[Pkg-shadow-commits] r2904 - in debian/trunk/tests/newusers: . 37_create_user_encrypt_MD5-PAM 37_create_user_encrypt_MD5-PAM/config/etc 37_create_user_encrypt_MD5-PAM/config/etc/pam.d 41_create_user_encrypt_SHA256-PAM 41_create_user_encrypt_SHA256-PAM/config/etc 41_create_user_encrypt_SHA256-PAM/config/etc/pam.d 42_create_user_encrypt_SHA512-PAM 42_create_user_encrypt_SHA512-PAM/config/etc 42_create_user_encrypt_SHA512-PAM/config/etc/pam.d 43_create_user_encrypt_SHA256_rounds_3000-PAM 43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc 43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d 44_create_user_encrypt_SHA256_rounds_300-PAM 44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc 44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d 49_multiple_system_users/config/etc 49_multiple_system_users/config/etc/pam.d 49_multiple_system_users/data
Nicolas FRANÇOIS
nekral-guest at alioth.debian.org
Sun May 10 19:27:29 UTC 2009
Author: nekral-guest
Date: 2009-05-10 19:27:29 +0000 (Sun, 10 May 2009)
New Revision: 2904
Added:
debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/
debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/
debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/common-password
debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/newusers
debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/
debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/
debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/common-password
debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/newusers
debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/
debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/
debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/common-password
debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/newusers
debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/
debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/
debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/common-password
debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/newusers
debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/
debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/
debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/common-password
debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/newusers
debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/
debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/common-password
debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/newusers
Modified:
debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/newusers.test
debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/newusers.test
debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/newusers.test
debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/newusers.test
debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/newusers.test
debian/trunk/tests/newusers/49_multiple_system_users/data/group
debian/trunk/tests/newusers/49_multiple_system_users/data/passwd
Log:
Added newusers tests specific to the PAM version, to replace the one which use the non-PAM specific options.
Added: debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/common-password
===================================================================
--- debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/common-password (rev 0)
+++ debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/common-password 2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,33 @@
+#
+# /etc/pam.d/common-password - password-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define the services to be
+# used to change user passwords. The default is pam_unix.
+
+# Explanation of pam_unix options:
+#
+# The "md5" option enables MD5 passwords. Without this option, the
+# default is Unix crypt.
+#
+# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
+# login.defs.
+#
+# See the pam_unix manpage for other options.
+
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules. See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+password [success=1 default=ignore] pam_unix.so obscure md5
+# here's the fallback if no module succeeds
+password requisite pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+password required pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config
Added: debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/newusers
===================================================================
--- debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/newusers (rev 0)
+++ debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/newusers 2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,6 @@
+#
+# The PAM configuration file for the Shadow `chpasswd' service
+#
+
+ at include common-password
+
Modified: debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/newusers.test
===================================================================
--- debian/trunk/tests/newusers/37_create_user_encrypt_MD5/newusers.test 2009-04-30 21:53:54 UTC (rev 2853)
+++ debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/newusers.test 2009-05-10 19:27:29 UTC (rev 2904)
@@ -16,7 +16,7 @@
change_config
-newusers -c MD5 data/newusers.list
+newusers data/newusers.list
echo -n "Check the passwd file..."
../../common/compare_file.pl data/passwd /etc/passwd
Added: debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/common-password
===================================================================
--- debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/common-password (rev 0)
+++ debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/common-password 2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,33 @@
+#
+# /etc/pam.d/common-password - password-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define the services to be
+# used to change user passwords. The default is pam_unix.
+
+# Explanation of pam_unix options:
+#
+# The "md5" option enables MD5 passwords. Without this option, the
+# default is Unix crypt.
+#
+# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
+# login.defs.
+#
+# See the pam_unix manpage for other options.
+
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules. See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+password [success=1 default=ignore] pam_unix.so obscure sha256
+# here's the fallback if no module succeeds
+password requisite pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+password required pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config
Added: debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/newusers
===================================================================
--- debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/newusers (rev 0)
+++ debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/newusers 2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,6 @@
+#
+# The PAM configuration file for the Shadow `chpasswd' service
+#
+
+ at include common-password
+
Modified: debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/newusers.test
===================================================================
--- debian/trunk/tests/newusers/41_create_user_encrypt_SHA256/newusers.test 2009-04-30 21:53:54 UTC (rev 2853)
+++ debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/newusers.test 2009-05-10 19:27:29 UTC (rev 2904)
@@ -16,7 +16,7 @@
change_config
-newusers -c SHA256 data/newusers.list
+newusers data/newusers.list
echo -n "Check the passwd file..."
../../common/compare_file.pl data/passwd /etc/passwd
Added: debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/common-password
===================================================================
--- debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/common-password (rev 0)
+++ debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/common-password 2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,33 @@
+#
+# /etc/pam.d/common-password - password-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define the services to be
+# used to change user passwords. The default is pam_unix.
