diff options
| author | Tobias Brunner | 2013-06-17 10:48:15 +0200 |
|---|---|---|
| committer | Adam Vandenberg | 2013-09-19 07:30:27 -0700 |
| commit | ae2f94a7c0bf2e763bd93d6ce5083867be110b85 (patch) | |
| tree | c786cec80991dac2ae007d4b0b77bf40836f8ffe /Library/Formula | |
| parent | b7f0ddf4b8d41bd7ecd66e934b353f9346f2fa52 (diff) | |
| download | homebrew-ae2f94a7c0bf2e763bd93d6ce5083867be110b85.tar.bz2 | |
strongswan: 5.1.0 - strongSwan IPsec based VPN
This is the first strongSwan version that supports virtual IP addresses
on Mac OS X, making it finally usable in common client access (aka
road-warrior) scenarios.
As the Mac OS X kernel does not support AES-GCM it comes with an
optional userland IPsec implementation that provides support for the
Suite B cryptographic suite of algorithms.
The configure options are currently trimmed for use in client scenarios.
Closes #20941.
Signed-off-by: Adam Vandenberg <flangy@gmail.com>
Diffstat (limited to 'Library/Formula')
| -rw-r--r-- | Library/Formula/strongswan.rb | 77 |
1 files changed, 77 insertions, 0 deletions
diff --git a/Library/Formula/strongswan.rb b/Library/Formula/strongswan.rb new file mode 100644 index 000000000..de7d727c4 --- /dev/null +++ b/Library/Formula/strongswan.rb @@ -0,0 +1,77 @@ +require 'formula' + +class Strongswan < Formula + homepage 'http://www.strongswan.org' + url 'http://download.strongswan.org/strongswan-5.1.0.tar.bz2' + sha1 'ee7a9b078b183c138156fba695ddf870f1990748' + + option 'with-curl', 'Build with libcurl based fetcher' + option 'with-suite-b', 'Build with Suite B support (does not use the IPsec implementation provided by the kernel)' + + depends_on 'vstr' + depends_on 'openssl' if build.include? 'with-suite-b' or MacOS.version <= :leopard + depends_on 'curl' => :optional + + def install + # required for Vstr + ENV.append 'CFLAGS', '--std=gnu89' if ENV.compiler == :clang + args = %W[ + --disable-dependency-tracking + --prefix=#{prefix} + --sbindir=#{bin} + --sysconfdir=#{etc} + --disable-defaults + --enable-charon + --enable-cmd + --enable-constraints + --enable-eap-identity + --enable-eap-md5 + --enable-eap-gtc + --enable-eap-mschapv2 + --enable-ikev1 + --enable-ikev2 + --enable-kernel-pfroute + --enable-nonce + --enable-openssl + --enable-osx-attr + --enable-pem + --enable-pgp + --enable-pkcs1 + --enable-pkcs8 + --enable-pubkey + --enable-revocation + --enable-socket-default + --enable-sshkey + --enable-stroke + --enable-tools + --enable-updown + --enable-unity + --enable-vstr + --enable-xauth-generic + ] + args << "--enable-curl" if build.with? 'curl' + args << "--enable-kernel-pfkey" unless build.with? 'suite-b' + args << "--enable-kernel-libipsec" if build.with? 'suite-b' + + system "./configure", *args + system "make", "install" + end + + def caveats + msg = <<-EOS.undent + strongSwan's configuration files are placed in: + #{etc} + + You will have to run both 'ipsec' and 'charon-cmd' with 'sudo'. + EOS + if build.with? 'suite-b' + msg += <<-EOS.undent + + If you previously ran strongSwan without Suite B support it might be + required to execute 'sudo sysctl -w net.inet.ipsec.esp_port=0' in order + to receive packets. + EOS + end + return msg + end +end |
