1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132 |
- ;;; GNU Guix --- Functional package management for GNU
- ;;; Copyright © 2013 Andreas Enge <andreas@enge.fr>
- ;;; Copyright © 2013, 2016, 2018, 2019, 2020, 2021 Ludovic Courtès <ludo@gnu.org>
- ;;; Copyright © 2014 Eric Bavier <bavier@member.fsf.org>
- ;;; Copyright © 2015 Jeff Mickey <j@codemac.net>
- ;;; Copyright © 2016, 2017, 2019, 2021 Efraim Flashner <efraim@flashner.co.il>
- ;;; Copyright © 2016–2021 Tobias Geerinckx-Rice <me@tobias.gr>
- ;;; Copyright © 2017 Julien Lepiller <julien@lepiller.eu>
- ;;; Copyright © 2018, 2020 Pierre Langlois <pierre.langlois@gmx.com>
- ;;; Copyright © 2018 Meiyo Peng <meiyo.peng@gmail.com>
- ;;; Copyright © 2019, 2020 Leo Famulari <leo@famulari.name>
- ;;; Copyright © 2019 Rutger Helling <rhelling@mykolab.com>
- ;;; Copyright © 2019 Ricardo Wurmus <rekado@elephly.net>
- ;;; Copyright © 2020 Brice Waegeneire <brice@waegenei.re>
- ;;; Copyright © 2020 Ryan Prior <rprior@protonmail.com>
- ;;; Copyright © 2020 Ivan Kozlov <kanichos@yandex.ru>
- ;;; Copyright © 2020 David Dashyan <mail@davie.li>
- ;;; Copyright © 2021 Domagoj Stolfa <ds815@gmx.com>
- ;;; Copyright © 2021 Raghav Gururajan <rg@raghavgururajan.name>
- ;;; Copyright © 2021 jgart <jgart@dismail.de>
- ;;;
- ;;; This file is part of GNU Guix.
- ;;;
- ;;; GNU Guix is free software; you can redistribute it and/or modify it
- ;;; under the terms of the GNU General Public License as published by
- ;;; the Free Software Foundation; either version 3 of the License, or (at
- ;;; your option) any later version.
- ;;;
- ;;; GNU Guix is distributed in the hope that it will be useful, but
- ;;; WITHOUT ANY WARRANTY; without even the implied warranty of
- ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- ;;; GNU General Public License for more details.
- ;;;
- ;;; You should have received a copy of the GNU General Public License
- ;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
- (define-module (gnu packages vpn)
- #:use-module ((guix licenses) #:prefix license:)
- #:use-module (guix packages)
- #:use-module (guix download)
- #:use-module (guix git-download)
- #:use-module (guix build-system cmake)
- #:use-module (guix build-system copy)
- #:use-module (guix build-system gnu)
- #:use-module (guix build-system go)
- #:use-module (guix build-system linux-module)
- #:use-module (guix build-system python)
- #:use-module (guix build-system qt)
- #:use-module (guix utils)
- #:use-module (gnu packages)
- #:use-module (gnu packages admin)
- #:use-module (gnu packages base)
- #:use-module (gnu packages bash)
- #:use-module (gnu packages check)
- #:use-module (gnu packages dns)
- #:use-module (gnu packages autotools)
- #:use-module (gnu packages compression)
- #:use-module (gnu packages curl)
- #:use-module (gnu packages freedesktop)
- #:use-module (gnu packages gettext)
- #:use-module (gnu packages gnome)
- #:use-module (gnu packages gl)
- #:use-module (gnu packages gnupg)
- #:use-module (gnu packages golang)
- #:use-module (gnu packages guile)
- #:use-module (gnu packages libevent)
- #:use-module (gnu packages linux)
- #:use-module (gnu packages multiprecision)
- #:use-module (gnu packages ncurses)
- #:use-module (gnu packages nss)
- #:use-module (gnu packages perl)
- #:use-module (gnu packages pkg-config)
- #:use-module (gnu packages polkit)
- #:use-module (gnu packages python)
- #:use-module (gnu packages python-build)
- #:use-module (gnu packages python-crypto)
- #:use-module (gnu packages python-xyz)
- #:use-module (gnu packages python-web)
- #:use-module (gnu packages qt)
- #:use-module (gnu packages samba)
- #:use-module (gnu packages tls)
- #:use-module (gnu packages xml))
- (define-public bitmask
- (package
- (name "bitmask")
- (version "0.21.6")
- (source
- (origin
- (method git-fetch)
- (uri
- (git-reference
- (url "https://0xacab.org/leap/bitmask-vpn")
- (commit version)))
- (file-name (git-file-name name version))
- (sha256
- (base32 "0xmn0pkpn0mcwi1jlgm5skydcnfxk5fawg5hl2inn50m0ikgxk1c"))
- (modules
- '((guix build utils)))
- (snippet
- `(begin
- (delete-file-recursively "branding/thirdparty")
- (call-with-output-file "pkg/config/version/version.go"
- (lambda (port)
- (format port "package version\n")
- (format port "\n")
- (format port (string-append "var VERSION = \"" ,version "\""))))
- #t))))
- (build-system go-build-system)
- (arguments
- `(#:imported-modules
- ((guix build cmake-build-system)
- (guix build copy-build-system)
- (guix build python-build-system)
- (guix build qt-build-system)
- (guix build qt-utils)
- ,@%go-build-system-modules)
- #:modules
- (((guix build copy-build-system)
- #:prefix copy:)
- ((guix build python-build-system)
- #:prefix python:)
- ((guix build qt-build-system)
- #:prefix qt:)
- (guix build utils)
- (guix build go-build-system))
- #:unpack-path "0xacab.org/leap/bitmask-vpn"
- #:import-path "0xacab.org/leap/bitmask-vpn/cmd/bitmask-helper"
- #:phases
- (modify-phases %standard-phases
- (add-after 'setup-go-environment 'insert-missing-sources
- ;; For some reason this package is left out.
