1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
|
# Copyright 1999-2005 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/net-nds/openldap/openldap-2.2.23.ebuild,v 1.3 2005/05/18 00:12:10 robbat2 Exp $
inherit eutils
DESCRIPTION="LDAP suite of application and development tools"
HOMEPAGE="http://www.OpenLDAP.org/"
SRC_URI="mirror://openldap/openldap-release/${P}.tgz"
LICENSE="OPENLDAP"
SLOT="0"
IUSE="berkdb crypt debug gdbm ipv6 odbc perl readline samba sasl slp ssl tcpd"
#In portage for testing only, hardmasked in package.mask
KEYWORDS="~alpha ~amd64 ~ia64 ~ppc ~ppc64 ~sparc ~x86"
DEPEND=">=sys-libs/ncurses-5.1
>=sys-apps/sed-4
tcpd? ( >=sys-apps/tcp-wrappers-7.6 )
ssl? ( >=dev-libs/openssl-0.9.6 )
readline? ( >=sys-libs/readline-4.1 )
sasl? ( >=dev-libs/cyrus-sasl-2.1.7-r3 )
odbc? ( dev-db/unixODBC )
slp? ( >=net-libs/openslp-1.0 )
perl? ( >=dev-lang/perl-5.6 )
samba? ( >=dev-libs/openssl-0.9.6 )"
# note that the 'samba' USE flag pulling in OpenSSL is NOT an error. OpenLDAP
# uses OpenSSL for LanMan/NTLM hashing (which is used in some enviroments, like
# mine at work)!
# Robin H. Johnson <robbat2@gentoo.org> March 8, 2004
# if USE=berkdb
# pull in sys-libs/db
# else if USE=gdbm
# pull in sys-libs/gdbm
# else
# pull in sys-libs/db
DEPEND_BERKDB=">=sys-libs/db-4.2.52_p1"
DEPEND_GDBM=">=sys-libs/gdbm-1.8.0"
DEPEND="${DEPEND}
berkdb? ( ${DEPEND_BERKDB} )
!berkdb? (
gdbm? ( ${DEPEND_GDBM} )
!gdbm? ( ${DEPEND_BERKDB} )
)"
#DEPEND="${DEPEND} !<net-nds/openldap-2.2"
pkg_setup() {
if has_version '<net-nds/openldap-2.2' && [ -n "$(ls /var/lib/openldap-data/*{bdb,gdbm})" ]; then
eerror "A possible old installation of OpenLDAP was detected"
eerror "As major version upgrades to 2.2 can corrupt your database"
eerror "You need to dump your database and re-create it afterwards."
eerror ""
d="$(date -u +%s)"
l="/root/ldapdump.${d}"
i="${l}.raw"
eerror " 1. /etc/init.d/slurpd stop ; /etc/init.d/slapd stop"
eerror " 2. slapcat -l ${i}"
eerror " 3. egrep -v '^entryCSN:' <${i} >${l}"
eerror " 4. emerge unmerge '<=net-nds/openldap-2.1*'"
eerror " 5. mv /var/lib/openldap-data/ /var/lib/openldap-data,2.1/"
eerror " 6. emerge '>=net-nds/openldap-2.2'"
eerror " 7. etc-update, and ensure that you apply the changes"
eerror " 8. slapadd -l ${l}"
eerror " 9. chown ldap:ldap /var/lib/openldap-data/*"
eerror "10. /etc/init.d/slapd start"
eerror "11. check that your data is intact."
eerror "12. set up the new replication system."
eerror ""
eerror "This install will not proceed until /var/lib/openldap-data/ is"
eerror "at least moved out of the way."
exit 1
fi
}
pkg_preinst() {
enewgroup ldap 439
enewuser ldap 439 /bin/false /usr/lib/openldap ldap
}
src_unpack() {
unpack ${A}
# According to MDK, the link order needs to be changed so that
# on systems w/ MD5 passwords the system crypt library is used
# (the net result is that "passwd" can be used to change ldap passwords w/
# proper pam support)
sed -ie 's/$(SECURITY_LIBS) $(LDIF_LIBS) $(LUTIL_LIBS)/$(LUTIL_LIBS) $(SECURITY_LIBS) $(LDIF_LIBS)/' \
${S}/servers/slapd/Makefile.in
# Fix up DB-4.0 linking problem
# remember to autoconf! this expands configure by 500 lines (4 lines to m4
# stuff).
EPATCH_OPTS="-p1 -d ${S}" epatch ${FILESDIR}/${PN}-2.2.14-db40.patch
# supersedes old fix for bug #31202
EPATCH_OPTS="-p1 -d ${S}" epatch ${FILESDIR}/${PN}-2.2.14-perlthreadsfix.patch
# fix up stuff for newer autoconf that simulates autoconf-2.13, but doesn't
# do it perfectly.
cd ${S}/build
ln -s shtool install
ln -s shtool install.sh
# reconf for db40 fixes.
cd ${S}
WANT_AUTOCONF="2.1" autoconf
}
src_compile() {
local myconf
myconf="${myconf} --enable-ldbm"
myconf_berkdb='--enable-bdb --with-ldbm-api=berkeley'
myconf_gdbm='--disable-bdb --with-ldbm-api=gdbm'
if use berkdb; then
einfo "Using Berkeley DB for local backend"
myconf="${myconf} ${myconf_berkdb}"
elif use gdbm; then
einfo "Using GDBM for local backend"
myconf="${myconf} ${myconf_gdbm}"
else
ewarn "Neither gdbm or berkdb USE flags present, falling back to"
ewarn "Berkeley DB for local backend"
myconf="${myconf} ${myconf_berkdb}"
fi
# enable slapd/slurpd servers
myconf="${myconf} --enable-ldap"
myconf="${myconf} --enable-slapd --enable-slurpd"
# basic stuff
myconf="${myconf} --enable-syslog"
use debug && myconf="${myconf} --enable-debug" # there is no disable-debug
# extra functionality
myconf="${myconf} --enable-dynamic --enable-modules"
myconf="${myconf} --enable-rewrite --enable-rlookups"
myconf="${myconf} --enable-passwd --enable-phonetic"
myconf="${myconf} --enable-dnssrv --enable-ldap"
myconf="${myconf} --enable-meta --enable-monitor"
myconf="${myconf} --enable-null --enable-shell"
myconf="${myconf} --enable-local --enable-proctitle"
myconf="${myconf} --enable-hdb --enable-dyngroup"
myconf="${myconf} --enable-aci --enable-proxycache"
myconf="${myconf} --enable-cleartext --enable-slapi"
# disabled options:
# --with-bdb-module=dynamic # --enable-dnsserv
# alas, for BSD only:
# --with-fetch
for i in crypt ipv6 readline perl slp; do
myconf="${myconf} `use_enable ${i}`"
done
myconf="${myconf} `use_with sasl cyrus-sasl` `use_enable sasl spasswd`"
myconf="${myconf} `use_enable tcpd wrappers` `use_enable odbc sql`"
myconf="${myconf} `use_with ssl tls` `use_with samba lmpasswd`"
econf \
--libexecdir=/usr/lib/openldap \
${myconf} || die "configure failed"
make depend || die "make depend failed"
make || die "make failed"
}
src_test() {
einfo "Doing tests"
cd tests ; make tests || die "make tests failed"
}
src_install() {
make DESTDIR=${D} install || die "make install failed"
dodoc ANNOUNCEMENT CHANGES COPYRIGHT README LICENSE
docinto rfc ; dodoc doc/rfc/*.txt
# make state directories
for x in data slurp ldbm; do
keepdir /var/lib/openldap-${x}
fowners ldap:ldap /var/lib/openldap-${x}
fperms 0700 /var/lib/openldap-${x}
done
# manually remove /var/tmp references in .la
# because it is packaged with an ancient libtool
for x in ${D}/usr/lib/lib*.la; do
sed -i -e "s:-L${S}[/]*libraries::" ${x}
done
# change slapd.pid location in configuration file
keepdir /var/run/openldap
fowners ldap:ldap /var/run/openldap
fperms 0755 /var/run/openldap
for f in /etc/openldap/slapd.conf /etc/openldap/slapd.conf.default; do
sed -e "s:/var/lib/run/slapd.:/var/run/openldap/slapd.:" -i ${D}/${f}
sed -e "/database\tbdb$/acheckpoint 32 30 # <kbyte> <min>" -i ${D}/${f}
fowners root:ldap ${f}
fperms 0640 ${f}
done
# install our own init scripts
exeinto /etc/init.d
newexe ${FILESDIR}/2.0/slapd slapd
newexe ${FILESDIR}/2.0/slurpd slurpd
insinto /etc/conf.d
newins ${FILESDIR}/2.0/slapd.conf slapd
# install MDK's ssl cert script
if use ssl || use samba; then
dodir /etc/openldap/ssl
exeinto /etc/openldap/ssl
doexe ${FILESDIR}/gencert.sh
fi
}
pkg_postinst() {
if use ssl; then
# make a self-signed ssl cert (if there isn't one there already)
if [ ! -e /etc/openldap/ssl/ldap.pem ]
then
cd /etc/openldap/ssl
yes "" | sh gencert.sh
chmod 640 ldap.pem
chown root:ldap ldap.pem
else
einfo "An LDAP cert already appears to exist, no creating"
fi
fi
# Since moving to running openldap as user ldap there are some
# permissions problems with directories and files.
# Let's make sure these permissions are correct.
chown ldap:ldap /var/run/openldap
chmod 0755 /var/run/openldap
chown root:ldap /etc/openldap/slapd.conf{,.default}
chmod 0640 /etc/openldap/slapd.conf{,.default}
chown ldap:ldap /var/lib/openldap-{data,ldbm,slurp}
if use ssl; then
ewarn "Self-signed SSL certificates are treated harshly by OpenLDAP 2.[12]"
ewarn "add 'TLS_REQCERT never' if you want to use them."
fi
}
|