diff options
author | Simon Rettberg | 2024-05-23 15:44:00 +0200 |
---|---|---|
committer | Simon Rettberg | 2024-05-23 15:44:00 +0200 |
commit | b89827a57aabd317ac0f70d93f2e57832555c158 (patch) | |
tree | 57a9779baab1e15f16aa20dc8f0646185a333d60 /core/modules/pam | |
parent | [qemu] Use virt-manager if CoW admin/edit mode is active (diff) | |
download | mltk-b89827a57aabd317ac0f70d93f2e57832555c158.tar.gz mltk-b89827a57aabd317ac0f70d93f2e57832555c158.tar.xz mltk-b89827a57aabd317ac0f70d93f2e57832555c158.zip |
[pam] Cleanup, remove pam_script
Diffstat (limited to 'core/modules/pam')
-rw-r--r-- | core/modules/pam/TODO | 1 | ||||
l--------- | core/modules/pam/data/etc/pam-script/pam_script_auth | 1 | ||||
l--------- | core/modules/pam/data/etc/pam-script/pam_script_ses_close | 1 | ||||
l--------- | core/modules/pam/data/etc/pam-script/pam_script_ses_open | 1 | ||||
-rw-r--r-- | core/modules/pam/data/etc/security/pam_env.conf | 73 | ||||
-rwxr-xr-x | core/modules/pam/data/opt/openslx/scripts/pam_script_auth | 160 | ||||
-rwxr-xr-x | core/modules/pam/data/opt/openslx/scripts/pam_script_ses_close | 27 | ||||
-rwxr-xr-x | core/modules/pam/data/opt/openslx/scripts/pam_script_ses_open | 25 | ||||
-rw-r--r-- | core/modules/pam/module.build | 14 | ||||
-rw-r--r-- | core/modules/pam/module.conf | 4 | ||||
-rw-r--r-- | core/modules/pam/module.conf.centos | 37 | ||||
-rw-r--r-- | core/modules/pam/module.conf.debian | 1 | ||||
-rw-r--r-- | core/modules/pam/module.conf.opensuse | 45 | ||||
-rw-r--r-- | core/modules/pam/module.conf.ubuntu | 1 | ||||
-rw-r--r-- | core/modules/pam/module.conf.ubuntu.16 | 42 | ||||
-rw-r--r-- | core/modules/pam/module.conf.ubuntu.17 | 42 | ||||
-rw-r--r-- | core/modules/pam/module.conf.ubuntu.18 | 43 |
17 files changed, 0 insertions, 518 deletions
diff --git a/core/modules/pam/TODO b/core/modules/pam/TODO deleted file mode 100644 index 6f95e62d..00000000 --- a/core/modules/pam/TODO +++ /dev/null @@ -1 +0,0 @@ -suse krb5 mount home dirs diff --git a/core/modules/pam/data/etc/pam-script/pam_script_auth b/core/modules/pam/data/etc/pam-script/pam_script_auth deleted file mode 120000 index 319fba0e..00000000 --- a/core/modules/pam/data/etc/pam-script/pam_script_auth +++ /dev/null @@ -1 +0,0 @@ -/opt/openslx/scripts/pam_script_auth
\ No newline at end of file diff --git a/core/modules/pam/data/etc/pam-script/pam_script_ses_close b/core/modules/pam/data/etc/pam-script/pam_script_ses_close deleted file mode 120000 index f3682056..00000000 --- a/core/modules/pam/data/etc/pam-script/pam_script_ses_close +++ /dev/null @@ -1 +0,0 @@ -/opt/openslx/scripts/pam_script_ses_close
\ No newline at end of file diff --git a/core/modules/pam/data/etc/pam-script/pam_script_ses_open b/core/modules/pam/data/etc/pam-script/pam_script_ses_open deleted file mode 120000 index 4f5598e5..00000000 --- a/core/modules/pam/data/etc/pam-script/pam_script_ses_open +++ /dev/null @@ -1 +0,0 @@ -/opt/openslx/scripts/pam_script_ses_open
