diff options
Diffstat (limited to 'sec-policy/selinux-base')
-rw-r--r-- | sec-policy/selinux-base/ChangeLog | 7 | ||||
-rw-r--r-- | sec-policy/selinux-base/Manifest | 36 | ||||
-rw-r--r-- | sec-policy/selinux-base/selinux-base-2.20140311-r1.ebuild | 161 | ||||
-rw-r--r-- | sec-policy/selinux-base/selinux-base-2.20140311-r2.ebuild | 161 | ||||
-rw-r--r-- | sec-policy/selinux-base/selinux-base-2.20140311-r3.ebuild | 161 | ||||
-rw-r--r-- | sec-policy/selinux-base/selinux-base-2.20140311-r4.ebuild | 161 |
6 files changed, 20 insertions, 667 deletions
diff --git a/sec-policy/selinux-base/ChangeLog b/sec-policy/selinux-base/ChangeLog index dc6bb3ec5925..f219a25dd8cf 100644 --- a/sec-policy/selinux-base/ChangeLog +++ b/sec-policy/selinux-base/ChangeLog @@ -1,6 +1,11 @@ # ChangeLog for sec-policy/selinux-base # Copyright 1999-2014 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base/ChangeLog,v 1.63 2014/12/21 14:07:10 swift Exp $ +# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base/ChangeLog,v 1.64 2014/12/21 14:20:23 swift Exp $ + + 21 Dec 2014; Sven Vermeulen <swift@gentoo.org> + -selinux-base-2.20140311-r1.ebuild, -selinux-base-2.20140311-r2.ebuild, + -selinux-base-2.20140311-r3.ebuild, -selinux-base-2.20140311-r4.ebuild: + Remove old ebuilds 21 Dec 2014; Sven Vermeulen <swift@gentoo.org> selinux-base-2.20141203-r1.ebuild: diff --git a/sec-policy/selinux-base/Manifest b/sec-policy/selinux-base/Manifest index 4324d1907924..72d758cda663 100644 --- a/sec-policy/selinux-base/Manifest +++ b/sec-policy/selinux-base/Manifest @@ -2,10 +2,6 @@ Hash: SHA256 AUX config 631 SHA256 891ddc7cfd577a8591d65f6cb3398863ec338209b347ce9bfc125817b841860e SHA512 f3c4fece54e5786de94fc97c8e7678f9901c6963828d28b020c423458ac258480191f216522fed7658e7ad1c94fd25557efc524a4b75ec8837116c6a14c2328a WHIRLPOOL e9fe30b0e31dfc2f5f9059f843de3562ded62be8868770663cfb0e80494be17ca1536d522e82c10aec0b083e9bda9b5326f37c60b483681bf237517646e5c18a -DIST patchbundle-selinux-base-policy-2.20140311-r1.tar.bz2 259943 SHA256 0444ad505802b730dcc47daae8341de4f1a2f1cfebf85d90fcfe057cbc7aeb4f SHA512 d660442fdb92227a08d453a6e5678dfa63c1fe16172d05bc04ccc2a3e0860ec494a5747fa7baab794171e3bc6738b507e05b01485d3ed7e32ec2e2bd36fca5dd WHIRLPOOL 262421e7bbd1561e326f0616a36b8f3084a3bee4225526c00b1031a98dd31ca8d7266f3e696069bd8d347327ffebb86c08abe5924e4b917f9cf1128ddd74e4bc -DIST patchbundle-selinux-base-policy-2.20140311-r2.tar.bz2 265878 SHA256 344e9c6c9f4466cbe39c067f4af902c25bb17d20431e0e19521490a92f41d80f SHA512 54b5092791038f97f7fd7dfe0d6becc3070171b2b114ecaff38c904c1392885756ce201663004bf4e6621236a77045828229fe2c5de317ba63da59786a99f312 WHIRLPOOL 27cd3eb4a15098d156af22c9f61ba02f0784a2eab49992b3a27777b5d60a76b6bc04e2cca81729176b779628886ca1ce13d89f865de3aa7380f1c9ef7682d3ce -DIST patchbundle-selinux-base-policy-2.20140311-r3.tar.bz2 268783 SHA256 1d2f1d090a61e96ee26c63ebc0d37d1aa7f7c826b2885fd28bde2d0c81a500b0 SHA512 ef3eb5143f4343675c6e5219c6bad1b5cbc3c885088c0389974d7106e8da949843e1504edcea39888d14a20a8d6cf4032e24fa5891e7fa678abf7d9c7cef3762 WHIRLPOOL 5c875dfb043c0076bde48a2f7f1051e3475316578c46688e2e94bd79e0130bdc9cc5719e9fb2e5c3bca52e97e5d4773546cec1ae21bd0a0d37b5a57ac4adf483 -DIST patchbundle-selinux-base-policy-2.20140311-r4.tar.bz2 272598 SHA256 86c4e0aae81adf76054bbb74dd19a19022dbc2139a6adfcb3710dd679e5aecd1 SHA512 81b4ee890baf01f1b55a70f46454b3f77a7dbbcd3e860e309162389a34be056bfe82d3fb9f7b843a8476b2b1fb5919d534402c2f06eeb9390b33b3e6745ca444 WHIRLPOOL 8a4503d201d465b049757764ca0c209b03b66ba2af8cb7e979354c2d35e1c5b428d9a1876a606a765702c50bb725fe4f53a9384bbb205f9f51ca28d59aaa9416 DIST patchbundle-selinux-base-policy-2.20140311-r5.tar.bz2 274187 SHA256 5ce76d59d12a7dfc02352eb2a77971d76c5ff0fa3c66cced6318919571f04839 SHA512 7a9da3ab23ce6217739f4548cc5365f64def11fe19b6f3b2a304685bb54246d12856388043870e0f061f71fb2c8c45da72bf3db28ad6e70f397f5dfffe2206c6 WHIRLPOOL a4729aaeed88f7485fbf112de91161bf4e75fb996f5123133c22fcb008966acc7db98c7849dc4b076cb633d00c81deae85cf6b5f8c48f8c3c72c90bcaff26d71 