summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMike Frysinger <vapier@gentoo.org>2006-01-14 02:06:21 +0000
committerMike Frysinger <vapier@gentoo.org>2006-01-14 02:06:21 +0000
commit3f53da22564c449d1dacf2d702daad827b72c31f (patch)
treebcde0634d2c895e98494c5aeafd64d4924da70fd /sys-apps
parentFixed perl deps (diff)
downloadgentoo-2-3f53da22564c449d1dacf2d702daad827b72c31f.tar.gz
gentoo-2-3f53da22564c449d1dacf2d702daad827b72c31f.tar.bz2
gentoo-2-3f53da22564c449d1dacf2d702daad827b72c31f.zip
clean out old files
(Portage version: 2.1_pre3-r1)
Diffstat (limited to 'sys-apps')
-rw-r--r--sys-apps/shadow/files/digest-shadow-4.0.4.1-r41
-rw-r--r--sys-apps/shadow/files/digest-shadow-4.0.5-r21
-rw-r--r--sys-apps/shadow/files/digest-shadow-4.0.5-r31
-rw-r--r--sys-apps/shadow/files/digest-shadow-4.0.6-r11
-rw-r--r--sys-apps/shadow/files/digest-shadow-4.0.71
-rw-r--r--sys-apps/shadow/files/digest-shadow-4.0.7-r11
-rw-r--r--sys-apps/shadow/files/digest-shadow-4.0.7-r31
-rw-r--r--sys-apps/shadow/files/shadow-4.0.4.1-gcc34-xmalloc.patch11
-rw-r--r--sys-apps/shadow/files/shadow-4.0.4.1-nls-manpages.patch14
-rw-r--r--sys-apps/shadow/files/shadow-4.0.4.1-passwd-typo.patch10
-rw-r--r--sys-apps/shadow/files/shadow-4.0.4.1-selinux.diff175
-rw-r--r--sys-apps/shadow/files/shadow-4.0.4.1-su-pam_open_session.patch210
-rw-r--r--sys-apps/shadow/files/shadow-4.0.4.1-useradd-manpage-update.patch17
-rw-r--r--sys-apps/shadow/files/shadow-4.0.4.1-userdel-missing-brackets.patch15
-rw-r--r--sys-apps/shadow/files/shadow-4.0.5-fix-adding-of-pam_env-set-env-vars.patch11
-rw-r--r--sys-apps/shadow/files/shadow-4.0.5-fix-mail-configure.patch165
-rw-r--r--sys-apps/shadow/files/shadow-4.0.5-hack-X-envvars.patch18
-rw-r--r--sys-apps/shadow/files/shadow-4.0.5-remove-else.patch16
-rw-r--r--sys-apps/shadow/shadow-4.0.4.1-r4.ebuild205
-rw-r--r--sys-apps/shadow/shadow-4.0.5-r2.ebuild187
-rw-r--r--sys-apps/shadow/shadow-4.0.5-r3.ebuild193
-rw-r--r--sys-apps/shadow/shadow-4.0.6-r1.ebuild192
-rw-r--r--sys-apps/shadow/shadow-4.0.7-r1.ebuild228
-rw-r--r--sys-apps/shadow/shadow-4.0.7-r3.ebuild238
-rw-r--r--sys-apps/shadow/shadow-4.0.7.ebuild192
25 files changed, 0 insertions, 2104 deletions
diff --git a/sys-apps/shadow/files/digest-shadow-4.0.4.1-r4 b/sys-apps/shadow/files/digest-shadow-4.0.4.1-r4
deleted file mode 100644
index 86c719561f0b..000000000000
--- a/sys-apps/shadow/files/digest-shadow-4.0.4.1-r4
+++ /dev/null
@@ -1 +0,0 @@
-MD5 3a3d17d3d7c630b602baf66ae7434c61 shadow-4.0.4.1.tar.bz2 814234
diff --git a/sys-apps/shadow/files/digest-shadow-4.0.5-r2 b/sys-apps/shadow/files/digest-shadow-4.0.5-r2
deleted file mode 100644
index 00b3a379adf1..000000000000
--- a/sys-apps/shadow/files/digest-shadow-4.0.5-r2
+++ /dev/null
@@ -1 +0,0 @@
-MD5 cca17a4843a3b5b324a5398faf81c3b4 shadow-4.0.5.tar.bz2 1012361
diff --git a/sys-apps/shadow/files/digest-shadow-4.0.5-r3 b/sys-apps/shadow/files/digest-shadow-4.0.5-r3
deleted file mode 100644
index 00b3a379adf1..000000000000
--- a/sys-apps/shadow/files/digest-shadow-4.0.5-r3
+++ /dev/null
@@ -1 +0,0 @@
-MD5 cca17a4843a3b5b324a5398faf81c3b4 shadow-4.0.5.tar.bz2 1012361
diff --git a/sys-apps/shadow/files/digest-shadow-4.0.6-r1 b/sys-apps/shadow/files/digest-shadow-4.0.6-r1
deleted file mode 100644
index 029176db1f9c..000000000000
--- a/sys-apps/shadow/files/digest-shadow-4.0.6-r1
+++ /dev/null
@@ -1 +0,0 @@
-MD5 3ca79b02c0aaa82128f4c32cb68ffe4f shadow-4.0.6.tar.bz2 1016214
diff --git a/sys-apps/shadow/files/digest-shadow-4.0.7 b/sys-apps/shadow/files/digest-shadow-4.0.7
deleted file mode 100644
index 57cfe54be85e..000000000000
--- a/sys-apps/shadow/files/digest-shadow-4.0.7
+++ /dev/null
@@ -1 +0,0 @@
-MD5 89ebec0d1c0d861a5bd5c4c63e5cb0cc shadow-4.0.7.tar.bz2 1019749
diff --git a/sys-apps/shadow/files/digest-shadow-4.0.7-r1 b/sys-apps/shadow/files/digest-shadow-4.0.7-r1
deleted file mode 100644
index 57cfe54be85e..000000000000
--- a/sys-apps/shadow/files/digest-shadow-4.0.7-r1
+++ /dev/null
@@ -1 +0,0 @@
-MD5 89ebec0d1c0d861a5bd5c4c63e5cb0cc shadow-4.0.7.tar.bz2 1019749
diff --git a/sys-apps/shadow/files/digest-shadow-4.0.7-r3 b/sys-apps/shadow/files/digest-shadow-4.0.7-r3
deleted file mode 100644
index 57cfe54be85e..000000000000
--- a/sys-apps/shadow/files/digest-shadow-4.0.7-r3
+++ /dev/null
@@ -1 +0,0 @@
-MD5 89ebec0d1c0d861a5bd5c4c63e5cb0cc shadow-4.0.7.tar.bz2 1019749
diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-gcc34-xmalloc.patch b/sys-apps/shadow/files/shadow-4.0.4.1-gcc34-xmalloc.patch
deleted file mode 100644
index 9ea7d23f3230..000000000000
--- a/sys-apps/shadow/files/shadow-4.0.4.1-gcc34-xmalloc.patch
+++ /dev/null
@@ -1,11 +0,0 @@
---- libmisc/old/xmalloc.c 2004-04-21 09:15:20.000000000 +0000
-+++ libmisc/xmalloc.c 2004-04-21 09:32:50.000000000 +0000
-@@ -13,7 +13,7 @@
- RCSID ("$Id: shadow-4.0.4.1-gcc34-xmalloc.patch,v 1.1 2004/04/22 11:22:43 lv Exp $")
- #include <stdio.h>
- #include "defines.h"
--extern char *malloc ();
-+extern void *malloc (size_t size);
-
- char *xmalloc (size_t size)
- {
diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-nls-manpages.patch b/sys-apps/shadow/files/shadow-4.0.4.1-nls-manpages.patch
deleted file mode 100644
index cffa6b22bcf9..000000000000
--- a/sys-apps/shadow/files/shadow-4.0.4.1-nls-manpages.patch
+++ /dev/null
@@ -1,14 +0,0 @@
---- man/Makefile.in.orig 2004-10-16 16:44:32.554707920 -0400
-+++ man/Makefile.in 2004-10-16 16:44:52.870619432 -0400
-@@ -153,7 +153,11 @@
- target_alias = @target_alias@
-
- # subdirectories for translated manual pages
-+ifeq ($(USE_NLS),no)
-+SUBDIRS =
-+else
- SUBDIRS = cs de es fr hu id it ja ko pl pt_BR ru zh_CN zh_TW
-+endif
-
- man_MANS = \
- adduser.8 \
diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-passwd-typo.patch b/sys-apps/shadow/files/shadow-4.0.4.1-passwd-typo.patch
deleted file mode 100644
index 8f94ffcd5c99..000000000000
--- a/sys-apps/shadow/files/shadow-4.0.4.1-passwd-typo.patch
+++ /dev/null
@@ -1,10 +0,0 @@
-Index: man/passwd.1
-===================================================================
-RCS file: /cvsroot/shadow/man/passwd.1,v
-retrieving revision 1.16
-diff -u -B -U0 -r1.16 passwd.1
---- man/passwd.1 1 May 2003 18:17:39 -0000 1.16
-+++ man/passwd.1 29 Oct 2004 02:52:21 -0000
-@@ -112 +112 @@
--User accounts may be locked and unlocked with the \fB-l\fR and fB-u\fR
-+User accounts may be locked and unlocked with the \fB-l\fR and \fB-u\fR
diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-selinux.diff b/sys-apps/shadow/files/shadow-4.0.4.1-selinux.diff
deleted file mode 100644
index 26e118125f77..000000000000
--- a/sys-apps/shadow/files/shadow-4.0.4.1-selinux.diff
+++ /dev/null
@@ -1,175 +0,0 @@
-diff -urN shadow-4.0.3.orig/lib/Makefile.am shadow-4.0.3/lib/Makefile.am
---- shadow-4.0.3.orig/lib/Makefile.am 2001-10-06 14:53:20.000000000 -0500
-+++ shadow-4.0.3/lib/Makefile.am 2003-08-07 08:38:20.000000000 -0500
-@@ -1,7 +1,7 @@
-
- AUTOMAKE_OPTIONS = 1.0 foreign
-
--DEFS =
-+DEFS = -DWITH_SELINUX
- INCLUDES =
-
- lib_LTLIBRARIES = libshadow.la
-diff -urN shadow-4.0.3.orig/lib/Makefile.in shadow-4.0.3/lib/Makefile.in
---- shadow-4.0.3.orig/lib/Makefile.in 2004-01-14 16:15:26.000000000 +0200
-+++ shadow-4.0.3/lib/Makefile.in 2004-07-03 21:34:31.815854072 +0300
-@@ -56,7 +56,7 @@
- CXXFLAGS = @CXXFLAGS@
- CYGPATH_W = @CYGPATH_W@
-
--DEFS =
-+DEFS = -DWITH_SELINUX
- DEPDIR = @DEPDIR@
- ECHO = @ECHO@
- ECHO_C = @ECHO_C@
-diff -urN shadow-4.0.3.orig/lib/commonio.c shadow-4.0.3/lib/commonio.c
---- shadow-4.0.3.orig/lib/commonio.c 2001-11-17 07:15:52.000000000 -0600
-+++ shadow-4.0.3/lib/commonio.c 2003-08-07 08:38:20.000000000 -0500
-@@ -15,7 +15,10 @@
- #ifdef HAVE_SHADOW_H
- #include <shadow.h>
- #endif
--
-+#ifdef WITH_SELINUX
-+#include <selinux/selinux.h>
-+static security_context_t old_context=NULL;
-+#endif
- #include "commonio.h"
-
- /* local function prototypes */
-@@ -437,6 +440,15 @@
- return 0;
- }
-
-+#ifdef WITH_SELINUX
-+ db->scontext=NULL;
-+ if (is_selinux_enabled() && (! db->readonly)) {
-+ if (fgetfilecon(fileno(db->fp),&db->scontext) < 0) {
-+ goto cleanup;
-+ }
-+ }
-+#endif
-+
- buflen = BUFLEN;
- buf = (char *) malloc(buflen);
- if (!buf)
-@@ -492,6 +504,12 @@
- free(buf);
- cleanup:
- free_linked_list(db);
-+#ifdef WITH_SELINUX
-+ if (db->scontext!= NULL) {
-+ freecon(db->scontext);
-+ db->scontext=NULL;
-+ }
-+#endif
- fclose(db->fp);
- db->fp = NULL;
- errno = ENOMEM;
-@@ -627,6 +645,19 @@
- goto fail;
- }
-
-+#ifdef WITH_SELINUX
-+ if (db->scontext != NULL) {
-+ int stat=getfscreatecon(&old_context);
-+ if (stat< 0) {
-+ errors++;
-+ goto fail;
-+ }
-+ if (setfscreatecon(db->scontext)<0) {
-+ errors++;
-+ goto fail;
-+ }
-+ }
-+#endif
- /*
- * Create backup file.
