commit:     1e386c2dc36e798b96db231bce56bc8903a465d3
Author:     Sebastian Pipping <sping <AT> gentoo <DOT> org>
AuthorDate: Tue Dec 21 00:16:55 2021 +0000
Commit:     Sebastian Pipping <sping <AT> gentoo <DOT> org>
CommitDate: Tue Dec 21 00:16:55 2021 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1e386c2d

sys-apps/usbguard: Add USE=selinux

Closes: https://bugs.gentoo.org/829726
Signed-off-by: Sebastian Pipping <sping <AT> gentoo.org>
Package-Manager: Portage-3.0.30, Repoman-3.0.3

 sys-apps/usbguard/usbguard-1.0.0-r5.ebuild | 103 +++++++++++++++++++++++++++++
 1 file changed, 103 insertions(+)

diff --git a/sys-apps/usbguard/usbguard-1.0.0-r5.ebuild 
b/sys-apps/usbguard/usbguard-1.0.0-r5.ebuild
new file mode 100644
index 000000000000..42ed8e9db739
--- /dev/null
+++ b/sys-apps/usbguard/usbguard-1.0.0-r5.ebuild
@@ -0,0 +1,103 @@
+# Copyright 1999-2021 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit autotools bash-completion-r1
+
+DESCRIPTION="Daemon protecting your computer against BadUSB"
+HOMEPAGE="https://github.com/USBGuard/usbguard";
+SRC_URI="https://github.com/USBGuard/usbguard/releases/download/${P}/${P}.tar.gz";
+
+LICENSE="GPL-2+"
+SLOT="0/1"  # due to libusbguard.so.<1>.0.0
+KEYWORDS="~amd64 ~x86"
+IUSE="dbus ldap policykit selinux static-libs systemd test umockdev"
+
+REQUIRED_USE="policykit? ( dbus )"
+
+# https://github.com/USBGuard/usbguard/issues/449
+# https://bugs.gentoo.org/769692
+REQUIRED_USE+=" test? ( static-libs )"
+
+CDEPEND="
+       <dev-libs/pegtl-3
+       >=dev-libs/libsodium-0.4.5:=
+       >=dev-libs/protobuf-2.5.0:=
+       >=sys-cluster/libqb-0.16.0:=
+       sys-devel/gcc:*[cxx]
+       >=sys-libs/libcap-ng-0.7.0
+       >=sys-libs/libseccomp-2.0.0
+       >=sys-process/audit-2.7.7
+       dbus? (
+               dev-libs/glib:2
+               sys-apps/dbus
+               policykit? ( sys-auth/polkit[introspection] )
+       )
+       ldap? ( net-nds/openldap )
+       systemd? ( sys-apps/systemd )
+       umockdev? ( dev-util/umockdev )
+       "
+RDEPEND="${CDEPEND}
+       virtual/udev
+       selinux? ( sec-policy/selinux-usbguard )
+       "
+DEPEND="${CDEPEND}
+       app-text/asciidoc
+       dev-cpp/catch:1
+       dbus? (
+               dev-libs/libxml2
+               dev-libs/libxslt
+               dev-util/gdbus-codegen
+       )
+       "
+
+RESTRICT="!test? ( test )"
+
+PATCHES=(
+       "${FILESDIR}"/${PN}-1.0.0-pthreads-link.patch
+       "${FILESDIR}"/${PN}-1.0.0-bash-completion-configure.patch
+)
+
+src_prepare() {
+       default
+       eautoreconf
+}
+
+src_configure() {
+       local myargs=(
+               --with-bash-completion-dir=$(get_bashcompdir)
+               $(use_with dbus)
+               $(use_with ldap)
+               $(use_with policykit polkit)
+               $(use_enable static-libs static)
+               $(use_enable systemd)
+               $(use_enable umockdev)
+       )
+
+       econf "${myargs[@]}"
+}
+
+src_install() {
+       default
+
+       keepdir /etc/usbguard/IPCAccessControl.d  # bug 808801
+       keepdir /var/lib/log/usbguard
+       chmod 0600 "${ED}"/etc/usbguard/IPCAccessControl.d/.keep* || die  # bug 
808801
+
+       newinitd "${FILESDIR}"/${PN}-0.7.6-usbguard.openrc usbguard
+       use dbus && newinitd "${FILESDIR}"/${PN}-0.7.6-usbguard-dbus.openrc 
usbguard-dbus
+}
+
+pkg_postinst() {
+       ewarn
+       ewarn 'BEFORE STARTING USBGUARD please be sure to create/generate'
+       ewarn '                         a rules file at 
/etc/usbguard/rules.conf'
+       ewarn '                         so that you do not'
+       ewarn '                                            GET LOCKED OUT'
+       ewarn "                         of this system (\"$(hostname)\")."
+       ewarn
+       ewarn 'This command may be of help:'
+       ewarn '  sudo sh -c "usbguard generate-policy > 
/etc/usbguard/rules.conf"'
+       ewarn
+}

Reply via email to