Hello community, here is the log from the commit of package pam checked in at Tue Aug 1 17:28:08 CEST 2006. -------- --- pam/pam.changes 2006-06-28 13:07:55.000000000 +0200 +++ pam/pam.changes 2006-07-28 11:30:38.000000000 +0200 @@ -1,0 +2,10 @@ +Fri Jul 28 11:30:28 CEST 2006 - kukuk@suse.de + +- Add missing namespace.init script + +------------------------------------------------------------------- +Thu Jul 27 17:12:24 CEST 2006 - kukuk@suse.de + +- Reenable audit subsystem + +------------------------------------------------------------------- New: ---- pam-0.99.5.0-namespace-init.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ pam.spec ++++++ --- /var/tmp/diff_new_pack.cBQ27U/_old 2006-08-01 17:27:52.000000000 +0200 +++ /var/tmp/diff_new_pack.cBQ27U/_new 2006-08-01 17:27:52.000000000 +0200 @@ -11,7 +11,8 @@ # norootforbuild Name: pam -BuildRequires: cracklib-devel db-devel +URL: http://www.kernel.org/pub/linux/libs/pam/ +BuildRequires: audit-devel cracklib-devel db-devel %define libpam_so_version 0.81.4 %define libpam_misc_so_version 0.81.2 %define libpamc_so_version 0.81.0 @@ -19,7 +20,7 @@ Group: System/Libraries Autoreqprov: on Version: 0.99.5.0 -Release: 1 +Release: 4 Summary: A security tool that provides authentication for applications Obsoletes: pam-laus Source: Linux-PAM-%{version}.tar.bz2 @@ -31,6 +32,7 @@ Source6: common-password.pamd Source7: common-session.pamd Source8: etc.environment +Patch: pam-0.99.5.0-namespace-init.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build %description @@ -58,6 +60,7 @@ %prep %setup -q -n Linux-PAM-%{version} +%patch # # Install docu # @@ -147,21 +150,22 @@ %files -f Linux-PAM.lang %defattr(-,root,root) %doc %{_defaultdocdir}/pam -%dir /etc/pam.d -%dir /etc/security -%config(noreplace) /etc/pam.d/other -%config(noreplace) /etc/pam.d/common-* -%config(noreplace) /etc/securetty -%config(noreplace) /etc/environment -%config(noreplace) /etc/security/access.conf -%config(noreplace) /etc/security/group.conf -%config(noreplace) /etc/security/limits.conf -%config(noreplace) /etc/security/pam_env.conf -%config(noreplace) /etc/security/time.conf +%dir %{_sysconfdir}/pam.d +%dir %{_sysconfdir}/security +%config(noreplace) %{_sysconfdir}/pam.d/other +%config(noreplace) %{_sysconfdir}/pam.d/common-* +%config(noreplace) %{_sysconfdir}/securetty +%config(noreplace) %{_sysconfdir}/environment +%config(noreplace) %{_sysconfdir}/security/access.conf +%config(noreplace) %{_sysconfdir}/security/group.conf +%config(noreplace) %{_sysconfdir}/security/limits.conf +%config(noreplace) %{_sysconfdir}/security/pam_env.conf +%config(noreplace) %{_sysconfdir}/security/time.conf +%config(noreplace) %{_sysconfdir}/security/namespace.conf +%config(noreplace) %{_sysconfdir}/security/namespace.init %doc %{_mandir}/man5/*.conf.5* %doc %{_mandir}/man5/pam.d.5* %doc %{_mandir}/man8/* -%doc %{_mandir}/man8/unix_chkpwd.8* /%{_lib}/libpam.so.0 /%{_lib}/libpam.so.%{libpam_so_version} /%{_lib}/libpamc.so.0 @@ -186,6 +190,10 @@ %{_libdir}/libpam_misc.so %changelog -n pam +* Fri Jul 28 2006 - kukuk@suse.de +- Add missing namespace.init script +* Thu Jul 27 2006 - kukuk@suse.de +- Reenable audit subsystem * Wed Jun 28 2006 - kukuk@suse.de - Update to Linux-PAM 0.99.5.0 (more manual pages, three new PAM modules: pam_keyinit, pam_namespace, pam_rhosts) ++++++ pam-0.99.5.0-namespace-init.patch ++++++ --- modules/pam_namespace/namespace.init 2006-06-20 14:49:34.000000000 +0000 +++ modules/pam_namespace/namespace.init 2006-06-20 16:09:48.000000000 +0000 @@ -0,0 +1,24 @@ +#!/bin/sh +# This is only a boilerplate for the instance initialization script. +# It receives polydir path as $1 and the instance path as $2. +# +# If you intend to polyinstantiate /tmp and you also want to use the X windows +# environment, you will have to use this script to bind mount the socket that +# is used by the X server to communicate with its clients. X server places +# this socket in /tmp/.X11-unix directory, which will get obscured by +# polyinstantiation. Uncommenting the following lines will bind mount +# the relevant directory at an alternative location (/.tmp/.X11-unix) such +# that the X server, window manager and X clients, can still find the +# socket X0 at the polyinstanted /tmp/.X11-unix. +# +#if [ $1 = /tmp ]; then +# if [ ! -f /.tmp/.X11-unix ]; then +# mkdir -p /.tmp/.X11-unix +# fi +# mount --bind /tmp/.X11-unix /.tmp/.X11-unix +# cp -fp -- /tmp/.X0-lock "$2/.X0-lock" +# mkdir -- "$2/.X11-unix" +# ln -fs -- /.tmp/.X11-unix/X0 "$2/.X11-unix/X0" +#fi + +exit 0 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Remember to have fun...