- */
-@@ -683,14 +714,26 @@
- goto fail;
-
- nscd_need_reload = 1;
--
-+ goto success;
-+fail:
-+ errors++;
- success:
-- free_linked_list(db);
-- return 1;
-
--fail:
-+#ifdef WITH_SELINUX
-+ if (db->scontext != NULL) {
-+ if (setfscreatecon(old_context)<0) {
-+ errors++;
-+ }
-+ if (old_context != NULL) {
-+ freecon(old_context);
-+ old_context=NULL;
-+ }
-+ freecon(db->scontext);
-+ db->scontext=NULL;
-+ }
-+#endif
- free_linked_list(db);
-- return 0;
-+ return errors==0;
- }
-
-
-diff -urN shadow-4.0.3.orig/lib/commonio.h shadow-4.0.3/lib/commonio.h
---- shadow-4.0.3.orig/lib/commonio.h 2001-08-14 16:09:54.000000000 -0500
-+++ shadow-4.0.3/lib/commonio.h 2003-08-07 08:38:20.000000000 -0500
-@@ -1,5 +1,8 @@
- /* $Id: shadow-4.0.4.1-selinux.diff,v 1.2 2004/07/03 19:59:59 pebenito Exp $ */
-
-+#ifdef WITH_SELINUX
-+#include <selinux/selinux.h>
-+#endif
- /*
- * Linked list entry.
- */
-@@ -70,6 +73,9 @@
- */
- FILE *fp;
-
-+#ifdef WITH_SELINUX
-+ security_context_t scontext;
-+#endif
- /*
- * Head, tail, current position in linked list.
- */
-diff -urN shadow-4.0.3.orig/src/Makefile.am shadow-4.0.3/src/Makefile.am
---- shadow-4.0.3.orig/src/Makefile.am 2002-03-10 01:12:52.000000000 -0600
-+++ shadow-4.0.3/src/Makefile.am 2003-08-07 08:38:20.000000000 -0500
-@@ -4,7 +4,7 @@
- ubindir = ${prefix}/bin
- usbindir = ${prefix}/sbin
-
--DEFS = -D_HAVE_CONFIG_H -DLOCALEDIR=\"$(datadir)/locale\"
-+DEFS = -D_HAVE_CONFIG_H -DLOCALEDIR=\"$(datadir)/locale\" -DWITH_SELINUX
-
- INCLUDES = -I${top_srcdir} \
- -I${top_srcdir}/lib \
-@@ -35,7 +35,7 @@
- suidubins = chage chfn chsh expiry gpasswd newgrp passwd
-
- LDADD = $(top_builddir)/libmisc/libmisc.la \
-- $(top_builddir)/lib/libshadow.la
-+ $(top_builddir)/lib/libshadow.la -lselinux
-
- chpasswd_LDADD = $(LDADD) $(LIBPAM)
- chage_LDADD = $(LDADD) $(LIBPAM)
-diff -urN shadow-4.0.3.orig/src/Makefile.in shadow-4.0.3/src/Makefile.in
---- shadow-4.0.3.orig/src/Makefile.in 2002-03-13 13:04:10.000000000 -0600
-+++ shadow-4.0.3/src/Makefile.in 2003-08-07 08:45:13.000000000 -0500
-@@ -145,7 +145,7 @@
- suidubins = chage chfn chsh expiry gpasswd newgrp passwd
-
- LDADD = $(top_builddir)/libmisc/libmisc.la \
-- $(top_builddir)/lib/libshadow.la
-+ $(top_builddir)/lib/libshadow.la -lselinux
-
-
- chpasswd_LDADD = $(LDADD) $(LIBPAM)
diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-su-pam_open_session.patch b/sys-apps/shadow/files/shadow-4.0.4.1-su-pam_open_session.patch
deleted file mode 100644
index 3bdeb9795401..000000000000
--- a/sys-apps/shadow/files/shadow-4.0.4.1-su-pam_open_session.patch
+++ /dev/null
@@ -1,210 +0,0 @@
---- shadow-4.0.3/src/su.c.orig 2002-10-20 16:43:21.000000000 +0200
-+++ shadow-4.0.3/src/su.c 2002-10-20 16:50:57.000000000 +0200
-@@ -134,6 +134,108 @@
- exit (1);
- }
-
-+#ifdef USE_PAM
-+static int caught=0;
-+
-+/* Signal handler for parent process later */
-+static void su_catch_sig(int sig)
-+{
-+ ++caught;
-+}
-+
-+/* This I ripped out of su.c from sh-utils after the Mandrake pam patch
-+ * have been applied. Some work was needed to get it integrated into
-+ * su.c from shadow.
-+ */
-+static void run_shell (const char *shellstr, char *args[], int doshell)
-+{
-+ int child;
-+ sigset_t ourset;
-+ int status;
-+ int ret;
-+
-+ child = fork();
-+ if (child == 0) { /* child shell */
-+ pam_end (pamh, PAM_SUCCESS);
-+
-+ if (doshell)
-+ shell (shellstr, (char *) args[0]);
-+ else
-+ (void) execv (shellstr, (char **) args);
-+ {
-+ int exit_status = (errno == ENOENT ? 127 : 126);
-+ exit (exit_status);
-+ }
-+ } else if (child == -1) {
-+ (void) fprintf(stderr, "%s: Cannot fork user shell\n", Prog);
-+ SYSLOG ((LOG_WARN, "Cannot execute %s", pwent.pw_shell));
-+ closelog ();
-+ exit(1);
-+ }
-+ /* parent only */
-+ sigfillset(&ourset);
-+ if (sigprocmask(SIG_BLOCK, &ourset, NULL)) {
-+ (void) fprintf(stderr, "%s: signal malfunction\n", Prog);
-+ caught = 1;
-+ }
-+ if (!caught) {
-+ struct sigaction action;
-+ action.sa_handler = su_catch_sig;
-+ sigemptyset(&action.sa_mask);
-+ action.sa_flags = 0;
-+ sigemptyset(&ourset);
-+
-+ if (sigaddset(&ourset, SIGTERM)
-+ || sigaddset(&ourset, SIGALRM)
-+ || sigaction(SIGTERM, &action, NULL)
-+ || sigprocmask(SIG_UNBLOCK, &ourset, NULL)
-+ ) {
-+ fprintf(stderr, "%s: signal masking malfunction\n", Prog);
-+ caught = 1;
-+ }
-+ }
-+
-+ if (!caught) {
-+ do {
-+ int pid;
-+
-+ pid = waitpid(-1, &status, WUNTRACED);
-+
-+ if (WIFSTOPPED(status)) {
-+ kill(getpid(), SIGSTOP);
-+ /* once we get here, we must have resumed */
-+ kill(pid, SIGCONT);
-+ }
-+ } while (WIFSTOPPED(status));
-+ }
-+
-+ if (caught) {
-+ fprintf(stderr, "\nSession terminated, killing shell...");
-+ kill (child, SIGTERM);
-+ }
-+
-+ ret = pam_close_session(pamh, 0);
-+ if (ret != PAM_SUCCESS) {
-+ SYSLOG ((LOG_ERR, "pam_close_session: %s",
-+ pam_strerror (pamh, ret)));
-+ fprintf (stderr, "%s: %s\n", Prog,
-+ pam_strerror (pamh, ret));
-+ pam_end (pamh, ret);
-+ exit (1);
-+ }
-+
-+ ret = pam_end(pamh, PAM_SUCCESS);
-+
-+ if (caught) {
-+ sleep(2);
-+ kill(child, SIGKILL);
-+ fprintf(stderr, " ...killed.\n");
-+ exit(-1);
-+ }
-+
-+ exit (WEXITSTATUS(status));
-+}
-+#endif
-
- /*
- * su - switch user id
-@@ -152,6 +254,7 @@
- int main (int argc, char **argv)
- {
- char *cp;
-+ char **envcp;
- const char *tty = 0; /* Name of tty SU is run from */
- int doshell = 0;
- int fakelogin = 0;
-@@ -252,6 +355,14 @@
- */
- if ((cp = getenv ("TERM")))
- addenv ("TERM", cp);
-+ /*
-+ * Also leave DISPLAY and XAUTHORITY if present, else
-+ * pam_xauth will not work.
