[gentoo-commits] proj/musl:master commit in: sys-auth/polkit/, sys-auth/polkit/files/

2022-02-23 Thread Jory Pratt
commit: 3fa32295616a9ffef5bbea9c8568367b080a520f
Author: Jory Pratt  gentoo  org>
AuthorDate: Wed Feb 23 15:58:58 2022 +
Commit: Jory Pratt  gentoo  org>
CommitDate: Wed Feb 23 15:59:23 2022 +
URL:https://gitweb.gentoo.org/proj/musl.git/commit/?id=3fa32295

sys-auth/polkit: sync with ::gentoo

Package-Manager: Portage-3.0.30, Repoman-3.0.3
Signed-off-by: Jory Pratt  gentoo.org>

 .../polkit/files/polkit-0.120-CVE-2021-4115.patch  |  78 +
 sys-auth/polkit/polkit-0.120-r3.ebuild | 128 +
 2 files changed, 206 insertions(+)

diff --git a/sys-auth/polkit/files/polkit-0.120-CVE-2021-4115.patch 
b/sys-auth/polkit/files/polkit-0.120-CVE-2021-4115.patch
new file mode 100644
index ..a82ce25c
--- /dev/null
+++ b/sys-auth/polkit/files/polkit-0.120-CVE-2021-4115.patch
@@ -0,0 +1,78 @@
+https://gitlab.freedesktop.org/polkit/polkit/-/commit/41cb093f554da8772362654a128a84dd8a5542a7
+https://gitlab.freedesktop.org/polkit/polkit/-/issues/141
+https://bugs.gentoo.org/833574
+
+From: Jan Rybar 
+Date: Mon, 21 Feb 2022 08:29:05 +
+Subject: [PATCH] CVE-2021-4115 (GHSL-2021-077) fix
+
+--- a/src/polkit/polkitsystembusname.c
 b/src/polkit/polkitsystembusname.c
+@@ -62,6 +62,10 @@ enum
+   PROP_NAME,
+ };
+ 
++
++guint8 dbus_call_respond_fails;  // has to be global because of callback
++
++
+ static void subject_iface_init (PolkitSubjectIface *subject_iface);
+ 
+ G_DEFINE_TYPE_WITH_CODE (PolkitSystemBusName, polkit_system_bus_name, 
G_TYPE_OBJECT,
+@@ -364,6 +368,7 @@ on_retrieved_unix_uid_pid (GObject  *src,
+   if (!v)
+ {
+   data->caught_error = TRUE;
++  dbus_call_respond_fails += 1;
+ }
+   else
+ {
+@@ -405,6 +410,8 @@ polkit_system_bus_name_get_creds_sync (PolkitSystemBusName 
  *system_bus
+   tmp_context = g_main_context_new ();
+   g_main_context_push_thread_default (tmp_context);
+ 
++  dbus_call_respond_fails = 0;
++
+   /* Do two async calls as it's basically as fast as one sync call.
+*/
+   g_dbus_connection_call (connection,
+@@ -432,11 +439,34 @@ polkit_system_bus_name_get_creds_sync 
(PolkitSystemBusName   *system_bus
+ on_retrieved_unix_uid_pid,
+ );
+ 
+-  while (!((data.retrieved_uid && data.retrieved_pid) || data.caught_error))
+-g_main_context_iteration (tmp_context, TRUE);
++  while (TRUE)
++  {
++/* If one dbus call returns error, we must wait until the other call
++ * calls _call_finish(), otherwise fd leak is possible.
++ * Resolves: GHSL-2021-077
++*/
+ 
+-  if (data.caught_error)
+-goto out;
++if ( (dbus_call_respond_fails > 1) )
++{
++  // we got two faults, we can leave
++  goto out;
++}
++
++if ((data.caught_error && (data.retrieved_pid || data.retrieved_uid)))
++{
++  // we got one fault and the other call finally finished, we can leave
++  goto out;
++}
++
++if ( !(data.retrieved_uid && data.retrieved_pid) )
++{
++  g_main_context_iteration (tmp_context, TRUE);
++}
++else
++{
++  break;
++}
++  }
+ 
+   if (out_uid)
+ *out_uid = data.uid;
+GitLab

diff --git a/sys-auth/polkit/polkit-0.120-r3.ebuild 
b/sys-auth/polkit/polkit-0.120-r3.ebuild
new file mode 100644
index ..b4a58c38
--- /dev/null
+++ b/sys-auth/polkit/polkit-0.120-r3.ebuild
@@ -0,0 +1,128 @@
+# Copyright 1999-2022 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+inherit meson pam pax-utils systemd xdg-utils
+
+DESCRIPTION="Policy framework for controlling privileges for system-wide 
services"
+HOMEPAGE="https://www.freedesktop.org/wiki/Software/polkit 
https://gitlab.freedesktop.org/polkit/polkit;
+SRC_URI="https://www.freedesktop.org/software/${PN}/releases/${P}.tar.gz
+   https://dev.gentoo.org/~anarchy/dist/polkit-0.120-duktape-1.patch;
+
+LICENSE="LGPL-2"
+SLOT="0"
+KEYWORDS="amd64 ~arm ~arm64 ~mips ~ppc64 ~x86"
+IUSE="duktape examples gtk +introspection kde pam selinux systemd test"
+#RESTRICT="!test? ( test )"
+# Tests currently don't work with meson. See
+#   https://gitlab.freedesktop.org/polkit/polkit/-/issues/144
+RESTRICT="test"
+
+BDEPEND="
+   acct-user/polkitd
+   app-text/docbook-xml-dtd:4.1.2
+   app-text/docbook-xsl-stylesheets
+   dev-libs/glib
+   dev-libs/gobject-introspection-common
+   dev-libs/libxslt
+   dev-util/glib-utils
+   sys-devel/gettext
+   virtual/pkgconfig
+   introspection? ( dev-libs/gobject-introspection )
+"
+DEPEND="
+   duktape? ( dev-lang/duktape )
+   !duktape? ( dev-lang/spidermonkey:78[-debug] )
+   dev-libs/glib:2
+   dev-libs/expat
+   pam? (
+   sys-auth/pambase
+   sys-libs/pam
+   )
+   !pam? ( virtual/libcrypt:= )
+   systemd? ( sys-apps/systemd:0=[policykit] )
+   !systemd? ( sys-auth/elogind )
+"
+RDEPEND="${DEPEND}
+   

