diff options
author | Ciaran McCreesh <ciaranm@gentoo.org> | 2005-02-19 16:45:24 +0000 |
---|---|---|
committer | Ciaran McCreesh <ciaranm@gentoo.org> | 2005-02-19 16:45:24 +0000 |
commit | 2939a162fca51032621107f03d15539658a6634d (patch) | |
tree | db03ac11673a2502ed8ee3977583dbba3829636f /sys-apps/findutils | |
parent | version 0.39.11, command line tool correction (diff) | |
download | historical-2939a162fca51032621107f03d15539658a6634d.tar.gz historical-2939a162fca51032621107f03d15539658a6634d.tar.bz2 historical-2939a162fca51032621107f03d15539658a6634d.zip |
Version bump, bug #82581. Thanks to spb for testing the updated selinux patch
Package-Manager: portage-2.0.51.16-militant-sandwich
Diffstat (limited to 'sys-apps/findutils')
-rw-r--r-- | sys-apps/findutils/ChangeLog | 10 | ||||
-rw-r--r-- | sys-apps/findutils/Manifest | 21 | ||||
-rw-r--r-- | sys-apps/findutils/files/digest-findutils-4.2.18 | 1 | ||||
-rw-r--r-- | sys-apps/findutils/files/findutils-4.2.18-selinux.diff | 479 | ||||
-rw-r--r-- | sys-apps/findutils/findutils-4.1.20-r1.ebuild | 4 | ||||
-rw-r--r-- | sys-apps/findutils/findutils-4.2.18.ebuild | 70 | ||||
-rw-r--r-- | sys-apps/findutils/metadata.xml | 6 |
7 files changed, 582 insertions, 9 deletions
diff --git a/sys-apps/findutils/ChangeLog b/sys-apps/findutils/ChangeLog index 6076b56606b5..4b4e1562a9b8 100644 --- a/sys-apps/findutils/ChangeLog +++ b/sys-apps/findutils/ChangeLog @@ -1,6 +1,12 @@ # ChangeLog for sys-apps/findutils -# Copyright 2002-2004 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/sys-apps/findutils/ChangeLog,v 1.39 2004/07/01 08:11:51 solar Exp $ +# Copyright 2002-2005 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/sys-apps/findutils/ChangeLog,v 1.40 2005/02/19 16:45:21 ciaranm Exp $ + +*findutils-4.2.18 (19 Feb 2005) + + 19 Feb 2005; Ciaran McCreesh <ciaranm@gentoo.org> metadata.xml, + +files/findutils-4.2.18-selinux.diff, +findutils-4.2.18.ebuild: + Version bump, bug #82581. Thanks to spb for testing the updated selinux patch 01 Jul 2004; <solar@gentoo.org> findutils-4.1.20-r1.ebuild: added support for static linking of find/xargs diff --git a/sys-apps/findutils/Manifest b/sys-apps/findutils/Manifest index 3a036cd834c3..b81048fb23b5 100644 --- a/sys-apps/findutils/Manifest +++ b/sys-apps/findutils/Manifest @@ -1,6 +1,19 @@ -MD5 e1d5db80fe1ed9680665c50c11ec3fbe ChangeLog 5761 -MD5 027898bb4f64339083a599c95d3ac4f1 findutils-4.1.20-r1.ebuild 2065 -MD5 9a09f8d531c582e78977dbfd96edc1f2 metadata.xml 164 +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + +MD5 bc3f7171797c9e05f190c430e1c1a264 findutils-4.2.18.ebuild 1971 +MD5 87c31eb9bb3ed6de08e6f27b2c576f92 ChangeLog 6009 +MD5 1f7197b778d47c773d19430261c84f49 metadata.xml 261 +MD5 3f4b41cc2feb37166ed7b75ea6d44f10 findutils-4.1.20-r1.ebuild 2066 +MD5 62f86a597482354916befe2e1f084b8d files/findutils-4.2.18-selinux.diff 15327 MD5 43e3e3c15b66b30de4be62db3b7674ea files/findutils-4.1.20-selinux.diff 10392 -MD5 be3f6e925d8c5774cc1ea631677e7401 files/digest-findutils-4.1.20-r1 68 +MD5 f983b276be2d73937687b61be2bc917d files/digest-findutils-4.2.18 68 MD5 0315b5033cf65d15f24b1c252070db45 files/findutils-env-size.patch 