Patrick Williams | b48b7b4 | 2016-08-17 15:04:38 -0500 | [diff] [blame] | 1 | SUMMARY = "OpenFlow communications protocol" |
| 2 | DESCRIPTION = "\ |
| 3 | Open standard that enables researchers to run experimental protocols in \ |
| 4 | contained networks. OpenFlow is a communications interface between \ |
| 5 | control and forwarding planes of a software-defined networking architecture.\ |
| 6 | " |
| 7 | HOMEPAGE = "http://www.openflow.org" |
| 8 | |
| 9 | SECTION = "net" |
Andrew Geissler | 9aee500 | 2022-03-30 16:27:02 +0000 | [diff] [blame] | 10 | LICENSE = "GPL-2.0-only" |
Patrick Williams | b48b7b4 | 2016-08-17 15:04:38 -0500 | [diff] [blame] | 11 | |
| 12 | LIC_FILES_CHKSUM = "file://COPYING;md5=e870c934e2c3d6ccf085fd7cf0a1e2e2" |
| 13 | |
Andrew Geissler | 595f630 | 2022-01-24 19:11:47 +0000 | [diff] [blame] | 14 | SRC_URI = "git://gitosis.stanford.edu/openflow.git;protocol=git;branch=master" |
Patrick Williams | b48b7b4 | 2016-08-17 15:04:38 -0500 | [diff] [blame] | 15 | |
Patrick Williams | db4c27e | 2022-08-05 08:10:29 -0500 | [diff] [blame] | 16 | CVE_CHECK_IGNORE = "\ |
| 17 | CVE-2015-1611 \ |
| 18 | CVE-2015-1612 \ |
| 19 | " |
| 20 | |
Patrick Williams | b48b7b4 | 2016-08-17 15:04:38 -0500 | [diff] [blame] | 21 | DEPENDS = "virtual/libc" |
| 22 | |
Andrew Geissler | eff2747 | 2021-10-29 15:35:00 -0500 | [diff] [blame] | 23 | PACKAGECONFIG ??= "" |
Brad Bishop | 6e60e8b | 2018-02-01 10:27:11 -0500 | [diff] [blame] | 24 | PACKAGECONFIG[openssl] = "--enable-ssl,--disable-ssl, openssl openssl-native, libssl" |
Patrick Williams | b48b7b4 | 2016-08-17 15:04:38 -0500 | [diff] [blame] | 25 | |
| 26 | EXTRA_OECONF += " \ |
| 27 | KARCH=${TARGET_ARCH} \ |
Patrick Williams | ddad1a1 | 2017-02-23 20:36:32 -0600 | [diff] [blame] | 28 | ${@bb.utils.contains('PACKAGECONFIG', 'openssl', 'SSL_LIBS="-lssl -lcrypto"', '', d)} \ |
Patrick Williams | b48b7b4 | 2016-08-17 15:04:38 -0500 | [diff] [blame] | 29 | " |
| 30 | |
| 31 | S = "${WORKDIR}/git" |
| 32 | |
Brad Bishop | 6e60e8b | 2018-02-01 10:27:11 -0500 | [diff] [blame] | 33 | inherit autotools-brokensep pkgconfig |
Patrick Williams | b48b7b4 | 2016-08-17 15:04:38 -0500 | [diff] [blame] | 34 | |
Patrick Williams | 213cb26 | 2021-08-07 19:21:33 -0500 | [diff] [blame] | 35 | do_configure:prepend() { |
Patrick Williams | b48b7b4 | 2016-08-17 15:04:38 -0500 | [diff] [blame] | 36 | ./boot.sh |
Patrick Williams | b48b7b4 | 2016-08-17 15:04:38 -0500 | [diff] [blame] | 37 | } |
| 38 | |
Patrick Williams | 213cb26 | 2021-08-07 19:21:33 -0500 | [diff] [blame] | 39 | do_install:append() { |
Patrick Williams | b48b7b4 | 2016-08-17 15:04:38 -0500 | [diff] [blame] | 40 | # Remove /var/run as it is created on startup |
| 41 | rm -rf ${D}${localstatedir}/run |
Andrew Geissler | 595f630 | 2022-01-24 19:11:47 +0000 | [diff] [blame] | 42 | |
| 43 | # /var/log/openflow needs to be created in runtime. Use rmdir to catch if |
| 44 | # upstream stops creating /var/log/openflow, or adds something else in |
| 45 | # /var/log. |
| 46 | rmdir ${D}${localstatedir}/log/${BPN} ${D}${localstatedir}/log |
| 47 | rmdir --ignore-fail-on-non-empty ${D}${localstatedir} |
| 48 | |
| 49 | # Create /var/log/openflow in runtime. |
| 50 | if [ "${@bb.utils.filter('DISTRO_FEATURES', 'systemd', d)}" ]; then |
| 51 | install -d ${D}${nonarch_libdir}/tmpfiles.d |
| 52 | echo "d ${localstatedir}/log/${BPN} - - - -" > ${D}${nonarch_libdir}/tmpfiles.d/${BPN}.conf |
| 53 | fi |
| 54 | if [ "${@bb.utils.filter('DISTRO_FEATURES', 'sysvinit', d)}" ]; then |
| 55 | install -d ${D}${sysconfdir}/default/volatiles |
| 56 | echo "d root root 0755 ${localstatedir}/log/${BPN} none" > ${D}${sysconfdir}/default/volatiles/99_${BPN} |
| 57 | fi |
Patrick Williams | b48b7b4 | 2016-08-17 15:04:38 -0500 | [diff] [blame] | 58 | } |
Andrew Geissler | 595f630 | 2022-01-24 19:11:47 +0000 | [diff] [blame] | 59 | |
| 60 | FILES:${PN} += "${nonarch_libdir}/tmpfiles.d" |
Andrew Geissler | 615f2f1 | 2022-07-15 14:00:58 -0500 | [diff] [blame] | 61 | |
| 62 | # This CVE is not for this product but cve-check assumes it is |
| 63 | # because two CPE collides when checking the NVD database |
| 64 | CVE_CHECK_IGNORE = "CVE-2018-1078" |