diff options
author | Robin H. Johnson <robbat2@gentoo.org> | 2007-02-25 11:34:42 +0000 |
---|---|---|
committer | Robin H. Johnson <robbat2@gentoo.org> | 2007-02-25 11:34:42 +0000 |
commit | b7b1167bdb943755f2f573913fee9009dc6b0554 (patch) | |
tree | 9103750edb91564f3dc930093197f6b7148d8bca /sys-process | |
parent | Dropped ppc-macos keyword, see you in prefix (diff) | |
download | gentoo-2-b7b1167bdb943755f2f573913fee9009dc6b0554.tar.gz gentoo-2-b7b1167bdb943755f2f573913fee9009dc6b0554.tar.bz2 gentoo-2-b7b1167bdb943755f2f573913fee9009dc6b0554.zip |
Cleanup all of the old stuff.
(Portage version: 2.1.2-r11)
Diffstat (limited to 'sys-process')
28 files changed, 11 insertions, 1042 deletions
diff --git a/sys-process/audit/ChangeLog b/sys-process/audit/ChangeLog index 073746e032f2..664b8ff2746a 100644 --- a/sys-process/audit/ChangeLog +++ b/sys-process/audit/ChangeLog @@ -1,6 +1,16 @@ # ChangeLog for sys-process/audit # Copyright 1999-2007 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/ChangeLog,v 1.16 2007/02/25 11:29:26 robbat2 Exp $ +# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/ChangeLog,v 1.17 2007/02/25 11:34:42 robbat2 Exp $ + + 25 Feb 2007; Robin H. Johnson <robbat2@gentoo.org> + -files/auditd.confd-0.7.2-r1, -files/auditd.initd-0.7.2-r1, + -files/audit-0.9.14-header.patch, -files/audit-1.1.3-compilefix.patch, + -files/audit-1.2.3-syscall-partial.patch, -files/auditd.confd, + -files/auditd.initd, -audit-0.7.2-r1.ebuild, -audit-0.7.3.ebuild, + -audit-0.7.4.ebuild, -audit-0.8.ebuild, -audit-0.8.1.ebuild, + -audit-0.9.1.ebuild, -audit-1.1.6.ebuild, -audit-1.2.1.ebuild, + -audit-1.2.3.ebuild, -audit-1.2.5.ebuild: + Cleanup all of the old stuff. *audit-1.2.9-r2 (25 Feb 2007) diff --git a/sys-process/audit/audit-0.7.2-r1.ebuild b/sys-process/audit/audit-0.7.2-r1.ebuild deleted file mode 100644 index 649855b3eb41..000000000000 --- a/sys-process/audit/audit-0.7.2-r1.ebuild +++ /dev/null @@ -1,54 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.7.2-r1.ebuild,v 1.1 2005/05/01 03:20:47 robbat2 Exp $ - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~x86" -IUSE="" - -DEPEND="sys-devel/libtool - virtual/os-headers - >=sys-devel/automake-1.9 - >=sys-devel/autoconf-2.59" -RDEPEND="" - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - WANT_AUTOMAKE="1.9" \ - autoreconf -fv --install || die "autoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR=${D} install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - # remove RH garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - # restrictive perms for security - chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${D}/etc/{auditd.conf,audit.rules} -} - -pkg_postinst() { - # upstream wants these to have restrictive perms - chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/ - chmod 0640 /etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-0.7.3.ebuild b/sys-process/audit/audit-0.7.3.ebuild deleted file mode 100644 index 3b1647709bf8..000000000000 --- a/sys-process/audit/audit-0.7.3.ebuild +++ /dev/null @@ -1,54 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.7.3.ebuild,v 1.1 2005/05/07 07:05:52 beu Exp $ - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~x86" -IUSE="" - -DEPEND="sys-devel/libtool - virtual/os-headers - >=sys-devel/automake-1.9 - >=sys-devel/autoconf-2.59" -RDEPEND="" - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - WANT_AUTOMAKE="1.9" \ - autoreconf -fv --install || die "autoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR=${D} install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - # remove RH garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - # restrictive perms for security - chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${D}/etc/{auditd.conf,audit.rules} -} - -pkg_postinst() { - # upstream wants these to have restrictive perms - chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/ - chmod 0640 /etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-0.7.4.ebuild b/sys-process/audit/audit-0.7.4.ebuild deleted file mode 100644 index 7119d6416cb5..000000000000 --- a/sys-process/audit/audit-0.7.4.ebuild +++ /dev/null @@ -1,54 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.7.4.ebuild,v 1.1 2005/05/09 05:45:13 beu Exp $ - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~x86" -IUSE="" - -DEPEND="sys-devel/libtool - virtual/os-headers - >=sys-devel/automake-1.9 - >=sys-devel/autoconf-2.59" -RDEPEND="" - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - WANT_AUTOMAKE="1.9" \ - autoreconf -fv --install || die "autoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR=${D} install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - # remove RH garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - # restrictive perms for security - chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${D}/etc/{auditd.conf,audit.rules} -} - -pkg_postinst() { - # upstream wants these to have restrictive perms - chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/ - chmod 0640 /etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-0.8.1.ebuild b/sys-process/audit/audit-0.8.1.ebuild deleted file mode 100644 index 02ef13a83c58..000000000000 --- a/sys-process/audit/audit-0.8.1.ebuild +++ /dev/null @@ -1,54 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.8.1.ebuild,v 1.1 2005/05/19 18:15:39 robbat2 Exp $ - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~x86" -IUSE="" - -DEPEND="sys-devel/libtool - virtual/os-headers - >=sys-devel/automake-1.9 - >=sys-devel/autoconf-2.59" -RDEPEND="" - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - WANT_AUTOMAKE="1.9" \ - autoreconf -fv --install || die "autoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR=${D} install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - # remove RH garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - # restrictive perms for security - chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${D}/etc/{auditd.conf,audit.rules} -} - -pkg_postinst() { - # upstream wants these to have restrictive perms - chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/ - chmod 0640 /etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-0.8.ebuild b/sys-process/audit/audit-0.8.ebuild deleted file mode 100644 index 76a267f44653..000000000000 --- a/sys-process/audit/audit-0.8.ebuild +++ /dev/null @@ -1,54 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.8.ebuild,v 1.1 2005/05/15 14:55:30 beu Exp $ - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~x86" -IUSE="" - -DEPEND="sys-devel/libtool - virtual/os-headers - >=sys-devel/automake-1.9 - >=sys-devel/autoconf-2.59" -RDEPEND="" - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - WANT_AUTOMAKE="1.9" \ - autoreconf -fv --install || die "autoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR=${D} install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - # remove RH garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - # restrictive perms for security - chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${D}/etc/{auditd.conf,audit.rules} -} - -pkg_postinst() { - # upstream wants these to have restrictive perms - chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/ - chmod 0640 /etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-0.9.1.ebuild b/sys-process/audit/audit-0.9.1.ebuild deleted file mode 100644 index c3ec2dcc4ec0..000000000000 --- a/sys-process/audit/audit-0.9.1.ebuild +++ /dev/null @@ -1,54 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.9.1.ebuild,v 1.1 2005/06/06 01:39:22 beu Exp $ - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~x86" -IUSE="" - -DEPEND="sys-devel/libtool - virtual/os-headers - >=sys-devel/automake-1.9 - >=sys-devel/autoconf-2.59" -RDEPEND="" - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - WANT_AUTOMAKE="1.9" \ - autoreconf -fv --install || die "autoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR=${D} install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - # remove RH garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - # restrictive perms for security - chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${D}/etc/{auditd.conf,audit.rules} -} - -pkg_postinst() { - # upstream wants these to have restrictive perms - chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/ - chmod 0640 /etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-1.1.6.ebuild b/sys-process/audit/audit-1.1.6.ebuild deleted file mode 100644 index 43dcb9e163d4..000000000000 --- a/sys-process/audit/audit-1.1.6.ebuild +++ /dev/null @@ -1,67 +0,0 @@ -# Copyright 1999-2006 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-1.1.6.ebuild,v 1.2 2006/11/13 11:41:07 robbat2 Exp $ - -inherit eutils autotools - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -HEADER_KV="2.6.18-rc4" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="-*" -IUSE="" - -RDEPEND=">=dev-lang/python-2.4" -DEPEND="${RDEPEND} - dev-lang/swig" -# Do not use os-headers as this is linux specific -# linux-headers 2.6.17_rc1 is NOT in the tree yet. - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - for i in audit.h elf-em.h; do - cp -f ${FILESDIR}/${i}-${HEADER_KV} ${S}/lib/${i} - done - sed -i -e 's,<linux/elf-em.h>,"elf-em.h",g' ${S}/lib/audit.h - sed -i -e 's,<linux/audit.h>,"audit.h",g' ${S}/lib/libaudit.h - cp -f ${S}/lib/{audit,elf-em}.h ${S}/src/mt/ - eautoreconf || die "eautoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR="${D}" install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - rm -rf ${D}/lib/*.la ${D}/usr/lib/*.la - # remove RedHat garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules contrib/* - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - lockdown_perms ${D} -} - -pkg_postinst() { - lockdown_perms / -} - -lockdown_perms() { - # upstream wants these to have restrictive perms - basedir="$1" - chmod 0750 ${basedir}/sbin/{auditctl,aureport,audispd,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${basedir}/etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-1.2.1.ebuild b/sys-process/audit/audit-1.2.1.ebuild deleted file mode 100644 index 749a6341bc32..000000000000 --- a/sys-process/audit/audit-1.2.1.ebuild +++ /dev/null @@ -1,60 +0,0 @@ -# Copyright 1999-2006 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-1.2.1.ebuild,v 1.1 2006/04/19 23:17:16 robbat2 Exp $ - -inherit eutils autotools - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="-*" -IUSE="" - -RDEPEND=">=dev-lang/python-2.4" -DEPEND="${RDEPEND} - dev-lang/swig - >=sys-kernel/linux-headers-2.6.17_rc1" -# Do not use os-headers as this is linux specific -# linux-headers 2.6.17_rc1 is NOT in the tree yet. - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - eautoreconf || die "eautoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR="${D}" install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - rm -rf ${D}/lib/*.la ${D}/usr/lib/*.la - # remove RedHat garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules contrib/* - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - lockdown_perms ${D} -} - -pkg_postinst() { - lockdown_perms / -} - -lockdown_perms() { - # upstream wants these to have restrictive perms - basedir="$1" - chmod 0750 ${basedir}/sbin/{auditctl,aureport,audispd,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${basedir}/etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-1.2.3.ebuild b/sys-process/audit/audit-1.2.3.ebuild deleted file mode 100644 index 79451df045cd..000000000000 --- a/sys-process/audit/audit-1.2.3.ebuild +++ /dev/null @@ -1,68 +0,0 @@ -# Copyright 1999-2006 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-1.2.3.ebuild,v 1.2 2006/11/13 11:41:07 robbat2 Exp $ - -inherit eutils autotools toolchain-funcs - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="-*" -IUSE="" - -RDEPEND=">=dev-lang/python-2.4" -DEPEND="${RDEPEND} - dev-lang/swig - >=sys-kernel/linux-headers-2.6.17_p3" -# Do not use os-headers as this is linux specific -# linux-headers 2.6.17_p3 is NOT in the tree yet. -# It is basically linux-headers-2.6.17 + patch-2.6.17-git3 - 2.6.16-appCompat.patch - -src_unpack() { - unpack ${A} || die "unpack failed" - epatch ${FILESDIR}/${P}-syscall-partial.patch - cd ${S} || die "cd '${S}' failed" - eautoreconf || die "eautoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR="${D}" install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - rm -rf ${D}/lib/*.la ${D}/usr/lib/*.la - gen_usr_ldscript libaudit.so libauparse.so - # remove RedHat garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules contrib/* - # scripts - newinitd ${FILESDIR}/auditd-init.d-1.2.3 auditd - newconfd ${FILESDIR}/auditd-conf.d-1.2.3 auditd - # Gentoo rules - insinto /etc/audit/ - doins ${FILESDIR}/audit.rules* - # audit logs go here - keepdir /var/log/audit/ - # Security - lockdown_perms ${D} -} - -pkg_postinst() { - lockdown_perms / -} - -lockdown_perms() { - # upstream wants these to have restrictive perms - basedir="$1" - chmod 0750 ${basedir}/sbin/au{ditctl,report,dispd,ditd,search,trace} 2>/dev/null - chmod 0750 ${basedir}/var/log/audit/ 2>/dev/null - chmod 0640 ${basedir}/etc/{audit/,}{auditd.conf,audit.rules*} 2>/dev/null -} diff --git a/sys-process/audit/audit-1.2.5.ebuild b/sys-process/audit/audit-1.2.5.ebuild deleted file mode 100644 index bb8355368769..000000000000 --- a/sys-process/audit/audit-1.2.5.ebuild +++ /dev/null @@ -1,74 +0,0 @@ -# Copyright 1999-2006 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-1.2.5.ebuild,v 1.1 2006/11/13 11:41:07 robbat2 Exp $ - -inherit eutils autotools toolchain-funcs - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -HEADER_KV="2.6.18-rc4" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="-*" -IUSE="" - -RDEPEND=">=dev-lang/python-2.4" -DEPEND="${RDEPEND} - dev-lang/swig" -# Do not use os-headers as this is linux specific -# linux-headers 2.6.17_p3 is NOT in the tree yet. -# It is basically linux-headers-2.6.17 + patch-2.6.17-git3 - 2.6.16-appCompat.patch - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - for i in audit.h elf-em.h; do - cp -f ${FILESDIR}/${i}-${HEADER_KV} ${S}/lib/${i} - done - sed -i -e 's,<linux/elf-em.h>,"elf-em.h",g' ${S}/lib/audit.h - sed -i -e 's,<linux/audit.h>,"audit.h",g' ${S}/lib/libaudit.h - cp -f ${S}/lib/{audit,elf-em}.h ${S}/src/mt/ - eautoreconf || die "eautoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR="${D}" install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - rm -rf ${D}/lib/*.la ${D}/usr/lib/*.la - gen_usr_ldscript libaudit.so libauparse.so - # remove RedHat garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules contrib/* - # scripts - newinitd ${FILESDIR}/auditd-init.d-1.2.3 auditd - newconfd ${FILESDIR}/auditd-conf.d-1.2.3 auditd - # Gentoo rules - insinto /etc/audit/ - doins ${FILESDIR}/audit.rules* - # audit logs go here - keepdir /var/log/audit/ - # Security - lockdown_perms ${D} -} - -pkg_postinst() { - lockdown_perms / -} - -lockdown_perms() { - # upstream wants these to have restrictive perms - basedir="$1" - chmod 0750 ${basedir}/sbin/au{ditctl,report,dispd,ditd,search,trace} 2>/dev/null - chmod 0750 ${basedir}/var/log/audit/ 2>/dev/null - chmod 0640 ${basedir}/etc/{audit/,}{auditd.conf,audit.rules*} 2>/dev/null -} diff --git a/sys-process/audit/files/audit-0.9.14-header.patch b/sys-process/audit/files/audit-0.9.14-header.patch deleted file mode 100644 index 1668d9ff5b9e..000000000000 --- a/sys-process/audit/files/audit-0.9.14-header.patch +++ /dev/null @@ -1,208 +0,0 @@ -diff -ur audit-0.9.14/lib/libaudit.h /opt/audit-0.9.14/lib/libaudit.h ---- audit-0.9.14/lib/libaudit.h 2005-06-21 17:50:54.000000000 -0400 -+++ /opt/audit-0.9.14/lib/libaudit.h 2005-06-28 14:26:57.000000000 -0400 -@@ -1,3 +1,196 @@ -+/* NOTE: This file is really 2 that are combined temporarily. */ -+ -+/* audit.h -- Auditing support -+ * -+ * Copyright 2003-2004 Red Hat Inc., Durham, North Carolina. -+ * All Rights Reserved. -+ * -+ * This program is free software; you can redistribute it and/or modify -+ * it under the terms of the GNU General Public License as published by -+ * the Free Software Foundation; either version 2 of the License, or -+ * (at your option) any later version. -+ * -+ * This program is distributed in the hope that it will be useful, -+ * but WITHOUT ANY WARRANTY; without even the implied warranty of -+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -+ * GNU General Public License for more details. -+ * -+ * You should have received a copy of the GNU General Public License -+ * along with this program; if not, write to the Free Software -+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA -+ * -+ * Written by Rickard E. (Rik) Faith <faith@redhat.com> -+ * -+ */ -+ -+#ifndef _LINUX_AUDIT_H_ -+#define _LINUX_AUDIT_H_ -+ -+#include <elf.h> -+ -+/* The netlink messages for the audit system is divided into blocks: -+ * 1000 - 1099 are for commanding the audit system -+ * 1100 - 1199 user space trusted application messages -+ * 1200 - 1299 messages internal to the audit daemon -+ * 1300 - 1399 audit event messages -+ * 1400 - 1499 SE Linux use -+ * 1500 - 1999 future use -+ * 2000 is for otherwise unclassified kernel audit messages -+ * -+ * Messages from 1000-1199 are bi-directional. 1200-1299 are exclusively user -+ * space. Anything over that is kernel --> user space communication. -+ */ -+#define AUDIT_GET 1000 /* Get status */ -+#define AUDIT_SET 1001 /* Set status (enable/disable/auditd) */ -+#define AUDIT_LIST 1002 /* List syscall filtering rules */ -+#define AUDIT_ADD 1003 /* Add syscall filtering rule */ -+#define AUDIT_DEL 1004 /* Delete syscall filtering rule */ -+#define AUDIT_USER 1005 /* Message from userspace -- deprecated */ -+#define AUDIT_LOGIN 1006 /* Define the login id and information */ -+#define AUDIT_WATCH_INS 1007 /* Insert file/dir watch entry */ -+#define AUDIT_WATCH_REM 1008 /* Remove file/dir watch entry */ -+#define AUDIT_WATCH_LIST 1009 /* List all file/dir watches */ -+#define AUDIT_SIGNAL_INFO 1010 /* Get info about sender of signal to auditd */ -+ -+#define AUDIT_FIRST_USER_MSG 1100 /* Userspace messages uninteresting to kernel */ -+#define AUDIT_LAST_USER_MSG 1199 -+ -+#define AUDIT_DAEMON_START 