diff options
author | 2006-01-14 02:06:21 +0000 | |
---|---|---|
committer | 2006-01-14 02:06:21 +0000 | |
commit | 3f53da22564c449d1dacf2d702daad827b72c31f (patch) | |
tree | bcde0634d2c895e98494c5aeafd64d4924da70fd /sys-apps | |
parent | Fixed perl deps (diff) | |
download | gentoo-2-3f53da22564c449d1dacf2d702daad827b72c31f.tar.gz gentoo-2-3f53da22564c449d1dacf2d702daad827b72c31f.tar.bz2 gentoo-2-3f53da22564c449d1dacf2d702daad827b72c31f.zip |
clean out old files
(Portage version: 2.1_pre3-r1)
Diffstat (limited to 'sys-apps')
25 files changed, 0 insertions, 2104 deletions
diff --git a/sys-apps/shadow/files/digest-shadow-4.0.4.1-r4 b/sys-apps/shadow/files/digest-shadow-4.0.4.1-r4 deleted file mode 100644 index 86c719561f0b..000000000000 --- a/sys-apps/shadow/files/digest-shadow-4.0.4.1-r4 +++ /dev/null @@ -1 +0,0 @@ -MD5 3a3d17d3d7c630b602baf66ae7434c61 shadow-4.0.4.1.tar.bz2 814234 diff --git a/sys-apps/shadow/files/digest-shadow-4.0.5-r2 b/sys-apps/shadow/files/digest-shadow-4.0.5-r2 deleted file mode 100644 index 00b3a379adf1..000000000000 --- a/sys-apps/shadow/files/digest-shadow-4.0.5-r2 +++ /dev/null @@ -1 +0,0 @@ -MD5 cca17a4843a3b5b324a5398faf81c3b4 shadow-4.0.5.tar.bz2 1012361 diff --git a/sys-apps/shadow/files/digest-shadow-4.0.5-r3 b/sys-apps/shadow/files/digest-shadow-4.0.5-r3 deleted file mode 100644 index 00b3a379adf1..000000000000 --- a/sys-apps/shadow/files/digest-shadow-4.0.5-r3 +++ /dev/null @@ -1 +0,0 @@ -MD5 cca17a4843a3b5b324a5398faf81c3b4 shadow-4.0.5.tar.bz2 1012361 diff --git a/sys-apps/shadow/files/digest-shadow-4.0.6-r1 b/sys-apps/shadow/files/digest-shadow-4.0.6-r1 deleted file mode 100644 index 029176db1f9c..000000000000 --- a/sys-apps/shadow/files/digest-shadow-4.0.6-r1 +++ /dev/null @@ -1 +0,0 @@ -MD5 3ca79b02c0aaa82128f4c32cb68ffe4f shadow-4.0.6.tar.bz2 1016214 diff --git a/sys-apps/shadow/files/digest-shadow-4.0.7 b/sys-apps/shadow/files/digest-shadow-4.0.7 deleted file mode 100644 index 57cfe54be85e..000000000000 --- a/sys-apps/shadow/files/digest-shadow-4.0.7 +++ /dev/null @@ -1 +0,0 @@ -MD5 89ebec0d1c0d861a5bd5c4c63e5cb0cc shadow-4.0.7.tar.bz2 1019749 diff --git a/sys-apps/shadow/files/digest-shadow-4.0.7-r1 b/sys-apps/shadow/files/digest-shadow-4.0.7-r1 deleted file mode 100644 index 57cfe54be85e..000000000000 --- a/sys-apps/shadow/files/digest-shadow-4.0.7-r1 +++ /dev/null @@ -1 +0,0 @@ -MD5 89ebec0d1c0d861a5bd5c4c63e5cb0cc shadow-4.0.7.tar.bz2 1019749 diff --git a/sys-apps/shadow/files/digest-shadow-4.0.7-r3 b/sys-apps/shadow/files/digest-shadow-4.0.7-r3 deleted file mode 100644 index 57cfe54be85e..000000000000 --- a/sys-apps/shadow/files/digest-shadow-4.0.7-r3 +++ /dev/null @@ -1 +0,0 @@ -MD5 89ebec0d1c0d861a5bd5c4c63e5cb0cc shadow-4.0.7.tar.bz2 1019749 diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-gcc34-xmalloc.patch b/sys-apps/shadow/files/shadow-4.0.4.1-gcc34-xmalloc.patch deleted file mode 100644 index 9ea7d23f3230..000000000000 --- a/sys-apps/shadow/files/shadow-4.0.4.1-gcc34-xmalloc.patch +++ /dev/null @@ -1,11 +0,0 @@ ---- libmisc/old/xmalloc.c 2004-04-21 09:15:20.000000000 +0000 -+++ libmisc/xmalloc.c 2004-04-21 09:32:50.000000000 +0000 -@@ -13,7 +13,7 @@ - RCSID ("$Id: shadow-4.0.4.1-gcc34-xmalloc.patch,v 1.1 2004/04/22 11:22:43 lv Exp $") - #include <stdio.h> - #include "defines.h" --extern char *malloc (); -+extern void *malloc (size_t size); - - char *xmalloc (size_t size) - { diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-nls-manpages.patch b/sys-apps/shadow/files/shadow-4.0.4.1-nls-manpages.patch deleted file mode 100644 index cffa6b22bcf9..000000000000 --- a/sys-apps/shadow/files/shadow-4.0.4.1-nls-manpages.patch +++ /dev/null @@ -1,14 +0,0 @@ ---- man/Makefile.in.orig 2004-10-16 16:44:32.554707920 -0400 -+++ man/Makefile.in 2004-10-16 16:44:52.870619432 -0400 -@@ -153,7 +153,11 @@ - target_alias = @target_alias@ - - # subdirectories for translated manual pages -+ifeq ($(USE_NLS),no) -+SUBDIRS = -+else - SUBDIRS = cs de es fr hu id it ja ko pl pt_BR ru zh_CN zh_TW -+endif - - man_MANS = \ - adduser.8 \ diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-passwd-typo.patch b/sys-apps/shadow/files/shadow-4.0.4.1-passwd-typo.patch deleted file mode 100644 index 8f94ffcd5c99..000000000000 --- a/sys-apps/shadow/files/shadow-4.0.4.1-passwd-typo.patch +++ /dev/null @@ -1,10 +0,0 @@ -Index: man/passwd.1 -=================================================================== -RCS file: /cvsroot/shadow/man/passwd.1,v -retrieving revision 1.16 -diff -u -B -U0 -r1.16 passwd.1 ---- man/passwd.1 1 May 2003 18:17:39 -0000 1.16 -+++ man/passwd.1 29 Oct 2004 02:52:21 -0000 -@@ -112 +112 @@ --User accounts may be locked and unlocked with the \fB-l\fR and fB-u\fR -+User accounts may be locked and unlocked with the \fB-l\fR and \fB-u\fR diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-selinux.diff b/sys-apps/shadow/files/shadow-4.0.4.1-selinux.diff deleted file mode 100644 index 26e118125f77..000000000000 --- a/sys-apps/shadow/files/shadow-4.0.4.1-selinux.diff +++ /dev/null @@ -1,175 +0,0 @@ -diff -urN shadow-4.0.3.orig/lib/Makefile.am shadow-4.0.3/lib/Makefile.am ---- shadow-4.0.3.orig/lib/Makefile.am 2001-10-06 14:53:20.000000000 -0500 -+++ shadow-4.0.3/lib/Makefile.am 2003-08-07 08:38:20.000000000 -0500 -@@ -1,7 +1,7 @@ - - AUTOMAKE_OPTIONS = 1.0 foreign - --DEFS = -+DEFS = -DWITH_SELINUX - INCLUDES = - - lib_LTLIBRARIES = libshadow.la -diff -urN shadow-4.0.3.orig/lib/Makefile.in shadow-4.0.3/lib/Makefile.in ---- shadow-4.0.3.orig/lib/Makefile.in 2004-01-14 16:15:26.000000000 +0200 -+++ shadow-4.0.3/lib/Makefile.in 2004-07-03 21:34:31.815854072 +0300 -@@ -56,7 +56,7 @@ - CXXFLAGS = @CXXFLAGS@ - CYGPATH_W = @CYGPATH_W@ - --DEFS = -+DEFS = -DWITH_SELINUX - DEPDIR = @DEPDIR@ - ECHO = @ECHO@ - ECHO_C = @ECHO_C@ -diff -urN shadow-4.0.3.orig/lib/commonio.c shadow-4.0.3/lib/commonio.c ---- shadow-4.0.3.orig/lib/commonio.c 2001-11-17 07:15:52.000000000 -0600 -+++ shadow-4.0.3/lib/commonio.c 2003-08-07 08:38:20.000000000 -0500 -@@ -15,7 +15,10 @@ - #ifdef HAVE_SHADOW_H - #include <shadow.h> - #endif -- -+#ifdef WITH_SELINUX -+#include <selinux/selinux.h> -+static security_context_t old_context=NULL; -+#endif - #include "commonio.h" - - /* local function prototypes */ -@@ -437,6 +440,15 @@ - return 0; - } - -+#ifdef WITH_SELINUX -+ db->scontext=NULL; -+ if (is_selinux_enabled() && (! db->readonly)) { -+ if (fgetfilecon(fileno(db->fp),&db->scontext) < 0) { -+ goto cleanup; -+ } -+ } -+#endif -+ - buflen = BUFLEN; - buf = (char *) malloc(buflen); - if (!buf) -@@ -492,6 +504,12 @@ - free(buf); - cleanup: - free_linked_list(db); -+#ifdef WITH_SELINUX -+ if (db->scontext!= NULL) { -+ freecon(db->scontext); -+ db->scontext=NULL; -+ } -+#endif - fclose(db->fp); - db->fp = NULL; - errno = ENOMEM; -@@ -627,6 +645,19 @@ - goto fail; - } - -+#ifdef WITH_SELINUX -+ if (db->scontext != NULL) { -+ int stat=getfscreatecon(&old_context); -+ if (stat< 0) { -+ errors++; -+ goto fail; -+ } -+ if (setfscreatecon(db->scontext)<0) { -+ errors++; -+ goto fail; -+ } -+ } -+#endif - /* - * Create backup file. - */ -@@ -683,14 +714,26 @@ - goto fail; - - nscd_need_reload = 1; -- -+ goto success; -+fail: -+ errors++; - success: -- free_linked_list(db); -- return 1; - --fail: -+#ifdef WITH_SELINUX -+ if (db->scontext != NULL) { -+ if (setfscreatecon(old_context)<0) { -+ errors++; -+ } -+ if (old_context != NULL) { -+ freecon(old_context); -+ old_context=NULL; -+ } -+ freecon(db->scontext); -+ db->scontext=NULL; -+ } -+#endif - free_linked_list(db); -- return 0; -+ return errors==0; - } - - -diff -urN shadow-4.0.3.orig/lib/commonio.h shadow-4.0.3/lib/commonio.h ---- shadow-4.0.3.orig/lib/commonio.h 2001-08-14 16:09:54.000000000 -0500 -+++ shadow-4.0.3/lib/commonio.h 2003-08-07 08:38:20.000000000 -0500 -@@ -1,5 +1,8 @@ - /* $Id: shadow-4.0.4.1-selinux.diff,v 1.2 2004/07/03 19:59:59 pebenito Exp $ */ - -+#ifdef WITH_SELINUX -+#include <selinux/selinux.h> -+#endif - /* - * Linked list entry. - */ -@@ -70,6 +73,9 @@ - */ - FILE *fp; - -+#ifdef WITH_SELINUX -+ security_context_t scontext; -+#endif - /* - * Head, tail, current position in linked list. - */ -diff -urN shadow-4.0.3.orig/src/Makefile.am shadow-4.0.3/src/Makefile.am ---- shadow-4.0.3.orig/src/Makefile.am 2002-03-10 01:12:52.000000000 -0600 -+++ shadow-4.0.3/src/Makefile.am 2003-08-07 08:38:20.000000000 -0500 -@@ -4,7 +4,7 @@ - ubindir = ${prefix}/bin - usbindir = ${prefix}/sbin - --DEFS = -D_HAVE_CONFIG_H -DLOCALEDIR=\"$(datadir)/locale\" -+DEFS = -D_HAVE_CONFIG_H -DLOCALEDIR=\"$(datadir)/locale\" -DWITH_SELINUX - - INCLUDES = -I${top_srcdir} \ - -I${top_srcdir}/lib \ -@@ -35,7 +35,7 @@ - suidubins = chage chfn chsh expiry gpasswd newgrp passwd - - LDADD = $(top_builddir)/libmisc/libmisc.la \ -- $(top_builddir)/lib/libshadow.la -+ $(top_builddir)/lib/libshadow.la -lselinux - - chpasswd_LDADD = $(LDADD) $(LIBPAM) - chage_LDADD = $(LDADD) $(LIBPAM) -diff -urN shadow-4.0.3.orig/src/Makefile.in shadow-4.0.3/src/Makefile.in ---- shadow-4.0.3.orig/src/Makefile.in 2002-03-13 13:04:10.000000000 -0600 -+++ shadow-4.0.3/src/Makefile.in 2003-08-07 08:45:13.000000000 -0500 -@@ -145,7 +145,7 @@ - suidubins = chage chfn chsh expiry gpasswd newgrp passwd - - LDADD = $(top_builddir)/libmisc/libmisc.la \ -- $(top_builddir)/lib/libshadow.la -+ $(top_builddir)/lib/libshadow.la -lselinux - - - chpasswd_LDADD = $(LDADD) $(LIBPAM) diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-su-pam_open_session.patch b/sys-apps/shadow/files/shadow-4.0.4.1-su-pam_open_session.patch deleted file mode 100644 index 3bdeb9795401..000000000000 --- a/sys-apps/shadow/files/shadow-4.0.4.1-su-pam_open_session.patch +++ /dev/null @@ -1,210 +0,0 @@ ---- shadow-4.0.3/src/su.c.orig 2002-10-20 16:43:21.000000000 +0200 -+++ shadow-4.0.3/src/su.c 2002-10-20 16:50:57.000000000 +0200 -@@ -134,6 +134,108 @@ - exit (1); - } - -+#ifdef USE_PAM -+static int caught=0; -+ -+/* Signal handler for parent process later */ -+static void su_catch_sig(int sig) -+{ -+ ++caught; -+} -+ -+/* This I ripped out of su.c from sh-utils after the Mandrake pam patch -+ * have been applied. Some work was needed to get it integrated into -+ * su.c from shadow. -+ */ -+static void run_shell (const char *shellstr, char *args[], int doshell) -+{ -+ int child; -+ sigset_t ourset; -+ int status; -+ int ret; -+ -+ child = fork(); -+ if (child == 0) { /* child shell */ -+ pam_end (pamh, PAM_SUCCESS); -+ -+ if (doshell) -+ shell (shellstr, (char *) args[0]); -+ else -+ (void) execv (shellstr, (char **) args); -+ { -+ int exit_status = (errno == ENOENT ? 127 : 126); -+ exit (exit_status); -+ } -+ } else if (child == -1) { -+ (void) fprintf(stderr, "%s: Cannot fork user shell\n", Prog); -+ SYSLOG ((LOG_WARN, "Cannot execute %s", pwent.pw_shell)); -+ closelog (); -+ exit(1); -+ } -+ /* parent only */ -+ sigfillset(&ourset); -+ if (sigprocmask(SIG_BLOCK, &ourset, NULL)) { -+ (void) fprintf(stderr, "%s: signal malfunction\n", Prog); -+ caught = 1; -+ } -+ if (!caught) { -+ struct sigaction action; -+ action.sa_handler = su_catch_sig; -+ sigemptyset(&action.sa_mask); -+ action.sa_flags = 0; -+ sigemptyset(&ourset); -+ -+ if (sigaddset(&ourset, SIGTERM) -+ || sigaddset(&ourset, SIGALRM) -+ || sigaction(SIGTERM, &action, NULL) -+ || sigprocmask(SIG_UNBLOCK, &ourset, NULL) -+ ) { -+ fprintf(stderr, "%s: signal masking malfunction\n", Prog); -+ caught = 1; -+ } -+ } -+ -+ if (!caught) { -+ do { -+ int pid; -+ -+ pid = waitpid(-1, &status, WUNTRACED); -+ -+ if (WIFSTOPPED(status)) { -+ kill(getpid(), SIGSTOP); -+ /* once we get here, we must have resumed */ -+ kill(pid, SIGCONT); -+ } -+ } while (WIFSTOPPED(status)); -+ } -+ -+ if (caught) { -+ fprintf(stderr, "\nSession terminated, killing shell..."); -+ kill (child, SIGTERM); -+ } -+ -+ ret = pam_close_session(pamh, 0); -+ if (ret != PAM_SUCCESS) { -+ SYSLOG ((LOG_ERR, "pam_close_session: %s", -+ pam_strerror (pamh, ret))); -+ fprintf (stderr, "%s: %s\n", Prog, -+ pam_strerror (pamh, ret)); -+ pam_end (pamh, ret); -+ exit (1); -+ } -+ -+ ret = pam_end(pamh, PAM_SUCCESS); -+ -+ if (caught) { -+ sleep(2); -+ kill(child, SIGKILL); -+ fprintf(stderr, " ...killed.\n"); -+ exit(-1); -+ } -+ -+ exit (WEXITSTATUS(status)); -+} -+#endif - - /* - * su - switch user id -@@ -152,6 +254,7 @@ - int main (int argc, char **argv) - { - char *cp; -+ char **envcp; - const char *tty = 0; /* Name of tty SU is run from */ - int doshell = 0; - int fakelogin = 0; -@@ -252,6 +355,14 @@ - */ - if ((cp = getenv ("TERM"))) - addenv ("TERM", cp); -+ /* -+ * Also leave DISPLAY and XAUTHORITY if present, else -+ * pam_xauth will not work. -+ */ -+ if ((cp = getenv ("DISPLAY"))) -+ addenv ("DISPLAY", cp); -+ if ((cp = getenv ("XAUTHORITY"))) -+ addenv ("XAUTHORITY", cp); - } else { - while (*envp) - addenv (*envp++, NULL); -@@ -507,7 +618,10 @@ - } - #endif - -+/* setup the environment for pam later on, else we run into auth problems */ -+#ifndef USE_PAM - environ = newenvp; /* make new environment active */ -+#endif - - if (getenv ("IFS")) /* don't export user IFS ... */ - addenv ("IFS= \t\n", NULL); /* ... instead, set a safe IFS */ -@@ -555,6 +669,31 @@ - exit (1); - } - -+ ret = pam_open_session (pamh, 0); -+ if (ret != PAM_SUCCESS) { -+ SYSLOG ((LOG_ERR, "pam_open_session: %s", -+ pam_strerror (pamh, ret))); -+ fprintf (stderr, "%s: %s\n", Prog, -+ pam_strerror (pamh, ret)); -+ pam_end (pamh, ret); -+ exit (1); -+ } -+ -+ /* we need to setup the environment *after* pam_open_session(), -+ * else the UID is changed before stuff like pam_xauth could -+ * run, and we cannot access /etc/shadow and co -+ */ -+ environ = newenvp; /* make new environment active */ -+ -+ /* update environment with all pam set variables */ -+ envcp = pam_getenvlist(pamh); -+ if(envcp) { -+ while(*envcp) { -+ putenv(*envcp); -+ envcp++; -+ } -+ } -+ - /* become the new user */ - if (change_uid (&pwent)) { - pam_setcred (pamh, PAM_DELETE_CRED); -@@ -562,9 +701,6 @@ - exit (1); - } - -- /* now we are done using PAM */ -- pam_end (pamh, PAM_SUCCESS); -- - #else /* !USE_PAM */ - if (!amroot) /* no limits if su from root */ - setup_limits (&pwent); -@@ -622,13 +758,21 @@ - */ - - argv[-1] = pwent.pw_shell; -+#ifndef USE_PAM - (void) execv (pwent.pw_shell, &argv[-1]); -+#else -+ run_shell (pwent.pw_shell, &argv[-1], 0); -+#endif - (void) fprintf (stderr, _("No shell\n")); - SYSLOG ((LOG_WARN, "Cannot execute %s", pwent.pw_shell)); - closelog (); - exit (1); - } - -+#ifndef USE_PAM - shell (pwent.pw_shell, cp); -+#else -+ run_shell (pwent.pw_shell, &cp, 1); -+#endif - /* NOT REACHED */ - exit (1); - } diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-useradd-manpage-update.patch b/sys-apps/shadow/files/shadow-4.0.4.1-useradd-manpage-update.patch deleted file mode 100644 index b444d118356a..000000000000 --- a/sys-apps/shadow/files/shadow-4.0.4.1-useradd-manpage-update.patch +++ /dev/null @@ -1,17 +0,0 @@ ---- shadow-4.0.4.1.orig/man/useradd.8 2004-01-22 21:09:46.369993928 +0200 -+++ shadow-4.0.4.1/man/useradd.8 2004-01-22 21:12:39.043743528 +0200 -@@ -49,10 +49,10 @@ - .SS Creating New Users - When invoked without the \fB-D\fR option, the \fBuseradd\fR command creates - a new user account using the values specified on the command line and the --default values from the system. The new user account will be entered into --the system files as needed, the home directory will be created, and initial --files copied, depending on the command line options. The options which apply --to the \fBuseradd\fR command are: -+default values from the system. Depending on command line options, the -+useradd command will update system files and may also create the new user's -+home directory and copy initial files. The options which apply to the -+\fBuseradd\fR command are: - .IP "\fB-c\fR \fIcomment\fR" - The new user's password file comment field. - .IP "\fB-d\fR \fIhome_dir\fR" diff --git a/sys-apps/shadow/files/shadow-4.0.4.1-userdel-missing-brackets.patch b/sys-apps/shadow/files/shadow-4.0.4.1-userdel-missing-brackets.patch deleted file mode 100644 index 7e0393354f13..000000000000 --- a/sys-apps/shadow/files/shadow-4.0.4.1-userdel-missing-brackets.patch +++ /dev/null @@ -1,15 +0,0 @@ ---- src/userdel.c.orig 2004-10-07 13:42:06.716627000 -0700 -+++ src/userdel.c 2004-10-07 14:05:03.547335810 -0700 -@@ -810,9 +810,10 @@ - pam_end (pamh, retval); - } - -- if (retval != PAM_SUCCESS) -+ if (retval != PAM_SUCCESS) { - fprintf (stderr, _("%s: PAM chauthtok failed\n"), Prog); -- exit (1); -+ exit (1); -+ } - - if (retval == PAM_SUCCESS) - pam_end (pamh, PAM_SUCCESS); diff --git a/sys-apps/shadow/files/shadow-4.0.5-fix-adding-of-pam_env-set-env-vars.patch b/sys-apps/shadow/files/shadow-4.0.5-fix-adding-of-pam_env-set-env-vars.patch deleted file mode 100644 index c6ac906df360..000000000000 --- a/sys-apps/shadow/files/shadow-4.0.5-fix-adding-of-pam_env-set-env-vars.patch +++ /dev/null @@ -1,11 +0,0 @@ ---- shadow-4.0.5/src/su.c 2004-11-07 20:51:54.992246016 +0200 -+++ shadow-4.0.5.az/src/su.c 2004-11-07 20:47:56.972430528 +0200 -@@ -684,7 +684,7 @@ - envcp = pam_getenvlist (pamh); - if (envcp) { - while (*envcp) { -- putenv (*envcp); -+ addenv (*envcp, NULL); - envcp++; - } - } diff --git a/sys-apps/shadow/files/shadow-4.0.5-fix-mail-configure.patch b/sys-apps/shadow/files/shadow-4.0.5-fix-mail-configure.patch deleted file mode 100644 index bdc8c818fd61..000000000000 --- a/sys-apps/shadow/files/shadow-4.0.5-fix-mail-configure.patch +++ /dev/null @@ -1,165 +0,0 @@ ---- shadow-4.0.5/configure.in 2004-11-07 19:29:12.275693608 +0200 -+++ shadow-4.0.5.az/configure.in 2004-11-07 19:28:29.246235080 +0200 -@@ -131,41 +131,48 @@ - fi - - AC_CACHE_CHECK([location of shared mail directory], shadow_cv_maildir, --[for maildir in /var/mail /var/spool/mail /usr/spool/mail /usr/mail none; do -- if test -d $maildir; then -+[for shadow_cv_maildir in /var/mail /var/spool/mail /usr/spool/mail /usr/mail none; do -+ if test -d $shadow_cv_maildir; then - break - fi - done]) --AC_DEFINE_UNQUOTED(MAIL_SPOOL_DIR, "$shadow_cv_maildir") -+if test "$shadow_cv_maildir" != "none"; then -+ AC_DEFINE_UNQUOTED(MAIL_SPOOL_DIR, "$shadow_cv_maildir") -+fi - - AC_CACHE_CHECK([location of user mail file], shadow_cv_mailfile, --[for mailfile in Mailbox mailbox Mail mail .mail none; do -+[for shadow_cv_mailfile in Mailbox mailbox Mail mail .mail none; do - if test -f $HOME/$shadow_cv_mailfile; then - break - fi - done]) --AC_DEFINE_UNQUOTED(MAIL_SPOOL_FILE, "$shadow_cv_mailfile") -+if test "$shadow_cv_mailfile" != "none"; then -+ AC_DEFINE_UNQUOTED(MAIL_SPOOL_FILE, "$shadow_cv_mailfile") -+fi - - AC_CACHE_CHECK([location of utmp], shadow_cv_utmpdir, --[for utmpdir in /var/run /var/adm /usr/adm /etc none; do -+[for shadow_cv_utmpdir in /var/run /var/adm /usr/adm /etc none; do - if test -f $shadow_cv_utmpdir/utmp; then - break - fi - done]) - if test "$shadow_cv_utmpdir" = "none"; then - AC_MSG_WARN(utmp file not found) -+else -+ AC_DEFINE_UNQUOTED(_UTMP_FILE, "$shadow_cv_utmpdir/utmp") - fi --AC_DEFINE_UNQUOTED(_UTMP_FILE, "$shadow_cv_utmpdir/utmp") - - AC_CACHE_CHECK([location of faillog/lastlog/wtmp], shadow_cv_logdir, - [for shadow_cv_logdir in /var/log /var/adm /usr/adm /etc; do -- if test -d $logdir; then -+ if test -d $shadow_cv_logdir; then - break - fi - done]) --AC_DEFINE_UNQUOTED(_WTMP_FILE, "$shadow_cv_logdir/wtmp") --AC_DEFINE_UNQUOTED(LASTLOG_FILE, "$shadow_cv_logdir/lastlog") --AC_DEFINE_UNQUOTED(FAILLOG_FILE, "$shadow_cv_logdir/faillog") -+if test "$shadow_cv_logdir" != "none"; then -+ AC_DEFINE_UNQUOTED(_WTMP_FILE, "$shadow_cv_logdir/wtmp") -+ AC_DEFINE_UNQUOTED(LASTLOG_FILE, "$shadow_cv_logdir/lastlog") -+ AC_DEFINE_UNQUOTED(FAILLOG_FILE, "$shadow_cv_logdir/faillog") -+fi - - AC_CACHE_CHECK([location of the passwd program], shadow_cv_passwd_dir, - [if test -f /usr/bin/passwd; then ---- shadow-4.0.5/configure 2004-11-07 19:29:07.210463640 +0200 -+++ shadow-4.0.5.az/configure 2004-11-07 19:28:29.253234016 +0200 -@@ -22286,25 +22284,27 @@ - if test "${shadow_cv_maildir+set}" = set; then - echo $ECHO_N "(cached) $ECHO_C" >&6 - else -- for maildir in /var/mail /var/spool/mail /usr/spool/mail /usr/mail none; do -- if test -d $maildir; then -+ for shadow_cv_maildir in /var/mail /var/spool/mail /usr/spool/mail /usr/mail none; do -+ if test -d $shadow_cv_maildir; then - break - fi - done - fi - echo "$as_me:$LINENO: result: $shadow_cv_maildir" >&5 - echo "${ECHO_T}$shadow_cv_maildir" >&6 --cat >>confdefs.h <<_ACEOF -+if test "$shadow_cv_maildir" != "none"; then -+ cat >>confdefs.h <<_ACEOF - #define MAIL_SPOOL_DIR "$shadow_cv_maildir" - _ACEOF - -+fi - - echo "$as_me:$LINENO: checking location of user mail file" >&5 - echo $ECHO_N "checking location of user mail file... $ECHO_C" >&6 - if test "${shadow_cv_mailfile+set}" = set; then - echo $ECHO_N "(cached) $ECHO_C" >&6 - else -- for mailfile in Mailbox mailbox Mail mail .mail none; do -+ for shadow_cv_mailfile in Mailbox mailbox Mail mail .mail none; do - if test -f $HOME/$shadow_cv_mailfile; then - break - fi -@@ -22312,17 +22312,19 @@ - fi - echo "$as_me:$LINENO: result: $shadow_cv_mailfile" >&5 - echo "${ECHO_T}$shadow_cv_mailfile" >&6 --cat >>confdefs.h <<_ACEOF -+if test "$shadow_cv_mailfile" != "none"; then -+ cat >>confdefs.h <<_ACEOF - #define MAIL_SPOOL_FILE "$shadow_cv_mailfile" - _ACEOF - -+fi - - echo "$as_me:$LINENO: checking location of utmp" >&5 - echo $ECHO_N "checking location of utmp... $ECHO_C" >&6 - if test "${shadow_cv_utmpdir+set}" = set; then - echo $ECHO_N "(cached) $ECHO_C" >&6 - else -- for utmpdir in /var/run /var/adm /usr/adm /etc none; do -+ for shadow_cv_utmpdir in /var/run /var/adm /usr/adm /etc none; do - if test -f $shadow_cv_utmpdir/utmp; then - break - fi -@@ -22333,11 +22335,12 @@ - if test "$shadow_cv_utmpdir" = "none"; then - { echo "$as_me:$LINENO: WARNING: utmp file not found" >&5 - echo "$as_me: WARNING: utmp file not found" >&2;} --fi --cat >>confdefs.h <<_ACEOF -+else -+ cat >>confdefs.h <<_ACEOF - #define _UTMP_FILE "$shadow_cv_utmpdir/utmp" - _ACEOF - -+fi - - echo "$as_me:$LINENO: checking location of faillog/lastlog/wtmp" >&5 - echo $ECHO_N "checking location of faillog/lastlog/wtmp... $ECHO_C" >&6 -@@ -22345,25 +22348,27 @@ - echo $ECHO_N "(cached) $ECHO_C" >&6 - else - for shadow_cv_logdir in /var/log /var/adm /usr/adm /etc; do -- if test -d $logdir; then -+ if test -d $shadow_cv_logdir; then - break - fi - done - fi - echo "$as_me:$LINENO: result: $shadow_cv_logdir" >&5 - echo "${ECHO_T}$shadow_cv_logdir" >&6 --cat >>confdefs.h <<_ACEOF -+if test "$shadow_cv_logdir" != "none"; then -+ cat >>confdefs.h <<_ACEOF - #define _WTMP_FILE "$shadow_cv_logdir/wtmp" - _ACEOF - --cat >>confdefs.h <<_ACEOF -+ cat >>confdefs.h <<_ACEOF - #define LASTLOG_FILE "$shadow_cv_logdir/lastlog" - _ACEOF - --cat >>confdefs.h <<_ACEOF -+ cat >>confdefs.h <<_ACEOF - #define FAILLOG_FILE "$shadow_cv_logdir/faillog" - _ACEOF - -+fi - - echo "$as_me:$LINENO: checking location of the passwd program" >&5 - echo $ECHO_N "checking location of the passwd program... $ECHO_C" >&6 diff --git a/sys-apps/shadow/files/shadow-4.0.5-hack-X-envvars.patch b/sys-apps/shadow/files/shadow-4.0.5-hack-X-envvars.patch deleted file mode 100644 index e8672886b07b..000000000000 --- a/sys-apps/shadow/files/shadow-4.0.5-hack-X-envvars.patch +++ /dev/null @@ -1,18 +0,0 @@ ---- shadow-4.0.5/src/su.c.orig 2004-11-03 18:25:17.663531472 -0500 -+++ shadow-4.0.5/src/su.c 2004-11-03 18:25:24.256529184 -0500 -@@ -359,7 +359,6 @@ - */ - if ((cp = getenv ("TERM"))) - addenv ("TERM", cp); --#ifndef USE_PAM - /* - * Also leave DISPLAY and XAUTHORITY if present, else - * pam_xauth will not work. -@@ -368,7 +367,6 @@ - addenv ("DISPLAY", cp); - if ((cp = getenv ("XAUTHORITY"))) - addenv ("XAUTHORITY", cp); --#endif /* !USE_PAM */ - } else { - while (*envp) - addenv (*envp++, NULL); diff --git a/sys-apps/shadow/files/shadow-4.0.5-remove-else.patch b/sys-apps/shadow/files/shadow-4.0.5-remove-else.patch deleted file mode 100644 index fc375e81fd4f..000000000000 --- a/sys-apps/shadow/files/shadow-4.0.5-remove-else.patch +++ /dev/null @@ -1,16 +0,0 @@ -=================================================================== -RCS file: /cvsroot/shadow/libmisc/pwdcheck.c,v -retrieving revision 1.3 -retrieving revision 1.4 -diff -u -r1.3 -r1.4 ---- shadow/libmisc/pwdcheck.c 2004/06/02 23:50:10 1.3 -+++ shadow/libmisc/pwdcheck.c 2004/11/02 18:46:30 1.4 -@@ -34,7 +34,7 @@ - retcode = pam_acct_mgmt (pamh, 0); - if (retcode == PAM_NEW_AUTHTOK_REQD) - retcode = pam_chauthtok (pamh, PAM_CHANGE_EXPIRED_AUTHTOK); -- else if (retcode) -+ if (retcode) - goto bailout; - - if (pam_setcred (pamh, 0)) diff --git a/sys-apps/shadow/shadow-4.0.4.1-r4.ebuild b/sys-apps/shadow/shadow-4.0.4.1-r4.ebuild deleted file mode 100644 index 5132f70faeb5..000000000000 --- a/sys-apps/shadow/shadow-4.0.4.1-r4.ebuild +++ /dev/null @@ -1,205 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.4.1-r4.ebuild,v 1.17 2005/08/24 00:33:34 vapier Exp $ - -inherit eutils libtool gnuconfig flag-o-matic - -FORCE_SYSTEMAUTH_UPDATE="no" -SELINUX_PATCH="shadow-4.0.4.1-selinux.diff" - -DESCRIPTION="Utilities to deal with user accounts" -HOMEPAGE="http://shadow.pld.org.pl/" -SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2" - -LICENSE="BSD" -SLOT="0" -KEYWORDS="alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86" -IUSE="pam selinux nls" - -DEPEND=">=sys-libs/cracklib-2.7-r3 - pam? ( >=sys-libs/pam-0.75-r4 ) - nls? ( sys-devel/gettext ) - selinux? ( sys-libs/libselinux )" -RDEPEND=">=sys-libs/cracklib-2.7-r3 - pam? ( >=sys-libs/pam-0.75-r4 ) - selinux? ( sys-libs/libselinux )" - -pkg_preinst() { - rm -f ${ROOT}/etc/pam.d/system-auth.new -} - -src_unpack() { - unpack ${A} - cd ${S} - - # selinux loving - use selinux && epatch ${FILESDIR}/${SELINUX_PATCH} - - # uclibc support, corrects NIS usage - use elibc_uclibc && epatch ${FILESDIR}/shadow-4.0.4.1-nonis.patch - - # Get su to call pam_open_session(), and also set DISPLAY and XAUTHORITY, - # else the session entries in /etc/pam.d/su never get executed, and - # pam_xauth for one, is then never used. This should close bug #8831. - # - # <azarah@gentoo.org> (19 Oct 2002) - use pam && epatch ${FILESDIR}/${P}-su-pam_open_session.patch - - # If su should not simulate a login shell, use '/bin/sh' as shell to enable - # running of commands as user with /bin/false as shell, closing bug #15015. - # - # <azarah@gentoo.org> (23 Feb 2003) -# This one could be a security hole ... -# cd ${S}; epatch ${FILESDIR}/${P}-nologin-run-sh.patch - - # Patch the useradd manpage to be a bit more clear, closing bug #13203. - # Thanks to Guy <guycad@mindspring.com>. - epatch ${FILESDIR}/${P}-useradd-manpage-update.patch - - # Patch to correct the definition if malloc, so that shadow can compile - # using gcc 3.4. see bug #47455 for more information - epatch ${FILESDIR}/${P}-gcc34-xmalloc.patch - - # userdel has a bug when PAM is enabled that causes it to always exit - # with an exit status of 1 #66687 - epatch ${FILESDIR}/${P}-userdel-missing-brackets.patch - - # don't install manpages if USE=-nls - epatch ${FILESDIR}/${P}-nls-manpages.patch - - # fix small graphical typo in passwd.1 #68150 - epatch ${FILESDIR}/${P}-passwd-typo.patch - - # Allows shadow configure detect newer systems properly - gnuconfig_update - elibtoolize - epunt_cxx -} - -src_compile() { - append-ldflags -Wl,-z,now - - econf \ - --disable-desrpc \ - --with-libcrypt \ - --with-libcrack \ - --enable-shared=no \ - --enable-static=yes \ - $(use_with pam libpam) \ - $(use_enable nls) \ - || die "bad configure" - - # Parallel make fails sometimes - emake -j1 || die "compile problem" -} - -src_install() { - make DESTDIR=${D} install || die "install problem" - - # lock down setuid perms #47208 - fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \ - /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms" - - # Remove libshadow and libmisc; see bug 37725 and the following - # comment from shadow's README.linux: - # Currently, libshadow.a is for internal use only, so if you see - # -lshadow in a Makefile of some other package, it is safe to - # remove it. - rm -f ${D}/lib/lib{misc,shadow}.{a,la} - - # Do not install this login, but rather the one from - # pam-login, as this one have a serious root exploit - # with pam_limits in use. - use pam && rm ${D}/bin/login - - dosym newgrp /usr/bin/sg - dosym useradd /usr/sbin/adduser - dosym vipw /usr/sbin/vigr - # Remove dead links - rm -f ${D}/bin/{sg,vipw,vigr} - - insinto /etc - # Using a securetty with devfs device names added - # (compat names kept for non-devfs compatibility) - insopts -m0600 ; doins ${FILESDIR}/securetty - insopts -m0600 ; doins ${S}/etc/login.access - insopts -m0644 ; doins ${S}/etc/limits - - # needed for 'adduser -D' - insinto /etc/default - insopts -m0600 - doins ${FILESDIR}/default/useradd - # From sys-apps/pam-login now - #insopts -m0644 ; doins ${FILESDIR}/login.defs - - # move passwd to / to help recover broke systems #64441 - mv ${D}/usr/bin/passwd ${D}/bin/ - dosym ../../bin/passwd /usr/bin/passwd - - if use pam; then - insinto /etc/pam.d ; insopts -m0644 - for x in ${FILESDIR}/pam.d/*; do - [ -f ${x} ] && doins ${x} - done - cd ${FILESDIR}/pam.d - # Make sure /etc/pam.d/system-auth is the new version .. - mv ${D}/etc/pam.d/system-auth-1.1 ${D}/etc/pam.d/system-auth - newins system-auth-1.1 system-auth.new || die - newins shadow chage - newins shadow chsh - newins shadow chfn - newins shadow useradd - newins shadow groupadd - fi - - # Remove manpages that are handled by other packages - cd ${D}/usr/share/man - find \ - -name 'id.1' \ - -o -name 'passwd.5' \ - -exec rm {} \; - cd ${S} - - if ! use pam; then - # Dont install the manpage, since we dont use - # login with shadow - rm -f ${D}/usr/share/man/man1/login.* - # We use pam, so this is not applicable. - rm -f ${D}/usr/share/man/man5/suauth.* - fi - - cd ${S}/doc - dodoc INSTALL README WISHLIST - docinto txt - dodoc HOWTO LSM README.* *.txt - - # ttyB0 is the PDC software console - if [ "${ARCH}" = "hppa" ] - then - echo "ttyB0" >> ${D}/etc/securetty - fi -} - -pkg_postinst() { - use pam || return 0; - local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)" - local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)" - - if [ "${CHECK1}" != "${CHECK2}" -a "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ] - then - ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth " - ewarn "is being updated automatically. Your old " - ewarn "system-auth will be backed up as:" - ewarn - ewarn " ${ROOT}etc/pam.d/system-auth.bak" - echo - - cp -pPR ${ROOT}/etc/pam.d/system-auth \ - ${ROOT}/etc/pam.d/system-auth.bak; - mv -f ${ROOT}/etc/pam.d/system-auth.new \ - ${ROOT}/etc/pam.d/system-auth - rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth - else - rm -f ${ROOT}/etc/pam.d/system-auth.new - fi -} diff --git a/sys-apps/shadow/shadow-4.0.5-r2.ebuild b/sys-apps/shadow/shadow-4.0.5-r2.ebuild deleted file mode 100644 index 469b7c0c753f..000000000000 --- a/sys-apps/shadow/shadow-4.0.5-r2.ebuild +++ /dev/null @@ -1,187 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.5-r2.ebuild,v 1.10 2005/08/24 00:33:34 vapier Exp $ - -inherit eutils libtool gnuconfig flag-o-matic - -FORCE_SYSTEMAUTH_UPDATE="no" -SELINUX_PATCH="shadow-4.0.4.1-selinux.diff" - -DESCRIPTION="Utilities to deal with user accounts" -HOMEPAGE="http://shadow.pld.org.pl/" -SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2" - -LICENSE="BSD" -SLOT="0" -KEYWORDS="alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86" -IUSE="pam selinux nls skey" - -RDEPEND=">=sys-libs/cracklib-2.7-r3 - pam? ( >=sys-libs/pam-0.75-r4 sys-apps/pam-login ) - !pam? ( !sys-apps/pam-login ) - skey? ( app-admin/skey ) - selinux? ( sys-libs/libselinux )" -DEPEND="${RDEPEND} - >=sys-apps/portage-2.0.51-r2 - nls? ( sys-devel/gettext )" - -pkg_preinst() { - rm -f ${ROOT}/etc/pam.d/system-auth.new -} - -src_unpack() { - unpack ${A} - cd ${S} - - # uclibc support, corrects NIS usage - epatch ${FILESDIR}/shadow-4.0.4.1-nonis.patch - - # If su should not simulate a login shell, use '/bin/sh' as shell to enable - # running of commands as user with /bin/false as shell, closing bug #15015. - # *** This one could be a security hole; disable for now *** - #epatch ${FILESDIR}/${P}-nologin-run-sh.patch - - # don't install manpages if USE=-nls - epatch ${FILESDIR}/shadow-${PV}-nls-manpages.patch - - # tweak the default login.defs - epatch ${FILESDIR}/shadow-${PV}-login.defs.patch - - # fix small graphical typo in passwd.1 #68150 - epatch ${FILESDIR}/shadow-4.0.4.1-passwd-typo.patch - - # skeychallenge call needs updating #69741 - epatch ${FILESDIR}/shadow-${PV}-skey.patch - - # remove an extra else #69212 - epatch ${FILESDIR}/shadow-${PV}-remove-else.patch - - # restore DISPLAY/XAUTHORITY propogation even with USE=pam - # so that users have a chance to migrate to new system #69925 - epatch ${FILESDIR}/shadow-${PV}-hack-X-envvars.patch - [ "${PVR}" != "4.0.5-r2" ] && die "remove the X envvar hack!" - - # Allows shadow configure detect newer systems properly - gnuconfig_update - elibtoolize - epunt_cxx -} - -src_compile() { - append-ldflags -Wl,-z,now - econf \ - --disable-desrpc \ - --with-libcrypt \ - --with-libcrack \ - --enable-shared=no \ - --enable-static=yes \ - $(use_with pam libpam) \ - $(use_with skey libskey) \ - $(use_with selinux) \ - $(use_enable nls) \ - || die "bad configure" - emake || die "compile problem" -} - -src_install() { - make DESTDIR=${D} install || die "install problem" - dosym useradd /usr/sbin/adduser - - # lock down setuid perms #47208 - fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \ - /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms" - - # Remove libshadow and libmisc; see bug 37725 and the following - # comment from shadow's README.linux: - # Currently, libshadow.a is for internal use only, so if you see - # -lshadow in a Makefile of some other package, it is safe to - # remove it. - rm -f ${D}/lib/lib{misc,shadow}.