[Pkg-shadow-commits] r668 - trunk/debian/patches

Christian Perrier bubulle at costa.debian.org
Thu Dec 1 19:09:14 UTC 2005


Author: bubulle
Date: 2005-12-01 19:09:08 +0000 (Thu, 01 Dec 2005)
New Revision: 668

Removed:
   trunk/debian/patches/010_more-i18ned-messages
   trunk/debian/patches/336_chfn.1
   trunk/debian/patches/357_newgrp-stop_cont-proxy
   trunk/debian/patches/365_PAM_copy_environ_later
   trunk/debian/patches/403_sg_symlink_162339_163652.dpatch
   trunk/debian/patches/405_subsystem_remove_*_in_shell.dpatch
   trunk/debian/patches/440_manpages-login.1
   trunk/debian/patches/443_chage_exit_values
   trunk/debian/patches/446_newgrp.1_no_SHADOWPWD
Log:
Removed unused patches


Deleted: trunk/debian/patches/010_more-i18ned-messages
===================================================================
--- trunk/debian/patches/010_more-i18ned-messages	2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/010_more-i18ned-messages	2005-12-01 19:09:08 UTC (rev 668)
@@ -1,211 +0,0 @@
-Purpose: Internationalise a few more messages
-
-Fixes: #266281
-
-Status wrt upstream: submitted 20050613 (slightly differently as upstream 
-                                         differs on some files)
-
-Index: shadow-4.0.12/libmisc/obscure.c
-===================================================================
---- shadow-4.0.12.orig/libmisc/obscure.c	2005-08-17 11:49:14.000000000 +0200
-+++ shadow-4.0.12/libmisc/obscure.c	2005-08-17 11:51:09.000000000 +0200
-@@ -158,7 +158,7 @@
- #endif
- 
- 	if (strcmp (new, old) == 0)
--		return "no change";
-+		return _("no change");
- 
- 	newmono = str_lower (xstrdup (new));
- 	oldmono = str_lower (xstrdup (old));
-@@ -167,19 +167,19 @@
- 	strcat (wrapped, oldmono);
- 
- 	if (palindrome (oldmono, newmono))
--		msg = "a palindrome";
-+		msg = _("a palindrome");
- 
- 	if (!msg && strcmp (oldmono, newmono) == 0)
--		msg = "case changes only";
-+		msg = _("case changes only");
- 
- 	if (!msg && similar (oldmono, newmono))
--		msg = "too similar";
-+		msg = _("too similar");
- 
- 	if (!msg && simple (old, new))
--		msg = "too simple";
-+		msg = _("too simple");
- 
- 	if (!msg && strstr (wrapped, newmono))
--		msg = "rotated";
-+		msg = _("rotated");
- 
- #ifdef HAVE_LIBCRACK
- 	/*
-@@ -215,7 +215,7 @@
- 	newlen = strlen (new);
- 
- 	if (newlen < getdef_num ("PASS_MIN_LEN", 0))
--		return "too short";
-+		return _("too short");
- 
- 	/*
- 	 * Remaining checks are optional.
-Index: shadow-4.0.12/libmisc/utmp.c
-===================================================================
---- shadow-4.0.12.orig/libmisc/utmp.c	2005-08-17 11:49:14.000000000 +0200
-+++ shadow-4.0.12/libmisc/utmp.c	2005-08-17 11:51:09.000000000 +0200
-@@ -53,9 +53,9 @@
- extern void endutent ();
- 
- #define	NO_UTENT \
--	"No utmp entry.  You must exec \"login\" from the lowest level \"sh\""
-+	_("No utmp entry.  You must exec \"login\" from the lowest level \"sh\"")
- #define	NO_TTY \
--	"Unable to determine your tty name."
-+	_("Unable to determine your tty name.")
- 
- /*
-  * checkutmp - see if utmp file is correct for this process
-Index: shadow-4.0.12/src/login.c
-===================================================================
---- shadow-4.0.12.orig/src/login.c	2005-08-17 11:50:56.000000000 +0200
-+++ shadow-4.0.12/src/login.c	2005-08-17 11:51:09.000000000 +0200
-@@ -595,7 +595,7 @@
- 		retcode = pam_start ("login", username, &conv, &pamh);
- 		if (retcode != PAM_SUCCESS) {
- 			fprintf (stderr,
--				 "login: PAM Failure, aborting: %s\n",
-+				 _("login: PAM Failure, aborting: %s\n"),
- 				 pam_strerror (pamh, retcode));
- 			SYSLOG ((LOG_ERR, "Couldn't initialize PAM: %s",
- 				pam_strerror (pamh, retcode)));
-@@ -713,7 +713,7 @@
- 			  if (!failed)
- 			    break;
- 			  
--			  fprintf(stderr,"Login incorrect\n\n");
-+			  fprintf(stderr,_("Login incorrect\n\n"));
- 			  if (pwd && getdef_bool("FAILLOG_ENAB"))
- 			    failure (pwent.pw_uid, tty, &faillog);
- 			  if (getdef_str("FTMP_FILE") != NULL) {
-@@ -1018,7 +1018,7 @@
- 	child = fork ();
- 	if (child < 0) {
- 		/* error in fork() */
--		fprintf (stderr, "login: failure forking: %s",
-+		fprintf (stderr, _("login: failure forking: %s"),
- 			 strerror (errno));
- 		PAM_END;
