[sys-process/audit] version bump
This commit is contained in:
parent
377ffe1780
commit
3fbb2cd7b5
@ -1 +1 @@
|
|||||||
DIST audit-2.6.4.tar.gz 1078677 SHA256 b5a79cecd9593c368c9e42d5af72fcd14f046676657e906970b6c4a1aa5d06c7 SHA512 69b5d3987d2b8b189d1242fde639af3d7d366e901733133e47ee71223caf73aa7da40b7811298f0af861969b0ab482c5ef9830b711bdd15bd5f4d0ebc88a1224 WHIRLPOOL bda2f7bb754620b003c9c7df2e29d169e0421a9f0a1cf11396539fc3cae1d3907dc4265c3941e24a30eb206032a894989e74b803f2c4a7558057b879c41b2642
|
DIST audit-2.7.1.tar.gz 1099083 SHA256 0441790794fd9375dbca598fa0ffb46c57ff37b3a24b94ffec0bbee3215cca09 SHA512 37964d81deee8608fde5f90d5d096727d3eb009e084be34749adcb0662e607e35c49c80bd83ce38b17161f11363b691721c8a8aa5dea832d320c53ab0ebb7483 WHIRLPOOL 87b7187dc56d78a5401d0f2a39c5461924bbac1d5fa49f68121a38a2422f3e6111e6c9f73db54c882cbaa17f584a23478863ef7c86053ddff63088d3903aafc9
|
||||||
|
@ -15,11 +15,12 @@ SRC_URI="https://people.redhat.com/sgrubb/audit/${P}.tar.gz"
|
|||||||
LICENSE="GPL-2"
|
LICENSE="GPL-2"
|
||||||
SLOT="0"
|
SLOT="0"
|
||||||
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
|
KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
|
||||||
IUSE="apparmor ldap python tcpd"
|
IUSE="apparmor gssapi ldap python static-libs tcpd"
|
||||||
# Testcases are pretty useless as they are built for RedHat users/groups and kernels.
|
# Testcases are pretty useless as they are built for RedHat users/groups and kernels.
|
||||||
RESTRICT="test"
|
RESTRICT="test"
|
||||||
|
|
||||||
RDEPEND="apparmor? ( sys-apps/apparmor )
|
RDEPEND="apparmor? ( sys-apps/apparmor )
|
||||||
|
gssapi? ( virtual/krb5 )
|
||||||
ldap? ( net-nds/openldap )
|
ldap? ( net-nds/openldap )
|
||||||
tcpd? ( sys-apps/tcp-wrappers )
|
tcpd? ( sys-apps/tcp-wrappers )
|
||||||
sys-libs/libcap-ng"
|
sys-libs/libcap-ng"
|
||||||
@ -78,7 +79,9 @@ src_prepare() {
|
|||||||
multilib_src_configure() {
|
multilib_src_configure() {
|
||||||
local ECONF_SOURCE=${S}
|
local ECONF_SOURCE=${S}
|
||||||
econf \
|
econf \
|
||||||
--sbindir=/sbin \
|
--sbindir=${EPREFIX}/sbin \
|
||||||
|
$(use_enable gssapi gssapi-krb5) \
|
||||||
|
$(use_enable static-libs static) \
|
||||||
--enable-systemd \
|
--enable-systemd \
|
||||||
--without-python \
|
--without-python \
|
||||||
--without-python3 \
|
--without-python3 \
|
||||||
@ -188,9 +191,9 @@ multilib_src_install_all() {
|
|||||||
|
|
||||||
fperms 644 "$(systemd_get_systemunitdir)"/auditd.service # 556436
|
fperms 644 "$(systemd_get_systemunitdir)"/auditd.service # 556436
|
||||||
|
|
||||||
[ -f "${D}"/sbin/audisp-remote ] && \
|
[ -f "${ED}"/sbin/audisp-remote ] && \
|
||||||
dodir /usr/sbin && \
|
dodir /usr/sbin && \
|
||||||
mv "${D}"/{sbin,usr/sbin}/audisp-remote || die
|
mv "${ED}"/{sbin,usr/sbin}/audisp-remote || die
|
||||||
|
|
||||||
# Gentoo rules
|
# Gentoo rules
|
||||||
insinto /etc/audit/
|
insinto /etc/audit/
|
||||||
@ -201,7 +204,7 @@ multilib_src_install_all() {
|
|||||||
keepdir /var/log/audit/
|
keepdir /var/log/audit/
|
||||||
|
|
||||||
# Security
|
# Security
|
||||||
lockdown_perms "${D}"
|
lockdown_perms "${ED}"
|
||||||
|
|
||||||
prune_libtool_files --modules
|
prune_libtool_files --modules
|
||||||
}
|
}
|
||||||
@ -212,15 +215,15 @@ pkg_preinst() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
pkg_postinst() {
|
pkg_postinst() {
|
||||||
lockdown_perms "${ROOT}"
|
lockdown_perms "${EROOT}"
|
||||||
# Preserve from the audit-1 series
|
# Preserve from the audit-1 series
|
||||||
preserve_old_lib_notify /$(get_libdir)/libaudit.so.0
|
preserve_old_lib_notify /$(get_libdir)/libaudit.so.0
|
||||||
}
|
}
|
||||||
|
|
||||||
lockdown_perms() {
|
lockdown_perms() {
|
||||||
# upstream wants these to have restrictive perms
|
# upstream wants these to have restrictive perms.
|
||||||
# should not || die, maybe not all paths exist
|
# should not || die, maybe not all paths exist.
|
||||||
basedir="$1"
|
local basedir="$1"
|
||||||
chmod 0750 "${basedir}"/sbin/au{ditctl,report,dispd,ditd,search,trace} 2>/dev/null
|
chmod 0750 "${basedir}"/sbin/au{ditctl,report,dispd,ditd,search,trace} 2>/dev/null
|
||||||
chmod 0750 "${basedir}"/var/log/audit/ 2>/dev/null
|
chmod 0750 "${basedir}"/var/log/audit/ 2>/dev/null
|
||||||
chmod 0640 "${basedir}"/etc/{audit/,}{auditd.conf,audit.rules*} 2>/dev/null
|
chmod 0640 "${basedir}"/etc/{audit/,}{auditd.conf,audit.rules*} 2>/dev/null
|
Loading…
Reference in New Issue
Block a user