1 |
pacho 13/03/28 17:04:38 |
2 |
|
3 |
Modified: ChangeLog |
4 |
Added: gnome-keyring-3.8.0.ebuild |
5 |
Log: |
6 |
Version bump for Gnome 3.8 |
7 |
|
8 |
(Portage version: 2.1.11.58/cvs/Linux x86_64, signed Manifest commit with key A188FBD4) |
9 |
|
10 |
Revision Changes Path |
11 |
1.229 gnome-base/gnome-keyring/ChangeLog |
12 |
|
13 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/ChangeLog?rev=1.229&view=markup |
14 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/ChangeLog?rev=1.229&content-type=text/plain |
15 |
diff : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/ChangeLog?r1=1.228&r2=1.229 |
16 |
|
17 |
Index: ChangeLog |
18 |
=================================================================== |
19 |
RCS file: /var/cvsroot/gentoo-x86/gnome-base/gnome-keyring/ChangeLog,v |
20 |
retrieving revision 1.228 |
21 |
retrieving revision 1.229 |
22 |
diff -u -r1.228 -r1.229 |
23 |
--- ChangeLog 7 Mar 2013 08:34:55 -0000 1.228 |
24 |
+++ ChangeLog 28 Mar 2013 17:04:38 -0000 1.229 |
25 |
@@ -1,6 +1,11 @@ |
26 |
# ChangeLog for gnome-base/gnome-keyring |
27 |
# Copyright 1999-2013 Gentoo Foundation; Distributed under the GPL v2 |
28 |
-# $Header: /var/cvsroot/gentoo-x86/gnome-base/gnome-keyring/ChangeLog,v 1.228 2013/03/07 08:34:55 eva Exp $ |
29 |
+# $Header: /var/cvsroot/gentoo-x86/gnome-base/gnome-keyring/ChangeLog,v 1.229 2013/03/28 17:04:38 pacho Exp $ |
30 |
+ |
31 |
+*gnome-keyring-3.8.0 (28 Mar 2013) |
32 |
+ |
33 |
+ 28 Mar 2013; Pacho Ramos <pacho@g.o> +gnome-keyring-3.8.0.ebuild: |
34 |
+ Version bump for Gnome 3.8 |
35 |
|
36 |
07 Mar 2013; Gilles Dartiguelongue <eva@g.o> |
37 |
-gnome-keyring-3.4.1-r1.ebuild, |
38 |
|
39 |
|
40 |
|
41 |
1.1 gnome-base/gnome-keyring/gnome-keyring-3.8.0.ebuild |
42 |
|
43 |
file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/gnome-keyring-3.8.0.ebuild?rev=1.1&view=markup |
44 |
plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/gnome-keyring-3.8.0.ebuild?rev=1.1&content-type=text/plain |
45 |
|
46 |
Index: gnome-keyring-3.8.0.ebuild |
47 |
=================================================================== |
48 |
# Copyright 1999-2013 Gentoo Foundation |
49 |
# Distributed under the terms of the GNU General Public License v2 |
50 |
# $Header: /var/cvsroot/gentoo-x86/gnome-base/gnome-keyring/gnome-keyring-3.8.0.ebuild,v 1.1 2013/03/28 17:04:38 pacho Exp $ |
51 |
|
52 |
EAPI="5" |
53 |
GCONF_DEBUG="yes" # Not gnome macro but similar |
54 |
GNOME2_LA_PUNT="yes" |
55 |
|
56 |
# Need to learn how fcaps.eclass works |
57 |
inherit gnome2 pam versionator virtualx |
58 |
|
59 |
DESCRIPTION="Password and keyring managing daemon" |
60 |
HOMEPAGE="http://live.gnome.org/GnomeKeyring" |
61 |
|
62 |
LICENSE="GPL-2+ LGPL-2+" |
63 |
SLOT="0" |
64 |
IUSE="+caps debug pam selinux" |
65 |
KEYWORDS="~alpha ~amd64 ~arm ~ia64 ~mips ~ppc ~ppc64 ~sh ~sparc ~x86 ~amd64-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~sparc-solaris ~x86-solaris" |
66 |
|
67 |
RDEPEND=" |
68 |
>=app-crypt/gcr-3.5.3:= |
69 |
>=dev-libs/glib-2.32.0:2 |
70 |
app-misc/ca-certificates |
71 |
>=dev-libs/libgcrypt-1.2.2:= |
72 |
>=sys-apps/dbus-1.1.1 |
73 |
caps? ( sys-libs/libcap-ng ) |
74 |
pam? ( virtual/pam ) |
75 |
" |
76 |
DEPEND="${RDEPEND} |
77 |
>=dev-util/intltool-0.35 |
78 |
sys-devel/gettext |
79 |
virtual/pkgconfig |