- (lambda* (#:key inputs #:allow-other-keys)
- (let* ((name "go-0xacab-org-leap-shapeshifter")
- (shapeshifter (assoc-ref inputs name))
- (shapeshifter-src (string-append shapeshifter "/src")))
- (copy-recursively shapeshifter-src "src"))))
- (add-after 'unpack 'patch
- (lambda* (#:key inputs outputs #:allow-other-keys)
- (with-directory-excursion "src/0xacab.org/leap/bitmask-vpn"
- ;; Use 'emersion/go-autostart',
- ;; instead of 'ProtonMail/go-autostart',
- ;; as the latter no longer exists.
- (substitute* (find-files "." "\\.go$")
- (("github.com/ProtonMail/go-autostart")
- "github.com/emersion/go-autostart"))
- ;; Use correct paths for referenced items.
- (let* ((out (assoc-ref outputs "out"))
- (policy-dir (string-append out "/share/polkit-1/actions"))
- (policy-file "se.leap.bitmask.policy")
- (policy-path (string-append policy-dir "/" policy-file))
- (ip (string-append (assoc-ref inputs "iproute")
- "/sbin/ip"))
- (iptables (string-append (assoc-ref inputs "iptables")
- "/sbin/iptables"))
- (ip6tables (string-append (assoc-ref inputs "iptables")
- "/sbin/ip6tables"))
- (sysctl (string-append (assoc-ref inputs "procps")
- "/sbin/sysctl"))
- (pkttyagent (string-append (assoc-ref inputs "polkit")
- "/bin/pkttyagent"))
- (openvpn (string-append (assoc-ref inputs "openvpn")
- "/sbin/openvpn"))
- (bitmask-root (string-append (assoc-ref outputs "out")
- "/sbin/bitmask-root")))
- (substitute* (find-files "." "(\\.go$|\\.policy$|bitmask-root)")
- (("swhich\\(\"ip\"\\)")
- (string-append "\"" ip "\""))
- (("swhich\\(\"iptables\"\\)")
- (string-append "\"" iptables "\""))
- (("swhich\\(\"ip6tables\"\\)")
- (string-append "\"" ip6tables "\""))
- (("swhich\\(\"sysctl\"\\)")
- (string-append "\"" sysctl "\""))
- (("/usr/(bin|lib|libexec)/.*(kit|agent|agent-1)") pkttyagent)
- (("/usr/sbin/openvpn") openvpn)
- (("/usr/sbin/bitmask-root") bitmask-root)
- (("/usr/local/sbin/bitmask-root") bitmask-root)
- (("/usr/share.*\\.policy") policy-path)))
- (substitute* (find-files "." "\\.pro$")
- ;; Use correct path for goshim files,
- ;; which are generated in 'build-continued phase.
- (("-L.*/lib") "-L./lib")
- ;; FIXME: Unable to build i18n files.
- (("TRANSLATIONS.*i18n.*$") "")
- (("RESOURCES.*i18n.*$") "")))))
- (add-after 'build 'build-continued
- (lambda _
- ;; Generate goshim library and header files.
- (let* ((dir "src/0xacab.org/leap/bitmask-vpn")
- (source (string-append dir "/gui/backend.go"))
- (target (string-append dir "/lib/libgoshim.a")))
- (mkdir-p (string-append dir "/lib"))
- (invoke "go" "build" "-buildmode=c-archive" "-o" target source))
- ;; Build bitmask application.
- (with-directory-excursion "src/0xacab.org/leap/bitmask-vpn"
- (delete-file "Makefile")
- (invoke "qmake" "bitmask.pro")
- (invoke "make"))))
- (add-after 'check 'check-continued
- (lambda* (#:key tests? #:allow-other-keys)
- (when tests?
- ;; Run bitmask test-suite.
- (with-directory-excursion "src/0xacab.org/leap/bitmask-vpn"
- (delete-file "Makefile")
- (invoke "qmake" "test.pro")
- ;; Tests require display-server.
- (setenv "QT_QPA_PLATFORM" "offscreen")
- ;; Tests look for $XDG_RUNTIME_DIR.
- (setenv "XDG_RUNTIME_DIR" (getenv "TEMP"))
- ;; Tests write to $HOME.
- (setenv "HOME" (getenv "TEMP"))
- (invoke "make" "check")))))
- (add-after 'install 'install-continued
- (lambda args
- (apply (assoc-ref copy:%standard-phases 'install)
- #:install-plan
- ;; Install bitmask program.
- '(("src/0xacab.org/leap/bitmask-vpn/release"
- "bin"
- #:include ("bitmask"))
- ;; Install bitmask-root script.
- ("src/0xacab.org/leap/bitmask-vpn/helpers"
- "sbin"
- #:include ("bitmask-root"))
- ;; Install polkit-policy.
- ("src/0xacab.org/leap/bitmask-vpn/helpers"
- "share/polkit-1/actions"
- #:include ("se.leap.bitmask.policy")))
- args)))
- (add-after 'install-continued 'post-install
- (lambda* (#:key outputs #:allow-other-keys)
- (let* ((out (assoc-ref outputs "out"))
- (bitmask (string-append out "/bin/bitmask"))
- (bitmask-root (string-append out "/sbin/bitmask-root")))
- ;; Make bitmask-root script executable.
