[Pkg-shadow-commits] r668 - trunk/debian/patches
Christian Perrier
bubulle at costa.debian.org
Thu Dec 1 19:09:14 UTC 2005
Author: bubulle
Date: 2005-12-01 19:09:08 +0000 (Thu, 01 Dec 2005)
New Revision: 668
Removed:
trunk/debian/patches/010_more-i18ned-messages
trunk/debian/patches/336_chfn.1
trunk/debian/patches/357_newgrp-stop_cont-proxy
trunk/debian/patches/365_PAM_copy_environ_later
trunk/debian/patches/403_sg_symlink_162339_163652.dpatch
trunk/debian/patches/405_subsystem_remove_*_in_shell.dpatch
trunk/debian/patches/440_manpages-login.1
trunk/debian/patches/443_chage_exit_values
trunk/debian/patches/446_newgrp.1_no_SHADOWPWD
Log:
Removed unused patches
Deleted: trunk/debian/patches/010_more-i18ned-messages
===================================================================
--- trunk/debian/patches/010_more-i18ned-messages 2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/010_more-i18ned-messages 2005-12-01 19:09:08 UTC (rev 668)
@@ -1,211 +0,0 @@
-Purpose: Internationalise a few more messages
-
-Fixes: #266281
-
-Status wrt upstream: submitted 20050613 (slightly differently as upstream
- differs on some files)
-
-Index: shadow-4.0.12/libmisc/obscure.c
-===================================================================
---- shadow-4.0.12.orig/libmisc/obscure.c 2005-08-17 11:49:14.000000000 +0200
-+++ shadow-4.0.12/libmisc/obscure.c 2005-08-17 11:51:09.000000000 +0200
-@@ -158,7 +158,7 @@
- #endif
-
- if (strcmp (new, old) == 0)
-- return "no change";
-+ return _("no change");
-
- newmono = str_lower (xstrdup (new));
- oldmono = str_lower (xstrdup (old));
-@@ -167,19 +167,19 @@
- strcat (wrapped, oldmono);
-
- if (palindrome (oldmono, newmono))
-- msg = "a palindrome";
-+ msg = _("a palindrome");
-
- if (!msg && strcmp (oldmono, newmono) == 0)
-- msg = "case changes only";
-+ msg = _("case changes only");
-
- if (!msg && similar (oldmono, newmono))
-- msg = "too similar";
-+ msg = _("too similar");
-
- if (!msg && simple (old, new))
-- msg = "too simple";
-+ msg = _("too simple");
-
- if (!msg && strstr (wrapped, newmono))
-- msg = "rotated";
-+ msg = _("rotated");
-
- #ifdef HAVE_LIBCRACK
- /*
-@@ -215,7 +215,7 @@
- newlen = strlen (new);
-
- if (newlen < getdef_num ("PASS_MIN_LEN", 0))
-- return "too short";
-+ return _("too short");
-
- /*
- * Remaining checks are optional.
-Index: shadow-4.0.12/libmisc/utmp.c
-===================================================================
---- shadow-4.0.12.orig/libmisc/utmp.c 2005-08-17 11:49:14.000000000 +0200
-+++ shadow-4.0.12/libmisc/utmp.c 2005-08-17 11:51:09.000000000 +0200
-@@ -53,9 +53,9 @@
- extern void endutent ();
-
- #define NO_UTENT \
-- "No utmp entry. You must exec \"login\" from the lowest level \"sh\""
-+ _("No utmp entry. You must exec \"login\" from the lowest level \"sh\"")
- #define NO_TTY \
-- "Unable to determine your tty name."
-+ _("Unable to determine your tty name.")
