summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/shadow
diff options
context:
space:
mode:
authorAlexander Kanavin <alex@linutronix.de>2025-01-03 11:45:22 +0100
committerRichard Purdie <richard.purdie@linuxfoundation.org>2025-01-04 12:34:04 +0000
commit5a4d20322be01dc1bbfef29fabd61975e9410af6 (patch)
treef2d7b1c7a1e37ab0e550d717f0eeb82dcd5bbd15 /meta/recipes-extended/shadow
parent59486c65069a7fb519c77ea3d48dc7092b04363c (diff)
downloadpoky-5a4d20322be01dc1bbfef29fabd61975e9410af6.tar.gz
shadow: merge .inc into .bb
(From OE-Core rev: e7f39f67977a3915290ce26a2a828eecc6dddda4) Signed-off-by: Alexander Kanavin <alex@linutronix.de> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/shadow')
-rw-r--r--meta/recipes-extended/shadow/shadow.inc224
-rw-r--r--meta/recipes-extended/shadow/shadow_4.16.0.bb225
2 files changed, 224 insertions, 225 deletions
diff --git a/meta/recipes-extended/shadow/shadow.inc b/meta/recipes-extended/shadow/shadow.inc
deleted file mode 100644
index 6ba5a9c7f1..0000000000
--- a/meta/recipes-extended/shadow/shadow.inc
+++ /dev/null
@@ -1,224 +0,0 @@
1SUMMARY = "Tools to change and administer password and group data"
2HOMEPAGE = "http://github.com/shadow-maint/shadow"
3DESCRIPTION = "${SUMMARY}"
4BUGTRACKER = "http://github.com/shadow-maint/shadow/issues"
5SECTION = "base/utils"
6LICENSE = "BSD-3-Clause"
7LIC_FILES_CHKSUM = "file://COPYING;md5=c9a450b7be84eac23e6353efecb60b5b \
8 file://src/passwd.c;beginline=2;endline=7;md5=67bcf314687820b2f010d4863fce3fc5 \
9 "
10
11DEPENDS = "virtual/crypt"
12
13GITHUB_BASE_URI = "https://github.com/shadow-maint/shadow/releases"
14SRC_URI = "${GITHUB_BASE_URI}/download/${PV}/${BP}.tar.gz \
15 ${@bb.utils.contains('PACKAGECONFIG', 'pam', '${PAM_SRC_URI}', '', d)} \
16 file://useradd \
17 "
18
19SRC_URI:append:class-target = " \
20 file://login_defs_pam.sed \
21 file://shadow-update-pam-conf.patch \
22 "
23
24SRC_URI:append:class-native = " \
25 file://commonio.c-fix-unexpected-open-failure-in-chroot-env.patch \
26 "
27SRC_URI[sha256sum] = "1744f339e07a2b41056347ddd612839762ff565d7e9494fb049428002fa2e7e0"
28
29# Additional Policy files for PAM
30PAM_SRC_URI = "file://pam.d/chfn \
31 file://pam.d/chpasswd \
32 file://pam.d/chsh \
33 file://pam.d/login \
34 file://pam.d/newusers \
35 file://pam.d/passwd \
36 file://pam.d/su"
37
38inherit autotools gettext github-releases pkgconfig
39
40export CONFIG_SHELL="/bin/sh"
41
42EXTRA_OECONF += " \
43 --with-group-name-max-length=24 \
44 --enable-subordinate-ids=yes \
45 --without-sssd \
46 ${NSCDOPT}"
47
48CFLAGS:append:libc-musl = " -DLIBBSD_OVERLAY"
49
50NSCDOPT = ""
51NSCDOPT:class-native = "--without-nscd"
52NSCDOPT:class-nativesdk = "--without-nscd"
53NSCDOPT:libc-glibc = "--with-nscd"
54
55PAM_PLUGINS = "libpam-runtime \
56 pam-plugin-faildelay \
57 pam-plugin-securetty \
58 pam-plugin-nologin \
59 pam-plugin-env \
60 pam-plugin-group \
61 pam-plugin-limits \
62 pam-plugin-motd \
63 pam-plugin-mail \
64 pam-plugin-shells \
65 pam-plugin-rootok"
66
67PACKAGECONFIG ??= "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)} \
68 ${@bb.utils.contains('DISTRO_FEATURES', 'xattr', 'attr', '', d)}"
