View | Details | Raw Unified | Return to bug 36743
Collapse All | Expand All

(-)a/branches/ucs-4.0/ucs-4.0-0/base/univention-pam/conffiles/etc/pam.d/gdm (-23 lines)
 Lines 1-23    Link Here 
1
@%@UCRWARNING=# @%@
2
3
@include common-auth
4
@!@
5
scope = "gdm"
6
accessfileFlag = "auth/%s/restrict" % (scope,)
7
if configRegistry.is_true(accessfileFlag, False):
8
	accessfileDefault = "/etc/security/access-%s.conf" % (scope,)
9
	accessfileKey = "auth/%s/accessfile" % (scope,)
10
	accessfile = configRegistry.get(accessfileKey, accessfileDefault)
11
	line =  [
12
		'account required pam_access.so',
13
		'accessfile=%s' % (accessfile,),
14
		'listsep=,',
15
		]
16
	maxent = configRegistry.get('pamaccess/maxent', False)
17
	if maxent:
18
		line.append('maxent=%s' % (maxent,))
19
	print ' '.join(line)
20
@!@
21
@include common-account
22
@include common-session
23
@include common-password
(-)a/branches/ucs-4.0/ucs-4.0-0/base/univention-pam/conffiles/etc/pam.d/kdm (+23 lines)
Line 0    Link Here 
1
@%@UCRWARNING=# @%@
2
3
@include common-auth
4
@!@
5
scope = "kdm"
6
accessfileFlag = "auth/%s/restrict" % (scope,)
7
if configRegistry.is_true(accessfileFlag, False):
8
	accessfileDefault = "/etc/security/access-%s.conf" % (scope,)
9
	accessfileKey = "auth/%s/accessfile" % (scope,)
10
	accessfile = configRegistry.get(accessfileKey, accessfileDefault)
11
	line =  [
12
		'account required pam_access.so',
13
		'accessfile=%s' % (accessfile,),
14
		'listsep=,',
15
		]
16
	maxent = configRegistry.get('pamaccess/maxent', False)
17
	if maxent:
18
		line.append('maxent=%s' % (maxent,))
19
	print ' '.join(line)
20
@!@
21
@include common-account
22
@include common-session
23
@include common-password
(-)a/branches/ucs-4.0/ucs-4.0-0/base/univention-pam/conffiles/etc/security/access-gdm.conf (-19 lines)
 Lines 1-19    Link Here 
1
@%@UCRWARNING=# @%@
2
3
@!@
4
from univention.lib.misc import custom_username, custom_groupname
5
6
scope = "gdm"
7
names = {}
8
for item in configRegistry.keys():
9
	if item.startswith("auth/" + scope + "/") and configRegistry.is_true(item, False):
10
		tmp = item.split("/")
11
		if len(tmp) >= 4:
12
			if tmp[2] == "group":
13
				names[custom_groupname(tmp[3])] = 1
14
			elif tmp[2] == "user":
15
				names[custom_username(tmp[3])] = 1
16
17
print "+:" + ",".join(names.keys()) + ":ALL"
18
print "-:ALL:ALL"
19
@!@
(-)a/branches/ucs-4.0/ucs-4.0-0/base/univention-pam/conffiles/etc/security/access-kdm.conf (+19 lines)
Line 0    Link Here 
1
@%@UCRWARNING=# @%@
2
3
@!@
4
from univention.lib.misc import custom_username, custom_groupname
5
6
scope = "kdm"
7
names = {}
8
for item in configRegistry.keys():
9
	if item.startswith("auth/" + scope + "/") and configRegistry.is_true(item, False):
10
		tmp = item.split("/")
11
		if len(tmp) >= 4:
12
			if tmp[2] == "group":
13
				names[custom_groupname(tmp[3])] = 1
14
			elif tmp[2] == "user":
15
				names[custom_username(tmp[3])] = 1
16
17
print "+:" + ",".join(names.keys()) + ":ALL"
18
print "-:ALL:ALL"
19
