commit:     d38ef777e4788f1efdc811b85a80df03c4749737
Author:     Sam James <sam <AT> gentoo <DOT> org>
AuthorDate: Thu Aug 17 05:52:04 2023 +0000
Commit:     Sam James <sam <AT> gentoo <DOT> org>
CommitDate: Thu Aug 17 05:54:29 2023 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=d38ef777

sys-apps/shadow: add 4.14.0

The libbsd situation isn't ideal, but I don't feel we have a better option for 
now.

libbsd is used for two things:
1. readpassphrase(3) - not implemented in glibc, not aware of any plans to 
either
2. strlcpy(3) - implemented in >=glibc-2.38 (also in musl already)

With --disable-libbsd, shadow will use a bundled copy of readpassphrase.c, but
it still needs a system copy of strlcpy (=> libbsd if older glibc), 
disappointingly.

So, for now, depend on libbsd, and then when glibc-2.38 is stable, re-evaluate.

We could do a || ( ... ) dep now but it's, at minimum, likely to confuse
Portage and users.

Signed-off-by: Sam James <sam <AT> gentoo.org>

 sys-apps/shadow/Manifest             |   2 +
 sys-apps/shadow/shadow-4.14.0.ebuild | 270 +++++++++++++++++++++++++++++++++++
 2 files changed, 272 insertions(+)

diff --git a/sys-apps/shadow/Manifest b/sys-apps/shadow/Manifest
index ca3ab73585db..55b1cc480711 100644
--- a/sys-apps/shadow/Manifest
+++ b/sys-apps/shadow/Manifest
@@ -1,2 +1,4 @@
 DIST shadow-4.13.tar.xz 1762908 BLAKE2B 
315ab8a7e598aeefb50c11293e20cfa0982c3c3ae21c35ae243d09a4facf97a13c1d672990876e74ef94f5284402acf14997663743e2aaefa6cfc4369b7d24dc
 SHA512 
2949a728c3312bef13d23138d6b79caf402781b1cb179e33b5be546c1790971ec20778d0e9cd3dbe09691d928ffcbe88e60da42fab58c69a90d5ebe5e3e2ab8e
 DIST shadow-4.13.tar.xz.asc 488 BLAKE2B 
de1f8285c5713a772343a2a7c638d1d13429dd4fa867d4f91d4922aa0d083b4a3110d38e8a8ab82137fdf4fecb12ba3677f3fb235401fc6438ae663fbd9bfbd2
 SHA512 
f8549c4e699c65721d53946d61b6127712572f7ad9ee13018ef3a25307002992aa727471c948d1bb22dcddf112715bed387d28f436123f30e153ae6bc0cd3648
+DIST shadow-4.14.0.tar.xz 1787892 BLAKE2B 
6e9a6108f856953ec91c597e46ad4f912101a829c7b3ff3389510be43f56f0a70425bd562119282d73df269df45af354e626741ad748f9c1e6f27b74a462a62c
 SHA512 
ff960481d576f9db5a9f10becc4e1a74c03de484ecfdcd7f1ea735fded683d7ba0f9cd895dc6a431b77e5a633752273178b1bcda4cefaa5adbf0f143c9a0c86f
+DIST shadow-4.14.0.tar.xz.asc 488 BLAKE2B 
e9ccdb38f130088ba2193e40a4ef7ccce3a592972bc7cb4e50cd8ad768c152b9bbb61432abbfe6ccc0cbed3979b4f54b8da68d1c58cb25bdb668bf5427b5a628
 SHA512 
d011a732d73b4b066ca8d204c0420303f925c87efc7655feb5c5f60b619d67da450e220ee44f6c86929ae79cbd4343136fe9c20d25b39fa0a228a48e57636309

