diff options
author | Yi Zhao <yi.zhao@windriver.com> | 2021-08-04 14:49:44 +0800 |
---|---|---|
committer | Joe MacDonald <joe@deserted.net> | 2021-08-04 16:18:39 -0400 |
commit | 654201e25da6761f2b69f5ff1dd80ec61a79027f (patch) | |
tree | 7b10cd94c337572319c5cc265d6a2eb5020586b5 | |
parent | d5b93baf576c535bb27406dc10d81076bda3dee1 (diff) | |
download | meta-selinux-654201e25da6761f2b69f5ff1dd80ec61a79027f.tar.gz |
meta-selinux: convert to new override syntax
This is the result of automated script conversion:
poky/scripts/contrib/convert-overrides.py meta-selinux
Converting the metadata to use ":" as the override character instead of "_".
Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Joe MacDonald <joe@deserted.net>
50 files changed, 146 insertions, 146 deletions
@@ -38,7 +38,7 @@ layer should not change the system behavior. | |||
38 | In order to use the components in this layer you must add the 'selinux' to the | 38 | In order to use the components in this layer you must add the 'selinux' to the |
39 | DISTRO_FEATURES. In addition to selinux, you should be sure that acl, xattr and | 39 | DISTRO_FEATURES. In addition to selinux, you should be sure that acl, xattr and |
40 | pam are also present. | 40 | pam are also present. |
41 | e.g. DISTRO_FEATURES_append = " acl xattr pam selinux" | 41 | e.g. DISTRO_FEATURES:append = " acl xattr pam selinux" |
42 | 42 | ||
43 | You must also specify a preferred provider for the virtual/refpolicy. The | 43 | You must also specify a preferred provider for the virtual/refpolicy. The |
44 | included policies with this layer are simply reference policies and will need | 44 | included policies with this layer are simply reference policies and will need |
@@ -69,8 +69,8 @@ By default selinux enabled images coming up with "sysvinit" as init manager, | |||
69 | we can use "systemd" as an init manager using below changes to local.conf | 69 | we can use "systemd" as an init manager using below changes to local.conf |
70 | 70 | ||
71 | * enable systemd as init manager changes to local.conf | 71 | * enable systemd as init manager changes to local.conf |
72 | DISTRO_FEATURES_remove = " sysvinit" | 72 | DISTRO_FEATURES:remove = " sysvinit" |
73 | DISTRO_FEATURES_append = " systemd" | 73 | DISTRO_FEATURES:append = " systemd" |
74 | VIRTUAL-RUNTIME_init_manager = "systemd" | 74 | VIRTUAL-RUNTIME_init_manager = "systemd" |
75 | DISTRO_FEATURES_BACKFILL_CONSIDERED = "" | 75 | DISTRO_FEATURES_BACKFILL_CONSIDERED = "" |
76 | 76 | ||
diff --git a/SELinux-FAQ b/SELinux-FAQ index b6a0df9..8f56b2b 100644 --- a/SELinux-FAQ +++ b/SELinux-FAQ | |||
@@ -67,7 +67,7 @@ After init Poky build environment, please follow these steps: | |||
67 | 67 | ||
68 | 1. Add meta-selinux path to BUILDDIR/conf/bblayers.conf file. | 68 | 1. Add meta-selinux path to BUILDDIR/conf/bblayers.conf file. |
69 | 69 | ||
70 | 2. Set DISTRO="poky-selinux" or add DISTRO_FEATURES_append=" pam selinux" | 70 | 2. Set DISTRO="poky-selinux" or add DISTRO_FEATURES:append=" pam selinux" |
71 | in BUILDDIR/conf/local.conf file. | 71 | in BUILDDIR/conf/local.conf file. |
72 | 72 | ||
73 | 3. Build the default selinux image. | 73 | 3. Build the default selinux image. |
@@ -81,7 +81,7 @@ the following steps: | |||
81 | 81 | ||
82 | 1. Add meta-selinux path to BUILDDIR/conf/bblayers.conf file | 82 | 1. Add meta-selinux path to BUILDDIR/conf/bblayers.conf file |
83 | 83 | ||
84 | 2. Add DISTRO_FEATURES_append=" pam selinux" in BUILDDIR/conf/local.conf | 84 | 2. Add DISTRO_FEATURES:append=" pam selinux" in BUILDDIR/conf/local.conf |
85 | file. | 85 | file. |
86 | 86 | ||
87 | 3. Add packagegroup-core-selinux to your custom image. | 87 | 3. Add packagegroup-core-selinux to your custom image. |
diff --git a/classes/enable-audit.bbclass b/classes/enable-audit.bbclass index 4538b0b..17bcc8e 100644 --- a/classes/enable-audit.bbclass +++ b/classes/enable-audit.bbclass | |||
@@ -1,4 +1,4 @@ | |||
1 | # There is still no audit DISTRO_FEATURE, so enable audit when selinux feature enabled. | 1 | # There is still no audit DISTRO_FEATURE, so enable audit when selinux feature enabled. |
2 | inherit selinux | 2 | inherit selinux |
3 | 3 | ||
4 | PACKAGECONFIG_append = " ${@target_selinux(d, 'audit')}" | 4 | PACKAGECONFIG:append = " ${@target_selinux(d, 'audit')}" |
diff --git a/classes/enable-selinux.bbclass b/classes/enable-selinux.bbclass index de2a124..c8af97e 100644 --- a/classes/enable-selinux.bbclass +++ b/classes/enable-selinux.bbclass | |||
@@ -1,4 +1,4 @@ | |||
1 | inherit selinux | 1 | inherit selinux |
2 | 2 | ||
3 | PACKAGECONFIG_append = " ${@target_selinux(d)}" | 3 | PACKAGECONFIG:append = " ${@target_selinux(d)}" |
4 | PACKAGECONFIG[selinux] = "--enable-selinux,--disable-selinux,libselinux," | 4 | PACKAGECONFIG[selinux] = "--enable-selinux,--disable-selinux,libselinux," |
diff --git a/classes/meson-enable-selinux.bbclass b/classes/meson-enable-selinux.bbclass index 91c2a2b..b5b8cb7 100644 --- a/classes/meson-enable-selinux.bbclass +++ b/classes/meson-enable-selinux.bbclass | |||
@@ -1,4 +1,4 @@ | |||
1 | inherit selinux | 1 | inherit selinux |
2 | 2 | ||
3 | PACKAGECONFIG_append = " ${@target_selinux(d)}" | 3 | PACKAGECONFIG:append = " ${@target_selinux(d)}" |
4 | PACKAGECONFIG[selinux] = "-Dselinux=enabled,-Dselinux=disabled,libselinux," | 4 | PACKAGECONFIG[selinux] = "-Dselinux=enabled,-Dselinux=disabled,libselinux," |
diff --git a/classes/meson-selinux.bbclass b/classes/meson-selinux.bbclass index 77a763a..337ffca 100644 --- a/classes/meson-selinux.bbclass +++ b/classes/meson-selinux.bbclass | |||
@@ -1,4 +1,4 @@ | |||
1 | inherit selinux | 1 | inherit selinux |
2 | 2 | ||
3 | PACKAGECONFIG_append = " ${@target_selinux(d)}" | 3 | PACKAGECONFIG:append = " ${@target_selinux(d)}" |
4 | PACKAGECONFIG[selinux] = "-Dselinux=true,-Dselinux=false,libselinux," | 4 | PACKAGECONFIG[selinux] = "-Dselinux=true,-Dselinux=false,libselinux," |
diff --git a/classes/selinux-image.bbclass b/classes/selinux-image.bbclass index 7f157d3..23645b7 100644 --- a/classes/selinux-image.bbclass +++ b/classes/selinux-image.bbclass | |||
@@ -10,6 +10,6 @@ selinux_set_labels () { | |||
10 | 10 | ||
11 | DEPENDS += "policycoreutils-native" | 11 | DEPENDS += "policycoreutils-native" |
12 | 12 | ||
13 | IMAGE_PREPROCESS_COMMAND_append = " selinux_set_labels ;" | 13 | IMAGE_PREPROCESS_COMMAND:append = " selinux_set_labels ;" |
14 | 14 | ||
15 | inherit core-image | 15 | inherit core-image |
diff --git a/classes/with-audit.bbclass b/classes/with-audit.bbclass index 0c15312..a99bf71 100644 --- a/classes/with-audit.bbclass +++ b/classes/with-audit.bbclass | |||
@@ -1,5 +1,5 @@ | |||
1 | # There is still no audit DISTRO_FEATURE, so enable audit when selinux feature enabled. | 1 | # There is still no audit DISTRO_FEATURE, so enable audit when selinux feature enabled. |
2 | inherit selinux | 2 | inherit selinux |
3 | 3 | ||
4 | PACKAGECONFIG_append = " ${@target_selinux(d, 'audit')}" | 4 | PACKAGECONFIG:append = " ${@target_selinux(d, 'audit')}" |
5 | PACKAGECONFIG[audit] = "--with-audit,--without-audit,audit," | 5 | PACKAGECONFIG[audit] = "--with-audit,--without-audit,audit," |
diff --git a/classes/with-selinux.bbclass b/classes/with-selinux.bbclass index 7873d9b..37b9e13 100644 --- a/classes/with-selinux.bbclass +++ b/classes/with-selinux.bbclass | |||
@@ -1,4 +1,4 @@ | |||
1 | inherit selinux | 1 | inherit selinux |
2 | 2 | ||
