Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 7112 Details for
Bug 10135
USE flags for pam
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
shadow ebuild
shadow-4.0.3-r4.ebuild (text/plain), 4.57 KB, created by
Joshua Brindle (RETIRED)
on 2003-01-08 22:35:05 UTC
(
hide
)
Description:
shadow ebuild
Filename:
MIME Type:
Creator:
Joshua Brindle (RETIRED)
Created:
2003-01-08 22:35:05 UTC
Size:
4.57 KB
patch
obsolete
># Copyright 1999-2002 Gentoo Technologies, Inc. ># Distributed under the terms of the GNU General Public License v2 ># $Header: /home/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.3-r3.ebuild,v 1.1 2002/12/25 02:55:35 azarah Exp $ > >IUSE="pam" > >inherit libtool > >FORCE_SYSTEMAUTH_UPDATE="no" > >S="${WORKDIR}/${P}" >HOMEPAGE="http://shadow.pld.org.pl/" >DESCRIPTION="Utilities to deal with user accounts" >SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.gz" > >LICENSE="BSD" >SLOT="0" >KEYWORDS="x86 ppc sparc alpha" > >DEPEND="pam? (>=sys-libs/pam-0.75-r4) > >=sys-libs/cracklib-2.7-r3 > sys-devel/gettext" > >RDEPEND="pam? (>=sys-libs/pam-0.75-r4) > >=sys-libs/cracklib-2.7-r3" > > >pkg_preinst() { > rm -f ${ROOT}/etc/pam.d/system-auth.new >} > >src_unpack() { > unpack ${A} > > # Get su to call pam_open_session(), and also set DISPLAY and XAUTHORITY, > # else the session entries in /etc/pam.d/su never get executed, and > # pam_xauth for one, is then never used. This should close bug #8831. > # > # <azarah@gentoo.org> (19 Oct 2002) > cd ${S}; patch -p1 < ${FILESDIR}/${P}-su-pam_open_session.patch-v2 || die >} > >src_compile() { > elibtoolize > > local myconf="" > use nls || myconf="${myconf} --disable-nls" > use pam && myconf="${myconf} --with-libpam" > use pam || myconf="${myconf} --without-pam" > > ./configure --disable-desrpc \ > --with-libcrypt \ > --with-libcrack \ > --enable-shared=no \ > --enable-static=yes \ > --host=${CHOST} \ > ${myconf} || die "bad configure" > > # Parallel make fails sometimes > make || die "compile problem" >} > >src_install() { > dodir /etc/default /etc/skel > > make prefix=${D}/usr \ > exec_prefix=${D} \ > mandir=${D}/usr/share/man \ > install || die "install problem" > > # Do not install this login, but rather the one from > # pam-login, as this one have a serious root exploit > # with pam_limits in use. > # unless we don't want pam > use pam && rm ${D}/bin/login > > mv ${D}/lib ${D}/usr > dosed "s:/lib':/usr/lib':g" /usr/lib/libshadow.la > dosed "s:/lib/:/usr/lib/:g" /usr/lib/libshadow.la > dosed "s:/lib':/usr/lib':g" /usr/lib/libmisc.la > dosed "s:/lib/:/usr/lib/:g" /usr/lib/libmisc.la > dosym /usr/bin/newgrp /usr/bin/sg > dosym /usr/sbin/useradd /usr/sbin/adduser > dosym /usr/sbin/vipw /usr/sbin/vigr > # Remove dead links > rm -f ${D}/bin/{sg,vipw} > > insinto /etc > # Using a securetty with devfs device names added > # (compat names kept for non-devfs compatibility) > insopts -m0600 ; doins ${FILESDIR}/securetty > insopts -m0600 ; doins ${S}/etc/login.access > insopts -m0644 ; doins ${S}/etc/limits > > # needed for 'adduser -D' > insinto /etc/default > insopts -m0600 > doins ${FILESDIR}/default/useradd > ># From sys-apps/pam-login now ># insopts -m0644 ; doins ${FILESDIR}/login.defs ># Do this stuff only if we are using pam > if [ `use pam` ] ; then > insinto /etc/pam.d ; insopts -m0644 > cd ${FILESDIR}/pam.d > for x in * > do > [ -f ${x} ] && doins ${x} > done > fi > newins system-auth system-auth.new > newins shadow chage > newins shadow chsh > newins shadow chfn > newins shadow useradd > newins shadow groupadd > cd ${S} > > # The manpage install is beyond my comprehension, and > # also broken. Just do it over. > rm -rf ${D}/usr/share/man/* > for x in man/*.[0-9] > do > [ -f ${x} ] || continue > local dir="${D}/usr/share/man/man${x##*.}" > mkdir -p ${dir} > cp ${x} ${dir} > done > > # Dont install the manpage, since we dont use > # login with shadow > if [ `use pam` ] ; then > rm -f ${D}/usr/share/man/man1/login.* > # We use pam, so this is not applicable. > rm -f ${D}/usr/share/man/man5/suauth.* > fi > > cd ${S}/doc > dodoc ANNOUNCE INSTALL LICENSE README WISHLIST > docinto txt > dodoc HOWTO LSM README.* *.txt > > # Fix sparc serial console > if [ "${ARCH}" = "sparc" -o "${ARCH}" = "" ] > then > # ttyS0 and its devfsd counterpart (Sparc serial port "A") > dosed 's:\(vc/1\)$:tts/0\n\1:' /etc/securetty > dosed 's:\(tty1\)$:ttyS0\n\1:' /etc/securetty > fi >} > >pkg_postinst() { > if [ `use pam` ] ; then > local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)" > local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)" > > if [ "${CHECK1}" != "${CHECK2}" -a "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ] > then > ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth " > ewarn "is being updated automatically. Your old " > ewarn "system-auth will be backed up as:" > ewarn > ewarn " ${ROOT}etc/pam.d/system-auth.bak" > echo > > cp -a ${ROOT}/etc/pam.d/system-auth \ > ${ROOT}/etc/pam.d/system-auth.bak; > mv -f ${ROOT}/etc/pam.d/system-auth.new \ > ${ROOT}/etc/pam.d/system-auth > rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth > else > rm -f ${ROOT}/etc/pam.d/system-auth.new > fi > fi #end of if use pam block >} >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 10135
:
7111
| 7112 |
7113
|
7114
|
19275