- 		exit (0);
-Index: shadow-4.0.12/src/logoutd.c
-===================================================================
---- shadow-4.0.12.orig/src/logoutd.c	2005-08-17 11:49:14.000000000 +0200
-+++ shadow-4.0.12/src/logoutd.c	2005-08-17 11:51:09.000000000 +0200
-@@ -41,7 +41,7 @@
- static char *Prog;
- 
- #ifndef DEFAULT_HUP_MESG
--#define DEFAULT_HUP_MESG "login time exceeded\r\n"
-+#define DEFAULT_HUP_MESG _("login time exceeded\r\n")
- #endif
- 
- #ifndef HUP_MESG_FILE
-Index: shadow-4.0.12/src/newgrp.c
-===================================================================
---- shadow-4.0.12.orig/src/newgrp.c	2005-08-17 11:49:14.000000000 +0200
-+++ shadow-4.0.12/src/newgrp.c	2005-08-17 11:51:09.000000000 +0200
-@@ -467,7 +467,7 @@
- 		child = fork ();
- 		if (child < 0) {
- 			/* error in fork() */
--			fprintf (stderr, "%s: failure forking: %s",
-+			fprintf (stderr, _("%s: failure forking: %s"),
- 				 is_newgrp ? "newgrp" : "sg", strerror (errno));
- 			exit (1);
- 		} else if (child) {
-Index: shadow-4.0.12/src/su.c
-===================================================================
---- shadow-4.0.12.orig/src/su.c	2005-08-17 11:50:57.000000000 +0200
-+++ shadow-4.0.12/src/su.c	2005-08-17 11:51:09.000000000 +0200
-@@ -329,7 +329,7 @@
- 	if (ret != PAM_SUCCESS) {
- 		SYSLOG ((LOG_ERR, "pam_close_session: %s",
- 			 pam_strerror (pamh, ret)));
--		fprintf (stderr, "%s: %s\n", Prog, pam_strerror (pamh, ret));
-+		fprintf (stderr, _("%s: %s\n"), Prog, pam_strerror (pamh, ret));
- 		pam_end (pamh, ret);
- 		exit (1);
- 	}
-@@ -526,7 +526,7 @@
- 	if (ret != PAM_SUCCESS) {
- 		SYSLOG ((LOG_ERR, "pam_set_item: %s",
- 			 pam_strerror (pamh, ret)));
--		fprintf (stderr, "%s: %s\n", Prog, pam_strerror (pamh, ret));
-+		fprintf (stderr, _("%s: %s\n"), Prog, pam_strerror (pamh, ret));
- 		pam_end (pamh, ret);
- 		exit (1);
- 	}
-@@ -649,7 +649,7 @@
- 	if (ret != PAM_SUCCESS) {
- 		SYSLOG ((LOG_ERR, "pam_authenticate: %s",
- 			 pam_strerror (pamh, ret)));
--		fprintf (stderr, "%s: %s\n", Prog, pam_strerror (pamh, ret));
-+		fprintf (stderr, _("%s: %s\n"), Prog, pam_strerror (pamh, ret));
- 		pam_end (pamh, ret);
- 		su_failure (tty);
- 	}
-@@ -662,7 +662,7 @@
- 		} else {
- 			SYSLOG ((LOG_ERR, "pam_acct_mgmt: %s",
- 				 pam_strerror (pamh, ret)));
--			fprintf (stderr, "%s: %s\n", Prog,
-+			fprintf (stderr, _("%s: %s\n"), Prog,
- 				 pam_strerror (pamh, ret));
- 			pam_end (pamh, ret);
- 			su_failure (tty);
-@@ -798,7 +798,7 @@
- 	ret = pam_setcred (pamh, PAM_ESTABLISH_CRED);
- 	if (ret != PAM_SUCCESS) {
- 		SYSLOG ((LOG_ERR, "pam_setcred: %s", pam_strerror (pamh, ret)));
--		fprintf (stderr, "%s: %s\n", Prog, pam_strerror (pamh, ret));
-+		fprintf (stderr, _("%s: %s\n"), Prog, pam_strerror (pamh, ret));
- 		pam_end (pamh, ret);
- 		exit (1);
- 	}
-@@ -807,7 +807,7 @@
- 	if (ret != PAM_SUCCESS) {
- 		SYSLOG ((LOG_ERR, "pam_open_session: %s",
- 			 pam_strerror (pamh, ret)));
--		fprintf (stderr, "%s: %s\n", Prog, pam_strerror (pamh, ret));
-+		fprintf (stderr, _("%s: %s\n"), Prog, pam_strerror (pamh, ret));
- 		pam_setcred(pamh, PAM_DELETE_CRED);
- 		pam_end (pamh, ret);
- 		exit (1);
-Index: shadow-4.0.12/src/useradd.c
-===================================================================
---- shadow-4.0.12.orig/src/useradd.c	2005-08-17 11:51:02.000000000 +0200
-+++ shadow-4.0.12/src/useradd.c	2005-08-17 11:51:09.000000000 +0200
-@@ -790,7 +790,7 @@
- 		ngrp->gr_mem = add_list (ngrp->gr_mem, user_name);
- 		if (!gr_update (ngrp)) {
- 			fprintf (stderr,
--				 "%s: error adding new group entry\n", Prog);
-+				 _("%s: error adding new group entry\n"), Prog);
- 			fail_exit (E_GRP_UPDATE);
- 		}
- 		SYSLOG ((LOG_INFO, "add `%s' to group `%s'",
-Index: shadow-4.0.12/src/chage.c
-===================================================================
---- shadow-4.0.12.orig/src/chage.c	2005-08-17 11:51:02.000000000 +0200
-+++ shadow-4.0.12/src/chage.c	2005-08-17 11:51:09.000000000 +0200
-@@ -563,7 +563,7 @@
- 	}
- 
- 	if (lflg && (setgid (getgid ()) || setuid (ruid))) {
--		fprintf (stderr, "%s: failed to drop privileges (%s)\n",
-+		fprintf (stderr, _("%s: failed to drop privileges (%s)\n"),
- 			 Prog, strerror (errno));
- 		exit (E_NOPERM);
- 	}

