mirror of
https://github.com/beard7n/bsdports.git
synced 2026-04-10 02:21:15 +02:00
unbound updated; added postgresql15
This commit is contained in:
67
net/openvpn-devel/Makefile
Normal file
67
net/openvpn-devel/Makefile
Normal file
@@ -0,0 +1,67 @@
|
||||
#
|
||||
# $Id$
|
||||
#
|
||||
PORTNAME= openvpn
|
||||
#PORTVERSION= 2.6.8
|
||||
CATEGORIES= security net
|
||||
#MASTER_SITES= http://openvpn.net/release/
|
||||
MASTER_SITES+= http://swupdate.openvpn.net/community/releases/
|
||||
MASTER_SITES+= http://build.openvpn.net/downloads/releases/
|
||||
|
||||
MAINTAINER= homeunix7@gmail.com
|
||||
COMMENT= Secure IP/Ethernet tunnel daemon
|
||||
|
||||
LIB_DEPENDS+= liblzo2.so:arch/liblzo2
|
||||
|
||||
DISTVERSION= g20231109
|
||||
USE_GITLAB= yes
|
||||
GL_COMMIT= efad93d049c318a3bd9ea5956c6ac8237b8d6d70
|
||||
|
||||
WRKSRC= ${WRKDIR}/${PORTNAME}-${GL_COMMIT}
|
||||
|
||||
GNU_CONFIGURE= yes
|
||||
USES+= gmake autoreconf
|
||||
CONFIGURE_ARGS+= --enable-password-save
|
||||
#CONFIGURE_ARGS+= --with-crypto-library=openssl
|
||||
CONFIGURE_ARGS+= --mandir=${PREFIX}/man
|
||||
CONFIGURE_ARGS+= --program-transform-name=''
|
||||
CPPFLAGS+= -I${LOCALBASE}/include
|
||||
LDFLAGS+= -L${LOCALBASE}/lib
|
||||
SHEBANG_FILES= sample/sample-scripts/verify-cn
|
||||
SHEBANG_FILES+= sample/sample-scripts/auth-pam.pl
|
||||
SHEBANG_FILES+= sample/sample-scripts/ucn.pl
|
||||
|
||||
CONFIGURE_ARGS+= --enable-strict
|
||||
CONFIGURE_ENV+= ac_cv_prog_CMAKE= CMAKE=
|
||||
|
||||
|
||||
OPENVPN_RUNDIR= /var/run/openvpn
|
||||
OPENVPN_LOGDIR= /var/log/openvpn
|
||||
OPENVPN_CONFDIR= ${PREFIX}/etc/openvpn
|
||||
|
||||
|
||||
SUB_LIST+= OPENVPN_RUNDIR=${OPENVPN_RUNDIR}
|
||||
SUB_LIST+= OPENVPN_LOGDIR=${OPENVPN_LOGDIR}
|
||||
SUB_LIST+= OPENVPN_CONFDIR=${OPENVPN_CONFDIR}
|
||||
|
||||
|
||||
USE_RC_SUBR= openvpn.sh
|
||||
USE_LDCONFIG= ${PREFIX}/lib
|
||||
|
||||
SUB_FILES= pkg-message pkg-install
|
||||
|
||||
post-build:
|
||||
# cd ${WRKSRC}/plugin/down-root && ${MAKE}
|
||||
# cd ${WRKSRC}/plugin/auth-pam && ${CC} ${CPPFLAGS} -I../.. -DDLOPEN_PAM=0 ${CFLAGS} -fPIC -shared -Wl,-soname,openvpn-auth-pam.so -o openvpn-auth-pam.so auth-pam.c pamdl.c -lc -lpam
|
||||
## @# self-tests here
|
||||
## cd ${WRKSRC} && ${MAKE} check
|
||||
|
||||
post-stage:
|
||||
${MKDIR} ${STAGEDIR}${EXAMPLESDIR}
|
||||
${INSTALL_DATA} ${WRKSRC}/sample/sample-config-files/*.conf ${STAGEDIR}${EXAMPLESDIR}
|
||||
# ${MKDIR} ${PREFIX}/lib
|
||||
# ${INSTALL_PROGRAM} ${WRKSRC}/plugin/down-root/openvpn-down-root.so ${PREFIX}/lib
|
||||
# ${INSTALL_PROGRAM} ${WRKSRC}/plugin/auth-pam/openvpn-auth-pam.so ${PREFIX}/lib
|
