commit: 518d0444cca7a8c609323414cb691c524ee65515 Author: Alexey Sokolov <alexey+gentoo <AT> asokolov <DOT> org> AuthorDate: Thu Jan 15 21:13:17 2026 +0000 Commit: Joonas Niilola <juippis <AT> gentoo <DOT> org> CommitDate: Fri Jan 16 13:02:05 2026 +0000 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=518d0444
sys-process/fcron: add patch to reorder seteuid and setegid https://github.com/yo8192/fcron/issues/43 Signed-off-by: Alexey Sokolov <alexey+gentoo <AT> asokolov.org> Part-of: https://github.com/gentoo/gentoo/pull/45391 Closes: https://github.com/gentoo/gentoo/pull/45391 Signed-off-by: Joonas Niilola <juippis <AT> gentoo.org> sys-process/fcron/fcron-3.4.0-r1.ebuild | 247 ++++++++++++++++++++++++ sys-process/fcron/files/fcron-3.4.0-order.patch | 55 ++++++ 2 files changed, 302 insertions(+) diff --git a/sys-process/fcron/fcron-3.4.0-r1.ebuild b/sys-process/fcron/fcron-3.4.0-r1.ebuild new file mode 100644 index 000000000000..90eb523f67e9 --- /dev/null +++ b/sys-process/fcron/fcron-3.4.0-r1.ebuild @@ -0,0 +1,247 @@ +# Copyright 1999-2026 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=8 + +WANT_AUTOMAKE="none" + +inherit autotools cron eapi9-ver flag-o-matic pam systemd user-info + +MY_PV="${PV/_beta/}" +MY_P="${PN}-${MY_PV}" + +DESCRIPTION="A command scheduler with extended capabilities over cron and anacron" +HOMEPAGE="http://fcron.free.fr/" +SRC_URI="http://fcron.free.fr/archives/${MY_P}.src.tar.gz -> ${P}.tar.gz" +S="${WORKDIR}/${MY_P}" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="~amd64 ~arm ~arm64 ~hppa ~loong ~mips ~ppc ~ppc64 ~riscv ~sparc ~x86" +IUSE="audit debug pam selinux +mta +system-crontab readline" + +DEPEND=" + acct-group/fcron + acct-user/fcron + virtual/libcrypt:= + audit? ( sys-process/audit ) + pam? ( sys-libs/pam ) + readline? ( sys-libs/readline:= ) + selinux? ( sys-libs/libselinux ) +" + +RDEPEND=" + ${DEPEND} + app-misc/editor-wrapper + mta? ( virtual/mta ) + pam? ( sys-auth/pambase ) +" + +PATCHES=( + "${FILESDIR}"/fcron-3.1.1-noreadline.patch + "${FILESDIR}"/fcron-3.2.1-musl-getopt-order.patch + "${FILESDIR}"/fcron-3.4.0-order.patch +) + +pkg_setup() { + rootuser=$(egetent passwd 0 | cut -d ':' -f 1) + [[ ${rootuser} ]] || rootuser=root + rootgroup=$(egetent group 0 | cut -d ':' -f 1) + [[ ${rootgroup} ]] || rootgroup=root +} + +src_prepare() { + default + + # respect LDFLAGS + sed "s:\(@LIBS@\):\$(LDFLAGS) \1:" -i Makefile.in || die "sed failed" + + # Adjust fcrontab path + sed -e 's:/etc/fcrontab:/etc/fcron/fcrontab:' -i script/check_system_crontabs.sh || die + + mv configure.in configure.ac || die + + # For docs + cp "${FILESDIR}"/crontab.2 "${WORKDIR}"/crontab || die + + sed -e '/systemctl daemon-reload/d' -i Makefile.in || die + # These two cause installation of /run + sed -e '/PIDDIR/d' -i Makefile.in || die + sed -e '/FIFODIR/d' -i Makefile.in || die + + # Workaround for: + # * QA Notice: system executables owned by nonzero uid: + # But fcron by design doesn't suid root. Hence, hide that fact + # from the QA check via a wrapper (not a symlink) + # https://bugs.gentoo.org/925512 + for file in fcrontab fcrondyn; do + cat > "${file}_wrapper" <<-EOF + #!