[yocto] [meta-selinux][PATCH] Bump versions to catch up with master in oe-core.
Philip Tricca
flihp at twobit.us
Fri Nov 15 08:06:38 PST 2013
I missed the significant change in tar w/r to xattrs and acls. Fixing
that up now.
- Philip
On 11/14/2013 10:53 PM, Philip Tricca wrote:
> openssh 6.2p2 -> 6.4p1
> glib-2.0 2.38.0 -> 2.38.1
> at 3.1.13 -> 3.1.14
> sudo 1.8.7 -> 1.8.8
> tar 1.26 -> 1.27
> mesa 9.1.6 -> 9.2.2
> gnupg 2.0.21 -> 2.0.22
>
> Signed-off-by: Philip Tricca <flihp at twobit.us>
> ---
> .../openssh/openssh_6.2p2.bbappend | 13 --
> .../openssh/openssh_6.4p1.bbappend | 13 ++
> recipes-core/glib-2.0/glib-2.0_2.38.0.bbappend | 1 -
> recipes-core/glib-2.0/glib-2.0_2.38.1.bbappend | 1 +
> recipes-extended/at/at/at-3.1.13-selinux.patch | 184 --------------------
> recipes-extended/at/at/at-3.1.14-selinux.patch | 184 ++++++++++++++++++++
> recipes-extended/at/at_3.1.13.bbappend | 7 -
> recipes-extended/at/at_3.1.14.bbappend | 7 +
> recipes-extended/sudo/sudo_1.8.7.bbappend | 3 -
> recipes-extended/sudo/sudo_1.8.8.bbappend | 3 +
> recipes-extended/tar/tar_1.26.bbappend | 15 --
> recipes-extended/tar/tar_1.27.bbappend | 15 ++
> recipes-graphics/mesa/mesa_9.1.6.bbappend | 1 -
> recipes-graphics/mesa/mesa_9.2.2.bbappend | 1 +
> recipes-support/gnupg/gnupg_2.0.21.bbappend | 5 -
> recipes-support/gnupg/gnupg_2.0.22.bbappend | 5 +
> 16 files changed, 229 insertions(+), 229 deletions(-)
> delete mode 100644 recipes-connectivity/openssh/openssh_6.2p2.bbappend
> create mode 100644 recipes-connectivity/openssh/openssh_6.4p1.bbappend
> delete mode 100644 recipes-core/glib-2.0/glib-2.0_2.38.0.bbappend
> create mode 100644 recipes-core/glib-2.0/glib-2.0_2.38.1.bbappend
> delete mode 100644 recipes-extended/at/at/at-3.1.13-selinux.patch
> create mode 100644 recipes-extended/at/at/at-3.1.14-selinux.patch
> delete mode 100644 recipes-extended/at/at_3.1.13.bbappend
> create mode 100644 recipes-extended/at/at_3.1.14.bbappend
> delete mode 100644 recipes-extended/sudo/sudo_1.8.7.bbappend
> create mode 100644 recipes-extended/sudo/sudo_1.8.8.bbappend
> delete mode 100644 recipes-extended/tar/tar_1.26.bbappend
> create mode 100644 recipes-extended/tar/tar_1.27.bbappend
> delete mode 100644 recipes-graphics/mesa/mesa_9.1.6.bbappend
> create mode 100644 recipes-graphics/mesa/mesa_9.2.2.bbappend
> delete mode 100644 recipes-support/gnupg/gnupg_2.0.21.bbappend
> create mode 100644 recipes-support/gnupg/gnupg_2.0.22.bbappend
>
> diff --git a/recipes-connectivity/openssh/openssh_6.2p2.bbappend b/recipes-connectivity/openssh/openssh_6.2p2.bbappend
> deleted file mode 100644
> index 223b8cf..0000000
> --- a/recipes-connectivity/openssh/openssh_6.2p2.bbappend
> +++ /dev/null
> @@ -1,13 +0,0 @@
> -PR .= ".5"
> -
> -inherit with-selinux
> -
> -FILESEXTRAPATHS_prepend := "${@target_selinux(d, '${THISDIR}/files:')}"
> -
> -# There is no distro feature just for audit. If we want it,
> -# uncomment the following.