@!@
(-)a/branches/ucs-4.0/ucs-4.0-0/base/univention-pam/debian/changelog (+6 lines)
 Lines 1-3    Link Here 
1
univention-pam (8.0.3-1) unstable; urgency=low
2
3
  * Bug #36743: Provide PAM configuration for KDM
4
5
 -- Philipp Hahn <hahn@univention.de>  Mon, 17 Nov 2014 12:31:41 +0100
6
1
univention-pam (8.0.2-1) unstable; urgency=medium
7
univention-pam (8.0.2-1) unstable; urgency=medium
2
8
3
  * Bug #36436: add spaces to commatas in the description of auth/.*/restrict
9
  * Bug #36436: add spaces to commatas in the description of auth/.*/restrict
(-)a/branches/ucs-4.0/ucs-4.0-0/base/univention-pam/debian/ucslint.overrides (-1 / +1 lines)
 Lines 3-9    Link Here 
3
0004-12: conffiles/etc/pam.d/passwd
3
0004-12: conffiles/etc/pam.d/passwd
4
0004-12: conffiles/etc/pam.d/su
4
0004-12: conffiles/etc/pam.d/su
5
0004-12: conffiles/etc/pam.d/rsh
5
0004-12: conffiles/etc/pam.d/rsh
6
0004-12: conffiles/etc/pam.d/gdm
6
0004-12: conffiles/etc/pam.d/kdm
7
0004-12: conffiles/etc/pam.d/kscreensaver
7
0004-12: conffiles/etc/pam.d/kscreensaver
8
0004-12: conffiles/etc/pam.d/screen
8
0004-12: conffiles/etc/pam.d/screen
9
0004-12: conffiles/etc/pam.d/kcheckpass
9
0004-12: conffiles/etc/pam.d/kcheckpass
(-)a/branches/ucs-4.0/ucs-4.0-0/base/univention-pam/debian/univention-pam.maintscript (+2 lines)
Line 0    Link Here 
1
rm_conffile /etc/univention/templates/files/etc/pam.d/gdm 8.0.3-1~
2
rm_conffile /etc/security/access-gdm.conf 8.0.3-1~
(-)a/branches/ucs-4.0/ucs-4.0-0/base/univention-pam/debian/univention-pam.postinst (-4 / +10 lines)
 Lines 69-78   univention-config-registry set \ Link Here 
69
	"auth/ftp/group/Domain Admins?yes" \
69
	"auth/ftp/group/Domain Admins?yes" \
70
	auth/ftp/group/Administrators?"yes" \
70
	auth/ftp/group/Administrators?"yes" \
71
	auth/ftp/user/root?"yes" \
71
	auth/ftp/user/root?"yes" \
72
	auth/gdm/restrict?"yes" \
72
	auth/kdm/restrict?"yes" \
73
	"auth/gdm/group/Domain Admins?yes" \
73
	"auth/kdm/group/Domain Admins?yes" \
74
	auth/gdm/group/Administrators?"yes" \
74
	auth/kdm/group/Administrators?"yes" \
75
	auth/gdm/user/root?"yes" \
75
	auth/kdm/user/root?"yes" \
76
 	auth/login/restrict?"yes" \
76
 	auth/login/restrict?"yes" \
77
	"auth/login/group/Domain Admins?yes" \
77
	"auth/login/group/Domain Admins?yes" \
78
	auth/login/group/Administrators?"yes" \
78
	auth/login/group/Administrators?"yes" \
 Lines 162-165   call_joinscript 11univention-pam.inst Link Here 
162
162
163
#DEBHELPER#
163
#DEBHELPER#
164
164
165
# Bug #36743: remove gdm PAM files
166
if [ "$1" = configure ] && dpkg --compare-versions "$2" lt-nl 8.0.3-1; then
167
	univention-config-registry update
168
	univention-config-registry unset auth/gdm/restrict auth/gdm/group/'Domain Admins' auth/gdm/group/Administrators auth/gdm/user/root
169
fi
170
165
exit 0
171
exit 0
(-)a/branches/ucs-4.0/ucs-4.0-0/base/univention-pam/debian/univention-pam.univention-config-registry (-6 / +6 lines)
 Lines 194-208   Variables: users/default/.* Link Here 
194
Variables: groups/default/.*