-
- /*
- * checkutmp - see if utmp file is correct for this process
-Index: shadow-4.0.12/src/login.c
-===================================================================
---- shadow-4.0.12.orig/src/login.c 2005-08-17 11:50:56.000000000 +0200
-+++ shadow-4.0.12/src/login.c 2005-08-17 11:51:09.000000000 +0200
-@@ -595,7 +595,7 @@
- retcode = pam_start ("login", username, &conv, &pamh);
- if (retcode != PAM_SUCCESS) {
- fprintf (stderr,
-- "login: PAM Failure, aborting: %s\n",
-+ _("login: PAM Failure, aborting: %s\n"),
- pam_strerror (pamh, retcode));
- SYSLOG ((LOG_ERR, "Couldn't initialize PAM: %s",
- pam_strerror (pamh, retcode)));
-@@ -713,7 +713,7 @@
- if (!failed)
- break;
-
-- fprintf(stderr,"Login incorrect\n\n");
-+ fprintf(stderr,_("Login incorrect\n\n"));
- if (pwd && getdef_bool("FAILLOG_ENAB"))
- failure (pwent.pw_uid, tty, &faillog);
- if (getdef_str("FTMP_FILE") != NULL) {
-@@ -1018,7 +1018,7 @@
- child = fork ();
- if (child < 0) {
- /* error in fork() */
-- fprintf (stderr, "login: failure forking: %s",
-+ fprintf (stderr, _("login: failure forking: %s"),
- strerror (errno));
- PAM_END;
- exit (0);
-Index: shadow-4.0.12/src/logoutd.c
-===================================================================
---- shadow-4.0.12.orig/src/logoutd.c 2005-08-17 11:49:14.000000000 +0200
-+++ shadow-4.0.12/src/logoutd.c 2005-08-17 11:51:09.000000000 +0200
-@@ -41,7 +41,7 @@
- static char *Prog;
-
- #ifndef DEFAULT_HUP_MESG
--#define DEFAULT_HUP_MESG "login time exceeded\r\n"
-+#define DEFAULT_HUP_MESG _("login time exceeded\r\n")
- #endif
-
- #ifndef HUP_MESG_FILE
-Index: shadow-4.0.12/src/newgrp.c
-===================================================================
---- shadow-4.0.12.orig/src/newgrp.c 2005-08-17 11:49:14.000000000 +0200
-+++ shadow-4.0.12/src/newgrp.c 2005-08-17 11:51:09.000000000 +0200
-@@ -467,7 +467,7 @@
- child = fork ();
- if (child < 0) {
- /* error in fork() */
-- fprintf (stderr, "%s: failure forking: %s",
-+ fprintf (stderr, _("%s: failure forking: %s"),
- is_newgrp ? "newgrp" : "sg", strerror (errno));
- exit (1);
- } else if (child) {
-Index: shadow-4.0.12/src/su.c
-===================================================================
---- shadow-4.0.12.orig/src/su.c 2005-08-17 11:50:57.000000000 +0200
-+++ shadow-4.0.12/src/su.c 2005-08-17 11:51:09.000000000 +0200
-@@ -329,7 +329,7 @@
- if (ret != PAM_SUCCESS) {
- SYSLOG ((LOG_ERR, "pam_close_session: %s",
- pam_strerror (pamh, ret)));
-- fprintf (stderr, "%s: %s\n", Prog, pam_strerror (pamh, ret));
-+ fprintf (stderr, _("%s: %s\n"), Prog, pam_strerror (pamh, ret));
- pam_end (pamh, ret);
- exit (1);
- }
-@@ -526,7 +526,7 @@
- if (ret != PAM_SUCCESS) {
- SYSLOG ((LOG_ERR, "pam_set_item: %s",
- pam_strerror (pamh, ret)));
-- fprintf (stderr, "%s: %s\n", Prog, pam_strerror (pamh, ret));
-+ fprintf (stderr, _("%s: %s\n"), Prog, pam_strerror (pamh, ret));
- pam_end (pamh, ret);
- exit (1);
- }
-@@ -649,7 +649,7 @@
- if (ret != PAM_SUCCESS) {
- SYSLOG ((LOG_ERR, "pam_authenticate: %s",
- pam_strerror (pamh, ret)));
-- fprintf (stderr, "%s: %s\n", Prog, pam_strerror (pamh, ret));
-+ fprintf (stderr, _("%s: %s\n"), Prog, pam_strerror (pamh, ret));
- pam_end (pamh, ret);
- su_failure (tty);
- }
-@@ -662,7 +662,7 @@
- } else {
- SYSLOG ((LOG_ERR, "pam_acct_mgmt: %s",
- pam_strerror (pamh, ret)));
-- fprintf (stderr, "%s: %s\n", Prog,
-+ fprintf (stderr, _("%s: %s\n"), Prog,
- pam_strerror (pamh, ret));
- pam_end (pamh, ret);
- su_failure (tty);
-@@ -798,7 +798,7 @@
- ret = pam_setcred (pamh, PAM_ESTABLISH_CRED);
- if (ret != PAM_SUCCESS) {
