From 264f2be5f341b9946381d84ebaffc95f9199990b Mon Sep 17 00:00:00 2001 From: root Date: Tue, 24 Apr 2012 00:01:27 +0000 Subject: Tue Apr 24 00:01:27 UTC 2012 --- testing/anjuta-extras/PKGBUILD | 4 +- testing/anjuta/PKGBUILD | 4 +- testing/dnsutils/PKGBUILD | 52 +++++++++++++++++++++++++ testing/dnsutils/remove-bind.patch | 25 ++++++++++++ testing/gdl/PKGBUILD | 6 +-- testing/gmime/PKGBUILD | 6 +-- testing/gtkpod/PKGBUILD | 32 +++++++++++++++ testing/gtkpod/gtkpod.install | 12 ++++++ testing/ldns/Makefile.patch | 20 ++++++++++ testing/ldns/PKGBUILD | 45 ++++++++++++++++++++++ testing/nx/PKGBUILD | 26 ++++++++----- testing/openssh/PKGBUILD | 77 +++++++++++++++++++++++++++++++++++++ testing/openssh/sshd | 45 ++++++++++++++++++++++ testing/openssh/sshd.close-sessions | 17 ++++++++ testing/openssh/sshd.confd | 4 ++ testing/openssh/sshd.pam | 12 ++++++ 16 files changed, 368 insertions(+), 19 deletions(-) create mode 100644 testing/dnsutils/PKGBUILD create mode 100644 testing/dnsutils/remove-bind.patch create mode 100644 testing/gtkpod/PKGBUILD create mode 100644 testing/gtkpod/gtkpod.install create mode 100644 testing/ldns/Makefile.patch create mode 100644 testing/ldns/PKGBUILD create mode 100644 testing/openssh/PKGBUILD create mode 100755 testing/openssh/sshd create mode 100644 testing/openssh/sshd.close-sessions create mode 100644 testing/openssh/sshd.confd create mode 100644 testing/openssh/sshd.pam (limited to 'testing') diff --git a/testing/anjuta-extras/PKGBUILD b/testing/anjuta-extras/PKGBUILD index 8996ddc61..b80ea1282 100644 --- a/testing/anjuta-extras/PKGBUILD +++ b/testing/anjuta-extras/PKGBUILD @@ -1,10 +1,10 @@ -# $Id: PKGBUILD 155009 2012-04-01 11:30:33Z heftig $ +# $Id: PKGBUILD 156690 2012-04-22 23:48:32Z heftig $ # Maintainer: Jan Alexander Steffens (heftig) # Contributor: Jan de Groot pkgname=anjuta-extras pkgver=3.4.0 -pkgrel=1 +pkgrel=2 pkgdesc="Anjuta Integrated Development Environment extra plugins" arch=('i686' 'x86_64') license=('GPL') diff --git a/testing/anjuta/PKGBUILD b/testing/anjuta/PKGBUILD index 04d037a42..ef11325cc 100644 --- a/testing/anjuta/PKGBUILD +++ b/testing/anjuta/PKGBUILD @@ -1,10 +1,10 @@ -# $Id: PKGBUILD 155007 2012-04-01 11:30:31Z heftig $ +# $Id: PKGBUILD 156687 2012-04-22 23:46:10Z heftig $ # Maintainer: Andreas Radke # Contributor: Harley Laue pkgname=anjuta pkgver=3.4.0 -pkgrel=2 +pkgrel=3 pkgdesc="GNOME Integrated Development Environment (IDE)" arch=('i686' 'x86_64') license=('GPL') diff --git a/testing/dnsutils/PKGBUILD b/testing/dnsutils/PKGBUILD new file mode 100644 index 000000000..ebfb32c78 --- /dev/null +++ b/testing/dnsutils/PKGBUILD @@ -0,0 +1,52 @@ +# $Id: PKGBUILD 156648 2012-04-22 08:05:14Z bisson $ +# Maintainer: Gaetan Bisson +# Contributor: kevin +# Contributor: mario + +pkgname=dnsutils + +# Use a period and not a hyphen before the patch level for proper versioning. +pkgver=9.9.0 +_pkgver=9.9.0 +pkgrel=2 + +pkgdesc='DNS utilities: dig host nslookup' +url='http://www.isc.org/software/bind/' +license=('custom:ISC') +arch=('i686' 'x86_64') +options=('!makeflags') +depends=('openssl' 'krb5' 'idnkit' 'dnssec-anchors') +source=("http://ftp.isc.org/isc/bind9/${_pkgver}/bind-${_pkgver}.tar.gz" + 'remove-bind.patch') +sha1sums=('6be77c75c8649088b0ae7124d819b5f412bb0094' + 'b465ef6160b004838f04de9978fe1be8422af777') + +replaces=('bind-tools' 'host') + +build() { + cd "${srcdir}/bind-${_pkgver}" + + patch -p1 -i ../remove-bind.patch + export STD_CDEFINES='-DDIG_SIGCHASE' + + # hack to remove unused bloat from the binaries + CFLAGS+=' -fdata-sections -ffunction-sections' + LDFLAGS+=' -Wl,--gc-sections' + + ./configure \ + --prefix=/usr \ + --sysconfdir=/etc \ + --localstatedir=/var \ + --disable-static \ + --disable-linux-caps \ + --with-openssl \ + --with-idn \ + + make +} + +package() { + cd "${srcdir}/bind-${_pkgver}" + install -Dm644 COPYRIGHT "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE" + cd bin; make DESTDIR="${pkgdir}" install +} diff --git a/testing/dnsutils/remove-bind.patch b/testing/dnsutils/remove-bind.patch new file mode 100644 index 000000000..19d650964 --- /dev/null +++ b/testing/dnsutils/remove-bind.patch @@ -0,0 +1,25 @@ +diff -aur old/bin/Makefile.in new/bin/Makefile.in +--- old/bin/Makefile.in 2009-10-05 05:07:08.000000000 -0700 ++++ new/bin/Makefile.in 2011-08-28 19:16:17.245495043 -0700 +@@ -19,8 +19,7 @@ + VPATH = @srcdir@ + top_srcdir = @top_srcdir@ + +-SUBDIRS = named rndc dig dnssec tests tools nsupdate \ +- check confgen @PKCS11_TOOLS@ ++SUBDIRS = dig + TARGETS = + + @BIND9_MAKE_RULES@ +diff -aur old/lib/Makefile.in new/lib/Makefile.in +--- old/lib/Makefile.in 2007-06-19 16:47:13.000000000 -0700 ++++ new/lib/Makefile.in 2011-08-28 19:17:50.828688599 -0700 +@@ -23,7 +23,7 @@ + # Attempt to disable parallel processing. + .NOTPARALLEL: + .NO_PARALLEL: +-SUBDIRS = isc isccc dns isccfg bind9 lwres tests ++SUBDIRS = isc dns isccfg bind9 lwres + TARGETS = + + @BIND9_MAKE_RULES@ diff --git a/testing/gdl/PKGBUILD b/testing/gdl/PKGBUILD index c352df8e9..17cd5f6b6 100644 --- a/testing/gdl/PKGBUILD +++ b/testing/gdl/PKGBUILD @@ -1,8 +1,8 @@ -# $Id: PKGBUILD 155076 2012-04-01 11:32:13Z heftig $ +# $Id: PKGBUILD 156686 2012-04-22 23:41:34Z heftig $ # Maintainer: Jan de Groot pkgname=gdl -pkgver=3.4.1 +pkgver=3.4.2 pkgrel=1 pkgdesc="GNOME Docking Library" arch=(i686 x86_64) @@ -12,7 +12,7 @@ depends=('gtk3') makedepends=('gtk-doc' 'intltool' 'gobject-introspection') options=('!libtool') source=(http://ftp.gnome.org/pub/GNOME/sources/$pkgname/${pkgver%.