public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
From: "Jason A. Donenfeld" <zx2c4@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Subject: [gentoo-commits] repo/gentoo:master commit in: net-vpn/wireguard-tools/
Date: Wed, 12 May 2021 23:40:11 +0000 (UTC)	[thread overview]
Message-ID: <1620862787.129df22822bfdadbff8e54ebfae088e09a07d6c0.zx2c4@gentoo> (raw)

commit:     129df22822bfdadbff8e54ebfae088e09a07d6c0
Author:     Jason A. Donenfeld <zx2c4 <AT> gentoo <DOT> org>
AuthorDate: Wed May 12 23:39:47 2021 +0000
Commit:     Jason A. Donenfeld <zx2c4 <AT> gentoo <DOT> org>
CommitDate: Wed May 12 23:39:47 2021 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=129df228

net-vpn/wireguard-tools: drop old

Package-Manager: Portage-3.0.18, Repoman-3.0.3
Signed-off-by: Jason A. Donenfeld <zx2c4 <AT> gentoo.org>

 net-vpn/wireguard-tools/Manifest                   |   4 -
 .../wireguard-tools-1.0.20200513.ebuild            | 116 ---------------------
 .../wireguard-tools-1.0.20200827.ebuild            | 116 ---------------------
 .../wireguard-tools-1.0.20210223.ebuild            | 116 ---------------------
 .../wireguard-tools-1.0.20210315.ebuild            | 116 ---------------------
 5 files changed, 468 deletions(-)

diff --git a/net-vpn/wireguard-tools/Manifest b/net-vpn/wireguard-tools/Manifest
index 6ccd2380ac7..bb9f64d7e73 100644
--- a/net-vpn/wireguard-tools/Manifest
+++ b/net-vpn/wireguard-tools/Manifest
@@ -1,5 +1 @@
-DIST wireguard-tools-1.0.20200513.tar.xz 94500 BLAKE2B 34a39533018416df382d180da76d6494feec1d40208c9df427c1979817dbe138c217fe4c4f4cf5cecd3c4053e6f73f1863d1e0a9ed2cad41899dda5387c15844 SHA512 4d27b262350b6b47843a323c2e7ab8d2bdd48065c265778abdec85b3f6fc92aa9af77d76e368df9cc8e435eae1c0ce50fed52e1d78db54358c1884d34be08d2c
-DIST wireguard-tools-1.0.20200827.tar.xz 94788 BLAKE2B d7d881a56819c028b37c11b9a44e3304a0f49250aa6ce3da894802dc2546b755f790ddd3fbc14ec1e0f653ead744434ee540c20226373122d131d7deeae94544 SHA512 843b70050d24f142262b672daee44cdccab508b52f42b19a32c275a17d40fd8fb66136a22ef2a4602217e821703bb36a261e474b465807308f52e6a0ee49e267
-DIST wireguard-tools-1.0.20210223.tar.xz 95444 BLAKE2B 59606684c08893c40ac14f9d021013c741f1ea80dc5a07946ec2597d8c91f6c8e1ebbc5714d04ea6d7d9356362a9d5598a578019ead38a2e327a2162d1d1a9af SHA512 98855853a3ecfce23a0a6bf4a885c85efaf2b08c9a92e0d3800fe40ae9adf05fdf4443150a71319bd9b53e314c8032694ea978db850a238813232a0c04edf692
-DIST wireguard-tools-1.0.20210315.tar.xz 96988 BLAKE2B d7b088a63fb386dc811f10681f6312572b360b211188630f7a76bb848ef01aac84205d62bd72edef2bac8a3e97eedccabdc2e092b8d70df8d7169d064d469831 SHA512 2ebc5e5a248f6b8c19cbb8bcc3c375ad339a16bf27e32346fb7cde21b9cfb1efdf877e0e5ea4a511f7cb69ff184a6731e76492e03cf490f7d49368e7f145b72e
