commit:     6a8a378f224cc8a3150bd44af80ec5ccf8363053
Author:     Andreas Sturmlechner <asturm <AT> gentoo <DOT> org>
AuthorDate: Sat Jan  9 09:58:27 2021 +0000
Commit:     Andreas Sturmlechner <asturm <AT> gentoo <DOT> org>
CommitDate: Mon Jan 11 12:28:00 2021 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6a8a378f

kde-frameworks/kio: Drop 5.74.1-r2

Package-Manager: Portage-3.0.12, Repoman-3.0.2
Signed-off-by: Andreas Sturmlechner <asturm <AT> gentoo.org>

 kde-frameworks/kio/Manifest                        |   1 -
 ...o-5.74.1-handle-shell-scripts-consistenty.patch | 310 ---------------------
 ...o-5.74.1-kio_trash-too-strict-perms-check.patch |  67 -----
 kde-frameworks/kio/kio-5.74.1-r2.ebuild            |  98 -------
 4 files changed, 476 deletions(-)

diff --git a/kde-frameworks/kio/Manifest b/kde-frameworks/kio/Manifest
index 5b113e00c77..2358f4820c7 100644
--- a/kde-frameworks/kio/Manifest
+++ b/kde-frameworks/kio/Manifest
@@ -1,3 +1,2 @@
-DIST kio-5.74.1.tar.xz 3281248 BLAKE2B 
584fde1483477b70ee7892bf0de37aedb62672c2ada57d85c9646894606f10b6a03750030e1926441707b12b18ece167fa3a0dbbb75a8155bddfd35342d372f8
 SHA512 
a563b939d2bc71443c6c748ddf293fab84072efebdcea639707d7aaf2739356a906668be3dca915464ce7c81b63d7482ac024df786e04bbafcf999cde5ebc5e2
 DIST kio-5.77.0.tar.xz 3293128 BLAKE2B 
67c4d637d3497ca1d488ee2d73e85cfd81950bb0fc5fe8968a0c7a6d1603f1b6a4ff3acd9f944c1314138c53fdba90f3fdf8efed2340bcb10e6aa92b757f8f38
 SHA512 
36760771dd152d4da4d2f8905ee7d978a2b7718e286ffe2323f1ac1b7975a5577e47e6145a4592b9700a8069867b42f55fd6e4eee4a006318483e5e0ee06ee4c
 DIST kio-5.78.0.tar.xz 3308004 BLAKE2B 
b21cdde13013d7a3df91e821c8562df650b727e521b6552e9875c9aa74a97bb8b8b4a1d8b8cfd8f7d2c2eb68989ba2b7efc0fe77d46e57759e34ac1b39f9999c
 SHA512 
55996a35f77442f3cc2ff98708da6dfd2734b0afffd7b3b90b5b2845c9770f3ec68a1e4e72d21b1c4e41d06778ab376b96ab64d958c89dd4f8b7fad6501a5db7

diff --git 
a/kde-frameworks/kio/files/kio-5.74.1-handle-shell-scripts-consistenty.patch 
b/kde-frameworks/kio/files/kio-5.74.1-handle-shell-scripts-consistenty.patch
deleted file mode 100644
index f5e17f338fd..00000000000
--- a/kde-frameworks/kio/files/kio-5.74.1-handle-shell-scripts-consistenty.patch
+++ /dev/null
@@ -1,310 +0,0 @@
-From fdd7c47c85d5d6dbf21e05e7a0d6afcf383f1d24 Mon Sep 17 00:00:00 2001
-From: Ahmad Samir <a.samir...@gmail.com>
-Date: Tue, 15 Sep 2020 20:06:49 +0200
-Subject: [PATCH] OpenUrlJob: handle all text scripts consistently
-
-Previously we only handled application/x-shellscript, but there are other
-scripts; a script is technically a file that inherits both text/plain and
-application/x-executable, e.g. .sh, .csh, .py, perl scripts ...etc. Treat
-all those mime types the way we handled shell scripts:
-  - if it's not a local url, or isn't executable we open it in the preferred
-    text editor
-  - if it's executable either show the OpenOrExecute dialog or execute
-    directly depending on how the job is configured
-
-The mimetype world is a confusing one:
-  - Executables, this includes .exe files (MS Windows); and 
"application/x-executable"
-    and "application/x-sharedlib", this depends on various parameters (e.g.
