summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'sec-policy/selinux-base')
-rw-r--r--sec-policy/selinux-base/ChangeLog7
-rw-r--r--sec-policy/selinux-base/Manifest36
-rw-r--r--sec-policy/selinux-base/selinux-base-2.20140311-r1.ebuild161
-rw-r--r--sec-policy/selinux-base/selinux-base-2.20140311-r2.ebuild161
-rw-r--r--sec-policy/selinux-base/selinux-base-2.20140311-r3.ebuild161
-rw-r--r--sec-policy/selinux-base/selinux-base-2.20140311-r4.ebuild161
6 files changed, 20 insertions, 667 deletions
diff --git a/sec-policy/selinux-base/ChangeLog b/sec-policy/selinux-base/ChangeLog
index dc6bb3ec5925..f219a25dd8cf 100644
--- a/sec-policy/selinux-base/ChangeLog
+++ b/sec-policy/selinux-base/ChangeLog
@@ -1,6 +1,11 @@
# ChangeLog for sec-policy/selinux-base
# Copyright 1999-2014 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base/ChangeLog,v 1.63 2014/12/21 14:07:10 swift Exp $
+# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base/ChangeLog,v 1.64 2014/12/21 14:20:23 swift Exp $
+
+ 21 Dec 2014; Sven Vermeulen <swift@gentoo.org>
+ -selinux-base-2.20140311-r1.ebuild, -selinux-base-2.20140311-r2.ebuild,
+ -selinux-base-2.20140311-r3.ebuild, -selinux-base-2.20140311-r4.ebuild:
+ Remove old ebuilds
21 Dec 2014; Sven Vermeulen <swift@gentoo.org>
selinux-base-2.20141203-r1.ebuild:
diff --git a/sec-policy/selinux-base/Manifest b/sec-policy/selinux-base/Manifest
index 4324d1907924..72d758cda663 100644
--- a/sec-policy/selinux-base/Manifest
+++ b/sec-policy/selinux-base/Manifest
@@ -2,10 +2,6 @@
Hash: SHA256
AUX config 631 SHA256 891ddc7cfd577a8591d65f6cb3398863ec338209b347ce9bfc125817b841860e SHA512 f3c4fece54e5786de94fc97c8e7678f9901c6963828d28b020c423458ac258480191f216522fed7658e7ad1c94fd25557efc524a4b75ec8837116c6a14c2328a WHIRLPOOL e9fe30b0e31dfc2f5f9059f843de3562ded62be8868770663cfb0e80494be17ca1536d522e82c10aec0b083e9bda9b5326f37c60b483681bf237517646e5c18a
-DIST patchbundle-selinux-base-policy-2.20140311-r1.tar.bz2 259943 SHA256 0444ad505802b730dcc47daae8341de4f1a2f1cfebf85d90fcfe057cbc7aeb4f SHA512 d660442fdb92227a08d453a6e5678dfa63c1fe16172d05bc04ccc2a3e0860ec494a5747fa7baab794171e3bc6738b507e05b01485d3ed7e32ec2e2bd36fca5dd WHIRLPOOL 262421e7bbd1561e326f0616a36b8f3084a3bee4225526c00b1031a98dd31ca8d7266f3e696069bd8d347327ffebb86c08abe5924e4b917f9cf1128ddd74e4bc
-DIST patchbundle-selinux-base-policy-2.20140311-r2.tar.bz2 265878 SHA256 344e9c6c9f4466cbe39c067f4af902c25bb17d20431e0e19521490a92f41d80f SHA512 54b5092791038f97f7fd7dfe0d6becc3070171b2b114ecaff38c904c1392885756ce201663004bf4e6621236a77045828229fe2c5de317ba63da59786a99f312 WHIRLPOOL 27cd3eb4a15098d156af22c9f61ba02f0784a2eab49992b3a27777b5d60a76b6bc04e2cca81729176b779628886ca1ce13d89f865de3aa7380f1c9ef7682d3ce
-DIST patchbundle-selinux-base-policy-2.20140311-r3.tar.bz2 268783 SHA256 1d2f1d090a61e96ee26c63ebc0d37d1aa7f7c826b2885fd28bde2d0c81a500b0 SHA512 ef3eb5143f4343675c6e5219c6bad1b5cbc3c885088c0389974d7106e8da949843e1504edcea39888d14a20a8d6cf4032e24fa5891e7fa678abf7d9c7cef3762 WHIRLPOOL 5c875dfb043c0076bde48a2f7f1051e3475316578c46688e2e94bd79e0130bdc9cc5719e9fb2e5c3bca52e97e5d4773546cec1ae21bd0a0d37b5a57ac4adf483
