diff options
author | Robin H. Johnson <robbat2@gentoo.org> | 2015-08-08 13:49:04 -0700 |
---|---|---|
committer | Robin H. Johnson <robbat2@gentoo.org> | 2015-08-08 17:38:18 -0700 |
commit | 56bd759df1d0c750a065b8c845e93d5dfa6b549d (patch) | |
tree | 3f91093cdb475e565ae857f1c5a7fd339e2d781e /sys-auth/pambase | |
download | gentoo-56bd759df1d0c750a065b8c845e93d5dfa6b549d.tar.gz gentoo-56bd759df1d0c750a065b8c845e93d5dfa6b549d.tar.bz2 gentoo-56bd759df1d0c750a065b8c845e93d5dfa6b549d.zip |
proj/gentoo: Initial commit
This commit represents a new era for Gentoo:
Storing the gentoo-x86 tree in Git, as converted from CVS.
This commit is the start of the NEW history.
Any historical data is intended to be grafted onto this point.
Creation process:
1. Take final CVS checkout snapshot
2. Remove ALL ChangeLog* files
3. Transform all Manifests to thin
4. Remove empty Manifests
5. Convert all stale $Header$/$Id$ CVS keywords to non-expanded Git $Id$
5.1. Do not touch files with -kb/-ko keyword flags.
Signed-off-by: Robin H. Johnson <robbat2@gentoo.org>
X-Thanks: Alec Warner <antarus@gentoo.org> - did the GSoC 2006 migration tests
X-Thanks: Robin H. Johnson <robbat2@gentoo.org> - infra guy, herding this project
X-Thanks: Nguyen Thai Ngoc Duy <pclouds@gentoo.org> - Former Gentoo developer, wrote Git features for the migration
X-Thanks: Brian Harring <ferringb@gentoo.org> - wrote much python to improve cvs2svn
X-Thanks: Rich Freeman <rich0@gentoo.org> - validation scripts
X-Thanks: Patrick Lauer <patrick@gentoo.org> - Gentoo dev, running new 2014 work in migration
X-Thanks: Michał Górny <mgorny@gentoo.org> - scripts, QA, nagging
X-Thanks: All of other Gentoo developers - many ideas and lots of paint on the bikeshed
Diffstat (limited to 'sys-auth/pambase')
-rw-r--r-- | sys-auth/pambase/Manifest | 4 | ||||
-rw-r--r-- | sys-auth/pambase/files/pambase-20120417-lastlog-silent.patch | 20 | ||||
-rw-r--r-- | sys-auth/pambase/files/pambase-20120417-systemd-auth.patch | 26 | ||||
-rw-r--r-- | sys-auth/pambase/files/pambase-20120417-systemd.patch | 29 | ||||
-rw-r--r-- | sys-auth/pambase/files/pambase-20150213-selinux-note.patch | 11 | ||||
-rw-r--r-- | sys-auth/pambase/metadata.xml | 93 | ||||
-rw-r--r-- | sys-auth/pambase/pambase-20101024-r2.ebuild | 97 | ||||
-rw-r--r-- | sys-auth/pambase/pambase-20120417-r3.ebuild | 113 | ||||
-rw-r--r-- | sys-auth/pambase/pambase-20140313.ebuild | 94 | ||||
-rw-r--r-- | sys-auth/pambase/pambase-20150213.ebuild | 100 |
10 files changed, 587 insertions, 0 deletions
diff --git a/sys-auth/pambase/Manifest b/sys-auth/pambase/Manifest new file mode 100644 index 000000000000..0f3c5faeee60 --- /dev/null +++ b/sys-auth/pambase/Manifest @@ -0,0 +1,4 @@ +DIST pambase-20101024.tar.bz2 3201 SHA256 89d60dd598d3da0ce1d1bcd7dc325f6c55002a1d4a7d27f9bb024f6732e9fba4 SHA512 8d2a89b38d94d2e423a033ea6922c0a0039a0fb64d60c05991d877b4fa893954723fe1c1763f3f67ed6fbc3639282a4ee1d76824f7f29025b6050632a6984b6f WHIRLPOOL 644965507d1f537c357a7020c13282d9de4131a6cf72e589b1e750e3b86a2185b9a882d0b3f865145a86e1ef613e4b92998be53734aefb6d6d8a69f65de806a4 +DIST pambase-20120417.tar.bz2 