From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1R3YAj-000576-Q9 for garchives@archives.gentoo.org; Tue, 13 Sep 2011 18:57:30 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 3E5FC21C2E0; Tue, 13 Sep 2011 18:57:17 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id E887221C2E0 for ; Tue, 13 Sep 2011 18:57:16 +0000 (UTC) Received: from pelican.gentoo.org (unknown [66.219.59.40]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 6E3DB1B4014 for ; Tue, 13 Sep 2011 18:57:16 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by pelican.gentoo.org (Postfix) with ESMTP id C44F880042 for ; Tue, 13 Sep 2011 18:57:15 +0000 (UTC) From: "Sven Vermeulen" To: gentoo-commits@lists.gentoo.org Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sven Vermeulen" Message-ID: <86eb0d23e66d844c36d2e3bddfda25347f54f304.SwifT@gentoo> Subject: [gentoo-commits] proj/hardened-dev:master commit in: sys-apps/policycoreutils/ X-VCS-Repository: proj/hardened-dev X-VCS-Files: sys-apps/policycoreutils/ChangeLog sys-apps/policycoreutils/policycoreutils-2.1.0-r1.ebuild X-VCS-Directories: sys-apps/policycoreutils/ X-VCS-Committer: SwifT X-VCS-Committer-Name: Sven Vermeulen X-VCS-Revision: 86eb0d23e66d844c36d2e3bddfda25347f54f304 Date: Tue, 13 Sep 2011 18:57:15 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: quoted-printable X-Archives-Salt: X-Archives-Hash: 8de8ea44aafebff2964e191c6be018cd commit: 86eb0d23e66d844c36d2e3bddfda25347f54f304 Author: Sven Vermeulen siphos be> AuthorDate: Tue Sep 13 18:55:58 2011 +0000 Commit: Sven Vermeulen siphos be> CommitDate: Tue Sep 13 18:55:58 2011 +0000 URL: http://git.overlays.gentoo.org/gitweb/?p=3Dproj/hardened-dev.= git;a=3Dcommit;h=3D86eb0d23 Fix patch paths --- sys-apps/policycoreutils/ChangeLog | 3 +++ .../policycoreutils-2.1.0-r1.ebuild | 6 ++++-- 2 files changed, 7 insertions(+), 2 deletions(-) diff --git a/sys-apps/policycoreutils/ChangeLog b/sys-apps/policycoreutil= s/ChangeLog index ae5c492..e7ad1ad 100644 --- a/sys-apps/policycoreutils/ChangeLog +++ b/sys-apps/policycoreutils/ChangeLog @@ -2,6 +2,9 @@ # Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2 # $Header: /var/cvsroot/gentoo-x86/sys-apps/policycoreutils/ChangeLog,v = 1.89 2011/08/12 18:46:59 blueness Exp $ =20 + 13 Sep 2011; policycoreutils-2.1.0-r1.ebuild: + Fix paths to patches + 12 Sep 2011; +policycoreutils-2.1.0-r1.ebuild, +metadata.xml: Support for semodule permissive diff --git a/sys-apps/policycoreutils/policycoreutils-2.1.0-r1.ebuild b/s= ys-apps/policycoreutils/policycoreutils-2.1.0-r1.ebuild index 0a53ca1..f6c05af 100644 --- a/sys-apps/policycoreutils/policycoreutils-2.1.0-r1.ebuild +++ b/sys-apps/policycoreutils/policycoreutils-2.1.0-r1.ebuild @@ -20,6 +20,8 @@ IUSE=3D"" DESCRIPTION=3D"SELinux core utilities" HOMEPAGE=3D"http://userspace.selinuxproject.org" SRC_URI=3D"http://userspace.selinuxproject.org/releases/20110727/devel/$= {P}.tar.gz + http://dev.gentoo.org/~swift/patches/policycoreutils/policycoreutils-2.= 0.85-sesandbox.patch.gz + http://dev.gentoo.org/~swift/patches/policycoreutils/policycoreutils-2.= 0.85-fix-seunshare-vuln.patch.gz mirror://gentoo/policycoreutils-extra-${EXTRAS_VER}.tar.bz2 mirror://gentoo/policycoreutils-2.0.85-python3.tar.gz" =20 @@ -57,11 +59,11 @@ src_prepare() { # vulnerability (bug #374897) might go by unnoticed if we ignore it now= . # As such, we will # - prepare support for switching name from "sandbox" to "sesandbox" - epatch "${FILESDIR}/policycoreutils-2.0.85-sesandbox.patch.gz" + epatch "${DISTDIR}/policycoreutils-2.0.85-sesandbox.patch.gz" # - patch the sandbox and seunshare code to fix the vulnerability # (uses, with permission, extract from # http://pkgs.fedoraproject.org/gitweb/?p=3Dpolicycoreutils.git;a=3Db= lob_plain;f=3Dpolicycoreutils-rhat.patch;hb=3DHEAD) - epatch "${FILESDIR}/policycoreutils-2.0.85-fix-seunshare-vuln.patch.gz" + epatch "${DISTDIR}/policycoreutils-2.0.85-fix-seunshare-vuln.patch.gz" # But for now, disable building sandbox code sed -i -e 's/sandbox //' "${S}/Makefile" || die "failed removing sandbo= x" # Overwrite gl.po, id.po and et.po with valid PO file