\ No newline at end of file diff --git a/core/modules/pam/data/etc/security/pam_env.conf b/core/modules/pam/data/etc/security/pam_env.conf deleted file mode 100644 index d0ba35c2..00000000 --- a/core/modules/pam/data/etc/security/pam_env.conf +++ /dev/null @@ -1,73 +0,0 @@ -# -# This is the configuration file for pam_env, a PAM module to load in -# a configurable list of environment variables for a -# -# The original idea for this came from Andrew G. Morgan ... -#<quote> -# Mmm. Perhaps you might like to write a pam_env module that reads a -# default environment from a file? I can see that as REALLY -# useful... Note it would be an "auth" module that returns PAM_IGNORE -# for the auth part and sets the environment returning PAM_SUCCESS in -# the setcred function... -#</quote> -# -# What I wanted was the REMOTEHOST variable set, purely for selfish -# reasons, and AGM didn't want it added to the SimpleApps login -# program (which is where I added the patch). So, my first concern is -# that variable, from there there are numerous others that might/would -# be useful to be set: NNTPSERVER, LESS, PATH, PAGER, MANPAGER ..... -# -# Of course, these are a different kind of variable than REMOTEHOST in -# that they are things that are likely to be configured by -# administrators rather than set by logging in, how to treat them both -# in the same config file? -# -# Here is my idea: -# -# Each line starts with the variable name, there are then two possible -# options for each variable DEFAULT and OVERRIDE. -# DEFAULT allows and administrator to set the value of the -# variable to some default value, if none is supplied then the empty -# string is assumed. The OVERRIDE option tells pam_env that it should -# enter in its value (overriding the default value) if there is one -# to use. OVERRIDE is not used, "" is assumed and no override will be -# done. -# -# VARIABLE [DEFAULT=[value]] [OVERRIDE=[value]] -# -# (Possibly non-existent) environment variables may be used in values -# using the ${string} syntax and (possibly non-existent) PAM_ITEMs may -# be used in values using the @{string} syntax. Both the $ and @ -# characters can be backslash escaped to be used as literal values -# values can be delimited with "", escaped " not supported. -# Note that many environment variables that you would like to use -# may not be set by the time the module is called. -# For example, HOME is used below several times, but -# many PAM applications don't make it available by the time you need it. -# -# -# First, some special variables -# -# Set the REMOTEHOST variable for any hosts that are remote, default -# to "localhost" rather than not being set at all -#REMOTEHOST DEFAULT=localhost OVERRIDE=@{PAM_RHOST} -# -# Set the DISPLAY variable if it seems reasonable -#DISPLAY DEFAULT=${REMOTEHOST}:0.0 OVERRIDE=${DISPLAY} -# -# -# Now some simple variables -# -#PAGER DEFAULT=less -#MANPAGER DEFAULT=less -#LESS DEFAULT="M q e h15 z23 b80" -#NNTPSERVER DEFAULT=localhost -#PATH DEFAULT=${HOME}/bin:/usr/local/bin:/bin\ -#:/usr/bin:/usr/local/bin/X11:/usr/bin/X11 -# -# silly examples of