 DIST wireguard-tools-1.0.20210424.tar.xz 96816 BLAKE2B 4787624d296c22241ff366c799eb07e1e718534eab9c998df24003380ed9743f76c3b8f779c7e534404573583c9654a43527d4c96de0def78a3d88d30ca6985e SHA512 b919c7ce1e8ee8660ccc1490d3dad7817f3d6f0ab79f26866e8ed10d40545a9ddca67959ff6cc84ac36a91683c1f58d274d91d47f40c0b9a7bfee4009dcbbf59

diff --git a/net-vpn/wireguard-tools/wireguard-tools-1.0.20200513.ebuild b/net-vpn/wireguard-tools/wireguard-tools-1.0.20200513.ebuild
deleted file mode 100644
index d38fb67b7a6..00000000000
--- a/net-vpn/wireguard-tools/wireguard-tools-1.0.20200513.ebuild
+++ /dev/null
@@ -1,116 +0,0 @@
-# Copyright 1999-2020 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=7
-
-inherit linux-info bash-completion-r1 systemd toolchain-funcs
-
-DESCRIPTION="Required tools for WireGuard, such as wg(8) and wg-quick(8)"
-HOMEPAGE="https://www.wireguard.com/"
-
-if [[ ${PV} == 9999 ]]; then
-	inherit git-r3
-	EGIT_REPO_URI="https://git.zx2c4.com/wireguard-tools"
-else
-	SRC_URI="https://git.zx2c4.com/wireguard-tools/snapshot/wireguard-tools-${PV}.tar.xz"
-	KEYWORDS="~alpha amd64 arm arm64 ~hppa ~ia64 ~m68k ~mips ppc ppc64 ~s390 sparc x86"
-fi
-
-LICENSE="GPL-2"
-SLOT="0"
-IUSE="+wg-quick"
-
-BDEPEND="virtual/pkgconfig"
-DEPEND=""
-RDEPEND="${DEPEND}
-	wg-quick? (
-		|| ( net-firewall/nftables net-firewall/iptables )
-		virtual/resolvconf
-	)
-"
-
-wg_quick_optional_config_nob() {
-	CONFIG_CHECK="$CONFIG_CHECK ~$1"
-	declare -g ERROR_$1="CONFIG_$1: This option is required for automatic routing of default routes inside of wg-quick(8), though it is not required for general WireGuard usage."
-}
-
-pkg_setup() {
-	if use wg-quick; then
-		wg_quick_optional_config_nob IP_ADVANCED_ROUTER
-		wg_quick_optional_config_nob IP_MULTIPLE_TABLES
-		wg_quick_optional_config_nob IPV6_MULTIPLE_TABLES
-		if has_version net-firewall/nftables; then
-			wg_quick_optional_config_nob NF_TABLES
-			wg_quick_optional_config_nob NF_TABLES_IPV4
-			wg_quick_optional_config_nob NF_TABLES_IPV6
-			wg_quick_optional_config_nob NFT_CT
-			wg_quick_optional_config_nob NFT_FIB
-			wg_quick_optional_config_nob NFT_FIB_IPV4
-			wg_quick_optional_config_nob NFT_FIB_IPV6
-			wg_quick_optional_config_nob NF_CONNTRACK_MARK
-		elif has_version net-firewall/iptables; then
-			wg_quick_optional_config_nob NETFILTER_XTABLES
-			wg_quick_optional_config_nob NETFILTER_XT_MARK
-			wg_quick_optional_config_nob NETFILTER_XT_CONNMARK
-			wg_quick_optional_config_nob NETFILTER_XT_MATCH_COMMENT
-			wg_quick_optional_config_nob NETFILTER_XT_MATCH_ADDRTYPE
-			wg_quick_optional_config_nob IP6_NF_RAW
-			wg_quick_optional_config_nob IP_NF_RAW
-			wg_quick_optional_config_nob IP6_NF_FILTER
-			wg_quick_optional_config_nob IP_NF_FILTER
-		fi
-	fi
-	get_version
-	if [[ -f $KERNEL_DIR/include/uapi/linux/wireguard.h ]]; then
-		CONFIG_CHECK="~WIREGUARD $CONFIG_CHECK"
-		declare -g ERROR_WIREGUARD="CONFIG_WIREGUARD: This option is required for using WireGuard."
