diff options
author | Michał Górny <mgorny@gentoo.org> | 2019-09-11 13:27:17 +0200 |
---|---|---|
committer | Michał Górny <mgorny@gentoo.org> | 2019-09-11 18:21:00 +0200 |
commit | 91f459e33251d00871cae5d14c305aace2f905ae (patch) | |
tree | 946001bff832cae4023413ae75d473cc9db4b0dd /sys-process/vixie-cron | |
parent | sys-process/rtirq: Drop old (diff) | |
download | gentoo-91f459e33251d00871cae5d14c305aace2f905ae.tar.gz gentoo-91f459e33251d00871cae5d14c305aace2f905ae.tar.bz2 gentoo-91f459e33251d00871cae5d14c305aace2f905ae.zip |
sys-process/vixie-cron: Drop old
Signed-off-by: Michał Górny <mgorny@gentoo.org>
Diffstat (limited to 'sys-process/vixie-cron')
-rw-r--r-- | sys-process/vixie-cron/files/vixie-cron-4.1-selinux-1.diff | 144 | ||||
-rw-r--r-- | sys-process/vixie-cron/vixie-cron-4.1-r14.ebuild | 126 |
2 files changed, 0 insertions, 270 deletions
diff --git a/sys-process/vixie-cron/files/vixie-cron-4.1-selinux-1.diff b/sys-process/vixie-cron/files/vixie-cron-4.1-selinux-1.diff deleted file mode 100644 index ec2493e8c3ca..000000000000 --- a/sys-process/vixie-cron/files/vixie-cron-4.1-selinux-1.diff +++ /dev/null @@ -1,144 +0,0 @@ -diff -purN vixie-cron-4.1.orig/Makefile vixie-cron-4.1/Makefile ---- vixie-cron-4.1.orig/Makefile 2004-08-27 14:09:33.000000000 -0400 -+++ vixie-cron-4.1/Makefile 2008-08-25 15:17:20.062720415 -0400 -@@ -68,7 +68,8 @@ LINTFLAGS = -hbxa $(INCLUDE) $(DEBUGGING - #<<want to use a nonstandard CC?>> - CC = gcc -Wall -Wno-unused -Wno-comment - #<<manifest defines>> --DEFS = -+DEFS = -s -DWITH_SELINUX -+LIBS += -lselinux - #(SGI IRIX systems need this) - #DEFS = -D_BSD_SIGNALS -Dconst= - #<<the name of the BSD-like install program>> -diff -purN vixie-cron-4.1.orig/database.c vixie-cron-4.1/database.c ---- vixie-cron-4.1.orig/database.c 2004-08-27 14:09:34.000000000 -0400 -+++ vixie-cron-4.1/database.c 2008-08-27 08:19:37.948930858 -0400 -@@ -28,6 +28,16 @@ static char rcsid[] = "# $Id$ - - #include "cron.h" - -+#ifdef WITH_SELINUX -+#include <selinux/selinux.h> -+#include <selinux/flask.h> -+#include <selinux/av_permissions.h> -+#include <selinux/get_context_list.h> -+#define SYSUSERNAME "system_u" -+#else -+#define SYSUSERNAME "*system*" -+#endif -+ - #define TMAX(a,b) ((a)>(b)?(a):(b)) - - static void process_crontab(const char *, const char *, -@@ -183,7 +193,7 @@ process_crontab(const char *uname, const - if (fname == NULL) { - /* must be set to something for logging purposes. - */ -- fname = "*system*"; -+ fname = SYSUSERNAME; - } else if ((pw = getpwnam(uname)) == NULL) { - /* file doesn't have a user in passwd file. - */ -@@ -245,6 +255,56 @@ process_crontab(const char *uname, const - free_user(u); - log_it(fname, getpid(), "RELOAD", tabname); - } -+#ifdef WITH_SELINUX -+ if (is_selinux_enabled()) { -+ security_context_t file_context=NULL; -+ security_context_t user_context=NULL; -+ struct av_decision avd; -+ int retval=0; -+ char *seuser=NULL; -+ char *level=NULL; -+ -+ if (fgetfilecon(crontab_fd, &file_context) < OK) { -+ log_it(fname, getpid(), "getfilecon FAILED", tabname); -+ goto next_crontab; -+ } -+ -+ /* -+ * Since crontab files are not directly