diff options
Diffstat (limited to 'app-forensics/openscap')
-rw-r--r-- | app-forensics/openscap/Manifest | 8 | ||||
-rw-r--r-- | app-forensics/openscap/metadata.xml | 16 | ||||
-rw-r--r-- | app-forensics/openscap/openscap-1.2.13.ebuild | 138 | ||||
-rw-r--r-- | app-forensics/openscap/openscap-1.2.14.ebuild | 138 | ||||
-rw-r--r-- | app-forensics/openscap/openscap-1.2.5.ebuild | 138 | ||||
-rw-r--r-- | app-forensics/openscap/openscap-9999.ebuild | 151 |
6 files changed, 589 insertions, 0 deletions
diff --git a/app-forensics/openscap/Manifest b/app-forensics/openscap/Manifest new file mode 100644 index 000000000000..c1e0e77921ed --- /dev/null +++ b/app-forensics/openscap/Manifest @@ -0,0 +1,8 @@ +DIST openscap-1.2.13.tar.gz 15874074 BLAKE2B 680a574cec7c8cd8e75dc91e4824735b09d2225ac91118897e569b2eb073959ea6d4a184fb79014aebe21d853ca01d2d36ed077050b82a2376066ad092bea170 SHA512 393b426f3278ab9438439df9a077b95b29bba66dfc2c799b7b40c2bf3980cf619aa1efc27225785ec780aa75926af6751b10fdb0b8d561c8056bf9a9a087792a +DIST openscap-1.2.14.tar.gz 15980085 BLAKE2B 1d5d418b215f4a66a9f1874c4b9ed32c7c80e09d74a0ef04a256a7e1a24f1b675871116b0e22576dce476ee01c3d3b26ea5a48870a58aca99fdaea52c6877a7a SHA512 0e408b2dd58b8b424a27f5c852c6dc8c596fdb201e45cc5f762a1998e00511040762df4e55cdfd93dac4c820c28935acdf3942e96227dfa4f4363d682a2da7da +DIST openscap-1.2.5.tar.gz 14513153 BLAKE2B bf7925fe17cb451f240ec50994f9291f55dbdb50c38872df0db1663a2d3f640e4d8bf1595d4fd7b46059ab43708e9340f4a1cced58029775f57f3b6d29a2eb30 SHA512 abeafafeaedd60ca08b52b981f83d458bc972894fc466d7cff29170b578a023f314bd330d7c812d838e09cad567ddc5daafa7e46e4b9a0db76451114d98d17ca +EBUILD openscap-1.2.13.ebuild 4286 BLAKE2B 280db60d4754f63ac12c717d10fc2048edbe6e98cb880a974b0780ed8321b23c40e598fd2a5042b67a30f9137e80b50f1dc183b13104100babbd94b40386d450 SHA512 7afdb887a8525c6cc159d3fb13409992461d17b1c39ffaff88d2d25ca7b2b357b374f0fac4741e2a5d462f52bedaa6cf207ebadc917ff84ed40ec94769feebd1 +EBUILD openscap-1.2.14.ebuild 4286 BLAKE2B 280db60d4754f63ac12c717d10fc2048edbe6e98cb880a974b0780ed8321b23c40e598fd2a5042b67a30f9137e80b50f1dc183b13104100babbd94b40386d450 SHA512 7afdb887a8525c6cc159d3fb13409992461d17b1c39ffaff88d2d25ca7b2b357b374f0fac4741e2a5d462f52bedaa6cf207ebadc917ff84ed40ec94769feebd1 +EBUILD openscap-1.2.5.ebuild 4269 BLAKE2B 50f916e56621d6e7d6b888fca6d5b7fd0cf9f2c39b7ab0b025df1d10de43e39e2d2628ec99790e9b8221679cedb730cb8526875f12c93a89aef3db60757dcd5a SHA512 271741cfe0a503f05c4fc1b93af2d517fb91f5c6a8c455d3bfccba79e2d63b9613282c127f225041e761be7db5130e40740960feb423fd8a1a1a0f5b7c5ce487 +EBUILD openscap-9999.ebuild 4525 BLAKE2B d01cac69963b680845045d12f01e246a362f6fc1fc642faca0136330778e823e042d23209aa0303309b1f0ebb4c22c6fcaee1ef71766763a740d5305d2488845 SHA512 49aa917d534848a7b6cf3859bd905386dc35771d18f01afb5a38816ab1cbffdb468a3644af9dc33887648ae9ea8df8a935b1bf9b95178107f0cbbb4e48ebd0c7 +MISC metadata.xml 578 BLAKE2B 11b1f278dca69f4a60d0787d132db680da262d1dc2ebd91cca07b7dc7d87016a3fa9d536ae008e432a1d82494ba6f4f02bda7488667104a2a994d430fb45886d SHA512 404947116ad0cfa7f260bd577e3ae99ae4a2813be4c36687e2664c5cc2d1ce2b130a83b03bafd81e1750b19a50ba49864959e97a67a8e2099c43186099e7f5f9 diff --git a/app-forensics/openscap/metadata.xml b/app-forensics/openscap/metadata.xml new file mode 100644 index 000000000000..dc502c8179d4 --- /dev/null +++ b/app-forensics/openscap/metadata.xml @@ -0,0 +1,16 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> + <!