80 |
" |
81 |
PDEPEND=">=gnome-base/libgnome-keyring-3.1.92" |
82 |
# eautoreconf needs: |
83 |
# >=dev-util/gtk-doc-am-1.9 |
84 |
# gtk-doc-am is not needed otherwise (no gtk-docs are installed) |
85 |
|
86 |
src_prepare() { |
87 |
# Disable stupid CFLAGS |
88 |
sed -e 's/CFLAGS="$CFLAGS -g"//' \ |
89 |
-e 's/CFLAGS="$CFLAGS -O0"//' \ |
90 |
-i configure.ac configure || die |
91 |
|
92 |
# FIXME: some tests write to /tmp (instead of TMPDIR) |
93 |
# Disable failing tests |
94 |
sed -e '/g_test_add.*test_remove_file_abort/d' \ |
95 |
-e '/g_test_add.*test_write_file/d' \ |
96 |
-e '/g_test_add.*write_large_file/,+2 c\ {}; \ ' \ |
97 |
-e '/g_test_add.*test_write_file_abort_.*/d' \ |
98 |
-e '/g_test_add.*test_unique_file_conflict.*/d' \ |
99 |
-i pkcs11/gkm/tests/test-transaction.c || die |
100 |
sed -e '/g_test_add.*test_create_assertion_complete_on_token/d' \ |
101 |
-i pkcs11/xdg-store/tests/test-xdg-trust.c || die |
102 |
sed -e '/g_test_add.*gnome2-store.import.pkcs12/,+1 d' \ |
103 |
-i pkcs11/gnome2-store/tests/test-import.c || die |
104 |
|
105 |
gnome2_src_prepare |
106 |
} |
107 |
|
108 |
src_configure() { |
109 |
G2CONF="${G2CONF} |
110 |
$(use_with caps libcap-ng) |
111 |
$(use_enable pam) |
112 |
$(use_with pam pam-dir $(getpam_mod_dir)) |
113 |
$(use_enable selinux) |
114 |
--with-root-certs=${EPREFIX}/etc/ssl/certs/ |
115 |
--with-ca-certificates=${EPREFIX}/etc/ssl/certs/ca-certificates.crt |
116 |
--enable-ssh-agent |
117 |
--enable-gpg-agent" |
118 |
gnome2_src_configure |
119 |
} |
120 |
|
121 |
src_test() { |
122 |
unset DBUS_SESSION_BUS_ADDRESS |
123 |
Xemake check |
124 |
} |
125 |
|
126 |
pkg_postinst() { |
127 |
use caps && fcaps 0:0 755 cap_ipc_lock "${EROOT}"/usr/bin/gnome-keyring-daemon |
128 |
gnome2_pkg_postinst |
129 |
} |
130 |
|
131 |
# borrowed from GSoC2010_Gentoo_Capabilities by constanze and Flameeyes |
132 |
# @FUNCTION: fcaps |
133 |
# @USAGE: fcaps {uid:gid} {file-mode} {cap1[,cap2,...]} {file} |
134 |
# @RETURN: 0 if all okay; non-zero if failure and fallback |
135 |
# @DESCRIPTION: |
136 |
# fcaps sets the specified capabilities in the effective and permitted set of |
137 |
# the given file. In case of failure fcaps sets the given file-mode. |
138 |
# Requires versionator.eclass |
139 |
fcaps() { |
140 |
local uid_gid=$1 |
141 |
local perms=$2 |
142 |
local capset=$3 |
143 |
local path=$4 |
144 |
local res |
145 |
|
146 |
chmod $perms $path && \ |
147 |
chown $uid_gid $path |
148 |
res=$? |
149 |
|
150 |
use caps || return $res |
151 |
|
152 |
#set the capability |
153 |
setcap "$capset=ep" "$path" &> /dev/null |
154 |
#check if the capability got set correctly |
155 |
setcap -v "$capset=ep" "$path" &> /dev/null |
156 |
res=$? |
157 |
|
158 |
if [ $res -ne 0 ]; then |
159 |
ewarn "Failed to set capabilities. Probable reason is missing kernel support." |
160 |
ewarn "Your kernel must have <FS>_FS_SECURITY enabled (e.g. EXT4_FS_SECURITY)" |
161 |
ewarn "where <FS> is the filesystem to store ${path}" |
162 |
if ! version_is_at_least 2.6.33 "$(uname -r)"; then |
163 |
ewarn "For kernel 2.6.32 or older, you will also need to enable" |
164 |
ewarn "SECURITY_FILE_CAPABILITIES." |
165 |
fi |
166 |
ewarn |
167 |
ewarn "Falling back to suid now..." |
168 |
chmod u+s ${path} |
169 |
fi |
170 |
return $res |
171 |
} |