commit: 2604791d633c251fd23fe80427d1902b6afe5642 Author: Anthony G. Basile <blueness <AT> gentoo <DOT> org> AuthorDate: Mon Mar 26 14:58:08 2018 +0000 Commit: Anthony G. Basile <blueness <AT> gentoo <DOT> org> CommitDate: Mon Mar 26 14:58:08 2018 +0000 URL: https://gitweb.gentoo.org/proj/musl.git/commit/?id=2604791d
sys-apps/sandbox: remove older versions Package-Manager: Portage-2.3.24, Repoman-2.3.6 sys-apps/sandbox/Manifest | 3 +- .../sandbox/files/sandbox-2.10-disable-same.patch | 77 ------------- .../sandbox/files/sandbox-2.10-fix-opendir.patch | 79 ------------- .../files/sandbox-2.10-memory-corruption.patch | 42 ------- .../files/sandbox-2.11-symlinkat-renameat.patch | 124 --------------------- sys-apps/sandbox/files/sandbox-2.6-musl.patch | 48 -------- sys-apps/sandbox/sandbox-2.10-r3.ebuild | 86 -------------- sys-apps/sandbox/sandbox-2.10-r4.ebuild | 87 --------------- 8 files changed, 1 insertion(+), 545 deletions(-) diff --git a/sys-apps/sandbox/Manifest b/sys-apps/sandbox/Manifest index fce1f0b..ef5db1c 100644 --- a/sys-apps/sandbox/Manifest +++ b/sys-apps/sandbox/Manifest @@ -1,3 +1,2 @@ -DIST sandbox-2.10.tar.xz 417068 SHA256 019d6a2646b3a5f9b6fc3fcb6ff99332901017eb845442bec8573b9901506fa6 SHA512 178b3b8fcb54e6ff67df1c8101866739b49e4d31a66717c21ef502dd2ab609fca70f1a0c662b913e207bfc1ba6994cefdcf5c92ff32add9dd98bd9707f301305 WHIRLPOOL 5d6cffa7317cafeba02af75de9ae914d4365a62b54d3dfcc14cb272e621f2f76a60a945591ccb57dd59d6750152087cb2f21e43ded3ec181d6b42df173147192 -DIST sandbox-2.12.tar.xz 424252 SHA256 265a490a8c528237c55ad26dfd7f62336fa5727c82358fc9cfbaa2e52c47fc50 SHA512 98bd2ee8807d81e65ee0c9f11cfaf2b37da2ee4d8763c68d18c0ff6b14f3cc847ae2d3a0aa30cbe86063a2108ed4d4dcf7cc3fc4f37cb7549d266d4c1989c2a9 WHIRLPOOL 4f3089746a11616c60057165f387122b74e8d2f30a2d77db296405a2b6f401fc625645bca73092436162f5d98a88bfb2a3b42909b0eceb9a59ab810d803441b0 +DIST sandbox-2.12.tar.xz 424252 BLAKE2B 55eb06cbc15ad9ff8b0c272b8d071591ce3533a6ff807719df79131e6c966d60c3b37d9d8e4e1d466df0992836c4594bf6927b496ecb343a71d7b0656219a6d7 SHA512 98bd2ee8807d81e65ee0c9f11cfaf2b37da2ee4d8763c68d18c0ff6b14f3cc847ae2d3a0aa30cbe86063a2108ed4d4dcf7cc3fc4f37cb7549d266d4c1989c2a9 DIST sandbox-2.13.tar.xz 424968 BLAKE2B efcbf527853e8cfe8b3fec026041f55f51cba78029f92195ec76a45e84cb2b6cc129267c6e50608584607de72a86b2e7836e77f20677de9b94bb5c40999e4712 SHA512 46ad79335e51a1ec0aaa34ab5eeabe9d007818c518682409c5aaf97d49ec23021ece8fa53264ce5332cdd04ef6b3fd9beff0dc0a3cb5dfe2f9b6a6e359f8c1cf diff --git a/sys-apps/sandbox/files/sandbox-2.10-disable-same.patch b/sys-apps/sandbox/files/sandbox-2.10-disable-same.patch deleted file mode 100644 index 296b322..0000000 --- a/sys-apps/sandbox/files/sandbox-2.10-disable-same.patch +++ /dev/null @@ -1,77 +0,0 @@ -From 7a923f646ce10b7dec3c7ae5fe2079c10aa21752 Mon Sep 17 00:00:00 2001 -From: Mike Frysinger <vap...@gentoo.org> -Date: Sun, 20 Dec 2015 16:08:16 -0500 -Subject: [PATCH] libsbutil: gnulib: hand disable same_name usage - -We don't provide same_name because the one caller we don't use, but it -relies on gc-sections to avoid link errors. That flag doesn't work on -ia64 though, so we need to hand delete the one caller. Ugh. - -Signed-off-by: Mike Frysinger <vap...