> -#
> -#PACKAGECONFIG += "${@target_selinux(d, 'audit')}"
> -
> -PACKAGECONFIG[audit] = "--with-audit=linux,--without-audit,audit,"
> -
> diff --git a/recipes-connectivity/openssh/openssh_6.4p1.bbappend b/recipes-connectivity/openssh/openssh_6.4p1.bbappend
> new file mode 100644
> index 0000000..223b8cf
> --- /dev/null
> +++ b/recipes-connectivity/openssh/openssh_6.4p1.bbappend
> @@ -0,0 +1,13 @@
> +PR .= ".5"
> +
> +inherit with-selinux
> +
> +FILESEXTRAPATHS_prepend := "${@target_selinux(d, '${THISDIR}/files:')}"
> +
> +# There is no distro feature just for audit. If we want it,
> +# uncomment the following.
> +#
> +#PACKAGECONFIG += "${@target_selinux(d, 'audit')}"
> +
> +PACKAGECONFIG[audit] = "--with-audit=linux,--without-audit,audit,"
> +
> diff --git a/recipes-core/glib-2.0/glib-2.0_2.38.0.bbappend b/recipes-core/glib-2.0/glib-2.0_2.38.0.bbappend
> deleted file mode 100644
> index 8c11cac..0000000
> --- a/recipes-core/glib-2.0/glib-2.0_2.38.0.bbappend
> +++ /dev/null
> @@ -1 +0,0 @@
> -inherit enable-selinux
> diff --git a/recipes-core/glib-2.0/glib-2.0_2.38.1.bbappend b/recipes-core/glib-2.0/glib-2.0_2.38.1.bbappend
> new file mode 100644
> index 0000000..8c11cac
> --- /dev/null
> +++ b/recipes-core/glib-2.0/glib-2.0_2.38.1.bbappend
> @@ -0,0 +1 @@
> +inherit enable-selinux
> diff --git a/recipes-extended/at/at/at-3.1.13-selinux.patch b/recipes-extended/at/at/at-3.1.13-selinux.patch
> deleted file mode 100644
> index 5a08a43..0000000
> --- a/recipes-extended/at/at/at-3.1.13-selinux.patch
> +++ /dev/null
> @@ -1,184 +0,0 @@
> -From: Xin Ouyang <Xin.Ouyang at windriver.com>
> -Date: Wed, 13 Jun 2012 14:47:54 +0800
> -Subject: [PATCH] at: atd add SELinux support.