- (chmod bitmask-root #o777))))
- (add-after 'post-install 'python-wrap
- (assoc-ref python:%standard-phases 'wrap))
- (add-after 'python-wrap 'qt-wrap
- (assoc-ref qt:%standard-phases 'qt-wrap)))))
- (native-inputs
- `(("pkg-config" ,pkg-config)))
- (inputs
- `(("iproute" ,iproute)
- ("iptables" ,iptables)
- ("mesa" ,mesa)
- ("openvpn" ,openvpn)
- ("polkit" ,polkit)
- ("procps" ,procps)
- ("python" ,python)
- ("qtbase" ,qtbase-5)
- ("qtdeclarative" ,qtdeclarative)
- ("qtquickcontrols" ,qtquickcontrols)
- ("qtquickcontrols2" ,qtquickcontrols2)))
- (propagated-inputs
- `(("go-0xacab-org-leap-shapeshifter"
- ,go-0xacab-org-leap-shapeshifter)
- ("go-github-com-apparentlymart-go-openvpn-mgmt"
- ,go-github-com-apparentlymart-go-openvpn-mgmt)
- ("go-github-com-emersion-go-autostart"
- ,go-github-com-emersion-go-autostart)
- ("go-github-com-keybase-go-ps"
- ,go-github-com-keybase-go-ps)
- ("go-github-com-rakyll-statik"
- ,go-github-com-rakyll-statik)
- ("go-github-com-sevlyar-go-daemon"
- ,go-github-com-sevlyar-go-daemon)
- ("go-golang-org-x-sys" ,go-golang-org-x-sys)))
- (synopsis "Generic VPN client by LEAP")
- (description "Bitmask, by @acronym{LEAP, LEAP Encryption Access Project},
- is an application to provide easy and secure encrypted communication with a
- @acronym{VPN, Virtual Private Network}. It allows you to select from a variety
- of trusted service provider all from one app. Current providers include Riseup
- Networks and The Calyx Institute, where the former is default.")
- (home-page "https://bitmask.net/")
- (license license:gpl3+)))
- (define-public gvpe
- (package
- (name "gvpe")
- (version "3.1")
- (source (origin
- (method url-fetch)
- (uri (string-append "mirror://gnu/gvpe/gvpe-"
- version ".tar.gz"))
- (sha256
- (base32
- "1cz8n75ksl0l908zc5l3rnfm1hv7130s2w8710799fr5sxrdbszi"))))
- (build-system gnu-build-system)
- (home-page "http://software.schmorp.de/pkg/gvpe.html")
- (native-inputs `(("pkg-config" ,pkg-config)))
- (inputs `(("openssl" ,openssl)
- ("zlib" ,zlib)))
- (synopsis "Secure VPN among multiple nodes over an untrusted network")
- (description
- "The GNU Virtual Private Ethernet creates a virtual network
- with multiple nodes using a variety of transport protocols. It works
- by creating encrypted host-to-host tunnels between multiple
- endpoints.")
- (license license:gpl3+)))
- (define-public strongswan
- (package
- (name "strongswan")
- (version "5.9.3")
- (source
- (origin
- (method url-fetch)
- (uri (string-append "https://download.strongswan.org/strongswan-"
- version ".tar.bz2"))
- (sha256
- (base32 "1xy6c9c7bq5a5jmm04r9f9iqn39yrr1dkq81jhvpxsd4l1ban9ck"))))
- (build-system gnu-build-system)
- (arguments
- `(#:phases
- (modify-phases %standard-phases
- (add-before 'build 'patch-command-file-names
- (lambda* (#:key inputs #:allow-other-keys)
- (substitute* "src/ipsec/_ipsec.in"
- (("cat|kill|sleep|rm|uname" command)
- (string-append (assoc-ref inputs "coreutils")
- "/bin/" command)))
- (substitute* "src/libstrongswan/utils/process.c"
- (("/bin/sh")
- (search-input-file inputs "/bin/sh")))
- (substitute* "src/libstrongswan/tests/suites/test_process.c"
- (("/bin/sh") (which "sh"))
- (("/bin/echo") (which "echo"))
- (("cat") (which "cat")))
- #t))
- (add-before 'check 'set-up-test-environment
- (lambda* (#:key inputs #:allow-other-keys)
- (setenv "TZDIR"
- (search-input-directory inputs "share/zoneinfo")))))
- #:configure-flags
- (list
- "--disable-ldap"
- "--disable-mysql"
- "--disable-systemd"
- ;; Disable BSD-4 licensed plugins.
- "--disable-blowfish"
- "--disable-des"
- ;; Make it usable. The default configuration is far too minimal to be
- ;; used with most common VPN set-ups.
- ;; See <https://wiki.strongswan.org/projects/strongswan/wiki/Autoconf>.
- "--enable-aesni"
- "--enable-attr-sql"
- "--enable-chapoly"
- "--enable-curl"
- "--enable-dhcp"
- "--enable-eap-aka"
- "--enable-eap-aka-3gpp"
- "--enable-eap-dynamic"
- "--enable-eap-identity"
- "--enable-eap-md5"
- "--enable-eap-mschapv2"
- "--enable-eap-peap"
- "--enable-eap-radius"
- "--enable-eap-sim"
- "--enable-eap-sim-file"
- "--enable-eap-simaka-pseudonym"
- "--enable-eap-simaka-reauth"
- "--enable-eap-simaka-sql"
- "--enable-eap-tls"
- "--enable-eap-tnc"
- "--enable-eap-ttls"
- "--enable-ext-auth"
- "--enable-farp"
- "--enable-ha"
- "--enable-led"
- "--enable-md4"
- "--enable-mediation"
- "--enable-openssl"
- "--enable-soup"
- "--enable-sql"
- "--enable-sqlite"
- "--enable-xauth-eap"
- "--enable-xauth-noauth"
- "--enable-xauth-pam"
- ;; Use libcap by default.
- "--with-capabilities=libcap")))
- (inputs
- `(("coreutils" ,coreutils)
- ("curl" ,curl)
- ("gmp" ,gmp)
- ("libcap" ,libcap)
- ("libgcrypt" ,libgcrypt)
- ("libsoup" ,libsoup)
- ("linux-pam" ,linux-pam)
- ("openssl" ,openssl)))
- (native-inputs
- `(("coreutils" ,coreutils)
- ("pkg-config" ,pkg-config)
- ("tzdata" ,tzdata-for-tests)))
- (synopsis "IKEv1/v2 keying daemon")
- (description "StrongSwan is an IPsec implementation originally based upon
- the FreeS/WAN project. It contains support for IKEv1, IKEv2, MOBIKE, IPv6,
- NAT-T and more.")