-    stripped executables are x-sharedlib, the same executable if not stripped
-    is x-executable...)
-  - Scripts: shell, python, perl... etc scripts, which are text files that
-    can be executed or opened as text.
-
-Adjust the unit test.
-
-BUG: 425829
-BUG: 425177
-FIXED-IN: 5.75
----
- autotests/openurljobtest.cpp | 56 +++++++++++++++++++++++--------
- autotests/openurljobtest.h   |  2 ++
- src/gui/openurljob.cpp       | 65 ++++++++++++++++++++++--------------
- 3 files changed, 85 insertions(+), 38 deletions(-)
-
-diff --git a/autotests/openurljobtest.cpp b/autotests/openurljobtest.cpp
-index 2f2ef8ad..ed2211a8 100644
---- a/autotests/openurljobtest.cpp
-+++ b/autotests/openurljobtest.cpp
-@@ -103,14 +103,13 @@ void OpenUrlJobTest::initTestCase()
-     KConfigGroup grp = mimeAppsCfg.group("Default Applications");
-     grp.writeEntry("text/plain", s_tempServiceName);
-     grp.writeEntry("text/html", s_tempServiceName);
--    grp.writeEntry("application/x-shellscript", s_tempServiceName);
-     grp.sync();
- 
--    for (const char *mimeType : {"text/plain", "application/x-shellscript"}) {
--        KService::Ptr preferredTextEditor = 
KApplicationTrader::preferredService(QString::fromLatin1(mimeType));
--        QVERIFY(preferredTextEditor);
--        QCOMPARE(preferredTextEditor->entryPath(), m_fakeService);
--    }
-+
-+    // "text/plain" encompasses all scripts (shell, python, perl)
-+    KService::Ptr preferredTextEditor = 
KApplicationTrader::preferredService(QStringLiteral("text/plain"));
-+    QVERIFY(preferredTextEditor);
-+    QCOMPARE(preferredTextEditor->entryPath(), m_fakeService);
- 
-     // As used for preferredService
-     QVERIFY(KService::serviceByDesktopName("openurljobtest_service"));
-@@ -230,17 +229,38 @@ void OpenUrlJobTest::invalidUrl()
-     QCOMPARE(job2->errorString(), QStringLiteral("Malformed URL\n/pathonly"));
- }
- 
-+void OpenUrlJobTest::refuseRunningNativeExecutables_data()
-+{
-+    QTest::addColumn<QString>("mimeType");
-+
-+    // Executables under e.g. /usr/bin/ can be either of these two mimetypes
-+    // see https://gitlab.freedesktop.org/xdg/shared-mime-info/-/issues/11
-+    QTest::newRow("x-sharedlib") << "application/x-sharedlib";
-+    QTest::newRow("x-executable") << "application/x-executable";
-+}
-+
- void OpenUrlJobTest::refuseRunningNativeExecutables()
- {
--   KIO::OpenUrlJob *job = new 
KIO::OpenUrlJob(QUrl::fromLocalFile(QCoreApplication::applicationFilePath()), 
QStringLiteral("application/x-executable"), this);
-+   QFETCH(QString, mimeType);
-+
-+   KIO::OpenUrlJob *job = new 
KIO::OpenUrlJob(QUrl::fromLocalFile(QCoreApplication::applicationFilePath()), 
mimeType, this);
-    QVERIFY(!job->exec());
-    QCOMPARE(job->error(), KJob::UserDefinedError);
-    QVERIFY2(job->errorString().contains("For security reasons, launching 
executables is not allowed in this context."), qPrintable(job->errorString()));
- }
- 
-+void OpenUrlJobTest::refuseRunningRemoteNativeExecutables_data()
-+{
-+    QTest::addColumn<QString>("mimeType");
-+    QTest::newRow("x-sharedlib") << "application/x-sharedlib";
-+    QTest::newRow("x-executable") << "application/x-executable";
-+}
-+
- void OpenUrlJobTest::refuseRunningRemoteNativeExecutables()
- {
--    KIO::OpenUrlJob *job = new 
KIO::OpenUrlJob(QUrl("protocol://host/path/exe"), 
QStringLiteral("application/x-executable"), this);
-+   QFETCH(QString, mimeType);
-+
-+    KIO::OpenUrlJob *job = new 
KIO::OpenUrlJob(QUrl("protocol://host/path/exe"), mimeType, this);
-     job->setRunExecutables(true); // even with this enabled, an error will 
occur
-     QVERIFY(!job->exec());
