From 6f429d833b6078a3fe9ba7f381d26d5b903477b8 Mon Sep 17 00:00:00 2001 From: Samuli Suominen Date: Tue, 1 Feb 2011 18:03:13 +0000 Subject: punt policykit, but leave the mask message in place for now --- sys-auth/policykit/ChangeLog | 115 ------------ sys-auth/policykit/Manifest | 10 - sys-auth/policykit/files/PolicyKit.conf | 13 -- .../files/policykit-0.7-completions.patch | 203 --------------------- .../files/policykit-0.9-consolekit03.patch | 86 --------- .../policykit/files/policykit-0.9-dbus-auth.patch | 13 -- .../files/policykit-0.9-pam-headers.patch | 17 -- .../policykit/files/policykit-0.9-pk-debug.patch | 17 -- sys-auth/policykit/metadata.xml | 10 - sys-auth/policykit/policykit-0.9-r1.ebuild | 129 ------------- 10 files changed, 613 deletions(-) delete mode 100644 sys-auth/policykit/ChangeLog delete mode 100644 sys-auth/policykit/Manifest delete mode 100644 sys-auth/policykit/files/PolicyKit.conf delete mode 100644 sys-auth/policykit/files/policykit-0.7-completions.patch delete mode 100644 sys-auth/policykit/files/policykit-0.9-consolekit03.patch delete mode 100644 sys-auth/policykit/files/policykit-0.9-dbus-auth.patch delete mode 100644 sys-auth/policykit/files/policykit-0.9-pam-headers.patch delete mode 100644 sys-auth/policykit/files/policykit-0.9-pk-debug.patch delete mode 100644 sys-auth/policykit/metadata.xml delete mode 100644 sys-auth/policykit/policykit-0.9-r1.ebuild (limited to 'sys-auth') diff --git a/sys-auth/policykit/ChangeLog b/sys-auth/policykit/ChangeLog deleted file mode 100644 index 31ca0673eedc..000000000000 --- a/sys-auth/policykit/ChangeLog +++ /dev/null @@ -1,115 +0,0 @@ -# ChangeLog for sys-auth/policykit -# Copyright 1999-2009 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/sys-auth/policykit/ChangeLog,v 1.31 2009/11/29 19:38:47 armin76 Exp $ - - 29 Nov 2009; Raúl Porcel policykit-0.9-r1.ebuild: - sparc stable - - 29 Nov 2009; Raúl Porcel policykit-0.9-r1.ebuild: - Add ~sparc - - 28 Oct 2009; Raúl Porcel policykit-0.9-r1.ebuild: - ia64/s390/sh/sparc stable wrt #278181 - - 03 Oct 2009; Markus Meier policykit-0.9-r1.ebuild: - arm stable, bug #278181 - - 29 Sep 2009; Tobias Klausmann - policykit-0.9-r1.ebuild: - Stable on alpha, bug #278181 - - 27 Sep 2009; nixnut policykit-0.9-r1.ebuild: - ppc stable #278181 - - 22 Sep 2009; Jeroen Roovers policykit-0.9-r1.ebuild: - Stable for HPPA (bug #278181). - - 19 Sep 2009; Romain Perier - policykit-0.9-r1.ebuild: - Stable for amd64 per bug #278181. - - 16 Sep 2009; Christian Faulhammer - policykit-0.9-r1.ebuild: - stable x86, bug 278181 - - 14 Sep 2009; Tom Gall policykit-0.9-r1.ebuild: - stable on ppc64, bug #?????? - - 13 Sep 2009; Nirbheek Chauhan - -policykit-0.92.ebuild, -files/policykit-0.92-as-needed.patch, - -files/policykit-0.92-zsh-completions.patch: - Remove 0.92 -- horribly broken, people have it unmasked by mistake and it - breaks setups for them -- bug 284796 - - 29 Aug 2009; William Hubbs metadata.xml: - Removed zsh-completion use flag from metadata since it is