-+ */
-+ if ((cp = getenv ("DISPLAY")))
-+ addenv ("DISPLAY", cp);
-+ if ((cp = getenv ("XAUTHORITY")))
-+ addenv ("XAUTHORITY", cp);
- } else {
- while (*envp)
- addenv (*envp++, NULL);
-@@ -507,7 +618,10 @@
- }
- #endif
-
-+/* setup the environment for pam later on, else we run into auth problems */
-+#ifndef USE_PAM
- environ = newenvp; /* make new environment active */
-+#endif
-
- if (getenv ("IFS")) /* don't export user IFS ... */
- addenv ("IFS= \t\n", NULL); /* ... instead, set a safe IFS */
-@@ -555,6 +669,31 @@
- exit (1);
- }
-
-+ ret = pam_open_session (pamh, 0);
-+ if (ret != PAM_SUCCESS) {
-+ SYSLOG ((LOG_ERR, "pam_open_session: %s",
-+ pam_strerror (pamh, ret)));
-+ fprintf (stderr, "%s: %s\n", Prog,
-+ pam_strerror (pamh, ret));
-+ pam_end (pamh, ret);
-+ exit (1);
-+ }
-+
-+ /* we need to setup the environment *after* pam_open_session(),
-+ * else the UID is changed before stuff like pam_xauth could
-+ * run, and we cannot access /etc/shadow and co
-+ */
-+ environ = newenvp; /* make new environment active */
-+
-+ /* update environment with all pam set variables */
-+ envcp = pam_getenvlist(pamh);
-+ if(envcp) {
-+ while(*envcp) {
-+ putenv(*envcp);
-+ envcp++;
-+ }
-+ }
-+
- /* become the new user */
- if (change_uid (&pwent)) {
- pam_setcred (pamh, PAM_DELETE_CRED);
-@@ -562,9 +701,6 @@
- exit (1);
- }
-
-- /* now we are done using PAM */
-- pam_end (pamh, PAM_SUCCESS);
--
- #else /* !USE_PAM */
- if (!amroot) /* no limits if su from root */
- setup_limits (&pwent);
-@@ -622,13 +758,21 @@
- */
-
- argv[-1] = pwent.pw_shell;
-+#ifndef USE_PAM
- (void) execv (pwent.pw_shell, &argv[-1]);
-+#else
-+ run_shell (pwent.pw_shell, &argv[-1], 0);
-+#endif
- (void) fprintf (stderr, _("No shell\n"));
- SYSLOG ((LOG_WARN, "Cannot execute %s", pwent.pw_shell));
- closelog ();
- exit (1);
- }
-
-+#ifndef USE_PAM
- shell (pwent.pw_shell, cp);
-+#else
-+ run_shell (pwent.pw_shell, &cp, 1);
-+#endif
- /* NOT REACHED */
- exit (1);
- }
diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-useradd-manpage-update.patch b/sys-apps/shadow/files/shadow-4.0.4.1-useradd-manpage-update.patch
deleted file mode 100644
index b444d118356a..000000000000
--- a/sys-apps/shadow/files/shadow-4.0.4.1-useradd-manpage-update.patch
+++ /dev/null
@@ -1,17 +0,0 @@
---- shadow-4.0.4.1.orig/man/useradd.8 2004-01-22 21:09:46.369993928 +0200
-+++ shadow-4.0.4.1/man/useradd.8 2004-01-22 21:12:39.043743528 +0200
-@@ -49,10 +49,10 @@
- .SS Creating New Users
- When invoked without the \fB-D\fR option, the \fBuseradd\fR command creates
- a new user account using the values specified on the command line and the
--default values from the system. The new user account will be entered into
--the system files as needed, the home directory will be created, and initial
--files copied, depending on the command line options. The options which apply
--to the \fBuseradd\fR command are:
-+default values from the system. Depending on command line options, the
-+useradd command will update system files and may also create the new user's
-+home directory and copy initial files. The options which apply to the
-+\fBuseradd\fR command are:
- .IP "\fB-c\fR \fIcomment\fR"
- The new user's password file comment field.
- .IP "\fB-d\fR \fIhome_dir\fR"
diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-userdel-missing-brackets.patch b/sys-apps/shadow/files/shadow-4.0.4.1-userdel-missing-brackets.patch
deleted file mode 100644
index 7e0393354f13..000000000000
--- a/sys-apps/shadow/files/shadow-4.0.4.1-userdel-missing-brackets.patch
+++ /dev/null
@@ -1,15 +0,0 @@
---- src/userdel.c.orig 2004-10-07 13:42:06.716627000 -0700
-+++ src/userdel.c 2004-10-07 14:05:03.547335810 -0700
-@@ -810,9 +810,10 @@
- pam_end (pamh, retval);
- }
-
-- if (retval != PAM_SUCCESS)
-+ if (retval != PAM_SUCCESS) {
- fprintf (stderr, _("%s: PAM chauthtok failed\n"), Prog);
-- exit (1);
-+ exit (1);
-+ }
-
- if (retval == PAM_SUCCESS)
- pam_end (pamh, PAM_SUCCESS);
diff --git a/sys-apps/shadow/files/shadow-4.0.5-fix-adding-of-pam_env-set-env-vars.patch b/sys-apps/shadow/files/shadow-4.0.5-fix-adding-of-pam_env-set-env-vars.patch
deleted file mode 100644
index c6ac906df360..000000000000
--- a/sys-apps/shadow/files/shadow-4.0.5-fix-adding-of-pam_env-set-env-vars.patch
+++ /dev/null
@@ -1,11 +0,0 @@
---- shadow-4.0.5/src/su.c 2004-11-07 20:51:54.992246016 +0200
-+++ shadow-4.0.5.az/src/su.c 2004-11-07 20:47:56.972430528 +0200
-@@ -684,7 +684,7 @@
- envcp = pam_getenvlist (pamh);
- if (envcp) {
- while (*envcp) {
-- putenv (*envcp);
-+ addenv (*envcp, NULL);
- envcp++;
- }
- }
diff --git a/sys-apps/shadow/files/shadow-4.0.5-fix-mail-configure.patch b/sys-apps/shadow/files/shadow-4.0.5-fix-mail-configure.patch
deleted file mode 100644
index bdc8c818fd61..000000000000
--- a/sys-apps/shadow/files/shadow-4.0.5-fix-mail-configure.patch
+++ /dev/null
@@ -1,165 +0,0 @@
---- shadow-4.0.5/configure.in 2004-11-07 19:29:12.275693608 +0200
-+++ shadow-4.0.5.az/configure.in 2004-11-07 19:28:29.246235080 +0200
-@@ -131,41 +131,48 @@
- fi
-
- AC_CACHE_CHECK([location of shared mail directory], shadow_cv_maildir,
--[for maildir in /var/mail /var/spool/mail /usr/spool/mail /usr/mail none; do
-- if test -d $maildir; then
-+[for shadow_cv_maildir in /var/mail /var/spool/mail /usr/spool/mail /usr/mail none; do
-+ if test -d $shadow_cv_maildir; then
- break
- fi
- done])
--AC_DEFINE_UNQUOTED(MAIL_SPOOL_DIR, "$shadow_cv_maildir")
-+if test "$shadow_cv_maildir" != "none"; then
-+ AC_DEFINE_UNQUOTED(MAIL_SPOOL_DIR, "$shadow_cv_maildir")
-+fi
-
- AC_CACHE_CHECK([location of user mail file], shadow_cv_mailfile,
--[for mailfile in Mailbox mailbox Mail mail .mail none; do
-+[for shadow_cv_mailfile in Mailbox mailbox Mail mail .mail none; do
- if test -f $HOME/$shadow_cv_mailfile; then
- break
- fi
- done])
--AC_DEFINE_UNQUOTED(MAIL_SPOOL_FILE, "$shadow_cv_mailfile")
-+if test "$shadow_cv_mailfile" != "none"; then
-+ AC_DEFINE_UNQUOTED(MAIL_SPOOL_FILE, "$shadow_cv_mailfile")
-+fi
-
- AC_CACHE_CHECK([location of utmp], shadow_cv_utmpdir,
--[for utmpdir in /var/run /var/adm /usr/adm /etc none; do
-+[for shadow_cv_utmpdir in /var/run /var/adm /usr/adm /etc none; do
- if test -f $shadow_cv_utmpdir/utmp; then
- break
- fi
- done])
- if test "$shadow_cv_utmpdir" = "none"; then
- AC_MSG_WARN(utmp file not found)
-+else
-+ AC_DEFINE_UNQUOTED(_UTMP_FILE, "$shadow_cv_utmpdir/utmp")
- fi
--AC_DEFINE_UNQUOTED(_UTMP_FILE, "$shadow_cv_utmpdir/utmp")
-
- AC_CACHE_CHECK([location of faillog/lastlog/wtmp], shadow_cv_logdir,
- [for shadow_cv_logdir in /var/log /var/adm /usr/adm /etc; do
-- if test -d $logdir; then
-+ if test -d $shadow_cv_logdir; then
- break
- fi
- done])
--AC_DEFINE_UNQUOTED(_WTMP_FILE, "$shadow_cv_logdir/wtmp")
--AC_DEFINE_UNQUOTED(LASTLOG_FILE, "$shadow_cv_logdir/lastlog")
--AC_DEFINE_UNQUOTED(FAILLOG_FILE, "$shadow_cv_logdir/faillog")
-+if test "$shadow_cv_logdir" != "none"; then
-+ AC_DEFINE_UNQUOTED(_WTMP_FILE, "$shadow_cv_logdir/wtmp")
-+ AC_DEFINE_UNQUOTED(LASTLOG_FILE, "$shadow_cv_logdir/lastlog")
-+ AC_DEFINE_UNQUOTED(FAILLOG_FILE, "$shadow_cv_logdir/faillog")
-+fi
-
- AC_CACHE_CHECK([location of the passwd program], shadow_cv_passwd_dir,
- [if test -f /usr/bin/passwd; then
---- shadow-4.0.5/configure 2004-11-07 19:29:07.210463640 +0200
-+++ shadow-4.0.5.az/configure 2004-11-07 19:28:29.253234016 +0200
-@@ -22286,25 +22284,27 @@
- if test "${shadow_cv_maildir+set}" = set; then
- echo $ECHO_N "(cached) $ECHO_C" >&6
- else
-- for maildir in /var/mail /var/spool/mail /usr/spool/mail /usr/mail none; do
-- if test -d $maildir; then
-+ for shadow_cv_maildir in /var/mail /var/spool/mail /usr/spool/mail /usr/mail none; do
-+ if test -d $shadow_cv_maildir; then
- break
- fi
- done
- fi
- echo "$as_me:$LINENO: result: $shadow_cv_maildir" >&5
- echo "${ECHO_T}$shadow_cv_maildir" >&6
--cat >>confdefs.h <<_ACEOF
-+if test "$shadow_cv_maildir" != "none"; then
-+ cat >>confdefs.h <<_ACEOF
- #define MAIL_SPOOL_DIR "$shadow_cv_maildir"
- _ACEOF
-
-+fi
-
- echo "$as_me:$LINENO: checking location of user mail file" >&5
- echo $ECHO_N "checking location of user mail file... $ECHO_C" >&6
- if test "${shadow_cv_mailfile+set}" = set; then
- echo $ECHO_N "(cached) $ECHO_C" >&6
- else
-- for mailfile in Mailbox mailbox Mail mail .mail none; do
-+ for shadow_cv_mailfile in Mailbox mailbox Mail mail .mail none; do
- if test -f $HOME/$shadow_cv_mailfile; then
- break
- fi
-@@ -22312,17 +22312,19 @@
- fi
- echo "$as_me:$LINENO: result: $shadow_cv_mailfile" >&5
- echo "${ECHO_T}$shadow_cv_mailfile" >&6