3361 SHA256 3fde3ff7714b3722b45545da36fdde6ca95a55d1b0a8cfb23666ec0de3ec5871 SHA512 7a666eb67f6484e536ecb070402036bcfdd137aced27df3f08b136d06eee5c13a6dc14aa93ea09e94c7f31e5a98db97dbaccd0c46af24b57028247de3a7cd9fe WHIRLPOOL 323edb9ef488a0ba562ef279d4acfb682540bf87838be9a3319ad2029ba1465d015fdf94c3192e24517ae9f0ed264e38d17aba65934211bd7b39bf309ee12540 +DIST pambase-20140313.tar.bz2 3417 SHA256 70f11281975eb1d7b14f36a16d2b9eff78099a246aeda96e4f8c667b2574b2a4 SHA512 76dd2a70947dac9573d47b81764ebe4f829bfd38d59c007e698a52c70757fa88525f510c14a1f474c58e3d33cb421ff61aa4ed1aae54497456004eff7494bfc8 WHIRLPOOL e9aac79b37c76af4389d193cb4eb79ad4372e25520a3f6bba6b473948999f1ac2ade00930180a4b9f47cdd7a458d1a174bd15ccf0a94130d216118d7d76485a9 +DIST pambase-20150213.tar.xz 3480 SHA256 cf1ea75e29c33bfddbc6f8519b860a6f0710345e936966014f59fe3e93ab7f44 SHA512 3b49dd3f06a0942fcced95527f62cbc4ff723c48dc896a0b57ecd19736d2892db974c782be3fe24e8e6e17294869a772ae9ee6118af96dfdc7a3a6561dc3f3e5 WHIRLPOOL 493084f04032b93d8021e84bdbcf6c339ec6c928b468aa59556f3d3d10403e4557316d516ea303d66422df13150c7c19761d9979aba32e5e4c9fe7e198c733a2 diff --git a/sys-auth/pambase/files/pambase-20120417-lastlog-silent.patch b/sys-auth/pambase/files/pambase-20120417-lastlog-silent.patch new file mode 100644 index 000000000000..79266a740b61 --- /dev/null +++ b/sys-auth/pambase/files/pambase-20120417-lastlog-silent.patch @@ -0,0 +1,20 @@ +--- pambase-20120417/login.in.orig 2012-11-21 14:31:49.031948988 +0100 ++++ pambase-20120417/login.in 2012-11-21 14:32:41.172330601 +0100 +@@ -3,4 +3,6 @@ + + account include system-local-login + password include system-local-login ++ ++session optional pam_lastlog.so DEBUG + session include system-local-login +--- pambase-20120417/system-login.in.orig 2012-11-21 14:31:42.232160039 +0100 ++++ pambase-20120417/system-login.in 2012-11-21 14:35:20.738025880 +0100 +@@ -41,7 +41,7 @@ + session required pam_env.so DEBUG + #endif + #if HAVE_LASTLOG +-session optional pam_lastlog.so DEBUG ++session optional pam_lastlog.so silent DEBUG + #endif + session include system-auth + #if HAVE_CONSOLEKIT diff --git a/sys-auth/pambase/files/pambase-20120417-systemd-auth.patch b/sys-auth/pambase/files/pambase-20120417-systemd-auth.patch new file mode 100644 index 000000000000..99c38e784771 --- /dev/null +++ b/sys-auth/pambase/files/pambase-20120417-systemd-auth.patch @@ -0,0 +1,26 @@ +diff -u pambase-20120417.old/system-auth.in pambase-20120417/system-auth.in +--- pambase-20120417.old/system-auth.in 2013-10-27 15:58:21.766193297 +0100 ++++ pambase-20120417/system-auth.in 2013-10-27 16:01:10.614555766 +0100 +@@ -35,3 +35,7 @@ + session optional pam_ssh.so + #endif + #include "system-session.inc" ++ ++#if HAVE_SYSTEMD ++-session optional pam_systemd.so ++#endif +Sólo en pambase-20120417: system-auth.in~ +diff -u pambase-20120417.old/system-login.in pambase-20120417/system-login.in +--- pambase-20120417.old/system-login.in 2013-10-27 15:58:21.766193297 +0100 ++++ pambase-20120417/system-login.in 2013-10-27 15:59:42.032316285 +0100 +@@ -47,9 +47,6 @@ + #if HAVE_CONSOLEKIT + -session optional pam_ck_connector.so nox11 + #endif +-#if HAVE_SYSTEMD +--session optional pam_systemd.so +-#endif + #if HAVE_GNOME_KEYRING + session optional pam_gnome_keyring.so auto_start + #endif +Sólo en pambase-20120417: system-login.in~ diff --git a/sys-auth/pambase/files/pambase-20120417-systemd.patch b/sys-auth/pambase/files/pambase-20120417-systemd.patch new file mode 100644 index 000000000000..047fb41c8592 --- /dev/null +++ b/sys-auth/pambase/files/pambase-20120417-systemd.patch @@ -0,0 +1,29 @@ +http://bugs.gentoo.org/372229 + +--- Makefile ++++ Makefile +@@ -28,6 +28,10 @@ + PAMFLAGS += -DHAVE_CONSOLEKIT=1 + endif + ++ifeq "$(SYSTEMD)" "yes" ++PAMFLAGS += -DHAVE_SYSTEMD=1 ++endif ++ + ifeq "$(GNOME_KEYRING)" "yes" + PAMFLAGS += -DHAVE_GNOME_KEYRING=1 + endif +--- system-login.in ++++ system-login.in +@@ -45,7 +45,10 @@ + #endif + session include system-auth + #if HAVE_CONSOLEKIT +-session optional pam_ck_connector.so nox11 ++-session optional pam_ck_connector.so nox11 ++#endif ++#if HAVE_SYSTEMD ++-session optional pam_systemd.so + #endif + #if HAVE_GNOME_KEYRING + session optional pam_gnome_keyring.so auto_start diff --git a/sys-auth/pambase/files/pambase-20150213-selinux-note.patch b/sys-auth/pambase/files/pambase-20150213-selinux-note.patch new file mode 100644 index 000000000000..1cb018f34508 --- /dev/null +++ b/sys-auth/pambase/files/pambase-20150213-selinux-note.patch @@ -0,0 +1,11 @@ +--- system-login.in.orig 2015-04-17 16:58:02.247000000 +0200 ++++ system-login.in 2015-04-17 16:58:07.684000000 +0200 +@@ -48,7 +48,7 @@ + session optional pam_ck_connector.so nox11 + #endif + #if HAVE_SELINUX +-# Note: modules that run in the user's context must come after this line. ++ # Note: modules that run in the user's context must come after this line. + session required pam_selinux.so multiple open + #endif + #if HAVE_GNOME_KEYRING diff --git a/sys-auth/pambase/metadata.xml b/sys-auth/pambase/metadata.xml new file mode 100644 index 000000000000..97d83d57b2d5 --- /dev/null +++ b/sys-auth/pambase/metadata.xml @@ -0,0 +1,93 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> + <herd>pam</herd> + <maintainer> + <email>pam-bugs@gentoo.org</email> + </maintainer> + <use> + <flag name="cracklib"> + Enable pam_cracklib module on system authentication stack. This + produces warnings when changing password to something easily + crackable. It requires the same USE flag to be enabled on + <pkg>sys-libs/pam</pkg> or system login might be impossible. + </flag> + <flag name="consolekit"> + Enable pam_ck_connector module on local system logins. This + allows for console logins to make use of ConsoleKit + authorization. + </flag> + <flag name="systemd"> + Use pam_systemd module to register user sessions in the systemd + control group hierarchy. + </flag> + <flag name="gnome-keyring"> + Enable pam_gnome_keyring module on system login stack. This + enables proper Gnome Keyring access to logins, whether they are + done with the login shell, a Desktop Manager or a remote login + systems such as SSH. + </flag> + <flag name="debug"> + Enable debug information logging on syslog(3) for all the + modules supporting this in the system authentication and system + login stacks. + </flag> + <flag name="passwdqc"> + Enable pam_passwdqc module on system auth stack for password + quality validation. This is an alternative to pam_cracklib + producing warnings, rejecting or providing example passwords + when changing your system password. It is used by default by + OpenWall GNU/*/Linux and by FreeBSD. + </flag> + <flag name="mktemp"> + Enable pam_mktemp module on system auth stack for session + handling. This module creates a private temporary directory for + the user, and sets TMP and TMPDIR accordingly. + </flag> + <flag name="pam_ssh"> + Enable pam_ssh module on system auth stack for authentication + and session handling. This module will accept as password the + passphrase of a private SSH key (one of ~/.ssh/id_rsa, + ~/.ssh/id_dsa or ~/.ssh/identity), and will spawn an ssh-agent + instance to cache the open key. + </flag> + <flag name="sha512"> + Switch Linux-PAM's pam_unix module to use sha512 for passwords + hashes rather than MD5. This option requires + <pkg>>=sys-libs/pam-1.0.1</pkg> built against + <pkg>>=sys-libs/glibc-2.7</pkg>, if it's built against an + earlier version, it will silently be ignored, and MD5 hashes + will be used. All the passwords changed after this USE flag is + enabled will be saved to the shadow file hashed using SHA512 + function. The password previously saved will be left + untouched. Please note that while SHA512-hashed passwords will + still be recognised if the USE flag is removed, the shadow file + will not be compatible with systems using an earlier glibc + version. + </flag> + <flag name="pam_krb5"> + Enable pam_krb5 module on system auth stack, as an alternative + to pam_unix. If Kerberos authentication succeed, only pam_unix + will be ignore, and all the other modules will proceed as usual, + including Gnome Keyring and other session modules. It requires + <pkg>sys-libs/pam</pkg> as PAM implementation. + </flag> + <flag name="minimal"> + Disables the standard PAM modules that provide extra information + to users on login; this includes pam_tally (and pam_tally2 for + Linux PAM 1.1 and later), pam_lastlog, pam_motd and other + similar modules. This might not be a good idea on a multi-user + system but could reduce slightly the overhead on single-user + non-networked systems. + </flag> + <flag name="nullok"> + Enable the nullok option with the pam_unix module. This allows + people to login with blank passwords. + </flag> + <flag name="securetty"> + Enable pam_securetty module in the login stack. Not generally + relevant anymore as the login stack only refers to local logins + and local terminals imply secure access in the first place. + </flag> + </use> +</pkgmetadata> diff --git a/sys-auth/pambase/pambase-20101024-r2.ebuild b/sys-auth/pambase/pambase-20101024-r2.ebuild new file mode 100644 index 000000000000..def54e6de49d --- /dev/null +++ b/sys-auth/pambase/pambase-20101024-r2.ebuild @@ -0,0 +1,97 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Id$ + +EAPI=4 + +inherit eutils + +DESCRIPTION="PAM base configuration files" +HOMEPAGE="http://www.gentoo.org/proj/en/base/pam/" +SRC_URI="http://dev.gentoo.org/~flameeyes/${PN}/${P}.tar.bz2" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-freebsd ~amd64-linux ~ia64-linux ~x86-linux" +IUSE="debug cracklib passwdqc consolekit gnome-keyring selinux mktemp pam_ssh +sha512 pam_krb5 minimal" +RESTRICT="binchecks" + +RDEPEND=" + || ( + >=sys-libs/pam-0.99.9.0-r1 + ( sys-auth/openpam + || ( sys-freebsd/freebsd-pam-modules sys-netbsd/netbsd-pam-modules ) + ) + ) + cracklib? ( >=sys-libs/pam-0.99[cracklib] ) + consolekit? ( >=sys-auth/consolekit-0.3[pam] ) + gnome-keyring? ( >=gnome-base/gnome-keyring-2.20[pam] ) + selinux? ( >=sys-libs/pam-0.99[selinux] ) + passwdqc? ( >=sys-auth/pam_passwdqc-1.0.4 ) + mktemp? ( sys-auth/pam_mktemp ) + pam_ssh? ( sys-auth/pam_ssh ) + sha512? ( >=sys-libs/pam-1.0.1 ) + pam_krb5? ( + || ( >=sys-libs/pam-1.1.0 sys-auth/openpam ) + >=sys-auth/pam_krb5-4.3 + ) + !<sys-freebsd/freebsd-pam-modules-6.2-r1 + !<sys-libs/pam-0.99.9.0-r1" +DEPEND="app-portage/portage-utils" + +src_compile() { + local implementation= + local linux_pam_version= + if has_version sys-libs/pam; then + implementation="linux-pam" + local ver_str=$(qatom `best_version sys-libs/pam` | cut -d ' ' -f 3) + linux_pam_version=$(printf "0x%02x%02x%02x" ${ver_str//\./ }) + elif has_version sys-auth/openpam; then + implementation="openpam" + else + die "PAM implementation not identified" + fi + + use_var() { + local varname=$(echo $1 | tr [a-z] [A-Z]) + local usename=${2-$(echo $1 | tr [A-Z] [a-z])} + local varvalue=$(use $usename && echo yes || echo no) + echo "${varname}=${varvalue}" + } + + emake \ + GIT=true \ + $(use_var debug) \ + $(use_var cracklib) \ + $(use_var passwdqc) \ + $(use_var consolekit) \ + $(use_var GNOME_KEYRING gnome-keyring) \ + $(use_var selinux) \ + $(use_var mktemp) \ + $(use_var PAM_SSH pam_ssh) \ + $(use_var sha512) \ + $(use_var KRB5 pam_krb5) \ + $(use_var minimal) \ + IMPLEMENTATION=${implementation} \ + LINUX_PAM_VERSION=${linux_pam_version} +} + +src_test() { :; } + +src_install() { + emake GIT=true DESTDIR="${ED}" install +} + +pkg_postinst() { + if use sha512; then + elog "Starting from version 20080801, pambase optionally enables" + elog "SHA512-hashed passwords. For this to work, you need sys-libs/pam-1.0.1" + elog "built against sys-libs/glibc-2.7 or later." + elog "If you don't have support for this, it will automatically fallback" + elog "to MD5-hashed passwords, just like before." + elog + elog "Please note that the change only affects the newly-changed passwords" + elog "and that SHA512-hashed passwords will not work on earlier versions" + elog "of glibc or Linux-PAM." + fi +} diff --git a/sys-auth/pambase/pambase-20120417-r3.ebuild b/sys-auth/pambase/pambase-20120417-r3.ebuild new file mode 100644 index 000000000000..b45a5ab8d22f --- /dev/null +++ b/sys-auth/pambase/pambase-20120417-r3.ebuild @@ -0,0 +1,113 @@ +# Copyright 1999-2014 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Id$ + +EAPI=5 +inherit eutils + +DESCRIPTION="PAM base configuration files" +HOMEPAGE="http://www.gentoo.org/proj/en/base/pam/" +SRC_URI="http://dev.gentoo.org/~flameeyes/${PN}/${P}.tar.bz2 + http://dev.gentoo.org/~phajdan.jr/${PN}/${P}.tar.bz2" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 -sparc-fbsd -x86-fbsd ~x86-freebsd ~amd64-linux ~ia64-linux ~x86-linux" +IUSE="consolekit cracklib debug gnome-keyring minimal mktemp pam_krb5 pam_ssh passwdqc selinux +sha512 systemd" + +RESTRICT=binchecks + +MIN_PAM_REQ=1.1.3 + +RDEPEND=" + || ( + >=sys-libs/pam-${MIN_PAM_REQ} + ( sys-auth/openpam || ( sys-freebsd/freebsd-pam-modules sys-netbsd/netbsd-pam-modules ) ) + ) + consolekit? ( >=sys-auth/consolekit-0.4.5_p2012[pam] ) + cracklib? ( >=sys-libs/pam-${MIN_PAM_REQ}[cracklib] ) + gnome-keyring? ( >=gnome-base/gnome-keyring-2.32[pam] ) + mktemp? ( sys-auth/pam_mktemp ) + pam_krb5? ( + || ( >=sys-libs/pam-${MIN_PAM_REQ} sys-auth/openpam ) + >=sys-auth/pam_krb5-4.3 + ) + pam_ssh? ( sys-auth/pam_ssh ) + passwdqc? ( >=sys-auth/pam_passwdqc-1.0.4 ) + selinux? ( >=sys-libs/pam-${MIN_PAM_REQ}[selinux] ) + sha512? ( >=sys-libs/pam-${MIN_PAM_REQ} ) + systemd? ( >=sys-apps/systemd-44-r1[pam] ) + !<sys-apps/shadow-4.1.5-r1 + !<sys-freebsd/freebsd-pam-modules-6.2-r1 + !<sys-libs/pam-0.99.9.0-r1" +DEPEND="app-portage/portage-utils" + +src_prepare() { + epatch "${FILESDIR}"/${P}-systemd.patch + epatch "${FILESDIR}"/${P}-lastlog-silent.patch + epatch "${FILESDIR}"/${P}-systemd-auth.patch # 485470 +} + +src_compile() { + local implementation= + local linux_pam_version= + if has_version sys-libs/pam; then + implementation=linux-pam + local ver_str=$(qatom `best_version sys-libs/pam` | cut -d ' ' -f 3) + linux_pam_version=$(printf "0x%02x%02x%02x" ${ver_str//\./ }) + elif has_version sys-auth/openpam; then + implementation=openpam + else + die "PAM implementation not identified" + fi + + use_var() { + local varname=$(echo $1 | tr [a-z] [A-Z]) + local usename=${2-$(echo $1 | tr [A-Z] [a-z])} + local varvalue=$(usex $usename) + echo "${varname}=${varvalue}" + } + + emake \ + GIT=true \ + $(use_var debug) \ + $(use_var cracklib) \ + $(use_var passwdqc) \ + $(use_var consolekit) \ + $(use_var systemd) \ + $(use_var GNOME_KEYRING gnome-keyring) \ + $(use_var selinux) \ + $(use_var mktemp) \ + $(use_var PAM_SSH pam_ssh) \ + $(use_var sha512) \ + $(use_var KRB5 pam_krb5) \ + $(use_var minimal) \ + IMPLEMENTATION=${implementation} \ + LINUX_PAM_VERSION=${linux_pam_version} +} + +src_test() { :; } + +src_install() { + emake GIT=true DESTDIR="${ED}" install +} + +pkg_postinst() { + if use sha512; then + elog "Starting from version 20080801, pambase optionally enables" + elog "SHA512-hashed passwords. For this to work, you need sys-libs/pam-1.0.1" + elog "built against sys-libs/glibc-2.7 or later." + elog "If you don't have support for this, it will automatically fallback" + elog "to MD5-hashed passwords, just like before." + elog + elog "Please note that the change only affects the newly-changed passwords" + elog "and that SHA512-hashed passwords will not work on earlier versions" + elog "of glibc or Linux-PAM." + fi + + if use systemd && use consolekit; then + ewarn "You are enabling 2 