From de935ef74bcceb17b946f649f3fd54f3e8624f81 Mon Sep 17 00:00:00 2001 From: Brandon Philips Date: Thu, 4 Apr 2013 22:25:53 -0700 Subject: [PATCH] chore(app-misc/ca-certificates): import from portage --- .../app-misc/ca-certificates/ChangeLog | 351 ++++++++++++++++++ .../app-misc/ca-certificates/Manifest | 45 +++ .../ca-certificates-20090709.ebuild | 72 ++++ .../ca-certificates-20110421.ebuild | 72 ++++ .../ca-certificates-20110502-r1.ebuild | 72 ++++ .../ca-certificates-20110502-r2.ebuild | 87 +++++ .../ca-certificates-20110502-r3.ebuild | 95 +++++ .../ca-certificates-20110502-r4.ebuild | 98 +++++ .../ca-certificates-20110502.ebuild | 72 ++++ .../ca-certificates-20111025.ebuild | 100 +++++ .../ca-certificates-20120212.ebuild | 100 +++++ .../ca-certificates-20120623.ebuild | 100 +++++ .../ca-certificates-20121114.ebuild | 100 +++++ .../ca-certificates-20130119.ebuild | 98 +++++ .../files/ca-certificates-20090709-root.patch | 107 ++++++ .../files/ca-certificates-20110502-root.patch | 110 ++++++ .../app-misc/ca-certificates/metadata.xml | 5 + 17 files changed, 1684 insertions(+) create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ChangeLog create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/Manifest create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20090709.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110421.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r1.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r2.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r3.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r4.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20111025.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20120212.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20120623.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20121114.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20130119.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/files/ca-certificates-20090709-root.patch create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/files/ca-certificates-20110502-root.patch create mode 100644 sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/metadata.xml diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ChangeLog b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ChangeLog new file mode 100644 index 0000000000..3e503de606 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ChangeLog @@ -0,0 +1,351 @@ +# ChangeLog for app-misc/ca-certificates +# Copyright 1999-2013 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/ca-certificates/ChangeLog,v 1.72 2013/03/23 08:57:13 vapier Exp $ + +*ca-certificates-20130119 (23 Mar 2013) + + 23 Mar 2013; Mike Frysinger + +ca-certificates-20130119.ebuild: + Version bump #458658 by Manuel Rüger. + + 19 Feb 2013; Zac Medico ca-certificates-20121114.ebuild: + Add ~arm-linux keyword. + +*ca-certificates-20121114 (17 Dec 2012) + + 17 Dec 2012; Mike Frysinger + +ca-certificates-20121114.ebuild: + Version bump #447132 by Manuel Rüger. + +*ca-certificates-20120623 (28 Jun 2012) + + 28 Jun 2012; Mike Frysinger + +ca-certificates-20120623.ebuild: + Version bump #423897 by Manuel Rüger. + +*ca-certificates-20120212 (11 May 2012) + + 11 May 2012; Mike Frysinger + +ca-certificates-20120212.ebuild: + Version bump #415395 by Manuel Rüger. + + 26 Apr 2012; Alexis Ballier + ca-certificates-20111025.ebuild: + keyword ~amd64-fbsd + + 25 Jan 2012; Mike Frysinger + ca-certificates-20111025.ebuild: + Mark ppc64 stable #394223. + + 04 Jan 2012; Brent Baude ca-certificates-20111025.ebuild: + Marking ca-certificates-20111025 ppc for bug 394223 + + 01 Jan 2012; Raúl Porcel + ca-certificates-20111025.ebuild: + alpha/ia64/m68k/s390/sh/sparc stable wrt #394223 + + 31 Dec 2011; Mike Frysinger + ca-certificates-20111025.ebuild: + Block older portages which do not handle unicode filenames in non-unicode + locales #394223. + + 26 Dec 2011; Markus Meier + ca-certificates-20111025.ebuild: + arm stable, bug #394223 + + 22 Dec 2011; Agostino Sarubbo + ca-certificates-20111025.ebuild: + Stable for X86, wrt bug #394223 + + 12 Dec 2011; Agostino Sarubbo + ca-certificates-20111025.ebuild: + Stable for AMD64, wrt bug #394223 + + 12 Dec 2011; Jeroen Roovers ca-certificates-20111025.ebuild: + Stable for HPPA (bug #394223). + +*ca-certificates-20111025 (29 Oct 2011) + + 29 Oct 2011; Robin H. Johnson + +ca-certificates-20111025.ebuild: + Bug #388845: version bump, includes new CACert intermediate SHA256 certs. + + 07 Sep 2011; Fabian Groffen + ca-certificates-20110502-r4.ebuild: + Fix compilation on platforms where /bin/sh is bourne, but not POSIX shell + (e.g. Solaris, AIX, etc.) + + 07 Sep 2011; Fabian Groffen + ca-certificates-20110502-r4.ebuild: + Update RELPATH to compensate for the added offset. + +*ca-certificates-20110502-r4 (07 Sep 2011) + + 07 Sep 2011; Mike Frysinger + +ca-certificates-20110502-r4.ebuild, + +files/ca-certificates-20110502-root.patch: + Generate relative symlinks to certs when using --root so c_rehash works + properly. + + 07 Sep 2011; Mike Frysinger + ca-certificates-20110502-r3.ebuild: + Remove old mktemp depends, and move deb2targz to DEPEND since it is only + needed to unpack the pkg. + +*ca-certificates-20110502-r3 (05 Sep 2011) + + 05 Sep 2011; Fabian Groffen + +ca-certificates-20110502-r3.ebuild: + Fix for Prefix migration gone bad. Make sure update-ca-certificates knows + about the offset, such that it doesn't generate symlinks pointing outside the + offset. Bug #381937 + + 03 Sep 2011; Fabian Groffen + ca-certificates-20110502-r2.ebuild: + Create ED, so we can actually copy files into it, when D != ED (on Prefix) + + 03 Sep 2011; Raúl Porcel + ca-certificates-20110502-r1.ebuild: + arm/ia64/m68k/s390/sh/sparc/x86 stable wrt #381169 + + 03 Sep 2011; Kacper Kowalik + ca-certificates-20110502-r1.ebuild: + ppc/ppc64 stable wrt #381169 + + 03 Sep 2011; Jeroen Roovers + ca-certificates-20110502-r1.ebuild: + Stable for HPPA (bug #381169). + + 02 Sep 2011; Jeremy Olexa + ca-certificates-20110502-r2.ebuild: + Add Gentoo Prefix support, convert to EAPI3, use prefix variables, modify + ROOT variable in update-ca-certificates script. Signed off by maintainer with + discussion + +*ca-certificates-20110502-r2 (02 Sep 2011) + + 02 Sep 2011; Mike Frysinger + +files/ca-certificates-20090709-root.patch, + +ca-certificates-20110502-r2.ebuild: + Move the config file generation to src_compile for most people to make + binpkgs easier to deploy. + + 01 Sep 2011; Tony Vroon + ca-certificates-20110502-r1.ebuild: + Marked stable on AMD64 based on arch testing by Agostino "ago" Sarubbo in + security bug #381169 filed by Alex "a3li" Legler. + + 01 Sep 2011; Tobias Klausmann + ca-certificates-20110502-r1.ebuild: + Stable on alpha, bug #381169 + +*ca-certificates-20110502-r1 (01 Sep 2011) + + 01 Sep 2011; Robin H. Johnson + +ca-certificates-20110502-r1.ebuild: + One more version bump to 20110502+nmu1 that actually has the DigiNotar CA + removed. + +*ca-certificates-20110502 (31 Aug 2011) + + 31 Aug 2011; Robin H. Johnson + +ca-certificates-20110502.ebuild: + Version bump for bug #381169 + +*ca-certificates-20110421 (16 May 2011) + + 16 May 2011; Mike Frysinger + +ca-certificates-20110421.ebuild: + Version bump #367007 by Matija Šuklje. + + 16 Oct 2009; Mounir Lamouri + ca-certificates-20090709.ebuild: + Stabilizing for ppc, bug 287409 + + 09 Oct 2009; Richard Freeman + ca-certificates-20090709.ebuild: + amd64 stable - 287409 + + 06 Oct 2009; Jeroen Roovers + ca-certificates-20090709.ebuild: + Stable for HPPA (bug #287409). + + 04 Oct 2009; Raúl Porcel + ca-certificates-20090709.ebuild: + alpha/arm/ia64/m68k/s390/sh/sparc stable wrt #287409 + + 03 Oct 2009; Christian Faulhammer + ca-certificates-20090709.ebuild: + stable x86, bug 287409 + + 03 Oct 2009; Brent Baude + ca-certificates-20090709.ebuild: + Marking ca-certificates-20090709 ppc64 for bug 287409 + +*ca-certificates-20090709 (20 Jul 2009) + + 20 Jul 2009; Mike Frysinger + +ca-certificates-20090709.ebuild: + Version bump. + + 28 Dec 2008; Tobias Scherbaum + ca-certificates-20080809.ebuild: + ppc stable, bug #252532 + + 27 Dec 2008; Brent Baude + ca-certificates-20080809.ebuild: + stable ppc64, bug 252532 + + 27 Dec 2008; Guy Martin + ca-certificates-20080809.ebuild: + hppa stable, #252532 + + 27 Dec 2008; Jeremy Olexa + ca-certificates-20080809.ebuild: + amd64 stable, bug 252532 + + 26 Dec 2008; Raúl Porcel + ca-certificates-20080809.ebuild: + alpha/arm/ia64/s390/sh/sparc/x86 stable wrt #252532 + + 27 Nov 2008; Mike Frysinger + ca-certificates-20080514-r2.ebuild, ca-certificates-20080809.ebuild: + Fixup find arguments #249092 by Maryasin Semen. + + 08 Nov 2008; Robin H. Johnson + ca-certificates-20080514-r2.ebuild, ca-certificates-20080809.ebuild: + Add help on how to batch remove for now. + + 26 Oct 2008; nixnut + ca-certificates-20080514-r2.ebuild: + Stable on ppc wrt bug 244416 + +*ca-certificates-20080809 (20 Aug 2008) + + 20 Aug 2008; Robin H. Johnson + +ca-certificates-20080809.ebuild: + Version bump. + + 18 Aug 2008; Brent Baude + ca-certificates-20080514-r2.ebuild: + stable ppc64, bug 233576 + + 18 Aug 2008; Jeroen Roovers + ca-certificates-20080514-r2.ebuild: + Stable for HPPA (bug #233576). + + 16 Aug 2008; Olivier Crête + ca-certificates-20080514-r2.ebuild: + Stable on amd64, bug #233576 + + 16 Aug 2008; Raúl Porcel + ca-certificates-20080514-r2.ebuild: + alpha/ia64/sparc/x86 stable wrt #233576 + + 16 Aug 2008; nixnut + ca-certificates-20080514-r1.ebuild: + Stable on ppc wrt bug 233576 + +*ca-certificates-20080514-r2 (16 Aug 2008) + + 16 Aug 2008; Robin H. Johnson + +files/ca-certificates-20080514-warn-on-bad-symlinks.patch, + +ca-certificates-20080514-r2.ebuild: + Patch per bug #234816, give a warning for every broken symlink - as their + existence can cause various SSL validation routines to fail. + + 10 Jun 2008; Robin H. Johnson + ca-certificates-20080514-r1.ebuild: + Update the RDEPEND per bug #225759. + + 31 May 2008; Robin H. Johnson + ca-certificates-20070303-r1.ebuild, ca-certificates-20080514.ebuild, + ca-certificates-20080514-r1.ebuild: + Fix up the HOMEPAGE, as it merely contains cacert stuff, but it's actually + from Debian. + + 31 May 2008; Robin H. Johnson + ca-certificates-20070303-r1.ebuild: + Drop to ~mips to make repoman happy. + +*ca-certificates-20080514-r1 (31 May 2008) + + 31 May 2008; Robin H. Johnson + +ca-certificates-20080514-r1.ebuild: + Include a bit of CONFIG_PROTECT_MASK magic, so that the + /etc/ca-certificates.conf is updated before update-ca-certificates is run, + resolves bug #177397. + +*ca-certificates-20080514 (25 May 2008) + + 25 May 2008; Robin H. Johnson + +ca-certificates-20080514.ebuild: + Version bump for ca-certificates. + + 28 Mar 2008; Alexis Ballier + ca-certificates-20070303-r1.ebuild: + freebsd-ubin also provides mktemp, this allows us to install + ca-certificates again; bug #215209 + + 27 Mar 2008; Mike Frysinger + ca-certificates-20070303-r1.ebuild: + RDEPEND on mktemp since the update script uses it. + + 31 Jan 2008; Doug Klima + ca-certificates-20070303-r1.ebuild: + need coreutils-6.10-r1 + + 31 Jan 2008; Mike Frysinger + ca-certificates-20070303-r1.ebuild: + Depend on mktemp or coreutils #208258 by Chris Gianelloni. + + 23 Jun 2007; Daniel Drake + ca-certificates-20050804.ebuild, ca-certificates-20061027.2.ebuild, + ca-certificates-20070303-r1.ebuild: + Change LICENSE to MPL-1.1, bug #176002 + +*ca-certificates-20070303-r1 (06 May 2007) + + 06 May 2007; Mike Frysinger + +ca-certificates-20070303-r1.ebuild: + Fix ca-certificates.conf generation #177298 by Remy Blank. + +*ca-certificates-20070303 (05 May 2007) + + 05 May 2007; Mike Frysinger + +ca-certificates-20070303.ebuild: + Version bump #175999 by Daniel Drake. + +*ca-certificates-20061027.2 (20 Feb 2007) + + 20 Feb 2007; Mike Frysinger + +ca-certificates-20061027.2.ebuild: + Version bump #167608 by Peter Gantner. + + 03 Feb 2007; Mike Frysinger + ca-certificates-20050804.ebuild: + Fixup doc installation #164995 by Krzysiek Pawlik. + + 17 Oct 2006; Roy Marples + ca-certificates-20050804.ebuild: + Added ~sparc-fbsd keyword. + + 27 Apr 2006; Alec Warner + files/digest-ca-certificates-20050518, + files/digest-ca-certificates-20050804, Manifest: + Fixing duff SHA256 digests: Bug # 131293 + + 30 Mar 2006; Diego Pettenò + ca-certificates-20050804.ebuild: + Add ~x86-fbsd keyword. + +*ca-certificates-20050804 (04 Sep 2005) + + 04 Sep 2005; Daniel Black + +ca-certificates-20050804.ebuild: + version bump + +*ca-certificates-20050518 (23 May 2005) + + 23 May 2005; Mike Frysinger : + Initial import. Ebuild submitted by me for #93520. diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/Manifest b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/Manifest new file mode 100644 index 0000000000..0d18e97c45 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/Manifest @@ -0,0 +1,45 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA256 + +AUX ca-certificates-20090709-root.patch 2842 SHA256 701da246597154c37b5c9ff6999730fe8b76fe10811f71b2d1eded50a2f4f175 SHA512 d7aa7f51099ffb254184bbe84a9129e2b682311eed585f43286c716a4e1d3857144ebb40074b1ec921a16d6a3a771b37d74300bf581b3ca8427d18998fad8ebe WHIRLPOOL 7c10e00fa48abe1756533f599364aab26253ede01c9b6d0563ae1848ec62657b863eb897ce0c16c53e0a353024025c0c5b9d112fdbfcb3f5754882e4a8feabce +AUX ca-certificates-20110502-root.patch 2942 SHA256 7f2273b748140c5806c37e954bb27846cb0b8bdddda15ba0f23d3fcae6e77e28 SHA512 972798239229d7d32b4e3c52a962f67db79eaafcbfac03683283861d2ed049daa5d2c77ef05343606afaed108bd8513c9aa588545049263ec8be598dfdb20d96 WHIRLPOOL 667d62670c3e498a69e46ba7d384fdacb37631ed887e7c4b110745905a8a28fdcc69e97778e1d177eb2ce68d724f0852e66f324025ecf059b1bc615c2cdf9d53 +DIST ca-certificates_20090709_all.deb 154620 SHA256 de1e35997eb39c7ba5713f206aba034ff8ce8aa3aebebfc7eb1823de9968d767 SHA512 2237f03c6794f33e5dde2acc05c04447daf2b8a41fc4182297d971cf4bc1eb2ae1abdf21561fb8fdf9dad27465e63c17b8bd2060d3b270edcfdf22c5c5cb094d WHIRLPOOL 174facc0da0677baae403a0e9234692768d6a6342a1894116561a2c41878850cdc603c3556961641ba743fe347c436adef1d914060b23767549dd40041c4120c +DIST ca-certificates_20110421_all.deb 176778 SHA256 a60a9c0faf1847df4553ce13ffe337412b88dd1b9d502741ac1760204c0bdda3 SHA512 11c9ba3f483cd17ca964f19e6ec394a2239fd74187f57224d7b13d1c0bf5dc55bb6c66217c1dd8273695ff92710617a897f7a40be6e4ec9960276f1bfe6b2bbb WHIRLPOOL 67dee5217526d5abec740f367fe28ce0f823d3c21b99fc988b73e75859e47beb00cb76e3d83572e704c3924e45bd9f6a7c818a1a1b2dd3bf7594864c9d9b2c5f +DIST ca-certificates_20110502+nmu1_all.deb 174242 SHA256 d44284ee9b733b9890a54516f66b68a382ac5fb2c0bdceafed4cf229aa3b05a1 