]> Pileus Git - ~andy/sunrise/commitdiff
In portage now
authorJakub Moc <jakub@gentoo.org>
Mon, 23 Apr 2007 05:51:37 +0000 (05:51 +0000)
committerJakub Moc <jakub@gentoo.org>
Mon, 23 Apr 2007 05:51:37 +0000 (05:51 +0000)
svn path=/sunrise/; revision=3514

sys-auth/pam_mount/ChangeLog [deleted file]
sys-auth/pam_mount/Manifest [deleted file]
sys-auth/pam_mount/files/pam_mount-gentoo-paths-and-examples.patch [deleted file]
sys-auth/pam_mount/files/system-auth [deleted file]
sys-auth/pam_mount/metadata.xml [deleted file]
sys-auth/pam_mount/pam_mount-0.18.ebuild [deleted file]

diff --git a/sys-auth/pam_mount/ChangeLog b/sys-auth/pam_mount/ChangeLog
deleted file mode 100644 (file)
index 0adcf99..0000000
+++ /dev/null
@@ -1,33 +0,0 @@
-# ChangeLog for sys-auth/pam_mount
-# Copyright 1999-2007 Gentoo Foundation; Distributed under the GPL v2
-# $Header: $
-
-  25 Dec 2006; Jakub Moc <jakub@gentoo.org> pam_mount-0.18.ebuild:
-  Force full eautoreconf, last (!!!) attempt on fixing the multilib-strict
-  junk
-
-  23 Dec 2006; Markus Ullmann <jokey@gentoo.org> -pam_mount-0.17.ebuild:
-  Drop old
-
-  12 Dec 2006; Jakub Moc <jakub@gentoo.org> +pam_mount-0.18.ebuild:
-  Version bump.
-
-  03 Nov 2006; Raul Porcel (armin76) <armin76@gmail.com>
-  -pam_mount-0.13.0.ebuild:
-  drop old
-
-  20 Oct 2006; Christian Faulhammer (opfer) <gentoo@faulhammer.org>
-  pam_mount-0.13.0.ebuild, pam_mount-0.17.ebuild:
-  added trailing slash to HOMEPAGE URL
-
-  05 Oct 2006; Jakub Moc <jakub@gentoo.org> pam_mount-0.13.0.ebuild,
-  pam_mount-0.17.ebuild:
-  Add missing autoconf/automake dependencies
-
-  11 Aug 2006; Jakub Moc <jakub@gentoo.org> pam_mount-0.13.0.ebuild,
-  +pam_mount-0.17.ebuild, files/pam_mount-gentoo-paths-and-examples.patch:
-  Version bump. Update patch to fix lsof path. Fix typo in HOMEPAGE.
-
-  08 Jun 2006; Jakub Moc <jakub@gentoo.org> +pam_mount-0.13.0.ebuild:
-  New ebuild, based on work of Sven Peter, Priit Laes and others in Bug 24213
-
diff --git a/sys-auth/pam_mount/Manifest b/sys-auth/pam_mount/Manifest
deleted file mode 100644 (file)
index 114728b..0000000
+++ /dev/null
@@ -1,6 +0,0 @@
-AUX pam_mount-gentoo-paths-and-examples.patch 3939 RMD160 93abfdd4bb60e6d481b336a3e083a0e82948fd6c SHA1 3e806e68f480ce9838b986f6c0946bd40c7ff472 SHA256 ab9c0fe31f76321048897300496bd10665c3748072eb5678c6c539e88bdbaa82
-AUX system-auth 788 RMD160 2bd8f3a36e181072708c2e16eb5142abedc92b56 SHA1 0b0925270acadaa87fcfd93dea8f17847da3f85e SHA256 a5683c1fe369facdd41d735ea774e628170fa48e979bb7f4778fff05a2ea6199
-DIST pam_mount-0.18.tar.bz2 294620 RMD160 077a9fb452197cadc8d7e5350b722ee81563181f SHA1 df3029817cb27eafc8f20728230edbfffdd35cac SHA256 efaac862ccc18ebd49a2f4c10d78bbb6f15a47fb3f6426c07cee51497d5b9797
-EBUILD pam_mount-0.18.ebuild 2026 RMD160 1371c49b015f364be4cc5830706b46b10566a8c0 SHA1 9e7b5b496d586ed64a726a988162d57325687642 SHA256 87ada3fc821693d204a5858db9c2ddd53a88e22d03a5b5a6717dcd255ea0c56e
-MISC ChangeLog 1197 RMD160 f0d4ba28ff8bb43c270d35d7a5de15f35711cc20 SHA1 705c52962ad64483abec61e3bba318980171a6c2 SHA256 9d133da40cb83c2a682eb273c68ef94a2cda4e201bee980a9ec1c7fe88e0bb33
-MISC metadata.xml 170 RMD160 645927a396fdc21cdeb089fe42c5397332420ea6 SHA1 ac7f48a14fec325926f9ce1be8fbf1f311b4f2e4 SHA256 d797a2ec6f9dc516c9f9c1a758ee87ad3e8c43101b5dc76c2f872d5bd4639b42
diff --git a/sys-auth/pam_mount/files/pam_mount-gentoo-paths-and-examples.patch b/sys-auth/pam_mount/files/pam_mount-gentoo-paths-and-examples.patch
deleted file mode 100644 (file)
index 1002650..0000000
+++ /dev/null
@@ -1,83 +0,0 @@
---- config/pam_mount.conf.orig 2006-08-11 12:44:04.000000000 +0200
-+++ config/pam_mount.conf      2006-08-11 12:51:24.000000000 +0200
-@@ -79,7 +79,7 @@
- # source in mount.c (it sends the password to the stdin file descriptor
- # of the child process -- look for STDIN_FILENO).
- #
--lsof /usr/bin/lsof %(MNTPT)
-+lsof /usr/sbin/lsof %(MNTPT)
- fsck /sbin/fsck -p %(FSCKTARGET)
- losetup /sbin/losetup -p0 "%(before=\"-e\" CIPHER)" "%(before=\"-k\" KEYBITS)" %(FSCKLOOP) %(VOLUME)
- unlosetup /sbin/losetup -d %(FSCKLOOP)
-
---- config/pam_mount.conf.orig 2006-08-11 12:44:04.000000000 +0200
-+++ config/pam_mount.conf      2006-08-11 12:51:24.000000000 +0200
-@@ -197,6 +197,46 @@
- # (thanks to Mike Hommey for this example)
- # volume test local - /tmpfs/test /home/test "size=10M,uid=test,gid=users,mode=0700 -t tmpfs" - -
-+# BEGIN GENTOO EXAMPLES FOR ENCRYPTED HOME
-+# user1 has an encrypted home that uses his/her system passwd as the
-+# encryption key
-+# To create a USB dongle secured user see user2:
-+# Define a user key and group key to use a USB dongle as an encrypted
-+# file system for the key to the user2 file system - so user would need
-+# the USB dongle, the password for user key and the password for user
-+# user2. in order to access the encrypted home of user2. Note that
-+# without the first two the user can still log in and create files
-+# on his home directory mount point. However the security for the
-+# encrypted volume is much better since a dictionary attack would need
-+# the dongle. See http://www.counterpane.com/twofish-final.html
-+# for a discussion on why twofish is a good choice. This setup works
-+# with mm-sources-2.6.0_beta9-r5. So to login graphically as user2
-+# insert key, ctrl-alt-f1 login as key, alt-f7, login as user2,
-+# ctrl-alt-f1, logout key, remove dongle. This works for KDM. Modify
-+# /etc/pam.d/login and /etc/pam.d/kde per docs
-+#volume key local - /dev/sda2 /key loop,encryption=twofish - -
-+#volume user1 local - /home/.user1 /home/user1 loop,encryption=twofish - -
-+#volume user2 local - /home/.user2 - - bf-ecb /key/sp.key
-+# /etc/fstab contains
-+#/home/.user2  /home/user2  reiserfs    user,loop,encryption=twofish,noauto     0 0
-+#/dev/sda2     /key         ext2        user,loop,encryption=twofish,noauto     0 0
-+#
-+# Device-Mapper based encryption (dm-crypt)
-+# Since the introduction of dm-crypt in Linux 2.6.4, cryptoloop has been
-+# deprecated. To use the new dm-crypt interface, you will have to adapt
-+# the preceding examples to use "crypt" instead of "local" as filesystem
-+# type. Additionally the cipher algorithm is specified via the "cipher"
-+# option (to distinguish from cryptoloop's "encryption"). Thus, the
-+# user1 example would look like this:
-+#volume user1 crypt - /home/.user1 /home/user1 loop,cipher=twofish - -
-+# An entry in /etc/fstab is not needed. A detailed HOWTO can be found in
-+# the forums: http://forums.gentoo.org/viewtopic.php?t=274651
-+# Note that pam_mount is LUKS (http://luks.endorphin.org) aware. To
-+# use luks, you need to have cryptsetup-luks (get it at 
-+# http://luks.endorphin.org/dm-cryp) installed. A config line would be
-+#volume user1 crypt - /dev/yourpartition /yourmountpoint - - -
-+# and cryptsetup will be told to read cypher/keysize/etc. from the luks-header.
-+# END GENTOO EXAMPLES
- # Details:
- # Local user configuration (~/.pam_mount.conf) can extend this.
---- scripts/umount.crypt       2005-12-28 11:26:51.000000000 +0100
-+++ umount.crypt       2005-12-29 20:19:01.000000000 +0100
-@@ -28,7 +28,7 @@
- export IFS=`echo -en " \t\n"`;
- LOSETUP=/sbin/losetup
--CRYPTSETUP=/sbin/cryptsetup
-+CRYPTSETUP=/bin/cryptsetup
- MOUNT=/bin/mount
- UMOUNT=/bin/umount
- READLINK="/usr/bin/readlink";
---- scripts/mount.crypt        2005-12-24 13:07:42.000000000 +0100
-+++ mount.crypt        2005-12-29 20:18:22.000000000 +0100
-@@ -28,7 +28,7 @@
- # Commands
- LOSETUP=/sbin/losetup
--CRYPTSETUP=/sbin/cryptsetup
-+CRYPTSETUP=/bin/cryptsetup
- MOUNT=/bin/mount
- FSCK="/sbin/fsck";
diff --git a/sys-auth/pam_mount/files/system-auth b/sys-auth/pam_mount/files/system-auth
deleted file mode 100644 (file)
index cea944c..0000000
+++ /dev/null
@@ -1,23 +0,0 @@
-#%PAM-1.0
-
-
-auth       required    pam_env.so
-auth       optional     pam_mount.so service=system-auth
-auth       sufficient  pam_unix.so likeauth nullok use_first_pass
-auth       required    pam_deny.so
-
-# Added for pam_mount support
-auth       required     pam_stack.so service=system-auth 
-auth       required    pam_tally.so file=/var/log/faillog onerr=succeed no_magic_root
-auth       required    pam_shells.so
-auth       required    pam_nologin.so
-
-account    required    pam_unix.so
-
-password   required    pam_cracklib.so difok=2 minlen=8 dcredit=2 ocredit=2 retry=3
-password   sufficient  pam_unix.so nullok md5 shadow use_authtok
-password   required    pam_deny.so
-
-session    required    pam_limits.so
-session    required    pam_unix.so
-session    optional     pam_mount.so use_first_pass service=system-auth
diff --git a/sys-auth/pam_mount/metadata.xml b/sys-auth/pam_mount/metadata.xml
deleted file mode 100644 (file)
index 7e32869..0000000
+++ /dev/null
@@ -1,5 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
-<pkgmetadata>
-<herd>maintainer-wanted</herd>
-</pkgmetadata>
diff --git a/sys-auth/pam_mount/pam_mount-0.18.ebuild b/sys-auth/pam_mount/pam_mount-0.18.ebuild
deleted file mode 100644 (file)
index 0b02840..0000000
+++ /dev/null
@@ -1,69 +0,0 @@
-# Copyright 1999-2007 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: $
-
-WANT_AUTOCONF="latest"
-WANT_AUTOMAKE="latest"
-inherit eutils pam autotools
-
-DESCRIPTION="A PAM module that can mount volumes for a user session e.g. encrypted home directories"
-HOMEPAGE="http://pam-mount.sourceforge.net/"
-SRC_URI="mirror://sourceforge/pam-mount/${P}.tar.bz2"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="~amd64 ~x86"
-IUSE="crypt"
-
-DEPEND=">=sys-libs/pam-0.78-r3
-       >=dev-libs/openssl-0.9.7i
-       >=dev-libs/glib-2"
-RDEPEND="${DEPEND}
-       crypt? ( sys-fs/cryptsetup-luks )
-       sys-process/lsof"
-
-src_unpack() {
-       unpack ${A}
-       cd "${S}"
-
-       # Gentoo installs cryptsetup in /bin, this patches the relevant
-       # locations, in scripts/(u)mount.crypt and adds gentoo specific
-       # comments to pam_mount.conf
-       epatch "${FILESDIR}/${PN}-gentoo-paths-and-examples.patch"
-
-       eautoreconf
-}
-
-src_compile() {
-       econf \
-               --with-slibdir=/$(get_libdir) || die "econf failed"
-       emake || die "emake failed"
-}
-
-src_install() {
-       emake DESTDIR="${D}" install || die "install failed"
-
-       insinto /etc/security
-       insopts -m0644
-       doins "${S}/config/pam_mount.conf"
-       dopamd "${FILESDIR}/system-auth"
-
-       dodoc README TODO AUTHORS ChangeLog FAQ NEWS
-}
-
-pkg_postinst() {
-       elog "In order to use pam_mount you will need to configure it."
-       elog "After the modifications in /etc/security/pam_mount.conf you "
-       elog "can create the encrypted directory using the mkehd command."
-       elog "Please use mkhed -h for more informations."
-       elog
-       elog "If you want to encrypt the home directories you will need a "
-       elog "kernel with device-mapper and crypto (AES or any other chipher)"
-       elog "support."
-       elog
-       elog "This ebuild only modifies the /etc/pam.d/system-auth file to"
-       elog "support pam_mount. If you have any programs that use pam with "
-       elog "a configuration file that does NOT include system-auth you will "
-       elog "need to modify this file too. Look at /etc/pam.d/system-auth or "
-       elog "the /usr/share/doc/${PF}/README file for more informations."
-}