summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMichael Palimaka <kensington@gentoo.org>2014-06-26 12:49:39 +0000
committerMichael Palimaka <kensington@gentoo.org>2014-06-26 12:49:39 +0000
commitc7d3281e3a0237e79bba1461cae8098f9ea45a1e (patch)
treee1fe989d9175bc37e86928b106feadefa68f6bad /net-nds/389-ds-base
parentRemove old. (diff)
downloadgentoo-2-c7d3281e3a0237e79bba1461cae8098f9ea45a1e.tar.gz
gentoo-2-c7d3281e3a0237e79bba1461cae8098f9ea45a1e.tar.bz2
gentoo-2-c7d3281e3a0237e79bba1461cae8098f9ea45a1e.zip
Remove old.
(Portage version: 2.2.10/cvs/Linux x86_64, signed Manifest commit with key 0x06B1F38DCA45A1EC!)
Diffstat (limited to 'net-nds/389-ds-base')
-rw-r--r--net-nds/389-ds-base/389-ds-base-1.3.0.2.ebuild200
-rw-r--r--net-nds/389-ds-base/ChangeLog8
-rw-r--r--net-nds/389-ds-base/files/389-ds-base-1.2.11.16-cve-2012-4450.patch367
-rw-r--r--net-nds/389-ds-base/files/selinux.patch8
4 files changed, 6 insertions, 577 deletions
diff --git a/net-nds/389-ds-base/389-ds-base-1.3.0.2.ebuild b/net-nds/389-ds-base/389-ds-base-1.3.0.2.ebuild
deleted file mode 100644
index be164da965b5..000000000000
--- a/net-nds/389-ds-base/389-ds-base-1.3.0.2.ebuild
+++ /dev/null
@@ -1,200 +0,0 @@
-# Copyright 1999-2014 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-nds/389-ds-base/389-ds-base-1.3.0.2.ebuild,v 1.2 2014/03/04 21:44:36 dilfridge Exp $
-
-EAPI=5
-
-WANT_AUTOMAKE="1.9"
-MY_P=${P/_alpha/.a}
-MY_P=${MY_P/_rc/.rc}
-inherit user eutils multilib flag-o-matic autotools
-
-DESCRIPTION="389 Directory Server (core librares and daemons )"
-HOMEPAGE="http://port389.org/"
-SRC_URI="http://directory.fedoraproject.org/sources/${MY_P}.tar.bz2"
-
-LICENSE="GPL-2-with-exceptions"
-SLOT="0"
-KEYWORDS="~amd64 ~x86"
-IUSE="autobind auto-dn-suffix debug doc +pam-passthru +dna +ldapi +bitwise +presence kerberos selinux"
-
-ALL_DEPEND="!>=sys-libs/db-5.0
- >=dev-libs/cyrus-sasl-2.1.19
- >=dev-libs/icu-3.4:=
- dev-libs/nss[utils]
- dev-libs/nspr
- dev-libs/svrcore
- dev-libs/openssl
- dev-libs/libpcre:3
- dev-perl/perl-mozldap
- >=net-analyzer/net-snmp-5.1.2
- net-nds/openldap
- sys-apps/tcp-wrappers
- >=sys-libs/db-4.5
- sys-libs/pam
- sys-libs/zlib
- kerberos? ( >=app-crypt/mit-krb5-1.7-r100[openldap] )
- selinux? ( >=sys-apps/policycoreutils-1.30.30
- sec-policy/selinux-base-policy )"
-
-DEPEND="${ALL_DEPEND}
- virtual/pkgconfig
- sys-devel/libtool
- doc? ( app-doc/doxygen )
- selinux? ( sys-devel/m4 >=sys-apps/checkpolicy-1.30.12 )
- sys-apps/sed"
-RDEPEND="${ALL_DEPEND}
- virtual/perl-Time-Local
- virtual/perl-MIME-Base64"
-
-S="${WORKDIR}/${MY_P}"
-
-pkg_setup() {
- enewgroup dirsrv
- enewuser dirsrv -1 -1 -1 dirsrv
-}
-
-src_prepare() {
- epatch "${FILESDIR}/selinux.patch"
- # Fix compilation against mozldap
- # epatch "${FILESDIR}/389-ds-base-1.2.11-fix-mozldap.patch"
-
- # as per 389 documentation, when 64bit, export USE_64
- use amd64 && export USE_64=1
-
- sed -i -e 's/nobody/dirsrv/g' configure.ac || die "sed failed on configure.ac"
- eautoreconf
-