/bin/sh + exec "${EPREFIX}/usr/libexec/${file}" "\$@" + EOF + done + + eautoconf +} + +src_configure() { + # Don't try to pass --with-debug as it'll play with cflags as + # well, and run foreground which is a _very_ nasty idea for + # Gentoo. + use debug && append-cppflags -DDEBUG + + # bindir is used just for calling fcronsighup + local myeconfargs=( + --with-cflags="${CFLAGS}" + --bindir=/usr/libexec + --sbindir=/usr/libexec + $(use_with audit) + $(use_with mta sendmail) + $(use_with pam) + $(use_with readline) + $(use_with selinux) + --sysconfdir=/etc/fcron + --with-username=fcron + --with-groupname=fcron + --with-piddir=/run + --with-spooldir=/var/spool/fcron + --with-fifodir=/run + --with-fcrondyn=yes + --disable-checks + --with-editor=/usr/libexec/editor + --with-shell=/bin/sh + --without-db2man + --without-dsssl-dir + --with-rootname=${rootuser} + --with-rootgroup=${rootgroup} + --with-systemdsystemunitdir="$(systemd_get_systemunitdir)" + ) + + econf "${myeconfargs[@]}" +} + +src_compile() { + default + + # bug #216460 + sed \ + -e 's:/usr/local/etc/fcron:/etc/fcron/fcron:g' \ + -e 's:/usr/local/etc:/etc:g' \ + -e 's:/usr/local/:/usr/:g' \ + -i doc/*/*/*.{txt,1,5,8,html} \ + || die "unable to fix documentation references" +} + +src_install() { + emake install BOOTINSTALL=0 DESTDIR="${ED}" STRIP=echo + + keepdir /var/spool/fcron + fowners fcron:fcron /var/spool/fcron + fperms 6770 /var/spool/fcron + + newbin fcrontab_wrapper fcrontab + newbin fcrondyn_wrapper fcrondyn + + # bitstring.h is a private header inside fcron, not even installed. + find "${ED}/usr/share/man" -name '*bitstring*' -delete || die + + if use system-crontab; then + dosym fcrontab /usr/bin/crontab + + exeinto /usr/libexec + newexe script/check_system_crontabs.sh check_system_crontabs + + insinto /etc/fcron + newins "${FILESDIR}"/fcrontab.2 fcrontab + + fowners ${rootuser}:fcron /etc/fcron/fcrontab + fperms 0640 /etc/fcron/fcrontab + + insinto /etc + newins "${FILESDIR}"/crontab.2 crontab + fi + + if use pam ; then + rm "${ED}/etc/fcron/pam.conf" || die + pamd_mimic system-services fcron auth account session + cat > "${T}"/fcrontab.pam <<- EOF + # Don't ask for the user's password; fcrontab will only allow to + # change user if running as root. + auth sufficient pam_permit.so + + # Still use the system-auth stack for account and session as the + # sysadmin might have set up stuff properly, and also avoids + # sidestepping limits (since fcrontab will run \$EDITOR). + account include system-auth + session include system-auth + EOF + newpamd "${T}"/fcrontab.pam fcrontab + fi + + newinitd "${FILESDIR}"/fcron.init-r5 fcron + newconfd "${FILESDIR}"/fcron.confd fcron + + local DOCS=( "${WORKDIR}/crontab" ) + einstalldocs +} + +pkg_postinst() { + if [[ -z "${REPLACING_VERSIONS}" ]]; then + # This is a new installation + elog "Make sure you execute" + elog "" + elog " # emerge --config ${CATEGORY}/${PN}" + elog "" + elog "to install the default systab on this system." + elif ver_replacing -lt "3.2.1"; then + # This is an upgrade + elog "fcron's default systab was updated since your last installation." + elog "You can use" + elog "" + elog " # emerge --config ${CATEGORY}/${PN}" + elog "" + elog "to re-install systab (do not call this command before you" + elog "have merged your configuration files)." + fi + + if ! use system-crontab; then + echo "" + ewarn "Remember that fcron will *not* use /etc/cron.d in this configuration" + ewarn "due to USE=-system-crontab!" + echo "" + fi +} + +pkg_config() { + if [[ $(fcrontab -l -u systab 