1 |
commit: b880a39368148d7f7e2906a6d07d73fe606f7c8a |
2 |
Author: Jory A. Pratt <anarchy <AT> gentoo <DOT> org> |
3 |
AuthorDate: Tue Jan 5 01:49:35 2016 +0000 |
4 |
Commit: Jory Pratt <anarchy <AT> gentoo <DOT> org> |
5 |
CommitDate: Tue Jan 5 01:49:55 2016 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/musl.git/commit/?id=b880a393 |
7 |
|
8 |
Add pam-1.2.1 support |
9 |
|
10 |
sys-libs/pam/Manifest | 8 +- |
11 |
sys-libs/pam/files/pam-1.2.1-fix-compat.patch | 21 +++ |
12 |
sys-libs/pam/files/pam-1.2.1-innetgr.patch | 54 +++++++ |
13 |
sys-libs/pam/files/pam-1.2.1-no-strndupa.patch | 46 ++++++ |
14 |
sys-libs/pam/metadata.xml | 2 - |
15 |
sys-libs/pam/pam-1.2.1-r99.ebuild | 213 +++++++++++++++++++++++++ |
16 |
6 files changed, 341 insertions(+), 3 deletions(-) |
17 |
|
18 |
diff --git a/sys-libs/pam/Manifest b/sys-libs/pam/Manifest |
19 |
index db75f3a..f5f232f 100644 |
20 |
--- a/sys-libs/pam/Manifest |
21 |
+++ b/sys-libs/pam/Manifest |
22 |
@@ -1,7 +1,13 @@ |
23 |
AUX pam-1.1.8-doc-install.patch 6592 SHA256 83edb1f57e3fa579bde4cd9ba05966063106f0dc8e57458eea9857250b1a0fb5 SHA512 335220790207c3cb9c84420f13e5e1ea8e42e2b5402def0d0f9425ae89b37c8aef66eb9906c58eeb249bd1ca27af711015c363421d4096206ea44c4c4beea302 WHIRLPOOL ae6df174b9457bcfd85f41b72ec22054898c0c86f9bb0b170ec3e6c747140d1ac3fba3e684e2c4c9c12bb4a1429996a5bb999c9dc2c7693d5109e52f383d1fcf |
24 |
AUX pam-1.1.8-fix-compat.patch 402 SHA256 c783156888287b44816b4a32c946af657c0a43d8926fe7bd9f54d9768ee8f699 SHA512 1178ead83fdc872a626576c620876d013cbeb6199edb704c8d91cb906b9aabc1dd02e11a27a792cb87179554dcaf3080d04478317e03cf34cea23bf42b65fe2f WHIRLPOOL 692d3df998b7c29f1a7ea4c75cbeabdb6a907d7a8ca0b9e22f9c02df883db6af6b2052f67f4778cf97667456d54abed7f89fb43ed1bcb01c9fdef42f63d2762f |
25 |
AUX pam-1.1.8-innetgr.patch 1662 SHA256 fb609212837c67da7da033a0daa01d1c2e34166867530e6924102b655e00ebde SHA512 ca32ecdacfc5b8f1482031203b616932b646a008b02080315ea2589af5962180d4ff4339c27fe9f6a878a89f47fb69429f4ac75d67b0e70ad7765a4db1dc74d9 WHIRLPOOL 3034a8cd10f26c303546a99c0ae7de38d016d537deae81e52cc510c515d7e8b7d703bf257fac8d737588add225e125d7a90f6f35cc811eb1330cb3cc88d67048 |
26 |
+AUX pam-1.2.1-fix-compat.patch 402 SHA256 c783156888287b44816b4a32c946af657c0a43d8926fe7bd9f54d9768ee8f699 SHA512 1178ead83fdc872a626576c620876d013cbeb6199edb704c8d91cb906b9aabc1dd02e11a27a792cb87179554dcaf3080d04478317e03cf34cea23bf42b65fe2f WHIRLPOOL 692d3df998b7c29f1a7ea4c75cbeabdb6a907d7a8ca0b9e22f9c02df883db6af6b2052f67f4778cf97667456d54abed7f89fb43ed1bcb01c9fdef42f63d2762f |
27 |
