commit:     2604791d633c251fd23fe80427d1902b6afe5642
Author:     Anthony G. Basile <blueness <AT> gentoo <DOT> org>
AuthorDate: Mon Mar 26 14:58:08 2018 +0000
Commit:     Anthony G. Basile <blueness <AT> gentoo <DOT> org>
CommitDate: Mon Mar 26 14:58:08 2018 +0000
URL:        https://gitweb.gentoo.org/proj/musl.git/commit/?id=2604791d

sys-apps/sandbox: remove older versions

Package-Manager: Portage-2.3.24, Repoman-2.3.6

 sys-apps/sandbox/Manifest                          |   3 +-
 .../sandbox/files/sandbox-2.10-disable-same.patch  |  77 -------------
 .../sandbox/files/sandbox-2.10-fix-opendir.patch   |  79 -------------
 .../files/sandbox-2.10-memory-corruption.patch     |  42 -------
 .../files/sandbox-2.11-symlinkat-renameat.patch    | 124 ---------------------
 sys-apps/sandbox/files/sandbox-2.6-musl.patch      |  48 --------
 sys-apps/sandbox/sandbox-2.10-r3.ebuild            |  86 --------------
 sys-apps/sandbox/sandbox-2.10-r4.ebuild            |  87 ---------------
 8 files changed, 1 insertion(+), 545 deletions(-)

diff --git a/sys-apps/sandbox/Manifest b/sys-apps/sandbox/Manifest
index fce1f0b..ef5db1c 100644
--- a/sys-apps/sandbox/Manifest
+++ b/sys-apps/sandbox/Manifest
@@ -1,3 +1,2 @@
-DIST sandbox-2.10.tar.xz 417068 SHA256 
019d6a2646b3a5f9b6fc3fcb6ff99332901017eb845442bec8573b9901506fa6 SHA512 
178b3b8fcb54e6ff67df1c8101866739b49e4d31a66717c21ef502dd2ab609fca70f1a0c662b913e207bfc1ba6994cefdcf5c92ff32add9dd98bd9707f301305
 WHIRLPOOL 
5d6cffa7317cafeba02af75de9ae914d4365a62b54d3dfcc14cb272e621f2f76a60a945591ccb57dd59d6750152087cb2f21e43ded3ec181d6b42df173147192
-DIST sandbox-2.12.tar.xz 424252 SHA256 
265a490a8c528237c55ad26dfd7f62336fa5727c82358fc9cfbaa2e52c47fc50 SHA512 
98bd2ee8807d81e65ee0c9f11cfaf2b37da2ee4d8763c68d18c0ff6b14f3cc847ae2d3a0aa30cbe86063a2108ed4d4dcf7cc3fc4f37cb7549d266d4c1989c2a9
 WHIRLPOOL 
4f3089746a11616c60057165f387122b74e8d2f30a2d77db296405a2b6f401fc625645bca73092436162f5d98a88bfb2a3b42909b0eceb9a59ab810d803441b0
+DIST sandbox-2.12.tar.xz 424252 BLAKE2B 
55eb06cbc15ad9ff8b0c272b8d071591ce3533a6ff807719df79131e6c966d60c3b37d9d8e4e1d466df0992836c4594bf6927b496ecb343a71d7b0656219a6d7
 SHA512 
98bd2ee8807d81e65ee0c9f11cfaf2b37da2ee4d8763c68d18c0ff6b14f3cc847ae2d3a0aa30cbe86063a2108ed4d4dcf7cc3fc4f37cb7549d266d4c1989c2a9
 DIST sandbox-2.13.tar.xz 424968 BLAKE2B 
efcbf527853e8cfe8b3fec026041f55f51cba78029f92195ec76a45e84cb2b6cc129267c6e50608584607de72a86b2e7836e77f20677de9b94bb5c40999e4712
 SHA512 
46ad79335e51a1ec0aaa34ab5eeabe9d007818c518682409c5aaf97d49ec23021ece8fa53264ce5332cdd04ef6b3fd9beff0dc0a3cb5dfe2f9b6a6e359f8c1cf

diff --git a/sys-apps/sandbox/files/sandbox-2.10-disable-same.patch 
b/sys-apps/sandbox/files/sandbox-2.10-disable-same.patch
deleted file mode 100644
index 296b322..0000000
--- a/sys-apps/sandbox/files/sandbox-2.10-disable-same.patch
+++ /dev/null
@@ -1,77 +0,0 @@
-From 7a923f646ce10b7dec3c7ae5fe2079c10aa21752 Mon Sep 17 00:00:00 2001
-From: Mike Frysinger <vap...@gentoo.org>
-Date: Sun, 20 Dec 2015 16:08:16 -0500
-Subject: [PATCH] libsbutil: gnulib: hand disable same_name usage
-
-We don't provide same_name because the one caller we don't use, but it
-relies on gc-sections to avoid link errors.  That flag doesn't work on
-ia64 though, so we need to hand delete the one caller.  Ugh.