SHA512 2ba33346689d21846632390ad55f2a6102a333cc32019a6e00d85c00970a6f744b4a4d548b68bf9b6369d0cfc2b06009db4b4be4ffafd3629bf05737fdc096d2 WHIRLPOOL 88ffbbc68e1299a2b3cc243e1b17160f9862c469279e8dca03841c45defb238c034c8d81abe811a3d32f9968d7754f6d8c64a697cbcba0c2eb4be9d513d527e9 +DIST ca-certificates_20110502_all.deb 175556 SHA256 fa14c729b48ed58f5c048b8721f09fded9824c1f450a656fb2cc396195935a98 SHA512 12b148987c292320e90b7124bf5d0194a3b7d8f1807b13b05461b18798e6a5346e205b065256d0bbdce7bf13d5db2b9c756b0f5a63a309d9164eff973179a363 WHIRLPOOL 79a8dd9c27f094dbe687d61f41d39c26229a21d02713134c71dd0878927eefcbe325cf801b63caf4421a6c97dd21731dd49862e931cef7a5895734039ad877b2 +DIST ca-certificates_20111025_all.deb 185800 SHA256 7d743b307ab31138176d6da4fff1f4c7f6bd246b42698662894bfb1b74e55647 SHA512 4be682158891110d32e8f065af64c597da09476263fdebb860d08387c873e7839b106b6f9ad6be7acfb4e0eb568274e2196377b4e0bbb61aafaeaecaeef88284 WHIRLPOOL 78568cc1b4f21ef7ca747dd9c60d43a98b15da9236c76ce928d416ad0875bd5ec2a1096d7e0551fada838d6ffbfe30366080f698ea4a35ef4748b9833c1550f8 +DIST ca-certificates_20120212_all.deb 176812 SHA256 7e4277a0a5a0ac42c370a93f986839b4e3ff82646581caa8c5135ad0a41d01d7 SHA512 c22cb3b3472deb7819bae6518b136a5af27e4cb29610b12713908ce7effbe5e39f9f1856efd75d071d70016462e66b34d5800ab061a2b3a213e4f2969330f8f0 WHIRLPOOL 306cbafa408ddb0444d5cb547ff201ca5709527db0ca5f4798db751d8ef8df147ef8ffe382adda3cefadd110197104af9bc8e45a6276a2d7739d59ffccd498c5 +DIST ca-certificates_20120623_all.deb 183022 SHA256 41f719a63b8cace12a6cd69dce3fea9720c2702511205c2bab20c5d05528ede7 SHA512 970478971f545919e15f1af7e774043113fee725c7dba89bff27969814d60e1187219fb7f87e250261c54bc0cb03098b69748c33b625f5e5061df65c6bbe019a WHIRLPOOL 07b693dabae839bde3c31548e11d8cb8b0940de6aa1838eab3834ad3a5206f4a32a3cd7d134c9722ce244ac5ed21c5a222b74899972be9f5ae59876c4b61fc22 +DIST ca-certificates_20121114_all.deb 192630 SHA256 f6991820d1c6431a7db42e92efa51f4058e921bdcc491a906dc1309e9ba35286 SHA512 b2810d1b728c71189100352706fda17c6d87f53b5c6fc2dfb78be13fcfb5758ddd7f5a4bb69742c18241bd05809cbbe67b7a4c179e678b8cf46e277b54d77869 WHIRLPOOL a75ef6c7cbb12ab24070ef7cc016dbd03509dc1cee95634281210fc45bd4a620b5854a76349e060f46f1f0844d774a5f53aeac5c34f73e025b890364b70be1ee +DIST ca-certificates_20130119_all.deb 185428 SHA256 08f8e5a1fab74a365c284ed4e353b4f14596f5ef533fced6395ead81fb3a76f7 SHA512 b93621e578dfa5ea224b3528839ca250fd9470dc28b17dd82e8669d64a631cb62218f1c53ebdb165ea3fffcaa8717210132215b5407ea0185e76ac2a11c0d157 WHIRLPOOL 9cedaba913d90f9f10ce7c97bcd248400b17c4fc3016e2fc3fca81333094f33ce60997da49144763fe86d705c458a273fd1e279a0237a1e855ae8ffe6d1e4c51 +EBUILD ca-certificates-20090709.ebuild 2126 SHA256 86820ea4d33d9e0e779c0a0d631242b12821bf4135ec6bccd2c284e948c51b19 SHA512 5c47bd113f19d733219b57c5f5845617fd37802a1a2556af928c6affdb30a210ce91d2b9f97a55c13a22c586f20abe0865a8ec7237ba1841bfadd5cba4184e3a WHIRLPOOL 472cffbb69b7888aeca35faf6e03ae7d862f839b74fef6617d2008f12d8ed6b5f9451ea0f536141b7fd80fd6a121dc8617ad1b87634127fe95557c95f74e1089 +EBUILD ca-certificates-20110421.ebuild 2119 SHA256 1223e4710e2d72fbb97f93bfa77351912b20b6ea07e83c7672bd24b1d812a634 SHA512 324615e914c150b991576df567b5f5042e527d05cd4674e44060771cf7e0e68cfa8495e432fa925d074b6602334d9b80cec50fdad7ae64cb3633c4c9726b42d6 WHIRLPOOL dffadcbc624cee7b9203c8ff6bba375508679c8d87ebb8a12da543d68cc937159b3f26b95bca94c444522e40c30b5b06741f1116233a6af3c6df5a428218fa16 +EBUILD ca-certificates-20110502-r1.ebuild 2116 SHA256 39b705809344be81df5d717a63f7909127481f9ec052c2169d74ac2eda508e68 SHA512 570c7611404cb2cd230bf5925967230aa9e2f90f84bad157d6da522ab5d49c08ae8e6a2170694a094331c549373b2d253388d67a69032f775f9a94dfe476c794 WHIRLPOOL c24f06ad859f69187caacb83ff2835d40d17a7e1e6c03c16cbaf7794c9eab1a2cfb01b7b58290d72abb4f36cec6a655e79efb9a9acd53e99ee5c6d75caf8193e +EBUILD ca-certificates-20110502-r2.ebuild 2858 SHA256 3c67bf66b6bf7d4f17fe3cf4eeb696331e62e201b51cdacd6bfc523ec3b2b0c6 SHA512 fe021b02d31e1cd399bbe98822631018a1a79ed45755d26b642e4aacdd0713e2d3c946d8f60309ecea05790792a02ce5631d52708d82f01b98d21ac0caa0bb94 WHIRLPOOL 6d5f93185329cc7a4ab1362f849a09dfe545826eb91e8fa26dedaa476e7e72d53caf89a9b7ce7b78693662aa1cc7fbbf7f9b1eacd13c2438808c9abe62a8c6e5 +EBUILD ca-certificates-20110502-r3.ebuild 3028 SHA256 878b924558f6dcbf177a2ca5dbc4a4f8fa2410a43a89e003308b34d4eb629a75 SHA512 2881451c22ce8ac6ea2868facd977ea31e0f1ff38d406ccd8e35a5c6a50d001d9ae098c9cd74f8f27603046b77157862dbad92505b55b677aad47119fc7d27c4 WHIRLPOOL 27d82d9d6ea3983fadf024b32a256852188c495c7489fc9aad6a4390510ed48365f8fa1df8bc39dc3d76a8a99c8a29c261bd650498c27322f5e5f54f227c3fae +EBUILD ca-certificates-20110502-r4.ebuild 3144 SHA256 bd241a8fa57a078e1b7ec9412fa116866783b6cd48becaf0bec20b9030851ba7 SHA512 5a88fe08d5e91ff2eca272ab5d18516e6300fd720f3080388745a0a91d13b138175fb63de379fd9fa2d9e80ca6ba8bc8832cd258ee8fbc8d9f81e88f71d28649 WHIRLPOOL a33b739a1254d7c6e586c2e6852e532624c1ab3280860f0ad10ca79d3e575bdbc0585653af4ba380e91eae560a417bf57a0e981acf64894413375ad676492f2e +EBUILD ca-certificates-20110502.ebuild 2120 SHA256 11ba88945cc66cc74f3e2236f0be28ed5e55162b7f1133929f7c4d6c7081dc05 SHA512 88636252ff41dd4a240a9eeead5b9f4458f79c04a7cb222e04da48e24f7d31b8525b282833ddeea72407eed794db4346094641bb3c7965e50e3e1a0d9e9c7e75 WHIRLPOOL a4ed56054a8cd6f7bfa4b1f31311deb89f2f2ce850c652f78924230ad02047360d978bd43d3a2c71bff6fec9861207726d904c11a87dc6f4b8d3c819da1cacb5 +EBUILD ca-certificates-20111025.ebuild 3204 SHA256 8b581d2b09083fd1c7ff07bfc28fdc9e5390a64842aa1e5848ccbf6d80534167 SHA512 d57818033cf6212050aa350261cb52be0b193d93e26ddc5f6d68424d571778b0d0ec1756bc618374b9fa3640af5fd7208c8e8363cf08ce62b31aa6bcbcef6117 WHIRLPOOL 75a0e9d66889fec86c0a1dae08a27791f48a63720cf1cb875c5cf0aefe736fa14c16feca3028c3dc1d83c0dd9245830cb17cde9287d629c0362c26c6b8436b7f +EBUILD ca-certificates-20120212.ebuild 3213 SHA256 191ee71a0d3d37354066c470f9a5825552705464b25d55e31a0d7fe258f5dd80 SHA512 0868fb43a91f47650a32d54a16a42a597fbf575c04c9bd44f8e2c375547c83582ff970a614fa08931e2ed8943eaa222fccfbd888f7f072086f1724f596f3252b WHIRLPOOL 40a419ca3d5edebfeff6c012c016efb8c9dfa24fbd9d82d45c9fc98b666a7037dc8c808f17859ec4d3732d2db628d0587dd4b9eefe4b928e0bde1cdbcacd9409 +EBUILD ca-certificates-20120623.ebuild 3213 SHA256 18144e8009cba175977e1a2214aea47d9598b0efb5a882ec667fd98bae9ebfe9 SHA512 e538c873e0a8a3a0889f1c613233ea32cdd68baca9b87ecd1f5bd49ac5b1d3631a1571c09961d0f537c89f0796459766cc7cdc12de8d23e2adcc4682d8eb5233 WHIRLPOOL 17813bfb5d2565cc95b84f7e46b4303d6f8dbfbc6a2b75596e441772a16293bae112b74d9d7bca397ea0a535a598e92ee98c9d179f9c8263535cc089ac9cb8f9 +EBUILD ca-certificates-20121114.ebuild 3225 SHA256 d7fd5b94ac5931d221ffacc1ed9f45907cf413df60360a44974581cb6d44fb0f SHA512 31cfea64701d6e643015f876a798e0790a8df551c3b6079486ddb5ef72c908f8be5caa1228b4e8d7058f7761c8dab246f786b83dc10194b8d42a7c4c09d22a31 WHIRLPOOL a2ab5fea5ca0c298e1451d6eb5e2502bdc8c201706305b815bc1f4595fe41956eeeb7436d49537d100d281f264a4f1b68bdf298fb6b2df142e43eb95e6be7b28 +EBUILD ca-certificates-20130119.ebuild 3167 SHA256 7f6f6126b8f7209d450e31ad0927f936bf2722bba32f4c7435fb1917f75c8bc5 SHA512 3c5b3ae92d2b8c176cca551891856b57933a078a4b8b408f0c03d8af16cbd838ee42ef65acf7158a0b42f8cac323b0dba92ad024b46aa5d2ab1f750031c95c57 WHIRLPOOL 5cb2dcaf5ecce8ac5b906673a2b23613989a046ac5a78939adfed6f901ce38c7168d471358ea4ceabc34c77a629bff5cc16b5a453dc9f9bb4d52290ce26cdc06 +MISC ChangeLog 11595 SHA256 ee3262b9c445eee69a4f7663d4aeae31bcc097e6c329da5dcd51243dab837322 SHA512 8d4d47da338fd3f0a890f30e7612e280488eb5b87310b40918ff1848f883c4567b5ec5647a001ad38a2a729635d62506916e5bedf54a9475fef76d69a38ef01c WHIRLPOOL d3982879ce6eeaf30c043ac06cfec5b0ed19e14a8e016ae1fc3f4c8ae55f8bf5379f99eed795790947d49b3fb0f6cb5a4e0d82ae6c7b3b0e4984a73f6032f276 +MISC metadata.xml 164 SHA256 f5f2891f2a4791cd31350bb2bb572131ad7235cd0eeb124c9912c187ac10ce92 SHA512 8eb0d5153d388f6ea069c64b93882244816a0a09aecc0d73cb872121ce0eb24c5ccafa96aad0b620b2300f319e1af101fa7fa6c5d0d561719d49bb07da0a2eca WHIRLPOOL 11a1441bddb7a6c69653c663902b7da5767ae6ad515ac2aabfc42fe37927a1ccc21472deeee454009ff720201a41c3e4a912df42661a0a87150fb46126da2d52 +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.0.19 (GNU/Linux) + +iQIcBAEBCAAGBQJRTW9gAAoJELEHsLL7fEFWsTYP/iQf35fbumJEovVD/ba+57sz +O2LaUFAILBiH9hpUvmdUhy3qYaWNCYKby+oLiZljShfmdWuJ3mWTcsaWiMuMsI1v +NXBWThTjS8tSG7EVRwOifFKU2DkalmPdw71PsgPj2z3ArIxfpQVrA8JIBl3UKZev +hzetvd4jm1Pa6Z7n8/OO8QwORYqDW+0KkrQIG/+npcJUKUTda4JmEQqo+eyCXNc4 +j+8dQH+IgZ7cdiKPcMf45VM7hGvVOg7QGEKR23bg6ZT6hfJWkpIvXILENB6YrSCg +OioRG287PykvXjincOKgdBjxWjvNTnXl7hcgPr8m6OrsWaw7Tl/qL8TvOtoLuErl +3eSiiAvy8NbvzxlyHV/qnFDihkB0gfqWeliNgC/ujkr22npR3Uv2O5tUB7Nt7tyX +EYu64gp8izEFuU47Vqs7WF03leYYaGebQnxgGNxPOlFPhyo8xi+k8iCxyfQaRgll +jcpb90fAwcMCqfBlIYYblm/nYBZ468gJfOZYEdHR0Mkkg/1P84flIGj9CRnxM/lv +2N6F39QkljoyM2TcUwTiF0EBjpjpxzpEEuc/Yrxqfw6fZgSl9gl2n4j18OQiHjSc +Yvp5Q2hZJo6KtzH1sMPrlpXOFizuYP0hPik+Mp+wCPhmK0yOGVSTaT/JCghURKXP +EswR5Ad9wV02/OGqc9na +=LtuG +-----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20090709.ebuild b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20090709.ebuild new file mode 100644 index 0000000000..8592c946c9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20090709.ebuild @@ -0,0 +1,72 @@ +# Copyright 1999-2009 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/ca-certificates/ca-certificates-20090709.ebuild,v 1.7 2009/10/21 21:08:59 volkmar Exp $ + +inherit eutils + +DESCRIPTION="Common CA Certificates PEM files" +HOMEPAGE="http://packages.debian.org/sid/ca-certificates" +SRC_URI="mirror://debian/pool/main/c/${PN}/${PN}_${PV}_all.deb" + +LICENSE="MPL-1.1" +SLOT="0" +KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~sparc-fbsd ~x86-fbsd" +IUSE="" + +DEPEND="|| ( >=sys-apps/coreutils-6.10-r1 sys-apps/mktemp sys-freebsd/freebsd-ubin )" +RDEPEND="${DEPEND} + dev-libs/openssl + sys-apps/debianutils" + +S=${WORKDIR} + +src_unpack() { + unpack ${A} + unpack ./data.tar.gz + rm -f control.tar.gz data.tar.gz debian-binary +} + +pkg_setup() { + # For the conversion to having it in CONFIG_PROTECT_MASK, + # we need to tell users about it once manually first. + [[ -f /etc/env.d/98ca-certificates ]] \ + || ewarn "You should run update-ca-certificates manually after etc-update" +} + +src_install() { + cp -pPR * "${D}"/ || die "installing data failed" + + ( + echo "# Automatically generated by ${CAT}/${PF}" + echo "# $(date -u)" + echo "# Do not edit." + cd "${D}"/usr/share/ca-certificates + find . -name '*.crt' | sort | cut -b3- + ) > "${D}"/etc/ca-certificates.conf + + mv "${D}"/usr/share/doc/{ca-certificates,${PF}} || die + prepalldocs + + echo 'CONFIG_PROTECT_MASK="/etc/ca-certificates.conf"' > 98ca-certificates + doenvd 98ca-certificates +} + +pkg_postinst() { + if [ "${ROOT}" = "/" ] ; then + # However it's too overzealous when the user has custom certs in place. + # --fresh is to clean up dangling symlinks + update-ca-certificates + fi + + local badcerts=0 + for c in $(find -L "${ROOT}"etc/ssl/certs/ -type l) ; do + ewarn "Broken symlink for a certificate at $c" + badcerts=1 + done + if [ $badcerts -eq 1 ]; then + ewarn "You MUST remove the above broken symlinks" + ewarn "Otherwise any SSL validation that use the directory may fail!" + ewarn "To batch-remove them, run:" + ewarn "find -L ${ROOT}etc/ssl/certs/ -type l -exec rm {} +" + fi +} diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110421.ebuild b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110421.ebuild new file mode 100644 index 0000000000..e170e12af1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110421.ebuild @@ -0,0 +1,72 @@ +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/ca-certificates/ca-certificates-20110421.ebuild,v 1.1 2011/05/16 03:11:56 vapier Exp $ + +inherit eutils + +DESCRIPTION="Common CA Certificates PEM files" +HOMEPAGE="http://packages.debian.org/sid/ca-certificates" +SRC_URI="mirror://debian/pool/main/c/${PN}/${PN}_${PV}_all.deb" + +LICENSE="MPL-1.1" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~sparc-fbsd ~x86-fbsd" +IUSE="" + +DEPEND="|| ( >=sys-apps/coreutils-6.10-r1 sys-apps/mktemp sys-freebsd/freebsd-ubin )" +RDEPEND="${DEPEND} + dev-libs/openssl + sys-apps/debianutils" + +S=${WORKDIR} + +src_unpack() { + unpack ${A} + unpack ./data.tar.gz + rm -f control.tar.gz data.tar.gz debian-binary +} + +pkg_setup() { + # For the conversion to having it in CONFIG_PROTECT_MASK, + # we need to tell users about it once manually first. + [[ -f /etc/env.d/98ca-certificates ]] \ + || ewarn "You should run update-ca-certificates manually after etc-update" +} + +src_install() { + cp -pPR * "${D}"/ || die + + ( + echo "# Automatically generated by ${CATEGORY}/${PF}" + echo "# $(date -u)" + echo "# Do not edit." + cd "${D}"/usr/share/ca-certificates + find . -name '*.crt' | sort | cut -b3- + ) > "${D}"/etc/ca-certificates.conf + + mv "${D}"/usr/share/doc/{ca-certificates,${PF}} || die + prepalldocs + + echo 'CONFIG_PROTECT_MASK="/etc/ca-certificates.conf"' > 98ca-certificates + doenvd 98ca-certificates +} + +pkg_postinst() { + if [ "${ROOT}" = "/" ] ; then + # However it's too overzealous when the user has custom certs in place. + # --fresh is to clean up dangling symlinks + update-ca-certificates + fi + + local c badcerts=0 + for c in $(find -L "${ROOT}"etc/ssl/certs/ -type l) ; do + ewarn "Broken symlink for a certificate at $c" + badcerts=1 + done + if [ $badcerts -eq 1 ]; then + ewarn "You MUST remove the above broken symlinks" + ewarn "Otherwise any SSL validation that use the directory may fail!" + ewarn "To batch-remove them, run:" + ewarn "find -L ${ROOT}etc/ssl/certs/ -type l -exec rm {} +" + fi +} diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r1.ebuild b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r1.ebuild new file mode 100644 index 0000000000..27c31c5dc4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r1.ebuild @@ -0,0 +1,72 @@ +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/ca-certificates/ca-certificates-20110502-r1.ebuild,v 1.6 2011/09/03 13:14:16 armin76 Exp $ + +inherit eutils + +DESCRIPTION="Common CA Certificates PEM files" +HOMEPAGE="http://packages.debian.org/sid/ca-certificates" +SRC_URI="mirror://debian/pool/main/c/${PN}/${PN}_${PV}+nmu1_all.deb" + +LICENSE="MPL-1.1" +SLOT="0" +KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~sparc-fbsd ~x86-fbsd" +IUSE="" + +DEPEND="|| ( >=sys-apps/coreutils-6.10-r1 sys-apps/mktemp sys-freebsd/freebsd-ubin )" +RDEPEND="${DEPEND} + dev-libs/openssl + sys-apps/debianutils" + +S=${WORKDIR} + +src_unpack() { + unpack ${A} + unpack ./data.tar.gz + rm -f control.tar.gz data.tar.gz debian-binary +} + +pkg_setup() { + # For