[arch-commits] Commit in catalyst-utils/trunk (PKGBUILD authatieventsd.sh)

Laurent Carlier lcarlier at nymeria.archlinux.org
Sat Mar 2 10:52:02 UTC 2013


    Date: Saturday, March 2, 2013 @ 11:52:02
  Author: lcarlier
Revision: 85512

upgpkg: catalyst-utils 13.1-2

Fix FS#33542, remove dependency on sysvinit-tools

Added:
  catalyst-utils/trunk/authatieventsd.sh
Modified:
  catalyst-utils/trunk/PKGBUILD

-------------------+
 PKGBUILD          |   13 ++++--
 authatieventsd.sh |  102 ++++++++++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 110 insertions(+), 5 deletions(-)

Modified: PKGBUILD
===================================================================
--- PKGBUILD	2013-03-02 09:50:49 UTC (rev 85511)
+++ PKGBUILD	2013-03-02 10:52:02 UTC (rev 85512)
@@ -6,7 +6,7 @@
 pkgbase=catalyst-utils
 pkgname=('catalyst-utils' 'opencl-catalyst')
 pkgver=13.1
-pkgrel=1
+pkgrel=2
 pkgdesc="AMD Catalyst drivers utilities and libraries with OpenCL implementation."
 arch=('i686' 'x86_64')
 url="http://www.amd.com"
@@ -14,11 +14,11 @@
 source=(http://www2.ati.com/drivers/linux/amd-driver-installer-catalyst-${pkgver}-linux-x86.x86_64.zip
         fglrx-authfile-locations.patch
         atieventsd.service
-        signature.from.12.9)
+        authatieventsd.sh)
 md5sums=('b5d9de9b000448dcc2a9eb74a889116d'
          '82bc263302a38fc3c97cd9ac05513435'
          '4bdb353dea68e33ac9e20ec30cc42082'
-         '01a51cd64705c0dfb1dcc7e285bf7637')
+         'a50e1c36b0669e84f8c6cf36432659db')
 
 if [ "${CARCH}" = "i686" ]; then
   _ARCHDIR="x86"
@@ -41,8 +41,8 @@
 package_catalyst-utils() {
   pkgdesc="AMD Catalyst drivers utilities and libraries."
   provides=('libgl')
-  conflicts=('libgl' 'nvidia-utils')
-  depends=('xorg-server>=1.7.0'  'gcc-libs' 'libxinerama' 'libxcursor' 'libxxf86vm' 'libxrandr' 'libsm' 'fontconfig' 'libxi' 'netkit-bsd-finger')
+  conflicts=('mesa-libgl' 'nvidia-utils' 'nvidia-nvidia-304xx-utils')
+  depends=('xorg-server>=1.7.0'  'gcc-libs' 'libxinerama' 'libxcursor' 'libxxf86vm' 'libxrandr' 'libsm' 'fontconfig' 'libxi' 'xorg-xauth' 'which' 'netkit-bsd-finger')
   optdepends=('qt: amdcccle'
               'acpid: acpi event support')
   
@@ -100,6 +100,9 @@
   # systemd script
   install -m644 "${srcdir}/atieventsd.service" "${pkgdir}/usr/lib/systemd/system/"
 
+  # (FS#33542) also use ps instead of pidof
+  install -m755 "${srcdir}/authatieventsd.sh" "${pkgdir}/etc/ati/authatieventsd.sh"
+
   # provided in opencl-catalyst package
   rm "${pkgdir}"/usr/lib/lib{amdocl*,OpenCL}.so* 
   

Added: authatieventsd.sh
===================================================================
--- authatieventsd.sh	                        (rev 0)
+++ authatieventsd.sh	2013-03-02 10:52:02 UTC (rev 85512)
@@ -0,0 +1,102 @@
+#!/bin/sh
+
+#
+# Control script grant/revoke access to X for the ATI External Events Daemon
+#
+# Distro maintainers may modify this reference script as necessary to conform
+# to their distribution policies.
+#
+# Copyright (c) 2006, ATI Technologies Inc.  All rights reserved.
+#
+
+#
+# Parameters:
+#   $1 is a keyword, either "grant" or "revoke"
+#   $2 is the display name
+#   $3 is the X authorization file to be authorized
+#
+# Returns:
+#   0 if authorization was successfully granted/revoked
+#   nonzero on failure
+#
+# Note:
+#   The third parameter only makes sense if xauth is being used.  If another
+#   mechanism such as xhost is being used it can be ignored.  For setups that
+#   do not do any form of authentication(!) this script can be trimmed down
+#   to just "exit 0" and the daemon will assume that it is always authorized.
+#
+
+GetServerAuthFile()
+{
+    # Determine where the authorization key may be hiding.  The location will
+    # vary depending upon whether X was started via xdm/kdm, gdm or startx, so
+    # check each one in turn.
+
+    # Check xdm/kdm
+
+    XDM_AUTH_MASK=/var/lib/xdm/authdir/authfiles/A$1*
+    XDM_AUTH_FILE=`ls -t $XDM_AUTH_MASK 2>/dev/null | head -n 1`   # Choose the newest file
+    if [ -n "$XDM_AUTH_FILE" ]; then
+        SERVER_AUTH_FILE=$XDM_AUTH_FILE
+        DISP_SEARCH_STRING="#ffff#"
+        return 0
+    fi
+
+    # Check gdm
+
+    GDM_AUTH_FILE=/var/lib/gdm/$1.Xauth
+    if [ -e $GDM_AUTH_FILE ]; then
+        SERVER_AUTH_FILE=$GDM_AUTH_FILE
+        DISP_SEARCH_STRING="$1"
+        return 0
+    fi
+
+    # Finally, check for startx
+
+    for XPID in `ps -C X -o pid=`; do
+        TRIAL_XAUTH_FILE=`tr '\0' '\n' < /proc/$XPID/environ | grep -e "^XAUTHORITY=" | cut -d= -f2`
+        TRIAL_XAUTH_KEY=`xauth -f $TRIAL_XAUTH_FILE list | grep "unix$1"`
+        if [ -n "$TRIAL_XAUTH_KEY" ]; then
+            SERVER_AUTH_FILE=$TRIAL_XAUTH_FILE
+            DISP_SEARCH_STRING="unix$1"
+            return 0
+        fi
+    done
+
+    # Couldn't find the key
+
+    return 1
+}
+
+# Main part of script
+
+#
+# Since the daemon is usually started during init time before X comes up,
+# $PATH may not yet contain the paths to the X binaries, particularly xauth.
+# Add the usual location for where xauth may live and fail out if we still
+# can't find it.
+#
+
+PATH=$PATH:/usr/bin:/usr/X11R6/bin
+which xauth > /dev/null || exit -1
+
+case "$1" in
+    grant)
+        GetServerAuthFile $2 || exit -1
+        DISP_AUTH_KEY=`xauth -f $SERVER_AUTH_FILE list | grep $DISP_SEARCH_STRING | awk '{ print $3 }'`
+        if [ -n "$DISP_AUTH_KEY" ]; then
+            xauth -f $3 add $2 . $DISP_AUTH_KEY || exit -1
+        else
+            exit -1
+        fi
+        ;;
+
+    revoke)
+        xauth -f $3 remove $2 || exit -1
+        ;;
+
+    *)
+        exit -1
+        ;;
+esac
+exit 0


Property changes on: catalyst-utils/trunk/authatieventsd.sh
___________________________________________________________________
Added: svn:executable
## -0,0 +1 ##
+*
\ No newline at end of property



More information about the arch-commits mailing list