Patrick Williams | c124f4f | 2015-09-15 14:41:29 -0500 | [diff] [blame] | 1 | SUMMARY = "Tools to change and administer password and group data" |
| 2 | HOMEPAGE = "http://pkg-shadow.alioth.debian.org" |
| 3 | BUGTRACKER = "https://alioth.debian.org/tracker/?group_id=30580" |
| 4 | SECTION = "base/utils" |
| 5 | LICENSE = "BSD | Artistic-1.0" |
| 6 | LIC_FILES_CHKSUM = "file://COPYING;md5=ed80ff1c2b40843cf5768e5229cf16e5 \ |
| 7 | file://src/passwd.c;beginline=8;endline=30;md5=d83888ea14ae61951982d77125947661" |
| 8 | |
Patrick Williams | c124f4f | 2015-09-15 14:41:29 -0500 | [diff] [blame] | 9 | DEPENDS_class-native = "" |
| 10 | DEPENDS_class-nativesdk = "" |
| 11 | |
| 12 | SRC_URI = "http://pkg-shadow.alioth.debian.org/releases/${BPN}-${PV}.tar.xz \ |
| 13 | file://shadow-4.1.3-dots-in-usernames.patch \ |
| 14 | file://usermod-fix-compilation-failure-with-subids-disabled.patch \ |
| 15 | file://fix-installation-failure-with-subids-disabled.patch \ |
| 16 | file://0001-Do-not-read-login.defs-before-doing-chroot.patch \ |
| 17 | file://check_size_of_uid_t_and_gid_t_using_AC_CHECK_SIZEOF.patch \ |
Brad Bishop | 6e60e8b | 2018-02-01 10:27:11 -0500 | [diff] [blame] | 18 | file://0001-useradd-copy-extended-attributes-of-home.patch \ |
Brad Bishop | d7bf8c1 | 2018-02-25 22:55:05 -0500 | [diff] [blame] | 19 | file://0001-shadow-CVE-2017-12424 \ |
Patrick Williams | c124f4f | 2015-09-15 14:41:29 -0500 | [diff] [blame] | 20 | ${@bb.utils.contains('PACKAGECONFIG', 'pam', '${PAM_SRC_URI}', '', d)} \ |
| 21 | " |
| 22 | |
| 23 | SRC_URI_append_class-target = " \ |
| 24 | file://login_defs_pam.sed \ |
| 25 | file://shadow-update-pam-conf.patch \ |
Patrick Williams | c0f7c04 | 2017-02-23 20:41:17 -0600 | [diff] [blame] | 26 | file://shadow-relaxed-usernames.patch \ |
Patrick Williams | c124f4f | 2015-09-15 14:41:29 -0500 | [diff] [blame] | 27 | " |
| 28 | |
| 29 | SRC_URI_append_class-native = " \ |
Patrick Williams | d8c66bc | 2016-06-20 12:57:21 -0500 | [diff] [blame] | 30 | file://0001-Disable-use-of-syslog-for-sysroot.patch \ |
Patrick Williams | c124f4f | 2015-09-15 14:41:29 -0500 | [diff] [blame] | 31 | file://allow-for-setting-password-in-clear-text.patch \ |
| 32 | file://commonio.c-fix-unexpected-open-failure-in-chroot-env.patch \ |
| 33 | file://0001-useradd.c-create-parent-directories-when-necessary.patch \ |
| 34 | " |
| 35 | SRC_URI_append_class-nativesdk = " \ |
Patrick Williams | d8c66bc | 2016-06-20 12:57:21 -0500 | [diff] [blame] | 36 | file://0001-Disable-use-of-syslog-for-sysroot.patch \ |
Patrick Williams | c124f4f | 2015-09-15 14:41:29 -0500 | [diff] [blame] | 37 | " |