DIST patchbundle-selinux-base-policy-2.20140311-r6.tar.bz2 281043 SHA256 7fbfb518731c6bce8a3937e7dbabeaf0d39059423f5930731034363862bf9a25 SHA512 6b8bfbb3ee9e9d229ac0fa7e80905300c24f4934fb2f150ba52f45e76a3f1e8b51c788136ea32a2b044a00c614a96538aad9d3ff7300735dae228861ab5aed6f WHIRLPOOL 9da1fb97b7a1c8f5990748695c1393d0d0c7c6bcd6acbb974653ee83df00d911b70b4f9544a9e4b3014b9f78f69745a17a5c7fa02859985b611ec4636b473981 DIST patchbundle-selinux-base-policy-2.20140311-r7.tar.bz2 285346 SHA256 8e216867cc5ec2c513ae81d04e637021b4eda9bbd0fafab0c7f61f087776c33c SHA512 01d30c38dba876136d61452a890adbbe0301fb990b65b0a15086f1c8f14df4f96faf57bee8fd1328147458e5a7e96f972792c26ef971924c0fc74cf644d4b644 WHIRLPOOL ec03df417b73d52a19809a2e7417b05b11880517e4bc5093725a8172177943f3fa526eb32222f41c3aed5ec5ba3d57fb5af2ed19a32af1c37529864d30afd68b @@ -13,32 +9,28 @@ DIST patchbundle-selinux-base-policy-2.20141203-r1.tar.bz2 264038 SHA256 0fb0ff6 DIST patchbundle-selinux-base-policy-2.20141203-r2.tar.bz2 268395 SHA256 60f5fbb2402f12b4c4aca89b134ee0dd4c88a1812208d765b601b23e025f7cfe SHA512 0a6d7a61ae259f6b4b9210c0b509a2b25581674b0d07e0fa8f2eff151f1e8bf084cae7a8928ede6e4358da661290940b8390a2cb6f5c6ababc021de4f6b445b9 WHIRLPOOL 6341b3c04aa547256f3128826fffe777c4ac2d7f6f916d6e7a7f2e976b18a903786116743a26f43602c707310662c445564ffdaa173b2c2cd9e48f4173c367a1 DIST refpolicy-2.20140311.tar.bz2 664416 SHA256 f69437db95548c78a5dec44c236397146b144153149009ea554d2e536e5436f7 SHA512 50bacee82ed41ac8b8007ecc33bf51d22303cc2ddd27cfb72cb5520dab5f8e255186e34b89cec492c7a2d4220b200814bdede9b46c19f987a3d3d65a1c9b749a WHIRLPOOL e07480beba6ab1f02ad36b7d0c50c4a71cb39a8ec78bf8d1dc3c82bb9dd1d69d9169d7c937165ea15f60ce1147f256d46644f944107a3a8a800d5bad70d4c255 DIST refpolicy-2.20141203.tar.bz2 680243 SHA256 f438209c430d8a2d4ddcbe4bdd3edb46f6af7dc4913637af0b73c635e40c1522 SHA512 682e4280c5799e4c12ec7594afc1389f67be35055748d2e0dbdc3419159a16c96d4946ca6178daee8370515951f8653b2e452efe8c962b8d7f9bc192f0b15a0c WHIRLPOOL 74bca232534e7af9051bb1ab9f77c1ff6c425781cf4561f781d6e9a40cc5ca0d9add540249ea5493e8782a9372aea296ead6c165c6c440ae1509eb319d151ee5 -EBUILD selinux-base-2.20140311-r1.ebuild 4500 SHA256 f79b925d17d5ab4d68301ead1ca4f2372bd355fc3204b12c4eb24f67d4beaa12 SHA512 dfd695f5fc8085361e73e026606b35ed60d6714801a390375a6df7f82ef9333b3686aa6a288831ca0e91ba68880a9383e801ea9374bc0a3d032e2579974b6ba7 WHIRLPOOL afb40d421963cebe974336d29abb4bfa6397027736d735645b6d738ead142b37c0a056400b782f5900537c4b03ade39aa5664fb4c047dd2895156f5d1c4aec17 -EBUILD selinux-base-2.20140311-r2.ebuild 4500 SHA256 706f0ed52ae8617bf6d349daeba3dab3660dab5fc361c11f33779c0ab6562518 SHA512 97f8ea114ca4974c3f8ba0ae53cf12aa2e68a270e7e424caff49179024e27aa0344d1c9b9bf005709c1f79c53f384ab9ba9bd1d49960980ec885593916b221fc WHIRLPOOL c7b6bfff7047f22951693881d4117ec33f3bffa4ed2255cf669b9890f16a3b05b56d412747afe2b12ac7f65b11e65f1d0b4fa07d8141e0263a8d52e48c3658ae -EBUILD selinux-base-2.20140311-r3.ebuild 4500 SHA256 b80c252890a682a023fc212e3fecb631f51d0315a52b1931732562fb1a9e687c SHA512 167a1488e191791e9f12bb3e585608625cb6ac812d5a3d6379f907657d1832cc472a626ea308be0c0f2d94c31ed0fa13749b881b79eaeb2dbb3ab146c0b2d2f3 WHIRLPOOL 00a345a9a7bf273326d5a84d659aa13a61d56bbd57fa12f07873315e06e5f7f29921cf673dbc4a8172374f54ae0bf875dfc3164cb275c791b4040833aef7413c -EBUILD selinux-base-2.20140311-r4.ebuild 4502 SHA256 cf21cd4dd2f3edf00ec863a24ba10aec99e7abcd70f3eb011d84c9647f449332 SHA512 90c0a5fd5f0c1d694ef34584cdc84136bb441a8d16f75b28f8e52ff9c9eb4ee61a578a1aa10a5621d7f14460c23f54d231d009a9770368734cda74da2a882cdd WHIRLPOOL adc40163bc672d7f513d85e3805108ceb011c51e9acf2fce0d0b594e64d6059f4c45bfaf8972706af02de5413a80376ff531229fec1d3ffa54d764a3fe25b192 EBUILD selinux-base-2.20140311-r5.ebuild 4897 SHA256 199a98bd44178ea2daa2a451e319d1e6c6241a974e95e187c8108f3bdf6865cb SHA512 c81601784505e2654f0b6d32ca7ed5d539b1d5f7d1e0d2f0bc70bcccff9c07bac2d5fa6d3924233c314f36381645241783aba156293f497bac7ecc730eebdcd8 