shadowsocks-rust/shadowsocks-rust.spec

105 lines
3.1 KiB
RPMSpec
Raw Normal View History

#
# spec file for package shadowsocks-rust
#
# Copyright (c) 2023 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
Name: shadowsocks-rust
Version: 1.16.2
Release: 0
Summary: Rust port of Shadowsocks
License: MIT
Group: Productivity/Networking/Web/Proxy
URL: https://github.com/shadowsocks/shadowsocks-rust
Source0: https://github.com/shadowsocks/shadowsocks-rust/archive/v%{version}/%{name}-%{version}.tar.gz
Source1: vendor.tar.gz
Source2: %{name}.json
Source3: %{name}-client.service
Source4: %{name}-server.service
Source5: %{name}-manager.service
BuildRequires: cargo
BuildRequires: cargo-packaging
BuildRequires: systemd-rpm-macros
BuildRequires: pkgconfig(openssl)
Recommends: shadowsocks-v2ray-plugin
Accepting request 1093738 from home:hillwood:branches:server:proxy - Update version to 1.15.3 * local-tun: Support tun_interface_destination for configuring Tun device's destination address * Support outbound_fwmark, outbound_user_cookie, outbound_bind_interface and outbound_bind_addr in configuration file * AEAD-2022 protoco * SIP002 Extended Format: Allowing unencoded user-info in URL * Manager standalone mode support bypassing ACL files * Allow sslocal run without any servers, which will bypass all connections and packets * "password" is optional for none / plain method * redir-local: Enable dual-stack support on Linux (TProxy) and FreeBSD * Disable md5-asm and sha1-asm: shadowsocks/shadowsocks-crypto * "acl" and "outbound_fwmark" are available in configuration file * Properly handle IPv4-mapped-IPv6 addresses in UDP assocations * Automatically bump RLIMIT_NOFILE on Unix (except Android) * SOCKS5 protocol supports RFC1929 Username/Password Authentication * HKDF-SHA1 uses ring's assembly implementation * Set environment variable SS_SYSTEM_DNS_RESOLVER_FORCE_BUILTIN to use system's builtin DNS resolver * Allow setting "system" in DNS configuration key "dns" to use system provided DNS API * Support setting SO_USER_COOKIE on FreeBSD * Local tun interface refactored the VirtDevice::poll strategy * balancer.check_best_interval could let ping balancer to ping only the choosen best server in this interval * Set a shorter interval in balancer.check_best_interval than balancer.check_interval to check much frequently the best server * efactored local-tun, using smoltcp as a user-space network stack * Support K8S deployment OBS-URL: https://build.opensuse.org/request/show/1093738 OBS-URL: https://build.opensuse.org/package/show/server:proxy/shadowsocks-rust?expand=0&rev=4
2023-06-19 09:41:07 +02:00
# ExcludeArch: ppc ppc64 ppc64le s390 s390x
%{?systemd_ordering}
%description
shadowsocks-rust is a rust port of shadowsocks.
Accepting request 1093738 from home:hillwood:branches:server:proxy - Update version to 1.15.3 * local-tun: Support tun_interface_destination for configuring Tun device's destination address * Support outbound_fwmark, outbound_user_cookie, outbound_bind_interface and outbound_bind_addr in configuration file * AEAD-2022 protoco * SIP002 Extended Format: Allowing unencoded user-info in URL * Manager standalone mode support bypassing ACL files * Allow sslocal run without any servers, which will bypass all connections and packets * "password" is optional for none / plain method * redir-local: Enable dual-stack support on Linux (TProxy) and FreeBSD * Disable md5-asm and sha1-asm: shadowsocks/shadowsocks-crypto * "acl" and "outbound_fwmark" are available in configuration file * Properly handle IPv4-mapped-IPv6 addresses in UDP assocations * Automatically bump RLIMIT_NOFILE on Unix (except Android) * SOCKS5 protocol supports RFC1929 Username/Password Authentication * HKDF-SHA1 uses ring's assembly implementation * Set environment variable SS_SYSTEM_DNS_RESOLVER_FORCE_BUILTIN to use system's builtin DNS resolver * Allow setting "system" in DNS configuration key "dns" to use system provided DNS API * Support setting SO_USER_COOKIE on FreeBSD * Local tun interface refactored the VirtDevice::poll strategy * balancer.check_best_interval could let ping balancer to ping only the choosen best server in this interval * Set a shorter interval in balancer.check_best_interval than balancer.check_interval to check much frequently the best server * efactored local-tun, using smoltcp as a user-space network stack * Support K8S deployment OBS-URL: https://build.opensuse.org/request/show/1093738 OBS-URL: https://build.opensuse.org/package/show/server:proxy/shadowsocks-rust?expand=0&rev=4
2023-06-19 09:41:07 +02:00
shadowsocks is a lightweight secured SOCKS5 proxy for embedded devices and
low-end boxes.
