From patchwork Mon Feb 17 14:30:28 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Giulio Benetti X-Patchwork-Id: 1239275 Return-Path: X-Original-To: incoming-buildroot@patchwork.ozlabs.org Delivered-To: patchwork-incoming-buildroot@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=busybox.net (client-ip=140.211.166.136; helo=silver.osuosl.org; envelope-from=buildroot-bounces@busybox.net; receiver=) Authentication-Results: ozlabs.org; dmarc=none (p=none dis=none) header.from=benettiengineering.com Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=aruba.it header.i=@aruba.it header.a=rsa-sha256 header.s=a1 header.b=OE43Nxle; dkim-atps=neutral Received: from silver.osuosl.org (smtp3.osuosl.org [140.211.166.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 48Lmcc5DNLz9sRN for ; Tue, 18 Feb 2020 01:30:56 +1100 (AEDT) Received: from localhost (localhost [127.0.0.1]) by silver.osuosl.org (Postfix) with ESMTP id 5E02520447; Mon, 17 Feb 2020 14:30:53 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from silver.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qmiiDTn+sXZa; Mon, 17 Feb 2020 14:30:47 +0000 (UTC) Received: from ash.osuosl.org (ash.osuosl.org [140.211.166.34]) by silver.osuosl.org (Postfix) with ESMTP id 5B4A42045E; Mon, 17 Feb 2020 14:30:47 +0000 (UTC) X-Original-To: buildroot@lists.busybox.net Delivered-To: buildroot@osuosl.org Received: from hemlock.osuosl.org (smtp2.osuosl.org [140.211.166.133]) by ash.osuosl.org (Postfix) with ESMTP id 5FF3F1BF33B for ; Mon, 17 Feb 2020 14:30:41 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by hemlock.osuosl.org (Postfix) with ESMTP id 5B98E86D73 for ; Mon, 17 Feb 2020 14:30:41 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from hemlock.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0xpIqPY67qAA for ; Mon, 17 Feb 2020 14:30:38 +0000 (UTC) X-Greylist: from auto-whitelisted by SQLgrey-1.7.6 Received: from smtpcmd11116.aruba.it (smtpcmd11116.aruba.it [62.149.156.116]) by hemlock.osuosl.org (Postfix) with ESMTP id CD37386D85 for ; Mon, 17 Feb 2020 14:30:37 +0000 (UTC) Received: from ubuntu.localdomain ([212.103.203.10]) by smtpcmd11.ad.aruba.it with bizsmtp id 3qWZ2200m0DySFo01qWbP9; Mon, 17 Feb 2020 15:30:35 +0100 From: Giulio Benetti To: buildroot@buildroot.org Date: Mon, 17 Feb 2020 15:30:28 +0100 Message-Id: <20200217143030.5031-3-giulio.benetti@benettiengineering.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200217143030.5031-1-giulio.benetti@benettiengineering.com> References: <20200217143030.5031-1-giulio.benetti@benettiengineering.com> MIME-Version: 1.0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aruba.it; s=a1; t=1581949835; bh=CowTkmUCqFga491DB+ef4dZS6BCuW1QYHP1WRaVf67U=; h=From:To:Subject:Date:MIME-Version; b=OE43NxlexTuHgzozU3lPgzj1o7g5luigvUKG61EXCLkPv2boaLTJjguppQ+ovHzEW sHYkKx2VZcW1yELPRr1lkwwNumXxGVFOlKYclYeSWG26I8oY/wNp9EJACumxQWG7J3 gmIO1F5xhvTcJWgKxSY3FET4pIcFq1z/1NxQmVWtbTM00YiyQp8ogdNRgaeD1gFyCY jeMUIX4Auygmxw+FnScWkqCQoeN7zvTypeCrS4h34l/1jssXm9/rEahMYVgnmVypDe fe1Cy17uLo8/1Mli0i2Ngemx5/X1F7Ve38AZpk+t5vYa1sRbSppwpXKsAp0T8dWl7V F4YWSyheq2TMg== Subject: [Buildroot] [PATCH 2/4] package/volume_key: add new package X-BeenThere: buildroot@busybox.net X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussion and development of buildroot List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Giulio Benetti , Adam Duskett , Marek Belisko Errors-To: buildroot-bounces@busybox.net Sender: "buildroot" The volume_key project provides a libvolume_key, a library for manipulating storage volume encryption keys and storing them separately from volumes, and an associated command-line tool, named volume_key. Signed-off-by: Giulio Benetti --- DEVELOPERS | 1 + package/Config.in | 1 + ...ove-po-Makefile.in-entry-from-AC_CON.patch | 28 +++++++++++++++++++ package/volume_key/Config.in | 19 +++++++++++++ package/volume_key/volume_key.hash | 3 ++ package/volume_key/volume_key.mk | 22 +++++++++++++++ 6 files changed, 74 insertions(+) create mode 100644 package/volume_key/0001-configure.ac-remove-po-Makefile.in-entry-from-AC_CON.patch create mode 100644 package/volume_key/Config.in create mode 100644 package/volume_key/volume_key.hash create mode 100644 package/volume_key/volume_key.mk diff --git a/DEVELOPERS b/DEVELOPERS index 6f2dbbb11a..5276c09384 100644 --- a/DEVELOPERS +++ b/DEVELOPERS @@ -1016,6 +1016,7 @@ F: package/minicom/ F: package/nfs-utils/ F: package/sunxi-mali-mainline/ F: package/sunxi-mali-mainline-driver/ +F: package/volume_key/ N: Gregory Dymarek F: package/ding-libs/ diff --git a/package/Config.in b/package/Config.in index 4d76a5791f..a058d7d2f0 100644 --- a/package/Config.in +++ b/package/Config.in @@ -1310,6 +1310,7 @@ menu "Crypto" source "package/tpm2-tss/Config.in" source "package/trousers/Config.in" source "package/ustream-ssl/Config.in" + source "package/volume_key/Config.in" source "package/wolfssl/Config.in" endmenu diff --git a/package/volume_key/0001-configure.ac-remove-po-Makefile.in-entry-from-AC_CON.patch b/package/volume_key/0001-configure.ac-remove-po-Makefile.in-entry-from-AC_CON.patch new file mode 100644 index 0000000000..44d6ee0d4b --- /dev/null +++ b/package/volume_key/0001-configure.ac-remove-po-Makefile.in-entry-from-AC_CON.patch @@ -0,0 +1,28 @@ +From d1142e667f4f2f2fcd2d36a006919325c1a4377e Mon Sep 17 00:00:00 2001 +From: Giulio Benetti +Date: Sat, 25 Jan 2020 17:24:38 +0100 +Subject: [PATCH] configure.ac: remove po/Makefile.in entry from + AC_CONFIG_FILES + +AC_CONFIG_FILES should not contain po/Makefile.in file because +gettextize will re-add it again causing build failure. + +Signed-off-by: Giulio Benetti +--- + configure.ac | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +diff --git a/configure.ac b/configure.ac +index 7d3d27a..f4295ff 100644 +--- a/configure.ac ++++ b/configure.ac +@@ -244,5 +244,5 @@ if test "$GCC" = yes ; then + fi + + dnl po/Makefile +-AC_CONFIG_FILES([Makefile contrib/Makefile doc/Makefile lib/Makefile po/Makefile.in python/Makefile python/python/Makefile python/python3/Makefile src/Makefile tests/Makefile]) ++AC_CONFIG_FILES([Makefile contrib/Makefile doc/Makefile lib/Makefile python/Makefile python/python/Makefile python/python3/Makefile src/Makefile tests/Makefile]) + AC_OUTPUT +-- +2.20.1 + diff --git a/package/volume_key/Config.in b/package/volume_key/Config.in new file mode 100644 index 0000000000..0c0827253d --- /dev/null +++ b/package/volume_key/Config.in @@ -0,0 +1,19 @@ +config BR2_PACKAGE_VOLUME_KEY + bool "volume_key" + depends on BR2_TOOLCHAIN_HAS_THREADS # cryptsetup, libassuan, libglib2, libgpgme, libnss + depends on BR2_USE_MMU # cryptsetup, libassuan, libglib2, libgpgme + depends on !BR2_STATIC_LIBS # cryptsetup, libnss + depends on BR2_TOOLCHAIN_HAS_SYNC_4 # cryptsetup + depends on BR2_USE_WCHAR # libglib2 + depends on BR2_PACKAGE_LIBGPG_ERROR_ARCH_SUPPORTS # libgpgme, libassuan + select BR2_PACKAGE_CRYPTSETUP + select BR2_PACKAGE_LIBASSUAN + select BR2_PACKAGE_LIBGLIB2 + select BR2_PACKAGE_LIBGPGME + select BR2_PACKAGE_LIBNSS + help + The volume_key project provides a libvolume_key, a library for manipulating + storage volume encryption keys and storing them separately from volumes, and an + associated command-line tool, named volume_key. + + https://pagure.io/volume_key diff --git a/package/volume_key/volume_key.hash b/package/volume_key/volume_key.hash new file mode 100644 index 0000000000..3925429b4e --- /dev/null +++ b/package/volume_key/volume_key.hash @@ -0,0 +1,3 @@ +# Locally calculated +sha256 f83146352464048f823c164e755dc10da0e06db024de5b1b6f78beeb8438dc22 volume_key-f56614199726ba1897d8687f0927535693b6603f.tar.gz +sha256 8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643 COPYING diff --git a/package/volume_key/volume_key.mk b/package/volume_key/volume_key.mk new file mode 100644 index 0000000000..8d5bff6d8e --- /dev/null +++ b/package/volume_key/volume_key.mk @@ -0,0 +1,22 @@ +################################################################################ +# +# volume_key +# +################################################################################ + +VOLUME_KEY_VERSION = f56614199726ba1897d8687f0927535693b6603f +VOLUME_KEY_SITE = https://pagure.io/volume_key.git +VOLUME_KEY_SITE_METHOD = git +VOLUME_KEY_LICENSE = GPL-2.0+ +VOLUME_KEY_LICENSE_FILES = COPYING +VOLUME_KEY_DEPENDENCIES = cryptsetup libglib2 libgpgme libnss $(TARGET_NLS_DEPENDENCIES) +VOLUME_KEY_INSTALL_STAGING = YES +VOLUME_KEY_AUTORECONF = YES +VOLUME_KEY_GETTEXTIZE = YES + +VOLUME_KEY_CONF_OPTS = --with-sysroot=$(STAGING_DIR) \ + --with-gpgme-prefix=$(STAGING_DIR)/usr \ + --without-python \ + --without-python3 + +$(eval $(autotools-package))