summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDirkjan Ochtman <djc@gentoo.org>2010-08-23 13:34:28 +0000
committerDirkjan Ochtman <djc@gentoo.org>2010-08-23 13:34:28 +0000
commit1dc59f2fcdc02faaee60eb414f5b380ac6f22713 (patch)
tree4b27f4535e198ab64c08eb1c35928ac6836eb6a4 /net-misc/openvpn
parentVersion bump. Cleanup (diff)
downloadhistorical-1dc59f2fcdc02faaee60eb414f5b380ac6f22713.tar.gz
historical-1dc59f2fcdc02faaee60eb414f5b380ac6f22713.tar.bz2
historical-1dc59f2fcdc02faaee60eb414f5b380ac6f22713.zip
Clean up old versions.
Package-Manager: portage-2.1.8.3/cvs/Linux x86_64
Diffstat (limited to 'net-misc/openvpn')
-rw-r--r--net-misc/openvpn/ChangeLog8
-rw-r--r--net-misc/openvpn/Manifest18
-rw-r--r--net-misc/openvpn/files/openvpn-2.0.7-pam.patch34
-rw-r--r--net-misc/openvpn/files/openvpn-2.0.7-persistent.patch44
-rw-r--r--net-misc/openvpn/openvpn-2.0.6.ebuild132
-rw-r--r--net-misc/openvpn/openvpn-2.0.7-r2.ebuild142
-rw-r--r--net-misc/openvpn/openvpn-2.1_rc19.ebuild161
-rw-r--r--net-misc/openvpn/openvpn-2.1_rc20.ebuild185
-rw-r--r--net-misc/openvpn/openvpn-2.1_rc21.ebuild188
9 files changed, 8 insertions, 904 deletions
diff --git a/net-misc/openvpn/ChangeLog b/net-misc/openvpn/ChangeLog
index bb91d9e934ad..1a46c98f91d4 100644
--- a/net-misc/openvpn/ChangeLog
+++ b/net-misc/openvpn/ChangeLog
@@ -1,6 +1,12 @@
# ChangeLog for net-misc/openvpn
# Copyright 1999-2010 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/openvpn/ChangeLog,v 1.173 2010/08/23 13:21:58 djc Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-misc/openvpn/ChangeLog,v 1.174 2010/08/23 13:34:28 djc Exp $
+
+ 23 Aug 2010; Dirkjan Ochtman <djc@gentoo.org> -openvpn-2.0.6.ebuild,
+ -openvpn-2.0.7-r2.ebuild, -files/openvpn-2.0.7-pam.patch,
+ -files/openvpn-2.0.7-persistent.patch, -openvpn-2.1_rc19.ebuild,
+ -openvpn-2.1_rc20.ebuild, -openvpn-2.1_rc21.ebuild:
+ Clean up old versions.
23 Aug 2010; Dirkjan Ochtman <djc@gentoo.org> metadata.xml:
Add myself as a maintainer.
diff --git a/net-misc/openvpn/Manifest b/net-misc/openvpn/Manifest
index 71746acf9ffc..8e8800c1db22 100644
--- a/net-misc/openvpn/Manifest
+++ b/net-misc/openvpn/Manifest
@@ -1,6 +1,4 @@
AUX down.sh 943 RMD160 db43a525c9eb2ccb538e938e0b7f4359af22e4de SHA1 261acc68a24108526345a7d117bba15dbcebaa6e SHA256 39debebcd8c899f20e6d355cbc8eaab46e28b83a9f6c33a94c065688a4f3d2c7
-AUX openvpn-2.0.7-pam.patch 1236 RMD160 3f9035a7005b206e1447dfd75edcb65cb5531b2d SHA1 09c362da6cea1d6f7e6ff060a4e92493a5b34cba SHA256 b5906cc1bff00ebc3dc9a58861388493aa6d2be774dbacba63c2cfcc8bfa4f92
-AUX openvpn-2.0.7-persistent.patch 1857 RMD160 b3232feb19810ac405cd7af6bb692ed03f9c44c2 SHA1 5ac9d0ff58f56ef771d44bb1dc13322815339e72 SHA256 51de714f2191ac3ea59a7f7c5a0aa1c0bf15ee5d79ace10f2276d415cd0f59e0
AUX openvpn-2.0.9-pam.patch 1190 RMD160 e914b19aeeb9d9d108394aa61bacd019a3223d4a SHA1 774c1d7fd322249a3ba9d42995640d94093a33b2 SHA256 c485acbb8dae4c9440ebd76a92e2de733faa6320ee6fb2d2408111c802a74b7e
AUX openvpn-2.0.9-persistent.patch 1851 RMD160 18571bd041024001339fce6dc2472567047c5508 SHA1 a982646053e94f99f514080c2188215a7edcab2a SHA256 60a825023db6b1e1082bc3de4c2efb47e6cf6c5bb73c78de03c29ab8fe79c7ac
AUX openvpn-2.1.conf 892 RMD160 687a747ed2f801b051438d02da8fcd44c6954484 SHA1 e65db7d972483c9391ef92d2931d9db7b69e4329 SHA256 330149a83684ddabe413d134d4c8efad4c88b18c2ab67165014deff5f7fffad2
@@ -9,27 +7,13 @@ AUX openvpn-2.1_rc13-peercred.patch 251 RMD160 26123eedc9b685fb01de93c1141588f80
AUX openvpn-2.1_rc20-pkcs11.patch 622 RMD160 7d7a41796096ed8f54f646f4ce57cf91b53cad2e SHA1 1748474195bc318c5232290fca5a9d6edaf95e1c SHA256 f972c473645f880c27b3c72379c49183f1e27d352f401d5ea7e734fad99f2d6c
AUX openvpn.init 1486 RMD160 7005230b0dc3ea400aa22c9a01c2aa034d8baace SHA1 1670c08a2bec65c2e3529aec8d377bad6cb2e0e5 SHA256 c4b9e0899fa5ee0b90c5100da7711dc7a6a5658f10042b0feda9e7efb90a11cf
AUX up.sh 2594 RMD160 17576f73e6de08828aeda2a8776b4a36331fa855 SHA1 4eb4d1e857053f86ea886dec8e8e6f45174df774 SHA256 848da0929c37b2112769232fbbdf61961b6107c6726d4b74d1ceb034b39ad5dd
-DIST openvpn-2.0.6.tar.gz 664816 RMD160 cf3cd807bb657baf317e896b57900958cf442a63 SHA1 046f3811831a06e4fbc9c64544faaecf04547ae5 SHA256 1074c9fb5a7881e6d4ff0b125cf1e44a9fb650beef187f061785698522453003
-DIST openvpn-2.0.7.tar.gz 665129 RMD160 b89f6df5ff08326f4e07e6cd4abda633627ef9e4 SHA1 74a4d19e42ca226f50ab5bdba16aa4a130c5e431 SHA256 9e29ebfb76375379b4ca12c2270dff3b4b1636eb643747c69249ae206833052e