WHIRLPOOL c8a16b88a7b57cf5b8070c160ccfc32736c4aef39b338a66664383d63595951e1023c55bc745a1203d8f39bf9fcaade2f12ece6c38f84613e5cec3d83908f567 EBUILD selinux-base-2.20140311-r6.ebuild 4897 SHA256 d3a5a1fef86d7a8758edb48583eda79f828fbdbd08f2e99802d1b8d1b8389868 SHA512 dc32a1c025ba37b4ea602242e6ae85d1db75cb4e88366ff5421b3c2a87b3844894eb075e2b728c16c6a803104543d1a2c69460da7915c2a38188c78c408f1da9 WHIRLPOOL 98467c2959889fa264bd707c4c3e38a0e3375d26350d617bc3f65634983328c395d9bc2709b50b83a6448b066ad90eb135db5cc923c6184790fc1a9059e767d0 EBUILD selinux-base-2.20140311-r7.ebuild 4900 SHA256 f92f68954e631e03d3f2ff767c37ca6f77223db0daafd9591d35023cbfd2a71d SHA512 43355646177445d147b482cd2dac95c7c69e26d76827ec39d1be21bc65d70b239c313a8fede74d9e70ac11d7794fc953fbab4a0eec8b980ae5e1997a2f85b6f6 WHIRLPOOL 64eda2f5478878decc2ca4b8bf6a91182c352dd258aa4c99233ea3b23646b8f0572b98bf905641917d86c873a9a516573364233538c27ba6acdd6b9d85af5fd2 EBUILD selinux-base-2.20141203-r1.ebuild 4547 SHA256 802602524e046647ca3bacfcb7f2d57f0cd4cb4642fea3f83237a4ef1e5b5a96 SHA512 a9c58fadfa5a92a9945d526f62a29e1205214a982b33bd816eeb2d3c1bc6decb3ffedea5047cd0e5a460004ff64c4b08795ae3a88d3ed106e94930091fdf7dfe WHIRLPOOL d1b5941e7acb0a6ba5080a511dfb3c4c70c5cd695369e4394d8fcf7f4d0ee38369cad7ee7ef1e5efaf3b0c3a3cc52df68502eeafc3aa30d9415eae83c23df922 EBUILD selinux-base-2.20141203-r2.ebuild 4489 SHA256 06924cac522eba1af4383fa8240661f4fa31fc68f84d75ab4bf635f2c5fb7db5 SHA512 d97825d1603d2df2ba15c5681388c74673b349e04c83b1c0e3f0fbfb9dc9f6366ad85e834fa85df9a99c73409a6ea33580393cdc087b30346514ad94b480424f WHIRLPOOL c2dda74e3daf39b38a30978a8baf306be8580a91bca69d63ed7643edeccbbc9eede89df0c4f28a47bc171d54c97924338f72f0b279eb23810dcb177e354ed367 EBUILD selinux-base-9999.ebuild 4485 SHA256 afab6154fbfae34364241dc0f52f61e4d3436b40b5c7eff04d11e55b5a9b4ca6 SHA512 d2f92fbde448d4575435e2865e4eb870d71175abf8770c011b2c9928db6d3c4197284f3ec0b480fd1860f0053e7deee44311fe40029bb1554b1edce352999ca7 WHIRLPOOL 8cde78f81cee58045e87397ac2d749826ef11c9e0e8e51d7e9827b916aabb87aa3aabe47f346c616fa925a9febe8046aae5eb269091d4d5d8b255062e052727c -MISC ChangeLog 10328 SHA256 639bf81dbe4d8d2d95c9e5ef4ca3a0a999a775f6b1d64720b112343c02ad81dd SHA512 28e6a60ea62aea3fa55e473253d90761b1112cb594dd2e6cb08f838c4cad297a691ef1de60ecd51fa2b8d2c5c5a4cec6127faeeb4b0dd92403c4ef11d623b673 WHIRLPOOL f2d00294f259f947885f8cb8da2ed1f230dc36d3fc0f875651f67f045bdf5c533356823b24893d74efa0e5b538ab7a2b05714486128aaa58d04104c183ab0ab0 +MISC ChangeLog 10547 SHA256 e866dc410244fa0003e39a83e2c453fdca019f06ef9c8a3456e4406591544b09 SHA512 c716a30db595901f7d4d30f57cb7924023d080591c6c9dc773c549d400589e5fa9e04b4f40b72440725008070052692210944b30b04b3ea6c3eeb76602bfaae2 WHIRLPOOL 3360e40fdd5b4e18ae52ac62015488beb367e7773dc43c1ff1db44e8634f911edde733332117ea29707c924dfff2887cdb16d0b7ef08db7fa2d63e70d5ef7348 MISC metadata.xml 753 SHA256 2542c8e9c994b3b2699d601ba980a8daef2288b5ad199867764f607978ddee67 SHA512 d5e803494fe0831fdddada0f1f464c941d93896afa19d9d1005daa8a4ebea7b20f905e6d0d89dd10ff1aceaee0c7c41c190f16b68bf4466c0f75d3a6110b8df0 WHIRLPOOL cd2535802ffacbdae1ff1787aa203311330202cb08df488dae59b178b102b818766d2320fe62de3cf7710047e8cafa6a41963381655d9fd5fb4c75a232decd52 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0 -iQIcBAEBCAAGBQJUltQyAAoJEC7dUkA7aK9HvdcP/2rwnyUy3skZ9+c7Td0qLsgT -7VQnNvE/qC5UlcYEW6BNCwYmHsz/EvfoZ24938jqLs5sorXYQNDk0mxEvqXC18H3 -oPDTfzdHGHNJ2CTGNB7uFgSqcW/zhOGFFDyK+bUZE8JKSdZLoR1GeQHx3qP2MM1n -0pE8E7jXTBGEw0DV9VxYQ4fPpV4bZ4kmJRy3C14hdcgieSu6kovinvDKI9gASncK -U+4jwBgXT2U0PsxP5zQB8+EZodQpXZXT+s0Ie7u1QQ5h8JHONBYHlhCMGoQIWJRp -RjWocNCZM5UkEe3rIcld7b9rRtMAOsn6Co1Q+zn+ADCVDpqqlBdd5AcF+z6VaREg -mUlBuFLegn/Xsl5t2ALcPuW9rQZ5+JdDlyi5AU21fPALkMb/mLFieIc5D1h7pWm9 -PUqnba+z8xLpfp0Kl1bRBhjJJKi3rUNv1WvO2xV+ABP76vrVkGDhoFB+UBKsfc8i -vZ84xECc6F9gsVLLlUGM4pLrpv1vqz++NT5j0hci/ioqja9UusAog86Txag9SHzl -/l7WwfRwyI/nTrDJ05br0vz2oTGCQKVflnajxfiWyZsbiBPaQxZ3bKlpPeRNPigZ -fn5dOH1ltO501rIxnVYymDio/ZNmMAuaucwddwyPg501KTWVqrxcY9qk7m4HdS4t -5IQDX11iet1ZAHx4S0ez -=TW1w +iQIcBAEBCAAGBQJUltdFAAoJEC7dUkA7aK9HwbYP/R/36PFR8XlbHcXxwriXJAYs +9EDw6LyPtf6EMZyvYMTPJflAEGzDwDCV9nqUFa8N92sATWuQ+UXb9fQjbiLay/Bq +D+81Ww5aWZxIaGvUoS+nBjfMEhTsVrnv8/5diWostERbjXHSDlISh0hsB/WWcjWN +C/ycY+/8cXx3jWFytYZOyP9uJJNuIUakXb5RsZj+Z2Iq+clIzszQOcqVjpQicFlA +LkA1RLR55UOzhlYhm1LOj4ZINPd3nL5snjqdG7fCgfeWXuAxnS1KO7DZQ8Zg4TAb +lgMJqHuZ3DheLoJdIHHSAPK/MfXRqXkESU0y/bZp9Ve9JAX1CzKQaxuRpLzjG2EL +kGgN4ga3bu5noFgsmr0o0/IZRxnSIuoL67WyAkEMoShKQgBaxOKpO1tEg/MhQ01L +ItnmtrgrOL2fcBX+3qdd7dSqNfUEjqpsT6i1CbE7b0Gp24sxgr2cCmb+M8Ps/dZP +rh119iE4zuEI5CNjrtxc7Hn14P0CDD+eSZOQNOuG+kHC0kSrrINwXSf0QnNkTn9I +VuYp3bSD5gghikCO4ClRPxgsSDtQIHwUj0ifEjWn2TdLpnl2lUHxIPmirNynav3p +n9aQFDlhTTxRcVa8fgfXjjah+YFhcDW8qQtxL35mF4eh1cLpAuYdtAC8/hc5OKo6 +sVXfm9/e9wvu9ur+VCIE +=+YQn -----END PGP SIGNATURE----- diff --git a/sec-policy/selinux-base/selinux-base-2.20140311-r1.ebuild b/sec-policy/selinux-base/selinux-base-2.20140311-r1.ebuild deleted file mode 100644 index 52cd48da8a92..000000000000 --- a/sec-policy/selinux-base/selinux-base-2.20140311-r1.ebuild +++ /dev/null @@ -1,161 +0,0 @@ -# Copyright 1999-2014 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base/selinux-base-2.20140311-r1.ebuild,v 1.2 2014/04/19 15:51:20 swift Exp $ -EAPI="4" - -inherit eutils - -IUSE="+peer_perms +open_perms +ubac +unconfined doc" - -DESCRIPTION="Gentoo base policy for SELinux" -HOMEPAGE="http://www.gentoo.org/proj/en/hardened/selinux/" -SRC_URI="http://oss.tresys.com/files/refpolicy/refpolicy-${PV}.tar.bz2 - http://dev.gentoo.org/~swift/patches/selinux-base-policy/patchbundle-selinux-base-policy-${PVR}.tar.bz2" -LICENSE="GPL-2" -SLOT="0" - -KEYWORDS="amd64 x86" - -RDEPEND=">=sys-apps/policycoreutils-2.1.10 - virtual/udev - !<=sec-policy/selinux-base-policy-2.20130424" -DEPEND="${RDEPEND} - sys-devel/m4 - >=sys-apps/checkpolicy-2.1.8" - -S=${WORKDIR}/ - -src_prepare() { - # Apply the gentoo patches to the policy. These patches are only necessary - # for base policies, or for interface changes on modules. - EPATCH_MULTI_MSG="Applying SELinux policy updates ... " \ - EPATCH_SUFFIX="patch" \ - EPATCH_SOURCE="${WORKDIR}" \ - EPATCH_FORCE="yes" \ - epatch - - cd "${S}/refpolicy" - make bare - # Fix bug 257111 - Correct the initial sid for cron-started jobs in the - # system_r role - sed -i -e 's:system_crond_t:system_cronjob_t:g' \ - "${S}/refpolicy/config/appconfig-standard/default_contexts" - sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \ - "${S}/refpolicy/config/appconfig-mls/default_contexts" - sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \ - "${S}/refpolicy/config/appconfig-mcs/default_contexts" - - epatch_user -} - -src_configure() { - [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" - - # Update the SELinux refpolicy capabilities based on the users' USE flags. - - if ! use peer_perms; then - sed -i -e '/network_peer_controls/d' \ - "${S}/refpolicy/policy/policy_capabilities" - fi - - if ! use open_perms; then - sed -i -e '/open_perms/d' \ - "${S}/refpolicy/policy/policy_capabilities" - fi - - if ! use ubac; then - sed -i -e '/^UBAC/s/y/n/' "${S}/refpolicy/build.conf" \ - || die "Failed to disable User Based Access Control" - fi - - echo "DISTRO = gentoo" >> "${S}/refpolicy/build.conf" - - # Prepare initial configuration - cd "${S}/refpolicy"; - make conf || die "Make conf failed" - - # Setup the policies based on the types delivered by the end user. - # These types can be "targeted", "strict", "mcs" and "mls". - for i in ${POLICY_TYPES}; do - cp -a "${S}/refpolicy" "${S}/${i}" - cd "${S}/${i}"; - - #cp "${FILESDIR}/modules-2.20120215.conf" "${S}/${i}/policy/modules.conf" - sed -i -e "/= module/d" "${S}/${i}/policy/modules.conf" - - sed -i -e '/^QUIET/s/n/y/' -e "/^NAME/s/refpolicy/$i/" \ - "${S}/${i}/build.conf" || die "build.conf setup failed." - - if [[ "${i}" == "mls" ]] || [[ "${i}" == "mcs" ]]; - then - # MCS/MLS require additional settings - sed -i -e "/^TYPE/s/standard/${i}/" "${S}/${i}/build.conf" \ - || die "failed to set type to mls" - fi - - if [ "${i}" == "targeted" ]; then - sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \ - "${S}/${i}/config/appconfig-standard/seusers" \ - || die "targeted seusers setup failed." - fi - - if [ "${i}" != "targeted" ] && [ "${i}" != "strict" ] && use unconfined; then - sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \ - "${S}/${i}/config/appconfig-${i}/seusers" \ - || die "policy seusers setup failed." - fi - done -} - -src_compile() { - [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" - - for i in ${POLICY_TYPES}; do - cd "${S}/${i}" - make base || die "${i} compile failed" - if use doc; then - make html || die - fi - done -} - -src_install() { - [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" - - for i in ${POLICY_TYPES}; do - cd "${S}/${i}" - - make DESTDIR="${D}" install \ - || die "${i} install failed." - - make DESTDIR="${D}" install-headers \ - || die "${i} headers install failed." - - echo "run_init_t" > "${D}/etc/selinux/${i}/contexts/run_init_type" - - echo "textrel_shlib_t" >> "${D}/etc/selinux/${i}/contexts/customizable_types" - - # libsemanage won't make this on its own - keepdir "/etc/selinux/${i}/policy" - - if use doc; then - dohtml doc/html/*; - fi - - insinto /usr/share/selinux/devel; - doins doc/policy.xml; - - done - - dodoc doc/Makefile.example doc/example.{te,fc,if} - - doman man/man8/*.8; - - insinto /etc/selinux - doins "${FILESDIR}/config" -} - -pkg_preinst() { - has_version "<${CATEGORY}/${PN}-2.20101213-r13" - previous_less_than_r13=$? -} diff --git a/sec-policy/selinux-base/selinux-base-2.20140311-r2.ebuild b/sec-policy/selinux-base/selinux-base-2.20140311-r2.ebuild deleted file mode 100644 index 8121c0332c02..000000000000 --- a/sec-policy/selinux-base/selinux-base-2.20140311-r2.ebuild +++ /dev/null @@ -1,161 +0,0 @@ -# Copyright 1999-2014 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base/selinux-base-2.20140311-r2.ebuild,v 1.2 2014/05/29 20:23:20 swift Exp $ -EAPI="4" - -inherit eutils - -IUSE="+peer_perms +open_perms +ubac +unconfined doc" - -DESCRIPTION="Gentoo base policy for SELinux" -HOMEPAGE="http://www.gentoo.org/proj/en/hardened/selinux/" -SRC_URI="http://oss.tresys.com/files/refpolicy/refpolicy-${PV}.tar.bz2 - http://dev.gentoo.org/~swift/patches/selinux-base-policy/patchbundle-selinux-base-policy-${PVR}.tar.bz2" -LICENSE="GPL-2" -SLOT="0" - -KEYWORDS="amd64 x86" - -RDEPEND=">=sys-apps/policycoreutils-2.1.10 - virtual/udev - !<=sec-policy/selinux-base-policy-2.20130424" -DEPEND="${RDEPEND} - sys-devel/m4 - >=sys-apps/checkpolicy-2.1.8" - -S=${WORKDIR}/ - -src_prepare() { - # Apply the gentoo patches to the policy. These patches are only necessary - # for base policies, or for interface changes on modules. - EPATCH_MULTI_MSG="Applying SELinux policy updates ... " \ - EPATCH_SUFFIX="patch" \ - EPATCH_SOURCE="${WORKDIR}" \ - EPATCH_FORCE="yes" \ - epatch - - cd "${S}/refpolicy" - make bare - # Fix bug 257111 - Correct the initial sid for cron-started jobs in the - # system_r role - sed -i -e 's:system_crond_t:system_cronjob_t:g' \ - "${S}/refpolicy/config/appconfig-standard/default_contexts" - sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \ - "${S}/refpolicy/config/appconfig-mls/default_contexts" - sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \ - "${S}/refpolicy/config/appconfig-mcs/default_contexts" - - epatch_user -} - -src_configure() { - [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" - - # Update the SELinux refpolicy capabilities based on the users' USE flags. - - if ! use peer_perms; then - sed -i -e '/network_peer_controls/d' \ - "${S}/refpolicy/policy/policy_capabilities" - fi - - if ! use open_perms; then - sed -i -e '/open_perms/d' \ - "${S}/refpolicy/policy/policy_capabilities" - fi - - if ! use ubac; then - sed -i -e '/^UBAC/s/y/n/' "${S}/refpolicy/build.conf" \ - || die "Failed to disable