blob: 8a7f36d34bd9a3b5b53d03ea501d2d2ed673ce79 [file] [log] [blame]
# Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
# Distributed under the terms of the GNU General Public License v2
EAPI=7
CROS_WORKON_COMMIT="109363d0a03be594cf5611441597c607960c4f3d"
CROS_WORKON_TREE=("52a8a8b6d3bbca5e90d4761aa308a5541d52b1bb" "4a9d701c1716dbba6b3de3a9927299f399ec4580" "ed310628c7b59ac5528ea8347990fc4f5e95c915" "5c6a69ae1a339332642149aa39da47d14efbe3fd" "fd58c41eff96201518af10b01b66391e72895365" "8d228c8e702aebee142bcbf0763a15786eb5b3bb" "e7dba8c91c1f3257c34d4a7ffff0ea2537aeb6bb")
CROS_WORKON_INCREMENTAL_BUILD=1
CROS_WORKON_LOCALNAME="platform2"
CROS_WORKON_PROJECT="chromiumos/platform2"
CROS_WORKON_OUTOFTREE_BUILD=1
# TODO(crbug.com/809389): Avoid directly including headers from other packages.
CROS_WORKON_SUBTREE="common-mk chromeos-config libcontainer libpasswordprovider login_manager metrics .gn"
PLATFORM_SUBDIR="login_manager"
inherit cros-workon platform systemd user
DESCRIPTION="Login manager for Chromium OS."
HOMEPAGE="https://chromium.googlesource.com/chromiumos/platform2/+/master/chromeos-login/"
SRC_URI=""
LICENSE="BSD-Google"
KEYWORDS="*"
IUSE="arc_adb_sideloading cheets fuzzer generated_cros_config systemd unibuild user_session_isolation"
COMMON_DEPEND="chromeos-base/bootstat:=
unibuild? (
!generated_cros_config? ( chromeos-base/chromeos-config )
generated_cros_config? ( chromeos-base/chromeos-config-bsp:= )
)
chromeos-base/chromeos-config-tools:=
chromeos-base/minijail:=
chromeos-base/cryptohome:=
chromeos-base/libchromeos-ui:=
chromeos-base/libcontainer:=
chromeos-base/libpasswordprovider:=
>=chromeos-base/metrics-0.0.1-r3152:=
dev-libs/nss:=
dev-libs/protobuf:=
fuzzer? ( dev-libs/libprotobuf-mutator:= )
sys-apps/util-linux:=
"
RDEPEND="${COMMON_DEPEND}"
DEPEND="${COMMON_DEPEND}
>=chromeos-base/protofiles-0.0.39:=
chromeos-base/system_api:=[fuzzer?]
chromeos-base/vboot_reference:=
"
pkg_preinst() {
enewgroup policy-readers
}
platform_pkg_test() {
local tests=( session_manager_test )
# Qemu doesn't support signalfd currently, and it's not clear how
# feasible it is to implement :(.
# So, filter out the tests that rely on signalfd().
local gtest_qemu_filter=""
if ! use x86 && ! use amd64; then
gtest_qemu_filter+="-ChildExitHandlerTest.*"
gtest_qemu_filter+=":SessionManagerProcessTest.*"
fi
local test_bin
for test_bin in "${tests[@]}"; do
platform_test "run" "${OUT}/${test_bin}" "0" "" "${gtest_qemu_filter}"
done
}
src_install() {
into /
dosbin "${OUT}/keygen"
dosbin "${OUT}/session_manager"
# Install DBus configuration.
insinto /usr/share/dbus-1/interfaces
doins dbus_bindings/org.chromium.SessionManagerInterface.xml
insinto /etc/dbus-1/system.d
doins SessionManager.conf
# Adding init scripts.
if use systemd; then
systemd_dounit init/systemd/*
systemd_enable_service x-started.target
systemd_enable_service multi-user.target ui.target
systemd_enable_service ui.target ui.service
systemd_enable_service ui.service machine-info.service
systemd_enable_service login-prompt-visible.target send-uptime-metrics.service
systemd_enable_service login-prompt-visible.target ui-init-late.service
systemd_enable_service start-user-session.target login.service
systemd_enable_service system-services.target ui-collect-machine-info.service
else
insinto /etc/init
doins init/upstart/*.conf
fi
exeinto /usr/share/cros/init/
doexe init/scripts/*
# For user session processes.
dodir /etc/skel/log
# For user NSS database
diropts -m0700
# Need to dodir each directory in order to get the opts right.
dodir /etc/skel/.pki
dodir /etc/skel/.pki/nssdb
# Yes, the created (empty) DB does work on ARM, x86 and x86_64.
certutil -N -d "sql:${D}/etc/skel/.pki/nssdb" -f <(echo '') || die
insinto /etc
doins chrome_dev.conf
# Create daemon store directories.
local daemon_store="/etc/daemon-store/session_manager"
dodir "${daemon_store}"
fperms 0700 "${daemon_store}"
fowners root:root "${daemon_store}"
local fuzzers=(
login_manager_validator_utils_fuzzer
login_manager_validator_utils_policy_desc_fuzzer
)
local fuzzer
for fuzzer in "${fuzzers[@]}"; do
platform_fuzzer_install "${S}"/OWNERS "${OUT}/${fuzzer}"
done
}