-
-Signed-off-by: Mike Frysinger <vap...@gentoo.org>
----
- libsbutil/gnulib/hash-triple.c |  9 ---------
- libsbutil/gnulib/same.h        | 25 -------------------------
- 2 files changed, 34 deletions(-)
- delete mode 100644 libsbutil/gnulib/same.h
-
-diff --git a/libsbutil/gnulib/hash-triple.c b/libsbutil/gnulib/hash-triple.c
-index c3b6d9f..06cfbdf 100644
---- a/libsbutil/gnulib/hash-triple.c
-+++ b/libsbutil/gnulib/hash-triple.c
-@@ -24,7 +24,6 @@
- #include <string.h>
- 
- #include "hash-pjw.h"
--#include "same.h"
- #include "same-inode.h"
- 
- #define STREQ(a, b) (strcmp (a, b) == 0)
-@@ -52,14 +51,6 @@ triple_hash_no_name (void const *x, size_t table_size)
- 
- /* Compare two F_triple structs.  */
- bool
--triple_compare (void const *x, void const *y)
--{
--  struct F_triple const *a = x;
--  struct F_triple const *b = y;
--  return (SAME_INODE (*a, *b) && same_name (a->name, b->name)) ? true : false;
--}
--
--bool
- triple_compare_ino_str (void const *x, void const *y)
- {
-   struct F_triple const *a = x;
-diff --git a/libsbutil/gnulib/same.h b/libsbutil/gnulib/same.h
-deleted file mode 100644
-index ee313c5..0000000
---- a/libsbutil/gnulib/same.h
-+++ /dev/null
-@@ -1,25 +0,0 @@
--/* Determine whether two file names refer to the same file.
--
--   Copyright (C) 1997-2000, 2003-2004, 2009-2015 Free Software Foundation, 
Inc.
--
--   This program is free software: you can redistribute it and/or modify
--   it under the terms of the GNU General Public License as published by
--   the Free Software Foundation; either version 3 of the License, or
--   (at your option) any later version.
--
--   This program is distributed in the hope that it will be useful,
--   but WITHOUT ANY WARRANTY; without even the implied warranty of
--   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
--   GNU General Public License for more details.
