Gentoo Archives: gentoo-commits

From: "Alexandre Rostovtsev (tetromino)" <tetromino@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] gentoo-x86 commit in gnome-base/gnome-keyring: ChangeLog gnome-keyring-3.2.2.ebuild gnome-keyring-3.0.3-r200.ebuild gnome-keyring-3.0.3-r300.ebuild
Date: Thu, 17 Nov 2011 06:09:33
Message-Id: 20111117060912.C362F2004C@flycatcher.gentoo.org
1 tetromino 11/11/17 06:09:12
2
3 Modified: ChangeLog
4 Added: gnome-keyring-3.2.2.ebuild
5 Removed: gnome-keyring-3.0.3-r200.ebuild
6 gnome-keyring-3.0.3-r300.ebuild
7 Log:
8 Bump, drop old. Notable changes: no longer autostarts in xfce and lxde (they don't support the new gnome-keyring dbus API), various bugfixes. Restrict tests since there seems to be no good way to reliably run them from portage.
9
10 (Portage version: 2.2.0_alpha74/cvs/Linux x86_64)
11
12 Revision Changes Path
13 1.215 gnome-base/gnome-keyring/ChangeLog
14
15 file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/ChangeLog?rev=1.215&view=markup
16 plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/ChangeLog?rev=1.215&content-type=text/plain
17 diff : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/ChangeLog?r1=1.214&r2=1.215
18
19 Index: ChangeLog
20 ===================================================================
21 RCS file: /var/cvsroot/gentoo-x86/gnome-base/gnome-keyring/ChangeLog,v
22 retrieving revision 1.214
23 retrieving revision 1.215
24 diff -u -r1.214 -r1.215
25 --- ChangeLog 30 Oct 2011 15:58:01 -0000 1.214
26 +++ ChangeLog 17 Nov 2011 06:09:12 -0000 1.215
27 @@ -1,6 +1,16 @@
28 # ChangeLog for gnome-base/gnome-keyring
29 # Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2
30 -# $Header: /var/cvsroot/gentoo-x86/gnome-base/gnome-keyring/ChangeLog,v 1.214 2011/10/30 15:58:01 armin76 Exp $
31 +# $Header: /var/cvsroot/gentoo-x86/gnome-base/gnome-keyring/ChangeLog,v 1.215 2011/11/17 06:09:12 tetromino Exp $
32 +
33 +*gnome-keyring-3.2.2 (17 Nov 2011)
34 +
35 + 17 Nov 2011; Alexandre Rostovtsev <tetromino@g.o>
36 + -files/gnome-keyring-3.0.2-automagic-libcap.patch,
37 + -gnome-keyring-3.0.3-r200.ebuild, -gnome-keyring-3.0.3-r300.ebuild,
38 + +gnome-keyring-3.2.2.ebuild:
39 + Bump, drop old. Notable changes: no longer autostarts in xfce and lxde (they
40 + don't support the new gnome-keyring dbus API), various bugfixes. Restrict
41 + tests since there seems to be no good way to reliably run them from portage.