%prep
%setup -q -a1 -n %{name}-%{version}
mkdir .cargo
Accepting request 1093738 from home:hillwood:branches:server:proxy - Update version to 1.15.3 * local-tun: Support tun_interface_destination for configuring Tun device's destination address * Support outbound_fwmark, outbound_user_cookie, outbound_bind_interface and outbound_bind_addr in configuration file * AEAD-2022 protoco * SIP002 Extended Format: Allowing unencoded user-info in URL * Manager standalone mode support bypassing ACL files * Allow sslocal run without any servers, which will bypass all connections and packets * "password" is optional for none / plain method * redir-local: Enable dual-stack support on Linux (TProxy) and FreeBSD * Disable md5-asm and sha1-asm: shadowsocks/shadowsocks-crypto * "acl" and "outbound_fwmark" are available in configuration file * Properly handle IPv4-mapped-IPv6 addresses in UDP assocations * Automatically bump RLIMIT_NOFILE on Unix (except Android) * SOCKS5 protocol supports RFC1929 Username/Password Authentication * HKDF-SHA1 uses ring's assembly implementation * Set environment variable SS_SYSTEM_DNS_RESOLVER_FORCE_BUILTIN to use system's builtin DNS resolver * Allow setting "system" in DNS configuration key "dns" to use system provided DNS API * Support setting SO_USER_COOKIE on FreeBSD * Local tun interface refactored the VirtDevice::poll strategy * balancer.check_best_interval could let ping balancer to ping only the choosen best server in this interval * Set a shorter interval in balancer.check_best_interval than balancer.check_interval to check much frequently the best server * efactored local-tun, using smoltcp as a user-space network stack * Support K8S deployment OBS-URL: https://build.opensuse.org/request/show/1093738 OBS-URL: https://build.opensuse.org/package/show/server:proxy/shadowsocks-rust?expand=0&rev=4
2023-06-19 09:41:07 +02:00
cat >>.cargo/config.toml <<EOF
[source.crates-io]
registry = 'https://github.com/rust-lang/crates.io-index'
replace-with = 'vendored-sources'
[source.vendored-sources]
directory = './vendor'
EOF
%build
%cargo_build
%install
%cargo_install
install -d %{buildroot}%{_sysconfdir}/shadowsocks/
install -m 0644 %{SOURCE2} %{buildroot}%{_sysconfdir}/shadowsocks/
install -d %{buildroot}%{_unitdir}
install -m 0644 %{SOURCE3} %{buildroot}%{_unitdir}
install -m 0644 %{SOURCE4} %{buildroot}%{_unitdir}
install -m 0644 %{SOURCE5} %{buildroot}%{_unitdir}
install -d %{buildroot}%{_sbindir}
ln -sf %{_sbindir}/service %{buildroot}%{_sbindir}/rc%{name}-client
ln -sf %{_sbindir}/service %{buildroot}%{_sbindir}/rc%{name}-server
ln -sf %{_sbindir}/service %{buildroot}%{_sbindir}/rc%{name}-manager
%pre
%service_add_pre %{name}-client.service
%service_add_pre %{name}-server.service
%service_add_pre %{name}-manager.service
%post
%service_add_post %{name}-client.service
%service_add_post %{name}-server.service
%service_add_post %{name}-manager.service
%preun
%service_del_preun %{name}-client.service
%service_del_preun %{name}-server.service
%service_del_preun %{name}-manager.service
%postun
%service_del_postun %{name}-client.service
%service_del_postun %{name}-server.service
%service_del_postun %{name}-manager.service
%files
%doc README.md
%license LICENSE
%{_bindir}/ss*
%{_sbindir}/rc%{name}-*
%{_unitdir}/%{name}-*.service
%dir %{_sysconfdir}/shadowsocks
%config %{_sysconfdir}/shadowsocks/%{name}.json
%changelog