- (home-page "https://strongswan.org/")
- (license
- (list license:gpl2+
- ;; src/aikgen/*
- ;; src/libcharon/plugins/dnscert/*
- ;; src/libcharon/plugins/ext_auth/*
- ;; src/libcharon/plugins/vici/ruby/*
- ;; src/libcharon/plugins/xauth_pam/xauth_pam_listener.[ch]
- license:expat
- ;; src/inclue/sys/*
- license:bsd-3
- ;; src/libstrongswan/plugins/sha3/sha3_keccak.c
- license:public-domain
- ;; src/libstrongswan/plugins/pkcs11/pkcs11.h
- (license:non-copyleft
- "file://src/libstrongswan/plugins/pkcs11/pkcs11.h"
- "pkcs11 contains a unknown permissive license. View the specific
- file for more details.")
- ;; These files are not included in the
- ;; build, they are disabled through
- ;; options to ./configure
- ;;
- ;; src/libstrongswan/plugins/blowfish/bf_enc.c
- ;; src/libstrongswan/plugins/blowfish/bf_locl.h
- ;; src/libstrongswan/plugins/blowfish/bf_pi.h
- ;; src/libstrongswan/plugins/blowfish/bf_skey.c
- ;; src/libstrongswan/plugins/blowfish/blowfish_crypter.c
- ;; src/libstrongswan/plugins/des/des_crypter.c
- license:bsd-4))))
- (define-public vpnc
- (package
- (name "vpnc")
- (version "0.5.3")
- (source (origin
- (method url-fetch)
- (uri (string-append "https://www.unix-ag.uni-kl.de/~massar/vpnc/vpnc-"
- version ".tar.gz"))
- (sha256 (base32
- "1128860lis89g1s21hqxvap2nq426c9j4bvgghncc1zj0ays7kj6"))))
- (build-system gnu-build-system)
- (inputs `(("libgcrypt" ,libgcrypt)
- ("perl" ,perl)
- ("vpnc-scripts" ,vpnc-scripts)))
- (arguments
- `(#:tests? #f ; there is no check target
- #:phases
- (modify-phases %standard-phases
- (add-after 'unpack 'use-store-paths
- (lambda* (#:key inputs outputs #:allow-other-keys)
- (let ((out (assoc-ref outputs "out"))
- (vpnc-scripts (assoc-ref inputs "vpnc-scripts")))
- (substitute* "config.c"
- (("/etc/vpnc/vpnc-script")
- (string-append vpnc-scripts "/etc/vpnc/vpnc-script")))
- (substitute* "Makefile"
- (("ETCDIR=.*")
- (string-append "ETCDIR=" out "/etc/vpnc\n"))
- (("PREFIX=.*")
- (string-append "PREFIX=" out "\n")))
- #t)))
- (delete 'configure)))) ; no configure script
- (synopsis "Client for Cisco VPN concentrators")
- (description
- "vpnc is a VPN client compatible with Cisco's EasyVPN equipment.
- It supports IPSec (ESP) with Mode Configuration and Xauth. It supports only
- shared-secret IPSec authentication with Xauth, AES (256, 192, 128), 3DES,
- 1DES, MD5, SHA1, DH1/2/5 and IP tunneling. It runs entirely in userspace.
- Only \"Universal TUN/TAP device driver support\" is needed in the kernel.")
- (license license:gpl2+) ; some file are bsd-2, see COPYING
- (home-page "https://www.unix-ag.uni-kl.de/~massar/vpnc/")))
- (define-public vpnc-scripts
- (let ((commit "3885f8bbc4ae03fd6da0ada6de12f7223a59595c"))
- (package
- (name "vpnc-scripts")
- (version (string-append "20200925." (string-take commit 7)))
- (source (origin
- (method git-fetch)
- (uri
- (git-reference
- (url "git://git.infradead.org/users/dwmw2/vpnc-scripts.git")
- (commit commit)))
- (file-name (git-file-name name version))
- (sha256
- (base32
- "1pmi4n58q81pmn9arvfixhvv6vkkf3rpwac3hwnwyl882q5q0ccx"))))
- (build-system gnu-build-system)
- (inputs `(("guile" ,guile-3.0) ; for the wrapper scripts
- ("coreutils" ,coreutils)
- ("grep" ,grep)
- ("iproute2" ,iproute) ; for ‘ip’
- ("net-tools" ,net-tools) ; for ‘ifconfig’, ‘route’
- ("sed" ,sed)
- ("which" ,which)))
- (arguments
- `(#:phases
- (modify-phases %standard-phases
- (add-after 'unpack 'use-relative-paths
- ;; Patch the scripts to work with and use relative paths.
- (lambda* _
- (for-each (lambda (script)
- (substitute* script
- (("^PATH=.*") "")
- (("/usr/s?bin/") "")
- (("\\[ +-x +([^]]+) +\\]" _ command)
- (string-append "command -v >/dev/null 2>&1 "
- command))))
- (find-files "." "^vpnc-script"))
- #t))
- (delete 'configure) ; no configure script
- (replace 'build
- (lambda _
- (invoke "gcc" "-o" "netunshare" "netunshare.c")))
- (replace 'install
- ;; There is no Makefile; manually install the relevant files.
- (lambda* (#:key outputs #:allow-other-keys)
- (let* ((out (assoc-ref outputs "out"))
- (etc (string-append out "/etc/vpnc")))
- (for-each (lambda (file)
- (install-file file etc))
- (append (find-files "." "^vpnc-script")
- (list "netunshare"
- "xinetd.netns.conf")))
- #t)))
- (add-after 'install 'wrap-scripts
- ;; Wrap scripts with paths to their common hard dependencies.
- ;; Optional dependencies will need to be installed by the user.
