diff options
author | 2006-02-28 15:33:15 +0000 | |
---|---|---|
committer | 2006-02-28 15:33:15 +0000 | |
commit | f9b8c4cae9de0ef69e420f5429ec5996058611b0 (patch) | |
tree | faa7f6e46260da1a3cc66070f600b13aca3ee46d /net-misc | |
parent | Improve EnhancedCommentify. Thanks to TGL in bug #124395. (diff) | |
download | gentoo-2-f9b8c4cae9de0ef69e420f5429ec5996058611b0.tar.gz gentoo-2-f9b8c4cae9de0ef69e420f5429ec5996058611b0.tar.bz2 gentoo-2-f9b8c4cae9de0ef69e420f5429ec5996058611b0.zip |
bump
(Portage version: 2.1_pre4-r1)
Diffstat (limited to 'net-misc')
-rw-r--r-- | net-misc/tor/ChangeLog | 9 | ||||
-rw-r--r-- | net-misc/tor/Manifest | 38 | ||||
-rw-r--r-- | net-misc/tor/files/digest-tor-0.1.0.17 | 3 | ||||
-rw-r--r-- | net-misc/tor/tor-0.1.0.17.ebuild | 131 |
4 files changed, 170 insertions, 11 deletions
diff --git a/net-misc/tor/ChangeLog b/net-misc/tor/ChangeLog index 4db6efd21653..420e308a00b8 100644 --- a/net-misc/tor/ChangeLog +++ b/net-misc/tor/ChangeLog @@ -1,6 +1,13 @@ # ChangeLog for net-misc/tor # Copyright 2000-2006 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/ChangeLog,v 1.52 2006/01/04 03:38:09 humpback Exp $ +# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/ChangeLog,v 1.53 2006/02/28 15:33:15 humpback Exp $ + +*tor-0.1.0.17 (28 Feb 2006) + + 28 Feb 2006; Gustavo Felisberto <humpback@gentoo.org>; + +tor-0.1.0.17.ebuild: + Bump to 0.1.017. Credits go to Christian Mandery in bug #123530 for + reporting this. *tor-0.1.0.16 (04 Jan 2006) diff --git a/net-misc/tor/Manifest b/net-misc/tor/Manifest index d6f28b65780b..a4d88e271a70 100644 --- a/net-misc/tor/Manifest +++ b/net-misc/tor/Manifest @@ -1,21 +1,39 @@ ------BEGIN PGP SIGNED MESSAGE----- -Hash: SHA1 - MD5 c2e6bcd8d4b3c128a26cbdb6cf09a28c ChangeLog 8329 +RMD160 2f8b6196213d34eac54781639b629b480c95bfd2 ChangeLog 8329 +SHA256 35030ca5e2577548533d0a3878af58e5a8dcd1da285b29dec535dc66e6594db1 ChangeLog 8329 MD5 ddb143bc03f010846dd1c1a12c80ec04 files/digest-tor-0.1.0.14-r1 64 +RMD160 2aaf8682c9df883fd12bf66af61cc01cd78f6e16 files/digest-tor-0.1.0.14-r1 64 +SHA256 4dee910e9860883bb173db48f419f865f1472f21161e1a20ff833fb50b3297b0 files/digest-tor-0.1.0.14-r1 64 MD5 28685c6cba8b8de0c3c4eb9b63194af9 files/digest-tor-0.1.0.16 64 +RMD160 7eb78d074f5599c0e710185b34d05370860fcf1d files/digest-tor-0.1.0.16 64 +SHA256 1510a4aa4332ddee77850444ab00e48ccfbb97d941f891354c1ca7b080edcfea files/digest-tor-0.1.0.16 64 +MD5 2e626d3d0276e7f9149faf58bbc9d821 files/digest-tor-0.1.0.17 238 +RMD160 c4b4c7d265ff9db7666a82f57bedcdcb198502ba files/digest-tor-0.1.0.17 238 +SHA256 8e4641954dc5e2e53a22565e87496a49c7efa1687b88206fc82988c2ee394d3b files/digest-tor-0.1.0.17 238 MD5 46b3d14e606aace36decc6497dfc0b00 files/tor.confd 321 +RMD160 e31d2f03bf979bef19895b4206f82f77cab09661 files/tor.confd 321 +SHA256 1e4fa4c700620d70d96ebcbe337adad5839829d148c76c69c39b2b3a2ff58e76 files/tor.confd 321 MD5 3321d3725a619e687d9bb7e2fb97d6c1 files/tor.initd 856 +RMD160 a7da05532322a2d0ce147741137de7b6ed3d8074 files/tor.initd 856 +SHA256 f5a5cf73164d2ecd9b33193071958d6371dd9000922a8624aedd6b8eda4ab9c5 files/tor.initd 856 MD5 bb2e1c6fc3298733ed0880793777533d files/tor.initd-r1 1236 +RMD160 bc7ba95f5e2a61f10e893800cf8edd02375101ab files/tor.initd-r1 1236 +SHA256 