[csw-devel] SF.net SVN: gar:[15425] csw/mgar/pkg/tcpwrappers
dmichelsen at users.sourceforge.net
dmichelsen at users.sourceforge.net
Wed Aug 24 13:52:00 CEST 2011
Revision: 15425
http://gar.svn.sourceforge.net/gar/?rev=15425&view=rev
Author: dmichelsen
Date: 2011-08-24 11:52:00 +0000 (Wed, 24 Aug 2011)
Log Message:
-----------
tcpwrappers: Tag alternatives release and make unified packages with just extended
Modified Paths:
--------------
csw/mgar/pkg/tcpwrappers/trunk/Makefile
csw/mgar/pkg/tcpwrappers/trunk/files/README
csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch
Added Paths:
-----------
csw/mgar/pkg/tcpwrappers/tags/tcpwrappers-7.6-alternatives-std-ext/
Removed Paths:
-------------
csw/mgar/pkg/tcpwrappers/trunk/files/CSWtcpwrap.postmsg
csw/mgar/pkg/tcpwrappers/trunk/files/man.patch
Modified: csw/mgar/pkg/tcpwrappers/trunk/Makefile
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/Makefile 2011-08-24 10:49:53 UTC (rev 15424)
+++ csw/mgar/pkg/tcpwrappers/trunk/Makefile 2011-08-24 11:52:00 UTC (rev 15425)
@@ -19,29 +19,38 @@
DISTFILES = $(DISTNAME).tar.gz
DISTFILES += COPYING
DISTFILES += README
-DISTFILES += CSWtcpwrap.postmsg
PATCHFILES = patch-cflags.diff
-PATCHFILES += man.patch
PATCHFILES += sharedlib.patch
-WORKSRC = $(WORKDIR)/$(DISTNAME)
+PACKAGES += CSWtcpwrapper
+SPKG_DESC_CSWtcpwrapper = Wrapper around common tools using libwrap.so.1
+# PKGFILES is catchall
+RUNTIME_DEP_PKGS_CSWtcpwrapper += CSWlibwrap1
+OBSOLETED_BY_CSWtcpwrapper += CSWtcpwrap
+CATALOGNAME_CSWtcpwrap = tcpwrappers_stub
-PACKAGES = CSWtcpwrap
-CATALOGNAME = tcpwrappers
+PACKAGES += CSWlibwrap1
+SPKG_DESC_CSWlibwrap1 = Socket wrappers for pre-screening tcp connections (ipv6.4 patched), libwrap.so.1
+PKGFILES_CSWlibwrap1 += $(call pkgfiles_lib,libwrap.so.1)
+PKGFILES_CSWlibwrap1 += $(mandir)/man5/.*
SPKG_DESC_CSWtcpwrap = $(DESCRIPTION)
-SPKG_VERSION = $(BASEVERSION)
+PACKAGES += CSWlibwrap-dev
+SPKG_DESC_CSWlibwrap-dev = Development files for libwrap.so.1
+PKGFILES_CSWlibwrap-dev += $(PKGFILES_DEVEL)
+RUNTIME_DEP_PKGS_CSWlibwrap-dev += CSWlibwrap1
-EXTRA_MODULATORS = EXTENDED
-MODULATIONS_EXTENDED = on off
-
BUILD_ARGS = REAL_DAEMON_DIR=/usr/sbin
BUILD_ARGS += STYLE=-DPROCESS_OPTIONS
BUILD_ARGS += USER_CFLAGS="$(CFLAGS)"
BUILD_ARGS += LIBS="-lsocket -lnsl"
+# EXTENDED = off
+EXTENDED = on
+
BUILD64 = 1
+NOISALIST = 1
CONFIGURE_SCRIPTS =
@@ -53,64 +62,41 @@
# No test suite
TEST_SCRIPTS =
-LIBNAME_EXTENDED-off = libwrap-std.so.0
-LIBNAME_EXTENDED-on = libwrap-ext.so.0
-
INSTALL_SCRIPTS = custom
-MERGE_SCRIPTS_isa-default-extended-off = copy-all
- MERGE_SCRIPTS_isa-default-extended-on = copy-only
- MERGE_DIRS_isa-default-extended-on = $(libdir)
+MIGRATE_FILES_CSWlibwrap1 = hosts.allow hosts.deny
-MERGE_SCRIPTS_isa-default64-extended-off = copy-relocated-only
- MERGE_DIRS_isa-default64-extended-off = $(libdir)
- MERGE_SCRIPTS_isa-default64-extended-on = copy-relocated-only
- MERGE_DIRS_isa-default64-extended-on = $(libdir)
+# This is an example to /usr/local/lib/ntalkd