-	elif kernel_is -ge 3 10 0 && kernel_is -lt 5 6 0 && ! has_version net-vpn/wireguard-modules; then
-		ewarn
-		ewarn "Your kernel does not appear to have upstream support for WireGuard"
-		ewarn "via CONFIG_WIREGUARD. However, the net-vpn/wireguard-modules ebuild"
-		ewarn "contains a compatibility module that should work for your kernel."
-		ewarn "It is highly recommended to install it:"
-		ewarn
-		ewarn "    emerge -av net-vpn/wireguard-modules"
-		ewarn
-	fi
-	linux-info_pkg_setup
-}
-
-src_compile() {
-	emake RUNSTATEDIR="${EPREFIX}/run" -C src CC="$(tc-getCC)" LD="$(tc-getLD)"
-}
-
-src_install() {
-	dodoc README.md
-	dodoc -r contrib
-	emake \
-		WITH_BASHCOMPLETION=yes \
-		WITH_SYSTEMDUNITS=yes \
-		WITH_WGQUICK=$(usex wg-quick) \
-		DESTDIR="${D}" \
-		BASHCOMPDIR="$(get_bashcompdir)" \
-		SYSTEMDUNITDIR="$(systemd_get_systemunitdir)" \
-		PREFIX="${EPREFIX}/usr" \
-		-C src install
-	use wg-quick && newinitd "${FILESDIR}/wg-quick.init" wg-quick
-}
-
-pkg_postinst() {
-	einfo
-	einfo "After installing WireGuard, if you'd like to try sending some packets through"
-	einfo "WireGuard, you may use, for testing purposes only, the insecure client.sh"
-	einfo "test example script:"
-	einfo
-	einfo "  \$ bzcat ${ROOT}/usr/share/doc/${PF}/contrib/ncat-client-server/client.sh.bz2 | sudo bash -"
-	einfo
-	einfo "This will automatically setup interface wg0, through a very insecure transport"
-	einfo "that is only suitable for demonstration purposes. You can then try loading the"
-	einfo "hidden website or sending pings:"
-	einfo
-	einfo "  \$ chromium http://192.168.4.1"
-	einfo "  \$ ping 192.168.4.1"
-	einfo
-	einfo "More info on getting started can be found at: https://www.wireguard.com/quickstart/"
-	einfo
-}

diff --git a/net-vpn/wireguard-tools/wireguard-tools-1.0.20200827.ebuild b/net-vpn/wireguard-tools/wireguard-tools-1.0.20200827.ebuild
deleted file mode 100644
index f61364d1c25..00000000000
--- a/net-vpn/wireguard-tools/wireguard-tools-1.0.20200827.ebuild
+++ /dev/null
@@ -1,116 +0,0 @@
-# Copyright 1999-2020 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=7
-
-inherit linux-info bash-completion-r1 systemd toolchain-funcs
-
-DESCRIPTION="Required tools for WireGuard, such as wg(8) and wg-quick(8)"
-HOMEPAGE="https://www.wireguard.com/"
-
-if [[ ${PV} == 9999 ]]; then
-	inherit git-r3
-	EGIT_REPO_URI="https://git.zx2c4.com/wireguard-tools"
-else
-	SRC_URI="https://git.zx2c4.com/wireguard-tools/snapshot/wireguard-tools-${PV}.tar.xz"
-	KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sparc ~x86"
-fi
-
-LICENSE="GPL-2"
-SLOT="0"
-IUSE="+wg-quick"
-
-BDEPEND="virtual/pkgconfig"
-DEPEND=""
-RDEPEND="${DEPEND}
-	wg-quick? (
-		|| ( net-firewall/nftables net-firewall/iptables )
-		virtual/resolvconf
-	)
-"
-
-wg_quick_optional_config_nob() {
-	CONFIG_CHECK="$CONFIG_CHECK ~$1"
-	declare -g ERROR_$1="CONFIG_$1: This option is required for automatic routing of default routes inside of wg-quick(8), though it is not required for general WireGuard usage."