- # enable nsslapd-allow-unauthenticated-binds by default
- sed -i '/^nsslapd-allow-unauthenticated-binds/ s/off/on/' "${S}"/ldap/ldif/template-dse.ldif.in || \
- die "cannot tweak default setting: nsslapd-allow-unauthenticated-binds"
-
-}
-
-src_configure() {
- local myconf=""
-
- use auto-dn-suffix && myconf="${myconf} --enable-auto-dn-suffix"
- use selinux && myconf="${myconf} --with-selinux"
-
- econf \
- $(use_enable debug) \
- $(use_enable pam-passthru) \
- $(use_enable ldapi) \
- $(use_enable autobind) \
- $(use_enable dna) \
- $(use_enable bitwise) \
- $(use_enable presence) \
- $(use_with kerberos) \
- --enable-maintainer-mode \
- --enable-autobind \
- --with-fhs \
- --with-openldap \
- $myconf || die "econf failed"
-}
-
-src_compile() {
- append-lfs-flags
-
- emake || die "compile failed"
- if use selinux; then
- emake -f selinux/Makefile || die " build selinux policy failed"
- fi
-}
-
-src_install () {
- # Use -j1 otherwise libacl-plugin.so could fail to install properly
- emake -j1 DESTDIR="${D}" install || die "emake install failed"
-
- if use selinux;then
- emake -f selinux/Makefile DESTDIR="${D}" install || die "Install selinux policy failed"
- fi
-
- # install not installed header
- insinto /usr/include/dirsrv
- doins ldap/servers/slapd/slapi-plugin.h
-
- # for build free-ipa require winsync-plugin
- doins ldap/servers/plugins/replication/winsync-plugin.h
- doins ldap/servers/plugins/replication/repl-session-plugin.h
-
- # make sure perl scripts have a proper shebang
- cd "${D}"/usr/share/dirsrv/script-templates/
-
- for i in $(find ./ -iname '*.pl') ;do
- sed -i -e 's/#{{PERL-EXEC}}/#\!\/usr\/bin\/perl/' $i || die
- done
-
- # remove redhat style init script
- rm -rf "${D}"/etc/rc.d || die
- rm -rf "${D}"/etc/default || die
-
- # and install gentoo style init script
- newinitd "${FILESDIR}"/389-ds.initd 389-ds
- newinitd "${FILESDIR}"/389-ds-snmp.initd 389-ds-snmp
-
- # install Gentoo-specific start/stop scripts
- rm -f "${D}"/usr/sbin/{re,}start-dirsrv || die "cannot remove 389 start/stop executables"
- exeinto /usr/sbin
- doexe "${FILESDIR}"/{re,}start-dirsrv
-
- # cope with libraries being in /usr/lib/dirsrv
- dodir /etc/env.d
- echo "LDPATH=/usr/$(get_libdir)/dirsrv" > "${D}"/etc/env.d/08dirsrv
-
- # create the directory where our log file and database
- diropts -m 0755
- dodir /var/lib/dirsrv
- keepdir /var/lib/dirsrv
- dodir /var/lock/dirsrv
- keepdir /var/lock/dirsrv
- # snmp agent, required directory
- keepdir /var/agentx
- dodir /var/agentx
-
- if use doc; then
- cd "${S}"
- doxygen slapi.doxy || die "cannot run doxygen"
- dohtml -r docs/html
- fi
-}
-
-pkg_postinst() {
- if use selinux; then
- if has "loadpolicy" $FEATURES; then
- einfo "Inserting the following modules into the module store"
- cd /usr/share/selinux/targeted # struct policy not supported
- semodule -s dirsrv -i dirsrv.pp
- else
- elog
- elog "Policy has not been loaded. It is strongly suggested"
- elog "that the policy be loaded before continuing!!"