Deleted: trunk/debian/patches/336_chfn.1
===================================================================
--- trunk/debian/patches/336_chfn.1	2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/336_chfn.1	2005-12-01 19:09:08 UTC (rev 668)
@@ -1,24 +0,0 @@
-Goal: do not advertize that the "other" field can contain control characters.
-
-Status wrt upstream: need to be checked.
-
-Note: 
-  * The reason why this sentence was commented is not clear.
-    We can keep the patch, without applying it.
-
-Index: shadow-4.0.10/man/chfn.1.xml
-===================================================================
---- shadow-4.0.10.orig/man/chfn.1.xml	2005-06-15 14:21:58.000000000 +0200
-+++ shadow-4.0.10/man/chfn.1.xml	2005-07-04 18:00:03.000000000 +0200
-@@ -42,9 +42,9 @@
-     
-     <para>The only restriction placed on the contents of the fields is that
-       no control characters may be present, nor any of comma, colon, or
--      equal sign. The <emphasis remap='I'>other</emphasis> field does not
-+      equal sign.<!-- The <emphasis remap='I'>other</emphasis> field does not
-       have this restriction, and is used to store accounting information
--      used by other applications.
-+      used by other applications.-->
-     </para>
-     
-     <para> If none of the options are selected, <command>chfn</command>