DIST openvpn-2.0.9.tar.gz 669076 RMD160 e2b73071c8d6e9fba93afe46355a35882773d936 SHA1 6e900994bc9e4a14096173931c565ac27b0e7bb5 SHA256 347c551e7c88affc1f4b7a4b715080253c9298dcc512ed29fe8ca5cd26d015d9
DIST openvpn-2.1.0.tar.gz 879876 RMD160 3a97b9db31bc4828676c49ee18acbd06db53c75a SHA1 dc6ff5b1a14e4edb85ec92930b10e4ee5e8d03b3 SHA256 6634f89575040b1987a1e793b5d6fedb11088007eb150dbdab4a8cfdf3c0686e
DIST openvpn-2.1.0_eurephia.patch 2774 RMD160 6d65df5110dff6c9b28262dc40ada15fc30bdf34 SHA1 3b96a0c10f2f1ef586b4f861efb7d048fd51fd44 SHA256 9604f1bcc8d60361795741fc74caa9f0fad3c087e4023ed2d0af0b13c6650896
DIST openvpn-2.1_rc15.tar.gz 833429 RMD160 90333139815a1681ab7a6aeba9bc5a005c5a9713 SHA1 a07f9b24947428e905d0c41339b9ed522358c672 SHA256 66cfe347da6ab29ae39c80527714079cdb5699fdf453f7e031dd2ec0172d13a5
-DIST openvpn-2.1_rc19.tar.gz 839955 RMD160 aee1c3f302a8b79d558b80aa9dc236d5501cde84 SHA1 6fad4ea35b466591dc737c47f6a90ec4d9be742e SHA256 d7f52e2217ed1cf367ca93257b27c8acb29fcae4fcaa31b4a94146a3c7a7de33
-DIST openvpn-2.1_rc20-ipv6-0.4.9.patch.gz 20193 RMD160 4d822c0b85e7665257ff397159bbab95b49cb6a0 SHA1 ec9acc41dea6b5025137fff007d51fe3139ae357 SHA256 f4b842dd62eae121a7c4b07864939467b6b4cf056d833ea70d11e7d585c9464f
-DIST openvpn-2.1_rc20.tar.gz 844253 RMD160 4dd7924cb41a268e76a93af66fd05f948f22e5f3 SHA1 ab0e928bd7d4896ddb0061bf3aba9f3cd6cefe6e SHA256 4d423b48cb3ccc66b5669b9404dcb028cb62af410361c09e6056db0c5d2a1267
-DIST openvpn-2.1_rc20_eurephia.patch 8070 RMD160 cc4c1ac4c1873e13a453435088451e71a35a2ba8 SHA1 b76d47cd0ec60174a3e0fb116cef2c55b79746f6 SHA256 94765afa4fd164154c2d0c423cce797f65bf99512db43c1792b11bd0146cbb43
-DIST openvpn-2.1_rc21-ipv6-0.4.10.patch.gz 21032 RMD160 27f10b4e54eddd9aa07ea352d16a1977e4b89832 SHA1 52677168abb32e7adb19b60656a24ee908cbb385 SHA256 6c73c891b38b964d737f84d57dfc37694ec663f0e03701cd3c90f9fbf3280f6d
-DIST openvpn-2.1_rc21.tar.gz 845711 RMD160 2ba73bc6367fa849eb19126dd3bd8bdec9775f9e SHA1 b9a6a6a637fab4b419b8e038d12a42c021d9e34e SHA256 0982f3261be3ff5e834f5fc4ffb086a291f90185d8179d862cb92b303eefa13b
-DIST openvpn-2.1_rc21_eurephia.patch 2774 RMD160 08435165b64fd5fc267f8846c1044ed17ef24cb2 SHA1 f2dfddc3b3e1f95dfeae08c55ec6bdf8b24f6c7c SHA256 94d23c0ccebe6c1341d3291763c6b1a74fc04f80042f2b5b6282ccdf1facc693
DIST openvpn-2.1_rc22-ipv6-0.4.10.patch.gz 21090 RMD160 34c4c2ebeef129230643ab40998b6546b2c832ea SHA1 41710ada46592507f6a64cf74e78bd06da232ced SHA256 da47f9599c3251bd39e3553f3fdab2581462092e22069de4e4d458c80f383da4
-EBUILD openvpn-2.0.6.ebuild 3992 RMD160 a29b45480578f9ff80a8ab202c57813f6052c350 SHA1 e973ea504b42a90d4de99756a0349d6cee80dea3 SHA256 7fac8d4cecd9595317533ee2d2b79e2c93d350b83cffc63c07168c093ed11e28
-EBUILD openvpn-2.0.7-r2.ebuild 4170 RMD160 ef75f17baaf6ac5932e7f9c5fabce4721a6c82c0 SHA1 cd9a3c4eb180689f9f4196d697a3ce06eae29a86 SHA256 38e1d07c767e64b9c46d3798e75deb73ff7fd583e173a2518230174d4ce1b3a5
EBUILD openvpn-2.0.9.ebuild 4266 RMD160 21afbb0a8dc307ccfc989f10bb934895f2a9b0c6 SHA1 42aa8365eb6903dc164d1ff4661067ddecef9bf4 SHA256 1281eab97a97d8212659ce494ddb66e8c992ad59a7a2d3adca81a6f033b9e6f2
EBUILD openvpn-2.1.0-r1.ebuild 5861 RMD160 3d74eb55e2e6f055bb19e169bddeaba743f6d897 SHA1 4826addf9453f56e2378035ee72b17d8e5547810 SHA256 a882134e3a1d82248b7d3a83e66c18a8d47963311170401ca4952582f4255a10
EBUILD openvpn-2.1_rc15.ebuild 4679 RMD160 f814096d99990986e910c1ecc933df636a586a71 SHA1 8ffbab4ca728b933029f7bf9876e862477401b06 SHA256 66012cc09038cc22dc33962cbe6cea5051e1106141f21b9dad202da51ab2e7db
-EBUILD openvpn-2.1_rc19.ebuild 4685 RMD160 738549b27fc91bab472cdc83589c02cbb718e2a2 SHA1 74da0799d955e8f78f375e044ac32c6a6c41e7bb SHA256 278bf6d40ecc63a0f5a077b4dd1ec726efdfe5919718565a3e2d25646fbca5d5
-EBUILD openvpn-2.1_rc20.ebuild 5430 RMD160 1496406547e3eb871aa9540f535714ebad931fe6 SHA1 3a13d8c306387201411ba5dffdb5355c9373981b SHA256 8b529b7937b50832463dcd50ff642ee4d929f36ebdf655945da8e46768d3c367
-EBUILD openvpn-2.1_rc21.ebuild 5488 RMD160 b59322eafea45860b18cbdabae00727265e192fa SHA1 ead7f1079204379ff77830f178f6efa8dee61df1 SHA256 16e27575161bbd7fc0c5f3347b9876481237ecaa0998ad9e7d3f757da0cc9a93
-MISC ChangeLog 26438 RMD160 2043454eb9ab493ae287ab4297a701d1cc000184 SHA1 215a7f92a89b7c017f7fb427276d7a7f22d537ed SHA256 2fbcac8b2142556cdd8d2808b62822eb21be25b14164ba61f8a61894da13ff64
+MISC ChangeLog 26716 RMD160 085150cbb9fabaa29eaf3eb85beadee9a805af22 SHA1 a322aa1f765a9d31faf270fa9751985383d3c002 SHA256 ea3c894befb9803a8b944bbd966a5c7c76ed0199407df62ed7ec29cdbc7bfb63