- (lambda* (#:key inputs outputs #:allow-other-keys)
- (let ((out (assoc-ref outputs "out"))
- (guile (search-input-file inputs "bin/guile")))
- (for-each
- (lambda (script)
- (wrap-script (string-append out "/etc/vpnc/" script)
- #:guile guile
- `("PATH" ":" prefix
- ,(map (lambda (name)
- (let ((input (assoc-ref inputs name)))
- (string-append input "/bin:"
- input "/sbin")))
- (list "coreutils"
- "grep"
- "iproute2"
- "net-tools"
- "sed"
- "which")))))
- (list "vpnc-script-ptrtd"
- "vpnc-script-sshd"
- "vpnc-script"))
- #t))))
- #:tests? #f)) ; no tests
- (home-page "http://git.infradead.org/users/dwmw2/vpnc-scripts.git")
- (synopsis "Network configuration scripts for Cisco VPN clients")
- (description
- "This set of scripts configures routing and name services when invoked
- by the VPNC or OpenConnect Cisco @dfn{Virtual Private Network} (VPN) clients.
- The default @command{vpnc-script} automatically configures most common
- connections, and provides hooks for performing custom actions at various stages
- of the connection or disconnection process.
- Alternative scripts are provided for more complicated set-ups, or to serve as an
- example for writing your own. For example, @command{vpnc-script-sshd} contains
- the entire VPN in a network namespace accessible only through SSH.")
- (license license:gpl2+))))
- (define-public ocproxy
- (package
- (name "ocproxy")
- (version "1.60")
- (source (origin
- (method git-fetch)
- (uri (git-reference
- (url "https://github.com/cernekee/ocproxy")
- (commit (string-append "v" version))))
- (file-name (git-file-name name version))
- (sha256
- (base32
- "03323nnhb4y9nzwva04mq7xg03dvdrgp689g89f69jqc261skcqx"))))
- (build-system gnu-build-system)
- (native-inputs
- `(("autoconf" ,autoconf)
- ("automake" ,automake)))
- (inputs
- `(("libevent" ,libevent)))
- (home-page "https://github.com/cernekee/ocproxy")
- (synopsis "OpenConnect proxy")
- (description
- "User-level @dfn{SOCKS} and port forwarding proxy for OpenConnect based
- on LwIP. When using ocproxy, OpenConnect only handles network activity that
- the user specifically asks to proxy, so the @dfn{VPN} interface no longer
- \"hijacks\" all network traffic on the host.")
- (license license:bsd-3)))
- (define-public openconnect
- (package
- (name "openconnect")
- (version "8.10")
- (source (origin
- (method url-fetch)
- (uri (string-append "ftp://ftp.infradead.org/pub/openconnect/"
- "openconnect-" version ".tar.gz"))
- (sha256
- (base32 "1cdsx4nsrwawbsisfkldfc9i4qn60g03vxb13nzppr2br9p4rrih"))))
- (build-system gnu-build-system)
- (propagated-inputs
- `(("libxml2" ,libxml2)
- ("gnutls" ,gnutls)
- ("zlib" ,zlib)))
- (inputs
- `(("lz4" ,lz4)
- ("vpnc-scripts" ,vpnc-scripts)))
- (native-inputs
- `(("gettext" ,gettext-minimal)
- ("pkg-config" ,pkg-config)))
- (arguments
- `(#:configure-flags
- `(,(string-append "--with-vpnc-script="
- (assoc-ref %build-inputs "vpnc-scripts")
- "/etc/vpnc/vpnc-script"))))
- (synopsis "Client for Cisco VPN")
- (description
- "OpenConnect is a client for Cisco's AnyConnect SSL VPN, which is
- supported by the ASA5500 Series, by IOS 12.4(9)T or later on Cisco SR500,
- 870, 880, 1800, 2800, 3800, 7200 Series and Cisco 7301 Routers,
- and probably others.")
- (license license:lgpl2.1)
- (home-page "https://www.infradead.org/openconnect/")))
- (define-public openconnect-sso
- (package
- (name "openconnect-sso")
- (version "0.7.3")
- (source
- (origin
- (method url-fetch)
- (uri (pypi-uri "openconnect-sso" version))
- (sha256
- (base32 "065s5c8q80jh0psdw7694nlabwpra7aw6yc4jlgsc9vxx8rx2na1"))))
- (build-system python-build-system)
- (arguments
- `(#:tests? #f ; Tests not included, building from git requires poetry.
- #:phases
- (modify-phases %standard-phases
- (add-after 'unpack 'patch-openconnect
- (lambda _
- (substitute* "openconnect_sso/app.py"
- (("\"openconnect\"")
- (string-append "\"" (which "openconnect") "\"")))
- #t))
- (replace 'check
- (lambda* (#:key tests? #:allow-other-keys)
- (when tests?
- (invoke "pytest" "-v"))
- #t))
- (add-after 'install 'wrap-qt-process-path
- (lambda* (#:key inputs outputs #:allow-other-keys)
- (let* ((out (assoc-ref outputs "out"))
- (bin (string-append out "/bin/openconnect-sso"))
- (qt-process-path (string-append
- (assoc-ref inputs "qtwebengine")
- "/lib/qt5/libexec/QtWebEngineProcess")))
- (wrap-program bin
- #:sh (search-input-file inputs "bin/bash")
- `("QTWEBENGINEPROCESS_PATH" = (,qt-process-path)))
- #t))))))
- (inputs
- `(("openconnect" ,openconnect)
- ("python-attrs" ,python-attrs)
- ("python-colorama" ,python-colorama)
- ("python-keyring" ,python-keyring)
- ("python-lxml" ,python-lxml)
- ("python-prompt-toolkit" ,python-prompt-toolkit)
- ("python-requests" ,python-requests)
- ("python-pyqt" ,python-pyqt)
- ("python-pyqtwebengine" ,python-pyqtwebengine)
- ("python-pysocks" ,python-pysocks)
- ("python-pyxdg" ,python-pyxdg)
- ("python-structlog" ,python-structlog)
- ("python-toml" ,python-toml)
- ("qtwebengine" ,qtwebengine)))
- (native-inputs
- `(("python-pytest" ,python-pytest)
- ("python-setuptools-scm" ,python-setuptools-scm)))
- (home-page "https://github.com/vlaci/openconnect-sso")
- (synopsis "OpenConnect wrapper script supporting Azure AD (SAMLv2)")
- (description
- "This package provides a wrapper script for OpenConnect supporting Azure AD
- (SAMLv2) authentication to Cisco SSL-VPNs.")
