summaryrefslogtreecommitdiff
path: root/mk/check
diff options
context:
space:
mode:
authorrillig <rillig@pkgsrc.org>2006-10-13 06:32:15 +0000
committerrillig <rillig@pkgsrc.org>2006-10-13 06:32:15 +0000
commit20d92f3be1177801891be5011a27bf9b27bb42c5 (patch)
tree09527e29e827d4068f8cf79645db002fa7e0f4f8 /mk/check
parentb49d90f8c6e0fe382e3f3ac64556f4e9852dafa7 (diff)
downloadpkgsrc-20d92f3be1177801891be5011a27bf9b27bb42c5.tar.gz
Added a new post-installation check to see whether the files have their
permissions properly set. See mk/check/check-perms.mk and sysutils/checkperms for details.
Diffstat (limited to 'mk/check')
-rw-r--r--mk/check/bsd.check.mk3
-rw-r--r--mk/check/check-perms.mk67
2 files changed, 69 insertions, 1 deletions
diff --git a/mk/check/bsd.check.mk b/mk/check/bsd.check.mk
index d74d00065ee..0290ac2db4b 100644
--- a/mk/check/bsd.check.mk
+++ b/mk/check/bsd.check.mk
@@ -1,4 +1,4 @@
-# $NetBSD: bsd.check.mk,v 1.2 2006/06/07 17:04:01 jlam Exp $
+# $NetBSD: bsd.check.mk,v 1.3 2006/10/13 06:32:15 rillig Exp $
#
# This Makefile fragment is included by bsd.pkg.mk and provides all
# variables and targets related to build and install checks.
@@ -11,6 +11,7 @@
.include "${PKGSRCDIR}/mk/check/check-files.mk"
.include "${PKGSRCDIR}/mk/check/check-interpreter.mk"
+.include "${PKGSRCDIR}/mk/check/check-perms.mk"
.include "${PKGSRCDIR}/mk/check/check-shlibs.mk"
.include "${PKGSRCDIR}/mk/check/check-vulnerable.mk"
.include "${PKGSRCDIR}/mk/check/check-wrkref.mk"
diff --git a/mk/check/check-perms.mk b/mk/check/check-perms.mk
new file mode 100644
index 00000000000..f5a55c6596e
--- /dev/null
+++ b/mk/check/check-perms.mk
@@ -0,0 +1,67 @@
+# $NetBSD: check-perms.mk,v 1.1 2006/10/13 06:32:15 rillig Exp $
+#
+# This file checks that after installation of a package, all files and
+# directories of that package have sensible permissions set.
+#
+# The following variables may be set by a package:
+#
+# The following variables may be set by the pkgsrc user in mk.conf:
+#
+# CHECK_PERMS: YesNo (default: yes for PKG_DEVELOPER, no otherwise)
+# Specifies whether the permissions check should be run at all.
+#
+# CHECK_PERMS_SKIP: List of PathMask (default: empty)
+# A list of patterns (like man/*) that should be excluded from the
+# check. Note that a * in a pattern also matches a slash in a
+# pathname.
+#
+
+.if defined(PKG_DEVELOPER)
+CHECK_PERMS?= yes
+.else
+CHECK_PERMS?= no
+.endif
+
+#.if !empty(CHECK_PERMS:M[Yy][Ee][Ss])
+#_POST_INSTALL_CHECKS+= check-perms
+#.endif
+
+_CHECK_PERMS_CMD= ${LOCALBASE}/bin/checkperms
+_CHECK_PERMS_GETDIRS_AWK= \
+ /.*/ { \
+ print $$0; \
+ dir = $$0; \
+ while (sub("/[^/]*$$", "", dir) && dir != "") { \
+ if (!(dir in dirs)) { \
+ dirs[dir] = "done"; \
+ print dir; \
+ } \
+ } \
+ }
+
+CHECK_PERMS_SKIP?= # none
+_CHECK_PERMS_SKIP_FILTER= case "$$file" in
+_CHECK_PERMS_SKIP_FILTER+= ${CHECK_PERMS_SKIP:@.pattern.@${PREFIX}/${.pattern.}|${.pattern.}) continue ;;@}
+_CHECK_PERMS_SKIP_FILTER+= *) ;;
+_CHECK_PERMS_SKIP_FILTER+= esac
+
+.PHONY: check-perms
+.if exists(${_CHECK_PERMS_CMD})
+check-perms:
+ @${STEP_MSG} "Checking file permissions in ${PKGNAME}"
+ ${_PKG_SILENT}${_PKG_DEBUG} \
+ set -e; \
+ ${PKG_FILELIST_CMD} \
+ | sort \
+ | sed -e 's,\\,\\\\,g' \
+ | while read file; do \
+ ${_CHECK_PERMS_SKIP_FILTER}; \
+ printf "%s\\n" "$$file"; \
+ done \
+ | awk ${_CHECK_PERMS_GETDIRS_AWK:Q} \
+ | ${_CHECK_PERMS_CMD}
+.else
+check-perms:
+ @${WARNING_MSG} "[check-perms.mk] Skipping file permissions check."
+ @${WARNING_MSG} "[check-perms.mk] Install sysutils/checkperms to enable this check."
+.endif