- elog
- elog "Automatic policy loading can be enabled by adding"
- elog "\"loadpolicy\" to the FEATURES in make.conf."
- elog
- ebeep 4
- fi
- fi
-
- elog
- elog "If you are planning to use 389-ds-snmp (ldap-agent),"
- elog "make sure to properly configure: /etc/dirsrv/config/ldap-agent.conf"
- elog "adding proper 'server' entries, and adding the lines below to"
- elog " => /etc/snmp/snmpd.conf"
- elog
- elog "master agentx"
- elog "agentXSocket /var/agentx/master"
- elog
- elog
- elog "To start 389 Directory Server (LDAP service) at boot:"
- elog
- elog " rc-update add 389-ds default"
- elog
-
- elog "If you are upgrading from previous 1.2.6 release candidates"
- elog "please see:"
- elog "http://directory.fedoraproject.org/wiki/Subtree_Rename#warning:_upgrade_from_389_v1.2.6_.28a.3F.2C_rc1_.7E_rc6.29_to_v1.2.6_rc6_or_newer"
- elog
-
-}
diff --git a/net-nds/389-ds-base/ChangeLog b/net-nds/389-ds-base/ChangeLog
index 0bbebb2346e3..02186ffb00ba 100644
--- a/net-nds/389-ds-base/ChangeLog
+++ b/net-nds/389-ds-base/ChangeLog
@@ -1,6 +1,11 @@
# ChangeLog for net-nds/389-ds-base
# Copyright 1999-2014 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/net-nds/389-ds-base/ChangeLog,v 1.27 2014/06/22 20:36:26 lxnay Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-nds/389-ds-base/ChangeLog,v 1.28 2014/06/26 12:49:39 kensington Exp $
+
+ 26 Jun 2014; Michael Palimaka <kensington@gentoo.org>
+ -389-ds-base-1.3.0.2.ebuild, -files/389-ds-base-1.2.11.16-cve-2012-4450.patch,
+ -files/selinux.patch:
+ Remove old.
22 Jun 2014; Fabio Erculiani <lxnay@gentoo.org> metadata.xml:
reset to maintainer-needed@
@@ -146,4 +151,3 @@
new ebuild, 389 Directory Server server package, thanks to
Andreis_Vinogradovs ( slepnoga ) <spamslepnoga@inbox.ru> for the base
ebuild, will close #104554
-
diff --git a/net-nds/389-ds-base/files/389-ds-base-1.2.11.16-cve-2012-4450.patch b/net-nds/389-ds-base/files/389-ds-base-1.2.11.16-cve-2012-4450.patch
deleted file mode 100644
index 54d9b1b975d7..000000000000
--- a/net-nds/389-ds-base/files/389-ds-base-1.2.11.16-cve-2012-4450.patch
+++ /dev/null
@@ -1,367 +0,0 @@
-From 5beb93d42efb807838c09c5fab898876876f8d09 Mon Sep 17 00:00:00 2001
-From: Noriko Hosoi <nhosoi@totoro.usersys.redhat.com>
-Date: Fri, 21 Sep 2012 19:35:18 +0000
-Subject: Trac Ticket #340 - Change on SLAPI_MODRDN_NEWSUPERIOR is not
-
- evaluated in acl
-
-https://fedorahosted.org/389/ticket/340
-
-Bug Description: When modrdn operation was executed, only newrdn
-change was passed to the acl plugin. Also, the change was used
-only for the acl search, but not for the acl target in the items
-in the acl cache.
-
-Fix Description: This patch also passes the newsuperior update
-to the acl plugin. And the modrdn updates are applied to the
-acl target in the acl cache.
----
-diff --git a/ldap/servers/plugins/acl/acl.c b/ldap/servers/plugins/acl/acl.c
-index 15e474e..3389404 100644
---- a/ldap/servers/plugins/acl/acl.c
-+++ b/ldap/servers/plugins/acl/acl.c
-@@ -170,9 +170,9 @@ acl_access_allowed_modrdn(
- * Test if have access to make the first rdn of dn in entry e.