> -
> -Upstream-Status: Inappropriate [configuration]
> -
> -Signed-off-by: Xin Ouyang <Xin.Ouyang at windriver.com>
> ----
> - Makefile.in | 1 +
> - atd.c | 83 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
> - config.h.in | 3 ++
> - configure.ac | 8 +++++
> - 4 files changed, 95 insertions(+), 0 deletions(-)
> -
> -diff --git a/Makefile.in b/Makefile.in
> -index 10e7ed2..35792cd 100644
> ---- a/Makefile.in
> -+++ b/Makefile.in
> -@@ -39,6 +39,7 @@ LIBS = @LIBS@
> - LIBOBJS = @LIBOBJS@
> - INSTALL = @INSTALL@
> - PAMLIB = @PAMLIB@
> -+SELINUXLIB = @SELINUXLIB@
> -
> - CLONES = atq atrm
> - ATOBJECTS = at.o panic.o perm.o posixtm.o y.tab.o lex.yy.o
> -@@ -72,7 +72,7 @@ at: $(ATOBJECTS)
> - $(LN_S) -f at atrm
> -
> - atd: $(RUNOBJECTS)
> -- $(CC) $(CFLAGS) -o atd $(RUNOBJECTS) $(LIBS) $(PAMLIB) $(LDFLAGS)
> -+ $(CC) $(CFLAGS) -o atd $(RUNOBJECTS) $(LIBS) $(PAMLIB) $(SELINUXLIB) $(LDFLAGS)
> -
> - y.tab.c y.tab.h: parsetime.y
> - $(YACC) -d parsetime.y
> -diff --git a/atd.c b/atd.c
> -index af3e577..463124f 100644
> ---- a/atd.c
> -+++ b/atd.c
> -@@ -83,6 +83,14 @@
> - #include "getloadavg.h"
> - #endif
> -
> -+#ifdef WITH_SELINUX
> -+#include <selinux/selinux.h>
> -+#include <selinux/get_context_list.h>
> -+int selinux_enabled = 0;
> -+#include <selinux/flask.h>
> -+#include <selinux/av_permissions.h>
> -+#endif
> -+
> - /* Macros */
> -
> - #define BATCH_INTERVAL_DEFAULT 60
> -@@ -195,6 +203,70 @@ myfork()
> - #define fork myfork
> - #endif
> -
> -+#ifdef WITH_SELINUX
> -+static int
> -+set_selinux_context(const char *name, const char *filename)
> -+{
> -+ security_context_t user_context=NULL;
> -+ security_context_t file_context=NULL;
> -+ struct av_decision avd;
> -+ int retval=-1;
> -+ char *seuser=NULL;
> -+ char *level=NULL;
> -+
> -+ if (getseuserbyname(name, &seuser, &level) == 0) {
> -+ retval=get_default_context_with_level(seuser, level, NULL, &user_context);
> -+ free(seuser);
> -+ free(level);
> -+ if (retval) {
> -+ if (security_getenforce()==1) {
> -+ perr("execle: couldn't get security context for user %s\n", name);
> -+ } else {
> -+ syslog(LOG_ERR, "execle: couldn't get security context for user %s\n", name);
> -+ return -1;
> -+ }
> -+ }
> -+ }
> -+
> -+ /*
> -+ * Since crontab files are not directly executed,
> -+ * crond must ensure that the crontab file has
> -+ * a context that is appropriate for the context of
> -+ * the user cron job. It performs an entrypoint
> -+ * permission check for this purpose.
> -+ */
> -+ if (fgetfilecon(STDIN_FILENO, &file_context) < 0)
> -+ perr("fgetfilecon FAILED %s", filename);
> -+
> -+ retval = security_compute_av(user_context,
> -+ file_context,
> -+ SECCLASS_FILE,
> -+ FILE__ENTRYPOINT,
> -+ &avd);
> -+ freecon(file_context);
> -+ if (retval || ((FILE__ENTRYPOINT & avd.allowed) != FILE__ENTRYPOINT)) {
> -+ if (security_getenforce()==1) {
> -+ perr("Not allowed to set exec context to %s for user %s\n", user_context,name);
> -+ } else {
> -+ syslog(LOG_ERR, "Not allowed to set exec context to %s for user %s\n", user_context,name);
> -+ retval = -1;
> -+ goto err;
> -+ }
> -+ }
> -+ if (setexeccon(user_context) < 0) {
> -+ if (security_getenforce()==1) {
> -+ perr("Could not set exec context to %s for user %s\n", user_context,name);
> -+ retval = -1;
> -+ } else {
> -+ syslog(LOG_ERR, "Could not set exec context to %s for user %s\n", user_context,name);
> -+ }
> -+ }
> -+err:
> -+ freecon(user_context);
> -+ return 0;
> -+}
> -+#endif
> -+
> - static void
> - run_file(const char *filename, uid_t uid, gid_t gid)
> - {
> -@@ -435,6 +507,13 @@ run_file(const char *filename, uid_t uid, gid_t gid)
> -
> - chdir("/");
> -
> -+#ifdef WITH_SELINUX
> -+ if (selinux_enabled > 0) {
> -+ if (set_selinux_context(pentry->pw_name, filename) < 0)
> -+ perr("SELinux Failed to set context\n");
> -+ }
> -+#endif
> -+
> - if (execle("/bin/sh", "sh", (char *) NULL, nenvp) != 0)
> - perr("Exec failed for /bin/sh");
> -
> -@@ -707,6 +786,10 @@ main(int argc, char *argv[])
> - struct passwd *pwe;
> - struct group *ge;
> -
> -+#ifdef WITH_SELINUX
> -+ selinux_enabled = is_selinux_enabled();
> -+#endif
> -+
> - /* We don't need root privileges all the time; running under uid and gid
> - * daemon is fine.
