commit:     0742bf1dc476bebb2f89798418dabb5b027aeece
Author:     Luis Ressel <aranea <AT> aixah <DOT> de>
AuthorDate: Mon Nov 13 06:37:52 2017 +0000
Commit:     Anthony G. Basile <blueness <AT> gentoo <DOT> org>
CommitDate: Mon Nov 13 09:44:43 2017 +0000
URL:        https://gitweb.gentoo.org/proj/musl.git/commit/?id=0742bf1d

sys-apps/policycoreutils: Import from ::gentoo

 sys-apps/policycoreutils/Manifest                  |   2 +
 ...policycoreutils-2.7-0001-newrole-not-suid.patch |  13 ++
 sys-apps/policycoreutils/metadata.xml              |  27 +++
 .../policycoreutils/policycoreutils-2.7.ebuild     | 181 +++++++++++++++++++++
 4 files changed, 223 insertions(+)

diff --git a/sys-apps/policycoreutils/Manifest 
b/sys-apps/policycoreutils/Manifest
new file mode 100644
index 0000000..9703b5b
--- /dev/null
+++ b/sys-apps/policycoreutils/Manifest
@@ -0,0 +1,2 @@
+DIST policycoreutils-2.7.tar.gz 2796707 SHA256 
0a1b8a4a323b854981c6755ff025fe98a0f1cff307f109abb260f0490f13e4f4 SHA512 
ce97d659f72058fd23d8dab8db98fc7c0003806a636c521fa15da465d7358d40ccc8e3eaa9675f00a9b0b8aaa1465d3fb650bc0ebbbf00164e121230673256fb
 WHIRLPOOL 
f2360ab5e83f1a9a0f9e63bf700a89c28b61d13f8101c9ea2b68e9f071ede23557a0a5bec9a077b96b42be063421018ab8b85c4443e3bc1021f0d251a62de301
+DIST policycoreutils-extra-1.36.tar.bz2 8830 SHA256 
2dfbe799bbbf150e68fab7e168fd71b94505c992623f30c71873213447506e8f SHA512 
c6a18e6fb2d65f51dc55b88907f23241f2fbfc033d3d2888b109596d9ed31d509b2c93456727ea4d1f98544831afb15c449ff72d6aedf93b9e474b27817f7fb3
 WHIRLPOOL 
c9772dba472b9b466181204f5bd5fb13d839042c53c84db38999a8b077b0dee1e9e78089b7b5fe4bc4076a1ad1c420528354404b292abd428a73e6f95312d0c4

diff --git 
a/sys-apps/policycoreutils/files/policycoreutils-2.7-0001-newrole-not-suid.patch
 
b/sys-apps/policycoreutils/files/policycoreutils-2.7-0001-newrole-not-suid.patch
new file mode 100644
index 0000000..6049bbe
--- /dev/null
+++ 
b/sys-apps/policycoreutils/files/policycoreutils-2.7-0001-newrole-not-suid.patch
@@ -0,0 +1,13 @@
+diff --git a/policycoreutils/newrole/Makefile 
b/policycoreutils/newrole/Makefile
+index bdefbb8..9cff135 100644
+--- policycoreutils/newrole/Makefile
++++ policycoreutils/newrole/Makefile
+@@ -49,7 +49,7 @@ ifeq ($(NAMESPACE_PRIV),y)
+       IS_SUID=y
+ endif
+ ifeq ($(IS_SUID),y)
+-      MODE := 4555
++      MODE := 0555
+       override LDLIBS += -lcap-ng
+ else
+       MODE := 0555

diff --git a/sys-apps/policycoreutils/metadata.xml 
b/sys-apps/policycoreutils/metadata.xml
new file mode 100644
index 0000000..16effc3
--- /dev/null
+++ b/sys-apps/policycoreutils/metadata.xml
@@ -0,0 +1,27 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd";>
+<pkgmetadata>
+       <maintainer type="project">
+               <email>[email protected]</email>
+               <name>SELinux Team</name>
+       </maintainer>
+       <longdescription>
+               Policycoreutils contains the policy core utilities that are 
required
+               for basic operation of a SELinux system.  These utilities 
include
+               load_policy to load policies, setfiles to label filesystems, 
newrole
+               to switch roles, and run_init to run /etc/init.d scripts in the 
proper
+               context.
+
+               Gentoo-specific tools include rlpkg for relabeling packages by 
name,
+               avc_toggle to toggle between enforcing and permissive modes, and
+               avc_enforcing to query the current mode of the system, 
enforcing or
+               permissive.
+       </longdescription>
+       <use>
+               <flag name="audit">Enable support for 
<pkg>sys-process/audit</pkg> and use the audit_* functions (like audit_getuid 
instead of getuid())</flag>
+       </use>
+       <upstream>
+               <remote-id type="cpe">cpe:/a:redhat:policycoreutils</remote-id>
+               <remote-id type="github">SELinuxProject/selinux</remote-id>
+       </upstream>
+</pkgmetadata>

