From dc917209fd0e6b6656650252eb45ccba465e2f63 Mon Sep 17 00:00:00 2001 From: Xin Ouyang Date: Mon, 22 Apr 2013 21:47:31 +0800 Subject: selinux userspace: uprev to release 2.20120924 Upreved packages: - checkpolicy to 2.1.11 - libselinux to 2.1.12 - libsemanage to 2.1.9 - libsepol to 2.1.8 - policycoreutils to 2.1.13 - sepolgen to 1.1.8 Misc changes: - libselinux has a new depend for libpcre - drop patches that new version merged - set PR to r0 for new version Signed-off-by: Xin Ouyang --- recipes-security/selinux/checkpolicy_2.1.11.bb | 9 + recipes-security/selinux/checkpolicy_2.1.8.bb | 9 - recipes-security/selinux/libselinux.inc | 5 +- .../libselinux-fix-init-load-policy.patch | 2 +- .../libselinux/libselinux-pcre-link-order.patch | 34 + recipes-security/selinux/libselinux_2.1.12.bb | 12 + recipes-security/selinux/libselinux_2.1.9.bb | 11 - .../Fix-segfault-for-standard-policy.patch | 37 - ...bsemanage-semanage.conf-for-cross-compile.patch | 122 - recipes-security/selinux/libsemanage_2.1.6.bb | 15 - recipes-security/selinux/libsemanage_2.1.9.bb | 14 + recipes-security/selinux/libsepol_2.1.4.bb | 11 - recipes-security/selinux/libsepol_2.1.8.bb | 11 + recipes-security/selinux/policycoreutils.inc | 3 +- .../policycoreutils-fix-format-security.patch | 31 - .../policycoreutils-remove-empty-po-files.patch | 3809 -------------------- recipes-security/selinux/policycoreutils_2.1.10.bb | 13 - recipes-security/selinux/policycoreutils_2.1.13.bb | 10 + recipes-security/selinux/selinux_20120216.inc | 12 - recipes-security/selinux/selinux_20120924.inc | 12 + recipes-security/selinux/sepolgen_1.1.5.bb | 10 - recipes-security/selinux/sepolgen_1.1.8.bb | 9 + 22 files changed, 118 insertions(+), 4083 deletions(-) create mode 100644 recipes-security/selinux/checkpolicy_2.1.11.bb delete mode 100644 recipes-security/selinux/checkpolicy_2.1.8.bb create mode 100644 recipes-security/selinux/libselinux/libselinux-pcre-link-order.patch create mode 100644 recipes-security/selinux/libselinux_2.1.12.bb delete mode 100644 recipes-security/selinux/libselinux_2.1.9.bb delete mode 100644 recipes-security/selinux/libsemanage/Fix-segfault-for-standard-policy.patch delete mode 100644 recipes-security/selinux/libsemanage/libsemanage-semanage.conf-for-cross-compile.patch delete mode 100644 recipes-security/selinux/libsemanage_2.1.6.bb create mode 100644 recipes-security/selinux/libsemanage_2.1.9.bb delete mode 100644 recipes-security/selinux/libsepol_2.1.4.bb create mode 100644 recipes-security/selinux/libsepol_2.1.8.bb delete mode 100644 recipes-security/selinux/policycoreutils/policycoreutils-fix-format-security.patch delete mode 100644 recipes-security/selinux/policycoreutils/policycoreutils-remove-empty-po-files.patch delete mode 100644 recipes-security/selinux/policycoreutils_2.1.10.bb create mode 100644 recipes-security/selinux/policycoreutils_2.1.13.bb delete mode 100644 recipes-security/selinux/selinux_20120216.inc create mode 100644 recipes-security/selinux/selinux_20120924.inc delete mode 100644 recipes-security/selinux/sepolgen_1.1.5.bb create mode 100644 recipes-security/selinux/sepolgen_1.1.8.bb diff --git a/recipes-security/selinux/checkpolicy_2.1.11.bb b/recipes-security/selinux/checkpolicy_2.1.11.bb new file mode 100644 index 0000000..e8b5630 --- /dev/null +++ b/recipes-security/selinux/checkpolicy_2.1.11.bb @@ -0,0 +1,9 @@ +PR = "r0" + +include selinux_20120924.inc +include ${BPN}.inc + +LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" + +SRC_URI[md5sum] = "046b590de004f8a6cee655c4e95a7970" +SRC_URI[sha256sum] = "06acbc776134464d133669de82b7f7c7ebca376c307a3a3478544a42c5d050f1" diff --git a/recipes-security/selinux/checkpolicy_2.1.8.bb b/recipes-security/selinux/checkpolicy_2.1.8.bb deleted file mode 100644 index d0fd759..0000000 --- a/recipes-security/selinux/checkpolicy_2.1.8.bb +++ /dev/null @@ -1,9 +0,0 @@ -PR = "r2" - -include selinux_20120216.inc -include ${BPN}.inc - -LIC_FILES_CHKSUM = "file://COPYING;md5=393a5ca445f6965873eca0259a17f833" - -SRC_URI[md5sum] = "e7b5d62873d4efc8a502b75f042f6735" -SRC_URI[sha256sum] = "8ed586fd2ccf9900f86e38b72af4aa5cc3bade35d0fa19c53ac1a3d59fe0013a" diff --git a/recipes-security/selinux/libselinux.inc b/recipes-security/selinux/libselinux.inc index 575ebbc..484f41c 100644 --- a/recipes-security/selinux/libselinux.inc +++ b/recipes-security/selinux/libselinux.inc @@ -9,7 +9,7 @@ LICENSE = "PD" inherit lib_package pythonnative -DEPENDS += "libsepol python swig-native" +DEPENDS += "libsepol python libpcre swig-native" PACKAGES += "${PN}-python" FILES_${PN}-python = "${libdir}/python${PYTHON_BASEVERSION}/site-packages/selinux/*" @@ -23,6 +23,8 @@ def get_policyconfigarch(d): return "ARCH=%s" % (target) EXTRA_OEMAKE += "${@get_policyconfigarch(d)}" +EXTRA_OEMAKE += "LDFLAGS='${LDFLAGS} -lpcre'" + do_compile_append() { oe_runmake pywrap -j1 \ INCLUDEDIR='${STAGING_INCDIR}' \ @@ -38,6 +40,7 @@ do_install_append() { DESTDIR=${D} \ PYLIBVER='python${PYTHON_BASEVERSION}' \ PYLIBDIR='${D}/${libdir}/$(PYLIBVER)' + rm -rf ${D}${base_sbindir} } BBCLASSEXTEND = "native" diff --git a/recipes-security/selinux/libselinux/libselinux-fix-init-load-policy.patch b/recipes-security/selinux/libselinux/libselinux-fix-init-load-policy.patch index d959f2c..67e32d6 100644 --- a/recipes-security/selinux/libselinux/libselinux-fix-init-load-policy.patch +++ b/recipes-security/selinux/libselinux/libselinux-fix-init-load-policy.patch @@ -17,7 +17,7 @@ index f569664..60e7efd 100644 @@ -370,6 +370,7 @@ int selinux_init_load_policy(int *enforce) * mount it if present for use in the calls below. */ - char *mntpoint = NULL; + const char *mntpoint = NULL; + rc = mount("sysfs", "/sys", "sysfs", 0, 0); if (mount(SELINUXFS, SELINUXMNT, SELINUXFS, 0, 0) == 0 || errno == EBUSY) { mntpoint = SELINUXMNT; diff --git a/recipes-security/selinux/libselinux/libselinux-pcre-link-order.patch b/recipes-security/selinux/libselinux/libselinux-pcre-link-order.patch new file mode 100644 index 0000000..ac4de7f --- /dev/null +++ b/recipes-security/selinux/libselinux/libselinux-pcre-link-order.patch @@ -0,0 +1,34 @@ +Subject: [PATCH] libselinux: Put -lpcre in LDADD for correct linking order + +Upstream-Status: pending + +Signed-off-by: Xin Ouyang +--- + src/Makefile | 4 ++-- + 1 files changed, 2 insertions(+), 2 deletions(-) + +diff --git a/src/Makefile b/src/Makefile +index ac019df..1907d8c 100644 +--- a/src/Makefile ++++ b/src/Makefile +@@ -20,7 +20,7 @@ RUBYINC ?= $(shell pkg-config --cflags ruby-$(RUBYLIBVER)) + RUBYINSTALL ?= $(LIBDIR)/ruby/site_ruby/$(RUBYLIBVER)/$(RUBYPLATFORM) + LIBBASE=$(shell basename $(LIBDIR)) + +-LDFLAGS ?= -lpcre ++LDADD ?