diff options
Diffstat (limited to 'sys-auth/openpam')
-rw-r--r-- | sys-auth/openpam/ChangeLog | 11 | ||||
-rw-r--r-- | sys-auth/openpam/Manifest | 12 | ||||
-rw-r--r-- | sys-auth/openpam/files/digest-openpam-20050201-r1 | 3 | ||||
-rw-r--r-- | sys-auth/openpam/files/openpam-20050201-gentoo.patch | 176 | ||||
-rw-r--r-- | sys-auth/openpam/files/openpam-20050201-nbsd.patch | 12 | ||||
-rw-r--r-- | sys-auth/openpam/metadata.xml | 5 | ||||
-rw-r--r-- | sys-auth/openpam/openpam-20050201-r1.ebuild | 46 |
7 files changed, 265 insertions, 0 deletions
diff --git a/sys-auth/openpam/ChangeLog b/sys-auth/openpam/ChangeLog new file mode 100644 index 000000000000..3134502334b0 --- /dev/null +++ b/sys-auth/openpam/ChangeLog @@ -0,0 +1,11 @@ +# ChangeLog for sys-auth/openpam +# Copyright 1999-2006 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/sys-auth/openpam/ChangeLog,v 1.1 2006/03/30 17:54:34 flameeyes Exp $ + +*openpam-20050201-r1 (30 Mar 2006) + + 30 Mar 2006; Diego Pettenò <flameeyes@gentoo.org> + +files/openpam-20050201-gentoo.patch, +files/openpam-20050201-nbsd.patch, + +metadata.xml, +openpam-20050201-r1.ebuild: + Import openpam from gentoo-alt overlay (in sys-auth rather than sys-libs). + diff --git a/sys-auth/openpam/Manifest b/sys-auth/openpam/Manifest new file mode 100644 index 000000000000..afb4cb1bda04 --- /dev/null +++ b/sys-auth/openpam/Manifest @@ -0,0 +1,12 @@ +MD5 d27aed5edec3b496da4edcab7576dde4 files/digest-openpam-20050201-r1 250 +RMD160 c7cfee3dae0e691a1af70f7d06fa03531284161e files/digest-openpam-20050201-r1 250 +SHA256 fce2b0553fbe02f5346c97074263c921160c17c3e56925cab10bb4f801ea3704 files/digest-openpam-20050201-r1 250 +MD5 1f429087f685185c153a880dc6124743 files/openpam-20050201-gentoo.patch 6783 +RMD160 82b333084feef282c6b20df224961d658ccaba5c files/openpam-20050201-gentoo.patch 6783 +SHA256 9d360bca2635d4d30ae66cd62be032bc09df5cfae2ced3e602ebfff9dade0612 files/openpam-20050201-gentoo.patch 6783 +MD5 56d3140397d4d682547d53200fcd9884 files/openpam-20050201-nbsd.patch 449 +RMD160 f9d7a48fa48af267bda9766b359314bda884e2af files/openpam-20050201-nbsd.patch 449 +SHA256 5ca47d57dc688dfddb24107026f049f70e520d62acde34b6a395b99b8be90d02 files/openpam-20050201-nbsd.patch 449 +MD5 d894c47c078c6e1082f89b5dd0e45b09 openpam-20050201-r1.ebuild 893 +RMD160 af52657497f9fcfa5cd50f17d65b7e00bc6a8a56 openpam-20050201-r1.ebuild 893 +SHA256 1a752948e9e28334eff1c01fa481acc04048d4598a5e6db68858ab1f66ba9837 openpam-20050201-r1.ebuild 893 diff --git a/sys-auth/openpam/files/digest-openpam-20050201-r1 b/sys-auth/openpam/files/digest-openpam-20050201-r1 new file mode 100644 index 000000000000..2a235fc808ad --- /dev/null +++ b/sys-auth/openpam/files/digest-openpam-20050201-r1 @@ -0,0 +1,3 @@ +MD5 a6c4c41e9f47123d841ad85a3e03e061 openpam-20050201.tar.gz 360003 +RMD160 da99df2897b7fd17580ae2474046fc7921973828 openpam-20050201.tar.gz 360003 +SHA256 3961d4a15eab33b52118af1323f1bc1314970097b5dbac32582b0ee50e940248 openpam-20050201.tar.gz 360003 diff --git a/sys-auth/openpam/files/openpam-20050201-gentoo.patch b/sys-auth/openpam/files/openpam-20050201-gentoo.patch new file mode 100644 index 000000000000..3b37c6fa2a76 --- /dev/null +++ b/sys-auth/openpam/files/openpam-20050201-gentoo.patch @@ -0,0 +1,176 @@ +diff -Nur openpam-20050201/include/security/Makefile.am openpam-20050201-gentoo/include/security/Makefile.am +--- openpam-20050201/include/security/Makefile.am 2005-02-01 00:00:00.000000000 +0100 ++++ openpam-20050201-gentoo/include/security/Makefile.am 2005-06-11 12:48:19.038207056 +0200 +@@ -6,4 +6,5 @@ + pam_appl.h \ + pam_constants.h \ + pam_modules.h \ +- pam_types.h ++ pam_types.h \ ++ pam_mod_misc.h +diff -Nur openpam-20050201/include/security/pam_mod_misc.h openpam-20050201-gentoo/include/security/pam_mod_misc.h +--- openpam-20050201/include/security/pam_mod_misc.h 1970-01-01 01:00:00.000000000 +0100 ++++ openpam-20050201-gentoo/include/security/pam_mod_misc.h 2005-06-11 12:48:19.038207056 +0200 +@@ -0,0 +1,56 @@ ++/*- ++ * Copyright 1998 Juniper Networks, Inc. ++ * All rights reserved. ++ * ++ * Redistribution and use in source and binary forms, with or without ++ * modification, are permitted provided that the following conditions ++ * are met: ++ * 1. Redistributions of source code must retain the above copyright ++ * notice, this list of conditions and the following disclaimer. ++ * 2. Redistributions in binary form must reproduce the above copyright ++ * notice, this list of conditions and the following disclaimer in the ++ * documentation and/or other materials provided with the distribution. ++ * ++ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ++ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE ++ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ++ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE ++ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL ++ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS ++ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) ++ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT ++ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY ++ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF ++ * SUCH DAMAGE. ++ * ++ * $FreeBSD: src/lib/libpam/libpam/security/pam_mod_misc.h,v 1.12 2003/05/31 16:56:35 des Exp $ ++ */ ++ ++#ifndef PAM_MOD_MISC_H ++#define PAM_MOD_MISC_H ++ ++#include <sys/cdefs.h> ++ ++/* ++ * Common option names ++ */ ++#define PAM_OPT_NULLOK "nullok" ++#define PAM_OPT_AUTH_AS_SELF "auth_as_self" ++#define PAM_OPT_ECHO_PASS "echo_pass" ++#define PAM_OPT_DEBUG "debug" ++ ++__BEGIN_DECLS ++void _pam_verbose_error(pam_handle_t *, int, const char *, ++ const char *, const char *, ...); ++__END_DECLS ++ ++#define PAM_LOG(...) \ ++ openpam_log(PAM_LOG_DEBUG, __VA_ARGS__) ++ ++#define PAM_RETURN(arg) \ ++ return (arg) ++ ++#define PAM_VERBOSE_ERROR(...) \ ++ _pam_verbose_error(pamh, flags, __FILE__, __FUNCTION__, __VA_ARGS__) ++ ++#endif +diff -Nur openpam-20050201/lib/Makefile.am openpam-20050201-gentoo/lib/Makefile.am +--- openpam-20050201/lib/Makefile.am 2005-02-01 00:00:00.000000000 +0100 ++++ openpam-20050201-gentoo/lib/Makefile.am 2005-06-11 12:48:19.038207056 +0200 +@@ -46,6 +46,7 @@ + pam_verror.c \ + pam_vinfo.c \ + pam_vprompt.c \ ++ pam_debug_log.c \ + $(NULL) + + libpam_la_LDFLAGS = -no-undefined -version-info @LIB_MAJ@ @DL_LIBS@ +diff -Nur openpam-20050201/lib/openpam_dynamic.c openpam-20050201-gentoo/lib/openpam_dynamic.c +--- openpam-20050201/lib/openpam_dynamic.c 2005-02-01 00:00:00.000000000 +0100 ++++ openpam-20050201-gentoo/lib/openpam_dynamic.c 2005-06-11 12:48:19.039206904 +0200 +@@ -73,8 +73,21 @@ + *strrchr(vpath, '.') = '\0'; + if ((dlh = dlopen(vpath, RTLD_NOW)) == NULL) { + openpam_log(PAM_LOG_DEBUG, "%s: %s", vpath, dlerror()); +- FREE(module); +- return (NULL); ++ ++ /* Gentoo Code to handle /lib/security directory */ ++ FREE(vpath); ++ if ( asprintf(&vpath, "%s/%s.%d", OPENPAM_MODULES_DIR, path, LIB_MAJ) < 0 ) ++ goto buf_err; ++ if ((dlh = dlopen(vpath, RTLD_NOW)) == NULL) { ++ openpam_log(PAM_LOG_DEBUG, "%s: %s", vpath, dlerror()); ++ *strrchr(vpath, '.') = '\0'; ++ if ((dlh = dlopen(vpath, RTLD_NOW)) == NULL) { ++ openpam_log(PAM_LOG_DEBUG, "%s: %s", vpath, dlerror()); ++ FREE(module); ++ ++ return (NULL); ++ } ++ } + } + } + FREE(vpath); +diff -Nur openpam-20050201/lib/pam_debug_log.c openpam-20050201-gentoo/lib/pam_debug_log.c +--- openpam-20050201/lib/pam_debug_log.c 1970-01-01 01:00:00.000000000 +0100 ++++ openpam-20050201-gentoo/lib/pam_debug_log.c 2005-06-11 12:55:17.688562528 +0200 +@@ -0,0 +1,64 @@ ++/*- ++ * Copyright 2001 Mark R V Murray ++ * All rights reserved. ++ * ++ * Redistribution and use in source and binary forms, with or without ++ * modification, are permitted provided that the following conditions ++ * are met: ++ * 1. Redistributions of source code must retain the above copyright ++ * notice, this list of conditions and the following disclaimer. ++ * 2. Redistributions in binary form must reproduce the above copyright ++ * notice, this list of conditions and the following disclaimer in the ++ * documentation and/or other materials provided with the distribution. ++ * ++ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND ++ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE ++ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ++ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE ++ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL ++ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS ++ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) ++ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT ++ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY ++ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF ++ * SUCH DAMAGE. ++ */ ++ ++#include <sys/cdefs.h> ++ ++#ifndef __GLIBC__ ++#include <libgen.h> ++#endif ++ ++#include <stdarg.h> ++#include <stdio.h> ++#include <stdlib.h> ++#include <string.h> ++ ++#include <security/pam_appl.h> ++#include <security/openpam.h> ++#include <security/pam_mod_misc.h> ++ ++/* Print a verbose error, including the function name and a ++ * cleaned up filename. ++ */ ++void ++_pam_verbose_error(pam_handle_t *pamh, int flags, ++ const char *file, const char *function, const char *format, ...) ++{ ++ va_list ap; ++ char *fmtbuf, *modname, *period; ++ ++ if (!(flags & PAM_SILENT) && !openpam_get_option(pamh, "no_warn")) { ++ modname = basename(file); ++ period = strchr(modname, '.'); ++ if (period == NULL) ++ period = strchr(modname, '\0'); ++ va_start(ap, format); ++ asprintf(&fmtbuf, "%.*s: %s: %s\n", (int)(period - modname), ++ modname, function, format); ++ pam_verror(pamh, fmtbuf, ap); ++ free(fmtbuf); ++ va_end(ap); ++ } ++} diff --git a/sys-auth/openpam/files/openpam-20050201-nbsd.patch b/sys-auth/openpam/files/openpam-20050201-nbsd.patch new file mode 100644 index 000000000000..bc797db8d065 --- /dev/null +++ b/sys-auth/openpam/files/openpam-20050201-nbsd.patch @@ -0,0 +1,12 @@ +--- openpam-20050201.orig/lib/pam_debug_log.c 2006-02-18 01:15:39.000000000 -0200 ++++ openpam-20050201/lib/pam_debug_log.c 2006-02-18 01:16:30.000000000 -0200 +@@ -47,7 +47,8 @@ + const char *file, const char *function, const char *format, ...) + { + va_list ap; +- char *fmtbuf, *modname, *period; ++ char *fmtbuf; ++ const char *modname, *period; + + if (!(flags & PAM_SILENT) && !openpam_get_option(pamh, "no_warn")) { + modname = basename(file); diff --git a/sys-auth/openpam/metadata.xml b/sys-auth/openpam/metadata.xml new file mode 100644 index 000000000000..ecedda4aa2cc --- /dev/null +++ b/sys-auth/openpam/metadata.xml @@ -0,0 +1,5 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> +<herd>bsd</herd> +</pkgmetadata> diff --git a/sys-auth/openpam/openpam-20050201-r1.ebuild b/sys-auth/openpam/openpam-20050201-r1.ebuild new file mode 100644 index 000000000000..87f0a6ecd235 --- /dev/null +++ b/sys-auth/openpam/openpam-20050201-r1.ebuild @@ -0,0 +1,46 @@ +# Copyright 1999-2006 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/sys-auth/openpam/openpam-20050201-r1.ebuild,v 1.1 2006/03/30 17:54:34 flameeyes Exp $ + +inherit multilib flag-o-matic autotools + +DESCRIPTION="Open source PAM library." +HOMEPAGE="http://www.openpam.org/" +SRC_URI="mirror://sourceforge/${PN}/${P}.tar.gz" + +LICENSE="BSD" +SLOT="0" +KEYWORDS="~x86-fbsd" +IUSE="debug" + +RDEPEND="!virtual/pam" +DEPEND="sys-devel/make + dev-lang/perl + =sys-devel/automake-1.8*" +PDEPEND="sys-freebsd/freebsd-pam-modules" + +PROVIDE="virtual/pam" + +src_unpack() { + unpack ${A} + cd ${S} + + epatch "${FILESDIR}/${P}-gentoo.patch" + epatch "${FILESDIR}/${P}-nbsd.patch" + eautomake +} + +src_compile() { + econf \ + --disable-dependency-tracking \ + --with-modules-dir=/$(get_libdir)/security \ + ${myconf} || die "econf failed" + + emake || die "emake failed" +} + +src_install() { + make DESTDIR=${D} install + + dodoc CREDITS HISTORY MANIFEST RELNOTES README +} |