||||
|
||||
.include <bsd.port.mk>
|
||||
#EOF
|
||||
3
net/openvpn-devel/distinfo
Normal file
3
net/openvpn-devel/distinfo
Normal file
@@ -0,0 +1,3 @@
|
||||
TIMESTAMP = 1707047858
|
||||
SHA256 (openvpn-openvpn-efad93d049c318a3bd9ea5956c6ac8237b8d6d70_GL0.tar.gz) = db885c742d8753942fdff960bc3a997cbad235790b29a2751cbf691f88cd20e7
|
||||
SIZE (openvpn-openvpn-efad93d049c318a3bd9ea5956c6ac8237b8d6d70_GL0.tar.gz) = 1194056
|
||||
71
net/openvpn-devel/files/openvpn.sh.in
Normal file
71
net/openvpn-devel/files/openvpn.sh.in
Normal file
@@ -0,0 +1,71 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# $Id$
|
||||
#
|
||||
# PROVIDE: openvpn
|
||||
# REQUIRE: DAEMON
|
||||
# KEYWORD: shutdown
|
||||
|
||||
. /etc/rc.subr
|
||||
|
||||
name="openvpn"
|
||||
rcvar="openvpn_enable"
|
||||
|
||||
command="%%PREFIX%%/sbin/${name}"
|
||||
command_args=""
|
||||
|
||||
load_rc_config ${name}
|
||||
|
||||
extra_commands="list"
|
||||
|
||||
start_cmd="openvpn_start"
|
||||
stop_cmd="openvpn_stop"
|
||||
restart_cmd="openvpn_restart"
|
||||
reload_cmd="openvpn_reload"
|
||||
list_cmd="openvpn_list"
|
||||
|
||||
openvpn_list() {
|
||||
echo -n "$1 "
|
||||
}
|
||||
|
||||
openvpn_start() {
|
||||
serv="$1"
|
||||
conffile="%%PREFIX%%/etc/openvpn/${serv}.conf"
|
||||
pidfile="/var/run/openvpn/${serv}.pid"
|
||||
echo "Start openvpn $serv."
|
||||
$command --config $conf --writepid $pidfile --daemon
|
||||
}
|
||||
|
||||
openvpn_stop() {
|
||||
serv="$1"
|
||||
pidfile="/var/run/openvpn/${serv}.pid"
|
||||
pid=$(check_pidfile $pidfile $command)
|
||||
test ! -z "$pid" && ( kill "$pid"; echo "Stopping openvpn $serv.")
|
||||
wait_for_pids $pid && rm -f "$pidfile"
|
||||
}
|
||||
|
||||
openvpn_restart() {
|
||||
serv="$1"
|
||||
openvpn_stop $serv
|
||||
openvpn_start $serv
|
||||
}
|
||||
|
||||
openvpn_reload() {
|
||||
serv="$1"
|
||||
pid=$(check_pidfile $pidfile $command)
|
||||
test ! -z "$pid" && ( kill -HUP "$pid")
|
||||
}
|
||||
|
||||
load_rc_config $name
|
||||
|
||||
: ${openvpn_enable=NO}
|
||||
|
||||
test -z "$2" && conflist=$(find %%PREFIX%%/etc/openvpn -maxdepth 1 -name '*.conf')
|
||||
test ! -z "$2" && test -r "%%PREFIX%%/etc/openvpn/${2}.conf" && conflist="%%PREFIX%%/etc/openvpn/${2}.conf"
|
||||
|
||||
for conf in $conflist; do
|
||||
serv="$(basename $conf .conf)"
|
||||
pidfile="/var/run/openvpn/${serv}.pid"
|
||||
run_rc_command "$1" "$serv"
|
||||
done
|
||||
#EOF
|
||||
91
net/openvpn-devel/files/openvpn.sh.in.old
Normal file
91
net/openvpn-devel/files/openvpn.sh.in.old
Normal file
@@ -0,0 +1,91 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# PROVIDE: openvpn
