move fds to own overlay
git-svn-id: https://svn.disconnected-by-peer.at/svn/linamh/trunk/mds@701 6952d904-891a-0410-993b-d76249ca496b
This commit is contained in:
17
app-admin/mmc-agent/ChangeLog
Normal file
17
app-admin/mmc-agent/ChangeLog
Normal file
@@ -0,0 +1,17 @@
|
||||
# ChangeLog for app-admin/mmc-agent
|
||||
# Copyright 1999-2009 Gentoo Foundation; Distributed under the GPL v2
|
||||
# $Header: $
|
||||
|
||||
11 Jan 2009; Mario Fetka <mario.fetka@gmail.com> +mmc-agent-2.3.2.ebuild:
|
||||
Bump
|
||||
|
||||
02 Nov 2008; Mario Fetka <mario.fetka@gmail.com>
|
||||
files/mmc-agent-2.3.1-kerberos-1.patch:
|
||||
update patch
|
||||
|
||||
31 Jul 2008; Mario Fetka <mario.fetka@gmail.com> mmc-agent-2.3.1.ebuild:
|
||||
repoman Cleanup
|
||||
|
||||
14 Jun 2008; Mario Fetka <mario-fetka@gmx.at> +metadata.xml:
|
||||
Initial import
|
||||
|
||||
9
app-admin/mmc-agent/Manifest
Normal file
9
app-admin/mmc-agent/Manifest
Normal file
@@ -0,0 +1,9 @@
|
||||
AUX mmc-agent-2.3.1-kerberos-1.patch 14230 RMD160 236a276fe5bae2a6927af8b9d619ad83d3c41b38 SHA1 8475086422569d922d114c22285b6e47b02fb18d SHA256 c1913d1e8ca4653479d9920ce9a6f238f503b25e21c03213c38e81178e3b1d0d
|
||||
AUX mmc-agent-2.3.2-printing-1.patch 33371 RMD160 f7064ec4dfc2e923c522f01190ca5d4f7d493d43 SHA1 ca9219b982e210bd92c85db8f982e1a3c6b9d48b SHA256 97dc50bb286361286e5451d2e85ea9b9d8609a2f92c3f3ca3836e9bcbcd1c931
|
||||
AUX mmc-agent.initd 438 RMD160 d7dc64366782ab0d6fe4347d6a169b88a4e03a49 SHA1 e4ae8808678161237703bbb63b144899c9a544c9 SHA256 922d0bacad3eda749f8807e3ae5c183f636fa93e0d41d7079e570c58ebccb879
|
||||
DIST mmc-agent-2.3.1.tar.gz 111217 RMD160 7e75cbf9637a50214f7d2f1eee5049f7809d29aa SHA1 35f468ad4eb77ca4117695eb2b6ea83b38a01d46 SHA256 39e594a36f7cde73e6dfcc3845841137c0fe016c82c6343838fb8879931c757b
|
||||
DIST mmc-agent-2.3.2.tar.gz 120949 RMD160 871b3b7766d69019de392e42ebf25a216d217c71 SHA1 1e7c634243c00c6b214f24c3467315d31a444215 SHA256 0ac8ff97818c58008cadb3c6b08dba39e42b078fea9d392fda649e036eabaea2
|
||||
EBUILD mmc-agent-2.3.1.ebuild 1250 RMD160 0230a124ace55353571f7b1b201664bd45405999 SHA1 af139ef81aee700b236962b6622e9e8f2a8986cf SHA256 da0e889c925d0ce8442081c4f3155a4f82dce17b152a54be798ee7e25e4917a1
|
||||
EBUILD mmc-agent-2.3.2.ebuild 1359 RMD160 9828113e282019037c1c189d877f3af743f43a0a SHA1 7c105971764320d297dc85350b04dcdca6fe5dda SHA256 e83cdb0c79ca797b180e01a3eb84117e516574bf8665dcba234ebc3d2195e139
|
||||
MISC ChangeLog 488 RMD160 9342f9c6d57681478ccf6e653551566aae20ceb8 SHA1 c96bec68b8d199af765a40076f49854a5ab001c6 SHA256 0c9726222878d99c78eaf10dec89c3a1e395e0d83fe276424cf3eb6895240c06
|
||||