@gentoo.org> ---- - libsbutil/gnulib/hash-triple.c | 9 --------- - libsbutil/gnulib/same.h | 25 ------------------------- - 2 files changed, 34 deletions(-) - delete mode 100644 libsbutil/gnulib/same.h - -diff --git a/libsbutil/gnulib/hash-triple.c b/libsbutil/gnulib/hash-triple.c -index c3b6d9f..06cfbdf 100644 ---- a/libsbutil/gnulib/hash-triple.c -+++ b/libsbutil/gnulib/hash-triple.c -@@ -24,7 +24,6 @@ - #include <string.h> - - #include "hash-pjw.h" --#include "same.h" - #include "same-inode.h" - - #define STREQ(a, b) (strcmp (a, b) == 0) -@@ -52,14 +51,6 @@ triple_hash_no_name (void const *x, size_t table_size) - - /* Compare two F_triple structs. */ - bool --triple_compare (void const *x, void const *y) --{ -- struct F_triple const *a = x; -- struct F_triple const *b = y; -- return (SAME_INODE (*a, *b) && same_name (a->name, b->name)) ? true : false; --} -- --bool - triple_compare_ino_str (void const *x, void const *y) - { - struct F_triple const *a = x; -diff --git a/libsbutil/gnulib/same.h b/libsbutil/gnulib/same.h -deleted file mode 100644 -index ee313c5..0000000 ---- a/libsbutil/gnulib/same.h -+++ /dev/null -@@ -1,25 +0,0 @@ --/* Determine whether two file names refer to the same file. -- -- Copyright (C) 1997-2000, 2003-2004, 2009-2015 Free Software Foundation, Inc. -- -- This program is free software: you can redistribute it and/or modify -- it under the terms of the GNU General Public License as published by -- the Free Software Foundation; either version 3 of the License, or -- (at your option) any later version. -- -- This program is distributed in the hope that it will be useful, -- but WITHOUT ANY WARRANTY; without even the implied warranty of -- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -- GNU General Public License for more details. -- -- You should have received a copy of the GNU General Public License -- along with this program. If not, see <http://www.gnu.org/licenses/>. */ -- --#ifndef SAME_H_ --# define SAME_H_ 1 -- --# include <stdbool.h> -- --bool same_name (const char *source, const char *dest); -- --#endif /* SAME_H_ */ --- -2.6.2 - diff --git a/sys-apps/sandbox/files/sandbox-2.10-fix-opendir.patch b/sys-apps/sandbox/files/sandbox-2.10-fix-opendir.patch deleted file mode 100644 index 2ff89bc..0000000 --- a/sys-apps/sandbox/files/sandbox-2.10-fix-opendir.patch +++ /dev/null @@ -1,79 +0,0 @@ -From 3f668dc6ba1910085e61b3a24167ab1352c60d92 Mon Sep 17 00:00:00 2001 -From: Mart Raudsepp <l...@gentoo.org> -Date: Fri, 11 Nov 2016 12:34:48 +0200 -Subject: [PATCH] libsandbox: do not abort with a long name to opendir - -Add a pre-check for opendir that catches too long name arguments -given to opendir, as it would get messed up and abort before it -even gets to the open*() syscall (which would handle it correctly), -due to opendir going through before_syscall/check_syscall, even -though it isn't a true syscall and it getting cut to SB_PATH_MAX -inbetween and getting confused somewhere. - -URL: https://bugs.gentoo.org/553092 -Signed-off-by: Mart Raudsepp <l...