diff --git a/sys-apps/policycoreutils/policycoreutils-2.7.ebuild 
b/sys-apps/policycoreutils/policycoreutils-2.7.ebuild
new file mode 100644
index 0000000..2f74519
--- /dev/null
+++ b/sys-apps/policycoreutils/policycoreutils-2.7.ebuild
@@ -0,0 +1,181 @@
+# Copyright 1999-2017 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI="6"
+PYTHON_COMPAT=( python{2_7,3_4,3_5} )
+PYTHON_REQ_USE="xml"
+
+inherit multilib python-r1 toolchain-funcs bash-completion-r1
+
+MY_P="${P//_/-}"
+
+MY_RELEASEDATE="20170804"
+EXTRAS_VER="1.36"
+SEMNG_VER="${PV}"
+SELNX_VER="${PV}"
+SEPOL_VER="${PV}"
+
+IUSE="audit pam dbus"
+REQUIRED_USE="${PYTHON_REQUIRED_USE}"
+
+DESCRIPTION="SELinux core utilities"
+HOMEPAGE="https://github.com/SELinuxProject/selinux/wiki";
+
+if [[ ${PV} == 9999 ]] ; then
+       inherit git-r3
+       EGIT_REPO_URI="https://github.com/SELinuxProject/selinux.git";
+       
SRC_URI="https://dev.gentoo.org/~perfinion/distfiles/policycoreutils-extra-${EXTRAS_VER}.tar.bz2";
+       S1="${WORKDIR}/${MY_P}/${PN}"
+       S2="${WORKDIR}/policycoreutils-extra"
+       S="${S1}"
+else
+       
SRC_URI="https://raw.githubusercontent.com/wiki/SELinuxProject/selinux/files/releases/${MY_RELEASEDATE}/${MY_P}.tar.gz
+               
https://dev.gentoo.org/~perfinion/distfiles/policycoreutils-extra-${EXTRAS_VER}.tar.bz2";
+       KEYWORDS="amd64 ~arm64 ~mips x86"
+       S1="${WORKDIR}/${MY_P}"
+       S2="${WORKDIR}/policycoreutils-extra"
+       S="${S1}"
+fi
+
+LICENSE="GPL-2"
+SLOT="0"
+
+DEPEND=">=sys-libs/libselinux-${SELNX_VER}:=[python,${PYTHON_USEDEP}]
+       >=sys-libs/glibc-2.4
+       >=sys-libs/libcap-1.10-r10:=
+       >=sys-libs/libsemanage-${SEMNG_VER}:=[python,${PYTHON_USEDEP}]
+       sys-libs/libcap-ng:=
+       >=sys-libs/libsepol-${SEPOL_VER}:=
+       >=app-admin/setools-4.1.1[${PYTHON_USEDEP}]
+       sys-devel/gettext
+       dev-python/ipy[${PYTHON_USEDEP}]
+       dbus? (
+               sys-apps/dbus
+               dev-libs/dbus-glib:=
+       )
+       audit? ( >=sys-process/audit-1.5.1[python,${PYTHON_USEDEP}] )
+       pam? ( sys-libs/pam:= )
+       ${PYTHON_DEPS}
+       !<sec-policy/selinux-base-policy-2.20151208-r6"
+# 2.20151208-r6 and higher has support for new setfiles
+
+### libcgroup -> seunshare
+### dbus -> restorecond
+
+# pax-utils for scanelf used by rlpkg
+RDEPEND="${DEPEND}
+       app-misc/pax-utils
+       !<sys-apps/openrc-0.14"
+
+PDEPEND="sys-apps/semodule-utils
+       sys-apps/selinux-python"
+
+src_unpack() {
+       # Override default one because we need the SRC_URI ones even in case of 
9999 ebuilds
+       default
+       if [[ ${PV} == 9999 ]] ; then
+               git-r3_src_unpack
+       fi
+}
+
+src_prepare() {
+       S="${S1}"
+       cd "${S}" || die "Failed to switch to ${S}"
+       if [[ ${PV} != 9999 ]] ; then
+               # If needed for live ebuilds please use /etc/portage/patches
+               eapply 
"${FILESDIR}/policycoreutils-2.7-0001-newrole-not-suid.patch"
+       fi
+
+       # rlpkg is more useful than fixfiles
+       sed -i -e '/^all/s/fixfiles//' "${S}/scripts/Makefile" \
+               || die "fixfiles sed 1 failed"
+       sed -i -e '/fixfiles/d' "${S}/scripts/Makefile" \
+               || die "fixfiles sed 2 failed"