the conversion to having it in CONFIG_PROTECT_MASK, + # we need to tell users about it once manually first. + [[ -f /etc/env.d/98ca-certificates ]] \ + || ewarn "You should run update-ca-certificates manually after etc-update" +} + +src_install() { + cp -pPR * "${D}"/ || die + + ( + echo "# Automatically generated by ${CATEGORY}/${PF}" + echo "# $(date -u)" + echo "# Do not edit." + cd "${D}"/usr/share/ca-certificates + find . -name '*.crt' | sort | cut -b3- + ) > "${D}"/etc/ca-certificates.conf + + mv "${D}"/usr/share/doc/{ca-certificates,${PF}} || die + prepalldocs + + echo 'CONFIG_PROTECT_MASK="/etc/ca-certificates.conf"' > 98ca-certificates + doenvd 98ca-certificates +} + +pkg_postinst() { + if [ "${ROOT}" = "/" ] ; then + # However it's too overzealous when the user has custom certs in place. + # --fresh is to clean up dangling symlinks + update-ca-certificates + fi + + local c badcerts=0 + for c in $(find -L "${ROOT}"etc/ssl/certs/ -type l) ; do + ewarn "Broken symlink for a certificate at $c" + badcerts=1 + done + if [ $badcerts -eq 1 ]; then + ewarn "You MUST remove the above broken symlinks" + ewarn "Otherwise any SSL validation that use the directory may fail!" + ewarn "To batch-remove them, run:" + ewarn "find -L ${ROOT}etc/ssl/certs/ -type l -exec rm {} +" + fi +} diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r2.ebuild b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r2.ebuild new file mode 100644 index 0000000000..1c78d11b98 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r2.ebuild @@ -0,0 +1,87 @@ +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/ca-certificates/ca-certificates-20110502-r2.ebuild,v 1.3 2011/09/03 17:33:45 grobian Exp $ + +EAPI="3" + +inherit eutils + +DESCRIPTION="Common CA Certificates PEM files" +HOMEPAGE="http://packages.debian.org/sid/ca-certificates" +SRC_URI="mirror://debian/pool/main/c/${PN}/${PN}_${PV}+nmu1_all.deb" + +LICENSE="MPL-1.1" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris ~x86-winnt" +IUSE="" + +DEPEND="|| ( >=sys-apps/coreutils-6.10-r1 sys-apps/mktemp sys-freebsd/freebsd-ubin )" +RDEPEND="${DEPEND} + dev-libs/openssl + sys-apps/debianutils + kernel_AIX? ( app-arch/deb2targz )" # platforms like AIX don't have a good ar + +S=${WORKDIR} + +pkg_setup() { + # For the conversion to having it in CONFIG_PROTECT_MASK, + # we need to tell users about it once manually first. + [[ -f "${EPREFIX}"/etc/env.d/98ca-certificates ]] \ + || ewarn "You should run update-ca-certificates manually after etc-update" +} + +src_unpack() { + unpack ${A} + unpack ./data.tar.gz + rm -f control.tar.gz data.tar.gz debian-binary +} + +src_prepare() { + epatch "${FILESDIR}"/${PN}-20090709-root.patch +} + +src_compile() { + ( + echo "# Automatically generated by ${CATEGORY}/${PF}" + echo "# $(date -u)" + echo "# Do not edit." + cd "${S}"/usr/share/ca-certificates + find * -name '*.crt' | LC_ALL=C sort + ) > "${S}"/etc/ca-certificates.conf + + sed -i "/^ROOT=""/s:=.*:='${EPREFIX}':" "${S}"/usr/sbin/update-ca-certificates || die + "${S}"/usr/sbin/update-ca-certificates --root "${S}" +} + +src_install() { + mkdir -p "${ED}" + cp -pPR * "${ED}"/ || die + + mv "${ED}"/usr/share/doc/{ca-certificates,${PF}} || die + prepalldocs + + echo 'CONFIG_PROTECT_MASK="/etc/ca-certificates.conf"' > 98ca-certificates + doenvd 98ca-certificates +} + +pkg_postinst() { + if [ -d "${EROOT}/usr/local/share/ca-certificates" ] ; then + # if the user has local certs, we need to rebuild again + # to include their stuff in the db. + # However it's too overzealous when the user has custom certs in place. + # --fresh is to clean up dangling symlinks + "${EROOT}"/usr/sbin/update-ca-certificates --root "${EROOT}" + fi + + local c badcerts=0 + for c in $(find -L "${EROOT}"etc/ssl/certs/ -type l) ; do + ewarn "Broken symlink for a certificate at $c" + badcerts=1 + done + if [ $badcerts -eq 1 ]; then + ewarn "You MUST remove the above broken symlinks" + ewarn "Otherwise any SSL validation that use the directory may fail!" + ewarn "To batch-remove them, run:" + ewarn "find -L ${EROOT}etc/ssl/certs/ -type l -exec rm {} +" + fi +} diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r3.ebuild b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r3.ebuild new file mode 100644 index 0000000000..02fcbb1b97 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r3.ebuild @@ -0,0 +1,95 @@ +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/ca-certificates/ca-certificates-20110502-r3.ebuild,v 1.2 2011/09/07 00:39:11 vapier Exp $ + +EAPI="3" + +inherit eutils + +DESCRIPTION="Common CA Certificates PEM files" +HOMEPAGE="http://packages.debian.org/sid/ca-certificates" +SRC_URI="mirror://debian/pool/main/c/${PN}/${PN}_${PV}+nmu1_all.deb" + +LICENSE="MPL-1.1" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris ~x86-winnt" +IUSE="" + +# platforms like AIX don't have a good ar +DEPEND="kernel_AIX? ( app-arch/deb2targz )" +# openssl: we run `c_rehash` +# debianutils: we run `run-parts` +RDEPEND="${DEPEND} + dev-libs/openssl + sys-apps/debianutils" + +S=${WORKDIR} + +pkg_setup() { + # For the conversion to having it in CONFIG_PROTECT_MASK, + # we need to tell users about it once manually first. + [[ -f "${EPREFIX}"/etc/env.d/98ca-certificates ]] \ + || ewarn "You should run update-ca-certificates manually after etc-update" +} + +src_unpack() { + if [[ -n ${EPREFIX} ]] ; then + # need to perform everything in the offset, #381937 + mkdir -p "./${EPREFIX}" + cd "./${EPREFIX}" || die + fi + unpack ${A} + unpack ./data.tar.gz + rm -f control.tar.gz data.tar.gz debian-binary +} + +src_prepare() { + cd "./${EPREFIX}" || die + epatch "${FILESDIR}"/${PN}-20090709-root.patch + sed -i -e '/="$ROOT/s:ROOT/:ROOT'"${EPREFIX}"'/:' \ + usr/sbin/update-ca-certificates || die +} + +src_compile() { + ( + echo "# Automatically generated by ${CATEGORY}/${PF}" + echo "# $(date -u)" + echo "# Do not edit." + cd "${S}${EPREFIX}"/usr/share/ca-certificates + find * -name '*.crt' | LC_ALL=C sort + ) > "${S}${EPREFIX}"/etc/ca-certificates.conf + + "${S}${EPREFIX}"/usr/sbin/update-ca-certificates --root "${S}" +} + +src_install() { + cp -pPR * "${D}"/ || die + + mv "${ED}"/usr/share/doc/{ca-certificates,${PF}} || die + prepalldocs + + echo 'CONFIG_PROTECT_MASK="/etc/ca-certificates.conf"' > 98ca-certificates + doenvd 98ca-certificates +} + +pkg_postinst() { + if [ -d "${EROOT}/usr/local/share/ca-certificates" ] ; then + # if the user has local certs, we need to rebuild again + # to include their stuff in the db. + # However it's too overzealous when the user has custom certs in place. + # --fresh is to clean up dangling symlinks + "${EROOT}"/usr/sbin/update-ca-certificates --root "${EROOT}" + fi + + local c badcerts=0 + for c in $(find -L "${EROOT}"etc/ssl/certs/ -type l) ; do + ewarn "Broken symlink for a certificate at $c" + badcerts=1 + done + if [ $badcerts -eq 1 ]; then + ewarn "You MUST remove the above broken symlinks" + ewarn "Otherwise any SSL validation that use the directory may fail!" + ewarn "To batch-remove them, run:" + ewarn "find -L ${EROOT}etc/ssl/certs/ -type l -exec rm {} +" + fi +} diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r4.ebuild b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r4.ebuild new file mode 100644 index 0000000000..1935676098 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502-r4.ebuild @@ -0,0 +1,98 @@ +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/ca-certificates/ca-certificates-20110502-r4.ebuild,v 1.3 2011/09/07 16:31:55 grobian Exp $ + +EAPI="3" + +inherit eutils + +DESCRIPTION="Common CA Certificates PEM files" +HOMEPAGE="http://packages.debian.org/sid/ca-certificates" +SRC_URI="mirror://debian/pool/main/c/${PN}/${PN}_${PV}+nmu1_all.deb" + +LICENSE="MPL-1.1" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris ~x86-winnt" +IUSE="" + +# platforms like AIX don't have a good ar +DEPEND="kernel_AIX? ( app-arch/deb2targz )" +# openssl: we run `c_rehash` +# debianutils: we run `run-parts` +RDEPEND="${DEPEND} + dev-libs/openssl + sys-apps/debianutils" + +S=${WORKDIR} + +pkg_setup() { + # For the conversion to having it in CONFIG_PROTECT_MASK, + # we need to tell users about it once manually first. + [[ -f "${EPREFIX}"/etc/env.d/98ca-certificates ]] \ + || ewarn "You should run update-ca-certificates manually after etc-update" +} + +src_unpack() { + if [[ -n ${EPREFIX} ]] ; then + # need to perform everything in the offset, #381937 + mkdir -p "./${EPREFIX}" + cd "./${EPREFIX}" || die + fi + unpack ${A} + unpack ./data.tar.gz + rm -f control.tar.gz data.tar.gz debian-binary +} + +src_prepare() { + cd "./${EPREFIX}" || die + epatch "${FILESDIR}"/${PN}-20110502-root.patch + local relp=$(echo "${EPREFIX}" | sed -e 's:[^/]\+:..:g') + sed -i \ + -e '/="$ROOT/s:ROOT/:ROOT'"${EPREFIX}"'/:' \ + -e '/RELPATH="\.\./s:"$:'"${relp}"'":' \ + usr/sbin/update-ca-certificates || die +} + +src_compile() { + ( + echo "# Automatically generated by ${CATEGORY}/${PF}" + echo "# $(date -u)" + echo "# Do not edit." + cd "${S}${EPREFIX}"/usr/share/ca-certificates + find * -name '*.crt' | LC_ALL=C sort + ) > "${S}${EPREFIX}"/etc/ca-certificates.conf + + sh "${S}${EPREFIX}"/usr/sbin/update-ca-certificates --root "${S}" || die +} + +src_install() { + cp -pPR * "${D}"/ || die + + mv "${ED}"/usr/share/doc/{ca-certificates,${PF}} || die + prepalldocs + + echo 'CONFIG_PROTECT_MASK="/etc/ca-certificates.conf"' > 98ca-certificates + doenvd 98ca-certificates +} + +pkg_postinst() { + if [ -d "${EROOT}/usr/local/share/ca-certificates" ] ; then + # if the user has local certs, we need to rebuild again + # to include their stuff in the db. + # However it's too overzealous when the user has custom certs in place. + # --fresh is to clean up dangling symlinks + "${EROOT}"/usr/sbin/update-ca-certificates --root "${EROOT}" + fi + + local c badcerts=0 + for c in $(find -L "${EROOT}"etc/ssl/certs/ -type l) ; do + ewarn "Broken symlink for a certificate at $c" + badcerts=1 + done + if [ $badcerts -eq 1 ]; then + ewarn "You MUST remove the above broken symlinks" + ewarn "Otherwise any SSL validation that use the directory may fail!" + ewarn "To batch-remove them, run:" + ewarn "find -L ${EROOT}etc/ssl/certs/ -type l -exec rm {} +" + fi +} diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502.ebuild b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502.ebuild new file mode 100644 index 0000000000..02549e84a5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20110502.ebuild @@ -0,0 +1,72 @@ +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/ca-certificates/ca-certificates-20110502.ebuild,v 1.1 2011/08/31 17:25:31 robbat2 Exp $ + +inherit eutils + +DESCRIPTION="Common CA Certificates PEM files" +HOMEPAGE="http://packages.debian.org/sid/ca-certificates" +SRC_URI="mirror://debian/pool/main/c/${PN}/${PN}_${PV}_all.deb" + +LICENSE="MPL-1.1" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~sparc-fbsd ~x86-fbsd" +IUSE="" + +DEPEND="|| ( >=sys-apps/coreutils-6.10-r1 sys-apps/mktemp sys-freebsd/freebsd-ubin )" +RDEPEND="${DEPEND} + dev-libs/openssl + sys-apps/debianutils" + +S=${WORKDIR} + +src_unpack() { + unpack ${A} + unpack ./data.tar.gz + rm -f control.tar.gz data.tar.gz debian-binary +} + +pkg_setup() { + # For the conversion to having it in CONFIG_PROTECT_MASK, + # we need to tell users about it once manually first. + [[ -f /etc/env.d/98ca-certificates ]] \ + || ewarn "You should run update-ca-certificates manually after etc-update" +} + +src_install() { + cp -pPR * "${D}"/ || die + + ( + echo "# Automatically generated by ${CATEGORY}/${PF}" + echo "# $(date -u)" + echo "# Do not edit." + cd "${D}"/usr/share/ca-certificates + find . -name '*.crt' | sort | cut -b3- + ) > "${D}"/etc/ca-certificates.conf + + mv "${D}"/usr/share/doc/{ca-certificates,${PF}} || die + prepalldocs + + echo 'CONFIG_PROTECT_MASK="/etc/ca-certificates.conf"' > 98ca-certificates + doenvd 98ca-certificates +} + +pkg_postinst() { + if [ "${ROOT}" = "/" ] ; then + # However it's too overzealous when the user has custom certs in place. + # --fresh is to clean up dangling symlinks + update-ca-certificates + fi + + local c badcerts=0 + for c in $(find -L "${ROOT}"etc/ssl/certs/ -type l) ; do + ewarn "Broken symlink for a certificate at $c" + badcerts=1 + done + if [ $badcerts -eq 1 ]; then + ewarn "You MUST remove the above broken symlinks" + ewarn "Otherwise any SSL validation that use the directory may fail!" + ewarn "To batch-remove them, run:" + ewarn "find -L ${ROOT}etc/ssl/certs/ -type l -exec rm {} +" + fi +} diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20111025.ebuild b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20111025.ebuild new file mode 100644 index 0000000000..5bd6181b7e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20111025.ebuild @@ -0,0 +1,100 @@ +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/ca-certificates/ca-certificates-20111025.ebuild,v 1.10 2012/04/26 13:57:53 aballier Exp $ + +EAPI="3" + +inherit eutils + +DESCRIPTION="Common CA Certificates PEM files" +HOMEPAGE="http://packages.debian.org/sid/ca-certificates" +#NMU_PR="1" +SRC_URI="mirror://debian/pool/main/c/${PN}/${PN}_${PV}${NMU_PR:++nmu}${NMU_PR}_all.deb" + +LICENSE="MPL-1.1" +SLOT="0" +KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris ~x86-winnt" +IUSE="" + +# platforms like AIX don't have a good ar +DEPEND="kernel_AIX? ( app-arch/deb2targz ) + ! "${S}${EPREFIX}"/etc/ca-certificates.conf + + sh "${S}${EPREFIX}"/usr/sbin/update-ca-certificates --root "${S}" || die +} + +src_install() { + cp -pPR * "${D}"/ || die + + mv "${ED}"/usr/share/doc/{ca-certificates,${PF}} || die + prepalldocs + + echo 'CONFIG_PROTECT_MASK="/etc/ca-certificates.conf"' > 98ca-certificates + doenvd 98ca-certificates +} + +pkg_postinst() { + if [ -d "${EROOT}/usr/local/share/ca-certificates" ] ; then + # if the user has local certs, we need to rebuild again + # to include their stuff in the db. + # However it's too overzealous when the user has custom certs in place. + # --fresh is to clean up dangling symlinks + "${EROOT}"/usr/sbin/update-ca-certificates --root "${EROOT}" + fi + + local c badcerts=0 + for c in $(find -L "${EROOT}"etc/ssl/certs/ -type l) ; do + ewarn "Broken symlink for a certificate at $c" + badcerts=1 + done + if [ $badcerts -eq 1 ]; then + ewarn "You MUST remove the above broken symlinks" + ewarn "Otherwise any SSL validation that use the directory may fail!" + ewarn "To batch-remove them, run:" + ewarn "find -L ${EROOT}etc/ssl/certs/ -type l -exec rm {} +" + fi +} diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20120212.ebuild