--
--   You should have received a copy of the GNU General Public License
--   along with this program.  If not, see <http://www.gnu.org/licenses/>.  */
--
--#ifndef SAME_H_
--# define SAME_H_ 1
--
--# include <stdbool.h>
--
--bool same_name (const char *source, const char *dest);
--
--#endif /* SAME_H_ */
--- 
-2.6.2
-

diff --git a/sys-apps/sandbox/files/sandbox-2.10-fix-opendir.patch 
b/sys-apps/sandbox/files/sandbox-2.10-fix-opendir.patch
deleted file mode 100644
index 2ff89bc..0000000
--- a/sys-apps/sandbox/files/sandbox-2.10-fix-opendir.patch
+++ /dev/null
@@ -1,79 +0,0 @@
-From 3f668dc6ba1910085e61b3a24167ab1352c60d92 Mon Sep 17 00:00:00 2001
-From: Mart Raudsepp <l...@gentoo.org>
-Date: Fri, 11 Nov 2016 12:34:48 +0200
-Subject: [PATCH] libsandbox: do not abort with a long name to opendir
-
-Add a pre-check for opendir that catches too long name arguments
-given to opendir, as it would get messed up and abort before it
-even gets to the open*() syscall (which would handle it correctly),
-due to opendir going through before_syscall/check_syscall, even
-though it isn't a true syscall and it getting cut to SB_PATH_MAX
-inbetween and getting confused somewhere.
-
-URL: https://bugs.gentoo.org/553092
-Signed-off-by: Mart Raudsepp <l...@gentoo.org>
----
- libsandbox/wrapper-funcs/opendir.c           |  2 ++
- libsandbox/wrapper-funcs/opendir_pre_check.c | 26 ++++++++++++++++++++++++++
- libsandbox/wrappers.h                        |  1 +
- 3 files changed, 29 insertions(+)
- create mode 100644 libsandbox/wrapper-funcs/opendir_pre_check.c
-
-diff --git a/libsandbox/wrapper-funcs/opendir.c 
b/libsandbox/wrapper-funcs/opendir.c
-index 7670775..70c2692 100644
---- a/libsandbox/wrapper-funcs/opendir.c
-+++ b/libsandbox/wrapper-funcs/opendir.c
-@@ -10,4 +10,6 @@
- #define WRAPPER_SAFE() SB_SAFE(name)
- #define WRAPPER_RET_TYPE DIR *
- #define WRAPPER_RET_DEFAULT NULL
-+#define WRAPPER_PRE_CHECKS() sb_opendir_pre_check(STRING_NAME, name)
-+
- #include "__wrapper_simple.c"
-diff --git a/libsandbox/wrapper-funcs/opendir_pre_check.c 
b/libsandbox/wrapper-funcs/opendir_pre_check.c
-new file mode 100644
-index 0000000..60c869f
---- /dev/null
-+++ b/libsandbox/wrapper-funcs/opendir_pre_check.c
-@@ -0,0 +1,26 @@
-+/*
-+ * opendir() pre-check.
-+ *
-+ * Copyright 1999-2016 Gentoo Foundation
-+ * Licensed under the GPL-2
-+ */
-+
-+bool sb_opendir_pre_check(const char *func, const char *name)
-+{
-+      /* If length of name is larger than PATH_MAX, we would mess it up
-+       * before it reaches the open syscall, which would cleanly error out
-+       * via sandbox as well (actually with much smaller lengths than even
-+       * PATH_MAX).
-+       * So error out early in this case, in order to avoid an abort in
-+       * check_syscall later on, which gets ran for opendir, despite it not
-+       * being a syscall.
