Gentoo Archives: gentoo-commits

From: Jory Pratt <anarchy@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] proj/musl:master commit in: sys-libs/pam/files/, sys-libs/pam/
Date: Tue, 05 Jan 2016 01:50:16
Message-Id: 1451958595.b880a39368148d7f7e2906a6d07d73fe606f7c8a.anarchy@gentoo
1 commit: b880a39368148d7f7e2906a6d07d73fe606f7c8a
2 Author: Jory A. Pratt <anarchy <AT> gentoo <DOT> org>
3 AuthorDate: Tue Jan 5 01:49:35 2016 +0000
4 Commit: Jory Pratt <anarchy <AT> gentoo <DOT> org>
5 CommitDate: Tue Jan 5 01:49:55 2016 +0000
6 URL: https://gitweb.gentoo.org/proj/musl.git/commit/?id=b880a393
7
8 Add pam-1.2.1 support
9
10 sys-libs/pam/Manifest | 8 +-
11 sys-libs/pam/files/pam-1.2.1-fix-compat.patch | 21 +++
12 sys-libs/pam/files/pam-1.2.1-innetgr.patch | 54 +++++++
13 sys-libs/pam/files/pam-1.2.1-no-strndupa.patch | 46 ++++++
14 sys-libs/pam/metadata.xml | 2 -
15 sys-libs/pam/pam-1.2.1-r99.ebuild | 213 +++++++++++++++++++++++++
16 6 files changed, 341 insertions(+), 3 deletions(-)
17
18 diff --git a/sys-libs/pam/Manifest b/sys-libs/pam/Manifest
19 index db75f3a..f5f232f 100644
20 --- a/sys-libs/pam/Manifest
21 +++ b/sys-libs/pam/Manifest
22 @@ -1,7 +1,13 @@
23 AUX pam-1.1.8-doc-install.patch 6592 SHA256 83edb1f57e3fa579bde4cd9ba05966063106f0dc8e57458eea9857250b1a0fb5 SHA512 335220790207c3cb9c84420f13e5e1ea8e42e2b5402def0d0f9425ae89b37c8aef66eb9906c58eeb249bd1ca27af711015c363421d4096206ea44c4c4beea302 WHIRLPOOL ae6df174b9457bcfd85f41b72ec22054898c0c86f9bb0b170ec3e6c747140d1ac3fba3e684e2c4c9c12bb4a1429996a5bb999c9dc2c7693d5109e52f383d1fcf
24 AUX pam-1.1.8-fix-compat.patch 402 SHA256 c783156888287b44816b4a32c946af657c0a43d8926fe7bd9f54d9768ee8f699 SHA512 1178ead83fdc872a626576c620876d013cbeb6199edb704c8d91cb906b9aabc1dd02e11a27a792cb87179554dcaf3080d04478317e03cf34cea23bf42b65fe2f WHIRLPOOL 692d3df998b7c29f1a7ea4c75cbeabdb6a907d7a8ca0b9e22f9c02df883db6af6b2052f67f4778cf97667456d54abed7f89fb43ed1bcb01c9fdef42f63d2762f
25 AUX pam-1.1.8-innetgr.patch 1662 SHA256 fb609212837c67da7da033a0daa01d1c2e34166867530e6924102b655e00ebde SHA512 ca32ecdacfc5b8f1482031203b616932b646a008b02080315ea2589af5962180d4ff4339c27fe9f6a878a89f47fb69429f4ac75d67b0e70ad7765a4db1dc74d9 WHIRLPOOL 3034a8cd10f26c303546a99c0ae7de38d016d537deae81e52cc510c515d7e8b7d703bf257fac8d737588add225e125d7a90f6f35cc811eb1330cb3cc88d67048