[gentoo-commits] proj/musl:master commit in: sys-auth/polkit/, sys-auth/polkit/files/

2022-01-26 Thread Jory Pratt
commit: 7b63ecc28ba29ecf67bf377328ad2534a0a9968e
Author: Jory Pratt  gentoo  org>
AuthorDate: Wed Jan 26 13:37:13 2022 +
Commit: Jory Pratt  gentoo  org>
CommitDate: Wed Jan 26 13:37:39 2022 +
URL:https://gitweb.gentoo.org/proj/musl.git/commit/?id=7b63ecc2

sys-auth/polkit: meson fix, security bump

Package-Manager: Portage-3.0.30, Repoman-3.0.3
Signed-off-by: Jory Pratt  gentoo.org>

 sys-auth/polkit/Manifest   |   2 -
 sys-auth/polkit/files/polkit-0.115-elogind.patch   |  28 ---
 ...it-0.116-make-netgroup-support-optional-1.patch | 248 -
 ...it-0.116-make-netgroup-support-optional-2.patch | 219 --
 .../polkit/files/polkit-0.120-CVE-2021-4043.patch  |  72 ++
 sys-auth/polkit/files/polkit-0.120-meson.patch |  42 
 sys-auth/polkit/metadata.xml   |   1 -
 sys-auth/polkit/polkit-0.119-r2.ebuild | 141 
 ...lkit-0.120-r1.ebuild => polkit-0.120-r2.ebuild} |  12 +-
 9 files changed, 121 insertions(+), 644 deletions(-)

diff --git a/sys-auth/polkit/Manifest b/sys-auth/polkit/Manifest
index 14c82431..1125d650 100644
--- a/sys-auth/polkit/Manifest
+++ b/sys-auth/polkit/Manifest
@@ -1,4 +1,2 @@
-DIST polkit-0.118-duktape.patch 50144 BLAKE2B 
83be77ed93596bd44306b8e5b677497c6e4dab3a16626a32849abb3d91b527ad1e3a1436dcd7389ca5794ea1d7efaa3d5acc950f868fcda85b4bab75ad54205a
 SHA512 
dec31b81678a5436ddeef633d668c735d3c7128d6b5fb7b5dda2d06e8cf40ce9093813e9fbc8870475321d6fcdef3395bf3dd0db7ed214f0f45b19bf47c8a867
-DIST polkit-0.119.tar.gz 1387409 BLAKE2B 
aeb605598393d1cab40f7c77954008a0392600584c5fe8cc9acaa0e122418ee48b9cce0b6839189ea415277ff0ae4dbd5b7c71cb910aa349dcaf7e1f3f70ef06
 SHA512 
0260fb15da1c4c1f429e8223260981e64e297f1be8ced42f6910f09ea6581b8205aca06c9c601eb4a128acba2f468de0223118f96862ba769f95721894cf1578
 DIST polkit-0.120-duktape-1.patch 127886 BLAKE2B 
5ae791538ff576c01340a8eee197c0da580cf8a5afd5d0ba54526191edf68c16811debed981c540fcf2ad6fbf0d13f66c71c8ccd32560fda2f39aeb86cd15349
 SHA512 
bd3fb95a2e4151646859fef031f463fabd8c02bd24024f8269a74c171d70f8fc33de055193b2a0fb0c40fc459f01ec9a546cfdf1c90ef096ba8e5135d08be4a7
 DIST polkit-0.120.tar.gz 1626659 BLAKE2B 
745727445b4946d44b8ea470d21ac131ca7706e83f5dbaf85cf3541ac60a1bbe23b3bf3172a62d9256ebb3dae02d2b2d476e3e0f7fe79a80c47864a120e62ed9
 SHA512 
db072769439d5e17d0eed681e7b94251b77828c1474b40fe40b94293903a64333e7fa17515a3270648691f04a1374d8b404405ead6abf292a8eb8483164adc46

diff --git a/sys-auth/polkit/files/polkit-0.115-elogind.patch 
b/sys-auth/polkit/files/polkit-0.115-elogind.patch
deleted file mode 100644
index 93d67201..
--- a/sys-auth/polkit/files/polkit-0.115-elogind.patch
+++ /dev/null
@@ -1,28 +0,0 @@
-From 08bb656496cd3d6213bbe9473f63f2d4a110da6e Mon Sep 17 00:00:00 2001
-From: Rasmus Thomsen 
-Date: Wed, 11 Apr 2018 13:14:14 +0200
-Subject: [PATCH] configure: fix elogind support
-
-HAVE_LIBSYSTEMD is used to determine which source files to use.
-We have to check if either have_libsystemd or have_libelogind is
-true, as both of these need the source files which are used when
-HAVE_LIBSYSTEMD is true.

- configure.ac | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-diff --git a/configure.ac b/configure.ac
-index 36df239..da47ecb 100644
 a/configure.ac
-+++ b/configure.ac
-@@ -221,7 +221,7 @@ AS_IF([test "x$cross_compiling" != "xyes" ], [
- 
- AC_SUBST(LIBSYSTEMD_CFLAGS)
- AC_SUBST(LIBSYSTEMD_LIBS)
--AM_CONDITIONAL(HAVE_LIBSYSTEMD, [test "$have_libsystemd" = "yes"], [Using 
libsystemd])
-+AM_CONDITIONAL(HAVE_LIBSYSTEMD, [test "$have_libsystemd" = "yes" || test 
"$have_libelogind" = "yes" ], [Using libsystemd])
- 
- dnl 
---
- dnl - systemd unit / service files
--- 
-2.17.0

