From 00117ca09fc8f3b3ee230e163c96b00eed3d5efd Mon Sep 17 00:00:00 2001 From: Gilles Dartiguelongue Date: Wed, 16 Aug 2017 12:17:13 +0200 Subject: =?UTF-8?q?dev-python/python-slip:=20version=20bump=200.6.1=20?= =?UTF-8?q?=E2=86=92=200.6.5?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Fix homepage, bug #617614. Package-Manager: Portage-2.3.7, Repoman-2.3.3 --- .../files/python-slip-0.6.5-no-selinux.patch | 93 ++++++++++++++++++++++ 1 file changed, 93 insertions(+) create mode 100644 dev-python/python-slip/files/python-slip-0.6.5-no-selinux.patch (limited to 'dev-python/python-slip/files') diff --git a/dev-python/python-slip/files/python-slip-0.6.5-no-selinux.patch b/dev-python/python-slip/files/python-slip-0.6.5-no-selinux.patch new file mode 100644 index 000000000000..b957625f7ecd --- /dev/null +++ b/dev-python/python-slip/files/python-slip-0.6.5-no-selinux.patch @@ -0,0 +1,93 @@ +From 66480a1ee0222d9944f58af945959183b23c26f6 Mon Sep 17 00:00:00 2001 +From: Alexandre Rostovtsev +Date: Wed, 16 Aug 2017 10:49:43 +0200 +Subject: [PATCH] Disable selinux + +Signed-off-by: Gilles Dartiguelongue +--- + setup.py.in | 2 +- + slip/util/files.py | 27 ++++++++++++++------------- + 2 files changed, 15 insertions(+), 14 deletions(-) + +diff --git a/setup.py.in b/setup.py.in +index 9e7644b..fb276a7 100644 +--- a/setup.py.in ++++ b/setup.py.in +@@ -8,7 +8,7 @@ setup(name="slip", version="@VERSION@", + py_modules=["slip.__init__", "slip.util.__init__", + "slip.util.hookable", "slip.util.files", + "slip._wrappers.__init__", "slip._wrappers._glib"], +- requires=["selinux"]) ++ requires=[]) + + setup(name="slip.dbus", version="@VERSION@", + py_modules=["slip.dbus.__init__", "slip.dbus.bus", +diff --git a/slip/util/files.py b/slip/util/files.py +index 98faa7c..a0a3768 100644 +--- a/slip/util/files.py ++++ b/slip/util/files.py +@@ -33,6 +33,7 @@ __all__ = ["issamefile", "linkfile", "copyfile", "linkorcopyfile", + + import os + import selinux ++# import selinux + import tempfile + import errno + import stat +@@ -140,8 +141,8 @@ def copyfile(srcpath, dstpath, copy_mode_from_dst=True, run_restorecon=True): + + os.rename(dsttmpfile.name, dstpath) + +- if run_restorecon and selinux.is_selinux_enabled() > 0: +- selinux.restorecon(dstpath) ++# if run_restorecon and selinux.is_selinux_enabled() > 0: ++# selinux.restorecon(dstpath) + + + def linkorcopyfile( +@@ -247,8 +248,8 @@ def overwrite_safely( + + exists = os.path.exists(path) + +- if preserve_context and selinux.is_selinux_enabled() <= 0: +- preserve_context = False ++# if preserve_context and selinux.is_selinux_enabled() <= 0: ++# preserve_context = False + + try: + fd, tmpname = tempfile.mkstemp(prefix=base + os.path.extsep, +@@ -263,10 +264,10 @@ def overwrite_safely( + if preserve_mode: + os.fchmod(fd, stat.S_IMODE(s.st_mode)) + +- if preserve_context: +- ret, ctx = selinux.getfilecon(path) +- if ret < 0: +- raise RuntimeError("getfilecon(%r) failed" % path) ++# if preserve_context: ++# ret, ctx = selinux.getfilecon(path) ++# if ret < 0: ++# raise RuntimeError("getfilecon(%r) failed" % path) + + f = os.fdopen(fd, "w") + fd = None +@@ -278,11 +279,11 @@ def overwrite_safely( + + os.rename(tmpname, path) + +- if preserve_context: +- if exists: +- selinux.setfilecon(path, ctx) +- else: +- selinux.restorecon(path) ++# if preserve_context: ++# if exists: ++# selinux.setfilecon(path, ctx) ++# else: ++# selinux.restorecon(path) + + finally: + if f: +-- +2.14.0 + -- cgit v1.2.3