escaped variables, just to show how they work. -# -#DOLLAR DEFAULT=\$ -#DOLLARDOLLAR DEFAULT= OVERRIDE=\$${DOLLAR} -#DOLLARPLUS DEFAULT=\${REMOTEHOST}${REMOTEHOST} -#ATSIGN DEFAULT="" OVERRIDE=\@ diff --git a/core/modules/pam/data/opt/openslx/scripts/pam_script_auth b/core/modules/pam/data/opt/openslx/scripts/pam_script_auth deleted file mode 100755 index 0e764f37..00000000 --- a/core/modules/pam/data/opt/openslx/scripts/pam_script_auth +++ /dev/null @@ -1,160 +0,0 @@ -#!/bin/ash - -# # # # # # # # # # # # # # # # # # # -# Legacy script - present only for -# backwards compat with old config.tgz -# modules. Newer approach lies in -# /opt/openslx/pam -# # # # # # # # # # # # # # # # # # # - -# Needed as pam_script clears PATH -export PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/opt/openslx/sbin:/opt/openslx/bin" - -# check if the script runs as root -[ "x$(whoami)" != "xroot" ] && exit 0 - -USER_UID=$(id -u "$PAM_USER") -if [ -n "$USER_UID" ]; then - PASSWD=$(getent passwd "$USER_UID") -else - PASSWD=$(getent passwd "$PAM_USER") -fi -USER_NAME=$(echo "$PASSWD" | awk -F ':' '{print $1}') -USER_UID=$(echo "$PASSWD" | awk -F ':' '{print $3}') -USER_GID=$(echo "$PASSWD" | awk -F ':' '{print $4}') -USER_HOME=$(echo "$PASSWD" | awk -F ':' '{print $6}') -[ -n "$USER_NAME" ] && PAM_USER="$USER_NAME" -[ -z "$USER_UID" ] && USER_UID=$(id -u "$PAM_USER") -[ -z "$USER_GID" ] && USER_GID=$(id -g "$PAM_USER") -[ -z "$USER_HOME" ] && USER_HOME="/home/$PAM_USER" -if [ -z "$USER_UID" -o -z "$USER_GID" ]; then - slxlog "pam-get-ids" "Could not determine UID or GID for user '$PAM_USER'." - exit 1 -fi - -# The user's non-persistent home directory mount point, which should be their linux home -TEMP_HOME_DIR="$USER_HOME" - -# check if PAM_USER is root and skip if it is the case -[ "x${PAM_USER}" == "xroot" ] && exit 0 - -############################################################################### -# -# Preparations for volatile /home/<user> -# -# -# check if we already mounted the home directory -if ! mount | grep -q -F " ${TEMP_HOME_DIR} "; then - # no home, lets create it - if ! mkdir -p "${TEMP_HOME_DIR}"; then - slxlog "pam-global-mktemphome" "Could not create '${TEMP_HOME_DIR}'." - exit 1 - fi - # now make it a tmpfs - if ! mount -t tmpfs -o "uid=${USER_UID},gid=${USER_GID},mode=0700,size=1024m" tmpfs "${TEMP_HOME_DIR}"; then - slxlog "pam-global-tmpfstemphome" "Could not make a tmpfs on ${TEMP_HOME_DIR}" - exit 1 - fi - # mount another tmpfs into subdir so we can create files that the user cannot modify - # but still read, while at the same time preventing any other user from reading it - mkdir -p "${TEMP_HOME_DIR}/.openslx" - mount -t tmpfs -o size=1m,uid=0,gid=0,mode=0755 tmpfs "${TEMP_HOME_DIR}/.openslx" -fi - -############################################################################### -# -# Preparations for /home/<user>/PERSISTENT -# -# -# Script to be sourced to mount the user's persistent home -PERSISTENT_MOUNT_SCRIPT="/opt/openslx/scripts/pam_script_mount_persistent" -# Script