-     QCOMPARE(job->error(), KJob::UserDefinedError);
-@@ -273,8 +293,11 @@ void OpenUrlJobTest::runScript_data()
- {
-     QTest::addColumn<QString>("mimeType");
- 
-+    // All text-based scripts inherit text/plain and 
application/x-executable, no need to test
-+    // all flavours (python, perl, lua, awk ...etc), this sample should be 
enough
-     QTest::newRow("shellscript") << "application/x-shellscript";
--    QTest::newRow("native") << "application/x-executable";
-+    QTest::newRow("pythonscript") << "text/x-python";
-+    QTest::newRow("javascript") << "application/javascript";
- }
- 
- void OpenUrlJobTest::runScript()
-@@ -305,16 +328,23 @@ void OpenUrlJobTest::runScript()
- 
- void OpenUrlJobTest::runNativeExecutable_data()
- {
-+    QTest::addColumn<QString>("mimeType");
-     QTest::addColumn<bool>("withHandler");
-     QTest::addColumn<bool>("handlerRetVal");
- 
--    QTest::newRow("no_handler") << false << false;
--    QTest::newRow("handler_false") << true << false;
--    QTest::newRow("handler_true") << true << true;
-+    QTest::newRow("no_handler_x-sharedlib") << "application/x-sharedlib" << 
false << false;
-+    QTest::newRow("handler_false_x-sharedlib") << "application/x-sharedlib" 
<< true << false;
-+    QTest::newRow("handler_true_x-sharedlib") << "application/x-sharedlib" << 
true << true;
-+
-+    QTest::newRow("no_handler_x-executable") << "application/x-executable" << 
false << false;
-+    QTest::newRow("handler_false_x-executable") << "application/x-executable" 
<< true << false;
-+    QTest::newRow("handler_true_x-executable") << "application/x-executable" 
<< true << true;
-+
- }
- 
- void OpenUrlJobTest::runNativeExecutable()
- {
-+    QFETCH(QString, mimeType);
-     QFETCH(bool, withHandler);
-     QFETCH(bool, handlerRetVal);
- 
-@@ -335,7 +365,7 @@ void OpenUrlJobTest::runNativeExecutable()
-     KIO::setDefaultUntrustedProgramHandler(withHandler ? &s_handler : 
nullptr);
- 
-     // When using OpenUrlJob to run the executable
--    KIO::OpenUrlJob *job = new 
KIO::OpenUrlJob(QUrl::fromLocalFile(scriptFile), 
QStringLiteral("application/x-executable"), this);
-+    KIO::OpenUrlJob *job = new 
KIO::OpenUrlJob(QUrl::fromLocalFile(scriptFile), mimeType, this);
-     job->setRunExecutables(true); // startProcess tests the case where this 
isn't set
-     const bool success = job->exec();
- 
-diff --git a/autotests/openurljobtest.h b/autotests/openurljobtest.h
-index e71987d9..f5b9a5be 100644
---- a/autotests/openurljobtest.h
-+++ b/autotests/openurljobtest.h
-@@ -26,7 +26,9 @@ private Q_SLOTS:
- 
-     void noServiceNoHandler();
-     void invalidUrl();
-+    void refuseRunningNativeExecutables_data();
-     void refuseRunningNativeExecutables();
-+    void refuseRunningRemoteNativeExecutables_data();
-     void refuseRunningRemoteNativeExecutables();
-     void notAuthorized();
-     void runScript_data();
-diff --git a/src/gui/openurljob.cpp b/src/gui/openurljob.cpp
-index 8ac187b4..3e35c95c 100644
---- a/src/gui/openurljob.cpp
-+++ b/src/gui/openurljob.cpp
-@@ -73,9 +73,9 @@ public:
- 
- private:
-     void executeCommand();
--    void handleExecutables(const QMimeType &mimeType);
-+    void handleBinaries(const QMimeType &mimeType);
-     void handleDesktopFiles();
--    void handleShellscripts();
-+    void handleScripts();
-     void openInPreferredApp();
-     void runLink(const QString &filePath, const QString &urlStr, const 
QString &optionalServiceName);
- 
-@@ -439,14 +439,29 @@ void KIO::OpenUrlJobPrivate::emitAccessDenied()
-     q->emitResult();
- }
- 
--// was: KRun::isExecutable (minus application/x-desktop and 
application/x-shellscript mimetypes).