-}
-
-pkg_setup() {
-	if use wg-quick; then
-		wg_quick_optional_config_nob IP_ADVANCED_ROUTER
-		wg_quick_optional_config_nob IP_MULTIPLE_TABLES
-		wg_quick_optional_config_nob IPV6_MULTIPLE_TABLES
-		if has_version net-firewall/nftables; then
-			wg_quick_optional_config_nob NF_TABLES
-			wg_quick_optional_config_nob NF_TABLES_IPV4
-			wg_quick_optional_config_nob NF_TABLES_IPV6
-			wg_quick_optional_config_nob NFT_CT
-			wg_quick_optional_config_nob NFT_FIB
-			wg_quick_optional_config_nob NFT_FIB_IPV4
-			wg_quick_optional_config_nob NFT_FIB_IPV6
-			wg_quick_optional_config_nob NF_CONNTRACK_MARK
-		elif has_version net-firewall/iptables; then
-			wg_quick_optional_config_nob NETFILTER_XTABLES
-			wg_quick_optional_config_nob NETFILTER_XT_MARK
-			wg_quick_optional_config_nob NETFILTER_XT_CONNMARK
-			wg_quick_optional_config_nob NETFILTER_XT_MATCH_COMMENT
-			wg_quick_optional_config_nob NETFILTER_XT_MATCH_ADDRTYPE
-			wg_quick_optional_config_nob IP6_NF_RAW
-			wg_quick_optional_config_nob IP_NF_RAW
-			wg_quick_optional_config_nob IP6_NF_FILTER
-			wg_quick_optional_config_nob IP_NF_FILTER
-		fi
-	fi
-	get_version
-	if [[ -f $KERNEL_DIR/include/uapi/linux/wireguard.h ]]; then
-		CONFIG_CHECK="~WIREGUARD $CONFIG_CHECK"
-		declare -g ERROR_WIREGUARD="CONFIG_WIREGUARD: This option is required for using WireGuard."
-	elif kernel_is -ge 3 10 0 && kernel_is -lt 5 6 0 && ! has_version net-vpn/wireguard-modules; then
-		ewarn
-		ewarn "Your kernel does not appear to have upstream support for WireGuard"
-		ewarn "via CONFIG_WIREGUARD. However, the net-vpn/wireguard-modules ebuild"
-		ewarn "contains a compatibility module that should work for your kernel."
-		ewarn "It is highly recommended to install it:"
-		ewarn
-		ewarn "    emerge -av net-vpn/wireguard-modules"
-		ewarn
-	fi
-	linux-info_pkg_setup
-}
-
-src_compile() {
-	emake RUNSTATEDIR="${EPREFIX}/run" -C src CC="$(tc-getCC)" LD="$(tc-getLD)"
-}
-
-src_install() {
-	dodoc README.md
-	dodoc -r contrib
-	emake \
-		WITH_BASHCOMPLETION=yes \
-		WITH_SYSTEMDUNITS=yes \
-		WITH_WGQUICK=$(usex wg-quick) \
-		DESTDIR="${D}" \
-		BASHCOMPDIR="$(get_bashcompdir)" \
-		SYSTEMDUNITDIR="$(systemd_get_systemunitdir)" \
-		PREFIX="${EPREFIX}/usr" \
-		-C src install
-	use wg-quick && newinitd "${FILESDIR}/wg-quick.init" wg-quick
-}
-
-pkg_postinst() {
-	einfo
-	einfo "After installing WireGuard, if you'd like to try sending some packets through"
-	einfo "WireGuard, you may use, for testing purposes only, the insecure client.sh"
-	einfo "test example script:"
-	einfo
-	einfo "  \$ bzcat ${ROOT}/usr/share/doc/${PF}/contrib/ncat-client-server/client.sh.bz2 | sudo bash -"
-	einfo
-	einfo "This will automatically setup interface wg0, through a very insecure transport"
-	einfo "that is only suitable for demonstration purposes. You can then try loading the"