69PACKAGECONFIG:class-native ??= "${@bb.utils.contains('DISTRO_FEATURES', 'xattr', 'attr', '', d)} libbsd"
70PACKAGECONFIG:class-nativesdk = ""
71PACKAGECONFIG[pam] = "--with-libpam,--without-libpam,libpam,${PAM_PLUGINS}"
72PACKAGECONFIG[attr] = "--with-attr,--without-attr,attr"
73PACKAGECONFIG[acl] = "--with-acl,--without-acl,acl"
74PACKAGECONFIG[audit] = "--with-audit,--without-audit,audit"
75PACKAGECONFIG[selinux] = "--with-selinux,--without-selinux,libselinux libsemanage"
76PACKAGECONFIG[libbsd] = "--with-libbsd,--without-libbsd,libbsd"
77PACKAGECONFIG[logind] = "--enable-logind,--disable-logind,systemd"
78
79RDEPENDS:${PN} = "shadow-securetty \
80 base-passwd \
81 util-linux-sulogin"
82RDEPENDS:${PN}:class-native = ""
83RDEPENDS:${PN}:class-nativesdk = ""
84
85do_install() {
86 oe_runmake DESTDIR="${D}" sbindir="${base_sbindir}" usbindir="${sbindir}" install
87
88 # Info dir listing isn't interesting at this point so remove it if it exists.
89 if [ -e "${D}${infodir}/dir" ]; then
90 rm -f ${D}${infodir}/dir
91 fi
92
93 # Enable CREATE_HOME by default.
94 sed -i 's/#CREATE_HOME/CREATE_HOME/g' ${D}${sysconfdir}/login.defs
95
96 # As we are on an embedded system, ensure the users mailbox is in
97 # ~/ not /var/spool/mail by default, as who knows where or how big
98 # /var is. The system MDA will set this later anyway.
99 sed -i 's/MAIL_DIR/#MAIL_DIR/g' ${D}${sysconfdir}/login.defs
100 sed -i 's/#MAIL_FILE/MAIL_FILE/g' ${D}${sysconfdir}/login.defs
101
102 # Disable checking emails.
103 sed -i 's/MAIL_CHECK_ENAB/#MAIL_CHECK_ENAB/g' ${D}${sysconfdir}/login.defs
104
105 # Comment out SU_NAME to work correctly with busybox
106 # See Bug#5359 and Bug#7173
107 sed -i 's:^SU_NAME:#SU_NAME:g' ${D}${sysconfdir}/login.defs
108
109 # Use proper encryption for passwords
110 sed -i 's/^#ENCRYPT_METHOD.*$/ENCRYPT_METHOD SHA512/' ${D}${sysconfdir}/login.defs
111
112 install -d ${D}${sysconfdir}/default
113 install -m 0644 ${UNPACKDIR}/useradd ${D}${sysconfdir}/default
114}
115
116do_install:append() {
117 # Ensure that the image has as a /var/spool/mail dir so shadow can
118 # put mailboxes there if the user reconfigures shadow to its
119 # defaults (see sed below).
120 install -m 0775 -d ${D}${localstatedir}/spool/mail
121 chown root:mail ${D}${localstatedir}/spool/mail
122
123 if [ -e ${UNPACKDIR}/pam.d ]; then
124 install -d ${D}${sysconfdir}/pam.d/
125 install -m 0644 ${UNPACKDIR}/pam.d/* ${D}${sysconfdir}/pam.d/
126 # Remove defaults that are not used when supporting PAM.
127 sed -i -f ${UNPACKDIR}/login_defs_pam.sed ${D}${sysconfdir}/login.defs
128 fi
129
130 install -d ${D}${sbindir} ${D}${base_sbindir} ${D}${base_bindir}
131
132 # Move binaries to the locations we want
133 rm ${D}${sbindir}/vigr
134 ln -sf vipw.${BPN} ${D}${base_sbindir}/vigr
135 if [ "${sbindir}" != "${base_sbindir}" ]; then
136 mv ${D}${sbindir}/vipw ${D}${base_sbindir}/vipw
137 fi
138 if [ "${bindir}" != "${base_bindir}" ]; then
139 mv ${D}${bindir}/login ${D}${base_bindir}/login
140 mv ${D}${bindir}/su ${D}${base_bindir}/su
141 fi
142
143 # Handle link properly after rename, otherwise missing files would
144 # lead rpm failed dependencies.
