1 |
flameeyes 10/10/30 17:54:35 |
2 |
|
3 |
Modified: ChangeLog |
4 |
Added: libvirt-0.8.5-r1.ebuild |
5 |
Removed: libvirt-0.8.5.ebuild |
6 |
Log: |
7 |
Bump backports with a patch of mine to fix bug #329427 (USB devices can't be accessed with enabled cgroup), and one (fixed) from Eric Blake to fix bug #343353 (build failure with USE=xen). |
8 |
|
9 |
(Portage version: 2.2.0_alpha2/cvs/Linux x86_64) |
10 |
|
11 |
Revision Changes Path |
12 |
1.79 app-emulation/libvirt/ChangeLog |
13 |
|
14 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/app-emulation/libvirt/ChangeLog?rev=1.79&view=markup |
15 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/app-emulation/libvirt/ChangeLog?rev=1.79&content-type=text/plain |
16 |
diff : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/app-emulation/libvirt/ChangeLog?r1=1.78&r2=1.79 |
17 |
|
18 |
Index: ChangeLog |
19 |
=================================================================== |
20 |
RCS file: /var/cvsroot/gentoo-x86/app-emulation/libvirt/ChangeLog,v |
21 |
retrieving revision 1.78 |
22 |
retrieving revision 1.79 |
23 |
diff -u -r1.78 -r1.79 |
24 |
--- ChangeLog 29 Oct 2010 17:17:42 -0000 1.78 |
25 |
+++ ChangeLog 30 Oct 2010 17:54:35 -0000 1.79 |
26 |
@@ -1,6 +1,14 @@ |
27 |
# ChangeLog for app-emulation/libvirt |
28 |
# Copyright 1999-2010 Gentoo Foundation; Distributed under the GPL v2 |
29 |
-# $Header: /var/cvsroot/gentoo-x86/app-emulation/libvirt/ChangeLog,v 1.78 2010/10/29 17:17:42 flameeyes Exp $ |
30 |
+# $Header: /var/cvsroot/gentoo-x86/app-emulation/libvirt/ChangeLog,v 1.79 2010/10/30 17:54:35 flameeyes Exp $ |
31 |
+ |
32 |
+*libvirt-0.8.5-r1 (30 Oct 2010) |
33 |
+ |
34 |
+ 30 Oct 2010; Diego E. Pettenò <flameeyes@g.o> |
35 |
+ -libvirt-0.8.5.ebuild, +libvirt-0.8.5-r1.ebuild: |
36 |
+ Bump backports with a patch of mine to fix bug #329427 (USB devices can't |
37 |
+ be accessed with enabled cgroup), and one (fixed) from Eric Blake to fix |
38 |
+ bug #343353 (build failure with USE=xen). |
39 |
|
40 |
29 Oct 2010; Diego E. Pettenò <flameeyes@g.o> metadata.xml: |
41 |
Update and try to put order into USE flags descriptions. |
42 |
|
43 |
|
44 |
|
45 |
1.1 app-emulation/libvirt/libvirt-0.8.5-r1.ebuild |
46 |
|
47 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/app-emulation/libvirt/libvirt-0.8.5-r1.ebuild?rev=1.1&view=markup |
48 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/app-emulation/libvirt/libvirt-0.8.5-r1.ebuild?rev=1.1&content-type=text/plain |
49 |
|
50 |
Index: libvirt-0.8.5-r1.ebuild |
51 |
=================================================================== |
52 |
# Copyright 1999-2010 Gentoo Foundation |
53 |
# Distributed under the terms of the GNU General Public License v2 |
54 |
# $Header: /var/cvsroot/gentoo-x86/app-emulation/libvirt/libvirt-0.8.5-r1.ebuild,v 1.1 2010/10/30 17:54:35 flameeyes Exp $ |
55 |
|
56 |
BACKPORTS=2 |
57 |
|
58 |
EAPI="2" |
