summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMamoru Komachi <usata@gentoo.org>2003-09-14 00:31:43 +0000
committerMamoru Komachi <usata@gentoo.org>2003-09-14 00:31:43 +0000
commita3bd68ae99da3f5dfd08a73afd3d5cffe47f66e0 (patch)
treec4dffc74fee28263bd99b1310f855b743532ca77 /app-i18n/iiimsf/files
parentnew ebuild (diff)
downloadgentoo-2-a3bd68ae99da3f5dfd08a73afd3d5cffe47f66e0.tar.gz
gentoo-2-a3bd68ae99da3f5dfd08a73afd3d5cffe47f66e0.tar.bz2
gentoo-2-a3bd68ae99da3f5dfd08a73afd3d5cffe47f66e0.zip
new ebuild
Diffstat (limited to 'app-i18n/iiimsf/files')
-rw-r--r--app-i18n/iiimsf/files/digest-iiimsf-11.4.14671
-rw-r--r--app-i18n/iiimsf/files/htt.conf108
-rw-r--r--app-i18n/iiimsf/files/iiim.initd16
-rw-r--r--app-i18n/iiimsf/files/iiimsf-11.4.1467-gentoo.diff43
4 files changed, 168 insertions, 0 deletions
diff --git a/app-i18n/iiimsf/files/digest-iiimsf-11.4.1467 b/app-i18n/iiimsf/files/digest-iiimsf-11.4.1467
new file mode 100644
index 000000000000..f4949c9aee07
--- /dev/null
+++ b/app-i18n/iiimsf/files/digest-iiimsf-11.4.1467
@@ -0,0 +1 @@
+MD5 ca6b6ac7c41641db6eaa0fa395748f90 im-sdk.r11_4.1467.tar.bz2 7253894
diff --git a/app-i18n/iiimsf/files/htt.conf b/app-i18n/iiimsf/files/htt.conf
new file mode 100644
index 000000000000..a7db37a3363a
--- /dev/null
+++ b/app-i18n/iiimsf/files/htt.conf
@@ -0,0 +1,108 @@
+# htt.conf sample file.
+
+## NOTICE to TCP wrapper users:
+## This file controls the aceess to htt_server(htt).
+## But by default, htt is linked with libwrap, therefore
+## htt is controled by hosts_access(5) as well. Because the
+## service name is "htt", the following entry in the hosts_access:
+## htt : ALL : deny
+## denies any accesses to htt_server(htt).
+#
+## NOTICE to PAM users:
+## htt uses PAM in order to check user's account and password if it
+## is enabled. But in many environments, PAM authentications are
+## disabled for unregisterd services by default. In this case,
+## you have to register "htt" service to the PAM configuration of your
+## system.
+## When AllowSystemUser directive is "password", "account" and "auth"
+## modules are used for authentication. When the directive is "permit",
+## "account" modules are used. Thus, whether the system requires
+## password checking depends also on the configuration of PAM.
+
+## ListenAddress <address>
+# <address> := <Any characters valid for hostname(cf. RFC1123)> [":" <service-name>]
+#
+# "ListenAddress" directive specifies local address where
+# htt_sever listens. Note that it can listen on multiple
+# addresses by specifying multiple "ListenAddress" directives.
+
+ListenAddress localhost:9010
+#ListenAddress localhost:9011
+
+## DefaultPermission (permit|checkuser|password|deny)
+#
+# "DefaultPermission" directive specifies the default permission.
+# It is applied if the access dose not match with any patterns of
+# "AccessControl" derectives.
+# permit ..... Permit the access. htt does not require any other
+# authentications.
+# checkuser .. htt requires a valid username.
+# password ... htt requires a valid username and password.
+# deny ....... Deny the access.
