Hello community,
here is the log from the commit of package yast2-security
checked in at Fri Aug 25 15:44:01 CEST 2006.
--------
--- yast2-security/yast2-security.changes 2006-08-21 13:12:35.000000000 +0200
+++ yast2-security/yast2-security.changes 2006-08-25 15:15:28.000000000 +0200
@@ -1,0 +2,7 @@
+Fri Aug 25 13:44:55 CEST 2006 - jsuchome@suse.cz
+
+- adapted for pam-config usage (F300956)
+- API of PamSettings module is obsolete
+- 2.14.0
+
+-------------------------------------------------------------------
Old:
----
yast2-security-2.13.5.tar.bz2
New:
----
yast2-security-2.14.0.tar.bz2
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ yast2-security.spec ++++++
--- /var/tmp/diff_new_pack.6jBnMM/_old 2006-08-25 15:43:51.000000000 +0200
+++ /var/tmp/diff_new_pack.6jBnMM/_new 2006-08-25 15:43:51.000000000 +0200
@@ -1,5 +1,5 @@
#
-# spec file for package yast2-security (Version 2.13.5)
+# spec file for package yast2-security (Version 2.14.0)
#
# Copyright (c) 2006 SUSE LINUX Products GmbH, Nuernberg, Germany.
# This file and all modifications and additions to the pristine
@@ -11,15 +11,16 @@
# norootforbuild
Name: yast2-security
-Version: 2.13.5
+Version: 2.14.0
Release: 1
License: GPL
Group: System/YaST
BuildRoot: %{_tmppath}/%{name}-%{version}-build
-Source0: yast2-security-2.13.5.tar.bz2
+Source0: yast2-security-2.14.0.tar.bz2
prefix: /usr
BuildRequires: doxygen perl-XML-Writer pkg-config update-desktop-files yast2-devtools yast2-pam yast2-testsuite
-Requires: yast2 yast2-pam
+# new Pam.ycp API
+Requires: yast2 yast2-pam >= 2.14.0
Provides: y2c_sec yast2-config-security
Obsoletes: y2c_sec yast2-config-security
Provides: yast2-trans-security y2t_sec
@@ -38,7 +39,7 @@
Jiri Suchomel
%prep
-%setup -n yast2-security-2.13.5
+%setup -n yast2-security-2.14.0
%build
%{prefix}/bin/y2tool y2autoconf
@@ -72,6 +73,10 @@
%doc %{prefix}/share/doc/packages/yast2-security
%changelog -n yast2-security
+* Fri Aug 25 2006 - jsuchome@suse.cz
+- adapted for pam-config usage (F300956)
+- API of PamSettings module is obsolete
+- 2.14.0
* Mon Aug 21 2006 - jsuchome@suse.cz
- adapted layout to fit in 80x40 xterm (#200382)
- 2.13.5
++++++ yast2-security-2.13.5.tar.bz2 -> yast2-security-2.14.0.tar.bz2 ++++++
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/VERSION new/yast2-security-2.14.0/VERSION
--- old/yast2-security-2.13.5/VERSION 2006-08-21 12:47:16.000000000 +0200
+++ new/yast2-security-2.14.0/VERSION 2006-08-25 13:45:21.000000000 +0200
@@ -1 +1 @@
-2.13.5
+2.14.0
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/configure new/yast2-security-2.14.0/configure
--- old/yast2-security-2.13.5/configure 2006-08-21 11:00:23.000000000 +0200
+++ new/yast2-security-2.14.0/configure 2006-06-12 14:12:45.000000000 +0200
@@ -1,6 +1,6 @@
#! /bin/sh
# Guess values for system-dependent variables and create Makefiles.
-# Generated by GNU Autoconf 2.59 for yast2-security 2.13.4.
+# Generated by GNU Autoconf 2.59 for yast2-security 2.13.3.
#
# Report bugs to http://bugs.opensuse.org/.
#
@@ -269,8 +269,8 @@
# Identity of this package.
PACKAGE_NAME='yast2-security'
PACKAGE_TARNAME='yast2-security'
-PACKAGE_VERSION='2.13.4'
-PACKAGE_STRING='yast2-security 2.13.4'
+PACKAGE_VERSION='2.13.3'
+PACKAGE_STRING='yast2-security 2.13.3'
PACKAGE_BUGREPORT='http://bugs.opensuse.org/'
ac_unique_file="RPMNAME"
@@ -728,7 +728,7 @@
# Omit some internal or obsolete options to make the list less imposing.
# This message is too long to be a string in the A/UX 3.1 sh.
cat <<_ACEOF
-\`configure' configures yast2-security 2.13.4 to adapt to many kinds of systems.