User Based Access Control" - fi - - echo "DISTRO = gentoo" >> "${S}/refpolicy/build.conf" - - # Prepare initial configuration - cd "${S}/refpolicy"; - make conf || die "Make conf failed" - - # Setup the policies based on the types delivered by the end user. - # These types can be "targeted", "strict", "mcs" and "mls". - for i in ${POLICY_TYPES}; do - cp -a "${S}/refpolicy" "${S}/${i}" - cd "${S}/${i}"; - - #cp "${FILESDIR}/modules-2.20120215.conf" "${S}/${i}/policy/modules.conf" - sed -i -e "/= module/d" "${S}/${i}/policy/modules.conf" - - sed -i -e '/^QUIET/s/n/y/' -e "/^NAME/s/refpolicy/$i/" \ - "${S}/${i}/build.conf" || die "build.conf setup failed." - - if [[ "${i}" == "mls" ]] || [[ "${i}" == "mcs" ]]; - then - # MCS/MLS require additional settings - sed -i -e "/^TYPE/s/standard/${i}/" "${S}/${i}/build.conf" \ - || die "failed to set type to mls" - fi - - if [ "${i}" == "targeted" ]; then - sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \ - "${S}/${i}/config/appconfig-standard/seusers" \ - || die "targeted seusers setup failed." - fi - - if [ "${i}" != "targeted" ] && [ "${i}" != "strict" ] && use unconfined; then - sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \ - "${S}/${i}/config/appconfig-${i}/seusers" \ - || die "policy seusers setup failed." - fi - done -} - -src_compile() { - [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" - - for i in ${POLICY_TYPES}; do - cd "${S}/${i}" - make base || die "${i} compile failed" - if use doc; then - make html || die - fi - done -} - -src_install() { - [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" - - for i in ${POLICY_TYPES}; do - cd "${S}/${i}" - - make DESTDIR="${D}" install \ - || die "${i} install failed." - - make DESTDIR="${D}" install-headers \ - || die "${i} headers install failed." - - echo "run_init_t" > "${D}/etc/selinux/${i}/contexts/run_init_type" - - echo "textrel_shlib_t" >> "${D}/etc/selinux/${i}/contexts/customizable_types" - - # libsemanage won't make this on its own - keepdir "/etc/selinux/${i}/policy" - - if use doc; then - dohtml doc/html/*; - fi - - insinto /usr/share/selinux/devel; - doins doc/policy.xml; - - done - - dodoc doc/Makefile.example doc/example.{te,fc,if} - - doman man/man8/*.8; - - insinto /etc/selinux - doins "${FILESDIR}/config" -} - -pkg_preinst() { - has_version "<${CATEGORY}/${PN}-2.20101213-r13" - previous_less_than_r13=$? -} diff --git a/sec-policy/selinux-base/selinux-base-2.20140311-r3.ebuild b/sec-policy/selinux-base/selinux-base-2.20140311-r3.ebuild deleted file mode 100644 index 6d3955c1bcc1..000000000000 --- a/sec-policy/selinux-base/selinux-base-2.20140311-r3.ebuild +++ /dev/null @@ -1,161 +0,0 @@ -# Copyright 1999-2014 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base/selinux-base-2.20140311-r3.ebuild,v 1.2 2014/08/01 21:04:23 swift Exp $ -EAPI="5" - -inherit eutils - -IUSE="+peer_perms +open_perms +ubac +unconfined doc" - -DESCRIPTION="Gentoo base policy for SELinux" -HOMEPAGE="http://www.gentoo.org/proj/en/hardened/selinux/" -SRC_URI="http://oss.tresys.com/files/refpolicy/refpolicy-${PV}.tar.bz2 - http://dev.gentoo.org/~swift/patches/selinux-base-policy/patchbundle-selinux-base-policy-${PVR}.tar.bz2" -LICENSE="GPL-2" -SLOT="0" - -KEYWORDS="amd64 x86" - -RDEPEND=">=sys-apps/policycoreutils-2.1.10 - virtual/udev - !<=sec-policy/selinux-base-policy-2.20130424" -DEPEND="${RDEPEND} - sys-devel/m4 - >=sys-apps/checkpolicy-2.1.8" - -S=${WORKDIR}/ - -src_prepare() { - # Apply the gentoo patches to the policy. These patches are only necessary - # for base policies, or for interface changes on modules. - EPATCH_MULTI_MSG="Applying SELinux policy updates ... " \ - EPATCH_SUFFIX="patch" \ - EPATCH_SOURCE="${WORKDIR}" \ - EPATCH_FORCE="yes" \ - epatch - - cd "${S}/refpolicy" - make bare - # Fix bug 257111 - Correct the initial sid for cron-started jobs in the - # system_r role - sed -i -e 's:system_crond_t:system_cronjob_t:g' \ - "${S}/refpolicy/config/appconfig-standard/default_contexts" - sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \ - "${S}/refpolicy/config/appconfig-mls/default_contexts" - sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \ - "${S}/refpolicy/config/appconfig-mcs/default_contexts" - - epatch_user -} - -src_configure() { - [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" - - # Update the SELinux refpolicy capabilities based on the users' USE flags. - - if ! use peer_perms; then - sed -i -e '/network_peer_controls/d' \ - "${S}/refpolicy/policy/policy_capabilities" - fi - - if ! use open_perms; then - sed -i -e '/open_perms/d' \ - "${S}/refpolicy/policy/policy_capabilities" - fi - - if ! use ubac; then - sed -i -e '/^UBAC/s/y/n/' "${S}/refpolicy/build.conf" \ - || die "Failed to disable User Based Access Control" - fi - - echo "DISTRO = gentoo" >> "${S}/refpolicy/build.conf" - - # Prepare initial configuration - cd "${S}/refpolicy"; - make conf || die "Make conf failed" - - # Setup the policies based on the types delivered by the end user. - # These types can be "targeted", "strict", "mcs" and "mls". - for i in ${POLICY_TYPES}; do - cp -a "${S}/refpolicy" "${S}/${i}" - cd "${S}/${i}"; - - #cp "${FILESDIR}/modules-2.20120215.conf" "${S}/${i}/policy/modules.conf" - sed -i -e "/= module/d" "${S}/${i}/policy/modules.conf" - - sed -i -e '/^QUIET/s/n/y/' -e "/^NAME/s/refpolicy/$i/" \ - "${S}/${i}/build.conf" || die "build.conf setup failed." - - if [[ "${i}" == "mls" ]] || [[ "${i}" == "mcs" ]]; - then - # MCS/MLS require additional settings - sed -i -e "/^TYPE/s/standard/${i}/" "${S}/${i}/build.conf" \ - || die "failed to set type to mls" - fi - - if [ "${i}" == "targeted" ]; then - sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \ - "${S}/${i}/config/appconfig-standard/seusers" \ - || die "targeted seusers setup failed." - fi - - if [ "${i}" != "targeted" ] && [ "${i}" != "strict" ] && use unconfined; then - sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \ - "${S}/${i}/config/appconfig-${i}/seusers" \ - || die "policy seusers setup failed." - fi - done -} - -src_compile() { - [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" - - for i in ${POLICY_TYPES}; do - cd "${S}/${i}" - make base || die "${i} compile failed" - if use doc; then - make html || die - fi - done -} - -src_install() { - [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" - - for i in ${POLICY_TYPES}; do - cd "${S}/${i}" - - make DESTDIR="${D}" install \ - || die "${i} install failed." - - make DESTDIR="${D}" install-headers \ - || die "${i} headers install failed." - - echo "run_init_t" > "${D}/etc/selinux/${i}/contexts/run_init_type" - - echo "textrel_shlib_t" >> "${D}/etc/selinux/${i}/contexts/customizable_types" - - # libsemanage won't make this on its own - keepdir "/etc/selinux/${i}/policy" - - if use doc; then - dohtml doc/html/*; - fi - - insinto /usr/share/selinux/devel; - doins doc/policy.xml; - - done - - dodoc doc/Makefile.example doc/example.{te,fc,if} - - doman man/man8/*.8; - - insinto /etc/selinux - doins "${FILESDIR}/config" -} - -pkg_preinst() { - has_version "<${CATEGORY}/${PN}-2.20101213-r13" - previous_less_than_r13=$? -} diff --git a/sec-policy/selinux-base/selinux-base-2.20140311-r4.ebuild b/sec-policy/selinux-base/selinux-base-2.20140311-r4.ebuild deleted file mode 100644 index e5b5390ddf56..000000000000 --- a/sec-policy/selinux-base/selinux-base-2.20140311-r4.ebuild +++ /dev/null @@ -1,161 +0,0 @@ -# Copyright 1999-2014 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sec-policy/selinux-base/selinux-base-2.20140311-r4.ebuild,v 1.1 2014/08/01 21:04:23 swift Exp $ -EAPI="5" - -inherit eutils - -IUSE="+peer_perms +open_perms +ubac +unconfined doc" - -DESCRIPTION="Gentoo base policy for SELinux" -HOMEPAGE="http://www.gentoo.org/proj/en/hardened/selinux/" -SRC_URI="http://oss.tresys.com/files/refpolicy/refpolicy-${PV}.tar.bz2 - http://dev.gentoo.org/~swift/patches/selinux-base-policy/patchbundle-selinux-base-policy-${PVR}.tar.bz2" -LICENSE="GPL-2" -SLOT="0" - -KEYWORDS="~amd64 ~x86" - -RDEPEND=">=sys-apps/policycoreutils-2.1.10 - virtual/udev - !