- (license license:gpl3)))
- (define-public openfortivpn
- (package
- (name "openfortivpn")
- (version "1.15.0")
- (source (origin
- (method git-fetch)
- (uri (git-reference
- (url "https://github.com/adrienverge/openfortivpn")
- (commit (string-append "v" version))))
- (file-name (git-file-name name version))
- (sha256
- (base32
- "1qsfgpxg553s8rc9cyrc4k96z0pislxsdxb9wyhp8fdprkak2mw2"))))
- (build-system gnu-build-system)
- (native-inputs
- `(("autoconf" ,autoconf)
- ("autotools" ,automake)
- ("pkg-config" ,pkg-config)))
- (inputs
- `(("openssl" ,openssl)
- ("ppp" ,ppp)))
- (home-page "https://github.com/adrienverge/openfortivpn")
- (synopsis "Client for PPP+SSL VPN tunnel services")
- (description "Openfortivpn is a client for PPP+SSL VPN tunnel services. It
- spawns a pppd process and operates the communication between the gateway and
- this process. It is compatible with Fortinet VPNs.")
- (license license:gpl3+)))
- (define-public openvpn
- (package
- (name "openvpn")
- (version "2.5.3")
- (source (origin
- (method url-fetch)
- (uri (string-append
- "https://swupdate.openvpn.org/community/releases/openvpn-"
- version ".tar.xz"))
- (sha256
- (base32
- "0zlski66mw10klmwvg445z051mld7xjng4iyl4f9b883qr1rjspv"))))
- (build-system gnu-build-system)
- (arguments
- '(#:configure-flags '("--enable-iproute2=yes")))
- (native-inputs
- `(("iproute2" ,iproute)))
- (inputs
- `(("lz4" ,lz4)
- ("lzo" ,lzo)
- ("openssl" ,openssl)
- ("linux-pam" ,linux-pam)))
- (home-page "https://openvpn.net/")
- (synopsis "Virtual private network daemon")
- (description
- "OpenVPN implements virtual private network (@dfn{VPN}) techniques
- for creating secure point-to-point or site-to-site connections in routed or
- bridged configurations and remote access facilities. It uses a custom
- security protocol that utilizes SSL/TLS for key exchange. It is capable of
- traversing network address translators (@dfn{NAT}s) and firewalls.")
- (license license:gpl2)))
- (define-public protonvpn-cli
- (package
- (name "protonvpn-cli")
- (version "2.2.6")
- (source
- (origin
- ;; PyPI has a ".whl" file but not a proper source release.
- ;; Thus, fetch code from Git.
- (method git-fetch)
- (uri (git-reference
- (url "https://github.com/ProtonVPN/linux-cli")
- (commit (string-append "v" version))))
- (file-name (git-file-name name version))
- (sha256
- (base32 "0y7v9ikrmy5dbjlpbpacp08gy838i8z54m8m4ps7ldk1j6kyia3n"))))
- (build-system python-build-system)
- (arguments
- '(#:tests? #f ; no tests in repo
- #:phases
- (modify-phases %standard-phases
- (add-after 'wrap 'wrap-wrapper
- ;; Wrap entrypoint with paths to its hard dependencies.
- (lambda* (#:key inputs outputs #:allow-other-keys)
- (let ((entrypoint (string-append (assoc-ref outputs "out")
- "/bin/.protonvpn-real")))
- (wrap-program entrypoint
- #:sh (search-input-file inputs "bin/bash")
- `("PATH" ":" prefix
- ,(map (lambda (name)
- (let ((input (assoc-ref inputs name)))
- (string-append input "/bin:"
- input "/sbin")))
- (list "dialog"
- "iproute2"
- "iptables"
- "ncurses"
- "openvpn"
- "procps"
- "which")))))
- #t)))))
- (native-inputs
- `(("python-docopt" ,python-docopt)))
- (inputs
- `(("dialog" ,dialog)
- ("iproute2" ,iproute)
- ("iptables" ,iptables)
- ("ncurses" ,ncurses)
- ("openvpn" ,openvpn)
- ("procps" ,procps)
- ("python-jinja2" ,python-jinja2)
- ("python-pythondialog" ,python-pythondialog)
- ("python-requests" ,python-requests)
- ("which" ,which)))
- (synopsis "Command-line client for ProtonVPN")
- (description
- "This is the official command-line interface for ProtonVPN, a secure
- point-to-point virtual private networking (VPN) service with a gratis tier.
- It can automatically find and connect to the fastest servers or use Tor over
- VPN. The gratis tier offers unlimited bandwidth for up to 10 devices.")
- (home-page "https://github.com/ProtonVPN/linux-cli")
- (license license:gpl3+)))
- (define-public tinc
- (package
- (name "tinc")
- (version "1.0.36")
- (source (origin
- (method url-fetch)
- (uri (string-append "https://tinc-vpn.org/packages/"
- "tinc-" version ".tar.gz"))
- (sha256
- (base32
- "021i2sl2mjscbm8g59d7vs74iw3gf0m48wg7w3zhwj6czarkpxs0"))))
- (build-system gnu-build-system)
- (arguments
- '(#:configure-flags
- '("--sysconfdir=/etc"
- "--localstatedir=/var")))
- (inputs `(("zlib" ,zlib)
- ("lzo" ,lzo)
- ("openssl" ,openssl)))
- (home-page "https://tinc-vpn.org")
- (synopsis "Virtual Private Network (VPN) daemon")
- (description
- "Tinc is a VPN that uses tunnelling and encryption to create a secure
- private network between hosts on the internet.")