global. - - 08 Aug 2009; Daniel Gryniewicz policykit-0.9-r1.ebuild: - Restrict parallel on install. bug #280829 - - 06 Jul 2009; Alexey Shvetsov policykit-0.9-r1.ebuild, - policykit-0.92.ebuild: - Add ~mips keyword - - 02 Jul 2009; Alexis Ballier policykit-0.9-r1.ebuild: - keyword ~x86-fbsd, bug #266560 - -*policykit-0.92 (20 Jun 2009) - - 20 Jun 2009; +policykit-0.92.ebuild, - +files/policykit-0.92-as-needed.patch, - +files/policykit-0.92-zsh-completions.patch: - Version bump to 0.92, bug #274411 - -*policykit-0.9-r1 (25 Apr 2009) - - 25 Apr 2009; Daniel Gryniewicz - +files/policykit-0.9-dbus-auth.patch, +policykit-0.9-r1.ebuild: - Fix policykit with new deny default in dbus - - 23 Apr 2009; Raúl Porcel policykit-0.9.ebuild: - Add ~arm/~s390/~sh - - 19 Apr 2009; Brent Baude policykit-0.9.ebuild: - Marking policykit-0.9 ~ppc for bug 266560 - - 17 Apr 2009; Daniel Gryniewicz metadata.xml: - Take ownership - - 19 Jan 2009; Gilles Dartiguelongue -policykit-0.6.ebuild: - Kill old revision. - - 15 Jan 2009; Peter Alfredsen metadata.xml: - Compnerd retired. - - 13 Jan 2009; Doug Goldstein metadata.xml: - gentopia is becoming freedesktop - - 14 Dec 2008; Gilles Dartiguelongue +files/PolicyKit.conf, - policykit-0.9.ebuild: - Add missing file, bug #250856. - -*policykit-0.9 (01 Dec 2008) - - 01 Dec 2008; Gilles Dartiguelongue - +files/policykit-0.7-completions.patch, - +files/policykit-0.9-consolekit03.patch, - +files/policykit-0.9-pam-headers.patch, - +files/policykit-0.9-pk-debug.patch, +policykit-0.9.ebuild: - Bump to 0.9. Fix bug #214801. - - 25 Jan 2008; Markus Rothe policykit-0.6.ebuild: - Added ~ppc64; bug #200076 - - 29 Dec 2007; Raúl Porcel policykit-0.6.ebuild: - Add ~alpha/~ia64/~sparc wrt #200076 - - 22 Dec 2007; Jeroen Roovers policykit-0.6.ebuild: - Marked ~hppa (bug #200076). - -*policykit-0.6 (23 Nov 2007) - - 23 Nov 2007; Saleem Abdulrasool +metadata.xml, - +policykit-0.6.ebuild: - Initial import of policykit for HAL 0.5.10 - diff --git a/sys-auth/policykit/Manifest b/sys-auth/policykit/Manifest deleted file mode 100644 index 2594b5a4c457..000000000000 --- a/sys-auth/policykit/Manifest +++ /dev/null @@ -1,10 +0,0 @@ -AUX PolicyKit.conf 391 RMD160 a9dbec3e7b2e3ef56d281d888ffaff68b3d62637 SHA1 c79e0f782f703a7091ce6ade5b5b504d33011392 SHA256 b17726dc415f022d21542ede6dd8bf45ffd4d1738da55f966b80b49d6be42ffd -AUX policykit-0.7-completions.patch 6701 RMD160 5ee4775762a4f8f40404bf5c31b1ccd59ff700a4 SHA1 7704fc1eff5480bd4bddbd1fadfd3fbf39edde77 SHA256 8714537248aad1982e555cf2af046a371c24fab5f8b686e94082cb3246c4a635 -AUX policykit-0.9-consolekit03.patch 4909 RMD160 20a68bd00af9d046e7daedfb20f7011b38c2c26e SHA1 cfba9d4fb2a18b711dd4133654ad9a2faba27c12 SHA256 34e57a4dd727a2bbb2039ffffc68e53aafbcd4fbad225abe16ea05c4f3360e51 -AUX policykit-0.9-dbus-auth.patch 654 RMD160 11fb39d2b44ff7bdd5e7f60b0ac86c5f2a412a33 SHA1 a0b7d1ebbc0f269facab712978eaeed6a1bc8617 SHA256 ee4c0ba3fd4928ef1867bdce0415e72db37092a2e6d58e2544a437c70289552e -AUX policykit-0.9-pam-headers.patch 