+
+DefaultPermission checkuser
+
+## AccessControl (permit|checkuser|password|deny) <pattern>
+# <pattern> := <IPv4Addr_pattern> | <IPv6Addr_pattern> | <host_pattern>
+# <IPv4Addr_pattern> := 3*(IPv4Addr_pe ".") IPv4Addr_pe ["/" DIGITS]
+# <IPv6Addr_pattern> := 7*(IPv6Addr_pe ".") IPv6Addr_pe ["/" DIGITS]
+# IPv4Addr_pe := 1*3DIGIT
+# IPv6Addr_pe := 1*4HEX
+# DIGIT = "0" | "1" | ... | "9"
+# HEX = "0" | "1" | ... | "9" | "a" | ... | "f"
+# <host_pattern> := *(<host_pe> ".")<host_pe>
+# <host_pe> := *(<Any characters valid for hostname(cf. RFC1123)>
+# | "*" | "$$" | "$(" <symname> ")" )
+# <symname> := "DOMAINNAME" | "HOSTNAME"
+#
+# "AccessControl" directive controls the access by the clients' hostname
+# or network address. When the client hostname or address matches with the
+# specified <pattern>, htt applies this directive. htt starts matching
+# operations in the order of "AccessControl" directives.
+# permit ..... Permit the access from the specified clients.
+# htt does not require any other authentications.
+# checkuser .. htt requires a valid username from the specified clients.
+# password ... htt requires a valid username and password.
+# from the specified clients.
+# deny ....... Deny all the accesses from the specified clients.
+#
+# "*" is a wild card character that matches any string.
+# $(HOSTNAME) in <host_pe> is replaced with the hostname where htt runs.
+# $(DOMAINNAME) in <host_pe> is replaced with the domainname where htt runs.
+# "$$" is replaced with "$".
+
+AccessControl permit 127.0.0.1
+#AccessControl permit *.$(DOMAINNAME)
+#AccessControl permit 172.16.0.0/16
+#AccessControl password *.foo.com
+#AccessControl deny *.bar.com
+
+## AllowSystemUser (permit|password|deny)
+#
+# "AllowSystemUser" directive controls whether htt allows system's user
+# to access the server.
+# permit ..... Permit the access of system's user. htt dose not require
+# any passwords.
+# password ... Permit the access of system's user if the user sends a
+# valid password.
+# deny ....... Deny the access of system's user.
+
+AllowSystemUser password
+
+## UserPermission (permit|password|deny) <username>[:<encrypted-password>]
+#
+# "UserPermission" directive controls the specified users' permission.
+# <username> must be a valid username.
+# <encrypted-password> must be a valid password entry encrypted by crypt().
+# If the system dose not support crypt(), all password matchings fail.
+# permit ..... Permit the access of the specified users. htt dose not require
+# any passwords.
+# password ... Permit the access of the specified user if the user sends a
+# valid password.
+# deny ....... Deny the access of the specified users.
+
+#UserPermission password guest1:/a6BKSXLLSgPE guest2:/a6BNlakdSgPE
+#UserPermission permit test
+#UserPermission deny root
+
+
diff --git a/app-i18n/iiimsf/files/iiim.initd b/app-i18n/iiimsf/files/iiim.initd
new file mode 100644
index 000000000000..e0201c902155
--- /dev/null
+++ b/app-i18n/iiimsf/files/iiim.initd
@@ -0,0 +1,16 @@
+#!/sbin/runscript
+# Copyright 1999-2003 Gentoo Technologies, Inc.
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/app-i18n/iiimsf/files/iiim.initd,v 1.1 2003/09/14 00:31:39 usata Exp $
+
+start() {
+ ebegin "Starting iiim"
+ start-stop-daemon -b --start --quiet --exec /usr/lib/im/htt
+ eend $?
+}
+
+stop() {
+ ebegin "Stopping iiim"
+ start-stop-daemon --stop --quiet --exec /usr/lib/im/htt
+ eend $?
