1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-01-15 15:41:54 +01:00
slackware-current/source/a/etc/etc.SlackBuild

84 lines
3 KiB
Text
Raw Normal View History

#!/bin/bash
# Copyright 2005-2018 Patrick J. Volkerding, Sebeka, MN, USA
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
# permitted provided that the following conditions are met:
#
# 1. Redistributions of this script must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=etc
VERSION=15.0
Tue Aug 31 20:58:13 UTC 2021 a/etc-15.0-x86_64-16.txz: Rebuilt. Added dhcpcd:dhcpcd (68:68) user and group. Thanks to Paul Blazejowski. a/kernel-firmware-20210830_2e271f2-noarch-1.txz: Upgraded. a/ntfs-3g-2021.8.22-x86_64-1.txz: Upgraded. Shared library .so-version bump. Fixed vulnerabilities that may allow an attacker using a maliciously crafted NTFS-formatted image file or external storage to potentially execute arbitrary privileged code. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33285 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35269 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35268 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33289 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33286 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35266 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33287 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35267 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39251 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39252 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39253 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39254 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39255 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39256 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39257 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39258 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39259 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39260 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39261 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39262 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39263 (* Security fix *) d/mercurial-5.9.1-x86_64-1.txz: Upgraded. d/python3-3.9.7-x86_64-1.txz: Upgraded. kde/bluedevil-5.22.5-x86_64-1.txz: Upgraded. kde/breeze-5.22.5-x86_64-1.txz: Upgraded. kde/breeze-grub-5.22.5-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.22.5-x86_64-1.txz: Upgraded. kde/drkonqi-5.22.5-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.22.5-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.22.5-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.22.5-x86_64-1.txz: Upgraded. kde/kdecoration-5.22.5-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.22.5-x86_64-1.txz: Upgraded. kde/kgamma5-5.22.5-x86_64-1.txz: Upgraded. kde/khotkeys-5.22.5-x86_64-1.txz: Upgraded. kde/kinfocenter-5.22.5-x86_64-1.txz: Upgraded. kde/kmenuedit-5.22.5-x86_64-1.txz: Upgraded. kde/kscreen-5.22.5-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.22.5-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.22.5-x86_64-1.txz: Upgraded. kde/ksystemstats-5.22.5-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.22.5-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.22.5-x86_64-1.txz: Upgraded. kde/kwayland-server-5.22.5-x86_64-1.txz: Upgraded. kde/kwin-5.22.5-x86_64-1.txz: Upgraded. kde/kwrited-5.22.5-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.22.5-x86_64-1.txz: Upgraded. kde/libkscreen-5.22.5-x86_64-1.txz: Upgraded. kde/libksysguard-5.22.5-x86_64-1.txz: Upgraded. kde/milou-5.22.5-x86_64-1.txz: Upgraded. kde/oxygen-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-disks-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-integration-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-nm-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-pa-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-vault-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.22.5-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.22.5-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.22.5-x86_64-1.txz: Upgraded. kde/powerdevil-5.22.5-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.22.5-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.22.5-x86_64-1.txz: Upgraded. kde/systemsettings-5.22.5-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.22.5-x86_64-1.txz: Upgraded. l/mozilla-nss-3.69.1-x86_64-1.txz: Upgraded. xap/xlockmore-5.67-x86_64-1.txz: Upgraded.
2021-08-31 22:58:13 +02:00
BUILD=${BUILD:-16}
# Automatically determine the architecture we're building on:
if [ -z "$ARCH" ]; then
case "$( uname -m )" in
i?86) export ARCH=i586 ;;
arm*) export ARCH=arm ;;
# Unless $ARCH is already set, use uname -m for all other archs:
*) export ARCH=$( uname -m ) ;;
esac
fi
# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
# the name of the created package would be, and then exit. This information
# could be useful to other scripts.
if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
echo "$PKGNAM-$VERSION-$ARCH-$BUILD.txz"
exit 0
fi
TMP=${TMP:-/tmp}
PKG=$TMP/package-etc
rm -rf $PKG
mkdir -p $TMP $PKG
# Explode the package framework:
cd $PKG
explodepkg $CWD/_etc.tar.gz
# Fix for ARCH:
sed -i -e "s#/i586-slackware-linux#/${ARCH}-slackware-linux#" etc/ld.so.conf.new
# Fix paths if lib64 is needed:
if [ "$ARCH" = "x86_64" ]; then
sed -i -e "s#/lib#/lib64#" etc/ld.so.conf.new
fi
zcat $CWD/nsswitch.conf.gz > $PKG/etc/nsswitch.conf.new
# Check to make sure that shadow has the same number of entries
# as passwd:
if [ ! "$(cat $CWD/passwd.new | wc -l)" = "$(cat $CWD/shadow.new | wc -l)" ]; then
echo "#######################################################################################"
echo "# WARNING: /etc/passwd.new and /etc/shadow.new don't have the same number of entries. #"
echo "#######################################################################################"
sleep 60
fi
# Install default passwd/shadow/group (sorted):
sort -n -t ':' -k3 $CWD/passwd.new > $PKG/etc/passwd.new
awk -F':' 'NR==FNR{z[$1]=$0;next}{print z[$1]}' $CWD/shadow.new $PKG/etc/passwd.new > $PKG/etc/shadow.new
sort -n -t ':' -k3 $CWD/group.new > $PKG/etc/group.new
mkdir -p $PKG/install
cat $CWD/slack-desc > $PKG/install/slack-desc
zcat $CWD/doinst.sh.gz > $PKG/install/doinst.sh
# Build the package:
cd $PKG
/sbin/makepkg -l y -c n $TMP/etc-$VERSION-$ARCH-$BUILD.txz