672 +MD5 be3f6e925d8c5774cc1ea631677e7401 files/digest-findutils-4.1.20-r1 68 +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1.2.6 (GNU/Linux) + +iD8DBQFCF20eLLFUmVNQ7rkRAoODAJ0RGlHQaJrjWVXNvmY+TJVGfEpn0gCglpW+ +k54WNKrC+Q0S7X+LogpNAmQ= +=mLOZ +-----END PGP SIGNATURE----- diff --git a/sys-apps/findutils/files/digest-findutils-4.2.18 b/sys-apps/findutils/files/digest-findutils-4.2.18 new file mode 100644 index 000000000000..7505dfb3cbf5 --- /dev/null +++ b/sys-apps/findutils/files/digest-findutils-4.2.18 @@ -0,0 +1 @@ +MD5 8aac2498435f3f1882678fb9ebda5c34 findutils-4.2.18.tar.gz 942093 diff --git a/sys-apps/findutils/files/findutils-4.2.18-selinux.diff b/sys-apps/findutils/files/findutils-4.2.18-selinux.diff new file mode 100644 index 000000000000..9d08f7c09ed0 --- /dev/null +++ b/sys-apps/findutils/files/findutils-4.2.18-selinux.diff @@ -0,0 +1,479 @@ +diff -ur findutils-4.2.18/find/defs.h findutils-4.2.18-new/find/defs.h +--- findutils-4.2.18/find/defs.h 2005-02-12 10:36:03.000000000 +0000 ++++ findutils-4.2.18-new/find/defs.h 2005-02-19 16:04:41.011994928 +0000 +@@ -130,6 +130,10 @@ + #define MODE_RWX (S_IXUSR | S_IXGRP | S_IXOTH | MODE_RW) + #define MODE_ALL (S_ISUID | S_ISGID | S_ISVTX | MODE_RWX) + ++#ifdef WITH_SELINUX ++#include <selinux/selinux.h> ++#endif /*WITH_SELINUX*/ ++ + #if 1 + #include <stdbool.h> + typedef bool boolean; +@@ -314,6 +318,9 @@ + struct dir_id fileid; /* samefile */ + mode_t type; /* type */ + FILE *stream; /* fprint fprint0 */ ++#ifdef WITH_SELINUX ++ security_context_t scontext; /* scontext */ ++#endif /*WITH_SELINUX*/ + struct format_val printf_vec; /* printf fprintf */ + } args; + +@@ -444,6 +451,9 @@ + boolean pred_used PARAMS((char *pathname, struct stat *stat_buf, struct predicate *pred_ptr)); + boolean pred_user PARAMS((char *pathname, struct stat *stat_buf, struct predicate *pred_ptr)); + boolean pred_xtype PARAMS((char *pathname, struct stat *stat_buf, struct predicate *pred_ptr)); ++#ifdef WITH_SELINUX ++boolean pred_scontext PARAMS((char *pathname, struct stat *stat_buf, struct predicate *pred_ptr)); ++#endif /* WITH_SELINUX */ + + int launch PARAMS((const struct buildcmd_control *ctl, + struct buildcmd_state *buildstate)); +@@ -519,6 +529,9 @@ + /* Pointer to the function used to stat files. */ + int (*xstat) (const char *name, struct stat *statbuf); + ++#ifdef WITH_SELINUX ++ int (*x_getfilecon) (); ++#endif /* WITH_SELINUX */ + + /* Indicate if we can implement safely_chdir() using the O_NOFOLLOW + * flag to open(2). +diff -ur findutils-4.2.18/find/find.1 findutils-4.2.18-new/find/find.1 +--- findutils-4.2.18/find/find.1 2005-02-15 09:32:24.000000000 +0000 ++++ findutils-4.2.18-new/find/find.1 2005-02-19 16:04:01.926936760 +0000 +@@ -441,6 +441,9 @@ + link to a file of type \fIc\fR; if the \-L option has been given, true + if \fIc\fR is `l'. In other words, for symbolic links, \-xtype checks + the type of the file that \-type does not check. ++.IP "\-context \fIscontext\fR" ++.IP "\--context \fIscontext\fR" ++(SELinux only) File has the security context \fIscontext\fR. + + .SS ACTIONS + .IP "\-delete\fR" +@@ -711,6 +714,8 @@ + File's type (like in ls \-l), U=unknown type (shouldn't happen) + .IP %Y + File's type (like %y), plus follow symlinks: L=loop, N=nonexistent ++.IP %Z ++(SELinux only) file's security context. + .PP + A `%' character followed by any other character is discarded (but the + other character is printed). +diff -ur findutils-4.2.18/find/find.c findutils-4.2.18-new/find/find.c +--- findutils-4.2.18/find/find.c 2005-02-16 09:51:08.000000000 +0000 ++++ findutils-4.2.18-new/find/find.c 2005-02-19 16:04:01.924937064 +0000 +@@ -228,6 +228,93 @@ + { + return lstat(name, p); + } ++#ifdef WITH_SELINUX ++ ++static int ++fallback_getfilecon(const char *name, security_context_t *p, int prev_rv) ++{ ++ /* Our original getfilecon() call failed. Perhaps we can't follow a ++ * symbolic link. If that might be the problem, lgetfilecon() the link. ++ * Otherwise, admit defeat. ++ */ ++ switch (errno) ++ { ++ case ENOENT: ++ case ENOTDIR: ++#ifdef DEBUG_STAT ++ fprintf(stderr, "fallback_getfilecon(): getfilecon(%s) failed; falling back on lgetfilecon()\n", name); ++#endif ++ return lgetfilecon(name, p); ++ ++ case EACCES: ++ case EIO: ++ case ELOOP: ++ case ENAMETOOLONG: ++#ifdef EOVERFLOW ++ case EOVERFLOW: /* EOVERFLOW is not #defined on UNICOS. */ ++#endif ++ default: ++ return prev_rv; ++ } ++} ++ ++ ++/* optionh_getfilecon() implements the getfilecon operation when the ++ * -H option is in effect. ++ * ++ * If the item to be examined is a command-line argument, we follow ++ * symbolic links. If the getfilecon() call fails on the command-line ++ * item, we fall back on the properties of the symbolic link. ++ * ++ * If the item to be examined is not a command-line argument, we ++ * examine the link itself. ++ */ ++int ++optionh_getfilecon(const char *name, security_context_t *p) ++{ ++ if (0 == state.curdepth) ++ { ++ /* This file is from the command line; deference the link (if it ++ * is a link). ++ */ ++ int rv = getfilecon(name, p); ++ if (0 == rv) ++ return 0; /* success */ ++ else ++ return fallback_getfilecon(name, p, rv); ++ } ++ else ++ { ++ /* Not a file on the command line; do not derefernce the link. ++ */ ++ return lgetfilecon(name, p); ++ } ++} ++ ++/* optionl_getfilecon() implements the getfilecon operation when the ++ * -L option is in effect. That option makes us examine the thing the ++ * symbolic link points to, not the symbolic link itself. ++ */ ++int ++optionl_getfilecon(const char *name, security_context_t *p) ++{ ++ int rv = getfilecon(name, p); ++ if (0 == rv) ++ return 0; /* normal case. */ ++ else ++ return fallback_getfilecon(name, p, rv); ++} ++ ++/* optionp_getfilecon() implements the stat operation when the -P ++ * option is in effect (this is also the default). That option makes ++ * us examine the symbolic link itself, not the thing it points to. ++ */ ++int ++optionp_getfilecon(const char *name, security_context_t *p) ++{ ++ return lgetfilecon(name, p); ++} ++#endif /* WITH_SELINUX */ + + #ifdef DEBUG_STAT + static uintmax_t stat_count = 0u; +@@ -256,11 +343,17 @@ + { + case SYMLINK_ALWAYS_DEREF: /* -L */ + options.xstat = optionl_stat; ++#ifdef WITH_SELINUX ++ options.x_getfilecon = optionl_getfilecon; ++#endif /* WITH_SELINUX */ + options.no_leaf_check = true; + break; + + case SYMLINK_NEVER_DEREF: /* -P (default) */ + options.xstat = optionp_stat; ++#ifdef WITH_SELINUX ++ options.x_getfilecon = optionp_getfilecon; ++#endif /* WITH_SELINUX */ + /* Can't turn no_leaf_check off because the user might have specified + * -noleaf anyway + */ +@@ -268,6 +361,9 @@ + + case SYMLINK_DEREF_ARGSONLY: /* -H */ + options.xstat = optionh_stat; ++#ifdef WITH_SELINUX ++ options.x_getfilecon = optionh_getfilecon; ++#endif /* WITH_SELINUX */ + options.no_leaf_check = true; + } + +@@ -373,6 +469,9 @@ + int + main (int argc, char **argv) + { ++#ifdef WITH_SELINUX ++ int is_selinux_enabled_flag = is_selinux_enabled()>0; ++#endif /* WITH_SELINUX */ + int i; + PFB parse_function; /* Pointer to the function which parses. */ + struct predicate *cur_pred; +@@ -509,6 +608,14 @@ + if (strchr ("-!(),", argv[i][0]) == NULL) + usage (_("paths must precede expression")); + predicate_name = argv[i]; ++#ifdef WITH_SELINUX ++ if (! is_selinux_enabled_flag) { ++ if ((strncmp(predicate_name,"-context",strlen("-context"))==0) || ++ (strncmp(predicate_name,"--context",strlen("--context"))==0)) { ++ error (1, 0,_("Error: invalid predicate %s: the kernel is not selinux-enabled.\n"),predicate_name); ++ } ++ } ++#endif + parse_function = find_parser (predicate_name); + if (parse_function == NULL) + /* Command line option not recognized */ +diff -ur findutils-4.2.18/find/Makefile.am findutils-4.2.18-new/find/Makefile.am +--- findutils-4.2.18/find/Makefile.am 2004-11-21 13:37:47.000000000 +0000 ++++ findutils-4.2.18-new/find/Makefile.am 2005-02-19 16:04:01.936935240 +0000 +@@ -3,8 +3,9 @@ + bin_PROGRAMS = find + find_SOURCES = find.c fstype.c parser.c pred.c tree.c util.c version.c + EXTRA_DIST = defs.h $(man_MANS) ++DEFS = @DEFS@ -I. -I$(srcdir) -I.. -DWITH_SELINUX + INCLUDES = -I../gnulib/lib -I$(top_srcdir)/lib -I$(top_srcdir)/gnulib/lib -I../intl -DLOCALEDIR=\"$(localedir)\" +-LDADD = ../lib/libfind.a ../gnulib/lib/libgnulib.a @INTLLIBS@ ++LDADD = ../lib/libfind.a ../gnulib/lib/libgnulib.a @INTLLIBS@ -lselinux + man_MANS = find.1 + SUBDIRS = testsuite + +diff -ur findutils-4.2.18/find/Makefile.in findutils-4.2.18-new/find/Makefile.in +--- findutils-4.2.18/find/Makefile.in 2005-02-16 10:26:56.000000000 +0000 ++++ findutils-4.2.18-new/find/Makefile.in 2005-02-19 16:04:01.927936608 +0000 +@@ -1,4 +1,4 @@ +-# Makefile.in generated by automake 1.9.4 from Makefile.am. ++# Makefile.in generated by automake 1.9.3 from Makefile.am. + # @configure_input@ + + # Copyright (C) 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, +@@ -174,7 +174,7 @@ + CPP = @CPP@ + CPPFLAGS = @CPPFLAGS@ + CYGPATH_W = @CYGPATH_W@ +-DEFS = @DEFS@ ++DEFS = @DEFS@ -I. -I$(srcdir) -I.. -DWITH_SELINUX + DEPDIR = @DEPDIR@ + ECHO_C = @ECHO_C@ + ECHO_N = @ECHO_N@ +@@ -266,7 +266,7 @@ + localedir = $(datadir)/locale + find_SOURCES = find.c fstype.c parser.c pred.c tree.c util.c version.c + EXTRA_DIST = defs.h $(man_MANS) +-LDADD = ../lib/libfind.a ../gnulib/lib/libgnulib.a @INTLLIBS@ ++LDADD = ../lib/libfind.a ../gnulib/lib/libgnulib.a @INTLLIBS@ -lselinux + man_MANS = find.1 + SUBDIRS = testsuite + all: all-recursive +@@ -282,9 +282,9 @@ + exit 1;; \ + esac; \ + done; \ +- echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnits find/Makefile'; \ ++ echo ' cd $(top_srcdir) && $(AUTOMAKE) --gnu find/Makefile'; \ + cd $(top_srcdir) && \ +- $(AUTOMAKE) --gnits find/Makefile ++ $(AUTOMAKE) --gnu find/Makefile + .PRECIOUS: Makefile + Makefile: $(srcdir)/Makefile.in $(top_builddir)/config.status + @case '$?' in \ +@@ -334,8 +334,7 @@ + f=`echo "$$p" | \ + sed 's,^.*/,,;s/$(EXEEXT)$$//;$(transform);s/$$/$(EXEEXT)/'`; \ + for opt in --help --version; do \ +- if "$(DESTDIR)$(bindir)/$$f" $$opt >c$${pid}_.out \ +- 2>c$${pid}_.err </dev/null \ ++ if "$(DESTDIR)$(bindir)/$$f" $$opt > c$${pid}_.out 2> c$${pid}_.err \ + && test -n "`cat c$${pid}_.out`" \ + && test -z "`cat c$${pid}_.err`"; then :; \ + else echo "$$f does not support $$opt" 1>&2; bad=1; fi; \ +diff -ur findutils-4.2.18/find/parser.c findutils-4.2.18-new/find/parser.c +--- findutils-4.2.18/find/parser.c 2005-02-12 20:49:25.000000000 +0000 ++++ findutils-4.2.18-new/find/parser.c 2005-02-19 16:04:01.942934328 +0000 +@@ -36,6 +36,10 @@ + #include <sys/file.h> + #endif + ++#ifdef WITH_SELINUX ++#include <selinux/selinux.h> ++#endif /*WITH_SELINUX*/ ++ + #if ENABLE_NLS + # include <libintl.h> + # define _(Text) gettext (Text) +@@ -139,6 +143,9 @@ + static boolean parse_warn PARAMS((char *argv[], int *arg_ptr)); + static boolean parse_xtype PARAMS((char *argv[], int *arg_ptr)); + static boolean parse_quit PARAMS((char *argv[], int *arg_ptr)); ++#ifdef WITH_SELINUX ++static boolean parse_scontext PARAMS((char *argv[], int *arg_ptr)); ++#endif /*WITH_SELINUX*/ + + static boolean insert_regex PARAMS((char *argv[], int *arg_ptr, boolean ignore_case)); + static boolean insert_type PARAMS((char *argv[], int *arg_ptr, boolean (*which_pred )())); +@@ -266,6 +273,8 @@ + {ARG_TEST, "wholename", parse_wholename}, /* GNU, replaces -path */ + {ARG_OPTION, "xdev", parse_xdev}, + {ARG_TEST, "xtype", parse_xtype}, /* GNU */ ++ {ARG_TEST, "context", parse_scontext}, /* SELinux */ ++ {ARG_TEST, "-context", parse_scontext}, /* SELinux */ + {0, 0, 0} + }; + +@@ -744,6 +753,10 @@ + -nouser -nogroup -path PATTERN -perm [+-]MODE -regex PATTERN\n\ + -wholename PATTERN -size N[bcwkMG] -true -type [bcdpflsD] -uid N\n\ + -used N -user NAME -xtype [bcdpfls]\n")); ++#ifdef WITH_SELINUX ++ puts (_("\ ++ -context CONTEXT\n")); ++#endif /*WITH_SELINUX*/ + puts (_("\ + actions: -exec COMMAND ; -fprint FILE -fprint0 FILE -fprintf FILE FORMAT\n\ + -fls FILE -ok COMMAND ; -print -print0 -printf FORMAT -prune -ls -delete\n\ +@@ -1601,6 +1614,32 @@ + return true; + } + ++#ifdef WITH_SELINUX ++ ++static boolean ++parse_scontext ( argv, arg_ptr ) ++ char *argv[]; ++ int *arg_ptr; ++{ ++ struct predicate *our_pred; ++ ++ if ( (argv == NULL) || (argv[*arg_ptr] == NULL) ) ++ return( false ); ++ ++ our_pred = insert_primary(pred_scontext); ++ our_pred->need_stat = 0; ++#ifdef DEBUG ++ our_pred->p_name = find_pred_name (pred_scontext); ++#endif /*DEBUG*/ ++ ++ our_pred->args.scontext = argv[*arg_ptr];; ++ ++ (*arg_ptr)++; ++ return( true ); ++} ++ ++#endif /*WITH_SELINUX*/ ++ + static