145 ln -sf newgrp.${BPN} ${D}${bindir}/sg
146
147 # usermod requires the subuid/subgid files to be in place before being
148 # able to use the -v/-V flags otherwise it fails:
149 # usermod: /etc/subuid does not exist, you cannot use the flags -v or -V
150 install -d ${D}${sysconfdir}
151 touch ${D}${sysconfdir}/subuid
152 touch ${D}${sysconfdir}/subgid
153}
154
155# Make executables look for dynamically linked libraries in a custom location, and install
156# the needed libraries there. That way we can use them from sstate
157# in setscene tasks without worrying about the dependency libraries being available.
158do_install:append:class-native() {
159 binaries=$(find ${D}${base_bindir}/ ${D}${base_sbindir}/ ${D}${bindir}/ ${D}${sbindir}/ -executable -type f)
160 chrpath -k -r ${STAGING_DIR_NATIVE}/lib-shadow-deps $binaries
161 mkdir -p ${D}${STAGING_DIR_NATIVE}/lib-shadow-deps/
162 libattr=${@bb.utils.contains('DISTRO_FEATURES', 'xattr', "${STAGING_LIBDIR_NATIVE}/libattr.so.*", '', d)}
163 install $libattr ${STAGING_LIBDIR_NATIVE}/libbsd.so.* ${STAGING_LIBDIR_NATIVE}/libmd.so.* ${D}${STAGING_DIR_NATIVE}/lib-shadow-deps/
164 install ${D}${libdir}/*.so.* ${D}${STAGING_DIR_NATIVE}/lib-shadow-deps/
165}
166
167SYSROOT_DIRS:append:class-native = " ${STAGING_DIR_NATIVE}/lib-shadow-deps/"
168INSANE_SKIP:${PN}:class-native = "already-stripped"
169
170do_install:append:class-nativesdk() {
171 oe_runmake -C ${B}/man DESTDIR="${D}" sbindir="${base_sbindir}" usbindir="${sbindir}" install-man
172}
173
174do_install:append:class-target() {
175 oe_runmake -C ${B}/man DESTDIR="${D}" sbindir="${base_sbindir}" usbindir="${sbindir}" install-man
176}
177
178PACKAGES =+ "${PN}-base"
179FILES:${PN}-base = "\
180 ${base_bindir}/login.shadow \
181 ${base_bindir}/su.shadow \
182 ${bindir}/sg \
183 ${bindir}/newgrp.shadow \
184 ${bindir}/groups.shadow \
185 ${sysconfdir}/pam.d/login \
186 ${sysconfdir}/pam.d/su \
187 ${sysconfdir}/login.defs \
188"
189RDEPENDS:${PN} += "${PN}-base"
190
191inherit update-alternatives
192
193ALTERNATIVE_PRIORITY = "200"
194
195ALTERNATIVE:${PN} = "passwd chfn chsh chpasswd vipw vigr nologin"
196ALTERNATIVE_LINK_NAME[chfn] = "${bindir}/chfn"
197ALTERNATIVE_LINK_NAME[chsh] = "${bindir}/chsh"
198ALTERNATIVE_LINK_NAME[chpasswd] = "${sbindir}/chpasswd"
199ALTERNATIVE_LINK_NAME[vipw] = "${base_sbindir}/vipw"
200ALTERNATIVE_LINK_NAME[vigr] = "${base_sbindir}/vigr"
201ALTERNATIVE_LINK_NAME[nologin] = "${base_sbindir}/nologin"
202
203ALTERNATIVE:${PN}-doc = "chfn.1 chsh.1 groups.1 su.1 nologin.8"
204ALTERNATIVE_LINK_NAME[chfn.1] = "${mandir}/man1/chfn.1"
205ALTERNATIVE_LINK_NAME[chsh.1] = "${mandir}/man1/chsh.1"
206ALTERNATIVE_LINK_NAME[groups.1] = "${mandir}/man1/groups.1"
207ALTERNATIVE_LINK_NAME[su.1] = "${mandir}/man1/su.1"
208ALTERNATIVE_LINK_NAME[nologin.8] = "${mandir}/man8/nologin.8"
209
210ALTERNATIVE:${PN}-base = "newgrp groups login su"
211ALTERNATIVE_LINK_NAME[login] = "${base_bindir}/login"
212ALTERNATIVE_LINK_NAME[su] = "${base_bindir}/su"
213
214PACKAGE_WRITE_DEPS += "shadow-native"
215pkg_postinst:${PN}:class-target () {
216 if [ "x$D" != "x" ]; then
217 rootarg="--root $D"
218 else
219 rootarg=""
220 fi
221
222 pwconv $rootarg || exit 1
223 grpconv $rootarg || exit 1
224}