3 | PACKAGECONFIG_append = " ${@target_selinux(d)}" | 3 | PACKAGECONFIG:append = " ${@target_selinux(d)}" |
4 | PACKAGECONFIG[selinux] = "--with-selinux,--without-selinux,libselinux," | 4 | PACKAGECONFIG[selinux] = "--with-selinux,--without-selinux,libselinux," |
diff --git a/dynamic-layers/networking-layer/recipes-daemons/iscsi-initiator-utils/iscsi-initiator-utils_selinux.inc b/dynamic-layers/networking-layer/recipes-daemons/iscsi-initiator-utils/iscsi-initiator-utils_selinux.inc index 81fe7b7..8802adb 100644 --- a/dynamic-layers/networking-layer/recipes-daemons/iscsi-initiator-utils/iscsi-initiator-utils_selinux.inc +++ b/dynamic-layers/networking-layer/recipes-daemons/iscsi-initiator-utils/iscsi-initiator-utils_selinux.inc | |||
@@ -1 +1 @@ | |||
FILESEXTRAPATHS_prepend := "${THISDIR}/files:" | FILESEXTRAPATHS:prepend := "${THISDIR}/files:" | ||
diff --git a/dynamic-layers/python2-layer/recipes-devtools/python/python_selinux.inc b/dynamic-layers/python2-layer/recipes-devtools/python/python_selinux.inc index bb54a90..4fed832 100644 --- a/dynamic-layers/python2-layer/recipes-devtools/python/python_selinux.inc +++ b/dynamic-layers/python2-layer/recipes-devtools/python/python_selinux.inc | |||
@@ -1,5 +1,5 @@ | |||
1 | # If selinux enabled, disable handlers to rw command history file | 1 | # If selinux enabled, disable handlers to rw command history file |
2 | FILESEXTRAPATHS_prepend := "${THISDIR}/files:" | 2 | FILESEXTRAPATHS:prepend := "${THISDIR}/files:" |
3 | 3 | ||
4 | inherit selinux | 4 | inherit selinux |
5 | 5 | ||
diff --git a/recipes-connectivity/bind/bind_selinux.inc b/recipes-connectivity/bind/bind_selinux.inc index 1be9260..aa11005 100644 --- a/recipes-connectivity/bind/bind_selinux.inc +++ b/recipes-connectivity/bind/bind_selinux.inc | |||
@@ -1,8 +1,8 @@ | |||
1 | FILESEXTRAPATHS_prepend := "${THISDIR}/files:" | 1 | FILESEXTRAPATHS:prepend := "${THISDIR}/files:" |
2 | 2 | ||
3 | SRC_URI += "file://volatiles.04_bind" | 3 | SRC_URI += "file://volatiles.04_bind" |
4 | 4 | ||
5 | do_install_append() { | 5 | do_install:append() { |
6 | install -d ${D}${sysconfdir}/default/volatiles | 6 | install -d ${D}${sysconfdir}/default/volatiles |
7 | install -m 0644 ${WORKDIR}/volatiles.04_bind ${D}${sysconfdir}/default/volatiles/04_bind | 7 | install -m 0644 ${WORKDIR}/volatiles.04_bind ${D}${sysconfdir}/default/volatiles/04_bind |
8 | 8 | ||
diff --git a/recipes-connectivity/openssh/openssh_selinux.inc b/recipes-connectivity/openssh/openssh_selinux.inc index ebd2721..20937c2 100644 --- a/recipes-connectivity/openssh/openssh_selinux.inc +++ b/recipes-connectivity/openssh/openssh_selinux.inc | |||
@@ -1,9 +1,9 @@ | |||
1 | inherit with-selinux | 1 | inherit with-selinux |
2 | 2 | ||
3 | FILESEXTRAPATHS_prepend := "${THISDIR}/files:" | 3 | FILESEXTRAPATHS:prepend := "${THISDIR}/files:" |
4 | 4 | ||
5 | # There is no distro feature just for audit. | 5 | # There is no distro feature just for audit. |
6 | PACKAGECONFIG_append = " audit" | 6 | PACKAGECONFIG:append = " audit" |
7 | 7 | ||
8 | PACKAGECONFIG[audit] = "--with-audit=linux,--without-audit,audit," | 8 | PACKAGECONFIG[audit] = "--with-audit=linux,--without-audit,audit," |
9 | 9 | ||
diff --git a/recipes-core/busybox/busybox_selinux.inc b/recipes-core/busybox/busybox_selinux.inc index 6e491ce..ded8007 100644 --- a/recipes-core/busybox/busybox_selinux.inc +++ b/recipes-core/busybox/busybox_selinux.inc | |||
@@ -1,6 +1,6 @@ | |||
1 | PTEST_BINDIR = "0" | 1 | PTEST_BINDIR = "0" |
2 | 2 | ||
3 | FILES_${PN} += "${libdir}/${PN}" | 3 | FILES:${PN} += "${libdir}/${PN}" |
4 | 4 | ||
5 | # We should use sh wrappers instead of links so the commands could get correct | 5 | # We should use sh wrappers instead of links so the commands could get correct |
6 | # security labels | 6 | # security labels |
@@ -39,7 +39,7 @@ python create_sh_wrapper_reset_alternative_vars () { | |||
39 | # Match coreutils | 39 | # Match coreutils |
40 | if alt_name == '[': | 40 | if alt_name == '[': |
41 | alt_name = 'lbracket' | 41 | alt_name = 'lbracket' |
42 | d.appendVar('ALTERNATIVE_%s' % (pn), ' ' + alt_name) | 42 | d.appendVar('ALTERNATIVE:%s' % (pn), ' ' + alt_name) |
43 | d.setVarFlag('ALTERNATIVE_LINK_NAME', alt_name, alt_link_name) | 43 | d.setVarFlag('ALTERNATIVE_LINK_NAME', alt_name, alt_link_name) |
44 | if os.path.exists(alt_wppath_dest): | 44 | if os.path.exists(alt_wppath_dest): |
45 | d.setVarFlag('ALTERNATIVE_TARGET', alt_name, alt_wppath) | 45 | d.setVarFlag('ALTERNATIVE_TARGET', alt_name, alt_wppath) |
@@ -56,11 +56,11 @@ python create_sh_wrapper_reset_alternative_vars () { | |||
56 | } | 56 | } |
57 | 57 | ||
58 | # Add to PACKAGEBUILDPKGD so it could override the alternatives, which are set in | 58 | # Add to PACKAGEBUILDPKGD so it could override the alternatives, which are set in |
59 | # do_package_prepend() section of busybox_*.bb. | 59 | # do_package:prepend() section of busybox_*.bb. |
60 | PACKAGEBUILDPKGD_prepend = "create_sh_wrapper_reset_alternative_vars " | 60 | PACKAGEBUILDPKGD:prepend = "create_sh_wrapper_reset_alternative_vars " |
61 | 61 | ||
62 | # Use sh wrappers instead of links | 62 | # Use sh wrappers instead of links |
63 | pkg_postinst_${PN} () { | 63 | pkg_postinst:${PN} () { |
64 | # This part of code is dedicated to the on target upgrade problem. | 64 | # This part of code is dedicated to the on target upgrade problem. |
65 | # It's known that if we don't make appropriate symlinks before update-alternatives calls, | 65 | # It's known that if we don't make appropriate symlinks before update-alternatives calls, |
66 | # there will be errors indicating missing commands such as 'sed'. | 66 | # there will be errors indicating missing commands such as 'sed'. |
diff --git a/recipes-core/eudev/eudev_selinux.inc b/recipes-core/eudev/eudev_selinux.inc index 2ad6b13..94950f5 100644 --- a/recipes-core/eudev/eudev_selinux.inc +++ b/recipes-core/eudev/eudev_selinux.inc | |||
@@ -1,3 +1,3 @@ | |||
1 | FILESEXTRAPATHS_prepend := "${THISDIR}/files:" | 1 | FILESEXTRAPATHS:prepend := "${THISDIR}/files:" |
2 | 2 | ||
3 | inherit enable-selinux | 3 | inherit enable-selinux |
diff --git a/recipes-core/initscripts/initscripts-1.0_selinux.inc b/recipes-core/initscripts/initscripts-1.0_selinux.inc index bf798e7..6530a87 100644 --- a/recipes-core/initscripts/initscripts-1.0_selinux.inc +++ b/recipes-core/initscripts/initscripts-1.0_selinux.inc | |||
@@ -1,6 +1,6 @@ | |||
1 | FILESEXTRAPATHS_prepend := "${THISDIR}/files:" | 1 | FILESEXTRAPATHS:prepend := "${THISDIR}/files:" |
2 | 2 | ||
3 | do_install_append () { | 3 | do_install:append () { |
4 | cat <<-EOF >> ${D}${sysconfdir}/init.d/populate-volatile.sh | 4 | cat <<-EOF >> ${D}${sysconfdir}/init.d/populate-volatile.sh |
5 | touch /var/log/lastlog | 5 | touch /var/log/lastlog |
6 | test ! -x /sbin/restorecon || /sbin/restorecon -iRF /var/volatile/ /var/lib /run \ | 6 | test ! -x /sbin/restorecon || /sbin/restorecon -iRF /var/volatile/ /var/lib /run \ |
diff --git a/recipes-core/libcgroup/libcgroup_selinux.inc b/recipes-core/libcgroup/libcgroup_selinux.inc index 9d9ebfc..7efdfd5 100644 --- a/recipes-core/libcgroup/libcgroup_selinux.inc +++ b/recipes-core/libcgroup/libcgroup_selinux.inc | |||
@@ -1,6 +1,6 @@ | |||
1 | EXTRA_OECONF_append_class-native = " --enable-pam=no" | 1 | EXTRA_OECONF:append:class-native = " --enable-pam=no" |
2 | 2 | ||
3 | do_install_append() { | 3 | do_install:append() { |
4 | test ! -f ${D}${base_libdir}/security/pam_cgroup.so.0.0.0 || { | 4 | test ! -f ${D}${base_libdir}/security/pam_cgroup.so.0.0.0 || { |