-- maintainer-needed --> + <use> + <flag name="gconf">Build the gconf independant probes</flag> + <flag name="nss">Prefer NSS over libgcrypt as the crypto engine</flag> + <flag name="rpm">Compiles the RPM probes</flag> + <flag name="sce">Enables Script Check Engine (SCE) support</flag> + <flag name="sql">Build the sql independant probes</flag> + </use> + <upstream> + <remote-id type="github">OpenSCAP/openscap</remote-id> + </upstream> +</pkgmetadata> + diff --git a/app-forensics/openscap/openscap-1.2.13.ebuild b/app-forensics/openscap/openscap-1.2.13.ebuild new file mode 100644 index 000000000000..d2b7aa583d7a --- /dev/null +++ b/app-forensics/openscap/openscap-1.2.13.ebuild @@ -0,0 +1,138 @@ +# Copyright 1999-2017 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +EAPI=5 + +PYTHON_COMPAT=( python2_7 ) + +inherit bash-completion-r1 eutils multilib python-single-r1 + +DESCRIPTION="Framework which enables integration with Security Content Automation Protocol" +HOMEPAGE="http://www.open-scap.org/" +SRC_URI="https://github.com/OpenSCAP/${PN}/releases/download/${PV}/${P}.tar.gz" + +LICENSE="LGPL-2.1+" +SLOT="0" +KEYWORDS="~amd64 ~x86" +IUSE="acl caps debug doc gconf ldap nss pcre perl python rpm selinux sce sql test xattr" +RESTRICT="test" + +RDEPEND="!nss? ( dev-libs/libgcrypt:0 ) + nss? ( dev-libs/nss ) + acl? ( virtual/acl ) + caps? ( sys-libs/libcap ) + gconf? ( gnome-base/gconf ) + ldap? ( net-nds/openldap ) + pcre? ( dev-libs/libpcre ) + rpm? ( >=app-arch/rpm-4.9 ) + sql? ( dev-db/opendbx ) + xattr? ( sys-apps/attr ) + dev-libs/libpcre + dev-libs/libxml2 + dev-libs/libxslt + net-misc/curl + ${PYTHON_DEPS}" +DEPEND="${RDEPEND} + doc? ( app-doc/doxygen ) + perl? ( dev-lang/swig ) + python? ( dev-lang/swig ) + test? ( + app-arch/unzip + dev-perl/XML-XPath + net-misc/ipcalc + sys-apps/grep )" + +REQUIRED_USE="${PYTHON_REQUIRED_USE}" + +src_prepare() { +# uncoment for debugging test +# sed -i 's,set -e,&;set -x,' tests/API/XCCDF/unittests/test_remediate_simple.sh || die +# sed -i 's,^ bash, LC_ALL=C bash,' tests/probes/process/test_probes_process.sh || die + + sed -i 's/uname -p/uname -m/' tests/probes/uname/test_probes_uname.xml.sh || die + + #probe runlevel for non-centos/redhat/fedora is not implemented + sed -i 's,.*runlevel_test.*,echo "runlevel test bypassed",' tests/mitre/test_mitre.sh || die + sed -i 's,probecheck "runlevel,probecheck "runlevellllll,' tests/probes/runlevel/test_probes_runlevel.sh || die + + #According to comment of theses tests, we must modify it. For the moment disable it + sed -i 's,.*linux-def_inetlisteningservers_test,#&,' tests/mitre/test_mitre.sh || die + sed -i 's,.*ind-def_environmentvariable_test,#&,' tests/mitre/test_mitre.sh || die + + # theses tests are hardcoded for checking hald process..., + # but no good solution for the moment, disabling them with a fake echo + # because encased in a if then +# sed -i 's,ha.d,/sbin/udevd --daemon,g' tests/mitre/unix-def_process_test.xml || die +# sed -i 's,ha.d,/sbin/udevd --daemon,g' tests/mitre/unix-def_process58_test.xml || die + sed -i 's,.