@gentoo.org> ---- - libsandbox/wrapper-funcs/opendir.c | 2 ++ - libsandbox/wrapper-funcs/opendir_pre_check.c | 26 ++++++++++++++++++++++++++ - libsandbox/wrappers.h | 1 + - 3 files changed, 29 insertions(+) - create mode 100644 libsandbox/wrapper-funcs/opendir_pre_check.c - -diff --git a/libsandbox/wrapper-funcs/opendir.c b/libsandbox/wrapper-funcs/opendir.c -index 7670775..70c2692 100644 ---- a/libsandbox/wrapper-funcs/opendir.c -+++ b/libsandbox/wrapper-funcs/opendir.c -@@ -10,4 +10,6 @@ - #define WRAPPER_SAFE() SB_SAFE(name) - #define WRAPPER_RET_TYPE DIR * - #define WRAPPER_RET_DEFAULT NULL -+#define WRAPPER_PRE_CHECKS() sb_opendir_pre_check(STRING_NAME, name) -+ - #include "__wrapper_simple.c" -diff --git a/libsandbox/wrapper-funcs/opendir_pre_check.c b/libsandbox/wrapper-funcs/opendir_pre_check.c -new file mode 100644 -index 0000000..60c869f ---- /dev/null -+++ b/libsandbox/wrapper-funcs/opendir_pre_check.c -@@ -0,0 +1,26 @@ -+/* -+ * opendir() pre-check. -+ * -+ * Copyright 1999-2016 Gentoo Foundation -+ * Licensed under the GPL-2 -+ */ -+ -+bool sb_opendir_pre_check(const char *func, const char *name) -+{ -+ /* If length of name is larger than PATH_MAX, we would mess it up -+ * before it reaches the open syscall, which would cleanly error out -+ * via sandbox as well (actually with much smaller lengths than even -+ * PATH_MAX). -+ * So error out early in this case, in order to avoid an abort in -+ * check_syscall later on, which gets ran for opendir, despite it not -+ * being a syscall. -+ */ -+ if (strnlen(name, PATH_MAX) == PATH_MAX) { -+ errno = ENAMETOOLONG; -+ sb_debug_dyn("EARLY FAIL: %s(%s): %s\n", -+ func, name, strerror(errno)); -+ return false; -+ } -+ -+ return true; -+} -diff --git a/libsandbox/wrappers.h b/libsandbox/wrappers.h -index 0aa58bb..bf5bf64 100644 ---- a/libsandbox/wrappers.h -+++ b/libsandbox/wrappers.h -@@ -27,6 +27,7 @@ attribute_hidden bool sb_fopen64_pre_check (const char *func, const char *pathn - attribute_hidden bool sb_mkdirat_pre_check (const char *func, const char *pathname, int dirfd); - attribute_hidden bool sb_openat_pre_check (const char *func, const char *pathname, int dirfd, int flags); - attribute_hidden bool sb_openat64_pre_check (const char *func, const char *pathname, int dirfd, int flags); -+attribute_hidden bool sb_opendir_pre_check (const char *func, const char *name); - attribute_hidden bool sb_unlinkat_pre_check (const char *func, const char *pathname, int dirfd); - attribute_hidden bool sb_common_at_pre_check(const char *func, const char **pathname, int dirfd, - char *dirfd_path, size_t dirfd_path_len); --- -2.9.0 - diff --git a/sys-apps/sandbox/files/sandbox-2.10-memory-corruption.patch b/sys-apps/sandbox/files/sandbox-2.10-memory-corruption.patch deleted file mode 100644 index 7dd27c9..0000000 --- a/sys-apps/sandbox/files/sandbox-2.10-memory-corruption.patch +++ /dev/null @@ -1,42 +0,0 @@ -From 529a388ebb1b4e9d6ad8a1bb61dd8211833a5976 Mon Sep 17 00:00:00 2001 -From: Denis Lisov <dennis.lis...