2>/dev/null) ]]; then + eerror "We're not going to make any change to your systab as long as" + eerror "it contains data; please clear it before proceeding." + eerror "You can do that with" + eerror "" + eerror " # fcrontab -u systab -r" + eerror "" + eerror "However you are advised to do this by hand to review existing" + eerror "systab just in case." + return 1 + fi + + if use system-crontab; then + elog "This is going to set up fcron to execute check_system_crontabs." + elog "In this configuration, /etc/crontab and /etc/cron.d are respected." + elog "Per default fcron will check for modifications every 10 minutes." + /usr/libexec/check_system_crontabs -v -i -f + else + elog "This is going to set up fcron to set up a default systab that" + elog "executes /etc/cron.{hourly,daily,weekly,monthly} but will ignore" + elog "/etc/crontab and /etc/cron.d." + fcrontab -u systab - <<- EOF + !serial(true) + 00 * * * * /bin/rm -f /var/spool/cron/lastrun/cron.hourly + 00 00 * * * /bin/rm -f /var/spool/cron/lastrun/cron.daily + 00 00 * * 6 /bin/rm -f /var/spool/cron/lastrun/cron.weekly + 00 00 1 * * /bin/rm -f /var/spool/cron/lastrun/cron.monthly + */10 * * * * /usr/bin/test -x /usr/sbin/run-crons && /usr/sbin/run-crons + !serial(false) + EOF + fi +} diff --git a/sys-process/fcron/files/fcron-3.4.0-order.patch b/sys-process/fcron/files/fcron-3.4.0-order.patch new file mode 100644 index 000000000000..299815799cc8 --- /dev/null +++ b/sys-process/fcron/files/fcron-3.4.0-order.patch @@ -0,0 +1,55 @@ +https://github.com/yo8192/fcron/issues/43 + +Reorder seteuid() and setegid() + +I don't know why it broke for Tim. Probably somehow after changing euid +(from user which has permission to some other user?) changing egid isn't +allowed anymore. For me fcrontab works both without and with this patch. + +--- a/fcrontab.c ++++ b/fcrontab.c +@@ -174,10 +174,10 @@ xexit(int exit_val) + + #ifdef HAVE_LIBPAM + /* we need those rights for pam to close properly */ +- if (geteuid() != fcrontab_uid && seteuid(fcrontab_uid) != 0) +- die_e("could not change euid to %d", fcrontab_uid); + if (getegid() != fcrontab_gid && setegid(fcrontab_gid) != 0) + die_e("could not change egid to %d", fcrontab_gid); ++ if (geteuid() != fcrontab_uid && seteuid(fcrontab_uid) != 0) ++ die_e("could not change euid to %d", fcrontab_uid); + pam_setcred(pamh, PAM_DELETE_CRED | PAM_SILENT); + pam_end(pamh, pam_close_session(pamh, PAM_SILENT)); + #endif +@@ -1032,8 +1032,8 @@ main(int argc, char **argv) + #ifdef USE_SETE_ID + /* drop any privilege we may have: we will only get them back + * temporarily every time we need it. */ +- seteuid_safe(useruid); + setegid_safe(usergid); ++ seteuid_safe(useruid); + #endif + + #ifdef HAVE_LIBPAM +--- a/subs.c ++++ b/subs.c +@@ -110,8 +110,8 @@ open_as_user(const char *pathname, uid_t openuid, gid_t opengid, int flags, ...) + va_end(ap); + } + +- seteuid_safe(openuid); + setegid_safe(opengid); ++ seteuid_safe(openuid); + + if (flags & O_CREAT) { + fd = open(pathname, flags, mode); +@@ -122,8 +122,8 @@ open_as_user(const char *pathname, uid_t openuid, gid_t opengid, int flags, ...) + saved_errno = errno; + + /* change the effective uid/gid back to original values */ +- seteuid_safe(orig_euid); + setegid_safe(orig_egid); ++ seteuid_safe(orig_euid); + + /* if open() didn't fail make sure we opened a 'normal' file */ + if (fd >= 0) {