| 38 | |
| 39 | SRC_URI[md5sum] = "2bfafe7d4962682d31b5eba65dba4fc8" |
| 40 | SRC_URI[sha256sum] = "3b0893d1476766868cd88920f4f1231c4795652aa407569faff802bcda0f3d41" |
| 41 | |
| 42 | # Additional Policy files for PAM |
| 43 | PAM_SRC_URI = "file://pam.d/chfn \ |
| 44 | file://pam.d/chpasswd \ |
| 45 | file://pam.d/chsh \ |
| 46 | file://pam.d/login \ |
| 47 | file://pam.d/newusers \ |
| 48 | file://pam.d/passwd \ |
| 49 | file://pam.d/su" |
| 50 | |
| 51 | inherit autotools gettext |
| 52 | |
| 53 | EXTRA_OECONF += "--without-audit \ |
| 54 | --without-libcrack \ |
| 55 | --without-selinux \ |
| 56 | --with-group-name-max-length=24 \ |
| 57 | --enable-subordinate-ids=yes \ |
| 58 | ${NSCDOPT}" |
| 59 | |
| 60 | NSCDOPT = "" |
| 61 | NSCDOPT_class-native = "--without-nscd" |
| 62 | NSCDOPT_class-nativesdk = "--without-nscd" |
Patrick Williams | c124f4f | 2015-09-15 14:41:29 -0500 | [diff] [blame] | 63 | NSCDOPT_libc-glibc = "${@bb.utils.contains('DISTRO_FEATURES', 'libc-spawn', '--with-nscd', '--without-nscd', d)}" |
| 64 | |
| 65 | PAM_PLUGINS = "libpam-runtime \ |
| 66 | pam-plugin-faildelay \ |
| 67 | pam-plugin-securetty \ |
| 68 | pam-plugin-nologin \ |
| 69 | pam-plugin-env \ |
| 70 | pam-plugin-group \ |
| 71 | pam-plugin-limits \ |
| 72 | pam-plugin-lastlog \ |
| 73 | pam-plugin-motd \ |
| 74 | pam-plugin-mail \ |
| 75 | pam-plugin-shells \ |
| 76 | pam-plugin-rootok" |
| 77 | |
Brad Bishop | 6e60e8b | 2018-02-01 10:27:11 -0500 | [diff] [blame] | 78 | PACKAGECONFIG ??= "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)} \ |
| 79 | ${@bb.utils.contains('DISTRO_FEATURES', 'xattr', 'attr', '', d)}" |
| 80 | PACKAGECONFIG_class-native ??= "${@bb.utils.contains('DISTRO_FEATURES', 'xattr', 'attr', '', d)}" |
Patrick Williams | c124f4f | 2015-09-15 14:41:29 -0500 | [diff] [blame] | 81 | PACKAGECONFIG_class-nativesdk = "" |
| 82 | PACKAGECONFIG[pam] = "--with-libpam,--without-libpam,libpam,${PAM_PLUGINS}" |
| 83 | PACKAGECONFIG[attr] = "--with-attr,--without-attr,attr" |
| 84 | PACKAGECONFIG[acl] = "--with-acl,--without-acl,acl" |
| 85 | |
| 86 | RDEPENDS_${PN} = "shadow-securetty \ |
| 87 | base-passwd \ |
| 88 | util-linux-sulogin" |
| 89 | RDEPENDS_${PN}_class-native = "" |
| 90 | RDEPENDS_${PN}_class-nativesdk = "" |
| 91 | |
| 92 | do_install() { |
| 93 | oe_runmake DESTDIR="${D}" sbindir="${base_sbindir}" usbindir="${sbindir}" install |
| 94 | |
| 95 | # Info dir listing isn't interesting at this point so remove it if it exists. |
| 96 | if [ -e "${D}${infodir}/dir" ]; then |
| 97 | rm -f ${D}${infodir}/dir |
| 98 | fi |
| 99 | |