+
+# Explanation of pam_unix options:
+#
+# The "md5" option enables MD5 passwords. Without this option, the
+# default is Unix crypt.
+#
+# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
+# login.defs.
+#
+# See the pam_unix manpage for other options.
+
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules. See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+password [success=1 default=ignore] pam_unix.so obscure sha512
+# here's the fallback if no module succeeds
+password requisite pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+password required pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config
Added: debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/newusers
===================================================================
--- debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/newusers (rev 0)
+++ debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/newusers 2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,6 @@
+#
+# The PAM configuration file for the Shadow `chpasswd' service
+#
+
+ at include common-password
+
Modified: debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/newusers.test
===================================================================
--- debian/trunk/tests/newusers/42_create_user_encrypt_SHA512/newusers.test 2009-04-30 21:53:54 UTC (rev 2853)
+++ debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/newusers.test 2009-05-10 19:27:29 UTC (rev 2904)
@@ -16,7 +16,7 @@
change_config
-newusers -c SHA512 data/newusers.list
+newusers data/newusers.list
echo -n "Check the passwd file..."
../../common/compare_file.pl data/passwd /etc/passwd
Added: debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/common-password
===================================================================
--- debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/common-password (rev 0)
+++ debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/common-password 2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,33 @@
+#
+# /etc/pam.d/common-password - password-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define the services to be
+# used to change user passwords. The default is pam_unix.
+
+# Explanation of pam_unix options:
+#
+# The "md5" option enables MD5 passwords. Without this option, the
+# default is Unix crypt.
+#
+# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
+# login.defs.
+#
+# See the pam_unix manpage for other options.
+
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules. See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+password [success=1 default=ignore] pam_unix.so obscure sha256 rounds=3000
+# here's the fallback if no module succeeds
+password requisite pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+password required pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config
Added: debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/newusers
===================================================================
--- debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/newusers (rev 0)
+++ debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/newusers 2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,6 @@
+#
+# The PAM configuration file for the Shadow `chpasswd' service
+#
+
+ at include common-password
+
Modified: debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/newusers.test
===================================================================
--- debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000/newusers.test 2009-04-30 21:53:54 UTC (rev 2853)
+++ debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/newusers.test 2009-05-10 19:27:29 UTC (rev 2904)
@@ -17,7 +17,7 @@
change_config
echo "newusers -c SHA256 -s 3000 data/newusers.list"
-newusers -c SHA256 -s 3000 data/newusers.list
+newusers data/newusers.list
echo -n "Check the passwd file..."
../../common/compare_file.pl data/passwd /etc/passwd
Added: debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/common-password
===================================================================
--- debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/common-password (rev 0)
+++ debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/common-password 2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,33 @@
+#
+# /etc/pam.d/common-password - password-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define the services to be
+# used to change user passwords. The default is pam_unix.
+
+# Explanation of pam_unix options:
+#
+# The "md5" option enables MD5 passwords. Without this option, the
+# default is Unix crypt.
+#
+# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
+# login.defs.
+#
+# See the pam_unix manpage for other options.
+
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules. See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+password [success=1 default=ignore] pam_unix.so obscure sha256 rounds=300
+# here's the fallback if no module succeeds
+password requisite pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+password required pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config
Added: debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/newusers
===================================================================
--- debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/newusers (rev 0)
+++ debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/newusers 2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,6 @@
+#
+# The PAM configuration file for the Shadow `chpasswd' service
+#
+
+ at include common-password
+
Modified: debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/newusers.test
===================================================================
--- debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300/newusers.test 2009-04-30 21:53:54 UTC (rev 2853)
+++ debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/newusers.test 2009-05-10 19:27:29 UTC (rev 2904)
@@ -16,8 +16,8 @@
change_config
-echo "newusers -c SHA256 -s 300 data/newusers.list"
-newusers -c SHA256 -s 300 data/newusers.list
+echo "newusers data/newusers.list"
+newusers data/newusers.list
echo -n "Check the passwd file..."
../../common/compare_file.pl data/passwd /etc/passwd
@@ -31,7 +31,7 @@
echo -n "Check the number of rounds..."
rounds=$(sed -n 's/^foo:\$5\$rounds=\([0-9]*\)\$.*$/\1/p' /etc/shadow)
echo -n "($rounds)..."
-if [ ! "$rounds" = 1000 ]; then
+if [ ! "$rounds" = 1000 ] && [ ! "$rounds" = "" ]; then
echo "Wrong number of rounds"
grep "^foo:" /etc/shadow
exit 1
Added: debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/common-password
===================================================================
--- debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/common-password (rev 0)
+++ debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/common-password 2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,33 @@
+#
+# /etc/pam.d/common-password - password-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define the services to be
+# used to change user passwords. The default is pam_unix.
