From 0f558761aa2dee1017b4751e4017205e015a9560 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Wed, 29 Jun 2022 12:04:12 +0100 Subject: gentoo resync : 29.12.2022 --- sys-auth/AusweisApp2/AusweisApp2-1.22.4.ebuild | 48 ---- sys-auth/AusweisApp2/AusweisApp2-1.22.5.ebuild | 48 ---- sys-auth/AusweisApp2/AusweisApp2-1.22.7.ebuild | 48 ++++ sys-auth/AusweisApp2/Manifest | 6 +- sys-auth/Manifest.gz | Bin 9404 -> 9579 bytes sys-auth/elogind/Manifest | 2 +- sys-auth/elogind/elogind-246.10-r2.ebuild | 4 +- sys-auth/libfprint/Manifest | 3 + .../libfprint-1.94.4-stderr-redefinition.patch | 24 ++ sys-auth/libfprint/libfprint-1.94.4.ebuild | 59 +++++ sys-auth/pam_mount/Manifest | 8 +- ...m_mount-2.16-crypto-Add-support-for-LUKS2.patch | 52 ---- sys-auth/pam_mount/pam_mount-2.16-r3.ebuild | 47 ---- sys-auth/pam_mount/pam_mount-2.17.ebuild | 49 ---- sys-auth/pam_mount/pam_mount-2.18-r1.ebuild | 2 +- sys-auth/pam_mount/pam_mount-2.18.ebuild | 49 ---- sys-auth/pam_p11/Manifest | 2 +- sys-auth/pam_p11/metadata.xml | 5 +- sys-auth/pam_skey/Manifest | 2 +- sys-auth/pam_skey/metadata.xml | 3 - sys-auth/polkit-qt/Manifest | 2 +- sys-auth/polkit-qt/polkit-qt-0.114.0-r1.ebuild | 2 +- sys-auth/polkit/Manifest | 12 +- sys-auth/polkit/files/polkit-0.115-elogind.patch | 28 -- .../polkit/files/polkit-0.117-CVE-2021-3560.patch | 29 --- .../polkit/files/polkit-0.120-CVE-2021-4034.patch | 72 ------ .../polkit/files/polkit-0.120-CVE-2021-4115.patch | 78 ------ sys-auth/polkit/metadata.xml | 1 - sys-auth/polkit/polkit-0.117-r3.ebuild | 136 ---------- sys-auth/polkit/polkit-0.120-r3.ebuild | 123 --------- sys-auth/polkit/polkit-0.120_p20220509.ebuild | 2 +- sys-auth/realtime-base/Manifest | 2 +- sys-auth/realtime-base/realtime-base-0.1-r1.ebuild | 4 +- sys-auth/seatd/Manifest | 6 +- sys-auth/seatd/seatd-0.6.4.ebuild | 3 +- sys-auth/seatd/seatd-0.7.0.ebuild | 56 ++++ sys-auth/seatd/seatd-9999.ebuild | 5 +- sys-auth/solo1/Manifest | 2 +- sys-auth/solo1/solo1-0.1.1.ebuild | 2 +- sys-auth/ssh-import-id/Manifest | 3 + sys-auth/ssh-import-id/metadata.xml | 9 + sys-auth/ssh-import-id/ssh-import-id-5.11.ebuild | 27 ++ sys-auth/ssh-ldap-pubkey/Manifest | 5 +- .../files/ssh-ldap-pubkey-1.3.3-python3.9.patch | 34 --- .../ssh-ldap-pubkey/ssh-ldap-pubkey-1.3.3.ebuild | 73 ------ .../ssh-ldap-pubkey/ssh-ldap-pubkey-1.4.0.ebuild | 60 +++++ sys-auth/sssd/Manifest | 3 - ...k-for-libsofthsm2.so-in-usr-libdir-sofths.patch | 32 --- sys-auth/sssd/sssd-2.3.1-r3.ebuild | 288 --------------------- sys-auth/ykpers/Manifest | 1 + sys-auth/ykpers/ykpers-1.20.0-r1.ebuild | 61 +++++ 51 files changed, 381 insertions(+), 1241 deletions(-) delete mode 100644 sys-auth/AusweisApp2/AusweisApp2-1.22.4.ebuild delete mode 100644 sys-auth/AusweisApp2/AusweisApp2-1.22.5.ebuild create mode 100644 sys-auth/AusweisApp2/AusweisApp2-1.22.7.ebuild create mode 100644 sys-auth/libfprint/files/libfprint-1.94.4-stderr-redefinition.patch create mode 100644 sys-auth/libfprint/libfprint-1.94.4.ebuild delete mode 100644 sys-auth/pam_mount/files/pam_mount-2.16-crypto-Add-support-for-LUKS2.patch delete mode 100644 sys-auth/pam_mount/pam_mount-2.16-r3.ebuild delete mode 100644 sys-auth/pam_mount/pam_mount-2.17.ebuild delete mode 100644 sys-auth/pam_mount/pam_mount-2.18.ebuild delete mode 100644 sys-auth/polkit/files/polkit-0.115-elogind.patch delete mode 100644 sys-auth/polkit/files/polkit-0.117-CVE-2021-3560.patch delete mode 100644 sys-auth/polkit/files/polkit-0.120-CVE-2021-4034.patch delete mode 100644 sys-auth/polkit/files/polkit-0.120-CVE-2021-4115.patch delete mode 100644 sys-auth/polkit/polkit-0.117-r3.ebuild delete mode 100644 sys-auth/polkit/polkit-0.120-r3.ebuild create mode 100644 sys-auth/seatd/seatd-0.7.0.ebuild create mode 100644 sys-auth/ssh-import-id/Manifest create mode 100644 sys-auth/ssh-import-id/metadata.xml create mode 100644 sys-auth/ssh-import-id/ssh-import-id-5.11.ebuild delete mode 100644 sys-auth/ssh-ldap-pubkey/files/ssh-ldap-pubkey-1.3.3-python3.9.patch delete mode 100644 sys-auth/ssh-ldap-pubkey/ssh-ldap-pubkey-1.3.3.ebuild create mode 100644 sys-auth/ssh-ldap-pubkey/ssh-ldap-pubkey-1.4.0.ebuild delete mode 100644 sys-auth/sssd/files/sssd-2.3.1-test_ca-Look-for-libsofthsm2.so-in-usr-libdir-sofths.patch delete mode 100644 sys-auth/sssd/sssd-2.3.1-r3.ebuild create mode 100644 sys-auth/ykpers/ykpers-1.20.0-r1.ebuild (limited to 'sys-auth') diff --git a/sys-auth/AusweisApp2/AusweisApp2-1.22.4.ebuild b/sys-auth/AusweisApp2/AusweisApp2-1.22.4.ebuild deleted file mode 100644 index c73e5792cc88..000000000000 --- a/sys-auth/AusweisApp2/AusweisApp2-1.22.4.ebuild +++ /dev/null @@ -1,48 +0,0 @@ -# Copyright 2020-2022 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=8 - -inherit cmake xdg-utils - -DESCRIPTION="Official authentication app for German ID cards and residence permits" -HOMEPAGE="https://www.ausweisapp.bund.de/" -SRC_URI="https://github.com/Governikus/${PN}/archive/${PV}.tar.gz -> ${P}.tar.gz" - -LICENSE="EUPL-1.2" -SLOT="0" -KEYWORDS="amd64 x86" - -BDEPEND=" - dev-qt/linguist-tools:5 - virtual/pkgconfig" - -RDEPEND=" - dev-libs/openssl:0= - dev-qt/qtconcurrent:5 - dev-qt/qtcore:5 - dev-qt/qtdeclarative:5 - dev-qt/qtgui:5 - dev-qt/qtnetwork:5 - dev-qt/qtquickcontrols2:5 - dev-qt/qtsvg:5 - dev-qt/qtwebsockets:5[qml] - dev-qt/qtwidgets:5 - net-libs/http-parser:0= - sys-apps/pcsc-lite - virtual/udev" - -DEPEND="${RDEPEND}" - -src_configure() { - local mycmakeargs=( -DBUILD_SHARED_LIBS=OFF ) - cmake_src_configure -} - -pkg_postinst() { - xdg_icon_cache_update -} - -pkg_postrm() { - xdg_icon_cache_update -} diff --git a/sys-auth/AusweisApp2/AusweisApp2-1.22.5.ebuild b/sys-auth/AusweisApp2/AusweisApp2-1.22.5.ebuild deleted file mode 100644 index fd2f4d5730d0..000000000000 --- a/sys-auth/AusweisApp2/AusweisApp2-1.22.5.ebuild +++ /dev/null @@ -1,48 +0,0 @@ -# Copyright 2020-2022 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=8 - -inherit cmake xdg-utils - -DESCRIPTION="Official authentication app for German ID cards and residence permits" -HOMEPAGE="https://www.ausweisapp.bund.de/" -SRC_URI="https://github.com/Governikus/${PN}/archive/${PV}.tar.gz -> ${P}.tar.gz" - -LICENSE="EUPL-1.2" -SLOT="0" -KEYWORDS="~amd64 ~x86" - -BDEPEND=" - dev-qt/linguist-tools:5 - virtual/pkgconfig" - -RDEPEND=" - dev-libs/openssl:0= - dev-qt/qtconcurrent:5 - dev-qt/qtcore:5 - dev-qt/qtdeclarative:5 - dev-qt/qtgui:5 - dev-qt/qtnetwork:5 - dev-qt/qtquickcontrols2:5 - dev-qt/qtsvg:5 - dev-qt/qtwebsockets:5[qml] - dev-qt/qtwidgets:5 - net-libs/http-parser:0= - sys-apps/pcsc-lite - virtual/udev" - -DEPEND="${RDEPEND}" - -src_configure() { - local mycmakeargs=( -DBUILD_SHARED_LIBS=OFF ) - cmake_src_configure -} - -pkg_postinst() { - xdg_icon_cache_update -} - -pkg_postrm() { - xdg_icon_cache_update -} diff --git a/sys-auth/AusweisApp2/AusweisApp2-1.22.7.ebuild b/sys-auth/AusweisApp2/AusweisApp2-1.22.7.ebuild new file mode 100644 index 000000000000..c73e5792cc88 --- /dev/null +++ b/sys-auth/AusweisApp2/AusweisApp2-1.22.7.ebuild @@ -0,0 +1,48 @@ +# Copyright 2020-2022 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=8 + +inherit cmake xdg-utils + +DESCRIPTION="Official authentication app for German ID cards and residence permits" +HOMEPAGE="https://www.ausweisapp.bund.de/" +SRC_URI="https://github.com/Governikus/${PN}/archive/${PV}.tar.gz -> ${P}.tar.gz" + +LICENSE="EUPL-1.2" +SLOT="0" +KEYWORDS="amd64 x86" + +BDEPEND=" + dev-qt/linguist-tools:5 + virtual/pkgconfig" + +RDEPEND=" + dev-libs/openssl:0= + dev-qt/qtconcurrent:5 + dev-qt/qtcore:5 + dev-qt/qtdeclarative:5 + dev-qt/qtgui:5 + dev-qt/qtnetwork:5 + dev-qt/qtquickcontrols2:5 + dev-qt/qtsvg:5 + dev-qt/qtwebsockets:5[qml] + dev-qt/qtwidgets:5 + net-libs/http-parser:0= + sys-apps/pcsc-lite + virtual/udev" + +DEPEND="${RDEPEND}" + +src_configure() { + local mycmakeargs=( -DBUILD_SHARED_LIBS=OFF ) + cmake_src_configure +} + +pkg_postinst() { + xdg_icon_cache_update +} + +pkg_postrm() { + xdg_icon_cache_update +} diff --git a/sys-auth/AusweisApp2/Manifest b/sys-auth/AusweisApp2/Manifest index d95cf0f81e36..ad1b051bba49 100644 --- a/sys-auth/AusweisApp2/Manifest +++ b/sys-auth/AusweisApp2/Manifest @@ -1,6 +1,4 @@ -DIST AusweisApp2-1.22.4.tar.gz 10972798 BLAKE2B 7d613e9729a9c13fc56945bc432f2daf1a40fbc795829bbb51caaf4c895b3a4b2b8dc5528f68df0f0d60a3ec2d78cd72e767ec5430804da2a4759349fbf4d520 SHA512 88f66873cc1515ab068cfd48ab7f8477c17743cb3f9114a6a1484371d0faeb24492d1f6c0652800d3640cc9b5768568f578de5da1c43691347e32c1a34a49d12 -DIST AusweisApp2-1.22.5.tar.gz 11251263 BLAKE2B 8f62864d4e4139b06715765666fb7cc040d7cfc0c3cfb8082399ca24b2edbca754f511a4e7ab1eee6dd4fa3e8ea6cd38d048446877a6cff6ce37d7bddc56e01a SHA512 79cdd749d656aa9b082a80b9db9863bc11f4c5b8e06efefa2eb215724a45894137c5b6b8884d622e4a8203346e1b4d91b292013395a978e06a0201e40693a17d -EBUILD AusweisApp2-1.22.4.ebuild 930 BLAKE2B 3a35bf075945e93c225a1a549db867744cac21a06c84ebd962c44ed80e16ef4ddeda6732d51d3f2164ec726b647097aaaa0e639f8051d61485021a6ebf028be6 SHA512 8db7d6bfd148a053313584f7f13766a018902047816e413ca281fa5d2c3f0dc169139bbdb4dd649d649c7618a9710fcec767d2a80746a89b03713c65a16d18e0 -EBUILD AusweisApp2-1.22.5.ebuild 932 BLAKE2B 788d3c3dd3f87cb286a10625d1cddd2537876a3d78720f81abe770e8a28c767496c1f2a912304c2ae92db4c7ec809e5445e850fa82efa6ebe47637d90a5737fa SHA512 d0a449d2f34d9c671f0f41de39f27159e7a6b73f727177b163b0eff70e302c7aee3e133f3e23b7a6ec90e4d42989b6e90b2881c9c7817df09f414bb38ba81d65 +DIST AusweisApp2-1.22.7.tar.gz 11406133 BLAKE2B 17bc9824035007bf62037562ebd38c2b3558660060c0eba302ac04e8e9d0eabc7c8cb69d064a1a02be213f91f823030e5afdab74d5614db2c1bc8318ca1f9f22 SHA512 4ea1d2c02e076121b340da6d16973de6dafe513d2e9c96b535063466c06137d8e2a325661478d0cfbd96f506a875dca8d4df6a53af657a8d2eb59e7ad7d1a472 +EBUILD AusweisApp2-1.22.7.ebuild 930 BLAKE2B 3a35bf075945e93c225a1a549db867744cac21a06c84ebd962c44ed80e16ef4ddeda6732d51d3f2164ec726b647097aaaa0e639f8051d61485021a6ebf028be6 SHA512 8db7d6bfd148a053313584f7f13766a018902047816e413ca281fa5d2c3f0dc169139bbdb4dd649d649c7618a9710fcec767d2a80746a89b03713c65a16d18e0 EBUILD AusweisApp2-9999.ebuild 896 BLAKE2B a283585d7f09d304017e9f80f3e081fa96787d702e919aa9f9bcd229078b6d17a9eb3dfeb8782f8011530a6cd8a3ab72be12c88251d4675c1924dea66a77672c SHA512 f361e420657a46e8234517d204548fb69b14bc367be38aa1f85b411bdcd53fdb6dc7a6b3807cf22376f82abc076181965d633b50e4b01a5a7a1032bbf45c0165 MISC metadata.xml 338 BLAKE2B cc2c3169dbe9280f8ab769c2c2c38a691d0af53999169948243cca1200c2a6ef8bb2f97dcc0e8dcbd709f3660fa262bf5279d3acce525baefe91951f91f1eca7 SHA512 db2026e39095afa71c7431290d8032fb6cdf70138beb14ae5cc20f4c5d03a0fa334cd769c14fe1085520b8631947c35c654bbd686ccc2e60a308d19ef6eb9e83 diff --git a/sys-auth/Manifest.gz b/sys-auth/Manifest.gz index a9c35698ecc4..d5960b12d09e 100644 Binary files a/sys-auth/Manifest.gz and b/sys-auth/Manifest.gz differ diff --git a/sys-auth/elogind/Manifest b/sys-auth/elogind/Manifest index 075eb13ff64b..7c69916f3cb0 100644 --- a/sys-auth/elogind/Manifest +++ b/sys-auth/elogind/Manifest @@ -7,5 +7,5 @@ AUX elogind.init 490 BLAKE2B 71c102f89a71a2963da50b153d8696a9480d81caa48e8422e7f AUX elogind.init-r1 503 BLAKE2B 7e54688c91f78b46411edff04dd8544dea778864d34ec00a4f0f2c166b4062ebc6b01f201f1b7d1f22f6781c51ac22f924136c83c0b0cdb29d6aadf640a6c0e8 SHA512 97d78afe1c0833f3f632272904bd8338869639facb79cd2fae6a4bf58fc5b2dd960484e1f9945152ff13d075216cf4b48b6b234eb7738fbbf445eee2c20e88f2 DIST elogind-246.10.tar.gz 1559256 BLAKE2B 17a8146ee08c8ccf167f25d89b1d4525050ed0b0baaad0d36924ad3c40ffc820ef1528b33557cf285ad06c9ac9c440137428c5a235a2acf563e56f2f8f07e208 SHA512 9db0f068ed94ec07bab4d764ccb38840af3d05a4b7c9c539721906f5381b509cb9a3cbfb0453a978210d306136368de6162578c600d522416ef2a7ac1b9f348b EBUILD elogind-246.10-r1.ebuild 