From: Robin H. Johnson Date: Sun, 25 Feb 2007 11:34:42 +0000 (+0000) Subject: Cleanup all of the old stuff. X-Git-Url: http://git.tremily.us/?a=commitdiff_plain;h=b4b1a73587fb89e8c3f7bd0f2f1ff0ddaaf7e797;p=gentoo.git Cleanup all of the old stuff. Package-Manager: portage-2.1.2-r11 --- diff --git a/sys-process/audit/ChangeLog b/sys-process/audit/ChangeLog index 073746e032f2..664b8ff2746a 100644 --- a/sys-process/audit/ChangeLog +++ b/sys-process/audit/ChangeLog @@ -1,6 +1,16 @@ # ChangeLog for sys-process/audit # Copyright 1999-2007 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/ChangeLog,v 1.16 2007/02/25 11:29:26 robbat2 Exp $ +# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/ChangeLog,v 1.17 2007/02/25 11:34:42 robbat2 Exp $ + + 25 Feb 2007; Robin H. Johnson + -files/auditd.confd-0.7.2-r1, -files/auditd.initd-0.7.2-r1, + -files/audit-0.9.14-header.patch, -files/audit-1.1.3-compilefix.patch, + -files/audit-1.2.3-syscall-partial.patch, -files/auditd.confd, + -files/auditd.initd, -audit-0.7.2-r1.ebuild, -audit-0.7.3.ebuild, + -audit-0.7.4.ebuild, -audit-0.8.ebuild, -audit-0.8.1.ebuild, + -audit-0.9.1.ebuild, -audit-1.1.6.ebuild, -audit-1.2.1.ebuild, + -audit-1.2.3.ebuild, -audit-1.2.5.ebuild: + Cleanup all of the old stuff. *audit-1.2.9-r2 (25 Feb 2007) diff --git a/sys-process/audit/Manifest b/sys-process/audit/Manifest index fa44551b75c4..1f36c0202087 100644 --- a/sys-process/audit/Manifest +++ b/sys-process/audit/Manifest @@ -1,15 +1,3 @@ -AUX audit-0.9.14-header.patch 8276 RMD160 c5d0b446003cc828255a85ffad5b99bb0d57a884 SHA1 7b67435b4044649784c8cd5c16edb751f1595a89 SHA256 2bcb6fa6d7f65fac77d169859da4ad7cfbb8a69be8347ec40e606931c868f6a2 -MD5 3060e7e99fc090bc2cc13597db2a8d29 files/audit-0.9.14-header.patch 8276 -RMD160 c5d0b446003cc828255a85ffad5b99bb0d57a884 files/audit-0.9.14-header.patch 8276 -SHA256 2bcb6fa6d7f65fac77d169859da4ad7cfbb8a69be8347ec40e606931c868f6a2 files/audit-0.9.14-header.patch 8276 -AUX audit-1.1.3-compilefix.patch 3742 RMD160 dd0a5338aaac12850e771d6baa9d0bfb5d3a4925 SHA1 ae6175e2ea2d2f1bbffdb6a9a7a2f332511d4b3d SHA256 8ffe02eb9ee988996c9cb4ccdcc3ee39903131173260b13b72b94298fb3afff4 -MD5 fe4a6c96f2df7f9126c1f043610399f2 files/audit-1.1.3-compilefix.patch 3742 -RMD160 dd0a5338aaac12850e771d6baa9d0bfb5d3a4925 files/audit-1.1.3-compilefix.patch 3742 -SHA256 8ffe02eb9ee988996c9cb4ccdcc3ee39903131173260b13b72b94298fb3afff4 files/audit-1.1.3-compilefix.patch 3742 -AUX audit-1.2.3-syscall-partial.patch 401 RMD160 470099c106338cfbfc1555bfd98e0b222424fbc4 SHA1 e359ff27c1f2c57c582231305ee7bde836614447 SHA256 b1aa50a65dd94c34c4c77484571a8878d94c555d8d1714339b20a2c5b101e4ad -MD5 18673b7580bce6ca3409f8debdb8e999 files/audit-1.2.3-syscall-partial.patch 401 -RMD160 470099c106338cfbfc1555bfd98e0b222424fbc4 files/audit-1.2.3-syscall-partial.patch 401 -SHA256 b1aa50a65dd94c34c4c77484571a8878d94c555d8d1714339b20a2c5b101e4ad files/audit-1.2.3-syscall-partial.patch 401 AUX audit.h-2.6.18-rc4 19390 RMD160 3f7bc0e9b1f393d5f286e24f5253e5bcc1123137 SHA1 14f86c26b41262f2f551b0c2c76b1085211903e0 SHA256 21ce510f2245af00aa251946fd2109738009d0a072c7c7fcc8f6fd45c5b326e7 MD5 ea765c5ab187d21da7d54a66598b6b93 files/audit.h-2.6.18-rc4 19390 RMD160 3f7bc0e9b1f393d5f286e24f5253e5bcc1123137 files/audit.h-2.6.18-rc4 19390 @@ -34,77 +22,11 @@ AUX auditd-init.d-1.2.3 1136 RMD160 ceddd2ce12be248183722b59240d662f507a16eb SHA MD5 4d59af7e92ad04817ebdf9cd75067270 files/auditd-init.d-1.2.3 1136 RMD160 ceddd2ce12be248183722b59240d662f507a16eb files/auditd-init.d-1.2.3 1136 SHA256 fd5e01b4aa83d848a2e97832b0ff0610610b7857ec7f0201f0f7cbeff8eec725 files/auditd-init.d-1.2.3 1136 -AUX auditd.confd 474 RMD160 c50759bdfda42fb58caedda86a16b37f8c7e4cf9 SHA1 6b5b3fdcdfef958ba3f9b570213b99d440f9d4a9 SHA256 4e1377ee330a3f5e16c9eeaf3f9c56ab9edc76fc7b65140f0f1d917fd77169f4 -MD5 d0c04da868c3fe0dff941187f054ecf6 files/auditd.confd 474 -RMD160 c50759bdfda42fb58caedda86a16b37f8c7e4cf9 files/auditd.confd 474 -SHA256 4e1377ee330a3f5e16c9eeaf3f9c56ab9edc76fc7b65140f0f1d917fd77169f4 files/auditd.confd 474 -AUX auditd.confd-0.7.2-r1 483 RMD160 dcf9352e4c9a82768ebd0290c98d3e89b539b638 SHA1 d82d62f3733f09387721d495a151597d93091577 SHA256 dce987232ae7bf4545b2aedcd73c4f1023bba949e5335dc7fa60927effa9fc62 -MD5 402bf22e8e90b45f8a8349314cd61068 files/auditd.confd-0.7.2-r1 483 -RMD160 dcf9352e4c9a82768ebd0290c98d3e89b539b638 files/auditd.confd-0.7.2-r1 483 -SHA256 dce987232ae7bf4545b2aedcd73c4f1023bba949e5335dc7fa60927effa9fc62 files/auditd.confd-0.7.2-r1 483 -AUX auditd.initd 708 RMD160 64bc9edad5e5367b5b8685ea677974a861982432 SHA1 6660220311e88f853015194c36283b8498bb6353 SHA256 8bd37af8033abf07eaec1214fe56f607561ee2b436fca05002d0cdc222c27cfc -MD5 7c1f1f14a4750e7d8bbc1de62b3fcf59 files/auditd.initd 708 -RMD160 64bc9edad5e5367b5b8685ea677974a861982432 files/auditd.initd 708 -SHA256 8bd37af8033abf07eaec1214fe56f607561ee2b436fca05002d0cdc222c27cfc files/auditd.initd 708 -AUX auditd.initd-0.7.2-r1 709 RMD160 b13f83a40faa483b060e9f888a81138c573618e2 SHA1 81ad1f580f211198a099b82b7a2c7ecf4402650d SHA256 4c00b21e22add54e3c5f9a3b95fda9f5c2f03e51b0e6555cb941a8a4d76d6f8e -MD5 d50e111e375e27af12b1c200175cd7b6 files/auditd.initd-0.7.2-r1 709 -RMD160 b13f83a40faa483b060e9f888a81138c573618e2 files/auditd.initd-0.7.2-r1 709 -SHA256 4c00b21e22add54e3c5f9a3b95fda9f5c2f03e51b0e6555cb941a8a4d76d6f8e files/auditd.initd-0.7.2-r1 709 AUX elf-em.h-2.6.18-rc4 1571 RMD160 9c397b86fb3c604b42e704fcb7d335e2b504325d SHA1 e2162ff6012b74168570be5d8e74df9484e63c28 SHA256 039326066a1e0a6ecbfd0a9023a140a3041c138efcf165aac0dded5444beb31c MD5 ba15d4db52d12f7214ae4a35e3320790 files/elf-em.h-2.6.18-rc4 1571 RMD160 9c397b86fb3c604b42e704fcb7d335e2b504325d files/elf-em.h-2.6.18-rc4 1571 SHA256 039326066a1e0a6ecbfd0a9023a140a3041c138efcf165aac0dded5444beb31c files/elf-em.h-2.6.18-rc4 1571 -DIST audit-0.7.2.tar.gz 70184 RMD160 d13d8e93972f91386ced42e8204fb8ad4225f087 SHA1 04c92f1744da92a8d83a75bdec8013bf4f03b470 SHA256 fc2855e4504efeb60ec61aef414719eb9f94ef00496418a8873f3f8dc3e0628f -DIST audit-0.7.3.tar.gz 72496 RMD160 035a95e73e333abbd119667c2b987b0321600273 SHA1 51919bfbc826582849d28bb613bc09722f764eb7 SHA256 c24eae64555a32d2725f3af2aaf551fc6ffa1ea67e0bdbe735a739f36b9fcf8a -DIST audit-0.7.4.tar.gz 72751 RMD160 8c0d60f24da68372760cd33a46c9fe3f8acaf286 SHA1 63628e4e24a5e5ea0efb6d3f267e249792031273 SHA256 3fa0aadadb7163b868d435bdb03f73df7d19f2f4d98cb86e7c8ed445c39f5f95 -DIST audit-0.8.1.tar.gz 75487 RMD160 e5b9ed8cca8d4d3c4b379144633f9cba70fefd76 