- SYSLOG ((LOG_ERR, "pam_setcred: %s", pam_strerror (pamh, ret)));
-- fprintf (stderr, "%s: %s\n", Prog, pam_strerror (pamh, ret));
-+ fprintf (stderr, _("%s: %s\n"), Prog, pam_strerror (pamh, ret));
- pam_end (pamh, ret);
- exit (1);
- }
-@@ -807,7 +807,7 @@
- if (ret != PAM_SUCCESS) {
- SYSLOG ((LOG_ERR, "pam_open_session: %s",
- pam_strerror (pamh, ret)));
-- fprintf (stderr, "%s: %s\n", Prog, pam_strerror (pamh, ret));
-+ fprintf (stderr, _("%s: %s\n"), Prog, pam_strerror (pamh, ret));
- pam_setcred(pamh, PAM_DELETE_CRED);
- pam_end (pamh, ret);
- exit (1);
-Index: shadow-4.0.12/src/useradd.c
-===================================================================
---- shadow-4.0.12.orig/src/useradd.c 2005-08-17 11:51:02.000000000 +0200
-+++ shadow-4.0.12/src/useradd.c 2005-08-17 11:51:09.000000000 +0200
-@@ -790,7 +790,7 @@
- ngrp->gr_mem = add_list (ngrp->gr_mem, user_name);
- if (!gr_update (ngrp)) {
- fprintf (stderr,
-- "%s: error adding new group entry\n", Prog);
-+ _("%s: error adding new group entry\n"), Prog);
- fail_exit (E_GRP_UPDATE);
- }
- SYSLOG ((LOG_INFO, "add `%s' to group `%s'",
-Index: shadow-4.0.12/src/chage.c
-===================================================================
---- shadow-4.0.12.orig/src/chage.c 2005-08-17 11:51:02.000000000 +0200
-+++ shadow-4.0.12/src/chage.c 2005-08-17 11:51:09.000000000 +0200
-@@ -563,7 +563,7 @@
- }
-
- if (lflg && (setgid (getgid ()) || setuid (ruid))) {
-- fprintf (stderr, "%s: failed to drop privileges (%s)\n",
-+ fprintf (stderr, _("%s: failed to drop privileges (%s)\n"),
- Prog, strerror (errno));
- exit (E_NOPERM);
- }
Deleted: trunk/debian/patches/336_chfn.1
===================================================================
--- trunk/debian/patches/336_chfn.1 2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/336_chfn.1 2005-12-01 19:09:08 UTC (rev 668)
@@ -1,24 +0,0 @@
-Goal: do not advertize that the "other" field can contain control characters.
-
-Status wrt upstream: need to be checked.
-
-Note:
- * The reason why this sentence was commented is not clear.
- We can keep the patch, without applying it.
-
-Index: shadow-4.0.10/man/chfn.1.xml
-===================================================================
---- shadow-4.0.10.orig/man/chfn.1.xml 2005-06-15 14:21:58.000000000 +0200
-+++ shadow-4.0.10/man/chfn.1.xml 2005-07-04 18:00:03.000000000 +0200
-@@ -42,9 +42,9 @@
-
- <para>The only restriction placed on the contents of the fields is that
- no control characters may be present, nor any of comma, colon, or
-- equal sign. The <emphasis remap='I'>other</emphasis> field does not
-+ equal sign.<!-- The <emphasis remap='I'>other</emphasis> field does not
- have this restriction, and is used to store accounting information
-- used by other applications.
-+ used by other applications.-->
- </para>
-
- <para> If none of the options are selected, <command>chfn</command>
Deleted: trunk/debian/patches/357_newgrp-stop_cont-proxy
===================================================================
--- trunk/debian/patches/357_newgrp-stop_cont-proxy 2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/357_newgrp-stop_cont-proxy 2005-12-01 19:09:08 UTC (rev 668)
@@ -1,38 +0,0 @@
-Goal: When newgrp process sits between parent and child shells, it should
- propagate STOPs from child to parent and CONTs from parent to child,
- otherwise e.g. bash's "suspend" command won't work.
-
-Status wrt upstream: Will be in 4.0.13
-
-Notes:
- newgrp doesn't fork and create child process, it just calls exec(),
- so there won't be "newgrp" process between parent and child shells.