*process_test.*,echo "process test bypassed",' tests/mitre/test_mitre.sh || die + sed -i 's,.*process58_test.*,echo "process58 test bypassed",' tests/mitre/test_mitre.sh || die + + #This test fail + sed -i 's,.*generate report: xccdf,#&,' tests/API/XCCDF/unittests/all.sh || die + + if ! use rpm ; then + sed -i 's,probe_rpminfo_req_deps_ok=yes,probe_rpminfo_req_deps_ok=no,' configure || die + sed -i 's,probe_rpminfo_opt_deps_ok=yes,probe_rpminfo_opt_deps_ok=no,' configure || die + sed -i 's,probe_rpmverify_req_deps_ok=yes,probe_rpmverify_req_deps_ok=no,' configure || die + sed -i 's,probe_rpmverify_opt_deps_ok=yes,probe_rpmverify_opt_deps_ok=no,' configure || die + sed -i 's,^probe_rpm.*_deps_missing=,&disabled_by_USE_flag,' configure || die + sed -i 's,.*rpm.*,#&,' tests/mitre/test_mitre.sh || die + fi + if ! use selinux ; then + einfo "Disabling SELinux probes" + sed -i 's,.*selinux.*, echo "SELinux test bypassed",' tests/mitre/test_mitre.sh || die + #process58 need selinux + sed -i 's,.*process58,#&,' tests/mitre/test_mitre.sh || die + fi + if ! use ldap; then + einfo "Disabling LDAP probes" + sed -i 's,ldap.h,ldapp.h,g' configure || die + fi + + epatch_user +} + +src_configure() { + python_setup + local myconf + if use debug ; then + myconf+=" --enable-debug" + fi + if use python ; then + myconf+=" --enable-python" + else + myconf+=" --enable-python=no" + fi + if use perl ; then + myconf+=" --enable-perl" + fi + if use nss ; then + myconf+=" --with-crypto=nss3" + else + myconf+=" --with-crypto=gcrypt" + fi + if use sce ; then + myconf+=" --enable-sce" + else + myconf+=" --enable-sce=no" + fi + econf ${myconf} +} + +src_compile() { + emake + if use doc ; then + cd docs && doxygen Doxyfile || die + fi +} + +src_install() { + emake install DESTDIR="${D}" + prune_libtool_files --all + if use doc ; then + dohtml -r docs/html/. + dodoc -r docs/examples/. + fi + dobashcomp "${D}"/etc/bash_completion.d/oscap + rm -rf "${D}"/etc/bash_completion.d || die +} diff --git a/app-forensics/openscap/openscap-1.2.14.ebuild b/app-forensics/openscap/openscap-1.2.14.ebuild new file mode 100644 index 000000000000..d2b7aa583d7a --- /dev/null +++ b/app-forensics/openscap/openscap-1.2.14.ebuild @@ -0,0 +1,138 @@ +# Copyright 1999-2017 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +EAPI=5 + +PYTHON_COMPAT=( python2_7 ) + +inherit bash-completion-r1 eutils multilib python-single-r1 + +DESCRIPTION="Framework which enables integration with Security Content Automation Protocol" +HOMEPAGE="http://www.open-scap.org/" +SRC_URI="https://github.com/OpenSCAP/${PN}/releases/download/${PV}/${P}.tar.gz" + +LICENSE="LGPL-2.1+" +SLOT="0" +KEYWORDS="~amd64 ~x86" +IUSE="acl caps debug doc gconf ldap nss pcre perl python rpm selinux sce sql test xattr" +RESTRICT="test" + +RDEPEND="!nss? ( dev-libs/libgcrypt:0 ) + nss? ( dev-libs/nss ) + acl? ( virtual/acl ) + caps? ( sys-libs/libcap ) + gconf? ( gnome-base/gconf ) + ldap? ( net-nds/openldap ) + pcre? ( dev-libs/libpcre ) + rpm? ( >=app-arch/rpm-4.9 ) + sql? ( dev-db/opendbx ) + xattr? ( sys-apps/attr ) + dev-libs/libpcre + dev-libs/libxml2 + dev-libs/libxslt + net-misc/curl + ${PYTHON_DEPS}" +DEPEND="${RDEPEND} + doc? ( app-doc/doxygen ) + perl? ( dev-lang/swig ) + python? ( dev-lang/swig ) + test? ( + app-arch/unzip + dev-perl/XML-XPath + net-misc/ipcalc + sys-apps/grep )" + +REQUIRED_USE="${PYTHON_REQUIRED_USE}" + +src_prepare() { +# uncoment for debugging test +# sed -i 's,set -e,&;set -x,' tests/API/XCCDF/unittests/test_remediate_simple.sh || die +# sed -i 's,^ bash, LC_ALL=C bash,' tests/probes/process/test_probes_process.sh || die + + sed -i 's/uname -p/uname -m/' tests/probes/uname/test_probes_uname.xml.sh || die + + #probe runlevel for non-centos/redhat/fedora is not implemented + sed -i 's,.*runlevel_test.*,echo "runlevel test bypassed",' tests/mitre/test_mitre.sh || die + sed -i 's,probecheck "runlevel,probecheck "runlevellllll,' tests/probes/runlevel/test_probes_runlevel.sh || die + + #According to comment of theses tests, we must modify it. For the moment disable it + sed -i 's,.*linux-def_inetlisteningservers_test,#&,' tests/mitre/test_mitre.sh || die + sed -i 's,.*ind-def_environmentvariable_test,#&,' tests/mitre/test_mitre.sh || die + + # theses tests are hardcoded for checking hald process..., + # but no good solution for the moment, disabling them with a fake echo + # because encased in a if then +# sed -i 's,ha.d,/sbin/udevd --daemon,g' tests/mitre/unix-def_process_test.xml || die +# sed -i 's,ha.d,/sbin/udevd --daemon,g' tests/mitre/unix-def_process58_test.xml || die + sed -i 's,.*process_test.*,echo "process test bypassed",' tests/mitre/test_mitre.sh || die + sed -i 's,.*process58_test.*,echo "process58 test bypassed",' tests/mitre/test_mitre.sh || die + + #This test fail + sed -i 's,.*generate report: xccdf,#&,' tests/API/XCCDF/unittests/all.sh || die + + if ! use rpm ; then + sed -i 's,probe_rpminfo_req_deps_ok=yes,probe_rpminfo_req_deps_ok=no,' configure || die + sed -i 's,probe_rpminfo_opt_deps_ok=yes,probe_rpminfo_opt_deps_ok=no,' configure || die + sed -i 's,probe_rpmverify_req_deps_ok=yes,probe_rpmverify_req_deps_ok=no,' configure || die + sed -i 's,probe_rpmverify_opt_deps_ok=yes,probe_rpmverify_opt_deps_ok=no,' configure || die + sed -i 's,^probe_rpm.*_deps_missing=,&disabled_by_USE_flag,' configure || die + sed -i 's,.*rpm.*,#&,' tests/mitre/test_mitre.sh || die + fi + if ! use selinux ; then + einfo "Disabling SELinux probes" + sed -i 's,.*selinux.*, echo "SELinux test bypassed",' tests/mitre/test_mitre.sh || die + #process58 need selinux + sed -i 's,.*process58,#&,' tests/mitre/test_mitre.sh || die + fi + if ! use ldap; then + einfo "Disabling LDAP probes" + sed -i 's,ldap.h,ldapp.h,g' configure || die + fi + + epatch_user +} + +src_configure() { + python_setup + local myconf + if use debug ; then + myconf+=" --enable-debug" + fi + if use python ; then + myconf+=" --enable-python" + else + myconf+=" --enable-python=no" + fi + if use perl ; then + myconf+=" --enable-perl" + fi + if use nss ; then + myconf+=" --with-crypto=nss3" + else + myconf+=" --with-crypto=gcrypt" + fi + if use sce ; then + myconf+=" --enable-sce" + else + myconf+=" --enable-sce=no" + fi + econf ${myconf} +} + +src_compile() { + emake + if use doc ; then + cd docs && doxygen Doxyfile || die + fi +} + +src_install() { + emake