| 100 | # Enable CREATE_HOME by default. |
| 101 | sed -i 's/#CREATE_HOME/CREATE_HOME/g' ${D}${sysconfdir}/login.defs |
| 102 | |
| 103 | # As we are on an embedded system, ensure the users mailbox is in |
| 104 | # ~/ not /var/spool/mail by default, as who knows where or how big |
| 105 | # /var is. The system MDA will set this later anyway. |
| 106 | sed -i 's/MAIL_DIR/#MAIL_DIR/g' ${D}${sysconfdir}/login.defs |
| 107 | sed -i 's/#MAIL_FILE/MAIL_FILE/g' ${D}${sysconfdir}/login.defs |
| 108 | |
| 109 | # Disable checking emails. |
| 110 | sed -i 's/MAIL_CHECK_ENAB/#MAIL_CHECK_ENAB/g' ${D}${sysconfdir}/login.defs |
| 111 | |
| 112 | # Comment out SU_NAME to work correctly with busybox |
| 113 | # See Bug#5359 and Bug#7173 |
| 114 | sed -i 's:^SU_NAME:#SU_NAME:g' ${D}${sysconfdir}/login.defs |
| 115 | |
| 116 | # Use proper encryption for passwords |
| 117 | sed -i 's/^#ENCRYPT_METHOD.*$/ENCRYPT_METHOD SHA512/' ${D}${sysconfdir}/login.defs |
| 118 | |
| 119 | # Now we don't have a mail system. Disable mail creation for now. |
| 120 | sed -i 's:/bin/bash:/bin/sh:g' ${D}${sysconfdir}/default/useradd |
| 121 | sed -i '/^CREATE_MAIL_SPOOL/ s:^:#:' ${D}${sysconfdir}/default/useradd |
| 122 | |
| 123 | # Use users group by default |
| 124 | sed -i 's,^GROUP=1000,GROUP=100,g' ${D}${sysconfdir}/default/useradd |
| 125 | } |
| 126 | |
| 127 | do_install_append() { |
| 128 | # Ensure that the image has as a /var/spool/mail dir so shadow can |
| 129 | # put mailboxes there if the user reconfigures shadow to its |
| 130 | # defaults (see sed below). |
| 131 | install -d ${D}${localstatedir}/spool/mail |
| 132 | |
| 133 | if [ -e ${WORKDIR}/pam.d ]; then |
| 134 | install -d ${D}${sysconfdir}/pam.d/ |
| 135 | install -m 0644 ${WORKDIR}/pam.d/* ${D}${sysconfdir}/pam.d/ |
| 136 | # Remove defaults that are not used when supporting PAM. |
| 137 | sed -i -f ${WORKDIR}/login_defs_pam.sed ${D}${sysconfdir}/login.defs |
| 138 | fi |
| 139 | |
| 140 | install -d ${D}${sbindir} ${D}${base_sbindir} ${D}${base_bindir} |
| 141 | |
| 142 | # Move binaries to the locations we want |
| 143 | rm ${D}${sbindir}/vigr |
| 144 | ln -sf vipw.${BPN} ${D}${base_sbindir}/vigr |
| 145 | if [ "${sbindir}" != "${base_sbindir}" ]; then |
| 146 | mv ${D}${sbindir}/vipw ${D}${base_sbindir}/vipw |
| 147 | fi |
| 148 | if [ "${bindir}" != "${base_bindir}" ]; then |
| 149 | mv ${D}${bindir}/login ${D}${base_bindir}/login |
| 150 | mv ${D}${bindir}/su ${D}${base_bindir}/su |
| 151 | fi |
| 152 | |
| 153 | # Handle link properly after rename, otherwise missing files would |
| 154 | # lead rpm failed dependencies. |