+CHECKPKG_OVERRIDES_CSWtcpwrapper += file-with-bad-content|/usr/local|root/opt/csw/share/man/man8/tcpd.8
-MIGRATE_FILES = hosts.allow hosts.deny
+include gar/category.mk
-ALTERNATIVES = std ext
-ALTERNATIVE_std = $(libdir)/libwrap.so.0 tcpwrappers $(libdir)/libwrap-std.so.0 200
-ALTERNATIVE_std += $(libdir)/$(ISA_DEFAULT64)/libwrap.so.0 tcpwrappers64 $(libdir)/$(ISA_DEFAULT64)/libwrap-std.so.0
-ALTERNATIVE_ext = $(libdir)/libwrap.so.0 tcpwrappers $(libdir)/libwrap-ext.so.0 100
-ALTERNATIVE_ext += $(libdir)/$(ISA_DEFAULT64)/libwrap.so.0 tcpwrappers64 $(libdir)/$(ISA_DEFAULT64)/libwrap-ext.so.0
+SPKG_VERSION = $(subst -,_,$(VERSION))
-POSTMSG = $(docdir)/$(CATALOGNAME)/CSWtcpwrap.postmsg
+post-extract-modulated:
+ -cd $(WORKSRC) && perl -pi -e 's,/etc/hosts\.,$(sysconfdir)/hosts.,g' \
+ hosts_access.3 \
+ hosts_access.5 \
+ tcpd.8 \
+ tcpdchk.8 \
+ tcpdmatch.8
+ @$(MAKECOOKIE)
-PACKAGES += CSWlibwrap0
-CATALOGNAME_CSWlibwrap0 = libwrap0
-PKGFILES_CSWlibwrap0 += $(call baseisadirs,$(libdir),libwrap\.so\.0(\.\d+)*)
-SPKG_DESC_CSWlibwrap0 += $(DESCRIPTION), libwrap.so.0
-RUNTIME_DEP_PKGS_CSWtcpwrap += CSWlibwrap0
-
-PACKAGES += CSWtcpwrap-dev
-SPKG_DESC_CSWtcpwrap-dev = $(DESCRIPTION) development package
-PKGFILES_CSWtcpwrap-dev += $(PKGFILES_DEVEL)
-CATALOGNAME_CSWtcpwrap-dev = tcpwrappers_dev
-
-# These binaries link against libwrap.so which will be linked by alternatives
-# after package install. Until then they can obviously not link properly.
-CHECKPKG_OVERRIDES = symbol-not-found|tcpdmatch
-CHECKPKG_OVERRIDES += symbol-not-found|tcpd
-CHECKPKG_OVERRIDES += symbol-not-found|try-from
-CHECKPKG_OVERRIDES += symbol-not-found|tcpdchk
-
-include gar/category.mk
-
build-custom:
- $(MAKE) -C $(WORKSRC) $(BUILD_ARGS) $(BUILD_TARGET_EXTENDED_$(EXTENDED))
+ $(BUILD_ENV) $(MAKE) -C $(WORKSRC) $(BUILD_ARGS) $(BUILD_TARGET_EXTENDED_$(EXTENDED))
@$(MAKECOOKIE)
install-custom:
- @echo " => Installing $(CATALOGNAME)"
- ginstall -d $(DESTDIR)$(docdir)/$(CATALOGNAME)
- cd $(WORKDIR) && ginstall -v -m 644 README $(DESTDIR)$(docdir)/$(CATALOGNAME)
+ @echo " => Installing tcpwrapper"
+ ginstall -d $(DESTDIR)$(docdir)/tcpwrapper"
+ cd $(WORKDIR) && ginstall -v -m 644 README $(DESTDIR)$(docdir)/tcpwrapper/README
ginstall -d $(DESTDIR)$(libexecdir)
cd $(WORKSRC) && ginstall -v -m 755 safe_finger tcpd tcpdchk tcpdmatch try-from $(DESTDIR)$(libexecdir)
ginstall -d $(DESTDIR)$(includedir)
cd $(WORKSRC) && ginstall -v -m 644 tcpd.h $(DESTDIR)$(includedir)
ginstall -d $(DESTDIR)$(libdir)
- cd $(WORKSRC) && ginstall -v -m 644 libwrap.so.0 $(DESTDIR)$(libdir)/$(LIBNAME_EXTENDED-$(EXTENDED))
+ cd $(WORKSRC) && ginstall -v -m 644 libwrap.so.1 $(DESTDIR)$(libdir)/libwrap.so.1
+ gln -s libwrap.so.1 $(DESTDIR)$(libdir)/libwrap.so
ginstall -d $(DESTDIR)$(mandir)/man3
cd $(WORKSRC) && ginstall -v -m 644 *.3 $(DESTDIR)$(mandir)/man3
ginstall -d $(DESTDIR)$(mandir)/man5
@@ -119,17 +105,3 @@
cd $(WORKSRC) && ginstall -v -m 644 *.8 $(DESTDIR)$(mandir)/man8
@$(MAKECOOKIE)