> - */
> -diff --git a/configure.ac b/configure.ac
> -index 2db7b65..5ecc35a 100644
> ---- a/configure.ac
> -+++ b/configure.ac
> -@@ -94,6 +94,18 @@ AC_CHECK_HEADERS(security/pam_appl.h, [
> - fi])
> - fi
> -
> -+AC_ARG_WITH([selinux],
> -+ [AS_HELP_STRING([--without-selinux], [without SELinux support])])
> -+
> -+if test "x$with_selinux" != xno; then
> -+AC_CHECK_HEADERS(selinux/selinux.h, [
> -+ SELINUXLIB="-lselinux"
> -+ AC_DEFINE(WITH_SELINUX, 1, [Define to 1 for SELinux support])],
> -+ [if test "x$with_selinux" = xyes; then
> -+ AC_MSG_ERROR([SELinux selected but selinux/selinux.h not found])
> -+ fi])
> -+fi
> -+
> - dnl Checking for programs
> -
> - AC_PATH_PROG(SENDMAIL, sendmail, , $PATH:/usr/lib:/usr/sbin )
> -@@ -104,6 +116,7 @@ fi
> -
> - AC_SUBST(MAIL_CMD)
> - AC_SUBST(PAMLIB)
> -+AC_SUBST(SELINUXLIB)
> -
> - AC_MSG_CHECKING(etcdir)
> - AC_ARG_WITH(etcdir,
> ---
> -1.7.5.4
> -
> diff --git a/recipes-extended/at/at/at-3.1.14-selinux.patch b/recipes-extended/at/at/at-3.1.14-selinux.patch
> new file mode 100644
> index 0000000..4e5e18c
> --- /dev/null
> +++ b/recipes-extended/at/at/at-3.1.14-selinux.patch
> @@ -0,0 +1,184 @@
> +From: Xin Ouyang <Xin.Ouyang at windriver.com>
> +Date: Wed, 13 Jun 2012 14:47:54 +0800
> +Subject: [PATCH] at: atd add SELinux support.
