summaryrefslogtreecommitdiff
path: root/debian
diff options
context:
space:
mode:
Diffstat (limited to 'debian')
-rw-r--r--debian/changelog41
-rw-r--r--debian/control4
-rw-r--r--debian/libpam-radius-auth.dirs1
-rw-r--r--debian/libpam-radius-auth.install1
-rw-r--r--debian/libpam-radius-auth.postinst9
-rw-r--r--debian/libpam-radius-auth.prerm9
-rw-r--r--debian/radius2
-rwxr-xr-xdebian/rules3
-rw-r--r--debian/source/format3
9 files changed, 63 insertions, 10 deletions
diff --git a/debian/changelog b/debian/changelog
index 377a829..78fcafa 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,36 @@
+libpam-radius-auth (1.5.0-cl3u7) RELEASED; urgency=low
+ * Closes: CM-24829 - Fixed order setting vrf and binding to source address
+
+ -- dev-support <dev-support@cumulusnetworks.com> Fri, 01 Mar 2019 14:21:25 -0800
+
+libpam-radius-auth (1.5.0-cl3u6) RELEASED; urgency=low
+ * Do not show passwd when debugging enabled
+
+ -- dev-support <dev-support@cumulusnetworks.com> Fri, 01 Mar 2019 14:21:25 -0800
+
+libpam-radius-auth (1.5.0-cl3u5) RELEASED; urgency=low
+ * Closes: CM-23004 - local account password was allowed even when
+ RADIUS server could be reached and was authoritative for the accountname
+
+ -- dev-support <dev-support@cumulusnetworks.com> Thu, 15 Nov 2018 13:51:34 -0800
+
+libpam-radius-auth (1.5.0-cl3u4) RELEASED; urgency=low
+ * fixed radius_shell to ensure euid set also, when run as a local user
+ shell (so user can still login when the radius server is done).
+
+ -- dev-support <dev-support@cumulusnetworks.com> Tue, 28 Aug 2018 11:52:21 -0700
+
+libpam-radius-auth (1.5.0-cl3u3) RELEASED; urgency=low
+ * minor bug fix
+
+ -- dev-support <dev-support@cumulusnetworks.com> Mon, 25 Jun 2018 22:07:29 -0700
+
+libpam-radius-auth (1.5.0-cl3u2) RELEASED; urgency=low
+ * Closes: CM-20649 - Fixed problem that didn't create the home directory
+ for privileged login users.
+
+ -- dev-support <dev-support@cumulusnetworks.com> Wed, 18 Apr 2018 18:24:48 -0700
+
libpam-radius-auth (1.5.0-cl3u1) RELEASED; urgency=low
* New Enabled - When the Vendor Specific Option (VSA) containing
shell:priv-lvl is present and and the level value is >= to the level
@@ -10,20 +43,20 @@ libpam-radius-auth (1.5.0-cl3u1) RELEASED; urgency=low
groups at install, therefore privileged radius users can sudo, and
can run 'net add', 'net commit', etc.
- -- Dave Olson <olson@cumulusnetworks.com> Sun, 15 Apr 2018 14:53:33 -0700
+ -- dev-support <dev-support@cumulusnetworks.com> Sun, 15 Apr 2018 14:53:33 -0700
libpam-radius-auth (1.4.1-cl3u3) RELEASED; urgency=low
* Closes CM-19908 - Logging changed to use pam_syslog, log message format
now has program invoking, not just pam_radius_auth
- -- Dave Olson <olson@cumulusnetworks.com> Tue, 27 Feb 2018 14:47:22 -0800
+ -- dev-support <dev-support@cumulusnetworks.com> Tue, 27 Feb 2018 14:47:22 -0800
libpam-radius-auth (1.4.1-cl3u2) RELEASED; urgency=low
* Improved documentation in man pages
- -- Dave Olson <olson@cumulusnetworks.com> Tue, 23 Jan 2018 16:03:38 -0800
+ -- dev-support <dev-support@cumulusnetworks.com> Tue, 23 Jan 2018 16:03:38 -0800
libpam-radius-auth (1.4.1-cl3u1) RELEASED; urgency=low
@@ -31,7 +64,7 @@ libpam-radius-auth (1.4.1-cl3u1) RELEASED; urgency=low
to get UID, GID, and base of home directory, so radius users
do not need to have an account created locally (or via LDAP)
- -- Dave Olson <olson@cumulusnetworks.com> Fri, 16 Jun 2017 15:44:12 -0700
+ -- dev-support <dev-support@cumulusnetworks.com> Fri, 16 Jun 2017 15:44:12 -0700
libpam-radius-auth (1.4.0) unstable; urgency=low
diff --git a/debian/control b/debian/control
index 969e8f5..ce22bf9 100644
--- a/debian/control
+++ b/debian/control
@@ -16,9 +16,9 @@ Description: PAM RADIUS client authentication module
Package: radius-shell
Architecture: any
-Depends: ${shlibs:Depends}, ${misc:Depends}, libaudit1, libcap2-bin, libcap2, libnss-mapuser, vyatta-cfg-system
+Depends: ${shlibs:Depends}, ${misc:Depends}, libaudit1, libcap2-bin, libcap2, libnss-mapuser
Description: Shell front-end used for radius users.
