# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4
# $Id: Portfile 115102 2013-12-25 04:40:20Z ryandesign@macports.org $

PortSystem          1.0

name                tor
conflicts           tor-devel
version             0.2.4.20
categories          security
platforms           darwin
maintainers         nomaintainer
license             BSD

description         anonymizing overlay network for TCP

long_description    Tor provides a distributed network of servers \
                    (onion routers). Users bounce their TCP streams \
                    (web traffic, FTP, SSH, etc.) around the \
                    routers. This makes it hard for recipients, \
                    observers, and even the onion routers \
                    themselves to track the source of the stream.

homepage            https://www.torproject.org/
master_sites        ${homepage}dist/

checksums           rmd160  a06c0f7e423fdc457adbd6f60350194ea5006bc5 \
                    sha256  ccc51747cbcbf98f658c34d5c693ff8a868698da0349d056e98287ef2e294d9f

depends_lib         port:libevent \
                    port:openssl \
                    port:zlib

configure.args      --disable-silent-rules

test.run            yes
test.target         check

livecheck.type      regex
livecheck.url       ${master_sites}?C=M\;O=D
livecheck.regex     tor-(\\d+\\.\\d+\\.\\d+\\.\\d+)${extract.suffix}