install DESTDIR="${D}" + prune_libtool_files --all + if use doc ; then + dohtml -r docs/html/. + dodoc -r docs/examples/. + fi + dobashcomp "${D}"/etc/bash_completion.d/oscap + rm -rf "${D}"/etc/bash_completion.d || die +} diff --git a/app-forensics/openscap/openscap-1.2.5.ebuild b/app-forensics/openscap/openscap-1.2.5.ebuild new file mode 100644 index 000000000000..444292acf604 --- /dev/null +++ b/app-forensics/openscap/openscap-1.2.5.ebuild @@ -0,0 +1,138 @@ +# Copyright 1999-2017 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +EAPI=5 + +PYTHON_COMPAT=( python2_7 ) + +inherit bash-completion-r1 eutils multilib python-single-r1 + +DESCRIPTION="Framework which enables integration with Security Content Automation Protocol" +HOMEPAGE="http://www.open-scap.org/" +SRC_URI="https://fedorahosted.org/releases/o/p/${PN}/${P}.tar.gz" + +LICENSE="LGPL-2.1+" +SLOT="0" +KEYWORDS="~amd64 ~x86" +IUSE="acl caps debug doc gconf ldap nss pcre perl python rpm selinux sce sql test xattr" +RESTRICT="test" + +RDEPEND="!nss? ( dev-libs/libgcrypt:0 ) + nss? ( dev-libs/nss ) + acl? ( virtual/acl ) + caps? ( sys-libs/libcap ) + gconf? ( gnome-base/gconf ) + ldap? ( net-nds/openldap ) + pcre? ( dev-libs/libpcre ) + rpm? ( >=app-arch/rpm-4.9 ) + sql? ( dev-db/opendbx ) + xattr? ( sys-apps/attr ) + dev-libs/libpcre + dev-libs/libxml2 + dev-libs/libxslt + net-misc/curl + ${PYTHON_DEPS}" +DEPEND="${RDEPEND} + doc? ( app-doc/doxygen ) + perl? ( dev-lang/swig ) + python? ( dev-lang/swig ) + test? ( + app-arch/unzip + dev-perl/XML-XPath + net-misc/ipcalc + sys-apps/grep )" + +REQUIRED_USE="${PYTHON_REQUIRED_USE}" + +src_prepare() { +# uncoment for debugging test +# sed -i 's,set -e,&;set -x,' tests/API/XCCDF/unittests/test_remediate_simple.sh || die +# sed -i 's,^ bash, LC_ALL=C bash,' tests/probes/process/test_probes_process.sh || die + + sed -i 's/uname -p/uname -m/' tests/probes/uname/test_probes_uname.xml.sh || die + + #probe runlevel for non-centos/redhat/fedora is not implemented + sed -i 's,.*runlevel_test.*,echo "runlevel test bypassed",' tests/mitre/test_mitre.sh || die + sed -i 's,probecheck "runlevel,probecheck "runlevellllll,' tests/probes/runlevel/test_probes_runlevel.sh || die + + #According to comment of theses tests, we must modify it. For the moment disable it + sed -i 's,.*linux-def_inetlisteningservers_test,#&,' tests/mitre/test_mitre.sh || die + sed -i 's,.*ind-def_environmentvariable_test,#&,' tests/mitre/test_mitre.sh || die + + # theses tests are hardcoded for checking hald process..., + # but no good solution for the moment, disabling them with a fake echo + # because encased in a if then +# sed -i 's,ha.d,/sbin/udevd --daemon,g' tests/mitre/unix-def_process_test.xml || die +# sed -i 's,ha.d,/sbin/udevd --daemon,g' tests/mitre/unix-def_process58_test.xml || die + sed -i 's,.*process_test.*,echo "process test bypassed",' tests/mitre/test_mitre.sh || die + sed -i 's,.*process58_test.*,echo "process58 test bypassed",' tests/mitre/test_mitre.sh || die + + #This test fail + sed -i 's,.