+AUX pam-1.2.1-innetgr.patch 1662 SHA256 fb609212837c67da7da033a0daa01d1c2e34166867530e6924102b655e00ebde SHA512 ca32ecdacfc5b8f1482031203b616932b646a008b02080315ea2589af5962180d4ff4339c27fe9f6a878a89f47fb69429f4ac75d67b0e70ad7765a4db1dc74d9 WHIRLPOOL 3034a8cd10f26c303546a99c0ae7de38d016d537deae81e52cc510c515d7e8b7d703bf257fac8d737588add225e125d7a90f6f35cc811eb1330cb3cc88d67048 |
28 |
+AUX pam-1.2.1-no-strndupa.patch 1452 SHA256 49bae3a1ee81d94527c15aab766e2bb5523cdc6e9ce00126d0d7b81c5b9b47a2 SHA512 967eb6d636fc5421ceea1ddd79de61d367cdd17b260ad3ad75da2e1af4ca87305f57776344ab53b23d1ec81d4d8b74874a0a05f68b70c54ba62f7ec23ad40a99 WHIRLPOOL 0cf25b0a11739493ef1b00e3d440b391ae14f88462f60a0c8d7b4d58aa7fd2ec41ed4d05a436265bbac5ab0a6529809ce2839af65b6560c4bda0b46a81cd0a92 |
29 |
DIST Linux-PAM-1.1.8-docs.tar.bz2 147887 SHA256 c4bb6a0e8307d2ab5611457fecf20fcbd6cdfff51dea524f0f06c74e4f3b4ff8 SHA512 36aa99996f8cc0640686d2af40845e18ad4b48183f18de9e1495427550ad5b61e2f59e25f6d5e8df1277cd3f171fd69bf6c49fe7c5b31f0b290e3641b65521e8 WHIRLPOOL c4b373e59fac30a29c2b16f01419492c72fae2ceb15b157418bba4899b75cf4b97bac4559b688ef8d5a231cc972f72654c4e10d63a0b72a0d6573388f7125f87 |
30 |
DIST Linux-PAM-1.1.8.tar.bz2 1148944 SHA256 c4b1f23a236d169e2496fea20721578d864ba00f7242d2b41d81050ac87a1e55 SHA512 245785ab4e187ceaab6393967352c8d2a2319c64e1e83285d0251cc02995dc2edab8e3001301b6d9f6774c441b7557d9caf4dfdf94c7cd5d44aa53ae759d9e5d WHIRLPOOL b4ec7baeb57b9d987086fe3e007e08e8b9c92b2ff86a94f8003a87c8448925835808661cd719d2445570aa8dd1c20fcbbe8bd465d73f4af8cd7edde0f650a734 |
31 |
+DIST Linux-PAM-1.2.0-docs.tar.bz2 490586 SHA256 3bc9ae398f759e372dbf4065ceed2df8b1ac5ab62c6688cb5f7849ce773df2c3 SHA512 028b7f9d6b0a5cf38f063e0f82ac3d0955e1e41d77c9f3fc803363d9ea710d71366e0a91f31b418cac397bb6639442de908fa00f02cd94cf612496d1b43c7e4c WHIRLPOOL 9a329b610d840c904050b2261e5ce34ac54232b0c7d51c12ee45c9e758ab6659ea8562e032fa9815c2beab0cfa1ea455dbfbf3cdef39d30d299a8bc5286f7a14 |
32 |
+DIST Linux-PAM-1.2.1.tar.bz2 1279523 SHA256 342b1211c0d3b203a7df2540a5b03a428a087bd8a48c17e49ae268f992b334d9 SHA512 4572aa1eaf5a1312410c74b5ed055b2592c5efe2bb82f59981da4e9e93555ad40aee3a89f446d9dc6c6af79efc04c33f739f66db9edc07e02479475a14e426da WHIRLPOOL 562917945b3b3a407955cc5bf5cd251ff7e257a94055d7cfbf06d5c2619b58d61624f16848de3512ddf61636ad8618315de3f7bd8e4e51b3b7d109adfa212c8a |
33 |
EBUILD pam-1.1.8-r99.ebuild 6289 SHA256 d9fac218f4e3a095a1d7bbe62d65db2c73a5183681b28006972c2575a1473221 SHA512 f341057c9234e57e102c38d46bdb2670bc6e2c50e53a3175cf3e65a35bd37e633712608f458b2e59fb7ec61a41169279efdbeeb4be468d5ba9287239ca5033e1 WHIRLPOOL 074506f012d3d820951d003b1350f62f9745d841b26ad7c89a345c819734c6cfd26d69a89f4f08dfb4c3ac67bf68e9b938d630fa3887cea33dcc0a7dcde18e7c |