-DIST patchbundle-selinux-base-policy-2.20140311-r4.tar.bz2 272598 SHA256 86c4e0aae81adf76054bbb74dd19a19022dbc2139a6adfcb3710dd679e5aecd1 SHA512 81b4ee890baf01f1b55a70f46454b3f77a7dbbcd3e860e309162389a34be056bfe82d3fb9f7b843a8476b2b1fb5919d534402c2f06eeb9390b33b3e6745ca444 WHIRLPOOL 8a4503d201d465b049757764ca0c209b03b66ba2af8cb7e979354c2d35e1c5b428d9a1876a606a765702c50bb725fe4f53a9384bbb205f9f51ca28d59aaa9416
DIST patchbundle-selinux-base-policy-2.20140311-r5.tar.bz2 274187 SHA256 5ce76d59d12a7dfc02352eb2a77971d76c5ff0fa3c66cced6318919571f04839 SHA512 7a9da3ab23ce6217739f4548cc5365f64def11fe19b6f3b2a304685bb54246d12856388043870e0f061f71fb2c8c45da72bf3db28ad6e70f397f5dfffe2206c6 WHIRLPOOL a4729aaeed88f7485fbf112de91161bf4e75fb996f5123133c22fcb008966acc7db98c7849dc4b076cb633d00c81deae85cf6b5f8c48f8c3c72c90bcaff26d71
DIST patchbundle-selinux-base-policy-2.20140311-r6.tar.bz2 281043 SHA256 7fbfb518731c6bce8a3937e7dbabeaf0d39059423f5930731034363862bf9a25 SHA512 6b8bfbb3ee9e9d229ac0fa7e80905300c24f4934fb2f150ba52f45e76a3f1e8b51c788136ea32a2b044a00c614a96538aad9d3ff7300735dae228861ab5aed6f WHIRLPOOL 9da1fb97b7a1c8f5990748695c1393d0d0c7c6bcd6acbb974653ee83df00d911b70b4f9544a9e4b3014b9f78f69745a17a5c7fa02859985b611ec4636b473981
DIST patchbundle-selinux-base-policy-2.20140311-r7.tar.bz2 285346 SHA256 8e216867cc5ec2c513ae81d04e637021b4eda9bbd0fafab0c7f61f087776c33c SHA512 01d30c38dba876136d61452a890adbbe0301fb990b65b0a15086f1c8f14df4f96faf57bee8fd1328147458e5a7e96f972792c26ef971924c0fc74cf644d4b644 WHIRLPOOL ec03df417b73d52a19809a2e7417b05b11880517e4bc5093725a8172177943f3fa526eb32222f41c3aed5ec5ba3d57fb5af2ed19a32af1c37529864d30afd68b
@@ -13,32 +9,28 @@ DIST patchbundle-selinux-base-policy-2.20141203-r1.tar.bz2 264038 SHA256 0fb0ff6
DIST patchbundle-selinux-base-policy-2.20141203-r2.tar.bz2 268395 SHA256 60f5fbb2402f12b4c4aca89b134ee0dd4c88a1812208d765b601b23e025f7cfe SHA512 0a6d7a61ae259f6b4b9210c0b509a2b25581674b0d07e0fa8f2eff151f1e8bf084cae7a8928ede6e4358da661290940b8390a2cb6f5c6ababc021de4f6b445b9 WHIRLPOOL 6341b3c04aa547256f3128826fffe777c4ac2d7f6f916d6e7a7f2e976b18a903786116743a26f43602c707310662c445564ffdaa173b2c2cd9e48f4173c367a1
DIST refpolicy-2.20140311.tar.bz2 664416 SHA256 f69437db95548c78a5dec44c236397146b144153149009ea554d2e536e5436f7 SHA512 50bacee82ed41ac8b8007ecc33bf51d22303cc2ddd27cfb72cb5520dab5f8e255186e34b89cec492c7a2d4220b200814bdede9b46c19f987a3d3d65a1c9b749a WHIRLPOOL e07480beba6ab1f02ad36b7d0c50c4a71cb39a8ec78bf8d1dc3c82bb9dd1d69d9169d7c937165ea15f60ce1147f256d46644f944107a3a8a800d5bad70d4c255
DIST refpolicy-2.20141203.tar.bz2 680243 SHA256 f438209c430d8a2d4ddcbe4bdd3edb46f6af7dc4913637af0b73c635e40c1522 SHA512 682e4280c5799e4c12ec7594afc1389f67be35055748d2e0dbdc3419159a16c96d4946ca6178daee8370515951f8653b2e452efe8c962b8d7f9bc192f0b15a0c WHIRLPOOL 74bca232534e7af9051bb1ab9f77c1ff6c425781cf4561f781d6e9a40cc5ca0d9add540249ea5493e8782a9372aea296ead6c165c6c440ae1509eb319d151ee5
-EBUILD selinux-base-2.20140311-r1.ebuild 4500 SHA256 f79b925d17d5ab4d68301ead1ca4f2372bd355fc3204b12c4eb24f67d4beaa12 SHA512 dfd695f5fc8085361e73e026606b35ed60d6714801a390375a6df7f82ef9333b3686aa6a288831ca0e91ba68880a9383e801ea9374bc0a3d032e2579974b6ba7 WHIRLPOOL afb40d421963cebe974336d29abb4bfa6397027736d735645b6d738ead142b37c0a056400b782f5900537c4b03ade39aa5664fb4c047dd2895156f5d1c4aec17
