commit:     0c8f637a677201d037500abd8611f8f0c415518e
Author:     Sam James <sam <AT> gentoo <DOT> org>
AuthorDate: Fri May  5 01:43:41 2023 +0000
Commit:     Sam James <sam <AT> gentoo <DOT> org>
CommitDate: Fri May  5 01:44:25 2023 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=0c8f637a

sys-apps/coreutils: backport cp permissions fix

Signed-off-by: Sam James <sam <AT> gentoo.org>

 sys-apps/coreutils/coreutils-9.3-r1.ebuild         | 267 +++++++++++++++++++++
 ...utils-9.3-cp-parents-preserve-permissions.patch |  86 +++++++
 2 files changed, 353 insertions(+)

diff --git a/sys-apps/coreutils/coreutils-9.3-r1.ebuild 
b/sys-apps/coreutils/coreutils-9.3-r1.ebuild
new file mode 100644
index 000000000000..564a8a362e13
--- /dev/null
+++ b/sys-apps/coreutils/coreutils-9.3-r1.ebuild
@@ -0,0 +1,267 @@
+# Copyright 1999-2023 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+# Try to keep an eye on Fedora's packaging: 
https://src.fedoraproject.org/rpms/coreutils
+# The upstream coreutils maintianers also maintain the package in Fedora and 
may
+# backport fixes which we want to pick up.
+
+PYTHON_COMPAT=( python3_{9..11} )
+VERIFY_SIG_OPENPGP_KEY_PATH="${BROOT}"/usr/share/openpgp-keys/coreutils.asc
+inherit flag-o-matic python-any-r1 toolchain-funcs verify-sig
+
+MY_PATCH="${PN}-9.0_p20220409-patches-01"
+DESCRIPTION="Standard GNU utilities (chmod, cp, dd, ls, sort, tr, head, wc, 
who,...)"
+HOMEPAGE="https://www.gnu.org/software/coreutils/";
+
+if [[ ${PV} == 9999 ]] ; then
+       EGIT_REPO_URI="https://git.savannah.gnu.org/git/coreutils.git";
+       inherit git-r3
+elif [[ ${PV} == *_p* ]] ; then
+       # Note: could put this in devspace, but if it's gone, we don't want
+       # it in tree anyway. It's just for testing.
+       MY_SNAPSHOT="$(ver_cut 1-2).18-ffd62"
+       SRC_URI="https://www.pixelbeat.org/cu/coreutils-${MY_SNAPSHOT}.tar.xz 
-> ${P}.tar.xz"
+       SRC_URI+=" verify-sig? ( 
https://www.pixelbeat.org/cu/coreutils-${MY_SNAPSHOT}.tar.xz.sig -> 
${P}.tar.xz.sig )"
+       S="${WORKDIR}"/${PN}-${MY_SNAPSHOT}
+else
+       SRC_URI="
+               mirror://gnu/${PN}/${P}.tar.xz
+               verify-sig? ( mirror://gnu/${PN}/${P}.tar.xz.sig )
+       "
+
+       KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~loong ~m68k ~mips ~ppc 
~ppc64 ~riscv ~s390 ~sparc ~x86 ~x86-linux"
+fi
+
+SRC_URI+=" !vanilla? ( 
https://dev.gentoo.org/~sam/distfiles/${CATEGORY}/${PN}/${MY_PATCH}.tar.xz )"
+
+LICENSE="GPL-3+"
+SLOT="0"
+IUSE="acl caps gmp hostname kill multicall nls +openssl selinux +split-usr 
static test vanilla xattr"
+RESTRICT="!test? ( test )"
+
+LIB_DEPEND="
+       acl? ( sys-apps/acl[static-libs] )
+       caps? ( sys-libs/libcap )
+       gmp? ( dev-libs/gmp:=[static-libs] )
+       openssl? ( dev-libs/openssl:=[static-libs] )
+       xattr? ( sys-apps/attr[static-libs] )
+"
+RDEPEND="
+       !static? ( ${LIB_DEPEND//\[static-libs]} )
+       selinux? ( sys-libs/libselinux )
+       nls? ( virtual/libintl )
+"
+DEPEND="
+       ${RDEPEND}
+       static? ( ${LIB_DEPEND} )
+"
+BDEPEND="
+       app-arch/xz-utils
+       dev-lang/perl
+       test? (
+               dev-lang/perl
+               dev-perl/Expect
+               dev-util/strace
+               ${PYTHON_DEPS}
+       )
+       verify-sig? ( sec-keys/openpgp-keys-coreutils )
+"
+RDEPEND+="
+       hostname? ( !sys-apps/net-tools[hostname] )
+       kill? (
+               !sys-apps/util-linux[kill]
+               !sys-process/procps[kill]
+       )
+       !app-misc/realpath
+       !<sys-apps/util-linux-2.13
+       !<sys-apps/sandbox-2.10-r4
+       !sys-apps/stat
+       !net-mail/base64
+       !sys-apps/mktemp
+       !<app-forensics/tct-1.18-r1