+\`configure' configures yast2-security 2.13.3 to adapt to many kinds of systems.
Usage: $0 [OPTION]... [VAR=VALUE]...
@@ -795,7 +795,7 @@
if test -n "$ac_init_help"; then
case $ac_init_help in
- short | recursive ) echo "Configuration of yast2-security 2.13.4:";;
+ short | recursive ) echo "Configuration of yast2-security 2.13.3:";;
esac
cat <<\_ACEOF
@@ -908,7 +908,7 @@
test -n "$ac_init_help" && exit 0
if $ac_init_version; then
cat <<\_ACEOF
-yast2-security configure 2.13.4
+yast2-security configure 2.13.3
generated by GNU Autoconf 2.59
Copyright (C) 2003 Free Software Foundation, Inc.
@@ -922,7 +922,7 @@
This file contains any messages produced by compilers while
running configure, to aid debugging if configure makes a mistake.
-It was created by yast2-security $as_me 2.13.4, which was
+It was created by yast2-security $as_me 2.13.3, which was
generated by GNU Autoconf 2.59. Invocation command line was
$ $0 $@
@@ -1652,7 +1652,7 @@
# Define the identity of the package.
PACKAGE='yast2-security'
- VERSION='2.13.4'
+ VERSION='2.13.3'
cat >>confdefs.h <<_ACEOF
@@ -1863,7 +1863,7 @@
-VERSION="2.13.4"
+VERSION="2.13.3"
RPMNAME="yast2-security"
MAINTAINER="Jiri Suchomel "
@@ -2693,7 +2693,7 @@
} >&5
cat >&5 <<_CSEOF
-This file was extended by yast2-security $as_me 2.13.4, which was
+This file was extended by yast2-security $as_me 2.13.3, which was
generated by GNU Autoconf 2.59. Invocation command line was
CONFIG_FILES = $CONFIG_FILES
@@ -2748,7 +2748,7 @@
cat >>$CONFIG_STATUS <<_ACEOF
ac_cs_version="\\
-yast2-security config.status 2.13.4
+yast2-security config.status 2.13.3
configured by $0, generated by GNU Autoconf 2.59,
with options \\"`echo "$ac_configure_args" | sed 's/[\\""\`\$]/\\\\&/g'`\\"
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/configure.in new/yast2-security-2.14.0/configure.in
--- old/yast2-security-2.13.5/configure.in 2006-08-21 11:00:19.000000000 +0200
+++ new/yast2-security-2.14.0/configure.in 2006-06-12 14:12:41.000000000 +0200
@@ -1,9 +1,9 @@
dnl configure.in for yast2-security
dnl
-dnl -- This file is generated by y2autoconf 2.13.21 - DO NOT EDIT! --
+dnl -- This file is generated by y2autoconf 2.13.18 - DO NOT EDIT! --
dnl (edit configure.in.in instead)
-AC_INIT(yast2-security, 2.13.4, http://bugs.opensuse.org/, yast2-security)
+AC_INIT(yast2-security, 2.13.3, http://bugs.opensuse.org/, yast2-security)
dnl Check for presence of file 'RPMNAME'
AC_CONFIG_SRCDIR([RPMNAME])
@@ -17,7 +17,7 @@
AM_INIT_AUTOMAKE(tar-ustar) dnl searches for some needed programs
dnl Important YaST2 variables
-VERSION="2.13.4"
+VERSION="2.13.3"
RPMNAME="yast2-security"
MAINTAINER="Jiri Suchomel "
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/src/Security.ycp new/yast2-security-2.14.0/src/Security.ycp
--- old/yast2-security-2.13.5/src/Security.ycp 2006-06-23 14:34:39.000000000 +0200
+++ new/yast2-security-2.14.0/src/Security.ycp 2006-08-25 13:46:04.000000000 +0200
@@ -12,6 +12,7 @@
module "Security";
textdomain "security";
+import "Pam";
import "PamSettings";
import "Progress";
@@ -271,7 +272,8 @@
Progress::NextStage();
/* pam stuff */
- list<string> pam_check_settings = PamSettings::GetValues("pam_pwcheck", "password");
+ map pwcheck = Pam::Query ("pwcheck");
+ list<string> pam_check_settings = pwcheck["password"]:[];
/* read the password hash settings */
string method = PamSettings::GetDefaultValue ("CRYPT_FILES");
@@ -418,33 +420,35 @@
string encr = Settings["PASSWD_ENCRYPTION"]:"blowfish";
PamSettings::SetDefaultValue ("CRYPT_FILES", encr);
- /* use cracklib? */
- PamSettings::RemoveValue ("pam_pwcheck", "password", "use_cracklib");
- PamSettings::RemoveValue ("pam_pwcheck", "password", "cracklib");
+ // use cracklib?