@gmail.com> -Date: Sat, 19 Dec 2015 19:13:58 +0300 -Subject: [PATCH] libsandbox: fix old_malloc_size check on realloc - -Realloc uses SB_MALLOC_TO_SIZE assuming it returns the usable size, -while it is really the mmap size, which is greater. Thus it may fail -to reallocate even if required. - -URL: https://bugs.gentoo.org/568714 -Signed-off-by: Denis Lisov <dennis.lis...@gmail.com> -Signed-off-by: Mike Frysinger <vap...@gentoo.org> ---- - libsandbox/memory.c | 5 +++-- - 1 file changed, 3 insertions(+), 2 deletions(-) - -diff --git a/libsandbox/memory.c b/libsandbox/memory.c -index 8581128..a2d69a2 100644 ---- a/libsandbox/memory.c -+++ b/libsandbox/memory.c -@@ -40,7 +40,8 @@ static int sb_munmap(void *addr, size_t length) - - #define SB_MALLOC_TO_MMAP(ptr) ((void*)((uintptr_t)(ptr) - MIN_ALIGN)) - #define SB_MMAP_TO_MALLOC(ptr) ((void*)((uintptr_t)(ptr) + MIN_ALIGN)) --#define SB_MALLOC_TO_SIZE(ptr) (*((size_t*)SB_MALLOC_TO_MMAP(ptr))) -+#define SB_MALLOC_TO_MMAP_SIZE(ptr) (*((size_t*)SB_MALLOC_TO_MMAP(ptr))) -+#define SB_MALLOC_TO_SIZE(ptr) (SB_MALLOC_TO_MMAP_SIZE(ptr) - MIN_ALIGN) - - void *malloc(size_t size) - { -@@ -57,7 +58,7 @@ void free(void *ptr) - { - if (ptr == NULL) - return; -- if (munmap(SB_MALLOC_TO_MMAP(ptr), SB_MALLOC_TO_SIZE(ptr))) -+ if (munmap(SB_MALLOC_TO_MMAP(ptr), SB_MALLOC_TO_MMAP_SIZE(ptr))) - sb_ebort("sandbox memory corruption with free(%p): %s\n", - ptr, strerror(errno)); - } --- -2.6.2 - diff --git a/sys-apps/sandbox/files/sandbox-2.11-symlinkat-renameat.patch b/sys-apps/sandbox/files/sandbox-2.11-symlinkat-renameat.patch deleted file mode 100644 index e33011f..0000000 --- a/sys-apps/sandbox/files/sandbox-2.11-symlinkat-renameat.patch +++ /dev/null @@ -1,124 +0,0 @@ -From 4c47cfa22802fd8201586bef233d8161df4ff61b Mon Sep 17 00:00:00 2001 -From: Mike Frysinger <vap...@gentoo.org> -Date: Fri, 10 Mar 2017 10:15:50 -0800 -Subject: [PATCH] libsandbox: whitelist renameat/symlinkat as symlink funcs - -These funcs don't deref their path args, so flag them as such. - -URL: https://bugs.gentoo.org/612202 -Signed-off-by: Mike Frysinger <vap...@gentoo.org> ---- - libsandbox/libsandbox.c | 4 +++- - tests/renameat-2.sh | 12 ++++++++++++ - tests/renameat-3.sh | 11 +++++++++++ - tests/renameat.at | 2 ++ - tests/symlinkat-2.sh | 10 ++++++++++ - tests/symlinkat-3.sh | 9 +++++++++ - tests/symlinkat.at | 2 ++ - 7 files changed, 49 insertions(+), 1 deletion(-) - create mode 100755 tests/renameat-2.sh - create mode 100755 tests/renameat-3.sh - create mode 100755 tests/symlinkat-2.sh - create mode 100755 tests/symlinkat-3.sh - -diff --git a/libsandbox/libsandbox.c b/libsandbox/libsandbox.c -index e809308d717d..de48bd79ba53 100644 ---- a/libsandbox/libsandbox.c -+++ b/libsandbox/libsandbox.c -@@ -650,8 +650,10 @@ static bool symlink_func(int sb_nr, int flags, const char *abs_path) - sb_nr == SB_NR_LCHOWN || - sb_nr == SB_NR_REMOVE || - sb_nr == SB_NR_RENAME || -+ sb_nr == SB_NR_RENAMEAT || - sb_nr == SB_NR_RMDIR || -- sb_nr == SB_NR_SYMLINK)) -+ sb_nr == SB_NR_SYMLINK || -+ sb_nr == SB_NR_SYMLINKAT)) - { - /* These funcs sometimes operate on symlinks */ - if (!