Revision: 15425
          http://gar.svn.sourceforge.net/gar/?rev=15425&view=rev
Author:   dmichelsen
Date:     2011-08-24 11:52:00 +0000 (Wed, 24 Aug 2011)
Log Message:
-----------
tcpwrappers: Tag alternatives release and make unified packages with just 
extended

Modified Paths:
--------------
    csw/mgar/pkg/tcpwrappers/trunk/Makefile
    csw/mgar/pkg/tcpwrappers/trunk/files/README
    csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch

Added Paths:
-----------
    csw/mgar/pkg/tcpwrappers/tags/tcpwrappers-7.6-alternatives-std-ext/

Removed Paths:
-------------
    csw/mgar/pkg/tcpwrappers/trunk/files/CSWtcpwrap.postmsg
    csw/mgar/pkg/tcpwrappers/trunk/files/man.patch

Modified: csw/mgar/pkg/tcpwrappers/trunk/Makefile
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/Makefile     2011-08-24 10:49:53 UTC (rev 
15424)
+++ csw/mgar/pkg/tcpwrappers/trunk/Makefile     2011-08-24 11:52:00 UTC (rev 
15425)
@@ -19,29 +19,38 @@
 DISTFILES = $(DISTNAME).tar.gz
 DISTFILES += COPYING
 DISTFILES += README
-DISTFILES += CSWtcpwrap.postmsg
 
 PATCHFILES = patch-cflags.diff
-PATCHFILES += man.patch
 PATCHFILES += sharedlib.patch
 
-WORKSRC = $(WORKDIR)/$(DISTNAME)
+PACKAGES += CSWtcpwrapper
+SPKG_DESC_CSWtcpwrapper = Wrapper around common tools using libwrap.so.1
+# PKGFILES is catchall
+RUNTIME_DEP_PKGS_CSWtcpwrapper += CSWlibwrap1
+OBSOLETED_BY_CSWtcpwrapper += CSWtcpwrap
+CATALOGNAME_CSWtcpwrap = tcpwrappers_stub
 
-PACKAGES = CSWtcpwrap
-CATALOGNAME = tcpwrappers
+PACKAGES += CSWlibwrap1
+SPKG_DESC_CSWlibwrap1 = Socket wrappers for pre-screening tcp connections 
(ipv6.4 patched), libwrap.so.1
+PKGFILES_CSWlibwrap1 += $(call pkgfiles_lib,libwrap.so.1)
+PKGFILES_CSWlibwrap1 += $(mandir)/man5/.*
 SPKG_DESC_CSWtcpwrap = $(DESCRIPTION)
 
-SPKG_VERSION = $(BASEVERSION)
+PACKAGES += CSWlibwrap-dev
+SPKG_DESC_CSWlibwrap-dev = Development files for libwrap.so.1
+PKGFILES_CSWlibwrap-dev += $(PKGFILES_DEVEL)
+RUNTIME_DEP_PKGS_CSWlibwrap-dev += CSWlibwrap1
 
-EXTRA_MODULATORS = EXTENDED
-MODULATIONS_EXTENDED = on off
-
 BUILD_ARGS = REAL_DAEMON_DIR=/usr/sbin
 BUILD_ARGS += STYLE=-DPROCESS_OPTIONS
 BUILD_ARGS += USER_CFLAGS="$(CFLAGS)"
 BUILD_ARGS += LIBS="-lsocket -lnsl"
 
+# EXTENDED = off
+EXTENDED = on
+
 BUILD64 = 1
+NOISALIST = 1
 
 CONFIGURE_SCRIPTS =
 
@@ -53,64 +62,41 @@
 # No test suite
 TEST_SCRIPTS =
 
-LIBNAME_EXTENDED-off = libwrap-std.so.0
-LIBNAME_EXTENDED-on  = libwrap-ext.so.0
-
 INSTALL_SCRIPTS = custom
 
-MERGE_SCRIPTS_isa-default-extended-off = copy-all
- MERGE_SCRIPTS_isa-default-extended-on = copy-only
-    MERGE_DIRS_isa-default-extended-on = $(libdir)
+MIGRATE_FILES_CSWlibwrap1 = hosts.allow hosts.deny
 
-MERGE_SCRIPTS_isa-default64-extended-off = copy-relocated-only
-   MERGE_DIRS_isa-default64-extended-off = $(libdir)
- MERGE_SCRIPTS_isa-default64-extended-on = copy-relocated-only
-    MERGE_DIRS_isa-default64-extended-on = $(libdir)
+# This is an example to /usr/local/lib/ntalkd
+CHECKPKG_OVERRIDES_CSWtcpwrapper += 
file-with-bad-content|/usr/local|root/opt/csw/share/man/man8/tcpd.8
 