194
Variables: groups/default/.*
195
195
196
Type: file
196
Type: file
197
File: etc/pam.d/gdm
197
File: etc/pam.d/kdm
198
Variables: auth/gdm/restrict
198
Variables: auth/kdm/restrict
199
Variables: auth/gdm/accessfile
199
Variables: auth/kdm/accessfile
200
Variables: pamaccess/maxent
200
Variables: pamaccess/maxent
201
201
202
Type: file
202
Type: file
203
File: etc/security/access-gdm.conf
203
File: etc/security/access-kdm.conf
204
Variables: auth/gdm/group/.*
204
Variables: auth/kdm/group/.*
205
Variables: auth/gdm/user/.*
205
Variables: auth/kdm/user/.*
206
Variables: users/default/.*
206
Variables: users/default/.*
207
Variables: groups/default/.*
207
Variables: groups/default/.*
208
208
(-)a/branches/ucs-4.0/ucs-4.0-0/base/univention-pam/debian/univention-pam.univention-config-registry-variables (-3 / +2 lines)
 Lines 233-240   Type=bool Link Here 
233
Categories=system-base
233
Categories=system-base
234
234
235
[auth/.*/restrict]
235
[auth/.*/restrict]
236
Description[de]=Die Option aktiviert über das PAM-Modul pam_access Anmeldebeschränkungen für den angegebenen Dienst. Ist die Variable auth/SERVICE/restrict aktiviert,  können sich nur Benutzer anmelden,  die über weitere Variablen in der Form auth/SERVICE/user/BENUTZERNAME=yes oder auth/SERVICE/group/GRUPPENNAME=yes zugelassen sind. Mögliche Werte als Service sind: chfn, chsh, cron, ftp, gdm, kcheckpass, kde, kscreensaver, login, other, passwd, ppp, rlogin, rsh, screen, sshd, su und sudo.
236
Description[de]=Die Option aktiviert über das PAM-Modul pam_access Anmeldebeschränkungen für den angegebenen Dienst. Ist die Variable auth/SERVICE/restrict aktiviert,  können sich nur Benutzer anmelden,  die über weitere Variablen in der Form auth/SERVICE/user/BENUTZERNAME=yes oder auth/SERVICE/group/GRUPPENNAME=yes zugelassen sind. Mögliche Werte als Service sind: chfn, chsh, cron, ftp, kdm, kcheckpass, kde, kscreensaver, login, other, passwd, ppp, rlogin, rsh, screen, sshd, su und sudo.
237
Description[en]=This option activates login restrictions for the given service using pam_access. If the variable auth/SERVICE/restrict is activated,  only users can login,  which are allows using variables in the form auth/SERVICE/user/USERNAME=yes or auth/SERVICE/group/GROUPNAME=yes. Possible values for the service are: chfn, chsh, cron, ftp, gdm, kcheckpass, kde, kscreensaver, login, other, passwd, ppp, rlogin, rsh, screen, sshd, su and sudo.
237
Description[en]=This option activates login restrictions for the given service using pam_access. If the variable auth/SERVICE/restrict is activated,  only users can login,  which are allows using variables in the form auth/SERVICE/user/USERNAME=yes or auth/SERVICE/group/GROUPNAME=yes. Possible values for the service are: chfn, chsh, cron, ftp, kdm, kcheckpass, kde, kscreensaver, login, other, passwd, ppp, rlogin, rsh, screen, sshd, su and sudo.
238
Type=bool
238
Type=bool
239
Categories=system-base
239
Categories=system-base
240
240
241
- 

Return to bug 36743