# Template file for 'strongswan' pkgname=strongswan version=5.9.10 revision=1 build_style=gnu-configure # tpm support waits on libtss2 configure_args="--disable-static --enable-blowfish --enable-curl --enable-md4 --enable-openssl --enable-eap-radius --enable-eap-mschapv2 --enable-eap-md5 --enable-eap-identity --enable-eap-dynamic --enable-led --enable-ha --enable-dhcp --enable-mediation --enable-soup --disable-des --enable-chapoly --enable-nm" hostmakedepends="pkg-config flex bison python3" makedepends="gmp-devel libsoup-devel libldns-devel unbound-devel libcurl-devel NetworkManager-devel openssl-devel" depends="iproute2 sqlite" conf_files="/etc/*.conf /etc/strongswan.d/*.conf /etc/strongswan.d/charon/*.conf /etc/ipsec.secrets" short_desc="IPsec-based VPN solution, supporting IKEv1/IKEv2 and MOBIKE" maintainer="Toyam Cox " license="GPL-2.0-or-later" homepage="https://www.strongswan.org/" changelog="https://raw.githubusercontent.com/strongswan/strongswan/master/NEWS" distfiles="https://download.strongswan.org/strongswan-${version}.tar.bz2" checksum=3b72789e243c9fa6f0a01ccaf4f83766eba96a5e5b1e071d36e997572cf34654 make_dirs="/etc/ipsec.d/ 0755 root root /etc/ipsec.d/aacerts 0755 root root /etc/ipsec.d/acerts 0755 root root /etc/ipsec.d/cacerts 0755 root root /etc/ipsec.d/oscpcerts 0755 root root /etc/ipsec.d/certs 0755 root root /etc/ipsec.d/crls 0755 root root /etc/ipsec.d/reqs 0755 root root /etc/ipsec.d/private 0750 root root" # CI checks are currently disabled due to a number of tests failing either as a # result of GitHub Actions having a networking setup that is incompatible with # them, or some other issue that is difficult to reproduce locally. make_check=ci-skip post_install() { vsv strongswan }