((sb_nr == SB_NR_FCHOWNAT || -diff --git a/tests/renameat-2.sh b/tests/renameat-2.sh -new file mode 100755 -index 000000000000..d0fbe8ae4574 ---- /dev/null -+++ b/tests/renameat-2.sh -@@ -0,0 +1,12 @@ -+#!/bin/sh -+# make sure we can clobber symlinks #612202 -+ -+addwrite $PWD -+ -+ln -s /asdf sym || exit 1 -+touch file -+renameat-0 0 AT_FDCWD file AT_FDCWD sym || exit 1 -+[ ! -e file ] -+[ ! -L sym ] -+[ -e sym ] -+test ! -s "${SANDBOX_LOG}" -diff --git a/tests/renameat-3.sh b/tests/renameat-3.sh -new file mode 100755 -index 000000000000..9ae5c9a6511a ---- /dev/null -+++ b/tests/renameat-3.sh -@@ -0,0 +1,11 @@ -+#!/bin/sh -+# make sure we reject bad renames #612202 -+ -+addwrite $PWD -+mkdir deny -+adddeny $PWD/deny -+ -+touch file -+renameat-0 -1,EACCES AT_FDCWD file AT_FDCWD deny/file || exit 1 -+[ -e file ] -+test -s "${SANDBOX_LOG}" -diff --git a/tests/renameat.at b/tests/renameat.at -index 081d7d20277e..eec4638deeaa 100644 ---- a/tests/renameat.at -+++ b/tests/renameat.at -@@ -1 +1,3 @@ - SB_CHECK(1) -+SB_CHECK(2) -+SB_CHECK(3) -diff --git a/tests/symlinkat-2.sh b/tests/symlinkat-2.sh -new file mode 100755 -index 000000000000..168362e8806f ---- /dev/null -+++ b/tests/symlinkat-2.sh -@@ -0,0 +1,10 @@ -+#!/bin/sh -+# make sure we can clobber symlinks #612202 -+ -+addwrite $PWD -+ -+symlinkat-0 0 /asdf AT_FDCWD ./sym || exit 1 -+[ -L sym ] -+symlinkat-0 -1,EEXIST /asdf AT_FDCWD ./sym || exit 1 -+[ -L sym ] -+test ! -s "${SANDBOX_LOG}" -diff --git a/tests/symlinkat-3.sh b/tests/symlinkat-3.sh -new file mode 100755 -index 000000000000..a01c750dd2b6 ---- /dev/null -+++ b/tests/symlinkat-3.sh -@@ -0,0 +1,9 @@ -+#!/bin/sh -+# make sure we reject bad symlinks #612202 -+ -+addwrite $PWD -+mkdir deny -+adddeny $PWD/deny -+ -+symlinkat-0 -1,EACCES ./ AT_FDCWD deny/sym || exit 1 -+test -s "${SANDBOX_LOG}" -diff --git a/tests/symlinkat.at b/tests/symlinkat.at -index 081d7d20277e..eec4638deeaa 100644 ---- a/tests/symlinkat.at -+++ b/tests/symlinkat.at -@@ -1 +1,3 @@ - SB_CHECK(1) -+SB_CHECK(2) -+SB_CHECK(3) --- -2.12.0 - diff --git a/sys-apps/sandbox/files/sandbox-2.6-musl.patch b/sys-apps/sandbox/files/sandbox-2.6-musl.patch deleted file mode 100644 index ee288d7..0000000 --- a/sys-apps/sandbox/files/sandbox-2.6-musl.patch +++ /dev/null @@ -1,48 +0,0 @@ -diff -Naur sandbox-2.6.orig/headers.h sandbox-2.6/headers.h ---- sandbox-2.6.orig/headers.h 2012-07-03 18:27:44.000000000 +0000 -+++ sandbox-2.6/headers.h 2014-05-22 13:57:55.225002786 +0000 -@@ -133,9 +133,11 @@ - #ifdef HAVE_ASM_PTRACE_H - # include <asm/ptrace.h> - #endif -+/* - #ifdef HAVE_LINUX_PTRACE_H - # include <linux/ptrace.h> - #endif -+*/ - #undef FU_ia64_fpreg - #undef FU_pt_all_user_regs - -diff -Naur sandbox-2.6.orig/libsandbox/trace.c sandbox-2.6/libsandbox/trace.c ---- sandbox-2.6.orig/libsandbox/trace.c 2014-05-22 13:58:25.215002800 +0000 -+++ sandbox-2.6/libsandbox/trace.c 2014-05-22 13:57:26.515002772 +0000 -@@ -9,7 +9,7 @@ - #include "wrappers.h" - #include "sb_nr.h" - --static