4193 BLAKE2B c3c674fea3b7e95441e2f63147e39e377330fb9f056191c88a51bb2f9e5f8684346f9b5d7c8d8b85cdbfb973da244ea46d6dcb7fd380e39d5e0e6d102fa7c502 SHA512 3a4c0bef8cc0499dd91a90702e0fc500be615cf96c4045988b5c21b7f45e7a0acfcf7208699cc88084052db84d2c9bd10271b0864ae91ac2e0a10a7485799ec8 -EBUILD elogind-246.10-r2.ebuild 4078 BLAKE2B e07dd16eb53f79976c6af4a3c17273d8ede0005b9de9a0db36ae326249c0325361a6df630db127a4451564b541ee543a638cf126e48bd1ae9d0d168080edbbe5 SHA512 f0301cc60be7730fb8347e1c77f2b2cd3dc2824a0d046ef375524a1354614a6cd4e5b18a023476103bded4033ebe52d5dd111c4476966d7aa987e4a17968dee0 +EBUILD elogind-246.10-r2.ebuild 4144 BLAKE2B 014c286c48d17589780d8b1b2257b5f5eaaca874b73350128ad438bdcdfcf205fb0b5e2ad3c5bf8bb274a3115a97256928d61dad5ffead253de4725396ba4545 SHA512 0e25086eff13432909aa3e93359239f9ccf7dfaebd0ec339c99a49842dfa91d22d45f7d11404be409d885a3ef8d282f4f441e41da2d3a0af7bbdc53da736a56f MISC metadata.xml 643 BLAKE2B 8304073654ac908cfb0e65493afc49a3f4925ba1c4adb8d571b57ddf3d7cf22a8e79dfbc6e3e3eb4fd8fe7f23f2edf2e1f0df908342add9c39e488bc1676ba39 SHA512 8c745c007f86f8c6a867a8c6e747111c4cc3e8f0faf4ad50b2dc4bf92b756b5d3f7b15af9a51e1c7353a45afeced6ad56b420f2af76706fe7d8e542db50ac952 diff --git a/sys-auth/elogind/elogind-246.10-r2.ebuild b/sys-auth/elogind/elogind-246.10-r2.ebuild index 55a49fd04edb..58f402657a19 100644 --- a/sys-auth/elogind/elogind-246.10-r2.ebuild +++ b/sys-auth/elogind/elogind-246.10-r2.ebuild @@ -19,7 +19,8 @@ HOMEPAGE="https://github.com/elogind/elogind" LICENSE="CC0-1.0 LGPL-2.1+ public-domain" SLOT="0" -IUSE="+acl audit +cgroup-hybrid debug doc +pam +policykit selinux" +IUSE="+acl audit +cgroup-hybrid debug doc +pam +policykit selinux test" +RESTRICT="!test? ( test )" BDEPEND=" app-text/docbook-xml-dtd:4.2 @@ -94,6 +95,7 @@ src_configure() { -Dhtml=$(usex doc auto false) -Dpam=$(usex pam true false) -Dselinux=$(usex selinux true false) + -Dtests=$(usex test true false) -Dutmp=$(usex elibc_musl false true) ) diff --git a/sys-auth/libfprint/Manifest b/sys-auth/libfprint/Manifest index 8a6ce38b630a..77863289800e 100644 --- a/sys-auth/libfprint/Manifest +++ b/sys-auth/libfprint/Manifest @@ -1,7 +1,10 @@ AUX libfprint-0.8.2-fix-implicit-declaration.patch 4831 BLAKE2B ec61d1ee189549f4456634b5b0157f32c61b2255330681b96bc50c73d9a5d51c1058f4f82b979ca4695d9d1065b0623e86be943f98c1582725bcddda0630156b SHA512 afd4e7c5ee65a91b17aa8bec4c6a0ba5b972e9f2586a0cfa7adc823d2a1f8d2378ed28928c5108870d2347f3edb2f343a24b2eaef6c015b7650834b4d76ceb73 AUX libfprint-1.94.1-test-timeout.patch 537 BLAKE2B 5010eac973ade5c5cf48e50355da33f83042c8f7a7d9bc2d88533cc0aa746aec33f0977442e79ff11a58682104d73c5d0dedb0c31564cf9def9af2c73abc2fd6 SHA512 a9d87b681e92be2a81a42d2a68642d4be8479da11b22b5dfd145b21a08ea863f3bc73557259f3c4592128f7000ccb26c6530aa84aebc49303ee0cd3d4aa81147 +AUX libfprint-1.94.4-stderr-redefinition.patch 928 BLAKE2B e23caf122c169f93307cd5137402470fa6bbb29719fb703e971daf742d3866c9403972adec3e678d4f6aa9eeabc2a07a565235843b3cf7921c54f7a912b73041 SHA512 e7d4914005867365c67d9e8d9a3ce1528e7471feb6ad34e2e0e98d44420a2359a5e39b5fdd1613ed937d0425ba61e666bf98b9e9a3b0462b1ddf2ae28fabe322 DIST libfprint-1.0.tar.gz 475347 BLAKE2B cb560898cec11861c4529c0c37c328f74eaf271c1932ca5126b7bd6c82fafee24aff393c0fe223fef018a34a409647065d5f98a999c00f0e7a879e33bdfcd3cb SHA512 2d7f569368035cce0a579ef3412a1961c28aab254ae6174ce9ad11ce97b3dce824d0c6123adac12718cb074439e4d5b93bf978e5341824f179231d1faa219a26 DIST libfprint-1.94.3.tar.gz 10409543 BLAKE2B 33e25715313cfc37f0c05ad47eca6d315a041a067cfc7dfac9d71fcf5231a11f54888dd837c083b8cca03ca2b4b0bced30340e8966ab4c989d4a33c59ceb483e SHA512 22290bd393b54ada75c4655b3e901b6ee25f389a396a9b29bc1e76c0333d9718483b2059c927deb5b8d8e0acf632fecc9c4535b3f161910d5c51fad508d3e7a4 +DIST libfprint-1.94.4.tar.gz 10408480 BLAKE2B 492ea10777d223ce7d610f0dca2871c8eae08cb5dd7d30187194d6cc139a60d5350e5908f759434065614c05a72192347be19c1d6fe5641e08a2f6419bdcede7 SHA512 425efdfde373179a237805c4b5561e3531616798c41ccd4358f1c521f1e21af01f8ca61aaf8c959e2c68a69e4dfda23960e696acaaad2228ffef6f999986468e EBUILD libfprint-1.0.ebuild 1063 BLAKE2B a486982077da190caacf146bd9831146087cdc4da4ccf8debb5bbeef1641b72fc21bc16de6ce8b69dd82262e6911ece105840f78991eeed34e6c300099564e42 SHA512 bf1e942f98ffa922bbb3e5110ee87106ca56a2f646be2afc9441ed0d15cea0bbc04daddd92bb9169c02619c8571fd02705be7229ea09716d8298ca0b5904f021 EBUILD libfprint-1.94.3.ebuild 1388 BLAKE2B 548dbde6c835bcbeff3b31daf812a9cd926f2df1b052bad503bbdbf4aaa32a3ad20723701105deaae14e2c1775994335fe748fe37becc92ebb81d11e48529d98 SHA512 aa9e8f5570e8daa2c4881d5eedb5b45c8879a42b32da79c7f274488c4a28e4662f7648ab59c6ec474ce0b7fec78e377e353e096d79fe1bd001ada43111b5ce9e +EBUILD libfprint-1.94.4.ebuild 1358 BLAKE2B cc1c872a121f73a58565bbbf52dd67f78c0cbbf0636c1c164cf205f00f7ec99046ff25775b9afca5aa81f61a1580afcbbe5691886aa97c5fce98676d9a0084eb SHA512 f690d23fef1afe5eeee917e79cab6d658755b2653c14f42025e074800dd01ec7a2206adb3955e167cb157bdfd195406f5aeacdfa76c4421b5c578eabe5d75f74 MISC metadata.xml 275 BLAKE2B 20edfbe69300bfaf17dcd8e55ed6576d69e44c4e41a27a6211eb613b1bef6e97b0ccca036d9a55ff318faa6ff0679fa387d115109935a4e144fa3dc9c0aaf847 SHA512 9d3975cfeeb4e4e3101c291081d5da73124002d03f016f8ac79931cbba20d3c28d7a08769b4c845cd8d8a2d9be537b68f429fe3691136f851b01bb8b5233f406 diff --git a/sys-auth/libfprint/files/libfprint-1.94.4-stderr-redefinition.patch b/sys-auth/libfprint/files/libfprint-1.94.4-stderr-redefinition.patch new file mode 100644 index 000000000000..fa7f4aac0986 --- /dev/null +++ b/sys-auth/libfprint/files/libfprint-1.94.4-stderr-redefinition.patch @@ -0,0 +1,24 @@ +https://gitlab.freedesktop.org/libfprint/libfprint/-/merge_requests/366 + +From 2584d440afc87d463cb8dc809d48c660e091c2c4 Mon Sep 17 00:00:00 2001 +From: Sam James +Date: Thu, 23 Jun 2022 05:57:46 +0100 +Subject: [PATCH] nbis: fix build on musl + +Drop re-definition of stderr. There's no need for this anywhere +(including glibc). This breaks in particular on musl because +stderr (and stdin) are both const, and macros unlike in glibc. + +Bug: https://bugs.gentoo.org/853811 +--- a/libfprint/nbis/include/bozorth.h ++++ b/libfprint/nbis/include/bozorth.h +@@ -217,8 +217,6 @@ struct xytq_struct { + /**************************************************************************/ + /* Globals supporting command line options */ + extern int verbose_threshold; +-/* Global supporting error reporting */ +-extern FILE *stderr; + + /**************************************************************************/ + /* In: BZ_GBLS.C */ +GitLab diff --git a/sys-auth/libfprint/libfprint-1.94.4.ebuild b/sys-auth/libfprint/libfprint-1.94.4.ebuild new file mode 100644 index 000000000000..5a5defa19e28 --- /dev/null +++ b/sys-auth/libfprint/libfprint-1.94.4.ebuild @@ -0,0 +1,59 @@ +# Copyright 1999-2022 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=8 + +inherit meson udev + +DESCRIPTION="Library to add support for consumer fingerprint readers" +HOMEPAGE="https://cgit.freedesktop.org/libfprint/libfprint/ https://github.com/freedesktop/libfprint https://gitlab.freedesktop.org/libfprint/libfprint" +SRC_URI="https://github.com/freedesktop/libfprint/archive/refs/tags/v${PV}.tar.gz -> ${P}.tar.gz" + +LICENSE="LGPL-2.1+" +SLOT="2" +KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~ia64 ~ppc ~ppc64 ~riscv ~sparc ~x86" +IUSE="examples gtk-doc +introspection" + +RDEPEND=" + dev-libs/glib:2 + dev-libs/libgudev + dev-libs/libgusb + dev-libs/nss + virtual/libusb:1= + x11-libs/pixman + !>=sys-auth/libfprint-1.90:0 + examples? ( + x11-libs/gdk-pixbuf:2 + x11-libs/gtk+:3 + ) +" + +DEPEND="${RDEPEND}" + +BDEPEND=" + virtual/pkgconfig + gtk-doc? ( dev-util/gtk-doc ) + introspection? ( + dev-libs/gobject-introspection + dev-libs/libgusb[introspection] + ) +" + +PATCHES=( + "${FILESDIR}"/${PN}-1.94.1-test-timeout.patch + "${FILESDIR}"/${PN}-1.94.4-stderr-redefinition.patch +) + +src_configure() { + local emesonargs=( + $(meson_use examples gtk-examples) + $(meson_use gtk-doc doc) + $(meson_use introspection) + -Ddrivers=all + -Dudev_rules=enabled + -Dudev_rules_dir=$(get_udevdir)/rules.d + --libdir=/usr/$(get_libdir) + ) + + meson_src_configure +} diff --git a/sys-auth/pam_mount/Manifest b/sys-auth/pam_mount/Manifest index 9a69ad67894d..4ffdf6d8dd32 100644 --- a/sys-auth/pam_mount/Manifest +++ b/sys-auth/pam_mount/Manifest @@ -1,10 +1,4 @@ -AUX pam_mount-2.16-crypto-Add-support-for-LUKS2.patch 1547 BLAKE2B f6c0ceba9ac683bd852606988688c18321b36192ea3e3d4b7443ac225b53446d594aafa78123a84847dd0b622cea54150a32a0852b572842f6f48fa7bf5e59e5 SHA512 7b37add4202fbbfef9ccbab10f4c3fc10da7dc976adab8c550ee2197b92e7f8f1db06186d155d0ae05b8c775d919d754071854a69c5d7f2a54c5b890f33bbc8f AUX pam_mount-2.16-remove-obsolete-openssl-api.patch 518 BLAKE2B 06dcaf0237e5e89549c1f1a6d6fef038785e9f170dc1065596b7ea2833a64d829ac762837cd0f1141db3f67571f4b43899ecc5b5e9a6ba093d9f55e8cdd7473f SHA512 362f44008810b4f9bd260cbbecba4f10b65bf7c98c77135eb5d365e91660d1fdd0c5dde65286f706c340b812e71f5f6cec85e8536263cce5e1c666068b27860c -DIST pam_mount-2.16.tar.xz 312316 BLAKE2B 5954af8f8bf8b9cb47e1c07dc0d5fc5c4db099eeca5de90a3a53dc65aac0a2a6fba3f99c4d91d12f53b13abb5d3bae262b42536434553872a36ec108dc8d2c0c SHA512 3a579d7287cfcaef831d3e54d3e912407b65a966303e81c47f445d601f38f866ce04326e3d37a061f74f97b9cfb201e56109f57e55699d15d8f947ae2b91c8e3 -DIST pam_mount-2.17.tar.xz 326948 BLAKE2B b5d8c5701bfa4e3ce50ca71b1130d5f68655df12ac45cf554f38f2625b33fcece895d4b67d79cea2ad735c4994c779844dfc5266872e054a1e6d078632f3370c SHA512 d55d2a0e99d51ef649845548e4178b9b34db9c742c592e0ba97359646281af17795080e6ecb1a2a11bc680d31f2c77e69261f731de8f68e8602bcd838371927f DIST pam_mount-2.18.tar.xz 324524 BLAKE2B a3f29de8c0a348c98d3e73ac3568595083036fa704b5c34ed17c3660fcc8ff5f64195ad4158af6e351f79865a9128dbb773c7d18bbb07bdff1010e555803cfce SHA512 7f1e373fd7876eddd9226163602ba484ed8a7e1ce92ba6140c1f7603cb205190cb11ad75be41b54d2a6cd21602320d41a65714bfd0af8b5247850a3ef0fe3b22 -EBUILD pam_mount-2.16-r3.ebuild 1169 BLAKE2B 9935602981ab8dd7e27a967ea17795d5f03a8e3fe49cee4c55842a7a1235c98cbe0e2c1ad75af4ec1a439fa011d38c48746052156755c4cf6c997037cd63d292 SHA512 9d07ce402abc31c1d1c35e3f2d0c8600694d32bb663cc0d3b0418fe38657ccdf57ef52ccdeb31e388c14810e4ea0e16477521af1827ed689910247e20fbb7d48 -EBUILD pam_mount-2.17.ebuild 1149 BLAKE2B b418aa41aaed00c19021ad2a22efbcc14799889875a52bee2f25e8d77ebdfb11c499628b7971939899768f38a9c357a3eeb716211aab2da286ef2b9ddd72ba6b SHA512 6cf9d721a91790b9f723691753111896ba2c72b939a27ff5e8390b3905d2788702351538ddd6d16b206e3d58206f0cc06560a50667e3525a1c33683a11154362 -EBUILD pam_mount-2.18-r1.ebuild 1144 BLAKE2B 748ed74310a78c0c5a38489f67158f0037b12a00f4099bdb123f18218f1d80ed7364b5c0ba7d185c96fdcb9290fa28018dd5460a26f9801b7cd0d3f50c29ad63 SHA512 28c60c0f6d7308f03c122e36d40c2258b8838691b5e52be757baafe7293b1267529205f268db3be6fb38efa4a61a75cd7783124ab3eabfc30709e028f682745a -EBUILD pam_mount-2.18.ebuild 1149 BLAKE2B b418aa41aaed00c19021ad2a22efbcc14799889875a52bee2f25e8d77ebdfb11c499628b7971939899768f38a9c357a3eeb716211aab2da286ef2b9ddd72ba6b SHA512 6cf9d721a91790b9f723691753111896ba2c72b939a27ff5e8390b3905d2788702351538ddd6d16b206e3d58206f0cc06560a50667e3525a1c33683a11154362 +EBUILD pam_mount-2.18-r1.ebuild 1141 BLAKE2B 1120e1cf0e023191dcd3f9076e3b0201a9b98efe6fccaf4e65e2d2dfc9c3cb47f035d536ab005e241c2421ff419579de301b92f0c594bc65254f58f42cd45f61 SHA512 01c29e8886078fe1c2746e8b25fe731d553be89424776371fba7132aac504c29775609f63417dad6b4a944154e5bbdf1965df2ae31f41c0608a50675f38be2ff MISC metadata.xml 296 BLAKE2B 3ef24644b485441de60341ffda066f60d6dc2ebd67c61299903159078d8622f3dd0c3950223d47a819c78fff6aca9b56f2eee3b02f933665f8ba600e264abfc0 SHA512 