-
- Closes: 314727
- (suspend command from su shell fails to return to parent shell)
-
-Index: shadow-4.0.12/src/newgrp.c
-===================================================================
---- shadow-4.0.12.orig/src/newgrp.c 2005-08-17 11:51:09.000000000 +0200
-+++ shadow-4.0.12/src/newgrp.c 2005-08-17 11:51:13.000000000 +0200
-@@ -472,9 +472,18 @@
- exit (1);
- } else if (child) {
- /* parent - wait for child to finish, then log session close */
-+ int cst = 0;
- do {
-- pid = waitpid (child, NULL, 0);
-- } while (pid != child);
-+ errno = 0;
-+ pid = waitpid (child, &cst, WUNTRACED);
-+ if (pid == child && WIFSTOPPED(cst)) {
-+ /* stop when child stops */
-+ raise(SIGSTOP);
-+ /* wake child when resumed */
-+ kill(child, SIGCONT);
-+ }
-+ } while (pid == child && WIFSTOPPED(cst) ||
-+ pid != child && errno == EINTR);
- SYSLOG ((LOG_INFO,
- "user `%s' (login `%s' on %s) returned to group `%s'",
- name, loginname, tty,
Deleted: trunk/debian/patches/365_PAM_copy_environ_later
===================================================================
--- trunk/debian/patches/365_PAM_copy_environ_later 2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/365_PAM_copy_environ_later 2005-12-01 19:09:08 UTC (rev 668)
@@ -1,22 +0,0 @@
-Goal: When PAM is used, the environment must be copied later.
- This was present in 4.0.11
-
-Status wrt upstream: will be in 4.0.13
-
-Index: shadow-4.0.12/src/su.c
-===================================================================
---- shadow-4.0.12.orig/src/su.c 2005-08-11 21:15:07.000000000 +0200
-+++ shadow-4.0.12/src/su.c 2005-08-11 21:30:06.000000000 +0200
-@@ -781,9 +781,12 @@
- addenv ("PATH", cp);
- }
-
-+#ifndef USE_PAM
-+/* setup the environment for pam later on, else we run into auth problems */
- if (change_environment || restricted_shell(pwent.pw_shell)) {
- environ = newenvp; /* make new environment active */
- }
-+#endif /* !USE_APM */
-
- if (getenv ("IFS")) /* don't export user IFS ... */
- addenv ("IFS= \t\n", NULL); /* ... instead, set a safe IFS */
Deleted: trunk/debian/patches/403_sg_symlink_162339_163652.dpatch
===================================================================
--- trunk/debian/patches/403_sg_symlink_162339_163652.dpatch 2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/403_sg_symlink_162339_163652.dpatch 2005-12-01 19:09:08 UTC (rev 668)
@@ -1,26 +0,0 @@
-#! /bin/sh /usr/share/dpatch/dpatch-run
-## 403_sg_symlink_162339_163652.dpatch by Nicolas FRANCOIS <nicolas.francois at centraliens.net>
-##
-## All lines beginning with `## DP:' are a description of the patch.
-## DP: This patch was probably a part of the fix for #162339 and #163652.
-## DP: It was needed because newgrp was installed in /bin, but the sg
-## DP: symlink pointed to /usr/bin/newgrp.
-## DP:
-## DP: The symlink is now done in debian/rules, and sg and newgrp are
-## DP: installed in /usr/bin.
-## DP: This patch can probably be removed now.
-## DP: (We just have to test if sg is linked to newgrp)
-
- at DPATCH@
-Index: shadow-4.0.13/src/Makefile.am
-===================================================================
---- shadow-4.0.13.orig/src/Makefile.am 2005-10-04 08:07:29.006420748 +0200
-+++ shadow-4.0.13/src/Makefile.am 2005-10-04 08:07:29.804258184 +0200
-@@ -78,7 +78,6 @@
-
- install-am: all-am
- $(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
-- ln -sf newgrp $(DESTDIR)$(ubindir)/sg
- ln -sf vipw $(DESTDIR)$(usbindir)/vigr
- for i in $(suidbins); do \
- chmod -f 4755 $(DESTDIR)$(bindir)/$$i; \
Deleted: trunk/debian/patches/405_subsystem_remove_*_in_shell.dpatch
===================================================================
--- trunk/debian/patches/405_subsystem_remove_*_in_shell.dpatch 2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/405_subsystem_remove_*_in_shell.dpatch 2005-12-01 19:09:08 UTC (rev 668)
@@ -1,46 +0,0 @@
-#! /bin/sh /usr/share/dpatch/dpatch-run
-## 405_subsystem_remove_*_in_shell.dpatch by Nicolas FRANCOIS <nicolas.francois at centraliens.net>
-##
-## All lines beginning with `## DP:' are a description of the patch.