|
||||
# REQUIRE: DAEMON
|
||||
# KEYWORD: shutdown
|
||||
|
||||
#
|
||||
# This script supports running multiple instances of openvpn.
|
||||
# To run additional instance link this script to something like
|
||||
# % ln -s openvpn openvpn_foo
|
||||
# and define additional openvpn_foo_* variables in one of
|
||||
# /etc/rc.conf, /etc/rc.conf.local or /etc/rc.conf.d/openvpn_foo
|
||||
#
|
||||
# Below NAME should be substituted with the name of this script. By default
|
||||
# it is openvpn, so read as openvpn_enable. If you linked the script to
|
||||
# openvpn_foo, then read as openvpn_foo_enable etc.
|
||||
#
|
||||
# The following variables are supported (defaults are shown).
|
||||
# You can place them in any of
|
||||
# /etc/rc.conf, /etc/rc.conf.local or /etc/rc.conf.d/NAME
|
||||
#
|
||||
# NAME_enable="NO" # set to YES to enable openvpn
|
||||
# NAME_if="" # driver(s) to load, set to "tun", "tap" or "tun tap"
|
||||
#
|
||||
# # optional:
|
||||
# NAME_flags="" # additional command line arguments
|
||||
# NAME_configfile="%%PREFIX%%/etc/openvpn/NAME.conf" # --config file
|
||||
# NAME_dir="%%PREFIX%%/etc/openvpn" # --cd directory
|
||||
#
|
||||
# You also need to set NAME_configfile and NAME_dir, if the configuration
|
||||
# file and directory where keys and certificates reside differ from the above
|
||||
# settings.
|
||||
#
|
||||
# Note that we deliberately refrain from unloading drivers.
|
||||
#
|
||||
# For further documentation, please see openvpn(8).
|
||||
#
|
||||
|
||||
. /etc/rc.subr
|
||||
|
||||
|
||||
name="openvpn"
|
||||
extra_commands="reload"
|
||||
pidfile="/var/run/${name}.pid"
|
||||
command="%%PREFIX%%/sbin/openvpn"
|
||||
start_precmd="openvpn_start_precmd"
|
||||
stop_postcmd="openvpn_stop_postcmd"
|
||||
|
||||
rcvar="${name}_enable"
|
||||
|
||||
openvpn_start_precmd()
|
||||
{
|
||||
for i in $interfaces ; do
|
||||
# FreeBSD <= 5.4 does not know kldstat's -m option
|
||||
# FreeBSD >= 6.0 does not add debug.* sysctl information
|
||||
# in the default build - we check both to keep things simple
|
||||
if ! sysctl debug.if_${i}_debug >/dev/null 2>&1 \
|
||||
&& ! kldstat -m if_${i} >/dev/null 2>&1 ; then
|
||||
if ! kldload if_${i} ; then
|
||||
warn "Could not load $i module."
|
||||
return 1
|
||||
fi
|
||||
fi
|
||||
done
|
||||
return 0
|
||||
}
|
||||
|
||||
openvpn_stop_postcmd()
|
||||
{
|
||||
rm -f "$pidfile" || warn "Could not remove $pidfile."
