# Contributor: William Pitcock # Contributor: Jakub Jirutka # Maintainer: Stuart Cardall pkgname=shadow pkgver=4.2.1 pkgrel=7 pkgdesc="PAM-using login and passwd utilities (usermod, useradd, ...)" url="http://pkg-shadow.alioth.debian.org/" arch="all" license="GPL" depends="" makedepends="linux-pam-dev" subpackages="$pkgname-doc $pkgname-dbg $pkgname-uidmap" source="http://pkg-shadow.alioth.debian.org/releases/shadow-$pkgver.tar.xz login.pamd dots-in-usernames.patch cross-size-checks.patch verbose-error-when-uid-doesnt-match.patch 301-CVE-2017-2616-su-properly-clear-child-PID.patch 302-CVE-2016-6252-fix-integer-overflow.patch " # secfixes: # - CVE-2016-6252 # - CVE-2017-2616 options="suid" builddir="$srcdir/shadow-$pkgver" build() { cd "$builddir" ./configure --prefix=/usr \ --sysconfdir=/etc \ --mandir=/usr/share/man \ --infodir=/usr/share/info \ --localstatedir=/var \ --disable-nls \ --with-libpam \ --without-audit \ --without-selinux \ --without-acl \ --without-attr \ --without-tcb \ --without-nscd \ --without-group-name-max-length \ || return 1 make || return 1 } package() { cd "$builddir" make DESTDIR="$pkgdir" install || return 1 # Do not install these pam.d files they are broken and outdated. # nologin is provided by util-linux. rm "$pkgdir"/etc/pam.d/* \ "$pkgdir"/sbin/nologin \ || return 1 # However, install our own for login. cp "$srcdir"/login.pamd "$pkgdir"/etc/pam.d/login || return 1 # /etc/login.defs is not very useful - replace it with a blank file. rm "$pkgdir"/etc/login.defs touch "$pkgdir"/etc/login.defs # Avoid conflict with man-pages. rm "$pkgdir"/usr/share/man/man3/getspnam.3* \ "$pkgdir"/usr/share/man/man5/passwd.5* || return 1 } uidmap() { pkgdesc="Utilities for using subordinate UIDs and GIDs" mkdir -p "$subpkgdir" cd "$subpkgdir" mkdir -p usr/bin mv "$pkgdir"/usr/bin/new*idmap usr/bin/ || return 1 chmod 4711 usr/bin/new*idmap || return 1 # Used e.g. for unprivileged LXC containers. mkdir etc touch etc/subuid etc/subgid } sha512sums="7a14bf8e08126f0402e37b6e4c559615ced7cf829e39156d929ed05cd8813de48a77ff1f7f6fe707da04cf662a2e9e84c22d63d88dd1ed13f935fde594db95f0 shadow-4.2.1.tar.xz 46a6f83f3698e101b58b8682852da749619412f75dfa85cecad03d0847f6c3dc452d984510db7094220e4570a0565b83b0556e16198ad894a3ec84b3e513d58d login.pamd 745eea04c054226feba165b635dbb8570b8a04537d41e914400a4c54633c3a9cf350da0aabfec754fb8cf3e58fc1c8cf597b895506312f19469071760c11f31d dots-in-usernames.patch c46760254439176babeef24d93900914092655af3a48f54385adf6ef5a3af76799fb7e96083acd27853d6ab6d7392543dbaf70bb26f164519e92f677da7851a4 cross-size-checks.patch 1b3513772a7a0294b587723213e4464cc5a1a42ae6a79e9b9f9ea20083684a21d81e362f44d87ce2e6de2daf396d8422b39019923c0b0cbb44fa4c4c24613c0c verbose-error-when-uid-doesnt-match.patch 0954920ce9307948848d8f9ca5ea5bba4db8394793ef314ab5c6770948e96071748192b52ba8c31d543fe71ce0e6e2a7f3a2a92862966a940639a19df1048634 301-CVE-2017-2616-su-properly-clear-child-PID.patch 36f494347cb980d85ea82331ec620a949be45f5f2c400a3b13f409a8d9c932c0f822cb0baa2ee78c6f356e7bf93de51c1b0f20730e8f3af36a746a5632d19bbe 302-CVE-2016-6252-fix-integer-overflow.patch"