if(Settings["PASSWD_USE_CRACKLIB"]:"no" == "yes") {
- string crack = "cracklib";
+ string crack = "pwcheck-cracklib";
string pth = Settings["CRACKLIB_DICT_PATH"]:"/usr/lib/cracklib_dict";
if (pth != "/usr/lib/cracklib_dict")
- crack = crack + "=" + pth;
- PamSettings::AddValue ("pam_pwcheck", "password", crack);
+ crack = "pwcheck-cracklib-path=" + pth;
+ Pam::Add (crack);
}
+ else
+ Pam::Remove ("pwcheck-cracklib");
- /* save obscure checks when not defualt*/
- PamSettings::RemoveValue ("pam_pwcheck", "password", "no_obscure_checks");
- if(Settings["OBSCURE_CHECKS_ENAB"]:"yes" != "yes")
- PamSettings::AddValue ("pam_pwcheck", "password", "no_obscure_checks");
-
- /* save min pass length when not default */
- PamSettings::RemoveValue ("pam_pwcheck", "password", "minlen");
- if(Settings["PASS_MIN_LEN"]:"5" != "5")
- PamSettings::AddValue ("pam_pwcheck", "password",
- sformat ("minlen=%1", Settings["PASS_MIN_LEN"]:"5"));
+ // save obscure checks
+ Pam::Set ("pwcheck-no_obscure_checks",
+ Settings["OBSCURE_CHECKS_ENAB"]:"yes" != "yes");
+
+ // save min pass length
+ if (Settings["PASS_MIN_LEN"]:"5" != "5")
+ Pam::Add (sformat ("pwcheck-minlen=%1", Settings["PASS_MIN_LEN"]:"5"));
+ else
+ Pam::Remove ("pwcheck-minlen=");
// save "remember" value (number of old user passwords to not allow)
- PamSettings::RemoveValue ("pam_pwcheck", "password", "remember");
if (Settings["PASSWD_REMEMBER_HISTORY"]:"0" != "0")
- PamSettings::AddValue ("pam_pwcheck", "password",
- sformat ("remember=%1", Settings["PASSWD_REMEMBER_HISTORY"]:"0"));
+ {
+ Pam::Add (sformat ("pwcheck-remember=%1",
+ Settings["PASSWD_REMEMBER_HISTORY"]:"0"));
+ }
+ else
+ Pam::Remove ("pwcheck-remember=");
PamSettings::Write (false);
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/src/dialogs.ycp new/yast2-security-2.14.0/src/dialogs.ycp
--- old/yast2-security-2.13.5/src/dialogs.ycp 2006-08-21 11:03:37.000000000 +0200
+++ new/yast2-security-2.14.0/src/dialogs.ycp 2006-08-21 13:13:14.000000000 +0200
@@ -4,7 +4,7 @@
* Summary: Dialogs definitions
* Authors: Michal Svec
*
- * $Id: dialogs.ycp 31463 2006-06-13 07:16:36Z jsuchome $
+ * $Id: dialogs.ycp 32461 2006-08-21 11:14:49Z jsuchome $
*/
{
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/testsuite/tests/Level1.out new/yast2-security-2.14.0/testsuite/tests/Level1.out
--- old/yast2-security-2.13.5/testsuite/tests/Level1.out 2006-06-23 14:34:40.000000000 +0200
+++ new/yast2-security-2.14.0/testsuite/tests/Level1.out 2006-08-25 13:48:53.000000000 +0200
@@ -55,31 +55,10 @@
Execute .target.bash "/sbin/telinit q" 0
Read .etc.default.passwd."CRYPT_FILES" nil
Write .etc.default.passwd."CRYPT_FILES" "blowfish" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "no_obscure_checks" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Write .etc.security nil true
+Execute .target.bash_output "pam-config -d --pwcheck-cracklib" $[]
+Execute .target.bash_output "pam-config -a --pwcheck-no_obscure_checks" $[]
+Execute .target.bash_output "pam-config -d --pwcheck-minlen=" $[]
+Execute .target.bash_output "pam-config -d --pwcheck-remember=" $[]
Write .etc.default.passwd nil true
Execute .target.bash "echo 0 > /proc/sys/kernel/sysrq" 0
Execute .target.bash "/sbin/SuSEconfig --module xdm" 0
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/testsuite/tests/Level1.ycp new/yast2-security-2.14.0/testsuite/tests/Level1.ycp
--- old/yast2-security-2.13.5/testsuite/tests/Level1.ycp 2006-06-23 14:34:40.000000000 +0200
+++ new/yast2-security-2.14.0/testsuite/tests/Level1.ycp 2006-08-25 13:48:13.000000000 +0200
