r41630 - in /desktop/experimental/gdm3/debian: changelog gdm3.gdm-autologin.pam gdm3.gdm-password.pam

bigon at users.alioth.debian.org bigon at users.alioth.debian.org
Wed May 7 14:58:10 UTC 2014


Author: bigon
Date: Wed May  7 14:58:10 2014
New Revision: 41630

URL: http://svn.debian.org/wsvn/pkg-gnome/?sc=1&rev=41630
Log:
debian/gdm3.pam, debian/gdm3-autologin.pam: Call pam_selinux open module
higher in the session stack

Modified:
    desktop/experimental/gdm3/debian/changelog
    desktop/experimental/gdm3/debian/gdm3.gdm-autologin.pam
    desktop/experimental/gdm3/debian/gdm3.gdm-password.pam

Modified: desktop/experimental/gdm3/debian/changelog
URL: http://svn.debian.org/wsvn/pkg-gnome/desktop/experimental/gdm3/debian/changelog?rev=41630&op=diff
==============================================================================
--- desktop/experimental/gdm3/debian/changelog	[utf-8] (original)
+++ desktop/experimental/gdm3/debian/changelog	[utf-8] Wed May  7 14:58:10 2014
@@ -13,6 +13,8 @@
     - Drop explicit dependency against systemd, libpam-systemd should pull the
       needed packages
     - Depends against consolekit on non-linux architectures
+  * debian/gdm3.pam, debian/gdm3-autologin.pam: Call pam_selinux open module
+    higher in the session stack
 
   [ Josselin Mouette ]
   * Make description up-to-date.
@@ -54,7 +56,7 @@
   * Install stub D-Bus files for gnome-online-accounts and telepathy, to 
     avoid launching such daemons in the login session.
 
- -- Laurent Bigonville <bigon at debian.org>  Mon, 05 May 2014 15:26:14 +0200
+ -- Laurent Bigonville <bigon at debian.org>  Wed, 07 May 2014 16:58:02 +0200
 
 gdm3 (3.12.0-1) experimental; urgency=low
 

Modified: desktop/experimental/gdm3/debian/gdm3.gdm-autologin.pam
URL: http://svn.debian.org/wsvn/pkg-gnome/desktop/experimental/gdm3/debian/gdm3.gdm-autologin.pam?rev=41630&op=diff
==============================================================================
--- desktop/experimental/gdm3/debian/gdm3.gdm-autologin.pam	[utf-8] (original)
+++ desktop/experimental/gdm3/debian/gdm3.gdm-autologin.pam	[utf-8] Wed May  7 14:58:10 2014
@@ -7,13 +7,13 @@
 # lingering context has been cleared. Without this it is possible 
 # that a module could execute code in the wrong domain.
 session [success=ok ignore=ignore module_unknown=ignore default=bad]        pam_selinux.so close
-session required        pam_limits.so
-session required        pam_env.so readenv=1
-session required        pam_env.so readenv=1 envfile=/etc/default/locale
 session required        pam_loginuid.so
- at include common-session
 # SELinux needs to intervene at login time to ensure that the process
 # starts in the proper default security context. Only sessions which are
 # intended to run in the user's context should be run after this.
 session [success=ok ignore=ignore module_unknown=ignore default=bad]        pam_selinux.so open
+session required        pam_limits.so
+session required        pam_env.so readenv=1
+session required        pam_env.so readenv=1 envfile=/etc/default/locale
+ at include common-session
 @include common-password

Modified: desktop/experimental/gdm3/debian/gdm3.gdm-password.pam
URL: http://svn.debian.org/wsvn/pkg-gnome/desktop/experimental/gdm3/debian/gdm3.gdm-password.pam?rev=41630&op=diff
==============================================================================
--- desktop/experimental/gdm3/debian/gdm3.gdm-password.pam	[utf-8] (original)
+++ desktop/experimental/gdm3/debian/gdm3.gdm-password.pam	[utf-8] Wed May  7 14:58:10 2014
@@ -5,17 +5,17 @@
 auth    optional        pam_gnome_keyring.so
 @include common-account
 # SELinux needs to be the first session rule. This ensures that any 
-# lingering context has been cleared. Without out this it is possible 
+# lingering context has been cleared. Without this it is possible 
 # that a module could execute code in the wrong domain.
 session [success=ok ignore=ignore module_unknown=ignore default=bad]        pam_selinux.so close
-session required        pam_limits.so
-session required        pam_env.so readenv=1
-session required        pam_env.so readenv=1 envfile=/etc/default/locale
 session required        pam_loginuid.so
- at include common-session
 # SELinux needs to intervene at login time to ensure that the process
 # starts in the proper default security context. Only sessions which are
 # intended to run in the user's context should be run after this.
 session [success=ok ignore=ignore module_unknown=ignore default=bad]        pam_selinux.so open
+session required        pam_limits.so
+session required        pam_env.so readenv=1
+session required        pam_env.so readenv=1 envfile=/etc/default/locale
+ at include common-session
 session optional        pam_gnome_keyring.so auto_start
 @include common-password




More information about the pkg-gnome-commits mailing list