59 |
|
60 |
PYTHON_DEPEND="python? 2:2.4" |
61 |
#RESTRICT_PYTHON_ABIS="3.*" |
62 |
#SUPPORT_PYTHON_ABIS="1" |
63 |
|
64 |
inherit eutils python autotools |
65 |
|
66 |
DESCRIPTION="C toolkit to manipulate virtual machines" |
67 |
HOMEPAGE="http://www.libvirt.org/" |
68 |
SRC_URI="http://libvirt.org/sources/${P}.tar.gz |
69 |
${BACKPORTS:+ |
70 |
http://dev.gentoo.org/~flameeyes/${PN}/${P}-backports-${BACKPORTS}.tar.bz2 |
71 |
http://dev.gentoo.org/~cardoe/${PN}/${P}-backports-${BACKPORTS}.tar.bz2}" |
72 |
LICENSE="LGPL-2.1" |
73 |
SLOT="0" |
74 |
KEYWORDS="~amd64 ~x86" |
75 |
IUSE="avahi caps debug iscsi +libvirtd lvm +lxc macvtap +network nfs nls \ |
76 |
numa openvz parted pcap phyp policykit python qemu sasl selinux |
77 |
uml virtualbox xen udev +json" |
78 |
# IUSE=one : bug #293416 & bug #299011 |
79 |
|
80 |
RDEPEND="sys-libs/readline |
81 |
sys-libs/ncurses |
82 |
>=net-misc/curl-7.18.0 |
83 |
>=dev-libs/libxml2-2.7.6 |
84 |
>=dev-libs/libnl-1.1 |
85 |
>=net-libs/gnutls-1.0.25 |
86 |
sys-fs/sysfsutils |
87 |
sys-apps/util-linux |
88 |
>=net-analyzer/netcat6-1.0-r2 |
89 |
avahi? ( >=net-dns/avahi-0.6[dbus] ) |
90 |
caps? ( sys-libs/libcap-ng ) |
91 |
iscsi? ( sys-block/open-iscsi ) |
92 |
libvirtd? ( net-misc/bridge-utils ) |
93 |
lvm? ( >=sys-fs/lvm2-2.02.48-r2 ) |
94 |
macvtap? ( >=dev-libs/libnl-1.1 ) |
95 |
nfs? ( net-fs/nfs-utils ) |
96 |
numa? ( sys-process/numactl ) |
97 |
openvz? ( sys-kernel/openvz-sources ) |
98 |
parted? ( >=sys-block/parted-1.8[device-mapper] ) |
99 |
pcap? ( >=net-libs/libpcap-1.0.0 ) |
100 |
phyp? ( net-libs/libssh2 ) |
101 |
policykit? ( >=sys-auth/polkit-0.9 ) |
102 |
qemu? ( || ( app-emulation/qemu-kvm >=app-emulation/qemu-0.10.0 app-emulation/qemu-kvm-spice ) ) |
103 |
sasl? ( dev-libs/cyrus-sasl ) |
104 |
selinux? ( >=sys-libs/libselinux-2.0.85 ) |
105 |
virtualbox? ( || ( >=app-emulation/virtualbox-ose-2.2.0 >=app-emulation/virtualbox-bin-2.2.0 ) ) |
106 |
xen? ( app-emulation/xen-tools app-emulation/xen ) |
107 |
udev? ( >=sys-fs/udev-145 >=x11-libs/libpciaccess-0.10.9 ) |
108 |
json? ( dev-libs/yajl )" |
109 |
# one? ( dev-libs/xmlrpc-c ) |
110 |
DEPEND="${RDEPEND} |
111 |
dev-util/pkgconfig |
112 |
nls? ( sys-devel/gettext )" |
113 |
|
114 |
pkg_setup() { |
115 |
python_set_active_version 2 |
116 |
} |
117 |
|
118 |
src_prepare() { |
119 |
[[ -n ${BACKPORTS} ]] && \ |
120 |
EPATCH_FORCE=yes EPATCH_SUFFIX="patch" EPATCH_SOURCE="${S}/patches" \ |
121 |
epatch |
122 |
|
123 |
eautoreconf |
124 |
} |
125 |
|
126 |
src_configure() { |
127 |
local myconf="" |
128 |
|
129 |
myconf="${myconf} $(use_enable debug)" |
130 |
|
131 |
## enable/disable daemon, otherwise client only utils |
132 |
myconf="${myconf} $(use_with libvirtd)" |
133 |
|
134 |
## enable/disable the daemon using avahi to find VMs |
135 |
myconf="${myconf} $(use_with avahi)" |
136 |
|
137 |
## hypervisors on the local host |
138 |