1200 /* Daemon startup record */ -+#define AUDIT_DAEMON_END 1201 /* Daemon normal stop record */ -+#define AUDIT_DAEMON_ABORT 1202 /* Daemon error stop record */ -+#define AUDIT_DAEMON_CONFIG 1203 /* Daemon config change */ -+ -+#define AUDIT_SYSCALL 1300 /* Syscall event */ -+#define AUDIT_FS_WATCH 1301 /* Filesystem watch event */ -+#define AUDIT_PATH 1302 /* Filname path information */ -+#define AUDIT_IPC 1303 /* IPC record */ -+#define AUDIT_SOCKETCALL 1304 /* sys_socketcall arguments */ -+#define AUDIT_CONFIG_CHANGE 1305 /* Audit system configuration change */ -+#define AUDIT_SOCKADDR 1306 /* sockaddr copied as syscall arg */ -+ -+#define AUDIT_AVC 1400 /* SE Linux avc denial or grant */ -+#define AUDIT_SELINUX_ERR 1401 /* Internal SE Linux Errors */ -+#define AUDIT_AVC_PATH 1402 /* dentry, vfsmount pair from avc */ -+ -+#define AUDIT_KERNEL 2000 /* Asynchronous audit record. NOT A REQUEST. */ -+ -+/* Rule flags */ -+#define AUDIT_PER_TASK 0x01 /* Apply rule at task creation (not syscall) */ -+#define AUDIT_AT_ENTRY 0x02 /* Apply rule at syscall entry */ -+#define AUDIT_AT_EXIT 0x04 /* Apply rule at syscall exit */ -+#define AUDIT_PREPEND 0x10 /* Prepend to front of list */ -+ -+/* Rule actions */ -+#define AUDIT_NEVER 0 /* Do not build context if rule matches */ -+#define AUDIT_POSSIBLE 1 /* Build context if rule matches */ -+#define AUDIT_ALWAYS 2 /* Generate audit record if rule matches */ -+ -+/* Rule structure sizes -- if these change, different AUDIT_ADD and -+ * AUDIT_LIST commands must be implemented. */ -+#define AUDIT_MAX_FIELDS 64 -+#define AUDIT_BITMASK_SIZE 64 -+#define AUDIT_WORD(nr) ((uint32_t)((nr)/32)) -+#define AUDIT_BIT(nr) (1 << ((nr) - AUDIT_WORD(nr)*32)) -+ -+/* Rule fields */ -+ /* These are useful when checking the -+ * task structure at task creation time -+ * (AUDIT_PER_TASK). */ -+#define AUDIT_PID 0 -+#define AUDIT_UID 1 -+#define AUDIT_EUID 2 -+#define AUDIT_SUID 3 -+#define AUDIT_FSUID 4 -+#define AUDIT_GID 5 -+#define AUDIT_EGID 6 -+#define AUDIT_SGID 7 -+#define AUDIT_FSGID 8 -+#define AUDIT_LOGINUID 9 -+#define AUDIT_PERS 10 -+#define AUDIT_ARCH 11 -+ -+ /* These are ONLY useful when checking -+ * at syscall exit time (AUDIT_AT_EXIT). */ -+#define AUDIT_DEVMAJOR 100 -+#define AUDIT_DEVMINOR 101 -+#define AUDIT_INODE 102 -+#define AUDIT_EXIT 103 -+#define AUDIT_SUCCESS 104 /* exit >= 0; value ignored */ -+ -+#define AUDIT_ARG0 200 -+#define AUDIT_ARG1 (AUDIT_ARG0+1) -+#define AUDIT_ARG2 (AUDIT_ARG0+2) -+#define AUDIT_ARG3 (AUDIT_ARG0+3) -+ -+#define AUDIT_NEGATE 0x80000000 -+ -+ -+/* Status symbols */ -+ /* Mask values */ -+#define AUDIT_STATUS_ENABLED 0x0001 -+#define AUDIT_STATUS_FAILURE 0x0002 -+#define AUDIT_STATUS_PID 0x0004 -+#define AUDIT_STATUS_RATE_LIMIT 0x0008 -+#define AUDIT_STATUS_BACKLOG_LIMIT 0x0010 -+ /* Failure-to-log actions */ -+#define AUDIT_FAIL_SILENT 0 -+#define AUDIT_FAIL_PRINTK 1 -+#define AUDIT_FAIL_PANIC 2 -+ -+/* distinguish syscall tables */ -+#define __AUDIT_ARCH_64BIT 0x80000000 -+#define __AUDIT_ARCH_LE 0x40000000 -+#define AUDIT_ARCH_ALPHA (EM_ALPHA|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_ARM (EM_ARM|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_ARMEB (EM_ARM) -+#define AUDIT_ARCH_CRIS (EM_CRIS|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_FRV (EM_FRV) -+#define AUDIT_ARCH_H8300 (EM_H8_300) -+#define AUDIT_ARCH_I386 (EM_386|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_IA64 (EM_IA_64|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_M32R (EM_M32R) -+#define AUDIT_ARCH_M68K (EM_68K) -+#define AUDIT_ARCH_MIPS (EM_MIPS) -+#define AUDIT_ARCH_MIPSEL (EM_MIPS|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_MIPS64 (EM_MIPS|__AUDIT_ARCH_64BIT) -+#define AUDIT_ARCH_MIPSEL64 (EM_MIPS|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_PARISC (EM_PARISC) -+#define AUDIT_ARCH_PARISC64 (EM_PARISC|__AUDIT_ARCH_64BIT) -+#define AUDIT_ARCH_PPC (EM_PPC) -+#define AUDIT_ARCH_PPC64 (EM_PPC64|__AUDIT_ARCH_64BIT) -+#define AUDIT_ARCH_S390 (EM_S390) -+#define AUDIT_ARCH_S390X (EM_S390|__AUDIT_ARCH_64BIT) -+#define AUDIT_ARCH_SH (EM_SH) -+#define AUDIT_ARCH_SHEL (EM_SH|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_SH64 (EM_SH|__AUDIT_ARCH_64BIT) -+#define AUDIT_ARCH_SHEL64 (EM_SH|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_SPARC (EM_SPARC) -+#define AUDIT_ARCH_SPARC64 (EM_SPARC64|__AUDIT_ARCH_64BIT) -+#define AUDIT_ARCH_V850 (EM_V850|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_X86_64 (EM_X86_64|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) -+ -+struct audit_status { -+ uint32_t mask; /* Bit mask for valid entries */ -+ uint32_t enabled; /* 1 = enabled, 0 = disabled */ -+ uint32_t failure; /* Failure-to-log action */ -+ uint32_t pid; /* pid of auditd process */ -+ uint32_t rate_limit; /* messages rate limit (per second) */ -+ uint32_t backlog_limit; /* waiting messages limit */ -+ uint32_t lost; /* messages lost */ -+ uint32_t backlog; /* messages waiting in queue */ -+}; -+ -+struct audit_rule { /* for AUDIT_LIST, AUDIT_ADD, and AUDIT_DEL */ -+ uint32_t flags; /* AUDIT_PER_{TASK,CALL}, AUDIT_PREPEND */ -+ uint32_t action; /* AUDIT_NEVER, AUDIT_POSSIBLE, AUDIT_ALWAYS */ -+ uint32_t field_count; -+ uint32_t mask[AUDIT_BITMASK_SIZE]; -+ uint32_t fields[AUDIT_MAX_FIELDS]; -+ uint32_t values[AUDIT_MAX_FIELDS]; -+}; -+ -+#endif /* _LINUX_AUDIT_H_ */ -+ - /* libaudit.h -- - * Copyright 2004, 2005 Red Hat Inc., Durham, North Carolina. - * All Rights Reserved. -@@ -27,7 +220,6 @@ - #include <stdint.h> - #include <sys/socket.h> - #include <linux/netlink.h> --#include <linux/audit.h> - #include <stdarg.h> - #include <syslog.h> - #include <linux/fs.h> /* For watch */ diff --git a/sys-process/audit/files/audit-1.1.3-compilefix.patch b/sys-process/audit/files/audit-1.1.3-compilefix.patch deleted file mode 100644 index f33886976940..000000000000 --- a/sys-process/audit/files/audit-1.1.3-compilefix.patch +++ /dev/null @@ -1,123 +0,0 @@ -diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/lib/libaudit.h audit-1.1.3.new/lib/libaudit.h ---- audit-1.1.3/lib/libaudit.h 2006-01-05 13:19:20.000000000 -0800 -+++ audit-1.1.3.new/lib/libaudit.h 2006-01-31 18:12:49.057268514 -0800 -@@ -31,6 +31,7 @@ extern "C" { - #include <asm/types.h> - #include <stdint.h> - #include <sys/socket.h> -+#include <signal.h> /* to avoid redefinition of sigval/siginfo */ - #include <linux/netlink.h> - #include <linux/audit.h> - #include <stdarg.h> -diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/src/auditctl-llist.c audit-1.1.3.new/src/auditctl-llist.c ---- audit-1.1.3/src/auditctl-llist.c 2006-01-04 08:27:42.000000000 -0800 -+++ audit-1.1.3.new/src/auditctl-llist.c 2006-01-31 18:07:52.367438434 -0800 -@@ -126,16 +126,16 @@ int list_find_item(llist *l, unsigned in - void list_clear(llist* l) - { - lnode* nextnode; -- register lnode* current; -+ register lnode* curnode; - -- current = l->head; -- while (current) -+ curnode = l->head; -+ while (curnode) - { -- nextnode=current->next; -- if (current->w) -- free(current->w); -- free(current); -- current=nextnode; -+ nextnode=curnode->next; -+ if (curnode->w) -+ free(curnode->w); -+ free(curnode); -+ curnode=nextnode; - } - l->head = 0; - l->cur = 0; -diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/src/ausearch-int.c audit-1.1.3.new/src/ausearch-int.c ---- audit-1.1.3/src/ausearch-int.c 2006-01-04 08:27:42.000000000 -0800 -+++ audit-1.1.3.new/src/ausearch-int.c 2006-01-31 18:09:11.607132293 -0800 -@@ -112,16 +112,16 @@ int ilist_find_item(ilist *l, unsigned i - void ilist_clear(ilist* l) - { - int_node* nextnode; -- register int_node* current; -+ register int_node* curnode; - - if (l == NULL) - return; - -- current = l->head; -- while (current) { -- nextnode=current->next; -- free(current); -- current=nextnode; -+ curnode = l->head; -+ while (curnode) { -+ nextnode=curnode->next; -+ free(curnode); -+ curnode=nextnode; - } - l->head = NULL; - l->cur = NULL; -diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/src/ausearch-llist.c audit-1.1.3.new/src/ausearch-llist.c ---- audit-1.1.3/src/ausearch-llist.c 2006-01-04 08:27:42.000000000 -0800 -+++ audit-1.1.3.new/src/ausearch-llist.c 2006-01-31 18:08:40.173666993 -0800 -@@ -136,15 +136,15 @@ int list_find_item(llist *l, unsigned in - void list_clear(llist* l) - { - lnode* nextnode; -- register lnode* current; -+ register lnode* curnode; - -- current = l->head; -- while (current) { -- nextnode=current->next; -- if (current->message) -- free(current->message); -- free(current); -- current=nextnode; -+ curnode = l->head; -+ while (curnode) { -+ nextnode=curnode->next; -+ if (curnode->message) -+ free(curnode->message); -+ free(curnode); -+ curnode=nextnode; - } - l->head = NULL; - l->cur = NULL; -diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/src/ausearch-string.c audit-1.1.3.new/src/ausearch-string.c ---- audit-1.1.3/src/ausearch-string.c 2006-01-04 08:27:42.000000000 -0800 -+++ audit-1.1.3.new/src/ausearch-string.c 2006-01-31 18:08:54.386329531 -0800 -@@ -130,17 +130,17 @@ int slist_find_item(slist *l, unsigned