--cat >>confdefs.h <<_ACEOF
-+if test "$shadow_cv_mailfile" != "none"; then
-+ cat >>confdefs.h <<_ACEOF
- #define MAIL_SPOOL_FILE "$shadow_cv_mailfile"
- _ACEOF
-
-+fi
-
- echo "$as_me:$LINENO: checking location of utmp" >&5
- echo $ECHO_N "checking location of utmp... $ECHO_C" >&6
- if test "${shadow_cv_utmpdir+set}" = set; then
- echo $ECHO_N "(cached) $ECHO_C" >&6
- else
-- for utmpdir in /var/run /var/adm /usr/adm /etc none; do
-+ for shadow_cv_utmpdir in /var/run /var/adm /usr/adm /etc none; do
- if test -f $shadow_cv_utmpdir/utmp; then
- break
- fi
-@@ -22333,11 +22335,12 @@
- if test "$shadow_cv_utmpdir" = "none"; then
- { echo "$as_me:$LINENO: WARNING: utmp file not found" >&5
- echo "$as_me: WARNING: utmp file not found" >&2;}
--fi
--cat >>confdefs.h <<_ACEOF
-+else
-+ cat >>confdefs.h <<_ACEOF
- #define _UTMP_FILE "$shadow_cv_utmpdir/utmp"
- _ACEOF
-
-+fi
-
- echo "$as_me:$LINENO: checking location of faillog/lastlog/wtmp" >&5
- echo $ECHO_N "checking location of faillog/lastlog/wtmp... $ECHO_C" >&6
-@@ -22345,25 +22348,27 @@
- echo $ECHO_N "(cached) $ECHO_C" >&6
- else
- for shadow_cv_logdir in /var/log /var/adm /usr/adm /etc; do
-- if test -d $logdir; then
-+ if test -d $shadow_cv_logdir; then
- break
- fi
- done
- fi
- echo "$as_me:$LINENO: result: $shadow_cv_logdir" >&5
- echo "${ECHO_T}$shadow_cv_logdir" >&6
--cat >>confdefs.h <<_ACEOF
-+if test "$shadow_cv_logdir" != "none"; then
-+ cat >>confdefs.h <<_ACEOF
- #define _WTMP_FILE "$shadow_cv_logdir/wtmp"
- _ACEOF
-
--cat >>confdefs.h <<_ACEOF
-+ cat >>confdefs.h <<_ACEOF
- #define LASTLOG_FILE "$shadow_cv_logdir/lastlog"
- _ACEOF
-
--cat >>confdefs.h <<_ACEOF
-+ cat >>confdefs.h <<_ACEOF
- #define FAILLOG_FILE "$shadow_cv_logdir/faillog"
- _ACEOF
-
-+fi
-
- echo "$as_me:$LINENO: checking location of the passwd program" >&5
- echo $ECHO_N "checking location of the passwd program... $ECHO_C" >&6
diff --git a/sys-apps/shadow/files/shadow-4.0.5-hack-X-envvars.patch b/sys-apps/shadow/files/shadow-4.0.5-hack-X-envvars.patch
deleted file mode 100644
index e8672886b07b..000000000000
--- a/sys-apps/shadow/files/shadow-4.0.5-hack-X-envvars.patch
+++ /dev/null
@@ -1,18 +0,0 @@
---- shadow-4.0.5/src/su.c.orig 2004-11-03 18:25:17.663531472 -0500
-+++ shadow-4.0.5/src/su.c 2004-11-03 18:25:24.256529184 -0500
-@@ -359,7 +359,6 @@
- */
- if ((cp = getenv ("TERM")))
- addenv ("TERM", cp);
--#ifndef USE_PAM
- /*
- * Also leave DISPLAY and XAUTHORITY if present, else
- * pam_xauth will not work.
-@@ -368,7 +367,6 @@
- addenv ("DISPLAY", cp);
- if ((cp = getenv ("XAUTHORITY")))
- addenv ("XAUTHORITY", cp);
--#endif /* !USE_PAM */
- } else {
- while (*envp)
- addenv (*envp++, NULL);
diff --git a/sys-apps/shadow/files/shadow-4.0.5-remove-else.patch b/sys-apps/shadow/files/shadow-4.0.5-remove-else.patch
deleted file mode 100644
index fc375e81fd4f..000000000000
--- a/sys-apps/shadow/files/shadow-4.0.5-remove-else.patch
+++ /dev/null
@@ -1,16 +0,0 @@
-===================================================================
-RCS file: /cvsroot/shadow/libmisc/pwdcheck.c,v
-retrieving revision 1.3
-retrieving revision 1.4
-diff -u -r1.3 -r1.4
---- shadow/libmisc/pwdcheck.c 2004/06/02 23:50:10 1.3
-+++ shadow/libmisc/pwdcheck.c 2004/11/02 18:46:30 1.4
-@@ -34,7 +34,7 @@
- retcode = pam_acct_mgmt (pamh, 0);
- if (retcode == PAM_NEW_AUTHTOK_REQD)
- retcode = pam_chauthtok (pamh, PAM_CHANGE_EXPIRED_AUTHTOK);
-- else if (retcode)
-+ if (retcode)
- goto bailout;
-
- if (pam_setcred (pamh, 0))
diff --git a/sys-apps/shadow/shadow-4.0.4.1-r4.ebuild b/sys-apps/shadow/shadow-4.0.4.1-r4.ebuild
deleted file mode 100644
index 5132f70faeb5..000000000000
--- a/sys-apps/shadow/shadow-4.0.4.1-r4.ebuild
+++ /dev/null
@@ -1,205 +0,0 @@
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.4.1-r4.ebuild,v 1.17 2005/08/24 00:33:34 vapier Exp $
-
-inherit eutils libtool gnuconfig flag-o-matic
-
-FORCE_SYSTEMAUTH_UPDATE="no"
-SELINUX_PATCH="shadow-4.0.4.1-selinux.diff"
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86"
-IUSE="pam selinux nls"
-
-DEPEND=">=sys-libs/cracklib-2.7-r3
- pam? ( >=sys-libs/pam-0.75-r4 )
- nls? ( sys-devel/gettext )
- selinux? ( sys-libs/libselinux )"
-RDEPEND=">=sys-libs/cracklib-2.7-r3
- pam? ( >=sys-libs/pam-0.75-r4 )
- selinux? ( sys-libs/libselinux )"
-
-pkg_preinst() {
- rm -f ${ROOT}/etc/pam.d/system-auth.new
-}
-
-src_unpack() {
- unpack ${A}
- cd ${S}
-
- # selinux loving
- use selinux && epatch ${FILESDIR}/${SELINUX_PATCH}
-
- # uclibc support, corrects NIS usage
- use elibc_uclibc && epatch ${FILESDIR}/shadow-4.0.4.1-nonis.patch
-
- # Get su to call pam_open_session(), and also set DISPLAY and XAUTHORITY,
- # else the session entries in /etc/pam.d/su never get executed, and
- # pam_xauth for one, is then never used. This should close bug #8831.
- #
- # <azarah@gentoo.org> (19 Oct 2002)
- use pam && epatch ${FILESDIR}/${P}-su-pam_open_session.patch
-
- # If su should not simulate a login shell, use '/bin/sh' as shell to enable
- # running of commands as user with /bin/false as shell, closing bug #15015.
- #
- # <azarah@gentoo.org> (23 Feb 2003)
-# This one could be a security hole ...
-# cd ${S}; epatch ${FILESDIR}/${P}-nologin-run-sh.patch
-
- # Patch the useradd manpage to be a bit more clear, closing bug #13203.
- # Thanks to Guy <guycad@mindspring.com>.
- epatch ${FILESDIR}/${P}-useradd-manpage-update.patch
-
- # Patch to correct the definition if malloc, so that shadow can compile
- # using gcc 3.4. see bug #47455 for more information
- epatch ${FILESDIR}/${P}-gcc34-xmalloc.patch
-
- # userdel has a bug when PAM is enabled that causes it to always exit
- # with an exit status of 1 #66687
- epatch ${FILESDIR}/${P}-userdel-missing-brackets.patch
-
- # don't install manpages if USE=-nls
- epatch ${FILESDIR}/${P}-nls-manpages.patch
-
- # fix small graphical typo in passwd.1 #68150
- epatch ${FILESDIR}/${P}-passwd-typo.patch
-
- # Allows shadow configure detect newer systems properly
- gnuconfig_update
- elibtoolize
- epunt_cxx
-}
-
-src_compile() {
- append-ldflags -Wl,-z,now
-
- econf \
- --disable-desrpc \
- --with-libcrypt \
- --with-libcrack \
- --enable-shared=no \
- --enable-static=yes \
- $(use_with pam libpam) \
- $(use_enable nls) \
- || die "bad configure"
-
- # Parallel make fails sometimes
- emake -j1 || die "compile problem"
-}
-
-src_install() {
- make DESTDIR=${D} install || die "install problem"
-
- # lock down setuid perms #47208
- fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \
- /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms"
-
- # Remove libshadow and libmisc; see bug 37725 and the following
- # comment from shadow's README.linux:
- # Currently, libshadow.a is for internal use only, so if you see
- # -lshadow in a Makefile of some other package, it is safe to
- # remove it.
- rm -f ${D}/lib/lib{misc,shadow}.{a,la}
-
- # Do not install this login, but rather the one from
- # pam-login, as this one have a serious root exploit
- # with pam_limits in use.
- use pam && rm ${D}/bin/login
-
- dosym newgrp /usr/bin/sg
- dosym useradd /usr/sbin/adduser
- dosym vipw /usr/sbin/vigr
- # Remove dead links
- rm -f ${D}/bin/{sg,vipw,vigr}
-
- insinto /etc
- # Using a securetty with devfs device names added
- # (compat names kept for non-devfs compatibility)
- insopts -m0600 ; doins ${FILESDIR}/securetty
- insopts -m0600 ; doins ${S}/etc/login.access
- insopts -m0644 ; doins ${S}/etc/limits
-
- # needed for 'adduser -D'
- insinto /etc/default
- insopts -m0600
- doins ${FILESDIR}/default/useradd
- # From sys-apps/pam-login now
- #insopts -m0644 ; doins ${FILESDIR}/login.defs
-
- # move passwd to / to help recover broke systems #64441
- mv ${D}/usr/bin/passwd ${D}/bin/
- dosym ../../bin/passwd /usr/bin/passwd
-
- if use pam; then
- insinto /etc/pam.d ; insopts -m0644
- for x in ${FILESDIR}/pam.d/*; do
- [ -f ${x} ] && doins ${x}
- done
- cd ${FILESDIR}/pam.d
- # Make sure /etc/pam.d/system-auth is the new version ..
- mv ${D}/etc/pam.d/system-auth-1.1 ${D}/etc/pam.d/system-auth
- newins system-auth-1.1 system-auth.new || die
- newins shadow chage
- newins shadow chsh
- newins shadow chfn
- newins shadow useradd
- newins shadow groupadd
- fi
-
- # Remove manpages that are handled by other packages
- cd ${D}/usr/share/man
- find \
- -name 'id.1' \
- -o -name 'passwd.5' \
- -exec rm {} \;
- cd ${S}
-
- if ! use pam; then
- # Dont install the manpage, since we dont use
- # login with shadow
- rm -f ${D}/usr/share/man/man1/login.*
- # We use pam, so this is not applicable.
