commit:     f8485e0566678bbfc0cf9df06dae52223fd3f6c2
Author:     Dennis Lamm <expeditioneer <AT> gentoo <DOT> org>
AuthorDate: Thu Oct 31 13:13:02 2019 +0000
Commit:     Dennis Lamm <expeditioneer <AT> gentoo <DOT> org>
CommitDate: Sat Nov  9 11:02:00 2019 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=f8485e05

sys-apps/firejail: removed old

Signed-off-by: Dennis Lamm <expeditioneer <AT> gentoo.org>
Package-Manager: Portage-2.3.76, Repoman-2.3.16

 sys-apps/firejail/Manifest               |  1 -
 sys-apps/firejail/firejail-0.9.50.ebuild | 49 --------------------------------
 sys-apps/firejail/metadata.xml           |  3 --
 3 files changed, 53 deletions(-)

diff --git a/sys-apps/firejail/Manifest b/sys-apps/firejail/Manifest
index 69947b7d043..2cdea90dbcf 100644
--- a/sys-apps/firejail/Manifest
+++ b/sys-apps/firejail/Manifest
@@ -1,2 +1 @@
-DIST firejail-0.9.50.tar.xz 279488 BLAKE2B 
96d8e9161f0631ebfa400fd79c1d8d139d014da46cc2bf7fd3683f75ef7dced6a435e09e1733b675bc549662d50fddca9bd8811872a5ed186d731bb3c16903ea
 SHA512 
766fe8a0c65ddc717759f0ea54a4fe72213f43ecf241c385e484eb7e47bebd5896976998c76e6a5ef9c153d4007c2a01e9d942cc9f352c4b085fb02fe708a87d
 DIST firejail-0.9.60.tar.gz 1067102 BLAKE2B 
c5fd9a9c60fe17fc7ae24946ae5ea2f666d1dd20d982c540783dd2e56d30859a24258c4f3426e2bafaff3530557f5865bc73af9573e399039e8d5b097e5cddee
 SHA512 
cb3eeff2f77801b4593a719a6b63da09cdc6c7f96f8ea8ea1aaa7e8538b080421a284441c6e43ce036fdf8510e08a73816c58d22f0af048344b8752f4a02759a

diff --git a/sys-apps/firejail/firejail-0.9.50.ebuild 
b/sys-apps/firejail/firejail-0.9.50.ebuild
deleted file mode 100644
index 85b81b1bd4d..00000000000
--- a/sys-apps/firejail/firejail-0.9.50.ebuild
+++ /dev/null
@@ -1,49 +0,0 @@
-# Copyright 1999-2017 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=6
-
-inherit eutils
-
-DESCRIPTION="Security sandbox for any type of processes"
-HOMEPAGE="https://firejail.wordpress.com/";
-SRC_URI="mirror://sourceforge/${PN}/${P}.tar.xz"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="amd64 ~x86"
-IUSE="apparmor +bind +chroot contrib +file-transfer +network
-       network-restricted +seccomp +userns x11"
-
-DEPEND="!sys-apps/firejail-lts
-       apparmor? ( sys-libs/libapparmor )"
-RDEPEND="${DEPEND}
-       x11? ( x11-wm/xpra[client,server] )"
-
-PATCHES=( "${FILESDIR}/${PV}-contrib-fix.patch" )
-
-RESTRICT=test
-
-src_prepare() {
-       default
-       find -name Makefile.in -exec sed -i -r \
-                       -e '/^\tinstall .*COPYING /d' \
-                       -e '/CFLAGS/s: (-O2|-ggdb) : :g' \
-                       -e '1iCC=@CC@' {} + || die
-}
-
-src_configure() {
-       local myeconfargs=(
-               $(use_enable apparmor)
-               $(use_enable bind)
-               $(use_enable chroot)
-               $(use_enable contrib contrib-install)
-               $(use_enable file-transfer)
-               $(use_enable network)
-               $(use_enable seccomp)
-               $(use_enable userns)
-               $(use_enable x11)
-       )
-       use network-restricted && myeconfargs+=( --enable-network=restricted )
-       econf "${myeconfargs[@]}"
-}

diff --git a/sys-apps/firejail/metadata.xml b/sys-apps/firejail/metadata.xml
index 3af2a06d7a1..2e4938a0a3c 100644
--- a/sys-apps/firejail/metadata.xml
+++ b/sys-apps/firejail/metadata.xml
@@ -18,14 +18,11 @@
        </upstream>
        <use>
                <flag name="apparmor">Enable support for custom AppArmor 
profiles</flag>
-               <flag name="bind">Enable custom bind mounts</flag>
                <flag name="chroot">Enable chrooting to custom directory</flag>
                <flag name="contrib">Install contrib scripts</flag>
                <flag name="file-transfer">Enable file transfers between 
sandboxes and the host system</flag>
                <flag name="globalcfg">Enable global config file</flag>
                <flag name="network">Enable networking features</flag>
-               <flag name="network-restricted">Grant access to --interface, 
--net=ethXXX and --netfilter only to root user;
-                                                                               
regular users are       only allowed --net=none</flag>
                <flag name="overlayfs">Enable overlayfs</flag>
                <flag name="private-home">Enable private home feature</flag>
                <flag name="seccomp">Enable system call filtering</flag>

Reply via email to