session trackers, ConsoleKit and systemd-logind" + ewarn "at the same time. This is not recommended setup to have, please" + ewarn "consider disabling either USE=\"consolekit\" or USE=\"systemd\." + fi +} diff --git a/sys-auth/pambase/pambase-20140313.ebuild b/sys-auth/pambase/pambase-20140313.ebuild new file mode 100644 index 000000000000..c667f3ef5959 --- /dev/null +++ b/sys-auth/pambase/pambase-20140313.ebuild @@ -0,0 +1,94 @@ +# Copyright 1999-2014 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Id$ + +EAPI=5 +inherit eutils + +DESCRIPTION="PAM base configuration files" +HOMEPAGE="http://www.gentoo.org/proj/en/base/pam/" +SRC_URI="http://dev.gentoo.org/~ssuominen/${P}.tar.bz2" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 -sparc-fbsd -x86-fbsd ~x86-freebsd ~amd64-linux ~ia64-linux ~x86-linux" +IUSE="consolekit cracklib debug gnome-keyring minimal mktemp pam_krb5 pam_ssh passwdqc selinux +sha512 systemd" + +RESTRICT=binchecks + +MIN_PAM_REQ=1.1.3 + +RDEPEND=" + || ( + >=sys-libs/pam-${MIN_PAM_REQ} + ( sys-auth/openpam || ( sys-freebsd/freebsd-pam-modules sys-netbsd/netbsd-pam-modules ) ) + ) + consolekit? ( >=sys-auth/consolekit-0.4.6[pam] ) + cracklib? ( >=sys-libs/pam-${MIN_PAM_REQ}[cracklib] ) + gnome-keyring? ( >=gnome-base/gnome-keyring-2.32[pam] ) + mktemp? ( sys-auth/pam_mktemp ) + pam_krb5? ( + || ( >=sys-libs/pam-${MIN_PAM_REQ} sys-auth/openpam ) + >=sys-auth/pam_krb5-4.3 + ) + pam_ssh? ( sys-auth/pam_ssh ) + passwdqc? ( >=sys-auth/pam_passwdqc-1.0.4 ) + selinux? ( >=sys-libs/pam-${MIN_PAM_REQ}[selinux] ) + sha512? ( >=sys-libs/pam-${MIN_PAM_REQ} ) + systemd? ( >=sys-apps/systemd-204[pam] ) + !<sys-apps/shadow-4.1.5-r1 + !<sys-freebsd/freebsd-pam-modules-6.2-r1 + !<sys-libs/pam-0.99.9.0-r1" +DEPEND="app-portage/portage-utils" + +src_compile() { + local implementation= + local linux_pam_version= + if has_version sys-libs/pam; then + implementation=linux-pam + local ver_str=$(qatom `best_version sys-libs/pam` | cut -d ' ' -f 3) + linux_pam_version=$(printf "0x%02x%02x%02x" ${ver_str//\./ }) + elif has_version sys-auth/openpam; then + implementation=openpam + else + die "PAM implementation not identified" + fi + + use_var() { + local varname=$(echo $1 | tr [a-z] [A-Z]) + local usename=${2-$(echo $1 | tr [A-Z] [a-z])} + local varvalue=$(usex $usename) + echo "${varname}=${varvalue}" + } + + emake \ + GIT=true \ + $(use_var debug) \ + $(use_var cracklib) \ + $(use_var passwdqc) \ + $(use_var consolekit) \ + $(use_var systemd) \ + $(use_var GNOME_KEYRING gnome-keyring) \ + $(use_var selinux) \ + $(use_var mktemp) \ + $(use_var PAM_SSH pam_ssh) \ + $(use_var sha512) \ + $(use_var KRB5 pam_krb5) \ + $(use_var minimal) \ + IMPLEMENTATION=${implementation} \ + LINUX_PAM_VERSION=${linux_pam_version} +} + +src_test() { :; } + +src_install() { + emake GIT=true DESTDIR="${ED}" install +} + +pkg_postinst() { + if use systemd && use consolekit; then + ewarn "You are enabling 2 session trackers, ConsoleKit and systemd-logind" + ewarn "at the same time. This is not recommended setup to have, please" + ewarn "consider disabling either USE=\"consolekit\" or USE=\"systemd\." + fi +} diff --git a/sys-auth/pambase/pambase-20150213.ebuild b/sys-auth/pambase/pambase-20150213.ebuild new file mode 100644 index 000000000000..7d8bd8b150ab --- /dev/null +++ b/sys-auth/pambase/pambase-20150213.ebuild @@ -0,0 +1,100 @@ +# Copyright 1999-2015 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Id$ + +EAPI=5 +inherit eutils + +DESCRIPTION="PAM base configuration files" +HOMEPAGE="http://www.gentoo.org/proj/en/base/pam/" +SRC_URI="http://dev.gentoo.org/~vapier/dist/${P}.tar.xz" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 -sparc-fbsd -x86-fbsd ~x86-freebsd ~amd64-linux ~ia64-linux ~x86-linux" +IUSE="consolekit cracklib debug gnome-keyring minimal mktemp +nullok pam_krb5 pam_ssh passwdqc securetty selinux +sha512 systemd" + +RESTRICT=binchecks + +MIN_PAM_REQ=1.1.3 + +RDEPEND=" + || ( + >=sys-libs/pam-${MIN_PAM_REQ} + ( sys-auth/openpam || ( sys-freebsd/freebsd-pam-modules sys-netbsd/netbsd-pam-modules ) ) + ) + consolekit? ( >=sys-auth/consolekit-0.4.6[pam] ) + cracklib? ( sys-libs/pam[cracklib] ) + gnome-keyring? ( >=gnome-base/gnome-keyring-2.32[pam] ) + mktemp? ( sys-auth/pam_mktemp ) + pam_krb5? ( + || ( >=sys-libs/pam-${MIN_PAM_REQ} sys-auth/openpam ) + >=sys-auth/pam_krb5-4.3 + ) + pam_ssh? ( sys-auth/pam_ssh ) + passwdqc? ( >=sys-auth/pam_passwdqc-1.0.4 ) + selinux? ( sys-libs/pam[selinux] ) + sha512? ( >=sys-libs/pam-${MIN_PAM_REQ} ) + systemd? ( >=sys-apps/systemd-204[pam] ) + !<sys-apps/shadow-4.1.5-r1 + !<sys-freebsd/freebsd-pam-modules-6.2-r1 + !<sys-libs/pam-0.99.9.0-r1" +DEPEND="app-portage/portage-utils + app-arch/xz-utils" + +src_prepare() { + epatch "${FILESDIR}"/${P}-selinux-note.patch #540096 +} + +src_compile() { + local implementation linux_pam_version + if has_version sys-libs/pam; then + implementation=linux-pam + local ver_str=$(qatom $(best_version sys-libs/pam) | cut -d ' ' -f 3) + linux_pam_version=$(printf "0x%02x%02x%02x" ${ver_str//\./ }) + elif has_version sys-auth/openpam; then + implementation=openpam + else + die "PAM implementation not identified" + fi + + use_var() { + local varname=$(echo "$1" | tr '[:lower:]' '[:upper:]') + local usename=${2-$(echo "$1" | tr '[:upper:]' '[:lower:]')} + local varvalue=$(usex ${usename}) + echo "${varname}=${varvalue}" + } + + emake \ + GIT=true \ + $(use_var debug) \ + $(use_var cracklib) \ + $(use_var passwdqc) \ + $(use_var consolekit) \ + $(use_var systemd) \ + $(use_var GNOME_KEYRING gnome-keyring) \ + $(use_var selinux) \ + $(use_var nullok) \ + $(use_var mktemp) \ + $(use_var pam_ssh) \ + $(use_var securetty) \ + $(use_var sha512) \ + $(use_var KRB5 pam_krb5) \ + $(use_var minimal) \ + IMPLEMENTATION=${implementation} \ + LINUX_PAM_VERSION=${linux_pam_version} +} + +src_test() { :; } + +src_install() { + emake GIT=true DESTDIR="${ED}" install +} + +pkg_postinst() { + if use systemd && use consolekit; then + ewarn "You are enabling 2 session trackers, ConsoleKit and systemd-logind" + ewarn "at the same time. This is not recommended setup to have, please" + ewarn "consider disabling either USE=\"consolekit\" or USE=\"systemd\." + fi +} |