Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 18 Sep 2010 03:01:01 +0900
From:      KATO Tsuguru <tkato432@yahoo.com>
To:        FreeBSD-gnats-submit@FreeBSD.org
Subject:   ports/150666: Update port: sysutils/eiciel
Message-ID:  <20100918030101.43623dfe.tkato432@yahoo.com>
Resent-Message-ID: <201009171830.o8HIU6Bo000279@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         150666
>Category:       ports
>Synopsis:       Update port: sysutils/eiciel
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Fri Sep 17 18:30:06 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator:     KATO Tsuguru
>Release:        FreeBSD 7.3-RELEASE-p2 i386
>Organization:
>Environment:
>Description:
- Fix build on 7-stable

New file:
files/patch-src__acl_manager.cpp
files/patch-src__acl_manager.hpp
files/patch-src__eiciel_main_controller.cpp

>How-To-Repeat:
>Fix:

diff -urN /usr/ports/sysutils/eiciel/Makefile sysutils/eiciel/Makefile
--- /usr/ports/sysutils/eiciel/Makefile	2010-08-10 16:21:17.000000000 +0900
+++ sysutils/eiciel/Makefile	2010-08-10 16:38:51.000000000 +0900
@@ -15,27 +15,21 @@
 
 LIB_DEPENDS=	gtkmm-2.4.1:${PORTSDIR}/x11-toolkits/gtkmm24
 
+LICENSE=	GPLv2
+
 USE_BZIP2=	yes
 USE_GNOME=	gnomehack gnomeprefix intlhack nautilus2 libgnomeui
 USE_GETTEXT=	yes
 USE_GMAKE=	yes
 USE_AUTOTOOLS=	libtool:22
-USE_LDCONFIG=	yes
 CONFIGURE_ENV=	CPPFLAGS="-I${LOCALBASE}/include" \
 		LDFLAGS="-L${LOCALBASE}/lib"
 CONFIGURE_ARGS=	--with-nautilus-extensions-dir=${PREFIX}/lib/nautilus/extensions-2.0
 MAKE_JOBS_SAFE=	yes
 
 MAN1=		eiciel.1
-LICENSE=	GPLv2
-
-.include <bsd.port.pre.mk>
-
-.if ${OSVERSION} < 800000
-BROKEN=		does not compile
-.endif
 
