[yocto] [meta-selinux][PATCH] Bump versions to catch up with master in oe-core.

Philip Tricca flihp at twobit.us
Thu Nov 14 19:53:19 PST 2013


  openssh 6.2p2 -> 6.4p1
  glib-2.0 2.38.0 -> 2.38.1
  at 3.1.13 -> 3.1.14
  sudo 1.8.7 -> 1.8.8
  tar 1.26 -> 1.27
  mesa 9.1.6 -> 9.2.2
  gnupg 2.0.21 -> 2.0.22

Signed-off-by: Philip Tricca <flihp at twobit.us>
---
 .../openssh/openssh_6.2p2.bbappend                 |   13 --
 .../openssh/openssh_6.4p1.bbappend                 |   13 ++
 recipes-core/glib-2.0/glib-2.0_2.38.0.bbappend     |    1 -
 recipes-core/glib-2.0/glib-2.0_2.38.1.bbappend     |    1 +
 recipes-extended/at/at/at-3.1.13-selinux.patch     |  184 --------------------
 recipes-extended/at/at/at-3.1.14-selinux.patch     |  184 ++++++++++++++++++++
 recipes-extended/at/at_3.1.13.bbappend             |    7 -
 recipes-extended/at/at_3.1.14.bbappend             |    7 +
 recipes-extended/sudo/sudo_1.8.7.bbappend          |    3 -
 recipes-extended/sudo/sudo_1.8.8.bbappend          |    3 +
 recipes-extended/tar/tar_1.26.bbappend             |   15 --
 recipes-extended/tar/tar_1.27.bbappend             |   15 ++
 recipes-graphics/mesa/mesa_9.1.6.bbappend          |    1 -
 recipes-graphics/mesa/mesa_9.2.2.bbappend          |    1 +
 recipes-support/gnupg/gnupg_2.0.21.bbappend        |    5 -
 recipes-support/gnupg/gnupg_2.0.22.bbappend        |    5 +
 16 files changed, 229 insertions(+), 229 deletions(-)
 delete mode 100644 recipes-connectivity/openssh/openssh_6.2p2.bbappend
 create mode 100644 recipes-connectivity/openssh/openssh_6.4p1.bbappend
 delete mode 100644 recipes-core/glib-2.0/glib-2.0_2.38.0.bbappend
 create mode 100644 recipes-core/glib-2.0/glib-2.0_2.38.1.bbappend
 delete mode 100644 recipes-extended/at/at/at-3.1.13-selinux.patch
 create mode 100644 recipes-extended/at/at/at-3.1.14-selinux.patch
 delete mode 100644 recipes-extended/at/at_3.1.13.bbappend
 create mode 100644 recipes-extended/at/at_3.1.14.bbappend
 delete mode 100644 recipes-extended/sudo/sudo_1.8.7.bbappend
 create mode 100644 recipes-extended/sudo/sudo_1.8.8.bbappend
 delete mode 100644 recipes-extended/tar/tar_1.26.bbappend
 create mode 100644 recipes-extended/tar/tar_1.27.bbappend
 delete mode 100644 recipes-graphics/mesa/mesa_9.1.6.bbappend
 create mode 100644 recipes-graphics/mesa/mesa_9.2.2.bbappend
 delete mode 100644 recipes-support/gnupg/gnupg_2.0.21.bbappend
 create mode 100644 recipes-support/gnupg/gnupg_2.0.22.bbappend

diff --git a/recipes-connectivity/openssh/openssh_6.2p2.bbappend b/recipes-connectivity/openssh/openssh_6.2p2.bbappend
deleted file mode 100644
index 223b8cf..0000000
--- a/recipes-connectivity/openssh/openssh_6.2p2.bbappend
+++ /dev/null
@@ -1,13 +0,0 @@
-PR .= ".5"
-
-inherit with-selinux
-
-FILESEXTRAPATHS_prepend := "${@target_selinux(d, '${THISDIR}/files:')}"
-
-# There is no distro feature just for audit.  If we want it,
-# uncomment the following.