i - void slist_clear(slist* l) - { - snode* nextnode; -- register snode* current; -+ register snode* curnode; - -- current = l->head; -- while (current) { -- nextnode=current->next; -- if (current->str) -- free(current->str); -- if (current->key) -- free(current->key); -- free(current); -- current=nextnode; -+ curnode = l->head; -+ while (curnode) { -+ nextnode=curnode->next; -+ if (curnode->str) -+ free(curnode->str); -+ if (curnode->key) -+ free(curnode->key); -+ free(curnode); -+ curnode=nextnode; - } - l->head = NULL; - l->cur = NULL; diff --git a/sys-process/audit/files/audit-1.2.3-syscall-partial.patch b/sys-process/audit/files/audit-1.2.3-syscall-partial.patch deleted file mode 100644 index 1b70589901e5..000000000000 --- a/sys-process/audit/files/audit-1.2.3-syscall-partial.patch +++ /dev/null @@ -1,11 +0,0 @@ ---- audit-1.2.3/lib/libaudit.h~ 2006-05-24 08:19:30.000000000 -0700 -+++ audit-1.2.3/lib/libaudit.h 2006-06-21 23:01:18.219583784 -0700 -@@ -91,6 +91,8 @@ - #define AUDIT_FS_INODE 1308 /* File system inode */ - #ifndef AUDIT_EXECVE - #define AUDIT_EXECVE 1309 -+#endif -+#ifndef AUDIT_SYSCALL_PARTIAL - #define AUDIT_SYSCALL_PARTIAL 1310 /* Partial syscall event */ - #endif - #ifndef AUDIT_IPC_SET_PERM diff --git a/sys-process/audit/files/auditd.confd b/sys-process/audit/files/auditd.confd deleted file mode 100644 index 5213240c55c7..000000000000 --- a/sys-process/audit/files/auditd.confd +++ /dev/null @@ -1,12 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/files/auditd.confd,v 1.1 2005/05/01 02:19:00 robbat2 Exp $ - -# Configuration options for auditd -# -f for foreground mode -# There are some other options as well, but you'll have to look in the source -# code to find them As they aren't ready for use yet. -extraoptions='' - -# Audit rules file -rulefile=/etc/audit.rules diff --git a/sys-process/audit/files/auditd.confd-0.7.2-r1 b/sys-process/audit/files/auditd.confd-0.7.2-r1 deleted file mode 100644 index 6a2f9d1da7be..000000000000 --- a/sys-process/audit/files/auditd.confd-0.7.2-r1 +++ /dev/null @@ -1,12 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/files/auditd.confd-0.7.2-r1,v 1.1 2005/05/01 03:20:48 robbat2 Exp $ - -# Configuration options for auditd -# -f for foreground mode -# There are some other options as well, but you'll have to look in the source -# code to find them As they aren't ready for use yet. -extraoptions='' - -# Audit rules file -rulefile=/etc/audit.rules diff --git a/sys-process/audit/files/auditd.initd b/sys-process/audit/files/auditd.initd deleted file mode 100644 index 8ec0ee60903c..000000000000 --- a/sys-process/audit/files/auditd.initd +++ /dev/null @@ -1,26 +0,0 @@ -#!/sbin/runscript -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/files/auditd.initd,v 1.2 2005/05/01 02:19:48 robbat2 Exp $ - -start() { - ebegin "Starting auditd" - start-stop-daemon \ - --start --quiet --pidfile /var/run/auditd.pid \ - --exec /usr/sbin/auditd -- ${extraoptions} - local ret=$? - eend $ret - if [ $ret -eq 0 -a -n "${rulefile}" -a -f "${rulefile}" ]; then - einfo "Loading audit rules from ${rulefile}" - /usr/sbin/auditctl -R "${rulefile}" - ret=$? - fi - return $ret -} - -stop() { - ebegin "Stopping auditd" - start-stop-daemon \ - --stop --quiet --pidfile /var/run/auditd.pid - eend $? -} diff --git a/sys-process/audit/files/auditd.initd-0.7.2-r1 b/sys-process/audit/files/auditd.initd-0.7.2-r1 deleted file mode 100644 index db705c6aa780..000000000000 --- a/sys-process/audit/files/auditd.initd-0.7.2-r1 +++ /dev/null @@ -1,26 +0,0 @@ -#!/sbin/runscript -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/files/auditd.initd-0.7.2-r1,v 1.1 2005/05/01 03:20:48 robbat2 Exp $ - -start() { - ebegin "Starting auditd" - start-stop-daemon \ - --start --quiet --pidfile /var/run/auditd.pid \ - --exec /sbin/auditd -- ${extraoptions} - local ret=$? - eend $ret - if [ $ret -eq 0 -a -n "${rulefile}" -a -f "${rulefile}" ]; then - einfo "Loading audit rules from ${rulefile}" - /sbin/auditctl -R "${rulefile}" - ret=$? - fi - return $ret -} - -stop() { - ebegin "Stopping auditd" - start-stop-daemon \ - --stop --quiet --pidfile /var/run/auditd.pid - eend $? -} diff --git a/sys-process/audit/files/digest-audit-0.7.2-r1 b/sys-process/audit/files/digest-audit-0.7.2-r1 deleted file mode 100644 index 5eae34c2de42..000000000000 --- a/sys-process/audit/files/digest-audit-0.7.2-r1 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 56c82cfe0d5af98a3313a8a76a08ed43 audit-0.7.2.tar.gz 70184 -RMD160 d13d8e93972f91386ced42e8204fb8ad4225f087 