MISC metadata.xml 831 RMD160 676787d48f1794d3769c159505c4f50673715fd0 SHA1 df225c398a434e6103716cc15539b6ed2e2cfa3c SHA256 1210ff6c2e7ef7c19c5c33df245be9845678bc8017a5e0477835ded1acbfa385
diff --git a/net-misc/openvpn/files/openvpn-2.0.7-pam.patch b/net-misc/openvpn/files/openvpn-2.0.7-pam.patch
deleted file mode 100644
index 34fa3aeb0108..000000000000
--- a/net-misc/openvpn/files/openvpn-2.0.7-pam.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-We should use pam property - this works on both LinuxPAM and OpenPAM
-
-diff -ur openvpn-2.0.7.orig/plugin/auth-pam/Makefile openvpn-2.0.7/plugin/auth-pam/Makefile
---- openvpn-2.0.7.orig/plugin/auth-pam/Makefile 2005-11-02 18:02:49 +0000
-+++ openvpn-2.0.7/plugin/auth-pam/Makefile 2006-10-11 12:05:55 +0100
-@@ -4,7 +4,7 @@
-
- # If PAM modules are not linked against libpam.so, set DLOPEN_PAM to 1. This
- # must be done on SUSE 9.1, at least.
--DLOPEN_PAM=1
-+DLOPEN_PAM=0
-
- ifeq ($(DLOPEN_PAM),1)
- LIBPAM=-ldl
-diff -ur openvpn-2.0.7.orig/plugin/auth-pam/pamdl.c openvpn-2.0.7/plugin/auth-pam/pamdl.c
---- openvpn-2.0.7.orig/plugin/auth-pam/pamdl.c 2005-11-02 18:02:49 +0000
-+++ openvpn-2.0.7/plugin/auth-pam/pamdl.c 2006-10-11 12:04:48 +0100
-@@ -10,7 +10,6 @@
- #include <stdio.h>
- #include <dlfcn.h>
- #include <security/pam_appl.h>
--#include <security/_pam_macros.h>
-
- #include "pamdl.h"
-
-@@ -74,7 +73,7 @@
- return real_pam_set_item(pamh, item_type, item);
- }
-
--int pam_get_item(const pam_handle_t *pamh, int item_type, const void **item)
-+int pam_get_item(pam_handle_t *pamh, int item_type, const void **item)
- {
- int (*real_pam_get_item)(const pam_handle_t *, int, const void **);
- RESOLVE_PAM_FUNCTION(pam_get_item, int,
diff --git a/net-misc/openvpn/files/openvpn-2.0.7-persistent.patch b/net-misc/openvpn/files/openvpn-2.0.7-persistent.patch
deleted file mode 100644
index cddfcdbd33be..000000000000
--- a/net-misc/openvpn/files/openvpn-2.0.7-persistent.patch
+++ /dev/null
@@ -1,44 +0,0 @@
-diff -u /tmp/openvpn-2.0.7/init.c openvpn-2.0.7/init.c
---- openvpn-2.0.7/init.c 2006-11-08 13:33:02.043877584 +0000
-+++ openvpn-2.0.7/init.c 2006-11-08 13:33:24.000000000 +0000
-@@ -347,7 +347,8 @@
- msg (M_FATAL|M_OPTERR,
- "options --mktun or --rmtun should only be used together with --dev");
- tuncfg (options->dev, options->dev_type, options->dev_node,
-- options->tun_ipv6, options->persist_mode);
-+ options->tun_ipv6, options->persist_mode,
-+ &options->tuntap_options);
- return true;
- }
- #endif
-diff -u /tmp/openvpn-2.0.7/tun.c openvpn-2.0.7/tun.c
---- openvpn-2.0.7/tun.c 2006-11-08 13:33:02.037878496 +0000
-+++ openvpn-2.0.7/tun.c 2006-11-08 13:34:20.000000000 +0000
-@@ -1095,13 +1095,14 @@
- #ifdef TUNSETPERSIST
-
- void
--tuncfg (const char *dev, const char *dev_type, const char *dev_node, bool ipv6, int persist_mode)
-+tuncfg (const char *dev, const char *dev_type, const char *dev_node, bool ipv6, int persist_mode, const struct tuntap_options *options)
- {
- struct tuntap *tt;
-
- ALLOC_OBJ (tt, struct tuntap);
- clear_tuntap (tt);
- tt->type = dev_type_enum (dev, dev_type);
-+ tt->options = *options;
- open_tun (dev, dev_type, dev_node, ipv6, tt);
- if (ioctl (tt->fd, TUNSETPERSIST, persist_mode) < 0)
- msg (M_ERR, "Cannot ioctl TUNSETPERSIST(%d) %s", persist_mode, dev);
-diff -u /tmp/openvpn-2.0.7/tun.h openvpn-2.0.7/tun.h
---- openvpn-2.0.7/tun.h 2006-11-08 13:33:02.042877736 +0000
-+++ openvpn-2.0.7/tun.h 2006-11-08 13:33:50.000000000 +0000
-@@ -194,7 +194,7 @@
- int read_tun (struct tuntap* tt, uint8_t *buf, int len);
-
- void tuncfg (const char *dev, const char *dev_type, const char *dev_node,
-- bool ipv6, int persist_mode);
-+ bool ipv6, int persist_mode, const struct tuntap_options *options);
-
- const char *guess_tuntap_dev (const char *dev,
- const char *dev_type,
diff --git a/net-misc/openvpn/openvpn-2.0.6.ebuild b/net-misc/openvpn/openvpn-2.0.6.ebuild
deleted file mode 100644
index 6bc9c632b2c5..000000000000
--- a/net-misc/openvpn/openvpn-2.0.6.ebuild
+++ /dev/null
@@ -1,132 +0,0 @@
-# Copyright 1999-2007 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/openvpn/openvpn-2.0.6.ebuild,v 1.16 2007/09/15 07:30:31 uberlord Exp $
-
-inherit eutils multilib
-
-DESCRIPTION="OpenVPN is a robust and highly flexible tunneling application compatible with many OSes."