548 RMD160 3260cd387dce7020c2f5dc19d0d1758ab55c339d SHA1 71beb07493c4fa27373c40e585e49e1ac00e51e2 SHA256 9aa6fd30e8fbd900cb06b0e90a6e91f986cb81c1963c990cc8a0b5504be3be64 -AUX policykit-0.9-pk-debug.patch 640 RMD160 377b5f0040fa91d269b2c51b68a1bd259974fd0b SHA1 2477f6381e186305d40ff867da3862b90573dd67 SHA256 a950edff87e6580c5c6052bbda5004d9f17f1e38172a88d5c799b576e8e1d79a -DIST PolicyKit-0.9.tar.gz 1254318 RMD160 197262d1c48e55558dd4bd57d7bbd8734666129c SHA1 ac99c580eff72f6d5df261c155fb047306439f85 SHA256 f40c7c6bec19d7dba2335bddcffd0457494409a0dfce11d888c748dc892e80b7 -EBUILD policykit-0.9-r1.ebuild 3593 RMD160 40e1db1597272fb562e08e4ab4b187c933429ddf SHA1 d6f9c9b312b41bc9515666a4b3f065647c9edaf3 SHA256 b8b6518b500b2fd11a6eaba4c5ae3b5ef6ef0c30347f6890606d28e0a010c56c -MISC ChangeLog 3917 RMD160 f2a0a6eeb28d219b3208914bc90d89c3be402db4 SHA1 0cfbc1e4455ec7038841d6ac23826ea2cb498a46 SHA256 b773b5eee4a3f5e4a6f7d956a4a513f798d95aff344d0dcf4ad5bb823ddb2e2b -MISC metadata.xml 261 RMD160 44b2badfb605371619668f04cb65397c422de35d SHA1 3ee0ecb7337d57d005414d56eac711977b50b0b0 SHA256 6348aa264130f415a7050a8970f853a347bb35b06b0f198faeb28e70c5e46a39 diff --git a/sys-auth/policykit/files/PolicyKit.conf b/sys-auth/policykit/files/PolicyKit.conf deleted file mode 100644 index 687ce97c7c2f..000000000000 --- a/sys-auth/policykit/files/PolicyKit.conf +++ /dev/null @@ -1,13 +0,0 @@ - - - - - - - - - - - - diff --git a/sys-auth/policykit/files/policykit-0.7-completions.patch b/sys-auth/policykit/files/policykit-0.7-completions.patch deleted file mode 100644 index 37f8d0d1e803..000000000000 --- a/sys-auth/policykit/files/policykit-0.7-completions.patch +++ /dev/null @@ -1,203 +0,0 @@ -commit afb4535accaa08e20050a7b2d508d884b02f45a0 -Author: Saleem Abdulrasool -Date: Mon Nov 19 15:35:03 2007 -0800 - - add zsh completion and optionalize bash and zsh completion - - Signed-off-by: Saleem Abdulrasool - -diff --git a/configure.in b/configure.in -index 2fdb935..a9ea35a 100644 ---- a/configure.in -+++ b/configure.in -@@ -495,6 +495,21 @@ AC_DEFINE_UNQUOTED(PAM_FILE_INCLUDE_PASSWORD, "$PAM_FILE_INCLUDE_PASSWORD", [pam - AC_DEFINE_UNQUOTED(PAM_FILE_INCLUDE_SESSION, "$PAM_FILE_INCLUDE_SESSION", [pam file session]) - - # ******************** -+# Shell Completion -+# ******************** -+ -+AC_ARG_WITH([bash-completion], -+ AC_HELP_STRING([--with-bash-completion],[Install bash completion scripts]),, -+ [with_bash_completion=yes]) -+ -+AC_ARG_WITH([zsh-completion], -+ AC_HELP_STRING([--with-zsh-completion],[Install zsh completion scripts]),, -+ [with_zsh_completion=no]) -+ -+AM_CONDITIONAL([WITH_BASH_COMPLETION], test x"$with_bash_completion" != x"no") -+AM_CONDITIONAL([WITH_ZSH_COMPLETION], test x"$with_zsh_completion" != x"no") -+ -+# ******************** - # Internationalisation - # ******************** - -diff --git a/tools/Makefile.am b/tools/Makefile.am -index a76e9fc..0449e12 100644 ---- a/tools/Makefile.am -+++ b/tools/Makefile.am -@@ -25,10 +25,17 @@ polkit_auth_LDADD = @GLIB_LIBS@ @DBUS_LIBS@ $(top_builddir)/src/polkit/libpolkit - polkit_action_SOURCES = polkit-action.c - polkit_action_LDADD = $(top_builddir)/src/polkit/libpolkit.la - -+if WITH_BASH_COMPLETION - profiledir = $(sysconfdir)/profile.d - profile_SCRIPTS = polkit-bash-completion.sh -+endif - --EXTRA_DIST = $(profile_SCRIPTS) -+if WITH_ZSH_COMPLETION -+zshcompletiondir = $(DESTDIR)$(datadir)/zsh/site-functions -+zshcompletion_SCRIPTS = _polkit _polkit_auth _polkit_action -+endif -+ -+EXTRA_DIST = polkit-bash-completion.sh _polkit _polkit_auth _polkit_action - - clean-local : - rm -f *~ polkit-reload-config -diff --git a/tools/_polkit b/tools/_polkit -new file mode 100644 -index 0000000..bc7bdac ---- /dev/null -+++ b/tools/_polkit -@@ -0,0 +1,54 @@ -+#autoload -+ -+# vim: set et sw=3 sts=3 ts=3 ft=zsh: -+# ZSH Completion for polkit-auth -+# Written by Saleem Abdulrasool -+# Usage: _polkit actions|constraints|authorization|overriden-actions|obtainable-actions|authorized-actions -+ -+_polkit_actions() { -+ local actions -+ actions=( $(polkit-action) ) -+ compadd "$@" -k actions -+} -+ -+_polkit_constraints() { -+ local constraints -+ constraints=( local active local+active ) -+ compadd "$@" -k constraints -+} -+ -+_polkit_authorization() { -+ local authorization -+ authorization=( no auth_admin_one_shot auth_admin auth_admin_keep_session auth_admin_keep_always auth_self_one_shot auth_self auth_self_keep_session auth_self_keep_always yes ) -+ compadd "$@" -k authorization -+} -+ -+_polkit_overriden_actions() { -+ local overrides -+ overrides=( $(polkit-action --show-overrides) ) -+ compadd "$@" -k overrides -+} -+ -+_polkit_obtainable_actions() { -+ local actions -+ actions=( $(polkit-auth --show-obtainable) ) -+ compadd "$@" -k actions -+} -+ -+_polkit_authorized_actions() { -+ local actions -+ actions=( $(polkit-auth --explicit) ) -+ compadd "$@" -k actions -+} -+ -+_polkit() { -+ local command="$argv[$#]" -+ -+ [[ "$command" == (actions|constraints|authorization|overriden-actions|obtainable-actions|authorized-actions) ]] || { -+ _message "unknown command: $command" -+ } -+ -+ _polkit_${command/-/_} -+} -+ -+_polkit "$@" -diff --git a/tools/_polkit_action b/tools/_polkit_action -new file mode 100644 -index 0000000..7ec7365 ---- /dev/null -+++ b/tools/_polkit_action -@@ -0,0 +1,24 @@ -+#compdef polkit-action -+ -+# vim: set et sw=3 sts=3 ts=3 ft=zsh: -+# ZSH Completion for polkit-action -+# Written by Saleem Abdulrasool -+ -+_polkit_action() { -+ local arguments -+ -+ arguments=( -+ "(-)--action[Show detailed information about a specific action]:action:_polkit actions" -+ "(-)--reset-defaults[Reset the defaults for the specified action]:Overridden Action:_polkit overriden-actions" -+ "(-)--show-overrides[List actions where the defaults are overridden]" -+ "(-)--set-defaults-any[Override the any stanza for an action]:Action:_polkit _actions:Authorization:_polkit authorization" -+ "(-)--set-defaults-inactive[Override the inactive stanza for an action]:Action:polkit _actions:Authorization:_polkit authorization" -+ "(-)--set-defaults-active[Override the active stanza for an action]:Action:polkit _actions:Authorization:_polkit authorization" -+ "(-)--version[Display program version]" -+ "(-)--help[Display program help]" -+ ) -+ -+ _arguments $arguments -+} -+ -+_polkit_action "$@" -diff --git a/tools/_polkit_auth b/tools/_polkit_auth -new file mode 100644 -index 0000000..e70f1a0 ---- /dev/null -+++ b/tools/_polkit_auth -@@ -0,0 +1,50 @@ -+#compdef polkit-auth -+ -+# vim: set et sw=3 sts=3 ts=3 ft=zsh: -+# ZSH Completion for polkit-auth -+# Written by Saleem Abdulrasool -+ -+_polkit_auth() { -+ local arguments action_arguments user_arguments grant_arguments -+ local commands actions grant=0 -+ -+ commands=( --show-obtainable --version --help ) -+ actions=( --obtain --explicit --explicit-detail --grant --revoke ) -+ -+ for (( i = 0 ; i < ${#words[@]} ; i++ )) ; do -+ if [[ "${words[$i]##--#}" == "grant" ]] ; then -+ grant=1 -+ break -+ fi -+ done -+ -+ arguments=( -+ '(-)--show-obtainable[Show all actions that can be obtained via authentication]' -+ '(-)--version[Show version and exit]' -+ '(-)--help[Show help information]' -+ ) -+ -+ action_arguments=( -+ "($commands $actions)--obtain[Attempt to obtain authorization to do an action]:Obtainable Actions:_polkit obtainable-actions" -+ "($commands $actions)--explicit[Show explicit authorizations]" -+ "($commands $actions)--explicit-detail[Show detailed information about explicit authorizations]" -+ "($commands $actions)--grant[Grant an authorization for an action]:Obtainable Actions:_polkit actions" -+ "($commands $actions)--revoke[Revoke all authorization for an action]:Authorized Actions:_polkit authorized-actions" -+ ) -+ -+ user_arguments=( -+ "($commands)--user[The user the authorization applies to]:User:_users" -+ ) -+ -+ grant_arguments=( -+ "($commands)--constraint[Optional constraints on the granted authorization]:Constraint:_polkit constraints" -+ ) -+ -+ if [[ grant -eq 1 ]] ; then -+ _arguments $arguments $user_arguments $action_arguments $grant_arguments -+ else -+ _arguments $arguments $user_arguments $action_arguments -+ fi -+} -+ -+_polkit_auth "$@" diff --git a/sys-auth/policykit/files/policykit-0.9-consolekit03.patch b/sys-auth/policykit/files/policykit-0.9-consolekit03.patch deleted file mode 100644 index fe0abd8d6aed..000000000000 --- a/sys-auth/policykit/files/policykit-0.9-consolekit03.patch +++ /dev/null @@ -1,86 +0,0 @@ -# Description: Make PolicyKit work with ConsoleKit 0.3 API as well -# Ubuntu: https://bugs.launchpad.net/273711 -# Upstream: http://cvs.fedoraproject.org/viewvc/rpms/PolicyKit/devel/pk-ck-api-change.patch?view=markup ---- policykit-0.9/src/polkit-dbus/polkit-dbus.c 2008-05-30 23:24:44.000000000 +0200 -+++ policykit-0.9.new/src/polkit-dbus/polkit-dbus.c 2008-09-24 13:40:37.000000000 +0200 -@@ -214,11 +214,17 @@ - dbus_message_unref (reply); - goto out; - } -+ /* GetUnixUser API Changed in CK 0.3.0 */ - if (!dbus_message_get_args (reply, NULL, -- DBUS_TYPE_INT32, &uid, -+ DBUS_TYPE_UINT32, &uid, - DBUS_TYPE_INVALID)) { -- kit_warning ("Invalid GetUnixUser reply from CK"); -- goto out; -+ /* try the older API */ -+ if (!dbus_message_get_args (reply, NULL, -+ DBUS_TYPE_INT32, &uid, -+ DBUS_TYPE_INVALID)) { -+ kit_warning ("Invalid GetUnixUser reply from CK"); -+ goto out; -+ } - } - dbus_message_unref (message); - dbus_message_unref (reply); -@@ -1326,16 +1332,21 @@ - - dbus_error_init (&error); - seat_objpath = dbus_message_get_path (message); -- if (!dbus_message_get_args (message, &error, -- DBUS_TYPE_STRING, &session_objpath, -+ /* API fixed in CK 0.3 to match spec */ -+ if (!dbus_message_get_args (message, &error, -+ DBUS_TYPE_OBJECT_PATH, &session_objpath, - DBUS_TYPE_INVALID)) { -+ if (!dbus_message_get_args (message, &error, -+ DBUS_TYPE_STRING, &session_objpath, -+ DBUS_TYPE_INVALID)) { -+ -+ /* TODO: should be _pk_critical */ -+ kit_warning ("The SessionAdded signal on the org.freedesktop.ConsoleKit.Seat " -+ "interface for object %s has the wrong signature! " -+ "Your system is misconfigured.", seat_objpath); - -- /* TODO: should be _pk_critical */ -- kit_warning ("The SessionAdded signal on the org.freedesktop.ConsoleKit.Seat " -- "interface for object %s has the wrong signature! " -- "Your system is misconfigured.", seat_objpath); -- -- goto out; -+ goto out; -+ } - } - - /* TODO: add to sessions - see polkit_tracker_is_authorization_relevant() */ -@@ -1353,16 +1364,21 @@ - - dbus_error_init (&error); - seat_objpath = dbus_message_get_path (message); -- if (!dbus_message_get_args (message, &error, -- DBUS_TYPE_STRING, &session_objpath, -+ /* API fixed in CK 0.3 to match spec */ -+ if (!dbus_message_get_args (message, &error, -+ DBUS_TYPE_OBJECT_PATH, &session_objpath, - DBUS_TYPE_INVALID)) { -+ if (!dbus_message_get_args (message, &error, -+ DBUS_TYPE_STRING, &session_objpath, -+ DBUS_TYPE_INVALID)) { -+ -+ /* TODO: should be _pk_critical */ -+ kit_warning ("The SessionRemoved signal on the org.freedesktop.ConsoleKit.Seat " -+ "interface for object %s has the wrong signature! " -+ "Your system is misconfigured.", seat_objpath); - -- /* TODO: should be _pk_critical */ -- kit_warning ("The SessionRemoved signal on the org.freedesktop.ConsoleKit.Seat " -- "interface for object %s has the wrong signature! " -- "Your system is misconfigured.", seat_objpath); -- -- goto out; -+ goto out; -+ } - } - - _remove_caller_by_session (pk_tracker, session_objpath); diff --git a/sys-auth/policykit/files/policykit-0.9-dbus-auth.patch b/sys-auth/policykit/files/policykit-0.9-dbus-auth.patch deleted file mode 100644 index 16d1f523c5d5..000000000000 --- a/sys-auth/policykit/files/policykit-0.9-dbus-auth.patch +++ /dev/null @@ -1,13 +0,0 @@ -diff --exclude-from=/home/dang/.scripts/diffrc -up -ruN PolicyKit-0.9.orig/polkitd/org.freedesktop.PolicyKit.conf.in PolicyKit-0.9/polkitd/org.freedesktop.PolicyKit.conf.in ---- PolicyKit-0.9.orig/polkitd/org.freedesktop.PolicyKit.conf.in 2008-05-30 