*generate report: xccdf,#&,' tests/API/XCCDF/unittests/all.sh || die + + if ! use rpm ; then + sed -i 's,probe_rpminfo_req_deps_ok=yes,probe_rpminfo_req_deps_ok=no,' configure || die + sed -i 's,probe_rpminfo_opt_deps_ok=yes,probe_rpminfo_opt_deps_ok=no,' configure || die + sed -i 's,probe_rpmverify_req_deps_ok=yes,probe_rpmverify_req_deps_ok=no,' configure || die + sed -i 's,probe_rpmverify_opt_deps_ok=yes,probe_rpmverify_opt_deps_ok=no,' configure || die + sed -i 's,^probe_rpm.*_deps_missing=,&disabled_by_USE_flag,' configure || die + sed -i 's,.*rpm.*,#&,' tests/mitre/test_mitre.sh || die + fi + if ! use selinux ; then + einfo "Disabling SELinux probes" + sed -i 's,.*selinux.*, echo "SELinux test bypassed",' tests/mitre/test_mitre.sh || die + #process58 need selinux + sed -i 's,.*process58,#&,' tests/mitre/test_mitre.sh || die + fi + if ! use ldap; then + einfo "Disabling LDAP probes" + sed -i 's,ldap.h,ldapp.h,g' configure || die + fi + + epatch_user +} + +src_configure() { + python_setup + local myconf + if use debug ; then + myconf+=" --enable-debug" + fi + if use python ; then + myconf+=" --enable-python" + else + myconf+=" --enable-python=no" + fi + if use perl ; then + myconf+=" --enable-perl" + fi + if use nss ; then + myconf+=" --with-crypto=nss3" + else + myconf+=" --with-crypto=gcrypt" + fi + if use sce ; then + myconf+=" --enable-sce" + else + myconf+=" --enable-sce=no" + fi + econf ${myconf} +} + +src_compile() { + emake + if use doc ; then + cd docs && doxygen Doxyfile || die + fi +} + +src_install() { + emake install DESTDIR="${D}" + prune_libtool_files --all + if use doc ; then + dohtml -r docs/html/. + dodoc docs/examples/. + fi + dobashcomp "${D}"/etc/bash_completion.d/oscap + rm -rf "${D}"/etc/bash_completion.d || die +} diff --git a/app-forensics/openscap/openscap-9999.ebuild b/app-forensics/openscap/openscap-9999.ebuild new file mode 100644 index 000000000000..d58554dfec2e --- /dev/null +++ b/app-forensics/openscap/openscap-9999.ebuild @@ -0,0 +1,151 @@ +# Copyright 1999-2017 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +EAPI=5 + +PYTHON_COMPAT=( python2_7 ) + +inherit bash-completion-r1 eutils multilib python-single-r1 + +DESCRIPTION="Framework which enables integration with Security Content Automation Protocol" +HOMEPAGE="http://www.open-scap.org/" +if [[ "${PV}" != "9999" ]]; +then + SRC_URI="https://fedorahosted.org/releases/o/p/${PN}/${P}.tar.gz" + KEYWORDS="~amd64 ~x86" +else + inherit git-r3 autotools + EGIT_REPO_URI="https://github.com/OpenSCAP/openscap.git" +fi + +LICENSE="LGPL-2.1+" +SLOT="0" +IUSE="acl caps debug doc gconf ldap nss pcre perl python rpm selinux sce sql test xattr" +#RESTRICT="test" + +RDEPEND="!nss? ( dev-libs/libgcrypt:0 ) + nss? ( dev-libs/nss ) + acl? ( virtual/acl ) + caps? ( sys-libs/libcap ) + gconf? ( gnome-base/gconf ) + ldap? ( net-nds/openldap ) + pcre? ( dev-libs/libpcre ) + rpm? ( >=app-arch/rpm-4.9 ) + sql? ( dev-db/opendbx ) + xattr? ( sys-apps/attr ) + dev-libs/libpcre + dev-libs/libxml2 + dev-libs/libxslt + net-misc/curl + ${PYTHON_DEPS}" +DEPEND="${RDEPEND} + doc? ( app-doc/doxygen ) + perl? ( dev-lang/swig ) + python? ( dev-lang/swig ) + test? ( + app-arch/unzip + dev-perl/XML-XPath + net-misc/ipcalc + sys-apps/grep )" + +REQUIRED_USE="${PYTHON_REQUIRED_USE}" + +src_prepare() { +# uncoment for debugging test +# sed -i 's,set -e,&;set -x,' tests/API/XCCDF/unittests/test_remediate_simple.sh || die + + sed -i 's/uname -p/uname -m/' tests/probes/uname/test_probes_uname.xml.sh || die + + #probe runlevel for non-centos/redhat/fedora is not implemented + sed -i 's,.