- (license license:gpl2+)))
- (define-public sshuttle
- (package
- (name "sshuttle")
- (version "0.78.5")
- (source
- (origin
- (method url-fetch)
- (uri (pypi-uri name version))
- (sha256
- (base32
- "0vp13xwrhx4m6zgsyzvai84lkq9mzkaw47j58dk0ll95kaymk2x8"))))
- (build-system python-build-system)
- (arguments
- `(#:phases
- (modify-phases %standard-phases
- (add-after 'unpack 'patch-FHS-file-names
- (lambda _
- (substitute* "sshuttle/client.py"
- (("/usr/bin/env") (which "env")))
- (substitute* "sshuttle/ssh.py"
- (("/bin/sh") "sh"))
- #t)))))
- (native-inputs
- `(("python-setuptools-scm" ,python-setuptools-scm)
- ;; For tests only.
- ("python-flake8" ,python-flake8)
- ("python-mock" ,python-mock)
- ("python-pytest-cov" ,python-pytest-cov)
- ("python-pytest-runner" ,python-pytest-runner)))
- (home-page "https://github.com/sshuttle/sshuttle")
- (synopsis "VPN that transparently forwards connections over SSH")
- (description "sshuttle creates an encrypted virtual private network (VPN)
- connection to any remote server to which you have secure shell (SSH) access.
- The only requirement is a suitable version of Python on the server;
- administrative privileges are required only on the client. Unlike most VPNs,
- sshuttle forwards entire sessions, not packets, using kernel transparent
- proxying. This makes it faster and more reliable than SSH's own tunneling and
- port forwarding features. It can forward both TCP and UDP traffic, including
- DNS domain name queries.")
- (license license:lgpl2.0))) ; incorrectly identified as GPL in ‘setup.py’
- (define-public sshoot
- (package
- (name "sshoot")
- (version "1.2.6")
- (source
- (origin
- (method url-fetch)
- (uri (pypi-uri name version))
- (sha256
- (base32
- "1ccgh0hjyxrwkgy3hnxz3hgbjbs0lmfs25d5l5jam0xbpcpj63h0"))))
- (build-system python-build-system)
- (arguments
- '(#:phases
- (modify-phases %standard-phases
- (add-after 'unpack 'patch-paths
- (lambda _
- (substitute* "sshoot/tests/test_manager.py"
- (("/bin/sh") (which "sh")))
- #t)))))
- (inputs
- `(("python-argcomplete" ,python-argcomplete)
- ("python-prettytable" ,python-prettytable)
- ("python-pyyaml" ,python-pyyaml)))
- ;; For tests only.
- (native-inputs
- `(("python-fixtures" ,python-fixtures)
- ("python-pbr" ,python-pbr)
- ("python-testtools" ,python-testtools)))
- (home-page "https://github.com/albertodonato/sshoot")
- (synopsis "sshuttle VPN session manager")
- (description "sshoot provides a command-line interface to manage multiple
- @command{sshuttle} virtual private networks. It supports flexible profiles
- with configuration options for most of @command{sshuttle}’s features.")
- (license license:gpl3+)))
- (define-public badvpn
- (package
- (name "badvpn")
- (version "1.999.130")
- (source
- (origin
- (method git-fetch)
- (uri (git-reference
- (url "https://github.com/ambrop72/badvpn")
- (commit version)))
- (file-name (git-file-name name version))
- (sha256
- (base32 "0rm67xhi7bh3yph1vh07imv5y1pwyldvw3wa5bz471g8mnkc7d3c"))))
- (build-system cmake-build-system)
- (arguments
- '(#:tests? #f)) ; no tests
- (inputs
- `(("nspr" ,nspr)
- ("nss" ,nss)
- ("openssl" ,openssl)))
- (native-inputs
- `(("pkg-config" ,pkg-config)))
- (home-page "https://github.com/ambrop72/badvpn")
- (synopsis "Peer-to-peer virtual private network (VPN)")
- (description "@code{BadVPN} is a collection of virtual private
- network (VPN) tools. It includes:
- @enumerate
- @item NCD programming language.\n
- NCD (Network Configuration Daemon) is a daemon and programming/scripting
- language for configuration of network interfaces and other aspects of the
- operating system.
- @item Tun2socks network-layer proxifier.\n
- The tun2socks program socksifes TCP connections at the network layer. It
- implements a TUN device which accepts all incoming TCP connections (regardless
- of destination IP), and forwards the connections through a SOCKS server.
- @item Peer-to-peer VPN.\n
- The peer-to-peer VPN implements a Layer 2 (Ethernet) network between the peers
- (VPN nodes).
- @end enumerate")
- ;; This project contains a bundled lwIP. lwIP is also released under the
- ;; 3-clause BSD license.
- (license license:bsd-3)))
- (define-public wireguard-linux-compat
- (package
- (name "wireguard-linux-compat")
- (version "1.0.20201221")
- (source (origin
- (method url-fetch)
- (uri (string-append "https://git.zx2c4.com/wireguard-linux-compat/"
- "snapshot/wireguard-linux-compat-" version
- ".tar.xz"))
- (sha256
- (base32
- "0ci13in0fqq32n5qamch4qhjgbdq86ygrgmfhc9szsh2nsl8jlkf"))))
- (build-system linux-module-build-system)
- (outputs '("out"
- "kernel-patch"))
- (arguments
- `(#:linux ,linux-libre-5.4 ; mustn't have WG built-in
- #:tests? #f ; no test suite
- #:modules ((guix build linux-module-build-system)
- (guix build utils)
- (ice-9 popen)
- (ice-9 textual-ports))
- #:phases
- (modify-phases %standard-phases
- (add-before 'build 'change-directory
- (lambda _
- (chdir "./src")
- #t))
- (add-after 'build 'build-patch
- (lambda* (#:key outputs #:allow-other-keys)
- (let* ((patch-builder "../kernel-tree-scripts/create-patch.sh")
- (port (open-input-pipe patch-builder))
- (str (get-string-all port)))
- (close-pipe port)
- (call-with-output-file "wireguard.patch"
- (lambda (port)
- (format port "~a" str))))
- #t))
- (add-after 'install 'install-patch
- (lambda* (#:key outputs #:allow-other-keys)
- (install-file "wireguard.patch"
- (assoc-ref %outputs "kernel-patch"))
- #t))
- ;; So that 'install-license-files' works...