-EBUILD selinux-base-2.20140311-r2.ebuild 4500 SHA256 706f0ed52ae8617bf6d349daeba3dab3660dab5fc361c11f33779c0ab6562518 SHA512 97f8ea114ca4974c3f8ba0ae53cf12aa2e68a270e7e424caff49179024e27aa0344d1c9b9bf005709c1f79c53f384ab9ba9bd1d49960980ec885593916b221fc WHIRLPOOL c7b6bfff7047f22951693881d4117ec33f3bffa4ed2255cf669b9890f16a3b05b56d412747afe2b12ac7f65b11e65f1d0b4fa07d8141e0263a8d52e48c3658ae
-EBUILD selinux-base-2.20140311-r3.ebuild 4500 SHA256 b80c252890a682a023fc212e3fecb631f51d0315a52b1931732562fb1a9e687c SHA512 167a1488e191791e9f12bb3e585608625cb6ac812d5a3d6379f907657d1832cc472a626ea308be0c0f2d94c31ed0fa13749b881b79eaeb2dbb3ab146c0b2d2f3 WHIRLPOOL 00a345a9a7bf273326d5a84d659aa13a61d56bbd57fa12f07873315e06e5f7f29921cf673dbc4a8172374f54ae0bf875dfc3164cb275c791b4040833aef7413c
-EBUILD selinux-base-2.20140311-r4.ebuild 4502 SHA256 cf21cd4dd2f3edf00ec863a24ba10aec99e7abcd70f3eb011d84c9647f449332 SHA512 90c0a5fd5f0c1d694ef34584cdc84136bb441a8d16f75b28f8e52ff9c9eb4ee61a578a1aa10a5621d7f14460c23f54d231d009a9770368734cda74da2a882cdd WHIRLPOOL adc40163bc672d7f513d85e3805108ceb011c51e9acf2fce0d0b594e64d6059f4c45bfaf8972706af02de5413a80376ff531229fec1d3ffa54d764a3fe25b192
EBUILD selinux-base-2.20140311-r5.ebuild 4897 SHA256 199a98bd44178ea2daa2a451e319d1e6c6241a974e95e187c8108f3bdf6865cb SHA512 c81601784505e2654f0b6d32ca7ed5d539b1d5f7d1e0d2f0bc70bcccff9c07bac2d5fa6d3924233c314f36381645241783aba156293f497bac7ecc730eebdcd8 WHIRLPOOL c8a16b88a7b57cf5b8070c160ccfc32736c4aef39b338a66664383d63595951e1023c55bc745a1203d8f39bf9fcaade2f12ece6c38f84613e5cec3d83908f567
EBUILD selinux-base-2.20140311-r6.ebuild 4897 SHA256 d3a5a1fef86d7a8758edb48583eda79f828fbdbd08f2e99802d1b8d1b8389868 SHA512 dc32a1c025ba37b4ea602242e6ae85d1db75cb4e88366ff5421b3c2a87b3844894eb075e2b728c16c6a803104543d1a2c69460da7915c2a38188c78c408f1da9 WHIRLPOOL 98467c2959889fa264bd707c4c3e38a0e3375d26350d617bc3f65634983328c395d9bc2709b50b83a6448b066ad90eb135db5cc923c6184790fc1a9059e767d0
EBUILD selinux-base-2.20140311-r7.ebuild 4900 SHA256 f92f68954e631e03d3f2ff767c37ca6f77223db0daafd9591d35023cbfd2a71d SHA512 43355646177445d147b482cd2dac95c7c69e26d76827ec39d1be21bc65d70b239c313a8fede74d9e70ac11d7794fc953fbab4a0eec8b980ae5e1997a2f85b6f6 WHIRLPOOL 64eda2f5478878decc2ca4b8bf6a91182c352dd258aa4c99233ea3b23646b8f0572b98bf905641917d86c873a9a516573364233538c27ba6acdd6b9d85af5fd2
EBUILD selinux-base-2.20141203-r1.ebuild 4547 SHA256 802602524e046647ca3bacfcb7f2d57f0cd4cb4642fea3f83237a4ef1e5b5a96 SHA512 a9c58fadfa5a92a9945d526f62a29e1205214a982b33bd816eeb2d3c1bc6decb3ffedea5047cd0e5a460004ff64c4b08795ae3a88d3ed106e94930091fdf7dfe WHIRLPOOL d1b5941e7acb0a6ba5080a511dfb3c4c70c5cd695369e4394d8fcf7f4d0ee38369cad7ee7ef1e5efaf3b0c3a3cc52df68502eeafc3aa30d9415eae83c23df922
EBUILD selinux-base-2.20141203-r2.ebuild 4489 SHA256 06924cac522eba1af4383fa8240661f4fa31fc68f84d75ab4bf635f2c5fb7db5 SHA512 d97825d1603d2df2ba15c5681388c74673b349e04c83b1c0e3f0fbfb9dc9f6366ad85e834fa85df9a99c73409a6ea33580393cdc087b30346514ad94b480424f WHIRLPOOL c2dda74e3daf39b38a30978a8baf306be8580a91bca69d63ed7643edeccbbc9eede89df0c4f28a47bc171d54c97924338f72f0b279eb23810dcb177e354ed367
EBUILD selinux-base-9999.ebuild 4485 SHA256 afab6154fbfae34364241dc0f52f61e4d3436b40b5c7eff04d11e55b5a9b4ca6 SHA512 d2f92fbde448d4575435e2865e4eb870d71175abf8770c011b2c9928db6d3c4197284f3ec0b480fd1860f0053e7deee44311fe40029bb1554b1edce352999ca7 WHIRLPOOL 8cde78f81cee58045e87397ac2d749826ef11c9e0e8e51d7e9827b916aabb87aa3aabe47f346c616fa925a9febe8046aae5eb269091d4d5d8b255062e052727c