- rm -f ${D}/usr/share/man/man5/suauth.*
- fi
-
- cd ${S}/doc
- dodoc INSTALL README WISHLIST
- docinto txt
- dodoc HOWTO LSM README.* *.txt
-
- # ttyB0 is the PDC software console
- if [ "${ARCH}" = "hppa" ]
- then
- echo "ttyB0" >> ${D}/etc/securetty
- fi
-}
-
-pkg_postinst() {
- use pam || return 0;
- local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)"
- local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)"
-
- if [ "${CHECK1}" != "${CHECK2}" -a "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]
- then
- ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
- ewarn "is being updated automatically. Your old "
- ewarn "system-auth will be backed up as:"
- ewarn
- ewarn " ${ROOT}etc/pam.d/system-auth.bak"
- echo
-
- cp -pPR ${ROOT}/etc/pam.d/system-auth \
- ${ROOT}/etc/pam.d/system-auth.bak;
- mv -f ${ROOT}/etc/pam.d/system-auth.new \
- ${ROOT}/etc/pam.d/system-auth
- rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth
- else
- rm -f ${ROOT}/etc/pam.d/system-auth.new
- fi
-}
diff --git a/sys-apps/shadow/shadow-4.0.5-r2.ebuild b/sys-apps/shadow/shadow-4.0.5-r2.ebuild
deleted file mode 100644
index 469b7c0c753f..000000000000
--- a/sys-apps/shadow/shadow-4.0.5-r2.ebuild
+++ /dev/null
@@ -1,187 +0,0 @@
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.5-r2.ebuild,v 1.10 2005/08/24 00:33:34 vapier Exp $
-
-inherit eutils libtool gnuconfig flag-o-matic
-
-FORCE_SYSTEMAUTH_UPDATE="no"
-SELINUX_PATCH="shadow-4.0.4.1-selinux.diff"
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86"
-IUSE="pam selinux nls skey"
-
-RDEPEND=">=sys-libs/cracklib-2.7-r3
- pam? ( >=sys-libs/pam-0.75-r4 sys-apps/pam-login )
- !pam? ( !sys-apps/pam-login )
- skey? ( app-admin/skey )
- selinux? ( sys-libs/libselinux )"
-DEPEND="${RDEPEND}
- >=sys-apps/portage-2.0.51-r2
- nls? ( sys-devel/gettext )"
-
-pkg_preinst() {
- rm -f ${ROOT}/etc/pam.d/system-auth.new
-}
-
-src_unpack() {
- unpack ${A}
- cd ${S}
-
- # uclibc support, corrects NIS usage
- epatch ${FILESDIR}/shadow-4.0.4.1-nonis.patch
-
- # If su should not simulate a login shell, use '/bin/sh' as shell to enable
- # running of commands as user with /bin/false as shell, closing bug #15015.
- # *** This one could be a security hole; disable for now ***
- #epatch ${FILESDIR}/${P}-nologin-run-sh.patch
-
- # don't install manpages if USE=-nls
- epatch ${FILESDIR}/shadow-${PV}-nls-manpages.patch
-
- # tweak the default login.defs
- epatch ${FILESDIR}/shadow-${PV}-login.defs.patch
-
- # fix small graphical typo in passwd.1 #68150
- epatch ${FILESDIR}/shadow-4.0.4.1-passwd-typo.patch
-
- # skeychallenge call needs updating #69741
- epatch ${FILESDIR}/shadow-${PV}-skey.patch
-
- # remove an extra else #69212
- epatch ${FILESDIR}/shadow-${PV}-remove-else.patch
-
- # restore DISPLAY/XAUTHORITY propogation even with USE=pam
- # so that users have a chance to migrate to new system #69925
- epatch ${FILESDIR}/shadow-${PV}-hack-X-envvars.patch
- [ "${PVR}" != "4.0.5-r2" ] && die "remove the X envvar hack!"
-
- # Allows shadow configure detect newer systems properly
- gnuconfig_update
- elibtoolize
- epunt_cxx
-}
-
-src_compile() {
- append-ldflags -Wl,-z,now
- econf \
- --disable-desrpc \
- --with-libcrypt \
- --with-libcrack \
- --enable-shared=no \
- --enable-static=yes \
- $(use_with pam libpam) \
- $(use_with skey libskey) \
- $(use_with selinux) \
- $(use_enable nls) \
- || die "bad configure"
- emake || die "compile problem"
-}
-
-src_install() {
- make DESTDIR=${D} install || die "install problem"
- dosym useradd /usr/sbin/adduser
-
- # lock down setuid perms #47208
- fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \
- /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms"
-
- # Remove libshadow and libmisc; see bug 37725 and the following
- # comment from shadow's README.linux:
- # Currently, libshadow.a is for internal use only, so if you see
- # -lshadow in a Makefile of some other package, it is safe to
- # remove it.
- rm -f ${D}/lib/lib{misc,shadow}.{a,la}
-
- # Do not install this login, but rather the one from
- # pam-login, as this one have a serious root exploit
- # with pam support enabled.
- use pam && rm ${D}/bin/login
-
- insinto /etc
- # Using a securetty with devfs device names added
- # (compat names kept for non-devfs compatibility)
- insopts -m0600 ; doins ${FILESDIR}/securetty
- insopts -m0600 ; doins etc/login.access
- insopts -m0644 ; doins etc/limits
-
- # needed for 'adduser -D'
- insinto /etc/default
- insopts -m0600
- doins ${FILESDIR}/default/useradd
-
- # move passwd to / to help recover broke systems #64441
- mv ${D}/usr/bin/passwd ${D}/bin/
- dosym /bin/passwd /usr/bin/passwd
-
- if use pam ; then
- insinto /etc/pam.d ; insopts -m0644
- for x in ${FILESDIR}/pam.d/*; do
- [ -f ${x} ] && doins ${x}
- done
- cd ${FILESDIR}/pam.d
- # Make sure /etc/pam.d/system-auth is the new version ..
- mv ${D}/etc/pam.d/system-auth-1.1 ${D}/etc/pam.d/system-auth
- newins system-auth-1.1 system-auth.new || die
- for x in chage chsh chfn chpasswd newusers \
- user{add,del,mod} group{add,del,mod} ; do
- newins shadow ${x}
- done
-
- # remove manpages that pam will install for us
- # and/or don't apply when using pam
-
- find ${D}/usr/share/man \
- '(' -name 'login.1' -o -name 'suauth.5' ')' \
- -exec rm {} \;
- else
- insinto /etc
- insopts -m0644
- newins etc/login.defs.linux login.defs
- fi
-
- # Remove manpages that are handled by other packages
- find ${D}/usr/share/man \
- '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
- -exec rm {} \;
-
- cd ${S}/doc
- dodoc INSTALL README WISHLIST
- docinto txt
- dodoc HOWTO LSM README.* *.txt
-
- # ttyB0 is the PDC software console
- if [ "${ARCH}" = "hppa" ]
- then
- echo "ttyB0" >> ${D}/etc/securetty
- fi
-}
-
-pkg_postinst() {
- use pam || return 0;
- local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)"
- local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)"
-
- if [ "${CHECK1}" != "${CHECK2}" -a "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]
- then
- ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
- ewarn "is being updated automatically. Your old "
- ewarn "system-auth will be backed up as:"
- ewarn
- ewarn " ${ROOT}etc/pam.d/system-auth.bak"
- echo
-
- cp -pPR ${ROOT}/etc/pam.d/system-auth \
- ${ROOT}/etc/pam.d/system-auth.bak;
- mv -f ${ROOT}/etc/pam.d/system-auth.new \
- ${ROOT}/etc/pam.d/system-auth
- rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth
- else
- rm -f ${ROOT}/etc/pam.d/system-auth.new
- fi
-}
diff --git a/sys-apps/shadow/shadow-4.0.5-r3.ebuild b/sys-apps/shadow/shadow-4.0.5-r3.ebuild
deleted file mode 100644
index f52aa2ce9458..000000000000
--- a/sys-apps/shadow/shadow-4.0.5-r3.ebuild
+++ /dev/null
@@ -1,193 +0,0 @@
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.5-r3.ebuild,v 1.12 2005/08/24 00:33:34 vapier Exp $
-
-inherit eutils libtool toolchain-funcs flag-o-matic
-
-FORCE_SYSTEMAUTH_UPDATE="no"
-SELINUX_PATCH="shadow-4.0.4.1-selinux.diff"
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86"
-IUSE="pam selinux nls skey"
-
-RDEPEND=">=sys-libs/cracklib-2.7-r3
- pam? ( >=sys-libs/pam-0.75-r4 sys-apps/pam-login )
- !pam? ( !sys-apps/pam-login )
- skey? ( app-admin/skey )
- selinux? ( sys-libs/libselinux )"
-DEPEND="${RDEPEND}
- >=sys-apps/portage-2.0.51-r2
- nls? ( sys-devel/gettext )"
-
-pkg_preinst() {
- rm -f ${ROOT}/etc/pam.d/system-auth.new
-}
-
-src_unpack() {
- unpack ${A}
- cd ${S}
-
- # uclibc support, corrects NIS usage
- epatch ${FILESDIR}/shadow-4.0.4.1-nonis.patch
-
- # If su should not simulate a login shell, use '/bin/sh' as shell to enable
- # running of commands as user with /bin/false as shell, closing bug #15015.
- # *** This one could be a security hole; disable for now ***
- #epatch ${FILESDIR}/${P}-nologin-run-sh.patch
-
- # don't install manpages if USE=-nls
- epatch ${FILESDIR}/shadow-${PV}-nls-manpages.patch
-
- # tweak the default login.defs
- epatch ${FILESDIR}/shadow-${PV}-login.defs.patch
-
- # fix small graphical typo in passwd.1 #68150
- epatch ${FILESDIR}/shadow-4.0.4.1-passwd-typo.patch
-
- # skeychallenge call needs updating #69741
- epatch ${FILESDIR}/shadow-${PV}-skey.patch
-
- # remove an extra else #69212
- epatch ${FILESDIR}/shadow-${PV}-remove-else.patch
-
- # The new configure changes do not detect maildir and mailfile
- # properly.
- epatch ${FILESDIR}/shadow-${PV}-fix-mail-configure.patch
-
- # Use addenv and not putenv so that pam_env added variables will
- # actually end up in the environment
- epatch ${FILESDIR}/shadow-${PV}-fix-adding-of-pam_env-set-env-vars.patch
-
- elibtoolize
- epunt_cxx
-}
-
-src_compile() {
- append-ldflags -Wl,-z,now
- econf \
- --disable-desrpc \
- --with-libcrypt \
- --with-libcrack \
- --enable-shared=no \
- --enable-static=yes \
- $(use_with pam libpam) \
- $(use_with skey libskey) \
- $(use_with selinux) \
- $(use_enable nls) \
- || die "bad configure"
- emake || die "compile problem"
-}
-
-src_install() {
- make DESTDIR=${D} install || die "install problem"
- dosym useradd /usr/sbin/adduser
-
- # lock down setuid perms #47208
- fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \
- /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms"
-
- # Remove libshadow and libmisc; see bug 37725 and the following
- # comment from shadow's README.linux:
- # Currently, libshadow.a is for internal use only, so if you see
- # -lshadow in a Makefile of some other package, it is safe to
- # remove it.