- (add-before 'install-license-files 'reset-cwd
- (lambda _
- (chdir "..")
- #t)))))
- (home-page "https://git.zx2c4.com/wireguard-linux-compat/")
- (synopsis "WireGuard kernel module for Linux 3.10 through 5.5")
- (description "This package contains an out-of-tree kernel patch and
- a loadable module adding WireGuard to Linux kernel versions 3.10 through 5.5.
- WireGuard was added to Linux 5.6.")
- (license license:gpl2)))
- (define-public wireguard-tools
- (package
- (name "wireguard-tools")
- (version "1.0.20210424")
- (source
- (origin
- (method git-fetch)
- (uri (git-reference
- (url "https://git.zx2c4.com/wireguard-tools.git")
- (commit (string-append "v" version))))
- (file-name (git-file-name name version))
- (sha256
- (base32 "12v0ykaz7phv1gqin35wf6ndgb9819vai17ynjxssq00xwcbsq43"))))
- (build-system gnu-build-system)
- (arguments
- `(#:make-flags
- (list ,(string-append "CC=" (cc-for-target))
- "--directory=src"
- "WITH_BASHCOMPLETION=yes"
- ;; Install the ‘simple and dirty’ helper script wg-quick(8).
- "WITH_WGQUICK=yes"
- (string-append "PREFIX=" (assoc-ref %outputs "out"))
- ;; Currently used only to create an empty /etc/wireguard directory.
- (string-append "SYSCONFDIR=no-thanks"))
- ;; The test suite is meant to be run interactively. It runs Clang's
- ;; scan-build static analyzer and then starts a web server to display the
- ;; results.
- #:tests? #f
- #:phases
- (modify-phases %standard-phases
- ;; No configure script
- (delete 'configure)
- (add-after 'install 'install-contrib-docs
- (lambda* (#:key outputs #:allow-other-keys)
- (let ((out (assoc-ref outputs "out")))
- (copy-recursively "contrib/"
- (string-append out "/share/doc/wireguard-tools"))
- #t)))
- (add-after 'install 'wrap-wg-quick
- (lambda* (#:key inputs outputs #:allow-other-keys)
- (let* ((out (assoc-ref outputs "out"))
- (inputs-sbin (map (lambda (input)
- (string-append (assoc-ref inputs input) "/sbin"))
- (list "resolvconf" "iproute" "procps"
- "iptables")))
- (coreutils (string-append (assoc-ref inputs "coreutils")
- "/bin")))
- (wrap-program (string-append out "/bin/wg-quick")
- #:sh (search-input-file inputs "bin/bash")
- `("PATH" ":" prefix ,(append inputs-sbin
- (list coreutils))))
- #t))))))
- (inputs
- `(("resolvconf" ,openresolv)
- ("coreutils" ,coreutils)
- ("bash" ,bash) ; for scripts using /dev/tcp
- ("procps" ,procps)
- ("iproute" ,iproute)
- ("iptables" ,iptables)))
- (home-page "https://www.wireguard.com/")
- (synopsis "Tools for configuring WireGuard tunnels")
- (description
- "This package provides the user-space command-line tools for using and
- configuring WireGuard tunnels.
- WireGuard is a simple and fast general-purpose @acronym{VPN, Virtual Private
- Network} that securely encapsulates IP packets over UDP. It aims to be as easy
- to configure and deploy as SSH. VPN connections are made simply by exchanging
- public keys and can roam across IP addresses.")
- (license
- (list license:lgpl2.1+ ; src/netlink.h & contrib/embeddable-wg-library
- license:gpl2)))) ; everything else
- (define-public wireguard
- (deprecated-package "wireguard" wireguard-tools))
- (define-public xl2tpd
- (package
- (name "xl2tpd")
- (version "1.3.16")
- (source (origin
- (method git-fetch)
- (uri (git-reference
- (url "https://github.com/xelerance/xl2tpd")
- (commit (string-append "v" version))))
- (file-name (git-file-name name version))
- (sha256
- (base32
- "0is5ccrvijz0pfm45pfrlbb9y8231yz3c4zqs8mkgakl9rxajy6l"))))
- (build-system gnu-build-system)
- (arguments
- `(#:make-flags (list (string-append "PREFIX=" %output)
- "CC=gcc")
- #:phases (modify-phases %standard-phases
- (delete 'configure) ;no configure script
- (add-before 'build 'setup-environment
- (lambda* (#:key inputs #:allow-other-keys)
- (substitute* "l2tp.h"
- (("/usr/sbin/pppd")
- (search-input-file inputs "/sbin/pppd")))
- (setenv "KERNELSRC"
- (assoc-ref inputs "linux-libre-headers"))
- #t)))
- #:tests? #f)) ; no tests provided
- (inputs `(("libpcap" ,libpcap)
- ("linux-libre-headers" ,linux-libre-headers)
- ("ppp" ,ppp)))
- (home-page "https://www.xelerance.com/software/xl2tpd/")
- (synopsis "Layer 2 Tunnelling Protocol Daemon (RFC 2661)")
- (description
- "xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661).
- L2TP allows you to tunnel PPP over UDP.")
- (license license:gpl2)))
|