diff --git 
a/sys-auth/polkit/files/polkit-0.116-make-netgroup-support-optional-1.patch 
b/sys-auth/polkit/files/polkit-0.116-make-netgroup-support-optional-1.patch
deleted file mode 100644
index 84f07f98..
--- a/sys-auth/polkit/files/polkit-0.116-make-netgroup-support-optional-1.patch
+++ /dev/null
@@ -1,248 +0,0 @@
-From 71e5409c931f8e69ef7e782d1c396c335a4c3f76 Mon Sep 17 00:00:00 2001
-From: A. Wilcox 
-Date: Mon, 20 May 2019 20:24:42 -0500
-Subject: [PATCH] On at least Linux/musl and Linux/uclibc, netgroup 
-support is not available.  PolKit fails to compile on these systems
-for that reason.
-
-This change makes netgroup support conditional on the presence of the
-setnetgrent(3) function which is required for the support to work.  If
-that function is not available on the system, an error will be returned
-to the administrator if unix-netgroup: is specified in configuration.
-
-Fixes bug 50145.
-
-Closes polkit/polkit#14.
-Signed-off-by: A. Wilcox 

- configure.ac |  2 +-
- src/polkit/polkitidentity.c  | 16 
- src/polkit/polkitunixnetgroup.c  |  3 

[gentoo-commits] proj/musl:master commit in: sys-auth/polkit/, sys-auth/polkit/files/

2020-09-17 Thread Jory Pratt
commit: b690de43759b5869bfc3af925094a0485d323b41
Author: stefson  yahoo  de>
AuthorDate: Wed Sep  9 07:18:15 2020 +
Commit: Jory Pratt  gentoo  org>
CommitDate: Thu Sep 17 15:19:14 2020 +
URL:https://gitweb.gentoo.org/proj/musl.git/commit/?id=b690de43

sys-auth/polkit: add upstream fix for mozjs-78

taken from upstream: 
https://gitlab.freedesktop.org/polkit/polkit/-/merge_requests/64

Keywords are dropped, to allow testing for others.

Signed-off-by: Steffen Kuhn  yandex.com>
Signed-off-by: Jory Pratt  gentoo.org>

 sys-auth/polkit/files/polkit-0.117-mozjs-78.patch | 104 
 sys-auth/polkit/polkit-0.117-r1.ebuild| 138 ++
 2 files changed, 242 insertions(+)

diff --git a/sys-auth/polkit/files/polkit-0.117-mozjs-78.patch 
b/sys-auth/polkit/files/polkit-0.117-mozjs-78.patch
new file mode 100644
index 000..f64a7bf
--- /dev/null
+++ b/sys-auth/polkit/files/polkit-0.117-mozjs-78.patch
@@ -0,0 +1,104 @@
+From 3e1d61868fa8bfc586099302e931433270e5d17d Mon Sep 17 00:00:00 2001
+From: Jan Rybar 
+Date: Tue, 25 Aug 2020 16:38:34 +
+Subject: [PATCH] Port polkit to mozjs78
+
+---
+ configure.ac   |  4 ++--
+ src/polkitbackend/polkitbackendjsauthority.cpp | 15 ++-
+ 2 files changed, 8 insertions(+), 11 deletions(-)
+
+diff --git a/configure.ac b/configure.ac
+index eea70fc7..c4569f10 100644
+--- a/configure.ac
 b/configure.ac
+@@ -34,7 +34,7 @@ AC_PROG_LN_S
+ AC_SYS_LARGEFILE
+ AM_PROG_CC_C_O
+ AC_PROG_CXX
+-AX_CXX_COMPILE_STDCXX([14], [], [mandatory])
++AX_CXX_COMPILE_STDCXX([17], [], [mandatory])
+ 
+ # Taken from dbus
+ AC_ARG_ENABLE(ansi, [  --enable-ansi   enable -ansi 
-pedantic gcc flags],enable_ansi=$enableval,enable_ansi=no)
+@@ -80,7 +80,7 @@ PKG_CHECK_MODULES(GLIB, [gmodule-2.0 gio-unix-2.0 >= 2.30.0])
+ AC_SUBST(GLIB_CFLAGS)
+ AC_SUBST(GLIB_LIBS)
+ 
+-PKG_CHECK_MODULES(LIBJS, [mozjs-68])
++PKG_CHECK_MODULES(LIBJS, [mozjs-78])
+ 
+ AC_SUBST(LIBJS_CFLAGS)
+ AC_SUBST(LIBJS_CXXFLAGS)
+diff --git a/src/polkitbackend/polkitbackendjsauthority.cpp 
b/src/polkitbackend/polkitbackendjsauthority.cpp
+index 25bd1f93..ca171083 100644
+--- a/src/polkitbackend/polkitbackendjsauthority.cpp
 b/src/polkitbackend/polkitbackendjsauthority.cpp
+@@ -49,6 +49,7 @@
+ #include 
+ #include 
+ #include 
++#include 
+ #include 
+ 
+ #include "initjs.h" /* init.js */
+@@ -367,7 +368,7 @@ load_scripts (PolkitBackendJsAuthority  *authority)
+ static void
+ reload_scripts (PolkitBackendJsAuthority *authority)
+ {
+-  JS::AutoValueArray<1> args(authority->priv->cx);
++  JS::RootedValueArray<1> args(authority->priv->cx);
+   JS::RootedValue rval(authority->priv->cx);
+ 
+   JS::RootedObject js_polkit(authority->priv->cx, 
authority->priv->js_polkit->get ());
+@@ -482,10 +483,6 @@ polkit_backend_js_authority_constructed (GObject *object)
+   if (!JS::InitSelfHostedCode (authority->priv->cx))
+ goto fail;
+ 
+-  JS::ContextOptionsRef (authority->priv->cx)
+-  .setIon (TRUE)
+-  .setBaseline (TRUE)
+-  .setAsmJS (TRUE);
+   JS::SetWarningReporter(authority->priv->cx, report_error);
+   JS_SetContextPrivate (authority->priv->cx, authority);
+ 
+@@ -720,7 +717,7 @@ set_property_strv (PolkitBackendJsAuthority  *authority,
+ elems[n].setNull ();
+ }
+ 
+-  JS::RootedObject array_object(authority->priv->cx, JS_NewArrayObject 
(authority->priv->cx, elems));
++  JS::RootedObject array_object(authority->priv->cx, JS::NewArrayObject 
(authority->priv->cx, elems));
+ 
+   value_jsval = JS::ObjectValue (*array_object);
+   JS_SetProperty (authority->priv->cx, obj, name, value_jsval);
+@@ -1114,7 +,7 @@ polkit_backend_js_authority_get_admin_auth_identities 
(PolkitBackendInteractiveA
+ {
+   PolkitBackendJsAuthority *authority = POLKIT_BACKEND_JS_AUTHORITY 
(_authority);
+   GList *ret = NULL;
+-  JS::AutoValueArray<2> args(authority->priv->cx);
++  JS::RootedValueArray<2> args(authority->priv->cx);
+   JS::RootedValue rval(authority->priv->cx);
+   guint n;
+   GError *error = NULL;
+@@ -1218,7 +1215,7 @@ polkit_backend_js_authority_check_authorization_sync 
(PolkitBackendInteractiveAu
+ {
+   PolkitBackendJsAuthority *authority = POLKIT_BACKEND_JS_AUTHORITY 
(_authority);
+   PolkitImplicitAuthorization ret = implicit;
+-  JS::AutoValueArray<2> args(authority->priv->cx);
++  JS::RootedValueArray<2> args(authority->priv->cx);
+   JS::RootedValue rval(authority->priv->cx);
+   GError *error = NULL;
+   JS::RootedString ret_jsstr (authority->priv->cx);
+@@ -1409,7 +1406,7 @@ js_polkit_spawn (JSContext  *cx,
+   JS::CallArgs args = JS::CallArgsFromVp (js_argc, vp);
+   array_object = [0].toObject();
+ 
+-  if (!JS_GetArrayLength (cx, array_object, _len))
++  if (!JS::GetArrayLength (cx, array_object, _len))
+ {
+   JS_ReportErrorUTF8 (cx, "Failed to get array length");
+   goto out;
+-- 
+GitLab
+
+

