diff options
author | Sebastian Pipping <sping@gentoo.org> | 2021-08-18 13:15:29 +0200 |
---|---|---|
committer | Sebastian Pipping <sping@gentoo.org> | 2021-08-18 13:15:43 +0200 |
commit | 9dc9bf3c02298f279114fd220e46328b3e0b200f (patch) | |
tree | 015a5eb94e1575b40f2d4fb79ce6459a667e1f08 /sys-apps/usbguard | |
parent | sys-apps/dcfldd: 1.7.1 (diff) | |
download | gentoo-9dc9bf3c02298f279114fd220e46328b3e0b200f.tar.gz gentoo-9dc9bf3c02298f279114fd220e46328b3e0b200f.tar.bz2 gentoo-9dc9bf3c02298f279114fd220e46328b3e0b200f.zip |
sys-apps/usbguard: Keepdir /etc/usbguard/IPCAccessControl.d
Closes: https://bugs.gentoo.org/808801
Signed-off-by: Sebastian Pipping <sping@gentoo.org>
Package-Manager: Portage-3.0.20, Repoman-3.0.3
Diffstat (limited to 'sys-apps/usbguard')
-rw-r--r-- | sys-apps/usbguard/usbguard-1.0.0-r3.ebuild | 101 |
1 files changed, 101 insertions, 0 deletions
diff --git a/sys-apps/usbguard/usbguard-1.0.0-r3.ebuild b/sys-apps/usbguard/usbguard-1.0.0-r3.ebuild new file mode 100644 index 000000000000..2f0a8eeb9d46 --- /dev/null +++ b/sys-apps/usbguard/usbguard-1.0.0-r3.ebuild @@ -0,0 +1,101 @@ +# Copyright 1999-2021 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=7 + +inherit autotools bash-completion-r1 + +DESCRIPTION="Daemon protecting your computer against BadUSB" +HOMEPAGE="https://github.com/USBGuard/usbguard" +SRC_URI="https://github.com/USBGuard/usbguard/releases/download/${P}/${P}.tar.gz" + +LICENSE="GPL-2+" +SLOT="0/1" # due to libusbguard.so.<1>.0.0 +KEYWORDS="~amd64 ~x86" +IUSE="dbus ldap policykit static-libs systemd test umockdev" + +REQUIRED_USE="policykit? ( dbus )" + +# https://github.com/USBGuard/usbguard/issues/449 +# https://bugs.gentoo.org/769692 +REQUIRED_USE+=" test? ( static-libs )" + +CDEPEND=" + <dev-libs/pegtl-3 + >=dev-libs/libsodium-0.4.5:= + >=dev-libs/protobuf-2.5.0:= + >=sys-cluster/libqb-0.16.0:= + sys-devel/gcc:*[cxx] + >=sys-libs/libcap-ng-0.7.0 + >=sys-libs/libseccomp-2.0.0 + >=sys-process/audit-2.7.7 + dbus? ( + dev-libs/glib:2 + sys-apps/dbus + policykit? ( sys-auth/polkit[introspection] ) + ) + ldap? ( net-nds/openldap ) + systemd? ( sys-apps/systemd ) + umockdev? ( dev-util/umockdev ) + " +RDEPEND="${CDEPEND} + virtual/udev + " +DEPEND="${CDEPEND} + app-text/asciidoc + dev-cpp/catch:1 + dbus? ( + dev-libs/libxml2 + dev-libs/libxslt + dev-util/gdbus-codegen + ) + " + +RESTRICT="!test? ( test )" + +PATCHES=( + "${FILESDIR}"/${PN}-1.0.0-pthreads-link.patch + "${FILESDIR}"/${PN}-1.0.0-bash-completion-configure.patch +) + +src_prepare() { + default + eautoreconf +} + +src_configure() { + local myargs=( + --with-bash-completion-dir=$(get_bashcompdir) + $(use_with dbus) + $(use_with ldap) + $(use_with policykit polkit) + $(use_enable static-libs static) + $(use_enable systemd) + $(use_enable umockdev) + ) + + econf "${myargs[@]}" +} + +src_install() { + default + + keepdir /etc/usbguard/IPCAccessControl.d # bug 808801 + keepdir /var/lib/log/usbguard + + newinitd "${FILESDIR}"/${PN}-0.7.6-usbguard.openrc usbguard + use dbus && newinitd "${FILESDIR}"/${PN}-0.7.6-usbguard-dbus.openrc usbguard-dbus +} + +pkg_postinst() { + ewarn + ewarn 'BEFORE STARTING USBGUARD please be sure to create/generate' + ewarn ' a rules file at /etc/usbguard/rules.conf' + ewarn ' so that you do not' + ewarn ' GET LOCKED OUT' + ewarn " of this system (\"$(hostname)\")." + ewarn + ewarn 'This command may be of help:' + ewarn ' sudo sh -c "usbguard generate-policy > /etc/usbguard/rules.conf"' + ewarn +} |