-post-merge:
- ginstall -d $(PKGROOT)$(dir $(POSTMSG))
- ginstall $(WORKDIR)/$(notdir $(POSTMSG)) $(PKGROOT)$(POSTMSG)
- ln -s libwrap.so.0 $(PKGROOT)$(libdir)/libwrap.so
- ln -s libwrap.so.0 $(PKGROOT)$(libdir)/$(ISA_DEFAULT64)/libwrap.so
- @# As libwrap.so.0 is the SONAME to be bound against we must register it with the package
- @# to allow chkpkg to look up the pkgname for the library. This is rewritten by alternatives
- @# on installation and is solely to register the link path, the destination doesn't matter.
- ln -s /etc/opt/csw/alternatives/tcpwrappers $(PKGROOT)$(libdir)/libwrap.so.0
- ln -s /etc/opt/csw/alternatives/tcpwrappers64 $(PKGROOT)$(libdir)/$(ISA_DEFAULT64)/libwrap.so.0
- @$(MAKECOOKIE)
-
-SPKG_REVSTAMP := $(SPKG_REVSTAMP)_rev=$(RELEASE)
-
Deleted: csw/mgar/pkg/tcpwrappers/trunk/files/CSWtcpwrap.postmsg
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/CSWtcpwrap.postmsg 2011-08-24 10:49:53 UTC (rev 15424)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/CSWtcpwrap.postmsg 2011-08-24 11:52:00 UTC (rev 15425)
@@ -1,12 +0,0 @@
-There are now two versions of tcpwrappers on the system installed:
-
- * libwrap-std.so.1 The "standard" tcp wrapper library
- * libwrap-ext.so.1 The "extended" tcp wrapper library
-
-You can easily select between the versions with the alternatives(8)
-system by executing
-
- /opt/csw/sbin/alternatives --config tcpwrappers
-
-See http://wiki.opencsw.org/package-alternatives for details.
-
Modified: csw/mgar/pkg/tcpwrappers/trunk/files/README
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/README 2011-08-24 10:49:53 UTC (rev 15424)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/README 2011-08-24 11:52:00 UTC (rev 15425)
@@ -15,14 +15,5 @@
This is to allow for ./configure style tests, that break in the transition
from lib.a to lib.so
-
-Note also that there are TWO versions of libwrap.so:
-libwrap-std.so.1 The "standard" tcp wrapper library
-libwrap-ext.so.1 The "extended" tcp wrapper library
-
-By default, /opt/csw/lib/libwrap.so.1 is linked to the std version.
-To use the extended syntax in hosts_options(5), you need to change
-the link to point to libwrap-ext.so.1
-Unfortunately, the syntax for the two versions, is slightly incompatible,
-which is why there are two versions.
-
+libwrap has been compiled to use the "extended" syntax as described in
+hosts_options(5).
Deleted: csw/mgar/pkg/tcpwrappers/trunk/files/man.patch
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/man.patch 2011-08-24 10:49:53 UTC (rev 15424)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/man.patch 2011-08-24 11:52:00 UTC (rev 15425)
@@ -1,154 +0,0 @@
-diff -Naur tcp_wrappers_7.6-ipv6.4.orig/hosts_access.3 tcp_wrappers_7.6-ipv6.4.patched/hosts_access.3
---- tcp_wrappers_7.6-ipv6.4.orig/hosts_access.3 1996-02-11 17:01:27.000000000 +0100
-+++ tcp_wrappers_7.6-ipv6.4.patched/hosts_access.3 2009-09-11 18:54:28.630235290 +0200
-@@ -78,7 +78,7 @@
- hosts_access(5), format of the access control tables.