diff --git a/meta/recipes-extended/shadow/shadow_4.16.0.bb b/meta/recipes-extended/shadow/shadow_4.16.0.bb
index e57676c1da..1fcf82bb01 100644
--- a/meta/recipes-extended/shadow/shadow_4.16.0.bb
+++ b/meta/recipes-extended/shadow/shadow_4.16.0.bb
@@ -1,4 +1,227 @@
1require shadow.inc 1SUMMARY = "Tools to change and administer password and group data"
2HOMEPAGE = "http://github.com/shadow-maint/shadow"
3DESCRIPTION = "${SUMMARY}"
4BUGTRACKER = "http://github.com/shadow-maint/shadow/issues"
5SECTION = "base/utils"
6LICENSE = "BSD-3-Clause"
7LIC_FILES_CHKSUM = "file://COPYING;md5=c9a450b7be84eac23e6353efecb60b5b \
8 file://src/passwd.c;beginline=2;endline=7;md5=67bcf314687820b2f010d4863fce3fc5 \
9 "
10
11DEPENDS = "virtual/crypt"
12
13GITHUB_BASE_URI = "https://github.com/shadow-maint/shadow/releases"
14SRC_URI = "${GITHUB_BASE_URI}/download/${PV}/${BP}.tar.gz \
15 ${@bb.utils.contains('PACKAGECONFIG', 'pam', '${PAM_SRC_URI}', '', d)} \
16 file://useradd \
17 "
18
19SRC_URI:append:class-target = " \
20 file://login_defs_pam.sed \
21 file://shadow-update-pam-conf.patch \
22 "
23
24SRC_URI:append:class-native = " \
25 file://commonio.c-fix-unexpected-open-failure-in-chroot-env.patch \
26 "
27SRC_URI[sha256sum] = "1744f339e07a2b41056347ddd612839762ff565d7e9494fb049428002fa2e7e0"
28
29# Additional Policy files for PAM
30PAM_SRC_URI = "file://pam.d/chfn \
31 file://pam.d/chpasswd \
32 file://pam.d/chsh \
33 file://pam.d/login \
34 file://pam.d/newusers \
35 file://pam.d/passwd \
36 file://pam.d/su"
37
38inherit autotools gettext github-releases pkgconfig
39
40export CONFIG_SHELL="/bin/sh"
41
42EXTRA_OECONF += " \
43 --with-group-name-max-length=24 \
44 --enable-subordinate-ids=yes \
45 --without-sssd \
46 ${NSCDOPT}"
47
48CFLAGS:append:libc-musl = " -DLIBBSD_OVERLAY"
49
50NSCDOPT = ""
51NSCDOPT:class-native = "--without-nscd"
52NSCDOPT:class-nativesdk = "--without-nscd"
53NSCDOPT:libc-glibc = "--with-nscd"
54
55PAM_PLUGINS = "libpam-runtime \
56 pam-plugin-faildelay \
57 pam-plugin-securetty \
58 pam-plugin-nologin \
59 pam-plugin-env \
60 pam-plugin-group \
61 pam-plugin-limits \
62 pam-plugin-motd \
63 pam-plugin-mail \
64 pam-plugin-shells \
65 pam-plugin-rootok"
66
67PACKAGECONFIG ??= "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)} \
68 ${@bb.utils.contains('DISTRO_FEATURES', 'xattr', 'attr', '', d)}"
69PACKAGECONFIG:class-native ??= "${@bb.utils.contains('DISTRO_FEATURES', 'xattr', 'attr', '', d)} libbsd"
70PACKAGECONFIG:class-nativesdk = ""
71PACKAGECONFIG[pam] = "--with-libpam,--without-libpam,libpam,${PAM_PLUGINS}"
72PACKAGECONFIG[attr] = "--with-attr,--without-attr,attr"
73PACKAGECONFIG[acl] = "--with-acl,--without-acl,acl"
74PACKAGECONFIG[audit] = "--with-audit,--without-audit,audit"
75PACKAGECONFIG[selinux] = "--with-selinux,--without-selinux,libselinux libsemanage"
76PACKAGECONFIG[libbsd] = "--with-libbsd,--without-libbsd,libbsd"
77PACKAGECONFIG[logind] = "--enable-logind,--disable-logind,systemd"
78
79RDEPENDS:${PN} = "shadow-securetty \
80 base-passwd \
81 util-linux-sulogin"
82RDEPENDS:${PN}:class-native = ""
83RDEPENDS:${PN}:class-nativesdk = ""
84
85do_install() {
86 oe_runmake DESTDIR="${D}" sbindir="${base_sbindir}" usbindir="${sbindir}" install
87
88 # Info dir listing isn't interesting at this point so remove it if it exists.