| 155 | ln -sf newgrp.${BPN} ${D}${bindir}/sg |
| 156 | } |
| 157 | |
| 158 | PACKAGES =+ "${PN}-base" |
| 159 | FILES_${PN}-base = "\ |
| 160 | ${base_bindir}/login.shadow \ |
| 161 | ${base_bindir}/su.shadow \ |
| 162 | ${bindir}/sg \ |
| 163 | ${bindir}/newgrp.shadow \ |
| 164 | ${bindir}/groups.shadow \ |
| 165 | ${sysconfdir}/pam.d/login \ |
| 166 | ${sysconfdir}/pam.d/su \ |
| 167 | ${sysconfdir}/login.defs \ |
| 168 | " |
| 169 | RDEPENDS_${PN} += "${PN}-base" |
| 170 | |
| 171 | inherit update-alternatives |
| 172 | |
| 173 | ALTERNATIVE_PRIORITY = "200" |
| 174 | |
Brad Bishop | 6e60e8b | 2018-02-01 10:27:11 -0500 | [diff] [blame] | 175 | ALTERNATIVE_${PN} = "passwd chfn chsh chpasswd vipw vigr nologin" |
Patrick Williams | c124f4f | 2015-09-15 14:41:29 -0500 | [diff] [blame] | 176 | ALTERNATIVE_LINK_NAME[chpasswd] = "${sbindir}/chpasswd" |
| 177 | ALTERNATIVE_LINK_NAME[vipw] = "${base_sbindir}/vipw" |
| 178 | ALTERNATIVE_LINK_NAME[vigr] = "${base_sbindir}/vigr" |
Brad Bishop | 6e60e8b | 2018-02-01 10:27:11 -0500 | [diff] [blame] | 179 | ALTERNATIVE_LINK_NAME[nologin] = "${base_sbindir}/nologin" |
Patrick Williams | c124f4f | 2015-09-15 14:41:29 -0500 | [diff] [blame] | 180 | |
| 181 | ALTERNATIVE_${PN}-base = "newgrp groups login su" |
| 182 | ALTERNATIVE_LINK_NAME[login] = "${base_bindir}/login" |
| 183 | ALTERNATIVE_LINK_NAME[su] = "${base_bindir}/su" |
| 184 | |
Brad Bishop | 37a0e4d | 2017-12-04 01:01:44 -0500 | [diff] [blame] | 185 | ALTERNATIVE_${PN}-doc = "passwd.5 getspnam.3 groups.1 su.1 nologin.8" |
Patrick Williams | c124f4f | 2015-09-15 14:41:29 -0500 | [diff] [blame] | 186 | ALTERNATIVE_LINK_NAME[passwd.5] = "${mandir}/man5/passwd.5" |
| 187 | ALTERNATIVE_LINK_NAME[getspnam.3] = "${mandir}/man3/getspnam.3" |
| 188 | ALTERNATIVE_LINK_NAME[groups.1] = "${mandir}/man1/groups.1" |
Patrick Williams | c0f7c04 | 2017-02-23 20:41:17 -0600 | [diff] [blame] | 189 | ALTERNATIVE_LINK_NAME[su.1] = "${mandir}/man1/su.1" |
Brad Bishop | 37a0e4d | 2017-12-04 01:01:44 -0500 | [diff] [blame] | 190 | ALTERNATIVE_LINK_NAME[nologin.8] = "${mandir}/man8/nologin.8" |
Patrick Williams | c124f4f | 2015-09-15 14:41:29 -0500 | [diff] [blame] | 191 | |
Brad Bishop | 6e60e8b | 2018-02-01 10:27:11 -0500 | [diff] [blame] | 192 | PACKAGE_WRITE_DEPS += "shadow-native" |
Patrick Williams | c124f4f | 2015-09-15 14:41:29 -0500 | [diff] [blame] | 193 | pkg_postinst_${PN} () { |
| 194 | if [ "x$D" != "x" ]; then |
| 195 | rootarg="--root $D" |
| 196 | else |
| 197 | rootarg="" |
| 198 | fi |
| 199 | |
| 200 | pwconv $rootarg || exit 1 |
| 201 | grpconv $rootarg || exit 1 |
| 202 | } |