long _do_ptrace(enum __ptrace_request request, const char *srequest, void *addr, void *data); -+static long _do_ptrace(int request, const char *srequest, void *addr, void *data); - #define do_ptrace(request, addr, data) _do_ptrace(request, #request, addr, data) - #define _trace_possible(data) true - -@@ -43,7 +43,7 @@ - _exit(status); - } - --static long _do_ptrace(enum __ptrace_request request, const char *srequest, void *addr, void *data) -+static long _do_ptrace(int request, const char *srequest, void *addr, void *data) - { - long ret; - try_again: -diff -Naur sandbox-2.6.orig/scripts/gen_symbol_header.awk sandbox-2.6/scripts/gen_symbol_header.awk ---- sandbox-2.6.orig/scripts/gen_symbol_header.awk 2014-05-22 13:58:25.235002800 +0000 -+++ sandbox-2.6/scripts/gen_symbol_header.awk 2014-05-22 13:57:26.520002772 +0000 -@@ -161,7 +161,7 @@ - else - printf("symbol_version(%s, %s, %s);\n", - sym_real_name, sym_index, symbol_array[2]); -- } else { -+ } else if (!(sym_index ~ 64)) { - # For non-versioned libc's we use strong aliases - printf("strong_alias(%s, %s);\n", sym_real_name, - sym_index); diff --git a/sys-apps/sandbox/sandbox-2.10-r3.ebuild b/sys-apps/sandbox/sandbox-2.10-r3.ebuild deleted file mode 100644 index bfef440..0000000 --- a/sys-apps/sandbox/sandbox-2.10-r3.ebuild +++ /dev/null @@ -1,86 +0,0 @@ -# Copyright 1999-2018 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 - -# -# don't monkey with this ebuild unless contacting portage devs. -# period. -# - -EAPI="5" - -inherit eutils flag-o-matic multilib-minimal multiprocessing pax-utils - -DESCRIPTION="sandbox'd LD_PRELOAD hack" -HOMEPAGE="https://www.gentoo.org/proj/en/portage/sandbox/" -SRC_URI="mirror://gentoo/${P}.tar.xz - https://dev.gentoo.org/~vapier/dist/${P}.tar.xz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="amd64 arm ia64 ~mips ppc sh sparc x86" -IUSE="" - -DEPEND="app-arch/xz-utils - >=app-misc/pax-utils-0.1.19" #265376 -RDEPEND="" - -has sandbox_death_notice ${EBUILD_DEATH_HOOKS} || EBUILD_DEATH_HOOKS="${EBUILD_DEATH_HOOKS} sandbox_death_notice" - -sandbox_death_notice() { - ewarn "If configure failed with a 'cannot run C compiled programs' error, try this:" - ewarn "FEATURES='-sandbox -usersandbox' emerge sandbox" -} - -src_prepare() { - epatch "${FILESDIR}"/${P}-memory-corruption.patch #568714 - epatch "${FILESDIR}"/${P}-disable-same.patch - epatch "${FILESDIR}"/${P}-fix-opendir.patch #553092 - epatch "${FILESDIR}"/${PN}-2.6-musl.patch - epatch "${FILESDIR}"/${P}-fix-visibility-musl.patch - epatch_user -} - -multilib_src_configure() { - filter-lfs-flags #90228 - - local myconf=() - host-is-pax && myconf+=( --disable-pch ) #301299 #425524 #572092 - - ECONF_SOURCE="${S}" \ - econf "${myconf[@]}" -} - -multilib_src_test() { - # Default sandbox build will run with --jobs set to # cpus. - emake check TESTSUITEFLAGS="--jobs=$(makeopts_jobs)" -} - -multilib_src_install_all() { - doenvd "${FILESDIR}"/09sandbox - - keepdir /var/log/sandbox - fowners root:portage /var/log/sandbox - fperms 0770 /var/log/sandbox - - cd "${S}" - dodoc AUTHORS ChangeLog* NEWS README -} - -pkg_preinst() { - chown root:portage "${ED}"/var/log/sandbox - chmod 0770 "${ED}"/var/log/sandbox - - if [[ ${REPLACING_VERSIONS} == 1.