26 +AUX pam-1.2.1-fix-compat.patch 402 SHA256 c783156888287b44816b4a32c946af657c0a43d8926fe7bd9f54d9768ee8f699 SHA512 1178ead83fdc872a626576c620876d013cbeb6199edb704c8d91cb906b9aabc1dd02e11a27a792cb87179554dcaf3080d04478317e03cf34cea23bf42b65fe2f WHIRLPOOL 692d3df998b7c29f1a7ea4c75cbeabdb6a907d7a8ca0b9e22f9c02df883db6af6b2052f67f4778cf97667456d54abed7f89fb43ed1bcb01c9fdef42f63d2762f
27 +AUX pam-1.2.1-innetgr.patch 1662 SHA256 fb609212837c67da7da033a0daa01d1c2e34166867530e6924102b655e00ebde SHA512 ca32ecdacfc5b8f1482031203b616932b646a008b02080315ea2589af5962180d4ff4339c27fe9f6a878a89f47fb69429f4ac75d67b0e70ad7765a4db1dc74d9 WHIRLPOOL 3034a8cd10f26c303546a99c0ae7de38d016d537deae81e52cc510c515d7e8b7d703bf257fac8d737588add225e125d7a90f6f35cc811eb1330cb3cc88d67048
28 +AUX pam-1.2.1-no-strndupa.patch 1452 SHA256 49bae3a1ee81d94527c15aab766e2bb5523cdc6e9ce00126d0d7b81c5b9b47a2 SHA512 967eb6d636fc5421ceea1ddd79de61d367cdd17b260ad3ad75da2e1af4ca87305f57776344ab53b23d1ec81d4d8b74874a0a05f68b70c54ba62f7ec23ad40a99 WHIRLPOOL 0cf25b0a11739493ef1b00e3d440b391ae14f88462f60a0c8d7b4d58aa7fd2ec41ed4d05a436265bbac5ab0a6529809ce2839af65b6560c4bda0b46a81cd0a92
29 DIST Linux-PAM-1.1.8-docs.tar.bz2 147887 SHA256 c4bb6a0e8307d2ab5611457fecf20fcbd6cdfff51dea524f0f06c74e4f3b4ff8 SHA512 36aa99996f8cc0640686d2af40845e18ad4b48183f18de9e1495427550ad5b61e2f59e25f6d5e8df1277cd3f171fd69bf6c49fe7c5b31f0b290e3641b65521e8 WHIRLPOOL c4b373e59fac30a29c2b16f01419492c72fae2ceb15b157418bba4899b75cf4b97bac4559b688ef8d5a231cc972f72654c4e10d63a0b72a0d6573388f7125f87
30 DIST Linux-PAM-1.1.8.tar.bz2 1148944 SHA256 c4b1f23a236d169e2496fea20721578d864ba00f7242d2b41d81050ac87a1e55 SHA512 245785ab4e187ceaab6393967352c8d2a2319c64e1e83285d0251cc02995dc2edab8e3001301b6d9f6774c441b7557d9caf4dfdf94c7cd5d44aa53ae759d9e5d WHIRLPOOL b4ec7baeb57b9d987086fe3e007e08e8b9c92b2ff86a94f8003a87c8448925835808661cd719d2445570aa8dd1c20fcbbe8bd465d73f4af8cd7edde0f650a734
31 +DIST Linux-PAM-1.2.0-docs.tar.bz2 490586 SHA256 3bc9ae398f759e372dbf4065ceed2df8b1ac5ab62c6688cb5f7849ce773df2c3 SHA512 028b7f9d6b0a5cf38f063e0f82ac3d0955e1e41d77c9f3fc803363d9ea710d71366e0a91f31b418cac397bb6639442de908fa00f02cd94cf612496d1b43c7e4c WHIRLPOOL 9a329b610d840c904050b2261e5ce34ac54232b0c7d51c12ee45c9e758ab6659ea8562e032fa9815c2beab0cfa1ea455dbfbf3cdef39d30d299a8bc5286f7a14