{a,la} - - # Do not install this login, but rather the one from - # pam-login, as this one have a serious root exploit - # with pam support enabled. - use pam && rm ${D}/bin/login - - insinto /etc - # Using a securetty with devfs device names added - # (compat names kept for non-devfs compatibility) - insopts -m0600 ; doins ${FILESDIR}/securetty - insopts -m0600 ; doins etc/login.access - insopts -m0644 ; doins etc/limits - - # needed for 'adduser -D' - insinto /etc/default - insopts -m0600 - doins ${FILESDIR}/default/useradd - - # move passwd to / to help recover broke systems #64441 - mv ${D}/usr/bin/passwd ${D}/bin/ - dosym /bin/passwd /usr/bin/passwd - - if use pam ; then - insinto /etc/pam.d ; insopts -m0644 - for x in ${FILESDIR}/pam.d/*; do - [ -f ${x} ] && doins ${x} - done - cd ${FILESDIR}/pam.d - # Make sure /etc/pam.d/system-auth is the new version .. - mv ${D}/etc/pam.d/system-auth-1.1 ${D}/etc/pam.d/system-auth - newins system-auth-1.1 system-auth.new || die - for x in chage chsh chfn chpasswd newusers \ - user{add,del,mod} group{add,del,mod} ; do - newins shadow ${x} - done - - # remove manpages that pam will install for us - # and/or don't apply when using pam - - find ${D}/usr/share/man \ - '(' -name 'login.1' -o -name 'suauth.5' ')' \ - -exec rm {} \; - else - insinto /etc - insopts -m0644 - newins etc/login.defs.linux login.defs - fi - - # Remove manpages that are handled by other packages - find ${D}/usr/share/man \ - '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \ - -exec rm {} \; - - cd ${S}/doc - dodoc INSTALL README WISHLIST - docinto txt - dodoc HOWTO LSM README.* *.txt - - # ttyB0 is the PDC software console - if [ "${ARCH}" = "hppa" ] - then - echo "ttyB0" >> ${D}/etc/securetty - fi -} - -pkg_postinst() { - use pam || return 0; - local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)" - local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)" - - if [ "${CHECK1}" != "${CHECK2}" -a "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ] - then - ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth " - ewarn "is being updated automatically. Your old " - ewarn "system-auth will be backed up as:" - ewarn - ewarn " ${ROOT}etc/pam.d/system-auth.bak" - echo - - cp -pPR ${ROOT}/etc/pam.d/system-auth \ - ${ROOT}/etc/pam.d/system-auth.bak; - mv -f ${ROOT}/etc/pam.d/system-auth.new \ - ${ROOT}/etc/pam.d/system-auth - rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth - else - rm -f ${ROOT}/etc/pam.d/system-auth.new - fi -} diff --git a/sys-apps/shadow/shadow-4.0.5-r3.ebuild b/sys-apps/shadow/shadow-4.0.5-r3.ebuild deleted file mode 100644 index f52aa2ce9458..000000000000 --- a/sys-apps/shadow/shadow-4.0.5-r3.ebuild +++ /dev/null @@ -1,193 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.5-r3.ebuild,v 1.12 2005/08/24 00:33:34 vapier Exp $ - -inherit eutils libtool toolchain-funcs flag-o-matic - -FORCE_SYSTEMAUTH_UPDATE="no" -SELINUX_PATCH="shadow-4.0.4.1-selinux.diff" - -DESCRIPTION="Utilities to deal with user accounts" -HOMEPAGE="http://shadow.pld.org.pl/" -SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2" - -LICENSE="BSD" -SLOT="0" -KEYWORDS="alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86" -IUSE="pam selinux nls skey" - -RDEPEND=">=sys-libs/cracklib-2.7-r3 - pam? ( >=sys-libs/pam-0.75-r4 sys-apps/pam-login ) - !pam? ( !sys-apps/pam-login ) - skey? ( app-admin/skey ) - selinux? ( sys-libs/libselinux )" -DEPEND="${RDEPEND} - >=sys-apps/portage-2.0.51-r2 - nls? ( sys-devel/gettext )" - -pkg_preinst() { - rm -f ${ROOT}/etc/pam.d/system-auth.new -} - -src_unpack() { - unpack ${A} - cd ${S} - - # uclibc support, corrects NIS usage - epatch ${FILESDIR}/shadow-4.0.4.1-nonis.patch - - # If su should not simulate a login shell, use '/bin/sh' as shell to enable - # running of commands as user with /bin/false as shell, closing bug #15015. - # *** This one could be a security hole; disable for now *** - #epatch ${FILESDIR}/${P}-nologin-run-sh.patch - - # don't install manpages if USE=-nls - epatch ${FILESDIR}/shadow-${PV}-nls-manpages.patch - - # tweak the default login.defs - epatch ${FILESDIR}/shadow-${PV}-login.defs.patch - - # fix small graphical typo in passwd.1 #68150 - epatch ${FILESDIR}/shadow-4.0.4.1-passwd-typo.patch - - # skeychallenge call needs updating #69741 - epatch ${FILESDIR}/shadow-${PV}-skey.patch - - # remove an extra else #69212 - epatch ${FILESDIR}/shadow-${PV}-remove-else.patch - - # The new configure changes do not detect maildir and mailfile - # properly. - epatch ${FILESDIR}/shadow-${PV}-fix-mail-configure.patch - - # Use addenv and not putenv so that pam_env added variables will - # actually end up in the environment - epatch ${FILESDIR}/shadow-${PV}-fix-adding-of-pam_env-set-env-vars.patch - - elibtoolize - epunt_cxx -} - -src_compile() { - append-ldflags -Wl,-z,now - econf \ - --disable-desrpc \ - --with-libcrypt \ - --with-libcrack \ - --enable-shared=no \ - --enable-static=yes \ - $(use_with pam libpam) \ - $(use_with skey libskey) \ - $(use_with selinux) \ - $(use_enable nls) \ - || die "bad configure" - emake || die "compile problem" -} - -src_install() { - make DESTDIR=${D} install || die "install problem" - dosym useradd /usr/sbin/adduser - - # lock down setuid perms #47208 - fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \ - /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms" - - # Remove libshadow and libmisc; see bug 37725 and the following - # comment from shadow's README.linux: - # Currently, libshadow.a is for internal use only, so if you see - # -lshadow in a Makefile of some other package, it is safe to - # remove it. - rm -f ${D}/lib/lib{misc,shadow}.{a,la} - - # Do not install this login, but rather the one from - # pam-login, as this one have a serious root exploit - # with pam support enabled. - use pam && rm ${D}/bin/login - - insinto /etc - # Using a securetty with devfs device names added - # (compat names kept for non-devfs compatibility) - insopts -m0600 ; doins ${FILESDIR}/securetty - insopts -m0600 ; doins etc/login.access - insopts -m0644 ; doins etc/limits - # Only output hvc ibm cruft for ppc64 machines - if [[ $(tc-arch) == "ppc64" ]] ; then - echo "hvc0" >> "${D}"/etc/securetty - echo "hvsi0" >> "${D}"/etc/securetty - fi - - # needed for 'adduser -D' - insinto /etc/default - insopts -m0600 - doins ${FILESDIR}/default/useradd - - # move passwd to / to help recover broke systems #64441 - mv ${D}/usr/bin/passwd ${D}/bin/ - dosym /bin/passwd /usr/bin/passwd - - if use pam ; then - insinto /etc/pam.d ; insopts -m0644 - for x in ${FILESDIR}/pam.d/*; do - [ -f ${x} ] && doins ${x} - done - cd ${FILESDIR}/pam.d - # Make sure /etc/pam.d/system-auth is the new version .. - mv ${D}/etc/pam.d/system-auth-1.1 ${D}/etc/pam.d/system-auth - newins system-auth-1.1 system-auth.new || die - for x in chage chsh chfn chpasswd newusers \ - user{add,del,mod} group{add,del,mod} ; do - newins shadow ${x} - done - - # remove manpages that pam will install for us - # and/or don't apply when using pam - - find ${D}/usr/share/man \ - '(' -name 'login.1' -o -name 'suauth.5' ')' \ - -exec rm {} \; - else - insinto /etc - insopts -m0644 - newins etc/login.defs.linux login.defs - fi - - # Remove manpages that are handled by other packages - find ${D}/usr/share/man \ - '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \ - -exec rm {} \; - - cd ${S}/doc - dodoc INSTALL README WISHLIST - docinto txt - dodoc HOWTO LSM README.