audit-0.7.2.tar.gz 70184 -SHA256 fc2855e4504efeb60ec61aef414719eb9f94ef00496418a8873f3f8dc3e0628f audit-0.7.2.tar.gz 70184 diff --git a/sys-process/audit/files/digest-audit-0.7.3 b/sys-process/audit/files/digest-audit-0.7.3 deleted file mode 100644 index 8ccfe7a87c8f..000000000000 --- a/sys-process/audit/files/digest-audit-0.7.3 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 1fbed5d8a67b2ad7724e4d95174d451f audit-0.7.3.tar.gz 72496 -RMD160 035a95e73e333abbd119667c2b987b0321600273 audit-0.7.3.tar.gz 72496 -SHA256 c24eae64555a32d2725f3af2aaf551fc6ffa1ea67e0bdbe735a739f36b9fcf8a audit-0.7.3.tar.gz 72496 diff --git a/sys-process/audit/files/digest-audit-0.7.4 b/sys-process/audit/files/digest-audit-0.7.4 deleted file mode 100644 index 8b9e5a870fba..000000000000 --- a/sys-process/audit/files/digest-audit-0.7.4 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 2a62ad468d504780da0899e15d1ea03c audit-0.7.4.tar.gz 72751 -RMD160 8c0d60f24da68372760cd33a46c9fe3f8acaf286 audit-0.7.4.tar.gz 72751 -SHA256 3fa0aadadb7163b868d435bdb03f73df7d19f2f4d98cb86e7c8ed445c39f5f95 audit-0.7.4.tar.gz 72751 diff --git a/sys-process/audit/files/digest-audit-0.8 b/sys-process/audit/files/digest-audit-0.8 deleted file mode 100644 index 08f0f321aa26..000000000000 --- a/sys-process/audit/files/digest-audit-0.8 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 e2930c151b3cddb563df50c69733c26f audit-0.8.tar.gz 74782 -RMD160 fa9c23fb864eaa3987743535e0fa51c2294c02fc audit-0.8.tar.gz 74782 -SHA256 a70523be883acfc07410b2d4ec1b3a958de73c0a609d40621e695c3156641aee audit-0.8.tar.gz 74782 diff --git a/sys-process/audit/files/digest-audit-0.8.1 b/sys-process/audit/files/digest-audit-0.8.1 deleted file mode 100644 index f0b66ce94631..000000000000 --- a/sys-process/audit/files/digest-audit-0.8.1 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 d02b1e35fdbfa5de94fd7daf8e94845a audit-0.8.1.tar.gz 75487 -RMD160 e5b9ed8cca8d4d3c4b379144633f9cba70fefd76 audit-0.8.1.tar.gz 75487 -SHA256 bf33acf43bc8ce64a25d5b624814a84022df131f2062327cdc311788aadc51dc audit-0.8.1.tar.gz 75487 diff --git a/sys-process/audit/files/digest-audit-0.9.1 b/sys-process/audit/files/digest-audit-0.9.1 deleted file mode 100644 index f22fc633e905..000000000000 --- a/sys-process/audit/files/digest-audit-0.9.1 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 052dd2563e90cd787994aebc69545891 audit-0.9.1.tar.gz 82578 -RMD160 beab2380723213bba3ad8dca21ebee1155a49900 audit-0.9.1.tar.gz 82578 -SHA256 88fdb0883f552dccb968bb953f6467f14bddb33cba22bad807649e4c039f1fab audit-0.9.1.tar.gz 82578 diff --git a/sys-process/audit/files/digest-audit-1.1.6 b/sys-process/audit/files/digest-audit-1.1.6 deleted file mode 100644 index 60209d810a5e..000000000000 --- a/sys-process/audit/files/digest-audit-1.1.6 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 19d208c284d6f6ae830f1943a74bbd7f audit-1.1.6.tar.gz 274815 -RMD160 8f420b47347d1c00b4b4c114dc4f913704a9205e audit-1.1.6.tar.gz 274815 -SHA256 44c152fc652567c64c5937335122b37250694152bd47d44628b11f1f65c16e04 audit-1.1.6.tar.gz 274815 diff --git a/sys-process/audit/files/digest-audit-1.2.1 b/sys-process/audit/files/digest-audit-1.2.1 deleted file mode 100644 index 4a2e99d49a54..000000000000 --- a/sys-process/audit/files/digest-audit-1.2.1 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 537d4ee68428e2ba2f01a8c07287fb6e audit-1.2.1.tar.gz 274432 -RMD160 14f70c58239f6ed2eba3d902630f4bd4112c4fba audit-1.2.1.tar.gz 274432 -SHA256 bba5d255d81ca36245464b83e977ba6bd05b1528cad07559fcc0367d39b2d26f audit-1.2.1.tar.gz 274432 diff --git a/sys-process/audit/files/digest-audit-1.2.3 b/sys-process/audit/files/digest-audit-1.2.3 deleted file mode 100644 index 3363ed812850..000000000000 --- a/sys-process/audit/files/digest-audit-1.2.3 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 a121e66bf44a65af3c4a04220a176d2e audit-1.2.3.tar.gz 276977 -RMD160 2fbc483dbff0ad5cd4022b4ccb5d3c082cccc0ef audit-1.2.3.tar.gz 276977 -SHA256 3bb70258c9e5ae2a0ebc43dc96542cd5494e169dc0d03d91bd9a7cd2a9f37b25 audit-1.2.3.tar.gz 276977 diff --git a/sys-process/audit/files/digest-audit-1.2.5 b/sys-process/audit/files/digest-audit-1.2.5 deleted file mode 100644 index c19a75b596a9..000000000000 --- a/sys-process/audit/files/digest-audit-1.2.5 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 d5d56d5e3189215dcd37a5eded761d12 audit-1.2.5.tar.gz 232383 -RMD160 8dd8bca46c918f0805756dfdfd898eb19b09f7e9 audit-1.2.5.tar.gz 232383 -SHA256 6b9fd472ca97c07e319338a73b3f0adbe5f53506a15adba2ac2ad3c7db7b0eef audit-1.2.5.tar.gz 232383 |