diff options
-rw-r--r-- | sys-auth/pam_keyring/ChangeLog | 11 | ||||
-rw-r--r-- | sys-auth/pam_keyring/Manifest | 24 | ||||
-rw-r--r-- | sys-auth/pam_keyring/files/digest-pam_keyring-0.0.8 | 3 | ||||
-rw-r--r-- | sys-auth/pam_keyring/files/gdm.example | 14 | ||||
-rw-r--r-- | sys-auth/pam_keyring/files/pam_keyring-0.0.8-fixes.patch | 56 | ||||
-rw-r--r-- | sys-auth/pam_keyring/metadata.xml | 9 | ||||
-rw-r--r-- | sys-auth/pam_keyring/pam_keyring-0.0.8.ebuild | 43 |
7 files changed, 160 insertions, 0 deletions
diff --git a/sys-auth/pam_keyring/ChangeLog b/sys-auth/pam_keyring/ChangeLog new file mode 100644 index 000000000000..6ae05c82e7a3 --- /dev/null +++ b/sys-auth/pam_keyring/ChangeLog @@ -0,0 +1,11 @@ +# ChangeLog for <CATEGORY>/<PACKAGE_NAME> +# Copyright 1999-2006 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/sys-auth/pam_keyring/ChangeLog,v 1.1 2006/10/02 05:03:44 tester Exp $ + +*pam_keyring-0.0.8 (02 Oct 2006) + + 02 Oct 2006; Olivier Crête <tester@gentoo.org> + +files/pam_keyring-0.0.8-fixes.patch, +files/gdm.example, +metadata.xml, + +pam_keyring-0.0.8.ebuild: + Initial commit + diff --git a/sys-auth/pam_keyring/Manifest b/sys-auth/pam_keyring/Manifest new file mode 100644 index 000000000000..a83b5644e557 --- /dev/null +++ b/sys-auth/pam_keyring/Manifest @@ -0,0 +1,24 @@ +AUX gdm.example 554 RMD160 79fa3d552e3d848002dc300bd40281404bf91eba SHA1 dc5b63bd5053f62e590220a6ab227fcbc67b918c SHA256 aa910ec8d79faf54d23d7a5a6d240ee8bc8a9b042c88bee296f52abb89577b81 +MD5 fa07eb24772ca08186c5ec37b47680c1 files/gdm.example 554 +RMD160 79fa3d552e3d848002dc300bd40281404bf91eba files/gdm.example 554 +SHA256 aa910ec8d79faf54d23d7a5a6d240ee8bc8a9b042c88bee296f52abb89577b81 files/gdm.example 554 +AUX pam_keyring-0.0.8-fixes.patch 1883 RMD160 c70c70df4d39fcaf3d128742f89b00e9f37f6dfc SHA1 326dd8ace3fb871b05959a7cceeeb6ab5d3f00b6 SHA256 40ccb080edc39087b795bbac7d2e5345f53ab7717c733af84d1dd51eb01b469a +MD5 0fa8755c568136e1d3e295abb26f9a21 files/pam_keyring-0.0.8-fixes.patch 1883 +RMD160 c70c70df4d39fcaf3d128742f89b00e9f37f6dfc files/pam_keyring-0.0.8-fixes.patch 1883 +SHA256 40ccb080edc39087b795bbac7d2e5345f53ab7717c733af84d1dd51eb01b469a files/pam_keyring-0.0.8-fixes.patch 1883 +DIST pam_keyring-0.0.8.tar.gz 627561 RMD160 0d930cb7a84d43b9d44d32a0b73c92a51c15676f SHA1 4f571cde22f5968bdb6aa470ffe5f3121d9f24e5 SHA256 057fc17dd923d060ea239e1468685dae565731c3f98a34ec15226f2ccdcd4560 +EBUILD pam_keyring-0.0.8.ebuild 1058 RMD160 3ac249d6c8c38ed3e49c6c1c495e73e43eae90a1 SHA1 3d3c5d4becf65c7db7cd6c94697b17a2a78a45f1 SHA256 b7eeb91e54a2f262ce7ad1d6c75748edb599168ee67cf996792087d6f5fbac6b +MD5 316262669db558fbb1b35bb5df8125e9 pam_keyring-0.0.8.ebuild 1058 +RMD160 3ac249d6c8c38ed3e49c6c1c495e73e43eae90a1 pam_keyring-0.0.8.ebuild 1058 +SHA256 b7eeb91e54a2f262ce7ad1d6c75748edb599168ee67cf996792087d6f5fbac6b pam_keyring-0.0.8.ebuild 1058 +MISC ChangeLog 332 RMD160 391829464c69914149a11a32b8f674087d3e03c6 SHA1 611432116d1c6a8fa9b0978d482b9bdeb89b35a0 SHA256 ec326ad4b36e5b699b1b75acaafddcf1ec8affb6dad87977a24a101004c7d3bb +MD5 de5242a9b2d0d6c266e7b531dbf5b63e ChangeLog 332 +RMD160 391829464c69914149a11a32b8f674087d3e03c6 ChangeLog 332 +SHA256 ec326ad4b36e5b699b1b75acaafddcf1ec8affb6dad87977a24a101004c7d3bb ChangeLog 332 +MISC metadata.xml 248 RMD160 74a3dfaa7d6d0f639f4af31011309c9faeb1ed0a SHA1 5da8dde1ba4922e4f52e24806cd6b731a6019a18 SHA256 71e4384e0f8bcee0ab591308de6ba216776123042aab63deed3bc36bea38c0f4 +MD5 ee62b17d39eabe8fd5e0055c7ff0e648 metadata.xml 248 +RMD160 74a3dfaa7d6d0f639f4af31011309c9faeb1ed0a metadata.xml 248 +SHA256 71e4384e0f8bcee0ab591308de6ba216776123042aab63deed3bc36bea38c0f4 metadata.xml 248 +MD5 1381df1ef4f41055b72c43daeb749334 files/digest-pam_keyring-0.0.8 253 +RMD160 6055d40ebe65662e474d36acedfce2b6543dc761 files/digest-pam_keyring-0.0.8 253 +SHA256 05ecca86142bb5a85c652fb10489539e0ffe95d9d8d8b635a0b5cc7453e2818a files/digest-pam_keyring-0.0.8 253 diff --git a/sys-auth/pam_keyring/files/digest-pam_keyring-0.0.8 b/sys-auth/pam_keyring/files/digest-pam_keyring-0.0.8 new file mode 100644 index 000000000000..f4bf960ecf9f --- /dev/null +++ b/sys-auth/pam_keyring/files/digest-pam_keyring-0.0.8 @@ -0,0 +1,3 @@ +MD5 81a5c466d8b08d9f95d478c5feac73a5 pam_keyring-0.0.8.tar.gz 627561 +RMD160 0d930cb7a84d43b9d44d32a0b73c92a51c15676f pam_keyring-0.0.8.tar.gz 627561 +SHA256 057fc17dd923d060ea239e1468685dae565731c3f98a34ec15226f2ccdcd4560 pam_keyring-0.0.8.tar.gz 627561 diff --git a/sys-auth/pam_keyring/files/gdm.example b/sys-auth/pam_keyring/files/gdm.example new file mode 100644 index 000000000000..27ab523d187c --- /dev/null +++ b/sys-auth/pam_keyring/files/gdm.example @@ -0,0 +1,14 @@ +#%PAM-1.0 +auth optional pam_env.so +auth optional pam_keyring.so try_first_pass +# Uncomment if you want pam_ssh to work too +# You obviously have to have the same password for both +#auth sufficient pam_ssh.so try_first_pass +auth include system-auth +auth required pam_nologin.so +account include system-auth +password include system-auth +session include system-auth +session optional pam_keyring.so +# Uncomment this one to for pam_ssh +#session optional pam_ssh.so diff --git a/sys-auth/pam_keyring/files/pam_keyring-0.0.8-fixes.patch b/sys-auth/pam_keyring/files/pam_keyring-0.0.8-fixes.patch new file mode 100644 index 000000000000..9822e0008cd5 --- /dev/null +++ b/sys-auth/pam_keyring/files/pam_keyring-0.0.8-fixes.patch @@ -0,0 +1,56 @@ +diff -ru pam_keyring-0.0.8.orig/src/compat.c pam_keyring-0.0.8/src/compat.c +--- pam_keyring-0.0.8.orig/src/compat.c 2006-06-02 13:04:37.000000000 -0400 ++++ pam_keyring-0.0.8/src/compat.c 2006-10-02 00:03:20.000000000 -0400 +@@ -37,15 +37,15 @@ + if (!msgbuf) { + syslog (LOG_AUTHPRIV|LOG_CRIT, "%s: vasprintf: %m", + "pam_keyring"); +- closelog(); +- return; +- } +- +- syslog (LOG_AUTHPRIV|priority, "%s: %s: %s", ++ } else { ++ syslog (LOG_AUTHPRIV|priority, "%s: %s: %s", + "pam_keyring", service, msgbuf); ++ free(msgbuf); + // _pam_overwrite(msgbuf); ++ } + + closelog(); ++ + } + + /* +@@ -53,7 +53,7 @@ + * response. + */ + int +-pam_prompt(pam_handle_t *pamh, int style, const char *prompt, char **user_msg) ++pam_prompt(pam_handle_t *pamh, int style, char **user_msg, const char *prompt) + { + int retval; + const void *item; +diff -ru pam_keyring-0.0.8.orig/src/compat.h pam_keyring-0.0.8/src/compat.h +--- pam_keyring-0.0.8.orig/src/compat.h 2006-06-01 13:15:38.000000000 -0400 ++++ pam_keyring-0.0.8/src/compat.h 2006-10-01 23:56:46.000000000 -0400 +@@ -6,6 +6,6 @@ + + extern int PAM_FORMAT((printf, 4, 5)) PAM_NONNULL((1,4)) + pam_prompt (pam_handle_t *pamh, int style, char **response, +- const char *fmt, ...); ++ const char *prompt); + + #endif +diff -ru pam_keyring-0.0.8.orig/src/pam_keyring.c pam_keyring-0.0.8/src/pam_keyring.c +--- pam_keyring-0.0.8.orig/src/pam_keyring.c 2006-06-05 11:36:17.000000000 -0400 ++++ pam_keyring-0.0.8/src/pam_keyring.c 2006-10-02 00:38:17.000000000 -0400 +@@ -285,7 +285,7 @@ + g_error_free(err); + goto _return; + } +- if (WIFEXITED(status) == 0 && standard_out != NULL) { ++ if (WIFEXITED(status) && standard_out != NULL) { + lines = g_strsplit(standard_out, "\n", 3); + if (lines[0] != NULL && + lines[1] != NULL && diff --git a/sys-auth/pam_keyring/metadata.xml b/sys-auth/pam_keyring/metadata.xml new file mode 100644 index 000000000000..0d7a58beec50 --- /dev/null +++ b/sys-auth/pam_keyring/metadata.xml @@ -0,0 +1,9 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> +<herd>pam</herd> +<maintainer> + <email>tester@gentoo.org</email> + <name>Olivier Crête</name> +</maintainer> +</pkgmetadata> diff --git a/sys-auth/pam_keyring/pam_keyring-0.0.8.ebuild b/sys-auth/pam_keyring/pam_keyring-0.0.8.ebuild new file mode 100644 index 000000000000..a651e10c07f1 --- /dev/null +++ b/sys-auth/pam_keyring/pam_keyring-0.0.8.ebuild @@ -0,0 +1,43 @@ +# Copyright 1999-2006 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/sys-auth/pam_keyring/pam_keyring-0.0.8.ebuild,v 1.1 2006/10/02 05:03:44 tester Exp $ + +inherit multilib eutils + +DESCRIPTION="Unlock GNOME keyring with login password" +HOMEPAGE="http://www.hekanetworks.com/pam_keyring/" +SRC_URI="http://www.hekanetworks.com/opensource/pam_keyring/${P}.tar.gz" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="~amd64" +IUSE="" + +DEPEND="sys-libs/pam + >=gnome-base/gnome-session-2.10 + >=gnome-base/gnome-keyring-0.4.8" + +src_unpack() { + unpack ${A} + + epatch ${FILESDIR}/${P}-fixes.patch +} + +src_compile() { + econf --libdir=/$(get_libdir) \ + || die "econf failed" + + emake || die "emake failed" +} + +src_install() { + make install DESTDIR=${D} || die "install failed" + rm -f ${D}/$(get_libdir)/security/*.{a,la} + dodoc AUTHORS ChangeLog README TODO + dodoc ${FILESDIR}/gdm.example +} + +pkg_postinst() { + einfo "There is a example of a /etc/pam.d/gdm with pam_keyring" + einfo "at /usr/share/doc/${PF}/gdm.example.gz" +} |