+       !<net-fs/netatalk-2.0.3-r4"
+
+pkg_setup() {
+       if use test ; then
+               python-any-r1_pkg_setup
+       fi
+}
+
+src_unpack() {
+       if [[ ${PV} == 9999 ]] ; then
+               git-r3_src_unpack
+
+               cd "${S}" || die
+               ./bootstrap || die
+
+               sed -i -e "s:submodule-checks ?= no-submodule-changes 
public-submodule-commit:submodule-checks ?= no-submodule-changes:" 
gnulib/top/maint.mk || die
+       elif use verify-sig ; then
+               # Needed for downloaded patch (which is unsigned, which is fine)
+               verify-sig_verify_detached "${DISTDIR}"/${P}.tar.xz{,.sig}
+       fi
+
+       default
+}
+
+src_prepare() {
+       local PATCHES=(
+               # Upstream patches
+               "${FILESDIR}"/${P}-cp-parents-preserve-permissions.patch
+       )
+
+       if ! use vanilla && [[ -d "${WORKDIR}"/patch ]] ; then
+               PATCHES+=( "${WORKDIR}"/patch )
+       fi
+
+       default
+
+       # Since we've patched many .c files, the make process will try to
+       # re-build the manpages by running `./bin --help`.  When doing a
+       # cross-compile, we can't do that since 'bin' isn't a native bin.
+       #
+       # Also, it's not like we changed the usage on any of these things,
+       # so let's just update the timestamps and skip the help2man step.
+       set -- man/*.x
+       touch ${@/%x/1} || die
+
+       # Avoid perl dep for compiled in dircolors default (bug #348642)
+       if ! has_version dev-lang/perl ; then
+               touch src/dircolors.h || die
+               touch ${@/%x/1} || die
+       fi
+}
+
+src_configure() {
+       local myconf=(
+               --with-packager="Gentoo"
+               --with-packager-version="${PVR} (p${PATCH_VER:-0})"
+               --with-packager-bug-reports="https://bugs.gentoo.org/";
+               # kill/uptime - procps
+               # groups/su   - shadow
+               # hostname    - net-tools
+               --enable-install-program="arch,$(usev hostname),$(usev kill)"
+               --enable-no-install-program="groups,$(usev !hostname),$(usev 
!kill),su,uptime"
+               $(usex caps '' --disable-libcap)
+               $(use_enable nls)
+               $(use_enable acl)
+               $(use_enable multicall single-binary)
+               $(use_enable xattr)
+               $(use_with gmp libgmp)
+               $(use_with openssl)
+       )
+
+       if use gmp ; then
+               myconf+=( --with-libgmp-prefix="${ESYSROOT}"/usr )
+       fi
+
+       if tc-is-cross-compiler && [[ ${CHOST} == *linux* ]] ; then
+               # bug #311569
+               export fu_cv_sys_stat_statfs2_bsize=yes
+               # bug #416629
+               export gl_cv_func_realpath_works=yes
+       fi
+
+       # bug #409919
+       export gl_cv_func_mknod_works=yes
+
+       if use static ; then
+               append-ldflags -static
+               # bug #321821
+               sed -i '/elf_sys=yes/s:yes:no:' configure || die
+       fi
+
+       if ! use selinux ; then
+               # bug #301782
+               export 
ac_cv_{header_selinux_{context,flash,selinux}_h,search_setfilecon}=no
+       fi
+
+       econf "${myconf[@]}"
+}
+
+src_test() {
+       # Known to fail with FEATURES=usersandbox (bug #439574):
+       #   -  tests/du/long-from-unreadable.sh} (bug #413621)
+       #   -  tests/rm/deep-2.sh (bug #413621)
+       #   -  tests/dd/no-allocate.sh (bug #629660)
+       if has usersandbox ${FEATURES} ; then
+               ewarn "You are emerging ${P} with 'usersandbox' enabled." \
+                       "Expect some test failures or emerge with 
'FEATURES=-usersandbox'!"