- */
-
--static int check_rdn_access( Slapi_PBlock *pb, Slapi_Entry *e, const char *dn,
-- int access) {
--
-+static int
-+check_rdn_access( Slapi_PBlock *pb, Slapi_Entry *e, const char *dn, int access)
-+{
- char **dns;
- char **rdns;
- int retCode = LDAP_INSUFFICIENT_ACCESS;
-@@ -655,7 +655,8 @@ cleanup_and_ret:
-
- }
-
--static void print_access_control_summary( char *source, int ret_val, char *clientDn,
-+static void
-+print_access_control_summary( char *source, int ret_val, char *clientDn,
- struct acl_pblock *aclpb,
- char *right,
- char *attr,
-@@ -1524,11 +1525,12 @@ acl_check_mods(
- *
- **************************************************************************/
- extern void
--acl_modified (Slapi_PBlock *pb, int optype, char *n_dn, void *change)
-+acl_modified (Slapi_PBlock *pb, int optype, Slapi_DN *e_sdn, void *change)
- {
- struct berval **bvalue;
- char **value;
- int rv=0; /* returned value */
-+ const char* n_dn;
- char* new_RDN;
- char* parent_DN;
- char* new_DN;
-@@ -1537,10 +1539,12 @@ acl_modified (Slapi_PBlock *pb, int optype, char *n_dn, void *change)
- int j;
- Slapi_Attr *attr = NULL;
- Slapi_Entry *e = NULL;
-- Slapi_DN *e_sdn;
- aclUserGroup *ugroup = NULL;
-
-- e_sdn = slapi_sdn_new_normdn_byval ( n_dn );
-+ if (NULL == e_sdn) {
-+ return;
-+ }
-+ n_dn = slapi_sdn_get_dn(e_sdn);
- /* Before we proceed, Let's first check if we are changing any groups.
- ** If we are, then we need to change the signature
- */
-@@ -1768,45 +1772,64 @@ acl_modified (Slapi_PBlock *pb, int optype, char *n_dn, void *change)
- }
-
- break;
-- }/* case op is modify*/
-+ }/* case op is modify*/
-
-- case SLAPI_OPERATION_MODRDN:
--
-- new_RDN = (char*) change;
-- slapi_log_error (SLAPI_LOG_ACL, plugin_name,
-- "acl_modified (MODRDN %s => \"%s\"\n",
-- n_dn, new_RDN);
-+ case SLAPI_OPERATION_MODRDN:
-+ {
-+ char **rdn_parent;
-+ rdn_parent = (char **)change;
-+ new_RDN = rdn_parent[0];
-+ parent_DN = rdn_parent[1];
-
- /* compute new_DN: */
-- parent_DN = slapi_dn_parent (n_dn);
-- if (parent_DN == NULL) {
-- new_DN = new_RDN;
-+ if (NULL == parent_DN) {
-+ parent_DN = slapi_dn_parent(n_dn);
-+ }
-+ if (NULL == parent_DN) {
-+ if (NULL == new_RDN) {
-+ slapi_log_error (SLAPI_LOG_ACL, plugin_name,
-+ "acl_modified (MODRDN %s => \"no change\"\n",
-+ n_dn);
-+ break;
-+ } else {
-+ new_DN = new_RDN;
-+ }
- } else {
-- new_DN = slapi_create_dn_string("%s,%s", new_RDN, parent_DN);
-+ if (NULL == new_RDN) {
-+ Slapi_RDN *rdn= slapi_rdn_new();
-+ slapi_sdn_get_rdn(e_sdn, rdn);
-+ new_DN = slapi_create_dn_string("%s,%s", slapi_rdn_get_rdn(rdn),
-+ parent_DN);
-+ slapi_rdn_free(&rdn);
-+ } else {
-+ new_DN = slapi_create_dn_string("%s,%s", new_RDN, parent_DN);
-+ }
- }
-+ slapi_log_error (SLAPI_LOG_ACL, plugin_name,
-+ "acl_modified (MODRDN %s => \"%s\"\n", n_dn, new_RDN);