diff --git a/sys-auth/polkit/polkit-0.117-r1.ebuild 

[gentoo-commits] proj/musl:master commit in: sys-auth/polkit/, sys-auth/polkit/files/

2019-04-28 Thread Jory Pratt
commit: 0b221c4343840a141621811e896da9f4fa359869
Author: Jory Pratt  gentoo  org>
AuthorDate: Sun Apr 28 21:55:50 2019 +
Commit: Jory Pratt  gentoo  org>
CommitDate: Sun Apr 28 21:55:50 2019 +
URL:https://gitweb.gentoo.org/proj/musl.git/commit/?id=0b221c43

sys-auth/polkit: sync with tree, update netgroup patch

Package-Manager: Portage-2.3.65, Repoman-2.3.12
Signed-off-by: Jory Pratt  gentoo.org>

 sys-auth/polkit/Manifest   |   1 +
 ...lkit-0.116-make-netgroup-support-optional.patch | 155 +
 sys-auth/polkit/metadata.xml   |   5 +-
 sys-auth/polkit/polkit-0.116.ebuild| 143 +++
 4 files changed, 302 insertions(+), 2 deletions(-)

diff --git a/sys-auth/polkit/Manifest b/sys-auth/polkit/Manifest
index 3883c90..9a71461 100644
--- a/sys-auth/polkit/Manifest
+++ b/sys-auth/polkit/Manifest
@@ -1,2 +1,3 @@
 DIST polkit-0.113.tar.gz 1448865 BLAKE2B 
93cb6abf03d0de193e9f64b953bee40faf3bd07cf6f86beb4f84edd740dedc0bcf7a1ffd6b3a1a816e5adad0ee59536dacae3d991add4c4965cc6a98566b7470
 SHA512 
ab177c89a20eeb2978ddbe28afb205d3619f9c5defe833eb68a85e71a0f2c905367f1295cbbfb85da5eafdd661bce474d5d84aca9195cd425a18c9b4170eb5f9
 DIST polkit-0.115.tar.gz 1550932 BLAKE2B 
3185ebed46209f88a9ffccbbcaf1bf180d1ae6d5ec53cf3c66d867ad43910b47a1123a3db190991ebb382a0d28fc5a119ea4bab942db324e9af5663056cf6ee1
 SHA512 
1153011fa93145b2c184e6b3446d3ca21b38918641aeccd8fac3985ac3e30ec6bc75be6973985fde90f2a24236592f1595be259155061c2d33358dd17c4ee4fc
+DIST polkit-0.116.tar.gz 1548311 BLAKE2B 
e9761a2934136d453a47b81dd1f132f9fc96c45b731d5fceb2aa7706f5325b6499f6acbb68032befc1b21878b1b54754685607c916ca8e02a8accca3ca014b31
 SHA512 
b66b01cc2bb4349de70147f41f161f0f6f41e7230b581dfb054058b48969ec57041ab05b51787c749ccfc36aa5f317952d7e7ba337b4f6f6c0a923ed5866c2d5