-+// was: KRun::isExecutable (minus application/x-desktop mimetype).
- // Feel free to make public if needed.
--static bool isExecutableMime(const QMimeType &mimeType)
-+static bool isBinary(const QMimeType &mimeType)
- {
--    return (mimeType.inherits(QStringLiteral("application/x-executable")) ||
--            /* e.g. /usr/bin/ls, see 
https://gitlab.freedesktop.org/xdg/shared-mime-info/-/issues/11 */
--            mimeType.inherits(QStringLiteral("application/x-sharedlib")) ||
--            
mimeType.inherits(QStringLiteral("application/x-ms-dos-executable")));
-+    // - Binaries could be e.g.:
-+    //   - application/x-executable
-+    //   - application/x-sharedlib e.g. /usr/bin/ls, see
-+    //     https://gitlab.freedesktop.org/xdg/shared-mime-info/-/issues/11
-+    //
-+    // - Mimetypes that inherit application/x-executable _and_ text/plain are 
scripts, these are
-+    //   handled by handleScripts()
-+
-+    return (mimeType.inherits(QStringLiteral("application/x-executable"))
-+            || mimeType.inherits(QStringLiteral("application/x-sharedlib"))
-+            || 
mimeType.inherits(QStringLiteral("application/x-ms-dos-executable")));
-+}
-+
-+// Helper function that returns whether a file is a text-based script
-+// e.g. ".sh", ".csh", ".py", ".js"
-+static bool isTextScript(const QMimeType &mimeType)
-+{
-+    return (mimeType.inherits(QStringLiteral("application/x-executable"))
-+            && mimeType.inherits(QStringLiteral("text/plain")));
- }
- 
- // Helper function that returns whether a file has the execute bit set or not.
