diff options
Diffstat (limited to 'sys-auth')
-rw-r--r-- | sys-auth/Manifest.gz | bin | 9255 -> 9252 bytes | |||
-rw-r--r-- | sys-auth/rtkit/Manifest | 2 | ||||
-rw-r--r-- | sys-auth/rtkit/files/rtkit-0.13_daemon_verbosity.patch | 67 | ||||
-rw-r--r-- | sys-auth/rtkit/rtkit-0.13-r2.ebuild | 49 |
4 files changed, 118 insertions, 0 deletions
diff --git a/sys-auth/Manifest.gz b/sys-auth/Manifest.gz Binary files differindex 7a5dac2690d8..3cbc8849155f 100644 --- a/sys-auth/Manifest.gz +++ b/sys-auth/Manifest.gz diff --git a/sys-auth/rtkit/Manifest b/sys-auth/rtkit/Manifest index e8d99973f82a..095a7f95e21d 100644 --- a/sys-auth/rtkit/Manifest +++ b/sys-auth/rtkit/Manifest @@ -1,5 +1,7 @@ +AUX rtkit-0.13_daemon_verbosity.patch 2852 BLAKE2B 734124f035c02e140d710c04271494d2e68737c8df22d1373fff8be09bf0f8c933440a2dad4bd06eb5d988c6f568aa56e7ce0705818660a82739d0e499556be8 SHA512 e5f2eb03bdb36326b86e63bdf36f79131a34916460af77633063e2672a1fb2f17c9d30af543d642217ace074f9d3ad5d26312cd18f6dd9525934aa866997819e AUX rtkit-0.13_meson_rtkitctl_dir.patch 655 BLAKE2B 4f52913ac74851824410a83d00101c19e1e92d4dbd780d4a1382e4dfdf43a1417e25df8a5be9af7398e50136141f88e7ad95ffdc1602c1530bc557551c4806bc SHA512 bcc2bcaa85c2ad5ed8e1a0133f33e8e209c5ea7ce342866e95c70479c5bb2a7e1f97ad22a7b29cf62c1092a8be123e1e82e808e8c99786b55ba9b471fd9ed552 AUX rtkit-0.13_meson_xxd_optional.patch 2002 BLAKE2B 6b6ba9a3a48e31e1f61c8fe97ef4feb58f87f4b4a3d53a14a05646eed1af714ccd49f133b0066a3037ffd02821521375dccb614b8db66cb8b889c56503b44615 SHA512 91be0179b07825f8aeb9ad407f809707fc3275dcd582ec05ad427ebf98ee7330aaf82c7c5f2e340856a0e0faa6c98c34665aba6546badfacaab7e099494a4efc DIST rtkit-0.13.tar.xz 130796 BLAKE2B 842d04556a47c199bed9fc6bc9281c0d88f83e183f01ef57ecbd80ce72949a301d6682a3aab96e996e71b82d8e8c7a85e1d44524f2ed6fbdffc6bf236cdcadaa SHA512 c058d770a4ccfdf4e2e3a713748b6a705b6d3e148a903b9dbba4bba9d3ded2b819d7dfbfa37b9fad78e57c0a5f10f2f94226f8738f666e692a085ab297a36b36 EBUILD rtkit-0.13-r1.ebuild 1219 BLAKE2B d11a57bd0ecbb5c2f70d71e42f5e8ab55845befbb91083fd9c5693cef047d49c14f8981d08f9b7f46d6dc0a18bf485ddbc87afa059776d50e145d622b29c9a6f SHA512 ebc260a36c774a551954038672e44680bf455a7834ec43719f1f88667982aa23494de3a4174eb4de2bd9f64ee228ee25b85d34fb2ceef1eadb1bb921bbf967a2 +EBUILD rtkit-0.13-r2.ebuild 1275 BLAKE2B 6bab90950c98421debb3f750cd57e8867889ebce398a12270cffaffc21a1d22575b6bdd15ac494f2ab55a3a22df41e7c077faff679e3002b7cb2b62ccb32fc61 SHA512 03cd11fb582038e5aefecef2ef69c6279b7cbf7d4d385c863e906f4f5bc513ab79e89c05e59608d2652dec3d1d1bedaeefc170ace5f65fded941a40241592380 MISC metadata.xml 533 BLAKE2B de053d674e2e03a0b8ef6a754a2ef5a9ce1cc639fed121ec5c358bdd0560a63c181e8a2be2060f49e058a1799f17291bdc0b832601d374d35f15a2e690afb538 SHA512 40bf89d951e50fc1950d03ee4029cb26c9a73727b9d982b691a7f5489f4c43de96c8ad039d731c4118486beaef77eeb15f56a0147acf56bf37181d60e7af6f94 diff --git a/sys-auth/rtkit/files/rtkit-0.13_daemon_verbosity.patch b/sys-auth/rtkit/files/rtkit-0.13_daemon_verbosity.patch new file mode 100644 index 000000000000..e8fb9c821dde --- /dev/null +++ b/sys-auth/rtkit/files/rtkit-0.13_daemon_verbosity.patch @@ -0,0 +1,67 @@ +From ad649ee491ed1a41537774ad11564a208e598a09 Mon Sep 17 00:00:00 2001 +From: Jean Delvare <jdelvare@suse.de> +Date: Sat, 15 Apr 2023 11:53:27 +0200 +Subject: [PATCH] rtkit-daemon: Don't log debug messages by default + +The rtkit-daemon service is a lot more verbose than other services +when it doesn't have anything