+
+       eapply_user
+
+       sed -i 's/-Werror//g' "${S1}"/*/Makefile || die "Failed to remove 
Werror"
+
+       python_copy_sources
+       # Our extra code is outside the regular directory, so set it to the 
extra
+       # directory. We really should optimize this as it is ugly, but the extra
+       # code is needed for Gentoo at the same time that policycoreutils is 
present
+       # (so we cannot use an additional package for now).
+       S="${S2}"
+       python_copy_sources
+}
+
+src_compile() {
+       building() {
+               emake -C "${BUILD_DIR}" \
+                       AUDIT_LOG_PRIVS="y" \
+                       AUDITH="$(usex audit y n)" \
+                       PAMH="$(usex pam y n)" \
+                       INOTIFYH="$(usex dbus y n)" \
+                       SESANDBOX="n" \
+                       CC="$(tc-getCC)" \
+                       PYLIBVER="${EPYTHON}" \
+                       LIBDIR="\$(PREFIX)/$(get_libdir)"
+       }
+       S="${S1}" # Regular policycoreutils
+       python_foreach_impl building
+       S="${S2}" # Extra set
+       python_foreach_impl building
+}
+
+src_install() {
+       # Python scripts are present in many places. There are no extension 
modules.
+       installation-policycoreutils() {
+               einfo "Installing policycoreutils"
+               emake -C "${BUILD_DIR}" DESTDIR="${D}" \
+                       AUDITH="$(usex audit y n)" \
+                       PAMH="$(usex pam y n)" \
+                       INOTIFYH="$(usex dbus y n)" \
+                       SESANDBOX="n" \
+                       AUDIT_LOG_PRIV="y" \
+                       LIBDIR="\$(PREFIX)/$(get_libdir)" \
+                       install
+               python_optimize
+       }
+
+       installation-extras() {
+               einfo "Installing policycoreutils-extra"
+               emake -C "${BUILD_DIR}" \
+                       DESTDIR="${D}" \
+                       INOTIFYH="$(usex dbus)" \
+                       SHLIBDIR="${D}$(get_libdir)/rc" \
+                       install
+               python_optimize
+       }
+
+       S="${S1}" # policycoreutils
+       python_foreach_impl installation-policycoreutils
+       S="${S2}" # extras
+       python_foreach_impl installation-extras
+       S="${S1}" # back for later
+
+       # remove redhat-style init script
+       rm -fR "${D}/etc/rc.d" || die
+
+       # compatibility symlinks
+       dosym /sbin/setfiles /usr/sbin/setfiles
+       bashcomp_alias setsebool getsebool
+
+       # location for policy definitions
+       dodir /var/lib/selinux
+       keepdir /var/lib/selinux
+
+       # Set version-specific scripts
+       for pyscript in rlpkg; do
+         python_replicate_script "${ED}/usr/sbin/${pyscript}"
+       done
+}
+
+pkg_postinst() {
+       for POLICY_TYPE in ${POLICY_TYPES} ; do
+               # There have been some changes to the policy store, rebuilding 
now.
+               # https://marc.info/?l=selinux&m=143757277819717&w=2
+               einfo "Rebuilding store ${POLICY_TYPE} (without re-loading)."
+               semodule -s "${POLICY_TYPE}" -n -B || die "Failed to rebuild 
policy store ${POLICY_TYPE}"
+       done
+}

Reply via email to