+
+# Explanation of pam_unix options:
+#
+# The "md5" option enables MD5 passwords. Without this option, the
+# default is Unix crypt.
+#
+# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
+# login.defs.
+#
+# See the pam_unix manpage for other options.
+
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules. See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+password [success=1 default=ignore] pam_unix.so obscure
+# here's the fallback if no module succeeds
+password requisite pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+password required pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config
Added: debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/newusers
===================================================================
--- debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/newusers (rev 0)
+++ debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/newusers 2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,6 @@
+#
+# The PAM configuration file for the Shadow `chpasswd' service
+#
+
+ at include common-password
+
Modified: debian/trunk/tests/newusers/49_multiple_system_users/data/group
===================================================================
--- debian/trunk/tests/newusers/49_multiple_system_users/data/group 2009-05-10 19:18:25 UTC (rev 2903)
+++ debian/trunk/tests/newusers/49_multiple_system_users/data/group 2009-05-10 19:27:29 UTC (rev 2904)
@@ -41,19 +41,19 @@
Debian-exim:x:102:
foo:x:65535:foo
fooo:x:997:
-foo1:x:99:
-foo1a:x:98:
+foo1:x:999:
+foo1a:x:998:
foo2:x:2000:
-foo3:x:97:
-foo4:x:96:
+foo3:x:996:
+foo4:x:995:
foo5:x:3005:
-foo6:x:95:
+foo6:x:994:
foo7:x:61000:
-foo8:x:94:
-foo9:x:93:
-foo10:x:92:
+foo8:x:993:
+foo9:x:992:
+foo10:x:991:
foo11:x:63000:
-foo12:x:91:
-foo13:x:90:
-foo14:x:89:
-foo15:x:88:
+foo12:x:990:
+foo13:x:989:
+foo14:x:988:
+foo15:x:987:
Modified: debian/trunk/tests/newusers/49_multiple_system_users/data/passwd
===================================================================
--- debian/trunk/tests/newusers/49_multiple_system_users/data/passwd 2009-05-10 19:18:25 UTC (rev 2903)
+++ debian/trunk/tests/newusers/49_multiple_system_users/data/passwd 2009-05-10 19:27:29 UTC (rev 2904)
@@ -19,20 +19,20 @@
Debian-exim:x:102:102::/var/spool/exim4:/bin/false
foo:x:65535:65535:User Foo - Gecos Field::/bin/sh
fooo:x:997:997:User Foo - Gecos Field::/bin/sh
-foo1:x:999:99:User Foo - Gecos Field::/bin/sh
-foo1a:x:999:98:User Foo - Gecos Field::/bin/sh
-foo1b:x:998:98:User Foo - Gecos Field::/bin/sh
+foo1:x:999:999:User Foo - Gecos Field::/bin/sh
+foo1a:x:999:998:User Foo - Gecos Field::/bin/sh
+foo1b:x:998:998:User Foo - Gecos Field::/bin/sh
foo2:x:2000:2000:User Foo - Gecos Field::/bin/sh
-foo3:x:996:97:User Foo - Gecos Field::/bin/sh
-foo4:x:3000:96:User Foo - Gecos Field::/bin/sh
+foo3:x:996:996:User Foo - Gecos Field::/bin/sh
+foo4:x:3000:995:User Foo - Gecos Field::/bin/sh
foo5:x:995:3005:User Foo - Gecos Field::/bin/sh
-foo6:x:994:95:User Foo - Gecos Field::/bin/sh
+foo6:x:994:994:User Foo - Gecos Field::/bin/sh
foo7:x:61000:61000:User Foo - Gecos Field::/bin/sh
-foo8:x:993:94:User Foo - Gecos Field::/bin/sh
-foo9:x:62000:93:User Foo - Gecos Field::/bin/sh
-foo10:x:992:92:User Foo - Gecos Field::/bin/sh
+foo8:x:993:993:User Foo - Gecos Field::/bin/sh
+foo9:x:62000:992:User Foo - Gecos Field::/bin/sh
+foo10:x:992:991:User Foo - Gecos Field::/bin/sh
foo11:x:991:63000:User Foo - Gecos Field::/bin/sh
-foo12:x:990:91:User Foo - Gecos Field::/bin/sh
-foo13:x:989:90:User Foo - Gecos Field::/bin/sh
-foo14:x:59000:89:User Foo - Gecos Field::/bin/sh
-foo15:x:988:88:User Foo - Gecos Field::/bin/sh
+foo12:x:990:990:User Foo - Gecos Field::/bin/sh
+foo13:x:989:989:User Foo - Gecos Field::/bin/sh
+foo14:x:59000:988:User Foo - Gecos Field::/bin/sh
+foo15:x:988:987:User Foo - Gecos Field::/bin/sh
More information about the Pkg-shadow-commits
mailing list