 post-install:
 	@${CAT} ${PKGMESSAGE}
 
-.include <bsd.port.post.mk>
+.include <bsd.port.mk>
diff -urN /usr/ports/sysutils/eiciel/files/patch-src__acl_manager.cpp sysutils/eiciel/files/patch-src__acl_manager.cpp
--- /usr/ports/sysutils/eiciel/files/patch-src__acl_manager.cpp	1970-01-01 09:00:00.000000000 +0900
+++ sysutils/eiciel/files/patch-src__acl_manager.cpp	2010-06-19 22:52:23.000000000 +0900
@@ -0,0 +1,93 @@
+--- src/acl_manager.cpp.orig	2010-06-03 05:38:27.000000000 +0900
++++ src/acl_manager.cpp	2010-06-19 22:52:10.000000000 +0900
+@@ -111,7 +111,7 @@
+ 		{
+ 			// A user|group entry
+ 			// Gather the permissions
+-			acl_entry new_acl;
++			acl_manager_entry new_acl;
+ 			new_acl.reading = ACL_GET_PERM(permission_set, ACL_READ);
+ 			new_acl.writing = ACL_GET_PERM(permission_set, ACL_WRITE);
+ 			new_acl.execution = ACL_GET_PERM(permission_set, ACL_EXECUTE);
+@@ -225,7 +225,7 @@
+ 		{
+ 			// An entry of type user/group
+             // get all permissions
+-			acl_entry new_acl;
++			acl_manager_entry new_acl;
+ 			new_acl.reading = ACL_GET_PERM(permission_set, ACL_READ);
+ 			new_acl.writing = ACL_GET_PERM(permission_set, ACL_WRITE);
+ 			new_acl.execution = ACL_GET_PERM(permission_set, ACL_EXECUTE);
+@@ -317,14 +317,14 @@
+ 	_text_acl_access.clear();
+ 
+ 	_text_acl_access += "u::" + permission_to_str(_owner_perms) + "\n";
+-	for (vector<acl_entry>::iterator i = _user_acl.begin();
++	for (vector<acl_manager_entry>::iterator i = _user_acl.begin();
+ 			i != _user_acl.end(); i++)
+ 	{
+ 		_text_acl_access += "u:" + write_name(*i) + ":" + permission_to_str(*i) + "\n";
+ 	}
+ 	
+ 	_text_acl_access += "g::" + permission_to_str(_group_perms) + "\n";
+-	for (vector<acl_entry>::iterator i = _group_acl.begin();
++	for (vector<acl_manager_entry>::iterator i = _group_acl.begin();
+ 			i != _group_acl.end(); i++)
+ 	{
+ 		_text_acl_access += "g:" + write_name(*i) + ":" + permission_to_str(*i) + "\n";
+@@ -352,12 +352,12 @@
+ 			_text_acl_default += "o::" + permission_to_str(_default_others) + "\n";
+ 		}
+ 
+-		for (vector<acl_entry>::iterator i = _default_user_acl.begin();
++		for (vector<acl_manager_entry>::iterator i = _default_user_acl.begin();
+ 				i != _default_user_acl.end(); i++)
+ 		{
+ 			_text_acl_default += "u:" + write_name(*i) + ":" + permission_to_str(*i) + "\n";
+ 		}
+-		for (vector<acl_entry>::iterator i = _default_group_acl.begin();
++		for (vector<acl_manager_entry>::iterator i = _default_group_acl.begin();
+ 				i != _default_group_acl.end(); i++)
+ 		{
+ 			_text_acl_default += "g:" + write_name(*i) + ":" + permission_to_str(*i) + "\n";
+@@ -370,7 +370,7 @@
+ 	}
+ }
+ 
+-string ACLManager::write_name(acl_entry& eacl)
++string ACLManager::write_name(acl_manager_entry& eacl)
+ {
+ 	if (eacl.valid_name)
+ 	{
+@@ -477,11 +477,11 @@
+ 	}
+ }
+ 
+-void ACLManager::set_acl_generic(const string& name, vector<acl_entry>& acl_list, 
++void ACLManager::set_acl_generic(const string& name, vector<acl_manager_entry>& acl_list, 
+         const permissions_t& perms)
+ {
+ 	ACLEquivalence equiv_acl(name);
+-	vector<acl_entry>::iterator i = find_if(acl_list.begin(), acl_list.end(), equiv_acl);
++	vector<acl_manager_entry>::iterator i = find_if(acl_list.begin(), acl_list.end(), equiv_acl);
+ 	if (i != acl_list.end()) // If already there, update
+ 	{
+ 		i->reading = perms.reading;
+@@ -490,7 +490,7 @@
+ 	}
+ 	else // If not there, create
+ 	{
+-		acl_entry eacl;
++		acl_manager_entry eacl;
+ 		eacl.valid_name = true;
+ 		eacl.name = name;
+ 		eacl.reading = perms.reading;
+@@ -524,7 +524,7 @@
+ 	update_changes_acl_default();
+ }
+ 
+-void ACLManager::remove_acl_generic(const string& name, vector<acl_entry>& acl_list)
++void ACLManager::remove_acl_generic(const string& name, vector<acl_manager_entry>& acl_list)
+ {
+ 	ACLEquivalence equiv_acl(name);
+ 	acl_list.erase(remove_if(acl_list.begin(), acl_list.end(), equiv_acl), acl_list.end());
diff -urN /usr/ports/sysutils/eiciel/files/patch-src__acl_manager.hpp sysutils/eiciel/files/patch-src__acl_manager.hpp
--- /usr/ports/sysutils/eiciel/files/patch-src__acl_manager.hpp	1970-01-01 09:00:00.000000000 +0900
+++ sysutils/eiciel/files/patch-src__acl_manager.hpp	2010-06-19 22:55:38.000000000 +0900
@@ -0,0 +1,63 @@
+--- src/acl_manager.hpp.orig	2010-06-03 05:38:27.000000000 +0900
++++ src/acl_manager.hpp	2010-06-19 22:48:42.000000000 +0900
+@@ -93,7 +93,7 @@
+ };
+ 
+ 
+-struct acl_entry : permissions_t
++struct acl_manager_entry : permissions_t
+ {
+ 	int qualifier; // Group or user
+ 	string name; // Symbolic name of the qualifier
+@@ -118,10 +118,10 @@
+ 		bool _there_is_mask;
