mirror of
https://github.com/AuxXxilium/synology-wireguard.git
synced 2024-11-23 23:11:06 +07:00
147 lines
5.4 KiB
Bash
Executable File
147 lines
5.4 KiB
Bash
Executable File
#!/bin/bash
|
|
if [ -z ${IS_IN_CONTAINER+x} ]; then
|
|
echo "This script expect to be run inside a docker container" 1>&2
|
|
exit 1
|
|
fi
|
|
|
|
if [ -z ${PACKAGE_ARCH+x} ]; then
|
|
echo "PACKAGE_ARCH is undefined. Please find and set you package arch:" 1>&2
|
|
echo "https://www.synology.com/en-global/knowledgebase/DSM/tutorial/Compatibility_Peripherals/What_kind_of_CPU_does_my_NAS_have" 1>&2
|
|
exit 2
|
|
fi
|
|
|
|
if [ -z ${DSM_VER+x} ]; then
|
|
echo "DSM_VER is undefined. This should a version number like 6.2" 1>&2
|
|
exit 3
|
|
fi
|
|
|
|
# Ensure that we are working directly in the root file system. Though this
|
|
# should always be the case in containers.
|
|
cd /
|
|
|
|
# Make the script quit if there are errors
|
|
set -e
|
|
|
|
export WIREGUARD_VERSION=$(wget -q https://git.zx2c4.com/wireguard-linux-compat/refs/ -O - | grep -oP '\/wireguard-linux-compat\/tag\/\?h=v\K[.0-9]*' | head -n 1)
|
|
export WIREGUARD_TOOLS_VERSION=$(wget -q https://git.zx2c4.com/wireguard-tools/refs/ -O - | grep -oP '\/wireguard-tools\/tag\/\?h=v\K[.0-9]*' | head -n 1)
|
|
export LIBMNL_VERSION=$(wget -q 'https://netfilter.org/projects/libmnl/files/?C=M;O=D' -O - | grep -oP 'a href="libmnl-\K[0-9.]*' | head -n 1 | sed 's/.\{1\}$//')
|
|
|
|
echo "WireGuard version: $WIREGUARD_VERSION"
|
|
echo "WireGuard tools version: $WIREGUARD_TOOLS_VERSION"
|
|
echo "libmnl version: $LIBMNL_VERSION"
|
|
echo
|
|
|
|
# Fetch Synology toolchain
|
|
if [[ ! -d /pkgscripts-ng ]] || [ -z "$(ls -A /pkgscripts-ng)" ]; then
|
|
clone_args=""
|
|
# If the DSM version is 7.0, use the DSM7.0 branch of pkgscripts-ng
|
|
if [[ "$DSM_VER" =~ ^7\.[0-9]+$ ]]; then
|
|
clone_args="-b DSM7.0"
|
|
export PRODUCT="DSM"
|
|
fi
|
|
git clone ${clone_args} https://github.com/SynologyOpenSource/pkgscripts-ng
|
|
else
|
|
echo "Existing pkgscripts-ng repo found. Pulling latest from origin."
|
|
cd /pkgscripts-ng
|
|
git pull origin
|
|
cd /
|
|
fi
|
|
|
|
# Configure the package according to the DSM version
|
|
if [[ "$DSM_VER" =~ ^7\.[0-9]+$ ]]; then
|
|
os_min_ver="7.0-40000"
|
|
pkgscripts_args=""