5 | mv -f ${D}${base_libdir}/security/pam_cgroup.so.0.0.0 ${D}${base_libdir}/security/pam_cgroup.so | 5 | mv -f ${D}${base_libdir}/security/pam_cgroup.so.0.0.0 ${D}${base_libdir}/security/pam_cgroup.so |
6 | rm -f ${D}${base_libdir}/security/pam_cgroup.so.* | 6 | rm -f ${D}${base_libdir}/security/pam_cgroup.so.* |
diff --git a/recipes-core/systemd/systemd_selinux.inc b/recipes-core/systemd/systemd_selinux.inc index b17e70a..8136ea8 100644 --- a/recipes-core/systemd/systemd_selinux.inc +++ b/recipes-core/systemd/systemd_selinux.inc | |||
@@ -1,6 +1,6 @@ | |||
1 | inherit ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'enable-audit', '', d)} | 1 | inherit ${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'enable-audit', '', d)} |
2 | 2 | ||
3 | do_install_append() { | 3 | do_install:append() { |
4 | if ${@bb.utils.contains('PACKAGECONFIG', 'backlight', 'true', 'false', d)}; then | 4 | if ${@bb.utils.contains('PACKAGECONFIG', 'backlight', 'true', 'false', d)}; then |
5 | install -d ${D}${localstatedir}/lib/systemd/backlight | 5 | install -d ${D}${localstatedir}/lib/systemd/backlight |
6 | fi | 6 | fi |
diff --git a/recipes-core/sysvinit/sysvinit_selinux.inc b/recipes-core/sysvinit/sysvinit_selinux.inc index 2e54330..480bde7 100644 --- a/recipes-core/sysvinit/sysvinit_selinux.inc +++ b/recipes-core/sysvinit/sysvinit_selinux.inc | |||
@@ -1,4 +1,4 @@ | |||
1 | FILESEXTRAPATHS_prepend := "${THISDIR}/files:" | 1 | FILESEXTRAPATHS:prepend := "${THISDIR}/files:" |
2 | 2 | ||
3 | B = "${S}" | 3 | B = "${S}" |
4 | 4 | ||
diff --git a/recipes-extended/lsof/lsof_selinux.inc b/recipes-extended/lsof/lsof_selinux.inc index 6691b4c..9021f38 100644 --- a/recipes-extended/lsof/lsof_selinux.inc +++ b/recipes-extended/lsof/lsof_selinux.inc | |||
@@ -2,7 +2,7 @@ inherit selinux | |||
2 | 2 | ||
3 | DEPENDS += "${LIBSELINUX}" | 3 | DEPENDS += "${LIBSELINUX}" |
4 | 4 | ||
5 | do_configure_prepend () { | 5 | do_configure:prepend () { |
6 | export LINUX_HASSELINUX="${@target_selinux(d, 'Y', 'N')}" | 6 | export LINUX_HASSELINUX="${@target_selinux(d, 'Y', 'N')}" |
7 | export LSOF_CFGF="${CFLAGS}" | 7 | export LSOF_CFGF="${CFLAGS}" |
8 | export LSOF_CFGL="${LDFLAGS}" | 8 | export LSOF_CFGL="${LDFLAGS}" |
diff --git a/recipes-extended/pam/libpam_selinux.inc b/recipes-extended/pam/libpam_selinux.inc index adcf938..bee1f3e 100644 --- a/recipes-extended/pam/libpam_selinux.inc +++ b/recipes-extended/pam/libpam_selinux.inc | |||
@@ -1,3 +1,3 @@ | |||
1 | inherit enable-selinux | 1 | inherit enable-selinux |
2 | 2 | ||
3 | RDEPENDS_${PN}-runtime += "${@target_selinux(d, 'pam-plugin-selinux')}" | 3 | RDEPENDS:${PN}-runtime += "${@target_selinux(d, 'pam-plugin-selinux')}" |
diff --git a/recipes-extended/shadow/shadow_selinux.inc b/recipes-extended/shadow/shadow_selinux.inc index 496ea6a..3c8daea 100644 --- a/recipes-extended/shadow/shadow_selinux.inc +++ b/recipes-extended/shadow/shadow_selinux.inc | |||
@@ -1,4 +1,4 @@ | |||
1 | FILESEXTRAPATHS_prepend := "${THISDIR}/files:" | 1 | FILESEXTRAPATHS:prepend := "${THISDIR}/files:" |
2 | 2 | ||
3 | inherit with-selinux with-audit | 3 | inherit with-selinux with-audit |
4 | 4 | ||
diff --git a/recipes-extended/sysklogd/sysklogd_selinux.inc b/recipes-extended/sysklogd/sysklogd_selinux.inc index 81fe7b7..8802adb 100644 --- a/recipes-extended/sysklogd/sysklogd_selinux.inc +++ b/recipes-extended/sysklogd/sysklogd_selinux.inc | |||
@@ -1 +1 @@ | |||
FILESEXTRAPATHS_prepend := "${THISDIR}/files:" | FILESEXTRAPATHS:prepend := "${THISDIR}/files:" | ||
diff --git a/recipes-extended/tar/tar_selinux.inc b/recipes-extended/tar/tar_selinux.inc index 341df8b..b1fa7bf 100644 --- a/recipes-extended/tar/tar_selinux.inc +++ b/recipes-extended/tar/tar_selinux.inc | |||
@@ -1,3 +1,3 @@ | |||
1 | inherit with-selinux | 1 | inherit with-selinux |
2 | 2 | ||
3 | PACKAGECONFIG_append = "${@bb.utils.contains('DISTRO_FEATURES', 'acl', ' acl', '', d)}" | 3 | PACKAGECONFIG:append = "${@bb.utils.contains('DISTRO_FEATURES', 'acl', ' acl', '', d)}" |
diff --git a/recipes-graphics/xcb/libxcb_selinux.inc b/recipes-graphics/xcb/libxcb_selinux.inc index 29bdadb..6924315 100644 --- a/recipes-graphics/xcb/libxcb_selinux.inc +++ b/recipes-graphics/xcb/libxcb_selinux.inc | |||
@@ -3,4 +3,4 @@ inherit enable-selinux | |||
3 | PACKAGECONFIG[selinux] = "--enable-selinux,--disable-selinux,," | 3 | PACKAGECONFIG[selinux] = "--enable-selinux,--disable-selinux,," |
4 | 4 | ||
5 | PACKAGES += "${PN}-xselinux" | 5 | PACKAGES += "${PN}-xselinux" |
6 | FILES_${PN}-xselinux += "${libdir}/libxcb-xselinux.so.*" | 6 | FILES:${PN}-xselinux += "${libdir}/libxcb-xselinux.so.*" |
diff --git a/recipes-kernel/linux/linux-yocto_selinux.inc b/recipes-kernel/linux/linux-yocto_selinux.inc index 3312e06..ba078f7 100644 --- a/recipes-kernel/linux/linux-yocto_selinux.inc +++ b/recipes-kernel/linux/linux-yocto_selinux.inc | |||
@@ -1,4 +1,4 @@ | |||
1 | FILESEXTRAPATHS_prepend := "${THISDIR}/files:" | 1 | FILESEXTRAPATHS:prepend := "${THISDIR}/files:" |
2 | 2 | ||
3 | # Enable selinux support in the kernel if the feature is enabled | 3 | # Enable selinux support in the kernel if the feature is enabled |
4 | SRC_URI += "${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'file://selinux.cfg', '', d)}" | 4 | SRC_URI += "${@bb.utils.contains('DISTRO_FEATURES', 'selinux', 'file://selinux.cfg', '', d)}" |
diff --git a/recipes-security/packagegroups/packagegroup-core-selinux.bb b/recipes-security/packagegroups/packagegroup-core-selinux.bb index 568aaac..148c8a2 100644 --- a/recipes-security/packagegroups/packagegroup-core-selinux.bb +++ b/recipes-security/packagegroups/packagegroup-core-selinux.bb | |||
@@ -6,9 +6,9 @@ PACKAGES = "\ | |||
6 | ${PN} \ | 6 | ${PN} \ |
7 | " | 7 | " |
8 | 8 | ||
9 | ALLOW_EMPTY_${PN} = "1" | 9 | ALLOW_EMPTY:${PN} = "1" |
10 | 10 | ||
11 | RDEPENDS_${PN} = " \ | 11 | RDEPENDS:${PN} = " \ |
12 | libsepol \ | 12 | libsepol \ |
13 | libsepol-bin \ | 13 | libsepol-bin \ |
14 | libselinux \ | 14 | libselinux \ |
diff --git a/recipes-security/packagegroups/packagegroup-selinux-minimal.bb b/recipes-security/packagegroups/packagegroup-selinux-minimal.bb index e198e84..0f9abae 100644 --- a/recipes-security/packagegroups/packagegroup-selinux-minimal.bb +++ b/recipes-security/packagegroups/packagegroup-selinux-minimal.bb | |||
@@ -6,9 +6,9 @@ PACKAGES = "\ | |||
6 | ${PN} \ | 6 | ${PN} \ |
7 | " | 7 | " |
8 | 8 | ||
9 | ALLOW_EMPTY_${PN} = "1" | 9 | ALLOW_EMPTY:${PN} = "1" |
10 | 10 | ||
11 | RDEPENDS_${PN} = "\ | 11 | RDEPENDS:${PN} = "\ |
12 | coreutils \ | 12 | coreutils \ |
13 | libsepol \ | 13 | libsepol \ |
14 | libselinux \ | 14 | libselinux \ |
diff --git a/recipes-security/packagegroups/packagegroup-selinux-policycoreutils.bb b/recipes-security/packagegroups/packagegroup-selinux-policycoreutils.bb index 2263592..7fd5d1c 100644 --- a/recipes-security/packagegroups/packagegroup-selinux-policycoreutils.bb +++ b/recipes-security/packagegroups/packagegroup-selinux-policycoreutils.bb | |||
@@ -6,9 +6,9 @@ PACKAGES = "\ | |||
6 | ${PN} \ | 6 | ${PN} \ |
7 | " | 7 | " |
8 | 8 | ||
9 | ALLOW_EMPTY_${PN} = "1" | 9 | ALLOW_EMPTY:${PN} = "1" |
10 | 10 | ||
11 | RDEPENDS_${PN} = "\ | 11 | RDEPENDS:${PN} = "\ |
12 | policycoreutils-fixfiles \ | 12 | policycoreutils-fixfiles \ |
13 | policycoreutils-genhomedircon \ | 13 | policycoreutils-genhomedircon \ |
14 | policycoreutils-loadpolicy \ | 14 | policycoreutils-loadpolicy \ |