* *.txt - - # ttyB0 is the PDC software console - if [ "${ARCH}" = "hppa" ] - then - echo "ttyB0" >> ${D}/etc/securetty - fi -} - -pkg_postinst() { - use pam || return 0; - local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)" - local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)" - - if [ "${CHECK1}" != "${CHECK2}" -a "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ] - then - ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth " - ewarn "is being updated automatically. Your old " - ewarn "system-auth will be backed up as:" - ewarn - ewarn " ${ROOT}etc/pam.d/system-auth.bak" - echo - - cp -pPR ${ROOT}/etc/pam.d/system-auth \ - ${ROOT}/etc/pam.d/system-auth.bak; - mv -f ${ROOT}/etc/pam.d/system-auth.new \ - ${ROOT}/etc/pam.d/system-auth - rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth - else - rm -f ${ROOT}/etc/pam.d/system-auth.new - fi -} diff --git a/sys-apps/shadow/shadow-4.0.6-r1.ebuild b/sys-apps/shadow/shadow-4.0.6-r1.ebuild deleted file mode 100644 index be142d533f0d..000000000000 --- a/sys-apps/shadow/shadow-4.0.6-r1.ebuild +++ /dev/null @@ -1,192 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.6-r1.ebuild,v 1.6 2005/08/24 00:33:34 vapier Exp $ - -inherit eutils libtool gnuconfig flag-o-matic - -FORCE_SYSTEMAUTH_UPDATE="no" -SELINUX_PATCH="shadow-4.0.4.1-selinux.diff" - -DESCRIPTION="Utilities to deal with user accounts" -HOMEPAGE="http://shadow.pld.org.pl/" -SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2" - -LICENSE="BSD" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86" -IUSE="pam selinux nls skey" - -RDEPEND=">=sys-libs/cracklib-2.7-r3 - pam? ( >=sys-libs/pam-0.75-r4 sys-apps/pam-login ) - !pam? ( !sys-apps/pam-login ) - skey? ( app-admin/skey ) - selinux? ( sys-libs/libselinux )" -DEPEND="${RDEPEND} - >=sys-apps/portage-2.0.51-r2 - nls? ( sys-devel/gettext )" - -pkg_preinst() { - rm -f ${ROOT}/etc/pam.d/system-auth.new -} - -src_unpack() { - unpack ${A} - cd ${S} - - # uclibc support, corrects NIS usage - epatch ${FILESDIR}/shadow-4.0.4.1-nonis.patch - - # If su should not simulate a login shell, use '/bin/sh' as shell to enable - # running of commands as user with /bin/false as shell, closing bug #15015. - # *** This one could be a security hole; disable for now *** - #epatch ${FILESDIR}/${P}-nologin-run-sh.patch - - # don't install manpages if USE=-nls - epatch ${FILESDIR}/shadow-4.0.5-nls-manpages.patch - - # tweak the default login.defs - epatch ${FILESDIR}/shadow-4.0.5-login.defs.patch - - # skeychallenge call needs updating #69741 - epatch ${FILESDIR}/shadow-4.0.5-skey.patch - - # The new configure changes do not detect utmp/logdir properly - epatch ${FILESDIR}/shadow-${PV}-fix-configure.patch - - # Tweak manpages #70880 - epatch ${FILESDIR}/shadow-${PV}-manpages.patch - - # Make user/group names more flexible #3485 / #22920 - epatch "${FILESDIR}"/${P}-dots-in-usernames.patch - epatch "${FILESDIR}"/${P}-long-groupnames.patch - - # Newer glibc's have a different nscd socket location #74395 - sed -i \ - -e '/_PATH_NSCDSOCKET/s:/var/run/.nscd_socket:/var/run/nscd/socket:' \ - lib/nscd.c || die "sed nscd socket" - - # Allows shadow configure detect newer systems properly - gnuconfig_update - elibtoolize - epunt_cxx -} - -src_compile() { - append-ldflags -Wl,-z,now - tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes - econf \ - --disable-desrpc \ - --with-libcrypt \ - --with-libcrack \ - --enable-shared=no \ - --enable-static=yes \ - $(use_with pam libpam) \ - $(use_with skey libskey) \ - $(use_with selinux) \ - $(use_enable nls) \ - || die "bad configure" - emake || die "compile problem" -} - -src_install() { - make DESTDIR=${D} install || die "install problem" - dosym useradd /usr/sbin/adduser - - # lock down setuid perms #47208 - fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \ - /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms" - - # Remove libshadow and libmisc; see bug 37725 and the following - # comment from shadow's README.linux: - # Currently, libshadow.a is for internal use only, so if you see - # -lshadow in a Makefile of some other package, it is safe to - # remove it. - rm -f ${D}/lib/lib{misc,shadow}.{a,la} - - # Do not install this login, but rather the one from - # pam-login, as this one have a serious root exploit - # with pam support enabled. - use pam && rm ${D}/bin/login - - insinto /etc - # Using a securetty with devfs device names added - # (compat names kept for non-devfs compatibility) - insopts -m0600 ; doins ${FILESDIR}/securetty - insopts -m0600 ; doins etc/login.access - insopts -m0644 ; doins etc/limits - - # needed for 'adduser -D' - insinto /etc/default - insopts -m0600 - doins ${FILESDIR}/default/useradd - - # move passwd to / to help recover broke systems #64441 - mv ${D}/usr/bin/passwd ${D}/bin/ - dosym /bin/passwd /usr/bin/passwd - - if use pam ; then - insinto /etc/pam.d ; insopts -m0644 - for x in ${FILESDIR}/pam.d/*; do - [ -f ${x} ] && doins ${x} - done - cd ${FILESDIR}/pam.d - # Make sure /etc/pam.d/system-auth is the new version .. - mv ${D}/etc/pam.d/system-auth-1.1 ${D}/etc/pam.d/system-auth - newins system-auth-1.1 system-auth.new || die - for x in chage chsh chfn chpasswd newusers \ - user{add,del,mod} group{add,del,mod} ; do - newins shadow ${x} - done - - # remove manpages that pam will install for us - # and/or don't apply when using pam - - find ${D}/usr/share/man \ - '(' -name 'login.1' -o -name 'suauth.5' ')' \ - -exec rm {} \; - else - insinto /etc - insopts -m0644 - newins etc/login.defs.linux login.defs - fi - - # Remove manpages that are handled by other packages - find ${D}/usr/share/man \ - '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \ - -exec rm {} \; - - cd ${S}/doc - dodoc INSTALL README WISHLIST - docinto txt - dodoc HOWTO LSM README.* *.txt - - # ttyB0 is the PDC software console - if [ "${ARCH}" = "hppa" ] - then - echo "ttyB0" >> ${D}/etc/securetty - fi -} - -pkg_postinst() { - use pam || return 0; - local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)" - local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)" - - if [ "${CHECK1}" != "${CHECK2}" -a "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ] - then - ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth " - ewarn "is being updated automatically. Your old " - ewarn "system-auth will be backed up as:" - ewarn - ewarn " ${ROOT}etc/pam.d/system-auth.bak" - echo - - cp -pPR ${ROOT}/etc/pam.d/system-auth \ - ${ROOT}/etc/pam.d/system-auth.bak; - mv -f ${ROOT}/etc/pam.d/system-auth.new \ - ${ROOT}/etc/pam.d/system-auth - rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth - else - rm -f ${ROOT}/etc/pam.d/system-auth.new - fi -} diff --git a/sys-apps/shadow/shadow-4.0.7-r1.ebuild b/sys-apps/shadow/shadow-4.0.7-r1.ebuild deleted file mode 100644 index c749744612e9..000000000000 --- a/sys-apps/shadow/shadow-4.0.7-r1.ebuild +++ /dev/null @@ -1,228 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.7-r1.ebuild,v 1.5 2005/08/24 00:33:34 vapier Exp $ - -inherit eutils libtool flag-o-matic - -# We should remove this login after pam-0.78 goes stable. -FORCE_SYSTEMAUTH_UPDATE="no" - -DESCRIPTION="Utilities to deal with user accounts" -HOMEPAGE="http://shadow.pld.org.pl/" -SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2" - -LICENSE="BSD" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86" -IUSE="pam selinux nls skey" - -RDEPEND=">=sys-libs/cracklib-2.7-r3 - pam? ( >=sys-libs/pam-0.75-r4 ) - !pam? ( !sys-apps/pam-login ) - skey? ( app-admin/skey ) - selinux? ( sys-libs/libselinux )" -DEPEND="${RDEPEND} - >=sys-apps/portage-2.0.51-r2 - nls? ( sys-devel/gettext )" -# We moved /etc/pam.d/login to pam-login -PDEPEND="pam? ( >=sys-apps/pam-login-3.17 )" - -pkg_preinst() { - rm -f ${ROOT}/etc/pam.d/system-auth.new -} - -src_unpack() { - unpack ${A} - cd ${S} - - # uclibc support, corrects NIS usage - epatch ${FILESDIR}/shadow-4.0.4.1-nonis.patch - - # If su should not simulate a login shell, use '/bin/sh' as shell to enable - # running of commands as user with /bin/false as shell, closing bug #15015. - # *** This one could be a security hole; disable for now *** - #epatch ${FILESDIR}/${P}-nologin-run-sh.patch - - # don't install manpages if USE=-nls - epatch ${FILESDIR}/shadow-4.0.5-nls-manpages.patch - - # tweak the default login.defs - epatch ${FILESDIR}/shadow-4.0.5-login.defs.patch - - # skeychallenge call needs updating #69741 - epatch ${FILESDIR}/shadow-4.0.5-skey.patch - - # The new configure changes do not detect utmp/logdir properly - epatch ${FILESDIR}/shadow-4.0.6-fix-configure.patch - - # Tweak manpages #70880 - epatch ${FILESDIR}/shadow-4.0.6-manpages.patch - - # Fix SU_WHEEL_ONLY behavior #80345 - epatch ${FILESDIR}/${P}-iswheel.patch - - # Fix lastlog not logged for tty's - epatch ${FILESDIR}/${P}-lastlog.patch - - # Make user/group names more flexible #3485 / #22920 - epatch "${FILESDIR}"/shadow-4.0.6-dots-in-usernames.patch - epatch "${FILESDIR}"/shadow-4.0.6-long-groupnames.patch - - # Newer glibc's have a different nscd socket location #74395 - sed -i \ - -e '/_PATH_NSCDSOCKET/s:/var/run/.nscd_socket:/var/run/nscd/socket:' \ - lib/nscd.c || die "sed nscd socket" - - elibtoolize - epunt_cxx -} - -src_compile() { - append-ldflags -Wl,-z,now - tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes - econf \ - --disable-desrpc \ - --with-libcrypt \ - --with-libcrack \ - --enable-shared=no \ - --enable-static=yes \ - $(use_with pam libpam) \ - $(use_with skey libskey) \ - $(use_with selinux) \ - $(use_enable nls) \ - || die "bad configure" - emake || die "compile problem" -} - -src_install() { - make DESTDIR=${D} install || die "install problem" - dosym useradd /usr/sbin/adduser - - # lock down setuid perms #47208 - fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \ - /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms" - - # Remove libshadow and libmisc; see bug 37725 and the following - # comment from shadow's README.linux: - # Currently, libshadow.a is for internal use only, so if you see - # -lshadow in a Makefile of some other package, it is safe to - # remove it. - rm -f ${D}/lib/lib{misc,shadow}.