blob: 1d239c2c82c1fc640e56593cadbedc9f555bd0c2 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
|
# Copyright 1999-2015 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-auth/polkit/polkit-0.112-r2.ebuild,v 1.17 2015/02/11 03:45:06 patrick Exp $
EAPI=5
inherit eutils autotools multilib pam pax-utils systemd user
DESCRIPTION="Policy framework for controlling privileges for system-wide services"
HOMEPAGE="http://www.freedesktop.org/wiki/Software/polkit"
SRC_URI="http://www.freedesktop.org/software/${PN}/releases/${P}.tar.gz"
LICENSE="LGPL-2"
SLOT="0"
KEYWORDS="amd64 arm ~mips ppc x86"
IUSE="examples gtk +introspection jit kde nls pam selinux systemd"
CDEPEND="
ia64? ( =dev-lang/spidermonkey-1.8.5*[-debug] )
hppa? ( =dev-lang/spidermonkey-1.8.5*[-debug] )
mips? ( =dev-lang/spidermonkey-1.8.5*[-debug] )
!hppa? ( !ia64? ( !mips? ( dev-lang/spidermonkey:17[-debug,jit=] ) ) )
>=dev-libs/glib-2.32
>=dev-libs/expat-2:=
introspection? ( >=dev-libs/gobject-introspection-1 )
pam? (
sys-auth/pambase
virtual/pam
)
systemd? ( sys-apps/systemd:0= )"
DEPEND="${CDEPEND}
app-text/docbook-xml-dtd:4.1.2
app-text/docbook-xsl-stylesheets
dev-libs/libxslt
dev-util/intltool
virtual/pkgconfig"
RDEPEND="${CDEPEND}
selinux? ( sec-policy/selinux-policykit )
"
PDEPEND="
gtk? ( || (
>=gnome-extra/polkit-gnome-0.105
lxde-base/lxpolkit
) )
kde? ( || (
kde-plasma/polkit-kde-agent
sys-auth/polkit-kde-agent
) )
!systemd? ( sys-auth/consolekit[policykit] )"
QA_MULTILIB_PATHS="
usr/lib/polkit-1/polkit-agent-helper-1
usr/lib/polkit-1/polkitd"
pkg_setup() {
local u=polkitd
local g=polkitd
local h=/var/lib/polkit-1
enewgroup ${g}
enewuser ${u} -1 -1 ${h} ${g}
esethome ${u} ${h}
}
src_prepare() {
sed -i -e 's|unix-group:wheel|unix-user:0|' src/polkitbackend/*-default.rules || die #401513
epatch "${FILESDIR}"/${PN}-make-netgroup-support-optional.patch
eautoreconf || die
}
src_configure() {
econf \
--localstatedir="${EPREFIX}"/var \
--disable-static \
--enable-man-pages \
--disable-gtk-doc \
$(use_enable systemd libsystemd-login) \
$(use_enable introspection) \
--disable-examples \
$(use_enable nls) \
$(if use hppa || use ia64 || use mips; then echo --with-mozjs=mozjs185; else echo --with-mozjs=mozjs-17.0; fi) \
"$(systemd_with_unitdir)" \
--with-authfw=$(usex pam pam shadow) \
$(use pam && echo --with-pam-module-dir="$(getpam_mod_dir)") \
--with-os-type=gentoo
}
src_compile() {
default
# Required for polkitd on hardened/PaX due to spidermonkey's JIT
local f='src/polkitbackend/.libs/polkitd test/polkitbackend/.libs/polkitbackendjsauthoritytest'
local m=''
# Only used when USE="jit" is enabled for 'dev-lang/spidermonkey:17' wrt #485910
has_version 'dev-lang/spidermonkey:17[jit]' && m='m'
# hppa, ia64 and mips uses spidermonkey-1.8.5 which requires different pax-mark flags
use hppa && m='mr'
use ia64 && m='mr'
use mips && m='mr'
[ -n "$m" ] && pax-mark ${m} ${f}
}
src_install() {
emake DESTDIR="${D}" install
dodoc docs/TODO HACKING NEWS README
fowners -R polkitd:root /{etc,usr/share}/polkit-1/rules.d
diropts -m0700 -o polkitd -g polkitd
keepdir /var/lib/polkit-1
if use examples; then
insinto /usr/share/doc/${PF}/examples
doins src/examples/{*.c,*.policy*}
fi
prune_libtool_files
}
pkg_postinst() {
chown -R polkitd:root "${EROOT}"/{etc,usr/share}/polkit-1/rules.d
chown -R polkitd:polkitd "${EROOT}"/var/lib/polkit-1
}
|