-
- /* Change the acls */
-- acllist_acicache_WRITE_LOCK();
-+ acllist_acicache_WRITE_LOCK();
- /* acllist_moddn_aci_needsLock expects normalized new_DN,
- * which is no need to be case-ignored */
- acllist_moddn_aci_needsLock ( e_sdn, new_DN );
- acllist_acicache_WRITE_UNLOCK();
-
- /* deallocat the parent_DN */
-- if (parent_DN != NULL) {
-- slapi_ch_free ( (void **) &new_DN );
-- slapi_ch_free ( (void **) &parent_DN );
-+ if (parent_DN != NULL) {
-+ slapi_ch_free_string(&new_DN);
-+ if (parent_DN != rdn_parent[1]) {
-+ slapi_ch_free_string(&parent_DN);
-+ }
- }
- break;
--
-- default:
-+ } /* case op is modrdn */
-+ default:
- /* print ERROR */
- break;
- } /*optype switch */
--
-- slapi_sdn_free ( &e_sdn );
--
- }
-+
- /***************************************************************************
- *
- * acl__scan_for_acis
-diff --git a/ldap/servers/plugins/acl/acl.h b/ldap/servers/plugins/acl/acl.h
-index 4fa3e3f..28c38e7 100644
---- a/ldap/servers/plugins/acl/acl.h
-+++ b/ldap/servers/plugins/acl/acl.h
-@@ -796,7 +796,8 @@ int acl_read_access_allowed_on_attr ( Slapi_PBlock *pb, Slapi_Entry *e, char
- struct berval *val, int access);
- void acl_set_acllist (Slapi_PBlock *pb, int scope, char *base);
- void acl_gen_err_msg(int access, char *edn, char *attr, char **errbuf);
--void acl_modified ( Slapi_PBlock *pb, int optype, char *dn, void *change);
-+void acl_modified (Slapi_PBlock *pb, int optype, Slapi_DN *e_sdn, void *change);
-+
- int acl_access_allowed_disjoint_resource( Slapi_PBlock *pb, Slapi_Entry *e,
- char *attr, struct berval *val, int access );
- int acl_access_allowed_main ( Slapi_PBlock *pb, Slapi_Entry *e, char **attrs,
-@@ -866,7 +867,7 @@ void acllist_print_tree ( Avlnode *root, int *depth, char *start, char *side);
- AciContainer *acllist_get_aciContainer_new ( );
- void acllist_done_aciContainer ( AciContainer *);
-
--aclUserGroup* aclg_find_userGroup (char *n_dn);
-+aclUserGroup* aclg_find_userGroup (const char *n_dn);
- void aclg_regen_ugroup_signature( aclUserGroup *ugroup);
- void aclg_markUgroupForRemoval ( aclUserGroup *u_group );
- void aclg_reader_incr_ugroup_refcnt(aclUserGroup* u_group);
-diff --git a/ldap/servers/plugins/acl/aclgroup.c b/ldap/servers/plugins/acl/aclgroup.c
-index c694293..2231304 100644
---- a/ldap/servers/plugins/acl/aclgroup.c
-+++ b/ldap/servers/plugins/acl/aclgroup.c
-@@ -213,7 +213,7 @@ aclg_reset_userGroup ( struct acl_pblock *aclpb )
- */
-
- aclUserGroup*
--aclg_find_userGroup(char *n_dn)
-+aclg_find_userGroup(const char *n_dn)
- {
- aclUserGroup *u_group = NULL;
- int i;
-diff --git a/ldap/servers/plugins/acl/acllist.c b/ldap/servers/plugins/acl/acllist.c
-index 9b5363a..e8198af 100644
---- a/ldap/servers/plugins/acl/acllist.c
-+++ b/ldap/servers/plugins/acl/acllist.c
-@@ -600,7 +600,6 @@ void