SHA1 aeade27682cbc7d6fb9ad17dd6f1ed3e5cc5f055 SHA256 bf33acf43bc8ce64a25d5b624814a84022df131f2062327cdc311788aadc51dc -DIST audit-0.8.tar.gz 74782 RMD160 fa9c23fb864eaa3987743535e0fa51c2294c02fc SHA1 3fe79cbba93e78b504cb175a2e2c5401ce1ab1ce SHA256 a70523be883acfc07410b2d4ec1b3a958de73c0a609d40621e695c3156641aee -DIST audit-0.9.1.tar.gz 82578 RMD160 beab2380723213bba3ad8dca21ebee1155a49900 SHA1 d23d3593b55ddd9689250d1e34dfc441805a8377 SHA256 88fdb0883f552dccb968bb953f6467f14bddb33cba22bad807649e4c039f1fab -DIST audit-1.1.6.tar.gz 274815 RMD160 8f420b47347d1c00b4b4c114dc4f913704a9205e SHA1 f8cc0340cfe570d96d4de973a1927e4aaff567f3 SHA256 44c152fc652567c64c5937335122b37250694152bd47d44628b11f1f65c16e04 -DIST audit-1.2.1.tar.gz 274432 RMD160 14f70c58239f6ed2eba3d902630f4bd4112c4fba SHA1 22c3b6a5c4e237cb91381abeb5e3074aae9cdbf9 SHA256 bba5d255d81ca36245464b83e977ba6bd05b1528cad07559fcc0367d39b2d26f -DIST audit-1.2.3.tar.gz 276977 RMD160 2fbc483dbff0ad5cd4022b4ccb5d3c082cccc0ef SHA1 9f40b82744915ab3df4255de7de69500e924fe18 SHA256 3bb70258c9e5ae2a0ebc43dc96542cd5494e169dc0d03d91bd9a7cd2a9f37b25 -DIST audit-1.2.5.tar.gz 232383 RMD160 8dd8bca46c918f0805756dfdfd898eb19b09f7e9 SHA1 9e34202e4304ac03e574af6b90b437fcaf2c7462 SHA256 6b9fd472ca97c07e319338a73b3f0adbe5f53506a15adba2ac2ad3c7db7b0eef DIST audit-1.2.9.tar.gz 240266 RMD160 329692787d24469b86107377e0004bfae380e0ea SHA1 a654638c49effc2514bc4b4c711fedf3af82a352 SHA256 3660d1220246e81df1e140867acefc82a61418009c740d92e56af2ae0baa4aff -EBUILD audit-0.7.2-r1.ebuild 1571 RMD160 f6fa25c23fbd547be702bd294d49fb2463840422 SHA1 f3ab3fe38d34872b26653709bf249c289331a9dc SHA256 487c009299e82b28b743e2d1892b76051d13a5159d3b9fd4525af0a4c7e5f0c2 -MD5 b7ae6b273342ab1c9a026a88c13cafa1 audit-0.7.2-r1.ebuild 1571 -RMD160 f6fa25c23fbd547be702bd294d49fb2463840422 audit-0.7.2-r1.ebuild 1571 -SHA256 487c009299e82b28b743e2d1892b76051d13a5159d3b9fd4525af0a4c7e5f0c2 audit-0.7.2-r1.ebuild 1571 -EBUILD audit-0.7.3.ebuild 1564 RMD160 304ba124145a91718380c3323dba7a750c60a743 SHA1 c302386a5cbdc5f7c132c7f820aa3cc322baaace SHA256 4c0ec3c67541629d804eb5aa768cc3fb77b7397ab30c35a7289c792314ad6c18 -MD5 7b7ff6f6407bc96c457a91f20a6f0c28 audit-0.7.3.ebuild 1564 -RMD160 304ba124145a91718380c3323dba7a750c60a743 audit-0.7.3.ebuild 1564 -SHA256 4c0ec3c67541629d804eb5aa768cc3fb77b7397ab30c35a7289c792314ad6c18 audit-0.7.3.ebuild 1564 -EBUILD audit-0.7.4.ebuild 1564 RMD160 8548886ca10bd324cc969887359b243ee1ec72b5 SHA1 1f8f6687238d4ee589fe24786bdefa8f11ae1b38 SHA256 ce7620877d6609ff0a045f41cb0bf8afff6ca4b6bb31091c9aa6aba36600b999 -MD5 800dc38b7b284025611145ab70338ae7 audit-0.7.4.ebuild 1564 -RMD160 8548886ca10bd324cc969887359b243ee1ec72b5 audit-0.7.4.ebuild 1564 -SHA256 ce7620877d6609ff0a045f41cb0bf8afff6ca4b6bb31091c9aa6aba36600b999 audit-0.7.4.ebuild 1564 -EBUILD audit-0.8.1.ebuild 1568 RMD160 7a33b02295170287c912e63061843a7180a626d3 SHA1 cbee458cd7b3fbd510e21c00fd461cabf3d4b62e SHA256 bd5b99c939ab394f891c7bece7c71dcf6b1f537263c774bc15c92ec8bc38a3f9 -MD5 23a5c32533900128dac2ca45b5889521 audit-0.8.1.ebuild 1568 -RMD160 7a33b02295170287c912e63061843a7180a626d3 audit-0.8.1.ebuild 1568 -SHA256 bd5b99c939ab394f891c7bece7c71dcf6b1f537263c774bc15c92ec8bc38a3f9 audit-0.8.1.ebuild 1568 -EBUILD audit-0.8.ebuild 1562 RMD160 fe1045f4888da8e3c9c475bde582667f41934c96 SHA1 ca3bb0b218c6d35c2eaeb8aa724e10af78e0e757 SHA256 e61f879a74d4ad8597c836768a009029fd73eca50cc361248aabc2a00cdc0eb9 -MD5 f72d5400e4239d7aa72c76c188ecc7c0 audit-0.8.ebuild 1562 -RMD160 fe1045f4888da8e3c9c475bde582667f41934c96 audit-0.8.ebuild 1562 -SHA256 e61f879a74d4ad8597c836768a009029fd73eca50cc361248aabc2a00cdc0eb9 audit-0.8.ebuild 1562 -EBUILD audit-0.9.1.ebuild 1564 RMD160 02e47ad08ae4f58d9f82b2773cf854d9a3aced53 SHA1 a5059cec53835df24c58174c6917c0ad9815d4f3 SHA256 a01bf8e0f27c70b7d40183f587bf59c1734ea60bb11733353900632fe9131389 -MD5 ccaf6e8614e3b817335570e1085e2a9a audit-0.9.1.ebuild 1564 -RMD160 02e47ad08ae4f58d9f82b2773cf854d9a3aced53 audit-0.9.1.ebuild 1564 -SHA256 a01bf8e0f27c70b7d40183f587bf59c1734ea60bb11733353900632fe9131389 audit-0.9.1.ebuild 1564 -EBUILD audit-1.1.6.ebuild 1912 RMD160 e5d15902c85f22103f500ae69e0a4cfdece7f26c SHA1 508e26c518ff7cb71347880a2398b8620cfe9b18 SHA256 29f53cbef435af1596618803bd6d4519d53edf691bef483320d7db7ca6815f1c -MD5 3a1f2c34a499b8a9dd5e43928f3eef9d audit-1.1.6.ebuild 1912 -RMD160 e5d15902c85f22103f500ae69e0a4cfdece7f26c audit-1.1.6.ebuild 1912 -SHA256 29f53cbef435af1596618803bd6d4519d53edf691bef483320d7db7ca6815f1c audit-1.1.6.ebuild 1912 -EBUILD audit-1.2.1.ebuild 1668 RMD160 b5516041db7911acc6847b86735bb76d15194f6b SHA1 b6fd2609ef2868a8c15688a3cc035e21c0756cb4 SHA256 331bd0e375083d2af0a70ee4fb628ddf247a9d3e5f708d874812a0f6dc6561f2 -MD5 5cac2cd08a185d624afc17083adea76e audit-1.2.1.ebuild 1668 -RMD160 b5516041db7911acc6847b86735bb76d15194f6b audit-1.2.1.ebuild 1668 -SHA256 331bd0e375083d2af0a70ee4fb628ddf247a9d3e5f708d874812a0f6dc6561f2 audit-1.2.1.ebuild 1668 -EBUILD audit-1.2.3.ebuild 1988 RMD160 5c1510293de62d2c70aa4021790af21cb476172f SHA1 2f5941b14a0ac253568556fefc481b72549a073b SHA256 690349c3f66045833e72e4a5b09143a60a451ea698df8c8bd2844a4e006d4a4a -MD5 1a1cec11bb2e687d498dbccb4f91367a audit-1.2.3.ebuild 1988 -RMD160 5c1510293de62d2c70aa4021790af21cb476172f audit-1.2.3.ebuild 1988 -SHA256 690349c3f66045833e72e4a5b09143a60a451ea698df8c8bd2844a4e006d4a4a audit-1.2.3.ebuild 1988 -EBUILD audit-1.2.5.ebuild 2186 RMD160 8f0393ca14113c5462dc618487fdcc5cec8e8736 SHA1 3810d4b933a6a828276940985bb2965de01c2aa6 SHA256 6a2a2cffa597104bbaf6c293c968d65958dac0ed9ca3f535ff8063b898d7af4a -MD5 527821e5b7740443b0386d62f4849e4e audit-1.2.5.ebuild 2186 -RMD160 8f0393ca14113c5462dc618487fdcc5cec8e8736 audit-1.2.5.ebuild 2186 -SHA256 6a2a2cffa597104bbaf6c293c968d65958dac0ed9ca3f535ff8063b898d7af4a audit-1.2.5.ebuild 2186 EBUILD audit-1.2.9-r1.ebuild 2149 RMD160 198117c42393baa577bd85583e80485ac1845220 SHA1 81b172e40fef80cc4b1a355883b2464368529810 SHA256 72e9ca2aaf3cd8f895b5cba9f65a35aec684ec9c451a64ec3ec0a5855d338d14 MD5 4ccb78e8fcc59b2e2a4d4709dec29378 audit-1.2.9-r1.ebuild 2149 RMD160 198117c42393baa577bd85583e80485ac1845220 audit-1.2.9-r1.ebuild 2149 @@ -117,44 +39,14 @@ EBUILD audit-1.2.9.ebuild 2105 RMD160 97de566a99d9b20dc82af1205457e02a9943780c S MD5 855d7b9a8025d3a984a8c8fd4275ad1b audit-1.2.9.ebuild 2105 RMD160 97de566a99d9b20dc82af1205457e02a9943780c audit-1.2.9.ebuild 2105 SHA256 b1831bd74bcf219f062b7a572b7e21c6a3383c44b360650803d764f8ccb92fe1 