-SRC_URI="http://openvpn.net/release/openvpn-${PV}.tar.gz"
-HOMEPAGE="http://openvpn.net/"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="alpha amd64 hppa ppc ppc64 sh sparc x86"
-IUSE="examples iproute2 minimal pam passwordsave selinux ssl static threads"
-
-RDEPEND=">=dev-libs/lzo-1.07
- kernel_linux? (
- iproute2? ( sys-apps/iproute2 ) !iproute2? ( sys-apps/net-tools )
- )
- !minimal? ( pam? ( virtual/pam ) )
- selinux? ( sec-policy/selinux-openvpn )
- ssl? ( >=dev-libs/openssl-0.9.6 )"
-DEPEND="${RDEPEND}
- virtual/os-headers"
-
-pkg_setup() {
- if use iproute2 ; then
- if built_with_use sys-apps/iproute2 minimal ; then
- eerror "iproute2 support requires that sys-apps/iproute2 was not"
- eerror "built with the minimal USE flag"
- die "iproute2 support not available"
- fi
- fi
-}
-
-src_compile() {
- local myconf=""
- # We cannot use use_enable with iproute2 as the Makefile stupidly
- # enables it with --disable-iproute2
- use iproute2 && myconf="${myconf} --enable-iproute2"
- use minimal && myconf="${myconf} --disable-plugins"
-
- econf ${myconf} \
- $(use_enable passwordsave password-save) \
- $(use_enable ssl) \
- $(use_enable ssl crypto) \
- $(use_enable threads pthread) \
- || die "configure failed"
-
- use static && sed -i -e '/^LIBS/s/LIBS = /LIBS = -static /' Makefile
-
- emake || die "make failed"
-
- if ! use minimal ; then
- cd plugin
- for i in $( ls 2>/dev/null ); do
- [[ ${i} == "README" || ${i} == "examples" ]] && continue
- [[ ${i} == "auth-pam" ]] && ! use pam && continue
- einfo "Building ${i} plugin"
- cd "${i}"
- emake || die "make failed"
- cd ..
- done
- cd ..
- fi
-}
-
-src_install() {
- make DESTDIR="${D}" install || die "make install failed"
-
- # install documentation
- dodoc AUTHORS ChangeLog PORTS README
-
- # Empty dir
- dodir /etc/openvpn
- keepdir /etc/openvpn
-
- # Install the init script
- newinitd "${FILESDIR}/openvpn.init" openvpn
-
- # install examples, controlled by the respective useflag
- if use examples ; then
- # dodoc does not supportly support directory traversal, #15193
- insinto /usr/share/doc/${PF}/examples
- doins -r sample-{config-files,keys,scripts} contrib
- prepalldocs
- fi
-
- # Install plugins and easy-rsa
- if ! use minimal ; then
- cd easy-rsa/2.0
- exeinto "/usr/share/${PN}/easy-rsa"
- doexe *-* pkitool
- insinto "/usr/share/${PN}/easy-rsa"
- doins README openssl.cnf vars
- cd ../..
-
- exeinto "/usr/$(get_libdir)/${PN}"
- doexe plugin/*/*.so
- fi
-}
-
-pkg_postinst() {
- ewarn "WARNING: The openvpn init script has changed"
- ewarn ""
- einfo "The openvpn init script expects to find the configuration file"
- einfo "openvpn.conf in /etc/openvpn along with any extra files it may need."
- einfo ""
- einfo "To create more VPNs, simply create a new .conf file for it and"
- einfo "then create a symlink to the openvpn init script from a link called"
- einfo "openvpn.newconfname - like so"
- einfo " cd /etc/openvpn"
- einfo " ${EDITOR##*/} foo.conf"
- einfo " cd /etc/init.d"
- einfo " ln -s openvpn openvpn.foo"
- einfo ""
- einfo "You can then treat openvpn.foo as any other service, so you can"
- einfo "stop one vpn and start another if you need to."
- if ! use minimal ; then
- einfo ""
- einfo "plugins have been installed into /usr/$(get_libdir)/${PN}"
- fi
- einfo ""
- einfo "It is recommended that you create your tun/tap interfaces using"
- einfo "the net.tun0/net.tap0 scripts provided by baselayout instead of"
- einfo "using the 'server' directive in openvpn configuration files."
- einfo "This will insure that the interface really is up after openvpn"
- einfo "starts."
- einfo "Note that you cannot use net.tun0/net.tap0 and the server option,"
- einfo "otherwise openvpn will not start."
- ebeep
-}
diff --git a/net-misc/openvpn/openvpn-2.0.7-r2.ebuild b/net-misc/openvpn/openvpn-2.0.7-r2.ebuild
deleted file mode 100644
index 09967eb8c44b..000000000000
--- a/net-misc/openvpn/openvpn-2.0.7-r2.ebuild
+++ /dev/null
@@ -1,142 +0,0 @@
-# Copyright 1999-2009 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/openvpn/openvpn-2.0.7-r2.ebuild,v 1.14 2009/05/28 18:02:15 cedk Exp $
-
-inherit eutils multilib
-
-DESCRIPTION="OpenVPN is a robust and highly flexible tunneling application compatible with many OSes."
