diff options
author | Joe MacDonald <joe_macdonald@mentor.com> | 2014-09-16 21:05:00 -0400 |
---|---|---|
committer | Joe MacDonald <joe_macdonald@mentor.com> | 2014-09-16 21:05:00 -0400 |
commit | aa85e81d9499787f40d0e09e3f16b0000483f546 (patch) | |
tree | ad519cf42897bac6a2008ad4ef04cf0cac3d4628 /recipes-security | |
parent | 8476ec5e64c13f9361434aa4deea9c106c85f42e (diff) | |
download | meta-selinux-aa85e81d9499787f40d0e09e3f16b0000483f546.tar.gz |
Globally replace 'base_contains' calls with 'bb.utils.contains'
Based on oe-core commit:
commit 1528e596d4906c33e4be83fcf691cfe76d340ff3
Author: Otavio Salvador <otavio@ossystems.com.br>
Date: Thu Apr 24 15:59:20 2014 -0300
Globally replace 'base_contains' calls with 'bb.utils.contains'
The base_contains is kept as a compatibility method and we ought to not
use it in OE-Core so we can remove it from base metadata in future.
Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
Diffstat (limited to 'recipes-security')
-rw-r--r-- | recipes-security/audit/audit_2.3.2.bb | 2 | ||||
-rw-r--r-- | recipes-security/refpolicy/refpolicy-minimum_2.20130424.bb | 2 | ||||
-rw-r--r-- | recipes-security/refpolicy/refpolicy_common.inc | 4 | ||||
-rw-r--r-- | recipes-security/selinux/policycoreutils.inc | 6 |
4 files changed, 7 insertions, 7 deletions
diff --git a/recipes-security/audit/audit_2.3.2.bb b/recipes-security/audit/audit_2.3.2.bb index 4baf7a0..96b19c8 100644 --- a/recipes-security/audit/audit_2.3.2.bb +++ b/recipes-security/audit/audit_2.3.2.bb | |||
@@ -84,7 +84,7 @@ do_install_append() { | |||
84 | install -D -m 0755 ${S}/../auditd ${D}/etc/init.d/auditd | 84 | install -D -m 0755 ${S}/../auditd ${D}/etc/init.d/auditd |
85 | rm -rf ${D}/etc/rc.d | 85 | rm -rf ${D}/etc/rc.d |
86 | 86 | ||
87 | if ${@base_contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then | 87 | if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then |
88 | install -d ${D}${sysconfdir}/tmpfiles.d/ | 88 | install -d ${D}${sysconfdir}/tmpfiles.d/ |
89 | install -m 0644 ${WORKDIR}/audit-volatile.conf ${D}${sysconfdir}/tmpfiles.d/ | 89 | install -m 0644 ${WORKDIR}/audit-volatile.conf ${D}${sysconfdir}/tmpfiles.d/ |
90 | fi | 90 | fi |
diff --git a/recipes-security/refpolicy/refpolicy-minimum_2.20130424.bb b/recipes-security/refpolicy/refpolicy-minimum_2.20130424.bb index d9539f3..fc83fd5 100644 --- a/recipes-security/refpolicy/refpolicy-minimum_2.20130424.bb +++ b/recipes-security/refpolicy/refpolicy-minimum_2.20130424.bb | |||
@@ -40,7 +40,7 @@ prepare_policy_store () { | |||
40 | mkdir -p ${D}${sysconfdir}/selinux/${POLICY_NAME}/modules/active/modules | 40 | mkdir -p ${D}${sysconfdir}/selinux/${POLICY_NAME}/modules/active/modules |
41 | mkdir -p ${D}${sysconfdir}/selinux/${POLICY_NAME}/contexts/files | 41 | mkdir -p ${D}${sysconfdir}/selinux/${POLICY_NAME}/contexts/files |
42 | touch ${D}${sysconfdir}/selinux/${POLICY_NAME}/contexts/files/file_contexts.local | 42 | touch ${D}${sysconfdir}/selinux/${POLICY_NAME}/contexts/files/file_contexts.local |
43 | if ${@base_contains('DISTRO_FEATURES','compressed_policy','true','false',d)}; then | 43 | if ${@bb.utils.contains('DISTRO_FEATURES','compressed_policy','true','false',d)}; then |
44 | bzip2 base.pp | 44 | bzip2 base.pp |
45 | cp base.pp.bz2 ${D}${sysconfdir}/selinux/${POLICY_NAME}/modules/active/base.pp | 45 | cp base.pp.bz2 ${D}${sysconfdir}/selinux/${POLICY_NAME}/modules/active/base.pp |
46 | for i in ${POLICY_MODULES_MIN}; do | 46 | for i in ${POLICY_MODULES_MIN}; do |
diff --git a/recipes-security/refpolicy/refpolicy_common.inc b/recipes-security/refpolicy/refpolicy_common.inc index fd205cf..abadb2a 100644 --- a/recipes-security/refpolicy/refpolicy_common.inc +++ b/recipes-security/refpolicy/refpolicy_common.inc | |||