-MIGRATE_FILES = hosts.allow hosts.deny
+include gar/category.mk
 
-ALTERNATIVES = std ext
-ALTERNATIVE_std  = $(libdir)/libwrap.so.0 tcpwrappers 
$(libdir)/libwrap-std.so.0 200
-ALTERNATIVE_std += $(libdir)/$(ISA_DEFAULT64)/libwrap.so.0 tcpwrappers64 
$(libdir)/$(ISA_DEFAULT64)/libwrap-std.so.0
-ALTERNATIVE_ext  = $(libdir)/libwrap.so.0 tcpwrappers 
$(libdir)/libwrap-ext.so.0 100
-ALTERNATIVE_ext += $(libdir)/$(ISA_DEFAULT64)/libwrap.so.0 tcpwrappers64 
$(libdir)/$(ISA_DEFAULT64)/libwrap-ext.so.0
+SPKG_VERSION = $(subst -,_,$(VERSION))
 
-POSTMSG = $(docdir)/$(CATALOGNAME)/CSWtcpwrap.postmsg
+post-extract-modulated:
+       -cd $(WORKSRC) && perl -pi -e 's,/etc/hosts\.,$(sysconfdir)/hosts.,g' \
+               hosts_access.3 \
+               hosts_access.5 \
+               tcpd.8 \
+               tcpdchk.8 \
+               tcpdmatch.8
+       @$(MAKECOOKIE)
 
-PACKAGES += CSWlibwrap0
-CATALOGNAME_CSWlibwrap0 = libwrap0
-PKGFILES_CSWlibwrap0 += $(call baseisadirs,$(libdir),libwrap\.so\.0(\.\d+)*)
-SPKG_DESC_CSWlibwrap0 += $(DESCRIPTION), libwrap.so.0
-RUNTIME_DEP_PKGS_CSWtcpwrap += CSWlibwrap0
-
-PACKAGES += CSWtcpwrap-dev
-SPKG_DESC_CSWtcpwrap-dev = $(DESCRIPTION) development package
-PKGFILES_CSWtcpwrap-dev += $(PKGFILES_DEVEL)
-CATALOGNAME_CSWtcpwrap-dev = tcpwrappers_dev
-
-# These binaries link against libwrap.so which will be linked by alternatives
-# after package install. Until then they can obviously not link properly.
-CHECKPKG_OVERRIDES  = symbol-not-found|tcpdmatch
-CHECKPKG_OVERRIDES += symbol-not-found|tcpd
-CHECKPKG_OVERRIDES += symbol-not-found|try-from
-CHECKPKG_OVERRIDES += symbol-not-found|tcpdchk
-
-include gar/category.mk
-
 build-custom:
-       $(MAKE) -C $(WORKSRC) $(BUILD_ARGS) $(BUILD_TARGET_EXTENDED_$(EXTENDED))
+       $(BUILD_ENV) $(MAKE) -C $(WORKSRC) $(BUILD_ARGS) 
$(BUILD_TARGET_EXTENDED_$(EXTENDED))
        @$(MAKECOOKIE)
 
 install-custom:
-       @echo " => Installing $(CATALOGNAME)"
-       ginstall -d $(DESTDIR)$(docdir)/$(CATALOGNAME)
-       cd $(WORKDIR) && ginstall -v -m 644 README 
$(DESTDIR)$(docdir)/$(CATALOGNAME)
+       @echo " => Installing tcpwrapper"
+       ginstall -d $(DESTDIR)$(docdir)/tcpwrapper"
+       cd $(WORKDIR) && ginstall -v -m 644 README 
$(DESTDIR)$(docdir)/tcpwrapper/README
        ginstall -d $(DESTDIR)$(libexecdir)
        cd $(WORKSRC) && ginstall -v -m 755 safe_finger tcpd tcpdchk tcpdmatch 
try-from $(DESTDIR)$(libexecdir)
        ginstall -d $(DESTDIR)$(includedir)
        cd $(WORKSRC) && ginstall -v -m 644 tcpd.h $(DESTDIR)$(includedir)
        ginstall -d $(DESTDIR)$(libdir)
-       cd $(WORKSRC) && ginstall -v -m 644 libwrap.so.0 
$(DESTDIR)$(libdir)/$(LIBNAME_EXTENDED-$(EXTENDED))
+       cd $(WORKSRC) && ginstall -v -m 644 libwrap.so.1 
$(DESTDIR)$(libdir)/libwrap.so.1
+       gln -s libwrap.so.1 $(DESTDIR)$(libdir)/libwrap.so
        ginstall -d $(DESTDIR)$(mandir)/man3
        cd $(WORKSRC) && ginstall -v -m 644 *.3 $(DESTDIR)$(mandir)/man3
        ginstall -d $(DESTDIR)$(mandir)/man5
@@ -119,17 +105,3 @@
        cd $(WORKSRC) && ginstall -v -m 644 *.8 $(DESTDIR)$(mandir)/man8
        @$(MAKECOOKIE)
 
