summaryrefslogtreecommitdiffstats
path: root/network/onioncat
diff options
context:
space:
mode:
Diffstat (limited to 'network/onioncat')
-rw-r--r--network/onioncat/README10
-rw-r--r--network/onioncat/onioncat.SlackBuild30
-rw-r--r--network/onioncat/onioncat.info8
-rw-r--r--network/onioncat/slack-desc4
4 files changed, 32 insertions, 20 deletions
diff --git a/network/onioncat/README b/network/onioncat/README
index f45fc75710..8de34eae3d 100644
--- a/network/onioncat/README
+++ b/network/onioncat/README
@@ -1,5 +1,7 @@
-onioncat creates a transparent IP layer on top of Tor's hidden services.
-It trainsmits IP-based data transparently through the Tor network on a
-location hidden basis. You can think of it as a point-to -multipoint VPN
-between hidden services.
+OnionCat creates a transparent IPv6 layer on top of Tor's hidden
+services or I2P's tunnels. It transmits any kind of IP-based data
+transparently through the Tor/I2P network on a location hidden basis.
+You can think of it as a peer-to-peer VPN between hidden services.
+Having Tor/I2P installed is not required for building.
+The Tor/I2P installation does not have to be from SBo.
diff --git a/network/onioncat/onioncat.SlackBuild b/network/onioncat/onioncat.SlackBuild
index b9ae0507ea..cfa73b3300 100644
--- a/network/onioncat/onioncat.SlackBuild
+++ b/network/onioncat/onioncat.SlackBuild
@@ -1,8 +1,8 @@
-#!/bin/sh
+#!/bin/bash
# Slackware build script for onioncat
-# Copyright 2013-2019 Markus Reichelt, Aachen, DE
+# Copyright 2013-2023 Markus Reichelt, Aachen, DE
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
@@ -25,10 +25,13 @@
# Originally written by crocket (crockabiscuit@gmail.com) - Thanks!
# Now maintained by Markus Reichelt, slackbuilds@mareichelt.de, 0xCCEEF115
+cd $(dirname $0) ; CWD=$(pwd)
+
PRGNAM=onioncat
-VERSION=${VERSION:-0.2.8}
+VERSION=${VERSION:-4.11.0}
BUILD=${BUILD:-1}
TAG=${TAG:-_SBo}
+PKGTYPE=${PKGTYPE:-tgz}
if [ -z "$ARCH" ]; then
case "$( uname -m )" in
@@ -38,7 +41,14 @@ if [ -z "$ARCH" ]; then
esac
fi
-CWD=$(pwd)
+# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
+# the name of the created package would be, and then exit. This information
+# could be useful to other scripts.
+if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
+ echo "$PRGNAM-$VERSION-$ARCH-$BUILD$TAG.$PKGTYPE"
+ exit 0
+fi
+
TMP=${TMP:-/tmp/SBo}
PKG=$TMP/package-$PRGNAM
OUTPUT=${OUTPUT:-/tmp}
@@ -68,9 +78,9 @@ cd $PRGNAM-$VERSION
chown -R root:root .
find -L . \
\( -perm 777 -o -perm 775 -o -perm 750 -o -perm 711 -o -perm 555 \
- -o -perm 511 \) -exec chmod 755 {} \; -o \
+ -o -perm 511 \) -exec chmod 755 {} \; -o \
\( -perm 666 -o -perm 664 -o -perm 640 -o -perm 600 -o -perm 444 \
- -o -perm 440 -o -perm 400 \) -exec chmod 644 {} \;
+ -o -perm 440 -o -perm 400 \) -exec chmod 644 {} \;
CFLAGS="$SLKCFLAGS" \
CXXFLAGS="$SLKCFLAGS" \
@@ -86,6 +96,7 @@ CXXFLAGS="$SLKCFLAGS" \
--enable-handle-http \
--enable-packet-queue \
--enable-rtt \
+ --disable-static \
--build=$ARCH-slackware-linux
make
@@ -94,12 +105,11 @@ make install DESTDIR=$PKG
find $PKG -print0 | xargs -0 file | grep -e "executable" -e "shared object" | grep ELF \
| cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null || true
-find $PKG/usr/man -type f -exec gzip -9 {} \;
-for i in $( find $PKG/usr/man -type l ) ; do ln -s $( readlink $i ).gz $i.gz ; rm $i ; done
+gzip -9 $PKG/usr/man/man1/*
mkdir -p $PKG/usr/doc/$PRGNAM-$VERSION
cp -a \
- AUTHORS COPYING ChangeLog INSTALL NEWS TODO \
+ AUTHORS COPYING ChangeLog NEWS TODO \
$PKG/usr/doc/$PRGNAM-$VERSION
cat $CWD/$PRGNAM.SlackBuild > $PKG/usr/doc/$PRGNAM-$VERSION/$PRGNAM.SlackBuild
@@ -107,4 +117,4 @@ mkdir -p $PKG/install
cat $CWD/slack-desc > $PKG/install/slack-desc
cd $PKG
-/sbin/makepkg -l y -c n $OUTPUT/$PRGNAM-$VERSION-$ARCH-$BUILD$TAG.${PKGTYPE:-tgz}
+/sbin/makepkg -l y -c n $OUTPUT/$PRGNAM-$VERSION-$ARCH-$BUILD$TAG.$PKGTYPE
diff --git a/network/onioncat/onioncat.info b/network/onioncat/onioncat.info
index 9887a18521..1372a96b27 100644
--- a/network/onioncat/onioncat.info
+++ b/network/onioncat/onioncat.info
@@ -1,8 +1,8 @@
PRGNAM="onioncat"
-VERSION="0.2.8"
-HOMEPAGE="https://www.cypherpunk.at/onioncat/"
-DOWNLOAD="https://www.cypherpunk.at/ocat/download/Source/stable/onioncat-0.2.8.tar.gz"
-MD5SUM="c4cd8a514c55471eee11719e1ff98b7c"
+VERSION="4.11.0"
+HOMEPAGE="https://www.onioncat.org/"
+DOWNLOAD="https://github.com/rahra/onioncat/releases/download/v4.11.0/onioncat-4.11.0.tar.gz"
+MD5SUM="8c12109c84aac6d0e1ee3bcc89c7b084"
DOWNLOAD_x86_64=""
MD5SUM_x86_64=""
REQUIRES=""
diff --git a/network/onioncat/slack-desc b/network/onioncat/slack-desc
index f61e2634b1..20e1864969 100644
--- a/network/onioncat/slack-desc
+++ b/network/onioncat/slack-desc
@@ -13,7 +13,7 @@ onioncat: services. It trainsmits IP-based data transparently through the Tor
onioncat: network on a location hidden basis. You can think of it as a point-to
onioncat: -multipoint VPN between hidden services.
onioncat:
+onioncat: I2P is also supported.
onioncat:
-onioncat: Website : https://www.cypherpunk.at/onioncat/
-onioncat:
+onioncat: Website : https://www.onioncat.org/
onioncat: