diff options
author | Mamoru Komachi <usata@gentoo.org> | 2003-09-14 00:31:43 +0000 |
---|---|---|
committer | Mamoru Komachi <usata@gentoo.org> | 2003-09-14 00:31:43 +0000 |
commit | a3bd68ae99da3f5dfd08a73afd3d5cffe47f66e0 (patch) | |
tree | c4dffc74fee28263bd99b1310f855b743532ca77 /app-i18n/iiimsf/files | |
parent | new ebuild (diff) | |
download | gentoo-2-a3bd68ae99da3f5dfd08a73afd3d5cffe47f66e0.tar.gz gentoo-2-a3bd68ae99da3f5dfd08a73afd3d5cffe47f66e0.tar.bz2 gentoo-2-a3bd68ae99da3f5dfd08a73afd3d5cffe47f66e0.zip |
new ebuild
Diffstat (limited to 'app-i18n/iiimsf/files')
-rw-r--r-- | app-i18n/iiimsf/files/digest-iiimsf-11.4.1467 | 1 | ||||
-rw-r--r-- | app-i18n/iiimsf/files/htt.conf | 108 | ||||
-rw-r--r-- | app-i18n/iiimsf/files/iiim.initd | 16 | ||||
-rw-r--r-- | app-i18n/iiimsf/files/iiimsf-11.4.1467-gentoo.diff | 43 |
4 files changed, 168 insertions, 0 deletions
diff --git a/app-i18n/iiimsf/files/digest-iiimsf-11.4.1467 b/app-i18n/iiimsf/files/digest-iiimsf-11.4.1467 new file mode 100644 index 000000000000..f4949c9aee07 --- /dev/null +++ b/app-i18n/iiimsf/files/digest-iiimsf-11.4.1467 @@ -0,0 +1 @@ +MD5 ca6b6ac7c41641db6eaa0fa395748f90 im-sdk.r11_4.1467.tar.bz2 7253894 diff --git a/app-i18n/iiimsf/files/htt.conf b/app-i18n/iiimsf/files/htt.conf new file mode 100644 index 000000000000..a7db37a3363a --- /dev/null +++ b/app-i18n/iiimsf/files/htt.conf @@ -0,0 +1,108 @@ +# htt.conf sample file. + +## NOTICE to TCP wrapper users: +## This file controls the aceess to htt_server(htt). +## But by default, htt is linked with libwrap, therefore +## htt is controled by hosts_access(5) as well. Because the +## service name is "htt", the following entry in the hosts_access: +## htt : ALL : deny +## denies any accesses to htt_server(htt). +# +## NOTICE to PAM users: +## htt uses PAM in order to check user's account and password if it +## is enabled. But in many environments, PAM authentications are +## disabled for unregisterd services by default. In this case, +## you have to register "htt" service to the PAM configuration of your +## system. +## When AllowSystemUser directive is "password", "account" and "auth" +## modules are used for authentication. When the directive is "permit", +## "account" modules are used. Thus, whether the system requires +## password checking depends also on the configuration of PAM. + +## ListenAddress <address> +# <address> := <Any characters valid for hostname(cf. RFC1123)> [":" <service-name>] +# +# "ListenAddress" directive specifies local address where +# htt_sever listens. Note that it can listen on multiple +# addresses by specifying multiple "ListenAddress" directives. + +ListenAddress localhost:9010 +#ListenAddress localhost:9011 + +## DefaultPermission (permit|checkuser|password|deny) +# +# "DefaultPermission" directive specifies the default permission. +# It is applied if the access dose not match with any patterns of +# "AccessControl" derectives. +# permit ..... Permit the access. htt does not require any other +# authentications. +# checkuser .. htt requires a valid username. +# password ... htt requires a valid username and password. +# deny ....... Deny the access. + +DefaultPermission checkuser + +## AccessControl (permit|checkuser|password|deny) <pattern> +# <pattern> := <IPv4Addr_pattern> | <IPv6Addr_pattern> | <host_pattern> +# <IPv4Addr_pattern> := 3*(IPv4Addr_pe ".") IPv4Addr_pe ["/" DIGITS] +# <IPv6Addr_pattern> := 7*(IPv6Addr_pe ".") IPv6Addr_pe ["/" DIGITS] +# IPv4Addr_pe := 1*3DIGIT +# IPv6Addr_pe := 1*4HEX +# DIGIT = "0" | "1" | ... | "9" +# HEX = "0" | "1" | ... | "9" | "a" | ... | "f" +# <host_pattern> := *(<host_pe> ".")<host_pe> +# <host_pe> := *(<Any characters valid for hostname(cf. RFC1123)> +# | "*" | "$$" | "$(" <symname> ")" ) +# <symname> := "DOMAINNAME" | "HOSTNAME" +# +# "AccessControl" directive controls the access by the clients' hostname +# or network address. When the client hostname or address matches with the +# specified <pattern>, htt applies this directive. htt starts matching +# operations in the order of "AccessControl" directives. +# permit ..... Permit the access from the specified clients. +# htt does not require any other authentications. +# checkuser .. htt requires a valid username from the specified clients. +# password ... htt requires a valid username and password. +# from the specified clients. +# deny ....... Deny all the accesses from the specified clients. +# +# "*" is a wild card character that matches any string. +# $(HOSTNAME) in <host_pe> is replaced with the hostname where htt runs. +# $(DOMAINNAME) in <host_pe> is replaced with the domainname where htt runs. +# "$$" is replaced with "$". + +AccessControl permit 127.0.0.1 +#AccessControl permit *.$(DOMAINNAME) +#AccessControl permit 172.16.0.0/16 +#AccessControl password *.foo.com +#AccessControl deny *.bar.com + +## AllowSystemUser (permit|password|deny) +# +# "AllowSystemUser" directive controls whether htt allows system's user +# to access the server. +# permit ..... Permit the access of system's user. htt dose not require +# any passwords. +# password ... Permit the access of system's user if the user sends a +# valid password. +# deny ....... Deny the access of system's user. + +AllowSystemUser password + +## UserPermission (permit|password|deny) <username>[:<encrypted-password>] +# +# "UserPermission" directive controls the specified users' permission. +# <username> must be a valid username. +# <encrypted-password> must be a valid password entry encrypted by crypt(). +# If the system dose not support crypt(), all password matchings fail. +# permit ..... Permit the access of the specified users. htt dose not require +# any passwords. +# password ... Permit the access of the specified user if the user sends a +# valid password. +# deny ....... Deny the access of the specified users. + +#UserPermission password guest1:/a6BKSXLLSgPE guest2:/a6BNlakdSgPE +#UserPermission permit test +#UserPermission deny root + + diff --git a/app-i18n/iiimsf/files/iiim.initd b/app-i18n/iiimsf/files/iiim.initd new file mode 100644 index 000000000000..e0201c902155 --- /dev/null +++ b/app-i18n/iiimsf/files/iiim.initd @@ -0,0 +1,16 @@ +#!