boolean + parse_xtype (char **argv, int *arg_ptr) + { +@@ -1776,7 +1815,11 @@ + if (*scan2 == '.') + for (scan2++; ISDIGIT (*scan2); scan2++) + /* Do nothing. */ ; ++#ifdef WITH_SELINUX ++ if (strchr ("abcdDfFgGhHiklmMnpPstuUyYZ", *scan2)) ++#else /* WITH_SELINUX */ + if (strchr ("abcdDfFgGhHiklmMnpPstuUyY", *scan2)) ++#endif /* WITH_SELINUX */ + { + segmentp = make_segment (segmentp, format, scan2 - format, + (int) *scan2); +diff -ur findutils-4.2.18/find/pred.c findutils-4.2.18-new/find/pred.c +--- findutils-4.2.18/find/pred.c 2005-02-07 23:49:45.000000000 +0000 ++++ findutils-4.2.18-new/find/pred.c 2005-02-19 16:04:01.944934024 +0000 +@@ -35,6 +35,14 @@ + #include "wait.h" + #include "buildcmd.h" + ++#ifdef WITH_SELINUX ++#include <selinux/selinux.h> ++#endif /*WITH_SELINUX*/ ++ ++#ifndef FNM_CASEFOLD ++#define FNM_CASEFOLD (1<<4) ++#endif /*FNM_CASEFOLD*/ ++ + #if ENABLE_NLS + # include <libintl.h> + # define _(Text) gettext (Text) +@@ -78,7 +86,6 @@ + + extern int yesno (); + +- + /* Get or fake the disk device blocksize. + Usually defined by sys/param.h (if at all). */ + #ifndef DEV_BSIZE +@@ -209,6 +216,9 @@ + {pred_used, "used "}, + {pred_user, "user "}, + {pred_xtype, "xtype "}, ++#ifdef WITH_SELINUX ++ {pred_scontext, "context"}, ++#endif /*WITH_SELINUX*/ + {0, "none "} + }; + +@@ -828,6 +838,26 @@ + + } + break; ++#ifdef WITH_SELINUX ++ case 'Z': /* SELinux security context */ ++ { ++ security_context_t scontext; ++ int rv; ++ rv = (*options.x_getfilecon)(state.rel_pathname, &scontext); ++ ++ if ( rv < 0 ) { ++ (void) fprintf(stderr, "getfileconf(%s): %s", ++ pathname, strerror(errno)); ++ (void) fflush(stderr); ++ } ++ else { ++ segment->text[segment->text_len] = 's'; ++ (void) fprintf (fp, segment->text, scontext); ++ freecon(scontext); ++ } ++ } ++ break ; ++#endif /* WITH_SELINUX */ + } + } + return (true); +@@ -1398,6 +1428,34 @@ + */ + return (pred_type (pathname, &sbuf, pred_ptr)); + } ++ ++ ++#ifdef WITH_SELINUX ++ ++boolean ++pred_scontext ( pathname, stat_buf, pred_ptr ) ++ char *pathname; ++ struct stat *stat_buf; ++ struct predicate *pred_ptr; ++{ ++ int rv; ++ security_context_t scontext; ++ ++ rv = (* options.x_getfilecon)(state.rel_pathname, &scontext); ++ ++ if ( rv < 0 ) { ++ (void) fprintf(stderr, "getfilecon(%s): %s\n", pathname, strerror(errno)); ++ (void) fflush(stderr); ++ return ( false ); ++ } ++ ++ rv = (fnmatch(pred_ptr->args.scontext, scontext,0)==0); ++ freecon(scontext); ++ return rv; ++} ++ ++#endif /*WITH_SELINUX*/ ++ + + /* 1) fork to get a child; parent remembers the child pid + 2) child execs the command requested +diff -ur findutils-4.2.18/find/util.c findutils-4.2.18-new/find/util.c +--- findutils-4.2.18/find/util.c 2005-01-23 18:04:45.000000000 +0000 ++++ findutils-4.2.18-new/find/util.c 2005-02-19 16:04:01.920937672 +0000 +@@ -70,6 +70,9 @@ + last_pred->need_stat = true; + last_pred->need_type = true; + last_pred->args.str = NULL; ++#ifdef WITH_SELINUX ++ last_pred->args.scontext = NULL; ++#endif + last_pred->pred_next = NULL; + last_pred->pred_left = NULL; + last_pred->pred_right = NULL; diff --git a/sys-apps/findutils/findutils-4.1.20-r1.ebuild