-@@ -456,7 +471,7 @@ static bool hasExecuteBit(const QString &fileName)
- }
- 
- // Handle native binaries (.e.g. /usr/bin/*); and .exe files
--void KIO::OpenUrlJobPrivate::handleExecutables(const QMimeType &mimeType)
-+void KIO::OpenUrlJobPrivate::handleBinaries(const QMimeType &mimeType)
- {
-     if (!KAuthorized::authorize(QStringLiteral("shell_access"))) {
-         emitAccessDenied();
-@@ -475,11 +490,9 @@ void KIO::OpenUrlJobPrivate::handleExecutables(const 
QMimeType &mimeType)
- 
-     const QString localPath = m_url.toLocalFile();
- 
--    // Check whether file is an executable script
--#ifdef Q_OS_WIN
--    const bool isNativeBinary = 
!mimeType.inherits(QStringLiteral("text/plain"));
--#else
--    const bool isNativeBinary = 
!mimeType.inherits(QStringLiteral("text/plain")) && 
!mimeType.inherits(QStringLiteral("application/x-ms-dos-executable"));
-+    bool isNativeBinary = true;
-+#ifndef Q_OS_WIN
-+    isNativeBinary = 
!mimeType.inherits(QStringLiteral("application/x-ms-dos-executable"));
- #endif
- 
-     if (m_showOpenOrExecuteDialog) {
-@@ -497,6 +510,8 @@ void KIO::OpenUrlJobPrivate::handleExecutables(const 
QMimeType &mimeType)
-             }
-         };
- 
-+        // Ask the user for confirmation before executing this binary (for 
binaries
-+        // the dialog will only show Execute/Cancel)
-         showOpenOrExecuteFileDialog(dialogFinished);
-         return;
-     }
-@@ -601,15 +616,15 @@ void KIO::OpenUrlJobPrivate::runUrlWithMimeType()
-         return;
-     }
- 
--    // Shell scripts
--    if (mimeType.inherits(QStringLiteral("application/x-shellscript"))) {
--        handleShellscripts();
-+    // Scripts (e.g. .sh, .csh, .py, .js)
-+    if (isTextScript(mimeType)) {
-+        handleScripts();
-         return;
-     }
- 
--    // Binaries (e.g. /usr/bin/konsole) and .exe files
--    if (isExecutableMime(mimeType)) {
--        handleExecutables(mimeType);
-+    // Binaries (e.g. /usr/bin/{konsole,ls}) and .exe files
-+    if (isBinary(mimeType)) {
-+        handleBinaries(mimeType);
-         return;
-     }
- 
-@@ -677,8 +692,9 @@ void KIO::OpenUrlJobPrivate::handleDesktopFiles()
-     openInPreferredApp();
- }
- 
--void KIO::OpenUrlJobPrivate::handleShellscripts()
-+void KIO::OpenUrlJobPrivate::handleScripts()
- {
-+    // Executable scripts of any type can run arbitrary shell commands
-     if (!KAuthorized::authorize(QStringLiteral("shell_access"))) {
-         emitAccessDenied();
-         return;
-@@ -687,8 +703,7 @@ void KIO::OpenUrlJobPrivate::handleShellscripts()
-     const bool isLocal = m_url.isLocalFile();
-     const QString localPath = m_url.toLocalFile();
-     if (!isLocal || !hasExecuteBit(localPath)) {
--        // Open remote shell scripts or ones without the execute bit, with the
--        // default application
-+        // Open remote scripts or ones without the execute bit, with the 
default application
-         openInPreferredApp();
-         return;
-     }
-@@ -706,7 +721,7 @@ void KIO::OpenUrlJobPrivate::handleShellscripts()
-         return;
-     }
- 
--    if (m_runExecutables) { // Local executable shell script, proceed
-+    if (m_runExecutables) { // Local executable script, proceed
-         executeCommand();
-     } else { // Open in the default (text editor) app
-         openInPreferredApp();
-@@ -767,7 +782,7 @@ void 
KIO::OpenUrlJobPrivate::showOpenOrExecuteFileDialog(std::function<void(bool
- 
-     if (!s_openOrExecuteFileHandler) {
-         // No way to ask the user whether to execute or open
--        if (mimeType.inherits(QStringLiteral("application/x-shellscript"))
-+        if (isTextScript(mimeType)
-             || mimeType.inherits(QStringLiteral("application/x-desktop"))) { 
// Open text-based ones in the default app
-             openInPreferredApp();
-         } else {
--- 
-GitLab
-

diff --git 
a/kde-frameworks/kio/files/kio-5.74.1-kio_trash-too-strict-perms-check.patch 
b/kde-frameworks/kio/files/kio-5.74.1-kio_trash-too-strict-perms-check.patch
deleted file mode 100644
index d0b0ca0769c..00000000000
--- a/kde-frameworks/kio/files/kio-5.74.1-kio_trash-too-strict-perms-check.patch
+++ /dev/null
@@ -1,67 +0,0 @@
-From 03bcb3d3ff89074a68839b6ebeb8030ef0ee4fd1 Mon Sep 17 00:00:00 2001
-From: David Faure <fa...@kde.org>
-Date: Fri, 11 Sep 2020 11:54:09 +0200
-Subject: [PATCH] kio_trash: remove unnecessarily strict permission check
-
-Tested with `chmod 0770 /d/.Trash-1000` (where /d is a mount point),
-kio_trash complained about security checks before this commit,
-and works with it.