/sbin/runscript +# Copyright 1999-2003 Gentoo Technologies, Inc. +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/app-i18n/iiimsf/files/iiim.initd,v 1.1 2003/09/14 00:31:39 usata Exp $ + +start() { + ebegin "Starting iiim" + start-stop-daemon -b --start --quiet --exec /usr/lib/im/htt + eend $? +} + +stop() { + ebegin "Stopping iiim" + start-stop-daemon --stop --quiet --exec /usr/lib/im/htt + eend $? +} diff --git a/app-i18n/iiimsf/files/iiimsf-11.4.1467-gentoo.diff b/app-i18n/iiimsf/files/iiimsf-11.4.1467-gentoo.diff new file mode 100644 index 000000000000..838e3ffdae22 --- /dev/null +++ b/app-i18n/iiimsf/files/iiimsf-11.4.1467-gentoo.diff @@ -0,0 +1,43 @@ +diff -urN im-sdk-r11_4-1467.ORIG/iiimsf/src/Makefile.am im-sdk-r11_4-1467/iiimsf/src/Makefile.am +--- im-sdk-r11_4-1467.ORIG/iiimsf/src/Makefile.am 2003-08-23 16:31:38.000000000 +0900 ++++ im-sdk-r11_4-1467/iiimsf/src/Makefile.am 2003-09-09 19:45:12.000000000 +0900 +@@ -27,5 +27,5 @@ + + htt_SOURCES = watchdog.c + +-htt_server_LDADD = $(LIB_DIR)/iml/libiml.la $(IM_LIBDIR)/iiimp/libiiimp.la $(SOCKET_LIBS) $(LIBCRYPT_FLAGS) $(LIBPAM_FLAGS) $(LIBWRAP_FLAGS) $(THREAD_LIBS) ++htt_server_LDADD = $(LIB_DIR)/iml/libiml.la /usr/lib/libiiimp.la $(SOCKET_LIBS) $(LIBCRYPT_FLAGS) $(LIBPAM_FLAGS) $(LIBWRAP_FLAGS) $(THREAD_LIBS) + bin_PROGRAMS = htt_server htt +diff -urN im-sdk-r11_4-1467.ORIG/iiimsf/src/Makefile.in im-sdk-r11_4-1467/iiimsf/src/Makefile.in +--- im-sdk-r11_4-1467.ORIG/iiimsf/src/Makefile.in 2003-08-23 16:46:25.000000000 +0900 ++++ im-sdk-r11_4-1467/iiimsf/src/Makefile.in 2003-09-09 19:44:22.000000000 +0900 +@@ -154,7 +154,7 @@ + + htt_SOURCES = watchdog.c + +-htt_server_LDADD = $(LIB_DIR)/iml/libiml.la $(IM_LIBDIR)/iiimp/libiiimp.la $(SOCKET_LIBS) $(LIBCRYPT_FLAGS) $(LIBPAM_FLAGS) $(LIBWRAP_FLAGS) $(THREAD_LIBS) ++htt_server_LDADD = $(LIB_DIR)/iml/libiml.la /usr/lib/libiiimp.la $(SOCKET_LIBS) $(LIBCRYPT_FLAGS) $(LIBPAM_FLAGS) $(LIBWRAP_FLAGS) $(THREAD_LIBS) + bin_PROGRAMS = htt_server htt + subdir = src + mkinstalldirs = $(SHELL) $(top_srcdir)/../acfiles/mkinstalldirs +@@ -181,7 +181,7 @@ + IIIMPUtil.$(OBJEXT) IIIMPTrans.$(OBJEXT) + htt_server_OBJECTS = $(am_htt_server_OBJECTS) + htt_server_DEPENDENCIES = $(LIB_DIR)/iml/libiml.la \ +- $(IM_LIBDIR)/iiimp/libiiimp.la ++ /usr/lib/libiiimp.la + htt_server_LDFLAGS = + + DEFS = @DEFS@ +diff -urN im-sdk-r11_4-1467.ORIG/iiimsf/src/IMSvrCfg.cpp im-sdk-r11_4-1467/iiimsf/src/IMSvrCfg.cpp +--- im-sdk-r11_4-1467.ORIG/iiimsf/src/IMSvrCfg.cpp 2003-08-23 16:46:25.000000000 +0900 ++++ im-sdk-r11_4-1467/iiimsf/src/IMSvrCfg.cpp 2003-09-09 19:44:22.000000000 +0900 +@@ -22,7 +22,7 @@ + #ifdef WIN32 + initstr(CONFIGFILE, "Configuration file", "D:\\WINNT\\System32\\htt.conf"); + #else +- initstr(CONFIGFILE, "Configuration file", "/usr/lib/im/htt.conf"); ++ initstr(CONFIGFILE, "Configuration file", "/etc/im/htt.conf"); + #endif + initstr(CONVERSIONKEYS, "Conversion ON keys", "<Ctrl>space"); + initstr(LABEL, "Label type", "numeric"); |