UmVirt LFS Package info
DB commit: 87572d7cf5c2e4fc6a7d33abc05341175a2c925a
APP commit: e905d50832f25d6e1ea1c062c557c2674e1072f0
Linux-PAM
The Linux PAM package contains Pluggable Authentication Modules used by the local system administrator to control how application programs authenticate users.Package info
Template:
Codename: Linux-PAM
Source file: Linux-PAM-1.7.1.tar.xz
Source file size: 510828
Source file MD5-checkum: 92812d7dd414d816fba8d649e84e68ca
Source directory: Linux-PAM-1.7.1
Package URL: https://umvirt.com/linux/downloads/0.2.4/packages/l/Linux-PAM-1.7.1.tar.xz
Package md5-checksum URL: https://umvirt.com/linux/downloads/0.2.4/packages/l/Linux-PAM-1.7.1.tar.xz.md5sum
Dependances: *** NO DEPENDANCES FOUND ***
Dependance of: libpwquality, libcap, cifs-utils, fcron, cups, c-kermit, proftpd, systemd, exim, gnome-keyring, lightdm-app, dovecot, polkit, postgresql-client, postgresql-server, xscreensaver, freerdp, freerdp2, samba, plasma.
Patches: *** NO PATCHES FOUND ***
Addons: Linux-PAM-1.7.1-docs.tar.xz.
Nestings *** NO NESTINGS FOUND ***
Configuration script:
mkdir build &&
cd build &&
meson setup .. \
--prefix=/usr \
--buildtype=release \
-D docdir=/usr/share/doc/Linux-PAM-1.7.1
Build script:
cd build
ninja
Install script:
cd build
if [[ "$ULFS_PKG_DOCUMENTATION" == "YES" ]]
then
tar -C / -xvf ../../Linux-PAM-1.7.1-docs.tar.xz
fi
install -v -m755 -d /etc/pam.d &&
cat > /etc/pam.d/other << "EOF"
auth required pam_deny.so
account required pam_deny.so
password required pam_deny.so
session required pam_deny.so
EOF
rm -fv /etc/pam.d/other
ninja install &&
chmod -v 4755 /usr/sbin/unix_chkpwd
install -vdm755 /etc/pam.d &&
cat > /etc/pam.d/system-account << "EOF" &&
# Begin /etc/pam.d/system-account
account required pam_unix.so
# End /etc/pam.d/system-account
EOF
cat > /etc/pam.d/system-auth << "EOF" &&
# Begin /etc/pam.d/system-auth
auth required pam_unix.so
# End /etc/pam.d/system-auth
EOF
cat > /etc/pam.d/system-session << "EOF" &&
# Begin /etc/pam.d/system-session
session required pam_unix.so
# End /etc/pam.d/system-session
EOF
cat > /etc/pam.d/system-password << "EOF"
# Begin /etc/pam.d/system-password
# use yescrypt hash for encryption, use shadow, and try to use any
# previously defined authentication token (chosen password) set by any
# prior module.
password required pam_unix.so yescrypt shadow try_first_pass
# End /etc/pam.d/system-password
EOF
cat > /etc/pam.d/other << "EOF"
# Begin /etc/pam.d/other
auth required pam_warn.so
auth required pam_deny.so
account required pam_warn.so
account required pam_deny.so
password required pam_warn.so
password required pam_deny.so
session required pam_warn.so
session required pam_deny.so
# End /etc/pam.d/other
EOF