-## DP: Remove the * at the beginning of the shell for subsystem logins.
-## DP: It fixed #82893
-## DP:
-## DP: This was fixed upstream by removing the * before calling subsystem.
-## DP: Thus, it is no more needed (but does not harm).
-
- at DPATCH@
-Index: shadow-4.0.13/lib/prototypes.h
-===================================================================
---- shadow-4.0.13.orig/lib/prototypes.h 2005-10-04 08:06:31.175204282 +0200
-+++ shadow-4.0.13/lib/prototypes.h 2005-10-04 08:07:31.522908001 +0200
-@@ -169,7 +169,7 @@
- extern void sulog (const char *, int, const char *, const char *);
-
- /* sub.c */
--extern void subsystem (const struct passwd *);
-+extern void subsystem (struct passwd *);
-
- /* ttytype.c */
- extern void ttytype (const char *);
-Index: shadow-4.0.13/libmisc/sub.c
-===================================================================
---- shadow-4.0.13.orig/libmisc/sub.c 2005-10-04 08:06:31.175204282 +0200
-+++ shadow-4.0.13/libmisc/sub.c 2005-10-04 08:07:31.522908001 +0200
-@@ -46,7 +46,7 @@
- * directory will be used as the root of a new filesystem which
- * the user is actually logged into.
- */
--void subsystem (const struct passwd *pw)
-+void subsystem (struct passwd *pw)
- {
- /*
- * The new root directory must begin with a "/" character.
-@@ -71,4 +71,8 @@
- closelog ();
- exit (1);
- }
-+
-+ /* Now fixup the shell to get rid of that '*' */
-+ if (*pw->pw_shell == '*')
-+ pw->pw_shell++;
- }
Deleted: trunk/debian/patches/440_manpages-login.1
===================================================================
--- trunk/debian/patches/440_manpages-login.1 2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/440_manpages-login.1 2005-12-01 19:09:08 UTC (rev 668)
@@ -1,31 +0,0 @@
-Goal: Better explain the respective roles of login, init and getty with regards
- to the utmp file
-
-Status wrt upstream: Fixed in 4.0.14
-
-Note:
- * Is it still the case if the pam session is closed?
-
-Index: shadow-4.0.13/man/login.1.xml
-===================================================================
---- shadow-4.0.13.orig/man/login.1.xml 2005-10-04 08:06:34.433540365 +0200
-+++ shadow-4.0.13/man/login.1.xml 2005-10-04 08:07:13.018678338 +0200
-@@ -172,6 +172,18 @@
- <para>The location of files is subject to differences in system
- configuration.
- </para>
-+
-+ <para>The <command>login</command> program is NOT responsible for removing
-+ users from the utmp file. It is the responsibility of <citerefentry>
-+ <refentrytitle>getty</refentrytitle><manvolnum>8</manvolnum>
-+ </citerefentry> and <citerefentry>
-+ <refentrytitle>init</refentrytitle><manvolnum>8</manvolnum>
-+ </citerefentry> to clean up apparent ownership of a terminal session.
-+ If you use <command>login</command>
-+ from the shell prompt without <command>exec</command>, the user you use
-+ will continue to appear to be logged in even after you log out of the
-+ "subsession".
-+ </para>
- </refsect1>
-
- <refsect1 id='files'>
Deleted: trunk/debian/patches/443_chage_exit_values
===================================================================
--- trunk/debian/patches/443_chage_exit_values 2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/443_chage_exit_values 2005-12-01 19:09:08 UTC (rev 668)
@@ -1,72 +0,0 @@
-Goal: differentiate the different failure causes by the exit value
- This will permit to adduser to detect if chage failed because the
- system doesn't have shadowed passwords.