b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20120212.ebuild new file mode 100644 index 0000000000..5d8225aee1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20120212.ebuild @@ -0,0 +1,100 @@ +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/ca-certificates/ca-certificates-20120212.ebuild,v 1.1 2012/05/11 00:39:05 vapier Exp $ + +EAPI="3" + +inherit eutils + +DESCRIPTION="Common CA Certificates PEM files" +HOMEPAGE="http://packages.debian.org/sid/ca-certificates" +#NMU_PR="1" +SRC_URI="mirror://debian/pool/main/c/${PN}/${PN}_${PV}${NMU_PR:++nmu}${NMU_PR}_all.deb" + +LICENSE="MPL-1.1" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris ~x86-winnt" +IUSE="" + +# platforms like AIX don't have a good ar +DEPEND="kernel_AIX? ( app-arch/deb2targz ) + ! "${S}${EPREFIX}"/etc/ca-certificates.conf + + sh "${S}${EPREFIX}"/usr/sbin/update-ca-certificates --root "${S}" || die +} + +src_install() { + cp -pPR * "${D}"/ || die + + mv "${ED}"/usr/share/doc/{ca-certificates,${PF}} || die + prepalldocs + + echo 'CONFIG_PROTECT_MASK="/etc/ca-certificates.conf"' > 98ca-certificates + doenvd 98ca-certificates +} + +pkg_postinst() { + if [ -d "${EROOT}/usr/local/share/ca-certificates" ] ; then + # if the user has local certs, we need to rebuild again + # to include their stuff in the db. + # However it's too overzealous when the user has custom certs in place. + # --fresh is to clean up dangling symlinks + "${EROOT}"/usr/sbin/update-ca-certificates --root "${EROOT}" + fi + + local c badcerts=0 + for c in $(find -L "${EROOT}"etc/ssl/certs/ -type l) ; do + ewarn "Broken symlink for a certificate at $c" + badcerts=1 + done + if [ $badcerts -eq 1 ]; then + ewarn "You MUST remove the above broken symlinks" + ewarn "Otherwise any SSL validation that use the directory may fail!" + ewarn "To batch-remove them, run:" + ewarn "find -L ${EROOT}etc/ssl/certs/ -type l -exec rm {} +" + fi +} diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20120623.ebuild b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20120623.ebuild new file mode 100644 index 0000000000..5cd8bc3799 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20120623.ebuild @@ -0,0 +1,100 @@ +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/ca-certificates/ca-certificates-20120623.ebuild,v 1.1 2012/06/28 18:14:34 vapier Exp $ + +EAPI="3" + +inherit eutils + +DESCRIPTION="Common CA Certificates PEM files" +HOMEPAGE="http://packages.debian.org/sid/ca-certificates" +#NMU_PR="1" +SRC_URI="mirror://debian/pool/main/c/${PN}/${PN}_${PV}${NMU_PR:++nmu}${NMU_PR}_all.deb" + +LICENSE="MPL-1.1" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris ~x86-winnt" +IUSE="" + +# platforms like AIX don't have a good ar +DEPEND="kernel_AIX? ( app-arch/deb2targz ) + ! "${S}${EPREFIX}"/etc/ca-certificates.conf + + sh "${S}${EPREFIX}"/usr/sbin/update-ca-certificates --root "${S}" || die +} + +src_install() { + cp -pPR * "${D}"/ || die + + mv "${ED}"/usr/share/doc/{ca-certificates,${PF}} || die + prepalldocs + + echo 'CONFIG_PROTECT_MASK="/etc/ca-certificates.conf"' > 98ca-certificates + doenvd 98ca-certificates +} + +pkg_postinst() { + if [ -d "${EROOT}/usr/local/share/ca-certificates" ] ; then + # if the user has local certs, we need to rebuild again + # to include their stuff in the db. + # However it's too overzealous when the user has custom certs in place. + # --fresh is to clean up dangling symlinks + "${EROOT}"/usr/sbin/update-ca-certificates --root "${EROOT}" + fi + + local c badcerts=0 + for c in $(find -L "${EROOT}"etc/ssl/certs/ -type l) ; do + ewarn "Broken symlink for a certificate at $c" + badcerts=1 + done + if [ $badcerts -eq 1 ]; then + ewarn "You MUST remove the above broken symlinks" + ewarn "Otherwise any SSL validation that use the directory may fail!" + ewarn "To batch-remove them, run:" + ewarn "find -L ${EROOT}etc/ssl/certs/ -type l -exec rm {} +" + fi +} diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20121114.ebuild b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20121114.ebuild new file mode 100644 index 0000000000..54f3b8e714 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20121114.ebuild @@ -0,0 +1,100 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/ca-certificates/ca-certificates-20121114.ebuild,v 1.2 2013/02/19 02:38:32 zmedico Exp $ + +EAPI="3" + +inherit eutils + +DESCRIPTION="Common CA Certificates PEM files" +HOMEPAGE="http://packages.debian.org/sid/ca-certificates" +#NMU_PR="1" +SRC_URI="mirror://debian/pool/main/c/${PN}/${PN}_${PV}${NMU_PR:++nmu}${NMU_PR}_all.deb" + +LICENSE="MPL-1.1" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris ~x86-winnt" +IUSE="" + +# platforms like AIX don't have a good ar +DEPEND="kernel_AIX? ( app-arch/deb2targz ) + ! "${S}${EPREFIX}"/etc/ca-certificates.conf + + sh "${S}${EPREFIX}"/usr/sbin/update-ca-certificates --root "${S}" || die +} + +src_install() { + cp -pPR * "${D}"/ || die + + mv "${ED}"/usr/share/doc/{ca-certificates,${PF}} || die + prepalldocs + + echo 'CONFIG_PROTECT_MASK="/etc/ca-certificates.conf"' > 98ca-certificates + doenvd 98ca-certificates +} + +pkg_postinst() { + if [ -d "${EROOT}/usr/local/share/ca-certificates" ] ; then + # if the user has local certs, we need to rebuild again + # to include their stuff in the db. + # However it's too overzealous when the user has custom certs in place. + # --fresh is to clean up dangling symlinks + "${EROOT}"/usr/sbin/update-ca-certificates --root "${EROOT}" + fi + + local c badcerts=0 + for c in $(find -L "${EROOT}"etc/ssl/certs/ -type l) ; do + ewarn "Broken symlink for a certificate at $c" + badcerts=1 + done + if [ $badcerts -eq 1 ]; then + ewarn "You MUST remove the above broken symlinks" + ewarn "Otherwise any SSL validation that use the directory may fail!" + ewarn "To batch-remove them, run:" + ewarn "find -L ${EROOT}etc/ssl/certs/ -type l -exec rm {} +" + fi +} diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20130119.ebuild b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20130119.ebuild new file mode 100644 index 0000000000..e573905ff7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/ca-certificates-20130119.ebuild @@ -0,0 +1,98 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-misc/ca-certificates/ca-certificates-20130119.ebuild,v 1.1 2013/03/23 08:57:13 vapier Exp $ + +EAPI="3" + +inherit eutils unpacker + +DESCRIPTION="Common CA Certificates PEM files" +HOMEPAGE="http://packages.debian.org/sid/ca-certificates" +#NMU_PR="1" +SRC_URI="mirror://debian/pool/main/c/${PN}/${PN}_${PV}${NMU_PR:++nmu}${NMU_PR}_all.deb" + +LICENSE="MPL-1.1" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~arm-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris ~x86-winnt" +IUSE="" + +# platforms like AIX don't have a good ar +DEPEND="kernel_AIX? ( app-arch/deb2targz ) + ! "${S}${EPREFIX}"/etc/ca-certificates.conf + + sh "${S}${EPREFIX}"/usr/sbin/update-ca-certificates --root "${S}" || die +} + +src_install() { + cp -pPR * "${D}"/ || die + + mv "${ED}"/usr/share/doc/{ca-certificates,${PF}} || die + prepalldocs + + echo 'CONFIG_PROTECT_MASK="/etc/ca-certificates.conf"' > 98ca-certificates + doenvd 98ca-certificates +} + +pkg_postinst() { + if [ -d "${EROOT}/usr/local/share/ca-certificates" ] ; then + # if the user has local certs, we need to rebuild again + # to include their stuff