Gentoo Archives: gentoo-commits

From: "Pacho Ramos (pacho)" <pacho@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo-x86 commit in gnome-base/gnome-keyring: gnome-keyring-3.8.0.ebuild ChangeLog
Date: Thu, 28 Mar 2013 17:04:44
Message-Id: 20130328170438.D5DEF2171D@flycatcher.gentoo.org
1 pacho 13/03/28 17:04:38
2
3 Modified: ChangeLog
4 Added: gnome-keyring-3.8.0.ebuild
5 Log:
6 Version bump for Gnome 3.8
7
8 (Portage version: 2.1.11.58/cvs/Linux x86_64, signed Manifest commit with key A188FBD4)
9
10 Revision Changes Path
11 1.229 gnome-base/gnome-keyring/ChangeLog
12
13 file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/ChangeLog?rev=1.229&view=markup
14 plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/ChangeLog?rev=1.229&content-type=text/plain
15 diff : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/ChangeLog?r1=1.228&r2=1.229
16
17 Index: ChangeLog
18 ===================================================================
19 RCS file: /var/cvsroot/gentoo-x86/gnome-base/gnome-keyring/ChangeLog,v
20 retrieving revision 1.228
21 retrieving revision 1.229
22 diff -u -r1.228 -r1.229
23 --- ChangeLog 7 Mar 2013 08:34:55 -0000 1.228
24 +++ ChangeLog 28 Mar 2013 17:04:38 -0000 1.229
25 @@ -1,6 +1,11 @@
26 # ChangeLog for gnome-base/gnome-keyring
27 # Copyright 1999-2013 Gentoo Foundation; Distributed under the GPL v2
28 -# $Header: /var/cvsroot/gentoo-x86/gnome-base/gnome-keyring/ChangeLog,v 1.228 2013/03/07 08:34:55 eva Exp $
29 +# $Header: /var/cvsroot/gentoo-x86/gnome-base/gnome-keyring/ChangeLog,v 1.229 2013/03/28 17:04:38 pacho Exp $
30 +
31 +*gnome-keyring-3.8.0 (28 Mar 2013)
32 +
33 + 28 Mar 2013; Pacho Ramos <pacho@g.o> +gnome-keyring-3.8.0.ebuild:
34 + Version bump for Gnome 3.8
35
36 07 Mar 2013; Gilles Dartiguelongue <eva@g.o>
37 -gnome-keyring-3.4.1-r1.ebuild,
38
39
40
41 1.1 gnome-base/gnome-keyring/gnome-keyring-3.8.0.ebuild
42
43 file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/gnome-keyring-3.8.0.ebuild?rev=1.1&view=markup
44 plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/gnome-keyring-3.8.0.ebuild?rev=1.1&content-type=text/plain
45
46 Index: gnome-keyring-3.8.0.ebuild
47 ===================================================================
48 # Copyright 1999-2013 Gentoo Foundation
49 # Distributed under the terms of the GNU General Public License v2
50 # $Header: /var/cvsroot/gentoo-x86/gnome-base/gnome-keyring/gnome-keyring-3.8.0.ebuild,v 1.1 2013/03/28 17:04:38 pacho Exp $
51
52 EAPI="5"
53 GCONF_DEBUG="yes" # Not gnome macro but similar
54 GNOME2_LA_PUNT="yes"
55
56 # Need to learn how fcaps.eclass works
57 inherit gnome2 pam versionator virtualx
58
59 DESCRIPTION="Password and keyring managing daemon"
60 HOMEPAGE="http://live.gnome.org/GnomeKeyring"
61
62 LICENSE="GPL-2+ LGPL-2+"
63 SLOT="0"
64 IUSE="+caps debug pam selinux"
65 KEYWORDS="~alpha ~amd64 ~arm ~ia64 ~mips ~ppc ~ppc64 ~sh ~sparc ~x86 ~amd64-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~sparc-solaris ~x86-solaris"
66
67 RDEPEND="
68 >=app-crypt/gcr-3.5.3:=
69 >=dev-libs/glib-2.32.0:2
70 app-misc/ca-certificates
71 >=dev-libs/libgcrypt-1.2.2:=