to be run in the user's context iff the persistent home could be mounted successfully -PERSISTENT_MOUNT_USER_SCRIPT="/opt/openslx/scripts/pam_script_mount_persistent_user" -# The user's persistent home directory mount point -PERSISTENT_HOME_DIR="${TEMP_HOME_DIR}/PERSISTENT" - -# now lets see if we have a persistent directory mount script, and it's not already mounted -if [ -e "${PERSISTENT_MOUNT_SCRIPT}" ] && ! mount | grep -q -F " ${PERSISTENT_HOME_DIR} "; then - # seems we should try to mount... - # create the PERSISTENT directory and give to user - if ! mkdir -p "${PERSISTENT_HOME_DIR}"; then - slxlog "pam-global-mkpersistent" "Could not create '${PERSISTENT_HOME_DIR}'." - else - # everything seems ok, call mount script - . "${PERSISTENT_MOUNT_SCRIPT}" \ - || slxlog "pam-global-sourcepersistent" "Could not source '${PERSISTENT_MOUNT_SCRIPT}'." - if [ -n "${REAL_ACCOUNT}" ]; then - echo "${REAL_ACCOUNT}" > "${TEMP_HOME_DIR}/.openslx/account" - chmod 0644 "${TEMP_HOME_DIR}/.openslx/account" - fi - fi -fi # end "mount-home-script-exists" - - -# Just try to delete the persistent dir. If the mount was successful, it will not work -# If it was not successful, it will be removed so the user doesn't think he can store -# anything in there -rmdir "${PERSISTENT_HOME_DIR}" 2> /dev/null - -# Write warning message to tmpfs home -if [ -d "${PERSISTENT_HOME_DIR}" ]; then - # create a WARNING.txt for the user with hint to PERSISTENT - cat > "${TEMP_HOME_DIR}/WARNING.txt" <<EOF -ATTENTION: This is the non-persistent home directory! -Files saved here will be lost on shutdown. -Your real home is under ${PERSISTENT_HOME_DIR} -Please save your files there. -EOF -else - # create a WARNING.txt for the user, no PERSISTENT :-( - cat > "${TEMP_HOME_DIR}/WARNING.txt" <<EOF -ATTENTION: This is a non-persistent home directory! -Files saved here will be lost on shutdown. -Please save your files on a USB drive or upload them -to some web service. -EOF -fi -chown "${USER_UID}" "${TEMP_HOME_DIR}/WARNING.txt" - -############################################################################### -# -# Preparations for /home/<user>/SHARE -# -# -# Script to be sourced to mount the common share folder -COMMON_SHARE_MOUNT_SCRIPT="/opt/openslx/scripts/pam_script_mount_common_share" -# User specific mount point for the common share -COMMON_SHARE_MOUNT_POINT="${TEMP_HOME_DIR}/SHARE" - -# check for common share mount script, exit if we don't have one -if [ -e "${COMMON_SHARE_MOUNT_SCRIPT}" ] && ! mount | grep -q -F " ${COMMON_SHARE_MOUNT_POINT} "; then - # create the SHARE directory - if ! mkdir -p "${COMMON_SHARE_MOUNT_POINT}"; then - slxlog "pam-global-mkshare" "Could not create '${COMMON_SHARE_MOUNT_POINT}'." - elif ! chown "${USER_UID}:${USER_GID}" "${COMMON_SHARE_MOUNT_POINT}"; then - slxlog "pam-global-chshare" "Could not chown '${COMMON_SHARE_MOUNT_POINT}' to '${PAM_USER}'." - else - COMMON_SHARE_MOUNT_POINT="${COMMON_SHARE_MOUNT_POINT}" \ - PAM_USER="${PAM_USER}" \ - PAM_AUTHTOK="${PAM_AUTHTOK}" \ - USER_UID="${USER_UID}" \ - USER_GID="${USER_GID}" \ - /bin/ash "${COMMON_SHARE_MOUNT_SCRIPT}" \ - || slxlog "pam-global-sourceshare" "Could not execute '${COMMON_SHARE_MOUNT_SCRIPT}'." - fi -fi -# Just try to delete the common share dir. If the mount was successful, it will not work -rmdir "${COMMON_SHARE_MOUNT_POINT}" 2> /dev/null - -# -# source the stuff in pam_script_auth.d, if it exists -# -if [ -d "/opt/openslx/scripts/pam_script_auth.d" ]; then - for HOOK in $(ls "/opt/openslx/scripts/pam_script_auth.d"); do - # source it, in case of failure do nothing since these scripts are non-critical - ( . "/opt/openslx/scripts/pam_script_auth.d/$HOOK" ) || slxlog "pam-source-hooks" "Could not source '$HOOK'." - done -fi - -exit 0 - diff --git a/core/modules/pam/data/opt/openslx/scripts/pam_script_ses_close b/core/modules/pam/data/opt/openslx/scripts/pam_script_ses_close deleted file mode 100755 index 80b496d6..00000000 --- a/core/modules/pam/data/opt/openslx/scripts/pam_script_ses_close +++ /dev/null @@ -1,27 +0,0 @@ -#!/bin/ash - -# # # # # # # # # # # # # # # # # # # -# Legacy script - present only for -# backwards compat with old config.tgz -# modules. Newer approach lies in -# /opt/openslx/pam -# # # # # # # # # # # # # # # # # # # - -# Needed as pam_script clears PATH -export PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/opt/openslx/sbin:/opt/openslx/bin" - -# can only work if script is run as root -[ "x$(whoami)" = "xroot" ] || exit 0 - -[ "x${PAM_SERVICE%greeter}" != "x${PAM_SERVICE}" ] && exit 0 - -# source hooks if there are any -if [ -d "/opt/openslx/scripts/pam_script_ses_close.d" ]; then - for HOOK in $(ls "/opt/openslx/scripts/pam_script_ses_close.d"); do - # failure is non-critical - . "/opt/openslx/scripts/pam_script_ses_close.d/$HOOK" || slxlog "pam-sesclose-hooks" "Could not source '$HOOK'." - done -fi - -exit 0 - diff --git a/core/modules/pam/data/opt/openslx/scripts/pam_script_ses_open b/core/modules/pam/data/opt/openslx/scripts/pam_script_ses_open deleted file mode 100755 index 0050758c..00000000 --- a/core/modules/pam/data/opt/openslx/scripts/pam_script_ses_open +++ /dev/null @@ -1,25 +0,0 @@ -#!/bin/ash - -# # # # # # # # # # # # # # # # # # # -# Legacy script - present only for -# backwards compat with old config.tgz -# modules. Newer approach lies in -# /opt/openslx/pam -# # # # # # # # # # # # # # # # # # # - -# Needed as pam_script clears PATH -export PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/opt/openslx/sbin:/opt/openslx/bin" - -# just exit for greeter sessions -[ "x${PAM_SERVICE%greeter}" != "x${PAM_SERVICE}" ] && exit 0 - -# source the stuff in pam_script_ses_open.d, if it exists -if [ -d "/opt/openslx/scripts/pam_script_ses_open.d" ]; then - for HOOK in $(ls "/opt/openslx/scripts/pam_script_ses_open.d"); do - # source it, in case of failure do nothing since these scripts are non-critical - . "/opt/openslx/scripts/pam_script_ses_open.d/$HOOK" || slxlog "pam-source-hooks" "Could not source '$HOOK'." - done -fi - -exit 0 - diff --git a/core/modules/pam/module.build