-MISC ChangeLog 10328 SHA256 639bf81dbe4d8d2d95c9e5ef4ca3a0a999a775f6b1d64720b112343c02ad81dd SHA512 28e6a60ea62aea3fa55e473253d90761b1112cb594dd2e6cb08f838c4cad297a691ef1de60ecd51fa2b8d2c5c5a4cec6127faeeb4b0dd92403c4ef11d623b673 WHIRLPOOL f2d00294f259f947885f8cb8da2ed1f230dc36d3fc0f875651f67f045bdf5c533356823b24893d74efa0e5b538ab7a2b05714486128aaa58d04104c183ab0ab0
+MISC ChangeLog 10547 SHA256 e866dc410244fa0003e39a83e2c453fdca019f06ef9c8a3456e4406591544b09 SHA512 c716a30db595901f7d4d30f57cb7924023d080591c6c9dc773c549d400589e5fa9e04b4f40b72440725008070052692210944b30b04b3ea6c3eeb76602bfaae2 WHIRLPOOL 3360e40fdd5b4e18ae52ac62015488beb367e7773dc43c1ff1db44e8634f911edde733332117ea29707c924dfff2887cdb16d0b7ef08db7fa2d63e70d5ef7348
MISC metadata.xml 753 SHA256 2542c8e9c994b3b2699d601ba980a8daef2288b5ad199867764f607978ddee67 SHA512 d5e803494fe0831fdddada0f1f464c941d93896afa19d9d1005daa8a4ebea7b20f905e6d0d89dd10ff1aceaee0c7c41c190f16b68bf4466c0f75d3a6110b8df0 WHIRLPOOL cd2535802ffacbdae1ff1787aa203311330202cb08df488dae59b178b102b818766d2320fe62de3cf7710047e8cafa6a41963381655d9fd5fb4c75a232decd52
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0
-iQIcBAEBCAAGBQJUltQyAAoJEC7dUkA7aK9HvdcP/2rwnyUy3skZ9+c7Td0qLsgT
-7VQnNvE/qC5UlcYEW6BNCwYmHsz/EvfoZ24938jqLs5sorXYQNDk0mxEvqXC18H3
-oPDTfzdHGHNJ2CTGNB7uFgSqcW/zhOGFFDyK+bUZE8JKSdZLoR1GeQHx3qP2MM1n
-0pE8E7jXTBGEw0DV9VxYQ4fPpV4bZ4kmJRy3C14hdcgieSu6kovinvDKI9gASncK
-U+4jwBgXT2U0PsxP5zQB8+EZodQpXZXT+s0Ie7u1QQ5h8JHONBYHlhCMGoQIWJRp
-RjWocNCZM5UkEe3rIcld7b9rRtMAOsn6Co1Q+zn+ADCVDpqqlBdd5AcF+z6VaREg
-mUlBuFLegn/Xsl5t2ALcPuW9rQZ5+JdDlyi5AU21fPALkMb/mLFieIc5D1h7pWm9
-PUqnba+z8xLpfp0Kl1bRBhjJJKi3rUNv1WvO2xV+ABP76vrVkGDhoFB+UBKsfc8i
-vZ84xECc6F9gsVLLlUGM4pLrpv1vqz++NT5j0hci/ioqja9UusAog86Txag9SHzl
-/l7WwfRwyI/nTrDJ05br0vz2oTGCQKVflnajxfiWyZsbiBPaQxZ3bKlpPeRNPigZ
-fn5dOH1ltO501rIxnVYymDio/ZNmMAuaucwddwyPg501KTWVqrxcY9qk7m4HdS4t
-5IQDX11iet1ZAHx4S0ez
-=TW1w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+=+YQn
-----END PGP SIGNATURE-----
diff --git a/sec-policy/selinux-base/selinux-base-2.20140311-r1.ebuild b/sec-policy/selinux-base/selinux-base-2.20140311-r1.ebuild
deleted file mode 100644
index 52cd48da8a92..000000000000
--- a/sec-policy/selinux-base/selinux-base-2.20140311-r1.ebuild
+++ /dev/null
@@ -1,161 +0,0 @@
-# Copyright 1999-2014 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base/selinux-base-2.20140311-r1.ebuild,v 1.2 2014/04/19 15:51:20 swift Exp $
-EAPI="4"
-
-inherit eutils
-
-IUSE="+peer_perms +open_perms +ubac +unconfined doc"
-
-DESCRIPTION="Gentoo base policy for SELinux"
-HOMEPAGE="http://www.gentoo.org/proj/en/hardened/selinux/"
-SRC_URI="http://oss.tresys.com/files/refpolicy/refpolicy-${PV}.tar.bz2
- http://dev.gentoo.org/~swift/patches/selinux-base-policy/patchbundle-selinux-base-policy-${PVR}.tar.bz2"
-LICENSE="GPL-2"
-SLOT="0"
-
-KEYWORDS="amd64 x86"
-
-RDEPEND=">=sys-apps/policycoreutils-2.1.10
- virtual/udev
- !<=sec-policy/selinux-base-policy-2.20130424"
-DEPEND="${RDEPEND}
- sys-devel/m4
- >=sys-apps/checkpolicy-2.1.8"
-
-S=${WORKDIR}/
-
-src_prepare() {
- # Apply the gentoo patches to the policy. These patches are only necessary
- # for base policies, or for interface changes on modules.