audit-1.2.9.ebuild 2105 -MISC ChangeLog 3233 RMD160 b4e6d155222147fd4b5b4a2eb5676def2643f443 SHA1 95f6a3f1dba49d62634d2dfb1dce9246273467c6 SHA256 a8b10b46aaed5b53bd39e8c63daffee3e71e5fe78001d7f9a53a54aa01e9a70a -MD5 fa233e8885fce5623ab6b2acaff82fb0 ChangeLog 3233 -RMD160 b4e6d155222147fd4b5b4a2eb5676def2643f443 ChangeLog 3233 -SHA256 a8b10b46aaed5b53bd39e8c63daffee3e71e5fe78001d7f9a53a54aa01e9a70a ChangeLog 3233 +MISC ChangeLog 3759 RMD160 76a59b66aa710630e59ea3f0d9d1c2cf45b1d053 SHA1 c1745e62bbdc5557bda2bda3f0a09ab98a8100f7 SHA256 98fe271d6eb3b89b48f91c774dbfe2b24a29f607f4844bf4de1186215bed9732 +MD5 75b66e107ea5e3847a03535e4fd6db13 ChangeLog 3759 +RMD160 76a59b66aa710630e59ea3f0d9d1c2cf45b1d053 ChangeLog 3759 +SHA256 98fe271d6eb3b89b48f91c774dbfe2b24a29f607f4844bf4de1186215bed9732 ChangeLog 3759 MISC metadata.xml 231 RMD160 e78f0580e975fa82702433055e1498b0d9228104 SHA1 de14a9907da991c933aed57aeba714d7b7ce28c6 SHA256 f62f6487425736b6d2f27bb84ee09ccee245c1abf74462b6fbcb90f2c368ad2e MD5 426b16b0f03a2c3b0fa6864a71876999 metadata.xml 231 RMD160 e78f0580e975fa82702433055e1498b0d9228104 metadata.xml 231 SHA256 f62f6487425736b6d2f27bb84ee09ccee245c1abf74462b6fbcb90f2c368ad2e metadata.xml 231 -MD5 c3b764781bc327cd347573729a52e4bd files/digest-audit-0.7.2-r1 232 -RMD160 26a030277dd0bea549f1b248b6d6a15e15192d00 files/digest-audit-0.7.2-r1 232 -SHA256 314456dddc68f722b0b8bf0ac04ada58f6c76673890082875146fab204f1214f files/digest-audit-0.7.2-r1 232 -MD5 b42d75fefc5c821bf0a3f826908ddf5c files/digest-audit-0.7.3 232 -RMD160 462b0676b1c4df80fb64c12a4fa323b11d819c72 files/digest-audit-0.7.3 232 -SHA256 6fd7698b406d5800282a3111776d9bfe6dcbe29af0881937ae46b4b0768257c5 files/digest-audit-0.7.3 232 -MD5 e947068fd556e0a653b9f41aad021aa8 files/digest-audit-0.7.4 232 -RMD160 4f6542d3198ec6e0f5de87c46ea6e76b9ca557ce files/digest-audit-0.7.4 232 -SHA256 508cc6bd3b5f2cf9723d29639b51b24fbbfee8af138626f3115f7e342511dc31 files/digest-audit-0.7.4 232 -MD5 8499458fe9b1e68cf696dab0a43b2197 files/digest-audit-0.8 226 -RMD160 4e787601fc9b20ec7b9d3140e133e6e1f35b3395 files/digest-audit-0.8 226 -SHA256 6315af70cc826c42d45fecffdb847558eff1802f3d4b6a05118901a19181f438 files/digest-audit-0.8 226 -MD5 0ba4cccaba7e5a512d8e805ccf385c31 files/digest-audit-0.8.1 232 -RMD160 515e22e7d2acb9e2634cd69b9ef0c037c31554ae files/digest-audit-0.8.1 232 -SHA256 9fe5f5e69f07a596b5be612a0351d889421681a102f324dc01381845dbbdf027 files/digest-audit-0.8.1 232 -MD5 34abf88bb06b37ecb3afd5cdeadfc23f files/digest-audit-0.9.1 232 -RMD160 bf925294f921d82a35e61d7fd3e50535a3f847be files/digest-audit-0.9.1 232 -SHA256 1b1be2379dcb585eb3708ee7010530af15aef1602ea060457907a0cc4f5b3b00 files/digest-audit-0.9.1 232 -MD5 edb393f2e6c69e99ffb30cffd84f91c6 files/digest-audit-1.1.6 235 -RMD160 9bd14ae6d5fa05e220d76edbe6141b738998f545 files/digest-audit-1.1.6 235 -SHA256 9771919111067a75162be5c8bcab827d83de60d3ee7d7b8b873372d17fa43320 files/digest-audit-1.1.6 235 -MD5 ded2fc0aedbcc841885edf0c30fbd5d5 files/digest-audit-1.2.1 235 -RMD160 ea0cbbfccc546049070cb9e5cba2e2935d26308d files/digest-audit-1.2.1 235 -SHA256 76c086afac2d22489c3f0e77d4b499adeb0e8e388dabd59d4bc45d050e05bf20 files/digest-audit-1.2.1 235 -MD5 2422b3460ec6face2b31b0469617075e files/digest-audit-1.2.3 235 -RMD160 fa6eadcc99cfc0497998a595515f2f804edbd207 files/digest-audit-1.2.3 235 -SHA256 d26e65bffa752bc78c9352d26e41fe0a25d201b6c4d135dc86c4c3d0de917956 files/digest-audit-1.2.3 235 -MD5 d851cba34d82b43ae3090ac44d0e302f files/digest-audit-1.2.5 235 -RMD160 e2c725a5626023f210634d16a3334f615ccd7100 files/digest-audit-1.2.5 235 -SHA256 9e98699429a16d24851405209afdb55f9e91e99cdf29486adf5b864b2ce0f289 files/digest-audit-1.2.5 235 MD5 6680465051b7c6f77446364536f6d36f files/digest-audit-1.2.9 235 RMD160 6151f479783510a59a0974d3133d50a648cfd363 files/digest-audit-1.2.9 235 SHA256 45a8955de9c405232ff0c416b2bbe7025b986788532130d1a4c35a91402c3f24 files/digest-audit-1.2.9 235 diff --git a/sys-process/audit/audit-0.7.2-r1.ebuild b/sys-process/audit/audit-0.7.2-r1.ebuild deleted file mode 100644 index 649855b3eb41..000000000000 --- a/sys-process/audit/audit-0.7.2-r1.ebuild +++ /dev/null @@ -1,54 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.7.2-r1.ebuild,v 1.1 2005/05/01 03:20:47 robbat2 Exp $ - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~x86" -IUSE="" - -DEPEND="sys-devel/libtool - virtual/os-headers - >=sys-devel/automake-1.9 - >=sys-devel/autoconf-2.59" -RDEPEND="" - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - WANT_AUTOMAKE="1.9" \ - autoreconf -fv --install || die "autoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR=${D} install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - # remove RH garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - # restrictive perms for security - chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${D}/etc/{auditd.conf,audit.rules} -} - -pkg_postinst() { - # upstream wants these to have restrictive perms - chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/ - chmod 0640 /etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-0.7.3.ebuild b/sys-process/audit/audit-0.7.3.ebuild deleted file mode 100644 index 3b1647709bf8..000000000000 --- a/sys-process/audit/audit-0.7.3.ebuild +++ /dev/null @@ -1,54 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.7.3.ebuild,v 1.1 2005/05/07 07:05:52 beu Exp $ - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~x86" -IUSE="" - -DEPEND="sys-devel/libtool - virtual/os-headers - >=sys-devel/automake-1.9 - >=sys-devel/autoconf-2.59" -RDEPEND="" - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - WANT_AUTOMAKE="1.9" \ - autoreconf -fv --install || die "autoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR=${D} install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - # remove RH garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - # restrictive perms for security - chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${D}/etc/{auditd.conf,audit.rules} -} - -pkg_postinst() { - # upstream wants these to have restrictive perms - chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/ - chmod 0640 /etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-0.7.4.ebuild b/sys-process/audit/audit-0.7.4.ebuild deleted file mode 100644 index 7119d6416cb5..000000000000 --- a/sys-process/audit/audit-0.7.4.ebuild +++ /dev/null @@ -1,54 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.7.4.ebuild,v 1.1 2005/05/09 05:45:13 beu Exp $ - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~x86" -IUSE="" - -DEPEND="sys-devel/libtool - virtual/os-headers - >=sys-devel/automake-1.9 - >=sys-devel/autoconf-2.59" -RDEPEND="" - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - WANT_AUTOMAKE="1.9" \ - autoreconf -fv --install || die "autoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR=${D} install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - # remove RH garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - # restrictive perms for security - chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${D}/etc/{auditd.conf,audit.rules} -} - -pkg_postinst() { - # upstream wants these to have restrictive perms - chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/ - chmod 0640 /etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-0.8.1.ebuild b/sys-process/audit/audit-0.8.1.ebuild deleted file mode 100644 index 02ef13a83c58..000000000000 --- a/sys-process/audit/audit-0.8.1.ebuild +++ /dev/null @@ -1,54 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.8.1.ebuild,v 1.1 2005/05/19 18:15:39 robbat2 Exp $ - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~x86" -IUSE="" - -DEPEND="sys-devel/libtool - virtual/os-headers - >=sys-devel/automake-1.9 - >=sys-devel/autoconf-2.59" -RDEPEND="" - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - WANT_AUTOMAKE="1.9" \ - autoreconf -fv --install || die "autoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR=${D} install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - # remove RH garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - # restrictive perms for security - chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${D}/etc/{auditd.conf,audit.rules} -} - -pkg_postinst() { - # upstream wants these to have restrictive perms - chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/ - chmod 0640 /etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-0.8.ebuild b/sys-process/audit/audit-0.8.ebuild deleted file mode 100644 index 76a267f44653..000000000000 --- a/sys-process/audit/audit-0.8.ebuild +++ /dev/null @@ -1,54 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.8.ebuild,v 1.1 2005/05/15 14:55:30 beu Exp $ - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~x86" -IUSE="" - -DEPEND="sys-devel/libtool - virtual/os-headers - >=sys-devel/automake-1.9 - >=sys-devel/autoconf-2.59" -RDEPEND="" - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - WANT_AUTOMAKE="1.9" \ - autoreconf -fv --install || die "autoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR=${D} install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - # remove RH garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - # restrictive perms for security - chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${D}/etc/{auditd.conf,audit.rules} -} - -pkg_postinst() { - # upstream wants these to have restrictive perms - chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/ - chmod 0640 /etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-0.9.1.ebuild b/sys-process/audit/audit-0.9.1.ebuild deleted file mode 100644 index c3ec2dcc4ec0..000000000000 --- a/sys-process/audit/audit-0.9.1.ebuild +++ /dev/null @@ -1,54 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-0.9.1.ebuild,v 1.1 2005/06/06 01:39:22 beu Exp $ - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~x86" -IUSE="" - -DEPEND="sys-devel/libtool - virtual/os-headers - >=sys-devel/automake-1.9 - >=sys-devel/autoconf-2.59" -RDEPEND="" - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - WANT_AUTOMAKE="1.9" \ - autoreconf -fv --install || die "autoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR=${D} install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - # remove RH garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - # restrictive perms for security - chmod 0750 ${D}/sbin/{auditctl,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${D}/etc/{auditd.conf,audit.rules} -} - -pkg_postinst() { - # upstream wants these to have restrictive perms - chmod 0750 /sbin/{auditctl,auditd,ausearch,autrace} /var/log/audit/ - chmod 0640 /etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-1.1.6.ebuild b/sys-process/audit/audit-1.1.6.ebuild deleted file mode 100644 index 43dcb9e163d4..000000000000 --- a/sys-process/audit/audit-1.1.6.ebuild +++ /dev/null @@ -1,67 +0,0 @@ -# Copyright 1999-2006 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-1.1.6.ebuild,v 1.2 2006/11/13 11:41:07 robbat2 Exp $ - -inherit eutils autotools - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -HEADER_KV="2.6.18-rc4" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="-*" -IUSE="" - -RDEPEND=">=dev-lang/python-2.4" -DEPEND="${RDEPEND} - dev-lang/swig" -# Do not use os-headers as this is linux specific -# linux-headers 2.6.17_rc1 is NOT in the tree yet. - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - for i in audit.h elf-em.h; do - cp -f ${FILESDIR}/${i}-${HEADER_KV} ${S}/lib/${i} - done - sed -i -e 's,,"elf-em.h",g' ${S}/lib/audit.h - sed -i -e 's,,"audit.h",g' ${S}/lib/libaudit.h - cp -f ${S}/lib/{audit,elf-em}.h ${S}/src/mt/ - eautoreconf || die "eautoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR="${D}" install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - rm -rf ${D}/lib/*.la ${D}/usr/lib/*.la - # remove RedHat garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules contrib/* - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - lockdown_perms ${D} -} - -pkg_postinst() { - lockdown_perms / -} - -lockdown_perms() { - # upstream wants these to have restrictive perms - basedir="$1" - chmod 0750 ${basedir}/sbin/{auditctl,aureport,audispd,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${basedir}/etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-1.2.1.ebuild b/sys-process/audit/audit-1.2.1.ebuild deleted file mode 100644 index 749a6341bc32..000000000000 --- a/sys-process/audit/audit-1.2.1.ebuild +++ /dev/null @@ -1,60 +0,0 @@ -# Copyright 1999-2006 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-1.2.1.ebuild,v 1.1 2006/04/19 23:17:16 robbat2 Exp $ - -inherit eutils autotools - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="-*" -IUSE="" - -RDEPEND=">=dev-lang/python-2.4" -DEPEND="${RDEPEND} - dev-lang/swig - >=sys-kernel/linux-headers-2.6.17_rc1" -# Do not use os-headers as this is linux specific -# linux-headers 2.6.17_rc1 is NOT in the tree yet. - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - eautoreconf || die "eautoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR="${D}" install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - rm -rf ${D}/lib/*.la ${D}/usr/lib/*.la - # remove RedHat garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules contrib/* - # scripts - newinitd ${FILESDIR}/auditd.initd-0.7.2-r1 auditd - newconfd ${FILESDIR}/auditd.confd-0.7.2-r1 auditd - # audit logs go here - keepdir /var/log/audit/ - lockdown_perms ${D} -} - -pkg_postinst() { - lockdown_perms / -} - -lockdown_perms() { - # upstream wants these to have restrictive perms - basedir="$1" - chmod 0750 ${basedir}/sbin/{auditctl,aureport,audispd,auditd,ausearch,autrace} ${D}/var/log/audit/ - chmod 0640 ${basedir}/etc/{auditd.conf,audit.rules} -} diff --git a/sys-process/audit/audit-1.2.3.ebuild b/sys-process/audit/audit-1.2.3.ebuild deleted file mode 100644 index 79451df045cd..000000000000 --- a/sys-process/audit/audit-1.2.3.ebuild +++ /dev/null @@ -1,68 +0,0 @@ -# Copyright 1999-2006 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-1.2.3.ebuild,v 1.2 2006/11/13 11:41:07 robbat2 Exp $ - -inherit eutils autotools toolchain-funcs - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="-*" -IUSE="" - -RDEPEND=">=dev-lang/python-2.4" -DEPEND="${RDEPEND} - dev-lang/swig - >=sys-kernel/linux-headers-2.6.17_p3" -# Do not use os-headers as this is linux specific -# linux-headers 2.6.17_p3 is NOT in the tree yet. -# It is basically linux-headers-2.6.17 + patch-2.6.17-git3 - 2.6.16-appCompat.patch - -src_unpack() { - unpack ${A} || die "unpack failed" - epatch ${FILESDIR}/${P}-syscall-partial.patch - cd ${S} || die "cd '${S}' failed" - eautoreconf || die "eautoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR="${D}" install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - rm -rf ${D}/lib/*.la ${D}/usr/lib/*.la - gen_usr_ldscript libaudit.so libauparse.so - # remove RedHat garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules contrib/* - # scripts - newinitd ${FILESDIR}/auditd-init.d-1.2.3 auditd - newconfd ${FILESDIR}/auditd-conf.d-1.2.3 auditd - # Gentoo rules - insinto /etc/audit/ - doins ${FILESDIR}/audit.rules* - # audit logs go here - keepdir /var/log/audit/ - # Security - lockdown_perms ${D} -} - -pkg_postinst() { - lockdown_perms / -} - -lockdown_perms() { - # upstream wants these to have restrictive perms - basedir="$1" - chmod 0750 ${basedir}/sbin/au{ditctl,report,dispd,ditd,search,trace} 2>/dev/null - chmod 0750 ${basedir}/var/log/audit/ 2>/dev/null - chmod 0640 ${basedir}/etc/{audit/,}{auditd.conf,audit.rules*} 2>/dev/null -} diff --git a/sys-process/audit/audit-1.2.5.ebuild b/sys-process/audit/audit-1.2.5.ebuild deleted file mode 100644 index bb8355368769..000000000000 --- a/sys-process/audit/audit-1.2.5.ebuild +++ /dev/null @@ -1,74 +0,0 @@ -# Copyright 1999-2006 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/audit-1.2.5.ebuild,v 1.1 2006/11/13 11:41:07 robbat2 Exp $ - -inherit eutils autotools toolchain-funcs - -DESCRIPTION="Userspace utilities for storing and processing auditing records." -HOMEPAGE="http://people.redhat.com/sgrubb/audit/" -SRC_URI="${HOMEPAGE}${P}.tar.gz" - -HEADER_KV="2.6.18-rc4" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="-*" -IUSE="" - -RDEPEND=">=dev-lang/python-2.4" -DEPEND="${RDEPEND} - dev-lang/swig" -# Do not use os-headers as this is linux specific -# linux-headers 2.6.17_p3 is NOT in the tree yet. -# It is basically linux-headers-2.6.17 + patch-2.6.17-git3 - 2.6.16-appCompat.patch - -src_unpack() { - unpack ${A} || die "unpack failed" - cd ${S} || die "cd '${S}' failed" - for i in audit.h elf-em.h; do - cp -f ${FILESDIR}/${i}-${HEADER_KV} ${S}/lib/${i} - done - sed -i -e 's,,"elf-em.h",g' ${S}/lib/audit.h - sed -i -e 's,,"audit.h",g' ${S}/lib/libaudit.h - cp -f ${S}/lib/{audit,elf-em}.h ${S}/src/mt/ - eautoreconf || die "eautoreconf failed" -} - -src_compile() { - econf --sbindir=/sbin --libdir=/lib || die "econf failed" - emake || die "emake failed" -} - -src_install() { - emake DESTDIR="${D}" install || die "emake install failed" - dodir /usr/lib - mv ${D}/lib/*.a ${D}/usr/lib - rm -rf ${D}/lib/*.la ${D}/usr/lib/*.la - gen_usr_ldscript libaudit.so libauparse.so - # remove RedHat garbage - rm -rf ${D}/etc/rc.d ${D}/etc/sysconfig - # docs - dodoc AUTHORS ChangeLog README* THANKS TODO sample.rules contrib/* - # scripts - newinitd ${FILESDIR}/auditd-init.d-1.2.3 auditd - newconfd ${FILESDIR}/auditd-conf.d-1.2.3 auditd - # Gentoo rules - insinto /etc/audit/ - doins ${FILESDIR}/audit.rules* - # audit logs go here - keepdir /var/log/audit/ - # Security - lockdown_perms ${D} -} - -pkg_postinst() { - lockdown_perms / -} - -lockdown_perms() { - # upstream wants these to have restrictive perms - basedir="$1" - chmod 0750 ${basedir}/sbin/au{ditctl,report,dispd,ditd,search,trace} 2>/dev/null - chmod 0750 ${basedir}/var/log/audit/ 2>/dev/null - chmod 0640 ${basedir}/etc/{audit/,}{auditd.conf,audit.rules*} 2>/dev/null -} diff --git a/sys-process/audit/files/audit-0.9.14-header.patch b/sys-process/audit/files/audit-0.9.14-header.patch deleted file mode 100644 index 1668d9ff5b9e..000000000000 --- a/sys-process/audit/files/audit-0.9.14-header.patch +++ /dev/null @@ -1,208 +0,0 @@ -diff -ur audit-0.9.14/lib/libaudit.h /opt/audit-0.9.14/lib/libaudit.h ---- audit-0.9.14/lib/libaudit.h 2005-06-21 17:50:54.000000000 -0400 -+++ /opt/audit-0.9.14/lib/libaudit.h 2005-06-28 14:26:57.000000000 -0400 -@@ -1,3 +1,196 @@ -+/* NOTE: This file is really 2 that are combined temporarily. */ -+ -+/* audit.h -- Auditing support -+ * -+ * Copyright 2003-2004 Red Hat Inc., Durham, North Carolina. -+ * All Rights Reserved. -+ * -+ * This program is free software; you can redistribute it and/or modify -+ * it under the terms of the GNU General Public License as published by -+ * the Free Software Foundation; either version 2 of the License, or -+ * (at your option) any later version. -+ * -+ * This program is distributed in the hope that it will be useful, -+ * but WITHOUT ANY WARRANTY; without even the implied warranty of -+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -+ * GNU General Public License for more details. -+ * -+ * You should have received a copy of the GNU General Public License -+ * along with this program; if not, write to the Free Software -+ * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA -+ * -+ * Written by Rickard E. (Rik) Faith -+ * -+ */ -+ -+#ifndef _LINUX_AUDIT_H_ -+#define _LINUX_AUDIT_H_ -+ -+#include -+ -+/* The netlink messages for the audit system is divided into blocks: -+ * 1000 - 1099 are for commanding the audit system -+ * 1100 - 1199 user space trusted application messages -+ * 1200 - 1299 messages internal to the audit daemon -+ * 1300 - 1399 audit event messages -+ * 1400 - 1499 SE Linux use -+ * 1500 - 1999 future use -+ * 2000 is for otherwise unclassified kernel audit messages -+ * -+ * Messages from 1000-1199 are bi-directional. 