diff --git a/sys-apps/shadow/shadow-4.14.0.ebuild 
b/sys-apps/shadow/shadow-4.14.0.ebuild
new file mode 100644
index 000000000000..cd807483b88c
--- /dev/null
+++ b/sys-apps/shadow/shadow-4.14.0.ebuild
@@ -0,0 +1,270 @@
+# Copyright 1999-2023 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+# Upstream sometimes pushes releases as pre-releases before marking them
+# official. Don't keyword the pre-releases!
+# Check https://github.com/shadow-maint/shadow/releases.
+
+VERIFY_SIG_OPENPGP_KEY_PATH="${BROOT}"/usr/share/openpgp-keys/sergehallyn.asc
+inherit libtool pam verify-sig
+
+DESCRIPTION="Utilities to deal with user accounts"
+HOMEPAGE="https://github.com/shadow-maint/shadow";
+SRC_URI="https://github.com/shadow-maint/shadow/releases/download/${PV}/${P}.tar.xz";
+SRC_URI+=" verify-sig? ( 
https://github.com/shadow-maint/shadow/releases/download/${PV}/${P}.tar.xz.asc 
)"
+
+LICENSE="BSD GPL-2"
+# Subslot is for libsubid's SONAME.
+SLOT="0/4"
+KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~loong ~m68k ~mips ~ppc ~ppc64 
~riscv ~s390 ~sparc ~x86"
+IUSE="acl audit bcrypt cracklib nls pam selinux skey split-usr su systemd 
xattr"
+# Taken from the man/Makefile.am file.
+LANGS=( cs da de es fi fr hu id it ja ko pl pt_BR ru sv tr zh_CN zh_TW )
+
+REQUIRED_USE="?? ( cracklib pam )"
+
+# TODO: Revisit libbsd dep once glibc-2.28 is stable as it provides strlcpy.
+COMMON_DEPEND="
+       dev-libs/libbsd
+       virtual/libcrypt:=
+       acl? ( sys-apps/acl:= )
+       audit? ( >=sys-process/audit-2.6:= )
+       cracklib? ( >=sys-libs/cracklib-2.7-r3:= )
+       nls? ( virtual/libintl )
+       pam? ( sys-libs/pam:= )
+       skey? ( sys-auth/skey:= )
+       selinux? (
+               >=sys-libs/libselinux-1.28:=
+               sys-libs/libsemanage:=
+       )
+       systemd? ( sys-apps/systemd:= )
+       xattr? ( sys-apps/attr:= )
+"
+DEPEND="
+       ${COMMON_DEPEND}
+       >=sys-kernel/linux-headers-4.14
+"
+RDEPEND="
+       ${COMMON_DEPEND}
+       !<sys-apps/man-pages-5.11-r1
+       !=sys-apps/man-pages-5.12-r0
+       !=sys-apps/man-pages-5.12-r1
+       nls? (
+               !<app-i18n/man-pages-it-5.06-r1
+               !<app-i18n/man-pages-ja-20180315-r1
+               !<app-i18n/man-pages-ru-5.03.2390.2390.20191017-r1
+       )
+       pam? ( >=sys-auth/pambase-20150213 )
+       su? ( !sys-apps/util-linux[su(-)] )
+"
+BDEPEND="
+       app-arch/xz-utils
+       sys-devel/gettext
+       verify-sig? ( sec-keys/openpgp-keys-sergehallyn )
+"
+
+src_prepare() {
+       default
+
+       elibtoolize
+}
+
+src_configure() {
+       local myeconfargs=(
+               # Negate new upstream default of disabling for now
+               --enable-lastlog
+               --disable-account-tools-setuid
+               --disable-static
+               --with-btrfs
+               # shadow uses a bundled copy of readpassphrase if 
--without-libbsd
+               --with-libbsd
+               --without-group-name-max-length
+               --without-tcb
+               $(use_enable nls)
+               # TODO: wire up upstream for elogind too
+               $(use_enable systemd logind)
+               $(use_with acl)
+               $(use_with audit)
+               $(use_with bcrypt)
+               $(use_with cracklib libcrack)
+               $(use_with elibc_glibc nscd)
+               $(use_with pam libpam)
+               $(use_with selinux)
+               $(use_with skey)
+               $(use_with su)
+               $(use_with xattr attr)
+       )
+
+       econf "${myeconfargs[@]}"
+
+       if use nls ; then
+               local l langs="po" # These are the pot files.
+               for l in ${LANGS[*]} ; do
+                       has ${l} ${LINGUAS-${l}} && langs+=" ${l}"
+               done
+               sed -i "/^SUBDIRS = /s:=.*:= ${langs}:" man/Makefile || die
+       fi
+}
+
+set_login_opt() {
+       local comment="" opt=${1} val=${2}
+       if [[ -z ${val} ]]; then
+               comment="#"
+               sed -i \
+                       -e "/^${opt}\>/s:^:#:" \
+                       "${ED}"/etc/login.defs || die
+       else
+               sed -i -r \
+                       -e "/^#?${opt}\>/s:.*:${opt} ${val}:" \
+                       "${ED}"/etc/login.defs
+       fi
+       local res=$(grep "^${comment}${opt}\>" "${ED}"/etc/login.defs)
+       einfo "${res:-Unable to find ${opt} in /etc/login.defs}"
+}
+
+src_install() {
+       emake DESTDIR="${D}" suidperms=4711 install
+
+       # 4.9 regression: https://github.com/shadow-maint/shadow/issues/389
+       emake DESTDIR="${D}" -C man install
+
+       find "${ED}" -name '*.la' -type f -delete || die
+
+       insinto /etc
+       if ! use pam ; then
+               insopts -m0600
+               doins etc/login.access etc/limits
+       fi
+
+       # needed for 'useradd -D'
+       insinto /etc/default
+       insopts -m0600
+       doins "${FILESDIR}"/default/useradd
+
+       if use split-usr ; then
+               # move passwd to / to help recover broke systems #64441
+               # We cannot simply remove this or else net-misc/scponly
+               # and other tools will break because of hardcoded passwd
+               # location
+               dodir /bin
+               mv "${ED}"/usr/bin/passwd "${ED}"/bin/ || die
+               dosym ../../bin/passwd /usr/bin/passwd
+       fi
+
+       cd "${S}" || die
+       insinto /etc
+       insopts -m0644
+       newins etc/login.defs login.defs
+
+       set_login_opt CREATE_HOME yes
+       if ! use pam ; then
+               set_login_opt MAIL_CHECK_ENAB no
+               set_login_opt SU_WHEEL_ONLY yes
+               set_login_opt CRACKLIB_DICTPATH /usr/lib/cracklib_dict
+               set_login_opt LOGIN_RETRIES 3
+               set_login_opt ENCRYPT_METHOD SHA512
+               set_login_opt CONSOLE
+       else
+               dopamd "${FILESDIR}"/pam.d-include/shadow
+
+               for x in chsh chfn ; do
+                       newpamd "${FILESDIR}"/pam.d-include/passwd ${x}
+               done
+
+               for x in chpasswd newusers ; do
+                       newpamd "${FILESDIR}"/pam.d-include/chpasswd ${x}
+               done
+
+               newpamd "${FILESDIR}"/pam.d-include/shadow-r1 groupmems
+
+               # Comment out login.defs options that pam hates
+               local opt sed_args=()
+               for opt in \
+                       CHFN_AUTH \
+                       CONSOLE \
+                       CRACKLIB_DICTPATH \
+                       ENV_HZ \
+                       ENVIRON_FILE \
+                       FAILLOG_ENAB \
+                       FTMP_FILE \
+                       LASTLOG_ENAB \
+                       MAIL_CHECK_ENAB \
+                       MOTD_FILE \
+                       NOLOGINS_FILE \
+                       OBSCURE_CHECKS_ENAB \
+                       PASS_ALWAYS_WARN \
+                       PASS_CHANGE_TRIES \
+                       PASS_MIN_LEN \
+                       PORTTIME_CHECKS_ENAB \
+                       QUOTAS_ENAB \
+                       SU_WHEEL_ONLY
+               do
+                       set_login_opt ${opt}
+                       sed_args+=( -e "/^#${opt}\>/b pamnote" )
+               done
+               sed -i "${sed_args[@]}" \
+                       -e 'b exit' \
+                       -e ': pamnote; i# NOTE: This setting should be 
configured via /etc/pam.d/ and not in this file.' \
+                       -e ': exit' \
+                       "${ED}"/etc/login.defs || die
+
+               # Remove manpages that pam will install for us
+               # and/or don't apply when using pam
+               find "${ED}"/usr/share/man -type f \
+                       '(' -name 'limits.5*' -o -name 'suauth.5*' ')' \
+                       -delete
+
+               # Remove pam.d files provided by pambase.
+               rm "${ED}"/etc/pam.d/{login,passwd} || die
+               if use su ; then
+                       rm "${ED}"/etc/pam.d/su || die
+               fi
+       fi
+
+       # Remove manpages that are handled by other packages
+       find "${ED}"/usr/share/man -type f \
+               '(' -name id.1 -o -name getspnam.3 ')' \
+               -delete || die
+
+       if ! use su ; then
+               find "${ED}"/usr/share/man -type f -name su.1 -delete || die
+       fi
+
+       cd "${S}" || die
+       dodoc ChangeLog NEWS TODO
+       newdoc README README.download
+       cd doc || die
+       dodoc HOWTO README* WISHLIST *.txt
+}
+
+pkg_preinst() {
+       rm -f "${EROOT}"/etc/pam.d/system-auth.new \
+               "${EROOT}/etc/login.defs.new"
+}
+
+pkg_postinst() {
+       # Missing entries from /etc/passwd can cause odd system blips.
+       # See bug #829872.
+       if ! pwck -r -q -R "${EROOT:-/}" &>/dev/null ; then
+               ewarn "Running 'pwck' returned errors. Please run it manually 
to fix any errors."
+       fi
+
+       # Enable shadow groups.
+       if [[ ! -f "${EROOT}"/etc/gshadow ]] ; then
+               if grpck -r -R "${EROOT:-/}" 2>/dev/null ; then
+                       grpconv -R "${EROOT:-/}"
+               else
+                       ewarn "Running 'grpck' returned errors. Please run it 
by hand, and then"
+                       ewarn "run 'grpconv' afterwards!"
+               fi
+       fi
+
+       [[ ! -f "${EROOT}"/etc/subgid ]] &&
+               touch "${EROOT}"/etc/subgid
+       [[ ! -f "${EROOT}"/etc/subuid ]] &&
+               touch "${EROOT}"/etc/subuid
+
+       einfo "The 'adduser' symlink to 'useradd' has been dropped."
+}

Reply via email to