|
|
|
|
# Synology has added a strict requirement on DSM 7.0 to prevent packages
|
|
# not signed by Synology from running with root privileges.
|
|
# Change the permission to run the package to lower in order
|
|
# to successfully install the package.
|
|
sed -i "s/root/package/" /source/WireGuard/conf/privilege
|
|
|
|
# For Virtual DSM 7.0 (vkmx64) the wireguard kernel module
|
|
# requires a spinlock implementation patch
|
|
if [[ "$PACKAGE_ARCH" =~ ^(kvmx64)$ ]]; then
|
|
export APPLY_SPINLOCK_PATCH=1
|
|
fi
|
|
else
|
|
os_min_ver="6.0-5941"
|
|
pkgscripts_args="-S"
|
|
|
|
# Temporary workaround for some architectures that are not part properly set as
|
|
# 64 bit: https://github.com/SynologyOpenSource/pkgscripts-ng/pull/26/
|
|
# NOTE: This fix breaks your workflow if you save the pkgscripts-ng repo state
|
|
# across runs
|
|
if [[ "$PACKAGE_ARCH" =~ ^(geminilake|purley|v1000)$ ]]; then
|
|
sed -i 's/\(local all64BitPlatforms\)=".*"/\1="PURLEY V1000 GEMINILAKE"/' /pkgscripts-ng/include/platforms
|
|
fi
|
|
fi
|
|
|
|
sed -i "s/DSM_VER/$DSM_VER/" /source/WireGuard/SynoBuildConf/depends
|
|
sed -i "s/OS_MIN_VER/$os_min_ver/" /source/WireGuard/INFO.sh
|
|
|
|
# Install the toolchain for the given package arch and DSM version
|
|
build_env="/build_env/ds.$PACKAGE_ARCH-$DSM_VER"
|
|
|
|
if [ ! -d "$build_env" ]; then
|
|
if [ -f "/toolkit_tarballs/base_env-$DSM_VER.txz" ] && [ -f "/toolkit_tarballs/ds.$PACKAGE_ARCH-$DSM_VER.env.txz" ] && [ -f "/toolkit_tarballs/ds.$PACKAGE_ARCH-$DSM_VER.dev.txz" ]; then
|
|
pkgscripts-ng/EnvDeploy -p $PACKAGE_ARCH -v $DSM_VER -t /toolkit_tarballs
|
|
else
|
|
pkgscripts-ng/EnvDeploy -p $PACKAGE_ARCH -v $DSM_VER
|
|
fi
|
|
|
|
# Ensure the installed toolchain has support for CA signed certificates.
|
|
# Without this wget on https:// will fail
|
|
cp /etc/ssl/certs/ca-certificates.crt "$build_env/etc/ssl/certs/"
|
|
fi
|
|
|
|
# Patch WireGuard to use its own included memneq implementation if architecture
|
|
# does not have built in memneq support.
|
|
if [ -z ${APPLY_MEMNEQ_PATCH+x} ]; then
|
|
source "/pkgscripts-ng/include/platform.$PACKAGE_ARCH"
|
|
if [ ! -z ${ToolChainSysRoot64} ]; then
|
|
ToolChainSysRoot="$ToolChainSysRoot64"
|
|
elif [ ! -z ${ToolChainSysRoot32} ]; then
|
|
ToolChainSysRoot="$ToolChainSysRoot32"
|
|
fi
|
|
if ! grep -q "int crypto_memneq" "$build_env/$ToolChainSysRoot/usr/lib/modules/DSM-$DSM_VER/build/include/crypto/algapi.h"; then
|
|
export APPLY_MEMNEQ_PATCH=1
|
|
elif grep -q "#if defined(CONFIG_SYNO_BACKPORT_ARM_CRYPTO)" "$build_env/$ToolChainSysRoot/usr/lib/modules/DSM-$DSM_VER/build/include/crypto/algapi.h" && \
|
|
! grep -qx "CONFIG_SYNO_BACKPORT_ARM_CRYPTO=y" "$build_env/$ToolChainSysRoot/usr/lib/modules/DSM-$DSM_VER/build/.config"; then
|
|
export APPLY_MEMNEQ_PATCH=1
|
|
fi
|
|
fi
|
|
|
|
# Disable quit if errors to allow printing of logfiles
|
|
set +e
|
|
|
|
# Build packages
|
|
# -p package arch
|
|
# -v DSM version
|
|
# -S no signing
|
|
# --build-opt=-J prevent parallel building (required)
|
|
# --print-log save build logs
|
|
# -c WireGuard project path in /source
|
|
pkgscripts-ng/PkgCreate.py \
|
|
-p $PACKAGE_ARCH \
|
|
-v $DSM_VER \
|
|
${pkgscripts_args} \
|
|
--build-opt=-J \
|
|
--print-log \
|
|
-c WireGuard
|
|
|
|
# Save package builder exit code. This allows us to print the logfiles and give
|
|
# a non-zero exit code on errors.
|
|
pkg_status=$?
|
|
|
|
echo "Build log"
|
|
echo "========="
|
|
cat "$build_env/logs.build"
|
|
echo
|
|
|
|
echo "Install log"
|
|
echo "==========="
|
|
cat "$build_env/logs.install"
|
|
echo
|
|
|
|
exit $pkg_status
|