Deleted: trunk/debian/patches/357_newgrp-stop_cont-proxy
===================================================================
--- trunk/debian/patches/357_newgrp-stop_cont-proxy	2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/357_newgrp-stop_cont-proxy	2005-12-01 19:09:08 UTC (rev 668)
@@ -1,38 +0,0 @@
-Goal:	When newgrp process sits between parent and child shells, it should
-	propagate STOPs from child to parent and CONTs from parent to child,
-	otherwise e.g. bash's "suspend" command won't work.
-
-Status wrt upstream: Will be in 4.0.13
-
-Notes:
-	newgrp doesn't fork and create child process, it just calls exec(),
-	so there won't be "newgrp" process between parent and child shells.
-
-	Closes: 314727
-	(suspend command from su shell fails to return to parent shell)
-
-Index: shadow-4.0.12/src/newgrp.c
-===================================================================
---- shadow-4.0.12.orig/src/newgrp.c	2005-08-17 11:51:09.000000000 +0200
-+++ shadow-4.0.12/src/newgrp.c	2005-08-17 11:51:13.000000000 +0200
-@@ -472,9 +472,18 @@
- 			exit (1);
- 		} else if (child) {
- 			/* parent - wait for child to finish, then log session close */
-+			int cst = 0;
- 			do {
--				pid = waitpid (child, NULL, 0);
--			} while (pid != child);
-+				errno = 0;
-+				pid = waitpid (child, &cst, WUNTRACED);
-+				if (pid == child && WIFSTOPPED(cst)) {
-+					/* stop when child stops */
-+					raise(SIGSTOP);
-+					/* wake child when resumed */
-+					kill(child, SIGCONT);
-+				}
-+			} while (pid == child && WIFSTOPPED(cst) ||
-+					pid != child && errno == EINTR);
- 			SYSLOG ((LOG_INFO,
- 				 "user `%s' (login `%s' on %s) returned to group `%s'",
- 				 name, loginname, tty,

Deleted: trunk/debian/patches/365_PAM_copy_environ_later
===================================================================
--- trunk/debian/patches/365_PAM_copy_environ_later	2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/365_PAM_copy_environ_later	2005-12-01 19:09:08 UTC (rev 668)
@@ -1,22 +0,0 @@
-Goal: When PAM is used, the environment must be copied later.
-      This was present in 4.0.11
-
-Status wrt upstream: will be in 4.0.13
-      
-Index: shadow-4.0.12/src/su.c
-===================================================================
---- shadow-4.0.12.orig/src/su.c	2005-08-11 21:15:07.000000000 +0200
-+++ shadow-4.0.12/src/su.c	2005-08-11 21:30:06.000000000 +0200
-@@ -781,9 +781,12 @@
- 		addenv ("PATH", cp);
- 	}
- 
-+#ifndef USE_PAM
-+/* setup the environment for pam later on, else we run into auth problems */
- 	if (change_environment || restricted_shell(pwent.pw_shell)) {
- 		environ = newenvp;	/* make new environment active */
- 	}
-+#endif				/* !USE_APM */
- 
- 	if (getenv ("IFS"))	/* don't export user IFS ... */
- 		addenv ("IFS= \t\n", NULL);	/* ... instead, set a safe IFS */

Deleted: trunk/debian/patches/403_sg_symlink_162339_163652.dpatch
===================================================================
--- trunk/debian/patches/403_sg_symlink_162339_163652.dpatch	2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/403_sg_symlink_162339_163652.dpatch	2005-12-01 19:09:08 UTC (rev 668)
@@ -1,26 +0,0 @@
-#! /bin/sh /usr/share/dpatch/dpatch-run
-## 403_sg_symlink_162339_163652.dpatch by Nicolas FRANCOIS <nicolas.francois at centraliens.net>
-##
-## All lines beginning with `## DP:' are a description of the patch.
-## DP: This patch was probably a part of the fix for #162339 and #163652.
-## DP: It was needed because newgrp was installed in /bin, but the sg
-## DP: symlink pointed to /usr/bin/newgrp.
-## DP:
-## DP: The symlink is now done in debian/rules, and sg and newgrp are
-## DP: installed in /usr/bin.
-## DP: This patch can probably be removed now.
-## DP: (We just have to test if sg is linked to newgrp)
-
- at DPATCH@
-Index: shadow-4.0.13/src/Makefile.am
-===================================================================
---- shadow-4.0.13.orig/src/Makefile.am	2005-10-04 08:07:29.006420748 +0200
-+++ shadow-4.0.13/src/Makefile.am	2005-10-04 08:07:29.804258184 +0200
-@@ -78,7 +78,6 @@
- 
- install-am: all-am
- 	$(MAKE) $(AM_MAKEFLAGS) install-exec-am install-data-am
--	ln -sf newgrp	$(DESTDIR)$(ubindir)/sg
- 	ln -sf vipw	$(DESTDIR)$(usbindir)/vigr
- 	for i in $(suidbins); do \
- 		chmod -f 4755 $(DESTDIR)$(bindir)/$$i; \

Deleted: trunk/debian/patches/405_subsystem_remove_*_in_shell.dpatch
===================================================================
--- trunk/debian/patches/405_subsystem_remove_*_in_shell.dpatch	2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/405_subsystem_remove_*_in_shell.dpatch	2005-12-01 19:09:08 UTC (rev 668)
@@ -1,46 +0,0 @@
-#! /bin/sh /usr/share/dpatch/dpatch-run
-## 405_subsystem_remove_*_in_shell.dpatch by Nicolas FRANCOIS <nicolas.francois at centraliens.net>
-##
-## All lines beginning with `## DP:' are a description of the patch.
-## DP: Remove the * at the beginning of the shell for subsystem logins.
-## DP: It fixed #82893
-## DP:
-## DP: This was fixed upstream by removing the * before calling subsystem.
-## DP: Thus, it is no more needed (but does not harm).
-
- at DPATCH@
-Index: shadow-4.0.13/lib/prototypes.h
-===================================================================
---- shadow-4.0.13.orig/lib/prototypes.h	2005-10-04 08:06:31.175204282 +0200
-+++ shadow-4.0.13/lib/prototypes.h	2005-10-04 08:07:31.522908001 +0200
-@@ -169,7 +169,7 @@
- extern void sulog (const char *, int, const char *, const char *);
- 
- /* sub.c */
--extern void subsystem (const struct passwd *);
-+extern void subsystem (struct passwd *);
- 
- /* ttytype.c */
- extern void ttytype (const char *);
-Index: shadow-4.0.13/libmisc/sub.c
-===================================================================
---- shadow-4.0.13.orig/libmisc/sub.c	2005-10-04 08:06:31.175204282 +0200
-+++ shadow-4.0.13/libmisc/sub.c	2005-10-04 08:07:31.522908001 +0200
-@@ -46,7 +46,7 @@
-  *	directory will be used as the root of a new filesystem which
-  *	the user is actually logged into.
-  */
--void subsystem (const struct passwd *pw)
-+void subsystem (struct passwd *pw)
- {
- 	/*
- 	 * The new root directory must begin with a "/" character.
-@@ -71,4 +71,8 @@
- 		closelog ();
- 		exit (1);
- 	}
-+
-+	/* Now fixup the shell to get rid of that '*' */
-+	if (*pw->pw_shell == '*')
-+		pw->pw_shell++;
- }

Deleted: trunk/debian/patches/440_manpages-login.1
===================================================================
--- trunk/debian/patches/440_manpages-login.1	2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/440_manpages-login.1	2005-12-01 19:09:08 UTC (rev 668)
@@ -1,31 +0,0 @@
-Goal: Better explain the respective roles of login, init and getty with regards
-      to the utmp file
-
-Status wrt upstream: Fixed in 4.0.14
-
-Note:
-    * Is it still the case if the pam session is closed?
-
-Index: shadow-4.0.13/man/login.1.xml
-===================================================================
---- shadow-4.0.13.orig/man/login.1.xml	2005-10-04 08:06:34.433540365 +0200
-+++ shadow-4.0.13/man/login.1.xml	2005-10-04 08:07:13.018678338 +0200
-@@ -172,6 +172,18 @@
-     <para>The location of files is subject to differences in system
-       configuration.
-     </para>
-+
-+    <para>The <command>login</command> program is NOT responsible for removing
-+      users from the utmp file. It is the responsibility of <citerefentry>
-+      <refentrytitle>getty</refentrytitle><manvolnum>8</manvolnum>
-+      </citerefentry> and <citerefentry>
-+      <refentrytitle>init</refentrytitle><manvolnum>8</manvolnum>
-+      </citerefentry> to clean up apparent ownership of a terminal session.
-+      If you use <command>login</command>
-+      from the shell prompt without <command>exec</command>, the user you use
-+      will continue to appear to be logged in even after you log out of the
-+      "subsession".
-+    </para>
-   </refsect1>
- 
-   <refsect1 id='files'>