- rm -f ${D}/lib/lib{misc,shadow}.{a,la}
-
- # Do not install this login, but rather the one from
- # pam-login, as this one have a serious root exploit
- # with pam support enabled.
- use pam && rm ${D}/bin/login
-
- insinto /etc
- # Using a securetty with devfs device names added
- # (compat names kept for non-devfs compatibility)
- insopts -m0600 ; doins ${FILESDIR}/securetty
- insopts -m0600 ; doins etc/login.access
- insopts -m0644 ; doins etc/limits
- # Only output hvc ibm cruft for ppc64 machines
- if [[ $(tc-arch) == "ppc64" ]] ; then
- echo "hvc0" >> "${D}"/etc/securetty
- echo "hvsi0" >> "${D}"/etc/securetty
- fi
-
- # needed for 'adduser -D'
- insinto /etc/default
- insopts -m0600
- doins ${FILESDIR}/default/useradd
-
- # move passwd to / to help recover broke systems #64441
- mv ${D}/usr/bin/passwd ${D}/bin/
- dosym /bin/passwd /usr/bin/passwd
-
- if use pam ; then
- insinto /etc/pam.d ; insopts -m0644
- for x in ${FILESDIR}/pam.d/*; do
- [ -f ${x} ] && doins ${x}
- done
- cd ${FILESDIR}/pam.d
- # Make sure /etc/pam.d/system-auth is the new version ..
- mv ${D}/etc/pam.d/system-auth-1.1 ${D}/etc/pam.d/system-auth
- newins system-auth-1.1 system-auth.new || die
- for x in chage chsh chfn chpasswd newusers \
- user{add,del,mod} group{add,del,mod} ; do
- newins shadow ${x}
- done
-
- # remove manpages that pam will install for us
- # and/or don't apply when using pam
-
- find ${D}/usr/share/man \
- '(' -name 'login.1' -o -name 'suauth.5' ')' \
- -exec rm {} \;
- else
- insinto /etc
- insopts -m0644
- newins etc/login.defs.linux login.defs
- fi
-
- # Remove manpages that are handled by other packages
- find ${D}/usr/share/man \
- '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
- -exec rm {} \;
-
- cd ${S}/doc
- dodoc INSTALL README WISHLIST
- docinto txt
- dodoc HOWTO LSM README.* *.txt
-
- # ttyB0 is the PDC software console
- if [ "${ARCH}" = "hppa" ]
- then
- echo "ttyB0" >> ${D}/etc/securetty
- fi
-}
-
-pkg_postinst() {
- use pam || return 0;
- local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)"
- local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)"
-
- if [ "${CHECK1}" != "${CHECK2}" -a "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]
- then
- ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
- ewarn "is being updated automatically. Your old "
- ewarn "system-auth will be backed up as:"
- ewarn
- ewarn " ${ROOT}etc/pam.d/system-auth.bak"
- echo
-
- cp -pPR ${ROOT}/etc/pam.d/system-auth \
- ${ROOT}/etc/pam.d/system-auth.bak;
- mv -f ${ROOT}/etc/pam.d/system-auth.new \
- ${ROOT}/etc/pam.d/system-auth
- rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth
- else
- rm -f ${ROOT}/etc/pam.d/system-auth.new
- fi
-}
diff --git a/sys-apps/shadow/shadow-4.0.6-r1.ebuild b/sys-apps/shadow/shadow-4.0.6-r1.ebuild
deleted file mode 100644
index be142d533f0d..000000000000
--- a/sys-apps/shadow/shadow-4.0.6-r1.ebuild
+++ /dev/null
@@ -1,192 +0,0 @@
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.6-r1.ebuild,v 1.6 2005/08/24 00:33:34 vapier Exp $
-
-inherit eutils libtool gnuconfig flag-o-matic
-
-FORCE_SYSTEMAUTH_UPDATE="no"
-SELINUX_PATCH="shadow-4.0.4.1-selinux.diff"
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
-IUSE="pam selinux nls skey"
-
-RDEPEND=">=sys-libs/cracklib-2.7-r3
- pam? ( >=sys-libs/pam-0.75-r4 sys-apps/pam-login )
- !pam? ( !sys-apps/pam-login )
- skey? ( app-admin/skey )
- selinux? ( sys-libs/libselinux )"
-DEPEND="${RDEPEND}
- >=sys-apps/portage-2.0.51-r2
- nls? ( sys-devel/gettext )"
-
-pkg_preinst() {
- rm -f ${ROOT}/etc/pam.d/system-auth.new
-}
-
-src_unpack() {
- unpack ${A}
- cd ${S}
-
- # uclibc support, corrects NIS usage
- epatch ${FILESDIR}/shadow-4.0.4.1-nonis.patch
-
- # If su should not simulate a login shell, use '/bin/sh' as shell to enable
- # running of commands as user with /bin/false as shell, closing bug #15015.
- # *** This one could be a security hole; disable for now ***
- #epatch ${FILESDIR}/${P}-nologin-run-sh.patch
-
- # don't install manpages if USE=-nls
- epatch ${FILESDIR}/shadow-4.0.5-nls-manpages.patch
-
- # tweak the default login.defs
- epatch ${FILESDIR}/shadow-4.0.5-login.defs.patch
-
- # skeychallenge call needs updating #69741
- epatch ${FILESDIR}/shadow-4.0.5-skey.patch
-
- # The new configure changes do not detect utmp/logdir properly
- epatch ${FILESDIR}/shadow-${PV}-fix-configure.patch
-
- # Tweak manpages #70880
- epatch ${FILESDIR}/shadow-${PV}-manpages.patch
-
- # Make user/group names more flexible #3485 / #22920
- epatch "${FILESDIR}"/${P}-dots-in-usernames.patch
- epatch "${FILESDIR}"/${P}-long-groupnames.patch
-
- # Newer glibc's have a different nscd socket location #74395
- sed -i \
- -e '/_PATH_NSCDSOCKET/s:/var/run/.nscd_socket:/var/run/nscd/socket:' \
- lib/nscd.c || die "sed nscd socket"
-
- # Allows shadow configure detect newer systems properly
- gnuconfig_update
- elibtoolize
- epunt_cxx
-}
-
-src_compile() {
- append-ldflags -Wl,-z,now
- tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes
- econf \
- --disable-desrpc \
- --with-libcrypt \
- --with-libcrack \
- --enable-shared=no \
- --enable-static=yes \
- $(use_with pam libpam) \
- $(use_with skey libskey) \
- $(use_with selinux) \
- $(use_enable nls) \
- || die "bad configure"
- emake || die "compile problem"
-}
-
-src_install() {
- make DESTDIR=${D} install || die "install problem"
- dosym useradd /usr/sbin/adduser
-
- # lock down setuid perms #47208
- fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \
- /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms"
-
- # Remove libshadow and libmisc; see bug 37725 and the following
- # comment from shadow's README.linux:
- # Currently, libshadow.a is for internal use only, so if you see
- # -lshadow in a Makefile of some other package, it is safe to
- # remove it.
- rm -f ${D}/lib/lib{misc,shadow}.{a,la}
-
- # Do not install this login, but rather the one from
- # pam-login, as this one have a serious root exploit
- # with pam support enabled.
- use pam && rm ${D}/bin/login
-
- insinto /etc
- # Using a securetty with devfs device names added
- # (compat names kept for non-devfs compatibility)
- insopts -m0600 ; doins ${FILESDIR}/securetty
- insopts -m0600 ; doins etc/login.access
- insopts -m0644 ; doins etc/limits
-
- # needed for 'adduser -D'
- insinto /etc/default
- insopts -m0600
- doins ${FILESDIR}/default/useradd
-
- # move passwd to / to help recover broke systems #64441
- mv ${D}/usr/bin/passwd ${D}/bin/
- dosym /bin/passwd /usr/bin/passwd
-
- if use pam ; then
- insinto /etc/pam.d ; insopts -m0644
- for x in ${FILESDIR}/pam.d/*; do
- [ -f ${x} ] && doins ${x}
- done
- cd ${FILESDIR}/pam.d
- # Make sure /etc/pam.d/system-auth is the new version ..
- mv ${D}/etc/pam.d/system-auth-1.1 ${D}/etc/pam.d/system-auth
- newins system-auth-1.1 system-auth.new || die
- for x in chage chsh chfn chpasswd newusers \
- user{add,del,mod} group{add,del,mod} ; do
- newins shadow ${x}
- done
-
- # remove manpages that pam will install for us
- # and/or don't apply when using pam
-
- find ${D}/usr/share/man \
- '(' -name 'login.1' -o -name 'suauth.5' ')' \
- -exec rm {} \;
- else
- insinto /etc
- insopts -m0644
- newins etc/login.defs.linux login.defs
- fi
-
- # Remove manpages that are handled by other packages
- find ${D}/usr/share/man \
- '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
- -exec rm {} \;
-
- cd ${S}/doc
- dodoc INSTALL README WISHLIST
- docinto txt
- dodoc HOWTO LSM README.* *.txt
-
- # ttyB0 is the PDC software console
- if [ "${ARCH}" = "hppa" ]
- then
- echo "ttyB0" >> ${D}/etc/securetty
- fi
-}
-
-pkg_postinst() {
- use pam || return 0;
- local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)"
- local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)"
-
- if [ "${CHECK1}" != "${CHECK2}" -a "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]
- then
- ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
- ewarn "is being updated automatically. Your old "
- ewarn "system-auth will be backed up as:"
- ewarn
- ewarn " ${ROOT}etc/pam.d/system-auth.bak"
- echo
-
- cp -pPR ${ROOT}/etc/pam.d/system-auth \
- ${ROOT}/etc/pam.d/system-auth.bak;
- mv -f ${ROOT}/etc/pam.d/system-auth.new \
- ${ROOT}/etc/pam.d/system-auth
- rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth
- else
- rm -f ${ROOT}/etc/pam.d/system-auth.new
- fi
-}
diff --git a/sys-apps/shadow/shadow-4.0.7-r1.ebuild b/sys-apps/shadow/shadow-4.0.7-r1.ebuild
deleted file mode 100644
index c749744612e9..000000000000
--- a/sys-apps/shadow/shadow-4.0.7-r1.ebuild
+++ /dev/null
@@ -1,228 +0,0 @@
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.7-r1.ebuild,v 1.5 2005/08/24 00:33:34 vapier Exp $
-
-inherit eutils libtool flag-o-matic
-
-# We should remove this login after pam-0.78 goes stable.