> +
> +Upstream-Status: Inappropriate [configuration]
> +
> +Signed-off-by: Xin Ouyang <Xin.Ouyang at windriver.com>
> +---
> + Makefile.in | 1 +
> + atd.c | 83 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
> + config.h.in | 3 ++
> + configure.ac | 8 +++++
> + 4 files changed, 95 insertions(+), 0 deletions(-)
> +
> +diff --git a/Makefile.in b/Makefile.in
> +index 10e7ed2..35792cd 100644
> +--- a/Makefile.in
> ++++ b/Makefile.in
> +@@ -39,6 +39,7 @@ LIBS = @LIBS@
> + LIBOBJS = @LIBOBJS@
> + INSTALL = @INSTALL@
> + PAMLIB = @PAMLIB@
> ++SELINUXLIB = @SELINUXLIB@
> +
> + CLONES = atq atrm
> + ATOBJECTS = at.o panic.o perm.o posixtm.o y.tab.o lex.yy.o
> +@@ -72,7 +72,7 @@ at: $(ATOBJECTS)
> + $(LN_S) -f at atrm
> +
> + atd: $(RUNOBJECTS)
> +- $(CC) $(LDFLAGS) -o atd $(RUNOBJECTS) $(LIBS) $(PAMLIB)
> ++ $(CC) $(LDFLAGS) -o atd $(RUNOBJECTS) $(LIBS) $(PAMLIB) $(SELINUXLIB)
> +
> + y.tab.c y.tab.h: parsetime.y
> + $(YACC) -d parsetime.y
> +diff --git a/atd.c b/atd.c
> +index af3e577..463124f 100644
> +--- a/atd.c
> ++++ b/atd.c
> +@@ -83,6 +83,14 @@
> + #include "getloadavg.h"
> + #endif
> +
> ++#ifdef WITH_SELINUX
> ++#include <selinux/selinux.h>
> ++#include <selinux/get_context_list.h>
> ++int selinux_enabled = 0;
> ++#include <selinux/flask.h>
> ++#include <selinux/av_permissions.h>
> ++#endif
> ++
> + /* Macros */
> +
> + #define BATCH_INTERVAL_DEFAULT 60
> +@@ -195,6 +203,70 @@ myfork()
> + #define fork myfork
> + #endif
> +
> ++#ifdef WITH_SELINUX
> ++static int
> ++set_selinux_context(const char *name, const char *filename)
> ++{
> ++ security_context_t user_context=NULL;
> ++ security_context_t file_context=NULL;
> ++ struct av_decision avd;
> ++ int retval=-1;
> ++ char *seuser=NULL;
> ++ char *level=NULL;
> ++
> ++ if (getseuserbyname(name, &seuser, &level) == 0) {
> ++ retval=get_default_context_with_level(seuser, level, NULL, &user_context);
> ++ free(seuser);
> ++ free(level);
> ++ if (retval) {
> ++ if (security_getenforce()==1) {
> ++ perr("execle: couldn't get security context for user %s\n", name);
> ++ } else {
> ++ syslog(LOG_ERR, "execle: couldn't get security context for user %s\n", name);
> ++ return -1;
> ++ }
> ++ }
> ++ }
> ++
> ++ /*
> ++ * Since crontab files are not directly executed,
> ++ * crond must ensure that the crontab file has
> ++ * a context that is appropriate for the context of
> ++ * the user cron job. It performs an entrypoint
> ++ * permission check for this purpose.
> ++ */
> ++ if (fgetfilecon(STDIN_FILENO, &file_context) < 0)
> ++ perr("fgetfilecon FAILED %s", filename);
> ++
> ++ retval = security_compute_av(user_context,
> ++ file_context,
> ++ SECCLASS_FILE,
> ++ FILE__ENTRYPOINT,
> ++ &avd);
> ++ freecon(file_context);
> ++ if (retval || ((FILE__ENTRYPOINT & avd.allowed) != FILE__ENTRYPOINT)) {
> ++ if (security_getenforce()==1) {
> ++ perr("Not allowed to set exec context to %s for user %s\n", user_context,name);
> ++ } else {
> ++ syslog(LOG_ERR, "Not allowed to set exec context to %s for user %s\n", user_context,name);
> ++ retval = -1;
> ++ goto err;
> ++ }
> ++ }
> ++ if (setexeccon(user_context) < 0) {
> ++ if (security_getenforce()==1) {
> ++ perr("Could not set exec context to %s for user %s\n", user_context,name);
> ++ retval = -1;
> ++ } else {
> ++ syslog(LOG_ERR, "Could not set exec context to %s for user %s\n", user_context,name);
> ++ }
> ++ }
> ++err:
> ++ freecon(user_context);
> ++ return 0;
> ++}
> ++#endif
> ++
> + static void
> + run_file(const char *filename, uid_t uid, gid_t gid)
> + {
> +@@ -435,6 +507,13 @@ run_file(const char *filename, uid_t uid, gid_t gid)
> +
> + chdir("/");
> +
> ++#ifdef WITH_SELINUX
> ++ if (selinux_enabled > 0) {
> ++ if (set_selinux_context(pentry->pw_name, filename) < 0)
> ++ perr("SELinux Failed to set context\n");
> ++ }
> ++#endif
> ++
> + if (execle("/bin/sh", "sh", (char *) NULL, nenvp) != 0)
> + perr("Exec failed for /bin/sh");
> +
> +@@ -707,6 +786,10 @@ main(int argc, char *argv[])
> + struct passwd *pwe;
> + struct group *ge;
> +
> ++#ifdef WITH_SELINUX
> ++ selinux_enabled = is_selinux_enabled();
> ++#endif
> ++
> + /* We don't need root privileges all the time; running under uid and gid
> + * daemon is fine.