@@ -13,7 +13,7 @@ S = "${WORKDIR}/refpolicy" | |||
13 | 13 | ||
14 | FILES_${PN} = " \ | 14 | FILES_${PN} = " \ |
15 | ${sysconfdir}/selinux/${POLICY_NAME}/ \ | 15 | ${sysconfdir}/selinux/${POLICY_NAME}/ \ |
16 | ${@base_contains('DISTRO_FEATURES', 'compressed_policy', '${datadir}/selinux/${POLICY_NAME}/*.pp.bz2', '${datadir}/selinux/${POLICY_NAME}/*.pp', d)} \ | 16 | ${@bb.utils.contains('DISTRO_FEATURES', 'compressed_policy', '${datadir}/selinux/${POLICY_NAME}/*.pp.bz2', '${datadir}/selinux/${POLICY_NAME}/*.pp', d)} \ |
17 | " | 17 | " |
18 | FILES_${PN}-dev =+ "${datadir}/selinux/${POLICY_NAME}/include/" | 18 | FILES_${PN}-dev =+ "${datadir}/selinux/${POLICY_NAME}/include/" |
19 | 19 | ||
@@ -69,7 +69,7 @@ prepare_policy_store () { | |||
69 | mkdir -p ${D}${sysconfdir}/selinux/${POLICY_NAME}/modules/active/modules | 69 | mkdir -p ${D}${sysconfdir}/selinux/${POLICY_NAME}/modules/active/modules |
70 | mkdir -p ${D}${sysconfdir}/selinux/${POLICY_NAME}/contexts/files | 70 | mkdir -p ${D}${sysconfdir}/selinux/${POLICY_NAME}/contexts/files |
71 | touch ${D}${sysconfdir}/selinux/${POLICY_NAME}/contexts/files/file_contexts.local | 71 | touch ${D}${sysconfdir}/selinux/${POLICY_NAME}/contexts/files/file_contexts.local |
72 | if ${@base_contains('DISTRO_FEATURES','compressed_policy','true','false',d)}; then | 72 | if ${@bb.utils.contains('DISTRO_FEATURES','compressed_policy','true','false',d)}; then |
73 | for i in ${D}${datadir}/selinux/${POLICY_NAME}/*.pp; do | 73 | for i in ${D}${datadir}/selinux/${POLICY_NAME}/*.pp; do |
74 | bzip2 $i | 74 | bzip2 $i |
75 | if [ "`basename $i`" != "base.pp" ]; then | 75 | if [ "`basename $i`" != "base.pp" ]; then |
diff --git a/recipes-security/selinux/policycoreutils.inc b/recipes-security/selinux/policycoreutils.inc index a4d174c..153b688 100644 --- a/recipes-security/selinux/policycoreutils.inc +++ b/recipes-security/selinux/policycoreutils.inc | |||
@@ -7,7 +7,7 @@ context." | |||
7 | SECTION = "base" | 7 | SECTION = "base" |
8 | LICENSE = "GPLv2+" | 8 | LICENSE = "GPLv2+" |
9 | 9 | ||
10 | SRC_URI += "${@base_contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)}" | 10 | SRC_URI += "${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)}" |
11 | 11 | ||
12 | PAM_SRC_URI = "file://pam.d/newrole \ | 12 | PAM_SRC_URI = "file://pam.d/newrole \ |
13 | file://pam.d/run_init \ | 13 | file://pam.d/run_init \ |
@@ -154,7 +154,7 @@ FILES_${PN}-loadpolicy += "\ | |||
154 | " | 154 | " |
155 | FILES_${PN}-newrole += "\ | 155 | FILES_${PN}-newrole += "\ |
156 | ${bindir}/newrole \ | 156 | ${bindir}/newrole \ |
157 | ${@base_contains('DISTRO_FEATURES', 'pam', '${sysconfdir}/pam.d/newrole', '', d)} \ | 157 | ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${sysconfdir}/pam.d/newrole', '', d)} \ |
158 | " | 158 | " |
159 | FILES_${PN}-python = "\ | 159 | FILES_${PN}-python = "\ |
160 | ${libdir}/python${PYTHON_BASEVERSION}/site-packages/seobject.py* \ | 160 | ${libdir}/python${PYTHON_BASEVERSION}/site-packages/seobject.py* \ |
@@ -164,7 +164,7 @@ FILES_${PN}-python = "\ | |||
164 | FILES_${PN}-runinit += "\ | 164 | FILES_${PN}-runinit += "\ |
165 | ${sbindir}/run_init \ | 165 | ${sbindir}/run_init \ |
166 | ${sbindir}/open_init_pty \ | 166 | ${sbindir}/open_init_pty \ |
167 | ${@base_contains('DISTRO_FEATURES', 'pam', '${sysconfdir}/pam.d/run_init', '', d)} \ | 167 | ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${sysconfdir}/pam.d/run_init', '', d)} \ |
168 | " | 168 | " |
169 | FILES_${PN}-dbg += "${libdir}/python${PYTHON_BASEVERSION}/site-packages/sepolicy/.debug/*" | 169 | FILES_${PN}-dbg += "${libdir}/python${PYTHON_BASEVERSION}/site-packages/sepolicy/.debug/*" |
170 | FILES_${PN}-sandbox += "\ | 170 | FILES_${PN}-sandbox += "\ |