Deleted: trunk/debian/patches/443_chage_exit_values
===================================================================
--- trunk/debian/patches/443_chage_exit_values	2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/443_chage_exit_values	2005-12-01 19:09:08 UTC (rev 668)
@@ -1,72 +0,0 @@
-Goal: differentiate the different failure causes by the exit value
-      This will permit to adduser to detect if chage failed because the
-      system doesn't have shadowed passwords.
-Fixes: #317012
-
-Status wrt upstream: will be in 4.0.13
-
-Index: shadow-4.0.12/src/chage.c
-===================================================================
---- shadow-4.0.12.orig/src/chage.c	2005-08-17 11:51:15.000000000 +0200
-+++ shadow-4.0.12/src/chage.c	2005-08-17 11:51:19.000000000 +0200
-@@ -541,6 +541,15 @@
- 	pwent = *pw;
- 	STRFCPY (name, pwent.pw_name);
- 
-+	if (!spw_file_present()) {
-+		fprintf (stderr,
-+		         _("%s: the shadow password file is not present\n"),
-+		         Prog);
-+		SYSLOG ((LOG_ERR, "can't find the shadow password file"));
-+		closelog ();
-+		exit (E_SHADOW_NOTFOUND);
-+	}
-+
- 	/*
- 	 * For shadow password files we have to lock the file and read in
- 	 * the entries as was done for the password file. The user entries
-Index: shadow-4.0.12/lib/exitcodes.h
-===================================================================
---- shadow-4.0.12.orig/lib/exitcodes.h	2005-08-17 11:49:12.000000000 +0200
-+++ shadow-4.0.12/lib/exitcodes.h	2005-08-17 11:51:19.000000000 +0200
-@@ -7,3 +7,4 @@
- #define E_NOPERM        1	/* permission denied */
- #define E_USAGE         2	/* invalid command syntax */
- #define E_BAD_ARG       3	/* invalid argument to option */
-+#define E_SHADOW_NOTFOUND 15	/* no shadow password file */
-Index: shadow-4.0.12/man/chage.1.xml
-===================================================================
---- shadow-4.0.12.orig/man/chage.1.xml	2005-08-10 10:58:05.000000000 +0200
-+++ shadow-4.0.12/man/chage.1.xml	2005-08-30 19:55:45.000000000 +0200
-@@ -183,6 +183,31 @@
-     
-   </refsect1>
-   
-+  <refsect1 id='exit_values'>
-+    <title>EXIT VALUES</title>
-+    <para>
-+      The <command>chage</command> command exits with the following values:
-+      <variablelist>
-+	<varlistentry>
-+	  <term><replaceable>0</replaceable></term>
-+	  <listitem>success</listitem>
-+	</varlistentry>
-+	<varlistentry>
-+	  <term><replaceable>1</replaceable></term>
-+	  <listitem>permission denied</listitem>
-+	</varlistentry>
-+	<varlistentry>
-+	  <term><replaceable>2</replaceable></term>
-+	  <listitem>invalid command syntax</listitem>
-+	</varlistentry>
-+	<varlistentry>
-+	  <term><replaceable>15</replaceable></term>
-+	  <listitem>can't find the shadow password file</listitem>
-+	</varlistentry>
-+      </variablelist>
-+    </para>
-+  </refsect1>
-+
-   <refsect1 id='see_also'>
-     <title>SEE ALSO</title>
-     <para><citerefentry>

Deleted: trunk/debian/patches/446_newgrp.1_no_SHADOWPWD
===================================================================
--- trunk/debian/patches/446_newgrp.1_no_SHADOWPWD	2005-11-30 22:55:05 UTC (rev 667)
+++ trunk/debian/patches/446_newgrp.1_no_SHADOWPWD	2005-12-01 19:09:08 UTC (rev 668)
@@ -1,23 +0,0 @@
-Goal: With 4.0.12, SHADOWPWD was removed (always enabled)
-
-Status wrt upstream:
-
-Index: shadow-4.0.12/man/newgrp.1
-===================================================================
---- shadow-4.0.12.orig/man/newgrp.1	2005-08-10 10:43:38.000000000 +0200
-+++ shadow-4.0.12/man/newgrp.1	2005-08-12 14:15:48.000000000 +0200
-@@ -47,10 +47,10 @@
- the group does, or if the user is not listed as a member and the group has
- a password. The user will be denied access if the group password is empty
- and the user is not listed as a member.
--If compiled with SHADOWPWD (respectively SHADOWGRP) defined, the password
--of the user (respectively, the password and the members of the group) will
--be overwritten by the value defined in \fI/etc/shadow\fR (respectively in
--\fI/etc/gshadow\fR) if an entry exists for this user (resp. group).
-+The password of the user (and respectively, if compiled with SHADOWGRP, the
-+password and the members of the group) will be overwritten by the value defined
-+in \fI/etc/shadow\fR (respectively in \fI/etc/gshadow\fR) if an entry exists
-+for this user (resp. group).
- .PP
- The \fBsg\fR command works similar to \fBnewgrp\fR but accepts a command.
- The command will be executed with the \fB/bin/sh\fR shell. With most shells you




More information about the Pkg-shadow-commits mailing list