-	einfo "hidden website or sending pings:"
-	einfo
-	einfo "  \$ chromium http://192.168.4.1"
-	einfo "  \$ ping 192.168.4.1"
-	einfo
-	einfo "More info on getting started can be found at: https://www.wireguard.com/quickstart/"
-	einfo
-}

diff --git a/net-vpn/wireguard-tools/wireguard-tools-1.0.20210223.ebuild b/net-vpn/wireguard-tools/wireguard-tools-1.0.20210223.ebuild
deleted file mode 100644
index b0ff48c21a8..00000000000
--- a/net-vpn/wireguard-tools/wireguard-tools-1.0.20210223.ebuild
+++ /dev/null
@@ -1,116 +0,0 @@
-# Copyright 1999-2021 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=7
-
-inherit linux-info bash-completion-r1 systemd toolchain-funcs
-
-DESCRIPTION="Required tools for WireGuard, such as wg(8) and wg-quick(8)"
-HOMEPAGE="https://www.wireguard.com/"
-
-if [[ ${PV} == 9999 ]]; then
-	inherit git-r3
-	EGIT_REPO_URI="https://git.zx2c4.com/wireguard-tools"
-else
-	SRC_URI="https://git.zx2c4.com/wireguard-tools/snapshot/wireguard-tools-${PV}.tar.xz"
-	KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sparc ~x86"
-fi
-
-LICENSE="GPL-2"
-SLOT="0"
-IUSE="+wg-quick"
-
-BDEPEND="virtual/pkgconfig"
-DEPEND=""
-RDEPEND="${DEPEND}
-	wg-quick? (
-		|| ( net-firewall/nftables net-firewall/iptables )
-		virtual/resolvconf
-	)
-"
-
-wg_quick_optional_config_nob() {
-	CONFIG_CHECK="$CONFIG_CHECK ~$1"
-	declare -g ERROR_$1="CONFIG_$1: This option is required for automatic routing of default routes inside of wg-quick(8), though it is not required for general WireGuard usage."
-}
-
-pkg_setup() {
-	if use wg-quick; then
-		wg_quick_optional_config_nob IP_ADVANCED_ROUTER
-		wg_quick_optional_config_nob IP_MULTIPLE_TABLES
-		wg_quick_optional_config_nob IPV6_MULTIPLE_TABLES
-		if has_version net-firewall/nftables; then
-			wg_quick_optional_config_nob NF_TABLES
-			wg_quick_optional_config_nob NF_TABLES_IPV4
-			wg_quick_optional_config_nob NF_TABLES_IPV6
-			wg_quick_optional_config_nob NFT_CT
-			wg_quick_optional_config_nob NFT_FIB
-			wg_quick_optional_config_nob NFT_FIB_IPV4
-			wg_quick_optional_config_nob NFT_FIB_IPV6
-			wg_quick_optional_config_nob NF_CONNTRACK_MARK
-		elif has_version net-firewall/iptables; then
-			wg_quick_optional_config_nob NETFILTER_XTABLES
-			wg_quick_optional_config_nob NETFILTER_XT_MARK
-			wg_quick_optional_config_nob NETFILTER_XT_CONNMARK
-			wg_quick_optional_config_nob NETFILTER_XT_MATCH_COMMENT
-			wg_quick_optional_config_nob NETFILTER_XT_MATCH_ADDRTYPE
-			wg_quick_optional_config_nob IP6_NF_RAW
-			wg_quick_optional_config_nob IP_NF_RAW
-			wg_quick_optional_config_nob IP6_NF_FILTER
-			wg_quick_optional_config_nob IP_NF_FILTER
-		fi
-	fi
-	get_version
-	if [[ -f $KERNEL_DIR/include/uapi/linux/wireguard.h ]]; then
-		CONFIG_CHECK="~WIREGUARD $CONFIG_CHECK"
-		declare -g ERROR_WIREGUARD="CONFIG_WIREGUARD: This option is required for using WireGuard."