|
||||
}
|
||||
|
||||
|
||||
|
||||
load_rc_config aaaaa
|
||||
|
||||
: ${openvpn_enable="NO"}
|
||||
: ${openvpn_flags=""}
|
||||
: ${openvpn_if=""}
|
||||
: ${openvpn_configfile="%%PREFIX%%/etc/openvpn/openvpn.conf"}
|
||||
: ${openvpn_dir="%%PREFIX%%/etc/openvpn"}
|
||||
|
||||
configfile="${openvpn_configfile}"
|
||||
dir="${openvpn_dir}"
|
||||
interfaces="${openvpn_if}"
|
||||
|
||||
required_files=${configfile}
|
||||
command_args="--cd ${dir} --daemon ${name} --config ${configfile} --writepid ${pidfile}"
|
||||
|
||||
run_rc_command "$1"
|
||||
#EOF
|
||||
@@ -0,0 +1,13 @@
|
||||
--- sample/sample-config-files/loopback-client.orig 2016-08-23 14:16:22 UTC
|
||||
+++ sample/sample-config-files/loopback-client
|
||||
@@ -9,8 +9,8 @@
|
||||
# ./openvpn --config sample-config-files/loopback-client (In one window)
|
||||
# ./openvpn --config sample-config-files/loopback-server (Simultaneously in another window)
|
||||
|
||||
-rport 16000
|
||||
-lport 16001
|
||||
+rport 16100
|
||||
+lport 16101
|
||||
remote localhost
|
||||
local localhost
|
||||
dev null
|
||||
@@ -0,0 +1,13 @@
|
||||
--- sample/sample-config-files/loopback-server.orig 2016-08-23 14:16:22 UTC
|
||||
+++ sample/sample-config-files/loopback-server
|
||||
@@ -9,8 +9,8 @@
|
||||
# ./openvpn --config sample-config-files/loopback-client (In one window)
|
||||
# ./openvpn --config sample-config-files/loopback-server (Simultaneously in another window)
|
||||
|
||||
-rport 16001
|
||||
-lport 16000
|
||||
+rport 16101
|
||||
+lport 16100
|
||||
remote localhost
|
||||
local localhost
|
||||
dev null
|
||||
65
net/openvpn-devel/files/patch-tests__t_cltsrv.sh
Normal file
65
net/openvpn-devel/files/patch-tests__t_cltsrv.sh
Normal file
@@ -0,0 +1,65 @@
|
||||
--- tests/t_cltsrv.sh.orig 2016-08-23 13:10:22 UTC
|
||||
+++ tests/t_cltsrv.sh
|
||||
@@ -1,7 +1,7 @@
|
||||
#! /bin/sh
|
||||
#
|
||||
# t_cltsrv.sh - script to test OpenVPN's crypto loopback
|
||||
-# Copyright (C) 2005, 2006, 2008 Matthias Andree
|
||||
+# Copyright (C) 2005 - 2014 Matthias Andree
|
||||
#
|
||||
# This program is free software; you can redistribute it and/or
|
||||
# modify it under the terms of the GNU General Public License
|
||||
@@ -22,8 +22,9 @@ set -e
|
||||
top_srcdir="${top_srcdir:-..}"
|
||||
top_builddir="${top_builddir:-..}"
|
||||
openvpn="${openvpn:-${top_builddir}/src/openvpn/openvpn}"
|
||||
-trap "rm -f log.$$ log.$$.signal ; trap 0 ; exit 77" 1 2 15
|
||||
-trap "rm -f log.$$ log.$$.signal ; exit 1" 0 3
|
||||
+root="${top_srcdir}/sample"
|
||||
+trap "rm -f ${root}/sample-config-files/loopback-*.test log.$$ log.$$.signal ; trap 0 ; exit 77" 1 2 15
|
||||
+trap "a=\$? ; rm -f ${root}/sample-config-files/loopback-*.test log.$$ log.$$.signal ; test \$a = 0 && exit 1 || exit \$a" 0 3
|
||||
addopts=
|
||||
case `uname -s` in
|
||||
FreeBSD)