*runlevel_test.*,echo "runlevel test bypassed",' tests/mitre/test_mitre.sh || die + sed -i 's,probecheck "runlevel,probecheck "runlevellllll,' tests/probes/runlevel/test_probes_runlevel.sh || die + + #According to comment of theses tests, we must modify it. For the moment disable it + sed -i 's,.*linux-def_inetlisteningservers_test,#&,' tests/mitre/test_mitre.sh || die + sed -i 's,.*ind-def_environmentvariable_test,#&,' tests/mitre/test_mitre.sh || die + + # theses tests are hardcoded for checking hald process..., + # but no good solution for the moment, disabling them with a fake echo + # because encased in a if then +# sed -i 's,ha.d,/sbin/udevd --daemon,g' tests/mitre/unix-def_process_test.xml || die +# sed -i 's,ha.d,/sbin/udevd --daemon,g' tests/mitre/unix-def_process58_test.xml || die + sed -i 's,.*process_test.*,echo "process test bypassed",' tests/mitre/test_mitre.sh || die + sed -i 's,.*process58_test.*,echo "process58 test bypassed",' tests/mitre/test_mitre.sh || die + + #This test fail + sed -i 's,.*generate report: xccdf,#&,' tests/API/XCCDF/unittests/all.sh || die + + if [[ "${PV}" == "9999" ]]; + then + # fix automake failure about missing 'config/config.rpath' + touch config/config.rpath + eautoreconf + fi + + if ! use rpm ; then + sed -i 's,probe_rpminfo_req_deps_ok=yes,probe_rpminfo_req_deps_ok=no,' configure || die + sed -i 's,probe_rpminfo_opt_deps_ok=yes,probe_rpminfo_opt_deps_ok=no,' configure || die + sed -i 's,probe_rpmverify_req_deps_ok=yes,probe_rpmverify_req_deps_ok=no,' configure || die + sed -i 's,probe_rpmverify_opt_deps_ok=yes,probe_rpmverify_opt_deps_ok=no,' configure || die + sed -i 's,^probe_rpm.*_deps_missing=,&disabled_by_USE_flag,' configure || die + sed -i 's,.*rpm.*,#&,' tests/mitre/test_mitre.sh || die + fi + if ! use selinux ; then + einfo "Disabling SELinux probes" + sed -i 's,.*selinux.*, echo "SELinux test bypassed",' tests/mitre/test_mitre.sh || die + #process58 need selinux + sed -i 's,.*process58,#&,' tests/mitre/test_mitre.sh || die + fi + if ! use ldap; then + einfo "Disabling LDAP probes" + sed -i 's,ldap.h,ldapp.h,g' configure || die + fi + + epatch_user +} + +src_configure() { + python_setup + local myconf + if use debug ; then + myconf+=" --enable-debug" + fi + if use python ; then + myconf+=" --enable-python" + else + myconf+=" --enable-python=no" + fi + if use perl ; then + myconf+=" --enable-perl" + fi + if use nss ; then + myconf+=" --with-crypto=nss3" + else + myconf+=" --with-crypto=gcrypt" + fi + if use sce ; then + myconf+=" --enable-sce" + else + myconf+=" --enable-sce=no" + fi + econf ${myconf} +} + +src_compile() { + emake + if use doc ; then + einfo "Building HTML documentation using Doxygen (which will take a while)" + cd docs && doxygen Doxyfile || die + fi +} + +src_install() { + emake install DESTDIR="${D}" + prune_libtool_files --all + if use doc ; then + dohtml -r docs/html/. + dodoc docs/examples/. + fi + dobashcomp "${D}"/etc/bash_completion.d/oscap + rm -rf "${D}"/etc/bash_completion.d || die +} |