-	elif kernel_is -ge 3 10 0 && kernel_is -lt 5 6 0 && ! has_version net-vpn/wireguard-modules; then
-		ewarn
-		ewarn "Your kernel does not appear to have upstream support for WireGuard"
-		ewarn "via CONFIG_WIREGUARD. However, the net-vpn/wireguard-modules ebuild"
-		ewarn "contains a compatibility module that should work for your kernel."
-		ewarn "It is highly recommended to install it:"
-		ewarn
-		ewarn "    emerge -av net-vpn/wireguard-modules"
-		ewarn
-	fi
-	linux-info_pkg_setup
-}
-
-src_compile() {
-	emake RUNSTATEDIR="${EPREFIX}/run" -C src CC="$(tc-getCC)" LD="$(tc-getLD)"
-}
-
-src_install() {
-	dodoc README.md
-	dodoc -r contrib
-	emake \
-		WITH_BASHCOMPLETION=yes \
-		WITH_SYSTEMDUNITS=yes \
-		WITH_WGQUICK=$(usex wg-quick) \
-		DESTDIR="${D}" \
-		BASHCOMPDIR="$(get_bashcompdir)" \
-		SYSTEMDUNITDIR="$(systemd_get_systemunitdir)" \
-		PREFIX="${EPREFIX}/usr" \
-		-C src install
-	use wg-quick && newinitd "${FILESDIR}/wg-quick.init" wg-quick
-}
-
-pkg_postinst() {
-	einfo
-	einfo "After installing WireGuard, if you'd like to try sending some packets through"
-	einfo "WireGuard, you may use, for testing purposes only, the insecure client.sh"
-	einfo "test example script:"
-	einfo
-	einfo "  \$ bzcat ${ROOT}/usr/share/doc/${PF}/contrib/ncat-client-server/client.sh.bz2 | sudo bash -"
-	einfo
-	einfo "This will automatically setup interface wg0, through a very insecure transport"
-	einfo "that is only suitable for demonstration purposes. You can then try loading the"
-	einfo "hidden website or sending pings:"
-	einfo
-	einfo "  \$ chromium http://192.168.4.1"
-	einfo "  \$ ping 192.168.4.1"
-	einfo
-	einfo "More info on getting started can be found at: https://www.wireguard.com/quickstart/"
-	einfo
-}

diff --git a/net-vpn/wireguard-tools/wireguard-tools-1.0.20210315.ebuild b/net-vpn/wireguard-tools/wireguard-tools-1.0.20210315.ebuild
deleted file mode 100644
index b0ff48c21a8..00000000000
--- a/net-vpn/wireguard-tools/wireguard-tools-1.0.20210315.ebuild
+++ /dev/null
@@ -1,116 +0,0 @@
-# Copyright 1999-2021 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=7
-
-inherit linux-info bash-completion-r1 systemd toolchain-funcs
-
-DESCRIPTION="Required tools for WireGuard, such as wg(8) and wg-quick(8)"
-HOMEPAGE="https://www.wireguard.com/"
-
-if [[ ${PV} == 9999 ]]; then
-	inherit git-r3
-	EGIT_REPO_URI="https://git.zx2c4.com/wireguard-tools"
-else
-	SRC_URI="https://git.zx2c4.com/wireguard-tools/snapshot/wireguard-tools-${PV}.tar.xz"
-	KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sparc ~x86"
-fi
-
-LICENSE="GPL-2"
-SLOT="0"
-IUSE="+wg-quick"
-
-BDEPEND="virtual/pkgconfig"
-DEPEND=""
-RDEPEND="${DEPEND}
-	wg-quick? (
-		|| ( net-firewall/nftables net-firewall/iptables )
-		virtual/resolvconf
-	)
-"
-
-wg_quick_optional_config_nob() {
-	CONFIG_CHECK="$CONFIG_CHECK ~$1"
-	declare -g ERROR_$1="CONFIG_$1: This option is required for automatic routing of default routes inside of wg-quick(8), though it is not required for general WireGuard usage."