- hosts_options(5), optional extensions to the base language.
- .SH FILES
--/etc/hosts.allow, /etc/hosts.deny, access control tables.
-+/etc/opt/csw/hosts.allow, /etc//opt/csw/hosts.deny, access control tables.
- .SH BUGS
- hosts_access() uses the strtok() library function. This may interfere
- with other code that relies on strtok().
-diff -Naur tcp_wrappers_7.6-ipv6.4.orig/hosts_access.5 tcp_wrappers_7.6-ipv6.4.patched/hosts_access.5
---- tcp_wrappers_7.6-ipv6.4.orig/hosts_access.5 1995-01-30 19:51:47.000000000 +0100
-+++ tcp_wrappers_7.6-ipv6.4.patched/hosts_access.5 2009-09-11 18:54:28.633332432 +0200
-@@ -21,10 +21,10 @@
- at the first match:
- .IP \(bu
- Access will be granted when a (daemon,client) pair matches an entry in
--the \fI/etc/hosts.allow\fR file.
-+the \fI/etc/opt/csw/hosts.allow\fR file.
- .IP \(bu
- Otherwise, access will be denied when a (daemon,client) pair matches an
--entry in the \fI/etc/hosts.deny\fR file.
-+entry in the \fI/etc/opt/csw/hosts.deny\fR file.
- .IP \(bu
- Otherwise, access will be granted.
- .PP
-@@ -268,7 +268,7 @@
- file:
- .PP
- .ne 2
--/etc/hosts.deny:
-+/etc/opt/csw/hosts.deny:
- .in +3
- ALL: ALL
- .PP
-@@ -279,7 +279,7 @@
- For example:
- .PP
- .ne 2
--/etc/hosts.allow:
-+/etc/opt/csw/hosts.allow:
- .in +3
- ALL: LOCAL @some_netgroup
- .br
-@@ -298,7 +298,7 @@
- that it can be omitted. The explicitly non-authorized hosts are listed
- in the deny file. For example:
- .PP
--/etc/hosts.deny:
-+/etc/opt/csw/hosts.deny:
- .in +3
- ALL: some.host.name, .some.domain
- .br
-@@ -313,13 +313,13 @@
- host. The result is mailed to the superuser.
- .PP
- .ne 2
--/etc/hosts.allow:
-+/etc/opt/csw/hosts.allow:
- .in +3
- .nf
- in.tftpd: LOCAL, .my.domain
- .PP
- .ne 2
--/etc/hosts.deny:
-+/etc/opt/csw/hosts.deny:
- .in +3
- .nf
- in.tftpd: ALL: (/some/where/safe_finger -l @%h | \\
-@@ -353,8 +353,8 @@
- .SH FILES
- .na
- .nf
--/etc/hosts.allow, (daemon,client) pairs that are granted access.
--/etc/hosts.deny, (daemon,client) pairs that are denied access.
-+/etc/opt/csw/hosts.allow, (daemon,client) pairs that are granted access.
-+/etc/opt/csw/hosts.deny, (daemon,client) pairs that are denied access.
- .ad
- .fi
- .SH SEE ALSO
-diff -Naur tcp_wrappers_7.6-ipv6.4.orig/tcpd.8 tcp_wrappers_7.6-ipv6.4.patched/tcpd.8
---- tcp_wrappers_7.6-ipv6.4.orig/tcpd.8 1996-02-21 16:39:16.000000000 +0100
-+++ tcp_wrappers_7.6-ipv6.4.patched/tcpd.8 2009-09-11 18:54:28.635231817 +0200
-@@ -146,7 +146,7 @@
- only non-trivial service that is affected by this limitation is
- \fIrexd\fR, which is used by the \fIon(1)\fR command. This is no great
- loss. On most systems, \fIrexd\fR is less secure than a wildcard in
--/etc/hosts.equiv.
-+/etc/opt/csw/hosts.equiv.