- acllist_init_scan (Slapi_PBlock *pb, int scope, const char *base)
- {
- Acl_PBlock *aclpb;
-- int i;
- AciContainer *root;
- char *basedn = NULL;
- int index;
-@@ -671,11 +670,6 @@ acllist_init_scan (Slapi_PBlock *pb, int scope, const char *base)
- aclpb->aclpb_state &= ~ACLPB_SEARCH_BASED_ON_LIST ;
-
- acllist_acicache_READ_UNLOCK();
--
-- i = 0;
-- while ( i < aclpb_max_selected_acls && aclpb->aclpb_base_handles_index[i] != -1 ) {
-- i++;
-- }
- }
-
- /*
-@@ -893,34 +887,50 @@ acllist_acicache_WRITE_LOCK( )
- int
- acllist_moddn_aci_needsLock ( Slapi_DN *oldsdn, char *newdn )
- {
--
--
- AciContainer *aciListHead;
- AciContainer *head;
-+ aci_t *acip;
-+ const char *oldndn;
-
- /* first get the container */
-
- aciListHead = acllist_get_aciContainer_new ( );
- slapi_sdn_free(&aciListHead->acic_sdn);
-- aciListHead->acic_sdn = oldsdn;
--
-+ aciListHead->acic_sdn = oldsdn;
-
- if ( NULL == (head = (AciContainer *) avl_find( acllistRoot, aciListHead,
-- (IFP) __acllist_aciContainer_node_cmp ) ) ) {
-+ (IFP) __acllist_aciContainer_node_cmp ) ) ) {
-
- slapi_log_error ( SLAPI_PLUGIN_ACL, plugin_name,
-- "Can't find the acl in the tree for moddn operation:olddn%s\n",
-- slapi_sdn_get_ndn ( oldsdn ));
-+ "Can't find the acl in the tree for moddn operation:olddn%s\n",
-+ slapi_sdn_get_ndn ( oldsdn ));
- aciListHead->acic_sdn = NULL;
- __acllist_free_aciContainer ( &aciListHead );
-- return 1;
-+ return 1;
- }
-
--
-- /* Now set the new DN */
-- slapi_sdn_done ( head->acic_sdn );
-- slapi_sdn_set_normdn_byval ( head->acic_sdn, newdn );
--
-+ /* Now set the new DN */
-+ slapi_sdn_set_normdn_byval(head->acic_sdn, newdn);
-+
-+ /* If necessary, reset the target DNs, as well. */
-+ oldndn = slapi_sdn_get_ndn(oldsdn);
-+ for (acip = head->acic_list; acip; acip = acip->aci_next) {
-+ const char *ndn = slapi_sdn_get_ndn(acip->aci_sdn);
-+ char *p = PL_strstr(ndn, oldndn);
-+ if (p) {
-+ if (p == ndn) {
-+ /* target dn is identical, replace it with new DN*/
-+ slapi_sdn_set_normdn_byval(acip->aci_sdn, newdn);
-+ } else {
-+ /* target dn is a descendent of olddn, merge it with new DN*/
-+ char *mynewdn;
-+ *p = '\0';
-+ mynewdn = slapi_ch_smprintf("%s%s", ndn, newdn);
-+ slapi_sdn_set_normdn_passin(acip->aci_sdn, mynewdn);
-+ }
-+ }
-+ }
-+
- aciListHead->acic_sdn = NULL;
- __acllist_free_aciContainer ( &aciListHead );
-
-diff --git a/ldap/servers/slapd/dn.c b/ldap/servers/slapd/dn.c
-index 11e56a9..b79d0f2 100644
---- a/ldap/servers/slapd/dn.c
-+++ b/ldap/servers/slapd/dn.c
-@@ -2097,7 +2097,7 @@ slapi_sdn_set_normdn_byval(Slapi_DN *sdn, const char *normdn)
- slapi_sdn_done(sdn);
- sdn->flag = slapi_setbit_uchar(sdn->flag, FLAG_DN);
- if(normdn == NULL) {
-- sdn->dn = slapi_ch_strdup(normdn);
-+ sdn->dn = NULL;
- sdn->ndn_len = 0;
- } else {
- sdn->dn = slapi_ch_strdup(normdn);
