aboutsummaryrefslogtreecommitdiffstats
path: root/recipes/shadow/shadow.inc
blob: 1b105c556cd2489da2d8aae75c35c5759557a53a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
# Configuration parameters
SHADOW_MAILFILE ?= "Mailbox"
SHADOW_MAILDIR ?= "${localstatedir}/spool/mail"
SHADOW_UTMPDIR ?= "${localstatedir}/utmp"
SHADOW_LOGDIR ?= "${localstatedir}/log"

# Metadata
DESCRIPTION = "Tools to change and administer password and group data."
HOMEPAGE = "http://pkg-shadow.alioth.debian.org/"
LICENSE = "BSD"
SECTION = "base"
DEPENDS += "${@base_contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}"

PACKAGE_ARCH_${PN} = "${MACHINE_ARCH}"

INC_PR = "r18"

# Additional Policy files for PAM
PAM_SRC_URI = " \
           file://pam.d/chfn \
           file://pam.d/chpasswd \
           file://pam.d/chsh \
           file://pam.d/login \
           file://pam.d/newusers \
           file://pam.d/passwd \
           file://pam.d/su \
"

SRC_URI = "ftp://pkg-shadow.alioth.debian.org/pub/pkg-shadow/shadow-${PV}.tar.bz2 \
           file://login_defs_pam.sed \
           ${@base_contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \
           file://securetty \
"

inherit autotools gettext

EXTRA_OECONF += "\
    --disable-account-tools-setuid \
    --without-audit \
    --without-selinux \
    --without-libcrack \
    ${@base_contains('DISTRO_FEATURES', 'pam', '--with-libpam', '--without-libpam', d)} \
"

EXTRA_OECONF_libc-uclibc += "\
    --disable-account-tools-setuid \
    --disable-shadowgrp \
    --without-audit \
    --without-selinux \
    --without-libcrack \
    --without-nscd \
    ${@base_contains('DISTRO_FEATURES', 'pam', '--with-libpam', '--without-libpam', d)} \
"

CFLAGS += "-I../include"

PACKAGES =+ "${PN}-group"
RDEPENDS_${PN} += "${PN}-group"

FILES_${PN}-group = "${bindir}/gpasswd ${bindir}/newgrp.shadow ${bindir}/sg ${bindir}/groups.shadow"

do_configure_prepend () {
    export CONFIG_SITE="${CONFIG_SITE} ${B}/cachedpaths"
    cat <<END >${B}/cachedpaths
shadow_cv_maildir=${SHADOW_MAILDIR}
shadow_cv_mailfile=${SHADOW_MAILFILE}
shadow_cv_utmpdir=${SHADOW_UTMPDIR}
shadow_cv_logdir=${SHADOW_LOGDIR}
shadow_cv_passwd_dir=${bindir}
END
}

do_install_append() {
  # Ensure that /etc/skel is created so any default files that we want copied into new users home
  # dirs can be put in there later (ideal for .xinitrc for example).
  install -d ${D}${sysconfdir}/skel/  
  
  # Ensure that the image has as /var/spool/mail dir so shadow can put mailboxes there if the user
  # reconfigures Shadow to default (see sed below).
  install -d ${D}${SHADOW_MAILDIR}

  if [ -e ${WORKDIR}/pam.d ]; then
      install -d ${D}${sysconfdir}/pam.d/
      install -m 0644 ${WORKDIR}/pam.d/* ${D}${sysconfdir}/pam.d/
  fi

  # Remove defaults that are not used when supporting PAM
  ${@base_contains('DISTRO_FEATURES', 'pam', 'sed -i -f ${WORKDIR}/login_defs_pam.sed ${D}${sysconfdir}/login.defs', '', d)}

  # Enable CREATE_HOME by default.
  sed -i 's/#CREATE_HOME/CREATE_HOME/g' ${D}${sysconfdir}/login.defs

  # As we are on an embedded system ensure the users mailbox is in ~/ not
  # /var/spool/mail by default as who knows where or how big /var is.
  # The system MDA will set this later anyway.
  sed -i 's/MAIL_DIR/#MAIL_DIR/g' ${D}${sysconfdir}/login.defs
  sed -i 's/#MAIL_FILE/MAIL_FILE/g' ${D}${sysconfdir}/login.defs

  # disable checking emails at all
  sed -i 's/MAIL_CHECK_ENAB/#MAIL_CHECK_ENAB/g' ${D}${sysconfdir}/login.defs

  install -d ${D}${sbindir} ${D}${base_sbindir} ${D}${base_bindir} 
  for i in passwd chfn newgrp groups chsh ; do
    mv ${D}${bindir}/$i ${D}${bindir}/$i.${PN}
  done

  mv ${D}${sbindir}/chpasswd ${D}${sbindir}/chpasswd.${PN}
  mv ${D}${sbindir}/vigr ${D}${base_sbindir}/vigr.${PN}
  mv ${D}${sbindir}/vipw ${D}${base_sbindir}/vipw.${PN}
  mv ${D}${bindir}/login ${D}${base_bindir}/login.${PN}

  # Ensure we add a suitable securetty file to the package that has most common embedded TTYs defined.
  if [ ! -z "${SERIAL_CONSOLE}" ]; then
  # our SERIAL_CONSOLE contains baud rate too and sometime -L option as well.
  # the following pearl :) takes that and converts it into newline sepated tty's and appends
  # them into securetty. So if a machine has a weird looking console device node (e.g. ttyAMA0) that securetty
  # does not know then it will get appended to securetty and root login will be allowed on
  # that console.
    echo "${SERIAL_CONSOLE}" | sed -e 's/[0-9][0-9]\|\-L//g'|tr "[ ]" "[\n]"  >> ${WORKDIR}/securetty
  fi
  install -m 0400 ${WORKDIR}/securetty ${D}${sysconfdir}/securetty 
}

pkg_postinst_${PN} () {
    update-alternatives --install ${bindir}/passwd passwd passwd.${PN} 200
    update-alternatives --install ${sbindir}/chpasswd chpasswd chpasswd.${PN} 200
    update-alternatives --install ${bindir}/chfn chfn chfn.${PN} 200
    update-alternatives --install ${bindir}/chsh chsh chsh.${PN} 200
    update-alternatives --install ${base_bindir}/login login login.${PN} 200
    update-alternatives --install ${base_sbindir}/vipw vipw vipw.${PN} 200
    update-alternatives --install ${base_sbindir}/vigr vigr vigr.${PN} 200
    if [ "x$D" != "x" ]; then
        exit 1
    fi  
	pwconv
	grpconv
}

pkg_prerm_${PN} () {
    for i in passwd chpasswd chfn chsh login vipw vigr ; do
        update-alternatives --remove $i $i.${PN}
    done
}

pkg_postinst_${PN}-group () {
   touch /etc/login.defs
   update-alternatives --install ${bindir}/newgrp newgrp newgrp.${PN} 200
   update-alternatives --install ${bindir}/groups groups groups.${PN} 200
}

pkg_prerm_${PN}-group () {
    update-alternatives --remove newgrp newgrp.${PN}
    update-alternatives --remove groups groups.${PN}
}