diff --git 
a/sys-auth/polkit/files/polkit-0.116-make-netgroup-support-optional.patch 
b/sys-auth/polkit/files/polkit-0.116-make-netgroup-support-optional.patch
new file mode 100644
index 000..0b4b698
--- /dev/null
+++ b/sys-auth/polkit/files/polkit-0.116-make-netgroup-support-optional.patch
@@ -0,0 +1,155 @@
+From 6a46ff1b969a7109c6f5f25ebabaa943bbd5bdaf Mon Sep 17 00:00:00 2001
+From: 
+Date: Sun, 28 Apr 2019 16:46:26 -0500
+Subject: [PATCH] make netgroup support optional
+
+---
+ configure.ac  | 2 +-
+ src/polkitbackend/init.js | 5 -
+ src/polkitbackend/polkitbackendinteractiveauthority.c | 4 
+ src/polkitbackend/polkitbackendjsauthority.cpp| 8 ++--
+ test/polkitbackend/test-polkitbackendjsauthority.c| 6 --
+ 5 files changed, 19 insertions(+), 6 deletions(-)
+
+diff --git a/configure.ac b/configure.ac
+index 5cedb4e..88ce2a6 100644
+--- a/configure.ac
 b/configure.ac
+@@ -99,7 +99,7 @@ AC_CHECK_LIB(expat,XML_ParserCreate,[EXPAT_LIBS="-lexpat"],
+[AC_MSG_ERROR([Can't find expat library. Please install expat.])])
+ AC_SUBST(EXPAT_LIBS)
+ 
+-AC_CHECK_FUNCS(clearenv fdatasync)
++AC_CHECK_FUNCS(clearenv fdatasync getnetgrent)
+ 
+ if test "x$GCC" = "xyes"; then
+   LDFLAGS="-Wl,--as-needed $LDFLAGS"
+diff --git a/src/polkitbackend/init.js b/src/polkitbackend/init.js
+index 79c80b6..2065cff 100644
+--- a/src/polkitbackend/init.js
 b/src/polkitbackend/init.js
+@@ -29,7 +29,10 @@ function Subject() {
+ };
+ 
+ this.isInNetGroup = function(netGroup) {
+-return polkit._userIsInNetGroup(this.user, netGroup);
++if (polkit._userIsInNetGroup)
++return polkit._userIsInNetGroup(this.user, netGroup);
++else
++return false;
+ };
+ 
+ this.toString = function() {
+diff --git a/src/polkitbackend/polkitbackendinteractiveauthority.c 
b/src/polkitbackend/polkitbackendinteractiveauthority.c
+index 056d9a8..559cd06 100644
+--- a/src/polkitbackend/polkitbackendinteractiveauthority.c
 b/src/polkitbackend/polkitbackendinteractiveauthority.c
+@@ -2225,6 +2225,7 @@ get_users_in_group (PolkitIdentity
*group,
+   return ret;
+ }
+ 
++#ifdef HAVE_GETNETGRENT
+ static GList *
+ get_users_in_net_group (PolkitIdentity*group,
+ gboolean   include_root)
+@@ -2284,6 +2285,7 @@ get_users_in_net_group (PolkitIdentity   
 *group,
+   endnetgrent ();
+   return ret;
+ }
++#endif
+ 
+ /* 

 */
+ 
+@@ -2369,10 +2371,12 @@ authentication_agent_initiate_challenge 
(AuthenticationAgent *agent,
+ {
+   user_identities = g_list_concat (user_identities, 
get_users_in_group (identity, FALSE));
+ }
++#ifdef HAVE_GETNETGRENT
+   else if (POLKIT_IS_UNIX_NETGROUP (identity))
+ {
+   user_identities =  g_list_concat (user_identities, 
get_users_in_net_group (identity, FALSE));
+ }

[gentoo-commits] proj/musl:master commit in: sys-auth/polkit/, sys-auth/polkit/files/

2018-12-02 Thread Anthony G. Basile
commit: 01006f554aa646ac1ef275753c3d28123d217b68
Author: S. Lockwood-Childs  vctlabs  com>
AuthorDate: Mon Nov 26 10:33:01 2018 +
Commit: Anthony G. Basile  gentoo  org>
CommitDate: Sun Dec  2 18:03:14 2018 +
URL:https://gitweb.gentoo.org/proj/musl.git/commit/?id=01006f55

sys-auth/polkit: bump version to 0.115

Signed-off-by: Anthony G. Basile  gentoo.org>

 sys-auth/polkit/Manifest   |   1 +
 sys-auth/polkit/files/polkit-0.115-elogind.patch   |  28 
 ...lkit-0.115-make-netgroup-support-optional.patch | 129 +++
 sys-auth/polkit/polkit-0.115-r1.ebuild | 141 +
 4 files changed, 299 insertions(+)

diff --git a/sys-auth/polkit/Manifest b/sys-auth/polkit/Manifest
index 39836f8..3883c90 100644
--- a/sys-auth/polkit/Manifest
+++ b/sys-auth/polkit/Manifest
@@ -1 +1,2 @@
 DIST polkit-0.113.tar.gz 1448865 BLAKE2B 
93cb6abf03d0de193e9f64b953bee40faf3bd07cf6f86beb4f84edd740dedc0bcf7a1ffd6b3a1a816e5adad0ee59536dacae3d991add4c4965cc6a98566b7470
 SHA512 
ab177c89a20eeb2978ddbe28afb205d3619f9c5defe833eb68a85e71a0f2c905367f1295cbbfb85da5eafdd661bce474d5d84aca9195cd425a18c9b4170eb5f9
+DIST polkit-0.115.tar.gz 1550932 BLAKE2B 
3185ebed46209f88a9ffccbbcaf1bf180d1ae6d5ec53cf3c66d867ad43910b47a1123a3db190991ebb382a0d28fc5a119ea4bab942db324e9af5663056cf6ee1
 SHA512 
1153011fa93145b2c184e6b3446d3ca21b38918641aeccd8fac3985ac3e30ec6bc75be6973985fde90f2a24236592f1595be259155061c2d33358dd17c4ee4fc

