blob: 1a8e0c51c413818a3b1fd65bf27709a15a114870 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
|
# Copyright 1999-2007 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/app-crypt/pinentry/pinentry-0.7.2-r3.ebuild,v 1.16 2007/01/09 20:38:32 swegener Exp $
WANT_AUTOCONF="2.5"
WANT_AUTOMAKE="1.9"
inherit flag-o-matic qt3 multilib eutils autotools
DESCRIPTION="Collection of simple PIN or passphrase entry dialogs which utilize the Assuan protocol"
HOMEPAGE="http://www.gnupg.org/aegypten/"
SRC_URI="mirror://gnupg/${PN}/${P}.tar.gz"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha ~amd64 ~arm hppa ia64 mips ppc ppc64 ~s390 ~sh sparc ~x86 ~x86-fbsd"
IUSE="gtk ncurses qt3 caps"
DEPEND="gtk? ( =x11-libs/gtk+-2* )
ncurses? ( sys-libs/ncurses )
qt3? ( $(qt_min_version 3.3) )
!gtk? ( !qt3? ( !ncurses? ( sys-libs/ncurses ) ) )
caps? ( sys-libs/libcap )"
src_unpack() {
unpack ${A}
cd "${S}"
epatch "${FILESDIR}"/${PV}-libcap.patch
epatch "${FILESDIR}"/${PV}-info.patch
AT_M4DIR="m4" eautoreconf
}
src_compile() {
local myconf=""
if ! ( use qt3 || use gtk || use ncurses )
then
myconf="--enable-pinentry-curses --enable-fallback-curses"
fi
append-ldflags $(bindnow-flags)
# Issues finding qt on multilib systems
export QTLIB="${QTDIR}/$(get_libdir)"
econf \
--disable-dependency-tracking \
--enable-maintainer-mode \
--disable-pinentry-gtk \
$(use_enable gtk pinentry-gtk2) \
$(use_enable qt3 pinentry-qt) \
$(use_enable ncurses pinentry-curses) \
$(use_enable ncurses fallback-curses) \
$(use_with caps libcap) \
${myconf} \
|| die "econf failed"
emake || die "emake failed"
}
src_install() {
make DESTDIR="${D}" install || die "make install failed"
dodoc AUTHORS ChangeLog NEWS README THANKS TODO || die "dodoc failed"
}
pkg_postinst() {
einfo "We no longer install pinentry-curses and pinentry-qt SUID root by default."
einfo "Linux kernels >=2.6.9 support memory locking for unprivileged processes."
einfo "The soft resource limit for memory locking specifies the limit an"
einfo "unprivileged process may lock into memory. You can also use POSIX"
einfo "capabilities to allow pinentry to lock memory. To do so activate the caps"
einfo "USE flag and add the CAP_IPC_LOCK capability to the permitted set of"
einfo "your users."
}
|