@@ -19,8 +19,14 @@
import "Security";
include "security/levels.ycp";
+map E = $[
+ "target" : $[
+ "bash_output" : $[]
+ ]
+];
+
Security::Settings = Levels["Level1"]:$[];
Security::modified = true;
-TEST(``(Security::Write()),[],nil);
+TEST(``(Security::Write()),[$[],$[],E],nil);
}
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/testsuite/tests/Level2.out new/yast2-security-2.14.0/testsuite/tests/Level2.out
--- old/yast2-security-2.13.5/testsuite/tests/Level2.out 2006-06-23 14:34:40.000000000 +0200
+++ new/yast2-security-2.14.0/testsuite/tests/Level2.out 2006-08-25 13:49:43.000000000 +0200
@@ -55,35 +55,10 @@
Execute .target.bash "/sbin/telinit q" 0
Read .etc.default.passwd."CRYPT_FILES" nil
Write .etc.default.passwd."CRYPT_FILES" "blowfish" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "cracklib" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "no_obscure_checks" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Write .etc.security nil true
+Execute .target.bash_output "pam-config -a --pwcheck-cracklib" $[]
+Execute .target.bash_output "pam-config -a --pwcheck-no_obscure_checks" $[]
+Execute .target.bash_output "pam-config -d --pwcheck-minlen=" $[]
+Execute .target.bash_output "pam-config -d --pwcheck-remember=" $[]
Write .etc.default.passwd nil true
Execute .target.bash "echo 0 > /proc/sys/kernel/sysrq" 0
Execute .target.bash "/sbin/SuSEconfig --module xdm" 0
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/testsuite/tests/Level2.ycp new/yast2-security-2.14.0/testsuite/tests/Level2.ycp
--- old/yast2-security-2.13.5/testsuite/tests/Level2.ycp 2006-06-23 14:34:40.000000000 +0200
+++ new/yast2-security-2.14.0/testsuite/tests/Level2.ycp 2006-08-25 13:49:10.000000000 +0200
@@ -19,8 +19,14 @@
import "Security";
include "security/levels.ycp";
+map E = $[
+ "target" : $[
+ "bash_output" : $[]
+ ]
+];
+
Security::Settings = Levels["Level2"]:$[];
Security::modified = true;
-TEST(``(Security::Write()),[],nil);
+TEST(``(Security::Write()),[$[],$[],E],nil);
}
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/testsuite/tests/Level3.out new/yast2-security-2.14.0/testsuite/tests/Level3.out
--- old/yast2-security-2.13.5/testsuite/tests/Level3.out 2006-06-23 14:34:40.000000000 +0200
+++ new/yast2-security-2.14.0/testsuite/tests/Level3.out 2006-08-25 13:49:57.000000000 +0200
@@ -55,39 +55,10 @@
Execute .target.bash "/sbin/telinit q" 0
Read .etc.default.passwd."CRYPT_FILES" nil
Write .etc.default.passwd."CRYPT_FILES" "blowfish" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "cracklib" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "no_obscure_checks" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "minlen=6" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Write .etc.security nil true
+Execute .target.bash_output "pam-config -a --pwcheck-cracklib" $[]
+Execute .target.bash_output "pam-config -a --pwcheck-no_obscure_checks" $[]
+Execute .target.bash_output "pam-config -a --pwcheck-minlen=6" $[]
+Execute .target.bash_output "pam-config -d --pwcheck-remember=" $[]
Write .etc.default.passwd nil true
Execute .target.bash "echo 0 > /proc/sys/kernel/sysrq" 0
Execute .target.bash "/sbin/SuSEconfig --module xdm" 0
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/testsuite/tests/Level3.ycp new/yast2-security-2.14.0/testsuite/tests/Level3.ycp
--- old/yast2-security-2.13.5/testsuite/tests/Level3.ycp 2006-06-23 14:34:40.000000000 +0200
+++ new/yast2-security-2.14.0/testsuite/tests/Level3.ycp 2006-08-25 13:49:43.000000000 +0200