myconf="${myconf} $(use_with xen) $(use_with xen xen-inotify)" |
139 |
if ! use policykit && use xen; then |
140 |
myconf="${myconf} --with-xen-proxy" |
141 |
fi |
142 |
myconf="${myconf} $(use_with openvz)" |
143 |
myconf="${myconf} $(use_with lxc)" |
144 |
if use virtualbox && has_version app-emulation/virtualbox-ose; then |
145 |
myconf="${myconf} --with-vbox=/usr/lib/virtualbox-ose/" |
146 |
else |
147 |
myconf="${myconf} $(use_with virtualbox vbox)" |
148 |
fi |
149 |
myconf="${myconf} $(use_with uml)" |
150 |
myconf="${myconf} $(use_with qemu)" |
151 |
# doesn't belong with hypervisors but links to libvirtd for some reason |
152 |
#myconf="${myconf} $(use_with one)" |
153 |
|
154 |
## hypervisor protocols |
155 |
myconf="${myconf} $(use_with phyp)" |
156 |
myconf="${myconf} --with-esx" |
157 |
|
158 |
## additional host drivers |
159 |
myconf="${myconf} $(use_with network)" |
160 |
myconf="${myconf} --with-storage-fs" |
161 |
myconf="${myconf} $(use_with lvm storage-lvm)" |
162 |
myconf="${myconf} $(use_with iscsi storage-iscsi)" |
163 |
myconf="${myconf} $(use_with parted storage-disk)" |
164 |
myconf="${myconf} $(use_with lvm storage-mpath)" |
165 |
myconf="${myconf} $(use_with numa numactl)" |
166 |
myconf="${myconf} $(use_with selinux)" |
167 |
|
168 |
# udev for device support details |
169 |
myconf="${myconf} $(use_with udev)" |
170 |
|
171 |
# linux capability support so we don't need privileged accounts |
172 |
myconf="${myconf} $(use_with caps capng)" |
173 |
|
174 |
## auth stuff |
175 |
myconf="${myconf} $(use_with policykit polkit)" |
176 |
myconf="${myconf} $(use_with sasl)" |
177 |
|
178 |
# network biits |
179 |
myconf="${myconf} $(use_with pcap libpcap)" |
180 |
myconf="${myconf} $(use_with macvtap)" |
181 |
|
182 |
## other |
183 |
myconf="${myconf} $(use_enable nls)" |
184 |
myconf="${myconf} $(use_with python)" |
185 |
myconf="${myconf} $(use_with json yajl)" |
186 |
|
187 |
## stuff we don't yet support |
188 |
myconf="${myconf} --without-netcf --without-audit" |
189 |
|
190 |
# we use udev over hal |
191 |
myconf="${myconf} --without-hal" |
192 |
|
193 |
# this is a nasty trick to work around the problem in bug |
194 |
# #275073. The reason why we don't solve this properly is that |
195 |
# it'll require us to rebuild autotools (and we don't really want |
196 |
# to do that right now). The proper solution has been sent |
197 |
# upstream and should hopefully land in 0.7.7, in the mean time, |
198 |
# mime the same functionality with this. |
199 |
case ${CHOST} in |
200 |
*cygwin* | *mingw* ) |
201 |
;; |
202 |
*) |
203 |
ac_cv_prog_WINDRES=no |
204 |
;; |
205 |
esac |
206 |
|
207 |
econf \ |
208 |
${myconf} \ |
209 |
--disable-static \ |
210 |
--docdir=/usr/share/doc/${PF} \ |
211 |
--with-remote \ |
212 |
--localstatedir=/var \ |
213 |
--with-remote-pid-file=/var/run/libvirtd.pid |
214 |
} |
215 |
|
216 |
src_test() { |
217 |