in the db. + # However it's too overzealous when the user has custom certs in place. + # --fresh is to clean up dangling symlinks + "${EROOT}"/usr/sbin/update-ca-certificates --root "${EROOT}" + fi + + local c badcerts=0 + for c in $(find -L "${EROOT}"etc/ssl/certs/ -type l) ; do + ewarn "Broken symlink for a certificate at $c" + badcerts=1 + done + if [ $badcerts -eq 1 ]; then + ewarn "You MUST remove the above broken symlinks" + ewarn "Otherwise any SSL validation that use the directory may fail!" + ewarn "To batch-remove them, run:" + ewarn "find -L ${EROOT}etc/ssl/certs/ -type l -exec rm {} +" + fi +} diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/files/ca-certificates-20090709-root.patch b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/files/ca-certificates-20090709-root.patch new file mode 100644 index 0000000000..72a4ba1a6d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/files/ca-certificates-20090709-root.patch @@ -0,0 +1,107 @@ +--- a/usr/sbin/update-ca-certificates ++++ b/usr/sbin/update-ca-certificates +@@ -23,6 +23,7 @@ + + verbose=0 + fresh=0 ++ROOT="" + while [ $# -gt 0 ]; + do + case $1 in +@@ -30,6 +31,9 @@ + verbose=1;; + --fresh|-f) + fresh=1;; ++ --root|-r) ++ ROOT=$(readlink -f "$2") ++ shift;; + --help|-h|*) +- echo "$0: [--verbose] [--fresh]" ++ echo "$0: [--verbose] [--fresh] [--root ]" + exit;; +@@ -37,11 +41,11 @@ + shift + done + +-CERTSCONF=/etc/ca-certificates.conf +-CERTSDIR=/usr/share/ca-certificates +-LOCALCERTSDIR=/usr/local/share/ca-certificates ++CERTSCONF="$ROOT/etc/ca-certificates.conf" ++CERTSDIR="$ROOT/usr/share/ca-certificates" ++LOCALCERTSDIR="$ROOT/usr/local/share/ca-certificates" + CERTBUNDLE=ca-certificates.crt +-ETCCERTSDIR=/etc/ssl/certs ++ETCCERTSDIR="$ROOT/etc/ssl/certs" + + cleanup() { + rm -f "$TEMPBUNDLE" +@@ -66,7 +70,7 @@ + -e 's/,/_/g').pem" + if ! test -e "$PEM" || [ "$(readlink "$PEM")" != "$CERT" ] + then +- ln -sf "$CERT" "$PEM" ++ ln -sf "${CERT#$ROOT}" "$PEM" + echo +$PEM >> "$ADDED" + fi + cat "$CERT" >> "$TEMPBUNDLE" +@@ -78,22 +82,22 @@ + if test -L "$PEM" + then + rm -f "$PEM" +- echo -$PEM >> "$REMOVED" ++ echo "-$PEM" >> "$REMOVED" + fi + } + +-cd $ETCCERTSDIR ++cd "$ETCCERTSDIR" + if [ "$fresh" = 1 ]; then + echo -n "Clearing symlinks in $ETCCERTSDIR..." + find . -type l -print | while read symlink + do +- case $(readlink $symlink) in +- $CERTSDIR*) rm -f $symlink;; ++ case $(readlink "$symlink") in ++ "$CERTSDIR"*) rm -f "$symlink";; + esac + done + find . -type l -print | while read symlink + do +- test -f $symlink || rm -f $symlink ++ test -f "$symlink" || rm -f "$symlink" + done + echo "done." + fi +@@ -102,12 +106,12 @@ + + # Handle certificates that should be removed. This is an explicit act + # by prefixing lines in the configuration files with exclamation marks (!). +-sed -n -e '/^$/d' -e 's/^!//p' $CERTSCONF | while read crt ++sed -n -e '/^$/d' -e 's/^!//p' "$CERTSCONF" | while read crt + do + remove "$CERTSDIR/$crt" + done + +-sed -e '/^$/d' -e '/^#/d' -e '/^!/d' $CERTSCONF | while read crt ++sed -e '/^$/d' -e '/^#/d' -e '/^!/d' "$CERTSCONF" | while read crt + do + if ! test -f "$CERTSDIR/$crt" + then +@@ -146,14 +150,14 @@ + + echo "$ADDED_CNT added, $REMOVED_CNT removed; done." + +-HOOKSDIR=/etc/ca-certificates/update.d ++HOOKSDIR="$ROOT/etc/ca-certificates/update.d" + echo -n "Running hooks in $HOOKSDIR...." + VERBOSE_ARG= + [ "$verbose" = 0 ] || VERBOSE_ARG=--verbose +-eval run-parts $VERBOSE_ARG --test -- $HOOKSDIR | while read hook ++eval run-parts $VERBOSE_ARG --test -- \""$HOOKSDIR"\" | while read hook + do + ( cat $ADDED +- cat $REMOVED ) | $hook || echo E: $hook exited with code $?. ++ cat $REMOVED ) | "$hook" || echo E: "$hook" exited with code $?. + done + echo "done." + diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/files/ca-certificates-20110502-root.patch b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/files/ca-certificates-20110502-root.patch new file mode 100644 index 0000000000..f3fcf5d593 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/files/ca-certificates-20110502-root.patch @@ -0,0 +1,110 @@ +--- a/usr/sbin/update-ca-certificates ++++ b/usr/sbin/update-ca-certificates +@@ -23,6 +23,8 @@ + + verbose=0 + fresh=0 ++ROOT="" ++RELPATH="" + while [ $# -gt 0 ]; + do + case $1 in +@@ -30,6 +31,11 @@ + verbose=1;; + --fresh|-f) + fresh=1;; ++ --root|-r) ++ ROOT=$(readlink -f "$2") ++ # needed as c_rehash wants to read the files directly ++ RELPATH="../../.." ++ shift;; + --help|-h|*) +- echo "$0: [--verbose] [--fresh]" ++ echo "$0: [--verbose] [--fresh] [--root ]" + exit;; +@@ -37,11 +41,11 @@ + shift + done + +-CERTSCONF=/etc/ca-certificates.conf +-CERTSDIR=/usr/share/ca-certificates +-LOCALCERTSDIR=/usr/local/share/ca-certificates ++CERTSCONF="$ROOT/etc/ca-certificates.conf" ++CERTSDIR="$ROOT/usr/share/ca-certificates" ++LOCALCERTSDIR="$ROOT/usr/local/share/ca-certificates" + CERTBUNDLE=ca-certificates.crt +-ETCCERTSDIR=/etc/ssl/certs ++ETCCERTSDIR="$ROOT/etc/ssl/certs" + + cleanup() { + rm -f "$TEMPBUNDLE" +@@ -66,7 +70,7 @@ + -e 's/,/_/g').pem" + if ! test -e "$PEM" || [ "$(readlink "$PEM")" != "$CERT" ] + then +- ln -sf "$CERT" "$PEM" ++ ln -sf "${RELPATH}${CERT#$ROOT}" "$PEM" + echo +$PEM >> "$ADDED" + fi + cat "$CERT" >> "$TEMPBUNDLE" +@@ -78,22 +82,22 @@ + if test -L "$PEM" + then + rm -f "$PEM" +- echo -$PEM >> "$REMOVED" ++ echo "-$PEM" >> "$REMOVED" + fi + } + +-cd $ETCCERTSDIR ++cd "$ETCCERTSDIR" + if [ "$fresh" = 1 ]; then + echo -n "Clearing symlinks in $ETCCERTSDIR..." + find . -type l -print | while read symlink + do +- case $(readlink $symlink) in +- $CERTSDIR*) rm -f $symlink;; ++ case $(readlink "$symlink") in ++ "$CERTSDIR"*) rm -f "$symlink";; + esac + done + find . -type l -print | while read symlink + do +- test -f $symlink || rm -f $symlink ++ test -f "$symlink" || rm -f "$symlink" + done + echo "done." + fi +@@ -102,12 +106,12 @@ + + # Handle certificates that should be removed. This is an explicit act + # by prefixing lines in the configuration files with exclamation marks (!). +-sed -n -e '/^$/d' -e 's/^!//p' $CERTSCONF | while read crt ++sed -n -e '/^$/d' -e 's/^!//p' "$CERTSCONF" | while read crt + do + remove "$CERTSDIR/$crt" + done + +-sed -e '/^$/d' -e '/^#/d' -e '/^!/d' $CERTSCONF | while read crt ++sed -e '/^$/d' -e '/^#/d' -e '/^!/d' "$CERTSCONF" | while read crt + do + if ! test -f "$CERTSDIR/$crt" + then +@@ -146,14 +150,14 @@ + + echo "$ADDED_CNT added, $REMOVED_CNT removed; done." + +-HOOKSDIR=/etc/ca-certificates/update.d ++HOOKSDIR="$ROOT/etc/ca-certificates/update.d" + echo -n "Running hooks in $HOOKSDIR...." + VERBOSE_ARG= + [ "$verbose" = 0 ] || VERBOSE_ARG=--verbose +-eval run-parts $VERBOSE_ARG --test -- $HOOKSDIR | while read hook ++eval run-parts $VERBOSE_ARG --test -- \""$HOOKSDIR"\" | while read hook + do + ( cat $ADDED +- cat $REMOVED ) | $hook || echo E: $hook exited with code $?. ++ cat $REMOVED ) | "$hook" || echo E: "$hook" exited with code $?. + done + echo "done." + diff --git a/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/metadata.xml b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/metadata.xml new file mode 100644 index 0000000000..96a2d58636 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/app-misc/ca-certificates/metadata.xml @@ -0,0 +1,5 @@ + + + +base-system +