-+       */
-+      if (strnlen(name, PATH_MAX) == PATH_MAX) {
-+              errno = ENAMETOOLONG;
-+              sb_debug_dyn("EARLY FAIL: %s(%s): %s\n",
-+                      func, name, strerror(errno));
-+              return false;
-+      }
-+
-+      return true;
-+}
-diff --git a/libsandbox/wrappers.h b/libsandbox/wrappers.h
-index 0aa58bb..bf5bf64 100644
---- a/libsandbox/wrappers.h
-+++ b/libsandbox/wrappers.h
-@@ -27,6 +27,7 @@ attribute_hidden bool sb_fopen64_pre_check  (const char 
*func, const char *pathn
- attribute_hidden bool sb_mkdirat_pre_check  (const char *func, const char 
*pathname, int dirfd);
- attribute_hidden bool sb_openat_pre_check   (const char *func, const char 
*pathname, int dirfd, int flags);
- attribute_hidden bool sb_openat64_pre_check (const char *func, const char 
*pathname, int dirfd, int flags);
-+attribute_hidden bool sb_opendir_pre_check  (const char *func, const char 
*name);
- attribute_hidden bool sb_unlinkat_pre_check (const char *func, const char 
*pathname, int dirfd);
- attribute_hidden bool sb_common_at_pre_check(const char *func, const char 
**pathname, int dirfd,
-                                              char *dirfd_path, size_t 
dirfd_path_len);
--- 
-2.9.0
-

diff --git a/sys-apps/sandbox/files/sandbox-2.10-memory-corruption.patch 
b/sys-apps/sandbox/files/sandbox-2.10-memory-corruption.patch
deleted file mode 100644
index 7dd27c9..0000000
--- a/sys-apps/sandbox/files/sandbox-2.10-memory-corruption.patch
+++ /dev/null
@@ -1,42 +0,0 @@
-From 529a388ebb1b4e9d6ad8a1bb61dd8211833a5976 Mon Sep 17 00:00:00 2001
-From: Denis Lisov <dennis.lis...@gmail.com>
-Date: Sat, 19 Dec 2015 19:13:58 +0300
-Subject: [PATCH] libsandbox: fix old_malloc_size check on realloc
-
-Realloc uses SB_MALLOC_TO_SIZE assuming it returns the usable size,
-while it is really the mmap size, which is greater. Thus it may fail
-to reallocate even if required.
-
-URL: https://bugs.gentoo.org/568714
-Signed-off-by: Denis Lisov <dennis.lis...@gmail.com>
-Signed-off-by: Mike Frysinger <vap...@gentoo.org>
----
- libsandbox/memory.c | 5 +++--
- 1 file changed, 3 insertions(+), 2 deletions(-)
-
-diff --git a/libsandbox/memory.c b/libsandbox/memory.c
-index 8581128..a2d69a2 100644
---- a/libsandbox/memory.c
-+++ b/libsandbox/memory.c
-@@ -40,7 +40,8 @@ static int sb_munmap(void *addr, size_t length)
- 
- #define SB_MALLOC_TO_MMAP(ptr) ((void*)((uintptr_t)(ptr) - MIN_ALIGN))
- #define SB_MMAP_TO_MALLOC(ptr) ((void*)((uintptr_t)(ptr) + MIN_ALIGN))
--#define SB_MALLOC_TO_SIZE(ptr) (*((size_t*)SB_MALLOC_TO_MMAP(ptr)))
-+#define SB_MALLOC_TO_MMAP_SIZE(ptr) (*((size_t*)SB_MALLOC_TO_MMAP(ptr)))
-+#define SB_MALLOC_TO_SIZE(ptr) (SB_MALLOC_TO_MMAP_SIZE(ptr) - MIN_ALIGN)
- 
- void *malloc(size_t size)
- {
-@@ -57,7 +58,7 @@ void free(void *ptr)
- {
-       if (ptr == NULL)
-               return;
--      if (munmap(SB_MALLOC_TO_MMAP(ptr), SB_MALLOC_TO_SIZE(ptr)))
-+      if (munmap(SB_MALLOC_TO_MMAP(ptr), SB_MALLOC_TO_MMAP_SIZE(ptr)))
-               sb_ebort("sandbox memory corruption with free(%p): %s\n",
-                       ptr, strerror(errno));
- }
--- 
-2.6.2
-

diff --git a/sys-apps/sandbox/files/sandbox-2.11-symlinkat-renameat.patch 
b/sys-apps/sandbox/files/sandbox-2.11-symlinkat-renameat.patch
deleted file mode 100644
index e33011f..0000000
--- a/sys-apps/sandbox/files/sandbox-2.11-symlinkat-renameat.patch
+++ /dev/null
@@ -1,124 +0,0 @@
-From 4c47cfa22802fd8201586bef233d8161df4ff61b Mon Sep 17 00:00:00 2001
-From: Mike Frysinger <vap...@gentoo.org>
-Date: Fri, 10 Mar 2017 10:15:50 -0800
-Subject: [PATCH] libsandbox: whitelist renameat/symlinkat as symlink funcs
-
-These funcs don't deref their path args, so flag them as such.