@@ -19,8 +19,14 @@
import "Security";
include "security/levels.ycp";
+map E = $[
+ "target" : $[
+ "bash_output" : $[]
+ ]
+];
+
Security::Settings = Levels["Level3"]:$[];
Security::modified = true;
-TEST(``(Security::Write()),[],nil);
+TEST(``(Security::Write()),[$[],$[],E],nil);
}
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/testsuite/tests/Read.out new/yast2-security-2.14.0/testsuite/tests/Read.out
--- old/yast2-security-2.13.5/testsuite/tests/Read.out 2006-06-23 14:34:40.000000000 +0200
+++ new/yast2-security-2.14.0/testsuite/tests/Read.out 2006-08-25 13:51:13.000000000 +0200
@@ -30,8 +30,7 @@
Read .sysconfig.sysctl.ENABLE_SYSRQ "r8"
Dir .etc.inittab: ["ca"]
Read .etc.inittab.ca ":ctrlaltdel:/sbin/shutdown -r -t 4 now"
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
+Execute .target.bash_output "pam-config -q --pwcheck" $[]
Read .etc.default.passwd."CRYPT_FILES" "blowfish"
Read .etc.default.passwd.group_crypt nil
Read .etc.default.passwd.crypt "md5"
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/testsuite/tests/Read.ycp new/yast2-security-2.14.0/testsuite/tests/Read.ycp
--- old/yast2-security-2.13.5/testsuite/tests/Read.ycp 2006-06-23 14:34:40.000000000 +0200
+++ new/yast2-security-2.14.0/testsuite/tests/Read.ycp 2006-08-25 13:50:56.000000000 +0200
@@ -76,6 +76,12 @@
]]]
];
-TEST(``(Security::Read()),[scr_info],nil);
+map E = $[
+ "target" : $[
+ "bash_output" : $[]
+ ]
+];
+
+TEST(``(Security::Read()),[scr_info,$[],E],nil);
}
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/testsuite/tests/Write.out new/yast2-security-2.14.0/testsuite/tests/Write.out
--- old/yast2-security-2.13.5/testsuite/tests/Write.out 2006-06-23 14:34:40.000000000 +0200
+++ new/yast2-security-2.14.0/testsuite/tests/Write.out 2006-08-25 13:51:35.000000000 +0200
@@ -55,35 +55,10 @@
Execute .target.bash "/sbin/telinit q" 0
Read .etc.default.passwd."CRYPT_FILES" nil
Write .etc.default.passwd."CRYPT_FILES" "blowfish" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "no_obscure_checks" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "minlen=l10" true
-Dir .etc.security.section: []
-Read .etc.security.v."pam_pwcheck"."password" nil
-Dir .etc.security.section: []
-Write .etc.security.v."pam_pwcheck"."password" "" true
-Write .etc.security nil true
+Execute .target.bash_output "pam-config -d --pwcheck-cracklib" $[]
+Execute .target.bash_output "pam-config -a --pwcheck-no_obscure_checks" $[]
+Execute .target.bash_output "pam-config -a --pwcheck-minlen=l10" $[]
+Execute .target.bash_output "pam-config -d --pwcheck-remember=" $[]
Write .etc.default.passwd nil true
Execute .target.bash "echo 1 > /proc/sys/kernel/sysrq" 0
Execute .target.bash "/sbin/SuSEconfig --module xdm" 0
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yast2-security-2.13.5/testsuite/tests/Write.ycp new/yast2-security-2.14.0/testsuite/tests/Write.ycp
--- old/yast2-security-2.13.5/testsuite/tests/Write.ycp 2006-06-23 14:34:40.000000000 +0200
+++ new/yast2-security-2.14.0/testsuite/tests/Write.ycp 2006-08-25 13:51:07.000000000 +0200
@@ -49,9 +49,14 @@
"USERDEL_POSTCMD" : "l20",
];
+map E = $[
+ "target" : $[
+ "bash_output" : $[]
+ ]
+];
Security::Settings = m;
Security::modified = true;
-TEST(``(Security::Write()),[],nil);
+TEST(``(Security::Write()),[$[],$[],E],nil);
}
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Remember to have fun...
---------------------------------------------------------------------
To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-commit+help@opensuse.org