%/etc/rc.d/openvpn%%RCSFX%% for details.
### ------------------------------------------------------------------------
### To get OpenVPN 1.X to talk with the new 2.0 version, you may need to
### edit the 1.X configuration file by adding these lines:
### tun-mtu 1500
### tun-mtu-extra 32
### mssfix 1450
### key-method 2 <- this key-method line only for TLS setups
### - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
### WARNING: THE DEFAULT PORT HAS CHANGED AND IS NOW 1194!
### OpenVPN 1.6 and older used 5000 rather than 1194 as their default
### port, so add the proper port options to your configuration file!
### - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
### For further compatibility, see <http://openvpn.net/relnotes.html>
### ------------------------------------------------------------------------
### If you want to donate to OpenVPN: <http://openvpn.net/donate.html>
### ------------------------------------------------------------------------

View File

@@ -0,0 +1,29 @@
set -e
rcvers() {
# determine if we have "old" or "new" (rcorder integration) scheme
# for %%PREFIX%%/etc/rc.d/* files
if test $1 -ge 700007 || test $1 -lt 700000 -a $1 -ge 600101 ; then
echo 2
else
echo 1
fi
}
if [ "$2" = INSTALL ] ; then
# check if the base system is new enough for us,
# which should only matter for package installs.
buildrc=$(rcvers %%OSVERSION%%)
execrc=$(rcvers $(sysctl -n kern.osreldate) )
if test $buildrc -gt $execrc ; then
cat <<EOF
Error: this package, $1, was compiled for a newer FreeBSD
====== version that uses different boot scripts.
Therefore, the rc.d script WILL NOT WORK.
Please update your ports tree and install security/openvpn from there.
EOF
exit 1
fi
fi

View File

@@ -0,0 +1,27 @@
#!/bin/sh
# OpenVPN simple up/down script for openresolvconf integration.
# (C) Copyright 2016 Baptiste Daroussin
# BSD 2-clause license.
set -e +u
: ${script_type:=down}
case "${script_type}" in
up)
i=1
while :; do
eval option=\"\$foreign_option_${i}\" || break
[ "${option}" ] || break
set -- ${option}
i=$((i + 1))
[ "$1" = "dhcp-option" ] || continue
case "$2" in
DNS) echo "nameserver ${3}" ;;
DOMAIN) echo "domain ${3}" ;;
DOMAIN-SEARCH) echo "search ${3}" ;;
esac
done | /sbin/resolvconf -a "${dev}"
;;
down)
/sbin/resolvconf -d "${dev}" -f
;;
esac

View File

@@ -0,0 +1,10 @@
OpenVPN is a robust, scalable and highly configurable VPN (Virtual Private
Network) daemon which can be used to securely link two or more private networks
using an encrypted tunnel over the internet. It can operate over UDP or TCP,
can use SSL or a pre-shared secret to authenticate peers, and in SSL mode, one
server can handle many clients.
WWW: http://openvpn.net/
- Matthias Andree
matthias.andree@gmx.de

View File

@@ -1,4 +1,3 @@
etc/rc.d/openvpn
include/openvpn-msg.h
include/openvpn-plugin.h
lib/openvpn/plugins/openvpn-plugin-auth-pam.la
@@ -13,6 +12,8 @@ share/doc/openvpn/COPYING
share/doc/openvpn/COPYRIGHT.GPL
share/doc/openvpn/gui-notes.txt
share/doc/openvpn/management-notes.txt
share/doc/openvpn/openvpn-examples.5.html
share/doc/openvpn/openvpn.8.html
share/doc/openvpn/README
share/doc/openvpn/README.auth-pam
share/doc/openvpn/README.down-root
@@ -21,19 +22,7 @@ share/examples/openvpn/client.conf
share/examples/openvpn/server.conf
share/examples/openvpn/tls-home.conf
share/examples/openvpn/tls-office.conf
@dir etc/rc.d
@dir etc
@dir include
@dir lib/openvpn/plugins
@dir lib/openvpn
@dir lib
@dir man/man5
@dir man/man8
@dir man
@dir sbin
@dir share/doc/openvpn
@dir share/doc
@dir share/examples/openvpn
@dir share/examples
@dir share
@dir .

View File

@@ -2,7 +2,7 @@
# $Id$
#
PORTNAME= openvpn
PORTVERSION= 2.6.6
PORTVERSION= 2.6.8
CATEGORIES= security net
#MASTER_SITES= http://openvpn.net/release/
MASTER_SITES+= http://swupdate.openvpn.net/community/releases/
@@ -32,7 +32,7 @@ CONFIGURE_ENV+= ac_cv_prog_CMAKE= CMAKE=
OPENVPN_RUNDIR= /var/run/openvpn
OPENVPN_LOGDIR= /var/log/openvpn
OPENVPN_CONFDIR= ${PREFIX}/etc/openvpn
OPENVPN_CONFDIR= ${PREFIX}/etc/openvpn
SUB_LIST+= OPENVPN_RUNDIR=${OPENVPN_RUNDIR}

View File

@@ -1,3 +1,3 @@
TIMESTAMP = 1694376351
SHA256 (openvpn-2.6.6.tar.gz) = 3b074f392818b31aa529b84f76e8b5e4ad03fca764924f46d906bceaaf421034
SIZE (openvpn-2.6.6.tar.gz) = 1901689
TIMESTAMP = 1705433849
SHA256 (openvpn-2.6.8.tar.gz) = 5ede1565c8a6d880100f7f235317a7ee9eea83d5052db5547f13a9e76af7805d
SIZE (openvpn-2.6.8.tar.gz) = 1896563

View File

@@ -2,7 +2,7 @@
# $Id$
#
PORTNAME= unbound
PORTVERSION= 1.16.2
PORTVERSION= 1.19.1
CATEGORIES= dns
MASTER_SITES= http://unbound.net/downloads/

View File

@@ -1,3 +1,3 @@
TIMESTAMP = 1663883009
SHA256 (unbound-1.16.2.tar.gz) = 2e32f283820c24c51ca1dd8afecfdb747c7385a137abe865c99db4b257403581
SIZE (unbound-1.16.2.tar.gz) = 6204297
TIMESTAMP = 1709843907
SHA256 (unbound-1.19.1.tar.gz) = bc1d576f3dd846a0739adc41ffaa702404c6767d2b6082deb9f2f97cbb24a3a9
SIZE (unbound-1.19.1.tar.gz) = 6340435