34 |
-MISC metadata.xml 1218 SHA256 9ea95e669c343b7e7184d3fb3b1bbad013493bfdca0e8f184ddf4728e6b5e884 SHA512 60ae70d605f654867e4c444c7489ecd76083c286039febd71ffd18a9e120b151a47488df925ec97e6768c62e5e48068abb864a6b978abd67623fb0b6c414f248 WHIRLPOOL a96d70fd81604dd265f15672183b793d0c3f48508b317f973481c460d56ea05d917a446fd60998536f7a3d811407ca3573554f9dcdc8f45ab88dbbf7875985ab |
35 |
+EBUILD pam-1.2.1-r99.ebuild 6733 SHA256 c897194ead8ee56e68efa98c98ed32ea13e1ac994d5bd452129bd255d24fcade SHA512 85a800b89e3859a3deba2bec8e51bf4374c44978ecb48bfee853c45f732bbba26e6a824bbc43f17aa8023b494aec0437839f1758a5afe89d49a683f387caf1d9 WHIRLPOOL 7fed197982bc3483d413b5404c76e45f48c1c2d142dc9c5f1ae66f640e35d196f0c3342d2460c0f442415a01691dfd54d857496a49e80001f90ebce3fceffcca |
36 |
+MISC metadata.xml 1139 SHA256 bd152404f476ae44a7e577f9d823725215d2fb6220f48005a7814358e2d2d6b6 SHA512 80c06a813fbcbe5fd85b73ee03b8f7bc4aba18a6005bdb1f80de523a6f221e139f7c73e29db9c1b599e90a6eb769240b9e302d4c1e24aca32f06479712b2d5fa WHIRLPOOL 3ad745a45d828eecf45e3221aa012c6a6d99cc332dc60022dc9da0220af36737f47b4952cf84ff10cc196cda5535cadb360f4db9b56c9f7c55dd62777b26c760 |
37 |
|
38 |
diff --git a/sys-libs/pam/files/pam-1.2.1-fix-compat.patch b/sys-libs/pam/files/pam-1.2.1-fix-compat.patch |
39 |
new file mode 100644 |
40 |
index 0000000..332f609 |
41 |
--- /dev/null |
42 |
+++ b/sys-libs/pam/files/pam-1.2.1-fix-compat.patch |
43 |
@@ -0,0 +1,21 @@ |
44 |
+--- a/modules/pam_lastlog/pam_lastlog.c |
45 |
++++ b/modules/pam_lastlog/pam_lastlog.c |
46 |
+@@ -10,6 +10,7 @@ |
47 |
+ |
48 |
+ #include "config.h" |
49 |
+ |
50 |
++#include <paths.h> |
51 |
+ #include <fcntl.h> |
52 |
+ #include <time.h> |
53 |
+ #include <errno.h> |
54 |
+@@ -48,6 +49,10 @@ |
55 |
+ |
56 |
+ #ifndef _PATH_BTMP |
57 |
+ # define _PATH_BTMP "/var/log/btmp" |
58 |
++#endif |
59 |
++ |
60 |
++#ifndef __GLIBC__ |
61 |
++#define logwtmp(args...) |
62 |
+ #endif |
63 |
+ |
64 |
+ /* XXX - time before ignoring lock. Is 1 sec enough? */ |
65 |
|
66 |
diff --git a/sys-libs/pam/files/pam-1.2.1-innetgr.patch b/sys-libs/pam/files/pam-1.2.1-innetgr.patch |
67 |
new file mode 100644 |
68 |
index 0000000..a94fa3d |
69 |
--- /dev/null |
70 |
+++ b/sys-libs/pam/files/pam-1.2.1-innetgr.patch |
71 |
@@ -0,0 +1,54 @@ |
72 |
+--- Linux-PAM-1.1.3.orig/modules/pam_group/pam_group.c |
73 |
++++ Linux-PAM-1.1.3/modules/pam_group/pam_group.c |
74 |
+@@ -658,10 +658,13 @@ |
75 |
+ continue; |
76 |
+ } |
77 |
+ /* If buffer starts with @, we are using netgroups */ |
78 |
++#ifdef HAVE_INNETGR |
79 |
+ if (buffer[0] == '@') |
80 |
+ good &= innetgr (&buffer[1], NULL, user, NULL); |