<=sec-policy/selinux-base-policy-2.20130424" -DEPEND="${RDEPEND} - sys-devel/m4 - >=sys-apps/checkpolicy-2.1.8" - -S=${WORKDIR}/ - -src_prepare() { - # Apply the gentoo patches to the policy. These patches are only necessary - # for base policies, or for interface changes on modules. - EPATCH_MULTI_MSG="Applying SELinux policy updates ... " \ - EPATCH_SUFFIX="patch" \ - EPATCH_SOURCE="${WORKDIR}" \ - EPATCH_FORCE="yes" \ - epatch - - cd "${S}/refpolicy" - make bare - # Fix bug 257111 - Correct the initial sid for cron-started jobs in the - # system_r role - sed -i -e 's:system_crond_t:system_cronjob_t:g' \ - "${S}/refpolicy/config/appconfig-standard/default_contexts" - sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \ - "${S}/refpolicy/config/appconfig-mls/default_contexts" - sed -i -e 's|system_r:cronjob_t|system_r:system_cronjob_t|g' \ - "${S}/refpolicy/config/appconfig-mcs/default_contexts" - - epatch_user -} - -src_configure() { - [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" - - # Update the SELinux refpolicy capabilities based on the users' USE flags. - - if ! use peer_perms; then - sed -i -e '/network_peer_controls/d' \ - "${S}/refpolicy/policy/policy_capabilities" - fi - - if ! use open_perms; then - sed -i -e '/open_perms/d' \ - "${S}/refpolicy/policy/policy_capabilities" - fi - - if ! use ubac; then - sed -i -e '/^UBAC/s/y/n/' "${S}/refpolicy/build.conf" \ - || die "Failed to disable User Based Access Control" - fi - - echo "DISTRO = gentoo" >> "${S}/refpolicy/build.conf" - - # Prepare initial configuration - cd "${S}/refpolicy"; - make conf || die "Make conf failed" - - # Setup the policies based on the types delivered by the end user. - # These types can be "targeted", "strict", "mcs" and "mls". - for i in ${POLICY_TYPES}; do - cp -a "${S}/refpolicy" "${S}/${i}" - cd "${S}/${i}"; - - #cp "${FILESDIR}/modules-2.20120215.conf" "${S}/${i}/policy/modules.conf" - sed -i -e "/= module/d" "${S}/${i}/policy/modules.conf" - - sed -i -e '/^QUIET/s/n/y/' -e "/^NAME/s/refpolicy/$i/" \ - "${S}/${i}/build.conf" || die "build.conf setup failed." - - if [[ "${i}" == "mls" ]] || [[ "${i}" == "mcs" ]]; - then - # MCS/MLS require additional settings - sed -i -e "/^TYPE/s/standard/${i}/" "${S}/${i}/build.conf" \ - || die "failed to set type to mls" - fi - - if [ "${i}" == "targeted" ]; then - sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \ - "${S}/${i}/config/appconfig-standard/seusers" \ - || die "targeted seusers setup failed." - fi - - if [ "${i}" != "targeted" ] && [ "${i}" != "strict" ] && use unconfined; then - sed -i -e '/root/d' -e 's/user_u/unconfined_u/' \ - "${S}/${i}/config/appconfig-${i}/seusers" \ - || die "policy seusers setup failed." - fi - done -} - -src_compile() { - [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" - - for i in ${POLICY_TYPES}; do - cd "${S}/${i}" - make base || die "${i} compile failed" - if use doc; then - make html || die - fi - done -} - -src_install() { - [ -z "${POLICY_TYPES}" ] && local POLICY_TYPES="targeted strict mls mcs" - - for i in ${POLICY_TYPES}; do - cd "${S}/${i}" - - make DESTDIR="${D}" install \ - || die "${i} install failed." - - make DESTDIR="${D}" install-headers \ - || die "${i} headers install failed." - - echo "run_init_t" > "${D}/etc/selinux/${i}/contexts/run_init_type" - - echo "textrel_shlib_t" >> "${D}/etc/selinux/${i}/contexts/customizable_types" - - # libsemanage won't make this on its own - keepdir "/etc/selinux/${i}/policy" - - if use doc; then - dohtml doc/html/*; - fi - - insinto /usr/share/selinux/devel; - doins doc/policy.xml; - - done - - dodoc doc/Makefile.example doc/example.{te,fc,if} - - doman man/man8/*.8; - - insinto /etc/selinux - doins "${FILESDIR}/config" -} - -pkg_preinst() { - has_version "<${CATEGORY}/${PN}-2.20101213-r13" - previous_less_than_r13=$? -} |