to do. Stop logging the debug messages +by default to avoid flooding the system log. + +This addresses issue #22. +--- a/rtkit-daemon.c ++++ b/rtkit-daemon.c +@@ -154,6 +154,9 @@ static bool canary_demote_unknown = FALSE; + /* Log to stderr? */ + static bool log_stderr = FALSE; + ++/* Also log debugging messages? */ ++static bool log_debug = FALSE; ++ + /* Scheduling policy to use */ + static int sched_policy = SCHED_RR; + +@@ -1876,6 +1879,7 @@ enum { + ARG_CANARY_DEMOTE_UNKNOWN, + ARG_CANARY_REFUSE_SEC, + ARG_STDERR, ++ ARG_DEBUG, + ARG_INTROSPECT + }; + +@@ -1905,6 +1909,7 @@ static const struct option long_options[] = { + { "canary-demote-unknown", no_argument, 0, ARG_CANARY_DEMOTE_UNKNOWN }, + { "canary-refuse-sec", required_argument, 0, ARG_CANARY_REFUSE_SEC }, + { "stderr", no_argument, 0, ARG_STDERR }, ++ { "debug", no_argument, 0, ARG_DEBUG }, + { "introspect", no_argument, 0, ARG_INTROSPECT }, + { NULL, 0, 0, 0} + }; +@@ -1933,6 +1938,7 @@ static void show_help(const char *exe) { + " --version Show version\n\n" + "OPTIONS:\n" + " --stderr Log to STDERR in addition to syslog\n" ++ " --debug Also log debugging mssages\n" + " --user-name=USER Run daemon as user (%s)\n\n" + " --scheduling-policy=(RR|FIFO) Choose scheduling policy (%s)\n" + " --our-realtime-priority=[%i..%i] Realtime priority for the daemon (%u)\n" +@@ -2222,6 +2228,10 @@ static int parse_command_line(int argc, char *argv[], int *ret) { + log_stderr = TRUE; + break; + ++ case ARG_DEBUG: ++ log_debug = TRUE; ++ break; ++ + case ARG_INTROSPECT: + fputs(introspect_xml, stdout); + *ret = 0; +@@ -2251,6 +2261,9 @@ static int parse_command_line(int argc, char *argv[], int *ret) { + return -1; + } + ++ if (!log_debug) ++ setlogmask(LOG_UPTO(LOG_INFO)); ++ + assert(our_realtime_priority >= (unsigned) sched_get_priority_min(sched_policy)); + assert(our_realtime_priority <= (unsigned) sched_get_priority_max(sched_policy)); + diff --git a/sys-auth/rtkit/rtkit-0.13-r2.ebuild b/sys-auth/rtkit/rtkit-0.13-r2.ebuild new file mode 100644 index 000000000000..58762eba219a --- /dev/null +++ b/sys-auth/rtkit/rtkit-0.13-r2.ebuild @@ -0,0 +1,49 @@ +# Copyright 1999-2023 Gentoo Authors +# Distributed under the terms of the GNU General Public License v2 + +EAPI=7 + +inherit linux-info meson + +DESCRIPTION="Realtime Policy and Watchdog Daemon" +HOMEPAGE="https://github.com/heftig/rtkit" +SRC_URI="https://github.com/heftig/${PN}/releases/download/v${PV}/${P}.tar.xz" + +LICENSE="GPL-3 BSD" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~ppc ~ppc64 ~sparc ~x86" +IUSE="selinux systemd" + +BDEPEND="virtual/pkgconfig" +DEPEND="acct-group/rtkit + acct-user/rtkit + sys-apps/dbus + sys-auth/polkit + sys-libs/libcap + systemd? ( sys-apps/systemd )" +RDEPEND="${DEPEND} + selinux? ( sec-policy/selinux-rtkit )" + +PATCHES=( + "${FILESDIR}"/${PN}-0.13_daemon_verbosity.patch + "${FILESDIR}"/${PN}-0.13_meson_rtkitctl_dir.patch + "${FILESDIR}"/${PN}-0.13_meson_xxd_optional.patch +) + +pkg_pretend() { + if use kernel_linux; then + CONFIG_CHECK="~!RT_GROUP_SCHED" + ERROR_RT_GROUP_SCHED="CONFIG_RT_GROUP_SCHED is enabled. rtkit-daemon (or any other " + ERROR_RT_GROUP_SCHED+="real-time task) will not work unless run as root. Please consider " + ERROR_RT_GROUP_SCHED+="unsetting this option." + check_extra_config + fi +} + +src_configure() { + local emesonargs=( + -Dinstalled_tests=false + $(meson_feature systemd libsystemd) + ) + meson_src_configure +} |