-
-URL: https://bugs.gentoo.org/612202
-Signed-off-by: Mike Frysinger <vap...@gentoo.org>
----
- libsandbox/libsandbox.c |  4 +++-
- tests/renameat-2.sh     | 12 ++++++++++++
- tests/renameat-3.sh     | 11 +++++++++++
- tests/renameat.at       |  2 ++
- tests/symlinkat-2.sh    | 10 ++++++++++
- tests/symlinkat-3.sh    |  9 +++++++++
- tests/symlinkat.at      |  2 ++
- 7 files changed, 49 insertions(+), 1 deletion(-)
- create mode 100755 tests/renameat-2.sh
- create mode 100755 tests/renameat-3.sh
- create mode 100755 tests/symlinkat-2.sh
- create mode 100755 tests/symlinkat-3.sh
-
-diff --git a/libsandbox/libsandbox.c b/libsandbox/libsandbox.c
-index e809308d717d..de48bd79ba53 100644
---- a/libsandbox/libsandbox.c
-+++ b/libsandbox/libsandbox.c
-@@ -650,8 +650,10 @@ static bool symlink_func(int sb_nr, int flags, const char 
*abs_path)
-             sb_nr == SB_NR_LCHOWN   ||
-             sb_nr == SB_NR_REMOVE   ||
-             sb_nr == SB_NR_RENAME   ||
-+            sb_nr == SB_NR_RENAMEAT ||
-             sb_nr == SB_NR_RMDIR    ||
--            sb_nr == SB_NR_SYMLINK))
-+            sb_nr == SB_NR_SYMLINK  ||
-+            sb_nr == SB_NR_SYMLINKAT))
-       {
-               /* These funcs sometimes operate on symlinks */
-               if (!((sb_nr == SB_NR_FCHOWNAT ||
-diff --git a/tests/renameat-2.sh b/tests/renameat-2.sh
-new file mode 100755
-index 000000000000..d0fbe8ae4574
---- /dev/null
-+++ b/tests/renameat-2.sh
-@@ -0,0 +1,12 @@
-+#!/bin/sh
-+# make sure we can clobber symlinks #612202
-+
-+addwrite $PWD
-+
-+ln -s /asdf sym || exit 1
-+touch file
-+renameat-0 0 AT_FDCWD file AT_FDCWD sym || exit 1
-+[ ! -e file ]
-+[ ! -L sym ]
-+[ -e sym ]
-+test ! -s "${SANDBOX_LOG}"
-diff --git a/tests/renameat-3.sh b/tests/renameat-3.sh
-new file mode 100755
-index 000000000000..9ae5c9a6511a
---- /dev/null
-+++ b/tests/renameat-3.sh
-@@ -0,0 +1,11 @@
-+#!/bin/sh
-+# make sure we reject bad renames #612202
-+
-+addwrite $PWD
-+mkdir deny
-+adddeny $PWD/deny
-+
-+touch file
-+renameat-0 -1,EACCES AT_FDCWD file AT_FDCWD deny/file || exit 1
-+[ -e file ]
-+test -s "${SANDBOX_LOG}"
-diff --git a/tests/renameat.at b/tests/renameat.at
-index 081d7d20277e..eec4638deeaa 100644
---- a/tests/renameat.at
-+++ b/tests/renameat.at
-@@ -1 +1,3 @@
- SB_CHECK(1)
-+SB_CHECK(2)
-+SB_CHECK(3)
-diff --git a/tests/symlinkat-2.sh b/tests/symlinkat-2.sh
-new file mode 100755
-index 000000000000..168362e8806f
---- /dev/null
-+++ b/tests/symlinkat-2.sh
-@@ -0,0 +1,10 @@
-+#!/bin/sh
-+# make sure we can clobber symlinks #612202
-+
-+addwrite $PWD
-+
-+symlinkat-0 0 /asdf AT_FDCWD ./sym || exit 1
-+[ -L sym ]
-+symlinkat-0 -1,EEXIST /asdf AT_FDCWD ./sym || exit 1
-+[ -L sym ]
-+test ! -s "${SANDBOX_LOG}"
-diff --git a/tests/symlinkat-3.sh b/tests/symlinkat-3.sh
-new file mode 100755
-index 000000000000..a01c750dd2b6
---- /dev/null
-+++ b/tests/symlinkat-3.sh
-@@ -0,0 +1,9 @@
-+#!/bin/sh
-+# make sure we reject bad symlinks #612202
-+
-+addwrite $PWD
-+mkdir deny
-+adddeny $PWD/deny
-+