{a,la} - - if use pam; then - # These is now shipped with pam-login, and login - # had/have a serious root exploit with pam support - # enabled. - for x in ${D}/bin/login \ - ${D}/usr/bin/faillog ${D}/usr/bin/lastlog \ - ${D}/usr/share/man/man5/faillog.5* \ - ${D}/usr/share/man/man8/lastlog.8* \ - ${D}/usr/share/man/man8/faillog.8*; do - [[ -f ${x} ]] && rm -f ${x} - done - fi - - insinto /etc - # Using a securetty with devfs device names added - # (compat names kept for non-devfs compatibility) - insopts -m0600 ; doins ${FILESDIR}/securetty - insopts -m0600 ; doins etc/login.access - insopts -m0644 ; doins etc/limits - - # needed for 'adduser -D' - insinto /etc/default - insopts -m0600 - doins ${FILESDIR}/default/useradd - - # move passwd to / to help recover broke systems #64441 - mv ${D}/usr/bin/passwd ${D}/bin/ - dosym /bin/passwd /usr/bin/passwd - - if use pam ; then - local INSTALL_SYSTEM_PAMD="yes" - - # Do not install below pam.d files if we have pam-0.78 or later - portageq has_version / '>=sys-libs/pam-0.78' && \ - INSTALL_SYSTEM_PAMD="no" - - for x in ${FILESDIR}/pam.d/*; do - case "${x##*/}" in - "login") - # We do no longer install this one, as its from - # pam-login now. - ;; - "system-auth"|"system-auth-1.1"|"other") - # These we only install if we do not have pam-0.78 - # or later. - [ "${INSTALL_SYSTEM_PAMD}" = "yes" ] && [ -f ${x} ] && \ - dopamd ${x} - ;; - *) - [ -f ${x} ] && dopamd ${x} - ;; - esac - done - for x in chage chsh chfn chpasswd newusers \ - user{add,del,mod} group{add,del,mod} ; do - newpamd ${FILESDIR}/pam.d/shadow ${x} - done - - # Only add this one if needed. - if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then - newpamd ${FILESDIR}/pam.d/system-auth-1.1 system-auth.new || \ - die "Failed to install system-auth.new!" - fi - - # remove manpages that pam will install for us - # and/or don't apply when using pam - - find ${D}/usr/share/man \ - '(' -name 'login.1' -o -name 'suauth.5' ')' \ - -exec rm {} \; - else - insinto /etc - insopts -m0644 - newins etc/login.defs.linux login.defs - fi - - # Remove manpages that are handled by other packages - find ${D}/usr/share/man \ - '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \ - -exec rm {} \; - - cd ${S}/doc - dodoc INSTALL README WISHLIST - docinto txt - dodoc HOWTO LSM README.* *.txt - - # ttyB0 is the PDC software console - if [ "${ARCH}" = "hppa" ]; then - echo "ttyB0" >> ${D}/etc/securetty - fi -} - -pkg_postinst() { - use pam || return 0; - - if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then - local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)" - local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)" - - if [ "${CHECK1}" != "${CHECK2}" ]; then - ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth " - ewarn "is being updated automatically. Your old " - ewarn "system-auth will be backed up as:" - ewarn - ewarn " ${ROOT}etc/pam.d/system-auth.bak" - echo - - cp -pPR ${ROOT}/etc/pam.d/system-auth \ - ${ROOT}/etc/pam.d/system-auth.bak; - mv -f ${ROOT}/etc/pam.d/system-auth.new \ - ${ROOT}/etc/pam.d/system-auth - rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth - else - rm -f ${ROOT}/etc/pam.d/system-auth.new - fi - fi -} diff --git a/sys-apps/shadow/shadow-4.0.7-r3.ebuild b/sys-apps/shadow/shadow-4.0.7-r3.ebuild deleted file mode 100644 index 29f06fe35490..000000000000 --- a/sys-apps/shadow/shadow-4.0.7-r3.ebuild +++ /dev/null @@ -1,238 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.7-r3.ebuild,v 1.11 2005/09/12 03:02:25 vapier Exp $ - -inherit eutils libtool toolchain-funcs flag-o-matic multilib - -# We should remove this login after pam-0.78 goes stable. -FORCE_SYSTEMAUTH_UPDATE="no" - -DESCRIPTION="Utilities to deal with user accounts" -HOMEPAGE="http://shadow.pld.org.pl/" -SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2" - -LICENSE="BSD" -SLOT="0" -KEYWORDS="alpha amd64 arm hppa ia64 m68k mips ppc ppc64 s390 sh sparc x86" -IUSE="pam selinux nls skey" - -RDEPEND=">=sys-libs/cracklib-2.7-r3 - pam? ( virtual/pam ) - !pam? ( !sys-apps/pam-login ) - skey? ( app-admin/skey ) - selinux? ( sys-libs/libselinux )" -DEPEND="${RDEPEND} - >=sys-apps/portage-2.0.51-r2 - nls? ( sys-devel/gettext )" -# We moved /etc/pam.d/login to pam-login -PDEPEND="pam? ( >=sys-apps/pam-login-3.17 )" - -pkg_preinst() { - rm -f ${ROOT}/etc/pam.d/system-auth.new -} - -src_unpack() { - unpack ${A} - cd "${S}" - - # uclibc support, corrects NIS usage - epatch "${FILESDIR}"/shadow-4.0.4.1-nonis.patch - - # If su should not simulate a login shell, use '/bin/sh' as shell to enable - # running of commands as user with /bin/false as shell, closing bug #15015. - # *** This one could be a security hole; disable for now *** - #epatch "${FILESDIR}"/${P}-nologin-run-sh.patch - - # don't install manpages if USE=-nls - epatch "${FILESDIR}"/shadow-4.0.5-nls-manpages.patch - - # tweak the default login.defs - epatch "${FILESDIR}"/shadow-4.0.5-login.defs.patch - - # skeychallenge call needs updating #69741 - epatch "${FILESDIR}"/shadow-4.0.5-skey.patch - - # The new configure changes do not detect utmp/logdir properly - epatch "${FILESDIR}"/shadow-4.0.6-fix-configure.patch - - # Tweak manpages #70880 - epatch "${FILESDIR}"/shadow-4.0.6-manpages.patch - - # Fix SU_WHEEL_ONLY behavior #80345 - epatch "${FILESDIR}"/${P}-iswheel.patch - - # Fix lastlog not logged for tty's - epatch "${FILESDIR}"/${P}-lastlog.patch - - # Make user/group names more flexible #3485 / #22920 - epatch "${FILESDIR}"/shadow-4.0.6-dots-in-usernames.patch - epatch "${FILESDIR}"/shadow-4.0.6-long-groupnames.patch - - # Newer glibc's have a different nscd socket location #74395 - epatch "${FILESDIR}"/${P}-nscd-socket-path.patch - - # Fix EPIPE failure when writing to nscd, bug #80413 - epatch "${FILESDIR}"/${P}-nscd-EPIPE-failure.patch - - elibtoolize - epunt_cxx -} - -src_compile() { - append-ldflags -Wl,-z,now - tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes - econf \ - --disable-desrpc \ - --with-libcrypt \ - --with-libcrack \ - --enable-shared=no \ - --enable-static=yes \ - $(use_with pam libpam) \ - $(use_with skey libskey) \ - $(use_with selinux) \ - $(use_enable nls) \ - || die "bad configure" - emake || die "compile problem" -} - -src_install() { - make DESTDIR="${D}" install || die "install problem" - dosym useradd /usr/sbin/adduser - - # lock down setuid perms #47208 - fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \ - /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms" - - # Remove libshadow and libmisc; see bug 37725 and the following - # comment from shadow's README.linux: - # Currently, libshadow.a is for internal use only, so if you see - # -lshadow in a Makefile of some other package, it is safe to - # remove it. - rm -f "${D}"/{,usr/}$(get_libdir)/lib{misc,shadow}.