32 +DIST Linux-PAM-1.2.1.tar.bz2 1279523 SHA256 342b1211c0d3b203a7df2540a5b03a428a087bd8a48c17e49ae268f992b334d9 SHA512 4572aa1eaf5a1312410c74b5ed055b2592c5efe2bb82f59981da4e9e93555ad40aee3a89f446d9dc6c6af79efc04c33f739f66db9edc07e02479475a14e426da WHIRLPOOL 562917945b3b3a407955cc5bf5cd251ff7e257a94055d7cfbf06d5c2619b58d61624f16848de3512ddf61636ad8618315de3f7bd8e4e51b3b7d109adfa212c8a
33 EBUILD pam-1.1.8-r99.ebuild 6289 SHA256 d9fac218f4e3a095a1d7bbe62d65db2c73a5183681b28006972c2575a1473221 SHA512 f341057c9234e57e102c38d46bdb2670bc6e2c50e53a3175cf3e65a35bd37e633712608f458b2e59fb7ec61a41169279efdbeeb4be468d5ba9287239ca5033e1 WHIRLPOOL 074506f012d3d820951d003b1350f62f9745d841b26ad7c89a345c819734c6cfd26d69a89f4f08dfb4c3ac67bf68e9b938d630fa3887cea33dcc0a7dcde18e7c
34 -MISC metadata.xml 1218 SHA256 9ea95e669c343b7e7184d3fb3b1bbad013493bfdca0e8f184ddf4728e6b5e884 SHA512 60ae70d605f654867e4c444c7489ecd76083c286039febd71ffd18a9e120b151a47488df925ec97e6768c62e5e48068abb864a6b978abd67623fb0b6c414f248 WHIRLPOOL a96d70fd81604dd265f15672183b793d0c3f48508b317f973481c460d56ea05d917a446fd60998536f7a3d811407ca3573554f9dcdc8f45ab88dbbf7875985ab
35 +EBUILD pam-1.2.1-r99.ebuild 6733 SHA256 c897194ead8ee56e68efa98c98ed32ea13e1ac994d5bd452129bd255d24fcade SHA512 85a800b89e3859a3deba2bec8e51bf4374c44978ecb48bfee853c45f732bbba26e6a824bbc43f17aa8023b494aec0437839f1758a5afe89d49a683f387caf1d9 WHIRLPOOL 7fed197982bc3483d413b5404c76e45f48c1c2d142dc9c5f1ae66f640e35d196f0c3342d2460c0f442415a01691dfd54d857496a49e80001f90ebce3fceffcca
36 +MISC metadata.xml 1139 SHA256 bd152404f476ae44a7e577f9d823725215d2fb6220f48005a7814358e2d2d6b6 SHA512 80c06a813fbcbe5fd85b73ee03b8f7bc4aba18a6005bdb1f80de523a6f221e139f7c73e29db9c1b599e90a6eb769240b9e302d4c1e24aca32f06479712b2d5fa WHIRLPOOL 3ad745a45d828eecf45e3221aa012c6a6d99cc332dc60022dc9da0220af36737f47b4952cf84ff10cc196cda5535cadb360f4db9b56c9f7c55dd62777b26c760
37
38 diff --git a/sys-libs/pam/files/pam-1.2.1-fix-compat.patch b/sys-libs/pam/files/pam-1.2.1-fix-compat.patch
39 new file mode 100644
40 index 0000000..332f609
41 --- /dev/null
42 +++ b/sys-libs/pam/files/pam-1.2.1-fix-compat.patch
43 @@ -0,0 +1,21 @@
44 +--- a/modules/pam_lastlog/pam_lastlog.c
45 ++++ b/modules/pam_lastlog/pam_lastlog.c
46 +@@ -10,6 +10,7 @@
47 +
48 + #include "config.h"
49 +
50 ++#include <paths.h>
51 + #include <fcntl.h>
52 + #include <time.h>
53 + #include <errno.h>
54 +@@ -48,6 +49,10 @@
55 +
56 + #ifndef _PATH_BTMP
57 + # define _PATH_BTMP "/var/log/btmp"
58 ++#endif
59 ++
60 ++#ifndef __GLIBC__
61 ++#define logwtmp(args...)
