UmVirt LFS Package info
DB commit: 9479b41c328304e88d8b007b04bc0dff783bbc6e
APP commit: b0e7f121177a769c20a4c985867d650259b096ce
Linux-PAM
The Linux PAM package contains Pluggable Authentication Modules used by the local system administrator to control how application programs authenticate users.Package info
Template:
Codename: Linux-PAM
Source file: Linux-PAM-1.7.0.tar.xz
Source file size: 507824
Source file MD5-checkum: c1e41d59d6852e45d0f953c8c8f869d6
Source directory: Linux-PAM-1.7.0
Package URL: https://umvirt.com/linux/downloads/0.2.3/packages/l/Linux-PAM-1.7.0.tar.xz
Package md5-checksum URL: https://umvirt.com/linux/downloads/0.2.3/packages/l/Linux-PAM-1.7.0.tar.xz.md5sum
Dependances: *** NO DEPENDANCES FOUND ***
Dependance of: libcap, cifs-utils, fcron, libpwquality, proftpd, cups, c-kermit, exim, systemd, lightdm-app, dovecot, gnome-keyring, postgresql-client, postgresql-server, xscreensaver, polkit, freerdp, freerdp2, samba, plasma.
Patches: *** NO PATCHES FOUND ***
Addons: Linux-PAM-1.7.0-docs.tar.xz.
Nestings *** NO NESTINGS FOUND ***
Configuration script:
mkdir build &&
cd build &&
meson setup .. \
--prefix=/usr \
--buildtype=release \
-D docdir=/usr/share/doc/Linux-PAM-1.7.0
Build script:
cd build
ninja
Install script:
cd build
if [[ "$ULFS_PKG_DOCUMENTATION" == "YES" ]]
then
tar -C / -xvf ../../Linux-PAM-1.7.0-docs.tar.xz
fi
install -v -m755 -d /etc/pam.d &&
cat > /etc/pam.d/other << "EOF"
auth required pam_deny.so
account required pam_deny.so
password required pam_deny.so
session required pam_deny.so
EOF
rm -fv /etc/pam.d/other
ninja install &&
chmod -v 4755 /usr/sbin/unix_chkpwd
install -vdm755 /etc/pam.d &&
cat > /etc/pam.d/system-account << "EOF" &&
# Begin /etc/pam.d/system-account
account required pam_unix.so
# End /etc/pam.d/system-account
EOF
cat > /etc/pam.d/system-auth << "EOF" &&
# Begin /etc/pam.d/system-auth
auth required pam_unix.so
# End /etc/pam.d/system-auth
EOF
cat > /etc/pam.d/system-session << "EOF" &&
# Begin /etc/pam.d/system-session
session required pam_unix.so
# End /etc/pam.d/system-session
EOF
cat > /etc/pam.d/system-password << "EOF"
# Begin /etc/pam.d/system-password
# use yescrypt hash for encryption, use shadow, and try to use any
# previously defined authentication token (chosen password) set by any
# prior module.
password required pam_unix.so yescrypt shadow try_first_pass
# End /etc/pam.d/system-password
EOF
cat > /etc/pam.d/other << "EOF"
# Begin /etc/pam.d/other
auth required pam_warn.so
auth required pam_deny.so
account required pam_warn.so
account required pam_deny.so
password required pam_warn.so
password required pam_deny.so
session required pam_warn.so
session required pam_deny.so
# End /etc/pam.d/other
EOF