diff --git a/sys-auth/polkit/files/polkit-0.115-elogind.patch 
b/sys-auth/polkit/files/polkit-0.115-elogind.patch
new file mode 100644
index 000..93d6720
--- /dev/null
+++ b/sys-auth/polkit/files/polkit-0.115-elogind.patch
@@ -0,0 +1,28 @@
+From 08bb656496cd3d6213bbe9473f63f2d4a110da6e Mon Sep 17 00:00:00 2001
+From: Rasmus Thomsen 
+Date: Wed, 11 Apr 2018 13:14:14 +0200
+Subject: [PATCH] configure: fix elogind support
+
+HAVE_LIBSYSTEMD is used to determine which source files to use.
+We have to check if either have_libsystemd or have_libelogind is
+true, as both of these need the source files which are used when
+HAVE_LIBSYSTEMD is true.
+---
+ configure.ac | 2 +-
+ 1 file changed, 1 insertion(+), 1 deletion(-)
+
+diff --git a/configure.ac b/configure.ac
+index 36df239..da47ecb 100644
+--- a/configure.ac
 b/configure.ac
+@@ -221,7 +221,7 @@ AS_IF([test "x$cross_compiling" != "xyes" ], [
+ 
+ AC_SUBST(LIBSYSTEMD_CFLAGS)
+ AC_SUBST(LIBSYSTEMD_LIBS)
+-AM_CONDITIONAL(HAVE_LIBSYSTEMD, [test "$have_libsystemd" = "yes"], [Using 
libsystemd])
++AM_CONDITIONAL(HAVE_LIBSYSTEMD, [test "$have_libsystemd" = "yes" || test 
"$have_libelogind" = "yes" ], [Using libsystemd])
+ 
+ dnl 
---
+ dnl - systemd unit / service files
+-- 
+2.17.0

diff --git 
a/sys-auth/polkit/files/polkit-0.115-make-netgroup-support-optional.patch 
b/sys-auth/polkit/files/polkit-0.115-make-netgroup-support-optional.patch
new file mode 100644
index 000..0a8f886
--- /dev/null
+++ b/sys-auth/polkit/files/polkit-0.115-make-netgroup-support-optional.patch
@@ -0,0 +1,129 @@
+--- polkit-0.115/configure.ac
 polkit-0.115-optional-netgroup/configure.ac
+@@ -158,7 +158,7 @@ AC_CHECK_LIB(expat,XML_ParserCreate,[EXP
+[AC_MSG_ERROR([Can't find expat library. Please install expat.])])
+ AC_SUBST(EXPAT_LIBS)
+ 
+-AC_CHECK_FUNCS(clearenv fdatasync)
++AC_CHECK_FUNCS(clearenv fdatasync getnetgrent)
+ 
+ if test "x$GCC" = "xyes"; then
+   LDFLAGS="-Wl,--as-needed $LDFLAGS"
+--- polkit-0.115/src/polkitbackend/init.js
 polkit-0.115-optional-netgroup/src/polkitbackend/init.js
+@@ -29,7 +29,10 @@ function Subject() {
+ };
+ 
+ this.isInNetGroup = function(netGroup) {
+-return polkit._userIsInNetGroup(this.user, netGroup);
++if (polkit._userIsInNetGroup)
++return polkit._userIsInNetGroup(this.user, netGroup);
++else
++return false;
+ };
+ 
+ this.toString = function() {
+--- polkit-0.115/src/polkitbackend/polkitbackendinteractiveauthority.c
 
polkit-0.115-optional-netgroup/src/polkitbackend/polkitbackendinteractiveauthority.c
+@@ -2214,6 +2214,7 @@ get_users_in_group (PolkitIdentity
+   return ret;
+ }
+ 
++#ifdef HAVE_GETNETGRENT
+ static GList *
+ get_users_in_net_group (PolkitIdentity*group,
+ gboolean   include_root)
+@@ -2269,6 +2270,7 @@ get_users_in_net_group (PolkitIdentity
+   endnetgrent ();
+   return ret;
+ }
++#endif
+ 
+ /* 

 */
+ 
+@@ -2355,10 +2357,12 @@ authentication_agent_initiate_challenge
+ {
+   user_identities = g_list_concat (user_identities, 
get_users_in_group (identity, FALSE));
+ }
++#ifdef HAVE_GETNETGRENT
+   else if (POLKIT_IS_UNIX_NETGROUP (identity))
+ {
+   user_identities =  

[gentoo-commits] proj/musl:master commit in: sys-auth/polkit/, sys-auth/polkit/files/

2017-02-22 Thread Aric Belsito
commit: fb42c05d1344fa7b9650a2d2ad3e317d69821a69
Author: Aric Belsito  gmail  com>
AuthorDate: Thu Feb 23 03:29:03 2017 +
Commit: Aric Belsito  gmail  com>
CommitDate: Thu Feb 23 03:29:03 2017 +
URL:https://gitweb.gentoo.org/proj/musl.git/commit/?id=fb42c05d

sys-auth/polkit: version bump to 0.113-r2

remove 0.112-r99 (no longer in tree)

 sys-auth/polkit/Manifest   |   9 +-
 sys-auth/polkit/files/polkit-0.113-elogind.patch   | 160 +
 .../polkit-make-netgroup-support-optional.patch|  86 ---
 sys-auth/polkit/metadata.xml   |   1 +
 ...kit-0.112-r99.ebuild => polkit-0.113-r2.ebuild} |  99 +++--
 sys-auth/polkit/polkit-0.113.ebuild|   8 +-
 6 files changed, 225 insertions(+), 138 deletions(-)