-FORCE_SYSTEMAUTH_UPDATE="no"
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
-IUSE="pam selinux nls skey"
-
-RDEPEND=">=sys-libs/cracklib-2.7-r3
- pam? ( >=sys-libs/pam-0.75-r4 )
- !pam? ( !sys-apps/pam-login )
- skey? ( app-admin/skey )
- selinux? ( sys-libs/libselinux )"
-DEPEND="${RDEPEND}
- >=sys-apps/portage-2.0.51-r2
- nls? ( sys-devel/gettext )"
-# We moved /etc/pam.d/login to pam-login
-PDEPEND="pam? ( >=sys-apps/pam-login-3.17 )"
-
-pkg_preinst() {
- rm -f ${ROOT}/etc/pam.d/system-auth.new
-}
-
-src_unpack() {
- unpack ${A}
- cd ${S}
-
- # uclibc support, corrects NIS usage
- epatch ${FILESDIR}/shadow-4.0.4.1-nonis.patch
-
- # If su should not simulate a login shell, use '/bin/sh' as shell to enable
- # running of commands as user with /bin/false as shell, closing bug #15015.
- # *** This one could be a security hole; disable for now ***
- #epatch ${FILESDIR}/${P}-nologin-run-sh.patch
-
- # don't install manpages if USE=-nls
- epatch ${FILESDIR}/shadow-4.0.5-nls-manpages.patch
-
- # tweak the default login.defs
- epatch ${FILESDIR}/shadow-4.0.5-login.defs.patch
-
- # skeychallenge call needs updating #69741
- epatch ${FILESDIR}/shadow-4.0.5-skey.patch
-
- # The new configure changes do not detect utmp/logdir properly
- epatch ${FILESDIR}/shadow-4.0.6-fix-configure.patch
-
- # Tweak manpages #70880
- epatch ${FILESDIR}/shadow-4.0.6-manpages.patch
-
- # Fix SU_WHEEL_ONLY behavior #80345
- epatch ${FILESDIR}/${P}-iswheel.patch
-
- # Fix lastlog not logged for tty's
- epatch ${FILESDIR}/${P}-lastlog.patch
-
- # Make user/group names more flexible #3485 / #22920
- epatch "${FILESDIR}"/shadow-4.0.6-dots-in-usernames.patch
- epatch "${FILESDIR}"/shadow-4.0.6-long-groupnames.patch
-
- # Newer glibc's have a different nscd socket location #74395
- sed -i \
- -e '/_PATH_NSCDSOCKET/s:/var/run/.nscd_socket:/var/run/nscd/socket:' \
- lib/nscd.c || die "sed nscd socket"
-
- elibtoolize
- epunt_cxx
-}
-
-src_compile() {
- append-ldflags -Wl,-z,now
- tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes
- econf \
- --disable-desrpc \
- --with-libcrypt \
- --with-libcrack \
- --enable-shared=no \
- --enable-static=yes \
- $(use_with pam libpam) \
- $(use_with skey libskey) \
- $(use_with selinux) \
- $(use_enable nls) \
- || die "bad configure"
- emake || die "compile problem"
-}
-
-src_install() {
- make DESTDIR=${D} install || die "install problem"
- dosym useradd /usr/sbin/adduser
-
- # lock down setuid perms #47208
- fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \
- /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms"
-
- # Remove libshadow and libmisc; see bug 37725 and the following
- # comment from shadow's README.linux:
- # Currently, libshadow.a is for internal use only, so if you see
- # -lshadow in a Makefile of some other package, it is safe to
- # remove it.
- rm -f ${D}/lib/lib{misc,shadow}.{a,la}
-
- if use pam; then
- # These is now shipped with pam-login, and login
- # had/have a serious root exploit with pam support
- # enabled.
- for x in ${D}/bin/login \
- ${D}/usr/bin/faillog ${D}/usr/bin/lastlog \
- ${D}/usr/share/man/man5/faillog.5* \
- ${D}/usr/share/man/man8/lastlog.8* \
- ${D}/usr/share/man/man8/faillog.8*; do
- [[ -f ${x} ]] && rm -f ${x}
- done
- fi
-
- insinto /etc
- # Using a securetty with devfs device names added
- # (compat names kept for non-devfs compatibility)
- insopts -m0600 ; doins ${FILESDIR}/securetty
- insopts -m0600 ; doins etc/login.access
- insopts -m0644 ; doins etc/limits
-
- # needed for 'adduser -D'
- insinto /etc/default
- insopts -m0600
- doins ${FILESDIR}/default/useradd
-
- # move passwd to / to help recover broke systems #64441
- mv ${D}/usr/bin/passwd ${D}/bin/
- dosym /bin/passwd /usr/bin/passwd
-
- if use pam ; then
- local INSTALL_SYSTEM_PAMD="yes"
-
- # Do not install below pam.d files if we have pam-0.78 or later
- portageq has_version / '>=sys-libs/pam-0.78' && \
- INSTALL_SYSTEM_PAMD="no"
-
- for x in ${FILESDIR}/pam.d/*; do
- case "${x##*/}" in
- "login")
- # We do no longer install this one, as its from
- # pam-login now.
- ;;
- "system-auth"|"system-auth-1.1"|"other")
- # These we only install if we do not have pam-0.78
- # or later.
- [ "${INSTALL_SYSTEM_PAMD}" = "yes" ] && [ -f ${x} ] && \
- dopamd ${x}
- ;;
- *)
- [ -f ${x} ] && dopamd ${x}
- ;;
- esac
- done
- for x in chage chsh chfn chpasswd newusers \
- user{add,del,mod} group{add,del,mod} ; do
- newpamd ${FILESDIR}/pam.d/shadow ${x}
- done
-
- # Only add this one if needed.
- if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
- newpamd ${FILESDIR}/pam.d/system-auth-1.1 system-auth.new || \
- die "Failed to install system-auth.new!"
- fi
-
- # remove manpages that pam will install for us
- # and/or don't apply when using pam
-
- find ${D}/usr/share/man \
- '(' -name 'login.1' -o -name 'suauth.5' ')' \
- -exec rm {} \;
- else
- insinto /etc
- insopts -m0644
- newins etc/login.defs.linux login.defs
- fi
-
- # Remove manpages that are handled by other packages
- find ${D}/usr/share/man \
- '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
- -exec rm {} \;
-
- cd ${S}/doc
- dodoc INSTALL README WISHLIST
- docinto txt
- dodoc HOWTO LSM README.* *.txt
-
- # ttyB0 is the PDC software console
- if [ "${ARCH}" = "hppa" ]; then
- echo "ttyB0" >> ${D}/etc/securetty
- fi
-}
-
-pkg_postinst() {
- use pam || return 0;
-
- if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
- local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)"
- local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)"
-
- if [ "${CHECK1}" != "${CHECK2}" ]; then
- ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
- ewarn "is being updated automatically. Your old "
- ewarn "system-auth will be backed up as:"
- ewarn
- ewarn " ${ROOT}etc/pam.d/system-auth.bak"
- echo
-
- cp -pPR ${ROOT}/etc/pam.d/system-auth \
- ${ROOT}/etc/pam.d/system-auth.bak;
- mv -f ${ROOT}/etc/pam.d/system-auth.new \
- ${ROOT}/etc/pam.d/system-auth
- rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth
- else
- rm -f ${ROOT}/etc/pam.d/system-auth.new
- fi
- fi
-}
diff --git a/sys-apps/shadow/shadow-4.0.7-r3.ebuild b/sys-apps/shadow/shadow-4.0.7-r3.ebuild
deleted file mode 100644
index 29f06fe35490..000000000000
--- a/sys-apps/shadow/shadow-4.0.7-r3.ebuild
+++ /dev/null
@@ -1,238 +0,0 @@
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.7-r3.ebuild,v 1.11 2005/09/12 03:02:25 vapier Exp $
-
-inherit eutils libtool toolchain-funcs flag-o-matic multilib
-
-# We should remove this login after pam-0.78 goes stable.
-FORCE_SYSTEMAUTH_UPDATE="no"
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86"
-IUSE="pam selinux nls skey"
-
-RDEPEND=">=sys-libs/cracklib-2.7-r3
- pam? ( virtual/pam )
- !pam? ( !sys-apps/pam-login )
- skey? ( app-admin/skey )
- selinux? ( sys-libs/libselinux )"
-DEPEND="${RDEPEND}
- >=sys-apps/portage-2.0.51-r2
- nls? ( sys-devel/gettext )"
-# We moved /etc/pam.d/login to pam-login
-PDEPEND="pam? ( >=sys-apps/pam-login-3.17 )"
-
-pkg_preinst() {
- rm -f ${ROOT}/etc/pam.d/system-auth.new
-}
-
-src_unpack() {
- unpack ${A}
- cd "${S}"
-
- # uclibc support, corrects NIS usage
- epatch "${FILESDIR}"/shadow-4.0.4.1-nonis.patch
-
- # If su should not simulate a login shell, use '/bin/sh' as shell to enable
- # running of commands as user with /bin/false as shell, closing bug #15015.
- # *** This one could be a security hole; disable for now ***
- #epatch "${FILESDIR}"/${P}-nologin-run-sh.patch
-
- # don't install manpages if USE=-nls
- epatch "${FILESDIR}"/shadow-4.0.5-nls-manpages.patch
-
- # tweak the default login.defs
- epatch "${FILESDIR}"/shadow-4.0.5-login.defs.patch
-
- # skeychallenge call needs updating #69741
- epatch "${FILESDIR}"/shadow-4.0.5-skey.patch
-
- # The new configure changes do not detect utmp/logdir properly
- epatch "${FILESDIR}"/shadow-4.0.6-fix-configure.patch
-
- # Tweak manpages #70880
- epatch "${FILESDIR}"/shadow-4.0.6-manpages.patch
-
- # Fix SU_WHEEL_ONLY behavior #80345
- epatch "${FILESDIR}"/${P}-iswheel.patch
-
- # Fix lastlog not logged for tty's
- epatch "${FILESDIR}"/${P}-lastlog.patch
-
- # Make user/group names more flexible #3485 / #22920
- epatch "${FILESDIR}"/shadow-4.0.6-dots-in-usernames.patch
- epatch "${FILESDIR}"/shadow-4.0.6-long-groupnames.patch
-
- # Newer glibc's have a different nscd socket location #74395
- epatch "${FILESDIR}"/${P}-nscd-socket-path.patch
-
- # Fix EPIPE failure when writing to nscd, bug #80413
- epatch "${FILESDIR}"/${P}-nscd-EPIPE-failure.patch
-
- elibtoolize
- epunt_cxx
-}
-
-src_compile() {
- append-ldflags -Wl,-z,now
- tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes
- econf \
- --disable-desrpc \
- --with-libcrypt \
- --with-libcrack \
- --enable-shared=no \
- --enable-static=yes \
- $(use_with pam libpam) \
- $(use_with skey libskey) \
- $(use_with selinux) \
- $(use_enable nls) \
- || die "bad configure"
- emake || die "compile problem"
-}
-
-src_install() {
- make DESTDIR="${D}" install || die "install problem"
- dosym useradd /usr/sbin/adduser
-
- # lock down setuid perms #47208
- fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \
- /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms"
-
- # Remove libshadow and libmisc; see bug 37725 and the following
- # comment from shadow's README.linux:
- # Currently, libshadow.a is for internal use only, so if you see
- # -lshadow in a Makefile of some other package, it is safe to
- # remove it.
- rm -f "${D}"/{,usr/}$(get_libdir)/lib{misc,shadow}.{a,la}
-
- if use pam; then
- # These is now shipped with pam-login, and login
- # had/have a serious root exploit with pam support
- # enabled.