-Fixes: #317012
-
-Status wrt upstream: will be in 4.0.13
-
-Index: shadow-4.0.12/src/chage.c
-===================================================================
---- shadow-4.0.12.orig/src/chage.c 2005-08-17 11:51:15.000000000 +0200
-+++ shadow-4.0.12/src/chage.c 2005-08-17 11:51:19.000000000 +0200
-@@ -541,6 +541,15 @@
- pwent = *pw;
- STRFCPY (name, pwent.pw_name);
-
-+ if (!spw_file_present()) {
-+ fprintf (stderr,
-+ _("%s: the shadow password file is not present\n"),
-+ Prog);
-+ SYSLOG ((LOG_ERR, "can't find the shadow password file"));
-+ closelog ();
-+ exit (E_SHADOW_NOTFOUND);
-+ }
-+
- /*
- * For shadow password files we have to lock the file and read in
- * the entries as was done for the password file. The user entries
-Index: shadow-4.0.12/lib/exitcodes.h
-===================================================================
---- shadow-4.0.12.orig/lib/exitcodes.h 2005-08-17 11:49:12.000000000 +0200
-+++ shadow-4.0.12/lib/exitcodes.h 2005-08-17 11:51:19.000000000 +0200
-@@ -7,3 +7,4 @@
- #define E_NOPERM 1 /* permission denied */
- #define E_USAGE 2 /* invalid command syntax */
- #define E_BAD_ARG 3 /* invalid argument to option */
-+#define E_SHADOW_NOTFOUND 15 /* no shadow password file */
-Index: shadow-4.0.12/man/chage.1.xml
-===================================================================
---- shadow-4.0.12.orig/man/chage.1.xml 2005-08-10 10:58:05.000000000 +0200
-+++ shadow-4.0.12/man/chage.1.xml 2005-08-30 19:55:45.000000000 +0200
-@@ -183,6 +183,31 @@
-
- </refsect1>
-
-+ <refsect1 id='exit_values'>
-+ <title>EXIT VALUES</title>
-+ <para>
-+ The <command>chage</command> command exits with the following values:
-+ <variablelist>
-+ <varlistentry>
-+ <term><replaceable>0</replaceable></term>
-+ <listitem>success</listitem>
-+ </varlistentry>
-+ <varlistentry>
-+ <term><replaceable>1</replaceable></term>
-+ <listitem>permission denied</listitem>
-+ </varlistentry>
-+ <varlistentry>
-+ <term><replaceable>2</replaceable></term>
-+ <listitem>invalid command syntax</listitem>
-+ </varlistentry>
-+ <varlistentry>
-+ <term><replaceable>15</replaceable></term>
-+ <listitem>can't find the shadow password file</listitem>
-+ </varlistentry>
-+ </variablelist>
-+ </para>
-+ </refsect1>
-+
- <refsect1 id='see_also'>
- <title>SEE ALSO</title>
- <para><citerefentry>
Deleted: trunk/debian/patches/446_newgrp.1_no_SHADOWPWD
===================================================================
--- trunk/debian/patches/446_newgrp.1_no_SHADOWPWD 2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/446_newgrp.1_no_SHADOWPWD 2005-12-01 19:09:08 UTC (rev 668)
@@ -1,23 +0,0 @@
-Goal: With 4.0.12, SHADOWPWD was removed (always enabled)
-
-Status wrt upstream:
-
-Index: shadow-4.0.12/man/newgrp.1
-===================================================================
---- shadow-4.0.12.orig/man/newgrp.1 2005-08-10 10:43:38.000000000 +0200
-+++ shadow-4.0.12/man/newgrp.1 2005-08-12 14:15:48.000000000 +0200
-@@ -47,10 +47,10 @@
- the group does, or if the user is not listed as a member and the group has
- a password. The user will be denied access if the group password is empty
- and the user is not listed as a member.
--If compiled with SHADOWPWD (respectively SHADOWGRP) defined, the password
--of the user (respectively, the password and the members of the group) will
--be overwritten by the value defined in \fI/etc/shadow\fR (respectively in
--\fI/etc/gshadow\fR) if an entry exists for this user (resp. group).
-+The password of the user (and respectively, if compiled with SHADOWGRP, the
-+password and the members of the group) will be overwritten by the value defined
-+in \fI/etc/shadow\fR (respectively in \fI/etc/gshadow\fR) if an entry exists
-+for this user (resp. group).
- .PP
- The \fBsg\fR command works similar to \fBnewgrp\fR but accepts a command.
- The command will be executed with the \fB/bin/sh\fR shell. With most shells you
More information about the Pkg-shadow-commits
mailing list