MISC metadata.xml 170 RMD160 645927a396fdc21cdeb089fe42c5397332420ea6 SHA1 ac7f48a14fec325926f9ce1be8fbf1f311b4f2e4 SHA256 d797a2ec6f9dc516c9f9c1a758ee87ad3e8c43101b5dc76c2f872d5bd4639b42
|
||||
296
app-admin/mmc-agent/files/mmc-agent-2.3.1-kerberos-1.patch
Normal file
296
app-admin/mmc-agent/files/mmc-agent-2.3.1-kerberos-1.patch
Normal file
@@ -0,0 +1,296 @@
|
||||
Submitted By: Mario Fetka (mario-fetka at gmx dot at)
|
||||
Date: 2008-06-14
|
||||
Initial Package Version: 2.2.0
|
||||
Origin: Ticket #144
|
||||
Upstream Status: Accepted
|
||||
Description: Kerberized accounts in ou=People
|
||||
|
||||
|
||||
diff -Naur mmc-agent-2.3.1.orig/conf/plugins/kerberos.ini mmc-agent-2.3.1/conf/plugins/kerberos.ini
|
||||
--- mmc-agent-2.3.1.orig/conf/plugins/kerberos.ini 1970-01-01 00:00:00.000000000 +0000
|
||||
+++ mmc-agent-2.3.1/conf/plugins/kerberos.ini 2008-05-17 13:04:35.000000000 +0000
|
||||
@@ -0,0 +1,5 @@
|
||||
+[main]
|
||||
+disable = 0
|
||||
+
|
||||
+[kerberos]
|
||||
+realm = EXAMPLE.COM
|
||||
diff -Naur mmc-agent-2.3.1.orig/mmc/plugins/base/__init__.py mmc-agent-2.3.1/mmc/plugins/base/__init__.py
|
||||
--- mmc-agent-2.3.1.orig/mmc/plugins/base/__init__.py 2008-04-29 15:15:48.000000000 +0000
|
||||
+++ mmc-agent-2.3.1/mmc/plugins/base/__init__.py 2008-06-14 09:22:59.000000000 +0000
|
||||
@@ -1229,6 +1229,10 @@
|
||||
attrs = []
|
||||
attrib = self.l.search_s(dn, ldap.SCOPE_BASE)
|
||||
c, attrs = attrib[0]
|
||||
+ # kerberos -> remove binary key from attrs
|
||||
+ try: attrs.pop('krb5Key')
|
||||
+ except: pass
|
||||
+ #
|
||||
newattrs = copy.deepcopy(attrs)
|
||||
return newattrs
|
||||
|
||||
@@ -1249,6 +1253,10 @@
|
||||
attrib = self.l.search_s(cn, ldap.SCOPE_BASE)
|
||||
|
||||
c,attrs=attrib[0]
|
||||
+ # kerberos -> remove binary key from attrs
|
||||
+ try: attrs.pop('krb5Key')
|
||||
+ except: pass
|
||||
+ #
|
||||
|
||||
newattrs = copy.deepcopy(attrs)
|
||||
|
||||
@@ -1402,8 +1410,13 @@
|
||||
@rtype: list
|
||||
"""
|
||||
if not base: base = self.baseUsersDN
|
||||
- if (pattern==''): searchFilter = "uid=*"
|
||||
- else: searchFilter = pattern
|
||||
+ # kerberos -> search only PosixAccount
|
||||
+ if (pattern==''): searchFilter = "(&(objectClass=posixAccount)(uid=*))"
|
||||
+ elif pattern[0] == '(':
|
||||
+ searchFilter = "(&(objectClass=posixAccount)%s)" % (pattern)
|
||||
+ else:
|
||||
+ searchFilter = "(&(objectClass=posixAccount)(%s))" % (pattern)
|
||||
+ #
|
||||
monoattrs = ["uid", "sn", "givenName", "mail"]
|
||||
result_set = self.search(searchFilter, base, monoattrs + ["telephoneNumber", "loginShell", "objectClass"], ldap.SCOPE_ONELEVEL)
|
||||
|
||||