diff --git a/recipes-security/refpolicy/refpolicy_common.inc b/recipes-security/refpolicy/refpolicy_common.inc index 1bacaa9..3d2eb89 100644 --- a/recipes-security/refpolicy/refpolicy_common.inc +++ b/recipes-security/refpolicy/refpolicy_common.inc | |||
@@ -6,7 +6,7 @@ LICENSE = "GPLv2" | |||
6 | LIC_FILES_CHKSUM = "file://${S}/COPYING;md5=393a5ca445f6965873eca0259a17f833" | 6 | LIC_FILES_CHKSUM = "file://${S}/COPYING;md5=393a5ca445f6965873eca0259a17f833" |
7 | 7 | ||
8 | PROVIDES = "virtual/refpolicy" | 8 | PROVIDES = "virtual/refpolicy" |
9 | RPROVIDES_${PN} = "refpolicy" | 9 | RPROVIDES:${PN} = "refpolicy" |
10 | 10 | ||
11 | # Specific config files for Poky | 11 | # Specific config files for Poky |
12 | SRC_URI += "file://customizable_types \ | 12 | SRC_URI += "file://customizable_types \ |
@@ -113,13 +113,13 @@ SRC_URI += " \ | |||
113 | 113 | ||
114 | S = "${WORKDIR}/refpolicy" | 114 | S = "${WORKDIR}/refpolicy" |
115 | 115 | ||
116 | CONFFILES_${PN} += "${sysconfdir}/selinux/config" | 116 | CONFFILES:${PN} += "${sysconfdir}/selinux/config" |
117 | FILES_${PN} += " \ | 117 | FILES:${PN} += " \ |
118 | ${sysconfdir}/selinux/${POLICY_NAME}/ \ | 118 | ${sysconfdir}/selinux/${POLICY_NAME}/ \ |
119 | ${datadir}/selinux/${POLICY_NAME}/*.pp \ | 119 | ${datadir}/selinux/${POLICY_NAME}/*.pp \ |
120 | ${localstatedir}/lib/selinux/${POLICY_NAME}/ \ | 120 | ${localstatedir}/lib/selinux/${POLICY_NAME}/ \ |
121 | " | 121 | " |
122 | FILES_${PN}-dev =+ " \ | 122 | FILES:${PN}-dev =+ " \ |
123 | ${datadir}/selinux/${POLICY_NAME}/include/ \ | 123 | ${datadir}/selinux/${POLICY_NAME}/include/ \ |
124 | ${sysconfdir}/selinux/sepolgen.conf \ | 124 | ${sysconfdir}/selinux/sepolgen.conf \ |
125 | " | 125 | " |
@@ -128,7 +128,7 @@ EXTRANATIVEPATH += "bzip2-native" | |||
128 | 128 | ||
129 | DEPENDS += "bzip2-replacement-native checkpolicy-native policycoreutils-native semodule-utils-native m4-native" | 129 | DEPENDS += "bzip2-replacement-native checkpolicy-native policycoreutils-native semodule-utils-native m4-native" |
130 | 130 | ||
131 | RDEPENDS_${PN}-dev =+ " \ | 131 | RDEPENDS:${PN}-dev =+ " \ |
132 | python3-core \ | 132 | python3-core \ |
133 | " | 133 | " |
134 | 134 | ||
@@ -289,11 +289,11 @@ do_install () { | |||
289 | install_config | 289 | install_config |
290 | } | 290 | } |
291 | 291 | ||
292 | do_install_append(){ | 292 | do_install:append(){ |
293 | # While building policies on target, Makefile will be searched from SELINUX_DEVEL_PATH | 293 | # While building policies on target, Makefile will be searched from SELINUX_DEVEL_PATH |
294 | echo "SELINUX_DEVEL_PATH=${datadir}/selinux/${POLICY_NAME}/include" > ${D}${sysconfdir}/selinux/sepolgen.conf | 294 | echo "SELINUX_DEVEL_PATH=${datadir}/selinux/${POLICY_NAME}/include" > ${D}${sysconfdir}/selinux/sepolgen.conf |
295 | } | 295 | } |
296 | 296 | ||
297 | sysroot_stage_all_append () { | 297 | sysroot_stage_all:append () { |
298 | sysroot_stage_dir ${D}${sysconfdir} ${SYSROOT_DESTDIR}${sysconfdir} | 298 | sysroot_stage_dir ${D}${sysconfdir} ${SYSROOT_DESTDIR}${sysconfdir} |
299 | } | 299 | } |
diff --git a/recipes-security/refpolicy/refpolicy_git.inc b/recipes-security/refpolicy/refpolicy_git.inc index f131646..ccf1bde 100644 --- a/recipes-security/refpolicy/refpolicy_git.inc +++ b/recipes-security/refpolicy/refpolicy_git.inc | |||
@@ -6,6 +6,6 @@ SRCREV_refpolicy ?= "1167739da1882f9c89281095d2595da5ea2d9d6b" | |||
6 | 6 | ||
7 | UPSTREAM_CHECK_GITTAGREGEX = "RELEASE_(?P<pver>\d+_\d+)" | 7 | UPSTREAM_CHECK_GITTAGREGEX = "RELEASE_(?P<pver>\d+_\d+)" |
8 | 8 | ||
9 | FILESEXTRAPATHS_prepend := "${THISDIR}/refpolicy:" | 9 | FILESEXTRAPATHS:prepend := "${THISDIR}/refpolicy:" |
10 | 10 | ||
11 | include refpolicy_common.inc | 11 | include refpolicy_common.inc |
diff --git a/recipes-security/selinux/checkpolicy_3.2.bb b/recipes-security/selinux/checkpolicy_3.2.bb index 552dc26..99ac470 100644 --- a/recipes-security/selinux/checkpolicy_3.2.bb +++ b/recipes-security/selinux/checkpolicy_3.2.bb | |||
@@ -18,7 +18,7 @@ EXTRA_OEMAKE += "LIBSEPOLA=${STAGING_LIBDIR}/libsepol.a" | |||
18 | 18 | ||
19 | S = "${WORKDIR}/git/checkpolicy" | 19 | S = "${WORKDIR}/git/checkpolicy" |
20 | 20 | ||
21 | do_install_append() { | 21 | do_install:append() { |
22 | install test/dismod ${D}/${bindir}/sedismod | 22 | install test/dismod ${D}/${bindir}/sedismod |
23 | install test/dispol ${D}/${bindir}/sedispol | 23 | install test/dispol ${D}/${bindir}/sedispol |
24 | } | 24 | } |
diff --git a/recipes-security/selinux/libselinux-python_3.2.bb b/recipes-security/selinux/libselinux-python_3.2.bb index b741449..f589ebd 100644 --- a/recipes-security/selinux/libselinux-python_3.2.bb +++ b/recipes-security/selinux/libselinux-python_3.2.bb | |||
@@ -10,7 +10,7 @@ require selinux_common.inc | |||
10 | 10 | ||
11 | inherit python3native python3targetconfig | 11 | inherit python3native python3targetconfig |
12 | 12 | ||
13 | FILESEXTRAPATHS_prepend := "${THISDIR}/libselinux:" | 13 | FILESEXTRAPATHS:prepend := "${THISDIR}/libselinux:" |
14 | SRC_URI += "\ | 14 | SRC_URI += "\ |
15 | file://0001-Makefile-fix-python-modules-install-path-for-multili.patch \ | 15 | file://0001-Makefile-fix-python-modules-install-path-for-multili.patch \ |
16 | file://0001-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch \ | 16 | file://0001-Do-not-use-PYCEXT-and-rely-on-the-installed-file-nam.patch \ |
@@ -19,7 +19,7 @@ SRC_URI += "\ | |||
19 | S = "${WORKDIR}/git/libselinux" | 19 | S = "${WORKDIR}/git/libselinux" |
20 | 20 | ||
21 | DEPENDS += "python3 swig-native libpcre libsepol" | 21 | DEPENDS += "python3 swig-native libpcre libsepol" |
22 | RDEPENDS_${PN} += "libselinux python3-core python3-shell" | 22 | RDEPENDS:${PN} += "libselinux python3-core python3-shell" |
23 | 23 | ||
24 | def get_policyconfigarch(d): | 24 | def get_policyconfigarch(d): |
25 | import re | 25 | import re |
@@ -30,10 +30,10 @@ def get_policyconfigarch(d): | |||
30 | 30 | ||
31 | EXTRA_OEMAKE += "${@get_policyconfigarch(d)}" | 31 | EXTRA_OEMAKE += "${@get_policyconfigarch(d)}" |
32 | EXTRA_OEMAKE += "LDFLAGS='${LDFLAGS} -lpcre' LIBSEPOLA='${STAGING_LIBDIR}/libsepol.a'" | 32 | EXTRA_OEMAKE += "LDFLAGS='${LDFLAGS} -lpcre' LIBSEPOLA='${STAGING_LIBDIR}/libsepol.a'" |
33 | EXTRA_OEMAKE_append_libc-musl = " FTS_LDLIBS=-lfts" | 33 | EXTRA_OEMAKE:append:libc-musl = " FTS_LDLIBS=-lfts" |
34 | 34 | ||
35 | FILES_${PN} = "${libdir}/python${PYTHON_BASEVERSION}/site-packages/*" | 35 | FILES:${PN} = "${libdir}/python${PYTHON_BASEVERSION}/site-packages/*" |
36 | INSANE_SKIP_${PN} = "dev-so" | 36 | INSANE_SKIP:${PN} = "dev-so" |
37 | 37 | ||
38 | do_compile() { | 38 | do_compile() { |
39 | oe_runmake pywrap -j1 \ | 39 | oe_runmake pywrap -j1 \ |
diff --git a/recipes-security/selinux/libselinux_3.2.bb b/recipes-security/selinux/libselinux_3.2.bb index 5acd576..55efbae 100644 --- a/recipes-security/selinux/libselinux_3.2.bb +++ b/recipes-security/selinux/libselinux_3.2.bb | |||
@@ -11,7 +11,7 @@ require selinux_common.inc | |||
11 | inherit lib_package python3native | 11 | inherit lib_package python3native |
12 | 12 | ||
13 | DEPENDS += "libsepol libpcre" | 13 | DEPENDS += "libsepol libpcre" |
14 | DEPENDS_append_libc-musl = " fts" | 14 | DEPENDS:append:libc-musl = " fts" |
15 | 15 | ||
16 | S = "${WORKDIR}/git/libselinux" | 16 | S = "${WORKDIR}/git/libselinux" |
17 | 17 | ||
@@ -24,6 +24,6 @@ def get_policyconfigarch(d): | |||
24 | 24 | ||