-diff --git a/ldap/servers/slapd/plugin_acl.c b/ldap/servers/slapd/plugin_acl.c
-index b878156..3bc3f21 100644
---- a/ldap/servers/slapd/plugin_acl.c
-+++ b/ldap/servers/slapd/plugin_acl.c
-@@ -134,11 +134,10 @@ int
- plugin_call_acl_mods_update ( Slapi_PBlock *pb, int optype )
- {
- struct slapdplugin *p;
-- char *dn;
- int rc = 0;
-- void *change = NULL;
-- Slapi_Entry *te = NULL;
-- Slapi_DN *sdn = NULL;
-+ void *change = NULL;
-+ Slapi_Entry *te = NULL;
-+ Slapi_DN *sdn = NULL;
- Operation *operation;
-
- slapi_pblock_get (pb, SLAPI_OPERATION, &operation);
-@@ -146,7 +145,7 @@ plugin_call_acl_mods_update ( Slapi_PBlock *pb, int optype )
- (void)slapi_pblock_get( pb, SLAPI_TARGET_SDN, &sdn );
-
- switch ( optype ) {
-- case SLAPI_OPERATION_MODIFY:
-+ case SLAPI_OPERATION_MODIFY:
- (void)slapi_pblock_get( pb, SLAPI_MODIFY_MODS, &change );
- break;
- case SLAPI_OPERATION_ADD:
-@@ -158,11 +157,27 @@ plugin_call_acl_mods_update ( Slapi_PBlock *pb, int optype )
- }
- break;
- case SLAPI_OPERATION_MODRDN:
-+ {
-+ void *mychange[2];
-+ char *newrdn = NULL;
-+ Slapi_DN *psdn = NULL;
-+ char *pdn = NULL;
-+
- /* newrdn: "change" is normalized but not case-ignored */
- /* The acl plugin expects normalized newrdn, but no need to be case-
- * ignored. */
-- (void)slapi_pblock_get( pb, SLAPI_MODRDN_NEWRDN, &change );
-+ (void)slapi_pblock_get( pb, SLAPI_MODRDN_NEWRDN, &newrdn );
-+ (void)slapi_pblock_get( pb, SLAPI_MODRDN_NEWSUPERIOR_SDN, &psdn );
-+ if (psdn) {
-+ pdn = (char *)slapi_sdn_get_dn(psdn);
-+ } else {
-+ (void)slapi_pblock_get( pb, SLAPI_MODRDN_NEWSUPERIOR, &pdn );
-+ }
-+ mychange[0] = newrdn;
-+ mychange[1] = pdn;
-+ change = mychange;
- break;
-+ }
- }
-
- if (NULL == sdn) {
-@@ -172,10 +187,9 @@ plugin_call_acl_mods_update ( Slapi_PBlock *pb, int optype )
- }
-
- /* call the global plugins first and then the backend specific */
-- dn = (char*)slapi_sdn_get_ndn(sdn); /* jcm - Had to cast away const */
- for ( p = get_plugin_list(PLUGIN_LIST_ACL); p != NULL; p = p->plg_next ) {
- if (plugin_invoke_plugin_sdn(p, SLAPI_PLUGIN_ACL_MODS_UPDATE, pb, sdn)){
-- rc = (*p->plg_acl_mods_update)(pb, optype, dn, change );
-+ rc = (*p->plg_acl_mods_update)(pb, optype, sdn, change );
- if ( rc != LDAP_SUCCESS ) break;
- }
- }
---
-cgit v0.9.0.2
diff --git a/net-nds/389-ds-base/files/selinux.patch b/net-nds/389-ds-base/files/selinux.patch
deleted file mode 100644
index 4b6e093eecca..000000000000
--- a/net-nds/389-ds-base/files/selinux.patch
+++ /dev/null
@@ -1,8 +0,0 @@
---- 389-ds-base-1.2.8.3.orig/selinux/Makefile
-+++ 389-ds-base-1.2.8.3/selinux/Makefile
-@@ -1,4 +1,4 @@
--POLICY_MAKEFILE = /usr/share/selinux/devel/Makefile
-+POLICY_MAKEFILE = /usr/share/selinux/targeted/include/Makefile
- POLICY_DIR = $(DESTDIR)/usr/share/selinux/targeted
-
- all: