[Pkg-shadow-commits] r2904 - in debian/trunk/tests/newusers: . 37_create_user_encrypt_MD5-PAM 37_create_user_encrypt_MD5-PAM/config/etc 37_create_user_encrypt_MD5-PAM/config/etc/pam.d 41_create_user_encrypt_SHA256-PAM 41_create_user_encrypt_SHA256-PAM/config/etc 41_create_user_encrypt_SHA256-PAM/config/etc/pam.d 42_create_user_encrypt_SHA512-PAM 42_create_user_encrypt_SHA512-PAM/config/etc 42_create_user_encrypt_SHA512-PAM/config/etc/pam.d 43_create_user_encrypt_SHA256_rounds_3000-PAM 43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc 43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d 44_create_user_encrypt_SHA256_rounds_300-PAM 44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc 44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d 49_multiple_system_users/config/etc 49_multiple_system_users/config/etc/pam.d 49_multiple_system_users/data

Nicolas FRANÇOIS nekral-guest at alioth.debian.org
Sun May 10 19:27:29 UTC 2009


Author: nekral-guest
Date: 2009-05-10 19:27:29 +0000 (Sun, 10 May 2009)
New Revision: 2904

Added:
   debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/
   debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/
   debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/common-password
   debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/newusers
   debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/
   debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/
   debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/common-password
   debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/newusers
   debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/
   debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/
   debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/common-password
   debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/newusers
   debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/
   debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/
   debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/common-password
   debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/newusers
   debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/
   debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/
   debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/common-password
   debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/newusers
   debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/
   debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/common-password
   debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/newusers
Modified:
   debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/newusers.test
   debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/newusers.test
   debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/newusers.test
   debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/newusers.test
   debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/newusers.test
   debian/trunk/tests/newusers/49_multiple_system_users/data/group
   debian/trunk/tests/newusers/49_multiple_system_users/data/passwd
Log:
Added newusers tests specific to the PAM version, to replace the one which use the non-PAM specific options.


Added: debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/common-password
===================================================================
--- debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/common-password	                        (rev 0)
+++ debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/common-password	2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,33 @@
+#
+# /etc/pam.d/common-password - password-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define the services to be
+# used to change user passwords.  The default is pam_unix.
+
+# Explanation of pam_unix options:
+#
+# The "md5" option enables MD5 passwords.  Without this option, the
+# default is Unix crypt.
+#
+# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
+# login.defs.
+#
+# See the pam_unix manpage for other options.
+
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules.  See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+password	[success=1 default=ignore]	pam_unix.so obscure md5
+# here's the fallback if no module succeeds
+password	requisite			pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+password	required			pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config

Added: debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/newusers
===================================================================
--- debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/newusers	                        (rev 0)
+++ debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/config/etc/pam.d/newusers	2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,6 @@
+#
+# The PAM configuration file for the Shadow `chpasswd' service
+#
+
+ at include common-password
+

Modified: debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/newusers.test
===================================================================
--- debian/trunk/tests/newusers/37_create_user_encrypt_MD5/newusers.test	2009-04-30 21:53:54 UTC (rev 2853)
+++ debian/trunk/tests/newusers/37_create_user_encrypt_MD5-PAM/newusers.test	2009-05-10 19:27:29 UTC (rev 2904)
@@ -16,7 +16,7 @@
 
 change_config
 
-newusers -c MD5 data/newusers.list
+newusers data/newusers.list
 
 echo -n "Check the passwd file..." 
 ../../common/compare_file.pl data/passwd /etc/passwd 

Added: debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/common-password
===================================================================
--- debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/common-password	                        (rev 0)
+++ debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/common-password	2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,33 @@
+#
+# /etc/pam.d/common-password - password-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define the services to be
+# used to change user passwords.  The default is pam_unix.
+
+# Explanation of pam_unix options:
+#
+# The "md5" option enables MD5 passwords.  Without this option, the
+# default is Unix crypt.
+#
+# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
+# login.defs.
+#
+# See the pam_unix manpage for other options.
+
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules.  See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+password	[success=1 default=ignore]	pam_unix.so obscure sha256
+# here's the fallback if no module succeeds
+password	requisite			pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+password	required			pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config

Added: debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/newusers
===================================================================
--- debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/newusers	                        (rev 0)
+++ debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/config/etc/pam.d/newusers	2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,6 @@
+#
+# The PAM configuration file for the Shadow `chpasswd' service
+#
+
+ at include common-password
+

Modified: debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/newusers.test
===================================================================
--- debian/trunk/tests/newusers/41_create_user_encrypt_SHA256/newusers.test	2009-04-30 21:53:54 UTC (rev 2853)
+++ debian/trunk/tests/newusers/41_create_user_encrypt_SHA256-PAM/newusers.test	2009-05-10 19:27:29 UTC (rev 2904)
@@ -16,7 +16,7 @@
 
 change_config
 
-newusers -c SHA256 data/newusers.list
+newusers data/newusers.list
 
 echo -n "Check the passwd file..." 
 ../../common/compare_file.pl data/passwd /etc/passwd 

Added: debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/common-password
===================================================================
--- debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/common-password	                        (rev 0)
+++ debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/common-password	2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,33 @@
+#
+# /etc/pam.d/common-password - password-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define the services to be
+# used to change user passwords.  The default is pam_unix.
+
+# Explanation of pam_unix options:
+#
+# The "md5" option enables MD5 passwords.  Without this option, the
+# default is Unix crypt.
+#
+# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
+# login.defs.
+#
+# See the pam_unix manpage for other options.
+
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules.  See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+password	[success=1 default=ignore]	pam_unix.so obscure sha512
+# here's the fallback if no module succeeds
+password	requisite			pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+password	required			pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config

Added: debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/newusers
===================================================================
--- debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/newusers	                        (rev 0)
+++ debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/config/etc/pam.d/newusers	2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,6 @@
+#
+# The PAM configuration file for the Shadow `chpasswd' service
+#
+
+ at include common-password
+

Modified: debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/newusers.test
===================================================================
--- debian/trunk/tests/newusers/42_create_user_encrypt_SHA512/newusers.test	2009-04-30 21:53:54 UTC (rev 2853)
+++ debian/trunk/tests/newusers/42_create_user_encrypt_SHA512-PAM/newusers.test	2009-05-10 19:27:29 UTC (rev 2904)
@@ -16,7 +16,7 @@
 
 change_config
 
-newusers -c SHA512 data/newusers.list
+newusers data/newusers.list
 
 echo -n "Check the passwd file..." 
 ../../common/compare_file.pl data/passwd /etc/passwd 

Added: debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/common-password
===================================================================
--- debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/common-password	                        (rev 0)
+++ debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/common-password	2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,33 @@
+#
+# /etc/pam.d/common-password - password-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define the services to be
+# used to change user passwords.  The default is pam_unix.
+
+# Explanation of pam_unix options:
+#
+# The "md5" option enables MD5 passwords.  Without this option, the
+# default is Unix crypt.
+#
+# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
+# login.defs.
+#
+# See the pam_unix manpage for other options.
+
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules.  See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+password	[success=1 default=ignore]	pam_unix.so obscure sha256 rounds=3000
+# here's the fallback if no module succeeds
+password	requisite			pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+password	required			pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config

Added: debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/newusers
===================================================================
--- debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/newusers	                        (rev 0)
+++ debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/config/etc/pam.d/newusers	2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,6 @@
+#
+# The PAM configuration file for the Shadow `chpasswd' service
+#
+
+ at include common-password
+

Modified: debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/newusers.test
===================================================================
--- debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000/newusers.test	2009-04-30 21:53:54 UTC (rev 2853)
+++ debian/trunk/tests/newusers/43_create_user_encrypt_SHA256_rounds_3000-PAM/newusers.test	2009-05-10 19:27:29 UTC (rev 2904)
@@ -17,7 +17,7 @@
 change_config
 
 echo "newusers -c SHA256 -s 3000 data/newusers.list"
-newusers -c SHA256 -s 3000 data/newusers.list
+newusers data/newusers.list
 
 echo -n "Check the passwd file..." 
 ../../common/compare_file.pl data/passwd /etc/passwd 

Added: debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/common-password
===================================================================
--- debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/common-password	                        (rev 0)
+++ debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/common-password	2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,33 @@
+#
+# /etc/pam.d/common-password - password-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define the services to be
+# used to change user passwords.  The default is pam_unix.
+
+# Explanation of pam_unix options:
+#
+# The "md5" option enables MD5 passwords.  Without this option, the
+# default is Unix crypt.
+#
+# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
+# login.defs.
+#
+# See the pam_unix manpage for other options.
+
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules.  See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+password	[success=1 default=ignore]	pam_unix.so obscure sha256 rounds=300
+# here's the fallback if no module succeeds
+password	requisite			pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+password	required			pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config

Added: debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/newusers
===================================================================
--- debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/newusers	                        (rev 0)
+++ debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/config/etc/pam.d/newusers	2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,6 @@
+#
+# The PAM configuration file for the Shadow `chpasswd' service
+#
+
+ at include common-password
+

Modified: debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/newusers.test
===================================================================
--- debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300/newusers.test	2009-04-30 21:53:54 UTC (rev 2853)
+++ debian/trunk/tests/newusers/44_create_user_encrypt_SHA256_rounds_300-PAM/newusers.test	2009-05-10 19:27:29 UTC (rev 2904)
@@ -16,8 +16,8 @@
 
 change_config
 
-echo "newusers -c SHA256 -s 300 data/newusers.list"
-newusers -c SHA256 -s 300 data/newusers.list
+echo "newusers data/newusers.list"
+newusers data/newusers.list
 
 echo -n "Check the passwd file..." 
 ../../common/compare_file.pl data/passwd /etc/passwd 
@@ -31,7 +31,7 @@
 echo -n "Check the number of rounds..."
 rounds=$(sed -n 's/^foo:\$5\$rounds=\([0-9]*\)\$.*$/\1/p' /etc/shadow)
 echo -n "($rounds)..."
-if [ ! "$rounds" = 1000 ]; then
+if [ ! "$rounds" = 1000 ] && [ ! "$rounds" = "" ]; then
 	echo "Wrong number of rounds"
 	grep "^foo:" /etc/shadow
 	exit 1

Added: debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/common-password
===================================================================
--- debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/common-password	                        (rev 0)
+++ debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/common-password	2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,33 @@
+#
+# /etc/pam.d/common-password - password-related modules common to all services
+#
+# This file is included from other service-specific PAM config files,
+# and should contain a list of modules that define the services to be
+# used to change user passwords.  The default is pam_unix.
+
+# Explanation of pam_unix options:
+#
+# The "md5" option enables MD5 passwords.  Without this option, the
+# default is Unix crypt.
+#
+# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
+# login.defs.
+#
+# See the pam_unix manpage for other options.
+
+# As of pam 1.0.1-6, this file is managed by pam-auth-update by default.
+# To take advantage of this, it is recommended that you configure any
+# local modules either before or after the default block, and use
+# pam-auth-update to manage selection of other modules.  See
+# pam-auth-update(8) for details.
+
+# here are the per-package modules (the "Primary" block)
+password	[success=1 default=ignore]	pam_unix.so obscure
+# here's the fallback if no module succeeds
+password	requisite			pam_deny.so
+# prime the stack with a positive return value if there isn't one already;
+# this avoids us returning an error just because nothing sets a success code
+# since the modules above will each just jump around
+password	required			pam_permit.so
+# and here are more per-package modules (the "Additional" block)
+# end of pam-auth-update config

Added: debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/newusers
===================================================================
--- debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/newusers	                        (rev 0)
+++ debian/trunk/tests/newusers/49_multiple_system_users/config/etc/pam.d/newusers	2009-05-10 19:27:29 UTC (rev 2904)
@@ -0,0 +1,6 @@
+#
+# The PAM configuration file for the Shadow `chpasswd' service
+#
+
+ at include common-password
+

Modified: debian/trunk/tests/newusers/49_multiple_system_users/data/group
===================================================================
--- debian/trunk/tests/newusers/49_multiple_system_users/data/group	2009-05-10 19:18:25 UTC (rev 2903)
+++ debian/trunk/tests/newusers/49_multiple_system_users/data/group	2009-05-10 19:27:29 UTC (rev 2904)
@@ -41,19 +41,19 @@
 Debian-exim:x:102:
 foo:x:65535:foo
 fooo:x:997:
-foo1:x:99:
-foo1a:x:98:
+foo1:x:999:
+foo1a:x:998:
 foo2:x:2000:
-foo3:x:97:
-foo4:x:96:
+foo3:x:996:
+foo4:x:995:
 foo5:x:3005:
-foo6:x:95:
+foo6:x:994:
 foo7:x:61000:
-foo8:x:94:
-foo9:x:93:
-foo10:x:92:
+foo8:x:993:
+foo9:x:992:
+foo10:x:991:
 foo11:x:63000:
-foo12:x:91:
-foo13:x:90:
-foo14:x:89:
-foo15:x:88:
+foo12:x:990:
+foo13:x:989:
+foo14:x:988:
+foo15:x:987:

Modified: debian/trunk/tests/newusers/49_multiple_system_users/data/passwd
===================================================================
--- debian/trunk/tests/newusers/49_multiple_system_users/data/passwd	2009-05-10 19:18:25 UTC (rev 2903)
+++ debian/trunk/tests/newusers/49_multiple_system_users/data/passwd	2009-05-10 19:27:29 UTC (rev 2904)
@@ -19,20 +19,20 @@
 Debian-exim:x:102:102::/var/spool/exim4:/bin/false
 foo:x:65535:65535:User Foo - Gecos Field::/bin/sh
 fooo:x:997:997:User Foo - Gecos Field::/bin/sh
-foo1:x:999:99:User Foo - Gecos Field::/bin/sh
-foo1a:x:999:98:User Foo - Gecos Field::/bin/sh
-foo1b:x:998:98:User Foo - Gecos Field::/bin/sh
+foo1:x:999:999:User Foo - Gecos Field::/bin/sh
+foo1a:x:999:998:User Foo - Gecos Field::/bin/sh
+foo1b:x:998:998:User Foo - Gecos Field::/bin/sh
 foo2:x:2000:2000:User Foo - Gecos Field::/bin/sh
-foo3:x:996:97:User Foo - Gecos Field::/bin/sh
-foo4:x:3000:96:User Foo - Gecos Field::/bin/sh
+foo3:x:996:996:User Foo - Gecos Field::/bin/sh
+foo4:x:3000:995:User Foo - Gecos Field::/bin/sh
 foo5:x:995:3005:User Foo - Gecos Field::/bin/sh
-foo6:x:994:95:User Foo - Gecos Field::/bin/sh
+foo6:x:994:994:User Foo - Gecos Field::/bin/sh
 foo7:x:61000:61000:User Foo - Gecos Field::/bin/sh
-foo8:x:993:94:User Foo - Gecos Field::/bin/sh
-foo9:x:62000:93:User Foo - Gecos Field::/bin/sh
-foo10:x:992:92:User Foo - Gecos Field::/bin/sh
+foo8:x:993:993:User Foo - Gecos Field::/bin/sh
+foo9:x:62000:992:User Foo - Gecos Field::/bin/sh
+foo10:x:992:991:User Foo - Gecos Field::/bin/sh
 foo11:x:991:63000:User Foo - Gecos Field::/bin/sh
-foo12:x:990:91:User Foo - Gecos Field::/bin/sh
-foo13:x:989:90:User Foo - Gecos Field::/bin/sh
-foo14:x:59000:89:User Foo - Gecos Field::/bin/sh
-foo15:x:988:88:User Foo - Gecos Field::/bin/sh
+foo12:x:990:990:User Foo - Gecos Field::/bin/sh
+foo13:x:989:989:User Foo - Gecos Field::/bin/sh
+foo14:x:59000:988:User Foo - Gecos Field::/bin/sh
+foo15:x:988:987:User Foo - Gecos Field::/bin/sh




More information about the Pkg-shadow-commits mailing list