diff --git a/sys-auth/polkit/Manifest b/sys-auth/polkit/Manifest
index 8645889..943dbd2 100644
--- a/sys-auth/polkit/Manifest
+++ b/sys-auth/polkit/Manifest
@@ -1,7 +1,6 @@
+AUX polkit-0.113-elogind.patch 5611 SHA256 
e53293e21eb9ece8bea7a90e2dd440f176af185470de33a3859b9a1274413e9a SHA512 
27d863690b51c7520488c7924dc24c83b0b8ebc2d0285b62a249227a7993b93c1ba526d3c9dd0aaa4d0d979ff5aac7dea8001b21a1f10236249a38a7b92c3be4
 WHIRLPOOL 
14dd9439136b0f17392a998d9b7f16435468ae66f91012185e67e6b56a1e6a3ec4b1bbfbe210949f31c0912cef046559a446c1d3f1939c82726604f55871b45c
 AUX polkit-0.113-make-netgroup-support-optional.patch 4099 SHA256 
eba507f6bb0edaa0a0a4c48147543b5ba0d37faa6f672bc20b854b5f09eb7588 SHA512 
91b4dcc2cad4954763b5f405504c88e3b339054c21121a586472f9b4d1d4db53e0719794628482e1b9bade0e0d3cbd882fafb402c626fdcd4aa716a7480f4f68
 WHIRLPOOL 
8419ff003e2629215500a8bbde4152cefddc57c080a77aa9962de8cac33686866dbc1d67a2d1e89c8ecb066c1e72b24967d65426bcf88a45ce8d627b69056488
-AUX polkit-make-netgroup-support-optional.patch 2818 SHA256 
840f295f8c99005938a501e696080136bcea6696a2e0abfe4c5f0f1e46a079a0 SHA512 
90ad57cdbdfcd706b1443b596eb2aa849e73e56d6c25c72683270a8f71d5e8c0144c9fa39e4267928531b1b7bf1870ab29cb6f19981ef1621419da7540d8ccbb
 WHIRLPOOL 
c68e260ce7fa65001fe0a4fcff97ebff9c447cad7d6fb8a564ebfb13e27b5c6e09be6b8f30a56cd1a3fcd0efe4346c6736e75004fd4aaeb1163209ad61eb77b7
-DIST polkit-0.112.tar.gz 1429240 SHA256 
d695f43cba4748a822fbe864dd32c4887c5da1c71694a47693ace5e88fcf6af6 SHA512 
e4ad1bd287b38e5650cb94b1897a959b2ceaa6c19b4478ba872eacb13b58758fd42f6ab1718976162d823d850cd5c99b3ccadf1b57d75dea7790101422029d5f
 WHIRLPOOL 
af5dd0a17b7356302b0319e80565d6ac916128dfc85b6e2711147f3de86651f11fe8d08f3d6067d7abd24e263be92403f9d8f46935ba93db571e386a603a038a
 DIST polkit-0.113.tar.gz 1448865 SHA256 
e1c095093c654951f78f8618d427faf91cf62abdefed98de40ff65eca6413c81 SHA512 
ab177c89a20eeb2978ddbe28afb205d3619f9c5defe833eb68a85e71a0f2c905367f1295cbbfb85da5eafdd661bce474d5d84aca9195cd425a18c9b4170eb5f9
 WHIRLPOOL 
106db7e6085a4ce49da44929138671eff2fd6007c80533518abe2d91ede9242b1e3cd0a1801190eeac5d4d5c1e978a30a18e47a6b604497b38853fa60c935a81
-EBUILD polkit-0.112-r99.ebuild 3316 SHA256 
5e2f2cd52b93b5524d2c65e0b3dfde9cb976c5026b6ec9fc0b790e4fa902a96f SHA512 
bc8fd3695cb4ce01a350e8f41161c90ab913c6740f20207546f37da2c9f6ad68de7e3cf0aaa889ada403205392cd2d5b238c9276aae59dd8df2bed691d645d06
 WHIRLPOOL 
f3bdbe97a68e7552129b16318fa75618d85241c7bf6f91209e90cabb0776cb09018240f2ed016ce16df18cdd250fd4410fb698cfd5b29369a1851b424c265218
-EBUILD polkit-0.113.ebuild 2755 SHA256 
0636e5b6b17b4ecfe655f3547e64c3eb9d1b1067c8858ff2dc00d749ed81e878 SHA512 
8b665cb3618b51d0e59b18c7eeb0e8b4d440348d2a6da1bd46dc851c58f2d154e457ba85f1502e63ac286262fb4a7b3a35ec1f0c47a8402e4ce9d3f673d7ca45
 WHIRLPOOL 
72476a771d0d9974ec7f104c7b721a5f454989bb7ba73f8d5ca804bb79bbd5e75198421ffb44d05b05ff57fa1b1ab15cf2e7687d5f244b15965e218a85037114
-MISC metadata.xml 368 SHA256 
6534d248e3385826f0d340734e1242c15261786e32db74d12499062ecbf2bddc SHA512 
c7c83834285eb494682f56460e5a494a368dff4e9c9dbcfe7ad367a403e812dd64f0bbbf49b26f8f9e8f83c3c40ddeaf7489c8e632a0149e0be056be04aa031d
 WHIRLPOOL 
90d3f192e593775dc409984aedf177315af40991781d84f080e3f0864d0107c7320c76fcdd48ca2a5d5c2415650c0b1dcceeb9026f0b4409a10741a77daf5880
+EBUILD polkit-0.113-r2.ebuild 3384 SHA256 
19dc6fa1d23c3a537af57bd2151437ab34a36e63c8e532bcdc23a5d5f176e834 SHA512 
4d266140ea3102c818c016299a37bbae6108e4cedcc80d762349d8237cd656754b49d836c84e940f58666305305dcf43eae0f57f34630b41de9ab2d8e1aa641d
 WHIRLPOOL 
b6a1f44e03f2dbcca44093d71208f577c9b499ac3d3fba14bff976ede213b1ce959a4acb7f2a6394fa22cbbb6a705ee83df99a1dd5c4aadc5b3e3f01e21bbb1f
+EBUILD polkit-0.113.ebuild 2795 SHA256 
164fdfad89e3b304220fa5a4171b0d2a784d499b22eaafbb6bd6e5b0154690a8 SHA512 
ab4e1b89e42c56af10b8209e9b51359875021b37f9a9367f9321e4fd314daf9a2c7be40be3cb2c9c9ced0891a6e7abd7cbb4ae682a477f6866a211a5af51103f
 WHIRLPOOL 
276f771c6d0270e6734febaef7b1cc01e3f4cf71a6081dbfc281264e9e4ba30a54c9daf759156b9f560673fed9e2c381d4a73e4c20457425aead322c3c216cf9
+MISC metadata.xml 493 SHA256 
868f4f8f3c8593e0f1441e5e36944b3386cda4eac8d0986ab3b390d53106b71f SHA512 

[gentoo-commits] proj/musl:master commit in: sys-auth/polkit/, sys-auth/polkit/files/