b/core/modules/pam/module.build index c099bc1e..41f4f680 100644 --- a/core/modules/pam/module.build +++ b/core/modules/pam/module.build @@ -8,20 +8,6 @@ fetch_source() { build() { mkdir -p "$MODULE_BUILD_DIR/opt/openslx/bin" gcc -o "$MODULE_BUILD_DIR/opt/openslx/bin/sslconnect" "$MODULE_DIR/sslconnect.c" -lssl -lcrypto -O3 || perror "Could not compile sslconnect.c" - - # build pam-script separatly since we use a source tarball - - # HACK: find pam_unix.so in MODULE_BUILD_DIR to see where to put pam_script - cde "${MODULE_WORK_DIR}/src/pam_script" - for i in 1 2 3; do # FUCK THIS BRAIN DAMAGE! - libtoolize - automake --add-missing - autoreconf - aclocal - autoheader - done - ./configure --prefix=/ --sysconfdir=/etc/pam-script --libdir="$SYS_PAM_MODULES_PATH" || perror "pam-script: ./configure failed." - make DESTDIR="${MODULE_BUILD_DIR}" install || perror "pam-script: make install to ${MODULE_BUILD_DIR} failed." } post_copy() { diff --git a/core/modules/pam/module.conf b/core/modules/pam/module.conf index 7789139d..2dcfdd84 100644 --- a/core/modules/pam/module.conf +++ b/core/modules/pam/module.conf @@ -18,7 +18,6 @@ REQUIRED_LIBRARIES=" nsswitch static libnfsidmap - pam_script " REQUIRED_DIRECTORIES=" /etc/security @@ -26,6 +25,3 @@ REQUIRED_DIRECTORIES=" REQUIRED_SYSTEM_FILES=" /etc/login.defs " -REQUIRED_GIT=" - https://github.com/jeroennijhof/pam_script.git -" diff --git a/core/modules/pam/module.conf.centos b/core/modules/pam/module.conf.centos deleted file mode 100644 index 3a8b2dcc..00000000 --- a/core/modules/pam/module.conf.centos +++ /dev/null @@ -1,37 +0,0 @@ -#!/bin/bash -# erase generic conf settings -REQUIRED_BINARIES="" -REQUIRED_FILES="" -REQUIRED_INSTALLED_PACKAGES=" - pam - pam-devel - pam_krb5 - libnfsidmap - nss-mdns - openssl-devel - nfs-utils - glibc -" -REQUIRED_CONTENT_PACKAGES=" - pam - pam-devel - pam_krb5 - libnfsidmap - nss-mdns - nfs-utils - glibc -" -REQUIRED_LIBRARIES+=" - libnss_compat - libnss_db - libnss_dns - libnss_files - libnss_nis -" -REQUIRED_DIRECTORIES+=" - /$LIB64 -" -REQUIRED_SYSTEM_FILES+=" - $SYS_PAM_MODULES_PATH -" - diff --git a/core/modules/pam/module.conf.debian b/core/modules/pam/module.conf.debian index 470163e2..b7f19d07 100644 --- a/core/modules/pam/module.conf.debian +++ b/core/modules/pam/module.conf.debian @@ -8,7 +8,6 @@ REQUIRED_INSTALLED_PACKAGES=" libssl-dev ldap-utils nfs-common - libpam0g-dev cifs-utils libtool " diff --git a/core/modules/pam/module.conf.opensuse b/core/modules/pam/module.conf.opensuse deleted file mode 100644 index df07be2c..00000000 --- a/core/modules/pam/module.conf.opensuse +++ /dev/null @@ -1,45 +0,0 @@ -#!