- for x in "${D}"/bin/login \
- "${D}"/usr/bin/faillog "${D}"/usr/bin/lastlog \
- "${D}"/usr/share/man/man5/faillog.5* \
- "${D}"/usr/share/man/man8/lastlog.8* \
- "${D}"/usr/share/man/man8/faillog.8*; do
- [[ -f ${x} ]] && rm -f ${x}
- done
- fi
-
- insinto /etc
- # Using a securetty with devfs device names added
- # (compat names kept for non-devfs compatibility)
- insopts -m0600 ; doins "${FILESDIR}"/securetty
- insopts -m0600 ; doins etc/login.access
- insopts -m0644 ; doins etc/limits
- # Output arch-specific cruft
- case $(tc-arch) in
- ppc64) echo "hvc0" >> "${D}"/etc/securetty
- echo "hvsi0" >> "${D}"/etc/securetty;;
- hppa) echo "ttyB0" >> "${D}"/etc/securetty;;
- arm) echo "ttyFB0" >> "${D}"/etc/securetty;;
- esac
-
- # needed for 'adduser -D'
- insinto /etc/default
- insopts -m0600
- doins "${FILESDIR}"/default/useradd
-
- # move passwd to / to help recover broke systems #64441
- mv "${D}"/usr/bin/passwd "${D}"/bin/
- dosym /bin/passwd /usr/bin/passwd
-
- if use pam ; then
- local INSTALL_SYSTEM_PAMD="yes"
-
- # Do not install below pam.d files if we have pam-0.78 or later
- portageq has_version / '>=sys-libs/pam-0.78' && \
- INSTALL_SYSTEM_PAMD="no"
-
- for x in "${FILESDIR}"/pam.d-include/*; do
- case "${x##*/}" in
- "login")
- # We do no longer install this one, as its from
- # pam-login now.
- ;;
- "system-auth"|"system-auth-1.1"|"other")
- # These we only install if we do not have pam-0.78
- # or later.
- [ "${INSTALL_SYSTEM_PAMD}" = "yes" ] && [ -f ${x} ] && \
- dopamd ${x}
- ;;
- "su")
- # Disable support for pam_env and pam_wheel on openpam
- has_version sys-libs/pam && dopamd ${x}
- ;;
- "su-openpam")
- has_version sys-libs/openpam && newpamd ${x} su
- ;;
- *)
- [ -f ${x} ] && dopamd ${x}
- ;;
- esac
- done
- for x in chage chsh chfn chpasswd newusers \
- user{add,del,mod} group{add,del,mod} ; do
- newpamd "${FILESDIR}"/pam.d-include/shadow ${x}
- done
-
- # Only add this one if needed.
- if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
- newpamd "${FILESDIR}"/pam.d-include/system-auth-1.1 system-auth.new || \
- die "Failed to install system-auth.new!"
- fi
-
- # remove manpages that pam will install for us
- # and/or don't apply when using pam
-
- find "${D}"/usr/share/man \
- '(' -name 'login.1' -o -name 'suauth.5' ')' \
- -exec rm {} \;
- else
- insinto /etc
- insopts -m0644
- newins etc/login.defs.linux login.defs
- fi
-
- # Remove manpages that are handled by other packages
- find "${D}"/usr/share/man \
- '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
- -exec rm {} \;
-
- cd "${S}"/doc
- dodoc INSTALL README WISHLIST
- docinto txt
- dodoc HOWTO LSM README.* *.txt
-}
-
-pkg_postinst() {
- use pam || return 0;
-
- if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then
- local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)"
- local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)"
-
- if [ "${CHECK1}" != "${CHECK2}" ]; then
- ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
- ewarn "is being updated automatically. Your old "
- ewarn "system-auth will be backed up as:"
- ewarn
- ewarn " ${ROOT}etc/pam.d/system-auth.bak"
- echo
-
- cp -pPR ${ROOT}/etc/pam.d/system-auth \
- ${ROOT}/etc/pam.d/system-auth.bak;
- mv -f ${ROOT}/etc/pam.d/system-auth.new \
- ${ROOT}/etc/pam.d/system-auth
- rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth
- else
- rm -f ${ROOT}/etc/pam.d/system-auth.new
- fi
- fi
-}
diff --git a/sys-apps/shadow/shadow-4.0.7.ebuild b/sys-apps/shadow/shadow-4.0.7.ebuild
deleted file mode 100644
index 89f4286d63f7..000000000000
--- a/sys-apps/shadow/shadow-4.0.7.ebuild
+++ /dev/null
@@ -1,192 +0,0 @@
-# Copyright 1999-2005 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.7.ebuild,v 1.5 2005/08/24 00:33:34 vapier Exp $
-
-inherit eutils libtool flag-o-matic
-
-FORCE_SYSTEMAUTH_UPDATE="no"
-
-DESCRIPTION="Utilities to deal with user accounts"
-HOMEPAGE="http://shadow.pld.org.pl/"
-SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2"
-
-LICENSE="BSD"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
-IUSE="pam selinux nls skey"
-
-RDEPEND=">=sys-libs/cracklib-2.7-r3
- pam? ( >=sys-libs/pam-0.75-r4 sys-apps/pam-login )
- !pam? ( !sys-apps/pam-login )
- skey? ( app-admin/skey )
- selinux? ( sys-libs/libselinux )"
-DEPEND="${RDEPEND}
- >=sys-apps/portage-2.0.51-r2
- nls? ( sys-devel/gettext )"
-
-pkg_preinst() {
- rm -f ${ROOT}/etc/pam.d/system-auth.new
-}
-
-src_unpack() {
- unpack ${A}
- cd ${S}
-
- # uclibc support, corrects NIS usage
- epatch ${FILESDIR}/shadow-4.0.4.1-nonis.patch
-
- # If su should not simulate a login shell, use '/bin/sh' as shell to enable
- # running of commands as user with /bin/false as shell, closing bug #15015.
- # *** This one could be a security hole; disable for now ***
- #epatch ${FILESDIR}/${P}-nologin-run-sh.patch
-
- # don't install manpages if USE=-nls
- epatch ${FILESDIR}/shadow-4.0.5-nls-manpages.patch
-
- # tweak the default login.defs
- epatch ${FILESDIR}/shadow-4.0.5-login.defs.patch
-
- # skeychallenge call needs updating #69741
- epatch ${FILESDIR}/shadow-4.0.5-skey.patch
-
- # The new configure changes do not detect utmp/logdir properly
- epatch ${FILESDIR}/shadow-4.0.6-fix-configure.patch
-
- # Tweak manpages #70880
- epatch ${FILESDIR}/shadow-4.0.6-manpages.patch
-
- # Fix SU_WHEEL_ONLY behavior #80345
- epatch ${FILESDIR}/${P}-iswheel.patch
-
- # Make user/group names more flexible #3485 / #22920
- epatch "${FILESDIR}"/shadow-4.0.6-dots-in-usernames.patch
- epatch "${FILESDIR}"/shadow-4.0.6-long-groupnames.patch
-
- # Newer glibc's have a different nscd socket location #74395
- sed -i \
- -e '/_PATH_NSCDSOCKET/s:/var/run/.nscd_socket:/var/run/nscd/socket:' \
- lib/nscd.c || die "sed nscd socket"
-
- elibtoolize
- epunt_cxx
-}
-
-src_compile() {
- append-ldflags -Wl,-z,now
- tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes
- econf \
- --disable-desrpc \
- --with-libcrypt \
- --with-libcrack \
- --enable-shared=no \
- --enable-static=yes \
- $(use_with pam libpam) \
- $(use_with skey libskey) \
- $(use_with selinux) \
- $(use_enable nls) \
- || die "bad configure"
- emake || die "compile problem"
-}
-
-src_install() {
- make DESTDIR=${D} install || die "install problem"
- dosym useradd /usr/sbin/adduser
-
- # lock down setuid perms #47208
- fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \
- /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms"
-
- # Remove libshadow and libmisc; see bug 37725 and the following
- # comment from shadow's README.linux:
- # Currently, libshadow.a is for internal use only, so if you see
- # -lshadow in a Makefile of some other package, it is safe to
- # remove it.
- rm -f ${D}/lib/lib{misc,shadow}.{a,la}
-
- # Do not install this login, but rather the one from
- # pam-login, as this one have a serious root exploit
- # with pam support enabled.
- use pam && rm ${D}/bin/login
-
- insinto /etc
- # Using a securetty with devfs device names added
- # (compat names kept for non-devfs compatibility)
- insopts -m0600 ; doins ${FILESDIR}/securetty
- insopts -m0600 ; doins etc/login.access
- insopts -m0644 ; doins etc/limits
-
- # needed for 'adduser -D'
- insinto /etc/default
- insopts -m0600
- doins ${FILESDIR}/default/useradd
-
- # move passwd to / to help recover broke systems #64441
- mv ${D}/usr/bin/passwd ${D}/bin/
- dosym /bin/passwd /usr/bin/passwd
-
- if use pam ; then
- insinto /etc/pam.d ; insopts -m0644
- for x in ${FILESDIR}/pam.d/*; do
- [ -f ${x} ] && doins ${x}
- done
- cd ${FILESDIR}/pam.d
- # Make sure /etc/pam.d/system-auth is the new version ..
- mv ${D}/etc/pam.d/system-auth-1.1 ${D}/etc/pam.d/system-auth
- newins system-auth-1.1 system-auth.new || die
- for x in chage chsh chfn chpasswd newusers \
- user{add,del,mod} group{add,del,mod} ; do
- newins shadow ${x}
- done
-
- # remove manpages that pam will install for us
- # and/or don't apply when using pam
-
- find ${D}/usr/share/man \
- '(' -name 'login.1' -o -name 'suauth.5' ')' \
- -exec rm {} \;
- else
- insinto /etc
- insopts -m0644
- newins etc/login.defs.linux login.defs
- fi
-
- # Remove manpages that are handled by other packages
- find ${D}/usr/share/man \
- '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \
- -exec rm {} \;
-
- cd ${S}/doc
- dodoc INSTALL README WISHLIST
- docinto txt
- dodoc HOWTO LSM README.* *.txt
-
- # ttyB0 is the PDC software console
- if [ "${ARCH}" = "hppa" ]
- then
- echo "ttyB0" >> ${D}/etc/securetty
- fi
-}
-
-pkg_postinst() {
- use pam || return 0;
- local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)"
- local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)"
-
- if [ "${CHECK1}" != "${CHECK2}" -a "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]
- then
- ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth "
- ewarn "is being updated automatically. Your old "
- ewarn "system-auth will be backed up as:"
- ewarn
- ewarn " ${ROOT}etc/pam.d/system-auth.bak"
- echo
-
- cp -pPR ${ROOT}/etc/pam.d/system-auth \
- ${ROOT}/etc/pam.d/system-auth.bak;
- mv -f ${ROOT}/etc/pam.d/system-auth.new \
- ${ROOT}/etc/pam.d/system-auth
- rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth
- else
- rm -f ${ROOT}/etc/pam.d/system-auth.new
- fi
-}