62 + #endif
63 +
64 + /* XXX - time before ignoring lock. Is 1 sec enough? */
65
66 diff --git a/sys-libs/pam/files/pam-1.2.1-innetgr.patch b/sys-libs/pam/files/pam-1.2.1-innetgr.patch
67 new file mode 100644
68 index 0000000..a94fa3d
69 --- /dev/null
70 +++ b/sys-libs/pam/files/pam-1.2.1-innetgr.patch
71 @@ -0,0 +1,54 @@
72 +--- Linux-PAM-1.1.3.orig/modules/pam_group/pam_group.c
73 ++++ Linux-PAM-1.1.3/modules/pam_group/pam_group.c
74 +@@ -658,10 +658,13 @@
75 + continue;
76 + }
77 + /* If buffer starts with @, we are using netgroups */
78 ++#ifdef HAVE_INNETGR
79 + if (buffer[0] == '@')
80 + good &= innetgr (&buffer[1], NULL, user, NULL);
81 + /* otherwise, if the buffer starts with %, it's a UNIX group */
82 +- else if (buffer[0] == '%')
83 ++ else
84 ++#endif
85 ++ if (buffer[0] == '%')
86 + good &= pam_modutil_user_in_group_nam_nam(pamh, user, &buffer[1]);
87 + else
88 + good &= logic_field(pamh,user, buffer, count, is_same);
89 +--- Linux-PAM-1.1.3.orig/modules/pam_succeed_if/pam_succeed_if.c
90 ++++ Linux-PAM-1.1.3/modules/pam_succeed_if/pam_succeed_if.c
91 +@@ -233,16 +233,20 @@
92 + static int
93 + evaluate_innetgr(const char *host, const char *user, const char *group)
94 + {
95 ++#ifdef HAVE_INNETGR
96 + if (innetgr(group, host, user, NULL) == 1)
97 + return PAM_SUCCESS;
98 ++#endif
99 + return PAM_AUTH_ERR;
100 + }
101 + /* Return PAM_SUCCESS if the (host,user) is NOT in the netgroup. */
102 + static int
103 + evaluate_notinnetgr(const char *host, const char *user, const char *group)
104 + {
105 ++#ifdef HAVE_INNETGR
106 + if (innetgr(group, host, user, NULL) == 0)
107 + return PAM_SUCCESS;
108 ++#endif
109 + return PAM_AUTH_ERR;
110 + }
111 +
112 +--- Linux-PAM-1.1.3.orig/modules/pam_time/pam_time.c
113 ++++ Linux-PAM-1.1.3/modules/pam_time/pam_time.c
114 +@@ -554,9 +554,11 @@
115 + continue;
116 + }
117 + /* If buffer starts with @, we are using netgroups */
118 ++#ifdef HAVE_INNETGR
119 + if (buffer[0] == '@')
120 + good &= innetgr (&buffer[1], NULL, user, NULL);
121 + else
122 ++#endif
123 + good &= logic_field(pamh, user, buffer, count, is_same);
124 + D(("with user: %s", good ? "passes":"fails" ));
125 +
126
127 diff --git a/sys-libs/pam/files/pam-1.2.1-no-strndupa.patch b/sys-libs/pam/files/pam-1.2.1-no-strndupa.patch
128 new file mode 100644
129 index 0000000..71b233a
130 --- /dev/null
131 +++ b/sys-libs/pam/files/pam-1.2.1-no-strndupa.patch
132 @@ -0,0 +1,46 @@
133 +From fa534c4a66f5fab7a9c5f9de76c81625e0b64068 Mon Sep 17 00:00:00 2001
134 +From: Yousong Zhou <yszhou4tech@×××××.com>
135 +Date: Thu, 23 Jul 2015 20:47:29 +0800
136 +Subject: [PATCH 9/9] pam_exec: fix build when strndupa() is not available.