-+symlinkat-0 -1,EACCES ./ AT_FDCWD deny/sym || exit 1
-+test -s "${SANDBOX_LOG}"
-diff --git a/tests/symlinkat.at b/tests/symlinkat.at
-index 081d7d20277e..eec4638deeaa 100644
---- a/tests/symlinkat.at
-+++ b/tests/symlinkat.at
-@@ -1 +1,3 @@
- SB_CHECK(1)
-+SB_CHECK(2)
-+SB_CHECK(3)
--- 
-2.12.0
-

diff --git a/sys-apps/sandbox/files/sandbox-2.6-musl.patch 
b/sys-apps/sandbox/files/sandbox-2.6-musl.patch
deleted file mode 100644
index ee288d7..0000000
--- a/sys-apps/sandbox/files/sandbox-2.6-musl.patch
+++ /dev/null
@@ -1,48 +0,0 @@
-diff -Naur sandbox-2.6.orig/headers.h sandbox-2.6/headers.h
---- sandbox-2.6.orig/headers.h 2012-07-03 18:27:44.000000000 +0000
-+++ sandbox-2.6/headers.h      2014-05-22 13:57:55.225002786 +0000
-@@ -133,9 +133,11 @@
- #ifdef HAVE_ASM_PTRACE_H
- # include <asm/ptrace.h>
- #endif
-+/*
- #ifdef HAVE_LINUX_PTRACE_H
- # include <linux/ptrace.h>
- #endif
-+*/
- #undef FU_ia64_fpreg
- #undef FU_pt_all_user_regs
- 
-diff -Naur sandbox-2.6.orig/libsandbox/trace.c sandbox-2.6/libsandbox/trace.c
---- sandbox-2.6.orig/libsandbox/trace.c        2014-05-22 13:58:25.215002800 
+0000
-+++ sandbox-2.6/libsandbox/trace.c     2014-05-22 13:57:26.515002772 +0000
-@@ -9,7 +9,7 @@
- #include "wrappers.h"
- #include "sb_nr.h"
- 
--static long _do_ptrace(enum __ptrace_request request, const char *srequest, 
void *addr, void *data);
-+static long _do_ptrace(int request, const char *srequest, void *addr, void 
*data);
- #define do_ptrace(request, addr, data) _do_ptrace(request, #request, addr, 
data)
- #define _trace_possible(data) true
- 
-@@ -43,7 +43,7 @@
-       _exit(status);
- }
- 
--static long _do_ptrace(enum __ptrace_request request, const char *srequest, 
void *addr, void *data)
-+static long _do_ptrace(int request, const char *srequest, void *addr, void 
*data)
- {
-       long ret;
-  try_again:
-diff -Naur sandbox-2.6.orig/scripts/gen_symbol_header.awk 
sandbox-2.6/scripts/gen_symbol_header.awk
---- sandbox-2.6.orig/scripts/gen_symbol_header.awk     2014-05-22 
13:58:25.235002800 +0000
-+++ sandbox-2.6/scripts/gen_symbol_header.awk  2014-05-22 13:57:26.520002772 
+0000
-@@ -161,7 +161,7 @@
-                               else
-                                       printf("symbol_version(%s, %s, %s);\n",
-                                              sym_real_name, sym_index, 
symbol_array[2]);
--                      } else {
-+                      } else if (!(sym_index ~ 64)) {
-                               # For non-versioned libc's we use strong aliases
-                               printf("strong_alias(%s, %s);\n", sym_real_name,
-                                      sym_index);

diff --git a/sys-apps/sandbox/sandbox-2.10-r3.ebuild 
b/sys-apps/sandbox/sandbox-2.10-r3.ebuild
deleted file mode 100644
index bfef440..0000000
--- a/sys-apps/sandbox/sandbox-2.10-r3.ebuild
+++ /dev/null
@@ -1,86 +0,0 @@
-# Copyright 1999-2018 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-
-#
-# don't monkey with this ebuild unless contacting portage devs.