- EPATCH_MULTI_MSG="Applying SELinux policy updates ... " \
- EPATCH_SUFFIX="patch" \
- EPATCH_SOURCE="${WORKDIR}" \
- EPATCH_FORCE="yes" \
- epatch
-
- cd "${S}/refpolicy"
- make bare
- # Fix bug 257111 - Correct the initial sid for cron-started jobs in the
- # system_r role
- sed -i -e 's:system_crond_t:system_cronjob_t:g' \
- "${S}/refpolicy/config/appconfig-standard/default_contexts"
- sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \
- "${S}/refpolicy/config/appconfig-mls/default_contexts"
- sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \
- "${S}/refpolicy/config/appconfig-mcs/default_contexts"
-
- epatch_user
-}
-
-src_configure() {
- [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
-
- # Update the SELinux refpolicy capabilities based on the users' USE flags.
-
- if ! use peer_perms; then
- sed -i -e '/network_peer_controls/d' \
- "${S}/refpolicy/policy/policy_capabilities"
- fi
-
- if ! use open_perms; then
- sed -i -e '/open_perms/d' \
- "${S}/refpolicy/policy/policy_capabilities"
- fi
-
- if ! use ubac; then
- sed -i -e '/^UBAC/s/y/n/' "${S}/refpolicy/build.conf" \
- || die "Failed to disable User Based Access Control"
- fi
-
- echo "DISTRO = gentoo" >> "${S}/refpolicy/build.conf"
-
- # Prepare initial configuration
- cd "${S}/refpolicy";
- make conf || die "Make conf failed"
-
- # Setup the policies based on the types delivered by the end user.
- # These types can be "targeted", "strict", "mcs" and "mls".
- for i in ${POLICY_TYPES}; do
- cp -a "${S}/refpolicy" "${S}/${i}"
- cd "${S}/${i}";
-
- #cp "${FILESDIR}/modules-2.20120215.conf" "${S}/${i}/policy/modules.conf"
- sed -i -e "/= module/d" "${S}/${i}/policy/modules.conf"
-
- sed -i -e '/^QUIET/s/n/y/' -e "/^NAME/s/refpolicy/$i/" \
- "${S}/${i}/build.conf" || die "build.conf setup failed."
-
- if [[ "${i}" == "mls" ]] || [[ "${i}" == "mcs" ]];
- then
- # MCS/MLS require additional settings
- sed -i -e "/^TYPE/s/standard/${i}/" "${S}/${i}/build.conf" \
- || die "failed to set type to mls"
- fi
-
- if [ "${i}" == "targeted" ]; then
- sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \
- "${S}/${i}/config/appconfig-standard/seusers" \
- || die "targeted seusers setup failed."
- fi
-
- if [ "${i}" != "targeted" ] && [ "${i}" != "strict" ] && use unconfined; then
- sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \
- "${S}/${i}/config/appconfig-${i}/seusers" \
- || die "policy seusers setup failed."
- fi
- done
-}
-
-src_compile() {
- [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
-
- for i in ${POLICY_TYPES}; do
- cd "${S}/${i}"
- make base || die "${i} compile failed"
- if use doc; then
- make html || die
- fi
- done
-}
-
-src_install() {
- [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
-
- for i in ${POLICY_TYPES}; do
- cd "${S}/${i}"
-
- make DESTDIR="${D}" install \
- || die "${i} install failed."
-
- make DESTDIR="${D}" install-headers \
- || die "${i} headers install failed."
-
- echo "run_init_t" > "${D}/etc/selinux/${i}/contexts/run_init_type"
-
- echo "textrel_shlib_t" >> "${D}/etc/selinux/${i}/contexts/customizable_types"
-
- # libsemanage won't make this on its own
- keepdir "/etc/selinux/${i}/policy"
-
- if use doc; then
- dohtml doc/html/*;
- fi
-
- insinto /usr/share/selinux/devel;
- doins doc/policy.xml;
-
- done
-
- dodoc doc/Makefile.example doc/example.{te,fc,if}
-
- doman man/man8/*.8;
-
- insinto /etc/selinux
- doins "${FILESDIR}/config"
-}
-
-pkg_preinst() {
- has_version "<${CATEGORY}/${PN}-2.20101213-r13"
- previous_less_than_r13=$?
-}
diff --git a/sec-policy/selinux-base/selinux-base-2.20140311-r2.ebuild b/sec-policy/selinux-base/selinux-base-2.20140311-r2.ebuild
deleted file mode 100644
index 8121c0332c02..000000000000
--- a/sec-policy/selinux-base/selinux-base-2.20140311-r2.ebuild
+++ /dev/null
@@ -1,161 +0,0 @@
-# Copyright 1999-2014 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base/selinux-base-2.20140311-r2.ebuild,v 1.2 2014/05/29 20:23:20 swift Exp $
-EAPI="4"
-
-inherit eutils
-
-IUSE="+peer_perms +open_perms +ubac +unconfined doc"
-
-DESCRIPTION="Gentoo base policy for SELinux"
-HOMEPAGE="http://www.gentoo.org/proj/en/hardened/selinux/"
-SRC_URI="http://oss.tresys.com/files/refpolicy/refpolicy-${PV}.tar.bz2
- http://dev.gentoo.org/~swift/patches/selinux-base-policy/patchbundle-selinux-base-policy-${PVR}.tar.bz2"
-LICENSE="GPL-2"
-SLOT="0"
-
-KEYWORDS="amd64 x86"
-
-RDEPEND=">=sys-apps/policycoreutils-2.1.10
- virtual/udev
- !<=sec-policy/selinux-base-policy-2.20130424"
-DEPEND="${RDEPEND}
- sys-devel/m4
- >=sys-apps/checkpolicy-2.1.8"
-
-S=${WORKDIR}/
-
-src_prepare() {
- # Apply the gentoo patches to the policy. These patches are only necessary
- # for base policies, or for interface changes on modules.