137 +
138 + * /modules/pam_exec/pam_exec.c: use strncpy() and local array instead
139 + of strndupa()
140 +
141 +Signed-off-by: Yousong Zhou <yszhou4tech@×××××.com>
142 +---
143 + modules/pam_exec/pam_exec.c | 9 +++++++--
144 + 1 file changed, 7 insertions(+), 2 deletions(-)
145 +
146 +diff --git a/modules/pam_exec/pam_exec.c b/modules/pam_exec/pam_exec.c
147 +index 17ba6ca..d5ccfeb 100644
148 +--- a/modules/pam_exec/pam_exec.c
149 ++++ b/modules/pam_exec/pam_exec.c
150 +@@ -102,6 +102,7 @@ call_exec (const char *pam_type, pam_handle_t *pamh,
151 + int use_stdout = 0;
152 + int optargc;
153 + const char *logfile = NULL;
154 ++ char *_authtok[PAM_MAX_RESP_SIZE];
155 + const char *authtok = NULL;
156 + pid_t pid;
157 + int fds[2];
158 +@@ -178,11 +179,15 @@ call_exec (const char *pam_type, pam_handle_t *pamh,
159 + }
160 +
161 + pam_set_item (pamh, PAM_AUTHTOK, resp);
162 +- authtok = strndupa (resp, PAM_MAX_RESP_SIZE);
163 ++ _authtok[PAM_MAX_RESP_SIZE-1] = '\0';
164 ++ authtok = strncpy(_authtok, resp, PAM_MAX_RESP_SIZE-1);
165 + _pam_drop (resp);
166 + }
167 + else
168 +- authtok = strndupa (void_pass, PAM_MAX_RESP_SIZE);
169 ++ {
170 ++ _authtok[PAM_MAX_RESP_SIZE-1] = '\0';
171 ++ authtok = strncpy(_authtok, void_pass, PAM_MAX_RESP_SIZE-1);
172 ++ }
173 +
174 + if (pipe(fds) != 0)
175 + {
176 +--
177 +1.7.10.4
178 +
179
180 diff --git a/sys-libs/pam/metadata.xml b/sys-libs/pam/metadata.xml
181 index 4ee5aec..f69d9e3 100644
182 --- a/sys-libs/pam/metadata.xml
183 +++ b/sys-libs/pam/metadata.xml
184 @@ -6,8 +6,6 @@
185 <email>pam-bugs@g.o</email>
186 </maintainer>
187 <use>
188 - <flag name='audit'>Enable support for <pkg>sys-process/audit</pkg></flag>
189 -
190 <flag name="berkdb">
191 Build the pam_userdb module, that allows to authenticate users
192 against a Berkeley DB file. Please note that enabling this USE
193
194 diff --git a/sys-libs/pam/pam-1.2.1-r99.ebuild b/sys-libs/pam/pam-1.2.1-r99.ebuild
195 new file mode 100644
196 index 0000000..21f2456
197 --- /dev/null
198 +++ b/sys-libs/pam/pam-1.2.1-r99.ebuild
199 @@ -0,0 +1,213 @@
200 +# Copyright 1999-2015 Gentoo Foundation
201 +# Distributed under the terms of the GNU General Public License v2
202 +# $Id$
203 +
204 +EAPI=5
205 +
206 +inherit libtool multilib multilib-minimal eutils pam toolchain-funcs flag-o-matic db-use fcaps
207 +
208 +MY_PN="Linux-PAM"
209 +MY_P="${MY_PN}-${PV}"
210 +
211 +DESCRIPTION="Linux-PAM (Pluggable Authentication Modules)"
212 +HOMEPAGE="http://www.linux-pam.org/ https://fedorahosted.org/linux-pam/"
213 +SRC_URI="http://www.linux-pam.org/library/${MY_P}.tar.bz2
214 + http://www.linux-pam.org/documentation/${MY_PN}-1.2.0-docs.tar.bz2"
215 +
216 +LICENSE="|| ( BSD GPL-2 )"
217 +SLOT="0"
218 +KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~ia64-linux ~x86-linux"
219 +IUSE="audit berkdb cracklib debug nis nls +pie selinux test vim-syntax"
220 +
221 +RDEPEND="nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] )
222 + cracklib? ( >=sys-libs/cracklib-2.9.1-r1[${MULTILIB_USEDEP}] )
223 + audit? ( >=sys-process/audit-2.2.2[${MULTILIB_USEDEP}] )
224 + selinux? ( >=sys-libs/libselinux-2.2.2-r4[${MULTILIB_USEDEP}] )
225 + berkdb? ( >=sys-libs/db-4.8.30-r1[${MULTILIB_USEDEP}] )
226 + nis? ( >=net-libs/libtirpc-0.2.4-r2[${MULTILIB_USEDEP}] )"
227 +DEPEND="${RDEPEND}