-# period.
-#
-
-EAPI="5"
-
-inherit eutils flag-o-matic multilib-minimal multiprocessing pax-utils
-
-DESCRIPTION="sandbox'd LD_PRELOAD hack"
-HOMEPAGE="https://www.gentoo.org/proj/en/portage/sandbox/";
-SRC_URI="mirror://gentoo/${P}.tar.xz
-       https://dev.gentoo.org/~vapier/dist/${P}.tar.xz";
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="amd64 arm ia64 ~mips ppc sh sparc x86"
-IUSE=""
-
-DEPEND="app-arch/xz-utils
-       >=app-misc/pax-utils-0.1.19" #265376
-RDEPEND=""
-
-has sandbox_death_notice ${EBUILD_DEATH_HOOKS} || 
EBUILD_DEATH_HOOKS="${EBUILD_DEATH_HOOKS} sandbox_death_notice"
-
-sandbox_death_notice() {
-       ewarn "If configure failed with a 'cannot run C compiled programs' 
error, try this:"
-       ewarn "FEATURES='-sandbox -usersandbox' emerge sandbox"
-}
-
-src_prepare() {
-       epatch "${FILESDIR}"/${P}-memory-corruption.patch #568714
-       epatch "${FILESDIR}"/${P}-disable-same.patch
-       epatch "${FILESDIR}"/${P}-fix-opendir.patch #553092
-       epatch "${FILESDIR}"/${PN}-2.6-musl.patch
-       epatch "${FILESDIR}"/${P}-fix-visibility-musl.patch
-       epatch_user
-}
-
-multilib_src_configure() {
-       filter-lfs-flags #90228
-
-       local myconf=()
-       host-is-pax && myconf+=( --disable-pch ) #301299 #425524 #572092
-
-       ECONF_SOURCE="${S}" \
-       econf "${myconf[@]}"
-}
-
-multilib_src_test() {
-       # Default sandbox build will run with --jobs set to # cpus.
-       emake check TESTSUITEFLAGS="--jobs=$(makeopts_jobs)"
-}
-
-multilib_src_install_all() {
-       doenvd "${FILESDIR}"/09sandbox
-
-       keepdir /var/log/sandbox
-       fowners root:portage /var/log/sandbox
-       fperms 0770 /var/log/sandbox
-
-       cd "${S}"
-       dodoc AUTHORS ChangeLog* NEWS README
-}
-
-pkg_preinst() {
-       chown root:portage "${ED}"/var/log/sandbox
-       chmod 0770 "${ED}"/var/log/sandbox
-
-       if [[ ${REPLACING_VERSIONS} == 1.* ]] ; then
-               local old=$(find "${EROOT}"/lib* -maxdepth 1 -name 
'libsandbox*')
-               if [[ -n ${old} ]] ; then
-                       elog "Removing old sandbox libraries for you:"
-                       find "${EROOT}"/lib* -maxdepth 1 -name 'libsandbox*' 
-print -delete
-               fi
-       fi
-}
-
-pkg_postinst() {
-       if [[ ${REPLACING_VERSIONS} == 1.* ]] ; then
-               chmod 0755 "${EROOT}"/etc/sandbox.d #265376
-       fi
-}

diff --git a/sys-apps/sandbox/sandbox-2.10-r4.ebuild 
b/sys-apps/sandbox/sandbox-2.10-r4.ebuild
deleted file mode 100644
index d4cb058..0000000
--- a/sys-apps/sandbox/sandbox-2.10-r4.ebuild
+++ /dev/null
@@ -1,87 +0,0 @@
-# Copyright 1999-2018 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-
-#
-# don't monkey with this ebuild unless contacting portage devs.