-SRC_URI="http://openvpn.net/release/openvpn-${PV}.tar.gz"
-HOMEPAGE="http://openvpn.net/"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="alpha amd64 hppa ~mips ppc ppc64 sh sparc ~sparc-fbsd x86 ~x86-fbsd"
-IUSE="examples iproute2 minimal pam passwordsave selinux ssl static threads"
-RESTRICT="!ssl? ( test )"
-
-RDEPEND=">=dev-libs/lzo-1.07
- kernel_linux? (
- iproute2? ( sys-apps/iproute2 ) !iproute2? ( sys-apps/net-tools )
- )
- !minimal? ( pam? ( virtual/pam ) )
- selinux? ( sec-policy/selinux-openvpn )
- ssl? ( >=dev-libs/openssl-0.9.6 )"
-DEPEND="${RDEPEND}
- virtual/os-headers"
-
-pkg_setup() {
- if use iproute2 ; then
- if built_with_use sys-apps/iproute2 minimal ; then
- eerror "iproute2 support requires that sys-apps/iproute2 was not"
- eerror "built with the minimal USE flag"
- die "iproute2 support not available"
- fi
- fi
-}
-
-src_unpack() {
- unpack ${A}
- cd "${S}"
-
- epatch "${FILESDIR}/${P}-pam.patch"
- epatch "${FILESDIR}/${P}-persistent.patch"
-
-}
-
-src_compile() {
- local myconf=""
- # We cannot use use_enable with iproute2 as the Makefile stupidly
- # enables it with --disable-iproute2
- use iproute2 && myconf="${myconf} --enable-iproute2"
- use minimal && myconf="${myconf} --disable-plugins"
-
- econf ${myconf} \
- $(use_enable passwordsave password-save) \
- $(use_enable ssl) \
- $(use_enable ssl crypto) \
- $(use_enable threads pthread) \
- || die "configure failed"
-
- use static && sed -i -e '/^LIBS/s/LIBS = /LIBS = -static /' Makefile
-
- emake || die "make failed"
-
- if ! use minimal ; then
- cd plugin
- for i in $( ls 2>/dev/null ); do
- [[ ${i} == "README" || ${i} == "examples" ]] && continue
- [[ ${i} == "auth-pam" ]] && ! use pam && continue
- einfo "Building ${i} plugin"
- cd "${i}"
- emake || die "make failed"
- cd ..
- done
- cd ..
- fi
-}
-
-src_install() {
- make DESTDIR="${D}" install || die "make install failed"
-
- # install documentation
- dodoc AUTHORS ChangeLog PORTS README
-
- # Empty dir
- dodir /etc/openvpn
- keepdir /etc/openvpn
-
- # Install the init script
- newinitd "${FILESDIR}/openvpn.init" openvpn
-
- # install examples, controlled by the respective useflag
- if use examples ; then
- # dodoc does not supportly support directory traversal, #15193
- insinto /usr/share/doc/${PF}/examples
- doins -r sample-{config-files,keys,scripts} contrib
- prepalldocs
- fi
-
- # Install plugins and easy-rsa
- if ! use minimal ; then
- cd easy-rsa/2.0
- exeinto "/usr/share/${PN}/easy-rsa"
- doexe *-* pkitool
- insinto "/usr/share/${PN}/easy-rsa"
- doins README openssl.cnf vars
- cd ../..
-
- exeinto "/usr/$(get_libdir)/${PN}"
- doexe plugin/*/*.so
- fi
-}
-
-pkg_postinst() {
- ewarn "WARNING: The openvpn init script has changed"
- ewarn ""
- einfo "The openvpn init script expects to find the configuration file"
- einfo "openvpn.conf in /etc/openvpn along with any extra files it may need."
- einfo ""
- einfo "To create more VPNs, simply create a new .conf file for it and"
- einfo "then create a symlink to the openvpn init script from a link called"
- einfo "openvpn.newconfname - like so"
- einfo " cd /etc/openvpn"
- einfo " ${EDITOR##*/} foo.conf"
- einfo " cd /etc/init.d"
- einfo " ln -s openvpn openvpn.foo"
- einfo ""
- einfo "You can then treat openvpn.foo as any other service, so you can"
- einfo "stop one vpn and start another if you need to."
- if ! use minimal ; then
- einfo ""
- einfo "plugins have been installed into /usr/$(get_libdir)/${PN}"
- fi
- einfo ""
- einfo "It is recommended that you create your tun/tap interfaces using"
- einfo "the net.tun0/net.tap0 scripts provided by baselayout instead of"
- einfo "using the 'server' directive in openvpn configuration files."
- einfo "This will insure that the interface really is up after openvpn"
- einfo "starts."
- einfo "Note that you cannot use net.tun0/net.tap0 and the server option,"
- einfo "otherwise openvpn will not start."
- ebeep
-}
diff --git a/net-misc/openvpn/openvpn-2.1_rc19.ebuild b/net-misc/openvpn/openvpn-2.1_rc19.ebuild
deleted file mode 100644
index af1a1ab01b0e..000000000000
--- a/net-misc/openvpn/openvpn-2.1_rc19.ebuild
+++ /dev/null
@@ -1,161 +0,0 @@
-# Copyright 1999-2009 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/openvpn/openvpn-2.1_rc19.ebuild,v 1.1 2009/08/01 15:04:41 cedk Exp $
-
-inherit eutils multilib toolchain-funcs
-
-DESCRIPTION="OpenVPN is a robust and highly flexible tunneling application compatible with many OSes."