-#
-#PACKAGECONFIG += "${@target_selinux(d, 'audit')}"
-
-PACKAGECONFIG[audit] = "--with-audit=linux,--without-audit,audit,"
-
diff --git a/recipes-connectivity/openssh/openssh_6.4p1.bbappend b/recipes-connectivity/openssh/openssh_6.4p1.bbappend
new file mode 100644
index 0000000..223b8cf
--- /dev/null
+++ b/recipes-connectivity/openssh/openssh_6.4p1.bbappend
@@ -0,0 +1,13 @@
+PR .= ".5"
+
+inherit with-selinux
+
+FILESEXTRAPATHS_prepend := "${@target_selinux(d, '${THISDIR}/files:')}"
+
+# There is no distro feature just for audit.  If we want it,
+# uncomment the following.
+#
+#PACKAGECONFIG += "${@target_selinux(d, 'audit')}"
+
+PACKAGECONFIG[audit] = "--with-audit=linux,--without-audit,audit,"
+
diff --git a/recipes-core/glib-2.0/glib-2.0_2.38.0.bbappend b/recipes-core/glib-2.0/glib-2.0_2.38.0.bbappend
deleted file mode 100644
index 8c11cac..0000000
--- a/recipes-core/glib-2.0/glib-2.0_2.38.0.bbappend
+++ /dev/null
@@ -1 +0,0 @@
-inherit enable-selinux
diff --git a/recipes-core/glib-2.0/glib-2.0_2.38.1.bbappend b/recipes-core/glib-2.0/glib-2.0_2.38.1.bbappend
new file mode 100644
index 0000000..8c11cac
--- /dev/null
+++ b/recipes-core/glib-2.0/glib-2.0_2.38.1.bbappend
@@ -0,0 +1 @@
+inherit enable-selinux
diff --git a/recipes-extended/at/at/at-3.1.13-selinux.patch b/recipes-extended/at/at/at-3.1.13-selinux.patch
deleted file mode 100644
index 5a08a43..0000000
--- a/recipes-extended/at/at/at-3.1.13-selinux.patch
+++ /dev/null
@@ -1,184 +0,0 @@
-From: Xin Ouyang <Xin.Ouyang at windriver.com>
-Date: Wed, 13 Jun 2012 14:47:54 +0800
-Subject: [PATCH] at: atd add SELinux support.
-
-Upstream-Status: Inappropriate [configuration]
-
-Signed-off-by: Xin Ouyang <Xin.Ouyang at windriver.com>
----
- Makefile.in  |    1 +
- atd.c        |   83 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- config.h.in  |    3 ++
- configure.ac |    8 +++++
- 4 files changed, 95 insertions(+), 0 deletions(-)
-
-diff --git a/Makefile.in b/Makefile.in
-index 10e7ed2..35792cd 100644
---- a/Makefile.in
-+++ b/Makefile.in
-@@ -39,6 +39,7 @@ LIBS		= @LIBS@
- LIBOBJS		= @LIBOBJS@
- INSTALL		= @INSTALL@
- PAMLIB          = @PAMLIB@
-+SELINUXLIB      = @SELINUXLIB@
- 
- CLONES		= atq atrm
- ATOBJECTS	= at.o panic.o perm.o posixtm.o y.tab.o lex.yy.o
-@@ -72,7 +72,7 @@ at: $(ATOBJECTS)
-	$(LN_S) -f at atrm
- 
- atd: $(RUNOBJECTS)
--	$(CC) $(CFLAGS) -o atd $(RUNOBJECTS) $(LIBS) $(PAMLIB) $(LDFLAGS)
-+	$(CC) $(CFLAGS) -o atd $(RUNOBJECTS) $(LIBS) $(PAMLIB) $(SELINUXLIB) $(LDFLAGS)
- 
- y.tab.c y.tab.h: parsetime.y
-	$(YACC) -d parsetime.y
-diff --git a/atd.c b/atd.c
-index af3e577..463124f 100644
---- a/atd.c
-+++ b/atd.c
-@@ -83,6 +83,14 @@
- #include "getloadavg.h"
- #endif
- 
-+#ifdef WITH_SELINUX
-+#include <selinux/selinux.h>
-+#include <selinux/get_context_list.h>
-+int selinux_enabled = 0;
-+#include <selinux/flask.h>
-+#include <selinux/av_permissions.h>
-+#endif
-+
- /* Macros */
- 
- #define BATCH_INTERVAL_DEFAULT 60
-@@ -195,6 +203,70 @@ myfork()
- #define fork myfork
- #endif
- 
-+#ifdef WITH_SELINUX
-+static int
-+set_selinux_context(const char *name, const char *filename)
-+{
-+    security_context_t user_context=NULL;
-+    security_context_t  file_context=NULL;
-+    struct av_decision avd;
-+    int retval=-1;
-+    char *seuser=NULL;
-+    char *level=NULL;
-+
-+    if (getseuserbyname(name, &seuser, &level) == 0) {
-+	retval=get_default_context_with_level(seuser, level, NULL, &user_context);
-+	free(seuser);
-+	free(level);
-+	if (retval) {
-+	    if (security_getenforce()==1) {
-+		perr("execle: couldn't get security context for user %s\n", name);
-+	    } else {
-+		syslog(LOG_ERR, "execle: couldn't get security context for user %s\n", name);
-+		return -1;
-+	    }
-+	}
-+    }
-+
-+    /*
-+    * Since crontab files are not directly executed,
-+    * crond must ensure that the crontab file has
-+    * a context that is appropriate for the context of
-+    * the user cron job.  It performs an entrypoint
-+    * permission check for this purpose.
-+    */
-+    if (fgetfilecon(STDIN_FILENO, &file_context) < 0)
-+	perr("fgetfilecon FAILED %s", filename);
-+
-+    retval = security_compute_av(user_context,
-+			file_context,
-+			SECCLASS_FILE,
-+			FILE__ENTRYPOINT,
-+			&avd);
-+    freecon(file_context);
-+    if (retval || ((FILE__ENTRYPOINT & avd.allowed) != FILE__ENTRYPOINT)) {
-+	if (security_getenforce()==1) {
-+	    perr("Not allowed to set exec context to %s for user  %s\n", user_context,name);
-+	} else {
-+	    syslog(LOG_ERR, "Not allowed to set exec context to %s for user  %s\n", user_context,name);
-+	    retval = -1;
-+	    goto err;
-+	}
-+    }
-+    if (setexeccon(user_context) < 0) {
-+	if (security_getenforce()==1) {
-+	    perr("Could not set exec context to %s for user  %s\n", user_context,name);
-+	    retval = -1;
-+	} else {
-+	    syslog(LOG_ERR, "Could not set exec context to %s for user  %s\n", user_context,name);
-+	}
-+    }
-+err:
-+    freecon(user_context);
-+    return 0;
-+}
-+#endif
-+
- static void
- run_file(const char *filename, uid_t uid, gid_t gid)
- {
-@@ -435,6 +507,13 @@ run_file(const char *filename, uid_t uid, gid_t gid)
- 
- 	    chdir("/");
- 
-+#ifdef WITH_SELINUX
-+	    if (selinux_enabled > 0) {
-+		if (set_selinux_context(pentry->pw_name, filename) < 0)
-+		    perr("SELinux Failed to set context\n");
-+	    }
-+#endif
-+
- 	    if (execle("/bin/sh", "sh", (char *) NULL, nenvp) != 0)
- 		perr("Exec failed for /bin/sh");
- 
-@@ -707,6 +786,10 @@ main(int argc, char *argv[])
-     struct passwd *pwe;
-     struct group *ge;
- 
-+#ifdef WITH_SELINUX
-+    selinux_enabled = is_selinux_enabled();
-+#endif
-+
- /* We don't need root privileges all the time; running under uid and gid
-  * daemon is fine.
-  */
-diff --git a/configure.ac b/configure.ac
-index 2db7b65..5ecc35a 100644
---- a/configure.ac
-+++ b/configure.ac
-@@ -94,6 +94,18 @@ AC_CHECK_HEADERS(security/pam_appl.h, [
-    fi])
- fi
- 
-+AC_ARG_WITH([selinux],
-+  [AS_HELP_STRING([--without-selinux], [without SELinux support])])
-+
-+if test "x$with_selinux" != xno; then
-+AC_CHECK_HEADERS(selinux/selinux.h, [
-+  SELINUXLIB="-lselinux"
-+  AC_DEFINE(WITH_SELINUX, 1, [Define to 1 for SELinux support])],
-+   [if test "x$with_selinux" = xyes; then
-+   AC_MSG_ERROR([SELinux selected but selinux/selinux.h not found])
-+   fi])
-+fi
-+
- dnl Checking for programs
- 
- AC_PATH_PROG(SENDMAIL, sendmail, , $PATH:/usr/lib:/usr/sbin )
-@@ -104,6 +116,7 @@ fi
- 
- AC_SUBST(MAIL_CMD)
- AC_SUBST(PAMLIB)
-+AC_SUBST(SELINUXLIB)
- 
- AC_MSG_CHECKING(etcdir)
- AC_ARG_WITH(etcdir,
--- 
-1.7.5.4
-
diff --git a/recipes-extended/at/at/at-3.1.14-selinux.patch b/recipes-extended/at/at/at-3.1.14-selinux.patch
new file mode 100644
index 0000000..4e5e18c
--- /dev/null
+++ b/recipes-extended/at/at/at-3.1.14-selinux.patch
@@ -0,0 +1,184 @@
+From: Xin Ouyang <Xin.Ouyang at windriver.com>
+Date: Wed, 13 Jun 2012 14:47:54 +0800
+Subject: [PATCH] at: atd add SELinux support.
+
+Upstream-Status: Inappropriate [configuration]
+
+Signed-off-by: Xin Ouyang <Xin.Ouyang at windriver.com>
+---
+ Makefile.in  |    1 +
+ atd.c        |   83 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+ config.h.in  |    3 ++
+ configure.ac |    8 +++++
+ 4 files changed, 95 insertions(+), 0 deletions(-)
+
+diff --git a/Makefile.in b/Makefile.in
+index 10e7ed2..35792cd 100644
+--- a/Makefile.in
++++ b/Makefile.in
+@@ -39,6 +39,7 @@ LIBS		= @LIBS@
+ LIBOBJS		= @LIBOBJS@
+ INSTALL		= @INSTALL@
+ PAMLIB          = @PAMLIB@
++SELINUXLIB      = @SELINUXLIB@
+ 
+ CLONES		= atq atrm
+ ATOBJECTS	= at.o panic.o perm.o posixtm.o y.tab.o lex.yy.o
+@@ -72,7 +72,7 @@ at: $(ATOBJECTS)
+	$(LN_S) -f at atrm
+ 
+ atd: $(RUNOBJECTS)
+-	$(CC) $(LDFLAGS) -o atd $(RUNOBJECTS) $(LIBS) $(PAMLIB)
++	$(CC) $(LDFLAGS) -o atd $(RUNOBJECTS) $(LIBS) $(PAMLIB) $(SELINUXLIB)
+ 
+ y.tab.c y.tab.h: parsetime.y
+	$(YACC) -d parsetime.y
+diff --git a/atd.c b/atd.c
+index af3e577..463124f 100644
+--- a/atd.c
++++ b/atd.c
+@@ -83,6 +83,14 @@
+ #include "getloadavg.h"
+ #endif
+ 
++#ifdef WITH_SELINUX
++#include <selinux/selinux.h>
++#include <selinux/get_context_list.h>
++int selinux_enabled = 0;
++#include <selinux/flask.h>
++#include <selinux/av_permissions.h>
++#endif
++
+ /* Macros */
+ 
+ #define BATCH_INTERVAL_DEFAULT 60
+@@ -195,6 +203,70 @@ myfork()
+ #define fork myfork
+ #endif
+ 
++#ifdef WITH_SELINUX
++static int
++set_selinux_context(const char *name, const char *filename)
++{
++    security_context_t user_context=NULL;
++    security_context_t  file_context=NULL;
++    struct av_decision avd;
++    int retval=-1;
++    char *seuser=NULL;
++    char *level=NULL;
++
++    if (getseuserbyname(name, &seuser, &level) == 0) {
++	retval=get_default_context_with_level(seuser, level, NULL, &user_context);
++	free(seuser);
++	free(level);
++	if (retval) {
++	    if (security_getenforce()==1) {
++		perr("execle: couldn't get security context for user %s\n", name);
++	    } else {
++		syslog(LOG_ERR, "execle: couldn't get security context for user %s\n", name);
++		return -1;
++	    }
++	}
++    }
++
++    /*
++    * Since crontab files are not directly executed,
++    * crond must ensure that the crontab file has
++    * a context that is appropriate for the context of
++    * the user cron job.  It performs an entrypoint
++    * permission check for this purpose.
++    */
++    if (fgetfilecon(STDIN_FILENO, &file_context) < 0)
++	perr("fgetfilecon FAILED %s", filename);
++
++    retval = security_compute_av(user_context,
++			file_context,
++			SECCLASS_FILE,
++			FILE__ENTRYPOINT,
++			&avd);
++    freecon(file_context);
++    if (retval || ((FILE__ENTRYPOINT & avd.allowed) != FILE__ENTRYPOINT)) {
++	if (security_getenforce()==1) {
++	    perr("Not allowed to set exec context to %s for user  %s\n", user_context,name);
++	} else {
++	    syslog(LOG_ERR, "Not allowed to set exec context to %s for user  %s\n", user_context,name);
++	    retval = -1;
++	    goto err;
++	}
++    }
++    if (setexeccon(user_context) < 0) {
++	if (security_getenforce()==1) {
++	    perr("Could not set exec context to %s for user  %s\n", user_context,name);
++	    retval = -1;
++	} else {
++	    syslog(LOG_ERR, "Could not set exec context to %s for user  %s\n", user_context,name);
++	}
++    }
++err:
++    freecon(user_context);
++    return 0;
++}
++#endif
++
+ static void
+ run_file(const char *filename, uid_t uid, gid_t gid)
+ {
+@@ -435,6 +507,13 @@ run_file(const char *filename, uid_t uid, gid_t gid)
+ 
+ 	    chdir("/");
+ 
++#ifdef WITH_SELINUX
++	    if (selinux_enabled > 0) {
++		if (set_selinux_context(pentry->pw_name, filename) < 0)
++		    perr("SELinux Failed to set context\n");
++	    }
++#endif
++
+ 	    if (execle("/bin/sh", "sh", (char *) NULL, nenvp) != 0)
+ 		perr("Exec failed for /bin/sh");
+ 
+@@ -707,6 +786,10 @@ main(int argc, char *argv[])
+     struct passwd *pwe;
+     struct group *ge;
+ 
++#ifdef WITH_SELINUX
++    selinux_enabled = is_selinux_enabled();
++#endif
++
+ /* We don't need root privileges all the time; running under uid and gid
+  * daemon is fine.
+  */
+diff --git a/configure.ac b/configure.ac
+index 2db7b65..5ecc35a 100644
+--- a/configure.ac
++++ b/configure.ac
+@@ -94,6 +94,18 @@ AC_CHECK_HEADERS(security/pam_appl.h, [
+    fi])
+ fi
+ 
++AC_ARG_WITH([selinux],
++  [AS_HELP_STRING([--without-selinux], [without SELinux support])])
++
++if test "x$with_selinux" != xno; then
++AC_CHECK_HEADERS(selinux/selinux.h, [
++  SELINUXLIB="-lselinux"
++  AC_DEFINE(WITH_SELINUX, 1, [Define to 1 for SELinux support])],
++   [if test "x$with_selinux" = xyes; then
++   AC_MSG_ERROR([SELinux selected but selinux/selinux.h not found])
++   fi])
++fi
++
+ dnl Checking for programs
+ 
+ AC_PATH_PROG(SENDMAIL, sendmail, , $PATH:/usr/lib:/usr/sbin )
+@@ -104,6 +116,7 @@ fi
+ 
+ AC_SUBST(MAIL_CMD)
+ AC_SUBST(PAMLIB)
++AC_SUBST(SELINUXLIB)
+ 
+ AC_MSG_CHECKING(etcdir)
+ AC_ARG_WITH(etcdir,
+-- 
+1.7.5.4
+
diff --git a/recipes-extended/at/at_3.1.13.bbappend b/recipes-extended/at/at_3.1.13.bbappend
deleted file mode 100644
index f30abab..0000000
--- a/recipes-extended/at/at_3.1.13.bbappend
+++ /dev/null
@@ -1,7 +0,0 @@
-PR .= ".2"
-
-FILESEXTRAPATHS_prepend := "${THISDIR}/${PN}:"
-
-SRC_URI += "file://at-3.1.13-selinux.patch"
-
-inherit with-selinux
diff --git a/recipes-extended/at/at_3.1.14.bbappend b/recipes-extended/at/at_3.1.14.bbappend
new file mode 100644
index 0000000..a7ecbc2
--- /dev/null
+++ b/recipes-extended/at/at_3.1.14.bbappend
@@ -0,0 +1,7 @@
+PR .= ".2"
+
+FILESEXTRAPATHS_prepend := "${THISDIR}/${PN}:"
+
+SRC_URI += "file://at-3.1.14-selinux.patch"
+
+inherit with-selinux
diff --git a/recipes-extended/sudo/sudo_1.8.7.bbappend b/recipes-extended/sudo/sudo_1.8.7.bbappend
deleted file mode 100644
index 5ad8973..0000000
--- a/recipes-extended/sudo/sudo_1.8.7.bbappend
+++ /dev/null
@@ -1,3 +0,0 @@
-PR .= ".2"
-
-inherit with-selinux
diff --git a/recipes-extended/sudo/sudo_1.8.8.bbappend b/recipes-extended/sudo/sudo_1.8.8.bbappend
new file mode 100644
index 0000000..5ad8973
--- /dev/null
+++ b/recipes-extended/sudo/sudo_1.8.8.bbappend
@@ -0,0 +1,3 @@
+PR .= ".2"
+
+inherit with-selinux
diff --git a/recipes-extended/tar/tar_1.26.bbappend b/recipes-extended/tar/tar_1.26.bbappend
deleted file mode 100644
index 2aad7a5..0000000
--- a/recipes-extended/tar/tar_1.26.bbappend
+++ /dev/null
@@ -1,15 +0,0 @@
-PR .= ".3"
-
-FILESEXTRAPATHS_prepend := "${THISDIR}/${PN}:"
-
-SRC_URI += "file://tar-1.24-xattrs.patch"
-
-inherit enable-selinux
-
-
-PACKAGECONFIG += "${@base_contains('DISTRO_FEATURES', 'acl', 'acl', '', d)}"
-
-# configure has no acl enable/disable options!
-#
-PACKAGECONFIG[acl] = ",,acl,"
-
diff --git a/recipes-extended/tar/tar_1.27.bbappend b/recipes-extended/tar/tar_1.27.bbappend
new file mode 100644
index 0000000..2aad7a5
--- /dev/null
+++ b/recipes-extended/tar/tar_1.27.bbappend
@@ -0,0 +1,15 @@
+PR .= ".3"
+
+FILESEXTRAPATHS_prepend := "${THISDIR}/${PN}:"
+
+SRC_URI += "file://tar-1.24-xattrs.patch"
+
+inherit enable-selinux
+
+
+PACKAGECONFIG += "${@base_contains('DISTRO_FEATURES', 'acl', 'acl', '', d)}"
+
+# configure has no acl enable/disable options!
+#
+PACKAGECONFIG[acl] = ",,acl,"
+
diff --git a/recipes-graphics/mesa/mesa_9.1.6.bbappend b/recipes-graphics/mesa/mesa_9.1.6.bbappend
deleted file mode 100644
index 8c11cac..0000000
--- a/recipes-graphics/mesa/mesa_9.1.6.bbappend
+++ /dev/null
@@ -1 +0,0 @@
-inherit enable-selinux
diff --git a/recipes-graphics/mesa/mesa_9.2.2.bbappend b/recipes-graphics/mesa/mesa_9.2.2.bbappend
new file mode 100644
index 0000000..8c11cac
--- /dev/null
+++ b/recipes-graphics/mesa/mesa_9.2.2.bbappend
@@ -0,0 +1 @@
+inherit enable-selinux
diff --git a/recipes-support/gnupg/gnupg_2.0.21.bbappend b/recipes-support/gnupg/gnupg_2.0.21.bbappend
deleted file mode 100644
index dddd945..0000000
--- a/recipes-support/gnupg/gnupg_2.0.21.bbappend
+++ /dev/null
@@ -1,5 +0,0 @@
-PR .= ".1"
-
-inherit enable-selinux
-# gnupg will not build with libselinux, so remove the depend
-PACKAGECONFIG[selinux] = "--enable-selinux-support,--disable-selinux-support,,"
diff --git a/recipes-support/gnupg/gnupg_2.0.22.bbappend b/recipes-support/gnupg/gnupg_2.0.22.bbappend
new file mode 100644
index 0000000..dddd945
--- /dev/null
+++ b/recipes-support/gnupg/gnupg_2.0.22.bbappend
@@ -0,0 +1,5 @@
+PR .= ".1"
+
+inherit enable-selinux
+# gnupg will not build with libselinux, so remove the depend
+PACKAGECONFIG[selinux] = "--enable-selinux-support,--disable-selinux-support,,"
-- 
1.7.10.4




More information about the yocto mailing list