*}/$pkgname-$pkgver.tar.xz) -sha256sums=('82fedce869a40d36394faa441472318746f7431ae051d99ada6df206ba027f5e') +sha256sums=('66eeca8aa8e7205abf38911a9eadfbd288967f92388682bd62942ed4f1db4906') build() { cd "$pkgname-$pkgver" diff --git a/testing/gmime/PKGBUILD b/testing/gmime/PKGBUILD index 144cc95b4..9459596a7 100644 --- a/testing/gmime/PKGBUILD +++ b/testing/gmime/PKGBUILD @@ -1,9 +1,9 @@ -# $Id: PKGBUILD 156594 2012-04-21 11:48:59Z ibiru $ +# $Id: PKGBUILD 156679 2012-04-22 23:09:57Z heftig $ # Maintainer: Jan de Groot # Contributor: Ben pkgname=gmime -pkgver=2.6.8 +pkgver=2.6.9 pkgrel=1 pkgdesc="Core mime parsing library" arch=('i686' 'x86_64') @@ -13,7 +13,7 @@ depends=('glib2' 'gpgme' 'zlib') makedepends=('gtk-sharp-2') options=('!libtool') source=(http://ftp.gnome.org/pub/GNOME/sources/$pkgname/${pkgver%.*}/$pkgname-$pkgver.tar.xz) -sha256sums=('cf434bc52329554b403ce08344a9c429f5807bbd67b2f1a6857daa145a2830d7') +sha256sums=('5ebb60a35fa5c0789fe10f6e4af5040cb7bc4a707a8a962fbd57b4fc5595c0b9') build() { # get rid of that .wapi errors in fakeroot diff --git a/testing/gtkpod/PKGBUILD b/testing/gtkpod/PKGBUILD new file mode 100644 index 000000000..7a3a1dff6 --- /dev/null +++ b/testing/gtkpod/PKGBUILD @@ -0,0 +1,32 @@ +# $Id: PKGBUILD 156691 2012-04-22 23:50:01Z heftig $ +# Maintainer: Kevin Piche +# Contributor: Aaron Griffin + +pkgname=gtkpod +pkgver=2.1.1 +pkgrel=2 +pkgdesc="A platform independent GUI for Apple's iPod using GTK3" +arch=('i686' 'x86_64') +url="http://gtkpod.sourceforge.net" +license=('GPL') +depends=('anjuta' 'curl' 'flac' 'libid3tag' 'libgpod' 'awk') +makedepends=('flex' 'intltool') +optdepends=('libmp4v2: MP4/h264 support' + 'vorbis-tools: OGG support' + 'id3v2: mp3 conversion support') +install=gtkpod.install +options=('!libtool') +source=("http://downloads.sourceforge.net/gtkpod/${pkgname}-${pkgver}.tar.gz") +md5sums=('36fd0324fd1d1da00fcddacef1b09983') + +build() { + cd "${srcdir}/${pkgname}-${pkgver}" + sed -i 's#python#python2#' scripts/sync-palm-jppy.py + ./configure --prefix=/usr + make +} + +package() { + cd "${srcdir}/${pkgname}-${pkgver}" + make DESTDIR="${pkgdir}" install +} diff --git a/testing/gtkpod/gtkpod.install b/testing/gtkpod/gtkpod.install new file mode 100644 index 000000000..c5d357a38 --- /dev/null +++ b/testing/gtkpod/gtkpod.install @@ -0,0 +1,12 @@ +post_install() { + gtk-update-icon-cache -q -t -f usr/share/icons/hicolor + glib-compile-schemas usr/share/glib-2.0/schemas +} + +post_upgrade() { + post_install $1 +} + +post_remove() { + post_install $1 +} diff --git a/testing/ldns/Makefile.patch b/testing/ldns/Makefile.patch new file mode 100644 index 000000000..d98291ac9 --- /dev/null +++ b/testing/ldns/Makefile.patch @@ -0,0 +1,20 @@ +--- old/Makefile.in 2012-01-12 00:11:36.000000000 +1100 ++++ new/Makefile.in 2012-01-27 11:36:16.110154453 +1100 +@@ -130,7 +130,7 @@ + exit -1 ; \ + fi + drill/drill: $(DRILL_LOBJS) $(LIB) +- $(LINK_EXE) $(DRILL_LOBJS) $(LIBS) -lldns -o drill/drill ++ $(LINK_EXE) $(DRILL_LOBJS) $(LIBS) $(LIBSSL_LIBS) -lldns -o drill/drill + + install-drill: drill/drill + $(INSTALL) -m 755 -d $(DESTDIR)$(bindir) +@@ -157,7 +157,7 @@ + exit -1 ; \ + fi + $(EXAMPLE_PROGS): $(EXAMPLE_LOBJS) $(LIB) +- $(LINK_EXE) $@.lo $(LIBS) -lldns -o $@ ++ $(LINK_EXE) $@.lo $(LIBS) $(LIBSSL_LIBS) -lldns -o $@ + + $(TESTNS): $(TESTNS_LOBJS) $(LIB) + $(LINK_EXE) $(TESTNS_LOBJS) $(LIBS) -lldns -o $(TESTNS) diff --git a/testing/ldns/PKGBUILD b/testing/ldns/PKGBUILD new file mode 100644 index 000000000..d113c41ec --- /dev/null +++ b/testing/ldns/PKGBUILD @@ -0,0 +1,45 @@ +# $Id: PKGBUILD 156650 2012-04-22 08:06:30Z bisson $ +# Maintainer: Gaetan Bisson +# Contributor: mathieui +# Contributor: jiribb + +pkgname=ldns +pkgver=1.6.12 +pkgrel=2 +pkgdesc='Fast DNS library supporting recent RFCs' +url='http://www.nlnetlabs.nl/projects/ldns/' +license=('custom:BSD') +arch=('i686' 'x86_64') +options=('!libtool') +depends=('openssl' 'dnssec-anchors') +optdepends=('libpcap: ldns-dpa tool') +makedepends=('libpcap') +source=("http://www.nlnetlabs.nl/downloads/${pkgname}/${pkgname}-${pkgver}.tar.gz" + 'Makefile.patch') +sha1sums=('1d61df0f666908551d5a62768f77d63e727810aa' + '01bce260e9639d9cd26109a689dddf2498e5026a') + +build() { + cd "${srcdir}/${pkgname}-${pkgver}" + + patch -p1 -i ../Makefile.patch + + ./configure \ + --prefix=/usr \ + --sysconfdir=/etc \ + --localstatedir=/var \ + --enable-static=no \ + --disable-rpath \ + --with-drill \ + --with-examples \ + + make +} + +package() { + cd "${srcdir}/${pkgname}-${pkgver}" + + make DESTDIR="${pkgdir}" install + + install -D -m644 LICENSE "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE" +} diff --git a/testing/nx/PKGBUILD b/testing/nx/PKGBUILD index 6db55bcd4..4cf19311a 100644 --- a/testing/nx/PKGBUILD +++ b/testing/nx/PKGBUILD @@ -1,10 +1,10 @@ -# $Id: PKGBUILD 156624 2012-04-21 23:25:48Z andyrtr $ +# $Id: PKGBUILD 156665 2012-04-22 17:10:42Z andyrtr $ # Maintainer: Andreas Radke pkgbase=nx pkgname=('libxcomp' 'nxproxy' 'nx-x11' 'nx-xcompext' 'nxagent' 'nx-headers') pkgver=3.5.0.12 -pkgrel=1 +pkgrel=2 arch=('i686' 'x86_64') url="http://wiki.x2go.org/" license=('GPL') @@ -41,8 +41,11 @@ package_nxproxy() { pkgdesc="NX proxy" depends=('libxcomp') - install -dm755 ${pkgdir}/usr/{bin,share/man/man1,lib/nx} - cp -a ${srcdir}/fakeinstall/usr/bin/nxproxy ${pkgdir}/usr/lib/nx + install -dm755 ${pkgdir}/usr/{bin,share/man/man1,lib/nx/bin} + cp -a ${srcdir}/fakeinstall/usr/bin/nxproxy ${pkgdir}/usr/lib/nx/bin + cd ${pkgdir}/usr/lib/nx + ln -sv /usr/lib/nx/bin/nxproxy . + # the wrapper cp -a ${srcdir}/nx-libs_$pkgver/bin/nxproxy ${pkgdir}/usr/bin chmod +x ${pkgdir}/usr/bin/nxproxy @@ -55,7 +58,6 @@ package_nx-xcompext() { depends=('libxcomp' 'nx-x11') install -dm755 ${pkgdir}/usr/lib/nx - #cp -a ${srcdir}/fakeinstall/usr/lib/nx/libXcompext.so* ${pkgdir}/usr/lib/nx cp -a ${srcdir}/fakeinstall/usr/lib/nx/libXcompext.so.3.5.0 ${pkgdir}/usr/lib/nx cd ${pkgdir}/usr/lib/nx ln -sv libXcompext.so.3.5.0 libXcompext.so.3 @@ -69,10 +71,13 @@ package_nx-x11() { pkgdesc="NX-X11 lib for the NX framework" depends=('libxcomp') - install -dm755 ${pkgdir}/{etc/ld.so.conf.d,usr/bin,usr/lib/nx} + install -dm755 ${pkgdir}/{etc/ld.so.conf.d,usr/bin,usr/lib/nx/bin} cp -aR ${srcdir}/fakeinstall/usr/lib/NX3/lib*/nx/lib*.so* ${pkgdir}/usr/lib/nx - cp -a ${srcdir}/fakeinstall/usr/lib/NX3/bin/nxauth ${pkgdir}/usr/lib/nx + cp -a ${srcdir}/fakeinstall/usr/lib/NX3/bin/nxauth ${pkgdir}/usr/lib/nx/bin + cd ${pkgdir}/usr/lib/nx + ln -sv /usr/lib/nx/bin/nxauth . + # the wrapper cp -a ${srcdir}/nx-libs_$pkgver/bin/nxauth ${pkgdir}/usr/bin chmod +x ${pkgdir}/usr/bin/nxauth @@ -85,8 +90,11 @@ package_nxagent() { pkgdesc="NX X server based on Xnest" depends=('nx-xcompext') - install -dm755 ${pkgdir}/usr/{bin,lib/nx} - cp -aR ${srcdir}/fakeinstall/usr/lib/NX3/bin/nxagent ${pkgdir}/usr/lib/nx + install -dm755 ${pkgdir}/usr/{bin,lib/nx/bin} + cp -aR ${srcdir}/fakeinstall/usr/lib/NX3/bin/nxagent ${pkgdir}/usr/lib/nx/bin + cd ${pkgdir}/usr/lib/nx + ln -sv /usr/lib/nx/bin/nxagent . + # the wrapper cp -a ${srcdir}/nx-libs_$pkgver/bin/nxagent ${pkgdir}/usr/bin chmod +x ${pkgdir}/usr/bin/nxagent diff --git a/testing/openssh/PKGBUILD b/testing/openssh/PKGBUILD new file mode 100644 index 000000000..0a52bc805 --- /dev/null +++ b/testing/openssh/PKGBUILD @@ -0,0 +1,77 @@ +# $Id: PKGBUILD 156652 2012-04-22 08:07:55Z bisson $ +# Maintainer: Gaetan Bisson +# Contributor: Aaron Griffin +# Contributor: judd + +pkgname=openssh +pkgver=6.0p1 +pkgrel=1 +pkgdesc='Free version of the SSH connectivity tools' +url='http://www.openssh.org/portable.html' +license=('custom:BSD') +arch=('i686' 'x86_64') +depends=('krb5' 'openssl' 'libedit' 'ldns') +optdepends=('x11-ssh-askpass: input passphrase in X without a terminal') +source=("ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/${pkgname}-${pkgver}.tar.gz" + 'sshd.close-sessions' + 'sshd.confd' + 'sshd.pam' + 'sshd') +sha1sums=('f691e53ef83417031a2854b8b1b661c9c08e4422' + '954bf1660aa32620c37034320877f4511b767ccb' + 'ec102deb69cad7d14f406289d2fc11fee6eddbdd' + '3413909fd45a28701c92e6e5b59c6b65346ddb0f' + '21fa88de6cc1c7912e71655f50896ba17991a1c2') + +backup=('etc/ssh/ssh_config' 'etc/ssh/sshd_config' 'etc/pam.d/sshd' 'etc/conf.d/sshd') + +build() { + cd "${srcdir}/${pkgname}-${pkgver}" + + ./configure \ + --prefix=/usr \ + --libexecdir=/usr/lib/ssh \ + --sysconfdir=/etc/ssh \ + --with-ldns \ + --with-libedit \ + --with-ssl-engine \ + --with-pam \ + --with-privsep-user=nobody \ + --with-kerberos5=/usr \ + --with-xauth=/usr/bin/xauth \ + --with-mantype=man \ + --with-md5-passwords \ + + make +} + +check() { + cd "${srcdir}/${pkgname}-${pkgver}" + + # The connect.sh test must be run by a user with a decent login shell; + # chroot builds use nobody with /bin/false. + make tests || true +} + +package() { + cd "${srcdir}/${pkgname}-${pkgver}" + make DESTDIR="${pkgdir}" install + + install -Dm755 ../sshd "${pkgdir}"/etc/rc.d/sshd + install -Dm644 ../sshd.pam "${pkgdir}"/etc/pam.d/sshd + install -Dm644 ../sshd.confd "${pkgdir}"/etc/conf.d/sshd + install -Dm644 LICENCE "${pkgdir}/usr/share/licenses/${pkgname}/LICENCE" + install -Dm755 ../sshd.close-sessions "${pkgdir}/etc/rc.d/functions.d/sshd-close-sessions" # FS#17389 + + rm "${pkgdir}"/usr/share/man/man1/slogin.1 + ln -sf ssh.1.gz "${pkgdir}"/usr/share/man/man1/slogin.1.gz + + install -Dm755 contrib/findssl.sh "${pkgdir}"/usr/bin/findssl.sh + install -Dm755 contrib/ssh-copy-id "${pkgdir}"/usr/bin/ssh-copy-id + install -Dm644 contrib/ssh-copy-id.1 "${pkgdir}"/usr/share/man/man1/ssh-copy-id.1 + + sed \ + -e '/^#ChallengeResponseAuthentication yes$/c ChallengeResponseAuthentication no' \ + -e '/^#UsePAM no$/c UsePAM yes' \ + -i "${pkgdir}"/etc/ssh/sshd_config +} diff --git a/testing/openssh/sshd b/testing/openssh/sshd new file mode 100755 index 000000000..1d68fb877 --- /dev/null +++ b/testing/openssh/sshd @@ -0,0 +1,45 @@ +#!/bin/bash + +. /etc/rc.conf +. /etc/rc.d/functions +. /etc/conf.d/sshd + +PIDFILE=/var/run/sshd.pid +PID=$(cat $PIDFILE 2>/dev/null) +if ! readlink -q /proc/$PID/exe | grep -q '^/usr/sbin/sshd'; then + PID= + rm $PIDFILE 2>/dev/null +fi + +case "$1" in + start) + stat_busy 'Starting Secure Shell Daemon' + /usr/bin/ssh-keygen -A + [[ -d /var/empty ]] || mkdir -p /var/empty + [[ -z $PID ]] && /usr/sbin/sshd $SSHD_ARGS + if [[ $? -gt 0 ]]; then + stat_fail + else + add_daemon sshd + stat_done + fi + ;; + stop) + stat_busy 'Stopping Secure Shell Daemon' + [[ ! -z $PID ]] && kill $PID &> /dev/null + if [[ $? -gt 0 ]]; then + stat_fail + else + rm_daemon sshd + stat_done + fi + ;; + restart) + $0 stop + sleep 1 + $0 start + ;; + *) + echo "usage: $0 {start|stop|restart}" +esac +exit 0 diff --git a/testing/openssh/sshd.close-sessions b/testing/openssh/sshd.close-sessions new file mode 100644 index 000000000..be2a709fc --- /dev/null +++ b/testing/openssh/sshd.close-sessions @@ -0,0 +1,17 @@ +# Close sshd sessions before shutting down the network; see FS#17389. + +sshd_close_sessions () { + if ck_daemon sshd; then + return + fi + /etc/rc.d/sshd stop + stat_busy "Stopping Secure Shell Sessions" + for i in $(pgrep sshd); do + if readlink -q /proc/$i/exe | grep -q '^/usr/sbin/sshd'; then + kill $i + fi + done &>/dev/null + stat_done +} + +add_hook shutdown_start sshd_close_sessions diff --git a/testing/openssh/sshd.confd b/testing/openssh/sshd.confd new file mode 100644 index 000000000..5ce7c0079 --- /dev/null +++ b/testing/openssh/sshd.confd @@ -0,0 +1,4 @@ +# +# Parameters to be passed to sshd +# +SSHD_ARGS="" diff --git a/testing/openssh/sshd.pam b/testing/openssh/sshd.pam new file mode 100644 index 000000000..c7b91cdfb --- /dev/null +++ b/testing/openssh/sshd.pam @@ -0,0 +1,12 @@ +#%PAM-1.0 +#auth required pam_securetty.so #Disable remote root +auth required pam_unix.so +auth required pam_env.so +account required pam_nologin.so +account required pam_unix.so +account required pam_time.so +password required pam_unix.so +session required pam_unix_session.so +session required pam_limits.so +-session optional pam_ck_connector.so nox11 +-session optional pam_systemd.so -- cgit v1.2.3-54-g00ecf