# Copyright 1999-2011 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 # $Header: /var/cvsroot/gentoo-x86/sys-apps/policycoreutils/policycoreutils-2.1.0-r1.ebuild,v 1.2 2011/10/23 12:40:16 swift Exp $ EAPI="3" PYTHON_DEPEND="*" PYTHON_USE_WITH="xml" SUPPORT_PYTHON_ABIS="1" RESTRICT_PYTHON_ABIS="*-jython" inherit multilib python toolchain-funcs eutils EXTRAS_VER="1.21" SEMNG_VER="2.1.0" SELNX_VER="2.1.0" SEPOL_VER="2.1.0" IUSE="" DESCRIPTION="SELinux core utilities" HOMEPAGE="http://userspace.selinuxproject.org" SRC_URI="http://userspace.selinuxproject.org/releases/20110727/devel/${P}.tar.gz http://dev.gentoo.org/~swift/patches/policycoreutils/policycoreutils-2.0.85-sesandbox.patch.gz http://dev.gentoo.org/~swift/patches/policycoreutils/policycoreutils-2.0.85-fix-seunshare-vuln.patch.gz mirror://gentoo/policycoreutils-extra-${EXTRAS_VER}.tar.bz2 mirror://gentoo/policycoreutils-2.0.85-python3.tar.gz" LICENSE="GPL-2" SLOT="0" KEYWORDS="amd64 x86" COMMON_DEPS=">=sys-libs/libselinux-${SELNX_VER}[python] >=sys-libs/glibc-2.4 >=sys-process/audit-1.5.1 >=sys-libs/libcap-1.10-r10 sys-libs/pam >=sys-libs/libsemanage-${SEMNG_VER}[python] sys-libs/libcap-ng >=sys-libs/libsepol-${SEPOL_VER} sys-devel/gettext" # pax-utils for scanelf used by rlpkg RDEPEND="${COMMON_DEPS} dev-python/sepolgen app-misc/pax-utils" DEPEND="${COMMON_DEPS}" S2=${WORKDIR}/policycoreutils-extra src_prepare() { # rlpkg is more useful than fixfiles sed -i -e '/^all/s/fixfiles//' "${S}/scripts/Makefile" \ || die "fixfiles sed 1 failed" sed -i -e '/fixfiles/d' "${S}/scripts/Makefile" \ || die "fixfiles sed 2 failed" # We currently do not support MCS, so the sandbox code in policycoreutils # is not usable yet. However, work for MCS is on the way and a reported # vulnerability (bug #374897) might go by unnoticed if we ignore it now. # As such, we will # - prepare support for switching name from "sandbox" to "sesandbox" epatch "${DISTDIR}/policycoreutils-2.0.85-sesandbox.patch.gz" # - patch the sandbox and seunshare code to fix the vulnerability # (uses, with permission, extract from # http://pkgs.fedoraproject.org/gitweb/?p=policycoreutils.git;a=blob_plain;f=policycoreutils-rhat.patch;hb=HEAD) epatch "${DISTDIR}/policycoreutils-2.0.85-fix-seunshare-vuln.patch.gz" # But for now, disable building sandbox code sed -i -e 's/sandbox //' "${S}/Makefile" || die "failed removing sandbox" # Overwrite gl.po, id.po and et.po with valid PO file cp "${S}/po/sq.po" "${S}/po/gl.po" || die "failed to copy ${S}/po/sq.po to gl.po" cp "${S}/po/sq.po" "${S}/po/id.po" || die "failed to copy ${S}/po/sq.po to id.po" cp "${S}/po/sq.po" "${S}/po/et.po" || die "failed to copy ${S}/po/sq.po to et.po" # Fixed scripts for Python 3 support cp "${WORKDIR}/seobject.py" "${S}/semanage/seobject.py" || die "failed to copy seobject.py" cp "${WORKDIR}/semanage" "${S}/semanage/semanage" || die "failed to copy semanage" cp "${WORKDIR}/chcat" "${S}/scripts/chcat" || die "failed to copy chcat" cp "${WORKDIR}/audit2allow" "${S}/audit2allow/audit2allow" || die "failed to copy audit2allow" } src_compile() { python_copy_sources semanage sandbox building() { einfo "Compiling policycoreutils" emake -C "${S}" AUDIT_LOG_PRIVS="y" CC="$(tc-getCC)" PYLIBVER="python$(python_get_version)" || die einfo "Compiling policycoreutils-extra" emake -C "${S2}" AUDIT_LOG_PRIVS="y" CC="$(tc-getCC)" PYLIBVER="python$(python_get_version)" || die } python_execute_function -s --source-dir semanage building } src_install() { # Python scripts are present in many places. There are no extension modules. installation() { einfo "Installing policycoreutils" emake -C "${S}" DESTDIR="${T}/images/${PYTHON_ABI}" AUDIT_LOG_PRIV="y" PYLIBVER="python$(python_get_version)" install || return 1 einfo "Installing policycoreutils-extra" emake -C "${S2}" DESTDIR="${T}/images/${PYTHON_ABI}" SHLIBDIR="${D}$(get_libdir)/rc" install || return 1 } python_execute_function installation python_merge_intermediate_installation_images "${T}/images" # remove redhat-style init script rm -fR "${D}/etc/rc.d" # compatibility symlinks dosym /sbin/setfiles /usr/sbin/setfiles dosym /$(get_libdir)/rc/runscript_selinux.so /$(get_libdir)/rcscripts/runscript_selinux.so # location for permissive definitions dodir /var/lib/selinux keepdir /var/lib/selinux } pkg_postinst() { python_mod_optimize seobject.py } pkg_postrm() { python_mod_cleanup seobject.py }