-}
-
-pkg_setup() {
-	if use wg-quick; then
-		wg_quick_optional_config_nob IP_ADVANCED_ROUTER
-		wg_quick_optional_config_nob IP_MULTIPLE_TABLES
-		wg_quick_optional_config_nob IPV6_MULTIPLE_TABLES
-		if has_version net-firewall/nftables; then
-			wg_quick_optional_config_nob NF_TABLES
-			wg_quick_optional_config_nob NF_TABLES_IPV4
-			wg_quick_optional_config_nob NF_TABLES_IPV6
-			wg_quick_optional_config_nob NFT_CT
-			wg_quick_optional_config_nob NFT_FIB
-			wg_quick_optional_config_nob NFT_FIB_IPV4
-			wg_quick_optional_config_nob NFT_FIB_IPV6
-			wg_quick_optional_config_nob NF_CONNTRACK_MARK
-		elif has_version net-firewall/iptables; then
-			wg_quick_optional_config_nob NETFILTER_XTABLES
-			wg_quick_optional_config_nob NETFILTER_XT_MARK
-			wg_quick_optional_config_nob NETFILTER_XT_CONNMARK
-			wg_quick_optional_config_nob NETFILTER_XT_MATCH_COMMENT
-			wg_quick_optional_config_nob NETFILTER_XT_MATCH_ADDRTYPE
-			wg_quick_optional_config_nob IP6_NF_RAW
-			wg_quick_optional_config_nob IP_NF_RAW
-			wg_quick_optional_config_nob IP6_NF_FILTER
-			wg_quick_optional_config_nob IP_NF_FILTER
-		fi
-	fi
-	get_version
-	if [[ -f $KERNEL_DIR/include/uapi/linux/wireguard.h ]]; then
-		CONFIG_CHECK="~WIREGUARD $CONFIG_CHECK"
-		declare -g ERROR_WIREGUARD="CONFIG_WIREGUARD: This option is required for using WireGuard."
-	elif kernel_is -ge 3 10 0 && kernel_is -lt 5 6 0 && ! has_version net-vpn/wireguard-modules; then
-		ewarn
-		ewarn "Your kernel does not appear to have upstream support for WireGuard"
-		ewarn "via CONFIG_WIREGUARD. However, the net-vpn/wireguard-modules ebuild"
-		ewarn "contains a compatibility module that should work for your kernel."
-		ewarn "It is highly recommended to install it:"
-		ewarn
-		ewarn "    emerge -av net-vpn/wireguard-modules"
-		ewarn
-	fi
-	linux-info_pkg_setup
-}
-
-src_compile() {
-	emake RUNSTATEDIR="${EPREFIX}/run" -C src CC="$(tc-getCC)" LD="$(tc-getLD)"
-}
-
-src_install() {
-	dodoc README.md
-	dodoc -r contrib
-	emake \
-		WITH_BASHCOMPLETION=yes \
-		WITH_SYSTEMDUNITS=yes \
-		WITH_WGQUICK=$(usex wg-quick) \
-		DESTDIR="${D}" \
-		BASHCOMPDIR="$(get_bashcompdir)" \
-		SYSTEMDUNITDIR="$(systemd_get_systemunitdir)" \
-		PREFIX="${EPREFIX}/usr" \
-		-C src install
-	use wg-quick && newinitd "${FILESDIR}/wg-quick.init" wg-quick
-}
-
-pkg_postinst() {
-	einfo
-	einfo "After installing WireGuard, if you'd like to try sending some packets through"
-	einfo "WireGuard, you may use, for testing purposes only, the insecure client.sh"
-	einfo "test example script:"
-	einfo
-	einfo "  \$ bzcat ${ROOT}/usr/share/doc/${PF}/contrib/ncat-client-server/client.sh.bz2 | sudo bash -"
-	einfo
-	einfo "This will automatically setup interface wg0, through a very insecure transport"
-	einfo "that is only suitable for demonstration purposes. You can then try loading the"
-	einfo "hidden website or sending pings:"
-	einfo