89 if [ -e "${D}${infodir}/dir" ]; then
90 rm -f ${D}${infodir}/dir
91 fi
92
93 # Enable CREATE_HOME by default.
94 sed -i 's/#CREATE_HOME/CREATE_HOME/g' ${D}${sysconfdir}/login.defs
95
96 # As we are on an embedded system, ensure the users mailbox is in
97 # ~/ not /var/spool/mail by default, as who knows where or how big
98 # /var is. The system MDA will set this later anyway.
99 sed -i 's/MAIL_DIR/#MAIL_DIR/g' ${D}${sysconfdir}/login.defs
100 sed -i 's/#MAIL_FILE/MAIL_FILE/g' ${D}${sysconfdir}/login.defs
101
102 # Disable checking emails.
103 sed -i 's/MAIL_CHECK_ENAB/#MAIL_CHECK_ENAB/g' ${D}${sysconfdir}/login.defs
104
105 # Comment out SU_NAME to work correctly with busybox
106 # See Bug#5359 and Bug#7173
107 sed -i 's:^SU_NAME:#SU_NAME:g' ${D}${sysconfdir}/login.defs
108
109 # Use proper encryption for passwords
110 sed -i 's/^#ENCRYPT_METHOD.*$/ENCRYPT_METHOD SHA512/' ${D}${sysconfdir}/login.defs
111
112 install -d ${D}${sysconfdir}/default
113 install -m 0644 ${UNPACKDIR}/useradd ${D}${sysconfdir}/default
114}
115
116do_install:append() {
117 # Ensure that the image has as a /var/spool/mail dir so shadow can
118 # put mailboxes there if the user reconfigures shadow to its
119 # defaults (see sed below).
120 install -m 0775 -d ${D}${localstatedir}/spool/mail
121 chown root:mail ${D}${localstatedir}/spool/mail
122
123 if [ -e ${UNPACKDIR}/pam.d ]; then
124 install -d ${D}${sysconfdir}/pam.d/
125 install -m 0644 ${UNPACKDIR}/pam.d/* ${D}${sysconfdir}/pam.d/
126 # Remove defaults that are not used when supporting PAM.
127 sed -i -f ${UNPACKDIR}/login_defs_pam.sed ${D}${sysconfdir}/login.defs
128 fi
129
130 install -d ${D}${sbindir} ${D}${base_sbindir} ${D}${base_bindir}
131
132 # Move binaries to the locations we want
133 rm ${D}${sbindir}/vigr
134 ln -sf vipw.${BPN} ${D}${base_sbindir}/vigr
135 if [ "${sbindir}" != "${base_sbindir}" ]; then
136 mv ${D}${sbindir}/vipw ${D}${base_sbindir}/vipw
137 fi
138 if [ "${bindir}" != "${base_bindir}" ]; then
139 mv ${D}${bindir}/login ${D}${base_bindir}/login
140 mv ${D}${bindir}/su ${D}${base_bindir}/su
141 fi
142
143 # Handle link properly after rename, otherwise missing files would
144 # lead rpm failed dependencies.
145 ln -sf newgrp.${BPN} ${D}${bindir}/sg
146
147 # usermod requires the subuid/subgid files to be in place before being
148 # able to use the -v/-V flags otherwise it fails:
149 # usermod: /etc/subuid does not exist, you cannot use the flags -v or -V
150 install -d ${D}${sysconfdir}
151 touch ${D}${sysconfdir}/subuid
152 touch ${D}${sysconfdir}/subgid
153}
154
155# Make executables look for dynamically linked libraries in a custom location, and install
156# the needed libraries there. That way we can use them from sstate
157# in setscene tasks without worrying about the dependency libraries being available.