-SRC_URI="http://openvpn.net/release/${P}.tar.gz"
-HOMEPAGE="http://openvpn.net/"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~sparc-fbsd ~x86 ~x86-fbsd"
-IUSE="examples iproute2 minimal pam passwordsave selinux ssl static pkcs11 threads userland_BSD"
-
-DEPEND=">=dev-libs/lzo-1.07
- kernel_linux? (
- iproute2? ( sys-apps/iproute2 ) !iproute2? ( sys-apps/net-tools )
- )
- !minimal? ( pam? ( virtual/pam ) )
- selinux? ( sec-policy/selinux-openvpn )
- ssl? ( >=dev-libs/openssl-0.9.6 )
- pkcs11? ( >=dev-libs/pkcs11-helper-1.05 )"
-RDEPEND="${DEPEND}"
-
-pkg_setup() {
- if use iproute2 ; then
- if built_with_use sys-apps/iproute2 minimal ; then
- eerror "iproute2 support requires that sys-apps/iproute2 was not"
- eerror "built with the minimal USE flag"
- die "iproute2 support not available"
- fi
- fi
-}
-
-src_unpack() {
- unpack ${A}
- cd "${S}"
-
- sed -i \
- -e "s/gcc \${CC_FLAGS}/\${CC} \${CFLAGS} -Wall/" \
- -e "s/-shared/-shared \${LDFLAGS}/" \
- plugin/*/Makefile || die "sed failed"
-}
-
-src_compile() {
- local myconf=""
-
- if use minimal ; then
- myconf="${myconf} --disable-plugins"
- myconf="${myconf} --disable-pkcs11"
- else
- myconf="$(use_enable pkcs11)"
- fi
-
- epatch "${FILESDIR}/${PN}-2.1_rc13-peercred.patch"
- econf ${myconf} \
- $(use_enable passwordsave password-save) \
- $(use_enable ssl) \
- $(use_enable ssl crypto) \
- $(use_enable threads pthread) \
- $(use_enable iproute2) \
- || die "configure failed"
-
- use static && sed -i -e '/^LIBS/s/LIBS = /LIBS = -static /' Makefile
-
- emake || die "make failed"
-
- if ! use minimal ; then
- cd plugin
- for i in $( ls 2>/dev/null ); do
- [[ ${i} == "README" || ${i} == "examples" || ${i} == "defer" ]] && continue
- [[ ${i} == "auth-pam" ]] && ! use pam && continue
- einfo "Building ${i} plugin"
- cd "${i}"
- emake CC=$(tc-getCC) || die "make failed"
- cd ..
- done
- cd ..
- fi
-}
-
-src_install() {
- make DESTDIR="${D}" install || die "make install failed"
-
- # install documentation
- dodoc AUTHORS ChangeLog PORTS README
- # remove empty dir
- rmdir "${D}/usr/share/doc/openvpn"
-
- # Empty dir
- dodir /etc/openvpn
- keepdir /etc/openvpn
-
- # Install some helper scripts
- exeinto /etc/openvpn
- doexe "${FILESDIR}/up.sh"
- doexe "${FILESDIR}/down.sh"
-
- # Install the init script and config file
- newinitd "${FILESDIR}/${PN}-2.1.init" openvpn
- newconfd "${FILESDIR}/${PN}-2.1.conf" openvpn
-
- # install examples, controlled by the respective useflag
- if use examples ; then
- # dodoc does not supportly support directory traversal, #15193
- insinto /usr/share/doc/${PF}/examples
- doins -r sample-{config-files,keys,scripts} contrib
- prepalldocs
- fi
-
- # Install plugins and easy-rsa
- if ! use minimal ; then
- cd easy-rsa/2.0
- make install "DESTDIR=${D}/usr/share/${PN}/easy-rsa"
- cd ../..
-
- exeinto "/usr/$(get_libdir)/${PN}"
- doexe plugin/*/*.so
- fi
-}
-
-pkg_postinst() {
- # Add openvpn user so openvpn servers can drop privs
- # Clients should run as root so they can change ip addresses,
- # dns information and other such things.
- enewgroup openvpn
- enewuser openvpn "" "" "" openvpn
-
- if [[ -n $(ls /etc/openvpn/*/local.conf 2>/dev/null) ]] ; then
- ewarn "WARNING: The openvpn init script has changed"
- ewarn ""
- fi
-
- einfo "The openvpn init script expects to find the configuration file"
- einfo "openvpn.conf in /etc/openvpn along with any extra files it may need."
- einfo ""
- einfo "To create more VPNs, simply create a new .conf file for it and"
- einfo "then create a symlink to the openvpn init script from a link called"
- einfo "openvpn.newconfname - like so"
- einfo " cd /etc/openvpn"
- einfo " ${EDITOR##*/} foo.conf"
- einfo " cd /etc/init.d"
- einfo " ln -s openvpn openvpn.foo"
- einfo ""
- einfo "You can then treat openvpn.foo as any other service, so you can"
- einfo "stop one vpn and start another if you need to."
-
- if grep -Eq "^[ \t]*(up|down)[ \t].*" "${ROOT}/etc/openvpn"/*.conf 2>/dev/null ; then
- ewarn ""
- ewarn "WARNING: If you use the remote keyword then you are deemed to be"
- ewarn "a client by our init script and as such we force up,down scripts."
- ewarn "These scripts call /etc/openvpn/\$SVCNAME-{up,down}.sh where you"
- ewarn "can move your scripts to."
- fi
-
- if ! use minimal ; then
- einfo ""
- einfo "plugins have been installed into /usr/$(get_libdir)/${PN}"
- fi
-}
diff --git a/net-misc/openvpn/openvpn-2.1_rc20.ebuild b/net-misc/openvpn/openvpn-2.1_rc20.ebuild
deleted file mode 100644
index 62919d428253..000000000000
--- a/net-misc/openvpn/openvpn-2.1_rc20.ebuild
+++ /dev/null
@@ -1,185 +0,0 @@
-# Copyright 1999-2009 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/openvpn/openvpn-2.1_rc20.ebuild,v 1.2 2009/10/10 23:48:18 cedk Exp $
-
-inherit eutils multilib toolchain-funcs autotools
-
-DESCRIPTION="OpenVPN is a robust and highly flexible tunneling application compatible with many OSes."