- .PP
- RPC broadcast requests (for example: \fIrwall, rup, rusers\fR) always
- appear to come from the responding host. What happens is that the
-@@ -158,9 +158,9 @@
- .PP
- The default locations of the host access control tables are:
- .PP
--/etc/hosts.allow
-+/etc/opt/csw/hosts.allow
- .br
--/etc/hosts.deny
-+/etc/opt/csw/hosts.deny
- .SH SEE ALSO
- .na
- .nf
-diff -Naur tcp_wrappers_7.6-ipv6.4.orig/tcpdchk.8 tcp_wrappers_7.6-ipv6.4.patched/tcpdchk.8
---- tcp_wrappers_7.6-ipv6.4.orig/tcpdchk.8 1995-01-08 17:00:31.000000000 +0100
-+++ tcp_wrappers_7.6-ipv6.4.patched/tcpdchk.8 2009-09-11 18:54:28.636911201 +0200
-@@ -8,7 +8,7 @@
- \fItcpdchk\fR examines your tcp wrapper configuration and reports all
- potential and real problems it can find. The program examines the
- \fItcpd\fR access control files (by default, these are
--\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
-+\fI/etc/opt/csw/hosts.allow\fR and \fI/etc/opt/csw/hosts.deny\fR), and compares the
- entries in these files against entries in the \fIinetd\fR or \fItlid\fR
- network configuration files.
- .PP
-@@ -44,9 +44,9 @@
- .PP
- The default locations of the \fItcpd\fR access control tables are:
- .PP
--/etc/hosts.allow
-+/etc/opt/csw/hosts.allow
- .br
--/etc/hosts.deny
-+/etc/opt/csw/hosts.deny
- .SH SEE ALSO
- .na
- .nf
-diff -Naur tcp_wrappers_7.6-ipv6.4.orig/tcpdmatch.8 tcp_wrappers_7.6-ipv6.4.patched/tcpdmatch.8
---- tcp_wrappers_7.6-ipv6.4.orig/tcpdmatch.8 1996-02-11 17:01:36.000000000 +0100
-+++ tcp_wrappers_7.6-ipv6.4.patched/tcpdmatch.8 2009-09-11 18:54:28.638584325 +0200
-@@ -11,7 +11,7 @@
- request for service. Examples are given below.
- .PP
- The program examines the \fItcpd\fR access control tables (default
--\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
-+\fI/etc/opt/csw/hosts.allow\fR and \fI/etc/opt/csw/hosts.deny\fR) and prints its
- conclusion. For maximal accuracy, it extracts additional information
- from your \fIinetd\fR or \fItlid\fR network configuration file.
- .PP
-@@ -76,9 +76,9 @@
- .PP
- The default locations of the \fItcpd\fR access control tables are:
- .PP
--/etc/hosts.allow
-+/etc/opt/csw/hosts.allow
- .br
--/etc/hosts.deny
-+/etc/opt/csw/hosts.deny
- .SH SEE ALSO
- .na
- .nf
Modified: csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch 2011-08-24 10:49:53 UTC (rev 15424)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch 2011-08-24 11:52:00 UTC (rev 15425)
@@ -8,8 +8,8 @@
+sunos5-shared:
+ @$(MAKE) REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
+ LIBS="-lsocket -lnsl" RANLIB=/bin/true \
-+ AR=ld ARFLAGS="-G -h libwrap.so.0 -lsocket -lnsl -o " \
-+ LIB=libwrap.so.0 VSYSLOG= \
++ AR=ld ARFLAGS="-G -h libwrap.so.1 -lsocket -lnsl -o " \
++ LIB=libwrap.so.1 VSYSLOG= \
+ NETGROUP=-DNETGROUP AUX_OBJ="setenv.o sharedhack.o" TLI=-DTLI \
+ BUGS="$(BUGS) -DSOLARIS_24_GETHOSTBYNAME_BUG" IPV6="$(IPV6)" \
+ EXTRA_CFLAGS="-DUSE_STRERROR -Kpic" all
@@ -17,8 +17,8 @@
+sunos5-sharedext:
+ @$(MAKE) REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
+ LIBS="-lsocket -lnsl" RANLIB=/bin/true \
-+ AR=ld ARFLAGS="-G -h libwrap.so.0 -lsocket -lnsl -o " \
-+ LIB=libwrap.so.0 VSYSLOG= STYLE=-DPROCESS_OPTIONS \
++ AR=ld ARFLAGS="-G -h libwrap.so.1 -lsocket -lnsl -o " \
++ LIB=libwrap.so.1 VSYSLOG= STYLE=-DPROCESS_OPTIONS \
+ NETGROUP=-DNETGROUP AUX_OBJ="setenv.o sharedhack.o" TLI=-DTLI \
+ BUGS="$(BUGS) -DSOLARIS_24_GETHOSTBYNAME_BUG" IPV6="$(IPV6)" \
+ EXTRA_CFLAGS="-DUSE_STRERROR -Kpic" all
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
More information about the devel
mailing list