25 | EXTRA_OEMAKE += "${@get_policyconfigarch(d)}" | 25 | EXTRA_OEMAKE += "${@get_policyconfigarch(d)}" |
26 | EXTRA_OEMAKE += "LDFLAGS='${LDFLAGS} -lpcre' LIBSEPOLA='${STAGING_LIBDIR}/libsepol.a'" | 26 | EXTRA_OEMAKE += "LDFLAGS='${LDFLAGS} -lpcre' LIBSEPOLA='${STAGING_LIBDIR}/libsepol.a'" |
27 | EXTRA_OEMAKE_append_libc-musl = " FTS_LDLIBS=-lfts" | 27 | EXTRA_OEMAKE:append:libc-musl = " FTS_LDLIBS=-lfts" |
28 | 28 | ||
29 | BBCLASSEXTEND = "native" | 29 | BBCLASSEXTEND = "native" |
diff --git a/recipes-security/selinux/libsemanage_3.2.bb b/recipes-security/selinux/libsemanage_3.2.bb index 58b6da4..0a6ff95 100644 --- a/recipes-security/selinux/libsemanage_3.2.bb +++ b/recipes-security/selinux/libsemanage_3.2.bb | |||
@@ -17,30 +17,30 @@ SRC_URI += "file://libsemanage-Fix-execve-segfaults-on-Ubuntu.patch \ | |||
17 | " | 17 | " |
18 | 18 | ||
19 | DEPENDS += "libsepol libselinux bzip2 python3 bison-native flex-native swig-native" | 19 | DEPENDS += "libsepol libselinux bzip2 python3 bison-native flex-native swig-native" |
20 | DEPENDS_append_class-target = " audit" | 20 | DEPENDS:append:class-target = " audit" |
21 | 21 | ||
22 | S = "${WORKDIR}/git/libsemanage" | 22 | S = "${WORKDIR}/git/libsemanage" |
23 | 23 | ||
24 | PACKAGES =+ "${PN}-python" | 24 | PACKAGES =+ "${PN}-python" |
25 | 25 | ||
26 | # For /usr/libexec/selinux/semanage_migrate_store | 26 | # For /usr/libexec/selinux/semanage_migrate_store |
27 | RDEPENDS_${PN}-python += "python3-core" | 27 | RDEPENDS:${PN}-python += "python3-core" |
28 | 28 | ||
29 | FILES_${PN}-python = "${libdir}/python${PYTHON_BASEVERSION}/site-packages/* \ | 29 | FILES:${PN}-python = "${libdir}/python${PYTHON_BASEVERSION}/site-packages/* \ |
30 | ${libexecdir}/selinux/semanage_migrate_store" | 30 | ${libexecdir}/selinux/semanage_migrate_store" |
31 | FILES_${PN}-dbg += "${libdir}/python${PYTHON_BASEVERSION}/site-packages/.debug/*" | 31 | FILES:${PN}-dbg += "${libdir}/python${PYTHON_BASEVERSION}/site-packages/.debug/*" |
32 | FILES_${PN} += "${libexecdir}" | 32 | FILES:${PN} += "${libexecdir}" |
33 | 33 | ||
34 | EXTRA_OEMAKE_class-native += "DISABLE_AUDIT=y" | 34 | EXTRA_OEMAKE:class-native += "DISABLE_AUDIT=y" |
35 | 35 | ||
36 | do_compile_append() { | 36 | do_compile:append() { |
37 | oe_runmake pywrap \ | 37 | oe_runmake pywrap \ |
38 | PYLIBVER='python${PYTHON_BASEVERSION}${PYTHON_ABI}' \ | 38 | PYLIBVER='python${PYTHON_BASEVERSION}${PYTHON_ABI}' \ |
39 | PYINC='-I${STAGING_INCDIR}/${PYLIBVER}' \ | 39 | PYINC='-I${STAGING_INCDIR}/${PYLIBVER}' \ |
40 | PYLIBS='-L${STAGING_LIBDIR}/${PYLIBVER} -l${PYLIBVER}' | 40 | PYLIBS='-L${STAGING_LIBDIR}/${PYLIBVER} -l${PYLIBVER}' |
41 | } | 41 | } |
42 | 42 | ||
43 | do_install_append() { | 43 | do_install:append() { |
44 | oe_runmake install-pywrap \ | 44 | oe_runmake install-pywrap \ |
45 | PYCEXT='.so' \ | 45 | PYCEXT='.so' \ |
46 | PYLIBVER='python${PYTHON_BASEVERSION}${PYTHON_ABI}' \ | 46 | PYLIBVER='python${PYTHON_BASEVERSION}${PYTHON_ABI}' \ |
diff --git a/recipes-security/selinux/mcstrans_3.2.bb b/recipes-security/selinux/mcstrans_3.2.bb index 0cece17..4d99e18 100644 --- a/recipes-security/selinux/mcstrans_3.2.bb +++ b/recipes-security/selinux/mcstrans_3.2.bb | |||
@@ -24,7 +24,7 @@ EXTRA_OEMAKE += "SBINDIR=${base_sbindir} \ | |||
24 | 24 | ||
25 | S = "${WORKDIR}/git/mcstrans" | 25 | S = "${WORKDIR}/git/mcstrans" |
26 | 26 | ||
27 | do_install_append() { | 27 | do_install:append() { |
28 | install -d ${D}${sbindir} | 28 | install -d ${D}${sbindir} |
29 | install -m 755 utils/untranscon ${D}${sbindir}/ | 29 | install -m 755 utils/untranscon ${D}${sbindir}/ |
30 | install -m 755 utils/transcon ${D}${sbindir}/ | 30 | install -m 755 utils/transcon ${D}${sbindir}/ |
@@ -42,12 +42,12 @@ do_install_append() { | |||
42 | cp -r share/* ${D}${datadir}/mcstrans/. | 42 | cp -r share/* ${D}${datadir}/mcstrans/. |
43 | } | 43 | } |
44 | 44 | ||
45 | SYSTEMD_SERVICE_mcstrans = "mcstrans.service" | 45 | SYSTEMD_SERVICE:mcstrans = "mcstrans.service" |
46 | INITSCRIPT_PACKAGES = "mcstrans" | 46 | INITSCRIPT_PACKAGES = "mcstrans" |
47 | INITSCRIPT_NAME_mcstrans = "mcstrans" | 47 | INITSCRIPT_NAME:mcstrans = "mcstrans" |
48 | INITSCRIPT_PARAMS_mcstrans = "defaults" | 48 | INITSCRIPT_PARAMS:mcstrans = "defaults" |
49 | 49 | ||
50 | pkg_postinst_mcstrans () { | 50 | pkg_postinst:mcstrans () { |
51 | if [ -z "$D" ]; then | 51 | if [ -z "$D" ]; then |
52 | if command -v systemd-tmpfiles >/dev/null; then | 52 | if command -v systemd-tmpfiles >/dev/null; then |
53 | systemd-tmpfiles --create ${sysconfdir}/tmpfiles.d/setrans.conf | 53 | systemd-tmpfiles --create ${sysconfdir}/tmpfiles.d/setrans.conf |
diff --git a/recipes-security/selinux/policycoreutils_3.2.bb b/recipes-security/selinux/policycoreutils_3.2.bb index 9fc1691..04f8ef7 100644 --- a/recipes-security/selinux/policycoreutils_3.2.bb +++ b/recipes-security/selinux/policycoreutils_3.2.bb | |||
@@ -26,40 +26,40 @@ S = "${WORKDIR}/git/policycoreutils" | |||
26 | 26 | ||
27 | inherit selinux python3native | 27 | inherit selinux python3native |
28 | 28 | ||
29 | RDEPENDS_${BPN}-fixfiles += "\ | 29 | RDEPENDS:${BPN}-fixfiles += "\ |
30 | ${BPN}-setfiles \ | 30 | ${BPN}-setfiles \ |
31 | grep \ | 31 | grep \ |
32 | findutils \ | 32 | findutils \ |
33 | " | 33 | " |
34 | RDEPENDS_${BPN}-genhomedircon += "\ | 34 | RDEPENDS:${BPN}-genhomedircon += "\ |
35 | ${BPN}-semodule \ | 35 | ${BPN}-semodule \ |
36 | " | 36 | " |
37 | RDEPENDS_${BPN}-loadpolicy += "\ | 37 | RDEPENDS:${BPN}-loadpolicy += "\ |
38 | libselinux \ | 38 | libselinux \ |
39 | libsepol \ | 39 | libsepol \ |
40 | " | 40 | " |
41 | RDEPENDS_${BPN}-newrole += "\ | 41 | RDEPENDS:${BPN}-newrole += "\ |
42 | libcap-ng \ | 42 | libcap-ng \ |
43 | libselinux \ | 43 | libselinux \ |
44 | " | 44 | " |
45 | RDEPENDS_${BPN}-runinit += "libselinux" | 45 | RDEPENDS:${BPN}-runinit += "libselinux" |
46 | RDEPENDS_${BPN}-secon += "libselinux" | 46 | RDEPENDS:${BPN}-secon += "libselinux" |
47 | RDEPENDS_${BPN}-semodule += "\ | 47 | RDEPENDS:${BPN}-semodule += "\ |
48 | libsepol \ | 48 | libsepol \ |
49 | libselinux \ | 49 | libselinux \ |
50 | libsemanage \ | 50 | libsemanage \ |
51 | " | 51 | " |
52 | RDEPENDS_${BPN}-sestatus += "libselinux" | 52 | RDEPENDS:${BPN}-sestatus += "libselinux" |
53 | RDEPENDS_${BPN}-setfiles += "\ | 53 | RDEPENDS:${BPN}-setfiles += "\ |
54 | libselinux \ | 54 | libselinux \ |
55 | libsepol \ | 55 | libsepol \ |
56 | " | 56 | " |
57 | RDEPENDS_${BPN}-setsebool += "\ | 57 | RDEPENDS:${BPN}-setsebool += "\ |
58 | libsepol \ | 58 | libsepol \ |
59 | libselinux \ | 59 | libselinux \ |
60 | libsemanage \ | 60 | libsemanage \ |
61 | " | 61 | " |
62 | RDEPENDS_${BPN} += "selinux-python" | 62 | RDEPENDS:${BPN} += "selinux-python" |
63 | 63 | ||
64 | PACKAGES =+ "\ | 64 | PACKAGES =+ "\ |
65 | ${PN}-fixfiles \ | 65 | ${PN}-fixfiles \ |
@@ -74,34 +74,34 @@ PACKAGES =+ "\ | |||
74 | ${PN}-setfiles \ | 74 | ${PN}-setfiles \ |
75 | ${PN}-setsebool \ | 75 | ${PN}-setsebool \ |
76 | " | 76 | " |
77 | FILES_${PN}-fixfiles += "${base_sbindir}/fixfiles" | 77 | FILES:${PN}-fixfiles += "${base_sbindir}/fixfiles" |
78 | FILES_${PN}-genhomedircon += "${base_sbindir}/genhomedircon" | 78 | FILES:${PN}-genhomedircon += "${base_sbindir}/genhomedircon" |
79 | FILES_${PN}-loadpolicy += "\ | 79 | FILES:${PN}-loadpolicy += "\ |
80 | ${base_sbindir}/load_policy \ | 80 | ${base_sbindir}/load_policy \ |
81 | " | 81 | " |
82 | FILES_${PN}-newrole += "\ | 82 | FILES:${PN}-newrole += "\ |