b/sys-apps/findutils/findutils-4.1.20-r1.ebuild index d551a423cd5c..01b64dd230d8 100644 --- a/sys-apps/findutils/findutils-4.1.20-r1.ebuild +++ b/sys-apps/findutils/findutils-4.1.20-r1.ebuild @@ -1,6 +1,6 @@ -# Copyright 1999-2004 Gentoo Foundation +# Copyright 1999-2005 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-apps/findutils/findutils-4.1.20-r1.ebuild,v 1.26 2004/12/07 22:11:46 vapier Exp $ +# $Header: /var/cvsroot/gentoo-x86/sys-apps/findutils/findutils-4.1.20-r1.ebuild,v 1.27 2005/02/19 16:45:21 ciaranm Exp $ inherit eutils flag-o-matic gnuconfig toolchain-funcs diff --git a/sys-apps/findutils/findutils-4.2.18.ebuild b/sys-apps/findutils/findutils-4.2.18.ebuild new file mode 100644 index 000000000000..1158d59e9153 --- /dev/null +++ b/sys-apps/findutils/findutils-4.2.18.ebuild @@ -0,0 +1,70 @@ +# Copyright 1999-2005 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/sys-apps/findutils/findutils-4.2.18.ebuild,v 1.1 2005/02/19 16:45:21 ciaranm Exp $ + +inherit eutils flag-o-matic gnuconfig toolchain-funcs + +SELINUX_PATCH="findutils-4.2.18-selinux.diff" + +# Note this doesn't point to gnu.org because alpha.gnu.org has quit +# supplying the development versions. If it comes back in the future +# then we might want to redirect the link. See bug 18729 +DESCRIPTION="GNU utilities to find files" +HOMEPAGE="http://www.gnu.org/software/findutils/findutils.html" +SRC_URI="ftp://alpha.gnu.org/gnu/${PN}/${P}.tar.gz + mirror://gentoo/${P}.tar.gz" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86" +IUSE="nls build afs selinux static" + +DEPEND="virtual/libc + >=sys-apps/sed-4 + nls? ( sys-devel/gettext ) + afs? ( net-fs/openafs ) + selinux? ( sys-libs/libselinux )" +RDEPEND="virtual/libc" + +src_unpack() { + unpack ${A} + cd ${S} + + # Detect new systems properly + gnuconfig_update + + # Don't build or install locate because it conflicts with slocate, + # which is a secure version of locate. See bug 18729 + sed -i '/^SUBDIRS/s/locate//' Makefile.in + + use selinux && epatch ${FILESDIR}/${SELINUX_PATCH} +} + +src_compile() { + if use afs && use x86; then + append-flags -I/usr/afsws/include + append-ldflags -lpam + export LIBS="/usr/afsws/lib/pam_afs.so.1 -lpam" + fi + export CPPFLAGS="${CXXFLAGS}" + use static && append-ldflags -static + + econf $(use_enable nls) || die + emake libexecdir=/usr/lib/find AR="$(tc-getAR)" || die +} + +src_install() { + einstall libexecdir=${D}/usr/lib/find || die + prepallman + + rm -rf ${D}/usr/var + use build \ + && rm -rf ${D}/usr/share \ + || dodoc NEWS README TODO ChangeLog +} + +pkg_postinst() { + ewarn "Please note that the locate and updatedb binaries" + ewarn "are not longer provided by findutils." + ewarn "Please emerge slocate" +} diff --git a/sys-apps/findutils/metadata.xml b/sys-apps/findutils/metadata.xml index 96a2d586367d..6e000d4d4f29 100644 --- a/sys-apps/findutils/metadata.xml +++ b/sys-apps/findutils/metadata.xml @@ -1,5 +1,9 @@ <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> <pkgmetadata> -<herd>base-system</herd> + <herd>base-system</herd> + <maintainer> + <email>ciaranm@gentoo.org</email> + <name>Ciaran McCreesh</name> + </maintainer> </pkgmetadata> |