{a,la} - - if use pam; then - # These is now shipped with pam-login, and login - # had/have a serious root exploit with pam support - # enabled. - for x in "${D}"/bin/login \ - "${D}"/usr/bin/faillog "${D}"/usr/bin/lastlog \ - "${D}"/usr/share/man/man5/faillog.5* \ - "${D}"/usr/share/man/man8/lastlog.8* \ - "${D}"/usr/share/man/man8/faillog.8*; do - [[ -f ${x} ]] && rm -f ${x} - done - fi - - insinto /etc - # Using a securetty with devfs device names added - # (compat names kept for non-devfs compatibility) - insopts -m0600 ; doins "${FILESDIR}"/securetty - insopts -m0600 ; doins etc/login.access - insopts -m0644 ; doins etc/limits - # Output arch-specific cruft - case $(tc-arch) in - ppc64) echo "hvc0" >> "${D}"/etc/securetty - echo "hvsi0" >> "${D}"/etc/securetty;; - hppa) echo "ttyB0" >> "${D}"/etc/securetty;; - arm) echo "ttyFB0" >> "${D}"/etc/securetty;; - esac - - # needed for 'adduser -D' - insinto /etc/default - insopts -m0600 - doins "${FILESDIR}"/default/useradd - - # move passwd to / to help recover broke systems #64441 - mv "${D}"/usr/bin/passwd "${D}"/bin/ - dosym /bin/passwd /usr/bin/passwd - - if use pam ; then - local INSTALL_SYSTEM_PAMD="yes" - - # Do not install below pam.d files if we have pam-0.78 or later - portageq has_version / '>=sys-libs/pam-0.78' && \ - INSTALL_SYSTEM_PAMD="no" - - for x in "${FILESDIR}"/pam.d-include/*; do - case "${x##*/}" in - "login") - # We do no longer install this one, as its from - # pam-login now. - ;; - "system-auth"|"system-auth-1.1"|"other") - # These we only install if we do not have pam-0.78 - # or later. - [ "${INSTALL_SYSTEM_PAMD}" = "yes" ] && [ -f ${x} ] && \ - dopamd ${x} - ;; - "su") - # Disable support for pam_env and pam_wheel on openpam - has_version sys-libs/pam && dopamd ${x} - ;; - "su-openpam") - has_version sys-libs/openpam && newpamd ${x} su - ;; - *) - [ -f ${x} ] && dopamd ${x} - ;; - esac - done - for x in chage chsh chfn chpasswd newusers \ - user{add,del,mod} group{add,del,mod} ; do - newpamd "${FILESDIR}"/pam.d-include/shadow ${x} - done - - # Only add this one if needed. - if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then - newpamd "${FILESDIR}"/pam.d-include/system-auth-1.1 system-auth.new || \ - die "Failed to install system-auth.new!" - fi - - # remove manpages that pam will install for us - # and/or don't apply when using pam - - find "${D}"/usr/share/man \ - '(' -name 'login.1' -o -name 'suauth.5' ')' \ - -exec rm {} \; - else - insinto /etc - insopts -m0644 - newins etc/login.defs.linux login.defs - fi - - # Remove manpages that are handled by other packages - find "${D}"/usr/share/man \ - '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \ - -exec rm {} \; - - cd "${S}"/doc - dodoc INSTALL README WISHLIST - docinto txt - dodoc HOWTO LSM README.* *.txt -} - -pkg_postinst() { - use pam || return 0; - - if [ "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ]; then - local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)" - local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)" - - if [ "${CHECK1}" != "${CHECK2}" ]; then - ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth " - ewarn "is being updated automatically. Your old " - ewarn "system-auth will be backed up as:" - ewarn - ewarn " ${ROOT}etc/pam.d/system-auth.bak" - echo - - cp -pPR ${ROOT}/etc/pam.d/system-auth \ - ${ROOT}/etc/pam.d/system-auth.bak; - mv -f ${ROOT}/etc/pam.d/system-auth.new \ - ${ROOT}/etc/pam.d/system-auth - rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth - else - rm -f ${ROOT}/etc/pam.d/system-auth.new - fi - fi -} diff --git a/sys-apps/shadow/shadow-4.0.7.ebuild b/sys-apps/shadow/shadow-4.0.7.ebuild deleted file mode 100644 index 89f4286d63f7..000000000000 --- a/sys-apps/shadow/shadow-4.0.7.ebuild +++ /dev/null @@ -1,192 +0,0 @@ -# Copyright 1999-2005 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/sys-apps/shadow/shadow-4.0.7.ebuild,v 1.5 2005/08/24 00:33:34 vapier Exp $ - -inherit eutils libtool flag-o-matic - -FORCE_SYSTEMAUTH_UPDATE="no" - -DESCRIPTION="Utilities to deal with user accounts" -HOMEPAGE="http://shadow.pld.org.pl/" -SRC_URI="ftp://ftp.pld.org.pl/software/shadow/${P}.tar.bz2" - -LICENSE="BSD" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86" -IUSE="pam selinux nls skey" - -RDEPEND=">=sys-libs/cracklib-2.7-r3 - pam? ( >=sys-libs/pam-0.75-r4 sys-apps/pam-login ) - !pam? ( !sys-apps/pam-login ) - skey? ( app-admin/skey ) - selinux? ( sys-libs/libselinux )" -DEPEND="${RDEPEND} - >=sys-apps/portage-2.0.51-r2 - nls? ( sys-devel/gettext )" - -pkg_preinst() { - rm -f ${ROOT}/etc/pam.d/system-auth.new -} - -src_unpack() { - unpack ${A} - cd ${S} - - # uclibc support, corrects NIS usage - epatch ${FILESDIR}/shadow-4.0.4.1-nonis.patch - - # If su should not simulate a login shell, use '/bin/sh' as shell to enable - # running of commands as user with /bin/false as shell, closing bug #15015. - # *** This one could be a security hole; disable for now *** - #epatch ${FILESDIR}/${P}-nologin-run-sh.patch - - # don't install manpages if USE=-nls - epatch ${FILESDIR}/shadow-4.0.5-nls-manpages.patch - - # tweak the default login.defs - epatch ${FILESDIR}/shadow-4.0.5-login.defs.patch - - # skeychallenge call needs updating #69741 - epatch ${FILESDIR}/shadow-4.0.5-skey.patch - - # The new configure changes do not detect utmp/logdir properly - epatch ${FILESDIR}/shadow-4.0.6-fix-configure.patch - - # Tweak manpages #70880 - epatch ${FILESDIR}/shadow-4.0.6-manpages.patch - - # Fix SU_WHEEL_ONLY behavior #80345 - epatch ${FILESDIR}/${P}-iswheel.patch - - # Make user/group names more flexible #3485 / #22920 - epatch "${FILESDIR}"/shadow-4.0.6-dots-in-usernames.patch - epatch "${FILESDIR}"/shadow-4.0.6-long-groupnames.patch - - # Newer glibc's have a different nscd socket location #74395 - sed -i \ - -e '/_PATH_NSCDSOCKET/s:/var/run/.nscd_socket:/var/run/nscd/socket:' \ - lib/nscd.c || die "sed nscd socket" - - elibtoolize - epunt_cxx -} - -src_compile() { - append-ldflags -Wl,-z,now - tc-is-cross-compiler && export ac_cv_func_setpgrp_void=yes - econf \ - --disable-desrpc \ - --with-libcrypt \ - --with-libcrack \ - --enable-shared=no \ - --enable-static=yes \ - $(use_with pam libpam) \ - $(use_with skey libskey) \ - $(use_with selinux) \ - $(use_enable nls) \ - || die "bad configure" - emake || die "compile problem" -} - -src_install() { - make DESTDIR=${D} install || die "install problem" - dosym useradd /usr/sbin/adduser - - # lock down setuid perms #47208 - fperms go-r /bin/su /usr/bin/ch{fn,sh,age} \ - /usr/bin/{expiry,newgrp,passwd,gpasswd} || die "fperms" - - # Remove libshadow and libmisc; see bug 37725 and the following - # comment from shadow's README.linux: - # Currently, libshadow.a is for internal use only, so if you see - # -lshadow in a Makefile of some other package, it is safe to - # remove it. - rm -f ${D}/lib/lib{misc,shadow}.{a,la} - - # Do not install this login, but rather the one from - # pam-login, as this one have a serious root exploit - # with pam support enabled. - use pam && rm ${D}/bin/login - - insinto /etc - # Using a securetty with devfs device names added - # (compat names kept for non-devfs compatibility) - insopts -m0600 ; doins ${FILESDIR}/securetty - insopts -m0600 ; doins etc/login.access - insopts -m0644 ; doins etc/limits - - # needed for 'adduser -D' - insinto /etc/default - insopts -m0600 - doins ${FILESDIR}/default/useradd - - # move passwd to / to help recover broke systems #64441 - mv ${D}/usr/bin/passwd ${D}/bin/ - dosym /bin/passwd /usr/bin/passwd - - if use pam ; then - insinto /etc/pam.d ; insopts -m0644 - for x in ${FILESDIR}/pam.d/*; do - [ -f ${x} ] && doins ${x} - done - cd ${FILESDIR}/pam.d - # Make sure /etc/pam.d/system-auth is the new version .. - mv ${D}/etc/pam.d/system-auth-1.1 ${D}/etc/pam.d/system-auth - newins system-auth-1.1 system-auth.new || die - for x in chage chsh chfn chpasswd newusers \ - user{add,del,mod} group{add,del,mod} ; do - newins shadow ${x} - done - - # remove manpages that pam will install for us - # and/or don't apply when using pam - - find ${D}/usr/share/man \ - '(' -name 'login.1' -o -name 'suauth.5' ')' \ - -exec rm {} \; - else - insinto /etc - insopts -m0644 - newins etc/login.defs.linux login.defs - fi - - # Remove manpages that are handled by other packages - find ${D}/usr/share/man \ - '(' -name id.1 -o -name passwd.5 -o -name getspnam.3 ')' \ - -exec rm {} \; - - cd ${S}/doc - dodoc INSTALL README WISHLIST - docinto txt - dodoc HOWTO LSM README.* *.txt - - # ttyB0 is the PDC software console - if [ "${ARCH}" = "hppa" ] - then - echo "ttyB0" >> ${D}/etc/securetty - fi -} - -pkg_postinst() { - use pam || return 0; - local CHECK1="$(md5sum ${ROOT}/etc/pam.d/system-auth | cut -d ' ' -f 1)" - local CHECK2="$(md5sum ${ROOT}/etc/pam.d/system-auth.new | cut -d ' ' -f 1)" - - if [ "${CHECK1}" != "${CHECK2}" -a "${FORCE_SYSTEMAUTH_UPDATE}" = "yes" ] - then - ewarn "Due to a security issue, ${ROOT}etc/pam.d/system-auth " - ewarn "is being updated automatically. Your old " - ewarn "system-auth will be backed up as:" - ewarn - ewarn " ${ROOT}etc/pam.d/system-auth.bak" - echo - - cp -pPR ${ROOT}/etc/pam.d/system-auth \ - ${ROOT}/etc/pam.d/system-auth.bak; - mv -f ${ROOT}/etc/pam.d/system-auth.new \ - ${ROOT}/etc/pam.d/system-auth - rm -f ${ROOT}/etc/pam.d/._cfg????_system-auth - else - rm -f ${ROOT}/etc/pam.d/system-auth.new - fi -} |