- EPATCH_MULTI_MSG="Applying SELinux policy updates ... " \
- EPATCH_SUFFIX="patch" \
- EPATCH_SOURCE="${WORKDIR}" \
- EPATCH_FORCE="yes" \
- epatch
-
- cd "${S}/refpolicy"
- make bare
- # Fix bug 257111 - Correct the initial sid for cron-started jobs in the
- # system_r role
- sed -i -e 's:system_crond_t:system_cronjob_t:g' \
- "${S}/refpolicy/config/appconfig-standard/default_contexts"
- sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \
- "${S}/refpolicy/config/appconfig-mls/default_contexts"
- sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \
- "${S}/refpolicy/config/appconfig-mcs/default_contexts"
-
- epatch_user
-}
-
-src_configure() {
- [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
-
- # Update the SELinux refpolicy capabilities based on the users' USE flags.
-
- if ! use peer_perms; then
- sed -i -e '/network_peer_controls/d' \
- "${S}/refpolicy/policy/policy_capabilities"
- fi
-
- if ! use open_perms; then
- sed -i -e '/open_perms/d' \
- "${S}/refpolicy/policy/policy_capabilities"
- fi
-
- if ! use ubac; then
- sed -i -e '/^UBAC/s/y/n/' "${S}/refpolicy/build.conf" \
- || die "Failed to disable User Based Access Control"
- fi
-
- echo "DISTRO = gentoo" >> "${S}/refpolicy/build.conf"
-
- # Prepare initial configuration
- cd "${S}/refpolicy";
- make conf || die "Make conf failed"
-
- # Setup the policies based on the types delivered by the end user.
- # These types can be "targeted", "strict", "mcs" and "mls".
- for i in ${POLICY_TYPES}; do
- cp -a "${S}/refpolicy" "${S}/${i}"
- cd "${S}/${i}";
-
- #cp "${FILESDIR}/modules-2.20120215.conf" "${S}/${i}/policy/modules.conf"
- sed -i -e "/= module/d" "${S}/${i}/policy/modules.conf"
-
- sed -i -e '/^QUIET/s/n/y/' -e "/^NAME/s/refpolicy/$i/" \
- "${S}/${i}/build.conf" || die "build.conf setup failed."
-
- if [[ "${i}" == "mls" ]] || [[ "${i}" == "mcs" ]];
- then
- # MCS/MLS require additional settings
- sed -i -e "/^TYPE/s/standard/${i}/" "${S}/${i}/build.conf" \
- || die "failed to set type to mls"
- fi
-
- if [ "${i}" == "targeted" ]; then
- sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \
- "${S}/${i}/config/appconfig-standard/seusers" \
- || die "targeted seusers setup failed."
- fi
-
- if [ "${i}" != "targeted" ] && [ "${i}" != "strict" ] && use unconfined; then
- sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \
- "${S}/${i}/config/appconfig-${i}/seusers" \
- || die "policy seusers setup failed."
- fi
- done
-}
-
-src_compile() {
- [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
-
- for i in ${POLICY_TYPES}; do
- cd "${S}/${i}"
- make base || die "${i} compile failed"
- if use doc; then
- make html || die
- fi
- done
-}
-
-src_install() {
- [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
-
- for i in ${POLICY_TYPES}; do
- cd "${S}/${i}"
-
- make DESTDIR="${D}" install \
- || die "${i} install failed."
-
- make DESTDIR="${D}" install-headers \
- || die "${i} headers install failed."
-
- echo "run_init_t" > "${D}/etc/selinux/${i}/contexts/run_init_type"
-
- echo "textrel_shlib_t" >> "${D}/etc/selinux/${i}/contexts/customizable_types"
-
- # libsemanage won't make this on its own
- keepdir "/etc/selinux/${i}/policy"
-
- if use doc; then
- dohtml doc/html/*;
- fi
-
- insinto /usr/share/selinux/devel;
- doins doc/policy.xml;
-
- done
-
- dodoc doc/Makefile.example doc/example.{te,fc,if}
-
- doman man/man8/*.8;
-
- insinto /etc/selinux
- doins "${FILESDIR}/config"
-}
-
-pkg_preinst() {
- has_version "<${CATEGORY}/${PN}-2.20101213-r13"
- previous_less_than_r13=$?
-}
diff --git a/sec-policy/selinux-base/selinux-base-2.20140311-r3.ebuild b/sec-policy/selinux-base/selinux-base-2.20140311-r3.ebuild
deleted file mode 100644
index 6d3955c1bcc1..000000000000
--- a/sec-policy/selinux-base/selinux-base-2.20140311-r3.ebuild
+++ /dev/null
@@ -1,161 +0,0 @@
-# Copyright 1999-2014 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base/selinux-base-2.20140311-r3.ebuild,v 1.2 2014/08/01 21:04:23 swift Exp $
-EAPI="5"
-
-inherit eutils
-
-IUSE="+peer_perms +open_perms +ubac +unconfined doc"
-
-DESCRIPTION="Gentoo base policy for SELinux"
-HOMEPAGE="http://www.gentoo.org/proj/en/hardened/selinux/"
-SRC_URI="http://oss.tresys.com/files/refpolicy/refpolicy-${PV}.tar.bz2
- http://dev.gentoo.org/~swift/patches/selinux-base-policy/patchbundle-selinux-base-policy-${PVR}.tar.bz2"
-LICENSE="GPL-2"
-SLOT="0"
-
-KEYWORDS="amd64 x86"
-
-RDEPEND=">=sys-apps/policycoreutils-2.1.10
- virtual/udev
- !<=sec-policy/selinux-base-policy-2.20130424"
-DEPEND="${RDEPEND}
- sys-devel/m4
- >=sys-apps/checkpolicy-2.1.8"
-
-S=${WORKDIR}/
-
-src_prepare() {
- # Apply the gentoo patches to the policy. These patches are only necessary
- # for base policies, or for interface changes on modules.