+ 		permissions_t _mask_acl;
+ 
+-		vector<acl_entry> _user_acl;
+-		vector<acl_entry> _group_acl;
+-		vector<acl_entry> _default_user_acl;
+-		vector<acl_entry> _default_group_acl;
++		vector<acl_manager_entry> _user_acl;
++		vector<acl_manager_entry> _group_acl;
++		vector<acl_manager_entry> _default_user_acl;
++		vector<acl_manager_entry> _default_group_acl;
+ 
+ 		permissions_t _default_user; 
+ 		bool _there_is_default_user;
+@@ -143,9 +143,9 @@
+ 		void get_acl_entries_default();
+ 		void create_textual_representation();
+ 		string permission_to_str(permissions_t& p);
+-		string write_name(acl_entry& eacl);
+-		void set_acl_generic(const string& nom, vector<acl_entry>& llistACL, const permissions_t& perms);
+-		void remove_acl_generic(const string& nom, vector<acl_entry>& llistaACL);
++		string write_name(acl_manager_entry& eacl);
++		void set_acl_generic(const string& nom, vector<acl_manager_entry>& llistACL, const permissions_t& perms);
++		void remove_acl_generic(const string& nom, vector<acl_manager_entry>& llistaACL);
+ 
+ 		void commit_changes_to_file();
+ 		void calculate_access_mask();
+@@ -160,7 +160,7 @@
+ 			public:
+ 				ACLEquivalence(const string& qualif)
+ 					: _qualifier(qualif) {}
+-				bool operator ()(acl_entry& a)
++				bool operator ()(acl_manager_entry& a)
+ 				{
+ 					return (a.valid_name && (a.name == _qualifier));
+ 				}
+@@ -203,10 +203,10 @@
+ 
+ 		void create_default_acl();
+ 
+-		vector<acl_entry> get_acl_user() const { return _user_acl; }
+-		vector<acl_entry> get_acl_group() const { return _group_acl; }
+-		vector<acl_entry> get_acl_user_default() const { return _default_user_acl; }
+-		vector<acl_entry> get_acl_group_default() const { return _default_group_acl; }
++		vector<acl_manager_entry> get_acl_user() const { return _user_acl; }
++		vector<acl_manager_entry> get_acl_group() const { return _group_acl; }
++		vector<acl_manager_entry> get_acl_user_default() const { return _default_user_acl; }
++		vector<acl_manager_entry> get_acl_group_default() const { return _default_group_acl; }
+ 		permissions_t get_mask() { return _mask_acl; }
+ 
+ 		permissions_t get_user() { return _owner_perms; }
diff -urN /usr/ports/sysutils/eiciel/files/patch-src__eiciel_main_controller.cpp sysutils/eiciel/files/patch-src__eiciel_main_controller.cpp
--- /usr/ports/sysutils/eiciel/files/patch-src__eiciel_main_controller.cpp	1970-01-01 09:00:00.000000000 +0900
+++ sysutils/eiciel/files/patch-src__eiciel_main_controller.cpp	2010-06-19 22:58:31.000000000 +0900
@@ -0,0 +1,43 @@
+--- src/eiciel_main_controller.cpp.orig	2010-06-03 05:38:27.000000000 +0900
++++ src/eiciel_main_controller.cpp	2010-06-19 22:56:56.000000000 +0900
+@@ -125,11 +125,11 @@
+ 		effective_permissions = _ACL_manager->get_mask();
+ 	}
+ 	
+-	vector<acl_entry> vACL;
++	vector<acl_manager_entry> vACL;
+ 	_window->add_non_selectable(Glib::locale_to_utf8(_ACL_manager->get_owner_name()), perms.reading,
+ 			perms.writing, perms.execution, EK_USER);
+ 	vACL = _ACL_manager->get_acl_user();
+-	for (vector<acl_entry>::iterator i = vACL.begin(); 
++	for (vector<acl_manager_entry>::iterator i = vACL.begin(); 
+ 			i != vACL.end(); i++)
+ 	{
+ 		_window->add_selectable(Glib::locale_to_utf8(i->name), i->reading, 
+@@ -153,7 +153,7 @@
+ 		(!effective_permissions.execution && perms.execution);
+ 
+ 	vACL = _ACL_manager->get_acl_group();
+-	for (vector<acl_entry>::iterator i = vACL.begin(); 
++	for (vector<acl_manager_entry>::iterator i = vACL.begin(); 
+ 			i != vACL.end(); i++)
+ 	{
+ 		_window->add_selectable(Glib::locale_to_utf8(i->name), i->reading, 
+@@ -200,7 +200,7 @@
+ 		vACL = _ACL_manager->get_acl_user_default();
+ 
+ 		there_is_default_acl |= (vACL.size() > 0);
+-		for (vector<acl_entry>::iterator i = vACL.begin(); 
++		for (vector<acl_manager_entry>::iterator i = vACL.begin(); 
+ 				i != vACL.end(); i++)
+ 		{
+ 			_window->add_selectable(Glib::locale_to_utf8(i->name), i->reading, 
+@@ -231,7 +231,7 @@
+ 		vACL = _ACL_manager->get_acl_group_default();
+ 
+ 		there_is_default_acl |= (vACL.size() > 0);
+-		for (vector<acl_entry>::iterator i = vACL.begin(); 
++		for (vector<acl_manager_entry>::iterator i = vACL.begin(); 
+ 				i != vACL.end(); i++)
+ 		{
+ 			_window->add_selectable(Glib::locale_to_utf8(i->name), i->reading, 
diff -urN /usr/ports/sysutils/eiciel/pkg-descr sysutils/eiciel/pkg-descr
--- /usr/ports/sysutils/eiciel/pkg-descr	2005-07-25 04:08:22.000000000 +0900
+++ sysutils/eiciel/pkg-descr	2010-06-10 04:14:51.000000000 +0900
@@ -2,4 +2,4 @@
 users and groups who will be granted permissions through the graphical 
 interface.
 