-SRC_URI="http://openvpn.net/release/${P}.tar.gz
- ipv6? (
- http://cloud.github.com/downloads/jjo/openvpn-ipv6/openvpn-2.1_rc20-ipv6-0.4.9.patch.gz
- )
- eurephia? (
- mirror://sourceforge/eurephia/${P}_eurephia.patch
- )"
-HOMEPAGE="http://openvpn.net/"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~sparc-fbsd ~x86-fbsd"
-IUSE="eurephia examples iproute2 ipv6 minimal pam passwordsave selinux ssl static pkcs11 threads userland_BSD"
-
-DEPEND=">=dev-libs/lzo-1.07
- kernel_linux? (
- iproute2? ( sys-apps/iproute2 ) !iproute2? ( sys-apps/net-tools )
- )
- !minimal? ( pam? ( virtual/pam ) )
- selinux? ( sec-policy/selinux-openvpn )
- ssl? ( >=dev-libs/openssl-0.9.6 )
- pkcs11? ( >=dev-libs/pkcs11-helper-1.05 )"
-RDEPEND="${DEPEND}"
-
-pkg_setup() {
- if use iproute2 ; then
- if built_with_use sys-apps/iproute2 minimal ; then
- eerror "iproute2 support requires that sys-apps/iproute2 was not"
- eerror "built with the minimal USE flag"
- die "iproute2 support not available"
- fi
- fi
-}
-
-src_unpack() {
- unpack ${A}
- cd "${S}"
-
- epatch "${FILESDIR}/${PN}-2.1_rc13-peercred.patch"
- epatch "${FILESDIR}"/openvpn-2.1_rc20-pkcs11.patch
- use ipv6 && epatch "${WORKDIR}"/openvpn-2.1_rc20-ipv6-0.4.9.patch
- use eurephia && epatch "${DISTDIR}/${P}_eurephia.patch"
- sed -i \
- -e "s/gcc \${CC_FLAGS}/\${CC} \${CFLAGS} -Wall/" \
- -e "s/-shared/-shared \${LDFLAGS}/" \
- plugin/*/Makefile || die "sed failed"
- eautoreconf
-}
-
-src_compile() {
- local myconf=""
-
- if use minimal ; then
- myconf="${myconf} --disable-plugins"
- myconf="${myconf} --disable-pkcs11"
- else
- myconf="$(use_enable pkcs11)"
- fi
-
- econf ${myconf} \
- $(use_enable passwordsave password-save) \
- $(use_enable ssl) \
- $(use_enable ssl crypto) \
- $(use_enable threads pthread) \
- $(use_enable iproute2) \
- || die "configure failed"
-
- use static && sed -i -e '/^LIBS/s/LIBS = /LIBS = -static /' Makefile
-
- emake || die "make failed"
-
- if ! use minimal ; then
- cd plugin
- for i in $( ls 2>/dev/null ); do
- [[ ${i} == "README" || ${i} == "examples" || ${i} == "defer" ]] && continue
- [[ ${i} == "auth-pam" ]] && ! use pam && continue
- einfo "Building ${i} plugin"
- cd "${i}"
- emake CC=$(tc-getCC) || die "make failed"
- cd ..
- done
- cd ..
- fi
-}
-
-src_install() {
- make DESTDIR="${D}" install || die "make install failed"
-
- # install documentation
- dodoc AUTHORS ChangeLog PORTS README
- # remove empty dir
- rmdir "${D}/usr/share/doc/openvpn"
-
- # Empty dir
- dodir /etc/openvpn
- keepdir /etc/openvpn
-
- # Install some helper scripts
- exeinto /etc/openvpn
- doexe "${FILESDIR}/up.sh"
- doexe "${FILESDIR}/down.sh"
-
- # Install the init script and config file
- newinitd "${FILESDIR}/${PN}-2.1.init" openvpn
- newconfd "${FILESDIR}/${PN}-2.1.conf" openvpn
-
- # install examples, controlled by the respective useflag
- if use examples ; then
- # dodoc does not supportly support directory traversal, #15193
- insinto /usr/share/doc/${PF}/examples
- doins -r sample-{config-files,keys,scripts} contrib
- prepalldocs
- fi
-
- # Install plugins and easy-rsa
- if ! use minimal ; then
- cd easy-rsa/2.0
- make install "DESTDIR=${D}/usr/share/${PN}/easy-rsa"
- cd ../..
-
- exeinto "/usr/$(get_libdir)/${PN}"
- doexe plugin/*/*.so
- fi
-}
-
-pkg_postinst() {
- # Add openvpn user so openvpn servers can drop privs
- # Clients should run as root so they can change ip addresses,
- # dns information and other such things.
- enewgroup openvpn
- enewuser openvpn "" "" "" openvpn
-
- if [[ -n $(ls /etc/openvpn/*/local.conf 2>/dev/null) ]] ; then
- ewarn "WARNING: The openvpn init script has changed"
- ewarn ""
- fi
-
- einfo "The openvpn init script expects to find the configuration file"
- einfo "openvpn.conf in /etc/openvpn along with any extra files it may need."
- einfo ""
- einfo "To create more VPNs, simply create a new .conf file for it and"
- einfo "then create a symlink to the openvpn init script from a link called"
- einfo "openvpn.newconfname - like so"
- einfo " cd /etc/openvpn"
- einfo " ${EDITOR##*/} foo.conf"
- einfo " cd /etc/init.d"
- einfo " ln -s openvpn openvpn.foo"
- einfo ""
- einfo "You can then treat openvpn.foo as any other service, so you can"
- einfo "stop one vpn and start another if you need to."
-
- if grep -Eq "^[ \t]*(up|down)[ \t].*" "${ROOT}/etc/openvpn"/*.conf 2>/dev/null ; then
- ewarn ""
- ewarn "WARNING: If you use the remote keyword then you are deemed to be"
- ewarn "a client by our init script and as such we force up,down scripts."
- ewarn "These scripts call /etc/openvpn/\$SVCNAME-{up,down}.sh where you"
- ewarn "can move your scripts to."
- fi
-
- if ! use minimal ; then
- einfo ""
- einfo "plugins have been installed into /usr/$(get_libdir)/${PN}"
- fi
-
- if use ipv6 ; then
- einfo ""
- einfo "This build contains IPv6-Patch from JuanJo Ciarlante."
- einfo "For more information please visit:"
- einfo "http://github.com/jjo/openvpn-ipv6"
- fi
-
- if use eurephia ; then
- einfo ""
- einfo "This build contains eurephia patch."
- einfo "For more information please visit:"
- einfo "http://www.eurephia.net/"
- fi
-}
diff --git a/net-misc/openvpn/openvpn-2.1_rc21.ebuild b/net-misc/openvpn/openvpn-2.1_rc21.ebuild
deleted file mode 100644
index c0a4e2f06d3c..000000000000
--- a/net-misc/openvpn/openvpn-2.1_rc21.ebuild
+++ /dev/null
@@ -1,188 +0,0 @@
-# Copyright 1999-2009 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-misc/openvpn/openvpn-2.1_rc21.ebuild,v 1.1 2009/11/15 14:23:26 cedk Exp $
-
-inherit eutils multilib toolchain-funcs autotools
-
-IPV6_VERSION="0.4.10"
-DESCRIPTION="OpenVPN is a robust and highly flexible tunneling application compatible with many OSes."