|
||||
@@ -45,18 +46,38 @@ esac
|
||||
# make sure that the --down script is executable -- fail (rather than
|
||||
# skip) test if it isn't.
|
||||
downscript="../tests/t_cltsrv-down.sh"
|
||||
-root="${top_srcdir}/sample"
|
||||
test -x "${root}/${downscript}" || chmod +x "${root}/${downscript}" || { echo >&2 "${root}/${downscript} is not executable, failing." ; exit 1 ; }
|
||||
echo "The following test will take about two minutes." >&2
|
||||
echo "If the addresses are in use, this test will retry up to two times." >&2
|
||||
|
||||
+set -- $(ifconfig lo0 | grep -E '\<inet' | head -n1)
|
||||
+add=
|
||||
+if [ "x$1$2" = "x" ] ; then
|
||||
+ echo >&2 "### NO ADDRESSES ON LOOPBACK INTERFACE lo0, SKIPPING TEST ###"
|
||||
+ exit 77
|
||||
+fi
|
||||
+if [ "inet6" = "$1" ] ; then
|
||||
+ add='proto udp6 '
|
||||
+fi
|
||||
+for i in server client ; do
|
||||
+ sed -e "s/localhost/$2/" -e "/^remote /a\\
|
||||
+$add" ${root}/sample-config-files/loopback-$i \
|
||||
+ >${root}/sample-config-files/loopback-$i.test
|
||||
+done
|
||||
+
|
||||
# go
|
||||
success=0
|
||||
for i in 1 2 3 ; do
|
||||
set +e
|
||||
(
|
||||
- "${openvpn}" --script-security 2 --cd "${root}" ${addopts} --setenv role srv --down "${downscript}" --tls-exit --ping-exit 180 --config "sample-config-files/loopback-server" &
|
||||
- "${openvpn}" --script-security 2 --cd "${top_srcdir}/sample" ${addopts} --setenv role clt --down "${downscript}" --tls-exit --ping-exit 180 --config "sample-config-files/loopback-client"
|
||||
+ "${openvpn}" --script-security 2 \
|
||||
+ --cd "${root}" ${addopts} --setenv role srv \
|
||||
+ --down "${downscript}" --tls-exit --ping-exit 180 \
|
||||
+ --config "sample-config-files/loopback-server.test" &
|
||||
+ "${openvpn}" --script-security 2 \
|
||||
+ --cd "${top_srcdir}/sample" ${addopts} --setenv role clt \
|
||||
+ --down "${downscript}" --tls-exit --ping-exit 180 \
|
||||
+ --config "sample-config-files/loopback-client.test"
|
||||
) 3>log.$$.signal >log.$$ 2>&1
|
||||
e1=$?
|
||||
wait $!
|
||||
19
net/openvpn-devel/files/pkg-install.in
Normal file
19
net/openvpn-devel/files/pkg-install.in
Normal file
@@ -0,0 +1,19 @@
|
||||
#!/bin/sh
|
||||
|
||||
set -x
|
||||
|
||||
OPENVPN_RUNDIR="%%OPENVPN_RUNDIR%%"
|
||||
OPENVPN_LOGDIR="%%OPENVPN_LOGDIR%%"
|
||||
OPENVPN_CONFDIR="%%OPENVPN_CONFDIR%%"
|
||||
|
||||
case $2 in
|
||||
PRE-INSTALL)
|
||||
install -d -o root -g wheel -m 0750 ${OPENVPN_RUNDIR}
|
||||
install -d -o root -g wheel -m 0750 ${OPENVPN_LOGDIR}
|
||||
install -d -o root -g wheel -m 0750 ${OPENVPN_CONFDIR}
|
||||
;;
|
||||
POST-INSTALL)
|
||||
;;
|
||||
esac
|
||||
exit 0
|
||||
#EOF
|
||||
20
net/openvpn-devel/files/pkg-message.in
Normal file
20
net/openvpn-devel/files/pkg-message.in
Normal file
@@ -0,0 +1,20 @@
|
||||
### ------------------------------------------------------------------------
|
||||
### The OpenVPN FreeBSD port, since v2.0.1, uses rcNG to start OpenVPN.
|
||||
### Edit /etc/rc.conf to start OpenVPN automatically at system startup.
|
||||
### See %%PREFIX%%/etc/rc.d/openvpn%%RCSFX%% for details.
|
||||
### ------------------------------------------------------------------------
|
||||
### To get OpenVPN 1.X to talk with the new 2.0 version, you may need to
|
||||
### edit the 1.X configuration file by adding these lines:
|
||||
### tun-mtu 1500
|
||||
### tun-mtu-extra 32
|
||||
### mssfix 1450
|
||||
### key-method 2 <- this key-method line only for TLS setups
|
||||
### - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||||
### WARNING: THE DEFAULT PORT HAS CHANGED AND IS NOW 1194!
|
||||
### OpenVPN 1.6 and older used 5000 rather than 1194 as their default
|
||||
### port, so add the proper port options to your configuration file!
|
||||
### - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||||
### For further compatibility, see <http://openvpn.net/relnotes.html>
|
||||
### ------------------------------------------------------------------------
|
||||
### If you want to donate to OpenVPN: <http://openvpn.net/donate.html>
|
||||
### ------------------------------------------------------------------------
|
||||
29
net/openvpn-devel/files/pkg-req.in
Normal file
29
net/openvpn-devel/files/pkg-req.in
Normal file
@@ -0,0 +1,29 @@
|
||||
set -e
|
||||
|
||||
rcvers() {
|
||||
# determine if we have "old" or "new" (rcorder integration) scheme
|
||||
# for %%PREFIX%%/etc/rc.d/* files
|
||||
if test $1 -ge 700007 || test $1 -lt 700000 -a $1 -ge 600101 ; then
|
||||
echo 2
|
||||
else
|
||||
echo 1
|
||||
fi
|
||||
}
|
||||
|
||||
if [ "$2" = INSTALL ] ; then
|
||||
# check if the base system is new enough for us,
|
||||
# which should only matter for package installs.
|
||||
buildrc=$(rcvers %%OSVERSION%%)
|
||||
execrc=$(rcvers $(sysctl -n kern.osreldate) )
|
||||
if test $buildrc -gt $execrc ; then
|
||||
cat <<EOF
|
||||
|
||||
Error: this package, $1, was compiled for a newer FreeBSD
|
||||
====== version that uses different boot scripts.
|
||||
Therefore, the rc.d script WILL NOT WORK.
|
||||
Please update your ports tree and install security/openvpn from there.
|
||||
|
||||
EOF
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
27
net/openvpn-devel/files/up-script.sample
Normal file
27
net/openvpn-devel/files/up-script.sample
Normal file
@@ -0,0 +1,27 @@
|
||||
#!/bin/sh
|
||||
# OpenVPN simple up/down script for openresolvconf integration.
|
||||
# (C) Copyright 2016 Baptiste Daroussin
|
||||
# BSD 2-clause license.
|
||||
|
||||
set -e +u
|
||||
: ${script_type:=down}
|
||||
case "${script_type}" in
|
||||
up)
|
||||
i=1
|
||||
while :; do
|
||||
eval option=\"\$foreign_option_${i}\" || break
|
||||
[ "${option}" ] || break
|
||||
set -- ${option}
|
||||
i=$((i + 1))
|
||||
[ "$1" = "dhcp-option" ] || continue
|
||||
case "$2" in
|
||||
DNS) echo "nameserver ${3}" ;;
|
||||
DOMAIN) echo "domain ${3}" ;;
|
||||
DOMAIN-SEARCH) echo "search ${3}" ;;
|
||||
esac
|
||||
done | /sbin/resolvconf -a "${dev}"
|
||||
;;
|
||||
down)
|
||||
/sbin/resolvconf -d "${dev}" -f
|
||||
;;
|
||||
esac
|
||||
10
net/openvpn-devel/pkg-descr
Normal file
10
net/openvpn-devel/pkg-descr
Normal file
@@ -0,0 +1,10 @@
|
||||
OpenVPN is a robust, scalable and highly configurable VPN (Virtual Private
|
||||
Network) daemon which can be used to securely link two or more private networks
|
||||
using an encrypted tunnel over the internet. It can operate over UDP or TCP,
|
||||
can use SSL or a pre-shared secret to authenticate peers, and in SSL mode, one
|
||||
server can handle many clients.