-post-merge:
-       ginstall -d $(PKGROOT)$(dir $(POSTMSG))
-       ginstall $(WORKDIR)/$(notdir $(POSTMSG)) $(PKGROOT)$(POSTMSG)
-       ln -s libwrap.so.0 $(PKGROOT)$(libdir)/libwrap.so
-       ln -s libwrap.so.0 $(PKGROOT)$(libdir)/$(ISA_DEFAULT64)/libwrap.so
-       @# As libwrap.so.0 is the SONAME to be bound against we must register 
it with the package
-       @# to allow chkpkg to look up the pkgname for the library. This is 
rewritten by alternatives
-       @# on installation and is solely to register the link path, the 
destination doesn't matter.
-       ln -s /etc/opt/csw/alternatives/tcpwrappers 
$(PKGROOT)$(libdir)/libwrap.so.0
-       ln -s /etc/opt/csw/alternatives/tcpwrappers64 
$(PKGROOT)$(libdir)/$(ISA_DEFAULT64)/libwrap.so.0
-       @$(MAKECOOKIE)
-
-SPKG_REVSTAMP := $(SPKG_REVSTAMP)_rev=$(RELEASE)
-

Deleted: csw/mgar/pkg/tcpwrappers/trunk/files/CSWtcpwrap.postmsg
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/CSWtcpwrap.postmsg     2011-08-24 
10:49:53 UTC (rev 15424)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/CSWtcpwrap.postmsg     2011-08-24 
11:52:00 UTC (rev 15425)
@@ -1,12 +0,0 @@
-There are now two versions of tcpwrappers on the system installed:
-
-  * libwrap-std.so.1  The "standard" tcp wrapper library
-  * libwrap-ext.so.1  The "extended" tcp wrapper library
-
-You can easily select between the versions with the alternatives(8)
-system by executing
-
-  /opt/csw/sbin/alternatives --config tcpwrappers
-
-See http://wiki.opencsw.org/package-alternatives for details.
-

Modified: csw/mgar/pkg/tcpwrappers/trunk/files/README
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/README 2011-08-24 10:49:53 UTC (rev 
15424)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/README 2011-08-24 11:52:00 UTC (rev 
15425)
@@ -15,14 +15,5 @@
 This is to allow for ./configure style tests, that break in the transition
 from lib.a to lib.so
 
-
-Note also that there are TWO versions of libwrap.so: 
-libwrap-std.so.1      The "standard" tcp wrapper library
-libwrap-ext.so.1      The "extended" tcp wrapper library
-
-By default, /opt/csw/lib/libwrap.so.1 is linked to the std version.
-To use the extended syntax in hosts_options(5), you need to change
-the link to point to libwrap-ext.so.1
-Unfortunately, the syntax for the two versions, is slightly incompatible,
-which is why there are two versions.
-
+libwrap has been compiled to use the "extended" syntax as described in
+hosts_options(5).