83 | ${bindir}/newrole \ | 83 | ${bindir}/newrole \ |
84 | ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${sysconfdir}/pam.d/newrole', '', d)} \ | 84 | ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${sysconfdir}/pam.d/newrole', '', d)} \ |
85 | " | 85 | " |
86 | FILES_${PN}-runinit += "\ | 86 | FILES:${PN}-runinit += "\ |
87 | ${base_sbindir}/run_init \ | 87 | ${base_sbindir}/run_init \ |
88 | ${base_sbindir}/open_init_pty \ | 88 | ${base_sbindir}/open_init_pty \ |
89 | ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${sysconfdir}/pam.d/run_init', '', d)} \ | 89 | ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${sysconfdir}/pam.d/run_init', '', d)} \ |
90 | " | 90 | " |
91 | FILES_${PN}-dbg += "${prefix}/libexec/selinux/hll/.debug" | 91 | FILES:${PN}-dbg += "${prefix}/libexec/selinux/hll/.debug" |
92 | FILES_${PN}-secon += "${bindir}/secon" | 92 | FILES:${PN}-secon += "${bindir}/secon" |
93 | FILES_${PN}-semodule += "${base_sbindir}/semodule" | 93 | FILES:${PN}-semodule += "${base_sbindir}/semodule" |
94 | FILES_${PN}-hll += "${prefix}/libexec/selinux/hll/*" | 94 | FILES:${PN}-hll += "${prefix}/libexec/selinux/hll/*" |
95 | FILES_${PN}-sestatus += "\ | 95 | FILES:${PN}-sestatus += "\ |
96 | ${base_sbindir}/sestatus \ | 96 | ${base_sbindir}/sestatus \ |
97 | ${sysconfdir}/sestatus.conf \ | 97 | ${sysconfdir}/sestatus.conf \ |
98 | " | 98 | " |
99 | FILES_${PN}-setfiles += "\ | 99 | FILES:${PN}-setfiles += "\ |
100 | ${base_sbindir}/restorecon \ | 100 | ${base_sbindir}/restorecon \ |
101 | ${base_sbindir}/restorecon_xattr \ | 101 | ${base_sbindir}/restorecon_xattr \ |
102 | ${base_sbindir}/setfiles \ | 102 | ${base_sbindir}/setfiles \ |
103 | " | 103 | " |
104 | FILES_${PN}-setsebool += "\ | 104 | FILES:${PN}-setsebool += "\ |
105 | ${base_sbindir}/setsebool \ | 105 | ${base_sbindir}/setsebool \ |
106 | ${datadir}/bash-completion/completions/setsebool \ | 106 | ${datadir}/bash-completion/completions/setsebool \ |
107 | " | 107 | " |
@@ -111,7 +111,7 @@ export STAGING_LIBDIR | |||
111 | export BUILD_SYS | 111 | export BUILD_SYS |
112 | export HOST_SYS | 112 | export HOST_SYS |
113 | 113 | ||
114 | PACKAGECONFIG_class-target ?= "\ | 114 | PACKAGECONFIG:class-target ?= "\ |
115 | ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)} \ | 115 | ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)} \ |
116 | audit \ | 116 | audit \ |
117 | " | 117 | " |
@@ -131,7 +131,7 @@ BBCLASSEXTEND = "native" | |||
131 | 131 | ||
132 | PCU_NATIVE_CMDS = "setfiles semodule hll" | 132 | PCU_NATIVE_CMDS = "setfiles semodule hll" |
133 | 133 | ||
134 | do_compile_class-native() { | 134 | do_compile:class-native() { |
135 | for PCU_CMD in ${PCU_NATIVE_CMDS} ; do | 135 | for PCU_CMD in ${PCU_NATIVE_CMDS} ; do |
136 | oe_runmake -C $PCU_CMD \ | 136 | oe_runmake -C $PCU_CMD \ |
137 | INCLUDEDIR='${STAGING_INCDIR}' \ | 137 | INCLUDEDIR='${STAGING_INCDIR}' \ |
@@ -139,11 +139,11 @@ do_compile_class-native() { | |||
139 | done | 139 | done |
140 | } | 140 | } |
141 | 141 | ||
142 | sysroot_stage_dirs_append_class-native() { | 142 | sysroot_stage_dirs:append:class-native() { |
143 | cp -R $from/${prefix}/libexec $to/${prefix}/libexec | 143 | cp -R $from/${prefix}/libexec $to/${prefix}/libexec |
144 | } | 144 | } |
145 | 145 | ||
146 | do_compile_prepend() { | 146 | do_compile:prepend() { |
147 | export PYTHON=python3 | 147 | export PYTHON=python3 |
148 | export PYLIBVER='python${PYTHON_BASEVERSION}' | 148 | export PYLIBVER='python${PYTHON_BASEVERSION}' |
149 | export PYTHON_CPPFLAGS="-I${STAGING_INCDIR}/${PYLIBVER}" | 149 | export PYTHON_CPPFLAGS="-I${STAGING_INCDIR}/${PYLIBVER}" |
@@ -151,12 +151,12 @@ do_compile_prepend() { | |||
151 | export PYTHON_SITE_PKG="${libdir}/${PYLIBVER}/site-packages" | 151 | export PYTHON_SITE_PKG="${libdir}/${PYLIBVER}/site-packages" |
152 | } | 152 | } |
153 | 153 | ||
154 | do_install_prepend() { | 154 | do_install:prepend() { |
155 | export PYTHON=python3 | 155 | export PYTHON=python3 |
156 | export SBINDIR="${D}/${base_sbindir}" | 156 | export SBINDIR="${D}/${base_sbindir}" |
157 | } | 157 | } |
158 | 158 | ||
159 | do_install_class-native() { | 159 | do_install:class-native() { |
160 | for PCU_CMD in ${PCU_NATIVE_CMDS} ; do | 160 | for PCU_CMD in ${PCU_NATIVE_CMDS} ; do |
161 | oe_runmake -C $PCU_CMD install \ | 161 | oe_runmake -C $PCU_CMD install \ |
162 | DESTDIR="${D}" \ | 162 | DESTDIR="${D}" \ |
@@ -165,7 +165,7 @@ do_install_class-native() { | |||
165 | done | 165 | done |
166 | } | 166 | } |
167 | 167 | ||
168 | do_install_append_class-target() { | 168 | do_install:append:class-target() { |
169 | if [ -e ${WORKDIR}/pam.d ]; then | 169 | if [ -e ${WORKDIR}/pam.d ]; then |
170 | install -d ${D}${sysconfdir}/pam.d/ | 170 | install -d ${D}${sysconfdir}/pam.d/ |
171 | install -m 0644 ${WORKDIR}/pam.d/* ${D}${sysconfdir}/pam.d/ | 171 | install -m 0644 ${WORKDIR}/pam.d/* ${D}${sysconfdir}/pam.d/ |
diff --git a/recipes-security/selinux/restorecond_3.2.bb b/recipes-security/selinux/restorecond_3.2.bb index d9def9a..75e65a8 100644 --- a/recipes-security/selinux/restorecond_3.2.bb +++ b/recipes-security/selinux/restorecond_3.2.bb | |||
@@ -20,16 +20,16 @@ EXTRA_OEMAKE += "SYSTEMDSYSTEMUNITDIR=${systemd_system_unitdir} \ | |||
20 | 20 | ||
21 | S = "${WORKDIR}/git/restorecond" | 21 | S = "${WORKDIR}/git/restorecond" |
22 | 22 | ||
23 | FILES_${PN} += "${datadir}/dbus-1/services/org.selinux.Restorecond.service \ | 23 | FILES:${PN} += "${datadir}/dbus-1/services/org.selinux.Restorecond.service \ |
24 | ${systemd_user_unitdir}/* \ | 24 | ${systemd_user_unitdir}/* \ |
25 | " | 25 | " |
26 | 26 | ||
27 | SYSTEMD_SERVICE_restorecond = "restorecond.service" | 27 | SYSTEMD_SERVICE:restorecond = "restorecond.service" |
28 | INITSCRIPT_PACKAGES = "restorecond" | 28 | INITSCRIPT_PACKAGES = "restorecond" |
29 | INITSCRIPT_NAME_restorecond = "restorecond" | 29 | INITSCRIPT_NAME:restorecond = "restorecond" |
30 | INITSCRIPT_PARAMS_restorecond = "defaults" | 30 | INITSCRIPT_PARAMS:restorecond = "defaults" |
31 | 31 | ||
32 | do_install_append() { | 32 | do_install:append() { |
33 | if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'false', 'true', d)}; then | 33 | if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'false', 'true', d)}; then |
34 | # remove /usr/lib/systemd/user | 34 | # remove /usr/lib/systemd/user |
35 | rm -rf ${D}${nonarch_libdir} | 35 | rm -rf ${D}${nonarch_libdir} |
diff --git a/recipes-security/selinux/selinux-autorelabel_0.1.bb b/recipes-security/selinux/selinux-autorelabel_0.1.bb index 85b0db9..a919445 100644 --- a/recipes-security/selinux/selinux-autorelabel_0.1.bb +++ b/recipes-security/selinux/selinux-autorelabel_0.1.bb | |||
@@ -7,7 +7,7 @@ file is present.\ | |||
7 | LICENSE = "MIT" | 7 | LICENSE = "MIT" |
8 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" | 8 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" |
9 | 9 | ||
10 | RDEPENDS_${PN} = " \ | 10 | RDEPENDS:${PN} = " \ |
11 | policycoreutils-setfiles \ | 11 | policycoreutils-setfiles \ |
12 | " | 12 | " |
13 | 13 | ||
@@ -19,7 +19,7 @@ INITSCRIPT_PARAMS = "start 01 S ." | |||
19 | 19 | ||
20 | require selinux-initsh.inc | 20 | require selinux-initsh.inc |
21 | 21 | ||
22 | do_install_append() { | 22 | do_install:append() { |
23 | if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then | 23 | if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then |
