summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDaniil Baturin <daniil@baturin.org>2025-04-09 18:30:21 +0100
committerDaniil Baturin <daniil@baturin.org>2025-04-09 18:31:23 +0100
commit7f9dfe54ff5c1668d30f04b79014825d3c8aff4c (patch)
treef58b896270a3c3e48197a26d7a4e4e8b2831ec5b
parentc14d4c2359b6c507467051a67935603038528889 (diff)
downloadlibpam-radius-auth-7f9dfe54ff5c1668d30f04b79014825d3c8aff4c.tar.gz
libpam-radius-auth-7f9dfe54ff5c1668d30f04b79014825d3c8aff4c.zip
packaging: T7336: rename the packages to vyos-libpam-radius-auth and vyos-radius-shell
for easier dependency management
-rw-r--r--debian/control12
1 files changed, 6 insertions, 6 deletions
diff --git a/debian/control b/debian/control
index ab7fa1c..efea7d2 100644
--- a/debian/control
+++ b/debian/control
@@ -1,22 +1,22 @@
-Source: libpam-radius-auth
-Maintainer: dev-support <dev-support@cumulusnetworks.com>
+Source: vyos-libpam-radius-auth
+Maintainer: VyOS maintainers <maintainers@vyos.io>
Section: libs
Priority: extra
Standards-Version: 3.9.6
Build-Depends: libpam0g-dev | libpam-dev, debhelper (>= 12), libaudit-dev, libcap-dev
-Package: libpam-radius-auth
+Package: vyos-libpam-radius-auth
Architecture: any
-Depends: ${shlibs:Depends}, ${misc:Depends}, libaudit1, radius-shell
+Depends: ${shlibs:Depends}, ${misc:Depends}, libaudit1, vyos-radius-shell
Description: PAM RADIUS client authentication module
This is the PAM to RADIUS authentication module. It allows any PAM-capable
machine to become a RADIUS client for authentication and accounting
requests. You will, however, need to supply your own RADIUS server to
perform the actual authentication
-Package: radius-shell
+Package: vyos-radius-shell
Architecture: any
-Depends: ${shlibs:Depends}, ${misc:Depends}, libaudit1, libcap2-bin, libcap2, libnss-mapuser
+Depends: ${shlibs:Depends}, ${misc:Depends}, libaudit1, libcap2-bin, libcap2, vyos-libnss-mapuser
Description: Shell front-end used for radius users.
This provides a uid fixup program. Due to the limitations of the
RADIUS protocol, we can't tell whether a user is privileged until