-
-Also tested with a USB key which ends up mounted as
-type vfat 
(rw,nosuid,nodev,relatime,uid=1000,gid=100,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,showexec,utf8,flush,errors=remount-ro,uhelper=udisks2).
 After kio_trash creates .Trash-1000
-it complained about a "strange filesystem", and while this is still true :),
-the removal of the code in TrashImpl::initTrashDirectory makes
-the trash dir on the USB key usable.
-
-BUG: 76380
-FIXED-IN: 5.74
----
- src/ioslaves/trash/trashimpl.cpp | 25 ++++---------------------
- 1 file changed, 4 insertions(+), 21 deletions(-)
-
-diff --git a/src/ioslaves/trash/trashimpl.cpp 
b/src/ioslaves/trash/trashimpl.cpp
-index b1ba87a4..9ec7cc7a 100644
---- a/src/ioslaves/trash/trashimpl.cpp
-+++ b/src/ioslaves/trash/trashimpl.cpp
-@@ -1210,9 +1210,9 @@ QString TrashImpl::trashForMountPoint(const QString 
&topdir, bool createIfNeeded
-     const QByteArray trashDir_c = QFile::encodeName(trashDir);
-     if (QT_LSTAT(trashDir_c.constData(), &buff) == 0) {
-         if ((buff.st_uid == uid)  // must be owned by user
--                && (S_ISDIR(buff.st_mode)) // must be a dir
--                && (!S_ISLNK(buff.st_mode)) // not a symlink
--                && ((buff.st_mode & 0777) == 0700)) {  // rwx for user, 
------ for group and others
-+                && S_ISDIR(buff.st_mode) // must be a dir
-+                && !S_ISLNK(buff.st_mode) // not a symlink
-+                && ((buff.st_mode & 0700) == 0700)) { // and we need write 
access to it
- 
-             if (checkTrashSubdirs(trashDir_c)) {
-                 return trashDir;
-@@ -1248,24 +1248,7 @@ bool TrashImpl::initTrashDirectory(const QByteArray 
&trashDir_c) const
-         return false;
-     }
-     //qCDebug(KIO_TRASH);
--    // This trash dir will be useable only if the directory is owned by user.
--    // In theory this is the case, but not on e.g. USB keys...
--    uid_t uid = getuid();
--    QT_STATBUF buff;
--    if (QT_LSTAT(trashDir_c.constData(), &buff) != 0) {
--        return false;    // huh?
--    }
--    if ((buff.st_uid == uid)  // must be owned by user
--            && ((buff.st_mode & 0777) == 0700)) {  // rwx for user, --- for 
group and others
--
--        return checkTrashSubdirs(trashDir_c);
--
--    } else {
--        qCWarning(KIO_TRASH) << trashDir_c << "just created, by it doesn't 
have the right permissions, probably some strange unsupported filesystem";
--        ::rmdir(trashDir_c.constData());
--        return false;
--    }
--    return true;
-+    return checkTrashSubdirs(trashDir_c);
- }
- 
- bool TrashImpl::checkTrashSubdirs(const QByteArray &trashDir_c) const
--- 
-GitLab
-

diff --git a/kde-frameworks/kio/kio-5.74.1-r2.ebuild 
b/kde-frameworks/kio/kio-5.74.1-r2.ebuild
deleted file mode 100644
index e332fd74357..00000000000
--- a/kde-frameworks/kio/kio-5.74.1-r2.ebuild
+++ /dev/null
@@ -1,98 +0,0 @@