diff -Naur mmc-agent-2.3.1.orig/mmc/plugins/kerberos/__init__.py mmc-agent-2.3.1/mmc/plugins/kerberos/__init__.py
|
||||
--- mmc-agent-2.3.1.orig/mmc/plugins/kerberos/__init__.py 1970-01-01 00:00:00.000000000 +0000
|
||||
+++ mmc-agent-2.3.1/mmc/plugins/kerberos/__init__.py 2007-11-21 09:56:21.000000000 +0000
|
||||
@@ -0,0 +1,180 @@
|
||||
+# -*- coding: utf-8; -*-
|
||||
+#
|
||||
+# (c) 2004-2007 Linbox / Free&ALter Soft, http://linbox.com
|
||||
+# (c) 2007 Mandriva, http://www.mandriva.com/
|
||||
+# (c) 2007 Kids-und-Co g.e.V http://www.kids-und-co.de
|
||||
+#
|
||||
+# $Id: __init__.py 108 2007-11-21 09:56:21Z iosifb $
|
||||
+#
|
||||
+# This file is part of Mandriva Management Console (MMC).
|
||||
+#
|
||||
+# MMC is free software; you can redistribute it and/or modify
|
||||
+# it under the terms of the GNU General Public License as published by
|
||||
+# the Free Software Foundation; either version 2 of the License, or
|
||||
+# (at your option) any later version.
|
||||
+#
|
||||
+# MMC is distributed in the hope that it will be useful,
|
||||
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
+# GNU General Public License for more details.
|
||||
+#
|
||||
+# You should have received a copy of the GNU General Public License
|
||||
+# along with MMC; if not, write to the Free Software
|
||||
+# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
||||
+
|
||||
+import logging
|
||||
+import ldap.modlist
|
||||
+import copy
|
||||
+from mmc.plugins.base import ldapUserGroupControl
|
||||
+import xmlrpclib
|
||||
+from mmc.support.errorObj import errorMessage
|
||||
+from mmc.support.mmcException import *
|
||||
+from mmc.support import mmctools
|
||||
+import mmc.plugins.base
|
||||
+from mmc.support.config import *
|
||||
+from mmc.plugins.base import ldapUserGroupControl
|
||||
+
|
||||
+VERSION = "2.3.1"
|
||||
+APIVERSION = "4:2:0"
|
||||
+REVISION = int("$Rev: 108 $".split(':')[1].strip(' $'))
|
||||
+
|
||||
+def getVersion(): return VERSION
|
||||
+def getApiVersion(): return APIVERSION
|
||||
+def getRevision(): return REVISION
|
||||
+
|
||||
+def activate():
|
||||
+ """
|
||||
+ this function define if the module "base" can be activated.
|
||||
+ @return: return True if this module can be activate
|
||||
+ @rtype: boolean
|
||||
+ """
|
||||
+ config = KerberosConfig("kerberos")
|
||||
+ logger = logging.getLogger()
|
||||
+
|
||||
+ if config.disabled:
|
||||
+ logger.info("Kerberos plugin disabled by configuration.")
|
||||
+ return False
|
||||
+
|
||||
+ try:
|
||||
+ ldapObj = ldapUserGroupControl()
|
||||
+ except ldap.INVALID_CREDENTIALS:
|
||||
+ logger.error("Can't bind to LDAP: invalid credentials.")