6e4d805d50bed8a410fc4a3c692407300495faa01aceb925b2e3653d59a7a2833ff284fc7d1c027a90d4fb930b59c09585436bbc534c8f08fb990ba26da6ecab diff --git a/sys-auth/pam_mount/files/pam_mount-2.16-crypto-Add-support-for-LUKS2.patch b/sys-auth/pam_mount/files/pam_mount-2.16-crypto-Add-support-for-LUKS2.patch deleted file mode 100644 index 437f359277d5..000000000000 --- a/sys-auth/pam_mount/files/pam_mount-2.16-crypto-Add-support-for-LUKS2.patch +++ /dev/null @@ -1,52 +0,0 @@ -From d4434c05e7c0cf05d87089404cfa2deedc60811a Mon Sep 17 00:00:00 2001 -From: Ingo Franzki -Date: Mon, 29 Oct 2018 16:47:40 +0100 -Subject: [PATCH] crypto: Add support for LUKS2 - -Cryptsetup version 2.0 added support for LUKS2. -This patch adds support for mounting LUKS2 volumes with -pam_mount. - -Signed-off-by: Ingo Franzki ---- - src/crypto-dmc.c | 10 ++++++++-- - 1 file changed, 8 insertions(+), 2 deletions(-) - -diff --git a/src/crypto-dmc.c b/src/crypto-dmc.c -index d0ab6ca..abd0358 100644 ---- a/src/crypto-dmc.c -+++ b/src/crypto-dmc.c -@@ -21,6 +21,12 @@ - #include "libcryptmount.h" - #include "pam_mount.h" - -+#ifndef CRYPT_LUKS -+ #define CRYPT_LUKS NULL /* Passing NULL to crypt_load will -+ default to LUKS(1) on older -+ libcryptsetup versions. */ -+#endif -+ - /** - * dmc_is_luks - check if @path points to a LUKS volume (cf. normal dm-crypt) - * @path: path to the crypto container -@@ -48,7 +54,7 @@ EXPORT_SYMBOL int ehd_is_luks(const char *path, bool blkdev) - - ret = crypt_init(&cd, device); - if (ret == 0) { -- ret = crypt_load(cd, CRYPT_LUKS1, NULL); -+ ret = crypt_load(cd, CRYPT_LUKS, NULL); - if (ret == -EINVAL) - ret = false; - else if (ret == 0) -@@ -106,7 +112,7 @@ static bool dmc_run(const struct ehd_mount_request *req, - #endif - } - -- ret = crypt_load(cd, CRYPT_LUKS1, NULL); -+ ret = crypt_load(cd, CRYPT_LUKS, NULL); - if (ret == 0) { - ret = crypt_activate_by_passphrase(cd, mt->crypto_name, - CRYPT_ANY_SLOT, req->key_data, req->key_size, flags); --- -2.21.0 - diff --git a/sys-auth/pam_mount/pam_mount-2.16-r3.ebuild b/sys-auth/pam_mount/pam_mount-2.16-r3.ebuild deleted file mode 100644 index df0bd7fb125a..000000000000 --- a/sys-auth/pam_mount/pam_mount-2.16-r3.ebuild +++ /dev/null @@ -1,47 +0,0 @@ -# Copyright 1999-2021 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=7 - -DESCRIPTION="A PAM module that can mount volumes for a user session" -HOMEPAGE="http://pam-mount.sourceforge.net" -SRC_URI="mirror://sourceforge/pam-mount/${P}.tar.xz" - -LICENSE="GPL-3" -SLOT="0" -KEYWORDS="amd64 ppc x86" - -IUSE="crypt ssl selinux" - -COMMON_DEPEND=">=sys-libs/pam-0.99 - >=sys-libs/libhx-3.12.1:= - >=dev-libs/libxml2-2.6 - crypt? ( >=sys-fs/cryptsetup-1.1.0:= ) - ssl? ( dev-libs/openssl:0= ) - selinux? ( sys-libs/libselinux )" -DEPEND="${COMMON_DEPEND} - virtual/pkgconfig" -RDEPEND="${COMMON_DEPEND} - >=sys-apps/util-linux-2.20" - -PATCHES=( - "${FILESDIR}"/pam_mount-2.16-crypto-Add-support-for-LUKS2.patch - "${FILESDIR}"/pam_mount-2.16-remove-obsolete-openssl-api.patch -) - -src_configure() { - econf --with-slibdir="/$(get_libdir)" \ - $(use_with crypt cryptsetup) \ - $(use_with ssl crypto) \ - $(use_with selinux) -} - -src_install() { - default - use selinux || rm -r "${D}"/etc/selinux - dodoc doc/*.txt - - # Remove unused nonstandard run-dir, current version uses - # FHS-compatible /run, but has leftover mkdir from old version - rm -r "${D}/var/lib" -} diff --git a/sys-auth/pam_mount/pam_mount-2.17.ebuild b/sys-auth/pam_mount/pam_mount-2.17.ebuild deleted file mode 100644 index 5e97bda985cd..000000000000 --- a/sys-auth/pam_mount/pam_mount-2.17.ebuild +++ /dev/null @@ -1,49 +0,0 @@ -# Copyright 1999-2021 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=7 - -DESCRIPTION="A PAM module that can mount volumes for a user session" -HOMEPAGE="http://pam-mount.sourceforge.net" -SRC_URI="mirror://sourceforge/pam-mount/${P}.tar.xz" - -LICENSE="GPL-3" -SLOT="0" -KEYWORDS="~amd64 ~ppc ~x86" - -IUSE="crypt ssl selinux" - -DEPEND=" - >=sys-libs/pam-0.99 - >=sys-libs/libhx-3.12.1:= - >=sys-apps/util-linux-2.20:= - >=dev-libs/libxml2-2.6:= - >=dev-libs/libpcre-7:= - crypt? ( >=sys-fs/cryptsetup-1.1.0:= ) - ssl? ( dev-libs/openssl:0= ) - selinux? ( sys-libs/libselinux )" -RDEPEND="${DEPEND}" -BDEPEND="virtual/pkgconfig" - -PATCHES=( - "${FILESDIR}"/pam_mount-2.16-remove-obsolete-openssl-api.patch -) - -src_configure() { - econf --with-slibdir="/$(get_libdir)" \ - $(use_with crypt cryptsetup) \ - $(use_with ssl crypto) \ - $(use_with selinux) -} - -src_install() { - default - use selinux || rm -r "${D}"/etc/selinux - dodoc doc/*.txt - - # Remove unused nonstandard run-dir, current version uses - # FHS-compatible /run, but has leftover mkdir from old version - rm -r "${D}/var/lib" - - find "${ED}" -name '*.la' -delete || die -} diff --git a/sys-auth/pam_mount/pam_mount-2.18-r1.ebuild b/sys-auth/pam_mount/pam_mount-2.18-r1.ebuild index 03fcbd7cc704..c8c8a3d853b4 100644 --- a/sys-auth/pam_mount/pam_mount-2.18-r1.ebuild +++ b/sys-auth/pam_mount/pam_mount-2.18-r1.ebuild @@ -9,7 +9,7 @@ SRC_URI="mirror://sourceforge/pam-mount/${P}.tar.xz" LICENSE="GPL-3" SLOT="0" -KEYWORDS="~amd64 ~ppc ~x86" +KEYWORDS="amd64 ppc x86" IUSE="crypt ssl selinux" diff --git a/sys-auth/pam_mount/pam_mount-2.18.ebuild b/sys-auth/pam_mount/pam_mount-2.18.ebuild deleted file mode 100644 index 5e97bda985cd..000000000000 --- a/sys-auth/pam_mount/pam_mount-2.18.ebuild +++ /dev/null @@ -1,49 +0,0 @@ -# Copyright 1999-2021 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=7 - -DESCRIPTION="A PAM module that can mount volumes for a user session" -HOMEPAGE="http://pam-mount.sourceforge.net" -SRC_URI="mirror://sourceforge/pam-mount/${P}.tar.xz" - -LICENSE="GPL-3" -SLOT="0" -KEYWORDS="~amd64 ~ppc ~x86" - -IUSE="crypt ssl selinux" - -DEPEND=" - >=sys-libs/pam-0.99 - >=sys-libs/libhx-3.12.1:= - >=sys-apps/util-linux-2.20:= - >=dev-libs/libxml2-2.6:= - >=dev-libs/libpcre-7:= - crypt? ( >=sys-fs/cryptsetup-1.1.0:= ) - ssl? ( dev-libs/openssl:0= ) - selinux? ( sys-libs/libselinux )" -RDEPEND="${DEPEND}" -BDEPEND="virtual/pkgconfig" - -PATCHES=( - "${FILESDIR}"/pam_mount-2.16-remove-obsolete-openssl-api.patch -) - -src_configure() { - econf --with-slibdir="/$(get_libdir)" \ - $(use_with crypt cryptsetup) \ - $(use_with ssl crypto) \ - $(use_with selinux) -} - -src_install() { - default - use selinux || rm -r "${D}"/etc/selinux - dodoc doc/*.txt - - # Remove unused nonstandard run-dir, current version uses - # FHS-compatible /run, but has leftover mkdir from old version - rm -r "${D}/var/lib" - - find "${ED}" -name '*.la' -delete || die -} diff --git a/sys-auth/pam_p11/Manifest b/sys-auth/pam_p11/Manifest index 2cc6fbd7ad72..c1b29993ea75 100644 --- a/sys-auth/pam_p11/Manifest +++ b/sys-auth/pam_p11/Manifest @@ -1,3 +1,3 @@ DIST pam_p11-0.3.1.tar.gz 422940 BLAKE2B b4c6d60a7ee31d808b9e928339f6e8aba3b56655b9f408ff7cd15ff4a397c89c00d00b0bbe70fc0b7bd6c6a246acd9c313c8f5b21a88e1474355c3407ff694f0 SHA512 caaa6882d4c007dfaba5974dc420bc45aa225f705679d170fdc9576aa49cbd24bba6985f14eb2bca97d4fe37aaf6088641add912dfbb93740b7d634f448addcf EBUILD pam_p11-0.3.1.ebuild 778 BLAKE2B 6f87bcd1fd02e56258f06a51094dfd54db373c3f31e922c178de53fafef46c0ef789abb37d06e9b0bb0d5ed395cc2774e7fe2ddba285f2cb77b26a8171001d0a SHA512 e313c484855355d57c4665b69a38d6d0eb171861df8695578c61b13dd7ac2cb27dc0ec8120d7594c361929109672e6534625c06f90bf8bc3d8d1b7138eea6193 -MISC metadata.xml 382 BLAKE2B 4c06443bd299d4d7971a10ae42872e5ad27e7ba203b4db1fe273db8de7d76f000342fde9776740fea7c98b8e3f8835ce4769d3889d696afd7a3c977061235f60 SHA512 de0b69fee7884757d5cd6801810abad965dcbff023e2e64345d9fe275495f3cd93b0cdb09d2a6fe5817e8816a304473cbde28f3ca73bf03ae9a562d2fc1f79f9 +MISC metadata.xml 298 BLAKE2B 001ea981512037cadd755c96c7b145ffb8a2c640852f5c3471315edbab111aa241334cef0d8e6d9049d85dc225fa86c027698125828be52e4a21ba962c43f50e SHA512 59a894c6a7c2fec3abf5e341f992846d2b3f0ec6d86ef8456dfa3e7cbf20f07c1c368091085bb5289da626231664fa04f31475353f6c23c1542f0aec6b76f4e5 diff --git a/sys-auth/pam_p11/metadata.xml b/sys-auth/pam_p11/metadata.xml index 56e8da2d1899..3d37d20d4ee8 100644 --- a/sys-auth/pam_p11/metadata.xml +++ b/sys-auth/pam_p11/metadata.xml @@ -1,10 +1,7 @@ - - Lars Wendler - polynomial-c@gentoo.org - + opensc opensc/pam_p11 diff --git a/sys-auth/pam_skey/Manifest b/sys-auth/pam_skey/Manifest index 2ad8712cc5f7..6244a73d78d2 100644 --- a/sys-auth/pam_skey/Manifest +++ b/sys-auth/pam_skey/Manifest @@ -1,4 +1,4 @@ DIST pam_skey-1.1.5-patches-7.tar.xz 9408 BLAKE2B d87da6c4606431618a1a4d75981809cbd91a8e5e3d1f9eae6fbb222e146d451f7c099f9b437829304b647a20c6200797732e9d01451cc4911abba7843151e36c SHA512 8bb39c2d173468c38b4d2bdac186d3f27e868c2be9dc6feffba957d4d33bc8e597c48e4638e5de09829000961fbf8b72f0ba577f232bebdfaa4c2961ede58838 DIST pam_skey-1.1.5.tar.gz 76963 BLAKE2B ded4a4e43b174338cd1beefce65314cc906db928593dd5eba2ba1be9cab33844d8fd38cb7d3b952a29da632b671c468e0dfe7f0f1e0d167397320cd9ca6d35e1 SHA512 12817cedf15a3b2287982e4beab5d3b388239cc0a1e141e66e41759ddb2da7fb9dd0df12202dcc8140db0868c8df1a8d19d5859224179e2419ffefd691cb9834 EBUILD pam_skey-1.1.5-r6.ebuild 1569 BLAKE2B 00126f69a7f44b0a87711bd0c1b46e98369ca795cf4a029a984aa1e1211f46ac7cb04c0d79e03c15c8a1abf323d689d81291480e1f6804766bee5d240d372fe2 SHA512 f6d567d3ee6a4affe913cf44a6c03f5d0b14334704e33e719201e2b362056b2d5bcd99f5b52b3ff6f8df60669a38338ff36c1e1b7a46b515d2371de01cfd1351 -MISC metadata.xml 299 BLAKE2B aad9f76242649190e49f8914d3715317da4ee9c01f2c8a8bdfe8e82ca7c1e350ff9c9d925131fcecb91b4698555d4e953655b7226d0e50ad91ee43e1ed110691 SHA512 60134693d556495c5dd794bcaab0c3f7b56def95d6bac6c0cc73237ae719c56f3f6decb411863e339ab14c63a1e5a141dc3f92e5107c4112857e0c945976e7e7 +MISC metadata.xml 219 BLAKE2B e537dd263eebadffefdd5f647258fd509cc8c6668b3195b6d292870b8b86bcb4a8887d2da843b2ba188e95be5e966488076cad5532b90cdeb538145cd4461af0 SHA512 1d89f269323fee42c1790031bfa4982c7ec425d11098d175be0aa741aba6da4b28f4afe594934361d28f6b83bae4231d4a323f9ae3d1d7c03311b5663de7911a diff --git a/sys-auth/pam_skey/metadata.xml b/sys-auth/pam_skey/metadata.xml index f24f61630158..f520e8983b28 100644 --- a/sys-auth/pam_skey/metadata.xml +++ b/sys-auth/pam_skey/metadata.xml @@ -4,7 +4,4 @@ ulm@gentoo.org - - pam_skey - diff --git a/sys-auth/polkit-qt/Manifest b/sys-auth/polkit-qt/Manifest index 4b6a991a3f5f..9c063ae8b808 100644 --- a/sys-auth/polkit-qt/Manifest +++ b/sys-auth/polkit-qt/Manifest @@ -1,5 +1,5 @@ AUX polkit-qt-0.114.0-cmake.patch 14143 BLAKE2B 53417ff3b0f95f713781d94eeb0c18f6a880b492b97fed8ec1dcfdec1940a2ae970f016772326f454d7f40b5be41936ac7614162a1d1406acb7e3a3bf009b31f SHA512 1677c3c0c18898d7972eb5b28c18611cab787fb6f9c0fb411e7ee0cf5bad0182777382957095c4b38f6a933272c5d262b543618f0283f77469e453aa73bbd683 AUX polkit-qt-0.114.0-glib-2.36.patch 6739 BLAKE2B b771febcdac3786331c28776f3db9317cab2413ad7abea194890e7419abdbec695859dd8d41cc0c4d6c9fb76dd46cab421a271c10354cfbbf6c349cd7ecaefb1 SHA512 bd5c7a742b8abc199ef9b54a6667a27b5f31e4cb66444bdae5d071e195b63356e7eeedcc51b966036f099d185a9576d88ac5ac6187cf739e3bb067a83d0474df DIST polkit-qt-1-0.114.0.tar.xz 58384 BLAKE2B e788198e386797ba9b4c228a451dde703f83e79c81eacaf805e431a3f60c0832adc3faef4616e3008dfaa816d7dc5a7a80aaf02936ea232373e78e0d008724ca SHA512 4a16d9428d5ccc0107dcbd67c29ecba196424e555dc43d55cf2b6e0e7b72c99f894e9c994eaed85a9536010d67a19f20fe74f792c0d6b9ca0e05ce85f655f9a8 -EBUILD polkit-qt-0.114.0-r1.ebuild 897 BLAKE2B 035c049c6650e011bafc64ce297add4ac8c9c4ed310dae13633b204a6eaa4e0165904754f3b7c1ee65f30dd664c17217806540046dbec5ec9927b9687ae72a24 SHA512 b899cb1093453f09bd27461fc630b8da70ef2d0480c86503e6cfee0f698079959af726c2dcb026da7ceac047df2af0494310c4292e35d2f4a7df61184e647a67 +EBUILD polkit-qt-0.114.0-r1.ebuild 904 BLAKE2B 