/bin/bash -REQUIRED_INSTALLED_PACKAGES=" - pam - pam_krb5 - pam-devel - nss-pam-ldapd - nss-mdns - pam-modules - libopenssl-devel - openldap2-client - nfsidmap - nfs-client - glibc - pam-devel -" -REQUIRED_CONTENT_PACKAGES=" - pam - pam_krb5 - pam-devel - pam-modules - nss-pam-ldapd - nss-mdns - openldap2-client - nfsidmap - nfs-client - glibc -" -REQUIRED_BINARIES+=" - mkhomedir_helper -" -REQUIRED_LIBRARIES+=" - libnss_compat - libnss_db - libnss_dns - libnss_files - libnss_nis -" -REQUIRED_DIRECTORIES+=" - /$LIB64 - /usr/$LIB64 -" -REQUIRED_SYSTEM_FILES+=" - /$LIB64/security -" - diff --git a/core/modules/pam/module.conf.ubuntu b/core/modules/pam/module.conf.ubuntu index 8e934bd3..54133526 100644 --- a/core/modules/pam/module.conf.ubuntu +++ b/core/modules/pam/module.conf.ubuntu @@ -9,7 +9,6 @@ REQUIRED_INSTALLED_PACKAGES=" ldap-utils libnfsidmap2 nfs-common - libpam0g-dev cifs-utils libtool " diff --git a/core/modules/pam/module.conf.ubuntu.16 b/core/modules/pam/module.conf.ubuntu.16 deleted file mode 100644 index 4d09bbd5..00000000 --- a/core/modules/pam/module.conf.ubuntu.16 +++ /dev/null @@ -1,42 +0,0 @@ -#!/bin/bash -# TODO fix and re-add ncp support ! -REQUIRED_INSTALLED_PACKAGES=" - libpam-cap - krb5-user - krb5-config - libpam-krb5 - libssl-dev - ldap-utils - libnfsidmap2 - nfs-common - libpam0g-dev - cifs-utils -" -REQUIRED_CONTENT_PACKAGES=" - libpam0g - libpam-modules - libpam-modules-bin - libpam-cap - libldap-2.4-2 - krb5-user - krb5-config - libpam-krb5 - ldap-utils - libnfsidmap2 - nfs-common - cifs-utils - keyutils -" -REQUIRED_BINARIES+=" - mount.cifs -" -REQUIRED_DIRECTORIES+=" - $SYS_PAM_MODULES_PATH - /lib - /usr/lib -" -REQUIRED_SYSTEM_FILES+=" - /etc/securetty - /etc/pam.conf - /etc/default/locale -" diff --git a/core/modules/pam/module.conf.ubuntu.17 b/core/modules/pam/module.conf.ubuntu.17 deleted file mode 100644 index 4d09bbd5..00000000 --- a/core/modules/pam/module.conf.ubuntu.17 +++ /dev/null @@ -1,42 +0,0 @@ -#!/bin/bash -# TODO fix and re-add ncp support ! -REQUIRED_INSTALLED_PACKAGES=" - libpam-cap - krb5-user - krb5-config - libpam-krb5 - libssl-dev - ldap-utils - libnfsidmap2 - nfs-common - libpam0g-dev - cifs-utils -" -REQUIRED_CONTENT_PACKAGES=" - libpam0g - libpam-modules - libpam-modules-bin - libpam-cap - libldap-2.4-2 - krb5-user - krb5-config - libpam-krb5 - ldap-utils - libnfsidmap2 - nfs-common - cifs-utils - keyutils -" -REQUIRED_BINARIES+=" - mount.cifs -" -REQUIRED_DIRECTORIES+=" - $SYS_PAM_MODULES_PATH - /lib - /usr/lib -" -REQUIRED_SYSTEM_FILES+=" - /etc/securetty - /etc/pam.conf - /etc/default/locale -" diff --git a/core/modules/pam/module.conf.ubuntu.18 b/core/modules/pam/module.conf.ubuntu.18 deleted file mode 100644 index 7f0fcaca..00000000 --- a/core/modules/pam/module.conf.ubuntu.18 +++ /dev/null @@ -1,43 +0,0 @@ -#!/bin/bash - -REQUIRED_INSTALLED_PACKAGES=" - libpam-cap - krb5-user - krb5-config - libpam-krb5 - libssl-dev - ldap-utils - libnfsidmap2 - nfs-common - libpam0g-dev - cifs-utils - libtool -" -REQUIRED_CONTENT_PACKAGES=" - libpam0g - libpam-modules - libpam-modules-bin - libpam-cap - libldap-2.4-2 - krb5-user - krb5-config - libpam-krb5 - ldap-utils - libnfsidmap2 - nfs-common - cifs-utils - keyutils -" -REQUIRED_BINARIES+=" - mount.cifs -" -REQUIRED_DIRECTORIES+=" - $SYS_PAM_MODULES_PATH - /lib - /usr/lib -" -REQUIRED_SYSTEM_FILES+=" - /etc/securetty - /etc/pam.conf - /etc/default/locale -" |