81 |
+ /* otherwise, if the buffer starts with %, it's a UNIX group */ |
82 |
+- else if (buffer[0] == '%') |
83 |
++ else |
84 |
++#endif |
85 |
++ if (buffer[0] == '%') |
86 |
+ good &= pam_modutil_user_in_group_nam_nam(pamh, user, &buffer[1]); |
87 |
+ else |
88 |
+ good &= logic_field(pamh,user, buffer, count, is_same); |
89 |
+--- Linux-PAM-1.1.3.orig/modules/pam_succeed_if/pam_succeed_if.c |
90 |
++++ Linux-PAM-1.1.3/modules/pam_succeed_if/pam_succeed_if.c |
91 |
+@@ -233,16 +233,20 @@ |
92 |
+ static int |
93 |
+ evaluate_innetgr(const char *host, const char *user, const char *group) |
94 |
+ { |
95 |
++#ifdef HAVE_INNETGR |
96 |
+ if (innetgr(group, host, user, NULL) == 1) |
97 |
+ return PAM_SUCCESS; |
98 |
++#endif |
99 |
+ return PAM_AUTH_ERR; |
100 |
+ } |
101 |
+ /* Return PAM_SUCCESS if the (host,user) is NOT in the netgroup. */ |
102 |
+ static int |
103 |
+ evaluate_notinnetgr(const char *host, const char *user, const char *group) |
104 |
+ { |
105 |
++#ifdef HAVE_INNETGR |
106 |
+ if (innetgr(group, host, user, NULL) == 0) |
107 |
+ return PAM_SUCCESS; |
108 |
++#endif |
109 |
+ return PAM_AUTH_ERR; |
110 |
+ } |
111 |
+ |
112 |
+--- Linux-PAM-1.1.3.orig/modules/pam_time/pam_time.c |
113 |
++++ Linux-PAM-1.1.3/modules/pam_time/pam_time.c |
114 |
+@@ -554,9 +554,11 @@ |
115 |
+ continue; |
116 |
+ } |
117 |
+ /* If buffer starts with @, we are using netgroups */ |
118 |
++#ifdef HAVE_INNETGR |
119 |
+ if (buffer[0] == '@') |
120 |
+ good &= innetgr (&buffer[1], NULL, user, NULL); |
121 |
+ else |
122 |
++#endif |
123 |
+ good &= logic_field(pamh, user, buffer, count, is_same); |
124 |
+ D(("with user: %s", good ? "passes":"fails" )); |
125 |
+ |
126 |
|
127 |
diff --git a/sys-libs/pam/files/pam-1.2.1-no-strndupa.patch b/sys-libs/pam/files/pam-1.2.1-no-strndupa.patch |
128 |
new file mode 100644 |
129 |
index 0000000..71b233a |
130 |
--- /dev/null |
131 |
+++ b/sys-libs/pam/files/pam-1.2.1-no-strndupa.patch |
132 |
@@ -0,0 +1,46 @@ |
133 |
+From fa534c4a66f5fab7a9c5f9de76c81625e0b64068 Mon Sep 17 00:00:00 2001 |
134 |
+From: Yousong Zhou <yszhou4tech@×××××.com> |
135 |
+Date: Thu, 23 Jul 2015 20:47:29 +0800 |
136 |
+Subject: [PATCH 9/9] pam_exec: fix build when strndupa() is not available. |
137 |
+ |
138 |
+ * /modules/pam_exec/pam_exec.c: use strncpy() and local array instead |
139 |
+ of strndupa() |
140 |
+ |
141 |
+Signed-off-by: Yousong Zhou <yszhou4tech@×××××.com> |
142 |
+--- |
143 |
+ modules/pam_exec/pam_exec.c | 9 +++++++-- |
144 |
+ 1 file changed, 7 insertions(+), 2 deletions(-) |
145 |
+ |
146 |