53a79dbe8419396fbe19968d94722a209fee83cfcb5d01d8153be7ca5295c7ee files/tor.initd-r1 1236 MD5 ef65448a33725bf0e7f4d02d5e0b8fb1 files/torrc.sample-0.1.0.14.patch 1120 +RMD160 e97a4f007390bba5f4836bd11eee80b59e30a748 files/torrc.sample-0.1.0.14.patch 1120 +SHA256 27c6a20633c453287df583ddd7922c65ae98335f9c850d0fb6b965b1038faeba files/torrc.sample-0.1.0.14.patch 1120 MD5 ab82c91feb4f7eceb4d1ed496a17f928 files/torrc.sample-0.1.0.16.patch 1134 +RMD160 ad432e115b9610e139315f3908f4622702b84f7a files/torrc.sample-0.1.0.16.patch 1134 +SHA256 3174ef12c8d15486b9bd872a72030367023e0f81639659ecb48204160705d6da files/torrc.sample-0.1.0.16.patch 1134 MD5 b79b08e0f979feb256c93295714b4fc9 metadata.xml 224 +RMD160 87e0a44a0ea05af5ad562f03d35b841c42c48971 metadata.xml 224 +SHA256 5a95452656188e381651219d143d53498f11199a52ade7ed467a94e001e72bd6 metadata.xml 224 MD5 68f8bf751a6bddbb1209e520d23c6337 tor-0.1.0.14-r1.ebuild 1271 +RMD160 a6925eb36c01a103936a19ea4a0606c676125f0d tor-0.1.0.14-r1.ebuild 1271 +SHA256 02493933f0810b609a35bf0204d18b161b456e23e09f362b0990f76fb632df89 tor-0.1.0.14-r1.ebuild 1271 MD5 5d87894b2eb81d47dc20b445408a499a tor-0.1.0.16.ebuild 4059 ------BEGIN PGP SIGNATURE----- -Version: GnuPG v1.4.2 (GNU/Linux) - -iD8DBQFDu0Ue8zY1VwezZiERAlycAJ9ZzAq25ielRe2iRN2MPAJqrSp2sgCgr0wm -bCUFEJotIu68F8YZRadlzMY= -=Eo78 ------END PGP SIGNATURE----- +RMD160 bf719e8b5a6bda9786e792c8ec03ca227cf0fe9c tor-0.1.0.16.ebuild 4059 +SHA256 083f279e112536cc160940725a4b6865188aabb222495a8ad291376bfe37175c tor-0.1.0.16.ebuild 4059 +MD5 5d87894b2eb81d47dc20b445408a499a tor-0.1.0.17.ebuild 4059 +RMD160 bf719e8b5a6bda9786e792c8ec03ca227cf0fe9c tor-0.1.0.17.ebuild 4059 +SHA256 083f279e112536cc160940725a4b6865188aabb222495a8ad291376bfe37175c tor-0.1.0.17.ebuild 4059 diff --git a/net-misc/tor/files/digest-tor-0.1.0.17 b/net-misc/tor/files/digest-tor-0.1.0.17 new file mode 100644 index 000000000000..40de0ad837b2 --- /dev/null +++ b/net-misc/tor/files/digest-tor-0.1.0.17 @@ -0,0 +1,3 @@ +MD5 83c4afe29fa82473afcb2ec7e17771b9 tor-0.1.0.17.tar.gz 634144 +RMD160 d3b99e1f1ea26d73dae073ee62d3a1899905074a tor-0.1.0.17.tar.gz 634144 +SHA256 33dc70a8d8f4ad20a9c9b8d476d431c713d8d94f1859b3efbaf1e178b36c2ca3 tor-0.1.0.17.tar.gz 634144 diff --git a/net-misc/tor/tor-0.1.0.17.ebuild b/net-misc/tor/tor-0.1.0.17.ebuild new file mode 100644 index 000000000000..3ebf42283c69 --- /dev/null +++ b/net-misc/tor/tor-0.1.0.17.ebuild @@ -0,0 +1,131 @@ +# Copyright 1999-2006 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/net-misc/tor/tor-0.1.0.17.ebuild,v 1.1 2006/02/28 15:33:15 humpback Exp $ + +inherit eutils flag-o-matic + +DESCRIPTION="The Onion Router - Anonymizing overlay network for TCP" +HOMEPAGE="http://tor.eff.org/" +SRC_URI="http://tor.eff.org/dist/${P}.tar.gz" + +LICENSE="BSD" +SLOT="0" +## Arch temas please please dont mark this stable untill you really test the +## chroot stuff +KEYWORDS="~amd64 ~ppc ~ppc64 ~sparc ~x86" +IUSE="static" + +DEPEND=">=dev-libs/openssl-0.9.6 + dev-libs/libevent" +RDEPEND="!static? ( + net-proxy/tsocks + >=dev-libs/openssl-0.9.6 + dev-libs/libevent + )" + +src_unpack() { + unpack ${A} + cd ${S} + epatch ${FILESDIR}/torrc.sample-0.1.0.16.patch +} + +src_compile() { + use static && append-ldflags -static + use static && append-flags -static + econf || die + emake || die +} + +src_install() { + exeinto /etc/init.d ; newexe ${FILESDIR}/tor.initd-r1 tor + insinto /etc/conf.d ; newins ${FILESDIR}/tor.confd tor + make DESTDIR=${D} install || die + + dodoc README ChangeLog AUTHORS INSTALL \ + doc/{CLIENTS,FAQ,HACKING,TODO} \ + doc/{control-spec.txt,rend-spec.txt,tor-doc.css,tor-doc.html,tor-spec.txt} + + enewgroup tor + enewuser tor -1 -1 /var/lib/tor tor + dodir /var/lib/tor + dodir /var/log/tor + fperms 750 /var/lib/tor /var/log/tor + fowners tor:tor /var/lib/tor /var/log/tor +} + +pkg_postinst() { + einfo "You must create /etc/tor/torrc, you can use the sample that is in that directory" + einfo "To have privoxy and tor working together you must add:" + einfo "forward-socks4a / localhost:9050 ." + einfo "to /etc/privoxy/config" + einfo + einfo "The Tor ebuild now includes chroot support." + einfo "If you like to run tor in chroot AND this is a new install OR" + einfo "your tor doesn't already run in chroot, simply run:" + einfo "\`ebuild /var/db/pkg/${CATEGORY}/${PF}/${PF}.ebuild config\`" + einfo "Before running the above command you might want to change the chroot" + einfo "dir in /etc/conf.d/tor. Otherwise /chroot/tor will be used." +} + +pkg_config() { + CHROOT=`sed -n 's/^[[:blank:]]\?CHROOT="\([^"]\+\)"/\1/p' /etc/conf.d/tor 2>/dev/null` + EXISTS="no" + + if [ -z "${CHROOT}" -a ! -d "/chroot/tor" ]; then + CHROOT="/chroot/tor" + elif [ -d ${CHROOT} ]; then + eerror; eerror "${CHROOT:-/chroot/tor} already exists. Quitting."; eerror; EXISTS="yes" + fi + + if [ ! "$EXISTS" = yes ]; then + USERNAME="tor" + BINARY="/usr/bin/tor" + + einfo + einfo "Setting up the chroot directory..." + mkdir -m 700 -p ${CHROOT} + mkdir -p ${CHROOT}/etc/tor \ + ${CHROOT}/dev ${CHROOT}/var/log/tor ${CHROOT}/var/lib/tor \ + ${CHROOT}/usr/bin ${CHROOT}/var/run ${CHROOT}/lib \ + ${CHROOT}/usr/lib + + einfo "Creating devices..." + mknod -m 0444 ${CHROOT}/dev/random c 1 8 + mknod -m 0444 ${CHROOT}/dev/urandom c 1 9 + mknod -m 0666 ${CHROOT}/dev/null c 1 3 + + einfo "Adding ${USERNAME} to ${CHROOT}/etc/passwd and group..." + grep ^${USERNAME}: /etc/passwd > ${CHROOT}/etc/passwd + grep ^${USERNAME}: /etc/group > ${CHROOT}/etc/group + + einfo "Copying system files..." + cp -p /etc/{nsswitch.conf,host.conf,resolv.conf,hosts,localtime} ${CHROOT}/etc + cp -p /lib/{libc.*,libnsl.*,libnss_*.*,libresolv.*,libgcc_*.*,ld-linux.*} ${CHROOT}/lib + + # Static version has no dynamic dependencies + if useq !static ; then + einfo "Copying dependencies..." + for DEP in $(ldd $BINARY | awk '{print $3}'); do + test -f ${DEP} && cp ${DEP} ${CHROOT}${DEP} + done + fi + + einfo "Copying binaries and config files..." + for i in ${BINARY}; do + cp ${i} ${CHROOT}${i} + done + + cp -R /etc/tor ${CHROOT}/etc/ + cp -Rp /var/lib/tor ${CHROOT}/var/lib/ + + einfo "Setting permissions..." + chown ${USERNAME}:${USERNAME} ${CHROOT} ${CHROOT}/var/lib/tor \ + ${CHROOT}/var/log/tor ${CHROOT}/var/run + chmod 0700 ${CHROOT}/var/lib/tor ${CHROOT}/var/run ${CHROOT}/var/log/tor + chmod 0444 ${CHROOT}/etc/{group,host.conf,hosts,localtime,nsswitch.conf} + chmod 0444 ${CHROOT}/etc/{passwd,resolv.conf} + chmod 0644 ${CHROOT}/etc/tor/* + + einfo "Done." + fi +} |