|
||||
+ return False
|
||||
+
|
||||
+ # Test if the Kerberos LDAP schema is available in the directory
|
||||
+ try:
|
||||
+ schema = ldapObj.getSchema("krb5KDCEntry")
|
||||
+ if len(schema) <= 0:
|
||||
+ logger.error("Kerberos schema is not included in LDAP directory");
|
||||
+ return False
|
||||
+ except:
|
||||
+ logger.exception("invalid schema")
|
||||
+ return False
|
||||
+ try:
|
||||
+ schema = ldapObj.getSchema("krb5Principal")
|
||||
+ if len(schema) <= 0:
|
||||
+ logger.error("Kerberos schema is not included in LDAP directory");
|
||||
+ return False
|
||||
+ except:
|
||||
+ logger.exception("invalid schema")
|
||||
+ return False
|
||||
+ """
|
||||
+ TODO: Check kerberos database
|
||||
+ """
|
||||
+ return True
|
||||
+
|
||||
+def isKrbUser(uid):
|
||||
+ return kerberosLdapControl().isKerberosUser(uid)
|
||||
+
|
||||
+def addKrbAttr(uid,password):
|
||||
+ return kerberosLdapControl().addKerberosAttr(uid,password)
|
||||
+
|
||||
+def delKrbAttr(uid,password):
|
||||
+ return kerberosLdapControl().delKerberosAttr(uid,password)
|
||||
+
|
||||
+def changePassword(uid,password):
|
||||
+ return kerberosLdapControl().changePassword(uid, password)
|
||||
+
|
||||
+class KerberosConfig(PluginConfig):
|
||||
+ def __init__(self,name, conffile = None):
|
||||
+ PluginConfig.__init__(self,name, conffile = None)
|
||||
+ self.setDefault()
|
||||
+ self.readConfig()
|
||||
+
|
||||
+ def readConfig(self):
|
||||
+ PluginConfig.readConf(self)
|
||||
+ self.realm = self.get("kerberos", "realm")
|
||||
+
|
||||
+class kerberosLdapControl(mmc.plugins.base.ldapUserGroupControl):
|
||||
+
|
||||
+ def __init__(self, conffile = None, conffilebase = None):
|
||||
+ mmc.plugins.base.ldapUserGroupControl.__init__(self, conffilebase)
|
||||
+ self.configKerberos = KerberosConfig("kerberos", conffile)
|
||||
+ self.realm = self.configKerberos.realm
|
||||
+
|
||||
+ def delKerberosAttr(self,uid,password):
|
||||
+ # If the password has been encoded in the XML-RPC stream, decode it
|
||||
+ if isinstance(password, xmlrpclib.Binary):
|
||||
+ password = str(password)
|
||||
+ dn = 'uid=' + uid + ',' + self.baseUsersDN
|
||||
+ s = self.l.search_s(dn, ldap.SCOPE_BASE)
|
||||
+ c, attr = s[0]
|
||||
+ old = {}
|
||||
+ new = {}
|
||||
+ for key in attr.keys(): old[key.lower()] = attr[key]
|
||||
+ new = copy.deepcopy(old)
|
||||
+ # remove krb attributes
|
||||
+ new.pop('krb5kdcflags')
|
||||
+ new.pop('krb5principalname')
|
||||
+ new.pop('krb5keyversionnumber')
|
||||
+ try: new.pop('krb5key')
|
||||
+ except KeyError: pass
|
||||
+ newobjclasses = ()
|
||||
+ for s in new.pop('objectclass'):
|
||||
+ if s[0:4] == 'krb5': pass
|
||||
+ else: newobjclasses = newobjclasses + (s,)
|
||||
+ new['objectclass'] = newobjclasses
|
||||
+ modlist = ldap.modlist.modifyModlist(old, new)
|
||||