42
43 30 Oct 2011; Raúl Porcel <armin76@g.o>
44 gnome-keyring-2.32.1-r1.ebuild:
45
46
47
48 1.1 gnome-base/gnome-keyring/gnome-keyring-3.2.2.ebuild
49
50 file : http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/gnome-keyring-3.2.2.ebuild?rev=1.1&view=markup
51 plain: http://sources.gentoo.org/viewvc.cgi/gentoo-x86/gnome-base/gnome-keyring/gnome-keyring-3.2.2.ebuild?rev=1.1&content-type=text/plain
52
53 Index: gnome-keyring-3.2.2.ebuild
54 ===================================================================
55 # Copyright 1999-2011 Gentoo Foundation
56 # Distributed under the terms of the GNU General Public License v2
57 # $Header: /var/cvsroot/gentoo-x86/gnome-base/gnome-keyring/gnome-keyring-3.2.2.ebuild,v 1.1 2011/11/17 06:09:12 tetromino Exp $
58
59 EAPI="4"
60 GCONF_DEBUG="no"
61 GNOME2_LA_PUNT="yes"
62
63 inherit gnome2 multilib pam virtualx
64
65 DESCRIPTION="Password and keyring managing daemon"
66 HOMEPAGE="http://www.gnome.org/"
67
68 LICENSE="GPL-2 LGPL-2"
69 SLOT="0"
70 IUSE="+caps debug doc pam test"
71 KEYWORDS="~amd64 ~mips ~sh ~x86 ~x86-fbsd ~amd64-linux ~sparc-solaris ~x86-linux ~x86-solaris"
72
73 # USE=valgrind is probably not a good idea for the tree
74 RDEPEND=">=dev-libs/glib-2.25:2
75 >=x11-libs/gtk+-2.90.0:3
76 >=app-crypt/p11-kit-0.6
77 app-misc/ca-certificates
78 >=dev-libs/libgcrypt-1.2.2
79 >=dev-libs/libtasn1-1
80 >=sys-apps/dbus-1.0
81 caps? ( sys-libs/libcap-ng )
82 pam? ( virtual/pam )
83 "
84 # valgrind? ( dev-util/valgrind )
85 DEPEND="${RDEPEND}
86 sys-devel/gettext
87 >=dev-util/gtk-doc-am-1.9
88 >=dev-util/intltool-0.35
89 >=dev-util/pkgconfig-0.9
90 doc? ( >=dev-util/gtk-doc-1.9 )"
91 PDEPEND=">=gnome-base/libgnome-keyring-3.1.92"
92 # eautoreconf needs:
93 # >=dev-util/gtk-doc-am-1.9
94
95 # FIXME: tests are flaky and write to /tmp (instead of TMPDIR)
96 RESTRICT="test"
97
98 pkg_setup() {
99 DOCS="AUTHORS ChangeLog NEWS README"
100 G2CONF="${G2CONF}
101 $(use_enable debug)
102 $(use_enable test tests)
103 $(use_with caps libcap-ng)
104 $(use_enable pam)
105 $(use_with pam pam-dir $(getpam_mod_dir))
106 --with-root-certs=${EPREFIX}/etc/ssl/certs/
107 --enable-ssh-agent
108 --enable-gpg-agent
109 --disable-update-mime"
110 # $(use_enable valgrind)
111 }
112
113 src_prepare() {
114 # Disable gcr tests due to weirdness with opensc
115 # ** WARNING **: couldn't load PKCS#11 module: /usr/lib64/pkcs11/gnome-keyring-pkcs11.so: Couldn't initialize module: The device was removed or unplugged
116 sed -e 's/^\(SUBDIRS = \.\)\(.*\)/\1/' \
117 -i gcr/Makefile.* || die "sed failed"
118
119 gnome2_src_prepare
120 }
121
122 src_test() {
123 unset DBUS_SESSION_BUS_ADDRESS
124 Xemake check
125 }
126
127 pkg_postinst() {
128 use caps && fcaps 0:0 755 cap_ipc_lock "${ROOT}"/usr/bin/gnome-keyring-daemon
129
130 gnome2_pkg_postinst
131 }
132
133 # borrowed from GSoC2010_Gentoo_Capabilities by constanze and Flameeyes
134 # @FUNCTION: fcaps
135 # @USAGE: fcaps {uid:gid} {file-mode} {cap1[,cap2,...]} {file}
136 # @RETURN: 0 if all okay; non-zero if failure and fallback
137 # @DESCRIPTION:
138 # fcaps sets the specified capabilities in the effective and permitted set of
139 # the given file. In case of failure fcaps sets the given file-mode.
140 fcaps() {
141 local uid_gid=$1
142 local perms=$2
143 local capset=$3
144 local path=$4
145 local res
146
147 chmod $perms $path && \
148 chown $uid_gid $path
149 res=$?
150
151 use caps || return $res
152
153 #set the capability
154 setcap "$capset=ep" "$path" &> /dev/null
155 #check if the capabilitiy got set correctly
156 setcap -v "$capset=ep" "$path" &> /dev/null
157 res=$?
158
159 if [ $res -ne 0 ]; then
160 ewarn "Failed to set capabilities. Probable reason is missed kernel support."
161 ewarn "Kernel must have SECURITY_FILE_CAPABILITIES, and <FS>_FS_SECURITY"
162 ewarn "enabled (e.g. EXT3_FS_SECURITY) where <FS> is the filesystem to store"
163 ewarn "${path}"
164 ewarn
165 ewarn "Falling back to suid now..."
166 chmod u+s ${path}
167 fi
168 return $res
169 }