17:24:44.000000000 -0400 -+++ PolicyKit-0.9/polkitd/org.freedesktop.PolicyKit.conf.in 2009-04-24 22:14:57.000000000 -0400 -@@ -8,4 +8,9 @@ - - - -+ -+ -+ -+ -+ - diff --git a/sys-auth/policykit/files/policykit-0.9-pam-headers.patch b/sys-auth/policykit/files/policykit-0.9-pam-headers.patch deleted file mode 100644 index b3b8e3ca35ee..000000000000 --- a/sys-auth/policykit/files/policykit-0.9-pam-headers.patch +++ /dev/null @@ -1,17 +0,0 @@ -# Remove unwanted pam header -# -# Gentoo: https://bugs.gentoo.org/show_bug.cgi?id=239554 -# Upstream: https://bugs.freedesktop.org/show_bug.cgi?id=16131 -# -diff --git a/src/polkit-dbus/polkit-resolve-exe-helper.c b/src/polkit-dbus/polkit-resolve-exe-helper.c -index c56b2f5..5992b67 100644 ---- a/src/polkit-dbus/polkit-resolve-exe-helper.c -+++ b/src/polkit-dbus/polkit-resolve-exe-helper.c -@@ -43,7 +43,6 @@ - #ifdef HAVE_FREEBSD - #include - #endif --#include - #include - #include - #include diff --git a/sys-auth/policykit/files/policykit-0.9-pk-debug.patch b/sys-auth/policykit/files/policykit-0.9-pk-debug.patch deleted file mode 100644 index e2e247804fc7..000000000000 --- a/sys-auth/policykit/files/policykit-0.9-pk-debug.patch +++ /dev/null @@ -1,17 +0,0 @@ -# -# Fix use of undefined _pk_debug -# -# Gentoo: https://bugs.gentoo.org/show_bug.cgi?id=239573 -# Upstream: https://bugs.freedesktop.org/show_bug.cgi?id=17904 -# ---- a/src/polkit/polkit-authorization-db-dummy.c 2008-05-31 07:24:44.000000000 +1000 -+++ b/src/polkit/polkit-authorization-db-dummy.c 2008-10-05 03:54:29.000000000 +1100 -@@ -105,7 +105,7 @@ - polkit_authorization_db_debug (PolKitAuthorizationDB *authdb) - { - kit_return_if_fail (authdb != NULL); -- _pk_debug ("PolKitAuthorizationDB: refcount=%d", authdb->refcount); -+ polkit_debug ("PolKitAuthorizationDB: refcount=%d", authdb->refcount); - } - - polkit_bool_t diff --git a/sys-auth/policykit/metadata.xml b/sys-auth/policykit/metadata.xml deleted file mode 100644 index 1941eab5e745..000000000000 --- a/sys-auth/policykit/metadata.xml +++ /dev/null @@ -1,10 +0,0 @@ - - - - - dang@gentoo.org - Daniel Gryniewicz - - freedesktop - - diff --git a/sys-auth/policykit/policykit-0.9-r1.ebuild b/sys-auth/policykit/policykit-0.9-r1.ebuild deleted file mode 100644 index 17eb11b5dcc6..000000000000 --- a/sys-auth/policykit/policykit-0.9-r1.ebuild +++ /dev/null @@ -1,129 +0,0 @@ -# Copyright 1999-2009 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-auth/policykit/policykit-0.9-r1.ebuild,v 1.14 2009/11/29 19:38:47 armin76 Exp $ - -inherit autotools bash-completion eutils multilib pam - -MY_PN="PolicyKit" -MY_P="${MY_PN}-${PV}" - -DESCRIPTION="Policy framework for controlling privileges for system-wide services" -HOMEPAGE="http://hal.freedesktop.org/docs/PolicyKit" -SRC_URI="http://hal.freedesktop.org/releases/${MY_P}.tar.gz" - -LICENSE="MIT" -SLOT="0" -KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 s390 sh sparc x86 ~x86-fbsd" -IUSE="bash-completion doc pam selinux zsh-completion" - -RDEPEND=">=dev-libs/glib-2.6 - >=dev-libs/dbus-glib-0.73 - dev-libs/expat - pam? ( virtual/pam ) - selinux? ( sys-libs/libselinux )" -DEPEND="${RDEPEND} - dev-libs/libxslt - app-text/docbook-xsl-stylesheets - >=dev-util/pkgconfig-0.18 - >=dev-util/intltool-0.36 - >=dev-util/gtk-doc-am-1.10-r1 - doc? ( >=dev-util/gtk-doc-1.10 )" - -S="${WORKDIR}/${MY_P}" - -pkg_setup() { - enewgroup polkituser - enewuser polkituser -1 "-1" /dev/null polkituser -} - -src_unpack() { - unpack ${A} - cd "${S}" - - # Add zsh/bash completion - epatch "${FILESDIR}/${PN}-0.7-completions.patch" - - # Fix use of undefined _pk_debug, bug #239573 - epatch "${FILESDIR}/${P}-pk-debug.patch" - - # Fix useless pam header inclusion, bug #239554 - epatch "${FILESDIR}/${P}-pam-headers.patch" - - # Fix API change in consolekit 0.3 - epatch "${FILESDIR}/${P}-consolekit03.patch" - - # Fix dbus auth for new deny default - epatch "${FILESDIR}"/${P}-dbus-auth.patch - eautoreconf -} - -src_compile() { - local authdb= - - if use pam ; then - authdb="--with-authdb=default --with-authfw=pam --with-pam-module-dir=$(getpam_mod_dir)" - else - authdb="--with-authdb=dummy --with-authfw=none" - fi - - econf ${authdb} \ - --without-bash-completion \ - --without-zsh-completion \ - --enable-man-pages \ - --with-os-type=gentoo \ - --with-polkit-user=polkituser \ - --with-polkit-group=polkituser \ - $(use_enable doc gtk-doc) \ - $(use_enable selinux) \ - --localstatedir=/var - # won't install with tests - # $(use_enable test tests) \ - emake || die "emake failed" -} - -src_install() { - emake -j1 DESTDIR="${D}" install || die "emake install failed" - - dodoc NEWS README AUTHORS ChangeLog - - if use bash-completion; then - dobashcompletion "${S}/tools/polkit-bash-completion.sh" - fi - - if use zsh-completion ; then - insinto /usr/share/zsh/site-functions - doins "${S}/tools/_polkit" || die "zsh completion died" - doins "${S}/tools/_polkit_auth" || die "zsh completion died" - doins "${S}/tools/_polkit_action" || die "zsh completion died" - fi - - einfo "Installing basic PolicyKit.conf" - insinto /etc/PolicyKit - doins "${FILESDIR}"/PolicyKit.conf || die "doins failed" - # Need to keep a few directories around... - - diropts -m0770 -o root -g polkituser - keepdir /var/run/PolicyKit - keepdir /var/lib/PolicyKit -} - -pkg_preinst() { - # Stolen from vixie-cron ebuilds - has_version "<${CATEGORY}/${PN}-0.9" - fix_var_dir_perms=$? -} - -pkg_postinst() { - # bug #239231 - if [[ $fix_var_dir_perms = 0 ]] ; then - echo - ewarn "Previous version of PolicyKit handled /var/run and /var/lib" - ewarn "with different permissions. Proper permissions are" - ewarn "now being set on ${ROOT}var/lib/PolicyKit and ${ROOT}var/lib/PolicyKit" - ewarn "Look at these directories if you have a specific configuration" - ewarn "that needs special ownerships or permissions." - echo - chmod 0770 "${ROOT}"var/{lib,run}/PolicyKit || die "chmod failed" - chgrp -R polkituser "${ROOT}"var/{lib,run}/PolicyKit || die "chgrp failed" - fi -} -- cgit v1.2.3-65-gdbad