+ #logger = logging.getLogger()
|
||||
+ #logger.debug(newobjclasses)
|
||||
+ #logger.debug(modlist)
|
||||
+ self.l.modify_s(dn, modlist)
|
||||
+ mmc.plugins.base.ldapUserGroupControl.changeUserPasswd(self,uid,password)
|
||||
+ return True
|
||||
+
|
||||
+ def addKerberosAttr(self,uid,password):
|
||||
+ # If the password has been encoded in the XML-RPC stream, decode it
|
||||
+ if isinstance(password, xmlrpclib.Binary):
|
||||
+ password = str(password)
|
||||
+ dn = 'uid=' + uid + ',' + self.baseUsersDN
|
||||
+ s = self.l.search_s(dn, ldap.SCOPE_BASE)
|
||||
+ c, attr = s[0]
|
||||
+ old = {}
|
||||
+ new = {}
|
||||
+ for key in attr.keys(): old[key.lower()] = attr[key]
|
||||
+ new = copy.deepcopy(old)
|
||||
+ new['objectclass'] = new['objectclass'] + ['krb5Principal','krb5KDCEntry']
|
||||
+ new['userpassword'] = ['{K5Key}']
|
||||
+ new['krb5kdcflags'] = ['126']
|
||||
+ new['krb5keyversionnumber'] = ['0']
|
||||
+ new['krb5principalname'] = [uid+'@' +self.realm]
|
||||
+ modlist = ldap.modlist.modifyModlist(old, new)
|
||||
+ self.l.modify_s(dn, modlist)
|
||||
+ self.l.passwd_s(dn, None, password)
|
||||
+ return True
|
||||
+
|
||||
+ def isKerberosUser(self,uid):
|
||||
+ ret = False
|
||||
+ if self.existUser(uid): ret = "krb5Principal" in self.getDetailedUser(uid)["objectClass"]
|
||||
+ return ret
|
||||
+
|
||||
+ def changePassword(self,uid,password):
|
||||
+ # If the password has been encoded in the XML-RPC stream, decode it
|
||||
+ if isinstance(password, xmlrpclib.Binary):
|
||||
+ password = str(password)
|
||||
+ dn = 'uid=' + uid + ',' + self.baseUsersDN
|
||||
+ self.l.modify_s(dn, [(ldap.MOD_REPLACE,'userPassWord','{K5KEY}')])
|
||||
+ self.l.passwd_s(dn, None, password)
|
||||
+ return True
|
||||
+
|
||||
+
|
||||
diff -Naur mmc-agent-2.3.1.orig/plugins_base.diff mmc-agent-2.3.1/plugins_base.diff
|
||||
--- mmc-agent-2.3.1.orig/plugins_base.diff 1970-01-01 00:00:00.000000000 +0000
|
||||
+++ mmc-agent-2.3.1/plugins_base.diff 2008-05-17 13:04:04.000000000 +0000
|
||||
@@ -0,0 +1,40 @@
|
||||
+--- mds-orig/mmc-agent/mmc/plugins/base/__init__.py 2007-11-21 10:57:03.000000000 +0100
|
||||
++++ kerberos_plugin/trunk/mmc-agent/mmc/plugins/base/__init__.py 2007-11-21 11:34:36.000000000 +0100
|
||||
+@@ -1207,6 +1207,10 @@
|
||||
+ attrs = []
|
||||
+ attrib = self.l.search_s(dn, ldap.SCOPE_BASE)
|
||||
+ c, attrs = attrib[0]
|
||||
++ # kerberos -> remove binary key from attrs
|
||||
++ try: attrs.pop('krb5Key')
|
||||
++ except: pass
|
||||
++ #
|
||||
+ newattrs = copy.deepcopy(attrs)
|
||||
+ return newattrs
|
||||
+
|
||||
+@@ -1227,6 +1231,10 @@
|
||||
+ attrib = self.l.search_s(cn, ldap.SCOPE_BASE)
|
||||
+
|
||||
+ c,attrs=attrib[0]
|
||||
++ # kerberos -> remove binary key from attrs
|
||||
++ try: attrs.pop('krb5Key')
|
||||
++ except: pass
|
||||
++ #