1200-1299 are exclusively user -+ * space. Anything over that is kernel --> user space communication. -+ */ -+#define AUDIT_GET 1000 /* Get status */ -+#define AUDIT_SET 1001 /* Set status (enable/disable/auditd) */ -+#define AUDIT_LIST 1002 /* List syscall filtering rules */ -+#define AUDIT_ADD 1003 /* Add syscall filtering rule */ -+#define AUDIT_DEL 1004 /* Delete syscall filtering rule */ -+#define AUDIT_USER 1005 /* Message from userspace -- deprecated */ -+#define AUDIT_LOGIN 1006 /* Define the login id and information */ -+#define AUDIT_WATCH_INS 1007 /* Insert file/dir watch entry */ -+#define AUDIT_WATCH_REM 1008 /* Remove file/dir watch entry */ -+#define AUDIT_WATCH_LIST 1009 /* List all file/dir watches */ -+#define AUDIT_SIGNAL_INFO 1010 /* Get info about sender of signal to auditd */ -+ -+#define AUDIT_FIRST_USER_MSG 1100 /* Userspace messages uninteresting to kernel */ -+#define AUDIT_LAST_USER_MSG 1199 -+ -+#define AUDIT_DAEMON_START 1200 /* Daemon startup record */ -+#define AUDIT_DAEMON_END 1201 /* Daemon normal stop record */ -+#define AUDIT_DAEMON_ABORT 1202 /* Daemon error stop record */ -+#define AUDIT_DAEMON_CONFIG 1203 /* Daemon config change */ -+ -+#define AUDIT_SYSCALL 1300 /* Syscall event */ -+#define AUDIT_FS_WATCH 1301 /* Filesystem watch event */ -+#define AUDIT_PATH 1302 /* Filname path information */ -+#define AUDIT_IPC 1303 /* IPC record */ -+#define AUDIT_SOCKETCALL 1304 /* sys_socketcall arguments */ -+#define AUDIT_CONFIG_CHANGE 1305 /* Audit system configuration change */ -+#define AUDIT_SOCKADDR 1306 /* sockaddr copied as syscall arg */ -+ -+#define AUDIT_AVC 1400 /* SE Linux avc denial or grant */ -+#define AUDIT_SELINUX_ERR 1401 /* Internal SE Linux Errors */ -+#define AUDIT_AVC_PATH 1402 /* dentry, vfsmount pair from avc */ -+ -+#define AUDIT_KERNEL 2000 /* Asynchronous audit record. NOT A REQUEST. */ -+ -+/* Rule flags */ -+#define AUDIT_PER_TASK 0x01 /* Apply rule at task creation (not syscall) */ -+#define AUDIT_AT_ENTRY 0x02 /* Apply rule at syscall entry */ -+#define AUDIT_AT_EXIT 0x04 /* Apply rule at syscall exit */ -+#define AUDIT_PREPEND 0x10 /* Prepend to front of list */ -+ -+/* Rule actions */ -+#define AUDIT_NEVER 0 /* Do not build context if rule matches */ -+#define AUDIT_POSSIBLE 1 /* Build context if rule matches */ -+#define AUDIT_ALWAYS 2 /* Generate audit record if rule matches */ -+ -+/* Rule structure sizes -- if these change, different AUDIT_ADD and -+ * AUDIT_LIST commands must be implemented. */ -+#define AUDIT_MAX_FIELDS 64 -+#define AUDIT_BITMASK_SIZE 64 -+#define AUDIT_WORD(nr) ((uint32_t)((nr)/32)) -+#define AUDIT_BIT(nr) (1 << ((nr) - AUDIT_WORD(nr)*32)) -+ -+/* Rule fields */ -+ /* These are useful when checking the -+ * task structure at task creation time -+ * (AUDIT_PER_TASK). */ -+#define AUDIT_PID 0 -+#define AUDIT_UID 1 -+#define AUDIT_EUID 2 -+#define AUDIT_SUID 3 -+#define AUDIT_FSUID 4 -+#define AUDIT_GID 5 -+#define AUDIT_EGID 6 -+#define AUDIT_SGID 7 -+#define AUDIT_FSGID 8 -+#define AUDIT_LOGINUID 9 -+#define AUDIT_PERS 10 -+#define AUDIT_ARCH 11 -+ -+ /* These are ONLY useful when checking -+ * at syscall exit time (AUDIT_AT_EXIT). */ -+#define AUDIT_DEVMAJOR 100 -+#define AUDIT_DEVMINOR 101 -+#define AUDIT_INODE 102 -+#define AUDIT_EXIT 103 -+#define AUDIT_SUCCESS 104 /* exit >= 0; value ignored */ -+ -+#define AUDIT_ARG0 200 -+#define AUDIT_ARG1 (AUDIT_ARG0+1) -+#define AUDIT_ARG2 (AUDIT_ARG0+2) -+#define AUDIT_ARG3 (AUDIT_ARG0+3) -+ -+#define AUDIT_NEGATE 0x80000000 -+ -+ -+/* Status symbols */ -+ /* Mask values */ -+#define AUDIT_STATUS_ENABLED 0x0001 -+#define AUDIT_STATUS_FAILURE 0x0002 -+#define AUDIT_STATUS_PID 0x0004 -+#define AUDIT_STATUS_RATE_LIMIT 0x0008 -+#define AUDIT_STATUS_BACKLOG_LIMIT 0x0010 -+ /* Failure-to-log actions */ -+#define AUDIT_FAIL_SILENT 0 -+#define AUDIT_FAIL_PRINTK 1 -+#define AUDIT_FAIL_PANIC 2 -+ -+/* distinguish syscall tables */ -+#define __AUDIT_ARCH_64BIT 0x80000000 -+#define __AUDIT_ARCH_LE 0x40000000 -+#define AUDIT_ARCH_ALPHA (EM_ALPHA|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_ARM (EM_ARM|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_ARMEB (EM_ARM) -+#define AUDIT_ARCH_CRIS (EM_CRIS|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_FRV (EM_FRV) -+#define AUDIT_ARCH_H8300 (EM_H8_300) -+#define AUDIT_ARCH_I386 (EM_386|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_IA64 (EM_IA_64|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_M32R (EM_M32R) -+#define AUDIT_ARCH_M68K (EM_68K) -+#define AUDIT_ARCH_MIPS (EM_MIPS) -+#define AUDIT_ARCH_MIPSEL (EM_MIPS|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_MIPS64 (EM_MIPS|__AUDIT_ARCH_64BIT) -+#define AUDIT_ARCH_MIPSEL64 (EM_MIPS|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_PARISC (EM_PARISC) -+#define AUDIT_ARCH_PARISC64 (EM_PARISC|__AUDIT_ARCH_64BIT) -+#define AUDIT_ARCH_PPC (EM_PPC) -+#define AUDIT_ARCH_PPC64 (EM_PPC64|__AUDIT_ARCH_64BIT) -+#define AUDIT_ARCH_S390 (EM_S390) -+#define AUDIT_ARCH_S390X (EM_S390|__AUDIT_ARCH_64BIT) -+#define AUDIT_ARCH_SH (EM_SH) -+#define AUDIT_ARCH_SHEL (EM_SH|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_SH64 (EM_SH|__AUDIT_ARCH_64BIT) -+#define AUDIT_ARCH_SHEL64 (EM_SH|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_SPARC (EM_SPARC) -+#define AUDIT_ARCH_SPARC64 (EM_SPARC64|__AUDIT_ARCH_64BIT) -+#define AUDIT_ARCH_V850 (EM_V850|__AUDIT_ARCH_LE) -+#define AUDIT_ARCH_X86_64 (EM_X86_64|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) -+ -+struct audit_status { -+ uint32_t mask; /* Bit mask for valid entries */ -+ uint32_t enabled; /* 1 = enabled, 0 = disabled */ -+ uint32_t failure; /* Failure-to-log action */ -+ uint32_t pid; /* pid of auditd process */ -+ uint32_t rate_limit; /* messages rate limit (per second) */ -+ uint32_t backlog_limit; /* waiting messages limit */ -+ uint32_t lost; /* messages lost */ -+ uint32_t backlog; /* messages waiting in queue */ -+}; -+ -+struct audit_rule { /* for AUDIT_LIST, AUDIT_ADD, and AUDIT_DEL */ -+ uint32_t flags; /* AUDIT_PER_{TASK,CALL}, AUDIT_PREPEND */ -+ uint32_t action; /* AUDIT_NEVER, AUDIT_POSSIBLE, AUDIT_ALWAYS */ -+ uint32_t field_count; -+ uint32_t mask[AUDIT_BITMASK_SIZE]; -+ uint32_t fields[AUDIT_MAX_FIELDS]; -+ uint32_t values[AUDIT_MAX_FIELDS]; -+}; -+ -+#endif /* _LINUX_AUDIT_H_ */ -+ - /* libaudit.h -- - * Copyright 2004, 2005 Red Hat Inc., Durham, North Carolina. - * All Rights Reserved. -@@ -27,7 +220,6 @@ - #include - #include - #include --#include - #include - #include - #include /* For watch */ diff --git a/sys-process/audit/files/audit-1.1.3-compilefix.patch b/sys-process/audit/files/audit-1.1.3-compilefix.patch deleted file mode 100644 index f33886976940..000000000000 --- a/sys-process/audit/files/audit-1.1.3-compilefix.patch +++ /dev/null @@ -1,123 +0,0 @@ -diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/lib/libaudit.h audit-1.1.3.new/lib/libaudit.h ---- audit-1.1.3/lib/libaudit.h 2006-01-05 13:19:20.000000000 -0800 -+++ audit-1.1.3.new/lib/libaudit.h 2006-01-31 18:12:49.057268514 -0800 -@@ -31,6 +31,7 @@ extern "C" { - #include - #include - #include -+#include /* to avoid redefinition of sigval/siginfo */ - #include - #include - #include -diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/src/auditctl-llist.c audit-1.1.3.new/src/auditctl-llist.c ---- audit-1.1.3/src/auditctl-llist.c 2006-01-04 08:27:42.000000000 -0800 -+++ audit-1.1.3.new/src/auditctl-llist.c 2006-01-31 18:07:52.367438434 -0800 -@@ -126,16 +126,16 @@ int list_find_item(llist *l, unsigned in - void list_clear(llist* l) - { - lnode* nextnode; -- register lnode* current; -+ register lnode* curnode; - -- current = l->head; -- while (current) -+ curnode = l->head; -+ while (curnode) - { -- nextnode=current->next; -- if (current->w) -- free(current->w); -- free(current); -- current=nextnode; -+ nextnode=curnode->next; -+ if (curnode->w) -+ free(curnode->w); -+ free(curnode); -+ curnode=nextnode; - } - l->head = 0; - l->cur = 0; -diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/src/ausearch-int.c audit-1.1.3.new/src/ausearch-int.c ---- audit-1.1.3/src/ausearch-int.c 2006-01-04 08:27:42.000000000 -0800 -+++ audit-1.1.3.new/src/ausearch-int.c 2006-01-31 18:09:11.607132293 -0800 -@@ -112,16 +112,16 @@ int ilist_find_item(ilist *l, unsigned i - void ilist_clear(ilist* l) - { - int_node* nextnode; -- register int_node* current; -+ register int_node* curnode; - - if (l == NULL) - return; - -- current = l->head; -- while (current) { -- nextnode=current->next; -- free(current); -- current=nextnode; -+ curnode = l->head; -+ while (curnode) { -+ nextnode=curnode->next; -+ free(curnode); -+ curnode=nextnode; - } - l->head = NULL; - l->cur = NULL; -diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/src/ausearch-llist.c audit-1.1.3.new/src/ausearch-llist.c ---- audit-1.1.3/src/ausearch-llist.c 2006-01-04 08:27:42.000000000 -0800 -+++ audit-1.1.3.new/src/ausearch-llist.c 2006-01-31 18:08:40.173666993 -0800 -@@ -136,15 +136,15 @@ int list_find_item(llist *l, unsigned in - void list_clear(llist* l) - { - lnode* nextnode; -- register lnode* current; -+ register lnode* curnode; - -- current = l->head; -- while (current) { -- nextnode=current->next; -- if (current->message) -- free(current->message); -- free(current); -- current=nextnode; -+ curnode = l->head; -+ while (curnode) { -+ nextnode=curnode->next; -+ if (curnode->message) -+ free(curnode->message); -+ free(curnode); -+ curnode=nextnode; - } - l->head = NULL; - l->cur = NULL; -diff -Nuarp --exclude '*~' --exclude 'config.*' --exclude ltmain.sh audit-1.1.3/src/ausearch-string.c audit-1.1.3.new/src/ausearch-string.c ---- audit-1.1.3/src/ausearch-string.c 2006-01-04 08:27:42.000000000 -0800 -+++ audit-1.1.3.new/src/ausearch-string.c 2006-01-31 18:08:54.386329531 -0800 -@@ -130,17 +130,17 @@ int slist_find_item(slist *l, unsigned i - void slist_clear(slist* l) - { - snode* nextnode; -- register snode* current; -+ register snode* curnode; - -- current = l->head; -- while (current) { -- nextnode=current->next; -- if (current->str) -- free(current->str); -- if (current->key) -- free(current->key); -- free(current); -- current=nextnode; -+ curnode = l->head; -+ while (curnode) { -+ nextnode=curnode->next; -+ if (curnode->str) -+ free(curnode->str); -+ if (curnode->key) -+ free(curnode->key); -+ free(curnode); -+ curnode=nextnode; - } - l->head = NULL; - l->cur = NULL; diff --git a/sys-process/audit/files/audit-1.2.3-syscall-partial.patch b/sys-process/audit/files/audit-1.2.3-syscall-partial.patch deleted file mode 100644 index 1b70589901e5..000000000000 --- a/sys-process/audit/files/audit-1.2.3-syscall-partial.patch +++ /dev/null @@ -1,11 +0,0 @@ ---- audit-1.2.3/lib/libaudit.h~ 2006-05-24 08:19:30.000000000 -0700 -+++ audit-1.2.3/lib/libaudit.h 2006-06-21 23:01:18.219583784 -0700 -@@ -91,6 +91,8 @@ - #define AUDIT_FS_INODE 1308 /* File system inode */ - #ifndef AUDIT_EXECVE - #define AUDIT_EXECVE 1309 -+#endif -+#ifndef AUDIT_SYSCALL_PARTIAL - #define AUDIT_SYSCALL_PARTIAL 1310 /* Partial syscall event */ - #endif - #ifndef AUDIT_IPC_SET_PERM diff --git a/sys-process/audit/files/auditd.confd b/sys-process/audit/files/auditd.confd deleted file mode 100644 index 5213240c55c7..000000000000 --- a/sys-process/audit/files/auditd.confd +++ /dev/null @@ -1,12 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/files/auditd.confd,v 1.1 2005/05/01 02:19:00 robbat2 Exp $ - -# Configuration options for auditd -# -f for foreground mode -# There are some other options as well, but you'll have to look in the source -# code to find them As they aren't ready for use yet. -extraoptions='' - -# Audit rules file -rulefile=/etc/audit.rules diff --git a/sys-process/audit/files/auditd.confd-0.7.2-r1 b/sys-process/audit/files/auditd.confd-0.7.2-r1 deleted file mode 100644 index 6a2f9d1da7be..000000000000 --- a/sys-process/audit/files/auditd.confd-0.7.2-r1 +++ /dev/null @@ -1,12 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/files/auditd.confd-0.7.2-r1,v 1.1 2005/05/01 03:20:48 robbat2 Exp $ - -# Configuration options for auditd -# -f for foreground mode -# There are some other options as well, but you'll have to look in the source -# code to find them As they aren't ready for use yet. -extraoptions='' - -# Audit rules file -rulefile=/etc/audit.rules diff --git a/sys-process/audit/files/auditd.initd b/sys-process/audit/files/auditd.initd deleted file mode 100644 index 8ec0ee60903c..000000000000 --- a/sys-process/audit/files/auditd.initd +++ /dev/null @@ -1,26 +0,0 @@ -#!