24 | echo "# first boot relabelling" > ${D}/.autorelabel | 24 | echo "# first boot relabelling" > ${D}/.autorelabel |
25 | fi | 25 | fi |
diff --git a/recipes-security/selinux/selinux-dbus_3.2.bb b/recipes-security/selinux/selinux-dbus_3.2.bb index bc34f89..badf392 100644 --- a/recipes-security/selinux/selinux-dbus_3.2.bb +++ b/recipes-security/selinux/selinux-dbus_3.2.bb | |||
@@ -9,9 +9,9 @@ require selinux_common.inc | |||
9 | 9 | ||
10 | S = "${WORKDIR}/git/dbus" | 10 | S = "${WORKDIR}/git/dbus" |
11 | 11 | ||
12 | RDEPENDS_${PN} += "python3-core selinux-python-sepolicy" | 12 | RDEPENDS:${PN} += "python3-core selinux-python-sepolicy" |
13 | 13 | ||
14 | FILES_${PN} += "\ | 14 | FILES:${PN} += "\ |
15 | ${datadir}/system-config-selinux/selinux_server.py \ | 15 | ${datadir}/system-config-selinux/selinux_server.py \ |
16 | ${datadir}/polkit-1/actions/org.selinux.policy \ | 16 | ${datadir}/polkit-1/actions/org.selinux.policy \ |
17 | ${datadir}/dbus-1/system-services/org.selinux.service \ | 17 | ${datadir}/dbus-1/system-services/org.selinux.service \ |
diff --git a/recipes-security/selinux/selinux-gui_3.2.bb b/recipes-security/selinux/selinux-gui_3.2.bb index 5818e49..5534ec6 100644 --- a/recipes-security/selinux/selinux-gui_3.2.bb +++ b/recipes-security/selinux/selinux-gui_3.2.bb | |||
@@ -10,9 +10,9 @@ require selinux_common.inc | |||
10 | 10 | ||
11 | S = "${WORKDIR}/git/gui" | 11 | S = "${WORKDIR}/git/gui" |
12 | 12 | ||
13 | RDEPENDS_${PN} += "python3-core" | 13 | RDEPENDS:${PN} += "python3-core" |
14 | 14 | ||
15 | FILES_${PN} += " \ | 15 | FILES:${PN} += " \ |
16 | ${datadir}/system-config-selinux/* \ | 16 | ${datadir}/system-config-selinux/* \ |
17 | ${datadir}/icons/hicolor/* \ | 17 | ${datadir}/icons/hicolor/* \ |
18 | ${datadir}/polkit-1/actions/org.selinux.config.policy \ | 18 | ${datadir}/polkit-1/actions/org.selinux.config.policy \ |
diff --git a/recipes-security/selinux/selinux-init_0.1.bb b/recipes-security/selinux/selinux-init_0.1.bb index ebe7399..c97316e 100644 --- a/recipes-security/selinux/selinux-init_0.1.bb +++ b/recipes-security/selinux/selinux-init_0.1.bb | |||
@@ -7,7 +7,7 @@ boot time. \ | |||
7 | LICENSE = "MIT" | 7 | LICENSE = "MIT" |
8 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" | 8 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" |
9 | 9 | ||
10 | RDEPENDS_${PN} = " \ | 10 | RDEPENDS:${PN} = " \ |
11 | coreutils \ | 11 | coreutils \ |
12 | libselinux-bin \ | 12 | libselinux-bin \ |
13 | policycoreutils-secon \ | 13 | policycoreutils-secon \ |
diff --git a/recipes-security/selinux/selinux-initsh.inc b/recipes-security/selinux/selinux-initsh.inc index 0a6cf4b..f6a3d85 100644 --- a/recipes-security/selinux/selinux-initsh.inc +++ b/recipes-security/selinux/selinux-initsh.inc | |||
@@ -9,15 +9,15 @@ SELINUX_SCRIPT_DST ?= "${SELINUX_SCRIPT_SRC}" | |||
9 | INITSCRIPT_NAME ?= "${SELINUX_SCRIPT_DST}" | 9 | INITSCRIPT_NAME ?= "${SELINUX_SCRIPT_DST}" |
10 | INITSCRIPT_PARAMS ?= "start 00 S ." | 10 | INITSCRIPT_PARAMS ?= "start 00 S ." |
11 | 11 | ||
12 | CONFFILES_${PN} += "${sysconfdir}/init.d/${SELINUX_SCRIPT_DST}" | 12 | CONFFILES:${PN} += "${sysconfdir}/init.d/${SELINUX_SCRIPT_DST}" |
13 | 13 | ||
14 | PACKAGE_ARCH ?= "${MACHINE_ARCH}" | 14 | PACKAGE_ARCH ?= "${MACHINE_ARCH}" |
15 | 15 | ||
16 | inherit update-rc.d systemd | 16 | inherit update-rc.d systemd |
17 | 17 | ||
18 | SYSTEMD_SERVICE_${PN} = "${SELINUX_SCRIPT_SRC}.service" | 18 | SYSTEMD_SERVICE:${PN} = "${SELINUX_SCRIPT_SRC}.service" |
19 | 19 | ||
20 | FILES_${PN} += "/.autorelabel" | 20 | FILES:${PN} += "/.autorelabel" |
21 | 21 | ||
22 | do_install () { | 22 | do_install () { |
23 | install -d ${D}${sysconfdir}/init.d/ | 23 | install -d ${D}${sysconfdir}/init.d/ |
@@ -36,6 +36,6 @@ do_install () { | |||
36 | fi | 36 | fi |
37 | } | 37 | } |
38 | 38 | ||
39 | sysroot_stage_all_append () { | 39 | sysroot_stage_all:append () { |
40 | sysroot_stage_dir ${D}${sysconfdir} ${SYSROOT_DESTDIR}${sysconfdir} | 40 | sysroot_stage_dir ${D}${sysconfdir} ${SYSROOT_DESTDIR}${sysconfdir} |
41 | } | 41 | } |
diff --git a/recipes-security/selinux/selinux-labeldev_0.1.bb b/recipes-security/selinux/selinux-labeldev_0.1.bb index 2a0bca9..d29efec 100644 --- a/recipes-security/selinux/selinux-labeldev_0.1.bb +++ b/recipes-security/selinux/selinux-labeldev_0.1.bb | |||
@@ -4,7 +4,7 @@ DESCRIPTION = "Set SELinux labels for /dev." | |||
4 | LICENSE = "MIT" | 4 | LICENSE = "MIT" |
5 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" | 5 | LIC_FILES_CHKSUM = "file://${COREBASE}/meta/COPYING.MIT;md5=3da9cfbcb788c80a0384361b4de20420" |
6 | 6 | ||
7 | RDEPENDS_${PN} = " \ | 7 | RDEPENDS:${PN} = " \ |
8 | coreutils \ | 8 | coreutils \ |
9 | libselinux-bin \ | 9 | libselinux-bin \ |
10 | policycoreutils-setfiles \ | 10 | policycoreutils-setfiles \ |
diff --git a/recipes-security/selinux/selinux-python_3.2.bb b/recipes-security/selinux/selinux-python_3.2.bb index a827a90..a954676 100644 --- a/recipes-security/selinux/selinux-python_3.2.bb +++ b/recipes-security/selinux/selinux-python_3.2.bb | |||
@@ -17,12 +17,12 @@ S = "${WORKDIR}/git/python" | |||
17 | EXTRA_OEMAKE += "LIBSEPOLA=${STAGING_LIBDIR}/libsepol.a" | 17 | EXTRA_OEMAKE += "LIBSEPOLA=${STAGING_LIBDIR}/libsepol.a" |
18 | 18 | ||
19 | DEPENDS += "python3 libsepol libselinux" | 19 | DEPENDS += "python3 libsepol libselinux" |
20 | RDEPENDS_${BPN}-audit2allow += "\ | 20 | RDEPENDS:${BPN}-audit2allow += "\ |
21 | python3-core \ | 21 | python3-core \ |
22 | libselinux-python \ | 22 | libselinux-python \ |
23 | ${BPN}-sepolgen \ | 23 | ${BPN}-sepolgen \ |
24 | " | 24 | " |
25 | RDEPENDS_${BPN}-chcat += "\ | 25 | RDEPENDS:${BPN}-chcat += "\ |
26 | python3-core \ | 26 | python3-core \ |
27 | python3-codecs \ | 27 | python3-codecs \ |
28 | python3-shell \ | 28 | python3-shell \ |
@@ -31,7 +31,7 @@ RDEPENDS_${BPN}-chcat += "\ | |||
31 | libselinux-python \ | 31 | libselinux-python \ |
32 | ${BPN} \ | 32 | ${BPN} \ |
33 | " | 33 | " |
34 | RDEPENDS_${BPN} += "\ | 34 | RDEPENDS:${BPN} += "\ |
35 | python3-core \ | 35 | python3-core \ |
36 | python3-codecs \ | 36 | python3-codecs \ |
37 | python3-io \ | 37 | python3-io \ |
@@ -43,7 +43,7 @@ RDEPENDS_${BPN} += "\ | |||
43 | libsemanage-python \ | 43 | libsemanage-python \ |
44 | setools \ | 44 | setools \ |
45 | " | 45 | " |
46 | RDEPENDS_${BPN}-semanage += "\ | 46 | RDEPENDS:${BPN}-semanage += "\ |
47 | python3-core \ | 47 | python3-core \ |
48 | python3-ipy \ | 48 | python3-ipy \ |
49 | python3-compression \ | 49 | python3-compression \ |
@@ -52,13 +52,13 @@ RDEPENDS_${BPN}-semanage += "\ | |||
52 | libselinux-python \ | 52 | libselinux-python \ |
53 | ${BPN} \ | 53 | ${BPN} \ |
54 | " | 54 | " |
55 | RDEPENDS_${BPN}-sepolicy += "\ | 55 | RDEPENDS:${BPN}-sepolicy += "\ |
56 | python3-core \ | 56 | python3-core \ |
57 | python3-codecs \ | 57 | python3-codecs \ |
58 | python3-syslog \ | 58 | python3-syslog \ |
59 | ${BPN} \ | 59 | ${BPN} \ |
60 | " | 60 | " |
61 | RDEPENDS_${BPN}-sepolgen-ifgen += "\ | 61 | RDEPENDS:${BPN}-sepolgen-ifgen += "\ |
62 | python3-core \ | 62 | python3-core \ |
63 | libselinux-python \ | 63 | libselinux-python \ |
64 | " | 64 | " |
@@ -71,33 +71,33 @@ PACKAGES =+ "\ | |||
71 | ${PN}-sepolgen \ | 71 | ${PN}-sepolgen \ |
72 | ${PN}-sepolicy \ | 72 | ${PN}-sepolicy \ |
73 | " | 73 | " |
74 | FILES_${PN}-audit2allow = "\ | 74 | FILES:${PN}-audit2allow = "\ |
75 | ${bindir}/audit2allow \ | 75 | ${bindir}/audit2allow \ |
76 | ${bindir}/audit2why \ | 76 | ${bindir}/audit2why \ |