|
||||
+
|
||||
+ newattrs = copy.deepcopy(attrs)
|
||||
+
|
||||
+@@ -1380,8 +1388,13 @@
|
||||
+ @rtype: list
|
||||
+ """
|
||||
+ if not base: base = self.baseUsersDN
|
||||
+- if (pattern==''): searchFilter = "uid=*"
|
||||
+- else: searchFilter = pattern
|
||||
++ # kerberos -> search only PosixAccount
|
||||
++ if (pattern==''): searchFilter = "(&(objectClass=posixAccount)(uid=*))"
|
||||
++ elif pattern[0] == '(':
|
||||
++ searchFilter = "(&(objectClass=posixAccount)%s)" % (pattern)
|
||||
++ else:
|
||||
++ searchFilter = "(&(objectClass=posixAccount)(%s))" % (pattern)
|
||||
++ #
|
||||
+ monoattrs = ["uid", "sn", "givenName", "mail"]
|
||||
+ result_set = self.search(searchFilter, base, monoattrs + ["telephoneNumber", "loginShell", "objectClass"], ldap.SCOPE_ONELEVEL)
|
||||
+
|
||||
diff -Naur mmc-agent-2.3.1.orig/setup.py mmc-agent-2.3.1/setup.py
|
||||
--- mmc-agent-2.3.1.orig/setup.py 2007-09-10 08:20:59.000000000 +0000
|
||||
+++ mmc-agent-2.3.1/setup.py 2008-06-14 09:24:15.000000000 +0000
|
||||
@@ -8,5 +8,5 @@
|
||||
author_email = "cdelfosse@mandriva.com",
|
||||
maintainer = "Cedric Delfosse",
|
||||
maintainer_email = "cdelfosse@mandriva.com",
|
||||
- packages = ["mmc", "mmc.support", "mmc.plugins", "mmc.plugins.base", "mmc.plugins.samba", "mmc.plugins.proxy", "mmc.plugins.mail", "mmc.plugins.network"],
|
||||
+ packages = ["mmc", "mmc.support", "mmc.plugins", "mmc.plugins.base", "mmc.plugins.samba", "mmc.plugins.proxy", "mmc.plugins.mail", "mmc.plugins.network", "mmc.plugins.kerberos"],
|
||||
)
|
||||
20
app-admin/mmc-agent/files/mmc-agent.initd
Executable file
20
app-admin/mmc-agent/files/mmc-agent.initd
Executable file
@@ -0,0 +1,20 @@
|
||||
#!/sbin/runscript
|
||||
# Copyright 1999-2007 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: $
|
||||
|
||||
depend() {
|
||||
need net slapd
|
||||
}
|
||||
|
||||
start() {
|
||||
ebegin "Starting mmc-agent"
|
||||
eval start-stop-daemon --start --quiet --exec /usr/sbin/mmc-agent --pidfile /var/run/mmc-agent.pid
|
||||
eend $?
|
||||
}
|
||||
|
||||
stop() {
|
||||
ebegin "Stopping mmc-agent"
|
||||
start-stop-daemon --stop --quiet --pidfile /var/run/mmc-agent.pid
|
||||
eend $?
|
||||
}
|
||||
5
app-admin/mmc-agent/metadata.xml
Normal file
5
app-admin/mmc-agent/metadata.xml
Normal file
@@ -0,0 +1,5 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
|
||||
<pkgmetadata>
|
||||
<herd>maintainer-wanted</herd>
|
||||
</pkgmetadata>
|
||||
50
app-admin/mmc-agent/mmc-agent-2.3.1.ebuild
Normal file
50
app-admin/mmc-agent/mmc-agent-2.3.1.ebuild
Normal file
@@ -0,0 +1,50 @@
|
||||
# Copyright 1999-2008 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: $
|
||||
|
||||
inherit distutils
|
||||
|
||||
# ESVN_REPO_URI="http://mds.mandriva.org/svn/mmc-agent"
|
||||
DESCRIPTION="The MMC Agent and its Python plugins."