927e7afb6add0d87d897273107fe87295bad5e05a65224a8b0cb0f41313a5637d9a126fc5ce717556b794bd33818e4ea051626d8abeaf46ddcb1e978e0b118b7 SHA512 1a2117e9c8c7b81d0bb88d9ccaa55326d9168b25cdc25dfe0d68814c66909ab69552d2e00b0ef6206092f95e2e0d2dbd0719b05c3e1cb47c71166a1d047ac3ce MISC metadata.xml 318 BLAKE2B 922a5e32e706b2976c5f359a14194d268d3f499398576c80ce5fad8c0fcea0fbf048de4480a80a6a1889c88b8b6c14147654a3ab4d5ffbcc258c2290da63f6d1 SHA512 614cb8dda7ad2088e5d6ef39b449bb4be0ac72cd0231c320188d76d1816dce6490c5114bb4798112c4b11d99d30a9e82ff8fcf08ffa8c049589682a5e38208f6 diff --git a/sys-auth/polkit-qt/polkit-qt-0.114.0-r1.ebuild b/sys-auth/polkit-qt/polkit-qt-0.114.0-r1.ebuild index c0f84d0b76ed..efecd86154c1 100644 --- a/sys-auth/polkit-qt/polkit-qt-0.114.0-r1.ebuild +++ b/sys-auth/polkit-qt/polkit-qt-0.114.0-r1.ebuild @@ -12,7 +12,7 @@ HOMEPAGE="https://api.kde.org/polkit-qt-1/html/" if [[ ${KDE_BUILD_TYPE} = release ]]; then SRC_URI="mirror://kde/stable/${KDE_ORG_NAME}/${KDE_ORG_NAME}-${PV}.tar.xz" - KEYWORDS="amd64 ~arm arm64 ~ppc ~ppc64 ~riscv x86" + KEYWORDS="amd64 ~arm arm64 ~loong ~ppc ~ppc64 ~riscv x86" fi LICENSE="LGPL-2" diff --git a/sys-auth/polkit/Manifest b/sys-auth/polkit/Manifest index afdab6e0266b..97dc21637488 100644 --- a/sys-auth/polkit/Manifest +++ b/sys-auth/polkit/Manifest @@ -1,18 +1,10 @@ -AUX polkit-0.115-elogind.patch 1069 BLAKE2B 6c5a3d7d3e716a994b951181808f64d864e6ca58b3a018a5354022f08c6e7c1d8987366c9777f47cc970916ad9fe39f288a1b1643113fc99745f333e02dab56f SHA512 06432fa56788699762c6978484640554f91728a1cb40679eb47b8514b3c7aa23aac5b9c26586eb4d7043a0af1b319bbe7f869d24844d9151317299b74a8e8f7f -AUX polkit-0.117-CVE-2021-3560.patch 909 BLAKE2B a912312e60fc442645a94a93795912220019a668f18a6a0d4e3c34ea23ea4155b37673b5e8db516cbe389b49423ef6008006823897dc41795ee5ac5def3e2708 SHA512 e62f362a4486e5eab04a0acd582d5cb9c1def19dd1707a9e1c861bdea6f576e6c24838c722526908de9cad63a699b513e4f56d1d5bbb0fcb9578f542d65b2953 AUX polkit-0.118-make-netgroup-support-optional.patch 7827 BLAKE2B 31fe769d1fdeb2ffca34533f0f448e3cd03d9a4849d8b67c7202368d804a5e6fbe58aecd1ae349c5193ffb87da035892500eb89507560412f10c2e44ed6c8d32 SHA512 ce00cbc8e35eb65f4db29cb4932b644bdc412f1c889560765f5da4eb7f265028c9e0839e1155b189fbea2b4bd3dca5106ad58698cfc1eebb61aeb582e29871a5 -AUX polkit-0.120-CVE-2021-4034.patch 1933 BLAKE2B f125b6c55428c2c12dbb89e7bc8619400d914f5b2b955d4e6ec24c4ac2cb02ba8e624f5c1a61dda74b1c24cd5c81a3f2985b9f4cf828bd801d940e707d62bec7 SHA512 cd32461e95297e29d7a5b7ba999b4f27c8296c964eb41c94b4511dc5181538ad0a50554340dae3c5a87629e07b8b22477478ffbf478f0fc16de856f8efb791d6 -AUX polkit-0.120-CVE-2021-4115.patch 2244 BLAKE2B 731e583d9657de6e3b7c384a0122487b71253539066ca17debf6172d6e6d45dee292bd421de5cc406c97d32862250d170ea42e83fb15103581c1443b7c39df35 SHA512 b9032fb05e4a18d72caf8eeed3f400d774798de28d5dde679f769f0d60cc1818ae688f6aa86c074517f2789eb61011368288c7ebafd0361af2c63f08ada3d00a AUX polkit-0.120-meson.patch 1201 BLAKE2B cae66df3db2c92392a07d3b39219a3c16819a9c2393b2bbfc65a32e4beac921e17bb09220cbfe2622edc21c7f81c64058cf60c315d48b8d80ba643d8336d5171 SHA512 f3a4feafae83dcc8bd665557cfc755c08888a78575313d510ec5ff140a2174a709755aa5e23081291ade6b2d333887a10848ae5c7a99b700a2e18476af21844d AUX polkit-0.120_p20220221-pkexec-suid.patch 1874 BLAKE2B 61984910aa9e99d07784894cd5415c8f524c2db49584bd14df9c75836387a711336897c02253abd546f5175d42f17e1a9f5954c646b1e5e97b3e544ed42a11cd SHA512 458eb26e294f3a28d951541d24cd6d5446106acd441cec8329b68a92029fd9c75278692fa81b89be251bfeb3cea5471c9a2c49e44ff3771c6c9354d388d49b3a AUX polkit-0.120_p20220509-make-netgroup-support-optional.patch 7306 BLAKE2B f01dae628a31cee32ea5416a456bc8515142949a656b7e7075db1e71b04b50041fa466e659f8056b02f8b6d542219bedb77b4279b7c375c7c4971c0b20d968b3 SHA512 300867e1b32f03eafaae9c91994576ce5112a064850dee1f323401cb624a60e48776c42dbb61ab2fd4d0c5fb0e9ec25e542842572d067a7b7b0e84c2c7d6ff4a -DIST polkit-0.117.tar.gz 1554536 BLAKE2B 1cf7e0ff9db19a29be626f4bea96c9e2ef8b1eab4b8287a5f1f4d2a818b86d58c1c4c4a41849d95e31559dba1b18853a31e934ebbadd8e07f94dfd58b45240e0 SHA512 c10ea984f2386fe436e58a2866e5323afc80d24f744f0ee61d966941259aa491bd96b07d911434aa731b300c3cca25b647804b396501175ab5b3c53384e94c70 -DIST polkit-0.120.tar.gz 1626659 BLAKE2B 745727445b4946d44b8ea470d21ac131ca7706e83f5dbaf85cf3541ac60a1bbe23b3bf3172a62d9256ebb3dae02d2b2d476e3e0f7fe79a80c47864a120e62ed9 SHA512 db072769439d5e17d0eed681e7b94251b77828c1474b40fe40b94293903a64333e7fa17515a3270648691f04a1374d8b404405ead6abf292a8eb8483164adc46 DIST polkit-0.120_p20220221.tar.bz2 734510 BLAKE2B 412f943d6d7b8ec493280073ed75c73f6acc89958d1507b416067ce742cc91e648956015a8d40a38c41ef061c79fc62004aa99b9902cdee0b8302852fa2df42c SHA512 15b09ba274f9b09ff5bf11d6238da43b0ee1fd76d53aa489b062f168a79f5de74cbd3953b45fa3bfad458e09e4c04032d08fe369bec6ffa35114da610741eb9f DIST polkit-0.120_p20220509.tar.bz2 702995 BLAKE2B 5eee6c5c895f95a1caa037cb7cc7ace86584013455142a8f7cd1e97c99de5d99575a70be525fb596342949f7c6ed56bd54cce6552132153bb1383377722f9e5c SHA512 24136d215d760d3eaff910495b2b1ac2d6bbc4577bd65566ff425485e76625aea2478ab323048c24ba6560ffee8eae6d22fa6b7bba0a3a5a35f53dc50d8dcb4f -EBUILD polkit-0.117-r3.ebuild 3421 BLAKE2B 8c73f230d712d78551e55bb5dbce0dd1ca61a6fdfb5f813d73e8f468d911e5d5141ee8d0e89915cb44d6eb9d74a57788c3e9a729b7d3208d4ae287efc7a018ec SHA512 1bb4ccb01b750961b067cdc91a4317d747022e5dfd1e7625f3f090302cf2a68a5b4da006c922c5e56192a7c520cb54a63b9c21e173def6e4868c388ec8ade7c0 -EBUILD polkit-0.120-r3.ebuild 3216 BLAKE2B 832d88d6f3e1770f42b9a17abb6a77c30cb4fedba6efef52a1a6e7c0e1c49d8e23af1379532c11b36136ff594ad5860cb69c6fe69aa81c25f0479b5f07cd2b5a SHA512 5c991f1f062230ba05564adfc9186f2f6b4bddd77182ff3ac5649198dd838c4c6216ff77dca042905b518d396f943dcd85a95f575b949b84605d0caabc95624d EBUILD polkit-0.120_p20220221-r1.ebuild 3303 BLAKE2B b00a260b749e8ee0620a04c93fd4cbe83de8e80d11fd4388be07914229b4dfefb881b35d2b22c231c1ebaa844a30f3579ae5948d290118a528414cbcd7e81110 SHA512 3b7d82d879a1611fcbb70562da47feace213acd0055a03bd752b7e2ee98951db3f8e3a12b04da80dcbf49eecbaf2573d71007879692c5f11264bde4f095ba239 EBUILD polkit-0.120_p20220221.ebuild 3236 BLAKE2B a0255cdd9d3b77b27d6962747ac34ce11c71dd10b1400bf187098216415856be84209f7b242ec25f0504ba7557b1cec622d796a8774ed33a14fde382f97b78dd SHA512 bcfd31c336e628b3bbfe20e7d43799945625f4af0b64b19969f56264833645ed2779da073d2731729c3faa7e2c824da75f6f69c4677322a3591feb4912d4d9da -EBUILD polkit-0.120_p20220509.ebuild 3803 BLAKE2B ff93a770243763bb9ce9d39134817ddeee84c4cdb98fa0652e92e59655a67f3bf4455ccf3c21d0940961e9f8a726823f4231cb83ff225e9e4d1b048575d36102 SHA512 41332f3d170d555bdc20e26d6c5b4022509f0972e20de81294c0623a00de824bac8af8b12c07201836ec83c39f0c4726a3fcbb5b21c5ad78cfcc20d77fdef8a8 -MISC metadata.xml 537 BLAKE2B 990f855eefe670eec229bdd37d597dbe568651ff4fefbad6c0f5bb1be53479b2b60ae44001d8af34c5730dba273878d47500f3dce120526a15618edfb42ed0ac SHA512 c30b94411055d404eb31b26b80b647500f8ef8c31d338b6753878298cde7e8c8657887cc0cf50fc23538401ac4239892a50f417c7e7840aa8c73c84c73518be2 +EBUILD polkit-0.120_p20220509.ebuild 3801 BLAKE2B a11fbcc81ea0c6f0e4a17a3fc4b11a4dcbb4d3a2985f5961cd92115f41b2e415bb31e4ad143d8653d8e0a7507399df6d00b44ae1f80f29a17efa26921f869d63 SHA512 75261b434a9086c3e623a569b981306584da571d25393ffdba471af1dc33e99f4fa6fc3b75dae562a52f0f13a231749d8eb6836a039453224b3eba86704e724d +MISC metadata.xml 454 BLAKE2B 1a94248c1f7e644ab2501a45aa66efb0fcfe2dd2526e486b1a7c73a56d4910463b69eff0b10cc568437b467f523ced8a2f38a9b67ed6f1891a3411230819f209 SHA512 3fabdf6bce379fa08c802b52398d65071515e08eef357c9886b6c74e1415671068cad942c711e1b1348f6e4b583ae6bec443e902e7d675df1938e981d3ff8143 diff --git a/sys-auth/polkit/files/polkit-0.115-elogind.patch b/sys-auth/polkit/files/polkit-0.115-elogind.patch deleted file mode 100644 index 93d672015db4..000000000000 --- a/sys-auth/polkit/files/polkit-0.115-elogind.patch +++ /dev/null @@ -1,28 +0,0 @@ -From 08bb656496cd3d6213bbe9473f63f2d4a110da6e Mon Sep 17 00:00:00 2001 -From: Rasmus Thomsen -Date: Wed, 11 Apr 2018 13:14:14 +0200 -Subject: [PATCH] configure: fix elogind support - -HAVE_LIBSYSTEMD is used to determine which source files to use. -We have to check if either have_libsystemd or have_libelogind is -true, as both of these need the source files which are used when -HAVE_LIBSYSTEMD is true. ---- - configure.ac | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/configure.ac b/configure.ac -index 36df239..da47ecb 100644 ---- a/configure.ac -+++ b/configure.ac -@@ -221,7 +221,7 @@ AS_IF([test "x$cross_compiling" != "xyes" ], [ - - AC_SUBST(LIBSYSTEMD_CFLAGS) - AC_SUBST(LIBSYSTEMD_LIBS) --AM_CONDITIONAL(HAVE_LIBSYSTEMD, [test "$have_libsystemd" = "yes"], [Using libsystemd]) -+AM_CONDITIONAL(HAVE_LIBSYSTEMD, [test "$have_libsystemd" = "yes" || test "$have_libelogind" = "yes" ], [Using libsystemd]) - - dnl --------------------------------------------------------------------------- - dnl - systemd unit / service files --- -2.17.0 diff --git a/sys-auth/polkit/files/polkit-0.117-CVE-2021-3560.patch b/sys-auth/polkit/files/polkit-0.117-CVE-2021-3560.patch deleted file mode 100644 index 9c3ce20cf574..000000000000 --- a/sys-auth/polkit/files/polkit-0.117-CVE-2021-3560.patch +++ /dev/null @@ -1,29 +0,0 @@ -https://bugs.gentoo.org/794052 - -From a04d13affe0fa53ff618e07aa8f57f4c0e3b9b81 Mon Sep 17 00:00:00 2001 -From: Jan Rybar -Date: Wed, 2 Jun 2021 15:43:38 +0200 -Subject: [PATCH] GHSL-2021-074: authentication bypass vulnerability in polkit - -initial values returned if error caught ---- - src/polkit/polkitsystembusname.c | 3 +++ - 1 file changed, 3 insertions(+) - -diff --git a/src/polkit/polkitsystembusname.c b/src/polkit/polkitsystembusname.c -index 8daa12c..8ed1363 100644 ---- a/src/polkit/polkitsystembusname.c -+++ b/src/polkit/polkitsystembusname.c -@@ -435,6 +435,9 @@ polkit_system_bus_name_get_creds_sync (PolkitSystemBusName *system_bus - while (!((data.retrieved_uid && data.retrieved_pid) || data.caught_error)) - g_main_context_iteration (tmp_context, TRUE); - -+ if (data.caught_error) -+ goto out; -+ - if (out_uid) - *out_uid = data.uid; - if (out_pid) --- -GitLab - diff --git a/sys-auth/polkit/files/polkit-0.120-CVE-2021-4034.patch b/sys-auth/polkit/files/polkit-0.120-CVE-2021-4034.patch deleted file mode 100644 index 22bb71d14204..000000000000 --- a/sys-auth/polkit/files/polkit-0.120-CVE-2021-4034.patch +++ /dev/null @@ -1,72 +0,0 @@ -https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt -https://bugs.gentoo.org/832057 -https://gitlab.freedesktop.org/polkit/polkit/-/commit/a2bf5c9c83b6ae46cbd5c779d3055bff81ded683.patch - -From a2bf5c9c83b6ae46cbd5c779d3055bff81ded683 Mon Sep 17 00:00:00 2001 -From: Jan Rybar -Date: Tue, 25 Jan 2022 17:21:46 +0000 -Subject: [PATCH] pkexec: local privilege escalation (CVE-2021-4034) - ---- a/src/programs/pkcheck.c -+++ b/src/programs/pkcheck.c -@@ -363,6 +363,11 @@ main (int argc, char *argv[]) - local_agent_handle = NULL; - ret = 126; - -+ if (argc < 1) -+ { -+ exit(126); -+ } -+ - /* Disable remote file access from GIO. */ - setenv ("GIO_USE_VFS", "local", 1); - ---- a/src/programs/pkexec.c -+++ b/src/programs/pkexec.c -@@ -488,6 +488,15 @@ main (int argc, char *argv[]) - pid_t pid_of_caller; - gpointer local_agent_handle; - -+ -+ /* -+ * If 'pkexec' is called THIS wrong, someone's probably evil-doing. Don't be nice, just bail out. -+ */ -+ if (argc<1) -+ { -+ exit(127); -+ } -+ - ret = 127; - authority = NULL; - subject = NULL; -@@ -614,10 +623,10 @@ main (int argc, char *argv[]) - - path = g_strdup (pwstruct.pw_shell); - if (!path) -- { -+ { - g_printerr ("No shell configured or error retrieving pw_shell\n"); - goto out; -- } -+ } - /* If you change this, be sure to change the if (!command_line) - case below too */ - command_line = g_strdup (path); -@@ -636,7 +645,15 @@ main (int argc, char *argv[]) - goto out; - } - g_free (path); -- argv[n] = path = s; -+ path = s; -+ -+ /* argc<2 and pkexec runs just shell, argv is guaranteed to be null-terminated. -+ * /-less shell shouldn't happen, but let's be defensive and don't write to null-termination -+ */ -+ if (argv[n] != NULL) -+ { -+ argv[n] = path; -+ } - } - if (access (path, F_OK) != 0) - { -GitLab diff --git a/sys-auth/polkit/files/polkit-0.120-CVE-2021-4115.patch b/sys-auth/polkit/files/polkit-0.120-CVE-2021-4115.patch deleted file mode 100644 index a82ce25cae03..000000000000 --- a/sys-auth/polkit/files/polkit-0.120-CVE-2021-4115.patch +++ /dev/null @@ -1,78 +0,0 @@ -https://gitlab.freedesktop.org/polkit/polkit/-/commit/41cb093f554da8772362654a128a84dd8a5542a7 -https://gitlab.freedesktop.org/polkit/polkit/-/issues/141 -https://bugs.gentoo.org/833574 - -From: Jan Rybar -Date: Mon, 21 Feb 2022 08:29:05 +0000 -Subject: [PATCH] CVE-2021-4115 (GHSL-2021-077) fix - ---- a/src/polkit/polkitsystembusname.c -+++ b/src/polkit/polkitsystembusname.c -@@ -62,6 +62,10 @@ enum - PROP_NAME, - }; - -+ -+guint8 dbus_call_respond_fails; // has to be global because of callback -+ -+ - static void subject_iface_init (PolkitSubjectIface *subject_iface); - - G_DEFINE_TYPE_WITH_CODE (PolkitSystemBusName, polkit_system_bus_name, G_TYPE_OBJECT, -@@ -364,6 +368,7 @@ on_retrieved_unix_uid_pid (GObject *src, - if (!v) - { - data->caught_error = TRUE; -+ dbus_call_respond_fails += 1; - } - else - { -@@ -405,6 +410,8 @@ polkit_system_bus_name_get_creds_sync (PolkitSystemBusName *system_bus - tmp_context = g_main_context_new (); - g_main_context_push_thread_default (tmp_context); - -+ dbus_call_respond_fails = 0; -+ - /* Do two async calls as it's basically as fast as one sync call. - */ - g_dbus_connection_call (connection, -@@ -432,11 +439,34 @@ polkit_system_bus_name_get_creds_sync (PolkitSystemBusName *system_bus - on_retrieved_unix_uid_pid, - &data); - -- while (!((data.retrieved_uid && data.retrieved_pid) || data.caught_error)) -- g_main_context_iteration (tmp_context, TRUE); -+ while (TRUE) -+ { -+ /* If one dbus call returns error, we must wait until the other call -+ * calls _call_finish(), otherwise fd leak is possible. -+ * Resolves: GHSL-2021-077 -+ */ - -- if (data.caught_error) -- goto out; -+ if ( (dbus_call_respond_fails > 1) ) -+ { -+ // we got two faults, we can leave -+ goto out; -+ } -+ -+ if ((data.caught_error && (data.retrieved_pid || data.retrieved_uid))) -+ { -+ // we got one fault and the other call finally finished, we can leave -+ goto out; -+ } -+ -+ if ( !(data.retrieved_uid && data.retrieved_pid) ) -+ { -+ g_main_context_iteration (tmp_context, TRUE); -+ } -+ else -+ { -+ break; -+ } -+ } - - if (out_uid) - *out_uid = data.uid; -GitLab diff --git a/sys-auth/polkit/metadata.xml b/sys-auth/polkit/metadata.xml index e93e97eb38ac..4e902cca885e 100644 --- a/sys-auth/polkit/metadata.xml +++ b/sys-auth/polkit/metadata.xml @@ -6,7 +6,6 @@ Use dev-lang/duktape instead of dev-lang/spidermonkey as JavaScript engine - Use sys-auth/elogind for session tracking Use sys-apps/systemd for session tracking diff --git a/sys-auth/polkit/polkit-0.117-r3.ebuild b/sys-auth/polkit/polkit-0.117-r3.ebuild deleted file mode 100644 index 650af02e7fab..000000000000 --- a/sys-auth/polkit/polkit-0.117-r3.ebuild +++ /dev/null @@ -1,136 +0,0 @@ -# Copyright 1999-2022 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=7 - -inherit autotools pam pax-utils systemd xdg-utils - -DESCRIPTION="Policy framework for controlling privileges for system-wide services" -HOMEPAGE="https://www.freedesktop.org/wiki/Software/polkit https://gitlab.freedesktop.org/polkit/polkit" -SRC_URI="https://www.freedesktop.org/software/${PN}/releases/${P}.tar.gz" - -LICENSE="LGPL-2" -SLOT="0" -KEYWORDS="~alpha ~amd64 arm ~arm64 ~hppa ~ia64 ~mips ppc ~ppc64 sparc ~x86" -IUSE="elogind examples gtk +introspection kde nls pam selinux systemd test" -RESTRICT="!test? ( test )" - -REQUIRED_USE="^^ ( elogind systemd )" - -BDEPEND=" - acct-user/polkitd - app-text/docbook-xml-dtd:4.1.2 - app-text/docbook-xsl-stylesheets - dev-libs/glib - dev-libs/gobject-introspection-common - dev-libs/libxslt - dev-util/glib-utils - dev-util/gtk-doc-am - dev-util/intltool - sys-devel/gettext - virtual/pkgconfig - introspection? ( dev-libs/gobject-introspection ) -" -DEPEND=" - dev-lang/spidermonkey:68[-debug] - dev-libs/glib:2 - dev-libs/expat - elogind? ( sys-auth/elogind ) - pam? ( - sys-auth/pambase - sys-libs/pam - ) - !pam? ( virtual/libcrypt:= ) - systemd? ( sys-apps/systemd:0=[policykit] ) -" -RDEPEND="${DEPEND} - acct-user/polkitd - selinux? ( sec-policy/selinux-policykit ) -" -PDEPEND=" - gtk? ( || ( - >=gnome-extra/polkit-gnome-0.105 - >=lxde-base/lxsession-0.5.2 - ) ) - kde? ( kde-plasma/polkit-kde-agent ) -" - -DOCS=( docs/TODO HACKING NEWS README ) - -PATCHES=( - # bug 660880 - "${FILESDIR}"/polkit-0.115-elogind.patch - - "${FILESDIR}"/polkit-0.117-CVE-2021-3560.patch - "${FILESDIR}"/polkit-0.120-CVE-2021-4034.patch -) - -QA_MULTILIB_PATHS=" - usr/lib/polkit-1/polkit-agent-helper-1 - usr/lib/polkit-1/polkitd" - -src_prepare() { - default - - sed -i -e 's|unix-group:wheel|unix-user:0|' src/polkitbackend/*-default.rules || die #401513 - - # Workaround upstream hack around standard gtk-doc behavior, bug #552170 - sed -i -e 's/@ENABLE_GTK_DOC_TRUE@\(TARGET_DIR\)/\1/' \ - -e '/install-data-local:/,/uninstall-local:/ s/@ENABLE_GTK_DOC_TRUE@//' \ - -e 's/@ENABLE_GTK_DOC_FALSE@install-data-local://' \ - docs/polkit/Makefile.in || die - - # disable broken test - bug #624022 - sed -i -e "/^SUBDIRS/s/polkitbackend//" test/Makefile.am || die - - # Fix cross-building, bug #590764, elogind patch, bug #598615 - eautoreconf -} - -src_configure() { - xdg_environment_reset - - local myeconfargs=( - --localstatedir="${EPREFIX}"/var - --disable-static - --enable-man-pages - --disable-gtk-doc - --disable-examples - $(use_enable elogind libelogind) - $(use_enable introspection) - $(use_enable nls) - $(usex pam "--with-pam-module-dir=$(getpam_mod_dir)" '') - --with-authfw=$(usex pam pam shadow) - $(use_enable systemd libsystemd-login) - --with-systemdsystemunitdir="$(systemd_get_systemunitdir)" - $(use_enable test) - --with-os-type=gentoo - ) - econf "${myeconfargs[@]}" -} - -src_compile() { - default - - # Required for polkitd on hardened/PaX due to spidermonkey's JIT - pax-mark mr src/polkitbackend/.libs/polkitd test/polkitbackend/.libs/polkitbackendjsauthoritytest -} - -src_install() { - default - - if use examples; then - docinto examples - dodoc src/examples/{*.c,*.policy*} - fi - - diropts -m 0700 -o polkitd - keepdir /usr/share/polkit-1/rules.d - - find "${ED}" -name '*.la' -delete || die -} - -pkg_postinst() { - chmod 0700 "${EROOT}"/{etc,usr/share}/polkit-1/rules.d - chown polkitd "${EROOT}"/{etc,usr/share}/polkit-1/rules.d -} diff --git a/sys-auth/polkit/polkit-0.120-r3.ebuild b/sys-auth/polkit/polkit-0.120-r3.ebuild deleted file mode 100644 index 8d65989915e6..000000000000 --- a/sys-auth/polkit/polkit-0.120-r3.ebuild +++ /dev/null @@ -1,123 +0,0 @@ -# Copyright 1999-2022 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=7 - -inherit meson pam pax-utils systemd xdg-utils - -DESCRIPTION="Policy framework for controlling privileges for system-wide services" -HOMEPAGE="https://www.freedesktop.org/wiki/Software/polkit https://gitlab.freedesktop.org/polkit/polkit" -SRC_URI="https://www.freedesktop.org/software/${PN}/releases/${P}.tar.gz" - -LICENSE="LGPL-2" -SLOT="0" -KEYWORDS="amd64 arm arm64 ~mips ppc64 ~riscv x86" -IUSE="examples gtk +introspection kde pam selinux systemd test" -#RESTRICT="!test? ( test )" -# Tests currently don't work with meson. See -# https://gitlab.freedesktop.org/polkit/polkit/-/issues/144 -RESTRICT="test" - -BDEPEND=" - acct-user/polkitd - app-text/docbook-xml-dtd:4.1.2 - app-text/docbook-xsl-stylesheets - dev-libs/glib - dev-libs/gobject-introspection-common - dev-libs/libxslt - dev-util/glib-utils - sys-devel/gettext - virtual/pkgconfig - introspection? ( dev-libs/gobject-introspection ) -" -DEPEND=" - dev-lang/spidermonkey:78[-debug] - dev-libs/glib:2 - dev-libs/expat - pam? ( - sys-auth/pambase - sys-libs/pam - ) - !pam? ( virtual/libcrypt:= ) - systemd? ( sys-apps/systemd:0=[policykit] ) - !systemd? ( sys-auth/elogind ) -" -RDEPEND="${DEPEND} - acct-user/polkitd - selinux? ( sec-policy/selinux-policykit ) -" -PDEPEND=" - gtk? ( || ( - >=gnome-extra/polkit-gnome-0.105 - >=lxde-base/lxsession-0.5.2 - ) ) - kde? ( kde-plasma/polkit-kde-agent ) -" - -DOCS=( docs/TODO HACKING NEWS README ) - -QA_MULTILIB_PATHS=" - usr/lib/polkit-1/polkit-agent-helper-1 - usr/lib/polkit-1/polkitd" - -src_prepare() { - local PATCHES=( - "${FILESDIR}/polkit-0.120-meson.patch" - "${FILESDIR}/polkit-0.120-CVE-2021-4034.patch" - "${FILESDIR}/polkit-0.120-CVE-2021-4115.patch" - ) - - default - - sed -i -e 's|unix-group:wheel|unix-user:0|' src/polkitbackend/*-default.rules || die #401513 -} - -src_configure() { - xdg_environment_reset - - local emesonargs=( - --localstatedir="${EPREFIX}"/var - -Dauthfw="$(usex pam pam shadow)" - -Dexamples=false - -Dgtk_doc=false - -Dman=true - -Dos_type=gentoo - -Dsession_tracking="$(usex systemd libsystemd-login libelogind)" - -Dsystemdsystemunitdir="$(systemd_get_systemunitdir)" - $(meson_use introspection) - $(meson_use test tests) - $(usex pam "-Dpam_module_dir=$(getpam_mod_dir)" '') - ) - meson_src_configure -} - -src_compile() { - meson_src_compile - - # Required for polkitd on hardened/PaX due to spidermonkey's JIT - pax-mark mr src/polkitbackend/.libs/polkitd test/polkitbackend/.libs/polkitbackendjsauthoritytest -} - -src_install() { - meson_src_install - - if use examples ; then - docinto examples - dodoc src/examples/{*.c,*.policy*} - fi - - diropts -m 0700 -o polkitd - keepdir /usr/share/polkit-1/rules.d - - # meson does not install required files with SUID bit. See - # https://bugs.gentoo.org/816393 - # Remove the following lines once this has been fixed by upstream - # (should be fixed in next release: https://gitlab.freedesktop.org/polkit/polkit/-/commit/4ff1abe4a4c1f8c8378b9eaddb0346ac6448abd8) - fperms u+s /usr/bin/pkexec - fperms u+s /usr/lib/polkit-1/polkit-agent-helper-1 -} - -pkg_postinst() { - chmod 0700 "${EROOT}"/{etc,usr/share}/polkit-1/rules.d - chown polkitd "${EROOT}"/{etc,usr/share}/polkit-1/rules.d -} diff --git a/sys-auth/polkit/polkit-0.120_p20220509.ebuild b/sys-auth/polkit/polkit-0.120_p20220509.ebuild index 5f6838c29981..0fedd4058792 100644 --- a/sys-auth/polkit/polkit-0.120_p20220509.ebuild +++ b/sys-auth/polkit/polkit-0.120_p20220509.ebuild @@ -22,7 +22,7 @@ fi LICENSE="LGPL-2" SLOT="0" -#KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~loong ~mips ~ppc ~ppc64 ~riscv ~sparc ~x86" +KEYWORDS="~alpha amd64 arm arm64 ~hppa ~ia64 ~loong ~mips ppc ppc64 ~riscv ~s390 sparc x86" IUSE="+duktape examples gtk +introspection kde pam selinux systemd test" if [[ ${PV} == *_p* ]] ; then RESTRICT="!test? ( test )" diff --git a/sys-auth/realtime-base/Manifest b/sys-auth/realtime-base/Manifest index d41084c1c9ce..3b8a2de9f721 100644 --- a/sys-auth/realtime-base/Manifest +++ b/sys-auth/realtime-base/Manifest @@ -1,2 +1,2 @@ -EBUILD realtime-base-0.1-r1.ebuild 948 BLAKE2B 3ca7e9da1fc00c2fa4d53c548fa56f8721291dc37b0904412968e5962253e08350c25a45ec6fff3deda39027fa18f0b45f2ffa77ff931511714174097c03ee6a SHA512 079f1cf5311ee6890f72cdae0be106909ca20e3c157ee5a3566342a359c383bdaf40e3ee4ed09fe7941e2c7a6e328213df75bb1825f3f18f4e8a0b849c2cd815 +EBUILD realtime-base-0.1-r1.ebuild 955 BLAKE2B 2675fbbf76877f9467c73eebf20704a3e74b69848a2d43246d8ed6114a73acc6edfc6d96feaa67bf6cb45c1f6ac7ffdca390c56d13aa1d044ae87f81e6b4293a