|
||||
|
||||
WWW: http://openvpn.net/
|
||||
|
||||
- Matthias Andree
|
||||
matthias.andree@gmx.de
|
||||
@@ -1,4 +1,3 @@
|
||||
etc/rc.d/openvpn
|
||||
include/openvpn-msg.h
|
||||
include/openvpn-plugin.h
|
||||
lib/openvpn/plugins/openvpn-plugin-auth-pam.la
|
||||
@@ -13,6 +12,8 @@ share/doc/openvpn/COPYING
|
||||
share/doc/openvpn/COPYRIGHT.GPL
|
||||
share/doc/openvpn/gui-notes.txt
|
||||
share/doc/openvpn/management-notes.txt
|
||||
share/doc/openvpn/openvpn-examples.5.html
|
||||
share/doc/openvpn/openvpn.8.html
|
||||
share/doc/openvpn/README
|
||||
share/doc/openvpn/README.auth-pam
|
||||
share/doc/openvpn/README.down-root
|
||||
@@ -21,19 +22,7 @@ share/examples/openvpn/client.conf
|
||||
share/examples/openvpn/server.conf
|
||||
share/examples/openvpn/tls-home.conf
|
||||
share/examples/openvpn/tls-office.conf
|
||||
@dir etc/rc.d
|
||||
@dir etc
|
||||
@dir include
|
||||
@dir lib/openvpn/plugins
|
||||
@dir lib/openvpn
|
||||
@dir lib
|
||||
@dir man/man5
|
||||
@dir man/man8
|
||||
@dir man
|
||||
@dir sbin
|
||||
@dir share/doc/openvpn
|
||||
@dir share/doc
|
||||
@dir share/examples/openvpn
|
||||
@dir share/examples
|
||||
@dir share
|
||||
@dir .
|
||||
@@ -2,7 +2,7 @@
|
||||
# $Id$
|
||||
#
|
||||
PORTNAME= openvpn
|
||||
PORTVERSION= 2.6.6
|
||||
PORTVERSION= 2.6.8
|
||||
CATEGORIES= security net
|
||||
#MASTER_SITES= http://openvpn.net/release/
|
||||
MASTER_SITES+= http://swupdate.openvpn.net/community/releases/
|
||||
@@ -32,7 +32,7 @@ CONFIGURE_ENV+= ac_cv_prog_CMAKE= CMAKE=
|
||||
|
||||
OPENVPN_RUNDIR= /var/run/openvpn
|
||||
OPENVPN_LOGDIR= /var/log/openvpn
|
||||
OPENVPN_CONFDIR= ${PREFIX}/etc/openvpn
|
||||
OPENVPN_CONFDIR= ${PREFIX}/etc/openvpn
|
||||
|
||||
|
||||
SUB_LIST+= OPENVPN_RUNDIR=${OPENVPN_RUNDIR}
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
TIMESTAMP = 1694376351
|
||||
SHA256 (openvpn-2.6.6.tar.gz) = 3b074f392818b31aa529b84f76e8b5e4ad03fca764924f46d906bceaaf421034
|
||||
SIZE (openvpn-2.6.6.tar.gz) = 1901689
|
||||
TIMESTAMP = 1705433849
|
||||
SHA256 (openvpn-2.6.8.tar.gz) = 5ede1565c8a6d880100f7f235317a7ee9eea83d5052db5547f13a9e76af7805d
|
||||
SIZE (openvpn-2.6.8.tar.gz) = 1896563
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
# $Id$
|
||||
#
|
||||
PORTNAME= unbound
|
||||
PORTVERSION= 1.16.2
|
||||
PORTVERSION= 1.19.1
|
||||
CATEGORIES= dns
|
||||
MASTER_SITES= http://unbound.net/downloads/
|
||||
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
TIMESTAMP = 1663883009
|
||||
SHA256 (unbound-1.16.2.tar.gz) = 2e32f283820c24c51ca1dd8afecfdb747c7385a137abe865c99db4b257403581
|
||||
SIZE (unbound-1.16.2.tar.gz) = 6204297
|
||||
TIMESTAMP = 1709843907
|
||||
SHA256 (unbound-1.19.1.tar.gz) = bc1d576f3dd846a0739adc41ffaa702404c6767d2b6082deb9f2f97cbb24a3a9
|
||||
SIZE (unbound-1.19.1.tar.gz) = 6340435
|
||||
|
||||
Reference in New Issue
Block a user