executed, -+ * crond must ensure that the crontab file has -+ * a context that is appropriate for the context of -+ * the user cron job. It performs an entrypoint -+ * permission check for this purpose. -+ */ -+ if (getseuserbyname(fname, &seuser, &level) < 0) { -+ log_it(fname, getpid(), "NO SEUSER", tabname); -+ goto next_crontab; -+ } -+ -+ if (get_default_context_with_level(seuser, level, NULL, &user_context) < 0) { -+ log_it(fname, getpid(), "NO CONTEXT", tabname); -+ freecon(file_context); -+ free(seuser); -+ free(level); -+ goto next_crontab; -+ } -+ -+ retval = security_compute_av(user_context, -+ file_context, -+ SECCLASS_FILE, -+ FILE__ENTRYPOINT, -+ &avd); -+ freecon(user_context); -+ freecon(file_context); -+ free(seuser); -+ free(level); -+ -+ if (retval || ((FILE__ENTRYPOINT & avd.allowed) != FILE__ENTRYPOINT)) { -+ log_it(fname, getpid(), "ENTRYPOINT FAILED", tabname); -+ goto next_crontab; -+ } -+ } -+#endif - u = load_user(crontab_fd, pw, fname); - if (u != NULL) { - u->mtime = statbuf->st_mtime; -diff -purN vixie-cron-4.1.orig/do_command.c vixie-cron-4.1/do_command.c ---- vixie-cron-4.1.orig/do_command.c 2004-08-27 14:09:34.000000000 -0400 -+++ vixie-cron-4.1/do_command.c 2008-08-25 15:43:43.289174371 -0400 -@@ -25,6 +25,11 @@ static char rcsid[] = "# $Id$ - - #include "cron.h" - -+#ifdef WITH_SELINUX -+#include <selinux/selinux.h> -+#include <selinux/get_context_list.h> -+#endif -+ - static void child_process(entry *, user *); - static int safe_p(const char *, const char *); - -@@ -265,6 +270,29 @@ child_process(entry *e, user *u) { - _exit(OK_EXIT); - } - # endif /*DEBUGGING*/ -+#ifdef WITH_SELINUX -+ if (is_selinux_enabled()) { -+ char *seuser=NULL; -+ char *level=NULL; -+ security_context_t scontext; -+ -+ if (getseuserbyname(u->name, &seuser, &level) < 0) { -+ fprintf(stderr, "getseuserbyname: Could not determine seuser for user %s\n", u->name); -+ _exit(ERROR_EXIT); -+ } -+ if (get_default_context_with_level(seuser, level, NULL, &scontext) < 0) { -+ fprintf(stderr, "get_default_context_with_level: could not get security context for user %s, seuser %s\n", u->name, seuser); -+ _exit(ERROR_EXIT); -+ } -+ if (setexeccon(scontext) < 0) { -+ fprintf(stderr, "setexeccon: Could not set exec context to %s for user %s\n", scontext, u->name); -+ _exit(ERROR_EXIT); -+ } -+ free(seuser); -+ free(level); -+ freecon(scontext); -+ } -+#endif - execle(shell, shell, "-c", e->cmd, (char *)0, e->envp); - fprintf(stderr, "execl: couldn't exec `%s'\n", shell); - perror("execl"); diff --git a/sys-process/vixie-cron/vixie-cron-4.1-r14.ebuild b/sys-process/vixie-cron/vixie-cron-4.1-r14.ebuild deleted file mode 100644 index 09604bb30746..000000000000 --- a/sys-process/vixie-cron/vixie-cron-4.1-r14.ebuild +++ /dev/null @@ -1,126 +0,0 @@ -# Copyright 1999-2018 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 - -EAPI=0 - -inherit cron toolchain-funcs pam eutils flag-o-matic user systemd - -# no useful homepage, bug #65898 -HOMEPAGE="ftp://ftp.isc.org/isc/cron/" -DESCRIPTION="Paul Vixie's cron daemon, a fully featured crond implementation" - -SELINUX_PATCH="${P}-selinux-1.diff" -GENTOO_PATCH_REV="r4" - -SRC_URI="mirror://gentoo/${P}.tar.bz2 - mirror://gentoo/${P}-gentoo-${GENTOO_PATCH_REV}.patch.bz2" - -LICENSE="ISC BSD-2 BSD" -KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-fbsd ~x86-fbsd" -IUSE="selinux pam debug" - -DEPEND="selinux? ( sys-libs/libselinux ) - pam? ( virtual/pam )" - -RDEPEND="selinux? ( sys-libs/libselinux ) - pam? ( virtual/pam )" - -#vixie-cron supports /etc/crontab -CRON_SYSTEM_CRONTAB="yes" - -pkg_setup() { - enewgroup crontab -} - -src_unpack() { - unpack ${A} - cd "${S}" - - epatch "${WORKDIR}"/${P}-gentoo-${GENTOO_PATCH_REV}.patch - epatch "${FILESDIR}"/crontab.5.diff - epatch "${FILESDIR}"/${P}-commandline.patch - epatch "${FILESDIR}"/${P}-basename.diff - epatch "${FILESDIR}"/${P}-setuid_check.patch - epatch "${FILESDIR}"/${P}-hardlink.patch - epatch "${FILESDIR}"/${P}-crontabrace.patch - use pam && epatch "${FILESDIR}"/${P}-pam.patch - use selinux && epatch "${FILESDIR}"/${SELINUX_PATCH} -} - -src_compile() { - use debug && append-flags -DDEBUGGING - - sed -i -e "s:gcc \(-Wall.*\):$(tc-getCC) \1 ${CFLAGS}:" \ - -e "s:^\(LDFLAGS[ \t]\+=\).*:\1 ${LDFLAGS}:" Makefile \ - || die "sed Makefile failed" - - emake || die "emake failed" -} - -src_install() { - docrondir -m 1730 -o root -g crontab - docron - docrontab -m 2755 -o root -g crontab - - # /etc stuff - insinto /etc - newins "${FILESDIR}"/crontab-3.0.1-r4 crontab - newins "${FILESDIR}"/${P}-cron.deny cron.deny - - keepdir /etc/cron.d - newpamd "${FILESDIR}"/pamd.compatible cron - newinitd "${FILESDIR}"/vixie-cron.rc7 vixie-cron - - # doc stuff - doman crontab.1 crontab.5 cron.8 - dodoc "${FILESDIR}"/crontab - dodoc CHANGES CONVERSION FEATURES MAIL README THANKS - - systemd_dounit "${FILESDIR}/${PN}.service" -} - -pkg_preinst() { - has_version "<${CATEGORY}/${PN}-4.1-r10" - fix_spool_dir_perms=$? -} - -pkg_postinst() { - if [[ -f ${ROOT}/etc/init.d/vcron ]] - then - ewarn "Please run:" - ewarn "rc-update del vcron" - ewarn "rc-update add vixie-cron default" - fi - - # bug 71326 - if [[ -u ${ROOT}/etc/pam.d/cron ]] ; then - echo - ewarn "Warning: previous ebuilds didn't reset permissions prior" - ewarn "to installing crontab, resulting in /etc/pam.d/cron being" - ewarn "installed with the SUID and executable bits set." - ewarn - ewarn "Run the following as root to set the proper permissions:" - ewarn " chmod 0644 /etc/pam.d/cron" - echo - fi - - # bug 164466 - if [[ $fix_spool_dir_perms = 0 ]] ; then - echo - ewarn "Previous ebuilds didn't correctly set permissions on" - ewarn "the crontabs spool directory. Proper permissions are" - ewarn "now being set on ${ROOT}var/spool/cron/crontabs/" - ewarn "Look at this directory if you have a specific configuration" - ewarn "that needs special ownerships or permissions." - echo - chmod 1730 "${ROOT}/var/spool/cron/crontabs" || die "chmod failed" - chgrp -R crontab "${ROOT}/var/spool/cron/crontabs" || die "chgrp failed" - cd "${ROOT}/var/spool/cron/crontabs/" - for cronfile in * ; do - [[ ! -f $cronfile ]] || chown "$cronfile:crontab" "$cronfile" \ - || ewarn "chown failed on $cronfile, you probably have an orphan file." - done - fi - - cron_pkg_postinst -} |