- EPATCH_MULTI_MSG="Applying SELinux policy updates ... " \
- EPATCH_SUFFIX="patch" \
- EPATCH_SOURCE="${WORKDIR}" \
- EPATCH_FORCE="yes" \
- epatch
-
- cd "${S}/refpolicy"
- make bare
- # Fix bug 257111 - Correct the initial sid for cron-started jobs in the
- # system_r role
- sed -i -e 's:system_crond_t:system_cronjob_t:g' \
- "${S}/refpolicy/config/appconfig-standard/default_contexts"
- sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \
- "${S}/refpolicy/config/appconfig-mls/default_contexts"
- sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \
- "${S}/refpolicy/config/appconfig-mcs/default_contexts"
-
- epatch_user
-}
-
-src_configure() {
- [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
-
- # Update the SELinux refpolicy capabilities based on the users' USE flags.
-
- if ! use peer_perms; then
- sed -i -e '/network_peer_controls/d' \
- "${S}/refpolicy/policy/policy_capabilities"
- fi
-
- if ! use open_perms; then
- sed -i -e '/open_perms/d' \
- "${S}/refpolicy/policy/policy_capabilities"
- fi
-
- if ! use ubac; then
- sed -i -e '/^UBAC/s/y/n/' "${S}/refpolicy/build.conf" \
- || die "Failed to disable User Based Access Control"
- fi
-
- echo "DISTRO = gentoo" >> "${S}/refpolicy/build.conf"
-
- # Prepare initial configuration
- cd "${S}/refpolicy";
- make conf || die "Make conf failed"
-
- # Setup the policies based on the types delivered by the end user.
- # These types can be "targeted", "strict", "mcs" and "mls".
- for i in ${POLICY_TYPES}; do
- cp -a "${S}/refpolicy" "${S}/${i}"
- cd "${S}/${i}";
-
- #cp "${FILESDIR}/modules-2.20120215.conf" "${S}/${i}/policy/modules.conf"
- sed -i -e "/= module/d" "${S}/${i}/policy/modules.conf"
-
- sed -i -e '/^QUIET/s/n/y/' -e "/^NAME/s/refpolicy/$i/" \
- "${S}/${i}/build.conf" || die "build.conf setup failed."
-
- if [[ "${i}" == "mls" ]] || [[ "${i}" == "mcs" ]];
- then
- # MCS/MLS require additional settings
- sed -i -e "/^TYPE/s/standard/${i}/" "${S}/${i}/build.conf" \
- || die "failed to set type to mls"
- fi
-
- if [ "${i}" == "targeted" ]; then
- sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \
- "${S}/${i}/config/appconfig-standard/seusers" \
- || die "targeted seusers setup failed."
- fi
-
- if [ "${i}" != "targeted" ] && [ "${i}" != "strict" ] && use unconfined; then
- sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \
- "${S}/${i}/config/appconfig-${i}/seusers" \
- || die "policy seusers setup failed."
- fi
- done
-}
-
-src_compile() {
- [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
-
- for i in ${POLICY_TYPES}; do
- cd "${S}/${i}"
- make base || die "${i} compile failed"
- if use doc; then
- make html || die
- fi
- done
-}
-
-src_install() {
- [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
-
- for i in ${POLICY_TYPES}; do
- cd "${S}/${i}"
-
- make DESTDIR="${D}" install \
- || die "${i} install failed."
-
- make DESTDIR="${D}" install-headers \
- || die "${i} headers install failed."
-
- echo "run_init_t" > "${D}/etc/selinux/${i}/contexts/run_init_type"
-
- echo "textrel_shlib_t" >> "${D}/etc/selinux/${i}/contexts/customizable_types"
-
- # libsemanage won't make this on its own
- keepdir "/etc/selinux/${i}/policy"
-
- if use doc; then
- dohtml doc/html/*;
- fi
-
- insinto /usr/share/selinux/devel;
- doins doc/policy.xml;
-
- done
-
- dodoc doc/Makefile.example doc/example.{te,fc,if}
-
- doman man/man8/*.8;
-
- insinto /etc/selinux
- doins "${FILESDIR}/config"
-}
-
-pkg_preinst() {
- has_version "<${CATEGORY}/${PN}-2.20101213-r13"
- previous_less_than_r13=$?