+diff --git a/modules/pam_exec/pam_exec.c b/modules/pam_exec/pam_exec.c |
147 |
+index 17ba6ca..d5ccfeb 100644 |
148 |
+--- a/modules/pam_exec/pam_exec.c |
149 |
++++ b/modules/pam_exec/pam_exec.c |
150 |
+@@ -102,6 +102,7 @@ call_exec (const char *pam_type, pam_handle_t *pamh, |
151 |
+ int use_stdout = 0; |
152 |
+ int optargc; |
153 |
+ const char *logfile = NULL; |
154 |
++ char *_authtok[PAM_MAX_RESP_SIZE]; |
155 |
+ const char *authtok = NULL; |
156 |
+ pid_t pid; |
157 |
+ int fds[2]; |
158 |
+@@ -178,11 +179,15 @@ call_exec (const char *pam_type, pam_handle_t *pamh, |
159 |
+ } |
160 |
+ |
161 |
+ pam_set_item (pamh, PAM_AUTHTOK, resp); |
162 |
+- authtok = strndupa (resp, PAM_MAX_RESP_SIZE); |
163 |
++ _authtok[PAM_MAX_RESP_SIZE-1] = '\0'; |
164 |
++ authtok = strncpy(_authtok, resp, PAM_MAX_RESP_SIZE-1); |
165 |
+ _pam_drop (resp); |
166 |
+ } |
167 |
+ else |
168 |
+- authtok = strndupa (void_pass, PAM_MAX_RESP_SIZE); |
169 |
++ { |
170 |
++ _authtok[PAM_MAX_RESP_SIZE-1] = '\0'; |
171 |
++ authtok = strncpy(_authtok, void_pass, PAM_MAX_RESP_SIZE-1); |
172 |
++ } |
173 |
+ |
174 |
+ if (pipe(fds) != 0) |
175 |
+ { |
176 |
+-- |
177 |
+1.7.10.4 |
178 |
+ |
179 |
|
180 |
diff --git a/sys-libs/pam/metadata.xml b/sys-libs/pam/metadata.xml |
181 |
index 4ee5aec..f69d9e3 100644 |
182 |
--- a/sys-libs/pam/metadata.xml |
183 |
+++ b/sys-libs/pam/metadata.xml |
184 |
@@ -6,8 +6,6 @@ |
185 |
<email>pam-bugs@g.o</email> |
186 |
</maintainer> |
187 |
<use> |
188 |
- <flag name='audit'>Enable support for <pkg>sys-process/audit</pkg></flag> |
189 |
- |
190 |
<flag name="berkdb"> |
191 |
Build the pam_userdb module, that allows to authenticate users |
192 |
against a Berkeley DB file. Please note that enabling this USE |
193 |
|
194 |
diff --git a/sys-libs/pam/pam-1.2.1-r99.ebuild b/sys-libs/pam/pam-1.2.1-r99.ebuild |
195 |
new file mode 100644 |
196 |
index 0000000..21f2456 |
197 |
--- /dev/null |
198 |
+++ b/sys-libs/pam/pam-1.2.1-r99.ebuild |
199 |
@@ -0,0 +1,213 @@ |
200 |
+# Copyright 1999-2015 Gentoo Foundation |
201 |
+# Distributed under the terms of the GNU General Public License v2 |
202 |
+# $Id$ |
203 |
+ |
204 |
+EAPI=5 |
205 |
+ |
206 |
+inherit libtool multilib multilib-minimal eutils pam toolchain-funcs flag-o-matic db-use fcaps |
207 |
+ |
208 |
+MY_PN="Linux-PAM" |
209 |
+MY_P="${MY_PN}-${PV}" |
210 |
+ |
211 |
+DESCRIPTION="Linux-PAM (Pluggable Authentication Modules)" |
212 |
+HOMEPAGE="http://www.linux-pam.org/ https://fedorahosted.org/linux-pam/" |
213 |
+SRC_URI="http://www.linux-pam.org/library/${MY_P}.tar.bz2 |
214 |
+ http://www.linux-pam.org/documentation/${MY_PN}-1.2.0-docs.tar.bz2" |
215 |
+ |
