PKGBUILDs/core/openssl/PKGBUILD

83 lines
2.3 KiB
Bash
Raw Normal View History

2011-09-08 16:09:54 +00:00
# Maintainer: Pierre Schmitz <pierre@archlinux.de>
2012-01-07 01:06:27 +00:00
# ALARM: Kevin Mihelich <kevin@archlinuxarm.org>
2016-03-06 16:23:36 +00:00
# - set ARM architecture targets
2011-09-08 16:09:54 +00:00
pkgname=openssl
2022-05-04 23:51:12 +00:00
_ver=1.1.1o
2011-09-08 16:09:54 +00:00
# use a pacman compatible version scheme
2012-04-19 14:28:42 +00:00
pkgver=${_ver/[a-z]/.${_ver//[0-9.]/}}
2021-02-18 14:58:53 +00:00
pkgrel=1
2011-09-08 16:09:54 +00:00
pkgdesc='The Open Source toolkit for Secure Sockets Layer and Transport Layer Security'
2018-04-01 05:34:42 +00:00
arch=('x86_64')
2011-09-08 16:09:54 +00:00
url='https://www.openssl.org'
license=('custom:BSD')
2020-12-14 15:01:29 +00:00
depends=('glibc')
makedepends=('perl')
optdepends=('ca-certificates' 'perl')
replaces=('openssl-perl' 'openssl-doc')
2011-09-08 16:09:54 +00:00
backup=('etc/ssl/openssl.cnf')
2018-09-14 12:36:10 +00:00
source=("https://www.openssl.org/source/${pkgname}-${_ver}.tar.gz"{,.asc}
2020-12-14 15:01:29 +00:00
'ca-dir.patch')
2022-05-04 23:51:12 +00:00
sha256sums=('9384a2b0570dd80358841464677115df785edb941c71211f75076d72fe6b438f'
2021-02-18 14:58:53 +00:00
'SKIP'
'75aa8c2c638c8a3ebfd9fa146fc61c7ff878fc997dc6aa10d39e4b2415d669b2')
2019-06-01 16:30:04 +00:00
validpgpkeys=('8657ABB260F056B1E5190839D9C4D26D0E604491'
2020-12-14 15:01:29 +00:00
'7953AC1FBC3DC8B3B292393ED5E9E43F7DF9EE8C')
2013-10-23 14:07:06 +00:00
prepare() {
2017-07-28 18:29:31 +00:00
cd "$srcdir/$pkgname-$_ver"
2016-03-06 16:23:36 +00:00
# set ca dir to /etc/ssl by default
2017-07-28 18:29:31 +00:00
patch -p0 -i "$srcdir/ca-dir.patch"
2013-10-23 14:07:06 +00:00
}
2011-09-08 16:09:54 +00:00
build() {
2017-07-28 18:29:31 +00:00
cd "$srcdir/$pkgname-$_ver"
2011-09-08 16:09:54 +00:00
2012-01-07 03:10:59 +00:00
if [ "${CARCH}" == 'x86_64' ]; then
openssltarget='linux-x86_64'
2016-03-06 16:23:36 +00:00
optflags='enable-ec_nistp_64_gcc_128'
2012-01-07 03:10:59 +00:00
elif [ "${CARCH}" == 'i686' ]; then
openssltarget='linux-elf'
2016-03-06 16:23:36 +00:00
optflags=''
2012-07-29 19:15:51 +00:00
elif [ "${CARCH}" == 'arm' -o "${CARCH}" == 'armv6h' -o "${CARCH}" == 'armv7h' ]; then
2012-01-07 03:10:59 +00:00
openssltarget='linux-armv4'
2016-03-06 16:23:36 +00:00
optflags=''
2015-07-05 07:17:34 +00:00
elif [ "${CARCH}" == 'aarch64' ]; then
openssltarget='linux-aarch64'
2017-04-25 00:11:55 +00:00
optflags='no-afalgeng'
2012-01-07 03:10:59 +00:00
fi
2011-09-08 16:09:54 +00:00
# mark stack as non-executable: http://bugs.archlinux.org/task/12434
2012-01-07 03:10:59 +00:00
./Configure --prefix=/usr --openssldir=/etc/ssl --libdir=lib \
2016-03-06 16:23:36 +00:00
shared no-ssl3-method ${optflags} \
2012-01-07 03:10:59 +00:00
"${openssltarget}" \
2014-03-29 16:14:44 +00:00
"-Wa,--noexecstack ${CPPFLAGS} ${CFLAGS} ${LDFLAGS}"
2011-09-08 16:09:54 +00:00
make depend
make
}
check() {
2020-12-14 15:01:29 +00:00
cd "$srcdir/$pkgbase-$_ver"
2011-09-08 16:09:54 +00:00
# the test fails due to missing write permissions in /etc/ssl
# revert this patch for make test
2017-07-28 18:29:31 +00:00
patch -p0 -R -i "$srcdir/ca-dir.patch"
2020-12-14 15:01:29 +00:00
2011-09-08 16:09:54 +00:00
make test
2020-12-14 15:01:29 +00:00
2017-07-28 18:29:31 +00:00
patch -p0 -i "$srcdir/ca-dir.patch"
2020-05-26 00:25:26 +00:00
# re-run make to re-generate CA.pl from th patched .in file.
make apps/CA.pl
2011-09-08 16:09:54 +00:00
}
package() {
2017-07-28 18:29:31 +00:00
cd "$srcdir/$pkgname-$_ver"
2020-12-14 15:01:29 +00:00
2021-02-18 14:58:53 +00:00
make DESTDIR="$pkgdir" MANDIR=/usr/share/man MANSUFFIX=ssl install_sw install_ssldirs install_man_docs
2020-12-14 15:01:29 +00:00
2021-02-18 14:58:53 +00:00
install -D -m644 LICENSE "$pkgdir/usr/share/licenses/$pkgname/LICENSE"
2011-09-08 16:09:54 +00:00
}