|
||||
HOMEPAGE="http://mds.mandriva.org/"
|
||||
SRC_URI="http://mds.mandriva.org/pub/mds/sources/${PV}/${P}.tar.gz"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
KEYWORDS="~amd64 ~ppc64 ~x86"
|
||||
IUSE=""
|
||||
|
||||
SLOT="0"
|
||||
|
||||
DEPEND=">=dev-python/setuptools-0.6_rc1
|
||||
>=dev-python/twisted-web-0.7.0
|
||||
>=dev-python/python-ldap-2.2.1"
|
||||
|
||||
src_unpack() {
|
||||
unpack ${A}
|
||||
epatch "${FILESDIR}"/${P}-kerberos-1.patch
|
||||
}
|
||||
|
||||
# from marienz's setuptools.eclass:
|
||||
src_install() {
|
||||
"${python}" setup.py install --root="${D}" --no-compile "$@" || die "install failed"
|
||||
dosbin bin/*
|
||||
insinto etc/mmc/agent/keys
|
||||
doins -r conf/agent/keys/*
|
||||
insinto etc/mmc/agent
|
||||
doins -r conf/agent/*.ini
|
||||
insinto etc/mmc/plugins
|
||||
doins -r conf/plugins/*.ini
|
||||
|
||||
newinitd "${FILESDIR}"/mmc-agent.initd mmc-agent
|
||||
}
|
||||
|
||||
src_test() {
|
||||
"${python}" setup.py test || die "tests failed"
|
||||
}
|
||||
|
||||
pkg_postinst() {
|
||||
elog "To disable some plugin in your mmc environments, you have to set"
|
||||
elog "disable to 1 in /etc/mmc/plugins/*.ini"
|
||||
elog "(one config file per service)"
|
||||
elog "You can't disable the base plugin."
|
||||
}
|
||||
54
app-admin/mmc-agent/mmc-agent-2.3.2.ebuild
Normal file
54
app-admin/mmc-agent/mmc-agent-2.3.2.ebuild
Normal file
@@ -0,0 +1,54 @@
|
||||
# Copyright 1999-2009 Gentoo Foundation
|
||||
# Distributed under the terms of the GNU General Public License v2
|
||||
# $Header: $
|
||||
|
||||
inherit distutils
|
||||
|
||||
# ESVN_REPO_URI="http://mds.mandriva.org/svn/mmc-agent"
|
||||
DESCRIPTION="The MMC Agent and its Python plugins."
|
||||
HOMEPAGE="http://mds.mandriva.org/"
|
||||
SRC_URI="http://mds.mandriva.org/pub/mds/sources/${PV}/${P}.tar.gz"
|
||||
|
||||
LICENSE="GPL-2"
|
||||
KEYWORDS="~amd64 ~ppc64 ~x86"
|
||||
IUSE=""
|
||||
|
||||
SLOT="0"
|
||||
|
||||
DEPEND=">=dev-python/setuptools-0.6_rc1
|
||||
>=dev-python/twisted-web-0.7.0
|
||||
>=dev-python/python-ldap-2.2.1"
|
||||
|
||||
src_unpack() {
|
||||
unpack ${A}
|
||||
cd ${S}
|
||||
epatch "${FILESDIR}"/${PN}-2.3.1-kerberos-1.patch
|
||||
epatch "${FILESDIR}"/${PN}-2.3.2-printing-1.patch
|
||||
}
|
||||
|
||||
# from marienz's setuptools.eclass:
|
||||
src_install() {
|
||||
"${python}" setup.py install --root="${D}" --no-compile "$@" || die "install failed"
|
||||
dosbin bin/*
|
||||
insinto etc/mmc/agent/keys
|
||||
doins -r conf/agent/keys/*
|
||||
insinto etc/mmc/agent
|
||||
doins -r conf/agent/*.ini
|
||||
insinto etc/mmc/plugins
|
||||
doins -r conf/plugins/*.ini
|
||||
insinto usr/share/mmc
|
||||
doins -r contrib
|
||||
|
||||
newinitd "${FILESDIR}"/mmc-agent.initd mmc-agent
|
||||
}
|
||||
|
||||
src_test() {
|
||||
"${python}" setup.py test || die "tests failed"
|
||||
}
|
||||
|
||||
pkg_postinst() {
|
||||
elog "To disable some plugin in your mmc environments, you have to set"
|
||||
elog "disable to 1 in /etc/mmc/plugins/*.ini"
|
||||
elog "(one config file per service)"
|
||||
elog "You can't disable the base plugin."
|
||||
}
|
||||
Reference in New Issue
Block a user