-SRC_URI="http://openvpn.net/release/${P}.tar.gz
- ipv6? (
- http://cloud.github.com/downloads/jjo/openvpn-ipv6/${P}-ipv6-${IPV6_VERSION}.patch.gz
- )
- eurephia? (
- mirror://sourceforge/eurephia/${P}_eurephia.patch
- )"
-HOMEPAGE="http://openvpn.net/"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~sparc-fbsd ~x86-fbsd"
-IUSE="eurephia examples iproute2 ipv6 minimal pam passwordsave selinux ssl static pkcs11 threads userland_BSD"
-
-DEPEND=">=dev-libs/lzo-1.07
- kernel_linux? (
- iproute2? ( sys-apps/iproute2 ) !iproute2? ( sys-apps/net-tools )
- )
- !minimal? ( pam? ( virtual/pam ) )
- selinux? ( sec-policy/selinux-openvpn )
- ssl? ( >=dev-libs/openssl-0.9.6 )
- pkcs11? ( >=dev-libs/pkcs11-helper-1.05 )"
-RDEPEND="${DEPEND}"
-
-pkg_setup() {
- if use iproute2 ; then
- if built_with_use sys-apps/iproute2 minimal ; then
- eerror "iproute2 support requires that sys-apps/iproute2 was not"
- eerror "built with the minimal USE flag"
- die "iproute2 support not available"
- fi
- fi
-}
-
-src_unpack() {
- unpack ${A}
- cd "${S}"
-
- epatch "${FILESDIR}/${PN}-2.1_rc13-peercred.patch"
- epatch "${FILESDIR}"/openvpn-2.1_rc20-pkcs11.patch
- use ipv6 && epatch "${WORKDIR}"/${P}-ipv6-${IPV6_VERSION}.patch
- use eurephia && epatch "${DISTDIR}/${P}_eurephia.patch"
- sed -i \
- -e "s/gcc \${CC_FLAGS}/\${CC} \${CFLAGS} -Wall/" \
- -e "s/-shared/-shared \${LDFLAGS}/" \
- plugin/*/Makefile || die "sed failed"
- eautoreconf
-}
-
-src_compile() {
- local myconf=""
-
- if use minimal ; then
- myconf="${myconf} --disable-plugins"
- myconf="${myconf} --disable-pkcs11"
- else
- myconf="$(use_enable pkcs11)"
- fi
-
- econf ${myconf} \
- $(use_enable passwordsave password-save) \
- $(use_enable ssl) \
- $(use_enable ssl crypto) \
- $(use_enable threads pthread) \
- $(use_enable iproute2) \
- || die "configure failed"
-
- use static && sed -i -e '/^LIBS/s/LIBS = /LIBS = -static /' Makefile
-
- emake || die "make failed"
-
- if ! use minimal ; then
- cd plugin
- for i in $( ls 2>/dev/null ); do
- [[ ${i} == "README" || ${i} == "examples" || ${i} == "defer" ]] && continue
- [[ ${i} == "auth-pam" ]] && ! use pam && continue
- einfo "Building ${i} plugin"
- cd "${i}"
- emake CC=$(tc-getCC) || die "make failed"
- cd ..
- done
- cd ..
- fi
-}
-
-src_install() {
- make DESTDIR="${D}" install || die "make install failed"
-
- # install documentation
- dodoc AUTHORS ChangeLog PORTS README
- use eurephia && dodoc README.eurephia
-
- # remove empty dir
- rmdir "${D}/usr/share/doc/openvpn"
-
- # Empty dir
- dodir /etc/openvpn
- keepdir /etc/openvpn
-
- # Install some helper scripts
- exeinto /etc/openvpn
- doexe "${FILESDIR}/up.sh"
- doexe "${FILESDIR}/down.sh"
-
- # Install the init script and config file
- newinitd "${FILESDIR}/${PN}-2.1.init" openvpn
- newconfd "${FILESDIR}/${PN}-2.1.conf" openvpn
-
- # install examples, controlled by the respective useflag
- if use examples ; then
- # dodoc does not supportly support directory traversal, #15193
- insinto /usr/share/doc/${PF}/examples
- doins -r sample-{config-files,keys,scripts} contrib
- prepalldocs
- fi
-
- # Install plugins and easy-rsa
- if ! use minimal ; then
- cd easy-rsa/2.0
- make install "DESTDIR=${D}/usr/share/${PN}/easy-rsa"
- cd ../..
-
- exeinto "/usr/$(get_libdir)/${PN}"
- doexe plugin/*/*.so
- fi
-}
-
-pkg_postinst() {
- # Add openvpn user so openvpn servers can drop privs
- # Clients should run as root so they can change ip addresses,
- # dns information and other such things.
- enewgroup openvpn
- enewuser openvpn "" "" "" openvpn
-
- if [[ -n $(ls /etc/openvpn/*/local.conf 2>/dev/null) ]] ; then
- ewarn "WARNING: The openvpn init script has changed"
- ewarn ""
- fi
-
- einfo "The openvpn init script expects to find the configuration file"
- einfo "openvpn.conf in /etc/openvpn along with any extra files it may need."
- einfo ""
- einfo "To create more VPNs, simply create a new .conf file for it and"
- einfo "then create a symlink to the openvpn init script from a link called"
- einfo "openvpn.newconfname - like so"
- einfo " cd /etc/openvpn"
- einfo " ${EDITOR##*/} foo.conf"
- einfo " cd /etc/init.d"
- einfo " ln -s openvpn openvpn.foo"
- einfo ""
- einfo "You can then treat openvpn.foo as any other service, so you can"
- einfo "stop one vpn and start another if you need to."
-
- if grep -Eq "^[ \t]*(up|down)[ \t].*" "${ROOT}/etc/openvpn"/*.conf 2>/dev/null ; then
- ewarn ""
- ewarn "WARNING: If you use the remote keyword then you are deemed to be"
- ewarn "a client by our init script and as such we force up,down scripts."
- ewarn "These scripts call /etc/openvpn/\$SVCNAME-{up,down}.sh where you"
- ewarn "can move your scripts to."
- fi
-
- if ! use minimal ; then
- einfo ""
- einfo "plugins have been installed into /usr/$(get_libdir)/${PN}"
- fi
-
- if use ipv6 ; then
- einfo ""
- einfo "This build contains IPv6-Patch from JuanJo Ciarlante."
- einfo "For more information please visit:"
- einfo "http://github.com/jjo/openvpn-ipv6"
- fi
-
- if use eurephia ; then
- einfo ""
- einfo "This build contains eurephia patch."
- einfo "For more information please visit:"
- einfo "http://www.eurephia.net/"
- fi
-}