228 + >=sys-devel/libtool-2
229 + >=sys-devel/flex-2.5.39-r1[${MULTILIB_USEDEP}]
230 + nls? ( sys-devel/gettext )
231 + nis? ( >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] )"
232 +PDEPEND="sys-auth/pambase
233 + vim-syntax? ( app-vim/pam-syntax )"
234 +RDEPEND="${RDEPEND}
235 + !<sys-apps/openrc-0.11.8
236 + !sys-auth/openpam
237 + !sys-auth/pam_userdb
238 + abi_x86_32? (
239 + !<=app-emulation/emul-linux-x86-baselibs-20140508-r7
240 + !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)]
241 + )"
242 +
243 +S="${WORKDIR}/${MY_P}"
244 +
245 +check_old_modules() {
246 + local retval="0"
247 +
248 + if sed -e 's:#.*::' "${EROOT}"/etc/pam.d/* 2>/dev/null | fgrep -q pam_stack.so; then
249 + eerror ""
250 + eerror "Your current setup is using the pam_stack module."
251 + eerror "This module is deprecated and no longer supported, and since version"
252 + eerror "0.99 is no longer installed, nor provided by any other package."
253 + eerror "The package will be built (to allow binary package builds), but will"
254 + eerror "not be installed."
255 + eerror "Please replace pam_stack usage with proper include directive usage,"
256 + eerror "following the PAM Upgrade guide at the following URL"
257 + eerror " https://www.gentoo.org/proj/en/base/pam/upgrade-0.99.xml"
258 + eerror ""
259 +
260 + retval=1
261 + fi
262 +
263 + if sed -e 's:#.*::' "${EROOT}"/etc/pam.d/* 2>/dev/null | egrep -q 'pam_(pwdb|console)'; then
264 + eerror ""
265 + eerror "Your current setup is using one or more of the following modules,"
266 + eerror "that are not built or supported anymore:"
267 + eerror "pam_pwdb, pam_console"
268 + eerror "If you are in real need for these modules, please contact the maintainers"
269 + eerror "of PAM through https://bugs.gentoo.org/ providing information about its"
270 + eerror "use cases."
271 + eerror "Please also make sure to read the PAM Upgrade guide at the following URL:"
272 + eerror " https://www.gentoo.org/proj/en/base/pam/upgrade-0.99.xml"
273 + eerror ""
274 +
275 + retval=1
276 + fi
277 +
278 + return ${retval}
279 +}
280 +
281 +pkg_pretend() {
282 + # do not error out, this is just a warning, one could build a binpkg
283 + # with old modules enabled.
284 + check_old_modules
285 +}
286 +
287 +src_unpack() {
288 + # Upstream didn't release a new doc tarball (since nothing changed?).
289 + unpack ${MY_PN}-1.2.0-docs.tar.bz2
290 + # Update timestamps to avoid regenerating at build time. #569338
291 + find -type f -exec touch -r "${T}" {} + || die
292 + mv Linux-PAM-1.2.{0,1} || die
293 + unpack ${MY_P}.tar.bz2
294 +}
295 +
296 +src_prepare() {
297 + epatch "${FILESDIR}"/${PN}-1.2.1-fix-compat.patch
298 + epatch "${FILESDIR}"/${PN}-1.2.1-innetgr.patch
299 + epatch "${FILESDIR}"/${PN}-1.2.1-no-strndupa.patch
300 +
301 + # disable insecure modules (musl-libc doesn't implement the functions anyway)
302 + use elibc_musl && sed -e 's/pam_rhosts//g' -i modules/Makefile.am modules/Makefile.in
303 + elibtoolize
304 +}
305 +
306 +multilib_src_configure() {
307 + # Do not let user's BROWSER setting mess us up. #549684
308 + unset BROWSER
309 +
310 + # Disable automatic detection of libxcrypt; we _don't_ want the
311 + # user to link libxcrypt in by default, since we won't track the
312 + # dependency and allow to break PAM this way.
