diff options
author | Michał Górny <mgorny@gentoo.org> | 2018-09-04 08:54:23 +0200 |
---|---|---|
committer | Michał Górny <mgorny@gentoo.org> | 2018-09-04 23:15:55 +0200 |
commit | d5f97eaa464736a454c8ad410f4acd4fccdf2324 (patch) | |
tree | c441190df7de6aa329b5b6ca2650533d4dd54c98 | |
parent | compat_coroutine: CancelledError cancels coroutine's future (diff) | |
download | portage-d5f97eaa464736a454c8ad410f4acd4fccdf2324.tar.gz portage-d5f97eaa464736a454c8ad410f4acd4fccdf2324.tar.bz2 portage-d5f97eaa464736a454c8ad410f4acd4fccdf2324.zip |
install-qa-checks.d: Add a check for Gentoo path policies (FHS-y)
Add a check that verifies whether ebuilds don't install to paths
forbidden by the policy. This mostly aims to verbosely report bugs
such as missing dependencies causing empty install paths, resulting
in files ending up in / and bad upstreams. This should also help
detect the relatively common mistake of using /usr/share/doc/${P}
instead of ${PF}.
The initial list of allowed paths was based on what ebuilds installed
to my system.
-rw-r--r-- | bin/install-qa-check.d/08gentoo-paths | 77 |
1 files changed, 77 insertions, 0 deletions
diff --git a/bin/install-qa-check.d/08gentoo-paths b/bin/install-qa-check.d/08gentoo-paths new file mode 100644 index 000000000..3ee887df0 --- /dev/null +++ b/bin/install-qa-check.d/08gentoo-paths @@ -0,0 +1,77 @@ +# Check whether ebuilds are not installing new, non-Gentoo-ey paths. + +gentoo_path_check() { + # allowed path definitions + # ------------------------ + + # directories common to / and /usr + local allowed_common_dirs=( + bin lib lib32 lib64 libx32 sbin + ) + + # toplevel directories which can be installed to by ebuilds + # /home is not included as no ebuilds should install files there + local allowed_paths_toplevel=( + "${allowed_common_dirs[@]}" + boot dev etc opt srv usr var + ) + + # directories in /usr which can be installed to by ebuilds + # /usr/games is not included as it is banned nowadays + local allowed_paths_usr=( + "${allowed_common_dirs[@]}" + include libexec share src + # toolchain stuff + "${CHOST}" "${CTARGET}" + ) + + + # the logic + # --------- + local bad_paths=() + local x + + local shopt_save=$(shopt -p nullglob) + shopt -s nullglob + + # 1. check for unexpected top-level directories + local toplevel_dirs=( "${ED%/}"/* ) + for x in "${toplevel_dirs[@]##*/}"; do + if ! has "${x}" "${allowed_paths_toplevel[@]}"; then + bad_paths+=( "/${x}" ) + fi + done + + # 2. check for unexpected /usr subdirectories + local usr_dirs=( "${ED%/}"/usr/* ) + for x in "${usr_dirs[@]##*/}"; do + if ! has "${x}" "${allowed_paths_usr[@]}"; then + bad_paths+=( "/usr/${x}" ) + fi + done + + # 3. check for unexpected /usr/share/doc subdirectories + local doc_dirs=( "${ED%/}"/usr/share/doc/* ) + for x in "${doc_dirs[@]##*/}"; do + if [[ ${x} != ${PF} ]]; then + bad_paths+=( "/usr/share/doc/${x}" ) + fi + done + + ${shopt_save} + + # report + # ------ + if [[ -n ${bad_paths[@]} ]]; then + eqawarn "The ebuild is installing to one or more unexpected paths:" + eqawarn + eqatag -v non-gentoo-paths "${bad_paths[@]}" + eqawarn + eqawarn "Please fix the ebuild to use correct FHS/Gentoo policy paths." + fi +} + +gentoo_path_check +: # guarantee successful exit + +# vim:ft=sh |