158do_install:append:class-native() {
159 binaries=$(find ${D}${base_bindir}/ ${D}${base_sbindir}/ ${D}${bindir}/ ${D}${sbindir}/ -executable -type f)
160 chrpath -k -r ${STAGING_DIR_NATIVE}/lib-shadow-deps $binaries
161 mkdir -p ${D}${STAGING_DIR_NATIVE}/lib-shadow-deps/
162 libattr=${@bb.utils.contains('DISTRO_FEATURES', 'xattr', "${STAGING_LIBDIR_NATIVE}/libattr.so.*", '', d)}
163 install $libattr ${STAGING_LIBDIR_NATIVE}/libbsd.so.* ${STAGING_LIBDIR_NATIVE}/libmd.so.* ${D}${STAGING_DIR_NATIVE}/lib-shadow-deps/
164 install ${D}${libdir}/*.so.* ${D}${STAGING_DIR_NATIVE}/lib-shadow-deps/
165}
166
167SYSROOT_DIRS:append:class-native = " ${STAGING_DIR_NATIVE}/lib-shadow-deps/"
168INSANE_SKIP:${PN}:class-native = "already-stripped"
169
170do_install:append:class-nativesdk() {
171 oe_runmake -C ${B}/man DESTDIR="${D}" sbindir="${base_sbindir}" usbindir="${sbindir}" install-man
172}
173
174do_install:append:class-target() {
175 oe_runmake -C ${B}/man DESTDIR="${D}" sbindir="${base_sbindir}" usbindir="${sbindir}" install-man
176}
177
178PACKAGES =+ "${PN}-base"
179FILES:${PN}-base = "\
180 ${base_bindir}/login.shadow \
181 ${base_bindir}/su.shadow \
182 ${bindir}/sg \
183 ${bindir}/newgrp.shadow \
184 ${bindir}/groups.shadow \
185 ${sysconfdir}/pam.d/login \
186 ${sysconfdir}/pam.d/su \
187 ${sysconfdir}/login.defs \
188"
189RDEPENDS:${PN} += "${PN}-base"
190
191inherit update-alternatives
192
193ALTERNATIVE_PRIORITY = "200"
194
195ALTERNATIVE:${PN} = "passwd chfn chsh chpasswd vipw vigr nologin"
196ALTERNATIVE_LINK_NAME[chfn] = "${bindir}/chfn"
197ALTERNATIVE_LINK_NAME[chsh] = "${bindir}/chsh"
198ALTERNATIVE_LINK_NAME[chpasswd] = "${sbindir}/chpasswd"
199ALTERNATIVE_LINK_NAME[vipw] = "${base_sbindir}/vipw"
200ALTERNATIVE_LINK_NAME[vigr] = "${base_sbindir}/vigr"
201ALTERNATIVE_LINK_NAME[nologin] = "${base_sbindir}/nologin"
202
203ALTERNATIVE:${PN}-doc = "chfn.1 chsh.1 groups.1 su.1 nologin.8"
204ALTERNATIVE_LINK_NAME[chfn.1] = "${mandir}/man1/chfn.1"
205ALTERNATIVE_LINK_NAME[chsh.1] = "${mandir}/man1/chsh.1"
206ALTERNATIVE_LINK_NAME[groups.1] = "${mandir}/man1/groups.1"
207ALTERNATIVE_LINK_NAME[su.1] = "${mandir}/man1/su.1"
208ALTERNATIVE_LINK_NAME[nologin.8] = "${mandir}/man8/nologin.8"
209
210ALTERNATIVE:${PN}-base = "newgrp groups login su"
211ALTERNATIVE_LINK_NAME[login] = "${base_bindir}/login"
212ALTERNATIVE_LINK_NAME[su] = "${base_bindir}/su"
213
214PACKAGE_WRITE_DEPS += "shadow-native"
215pkg_postinst:${PN}:class-target () {
216 if [ "x$D" != "x" ]; then
217 rootarg="--root $D"
218 else
219 rootarg=""
220 fi
221
222 pwconv $rootarg || exit 1
223 grpconv $rootarg || exit 1
224}
2 225
3# Build falsely assumes that if --enable-libpam is set, we don't need to link against 226# Build falsely assumes that if --enable-libpam is set, we don't need to link against
4# libcrypt. This breaks chsh. 227# libcrypt. This breaks chsh.