# # spec file for package ocserv # # Copyright (c) 2019 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed # upon. The license for this file, and modifications and additions to the # file, is the same license as for the pristine package itself (unless the # license for the pristine package is not an Open Source License, in which # case the license is the MIT License). An "Open Source License" is a # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. # Please submit bugfixes or comments via https://bugs.opensuse.org/ # Name: ocserv Version: 0.12.3 Release: 0 Summary: OpenConnect VPN Server License: GPL-2.0-only Group: Productivity/Networking/Security URL: http://www.infradead.org/ocserv #Source: ftp://ftp.infradead.org/pub/ocserv/%{name}-%{version}.tar.xz # released tarball has some problem, check out same thing from git # git clone https://gitlab.com/ocserv/ocserv # git checkout -b fce7610a Source: %{name}-%{version}.tar.xz Source1: ca.tmpl Source2: server.tmpl Source3: user.tmpl Source5: ocserv.sysctl Source6: ocserv.firewalld.xml Source99: README.SUSE #PATCH-FIX-UPSTREAM marguerite@opensuse.org $LIBSYSTEMD_DAEMON env is not set on openSUSE Patch1: %{name}-enable-systemd.patch #PATCH-FIX-UPSTREAM marguerite@opensuse.org tweak configuration Patch2: %{name}.config.patch #PATCH-FIX-OPENSUSE marguerite@opensuse.org leap doesn't have LZ4_compress_default Patch3: %{name}-LZ4_compress_default.patch BuildRequires: autogen BuildRequires: dbus-1-devel %if 0%{suse_version} >= 1500 BuildRequires: firewall-macros %endif BuildRequires: freeradius-client-devel BuildRequires: gperf BuildRequires: libev-devel BuildRequires: libgnutls-devel >= 3.1.10 BuildRequires: libnl3-devel BuildRequires: libprotobuf-c-devel BuildRequires: libseccomp-devel BuildRequires: libtalloc-devel BuildRequires: libtool BuildRequires: pam-devel BuildRequires: pkgconfig BuildRequires: protobuf-c BuildRequires: readline-devel BuildRequires: pkgconfig(libsystemd) BuildRequires: rubygem(ronn) # /usr/bin/certtool for generating certificates Requires: gnutls >= 3.1.10 BuildRoot: %{_tmppath}/%{name}-%{version}-build %{?systemd_requires} %if 0%{?suse_version} > 1310 BuildRequires: liblz4-devel %endif %description OpenConnect server (ocserv) is an SSL VPN server. Its purpose is to be a secure, small, fast and configurable VPN server. It implements the OpenConnect SSL VPN protocol, and has also (currently experimental) compatibility with clients using the AnyConnect SSL VPN protocol. The OpenConnect protocol provides a dual TCP/UDP VPN channel, and uses the standard IETF security protocols to secure it. The server is implemented primarily for the GNU/Linux platform but its code is designed to be portable to other UNIX variants as well. Ocserv's main features are security through privilege separation and sandboxing, accounting, and resilience due to a combined use of TCP and UDP. Authentication occurs in an isolated security module process, and each user is assigned an unprivileged worker process, and a networking (tun) device. That not only eases the control of the resources of each user or group of users, but also prevents data leak (e.g., heartbleed-style attacks), and privilege escalation due to any bug on the VPN handling (worker) process. A management interface allows for viewing and querying logged-in users. %prep %setup -q %patch1 -p1 %patch2 -p1 %patch3 -p1 autoreconf -fiv %build %configure --enable-systemd \ --enable-seccomp \ --disable-rpath \ --enable-local-libopts \ --enable-libopts-install make V=1 %{?_smp_mflags} %install make %{?_smp_mflags} DESTDIR=%{buildroot} install install -Dm 0644 %{SOURCE5} %{buildroot}%{_sysconfdir}/sysctl.d/60-ocserv.conf %if 0%{suse_version} >= 1500 install -D -m 644 %{SOURCE6} %{buildroot}%{_libexecdir}/firewalld/services/ocserv.xml %endif install -d %{buildroot}%{_sysconfdir}/ocserv/certificates install -m 0644 %{SOURCE1} %{buildroot}%{_sysconfdir}/ocserv/certificates install -m 0644 %{SOURCE2} %{buildroot}%{_sysconfdir}/ocserv/certificates install -m 0644 %{SOURCE3} %{buildroot}%{_sysconfdir}/ocserv/certificates install -m 0644 %{SOURCE99} %{buildroot}%{_sysconfdir}/ocserv/ install -m 0644 doc/sample.config %{buildroot}%{_sysconfdir}/ocserv/ocserv.conf install -m 0644 doc/sample.passwd %{buildroot}%{_sysconfdir}/ocserv/ocpasswd install -m 0755 doc/scripts/ocserv-script %{buildroot}%{_bindir} install -d %{buildroot}%{_unitdir} # if --with-dubs, here should be "standalone" install -m 0644 doc/systemd/socket-activated/ocserv.socket %{buildroot}%{_unitdir} install -m 0644 doc/systemd/socket-activated/ocserv.service %{buildroot}%{_unitdir} %pre %service_add_pre ocserv.service ocserv.socket %post %service_add_post ocserv.service ocserv.socket %if 0%{suse_version} >= 1500 %firewalld_reload %endif %preun %service_del_preun ocserv.service ocserv.socket %postun %service_del_postun ocserv.service ocserv.socket %files %defattr(-,root,root) %doc AUTHORS NEWS README.md TODO %license COPYING LICENSE %config %{_sysconfdir}/ocserv %config(noreplace) %{_sysconfdir}/sysctl.d/60-ocserv.conf %if 0%{suse_version} >= 1500 %dir %{_libexecdir}/firewalld %dir %{_libexecdir}/firewalld/services %{_libexecdir}/firewalld/services/ocserv.xml %endif %{_bindir}/occtl %{_bindir}/ocpasswd %{_bindir}/ocserv-script %{_bindir}/ocserv-fw %{_sbindir}/ocserv %{_unitdir}/ocserv.service %{_unitdir}/ocserv.socket %{_mandir}/man8/occtl.8%{ext_man} %{_mandir}/man8/ocpasswd.8%{ext_man} %{_mandir}/man8/ocserv.8%{ext_man} %changelog