blob: e09e3dbee7f6dc857a87e11ac1caaca3cf54a9fc (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
|
# Copyright 2004 Gentoo Foundation
# Distributed under the terms of the GNU General Public License, v2 or later
# Author Diego Pettenò <flameeyes@gentoo.org>
# $Header: /var/cvsroot/gentoo-x86/eclass/pam.eclass,v 1.13 2007/07/12 14:37:40 flameeyes Exp $
#
# This eclass contains functions to install pamd configuration files and
# pam modules.
inherit multilib
# dopamd <file> [more files]
#
# Install pam auth config file in /etc/pam.d
dopamd() {
[[ -z $1 ]] && die "dopamd requires at least one argument"
if hasq pam ${IUSE} && ! use pam; then
return 0;
fi
( # dont want to pollute calling env
insinto /etc/pam.d
insopts -m 0644
doins "$@"
) || die "failed to install $@"
cleanpamd "$@"
}
# newpamd <old name> <new name>
#
# Install pam file <old name> as <new name> in /etc/pam.d
newpamd() {
[[ $# -ne 2 ]] && die "newpamd requires two arguments"
if hasq pam ${IUSE} && ! use pam; then
return 0;
fi
( # dont want to pollute calling env
insinto /etc/pam.d
insopts -m 0644
newins "$1" "$2"
) || die "failed to install $1 as $2"
cleanpamd $2
}
# dopamsecurity <section> <file> [more files]
#
# Installs the config files in /etc/security/<section>/
dopamsecurity() {
[[ $# -lt 2 ]] && die "dopamsecurity requires at least two arguments"
if hasq pam ${IUSE} && ! use pam; then
return 0
fi
( # dont want to pollute calling env
insinto /etc/security/$1
insopts -m 0644
doins "${@:2}"
) || die "failed to install ${@:2}"
}
# newpamsecurity <section> <old name> <new name>
#
# Installs the config file <old name> as <new name> in /etc/security/<section>/
newpamsecurity() {
[[ $# -ne 3 ]] && die "newpamsecurity requires three arguments"
if hasq pam ${IUSE} && ! use pam; then
return 0;
fi
( # dont want to pollute calling env
insinto /etc/security/$1
insopts -m 0644
newins "$2" "$3"
) || die "failed to install $2 as $3"
}
# getpam_mod_dir
#
# Returns the pam modules' directory for current implementation
getpam_mod_dir() {
if has_version sys-libs/pam || has_version sys-libs/openpam; then
PAM_MOD_DIR=/$(get_libdir)/security
elif use ppc-macos; then
# OSX looks there for pam modules
PAM_MOD_DIR=/usr/lib/pam
else
# Unable to find PAM implementation... defaulting
PAM_MOD_DIR=/$(get_libdir)/security
fi
echo ${PAM_MOD_DIR}
}
# dopammod <file> [more files]
#
# Install pam module file in the pam modules' dir for current implementation
dopammod() {
[[ -z $1 ]] && die "dopammod requires at least one argument"
if hasq pam ${IUSE} && ! use pam; then
return 0;
fi
exeinto $(getpam_mod_dir)
doexe "$@" || die "failed to install $@"
}
# newpammod <old name> <new name>
#
# Install pam module file <old name> as <new name> in the pam
# modules' dir for current implementation
newpammod() {
[[ $# -ne 2 ]] && die "newpammod requires two arguements"
if hasq pam ${IUSE} && ! use pam; then
return 0;
fi
exeinto $(getpam_mod_dir)
newexe "$1" "$2" || die "failed to install $1 as $2"
}
# pamd_mimic_system <pamd file> [auth levels]
#
# This function creates a pamd file which mimics system-auth file
# for the given levels in the /etc/pam.d directory.
pamd_mimic_system() {
[[ $# -lt 2 ]] && die "pamd_mimic_system requires at least two argments"
if hasq pam ${IUSE} && ! use pam; then
return 0;
fi
dodir /etc/pam.d
pamdfile=${D}/etc/pam.d/$1
echo -e "# File autogenerated by pamd_mimic_system in pam eclass\n\n" >> \
$pamdfile
authlevels="auth account password session"
if has_version '<sys-libs/pam-0.78'; then
mimic="\trequired\t\tpam_stack.so service=system-auth"
else
mimic="\tinclude\t\tsystem-auth"
fi
shift
while [[ -n $1 ]]; do
hasq $1 ${authlevels} || die "unknown level type"
echo -e "$1${mimic}" >> ${pamdfile}
shift
done
}
# cleanpamd <pamd file>
#
# Cleans a pam.d file from modules that might not be present on the system
# where it's going to be installed
cleanpamd() {
while [[ -n $1 ]]; do
if ! has_version sys-libs/pam; then
sed -i -e '/pam_shells\|pam_console/s:^:#:' ${D}/etc/pam.d/$1
fi
shift
done
}
pam_epam_expand() {
sed -n -e 's|#%EPAM-\([[:alpha:]-]\+\):\([-+<>=/.![:alnum:]]\+\)%#.*|\1 \2|p' \
"$@" | sort -u | while read condition parameter; do
disable="# "
case "$condition" in
If-Has)
message="This can be used only if you have ${parameter} installed"
has_version "$parameter" && disable=""
;;
Use-Flag)
message="This can be used only if you enabled the ${parameter} USE flag"
use "$parameter" && disable=""
;;
*)
eerror "Unknown EPAM condition '${condition}' ('${parameter}')"
die "Unknown EPAM condition '${condition}' ('${parameter}')"
;;
esac
sed -i -e "s|#%EPAM-${condition}:${parameter}%#|# ${message}\n${disable}|" "$@"
done
}
# Think about it before uncommenting this one, for nwo run it by hand
# pam_pkg_preinst() {
# local shopts=$-
# set -o noglob # so that bash doen't expand "*"
#
# pam_epam_expand "${D}"/etc/pam.d/*
#
# set +o noglob; set -$shopts # reset old shell opts
# }
|