> + */
> +diff --git a/configure.ac b/configure.ac
> +index 2db7b65..5ecc35a 100644
> +--- a/configure.ac
> ++++ b/configure.ac
> +@@ -94,6 +94,18 @@ AC_CHECK_HEADERS(security/pam_appl.h, [
> + fi])
> + fi
> +
> ++AC_ARG_WITH([selinux],
> ++ [AS_HELP_STRING([--without-selinux], [without SELinux support])])
> ++
> ++if test "x$with_selinux" != xno; then
> ++AC_CHECK_HEADERS(selinux/selinux.h, [
> ++ SELINUXLIB="-lselinux"
> ++ AC_DEFINE(WITH_SELINUX, 1, [Define to 1 for SELinux support])],
> ++ [if test "x$with_selinux" = xyes; then
> ++ AC_MSG_ERROR([SELinux selected but selinux/selinux.h not found])
> ++ fi])
> ++fi
> ++
> + dnl Checking for programs
> +
> + AC_PATH_PROG(SENDMAIL, sendmail, , $PATH:/usr/lib:/usr/sbin )
> +@@ -104,6 +116,7 @@ fi
> +
> + AC_SUBST(MAIL_CMD)
> + AC_SUBST(PAMLIB)
> ++AC_SUBST(SELINUXLIB)
> +
> + AC_MSG_CHECKING(etcdir)
> + AC_ARG_WITH(etcdir,
> +--
> +1.7.5.4
> +
> diff --git a/recipes-extended/at/at_3.1.13.bbappend b/recipes-extended/at/at_3.1.13.bbappend
> deleted file mode 100644
> index f30abab..0000000
> --- a/recipes-extended/at/at_3.1.13.bbappend
> +++ /dev/null
> @@ -1,7 +0,0 @@
> -PR .= ".2"
> -
> -FILESEXTRAPATHS_prepend := "${THISDIR}/${PN}:"
> -
> -SRC_URI += "file://at-3.1.13-selinux.patch"
> -
> -inherit with-selinux
> diff --git a/recipes-extended/at/at_3.1.14.bbappend b/recipes-extended/at/at_3.1.14.bbappend
> new file mode 100644
> index 0000000..a7ecbc2
> --- /dev/null
> +++ b/recipes-extended/at/at_3.1.14.bbappend
> @@ -0,0 +1,7 @@
> +PR .= ".2"
> +
> +FILESEXTRAPATHS_prepend := "${THISDIR}/${PN}:"
> +
> +SRC_URI += "file://at-3.1.14-selinux.patch"
> +
> +inherit with-selinux
> diff --git a/recipes-extended/sudo/sudo_1.8.7.bbappend b/recipes-extended/sudo/sudo_1.8.7.bbappend
> deleted file mode 100644
> index 5ad8973..0000000
> --- a/recipes-extended/sudo/sudo_1.8.7.bbappend
> +++ /dev/null
> @@ -1,3 +0,0 @@
> -PR .= ".2"
> -
> -inherit with-selinux
> diff --git a/recipes-extended/sudo/sudo_1.8.8.bbappend b/recipes-extended/sudo/sudo_1.8.8.bbappend
> new file mode 100644
> index 0000000..5ad8973
> --- /dev/null
> +++ b/recipes-extended/sudo/sudo_1.8.8.bbappend
> @@ -0,0 +1,3 @@
> +PR .= ".2"
> +
> +inherit with-selinux
> diff --git a/recipes-extended/tar/tar_1.26.bbappend b/recipes-extended/tar/tar_1.26.bbappend
> deleted file mode 100644
> index 2aad7a5..0000000
> --- a/recipes-extended/tar/tar_1.26.bbappend
> +++ /dev/null
> @@ -1,15 +0,0 @@
> -PR .= ".3"
> -
> -FILESEXTRAPATHS_prepend := "${THISDIR}/${PN}:"
> -
> -SRC_URI += "file://tar-1.24-xattrs.patch"
> -
> -inherit enable-selinux
> -
> -
> -PACKAGECONFIG += "${@base_contains('DISTRO_FEATURES', 'acl', 'acl', '', d)}"
> -
> -# configure has no acl enable/disable options!
