aboutsummaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/shadow/files
AgeCommit message (Collapse)Author
2013-06-27shadow-native: Add --root option in groupmemsMikhail Durnev
Patch add_root_cmd_groupmems.patch that we apply to shadow-native allows program groupmems from the shadow utility package to chroot() so it can be used to modify etc/passwd and etc/group if they are located in a sysroot. The --root option in groupmems is needed for class useradd. Signed-off-by: Mikhail Durnev <mikhail_durnev@mentor.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>
2013-04-05shadow: add patch to fix crypt: Invalid ArgumentSaul Wold
This patch came from Slackware and address a change in crypt()'s handling of an invalid seed, which in the past returned an encrypted string and now returns a NULL. [YOCTO #4097] related to tinylogin segfault Signed-off-by: Saul Wold <sgw@linux.intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2013-03-01shadow: remove grpconv argc checkMartin Donnelly
The patched version of grpconv takes arguments but the check on argc was not removed. This patch removes this check which otherwise results in a spurious warning during rootfs creation. Signed-off-by: Martin Donnelly <martin.donnelly@ge.com> Signed-off-by: Saul Wold <sgw@linux.intel.com>
2012-10-24shadow-securetty: add ARM AMBA serial portsMarcin Juszkiewicz
Signed-off-by: Marcin Juszkiewicz <marcin.juszkiewicz@linaro.org> Signed-off-by: Saul Wold <sgw@linux.intel.com>
2012-05-25shadow shadow-native: fix build with automake 1.12Nitin A Kamble
Signed-off-by: Nitin A Kamble <nitin.a.kamble@intel.com>
2012-04-10shadow-native: disable logging to syslogScott Garman
Disable use of syslog to prevent sysroot user and group additions from writing entries to the host's syslog. This fixes [YOCTO #2012] Signed-off-by: Scott Garman <scott.a.garman@intel.com>
2012-02-03shadow-securetty: allow root logins on usb serial gadget deviceSteve Sakoman
Existing tty list does not include ttyGS0, add it Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2011-10-10Fix the --root option in shadow-native programsJulian Pidancet
The add_root_cmd_options.patch that we apply to shadow-native allow the various programs from the shadow utility package to chroot() so they can be used to modify etc/passwd and etc/group if they are located in a sysroot. Some of the shadow programs (gpasswd, useradd and usermod) need to parse the command line in two passes. But we can't use getopt_long() twice because getopt_long() reorders the command line arguments, and consequently corrupts the option parsing during the second pass. This patch fixes this issue by replacing the first pass by a very simple manual walk of the command line to handle the --root argument. This change is a patch of another patch, I apologize if it is difficult to read. But IMHO it wouldn't make sense to put the patch for this issue in another separated file. The --root options in groupadd and useradd are needed to make the useradd class work, and this issue was preventing to use useradd and groupadd long options while using the class. Signed-off-by: Julian Pidancet <julian.pidancet@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2011-09-09shadow: add patch for useradd lossagePhil Blundell
This fixes (or, at least, papers over) a failure in do_install for recipes which inherit useradd.bbclass. Rewinding optind in this way is not entirely portable but in practice it seems to work on GNU-ish build hosts at least. Signed-off-by: Phil Blundell <philb@gnu.org> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2011-07-27shadow: update pam related configure filesKang Kai
add shadow-update-pam-conf.patch to update the pam related configure files in oe way rather than Fedora. Signed-off-by: Kang Kai <kai.kang@windriver.com>
2011-06-30shadow-native: fix creation of home directoriesScott Garman
Pseudo was recently changed so that when system() calls are made after a chroot(), the host binaries can no longer be found, breaking the system("mkdir -p") approach when useradd creates home directories. Instead, use mkdir(2) to create home directories with a helper function to ensure parent directories get created. Signed-off-by: Scott Garman <scott.a.garman@intel.com>
2011-06-28shadow-sysroot: new recipe for useradd.bbclass supportScott Garman
Packaging login.defs with base-passwd causes problems due to the file being included in target package installs. Instead, this shadow-sysroot recipe can be used by useradd.bbclass to put login.defs into the target sysroot without disturbing packages intended for target devices. Signed-off-by: Scott Garman <scott.a.garman@intel.com>
2011-06-06shadow: add a -native recipe with customized utilitiesScott Garman
This adds a -native recipe for the shadow utilities. The custom --root option allows the the following utilities to be run within a chroot when invoked under pseudo: * useradd * groupadd * usermod * groupmod * userdel * groupdel * passwd * gpasswd * pwconv * pwunconv * grpconv * grpunconv They can then be used to manipulate user and group account information in target sysroots. useradd was also modified to create home directories recursively when necessary. Signed-off-by: Scott Garman <scott.a.garman@intel.com>
2011-06-06shadow: recipe and patch cleanupScott Garman
Taking over maintenance of the shadow recipe. Cleaning it up in preparation of adding a -native version that will be used to add users/groups during preinstall. Signed-off-by: Scott Garman <scott.a.garman@intel.com>
2011-06-02shadow: remove selinux entry from pam.d/loginKoen Kooi
SElinux has been disabled in the recipe, leading to messages like this: [ 167.643218] login[312]: PAM unable to dlopen(/lib/security/pam_selinux.so): /lib/security/pam_selinux.so: cannot open shared object file: No such file or directory [ 167.670837] login[312]: PAM adding faulty module: /lib/security/pam_selinux.so Signed-off-by: Koen Kooi <koen@dominion.thruhere.net>
2011-03-02shadow: upgrade to 4.1.4.3 to fix security vulnerabilityYu Ke
For CVE-2011-0721: http://lists.debian.org/debian-security-announce/2011/msg00030.html Signed-off-by: Yu Ke <ke.yu@intel.com>