313 + export ac_cv_header_xcrypt_h=no
314 +
315 + # Disable automatic detection of libcrypt
316 + use elibc_musl && export ac_cv_search_crypt=no
317 +
318 + local myconf=(
319 + --docdir='$(datarootdir)'/doc/${PF}
320 + --htmldir='$(docdir)/html'
321 + --libdir='$(prefix)'/$(get_libdir)
322 + --enable-securedir="${EPREFIX}"/$(get_libdir)/security
323 + --enable-isadir='.' #464016
324 + $(use_enable nls)
325 + $(use_enable selinux)
326 + $(use_enable cracklib)
327 + $(use_enable audit)
328 + $(use_enable debug)
329 + $(use_enable berkdb db)
330 + $(use_enable nis)
331 + $(use_enable pie)
332 + --with-db-uniquename=-$(db_findver sys-libs/db)
333 + --disable-prelude
334 + )
335 +
336 + ECONF_SOURCE=${S} \
337 + econf "${myconf[@]}"
338 +}
339 +
340 +multilib_src_compile() {
341 + emake sepermitlockdir="${EPREFIX}/run/sepermit"
342 +}
343 +
344 +multilib_src_install() {
345 + emake DESTDIR="${D}" install \
346 + sepermitlockdir="${EPREFIX}/run/sepermit"
347 +
348 + local prefix
349 + if multilib_is_native_abi; then
350 + prefix=
351 + gen_usr_ldscript -a pam pamc pam_misc
352 + else
353 + prefix=/usr
354 + fi
355 +
356 + # create extra symlinks just in case something depends on them...
357 + local lib
358 + for lib in pam pamc pam_misc; do
359 + if ! [[ -f "${ED}"${prefix}/$(get_libdir)/lib${lib}$(get_libname) ]]; then
360 + dosym lib${lib}$(get_libname 0) ${prefix}/$(get_libdir)/lib${lib}$(get_libname)
361 + fi
362 + done
363 +}
364 +
365 +DOCS=( CHANGELOG ChangeLog README AUTHORS Copyright NEWS )
366 +
367 +multilib_src_install_all() {
368 + einstalldocs
369 + prune_libtool_files --all
370 +
371 + docinto modules
372 + local dir
373 + for dir in modules/pam_*; do
374 + newdoc "${dir}"/README README."$(basename "${dir}")"
375 + done
376 +
377 + if use selinux; then
378 + dodir /usr/lib/tmpfiles.d
379 + cat - > "${D}"/usr/lib/tmpfiles.d/${CATEGORY}:${PN}:${SLOT}.conf <<EOF
380 +d /run/sepermit 0755 root root
381 +EOF
382 + fi
383 +}
384 +
385 +pkg_preinst() {
386 + check_old_modules || die "deprecated PAM modules still used"
387 +}
388 +
389 +pkg_postinst() {
390 + ewarn "Some software with pre-loaded PAM libraries might experience"
391 + ewarn "warnings or failures related to missing symbols and/or versions"
392 + ewarn "after any update. While unfortunate this is a limit of the"
393 + ewarn "implementation of PAM and the software, and it requires you to"
394 + ewarn "restart the software manually after the update."
395 + ewarn ""
396 + ewarn "You can get a list of such software running a command like"
397 + ewarn " lsof / | egrep -i 'del.*libpam\\.so'"
398 + ewarn ""
399 + ewarn "Alternatively, simply reboot your system."
400 + if [[ -x "${EROOT}"/var/log/tallylog ]] ; then
401 + elog ""
402 + elog "Because of a bug present up to version 1.1.1-r2, you have"
403 + elog "an executable /var/log/tallylog file. You can safely"
404 + elog "correct it by running the command"
405 + elog " chmod -x /var/log/tallylog"
406 + elog ""
407 + fi
408 +
409 + # The pam_unix module needs to check the password of the user which requires
410 + # read access to /etc/shadow only.
411 + fcaps cap_dac_override sbin/unix_chkpwd
412 +}