SHA512 e1257698c9c30a43af71ee46e94089e638f6ba87ad2f6a270c4d1638a376c1edb64e9ca97ffbe593165fbfe38879a195922c92cb6577cb375a3fa841d1b05229 MISC metadata.xml 266 BLAKE2B ca23b48703283ee907c17267dae8c0f40748e75a7ab7217981a5a81a39c28797966c43265fb0b9dce0b0acf6c79dde5826cf30eb3ca1ec808e96e790d4c554d3 SHA512 d91b69020930a0f557b96c72c89a0881c573da762dbb53dd6fb96e77bba0adbec787b75286ee3e5a62a34e3fa6913c742fa22f99c17d4a3e466e8be05009a6c3 diff --git a/sys-auth/realtime-base/realtime-base-0.1-r1.ebuild b/sys-auth/realtime-base/realtime-base-0.1-r1.ebuild index a28d0c4446bb..5cea0efc327f 100644 --- a/sys-auth/realtime-base/realtime-base-0.1-r1.ebuild +++ b/sys-auth/realtime-base/realtime-base-0.1-r1.ebuild @@ -1,4 +1,4 @@ -# Copyright 1999-2021 Gentoo Authors +# Copyright 1999-2022 Gentoo Authors # Distributed under the terms of the GNU General Public License v2 EAPI=7 @@ -9,7 +9,7 @@ SRC_URI="" LICENSE="public-domain" SLOT="0" -KEYWORDS="~alpha amd64 arm arm64 ~hppa ~ia64 ppc ppc64 ~riscv ~s390 sparc x86" +KEYWORDS="~alpha amd64 arm arm64 ~hppa ~ia64 ~loong ppc ppc64 ~riscv ~s390 sparc x86" IUSE="" DEPEND="" diff --git a/sys-auth/seatd/Manifest b/sys-auth/seatd/Manifest index 1bec0c6a247e..83e5ece36196 100644 --- a/sys-auth/seatd/Manifest +++ b/sys-auth/seatd/Manifest @@ -1,5 +1,7 @@ AUX seatd.initd 87 BLAKE2B e88a8c353191ad9b69c0ee263aee7a050333d43e8dd26c8b3ee40cfbcb17f9b7a9391720ac34d19f375a880fae8178cd7dfc0b45cc9565b4b073bbe43cadf5ce SHA512 a19171b55e6650a9237f89258d92aba18508684412fe8a072387c505945b8e54557bd52261de76230553a572d627f40e00770087040111a7473fadfe3c33c931 DIST seatd-0.6.4.tar.gz 38393 BLAKE2B 2d01dbf00846c311daa3b4ac2bf87e818c722fa38e84b4cf83470803c23f779f12e4efe922f0b09ec8ef35ca913178a7f76bcded75dd7f7a7431e3a838c6bcc6 SHA512 0e2b23eca2e7978e3f914433caa6f84243a20487c6fe9fe3e42a7bf663a4a0872482aa334a3f5dc9b6625c565b408c3c78310b5575b9fb2e2919efdb9620ec57 -EBUILD seatd-0.6.4.ebuild 1264 BLAKE2B a29acfe8ea8b9cf42abd3f37f7baa57b63999f1e4dc0a63ae13ee53b2cb11eecc6d77273df737b1497907a58ee5e5677321cd6ca3dcf9032810402cca79ea192 SHA512 a2bc67dc692e6d0f8863799353a30037c669852760bdb1df1858df99cf397474e1cab64d4e460e7284103bfc662c446b4eb60a5c3992fd6e10c758b347067dab -EBUILD seatd-9999.ebuild 1264 BLAKE2B cbc90f21e86f8430f2d1d7fd2b1a96659e7700e5438d0786ea4629b7b4e211a44f557efc998d943009a13e5694566a7fd48d22cbfed73bcbe6e59e6ef04485e3 SHA512 71c292c38490a4125054d0259f77acf26b77aeccc87c72e0f4f87203e0e66c77bf14bc02adc6e798378353e6b09b896491c968d256226331066f4a03c55d4899 +DIST seatd-0.7.0.tar.gz 39198 BLAKE2B eddae25b353a5ff4da8aa8b41ead6e6ebab6ffa321376887769cbaf22c3c1b8448d84758749714b82d6ca2d602f2140042634bbeb9312449d8ac207b3774851e SHA512 c81c43994b92672a388bf255edb1fe24d3dba7ece2eb35f9fedc05cc0b8e464e9167ffed037645c4072430fe7b3b8fc80cc99f21fb5100654b5dd23a94742e66 +EBUILD seatd-0.6.4.ebuild 1254 BLAKE2B 3cc547f14990fc6eb0cd608fd947969a455c83fc470b83975764203e0b525b0c8072a6692ec47dab6ddad2316ac5c8acae4c208c23d0da66db90661201db04b6 SHA512 46ad246936d4f99975672c153715bdd2500e81a92e186ca39df361ba3e525544eae4c22d91b4204cffb58d9a182e09ca2828ae8b5d52e9a8faf769028f59f895 +EBUILD seatd-0.7.0.ebuild 1259 BLAKE2B 390143428d11e9a4ff55b0e20e2261dbd478fb9ccf46a071de52671e95c9e7c24c4cb79220364c6065dd3d8f8158024a9333484728f1c3c93612cac08ab44b3e SHA512 c90e571b5aa504a2f6a6c3898f1d67deba82e1f66649ca9bdff14bd6fae5b6f2fc2d385d6721f11fed818d1fc1a5c5e1ba769e45b3cdd5cbae2c4876d152cabd +EBUILD seatd-9999.ebuild 1259 BLAKE2B 390143428d11e9a4ff55b0e20e2261dbd478fb9ccf46a071de52671e95c9e7c24c4cb79220364c6065dd3d8f8158024a9333484728f1c3c93612cac08ab44b3e SHA512 c90e571b5aa504a2f6a6c3898f1d67deba82e1f66649ca9bdff14bd6fae5b6f2fc2d385d6721f11fed818d1fc1a5c5e1ba769e45b3cdd5cbae2c4876d152cabd MISC metadata.xml 660 BLAKE2B 9375bcc1d6a5622abfca0cb2a55e2e319780488ed085efdbef58299259de54842a84b8af2f57eb6fe3ad7baa436d83b8116ac9afb6c8e76a8d69c8776eb7438d SHA512 307d307fb80b15a6d2ecfce5784ebe2dc1882e5e62e80d6d3cdf529e07171ca1364241912368e69893daebfed1ba4f1298e54e8f7978e1dcdc777f97f9a97784 diff --git a/sys-auth/seatd/seatd-0.6.4.ebuild b/sys-auth/seatd/seatd-0.6.4.ebuild index f34fd69aad55..38a16a371fb9 100644 --- a/sys-auth/seatd/seatd-0.6.4.ebuild +++ b/sys-auth/seatd/seatd-0.6.4.ebuild @@ -11,7 +11,7 @@ if [[ ${PV} == 9999 ]]; then inherit git-r3 EGIT_REPO_URI="https://git.sr.ht/~kennylevinsen/seatd" else - KEYWORDS="amd64 arm arm64 ppc64 ~riscv x86" + KEYWORDS="amd64 arm arm64 ~loong ppc64 ~riscv x86" SRC_URI="https://git.sr.ht/~kennylevinsen/seatd/archive/${PV}.tar.gz -> ${P}.tar.gz" fi LICENSE="MIT" @@ -31,7 +31,6 @@ BDEPEND=">=app-text/scdoc-1.9.7" src_configure() { local emesonargs=( -Dman-pages=enabled - -Dwerror=false $(meson_feature builtin libseat-builtin) $(meson_feature server) ) diff --git a/sys-auth/seatd/seatd-0.7.0.ebuild b/sys-auth/seatd/seatd-0.7.0.ebuild new file mode 100644 index 000000000000..0e20322a39a4 --- /dev/null +++ b/sys-auth/seatd/seatd-0.7.0.ebuild @@ -0,0 +1,56 @@ +# Copyright 2020-2022 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=8 + +inherit meson systemd + +DESCRIPTION="Minimal seat management daemon and universal library" +HOMEPAGE="https://sr.ht/~kennylevinsen/seatd" +if [[ ${PV} == 9999 ]]; then + inherit git-r3 + EGIT_REPO_URI="https://git.sr.ht/~kennylevinsen/seatd" +else + KEYWORDS="~amd64 ~arm ~arm64 ~loong ~ppc64 ~riscv ~x86" + SRC_URI="https://git.sr.ht/~kennylevinsen/seatd/archive/${PV}.tar.gz -> ${P}.tar.gz" +fi +LICENSE="MIT" +SLOT="0/1" +IUSE="builtin elogind +server systemd" +REQUIRED_USE="?? ( elogind systemd )" + +DEPEND=" + elogind? ( sys-auth/elogind ) + systemd? ( sys-apps/systemd ) +" +RDEPEND="${DEPEND} + server? ( acct-group/seat ) +" +BDEPEND=">=app-text/scdoc-1.9.7" + +src_configure() { + local emesonargs=( + -Dman-pages=enabled + $(meson_feature builtin libseat-builtin) + $(meson_feature server) + ) + + if use elogind ; then + emesonargs+=( -Dlibseat-logind=elogind ) + elif use systemd; then + emesonargs+=( -Dlibseat-logind=systemd ) + else + emesonargs+=( -Dlibseat-logind=disabled ) + fi + + meson_src_configure +} + +src_install() { + meson_src_install + + if use server; then + newinitd "${FILESDIR}/seatd.initd" seatd + systemd_dounit contrib/systemd/seatd.service + fi +} diff --git a/sys-auth/seatd/seatd-9999.ebuild b/sys-auth/seatd/seatd-9999.ebuild index 2c8b264374b9..0e20322a39a4 100644 --- a/sys-auth/seatd/seatd-9999.ebuild +++ b/sys-auth/seatd/seatd-9999.ebuild @@ -1,4 +1,4 @@ -# Copyright 2020-2021 Gentoo Authors +# Copyright 2020-2022 Gentoo Authors # Distributed under the terms of the GNU General Public License v2 EAPI=8 @@ -11,7 +11,7 @@ if [[ ${PV} == 9999 ]]; then inherit git-r3 EGIT_REPO_URI="https://git.sr.ht/~kennylevinsen/seatd" else - KEYWORDS="~amd64 ~arm64 ~ppc64 ~riscv ~x86" + KEYWORDS="~amd64 ~arm ~arm64 ~loong ~ppc64 ~riscv ~x86" SRC_URI="https://git.sr.ht/~kennylevinsen/seatd/archive/${PV}.tar.gz -> ${P}.tar.gz" fi LICENSE="MIT" @@ -31,7 +31,6 @@ BDEPEND=">=app-text/scdoc-1.9.7" src_configure() { local emesonargs=( -Dman-pages=enabled - -Dwerror=false $(meson_feature builtin libseat-builtin) $(meson_feature server) ) diff --git a/sys-auth/solo1/Manifest b/sys-auth/solo1/Manifest index e25fb563ac15..2cd0fd636cf7 100644 --- a/sys-auth/solo1/Manifest +++ b/sys-auth/solo1/Manifest @@ -1,3 +1,3 @@ DIST solo1-0.1.1.tar.gz 39300 BLAKE2B 3d486d7d515acf03131ef640e38f804f10b4601db37d2b668ea50a715e5b0b38e95d16f3dec41a282bfaacf743a531ef6b56f9b688bdbb7d7f8acc56bdd1d77c SHA512 7e345059205f8753d7d89a22091316f5a529e5afedd82f7a03acbe494035479ef28731cc2b91e8d46058ce638a0e420db8c5f57fcedfcc39b6d07de5eda86f93 -EBUILD solo1-0.1.1.ebuild 1087 BLAKE2B 67b0d3c4d8c4b2dd02c0f4d5fb53dcbfe5adb9d6f584e6b9f4712bb3273461ab4b28ea01b66c9ba06f24f0b14f58c357c01c5b05fa2af56e98ee3b7145b0c5b7 SHA512 e0ff6ae60722bb9eb3754655a3e83bcd82055fa1a3f04dcf95b83e60993dc843d3ab279f41c0b1726003f94025b4f3aa10c700e51e8673029a3a594f58996005 +EBUILD solo1-0.1.1.ebuild 1085 BLAKE2B 520b67840c4ede69b57fbe57b8302a0bf28ff3e82ce6ff049d7a2f7517eb6ced9257d6c6ab66ab3add6c0d1f1cb8953e73df007b7e3f89485546974dc09fabea SHA512 f9f7e55935dd01d1dcda9ed8432fc1dff3dd780946225287859a3fe156643c6339b5642683b16280cbed027949a42ec7a56018d84b4c20dfbb71a0b16164ff20 MISC metadata.xml 703 BLAKE2B f783bce450c4dd2231e6ffbe678c074b630fafa7fa2d75b296cc3e9d1dec11c4caa30182f4c09d15e20b6e4338b03b33961e01cdbde08b4bd05c6b90cbe35583 SHA512 bfb1e4a6cc78ea489411280ac1a8c649690fab10540698dc865daea0ddccce6bd5c5221bf72774d13755a998378d38ba14a9731664447baccbb8be2f795d0d19 diff --git a/sys-auth/solo1/solo1-0.1.1.ebuild b/sys-auth/solo1/solo1-0.1.1.ebuild index d2d01f96ae74..d75947830b6f 100644 --- a/sys-auth/solo1/solo1-0.1.1.ebuild +++ b/sys-auth/solo1/solo1-0.1.1.ebuild @@ -19,7 +19,7 @@ KEYWORDS="amd64 ~riscv" RDEPEND=">=dev-python/click-7.1.0[${PYTHON_USEDEP}] dev-python/cryptography[${PYTHON_USEDEP}] dev-python/ecdsa[${PYTHON_USEDEP}] - >=dev-python/fido2-0.9.1[${PYTHON_USEDEP}] + dev-python/fido2:0/0.9[${PYTHON_USEDEP}] dev-python/intelhex[${PYTHON_USEDEP}] dev-python/pyserial[${PYTHON_USEDEP}] dev-python/pyusb[${PYTHON_USEDEP}] diff --git a/sys-auth/ssh-import-id/Manifest b/sys-auth/ssh-import-id/Manifest new file mode 100644 index 000000000000..5252ea3d3152 --- /dev/null +++ b/sys-auth/ssh-import-id/Manifest @@ -0,0 +1,3 @@ +DIST ssh-import-id-5.11.tar.gz 146064 BLAKE2B d869ec480d224aa906ef08b5b9acfbf9324d67bffafadcf1c0adae108ad53e76cdfbcf0d1905a947bda5df507fbd69e7ee121890bc48e452ca67c5acd92ac18c SHA512 49703b8b9c127f13bf0626fd013318b9498ec8a67a060fb7607c7a1894da3e3e3e7e995c9b68af8375237f4031d06abda20f2a9a73a1fabbe33055f2f434716b +EBUILD ssh-import-id-5.11.ebuild 643 BLAKE2B ae3a39d8caae12c70b5de7d2cd22d17aeab0c6f822638519406120564f4cbe450bf85ce5daf2813512a748ea5fca6973d89c153fb4020830985a030403e58946 SHA512 4abe9d31d0192b251b4de025d04be133d4c14cf857811daf9bedb29b08971017d1ca86c15db2914190764af598665485df3152c93eabb79f69bfab8f42e74028 +MISC metadata.xml 277 BLAKE2B c345d754d34cb228e1b27283b6a38bf4e4e87925b27cc8ca7bd1f8a752be7a3fede5ba13df3bb692a5cb3187476767c89fb1205dd8591a183cefe4b8f8b2e127 SHA512 71ba86560b0ee47075fb4bb3e953b5a39fff709ec53cc1c8f795df63f996b4377b9a367057512b7d620764d6744cb92ab2943aeeeba52b940c3a3cffdd270675 diff --git a/sys-auth/ssh-import-id/metadata.xml b/sys-auth/ssh-import-id/metadata.xml new file mode 100644 index 000000000000..fd9ff4351985 --- /dev/null +++ b/sys-auth/ssh-import-id/metadata.xml @@ -0,0 +1,9 @@ + + + + + slashbeast@gentoo.org + Piotr Karbowski + + + diff --git a/sys-auth/ssh-import-id/ssh-import-id-5.11.ebuild b/sys-auth/ssh-import-id/ssh-import-id-5.11.ebuild new file mode 100644 index 000000000000..7b988386b2a9 --- /dev/null +++ b/sys-auth/ssh-import-id/ssh-import-id-5.11.ebuild @@ -0,0 +1,27 @@ +# Copyright 1999-2022 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=8 + +PYTHON_COMPAT=( python3_{7..10} ) + +inherit distutils-r1 + +DESCRIPTION="Utility to securely retrieve an SSH public key and install it locally" +HOMEPAGE="https://launchpad.net/ssh-import-id" +SRC_URI="https://launchpad.net/${PN}/trunk/${PV}/+download/${P}.tar.gz" + +LICENSE="GPL-3" +SLOT="0" +KEYWORDS="~alpha amd64 arm64 ~hppa ~ia64 ~loong ~mips ppc ppc64 sparc x86" +IUSE="" + +DEPEND="${PYTHON_DEPS}" +RDEPEND=" + dev-python/distro[${PYTHON_USEDEP}] +" + +src_install() { + distutils-r1_src_install + doman usr/share/man/man1/ssh-import-id.1 +} diff --git a/sys-auth/ssh-ldap-pubkey/Manifest b/sys-auth/ssh-ldap-pubkey/Manifest index 3de32b203270..73ab591f71b4 100644 --- a/sys-auth/ssh-ldap-pubkey/Manifest +++ b/sys-auth/ssh-ldap-pubkey/Manifest @@ -1,4 +1,3 @@ -AUX ssh-ldap-pubkey-1.3.3-python3.9.patch 1226 BLAKE2B 