summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/shadow/files
Commit message (Collapse)AuthorAgeFilesLines
* shadow-native: disable logging to syslogScott Garman2012-04-101-0/+34
| | | | | | | | | | | | Disable use of syslog to prevent sysroot user and group additions from writing entries to the host's syslog. This fixes [YOCTO #2012] (From OE-Core rev: e5aee0a2f5973a7aef81d0f38307a93791f616c6) Signed-off-by: Scott Garman <scott.a.garman@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* shadow-securetty: allow root logins on usb serial gadget deviceSteve Sakoman2012-02-031-0/+3
| | | | | | | | | Existing tty list does not include ttyGS0, add it (From OE-Core rev: 6ba9dc6460eb615e002e90ead0f4d5bc31856f22) Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* Fix the --root option in shadow-native programsJulian Pidancet2011-10-101-91/+98
| | | | | | | | | | | | | | | | | | | | | | | | | | | | The add_root_cmd_options.patch that we apply to shadow-native allow the various programs from the shadow utility package to chroot() so they can be used to modify etc/passwd and etc/group if they are located in a sysroot. Some of the shadow programs (gpasswd, useradd and usermod) need to parse the command line in two passes. But we can't use getopt_long() twice because getopt_long() reorders the command line arguments, and consequently corrupts the option parsing during the second pass. This patch fixes this issue by replacing the first pass by a very simple manual walk of the command line to handle the --root argument. This change is a patch of another patch, I apologize if it is difficult to read. But IMHO it wouldn't make sense to put the patch for this issue in another separated file. The --root options in groupadd and useradd are needed to make the useradd class work, and this issue was preventing to use useradd and groupadd long options while using the class. (From OE-Core rev: 6e9e19b18597103d8fe09f258cfd9904bb5f1c27) Signed-off-by: Julian Pidancet <julian.pidancet@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* shadow: add patch for useradd lossagePhil Blundell2011-09-091-0/+17
| | | | | | | | | | | This fixes (or, at least, papers over) a failure in do_install for recipes which inherit useradd.bbclass. Rewinding optind in this way is not entirely portable but in practice it seems to work on GNU-ish build hosts at least. (From OE-Core rev: 8fce8180c802ad187c4df44c17207bfb026ce6c7) Signed-off-by: Phil Blundell <philb@gnu.org> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* shadow: update pam related configure filesKang Kai2011-07-271-0/+91
| | | | | | | | | | add shadow-update-pam-conf.patch to update the pam related configure files in oe way rather than Fedora. (From OE-Core rev: 10e6fdd7e8fed5733f65a504148bba54bccb3c48) Signed-off-by: Kang Kai <kai.kang@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* shadow-native: fix creation of home directoriesScott Garman2011-06-301-27/+98
| | | | | | | | | | | | | | | Pseudo was recently changed so that when system() calls are made after a chroot(), the host binaries can no longer be found, breaking the system("mkdir -p") approach when useradd creates home directories. Instead, use mkdir(2) to create home directories with a helper function to ensure parent directories get created. (From OE-Core rev: 7d4099a964ec79b1ac4cf5348cf9f4221c3d4908) Signed-off-by: Scott Garman <scott.a.garman@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* shadow-sysroot: new recipe for useradd.bbclass supportScott Garman2011-06-281-0/+386
| | | | | | | | | | | | | Packaging login.defs with base-passwd causes problems due to the file being included in target package installs. Instead, this shadow-sysroot recipe can be used by useradd.bbclass to put login.defs into the target sysroot without disturbing packages intended for target devices. (From OE-Core rev: 6cbf741d73070759ecb9a284e6511c63d945f7c1) Signed-off-by: Scott Garman <scott.a.garman@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* shadow: add a -native recipe with customized utilitiesScott Garman2011-06-061-0/+1296
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This adds a -native recipe for the shadow utilities. The custom --root option allows the the following utilities to be run within a chroot when invoked under pseudo: * useradd * groupadd * usermod * groupmod * userdel * groupdel * passwd * gpasswd * pwconv * pwunconv * grpconv * grpunconv They can then be used to manipulate user and group account information in target sysroots. useradd was also modified to create home directories recursively when necessary. (From OE-Core rev: 37b8c18a3c2f3e77a9810a56a8ee786855ae1ba3) Signed-off-by: Scott Garman <scott.a.garman@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* shadow: recipe and patch cleanupScott Garman2011-06-065-0/+20
| | | | | | | | | | | Taking over maintenance of the shadow recipe. Cleaning it up in preparation of adding a -native version that will be used to add users/groups during preinstall. (From OE-Core rev: 254ca8c1667b8d35914555714239a09bfb4f43be) Signed-off-by: Scott Garman <scott.a.garman@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* shadow: remove selinux entry from pam.d/loginKoen Kooi2011-06-021-7/+0
| | | | | | | | | | | | SElinux has been disabled in the recipe, leading to messages like this: [ 167.643218] login[312]: PAM unable to dlopen(/lib/security/pam_selinux.so): /lib/security/pam_selinux.so: cannot open shared object file: No such file or directory [ 167.670837] login[312]: PAM adding faulty module: /lib/security/pam_selinux.so (From OE-Core rev: b90e9c2318fc421f37c57788ece54ce791a90b62) Signed-off-by: Koen Kooi <koen@dominion.thruhere.net> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* shadow: upgrade to 4.1.4.3 to fix security vulnerabilityYu Ke2011-03-0114-0/+646
For CVE-2011-0721: http://lists.debian.org/debian-security-announce/2011/msg00030.html Signed-off-by: Yu Ke <ke.yu@intel.com>