> -#
> -PACKAGECONFIG[acl] = ",,acl,"
> -
> diff --git a/recipes-extended/tar/tar_1.27.bbappend b/recipes-extended/tar/tar_1.27.bbappend
> new file mode 100644
> index 0000000..2aad7a5
> --- /dev/null
> +++ b/recipes-extended/tar/tar_1.27.bbappend
> @@ -0,0 +1,15 @@
> +PR .= ".3"
> +
> +FILESEXTRAPATHS_prepend := "${THISDIR}/${PN}:"
> +
> +SRC_URI += "file://tar-1.24-xattrs.patch"
> +
> +inherit enable-selinux
> +
> +
> +PACKAGECONFIG += "${@base_contains('DISTRO_FEATURES', 'acl', 'acl', '', d)}"
> +
> +# configure has no acl enable/disable options!
> +#
> +PACKAGECONFIG[acl] = ",,acl,"
> +
> diff --git a/recipes-graphics/mesa/mesa_9.1.6.bbappend b/recipes-graphics/mesa/mesa_9.1.6.bbappend
> deleted file mode 100644
> index 8c11cac..0000000
> --- a/recipes-graphics/mesa/mesa_9.1.6.bbappend
> +++ /dev/null
> @@ -1 +0,0 @@
> -inherit enable-selinux
> diff --git a/recipes-graphics/mesa/mesa_9.2.2.bbappend b/recipes-graphics/mesa/mesa_9.2.2.bbappend
> new file mode 100644
> index 0000000..8c11cac
> --- /dev/null
> +++ b/recipes-graphics/mesa/mesa_9.2.2.bbappend
> @@ -0,0 +1 @@
> +inherit enable-selinux
> diff --git a/recipes-support/gnupg/gnupg_2.0.21.bbappend b/recipes-support/gnupg/gnupg_2.0.21.bbappend
> deleted file mode 100644
> index dddd945..0000000
> --- a/recipes-support/gnupg/gnupg_2.0.21.bbappend
> +++ /dev/null
> @@ -1,5 +0,0 @@
> -PR .= ".1"
> -
> -inherit enable-selinux
> -# gnupg will not build with libselinux, so remove the depend
> -PACKAGECONFIG[selinux] = "--enable-selinux-support,--disable-selinux-support,,"
> diff --git a/recipes-support/gnupg/gnupg_2.0.22.bbappend b/recipes-support/gnupg/gnupg_2.0.22.bbappend
> new file mode 100644
> index 0000000..dddd945
> --- /dev/null
> +++ b/recipes-support/gnupg/gnupg_2.0.22.bbappend
> @@ -0,0 +1,5 @@
> +PR .= ".1"
> +
> +inherit enable-selinux
> +# gnupg will not build with libselinux, so remove the depend
> +PACKAGECONFIG[selinux] = "--enable-selinux-support,--disable-selinux-support,,"
>
More information about the yocto
mailing list