-WWW: http://rofi.pinchito.com/eiciel/
+WWW: http://rofi.roger-ferrer.org/eiciel/
diff -urN /usr/ports/sysutils/eiciel/pkg-plist sysutils/eiciel/pkg-plist
--- /usr/ports/sysutils/eiciel/pkg-plist	2010-08-10 16:21:17.000000000 +0900
+++ sysutils/eiciel/pkg-plist	2010-06-19 23:05:16.000000000 +0900
@@ -3,39 +3,39 @@
 lib/nautilus/extensions-2.0/libeiciel-nautilus.la
 lib/nautilus/extensions-2.0/libeiciel-nautilus.so
 share/applications/eiciel.desktop
-%%DATADIR%%/img/others-default.png
-%%DATADIR%%/img/others.png
 %%DATADIR%%/img/group-acl-default.png
 %%DATADIR%%/img/group-acl.png
 %%DATADIR%%/img/group-default.png
 %%DATADIR%%/img/group.png
+%%DATADIR%%/img/icon_eiciel_16.png
+%%DATADIR%%/img/icon_eiciel_24.png
+%%DATADIR%%/img/icon_eiciel_32.png
+%%DATADIR%%/img/icon_eiciel_48.png
+%%DATADIR%%/img/icon_eiciel_64.png
 %%DATADIR%%/img/mask-default.png
 %%DATADIR%%/img/mask.png
+%%DATADIR%%/img/others-default.png
+%%DATADIR%%/img/others.png
 %%DATADIR%%/img/user-acl-default.png
 %%DATADIR%%/img/user-acl.png
 %%DATADIR%%/img/user-default.png
 %%DATADIR%%/img/user.png
-%%DATADIR%%/img/icon_eiciel_16.png
-%%DATADIR%%/img/icon_eiciel_24.png
-%%DATADIR%%/img/icon_eiciel_32.png
-%%DATADIR%%/img/icon_eiciel_48.png
-%%DATADIR%%/img/icon_eiciel_64.png
 share/gnome/help/eiciel/C/eiciel.xml
-share/gnome/help/eiciel/C/figures/entrada_acl.png
-share/gnome/help/eiciel/C/figures/obrir_fitxer_nautilus.png
-share/gnome/help/eiciel/C/figures/obrir_fitxer.png
-share/gnome/help/eiciel/C/figures/permisos_acl.png
-share/gnome/help/eiciel/C/figures/permisos_ugo.png
 share/gnome/help/eiciel/C/figures/detall_mascara.png
-share/gnome/help/eiciel/C/figures/pantalla_ea.png
-share/gnome/help/eiciel/C/figures/others-default.png
-share/gnome/help/eiciel/C/figures/others.png
+share/gnome/help/eiciel/C/figures/entrada_acl.png
 share/gnome/help/eiciel/C/figures/group-acl-default.png
 share/gnome/help/eiciel/C/figures/group-acl.png
 share/gnome/help/eiciel/C/figures/group-default.png
 share/gnome/help/eiciel/C/figures/group.png
 share/gnome/help/eiciel/C/figures/mask-default.png
 share/gnome/help/eiciel/C/figures/mask.png
+share/gnome/help/eiciel/C/figures/obrir_fitxer.png
+share/gnome/help/eiciel/C/figures/obrir_fitxer_nautilus.png
+share/gnome/help/eiciel/C/figures/others-default.png
+share/gnome/help/eiciel/C/figures/others.png
+share/gnome/help/eiciel/C/figures/pantalla_ea.png
+share/gnome/help/eiciel/C/figures/permisos_acl.png
+share/gnome/help/eiciel/C/figures/permisos_ugo.png
 share/gnome/help/eiciel/C/figures/user-acl-default.png
 share/gnome/help/eiciel/C/figures/user-acl.png
 share/gnome/help/eiciel/C/figures/user-default.png
@@ -44,9 +44,9 @@
 share/locale/de/LC_MESSAGES/eiciel.mo
 share/locale/es/LC_MESSAGES/eiciel.mo
 share/locale/sv/LC_MESSAGES/eiciel.mo
-@dirrm %%DATADIR%%/img
-@dirrm %%DATADIR%%
 @dirrm share/gnome/help/eiciel/C/figures
 @dirrm share/gnome/help/eiciel/C
 @dirrm share/gnome/help/eiciel
+@dirrm %%DATADIR%%/img
+@dirrm %%DATADIR%%
 @dirrmtry share/applications
>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20100918030101.43623dfe.tkato432>