This provides a uid fixup program. Due to the limitations of the
RADIUS protocol, we can't tell whether a user is privileged until
- after authentication. This packages provides a shell front-end that
+ after authentication. This package provides a shell front-end that
sets the uid to the auid, if set and > 1000, and not already matching.
diff --git a/debian/libpam-radius-auth.dirs b/debian/libpam-radius-auth.dirs
index 8db6b07..8fbaf60 100644
--- a/debian/libpam-radius-auth.dirs
+++ b/debian/libpam-radius-auth.dirs
@@ -1,4 +1,3 @@
lib/security
etc
usr/share/doc/libpam-radius-auth/html
-usr/share/pam-configs
diff --git a/debian/libpam-radius-auth.install b/debian/libpam-radius-auth.install
index 7ca6146..128092b 100644
--- a/debian/libpam-radius-auth.install
+++ b/debian/libpam-radius-auth.install
@@ -1,2 +1,3 @@
pam_radius_auth.so lib/security
+pam_radius_auth.conf etc
index.html usr/share/doc/libpam-radius-auth/html
diff --git a/debian/libpam-radius-auth.postinst b/debian/libpam-radius-auth.postinst
new file mode 100644
index 0000000..de079ad
--- /dev/null
+++ b/debian/libpam-radius-auth.postinst
@@ -0,0 +1,9 @@
+#! /bin/sh
+
+set -e
+
+# needed for install, upgrade, remove, and purge, including aborts
+pam-auth-update --package
+
+#DEBHELPER#
+
diff --git a/debian/libpam-radius-auth.prerm b/debian/libpam-radius-auth.prerm
new file mode 100644
index 0000000..19f03ae
--- /dev/null
+++ b/debian/libpam-radius-auth.prerm
@@ -0,0 +1,9 @@
+#!/bin/sh
+
+set -e
+
+if [ "$1" = remove ]; then
+ pam-auth-update --package --remove radius
+fi
+
+#DEBHELPER#
diff --git a/debian/radius b/debian/radius
index 7e318a2..0c180cb 100644
--- a/debian/radius
+++ b/debian/radius
@@ -4,7 +4,7 @@ Priority: 257
Auth-Type: Primary
Auth:
[default=1 success=ignore] pam_succeed_if.so uid > 1000 quiet
- [authinfo_unavail=ignore success=end default=ignore] pam_radius_auth.so
+ [authinfo_unavail=ignore success=end auth_err=bad default=ignore] pam_radius_auth.so
Account-Type: Primary
Account:
diff --git a/debian/rules b/debian/rules
index 9ac6113..7066806 100755
--- a/debian/rules
+++ b/debian/rules
@@ -8,7 +8,7 @@ else
CFLAGS += -O2
endif
PAM_CONF_FILE=/etc/pam_radius_auth.conf
-CFLAGS+=-Wno-format-truncation -Wno-strict-aliasing -DCONF_FILE=\"${PAM_CONF_FILE}\"
+CFLAGS+=-g3 -Wno-strict-aliasing -Wno-format-truncation -DCONF_FILE=\"${PAM_CONF_FILE}\"
ifeq ($(DEB_HOST_GNU_CPU),(hppa|m68k|mips|powerpc|s390|sparc|sparc64|sheb))
CFLAGS += -DHIGHFIRST
@@ -23,6 +23,7 @@ export CFLAGS
override_dh_install:
dh_install -v --sourcedir=. --package=libpam-radius-auth
dh_install -v --sourcedir=. --package=radius-shell
+ chmod 600 debian/*/${PAM_CONF_FILE}
chmod 750 debian/*/sbin/radius_shell
override_dh_fixperms:
diff --git a/debian/source/format b/debian/source/format
index af745b3..b9b0237 100644
--- a/debian/source/format
+++ b/debian/source/format
@@ -1 +1,2 @@
-3.0 (git)
+1.0
+