2016-01-03 Thread Jory Pratt
commit: 7ca67b391cdbbcb243af5c0b046bedeef40cbdca
Author: Jory A. Pratt  gentoo  org>
AuthorDate: Sun Jan  3 16:47:41 2016 +
Commit: Jory Pratt  gentoo  org>
CommitDate: Sun Jan  3 16:47:41 2016 +
URL:https://gitweb.gentoo.org/proj/musl.git/commit/?id=7ca67b39

sys-auth/polkit - update netgroup support patch for ~arch

 ...lkit-0.113-make-netgroup-support-optional.patch | 130 +
 sys-auth/polkit/polkit-0.113.ebuild| 117 +++
 2 files changed, 247 insertions(+)

diff --git 
a/sys-auth/polkit/files/polkit-0.113-make-netgroup-support-optional.patch 
b/sys-auth/polkit/files/polkit-0.113-make-netgroup-support-optional.patch
new file mode 100644
index 000..232cc31
--- /dev/null
+++ b/sys-auth/polkit/files/polkit-0.113-make-netgroup-support-optional.patch
@@ -0,0 +1,130 @@
+--- polkit-0.113/configure.ac
 polkit-0.113-optional-netgroup/configure.ac
+@@ -158,7 +158,7 @@ AC_CHECK_LIB(expat,XML_ParserCreate,[EXP
+[AC_MSG_ERROR([Can't find expat library. Please install expat.])])
+ AC_SUBST(EXPAT_LIBS)
+ 
+-AC_CHECK_FUNCS(clearenv fdatasync)
++AC_CHECK_FUNCS(clearenv fdatasync getnetgrent)
+ 
+ if test "x$GCC" = "xyes"; then
+   LDFLAGS="-Wl,--as-needed $LDFLAGS"
+--- polkit-0.113/src/polkitbackend/init.js
 polkit-0.113-optional-netgroup/src/polkitbackend/init.js
+@@ -29,7 +29,10 @@ function Subject() {
+ };
+ 
+ this.isInNetGroup = function(netGroup) {
+-return polkit._userIsInNetGroup(this.user, netGroup);
++if (polkit._userIsInNetGroup)
++return polkit._userIsInNetGroup(this.user, netGroup);
++else
++return false;
+ };
+ 
+ this.toString = function() {
+--- polkit-0.113/src/polkitbackend/polkitbackendinteractiveauthority.c
 
polkit-0.113-optional-netgroup/src/polkitbackend/polkitbackendinteractiveauthority.c
+@@ -2214,6 +2214,7 @@ get_users_in_group (PolkitIdentity
+   return ret;
+ }
+ 
++#ifdef HAVE_GETNETGRENT
+ static GList *
+ get_users_in_net_group (PolkitIdentity*group,
+ gboolean   include_root)
+@@ -2269,6 +2270,7 @@ get_users_in_net_group (PolkitIdentity
+   endnetgrent ();
+   return ret;
+ }
++#endif
+ 
+ /* 

 */
+ 
+@@ -2355,10 +2357,12 @@ authentication_agent_initiate_challenge
+ {
+   user_identities = g_list_concat (user_identities, 
get_users_in_group (identity, FALSE));
+ }
++#ifdef HAVE_GETNETGRENT
+   else if (POLKIT_IS_UNIX_NETGROUP (identity))
+ {
+   user_identities =  g_list_concat (user_identities, 
get_users_in_net_group (identity, FALSE));
+ }
++#endif
+   else
+ {
+   g_warning ("Unsupported identity");
+--- polkit-0.113/src/polkitbackend/polkitbackendjsauthority.c
 polkit-0.113-optional-netgroup/src/polkitbackend/polkitbackendjsauthority.c
+@@ -189,13 +189,16 @@ static JSClass js_polkit_class = {
+ 
+ static JSBool js_polkit_log (JSContext *cx, unsigned argc, jsval *vp);
+ static JSBool js_polkit_spawn (JSContext *cx, unsigned argc, jsval *vp);
++#ifdef HAVE_GETNETGRENT
+ static JSBool js_polkit_user_is_in_netgroup (JSContext *cx, unsigned argc, 
jsval *vp);
+-
++#endif
+ static JSFunctionSpec js_polkit_functions[] =
+ {
+   JS_FS("log",js_polkit_log,0, 0),
+   JS_FS("spawn",  js_polkit_spawn,  0, 0),
++#ifdef HAVE_GETNETGRENT
+   JS_FS("_userIsInNetGroup", js_polkit_user_is_in_netgroup,  0, 0),
++#endif
+   JS_FS_END
+ };
+ 
+@@ -1498,7 +1501,7 @@ js_polkit_spawn (JSContext  *cx,
+ 
+ /* 

 */
+ 
+-
++#ifdef HAVE_GETNETGRENT
+ static JSBool
+ js_polkit_user_is_in_netgroup (JSContext  *cx,
+unsignedargc,
+@@ -1535,7 +1538,7 @@ js_polkit_user_is_in_netgroup (JSContext
+  out:
+   return ret;
+ }
+-
++#endif
+ 
+ 
+ /* 

 */
+--- polkit-0.113/test/polkitbackend/test-polkitbackendjsauthority.c
 
polkit-0.113-optional-netgroup/test/polkitbackend/test-polkitbackendjsauthority.c
+@@ -137,12 +137,14 @@ test_get_admin_identities (void)
+ "unix-group:users"
+   }
+ },
++#ifdef HAVE_GETNETGRENT
+ {
+   "net.company.action3",
+   {
+ "unix-netgroup:foo"
+   }
+ },
++#endif
+   };
+   guint n;
+ 
+@@ -258,7 +260,7 @@ static const RulesTestCase rules_test_ca
+ NULL,
+ POLKIT_IMPLICIT_AUTHORIZATION_NOT_AUTHORIZED,
+   },
+-
++#if HAVE_GETNETGRENT
+   /* check netgroup membership */
+   {
+ /* john is a member of netgroup 'foo', see test/etc/netgroup */
+@@ -276,7 +278,7 @@ static const RulesTestCase rules_test_ca
+ NULL,
+