# Explicitly allow parallel build of tests |
218 |
emake check || die "tests failed" |
219 |
} |
220 |
|
221 |
src_install() { |
222 |
emake install \ |
223 |
DESTDIR="${D}" \ |
224 |
HTML_DIR=/usr/share/doc/${PF}/html \ |
225 |
DOCS_DIR=/usr/share/doc/${PF}/python \ |
226 |
EXAMPLE_DIR=/usr/share/doc/${PF}/python/examples \ |
227 |
|| die "emake install failed" |
228 |
|
229 |
find "${D}" -name '*.la' -delete || die |
230 |
|
231 |
use libvirtd || return 0 |
232 |
# From here, only libvirtd-related instructions, be warned! |
233 |
|
234 |
newinitd "${FILESDIR}/libvirtd.init-r1" libvirtd || die |
235 |
newconfd "${FILESDIR}/libvirtd.confd-r1" libvirtd || die |
236 |
|
237 |
keepdir /var/lib/libvirt/images |
238 |
} |
239 |
|
240 |
pkg_preinst() { |
241 |
# we only ever want to generate this once |
242 |
if [[ -e "${ROOT}"/etc/libvirt/qemu/networks/default.xml ]]; then |
243 |
rm -rf "${D}"/etc/libvirt/qemu/networks/default.xml |
244 |
fi |
245 |
|
246 |
# We really don't want to use or support old PolicyKit cause it |
247 |
# screws with the new polkit integration |
248 |
if has_version sys-auth/policykit; then |
249 |
rm -rf "${D}"/usr/share/PolicyKit/policy/org.libvirt.unix.policy |
250 |
fi |
251 |
} |
252 |
|
253 |
pkg_postinst() { |
254 |
use python && python_mod_optimize $(python_get_sitedir)/libvirt.py |
255 |
|
256 |
elog |
257 |
if use policykit && has_version sys-auth/policykit; then |
258 |
elog "You must have run the following at least once:" |
259 |
elog |
260 |
elog "$ polkit-auth --grant org.libvirt.unix.manage --user \"USERNAME\"" |
261 |
elog |
262 |
elog "to grant USERNAME access to libvirt when using USE=policykit" |
263 |
else |
264 |
elog "To allow normal users to connect to libvirtd you must change the" |
265 |
elog " unix sock group and/or perms in /etc/libvirt/libvirtd.conf" |
266 |
fi |
267 |
|
268 |
use libvirtd || return 0 |
269 |
# From here, only libvirtd-related instructions, be warned! |
270 |
|
271 |
elog |
272 |
elog "For the basic networking support (bridged and routed networks)" |
273 |
elog "you don't need any extra software. For more complex network modes" |
274 |
elog "including but not limited to NATed network, you'll need the" |
275 |
elog "following packages": |
276 |
elog |
277 |
elog " net-dns/dnsmasq" |
278 |
elog " >=net-firewall/iptables-1.4.9" |
279 |
elog " net-firewall/ebtables" |
280 |
elog |
281 |
if has_version net-dns/dnsmasq; then |
282 |
ewarn "If you have a DNS server setup on your machine, you will have" |
283 |
ewarn "to configure /etc/dnsmasq.conf to enable the following settings: " |
284 |
ewarn " bind-interfaces" |
285 |
ewarn " interface or except-interface" |
286 |
ewarn |
287 |
ewarn "Otherwise you might have issues with your existing DNS server." |
288 |
fi |
289 |
} |
290 |
|
291 |
pkg_postrm() { |
292 |
use python && python_mod_cleanup $(python_get_sitedir)/libvirt.py |
293 |
} |