216 |
+LICENSE="|| ( BSD GPL-2 )" |
217 |
+SLOT="0" |
218 |
+KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~ia64-linux ~x86-linux" |
219 |
+IUSE="audit berkdb cracklib debug nis nls +pie selinux test vim-syntax" |
220 |
+ |
221 |
+RDEPEND="nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) |
222 |
+ cracklib? ( >=sys-libs/cracklib-2.9.1-r1[${MULTILIB_USEDEP}] ) |
223 |
+ audit? ( >=sys-process/audit-2.2.2[${MULTILIB_USEDEP}] ) |
224 |
+ selinux? ( >=sys-libs/libselinux-2.2.2-r4[${MULTILIB_USEDEP}] ) |
225 |
+ berkdb? ( >=sys-libs/db-4.8.30-r1[${MULTILIB_USEDEP}] ) |
226 |
+ nis? ( >=net-libs/libtirpc-0.2.4-r2[${MULTILIB_USEDEP}] )" |
227 |
+DEPEND="${RDEPEND} |
228 |
+ >=sys-devel/libtool-2 |
229 |
+ >=sys-devel/flex-2.5.39-r1[${MULTILIB_USEDEP}] |
230 |
+ nls? ( sys-devel/gettext ) |
231 |
+ nis? ( >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] )" |
232 |
+PDEPEND="sys-auth/pambase |
233 |
+ vim-syntax? ( app-vim/pam-syntax )" |
234 |
+RDEPEND="${RDEPEND} |
235 |
+ !<sys-apps/openrc-0.11.8 |
236 |
+ !sys-auth/openpam |
237 |
+ !sys-auth/pam_userdb |
238 |
+ abi_x86_32? ( |
239 |
+ !<=app-emulation/emul-linux-x86-baselibs-20140508-r7 |
240 |
+ !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] |
241 |
+ )" |
242 |
+ |
243 |
+S="${WORKDIR}/${MY_P}" |
244 |
+ |
245 |
+check_old_modules() { |
246 |
+ local retval="0" |
247 |
+ |
248 |
+ if sed -e 's:#.*::' "${EROOT}"/etc/pam.d/* 2>/dev/null | fgrep -q pam_stack.so; then |
249 |
+ eerror "" |
250 |
+ eerror "Your current setup is using the pam_stack module." |
251 |
+ eerror "This module is deprecated and no longer supported, and since version" |
252 |
+ eerror "0.99 is no longer installed, nor provided by any other package." |
253 |
+ eerror "The package will be built (to allow binary package builds), but will" |
254 |
+ eerror "not be installed." |
255 |
+ eerror "Please replace pam_stack usage with proper include directive usage," |
256 |
+ eerror "following the PAM Upgrade guide at the following URL" |
257 |
+ eerror " https://www.gentoo.org/proj/en/base/pam/upgrade-0.99.xml" |
258 |
+ eerror "" |
259 |
+ |
260 |
+ retval=1 |
261 |
+ fi |
262 |
+ |
263 |
+ if sed -e 's:#.*::' "${EROOT}"/etc/pam.d/* 2>/dev/null | egrep -q 'pam_(pwdb|console)'; then |
264 |
+ eerror "" |
265 |
+ eerror "Your current setup is using one or more of the following modules," |
266 |
+ eerror "that are not built or supported anymore:" |
267 |
+ eerror "pam_pwdb, pam_console" |
268 |
+ eerror "If you are in real need for these modules, please contact the maintainers" |
269 |
+ eerror "of PAM through https://bugs.gentoo.org/ providing information about its" |