-# Copyright 1999-2020 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=7
-
-ECM_DESIGNERPLUGIN="true"
-ECM_TEST="forceoptional"
-PVCUT=$(ver_cut 1-2)
-QTMIN=5.15.1
-VIRTUALX_REQUIRED="test"
-inherit ecm kde.org xdg-utils
-
-DESCRIPTION="Framework providing transparent file and data management"
-LICENSE="LGPL-2+"
-KEYWORDS="amd64 ~arm arm64 ~ppc64 x86"
-IUSE="acl +handbook kerberos +kwallet X"
-
-RDEPEND="
-       dev-libs/libxml2
-       dev-libs/libxslt
-       >=dev-qt/qtdbus-${QTMIN}:5
-       >=dev-qt/qtdeclarative-${QTMIN}:5
-       >=dev-qt/qtgui-${QTMIN}:5
-       >=dev-qt/qtnetwork-${QTMIN}:5[ssl]
-       >=dev-qt/qtwidgets-${QTMIN}:5
-       >=dev-qt/qtxml-${QTMIN}:5
-       =kde-frameworks/kauth-${PVCUT}*:5
-       =kde-frameworks/karchive-${PVCUT}*:5
-       =kde-frameworks/kbookmarks-${PVCUT}*:5
-       =kde-frameworks/kcodecs-${PVCUT}*:5
-       =kde-frameworks/kcompletion-${PVCUT}*:5
-       =kde-frameworks/kconfig-${PVCUT}*:5
-       =kde-frameworks/kconfigwidgets-${PVCUT}*:5
-       =kde-frameworks/kcoreaddons-${PVCUT}*:5
-       =kde-frameworks/kcrash-${PVCUT}*:5
-       =kde-frameworks/kdbusaddons-${PVCUT}*:5
-       =kde-frameworks/ki18n-${PVCUT}*:5
-       =kde-frameworks/kiconthemes-${PVCUT}*:5
-       =kde-frameworks/kitemviews-${PVCUT}*:5
-       =kde-frameworks/kjobwidgets-${PVCUT}*:5
-       =kde-frameworks/knotifications-${PVCUT}*:5
-       =kde-frameworks/kservice-${PVCUT}*:5
-       =kde-frameworks/ktextwidgets-${PVCUT}*:5
-       =kde-frameworks/kwidgetsaddons-${PVCUT}*:5
-       =kde-frameworks/kwindowsystem-${PVCUT}*:5
-       =kde-frameworks/kxmlgui-${PVCUT}*:5
-       =kde-frameworks/solid-${PVCUT}*:5
-       acl? (
-               sys-apps/attr
-               virtual/acl
-       )
-       handbook? ( =kde-frameworks/kdoctools-${PVCUT}*:5 )
-       kerberos? ( virtual/krb5 )
-       kwallet? ( =kde-frameworks/kwallet-${PVCUT}*:5 )
-       X? ( >=dev-qt/qtx11extras-${QTMIN}:5 )
-"
-DEPEND="${RDEPEND}
-       >=dev-qt/qtconcurrent-${QTMIN}:5
-       test? ( sys-libs/zlib )
-       X? (
-               x11-base/xorg-proto
-               x11-libs/libX11
-               x11-libs/libXrender
-       )
-"
-PDEPEND="
-       >=kde-frameworks/kded-${PVCUT}:5
-"
-
-# tests hang
-RESTRICT+=" test"
-
-PATCHES=(
-       "${FILESDIR}"/${P}-kio_trash-too-strict-perms-check.patch
-       "${FILESDIR}"/${P}-handle-shell-scripts-consistenty.patch
-)
-
-src_configure() {
-       local mycmakeargs=(
-               $(cmake_use_find_package acl ACL)
-               $(cmake_use_find_package handbook KF5DocTools)
-               $(cmake_use_find_package kerberos GSSAPI)
-               $(cmake_use_find_package kwallet KF5Wallet)
-               $(cmake_use_find_package X X11)
-       )
-
-       ecm_src_configure
-}
-
-pkg_postinst() {
-       ecm_pkg_postinst
-       xdg_desktop_database_update
-}
-
-pkg_postrm() {
-       ecm_pkg_postrm
-       xdg_desktop_database_update
-}

Reply via email to