+       fi
+
+       # Non-root tests will fail if the full path isn't
+       # accessible to non-root users
+       chmod -R go-w "${WORKDIR}" || die
+       chmod a+rx "${WORKDIR}" || die
+
+       # coreutils tests like to do `mount` and such with temp dirs,
+       # so make sure:
+       # - /etc/mtab is writable (bug #265725)
+       # - /dev/loop* can be mounted (bug #269758)
+       mkdir -p "${T}"/mount-wrappers || die
+       mkwrap() {
+               local w ww
+               for w in "${@}" ; do
+                       ww="${T}/mount-wrappers/${w}"
+                       cat <<-EOF > "${ww}"
+                               #!${EPREFIX}/bin/sh
+                               exec env 
SANDBOX_WRITE="\${SANDBOX_WRITE}:/etc/mtab:/dev/loop" $(type -P ${w}) "\$@"
+                       EOF
+                       chmod a+rx "${ww}" || die
+               done
+       }
+       mkwrap mount umount
+
+       addwrite /dev/full
+       #export RUN_EXPENSIVE_TESTS="yes"
+       #export FETISH_GROUPS="portage wheel"
+       env PATH="${T}/mount-wrappers:${PATH}" gl_public_submodule_commit= \
+               emake -k check VERBOSE=yes
+}
+
+src_install() {
+       default
+
+       insinto /etc
+       newins src/dircolors.hin DIR_COLORS
+
+       if use split-usr ; then
+               cd "${ED}"/usr/bin || die
+               dodir /bin
+
+               # Move critical binaries into /bin (required by FHS)
+               local fhs="cat chgrp chmod chown cp date dd df echo false ln ls
+                          mkdir mknod mv pwd rm rmdir stty sync true uname"
+               mv ${fhs} ../../bin/ || die "Could not move FHS bins!"
+
+               if use hostname ; then
+                       mv hostname ../../bin/ || die
+               fi
+
+               if use kill ; then
+                       mv kill ../../bin/ || die
+               fi
+
+               # Move critical binaries into /bin (common scripts)
+               # (Why are these required for booting?)
+               local com="basename chroot cut dir dirname du env expr head 
mkfifo
+                          mktemp readlink seq sleep sort tail touch tr tty 
vdir wc yes"
+               mv ${com} ../../bin/ || die "Could not move common bins!"
+
+               # Create a symlink for uname in /usr/bin/ since autotools 
require it.
+               # (Other than uname, we need to figure out why we are
+               # creating symlinks for these in /usr/bin instead of leaving
+               # the files there in the first place...)
+               local x
+               for x in ${com} uname ; do
+                       dosym ../../bin/${x} /usr/bin/${x}
+               done
+       fi
+}
+
+pkg_postinst() {
+       ewarn "Make sure you run 'hash -r' in your active shells."
+       ewarn "You should also re-source your shell settings for LS_COLORS"
+       ewarn "  changes, such as: source /etc/profile"
+}

diff --git 
a/sys-apps/coreutils/files/coreutils-9.3-cp-parents-preserve-permissions.patch 
b/sys-apps/coreutils/files/coreutils-9.3-cp-parents-preserve-permissions.patch
new file mode 100644
index 000000000000..c8f2a9bb4956
--- /dev/null
+++ 
b/sys-apps/coreutils/files/coreutils-9.3-cp-parents-preserve-permissions.patch
@@ -0,0 +1,86 @@
+https://git.savannah.gnu.org/cgit/coreutils.git/commit/?id=c6b1fe43474b48a6bf5793e11cc1d0d6e895fdf4
+
+From c6b1fe43474b48a6bf5793e11cc1d0d6e895fdf4 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?P=C3=A1draig=20Brady?= <[email protected]>
+Date: Wed, 3 May 2023 17:01:37 +0100
+Subject: cp: -p --parents: fix failure to preserve permissions for absolute
+ paths
+
+* src/cp.c (re_protect): Ensure copy_acl() is passed an absolute path.