* ]] ; then - local old=$(find "${EROOT}"/lib* -maxdepth 1 -name 'libsandbox*') - if [[ -n ${old} ]] ; then - elog "Removing old sandbox libraries for you:" - find "${EROOT}"/lib* -maxdepth 1 -name 'libsandbox*' -print -delete - fi - fi -} - -pkg_postinst() { - if [[ ${REPLACING_VERSIONS} == 1.* ]] ; then - chmod 0755 "${EROOT}"/etc/sandbox.d #265376 - fi -} diff --git a/sys-apps/sandbox/sandbox-2.10-r4.ebuild b/sys-apps/sandbox/sandbox-2.10-r4.ebuild deleted file mode 100644 index d4cb058..0000000 --- a/sys-apps/sandbox/sandbox-2.10-r4.ebuild +++ /dev/null @@ -1,87 +0,0 @@ -# Copyright 1999-2018 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 - -# -# don't monkey with this ebuild unless contacting portage devs. -# period. -# - -EAPI="5" - -inherit eutils flag-o-matic multilib-minimal multiprocessing pax-utils - -DESCRIPTION="sandbox'd LD_PRELOAD hack" -HOMEPAGE="https://www.gentoo.org/proj/en/portage/sandbox/" -SRC_URI="mirror://gentoo/${P}.tar.xz - https://dev.gentoo.org/~vapier/dist/${P}.tar.xz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="amd64 arm ia64 ~mips ppc sh sparc x86" -IUSE="" - -DEPEND="app-arch/xz-utils - >=app-misc/pax-utils-0.1.19" #265376 -RDEPEND="" - -has sandbox_death_notice ${EBUILD_DEATH_HOOKS} || EBUILD_DEATH_HOOKS="${EBUILD_DEATH_HOOKS} sandbox_death_notice" - -sandbox_death_notice() { - ewarn "If configure failed with a 'cannot run C compiled programs' error, try this:" - ewarn "FEATURES='-sandbox -usersandbox' emerge sandbox" -} - -src_prepare() { - epatch "${FILESDIR}"/${P}-memory-corruption.patch #568714 - epatch "${FILESDIR}"/${P}-disable-same.patch - epatch "${FILESDIR}"/${P}-fix-opendir.patch #553092 - epatch "${FILESDIR}"/${PN}-2.11-symlinkat-renameat.patch #612202 - epatch "${FILESDIR}"/${PN}-2.6-musl.patch - epatch "${FILESDIR}"/${P}-fix-visibility-musl.patch - epatch_user -} - -multilib_src_configure() { - filter-lfs-flags #90228 - - local myconf=() - host-is-pax && myconf+=( --disable-pch ) #301299 #425524 #572092 - - ECONF_SOURCE="${S}" \ - econf "${myconf[@]}" -} - -multilib_src_test() { - # Default sandbox build will run with --jobs set to # cpus. - emake check TESTSUITEFLAGS="--jobs=$(makeopts_jobs)" -} - -multilib_src_install_all() { - doenvd "${FILESDIR}"/09sandbox - - keepdir /var/log/sandbox - fowners root:portage /var/log/sandbox - fperms 0770 /var/log/sandbox - - cd "${S}" - dodoc AUTHORS ChangeLog* NEWS README -} - -pkg_preinst() { - chown root:portage "${ED}"/var/log/sandbox - chmod 0770 "${ED}"/var/log/sandbox - - if [[ ${REPLACING_VERSIONS} == 1.* ]] ; then - local old=$(find "${EROOT}"/lib* -maxdepth 1 -name 'libsandbox*') - if [[ -n ${old} ]] ; then - elog "Removing old sandbox libraries for you:" - find "${EROOT}"/lib* -maxdepth 1 -name 'libsandbox*' -print -delete - fi - fi -} - -pkg_postinst() { - if [[ ${REPLACING_VERSIONS} == 1.* ]] ; then - chmod 0755 "${EROOT}"/etc/sandbox.d #265376 - fi -}