blob: 27bc24d0b2ddd75dbd3d54590556a5e0bad8f435 [file] [log] [blame]
# Copyright 1999-2011 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-fs/fuse/fuse-2.8.5.ebuild,v 1.11 2011/07/26 00:09:54 zmedico Exp $
EAPI=3
inherit eutils libtool linux-info
MY_P=${P/_/-}
DESCRIPTION="An interface for filesystems implemented in userspace."
HOMEPAGE="http://fuse.sourceforge.net"
SRC_URI="mirror://sourceforge/fuse/${MY_P}.tar.gz"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="alpha amd64 arm hppa ia64 ppc ppc64 sparc x86 ~x86-fbsd"
IUSE="kernel_linux kernel_FreeBSD"
S=${WORKDIR}/${MY_P}
PDEPEND="kernel_FreeBSD? ( sys-fs/fuse4bsd )"
pkg_setup() {
if use kernel_linux ; then
if kernel_is lt 2 6 9; then
die "Your kernel is too old."
fi
CONFIG_CHECK="~FUSE_FS"
FUSE_FS_WARNING="You need to have FUSE module built to use user-mode utils"
linux-info_pkg_setup
fi
}
src_prepare() {
epatch "${FILESDIR}"/fuse-2.8.5-fix-lazy-binding.patch
epatch "${FILESDIR}"/fuse-2.8.5-gold.patch
# This patch changes fusermount to avoid calling getpwuid(3)
# if '-o user=<username>' is provided in the command line.
# This prevents glibc's implementation of getpwuid from invoking
# socket/connect syscalls, which allows Chromium OS daemons to
# put more restrictive seccomp filters on fusermount.
epatch "${FILESDIR}"/fuse-2.8.6-user-option.patch
elibtoolize
}
src_configure() {
econf \
INIT_D_PATH="${EPREFIX}/etc/init.d" \
MOUNT_FUSE_PATH="${EPREFIX}/sbin" \
UDEV_RULES_PATH="${EPREFIX}/lib/udev/rules.d" \
--disable-example \
--disable-mtab
}
src_install() {
emake DESTDIR="${D}" install || die "emake install failed"
dodoc AUTHORS ChangeLog Filesystems README \
README.NFS NEWS doc/how-fuse-works \
doc/kernel.txt FAQ
docinto example
dodoc example/*
if use kernel_linux ; then
newinitd "${FILESDIR}"/fuse.init fuse
elif use kernel_FreeBSD ; then
insinto /usr/include/fuse
doins include/fuse_kernel.h
newinitd "${FILESDIR}"/fuse-fbsd.init fuse
else
die "We don't know what init code install for your kernel, please file a bug."
fi
rm -rf "${D}/dev"
# user_allow_other is enabled to allow Chromium OS to run FUSE-based
# file system daemons as a non-root and non-chronos user, while
# allowing chronos to access the mount file systems.
dodir /etc
cat >"${ED}"/etc/fuse.conf <<-EOF
# Set the maximum number of FUSE mounts allowed to non-root users.
# The default is 1000.
#
#mount_max = 1000
# Allow non-root users to specify the 'allow_other' or 'allow_root'
# mount options.
#
user_allow_other
EOF
}