/sbin/runscript -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/files/auditd.initd,v 1.2 2005/05/01 02:19:48 robbat2 Exp $ - -start() { - ebegin "Starting auditd" - start-stop-daemon \ - --start --quiet --pidfile /var/run/auditd.pid \ - --exec /usr/sbin/auditd -- ${extraoptions} - local ret=$? - eend $ret - if [ $ret -eq 0 -a -n "${rulefile}" -a -f "${rulefile}" ]; then - einfo "Loading audit rules from ${rulefile}" - /usr/sbin/auditctl -R "${rulefile}" - ret=$? - fi - return $ret -} - -stop() { - ebegin "Stopping auditd" - start-stop-daemon \ - --stop --quiet --pidfile /var/run/auditd.pid - eend $? -} diff --git a/sys-process/audit/files/auditd.initd-0.7.2-r1 b/sys-process/audit/files/auditd.initd-0.7.2-r1 deleted file mode 100644 index db705c6aa780..000000000000 --- a/sys-process/audit/files/auditd.initd-0.7.2-r1 +++ /dev/null @@ -1,26 +0,0 @@ -#!/sbin/runscript -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-process/audit/files/auditd.initd-0.7.2-r1,v 1.1 2005/05/01 03:20:48 robbat2 Exp $ - -start() { - ebegin "Starting auditd" - start-stop-daemon \ - --start --quiet --pidfile /var/run/auditd.pid \ - --exec /sbin/auditd -- ${extraoptions} - local ret=$? - eend $ret - if [ $ret -eq 0 -a -n "${rulefile}" -a -f "${rulefile}" ]; then - einfo "Loading audit rules from ${rulefile}" - /sbin/auditctl -R "${rulefile}" - ret=$? - fi - return $ret -} - -stop() { - ebegin "Stopping auditd" - start-stop-daemon \ - --stop --quiet --pidfile /var/run/auditd.pid - eend $? -} diff --git a/sys-process/audit/files/digest-audit-0.7.2-r1 b/sys-process/audit/files/digest-audit-0.7.2-r1 deleted file mode 100644 index 5eae34c2de42..000000000000 --- a/sys-process/audit/files/digest-audit-0.7.2-r1 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 56c82cfe0d5af98a3313a8a76a08ed43 audit-0.7.2.tar.gz 70184 -RMD160 d13d8e93972f91386ced42e8204fb8ad4225f087 audit-0.7.2.tar.gz 70184 -SHA256 fc2855e4504efeb60ec61aef414719eb9f94ef00496418a8873f3f8dc3e0628f audit-0.7.2.tar.gz 70184 diff --git a/sys-process/audit/files/digest-audit-0.7.3 b/sys-process/audit/files/digest-audit-0.7.3 deleted file mode 100644 index 8ccfe7a87c8f..000000000000 --- a/sys-process/audit/files/digest-audit-0.7.3 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 1fbed5d8a67b2ad7724e4d95174d451f audit-0.7.3.tar.gz 72496 -RMD160 035a95e73e333abbd119667c2b987b0321600273 audit-0.7.3.tar.gz 72496 -SHA256 c24eae64555a32d2725f3af2aaf551fc6ffa1ea67e0bdbe735a739f36b9fcf8a audit-0.7.3.tar.gz 72496 diff --git a/sys-process/audit/files/digest-audit-0.7.4 b/sys-process/audit/files/digest-audit-0.7.4 deleted file mode 100644 index 8b9e5a870fba..000000000000 --- a/sys-process/audit/files/digest-audit-0.7.4 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 2a62ad468d504780da0899e15d1ea03c audit-0.7.4.tar.gz 72751 -RMD160 8c0d60f24da68372760cd33a46c9fe3f8acaf286 audit-0.7.4.tar.gz 72751 -SHA256 3fa0aadadb7163b868d435bdb03f73df7d19f2f4d98cb86e7c8ed445c39f5f95 audit-0.7.4.tar.gz 72751 diff --git a/sys-process/audit/files/digest-audit-0.8 b/sys-process/audit/files/digest-audit-0.8 deleted file mode 100644 index 08f0f321aa26..000000000000 --- a/sys-process/audit/files/digest-audit-0.8 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 e2930c151b3cddb563df50c69733c26f audit-0.8.tar.gz 74782 -RMD160 fa9c23fb864eaa3987743535e0fa51c2294c02fc audit-0.8.tar.gz 74782 -SHA256 a70523be883acfc07410b2d4ec1b3a958de73c0a609d40621e695c3156641aee audit-0.8.tar.gz 74782 diff --git a/sys-process/audit/files/digest-audit-0.8.1 b/sys-process/audit/files/digest-audit-0.8.1 deleted file mode 100644 index f0b66ce94631..000000000000 --- a/sys-process/audit/files/digest-audit-0.8.1 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 d02b1e35fdbfa5de94fd7daf8e94845a audit-0.8.1.tar.gz 75487 -RMD160 e5b9ed8cca8d4d3c4b379144633f9cba70fefd76 audit-0.8.1.tar.gz 75487 -SHA256 bf33acf43bc8ce64a25d5b624814a84022df131f2062327cdc311788aadc51dc audit-0.8.1.tar.gz 75487 diff --git a/sys-process/audit/files/digest-audit-0.9.1 b/sys-process/audit/files/digest-audit-0.9.1 deleted file mode 100644 index f22fc633e905..000000000000 --- a/sys-process/audit/files/digest-audit-0.9.1 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 052dd2563e90cd787994aebc69545891 audit-0.9.1.tar.gz 82578 -RMD160 beab2380723213bba3ad8dca21ebee1155a49900 audit-0.9.1.tar.gz 82578 -SHA256 88fdb0883f552dccb968bb953f6467f14bddb33cba22bad807649e4c039f1fab audit-0.9.1.tar.gz 82578 diff --git a/sys-process/audit/files/digest-audit-1.1.6 b/sys-process/audit/files/digest-audit-1.1.6 deleted file mode 100644 index 60209d810a5e..000000000000 --- a/sys-process/audit/files/digest-audit-1.1.6 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 19d208c284d6f6ae830f1943a74bbd7f audit-1.1.6.tar.gz 274815 -RMD160 8f420b47347d1c00b4b4c114dc4f913704a9205e audit-1.1.6.tar.gz 274815 -SHA256 44c152fc652567c64c5937335122b37250694152bd47d44628b11f1f65c16e04 audit-1.1.6.tar.gz 274815 diff --git a/sys-process/audit/files/digest-audit-1.2.1 b/sys-process/audit/files/digest-audit-1.2.1 deleted file mode 100644 index 4a2e99d49a54..000000000000 --- a/sys-process/audit/files/digest-audit-1.2.1 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 537d4ee68428e2ba2f01a8c07287fb6e audit-1.2.1.tar.gz 274432 -RMD160 14f70c58239f6ed2eba3d902630f4bd4112c4fba audit-1.2.1.tar.gz 274432 -SHA256 bba5d255d81ca36245464b83e977ba6bd05b1528cad07559fcc0367d39b2d26f audit-1.2.1.tar.gz 274432 diff --git a/sys-process/audit/files/digest-audit-1.2.3 b/sys-process/audit/files/digest-audit-1.2.3 deleted file mode 100644 index 3363ed812850..000000000000 --- a/sys-process/audit/files/digest-audit-1.2.3 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 a121e66bf44a65af3c4a04220a176d2e audit-1.2.3.tar.gz 276977 -RMD160 2fbc483dbff0ad5cd4022b4ccb5d3c082cccc0ef audit-1.2.3.tar.gz 276977 -SHA256 3bb70258c9e5ae2a0ebc43dc96542cd5494e169dc0d03d91bd9a7cd2a9f37b25 audit-1.2.3.tar.gz 276977 diff --git a/sys-process/audit/files/digest-audit-1.2.5 b/sys-process/audit/files/digest-audit-1.2.5 deleted file mode 100644 index c19a75b596a9..000000000000 --- a/sys-process/audit/files/digest-audit-1.2.5 +++ /dev/null @@ -1,3 +0,0 @@ -MD5 d5d56d5e3189215dcd37a5eded761d12 audit-1.2.5.tar.gz 232383 -RMD160 8dd8bca46c918f0805756dfdfd898eb19b09f7e9 audit-1.2.5.tar.gz 232383 -SHA256 6b9fd472ca97c07e319338a73b3f0adbe5f53506a15adba2ac2ad3c7db7b0eef audit-1.2.5.tar.gz 232383