270 |
+ eerror "use cases." |
271 |
+ eerror "Please also make sure to read the PAM Upgrade guide at the following URL:" |
272 |
+ eerror " https://www.gentoo.org/proj/en/base/pam/upgrade-0.99.xml" |
273 |
+ eerror "" |
274 |
+ |
275 |
+ retval=1 |
276 |
+ fi |
277 |
+ |
278 |
+ return ${retval} |
279 |
+} |
280 |
+ |
281 |
+pkg_pretend() { |
282 |
+ # do not error out, this is just a warning, one could build a binpkg |
283 |
+ # with old modules enabled. |
284 |
+ check_old_modules |
285 |
+} |
286 |
+ |
287 |
+src_unpack() { |
288 |
+ # Upstream didn't release a new doc tarball (since nothing changed?). |
289 |
+ unpack ${MY_PN}-1.2.0-docs.tar.bz2 |
290 |
+ # Update timestamps to avoid regenerating at build time. #569338 |
291 |
+ find -type f -exec touch -r "${T}" {} + || die |
292 |
+ mv Linux-PAM-1.2.{0,1} || die |
293 |
+ unpack ${MY_P}.tar.bz2 |
294 |
+} |
295 |
+ |
296 |
+src_prepare() { |
297 |
+ epatch "${FILESDIR}"/${PN}-1.2.1-fix-compat.patch |
298 |
+ epatch "${FILESDIR}"/${PN}-1.2.1-innetgr.patch |
299 |
+ epatch "${FILESDIR}"/${PN}-1.2.1-no-strndupa.patch |
300 |
+ |
301 |
+ # disable insecure modules (musl-libc doesn't implement the functions anyway) |
302 |
+ use elibc_musl && sed -e 's/pam_rhosts//g' -i modules/Makefile.am modules/Makefile.in |
303 |
+ elibtoolize |
304 |
+} |
305 |
+ |
306 |
+multilib_src_configure() { |
307 |
+ # Do not let user's BROWSER setting mess us up. #549684 |
308 |
+ unset BROWSER |
309 |
+ |
310 |
+ # Disable automatic detection of libxcrypt; we _don't_ want the |
311 |
+ # user to link libxcrypt in by default, since we won't track the |
312 |
+ # dependency and allow to break PAM this way. |
313 |
+ export ac_cv_header_xcrypt_h=no |
314 |
+ |
315 |
+ # Disable automatic detection of libcrypt |
316 |
+ use elibc_musl && export ac_cv_search_crypt=no |
317 |
+ |
318 |
+ local myconf=( |
319 |
+ --docdir='$(datarootdir)'/doc/${PF} |
320 |
+ --htmldir='$(docdir)/html' |
321 |
+ --libdir='$(prefix)'/$(get_libdir) |
322 |
+ --enable-securedir="${EPREFIX}"/$(get_libdir)/security |
323 |
+ --enable-isadir='.' #464016 |
324 |
+ $(use_enable nls) |
325 |
+ $(use_enable selinux) |
326 |
+ $(use_enable cracklib) |
327 |
+ $(use_enable audit) |
328 |
+ $(use_enable debug) |
329 |
+ $(use_enable berkdb db) |
330 |
+ $(use_enable nis) |
331 |
+ $(use_enable pie) |
332 |
+ --with-db-uniquename=-$(db_findver sys-libs/db) |
333 |
+ --disable-prelude |
334 |
+ ) |
335 |
+ |
336 |
+ ECONF_SOURCE=${S} \ |
337 |
+ econf "${myconf[@]}" |
338 |
+} |
339 |
+ |
340 |
+multilib_src_compile() { |
341 |
+ emake sepermitlockdir="${EPREFIX}/run/sepermit" |