72 >=sys-apps/dbus-1.1.1
73 caps? ( sys-libs/libcap-ng )
74 pam? ( virtual/pam )
75 "
76 DEPEND="${RDEPEND}
77 >=dev-util/intltool-0.35
78 sys-devel/gettext
79 virtual/pkgconfig
80 "
81 PDEPEND=">=gnome-base/libgnome-keyring-3.1.92"
82 # eautoreconf needs:
83 # >=dev-util/gtk-doc-am-1.9
84 # gtk-doc-am is not needed otherwise (no gtk-docs are installed)
85
86 src_prepare() {
87 # Disable stupid CFLAGS
88 sed -e 's/CFLAGS="$CFLAGS -g"//' \
89 -e 's/CFLAGS="$CFLAGS -O0"//' \
90 -i configure.ac configure || die
91
92 # FIXME: some tests write to /tmp (instead of TMPDIR)
93 # Disable failing tests
94 sed -e '/g_test_add.*test_remove_file_abort/d' \
95 -e '/g_test_add.*test_write_file/d' \
96 -e '/g_test_add.*write_large_file/,+2 c\ {}; \ ' \
97 -e '/g_test_add.*test_write_file_abort_.*/d' \
98 -e '/g_test_add.*test_unique_file_conflict.*/d' \
99 -i pkcs11/gkm/tests/test-transaction.c || die
100 sed -e '/g_test_add.*test_create_assertion_complete_on_token/d' \
101 -i pkcs11/xdg-store/tests/test-xdg-trust.c || die
102 sed -e '/g_test_add.*gnome2-store.import.pkcs12/,+1 d' \
103 -i pkcs11/gnome2-store/tests/test-import.c || die
104
105 gnome2_src_prepare
106 }
107
108 src_configure() {
109 G2CONF="${G2CONF}
110 $(use_with caps libcap-ng)
111 $(use_enable pam)
112 $(use_with pam pam-dir $(getpam_mod_dir))
113 $(use_enable selinux)
114 --with-root-certs=${EPREFIX}/etc/ssl/certs/
115 --with-ca-certificates=${EPREFIX}/etc/ssl/certs/ca-certificates.crt
116 --enable-ssh-agent
117 --enable-gpg-agent"
118 gnome2_src_configure
119 }
120
121 src_test() {
122 unset DBUS_SESSION_BUS_ADDRESS
123 Xemake check
124 }
125
126 pkg_postinst() {
127 use caps && fcaps 0:0 755 cap_ipc_lock "${EROOT}"/usr/bin/gnome-keyring-daemon
128 gnome2_pkg_postinst
129 }
130
131 # borrowed from GSoC2010_Gentoo_Capabilities by constanze and Flameeyes
132 # @FUNCTION: fcaps
133 # @USAGE: fcaps {uid:gid} {file-mode} {cap1[,cap2,...]} {file}
134 # @RETURN: 0 if all okay; non-zero if failure and fallback
135 # @DESCRIPTION:
136 # fcaps sets the specified capabilities in the effective and permitted set of
137 # the given file. In case of failure fcaps sets the given file-mode.
138 # Requires versionator.eclass
139 fcaps() {
140 local uid_gid=$1
141 local perms=$2
142 local capset=$3
143 local path=$4
144 local res
145
146 chmod $perms $path && \
147 chown $uid_gid $path
148 res=$?
149
150 use caps || return $res
151
152 #set the capability
153 setcap "$capset=ep" "$path" &> /dev/null
154 #check if the capability got set correctly
155 setcap -v "$capset=ep" "$path" &> /dev/null
156 res=$?
157
158 if [ $res -ne 0 ]; then
159 ewarn "Failed to set capabilities. Probable reason is missing kernel support."
160 ewarn "Your kernel must have <FS>_FS_SECURITY enabled (e.g. EXT4_FS_SECURITY)"
161 ewarn "where <FS> is the filesystem to store ${path}"
162 if ! version_is_at_least 2.6.33 "$(uname -r)"; then
163 ewarn "For kernel 2.6.32 or older, you will also need to enable"
164 ewarn "SECURITY_FILE_CAPABILITIES."
165 fi
166 ewarn
167 ewarn "Falling back to suid now..."
168 chmod u+s ${path}
169 fi
170 return $res
171 }