= -lpcre + + VERSION = $(shell cat ../VERSION) + LIBVERSION = 1 +@@ -116,7 +116,7 @@ $(LIBA): $(OBJS) + $(RANLIB) $@ + + $(LIBSO): $(LOBJS) +- $(CC) $(CFLAGS) $(LDFLAGS) -shared -o $@ $^ -ldl -L$(LIBDIR) -Wl,-soname,$(LIBSO),-z,defs,-z,relro ++ $(CC) $(CFLAGS) $(LDFLAGS) -shared -o $@ $^ -ldl -L$(LIBDIR) -Wl,-soname,$(LIBSO),-z,defs,-z,relro $(LDADD) + ln -sf $@ $(TARGET) + + $(LIBPC): $(LIBPC).in ../VERSION +-- +1.7.5.4 + diff --git a/recipes-security/selinux/libselinux_2.1.12.bb b/recipes-security/selinux/libselinux_2.1.12.bb new file mode 100644 index 0000000..34f9c2c --- /dev/null +++ b/recipes-security/selinux/libselinux_2.1.12.bb @@ -0,0 +1,12 @@ +PR = "r0" + +include selinux_20120924.inc +include ${BPN}.inc + +LIC_FILES_CHKSUM = "file://LICENSE;md5=84b4d2c6ef954a2d4081e775a270d0d0" + +SRC_URI[md5sum] = "73270f384a032fad34b5fe075fa05ce2" +SRC_URI[sha256sum] = "8dad879380e0ce1e4ab67195a08f6052c1396493bcb12fe92a033f49f7dbca9e" + +SRC_URI += "file://libselinux-fix-init-load-policy.patch \ + file://libselinux-pcre-link-order.patch" diff --git a/recipes-security/selinux/libselinux_2.1.9.bb b/recipes-security/selinux/libselinux_2.1.9.bb deleted file mode 100644 index 8d4fc3f..0000000 --- a/recipes-security/selinux/libselinux_2.1.9.bb +++ /dev/null @@ -1,11 +0,0 @@ -PR = "r3" - -include selinux_20120216.inc -include ${BPN}.inc - -LIC_FILES_CHKSUM = "file://LICENSE;md5=84b4d2c6ef954a2d4081e775a270d0d0" - -SRC_URI[md5sum] = "8ea0548dd65e9479b357ba1447f89221" -SRC_URI[sha256sum] = "749d4b39c80aa9df8247b8b3187ab72442c0dbad6e70bf312e25052bd4e7063f" - -SRC_URI += "file://libselinux-fix-init-load-policy.patch" diff --git a/recipes-security/selinux/libsemanage/Fix-segfault-for-standard-policy.patch b/recipes-security/selinux/libsemanage/Fix-segfault-for-standard-policy.patch deleted file mode 100644 index 8672b63..0000000 --- a/recipes-security/selinux/libsemanage/Fix-segfault-for-standard-policy.patch +++ /dev/null @@ -1,37 +0,0 @@ -From 64aff2c80f28280724f64628d6bf4c4722b4f75f Mon Sep 17 00:00:00 2001 -From: Xin Ouyang -Date: Thu, 12 Jan 2012 16:58:34 +0800 -Subject: [PATCH] libsemanage: Fix segfault for building standard policies. - -If you are building "standard" policies(not MCS/MLS), libsemanage -will crash, which caused by strdup() to "level" NULL pointers. -For example, semodule -s refpolicy -b base.pp -i a.pp ---- - src/genhomedircon.c | 4 ++++ - 1 files changed, 4 insertions(+), 0 deletions(-) - -diff --git a/src/genhomedircon.c b/src/genhomedircon.c -index d2646ae..262a6cd 100644 ---- a/src/genhomedircon.c -+++ b/src/genhomedircon.c -@@ -778,6 +778,8 @@ static int setup_fallback_user(genhomedircon_settings_t * s) - { - prefix = semanage_user_get_prefix(u); - level = semanage_user_get_mlslevel(u); -+ if (level == NULL) -+ level = ""; - } - - if (set_fallback_user(s, seuname, prefix, level) != 0) -@@ -861,6 +863,8 @@ static genhomedircon_user_entry_t *get_users(genhomedircon_settings_t * s, - if (u) { - prefix = semanage_user_get_prefix(*u); - level = semanage_user_get_mlslevel(*u); -+ if (level == NULL) -+ level = ""; - } else { - prefix = name; - level = "s0"; --- -1.7.7.3 - diff --git a/recipes-security/selinux/libsemanage/libsemanage-semanage.conf-for-cross-compile.patch b/recipes-security/selinux/libsemanage/libsemanage-semanage.conf-for-cross-compile.patch deleted file mode 100644 index b644455..0000000 --- a/recipes-security/selinux/libsemanage/libsemanage-semanage.conf-for-cross-compile.patch +++ /dev/null @@ -1,122 +0,0 @@ -From 2667fb6409c4677600910227457ea8a89510efd9 Mon Sep 17 00:00:00 2001 -From: Xin Ouyang -Date: Mon, 5 Mar 2012 17:09:47 +0800 -Subject: [PATCH] libsemanage: semanage.conf with semanage_set_root. - -Allow applications to use semanage.conf in the alternate root, if -semanage_set_root called. ---- - src/handle.c | 21 +++++++++++++++++++++ - src/handle.h | 2 ++ - src/semanage_store.c | 12 ------------ - src/semanage_store.h | 1 - - 4 files changed, 23 insertions(+), 13 deletions(-) - -diff --git a/src/handle.c b/src/handle.c -index 7adc1cc..ec61d6e 100644 ---- a/src/handle.c -+++ b/src/handle.c -@@ -37,10 +37,12 @@ - #include "semanage_store.h" - - #define SEMANAGE_COMMIT_READ_WAIT 5 -+#define SEMANAGE_CONF_PATH "/etc/selinux/semanage.conf" - - #include - #include - static char *private_selinux_path = NULL; -+static char *private_semanage_conf_path = NULL; - static char *private_file_context_path = NULL; - static char *private_file_context_local_path = NULL; - static char *private_file_context_homedir_path = NULL; -@@ -52,6 +54,7 @@ static char *private_policy_root = NULL; - - void semanage_free_root() { - free(private_selinux_path); private_selinux_path = NULL; -+ free(private_semanage_conf_path); private_semanage_conf_path = NULL; - free(private_file_context_path); private_file_context_path = NULL; - free(private_file_context_local_path); private_file_context_local_path = NULL; - free(private_file_context_homedir_path); private_file_context_homedir_path = NULL; -@@ -68,6 +71,10 @@ int semanage_set_root(const char *path) { - goto error; - } - -+ if ( asprintf(&private_semanage_conf_path, "%s/%s", path, SEMANAGE_CONF_PATH) < 0 ) { -+ goto error; -+ } -+ - if ( asprintf(&private_file_context_path, "%s/%s", path, selinux_file_context_path()) < 0 ) { - goto error; - } -@@ -171,6 +178,20 @@ const char *semanage_selinux_path(void) { - return selinux_path(); - } - -+/* Return a fully-qualified path + filename to the semanage -+ * configuration file. The caller must not alter the string returned -+ * (and hence why this function return type is const). -+ * -+ */ -+const char *semanage_conf_path(void) -+{ -+ if (private_semanage_conf_path -+ && access(private_semanage_conf_path, R_OK) == 0) -+ return private_semanage_conf_path; -+ -+ return SEMANAGE_CONF_PATH; -+} -+ - semanage_handle_t *semanage_handle_create(void) - { - semanage_handle_t *sh = NULL; -diff --git a/src/handle.h b/src/handle.h -index 723d811..bb12594 100644 ---- a/src/handle.h -+++ b/src/handle.h -@@ -105,6 +105,8 @@ struct semanage_handle { - dbase_config_t dbase[DBASE_COUNT]; - }; - -+const char *semanage_conf_path(void); -+ - /* === Local modifications === */ - static inline - dbase_config_t * semanage_user_base_dbase_local(semanage_handle_t * handle) -diff --git a/src/semanage_store.c b/src/semanage_store.c -index a223aa7..0e7b71a 100644 ---- a/src/semanage_store.c -+++ b/src/semanage_store.c -@@ -262,18 +262,6 @@ const char *semanage_path(enum semanage_store_defs store, - return semanage_paths[store][path_name]; - } - --/* Return a fully-qualified path + filename to the semanage -- * configuration file. The caller must not alter the string returned -- * (and hence why this function return type is const). -- * -- * This is going to be hard coded to /etc/selinux/semanage.conf for -- * the time being. FIXME -- */ --const char *semanage_conf_path(void) --{ -- return "/etc/selinux/semanage.conf"; --} -- - /**************** functions that create module store ***************/ - - /* Check that the semanage store exists. If 'create' is non-zero then -diff --git a/src/semanage_store.h b/src/semanage_store.h -index b451308..98e011d 100644 ---- a/src/semanage_store.h -+++ b/src/semanage_store.h -@@ -66,7 +66,6 @@ enum semanage_sandbox_defs { - /* FIXME: this needs to be made a module store specific init and the - * global configuration moved to another file. - */ --const char *semanage_conf_path(void); - int semanage_check_init(const char *root); - - extern const char *semanage_fname(enum semanage_sandbox_defs file_enum); --- -1.7.5.4 - diff --git a/recipes-security/selinux/libsemanage_2.1.6.bb b/recipes-security/selinux/libsemanage_2.1.6.bb deleted file mode 100644 index 978e72e..0000000 --- a/recipes-security/selinux/libsemanage_2.1.6.bb +++ /dev/null @@ -1,15 +0,0 @@ -PR = "r4" - -include selinux_20120216.inc -include ${BPN}.inc - -LIC_FILES_CHKSUM = "file://COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343" - -SRC_URI[md5sum] = "b49d75602432d8cfad8a3e5a0a966f07" -SRC_URI[sha256sum] = "64e6849fe50fb463ec0ba24653a26e3452fa4aaa7d7e192213d5c5a7c525aebb" - -SRC_URI += "file://Fix-segfault-for-standard-policy.patch \ - file://libsemanage-Fix-execve-segfaults-on-Ubuntu.patch \ - file://libsemanage-semanage.conf-for-cross-compile.patch \ - file://libsemanage-fix-path-len-limit.patch \ - file://libsemanage-fix-path-nologin.patch" diff --git a/recipes-security/selinux/libsemanage_2.1.9.bb b/recipes-security/selinux/libsemanage_2.1.9.bb new file mode 100644 index 0000000..0e0bc41 --- /dev/null +++ b/recipes-security/selinux/libsemanage_2.1.9.bb @@ -0,0 +1,14 @@ +PR = "r0" + +include selinux_20120924.inc +include ${BPN}.inc + +LIC_FILES_CHKSUM = "file://COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343" + +SRC_URI[md5sum] = "209e11da5b36c595a796751583f016f8" +SRC_URI[sha256sum] = "6f01d17f9751412f7b76e6e7daafeb2faf301b9bfeea83506160c81becf035cc" + +SRC_URI += "\ + file://libsemanage-Fix-execve-segfaults-on-Ubuntu.patch \ + file://libsemanage-fix-path-len-limit.patch \ + file://libsemanage-fix-path-nologin.patch" diff --git a/recipes-security/selinux/libsepol_2.1.4.bb b/recipes-security/selinux/libsepol_2.1.4.bb deleted file mode 100644 index eac1ed1..0000000 --- a/recipes-security/selinux/libsepol_2.1.4.bb +++ /dev/null @@ -1,11 +0,0 @@ -PR = "r1" - -include selinux_20120216.inc -include ${BPN}.inc - -LIC_FILES_CHKSUM = "file://COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343" - -SRC_URI[md5sum] = "909dae553edb34ea2224002a0c529cb0" -SRC_URI[sha256sum] = "8f5ea42ae6cc00b21f0e5f31f354d19fcce3edfe9328971d266245718714b1e8" - -SRC_URI += "file://libsepol-Change-ranlib-for-cross-compiling.patch" diff --git a/recipes-security/selinux/libsepol_2.1.8.bb b/recipes-security/selinux/libsepol_2.1.8.bb new file mode 100644 index 0000000..4d0e2dd --- /dev/null +++ b/recipes-security/selinux/libsepol_2.1.8.bb @@ -0,0 +1,11 @@ +PR = "r0" + +include selinux_20120924.inc +include ${BPN}.inc + +LIC_FILES_CHKSUM = "file://COPYING;md5=a6f89e2100d9b6cdffcea4f398e37343" + +SRC_URI[md5sum] = "56fa100ed85d7f06bd92f2892d92b3b0" +SRC_URI[sha256sum] = "63eedd2e435658eedb14cf5eb803468b701f4a2404f1a4af4ab52858e9c068f0" + +SRC_URI += "file://libsepol-Change-ranlib-for-cross-compiling.patch" diff --git a/recipes-security/selinux/policycoreutils.inc b/recipes-security/selinux/policycoreutils.inc index 786d1ab..434d7ab 100644 --- a/recipes-security/selinux/policycoreutils.inc +++ b/recipes-security/selinux/policycoreutils.inc @@ -43,11 +43,12 @@ RDEPENDS_${BPN} += "setools setools-libs ${BPN}-python" WARN_QA := "${@oe_filter_out('unsafe-references-in-scripts', '${WARN_QA}', d)}" ERROR_QA := "${@oe_filter_out('unsafe-references-in-scripts', '${ERROR_QA}', d)}" -PACKAGES =+ "${PN}-python ${PN}-sandbox" +PACKAGES =+ "${PN}-python ${PN}-sandbox system-config-selinux" FILES_${PN}-python = "${libdir}/python${PYTHON_BASEVERSION}/site-packages/*" FILES_${PN}-sandbox = "${datadir}/sandbox/*" FILES_${PN}-sandbox += "${bindir}/sandbox" FILES_${PN}-sandbox += "${sbindir}/seunshare" +FILES_system-config-selinux = "${datadir}/system-config-selinux/*" inherit pythonnative diff --git a/recipes-security/selinux/policycoreutils/policycoreutils-fix-format-security.patch b/recipes-security/selinux/policycoreutils/policycoreutils-fix-format-security.patch deleted file mode 100644 index 4c1d972..0000000 --- a/recipes-security/selinux/policycoreutils/policycoreutils-fix-format-security.patch +++ /dev/null @@ -1,31 +0,0 @@ -From 11686426e6148dd55c250570f3d537a3b2c2724d Mon Sep 17 00:00:00 2001 -From: Xin Ouyang -Date: Mon, 23 Jul 2012 11:22:56 +0800 -Subject: [PATCH] policycoreutils: fix format-security build error. - -With this fix, we can build policycoreutils with --Werror=format-security enabled. - -Signed-off-by: Xin Ouyang ---- - sandbox/seunshare.c | 4 ++-- - 1 files changed, 2 insertions(+), 2 deletions(-) - -diff --git a/sandbox/seunshare.c b/sandbox/seunshare.c -index c493e98..d7eb0b9 100644 ---- a/sandbox/seunshare.c -+++ b/sandbox/seunshare.c -@@ -311,8 +311,8 @@ static int seunshare_mount(const char *src, const char *dst, struct stat *src_st - */ - static int sandbox_error(const char *string) - { -- fprintf(stderr, string); -- syslog(LOG_AUTHPRIV | LOG_ALERT, string); -+ fprintf(stderr, "%s", string); -+ syslog(LOG_AUTHPRIV | LOG_ALERT, "%s", string); - exit(-1); - } - --- -1.7.5.4 - diff --git a/recipes-security/selinux/policycoreutils/policycoreutils-remove-empty-po-files.patch b/recipes-security/selinux/policycoreutils/policycoreutils-remove-empty-po-files.patch deleted file mode 100644 index c21746a..0000000 --- a/recipes-security/selinux/policycoreutils/policycoreutils-remove-empty-po-files.patch +++ /dev/null @@ -1,3809 +0,0 @@ -Subject: [PATCH] policycoreutils: remove empty po files - -Upstream-status: Backport -Upstream-git-url: http://oss.tresys.com/git/selinux.git - -| commit cb9a5c40af24db49a8bdd764c207d8acffb4e549 -| Author: Eric Paris -| Date: Wed Mar 28 14:54:50 2012 -0400 -| -| policycoreutils: remove empty po files -| -| et, gl, and id .po files contained no translations. This can cause -| build errors. Delete those puppies. -| -| Signed-off-by: Eric Paris - -Signed-off-by: Xin Ouyang ---- - po/et.po | 1254 -------------------------------------------------------------- - po/gl.po | 1254 -------------------------------------------------------------- - po/id.po | 1254 -------------------------------------------------------------- - 3 files changed, 0 insertions(+), 3762 deletions(-) - delete mode 100644 po/et.po - delete mode 100644 po/gl.po - delete mode 100644 po/id.po - -diff --git a/po/et.po b/po/et.po -deleted file mode 100644 -index 485c203..0000000 ---- a/po/et.po -+++ /dev/null -@@ -1,1254 +0,0 @@ --#: ../run_init/run_init.c:67 --msgid "" --"USAGE: run_init