1f3c3f9168b0370301aa31a47f14aaddd41eb1d14f66505ff013e245dd12cb514ae422f7189f3af6952fc6c7a5e22789c7c7cd88343d89f9c4a07b667e6bafef SHA512 54d23323a90cc25b1172291b99151cae37e346eccca027fc1010cfb8a7e69d6a353c71cefceefd4c06f43e60eb476d9141329ee1ff4cba74991cecdde888d72b -DIST ssh-ldap-pubkey-1.3.3.tar.gz 15389 BLAKE2B 24c741646e33cf7af400053eff17efa35b96ec418d1c2b8c370a371dde51fdbbb3af3423f0cc4374f61b302f9836601444ee72613388fa2d4445957f918d64f9 SHA512 b52d4de3e0704817e8ea0fb316c21646da1bac74ed226812c03f9ee5ae449a86e5ef4c679633d212db05382e216b254a185e29d4a2244318ad5de288b909254a -EBUILD ssh-ldap-pubkey-1.3.3.ebuild 1767 BLAKE2B 07f90f0ae83fc4961725035783e054ceaa8829351445efcafe69aa65774f6fa4713b2a6530d2f3ad8c1cac4abf8c092cf19ad63ca64e8e7a3f1bc0e44c82afab SHA512 fae36d8a5d43650ff949f20ea513fe79ee6806165af8d8190177c33c87a093ef014210555ebd30329501c3793882eef6e383c7f87dd8875dd46199aa359ec653 +DIST ssh-ldap-pubkey-1.4.0.tar.gz 15461 BLAKE2B 8e78fd6a5fa76ca97e813c95c9cbfefc3d40024cb31b8992de0c44770592f5abc7d8f0a4673905456dbe9a4272c1ce9a9e12bec69d9f8fa2f32a9b7a1895b978 SHA512 a62929b47f46f18936fcc7c233afaee43f0cef5f7a8de15304986205f98c2644a18f9c0dcabb35598f1cc485b8c4dbeb8b2f07cb2c3dcbb6b271a276aebf88e7 +EBUILD ssh-ldap-pubkey-1.4.0.ebuild 1532 BLAKE2B 425bbd7599738467bf07f0678d2f44ff186d1d7cd9e6381fa67d2aaf8d2be83abab12c88797df479775ca0cf91ceac4ff1b4362f32b3ad503e017eb2d45b8f80 SHA512 5a6e31df274d8551b8416d313cbbdc9e69b7a4622f06716466a0e553106e4fb13625a130858246d679be1bfde7c5f3125707261fe2708a3fc3f3af2394034a8a MISC metadata.xml 524 BLAKE2B cc3dbc1b79b08be66e589243c3fba1e4b6fb5b224b24ed775683260f4f9fe47db9c13a166658ab9093e4bccc94bc46bbe2ec5b55df4599b168892e1c3893cd60 SHA512 94735c9e5e150ebc13f62c2883691a460378a8b4866dcd167293cb037b3d36bc6015d08ecfdacbc0a9d7ab91e1208c14c751f9d078f3272e30ca85f58ab10ad9 diff --git a/sys-auth/ssh-ldap-pubkey/files/ssh-ldap-pubkey-1.3.3-python3.9.patch b/sys-auth/ssh-ldap-pubkey/files/ssh-ldap-pubkey-1.3.3-python3.9.patch deleted file mode 100644 index b646603a134a..000000000000 --- a/sys-auth/ssh-ldap-pubkey/files/ssh-ldap-pubkey-1.3.3-python3.9.patch +++ /dev/null @@ -1,34 +0,0 @@ -commit 56b4b77bfa2b063b3f3686b54d8e39f6bce1d2a0 -Author: Thomas Deutschmann -AuthorDate: Wed Jun 2 17:40:06 2021 +0200 -Commit: Thomas Deutschmann -CommitDate: Wed Jun 2 18:01:16 2021 +0200 - - Use decodebytes instead of decodestring in Python 3.9 - - base64.decodestring(), alias deprecated since Python 3.1, has been removed - in Python 3.9 in favor of new base64.decodebytes() function [Link 1]. - - Link 1: https://docs.python.org/3.9/whatsnew/3.9.html#removed - Closes: https://github.com/jirutka/ssh-ldap-pubkey/issues/49 - -diff --git a/ssh_ldap_pubkey/__init__.py b/ssh_ldap_pubkey/__init__.py -index 5da2ade..d80b335 100644 ---- a/ssh_ldap_pubkey/__init__.py -+++ b/ssh_ldap_pubkey/__init__.py -@@ -39,8 +39,14 @@ def is_valid_openssh_pubkey(pubkey): - key_type, data64 = map(_encode, pubkey.split()[0:2]) - except (ValueError, AttributeError): - return False -+ -+ if hasattr(base64, "decodebytes"): -+ decodebytes = base64.decodebytes -+ else: -+ decodebytes = base64.decodestring -+ - try: -- data = base64.decodestring(data64) -+ data = decodebytes(data64) - except base64.binascii.Error: - return False - diff --git a/sys-auth/ssh-ldap-pubkey/ssh-ldap-pubkey-1.3.3.ebuild b/sys-auth/ssh-ldap-pubkey/ssh-ldap-pubkey-1.3.3.ebuild deleted file mode 100644 index ac7bd5162af7..000000000000 --- a/sys-auth/ssh-ldap-pubkey/ssh-ldap-pubkey-1.3.3.ebuild +++ /dev/null @@ -1,73 +0,0 @@ -# Copyright 1999-2021 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI="7" - -PYTHON_COMPAT=( python3_{7..9} ) -inherit distutils-r1 - -DESCRIPTION="Utility to manage SSH public keys stored in LDAP" -HOMEPAGE="https://github.com/jirutka/ssh-ldap-pubkey" - -if [[ ${PV} == "9999" ]]; then - EGIT_REPO_URI="https://github.com/jirutka/${PN}/${PN}.git" - - inherit git-r3 -else - SRC_URI="https://github.com/jirutka/${PN}/archive/v${PV}.tar.gz -> ${P}.tar.gz" - KEYWORDS="~alpha amd64 ~arm ~arm64 ~ia64 ~ppc ~ppc64 x86" -fi - -LICENSE="MIT" -SLOT="0" -IUSE="schema test" -RESTRICT="!test? ( test )" - -MY_CDEPEND=" - dev-python/docopt[${PYTHON_USEDEP}] - >=dev-python/python-ldap-3.0[${PYTHON_USEDEP}] - virtual/logger" - -DEPEND=" - ${MY_CDEPEND} - dev-python/setuptools[${PYTHON_USEDEP}] - test? ( - dev-python/pytest[${PYTHON_USEDEP}] - dev-python/pytest-describe[${PYTHON_USEDEP}] - dev-python/pytest-mock[${PYTHON_USEDEP}] - )" - -# We need to block previous net-misc/openssh packages -# to avoid file collision on "/etc/openldap/schema/openssh-lpk.schema" -RDEPEND="${MY_CDEPEND} - schema? ( !net-misc/openssh[ldap(-)] )" - -DOCS=( README.md CHANGELOG.adoc ) - -PATCHES=( "${FILESDIR}"/${P}-python3.9.patch ) - -src_prepare() { - sed -i -e 's/pyldap/python-ldap >= 3.0/' setup.py || die - distutils-r1_src_prepare -} - -python_test() { - pytest -vv || die "Tests failed under ${EPYTHON}" -} - -python_install_all() { - distutils-r1_python_install_all - - if use schema; then - insinto /etc/openldap/schema - doins etc/openssh-lpk.schema - fi - - local MY_DOCDIR="/usr/share/doc/${PF}/examples" - insinto "${MY_DOCDIR}" - doins etc/ldap.conf - - # We don't want to compress this small file to allow user - # to diff configuration against upstream's default - docompress -x "${MY_DOCDIR}" -} diff --git a/sys-auth/ssh-ldap-pubkey/ssh-ldap-pubkey-1.4.0.ebuild b/sys-auth/ssh-ldap-pubkey/ssh-ldap-pubkey-1.4.0.ebuild new file mode 100644 index 000000000000..f47d13393d96 --- /dev/null +++ b/sys-auth/ssh-ldap-pubkey/ssh-ldap-pubkey-1.4.0.ebuild @@ -0,0 +1,60 @@ +# Copyright 1999-2022 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=7 + +DISTUTILS_USE_PEP517=setuptools +PYTHON_COMPAT=( python3_{8..10} ) +inherit distutils-r1 + +DESCRIPTION="Utility to manage SSH public keys stored in LDAP" +HOMEPAGE="https://github.com/jirutka/ssh-ldap-pubkey" + +if [[ ${PV} == 9999 ]] ; then + EGIT_REPO_URI="https://github.com/jirutka/${PN}/${PN}.git" + + inherit git-r3 +else + SRC_URI="https://github.com/jirutka/${PN}/archive/v${PV}.tar.gz -> ${P}.tar.gz" + KEYWORDS="~alpha amd64 ~arm ~arm64 ~ia64 ~ppc ~ppc64 x86" +fi + +LICENSE="MIT" +SLOT="0" +IUSE="schema" + +MY_CDEPEND="dev-python/docopt[${PYTHON_USEDEP}] + >=dev-python/python-ldap-3.0[${PYTHON_USEDEP}] + virtual/logger" +DEPEND="${MY_CDEPEND} + dev-python/setuptools[${PYTHON_USEDEP}] + test? ( + dev-python/pytest-describe[${PYTHON_USEDEP}] + dev-python/pytest-mock[${PYTHON_USEDEP}] + )" + +# We need to block previous net-misc/openssh packages +# to avoid file collision on "/etc/openldap/schema/openssh-lpk.schema" +RDEPEND="${MY_CDEPEND} + schema? ( !net-misc/openssh[ldap(-)] )" + +DOCS=( README.md CHANGELOG.adoc ) + +distutils_enable_tests pytest + +python_install_all() { + distutils-r1_python_install_all + + if use schema; then + insinto /etc/openldap/schema + doins etc/openssh-lpk.schema + fi + + local MY_DOCDIR="/usr/share/doc/${PF}/examples" + insinto "${MY_DOCDIR}" + doins etc/ldap.conf + + # We don't want to compress this small file to allow user + # to diff configuration against upstream's default + docompress -x "${MY_DOCDIR}" +} diff --git a/sys-auth/sssd/Manifest b/sys-auth/sssd/Manifest index 02ac7317f697..a180c55df228 100644 --- a/sys-auth/sssd/Manifest +++ b/sys-auth/sssd/Manifest @@ -1,11 +1,8 @@ -AUX sssd-2.3.1-test_ca-Look-for-libsofthsm2.so-in-usr-libdir-sofths.patch 1180 BLAKE2B 22b12936b8a4256af39396ce31a90742bc93331b2adb9c44442ddd1285ee19e03c24f99b899dfe35768d4383f7e46a241a0fa3975cc3cf4b32e93f1dd0805915 SHA512 d4519c7d9a63d6902da028584379457fda0be7b4e3b882498586504543e944462d93a3fe804f307562d75cd15257a1595c09bc1e804a41f47f1d2ff9999c7973 AUX sssd-2.6.0-conditional-python-install.patch 418 BLAKE2B 47f3653982c551bc99d547daa998422a94fac132b3c6ce5a9db9ae64ef3d7426b3ded0426d969ad7eef27b942985404d413cc415332b0bd83acdf7f2c9adbad2 SHA512 12ba5a0adb8bc9227216e7f3ebe5805917d155b9064d13becdfb40555d416892c7d101f208bde75a87f4b70862f3dcdc242ee3f1593ebd452fcefba6c5b47a1c AUX sssd.conf 124 BLAKE2B b6f9c016a014510f97b036d23d5f50e1e13085220fe82b0e6ef7a3ceeb114e59af935f39e66e4ad60a46f43983930e5d381b16b0ed31ba4349abe38c4b509367 SHA512 f16908c44b213edbf6b0c6e8d49df92e8c06fc623279037074fe51e49b8aca7dc18f5ed83f71909fc8209df80dfc150583edb1687f88e61588bdf9d1fbf6ed5a -DIST sssd-2.3.1.tar.gz 7186526 BLAKE2B 6d630fe75b9b426ef54adbe1704fde8e01fc34df7861028c07ce2985db8a151ce743d633061386fea6460fe8eabb89242b816d4bac87975bb9b7b2064ad1d547 SHA512 6aeb52d5222c5992d581296996749327bcaf276e4eb4413a6a32ea6529343432cfe413006aca4245c19b38b515be1c4c2ef88a157c617d889274179253355bc6 DIST sssd-2.5.2-CVE-2021-3621.patch.bz2 3155 BLAKE2B c50e331f0f1acbb9ef8e6d54a63219da44df5e565608c24635d85a110fcc024f7d5293c4412bca64831a9a3a14e2c1188be1a802c76575ad6d7a83243d3d89c2 SHA512 650af7c67b3a807935c0875ee877d366facdf818492fb4244757448ad351454a279968ea5414e6b3cd116e873abe4f1aef2ccdaf790a4df0cf7f2a0078a41860 DIST sssd-2.5.2.tar.gz 7579208 BLAKE2B ec5d9aeaf5b5e05b56c01f9137f6f24db05544dbd48458d742285b60e7beb6d48af865f3415e11ce89e187f4643bbecf15bbb321859ec80cfe458eb781cea6c9 SHA512 a9bac7b2cc23022dce3bcda314c9c26a0a0914c448f6d5a51c5ba18670f04c1fd1a94cb20173235b6285df1dcc9251cb6b3f3e71a220037b4eb66668e6f33c48 DIST sssd-2.6.0.tar.gz 7440969 BLAKE2B 6b05fcea09ef10a5b2f373dc6a66032edc4c4f46f65f42fdc9ffb5b676025095e16de4a86b3088351c22746e062829d1d68fa7e960cccb7c5a77d960e6d38e2a SHA512 0b9e169424cbadfa6132a3e5e9789facf82f04cce94cb5344b8ff49370ae8817c2cb16cf21caddf6a7cd42e661d5ff5bf97843d79681683aacff0053ff93f64b -EBUILD sssd-2.3.1-r3.ebuild 7522 BLAKE2B 3cc04f27c90f32423389a71b292831171851873e69f1912a0c0903bc3af25eed8b5719e77bd8d55835a15fa7be61b3d46fd431f9e77ccee32d37b23203bd6756 SHA512 ad09d592b764c0c74a8df10ac187cc9fb6687b230b3d639b076ff04947cdfa19ac5607467017b2254db56afebe54f4e04dbf6b3509a8375f03629227b1128a9f EBUILD sssd-2.5.2-r3.ebuild 7875 BLAKE2B 1d47ce3dce24057b31d11fb09e7e52da1ca0df09a59968767cc3cbd78049e31bf4c76c7265d96c284b2443c9a669ac6349679f629647de570093d13a6fdbd832 SHA512 bbed37b099c0aab4103665c444ad0b9af019d1dac13d3aed0bab9ab863c7c7e13cf26ece24d3b535da7eebe81d241772403b274275b93c59ccf4a6abe1663807 EBUILD sssd-2.6.0-r2.ebuild 7523 BLAKE2B a54989e1ba136092075899cf39fee5b5021735db6aed98b6b219089352f3c7ab82d258cf02ec2b367e6cc8c224d7bff15a3c2e25867a6717ad860242127c99a4 SHA512 8bee7e92ba3c0f57e4fffb6dfa2c6cb8ce6c1c7869022c8862f5bfcae45a32521a79a5ccaafe20a05e8a2d244b5bf8c56bbd64a9d281a97af5c468a8cba38bbb MISC metadata.xml 1178 BLAKE2B 13714a0bc0bcea712f6e03b00f1ba8cf11760a32552b0a07218b542db6e54968bcb8bf99cb1780dae1e06b92dc354aec5436b85887b25dfc951e2f5e7bdfbed1 SHA512 e8bbb2990be12ca9d98918f11839abc00bc1ba339c484ab232ccfcb2a01e940cd5aa1460de5d758390466945f536b6476cbdd67b431eaf014b18a10c449ab36c diff --git a/sys-auth/sssd/files/sssd-2.3.1-test_ca-Look-for-libsofthsm2.so-in-usr-libdir-sofths.patch b/sys-auth/sssd/files/sssd-2.3.1-test_ca-Look-for-libsofthsm2.so-in-usr-libdir-sofths.patch deleted file mode 100644 index b84df9a91cba..000000000000 --- a/sys-auth/sssd/files/sssd-2.3.1-test_ca-Look-for-libsofthsm2.so-in-usr-libdir-sofths.patch +++ /dev/null @@ -1,32 +0,0 @@ -From fc79d035ccc4c1a5da26bbd780aeb7e0a0afebf5 Mon Sep 17 00:00:00 2001 -From: Matt Turner -Date: Fri, 14 Aug 2020 13:36:30 -0700 -Subject: [PATCH] test_ca: Look for libsofthsm2.so in /usr/${libdir}/softhsm - too - -Signed-off-by: Matt Turner ---- - src/external/test_ca.m4 | 7 ++++--- - 1 file changed, 4 insertions(+), 3 deletions(-) - -diff --git a/src/external/test_ca.m4 b/src/external/test_ca.m4 -index 4d45a5a16..d318789bc 100644 ---- a/src/external/test_ca.m4 -+++ b/src/external/test_ca.m4 -@@ -33,9 +33,10 @@ AC_DEFUN([AM_CHECK_TEST_CA], - AM_CONDITIONAL([BUILD_TEST_CA], [test -x "$OPENSSL" -a -x "$SSH_KEYGEN" -a -x "$CERTUTIL" -a -x "$PK12UTIL"]) - else - -- for p in /usr/lib64/pkcs11/libsofthsm2.so /usr/lib/pkcs11/libsofthsm2.so /usr/lib/x86_64-linux-gnu/softhsm/libsofthsm2.so; do -- if test -f "${p}"; then -- SOFTHSM2_PATH="${p}" -+ for p in /usr/lib{64,}/{softhsm,pkcs11} /usr/lib/x86_64-linux-gnu/softhsm; do -+ f="${p}/libsofthsm2.so" -+ if test -f "${f}"; then -+ SOFTHSM2_PATH="${f}" - break; - fi - done --- -2.26.2 - diff --git a/sys-auth/sssd/sssd-2.3.1-r3.ebuild b/sys-auth/sssd/sssd-2.3.1-r3.ebuild deleted file mode 100644 index 9b6a97abcbd8..000000000000 --- a/sys-auth/sssd/sssd-2.3.1-r3.ebuild +++ /dev/null @@ -1,288 +0,0 @@ -# Copyright 1999-2022 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=7 - -PYTHON_COMPAT=( python3_{7,8,9} ) - -inherit autotools linux-info multilib-minimal python-single-r1 pam systemd toolchain-funcs - -DESCRIPTION="System Security Services Daemon provides access to identity and authentication" -HOMEPAGE="https://github.com/SSSD/sssd" -SRC_URI="https://github.com/SSSD/sssd/releases/download/${PN}-${PV//./_}/${P}.tar.gz" -KEYWORDS="amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~sparc x86" - -LICENSE="GPL-3" -SLOT="0" -IUSE="acl doc +locator +netlink nfsv4 nls +man pac python samba selinux sudo systemd test valgrind" -RESTRICT="!test? ( test )" - -REQUIRED_USE="pac? ( samba ) - python? ( ${PYTHON_REQUIRED_USE} )" - -DEPEND=" - >=app-crypt/mit-krb5-1.10.3 - app-crypt/p11-kit - >=dev-libs/ding-libs-0.2 - dev-libs/glib:2 - >=dev-libs/cyrus-sasl-2.1.25-r3[kerberos] - >=dev-libs/libpcre-8.30:= - >=dev-libs/popt-1.16 - >=dev-libs/openssl-1.0.2:0= - >=net-dns/bind-tools-9.9[gssapi] - >=net-dns/c-ares-1.7.4:= - >=net-nds/openldap-2.4.30:=[sasl] - >=sys-apps/dbus-1.6 - >=sys-apps/keyutils-1.5:= - >=sys-libs/pam-0-r1[${MULTILIB_USEDEP}] - >=sys-libs/talloc-2.0.7 - >=sys-libs/tdb-1.2.9 - >=sys-libs/tevent-0.9.16 - >=sys-libs/ldb-1.1.17-r1:= - virtual/libintl - locator? ( - >=app-crypt/mit-krb5-1.12.2[${MULTILIB_USEDEP}] - >=net-dns/c-ares-1.10.0-r1:=[${MULTILIB_USEDEP}] - ) - acl? ( net-fs/cifs-utils[acl] ) - netlink? ( dev-libs/libnl:3 ) - nfsv4? ( >=net-fs/nfs-utils-2.3.1-r2 ) - nls? ( >=sys-devel/gettext-0.18 ) - pac? ( - app-crypt/mit-krb5[${MULTILIB_USEDEP}] - net-fs/samba - ) - python? ( ${PYTHON_DEPS} ) - samba? ( >=net-fs/samba-4.10.2[winbind] ) - selinux? ( - >=sys-libs/libselinux-2.1.9 - >=sys-libs/libsemanage-2.1 - ) - systemd? ( - dev-libs/jansson:0= - net-libs/http-parser:0= - net-misc/curl:0= - )" -RDEPEND="${DEPEND} - >=sys-libs/glibc-2.17[nscd] - selinux? ( >=sec-policy/selinux-sssd-2.20120725-r9 )" -BDEPEND=">=sys-devel/autoconf-2.69-r5 - virtual/pkgconfig - doc? ( app-doc/doxygen ) - test? ( - dev-libs/check - dev-libs/softhsm:2 - dev-util/cmocka - net-libs/gnutls[pkcs11,tools] - sys-libs/libfaketime - sys-libs/nss_wrapper - sys-libs/pam_wrapper - sys-libs/uid_wrapper - valgrind? ( dev-util/valgrind ) - ) - man? ( - app-text/docbook-xml-dtd:4.4 - >=dev-libs/libxslt-1.1.26 - nls? ( app-text/po4a ) - )" - -CONFIG_CHECK="~KEYS" - -MULTILIB_WRAPPED_HEADERS=( - /usr/include/ipa_hbac.h - /usr/include/sss_idmap.h - /usr/include/sss_nss_idmap.h - # --with-ifp - /usr/include/sss_sifp.h - /usr/include/sss_sifp_dbus.h - # from 1.15.3 - /usr/include/sss_certmap.h -) - -PATCHES=( - "${FILESDIR}"/${P}-test_ca-Look-for-libsofthsm2.so-in-usr-libdir-sofths.patch -) - -pkg_setup() { - linux-info_pkg_setup -} - -src_prepare() { - sed -i 's:/var/run:/run:' \ - "${S}"/src/examples/logrotate || die - - default - eautoreconf - multilib_copy_sources - if use python && multilib_is_native_abi; then - python_setup - fi -} - -src_configure() { - local native_dbus_cflags=$($(tc-getPKG_CONFIG) --cflags dbus-1) - - multilib-minimal_src_configure -} - -multilib_src_configure() { - local myconf=() - - myconf+=( - --localstatedir="${EPREFIX}"/var - --runstatedir="${EPREFIX}"/run - --with-pid-path="${EPREFIX}"/run - --with-plugin-path="${EPREFIX}"/usr/$(get_libdir)/sssd - --enable-pammoddir="${EPREFIX}"/$(getpam_mod_dir) - --with-ldb-lib-dir="${EPREFIX}"/usr/$(get_libdir)/samba/ldb - --with-db-path="${EPREFIX}"/var/lib/sss/db - --with-gpo-cache-path="${EPREFIX}"/var/lib/sss/gpo_cache - --with-pubconf-path="${EPREFIX}"/var/lib/sss/pubconf - --with-pipe-path="${EPREFIX}"/var/lib/sss/pipes - --with-mcache-path="${EPREFIX}"/var/lib/sss/mc - --with-secrets-db-path="${EPREFIX}"/var/lib/sss/secrets - --with-log-path="${EPREFIX}"/var/log/sssd - --with-os=gentoo - --with-nscd="${EPREFIX}"/usr/sbin/nscd - --with-unicode-lib="glib2" - --disable-rpath - --sbindir=/usr/sbin - --with-crypto="libcrypto" - --enable-local-provider - $(multilib_native_use_with systemd kcm) - $(multilib_native_use_with systemd secrets) - $(use_with samba) - --with-smb-idmap-interface-version=6 - $(multilib_native_use_enable acl cifs-idmap-plugin) - $(multilib_native_use_with selinux) - $(multilib_native_use_with selinux semanage) - $(use_enable locator krb5-locator-plugin) - $(use_enable pac pac-responder) - $(multilib_native_use_with nfsv4 nfsv4-idmapd-plugin) - $(use_enable nls) - $(multilib_native_use_with netlink libnl) - $(multilib_native_use_with man manpages) - $(multilib_native_use_with sudo) - $(multilib_native_with autofs) - $(multilib_native_with ssh) - $(use_enable valgrind) - --without-python2-bindings - $(multilib_native_use_with python python3-bindings) - ) - - # Annoyingly configure requires that you pick systemd XOR sysv - if use systemd; then - myconf+=( - --with-initscript="systemd" - --with-systemdunitdir=$(systemd_get_systemunitdir) - ) - else - myconf+=(--with-initscript="sysv") - fi - - if ! multilib_is_native_abi; then - # work-around all the libraries that are used for CLI and server - myconf+=( - {POPT,TALLOC,TDB,TEVENT,LDB}_{CFLAGS,LIBS}=' ' - # ldb headers are fine since native needs it - # ldb lib fails... but it does not seem to bother - {DHASH,COLLECTION,INI_CONFIG_V{0,1,1_1,1_3}}_{CFLAGS,LIBS}=' ' - {PCRE,CARES,SYSTEMD_LOGIN,SASL,GLIB2,DBUS,CRYPTO,P11_KIT}_{CFLAGS,LIBS}=' ' - {NDR_NBT,SMBCLIENT,NDR_KRB5PAC}_{CFLAGS,LIBS}=' ' - - # use native include path for dbus (needed for build) - DBUS_CFLAGS="${native_dbus_cflags}" - - # non-pkgconfig checks - ac_cv_lib_ldap_ldap_search=yes - --without-secrets - --without-kcm - ) - fi - - econf "${myconf[@]}" -} - -multilib_src_compile() { - if multilib_is_native_abi; then - default - use doc && emake docs - if use man || use nls; then - emake update-po - fi - else - emake libnss_sss.la pam_sss.la - use locator && emake sssd_krb5_locator_plugin.la - use pac && emake sssd_pac_plugin.la - fi -} - -multilib_src_install() { - if multilib_is_native_abi; then - emake -j1 DESTDIR="${D}" "${_at_args[@]}" install - if use python; then - python_optimize - python_fix_shebang "${ED}" - fi - - else - # easier than playing with automake... - dopammod .libs/pam_sss.so - - into / - dolib.so .libs/libnss_sss.so* - - if use locator; then - exeinto /usr/$(get_libdir)/krb5/plugins/libkrb5 - doexe .libs/sssd_krb5_locator_plugin.so - fi - - if use pac; then - exeinto /usr/$(get_libdir)/krb5/plugins/authdata - doexe .libs/sssd_pac_plugin.so - fi - fi -} - -multilib_src_install_all() { - einstalldocs - find "${ED}" -type f -name '*.la' -delete || die - - insinto /etc/sssd - insopts -m600 - doins "${S}"/src/examples/sssd-example.conf - - insinto /etc/logrotate.d - insopts -m644 - newins "${S}"/src/examples/logrotate sssd - - newconfd "${FILESDIR}"/sssd.conf sssd - - keepdir /var/lib/sss/db - keepdir /var/lib/sss/deskprofile - keepdir /var/lib/sss/gpo_cache - keepdir /var/lib/sss/keytabs - keepdir /var/lib/sss/mc - keepdir /var/lib/sss/pipes/private - keepdir /var/lib/sss/pubconf/krb5.include.d - keepdir /var/lib/sss/secrets - keepdir /var/log/sssd - - # strip empty dirs - if ! use doc ; then - rm -r "${ED}"/usr/share/doc/"${PF}"/doc || die - rm -r "${ED}"/usr/share/doc/"${PF}"/{hbac,idmap,nss_idmap,sss_simpleifp}_doc || die - fi - - rm -r "${ED}"/run || die -} - -multilib_src_test() { - multilib_is_native_abi && emake check -} - -pkg_postinst() { - elog "You must set up sssd.conf (default installed into /etc/sssd)" - elog "and (optionally) configuration in /etc/pam.d in order to use SSSD" - elog "features. Please see howto in https://sssd.io/docs/design_pages/smartcard_authentication_require.html" -} diff --git a/sys-auth/ykpers/Manifest b/sys-auth/ykpers/Manifest index 1d32da30a705..f128787ab0df 100644 --- a/sys-auth/ykpers/Manifest +++ b/sys-auth/ykpers/Manifest @@ -1,5 +1,6 @@ AUX ykpers-1.20.0-fix-gcc10-fno-common.patch 308 BLAKE2B 720da4ac3f20c4512987b47068d7589ac70db0450306ddd16aec8ce5dde2e36e0d58c6ca0e7ffa5765b9b7a85b53a120078a117782ac6e8bf76066db52dd78ca SHA512 762bea78a6c6c2e43221374c6baf20828741e01532fd2bdc420ab197e96bcbc0eb6a1b157971ac58da7e1a7d8b4717cd1a1be84af23b473f51adfe4af57d1f4b AUX ykpers-1.20.0-json-boolean.patch 3572 BLAKE2B 684b9dab508b8d100d4e9237d833cb9160c33314a4076476b9342858844627acccc8f7025da0f22524251ca4541feceededd0f663e03810e53935ea809d1e556 SHA512 a8bc7ae71d0a05476688abfaea070ca7dc2eaa68e033524d4a1b2b6240eec2932d867e9eeaa248874a04f254618cd79bf9ebaa17421938b0c2e62502bf90c055 DIST ykpers-1.20.0.tar.gz 127975 BLAKE2B 8753332be4df3eeb6ef0489782037fca12883a263d5697cfaee901763e4698ca5415953da1c2f8b3512de041c1e78735c03a5e6ea2101c71ada36d4e6d5d3d2d SHA512 a38b26700793f0a801e5f5889bbbce4a3f728d22aaecf8d0890f1b5135e67bed16a78b7a36dbc323c5d296901f6dd420fa658a982492a0cd9f0bbf95a5fbc823 +EBUILD ykpers-1.20.0-r1.ebuild 1119 BLAKE2B 5dadf0ea3e1bd57f612f42ad997d4bdecb83b7b7e40d528f043fa70657c825119283204c501e44e95b0858ea66995e93273743d430b7eb302155693d0db6a767 SHA512 2df94918cd2d68db45662625e21131225070700e1eba860c94b60ff423dfdbfc546326c362775f142c49a7c424f1aab1c36daa000997beb0039b7b8631597967 EBUILD ykpers-1.20.0.ebuild 1096 BLAKE2B 88adc37fd2dcd2e783a656e1e6ad15d0fb3aae9d15f72f3ba03cd8fbe1103f1b1b2505ef3b9fe135aabf8d9ed5fa2b0dfe4596a03b493cfb97df5529e43668c9 SHA512 1e66409f3fb4d9fdebe9ae8872f9e56fd4e64d2f40473f0a996755d949ee025249ca667f3eb006ea24d907532baea4c767b5c0e596ae0df4e36b208af08e2702 MISC metadata.xml 419 BLAKE2B b4788083b4ed4628976fedb8c9ffb419e90f32eed892f4e360582ceade32353171364874f6dcc3f6b858a2df7e3c5b05675973a216b0338bea431ac999e55b20 SHA512 dd7fe5d412333da982aa9f9ae51e4d0d1d86ce527a8306c62b5a3c68a7f09958d53ce9f9aad64c564ac8b2df7118a917d1dc644f4a96f500c409f84cb0fa8c0d diff --git a/sys-auth/ykpers/ykpers-1.20.0-r1.ebuild b/sys-auth/ykpers/ykpers-1.20.0-r1.ebuild new file mode 100644 index 000000000000..839ecf070e7e --- /dev/null +++ b/sys-auth/ykpers/ykpers-1.20.0-r1.ebuild @@ -0,0 +1,61 @@ +# Copyright 1999-2022 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=8 + +inherit autotools udev + +MY_PN="yubikey-personalization" + +DESCRIPTION="Library and tool for personalization of Yubico's YubiKey" +HOMEPAGE="https://github.com/Yubico/yubikey-personalization" +SRC_URI="https://github.com/Yubico/${MY_PN}/archive/refs/tags/v${PV}.tar.gz -> ${P}.tar.gz" + +LICENSE="BSD-2" +SLOT="0" +KEYWORDS="~amd64 ~arm64 ~ppc64 ~riscv ~x86" + +RDEPEND="dev-libs/json-c:= + >=sys-auth/libyubikey-1.6 + virtual/libusb:1" +DEPEND="${RDEPEND}" +BDEPEND="app-text/asciidoc + virtual/pkgconfig" + +PATCHES=( + "${FILESDIR}"/${PN}-1.20.0-fix-gcc10-fno-common.patch + "${FILESDIR}"/${PN}-1.20.0-json-boolean.patch +) + +DOCS=( doc/. AUTHORS NEWS README ) + +S="${WORKDIR}/${MY_PN}-${PV}" + +src_prepare() { + default + eautoreconf +} + +src_configure() { + local myeconfargs=( + --libdir=/usr/$(get_libdir) + --localstatedir=/var + ) + econf "${myeconfargs[@]}" +} + +src_install() { + default + + udev_dorules 69-yubikey.rules + + find "${D}" -name '*.la' -delete || die +} + +pkg_postinst() { + udev_reload +} + +pkg_postrm() { + udev_reload +} -- cgit v1.2.3