Deleted: csw/mgar/pkg/tcpwrappers/trunk/files/man.patch
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/man.patch      2011-08-24 10:49:53 UTC 
(rev 15424)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/man.patch      2011-08-24 11:52:00 UTC 
(rev 15425)
@@ -1,154 +0,0 @@
-diff -Naur tcp_wrappers_7.6-ipv6.4.orig/hosts_access.3 
tcp_wrappers_7.6-ipv6.4.patched/hosts_access.3
---- tcp_wrappers_7.6-ipv6.4.orig/hosts_access.3        1996-02-11 
17:01:27.000000000 +0100
-+++ tcp_wrappers_7.6-ipv6.4.patched/hosts_access.3     2009-09-11 
18:54:28.630235290 +0200
-@@ -78,7 +78,7 @@
- hosts_access(5), format of the access control tables.
- hosts_options(5), optional extensions to the base language.
- .SH FILES
--/etc/hosts.allow, /etc/hosts.deny, access control tables.
-+/etc/opt/csw/hosts.allow, /etc//opt/csw/hosts.deny, access control tables.
- .SH BUGS
- hosts_access() uses the strtok() library function. This may interfere
- with other code that relies on strtok().
-diff -Naur tcp_wrappers_7.6-ipv6.4.orig/hosts_access.5 
tcp_wrappers_7.6-ipv6.4.patched/hosts_access.5
---- tcp_wrappers_7.6-ipv6.4.orig/hosts_access.5        1995-01-30 
19:51:47.000000000 +0100
-+++ tcp_wrappers_7.6-ipv6.4.patched/hosts_access.5     2009-09-11 
18:54:28.633332432 +0200
-@@ -21,10 +21,10 @@
- at the first match:
- .IP \(bu
- Access will be granted when a (daemon,client) pair matches an entry in
--the \fI/etc/hosts.allow\fR file.
-+the \fI/etc/opt/csw/hosts.allow\fR file.
- .IP \(bu
- Otherwise, access will be denied when a (daemon,client) pair matches an
--entry in the \fI/etc/hosts.deny\fR file.
-+entry in the \fI/etc/opt/csw/hosts.deny\fR file.
- .IP \(bu
- Otherwise, access will be granted.
- .PP
-@@ -268,7 +268,7 @@
- file:
- .PP
- .ne 2
--/etc/hosts.deny: 
-+/etc/opt/csw/hosts.deny: 
- .in +3
- ALL: ALL
- .PP
-@@ -279,7 +279,7 @@
- For example:
- .PP
- .ne 2
--/etc/hosts.allow: 
-+/etc/opt/csw/hosts.allow: 
- .in +3
- ALL: LOCAL @some_netgroup
- .br
-@@ -298,7 +298,7 @@
- that it can be omitted.  The explicitly non-authorized hosts are listed
- in the deny file. For example:
- .PP
--/etc/hosts.deny:
-+/etc/opt/csw/hosts.deny:
- .in +3
- ALL: some.host.name, .some.domain
- .br
-@@ -313,13 +313,13 @@
- host. The result is mailed to the superuser.
- .PP
- .ne 2
--/etc/hosts.allow:
-+/etc/opt/csw/hosts.allow:
- .in +3
- .nf
- in.tftpd: LOCAL, .my.domain
- .PP
- .ne 2
--/etc/hosts.deny:
-+/etc/opt/csw/hosts.deny:
- .in +3
- .nf
- in.tftpd: ALL: (/some/where/safe_finger -l @%h | \\
-@@ -353,8 +353,8 @@
- .SH FILES
- .na
- .nf
--/etc/hosts.allow, (daemon,client) pairs that are granted access.
--/etc/hosts.deny, (daemon,client) pairs that are denied access.
-+/etc/opt/csw/hosts.allow, (daemon,client) pairs that are granted access.
-+/etc/opt/csw/hosts.deny, (daemon,client) pairs that are denied access.
- .ad
- .fi
- .SH SEE ALSO
-diff -Naur tcp_wrappers_7.6-ipv6.4.orig/tcpd.8 
tcp_wrappers_7.6-ipv6.4.patched/tcpd.8
---- tcp_wrappers_7.6-ipv6.4.orig/tcpd.8        1996-02-21 16:39:16.000000000 
+0100
-+++ tcp_wrappers_7.6-ipv6.4.patched/tcpd.8     2009-09-11 18:54:28.635231817 
+0200
-@@ -146,7 +146,7 @@
- only non-trivial service that is affected by this limitation is
- \fIrexd\fR, which is used by the \fIon(1)\fR command. This is no great
- loss.  On most systems, \fIrexd\fR is less secure than a wildcard in
--/etc/hosts.equiv.
-+/etc/opt/csw/hosts.equiv.
- .PP
- RPC broadcast requests (for example: \fIrwall, rup, rusers\fR) always
- appear to come from the responding host. What happens is that the
-@@ -158,9 +158,9 @@
- .PP
- The default locations of the host access control tables are:
- .PP
--/etc/hosts.allow
-+/etc/opt/csw/hosts.allow
- .br
--/etc/hosts.deny
-+/etc/opt/csw/hosts.deny
- .SH SEE ALSO
- .na
- .nf
-diff -Naur tcp_wrappers_7.6-ipv6.4.orig/tcpdchk.8 
tcp_wrappers_7.6-ipv6.4.patched/tcpdchk.8
---- tcp_wrappers_7.6-ipv6.4.orig/tcpdchk.8     1995-01-08 17:00:31.000000000 
+0100
-+++ tcp_wrappers_7.6-ipv6.4.patched/tcpdchk.8  2009-09-11 18:54:28.636911201 
+0200
-@@ -8,7 +8,7 @@
- \fItcpdchk\fR examines your tcp wrapper configuration and reports all
- potential and real problems it can find. The program examines the
- \fItcpd\fR access control files (by default, these are
--\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR), and compares the
-+\fI/etc/opt/csw/hosts.allow\fR and \fI/etc/opt/csw/hosts.deny\fR), and 
compares the
- entries in these files against entries in the \fIinetd\fR or \fItlid\fR
- network configuration files.
- .PP
-@@ -44,9 +44,9 @@
- .PP
- The default locations of the \fItcpd\fR access control tables are:
- .PP
--/etc/hosts.allow
-+/etc/opt/csw/hosts.allow
- .br
--/etc/hosts.deny
-+/etc/opt/csw/hosts.deny
- .SH SEE ALSO
- .na
- .nf
-diff -Naur tcp_wrappers_7.6-ipv6.4.orig/tcpdmatch.8 
tcp_wrappers_7.6-ipv6.4.patched/tcpdmatch.8
---- tcp_wrappers_7.6-ipv6.4.orig/tcpdmatch.8   1996-02-11 17:01:36.000000000 
+0100
-+++ tcp_wrappers_7.6-ipv6.4.patched/tcpdmatch.8        2009-09-11 
18:54:28.638584325 +0200
-@@ -11,7 +11,7 @@
- request for service.  Examples are given below.
- .PP
- The program examines the \fItcpd\fR access control tables (default
--\fI/etc/hosts.allow\fR and \fI/etc/hosts.deny\fR) and prints its
-+\fI/etc/opt/csw/hosts.allow\fR and \fI/etc/opt/csw/hosts.deny\fR) and prints 
its
- conclusion.  For maximal accuracy, it extracts additional information
- from your \fIinetd\fR or \fItlid\fR network configuration file.
- .PP
-@@ -76,9 +76,9 @@
- .PP
- The default locations of the \fItcpd\fR access control tables are:
- .PP
--/etc/hosts.allow
-+/etc/opt/csw/hosts.allow
- .br
--/etc/hosts.deny
-+/etc/opt/csw/hosts.deny
- .SH SEE ALSO
- .na
- .nf