-# period.
-#
-
-EAPI="5"
-
-inherit eutils flag-o-matic multilib-minimal multiprocessing pax-utils
-
-DESCRIPTION="sandbox'd LD_PRELOAD hack"
-HOMEPAGE="https://www.gentoo.org/proj/en/portage/sandbox/";
-SRC_URI="mirror://gentoo/${P}.tar.xz
-       https://dev.gentoo.org/~vapier/dist/${P}.tar.xz";
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="amd64 arm ia64 ~mips ppc sh sparc x86"
-IUSE=""
-
-DEPEND="app-arch/xz-utils
-       >=app-misc/pax-utils-0.1.19" #265376
-RDEPEND=""
-
-has sandbox_death_notice ${EBUILD_DEATH_HOOKS} || 
EBUILD_DEATH_HOOKS="${EBUILD_DEATH_HOOKS} sandbox_death_notice"
-
-sandbox_death_notice() {
-       ewarn "If configure failed with a 'cannot run C compiled programs' 
error, try this:"
-       ewarn "FEATURES='-sandbox -usersandbox' emerge sandbox"
-}
-
-src_prepare() {
-       epatch "${FILESDIR}"/${P}-memory-corruption.patch #568714
-       epatch "${FILESDIR}"/${P}-disable-same.patch
-       epatch "${FILESDIR}"/${P}-fix-opendir.patch #553092
-       epatch "${FILESDIR}"/${PN}-2.11-symlinkat-renameat.patch #612202
-       epatch "${FILESDIR}"/${PN}-2.6-musl.patch
-       epatch "${FILESDIR}"/${P}-fix-visibility-musl.patch
-       epatch_user
-}
-
-multilib_src_configure() {
-       filter-lfs-flags #90228
-
-       local myconf=()
-       host-is-pax && myconf+=( --disable-pch ) #301299 #425524 #572092
-
-       ECONF_SOURCE="${S}" \
-       econf "${myconf[@]}"
-}
-
-multilib_src_test() {
-       # Default sandbox build will run with --jobs set to # cpus.
-       emake check TESTSUITEFLAGS="--jobs=$(makeopts_jobs)"
-}
-
-multilib_src_install_all() {
-       doenvd "${FILESDIR}"/09sandbox
-
-       keepdir /var/log/sandbox
-       fowners root:portage /var/log/sandbox
-       fperms 0770 /var/log/sandbox
-
-       cd "${S}"
-       dodoc AUTHORS ChangeLog* NEWS README
-}
-
-pkg_preinst() {
-       chown root:portage "${ED}"/var/log/sandbox
-       chmod 0770 "${ED}"/var/log/sandbox
-
-       if [[ ${REPLACING_VERSIONS} == 1.* ]] ; then
-               local old=$(find "${EROOT}"/lib* -maxdepth 1 -name 
'libsandbox*')
-               if [[ -n ${old} ]] ; then
-                       elog "Removing old sandbox libraries for you:"
-                       find "${EROOT}"/lib* -maxdepth 1 -name 'libsandbox*' 
-print -delete
-               fi
-       fi
-}
-
-pkg_postinst() {
-       if [[ ${REPLACING_VERSIONS} == 1.* ]] ; then
-               chmod 0755 "${EROOT}"/etc/sandbox.d #265376
-       fi
-}

Reply via email to