+* tests/cp/cp-parents.sh: Add a test case.
+* NEWS: Mention the bug.
+Fixes https://bugs.gnu.org/63245
+--- a/src/cp.c
++++ b/src/cp.c
+@@ -296,15 +296,19 @@ regular file.\n\
+    when done.  */
+ 
+ static bool
+-re_protect (char const *const_dst_name, int dst_dirfd, char const 
*dst_relname,
++re_protect (char const *const_dst_name, int dst_dirfd, char const 
*dst_fullname,
+             struct dir_attr *attr_list, const struct cp_options *x)
+ {
+   struct dir_attr *p;
+   char *dst_name;             /* A copy of CONST_DST_NAME we can change. */
+-  char *src_name;             /* The source name in 'dst_name'. */
++  char *src_name;             /* The relative source name in 'dst_name'. */
++  char *full_src_name;                /* The full source name in 'dst_name'. 
*/
+ 
+   ASSIGN_STRDUPA (dst_name, const_dst_name);
+-  src_name = dst_name + (dst_relname - const_dst_name);
++  full_src_name = dst_name + (dst_fullname - const_dst_name);
++  src_name = full_src_name;
++  while (*src_name == '/')
++    src_name++;
+ 
+   for (p = attr_list; p; p = p->next)
+     {
+@@ -347,7 +351,7 @@ re_protect (char const *const_dst_name, int dst_dirfd, 
char const *dst_relname,
+ 
+       if (x->preserve_mode)
+         {
+-          if (copy_acl (src_name, -1, dst_name, -1, p->st.st_mode) != 0)
++          if (copy_acl (full_src_name, -1, dst_name, -1, p->st.st_mode) != 0)
+             return false;
+         }
+       else if (p->restore_mode)
+@@ -687,6 +691,7 @@ do_copy (int n_files, char **file, char const 
*target_directory,
+           bool parent_exists = true;  /* True if dir_name (dst_name) exists. 
*/
+           struct dir_attr *attr_list;
+           char *arg_in_concat = NULL;
++          char *full_arg_in_concat = NULL;
+           char *arg = file[i];
+ 
+           /* Trailing slashes are meaningful (i.e., maybe worth preserving)
+@@ -719,6 +724,7 @@ do_copy (int n_files, char **file, char const 
*target_directory,
+                   (x->verbose ? "%s -> %s\n" : NULL),
+                   &attr_list, &new_dst, x));
+ 
++              full_arg_in_concat = arg_in_concat;
+               while (*arg_in_concat == '/')
+                 arg_in_concat++;
+             }
+@@ -747,7 +753,7 @@ do_copy (int n_files, char **file, char const 
*target_directory,
+                           new_dst, x, &copy_into_self, NULL);
+ 
+               if (parents_option)
+-                ok &= re_protect (dst_name, target_dirfd, arg_in_concat,
++                ok &= re_protect (dst_name, target_dirfd, full_arg_in_concat,
+                                   attr_list, x);
+             }
+ 
+--- a/tests/cp/cp-parents.sh
++++ b/tests/cp/cp-parents.sh
+@@ -66,4 +66,10 @@ p=$(ls -ld g/sym/b/c|cut -b-10); case $p in drwxr-xr-x);; 
*) fail=1;; esac
+ cp --parents --no-preserve=mode np/b/file np_dest/ || fail=1
+ p=$(ls -ld np_dest/np|cut -b-10); case $p in drwxr-xr-x);; *) fail=1;; esac
+ 
++# coreutils 9.1-9.3 inclusive would fail to copy acls for absolute dirs
++mkdir dest || framework_failure_
++if test -f /bin/ls; then
++  cp -t dest --parents -p /bin/ls || fail=1
++fi
++
+ Exit $fail
+-- 
+cgit v1.1

Reply via email to