342 |
+} |
343 |
+ |
344 |
+multilib_src_install() { |
345 |
+ emake DESTDIR="${D}" install \ |
346 |
+ sepermitlockdir="${EPREFIX}/run/sepermit" |
347 |
+ |
348 |
+ local prefix |
349 |
+ if multilib_is_native_abi; then |
350 |
+ prefix= |
351 |
+ gen_usr_ldscript -a pam pamc pam_misc |
352 |
+ else |
353 |
+ prefix=/usr |
354 |
+ fi |
355 |
+ |
356 |
+ # create extra symlinks just in case something depends on them... |
357 |
+ local lib |
358 |
+ for lib in pam pamc pam_misc; do |
359 |
+ if ! [[ -f "${ED}"${prefix}/$(get_libdir)/lib${lib}$(get_libname) ]]; then |
360 |
+ dosym lib${lib}$(get_libname 0) ${prefix}/$(get_libdir)/lib${lib}$(get_libname) |
361 |
+ fi |
362 |
+ done |
363 |
+} |
364 |
+ |
365 |
+DOCS=( CHANGELOG ChangeLog README AUTHORS Copyright NEWS ) |
366 |
+ |
367 |
+multilib_src_install_all() { |
368 |
+ einstalldocs |
369 |
+ prune_libtool_files --all |
370 |
+ |
371 |
+ docinto modules |
372 |
+ local dir |
373 |
+ for dir in modules/pam_*; do |
374 |
+ newdoc "${dir}"/README README."$(basename "${dir}")" |
375 |
+ done |
376 |
+ |
377 |
+ if use selinux; then |
378 |
+ dodir /usr/lib/tmpfiles.d |
379 |
+ cat - > "${D}"/usr/lib/tmpfiles.d/${CATEGORY}:${PN}:${SLOT}.conf <<EOF |
380 |
+d /run/sepermit 0755 root root |
381 |
+EOF |
382 |
+ fi |
383 |
+} |
384 |
+ |
385 |
+pkg_preinst() { |
386 |
+ check_old_modules || die "deprecated PAM modules still used" |
387 |
+} |
388 |
+ |
389 |
+pkg_postinst() { |
390 |
+ ewarn "Some software with pre-loaded PAM libraries might experience" |
391 |
+ ewarn "warnings or failures related to missing symbols and/or versions" |
392 |
+ ewarn "after any update. While unfortunate this is a limit of the" |
393 |
+ ewarn "implementation of PAM and the software, and it requires you to" |
394 |
+ ewarn "restart the software manually after the update." |
395 |
+ ewarn "" |
396 |
+ ewarn "You can get a list of such software running a command like" |
397 |
+ ewarn " lsof / | egrep -i 'del.*libpam\\.so'" |
398 |
+ ewarn "" |
399 |
+ ewarn "Alternatively, simply reboot your system." |
400 |
+ if [[ -x "${EROOT}"/var/log/tallylog ]] ; then |
401 |
+ elog "" |
402 |
+ elog "Because of a bug present up to version 1.1.1-r2, you have" |
403 |
+ elog "an executable /var/log/tallylog file. You can safely" |
404 |
+ elog "correct it by running the command" |
405 |
+ elog " chmod -x /var/log/tallylog" |
406 |
+ elog "" |
407 |
+ fi |
408 |
+ |
409 |
+ # The pam_unix module needs to check the password of the user which requires |
410 |
+ # read access to /etc/shadow only. |
411 |
+ fcaps cap_dac_override sbin/unix_chkpwd |
412 |
+} |