+}
diff --git a/app-i18n/iiimsf/files/iiimsf-11.4.1467-gentoo.diff b/app-i18n/iiimsf/files/iiimsf-11.4.1467-gentoo.diff
new file mode 100644
index 000000000000..838e3ffdae22
--- /dev/null
+++ b/app-i18n/iiimsf/files/iiimsf-11.4.1467-gentoo.diff
@@ -0,0 +1,43 @@
+diff -urN im-sdk-r11_4-1467.ORIG/iiimsf/src/Makefile.am im-sdk-r11_4-1467/iiimsf/src/Makefile.am
+--- im-sdk-r11_4-1467.ORIG/iiimsf/src/Makefile.am 2003-08-23 16:31:38.000000000 +0900
++++ im-sdk-r11_4-1467/iiimsf/src/Makefile.am 2003-09-09 19:45:12.000000000 +0900
+@@ -27,5 +27,5 @@
+
+ htt_SOURCES = watchdog.c
+
+-htt_server_LDADD = $(LIB_DIR)/iml/libiml.la $(IM_LIBDIR)/iiimp/libiiimp.la $(SOCKET_LIBS) $(LIBCRYPT_FLAGS) $(LIBPAM_FLAGS) $(LIBWRAP_FLAGS) $(THREAD_LIBS)
++htt_server_LDADD = $(LIB_DIR)/iml/libiml.la /usr/lib/libiiimp.la $(SOCKET_LIBS) $(LIBCRYPT_FLAGS) $(LIBPAM_FLAGS) $(LIBWRAP_FLAGS) $(THREAD_LIBS)
+ bin_PROGRAMS = htt_server htt
+diff -urN im-sdk-r11_4-1467.ORIG/iiimsf/src/Makefile.in im-sdk-r11_4-1467/iiimsf/src/Makefile.in
+--- im-sdk-r11_4-1467.ORIG/iiimsf/src/Makefile.in 2003-08-23 16:46:25.000000000 +0900
++++ im-sdk-r11_4-1467/iiimsf/src/Makefile.in 2003-09-09 19:44:22.000000000 +0900
+@@ -154,7 +154,7 @@
+
+ htt_SOURCES = watchdog.c
+
+-htt_server_LDADD = $(LIB_DIR)/iml/libiml.la $(IM_LIBDIR)/iiimp/libiiimp.la $(SOCKET_LIBS) $(LIBCRYPT_FLAGS) $(LIBPAM_FLAGS) $(LIBWRAP_FLAGS) $(THREAD_LIBS)
++htt_server_LDADD = $(LIB_DIR)/iml/libiml.la /usr/lib/libiiimp.la $(SOCKET_LIBS) $(LIBCRYPT_FLAGS) $(LIBPAM_FLAGS) $(LIBWRAP_FLAGS) $(THREAD_LIBS)
+ bin_PROGRAMS = htt_server htt
+ subdir = src
+ mkinstalldirs = $(SHELL) $(top_srcdir)/../acfiles/mkinstalldirs
+@@ -181,7 +181,7 @@
+ IIIMPUtil.$(OBJEXT) IIIMPTrans.$(OBJEXT)
+ htt_server_OBJECTS = $(am_htt_server_OBJECTS)
+ htt_server_DEPENDENCIES = $(LIB_DIR)/iml/libiml.la \
+- $(IM_LIBDIR)/iiimp/libiiimp.la
++ /usr/lib/libiiimp.la
+ htt_server_LDFLAGS =
+
+ DEFS = @DEFS@
+diff -urN im-sdk-r11_4-1467.ORIG/iiimsf/src/IMSvrCfg.cpp im-sdk-r11_4-1467/iiimsf/src/IMSvrCfg.cpp
+--- im-sdk-r11_4-1467.ORIG/iiimsf/src/IMSvrCfg.cpp 2003-08-23 16:46:25.000000000 +0900
++++ im-sdk-r11_4-1467/iiimsf/src/IMSvrCfg.cpp 2003-09-09 19:44:22.000000000 +0900
+@@ -22,7 +22,7 @@
+ #ifdef WIN32
+ initstr(CONFIGFILE, "Configuration file", "D:\\WINNT\\System32\\htt.conf");
+ #else
+- initstr(CONFIGFILE, "Configuration file", "/usr/lib/im/htt.conf");
++ initstr(CONFIGFILE, "Configuration file", "/etc/im/htt.conf");
+ #endif
+ initstr(CONVERSIONKEYS, "Conversion ON keys", "<Ctrl>space");
+ initstr(LABEL, "Label type", "numeric");