Modified: csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch
===================================================================
--- csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch        2011-08-24 
10:49:53 UTC (rev 15424)
+++ csw/mgar/pkg/tcpwrappers/trunk/files/sharedlib.patch        2011-08-24 
11:52:00 UTC (rev 15425)
@@ -8,8 +8,8 @@
 +sunos5-shared:
 +      @$(MAKE) REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
 +      LIBS="-lsocket -lnsl" RANLIB=/bin/true \
-+      AR=ld ARFLAGS="-G -h libwrap.so.0 -lsocket -lnsl -o " \
-+      LIB=libwrap.so.0 VSYSLOG= \
++      AR=ld ARFLAGS="-G -h libwrap.so.1 -lsocket -lnsl -o " \
++      LIB=libwrap.so.1 VSYSLOG= \
 +      NETGROUP=-DNETGROUP AUX_OBJ="setenv.o sharedhack.o" TLI=-DTLI \
 +      BUGS="$(BUGS) -DSOLARIS_24_GETHOSTBYNAME_BUG" IPV6="$(IPV6)" \
 +      EXTRA_CFLAGS="-DUSE_STRERROR -Kpic" all
@@ -17,8 +17,8 @@
 +sunos5-sharedext:
 +      @$(MAKE) REAL_DAEMON_DIR=$(REAL_DAEMON_DIR) STYLE=$(STYLE) \
 +      LIBS="-lsocket -lnsl" RANLIB=/bin/true \
-+      AR=ld ARFLAGS="-G -h libwrap.so.0 -lsocket -lnsl -o " \
-+      LIB=libwrap.so.0 VSYSLOG= STYLE=-DPROCESS_OPTIONS \
++      AR=ld ARFLAGS="-G -h libwrap.so.1 -lsocket -lnsl -o " \
++      LIB=libwrap.so.1 VSYSLOG= STYLE=-DPROCESS_OPTIONS \
 +      NETGROUP=-DNETGROUP AUX_OBJ="setenv.o sharedhack.o" TLI=-DTLI \
 +      BUGS="$(BUGS) -DSOLARIS_24_GETHOSTBYNAME_BUG" IPV6="$(IPV6)" \
 +      EXTRA_CFLAGS="-DUSE_STRERROR -Kpic" all

This was sent by the SourceForge.net collaborative development platform, the 
world's largest Open Source development site.

_______________________________________________
devel mailing list
devel@lists.opencsw.org
https://lists.opencsw.org/mailman/listinfo/devel

Reply via email to