-}
diff --git a/sec-policy/selinux-base/selinux-base-2.20140311-r4.ebuild b/sec-policy/selinux-base/selinux-base-2.20140311-r4.ebuild
deleted file mode 100644
index e5b5390ddf56..000000000000
--- a/sec-policy/selinux-base/selinux-base-2.20140311-r4.ebuild
+++ /dev/null
@@ -1,161 +0,0 @@
-# Copyright 1999-2014 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base/selinux-base-2.20140311-r4.ebuild,v 1.1 2014/08/01 21:04:23 swift Exp $
-EAPI="5"
-
-inherit eutils
-
-IUSE="+peer_perms +open_perms +ubac +unconfined doc"
-
-DESCRIPTION="Gentoo base policy for SELinux"
-HOMEPAGE="http://www.gentoo.org/proj/en/hardened/selinux/"
-SRC_URI="http://oss.tresys.com/files/refpolicy/refpolicy-${PV}.tar.bz2
- http://dev.gentoo.org/~swift/patches/selinux-base-policy/patchbundle-selinux-base-policy-${PVR}.tar.bz2"
-LICENSE="GPL-2"
-SLOT="0"
-
-KEYWORDS="~amd64 ~x86"
-
-RDEPEND=">=sys-apps/policycoreutils-2.1.10
- virtual/udev
- !<=sec-policy/selinux-base-policy-2.20130424"
-DEPEND="${RDEPEND}
- sys-devel/m4
- >=sys-apps/checkpolicy-2.1.8"
-
-S=${WORKDIR}/
-
-src_prepare() {
- # Apply the gentoo patches to the policy. These patches are only necessary
- # for base policies, or for interface changes on modules.
- EPATCH_MULTI_MSG="Applying SELinux policy updates ... " \
- EPATCH_SUFFIX="patch" \
- EPATCH_SOURCE="${WORKDIR}" \
- EPATCH_FORCE="yes" \
- epatch
-
- cd "${S}/refpolicy"
- make bare
- # Fix bug 257111 - Correct the initial sid for cron-started jobs in the
- # system_r role
- sed -i -e 's:system_crond_t:system_cronjob_t:g' \
- "${S}/refpolicy/config/appconfig-standard/default_contexts"
- sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \
- "${S}/refpolicy/config/appconfig-mls/default_contexts"
- sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \
- "${S}/refpolicy/config/appconfig-mcs/default_contexts"
-
- epatch_user
-}
-
-src_configure() {
- [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
-
- # Update the SELinux refpolicy capabilities based on the users' USE flags.
-
- if ! use peer_perms; then
- sed -i -e '/network_peer_controls/d' \
- "${S}/refpolicy/policy/policy_capabilities"
- fi
-
- if ! use open_perms; then
- sed -i -e '/open_perms/d' \
- "${S}/refpolicy/policy/policy_capabilities"
- fi
-
- if ! use ubac; then
- sed -i -e '/^UBAC/s/y/n/' "${S}/refpolicy/build.conf" \
- || die "Failed to disable User Based Access Control"
- fi
-
- echo "DISTRO = gentoo" >> "${S}/refpolicy/build.conf"
-
- # Prepare initial configuration
- cd "${S}/refpolicy";
- make conf || die "Make conf failed"
-
- # Setup the policies based on the types delivered by the end user.
- # These types can be "targeted", "strict", "mcs" and "mls".
- for i in ${POLICY_TYPES}; do
- cp -a "${S}/refpolicy" "${S}/${i}"
- cd "${S}/${i}";
-
- #cp "${FILESDIR}/modules-2.20120215.conf" "${S}/${i}/policy/modules.conf"
- sed -i -e "/= module/d" "${S}/${i}/policy/modules.conf"
-
- sed -i -e '/^QUIET/s/n/y/' -e "/^NAME/s/refpolicy/$i/" \
- "${S}/${i}/build.conf" || die "build.conf setup failed."
-
- if [[ "${i}" == "mls" ]] || [[ "${i}" == "mcs" ]];
- then
- # MCS/MLS require additional settings
- sed -i -e "/^TYPE/s/standard/${i}/" "${S}/${i}/build.conf" \
- || die "failed to set type to mls"
- fi
-
- if [ "${i}" == "targeted" ]; then
- sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \
- "${S}/${i}/config/appconfig-standard/seusers" \
- || die "targeted seusers setup failed."
- fi
-
- if [ "${i}" != "targeted" ] && [ "${i}" != "strict" ] && use unconfined; then
- sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \
- "${S}/${i}/config/appconfig-${i}/seusers" \
- || die "policy seusers setup failed."
- fi
- done
-}
-
-src_compile() {
- [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
-
- for i in ${POLICY_TYPES}; do
- cd "${S}/${i}"
- make base || die "${i} compile failed"
- if use doc; then
- make html || die
- fi
- done
-}
-
-src_install() {
- [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs"
-
- for i in ${POLICY_TYPES}; do
- cd "${S}/${i}"
-
- make DESTDIR="${D}" install \
- || die "${i} install failed."
-
- make DESTDIR="${D}" install-headers \
- || die "${i} headers install failed."
-
- echo "run_init_t" > "${D}/etc/selinux/${i}/contexts/run_init_type"
-
- echo "textrel_shlib_t" >> "${D}/etc/selinux/${i}/contexts/customizable_types"
-
- # libsemanage won't make this on its own
- keepdir "/etc/selinux/${i}/policy"
-
- if use doc; then
- dohtml doc/html/*;
- fi
-
- insinto /usr/share/selinux/devel;
- doins doc/policy.xml;
-
- done
-
- dodoc doc/Makefile.example doc/example.{te,fc,if}
-
- doman man/man8/*.8;
-
- insinto /etc/selinux
- doins "${FILESDIR}/config"
-}
-
-pkg_preinst() {
- has_version "<${CATEGORY}/${PN}-2.20101213-r13"
- previous_less_than_r13=$?
-}