77 | " | 77 | " |
78 | FILES_${PN}-chcat = "\ | 78 | FILES:${PN}-chcat = "\ |
79 | ${bindir}/chcat \ | 79 | ${bindir}/chcat \ |
80 | " | 80 | " |
81 | FILES_${PN}-semanage = "\ | 81 | FILES:${PN}-semanage = "\ |
82 | ${sbindir}/semanage \ | 82 | ${sbindir}/semanage \ |
83 | ${datadir}/bash-completion/completions/semanage \ | 83 | ${datadir}/bash-completion/completions/semanage \ |
84 | " | 84 | " |
85 | # The ${bindir}/sepolgen is a symlink to ${bindir}/sepolicy | 85 | # The ${bindir}/sepolgen is a symlink to ${bindir}/sepolicy |
86 | FILES_${PN}-sepolicy += "\ | 86 | FILES:${PN}-sepolicy += "\ |
87 | ${bindir}/sepolgen \ | 87 | ${bindir}/sepolgen \ |
88 | ${bindir}/sepolicy \ | 88 | ${bindir}/sepolicy \ |
89 | ${datadir}/bash-completion/completions/sepolicy \ | 89 | ${datadir}/bash-completion/completions/sepolicy \ |
90 | " | 90 | " |
91 | FILES_${PN}-sepolgen-ifgen += "\ | 91 | FILES:${PN}-sepolgen-ifgen += "\ |
92 | ${bindir}/sepolgen-ifgen \ | 92 | ${bindir}/sepolgen-ifgen \ |
93 | ${bindir}/sepolgen-ifgen-attr-helper \ | 93 | ${bindir}/sepolgen-ifgen-attr-helper \ |
94 | " | 94 | " |
95 | FILES_${PN}-sepolgen += "\ | 95 | FILES:${PN}-sepolgen += "\ |
96 | ${libdir}/python${PYTHON_BASEVERSION}/site-packages/sepolgen* \ | 96 | ${libdir}/python${PYTHON_BASEVERSION}/site-packages/sepolgen* \ |
97 | ${localstatedir}/lib/sepolgen/perm_map \ | 97 | ${localstatedir}/lib/sepolgen/perm_map \ |
98 | " | 98 | " |
99 | 99 | ||
100 | FILES_${PN} += "\ | 100 | FILES:${PN} += "\ |
101 | ${libdir}/python${PYTHON_BASEVERSION}/site-packages/seobject.py* \ | 101 | ${libdir}/python${PYTHON_BASEVERSION}/site-packages/seobject.py* \ |
102 | ${libdir}/python${PYTHON_BASEVERSION}/site-packages/sepolicy*.egg-info \ | 102 | ${libdir}/python${PYTHON_BASEVERSION}/site-packages/sepolicy*.egg-info \ |
103 | ${libdir}/python${PYTHON_BASEVERSION}/site-packages/sepolicy/* \ | 103 | ${libdir}/python${PYTHON_BASEVERSION}/site-packages/sepolicy/* \ |
diff --git a/recipes-security/selinux/selinux-sandbox_3.2.bb b/recipes-security/selinux/selinux-sandbox_3.2.bb index 2c6a823..a20982c 100644 --- a/recipes-security/selinux/selinux-sandbox_3.2.bb +++ b/recipes-security/selinux/selinux-sandbox_3.2.bb | |||
@@ -15,7 +15,7 @@ S = "${WORKDIR}/git/sandbox" | |||
15 | 15 | ||
16 | DEPENDS += "libcap-ng libselinux" | 16 | DEPENDS += "libcap-ng libselinux" |
17 | 17 | ||
18 | RDEPENDS_${PN} += "\ | 18 | RDEPENDS:${PN} += "\ |
19 | python3-core \ | 19 | python3-core \ |
20 | python3-math \ | 20 | python3-math \ |
21 | python3-shell \ | 21 | python3-shell \ |
@@ -24,7 +24,7 @@ RDEPENDS_${PN} += "\ | |||
24 | selinux-python \ | 24 | selinux-python \ |
25 | " | 25 | " |
26 | 26 | ||
27 | FILES_${PN} += "\ | 27 | FILES:${PN} += "\ |
28 | ${datadir}/sandbox/sandboxX.sh \ | 28 | ${datadir}/sandbox/sandboxX.sh \ |
29 | ${datadir}/sandbox/start \ | 29 | ${datadir}/sandbox/start \ |
30 | " | 30 | " |
diff --git a/recipes-security/selinux/semodule-utils_3.2.bb b/recipes-security/selinux/semodule-utils_3.2.bb index 7773d5b..a8bca0e 100644 --- a/recipes-security/selinux/semodule-utils_3.2.bb +++ b/recipes-security/selinux/semodule-utils_3.2.bb | |||
@@ -9,7 +9,7 @@ LIC_FILES_CHKSUM = "file://${S}/COPYING;md5=393a5ca445f6965873eca0259a17f833" | |||
9 | require selinux_common.inc | 9 | require selinux_common.inc |
10 | 10 | ||
11 | DEPENDS += "libsepol" | 11 | DEPENDS += "libsepol" |
12 | RDEPENDS_${PN}-dev = "" | 12 | RDEPENDS:${PN}-dev = "" |
13 | 13 | ||
14 | EXTRA_OEMAKE += "LIBSEPOLA=${STAGING_LIBDIR}/libsepol.a" | 14 | EXTRA_OEMAKE += "LIBSEPOLA=${STAGING_LIBDIR}/libsepol.a" |
15 | 15 | ||
@@ -21,9 +21,9 @@ PACKAGES =+ "\ | |||
21 | ${PN}-semodule-package \ | 21 | ${PN}-semodule-package \ |
22 | " | 22 | " |
23 | 23 | ||
24 | FILES_${PN}-semodule-expand += "${bindir}/semodule_expand" | 24 | FILES:${PN}-semodule-expand += "${bindir}/semodule_expand" |
25 | FILES_${PN}-semodule-link += "${bindir}/semodule_link" | 25 | FILES:${PN}-semodule-link += "${bindir}/semodule_link" |
26 | FILES_${PN}-semodule-package += "\ | 26 | FILES:${PN}-semodule-package += "\ |
27 | ${bindir}/semodule_package \ | 27 | ${bindir}/semodule_package \ |
28 | ${bindir}/semodule_unpackage \ | 28 | ${bindir}/semodule_unpackage \ |
29 | " | 29 | " |
diff --git a/recipes-security/setools/setools_4.4.0.bb b/recipes-security/setools/setools_4.4.0.bb index 4dd094f..528e78f 100644 --- a/recipes-security/setools/setools_4.4.0.bb +++ b/recipes-security/setools/setools_4.4.0.bb | |||
@@ -23,18 +23,18 @@ LIC_FILES_CHKSUM = "file://${S}/COPYING;md5=83a5eb6974c11f30785e90d0eeccf40c \ | |||
23 | 23 | ||
24 | DEPENDS += "bison-native flex-native swig-native python3 python3-cython-native libsepol libselinux" | 24 | DEPENDS += "bison-native flex-native swig-native python3 python3-cython-native libsepol libselinux" |
25 | 25 | ||
26 | DEPENDS_class-native += "libselinux python3-setuptools python3-cython python3-networkx" | 26 | DEPENDS:class-native += "libselinux python3-setuptools python3-cython python3-networkx" |
27 | 27 | ||
28 | RDEPENDS_${PN} += "python3-networkx python3-decorator python3-setuptools \ | 28 | RDEPENDS:${PN} += "python3-networkx python3-decorator python3-setuptools \ |
29 | python3-logging python3-json libselinux-python" | 29 | python3-logging python3-json libselinux-python" |
30 | 30 | ||
31 | RDEPENDS_${PN}_class-native = "" | 31 | RDEPENDS:${PN}:class-native = "" |
32 | 32 | ||
33 | RPROVIDES_${PN} += "${PN}-console" | 33 | RPROVIDES:${PN} += "${PN}-console" |
34 | 34 | ||
35 | inherit setuptools3 | 35 | inherit setuptools3 |
36 | 36 | ||
37 | do_install_append() { | 37 | do_install:append() { |
38 | # Need PyQt5 support, disable gui tools | 38 | # Need PyQt5 support, disable gui tools |
39 | rm -f ${D}${bindir}/apol | 39 | rm -f ${D}${bindir}/apol |
40 | rm -rf ${D}${libdir}/${PYTHON_DIR}/site-packages/setoolsgui | 40 | rm -rf ${D}${libdir}/${PYTHON_DIR}/site-packages/setoolsgui |
diff --git a/recipes-support/attr/attr_selinux.inc b/recipes-support/attr/attr_selinux.inc index ba0314e..7b45842 100644 --- a/recipes-support/attr/attr_selinux.inc +++ b/recipes-support/attr/attr_selinux.inc | |||
@@ -1,5 +1,5 @@ | |||
1 | inherit selinux | 1 | inherit selinux |
2 | 2 | ||
3 | FILESEXTRAPATHS_prepend := "${THISDIR}/files:" | 3 | FILESEXTRAPATHS:prepend := "${THISDIR}/files:" |
4 | 4 | ||
5 | SRC_URI += "file://fix-ptest-failures-when-selinux-enabled.patch" | 5 | SRC_URI += "file://fix-ptest-failures-when-selinux-enabled.patch" |
diff --git a/recipes-support/libpcre/libpcre_selinux.inc b/recipes-support/libpcre/libpcre_selinux.inc index 3810078..2da7073 100644 --- a/recipes-support/libpcre/libpcre_selinux.inc +++ b/recipes-support/libpcre/libpcre_selinux.inc | |||
@@ -1,4 +1,4 @@ | |||
1 | do_install_append () { | 1 | do_install:append () { |
2 | # This code creates libpcre for both the dev machine (SDK native) | 2 | # This code creates libpcre for both the dev machine (SDK native) |
3 | # and for cross-compiling (machine arch). For Linux (SDK Linux native | 3 | # and for cross-compiling (machine arch). For Linux (SDK Linux native |
4 | # + all machine arch), symlinks to the .so files have to be created, | 4 | # + all machine arch), symlinks to the .so files have to be created, |
@@ -15,4 +15,4 @@ do_install_append () { | |||
15 | fi | 15 | fi |
16 | } | 16 | } |
17 | 17 | ||
18 | FILES_${PN} += "${base_libdir}/libpcre.so.*" | 18 | FILES:${PN} += "${base_libdir}/libpcre.so.*" |