-	einfo "  \$ chromium http://192.168.4.1"
-	einfo "  \$ ping 192.168.4.1"
-	einfo
-	einfo "More info on getting started can be found at: https://www.wireguard.com/quickstart/"
-	einfo
-}


             reply	other threads:[~2021-05-12 23:40 UTC|newest]

Thread overview: 64+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-05-12 23:40 Jason A. Donenfeld [this message]
  -- strict thread matches above, loose matches on Subject: below --
2025-10-07 23:19 [gentoo-commits] repo/gentoo:master commit in: net-vpn/wireguard-tools/ Jason A. Donenfeld
2025-05-20 23:22 Jason A. Donenfeld
2022-05-05  9:51 WANG Xuerui
2022-02-20 19:34 Arthur Zamarin
2022-02-19  7:05 Arthur Zamarin
2022-02-19  7:05 Arthur Zamarin
2022-02-19  7:03 Arthur Zamarin
2022-02-19  5:20 Sam James
2022-02-18 17:42 Arthur Zamarin
2022-02-18 17:42 Arthur Zamarin
2021-09-27 22:05 Marek Szuba
2021-09-13 22:48 Jason A. Donenfeld
2021-09-13 21:16 Jason A. Donenfeld
2021-04-27 18:09 Sam James
2021-04-27 18:09 Sam James
2021-04-27 18:02 Sam James
2021-04-27 18:01 Sam James
2021-04-26 20:54 Sergei Trofimovich
2021-04-24 20:51 Jason A. Donenfeld
2021-03-15 14:35 Jason A. Donenfeld
2021-02-23 21:09 Jason A. Donenfeld
2020-09-08 16:26 Jason A. Donenfeld
2020-08-20 10:13 Jason A. Donenfeld
2020-07-31 12:12 Jason A. Donenfeld
2020-07-21 12:28 Jason A. Donenfeld
2020-06-28 20:56 Thomas Deutschmann
2020-06-28 20:37 Agostino Sarubbo
2020-06-28 20:33 Agostino Sarubbo
2020-06-28 20:30 Agostino Sarubbo
2020-06-28  7:49 Sergei Trofimovich
2020-06-27 20:41 Mart Raudsepp
2020-06-27 20:41 Mart Raudsepp
2020-06-27  9:09 Sergei Trofimovich
2020-06-26 17:43 Agostino Sarubbo
2020-06-25 10:46 Jason A. Donenfeld
2020-06-22 22:01 Jason A. Donenfeld
2020-06-19 15:41 Sergei Trofimovich
2020-05-14  0:33 Jason A. Donenfeld
2020-05-11  4:32 Jason A. Donenfeld
2020-04-27 23:50 Jason A. Donenfeld
2020-04-19  8:38 Sergei Trofimovich
2020-04-19  8:38 Sergei Trofimovich
2020-04-14 15:52 Agostino Sarubbo
2020-04-14 13:02 Agostino Sarubbo
2020-04-14 13:01 Agostino Sarubbo
2020-04-14 13:01 Agostino Sarubbo
2020-04-14 10:12 Mart Raudsepp
2020-04-14  7:58 Agostino Sarubbo
2020-04-03  3:37 Jason A. Donenfeld
2020-03-19 22:54 Jason A. Donenfeld
2020-02-06 15:29 Jason A. Donenfeld
2020-01-21 14:54 Jason A. Donenfeld
2020-01-02 18:59 Jason A. Donenfeld
2019-12-30  9:32 Jason A. Donenfeld
2019-12-28 15:37 Thomas Deutschmann
2019-12-28  8:04 Jason A. Donenfeld
2019-12-28  8:04 Jason A. Donenfeld
2019-12-28  8:04 Jason A. Donenfeld
2019-12-27 22:56 Jason A. Donenfeld
2019-12-27 15:25 Jason A. Donenfeld
2019-12-26 16:47 Jason A. Donenfeld
2019-12-26 13:08 Jason A. Donenfeld
2019-12-26 12:50 Jason A. Donenfeld

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1620862787.129df22822bfdadbff8e54ebfae088e09a07d6c0.zx2c4@gentoo \
    --to=zx2c4@gentoo.org \
    --cc=gentoo-commits@lists.gentoo.org \
    --cc=gentoo-dev@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox