From b89827a57aabd317ac0f70d93f2e57832555c158 Mon Sep 17 00:00:00 2001
From: Simon Rettberg
Date: Thu, 23 May 2024 15:44:00 +0200
Subject: [pam] Cleanup, remove pam_script
---
core/modules/pam/TODO | 1 -
.../pam/data/etc/pam-script/pam_script_auth | 1 -
.../pam/data/etc/pam-script/pam_script_ses_close | 1 -
.../pam/data/etc/pam-script/pam_script_ses_open | 1 -
core/modules/pam/data/etc/security/pam_env.conf | 73 ----------
.../pam/data/opt/openslx/scripts/pam_script_auth | 160 ---------------------
.../data/opt/openslx/scripts/pam_script_ses_close | 27 ----
.../data/opt/openslx/scripts/pam_script_ses_open | 25 ----
core/modules/pam/module.build | 14 --
core/modules/pam/module.conf | 4 -
core/modules/pam/module.conf.centos | 37 -----
core/modules/pam/module.conf.debian | 1 -
core/modules/pam/module.conf.opensuse | 45 ------
core/modules/pam/module.conf.ubuntu | 1 -
core/modules/pam/module.conf.ubuntu.16 | 42 ------
core/modules/pam/module.conf.ubuntu.17 | 42 ------
core/modules/pam/module.conf.ubuntu.18 | 43 ------
17 files changed, 518 deletions(-)
delete mode 100644 core/modules/pam/TODO
delete mode 120000 core/modules/pam/data/etc/pam-script/pam_script_auth
delete mode 120000 core/modules/pam/data/etc/pam-script/pam_script_ses_close
delete mode 120000 core/modules/pam/data/etc/pam-script/pam_script_ses_open
delete mode 100644 core/modules/pam/data/etc/security/pam_env.conf
delete mode 100755 core/modules/pam/data/opt/openslx/scripts/pam_script_auth
delete mode 100755 core/modules/pam/data/opt/openslx/scripts/pam_script_ses_close
delete mode 100755 core/modules/pam/data/opt/openslx/scripts/pam_script_ses_open
delete mode 100644 core/modules/pam/module.conf.centos
delete mode 100644 core/modules/pam/module.conf.opensuse
delete mode 100644 core/modules/pam/module.conf.ubuntu.16
delete mode 100644 core/modules/pam/module.conf.ubuntu.17
delete mode 100644 core/modules/pam/module.conf.ubuntu.18
diff --git a/core/modules/pam/TODO b/core/modules/pam/TODO
deleted file mode 100644
index 6f95e62d..00000000
--- a/core/modules/pam/TODO
+++ /dev/null
@@ -1 +0,0 @@
-suse krb5 mount home dirs
diff --git a/core/modules/pam/data/etc/pam-script/pam_script_auth b/core/modules/pam/data/etc/pam-script/pam_script_auth
deleted file mode 120000
index 319fba0e..00000000
--- a/core/modules/pam/data/etc/pam-script/pam_script_auth
+++ /dev/null
@@ -1 +0,0 @@
-/opt/openslx/scripts/pam_script_auth
\ No newline at end of file
diff --git a/core/modules/pam/data/etc/pam-script/pam_script_ses_close b/core/modules/pam/data/etc/pam-script/pam_script_ses_close
deleted file mode 120000
index f3682056..00000000
--- a/core/modules/pam/data/etc/pam-script/pam_script_ses_close
+++ /dev/null
@@ -1 +0,0 @@
-/opt/openslx/scripts/pam_script_ses_close
\ No newline at end of file
diff --git a/core/modules/pam/data/etc/pam-script/pam_script_ses_open b/core/modules/pam/data/etc/pam-script/pam_script_ses_open
deleted file mode 120000
index 4f5598e5..00000000
--- a/core/modules/pam/data/etc/pam-script/pam_script_ses_open
+++ /dev/null
@@ -1 +0,0 @@
-/opt/openslx/scripts/pam_script_ses_open
\ No newline at end of file
diff --git a/core/modules/pam/data/etc/security/pam_env.conf b/core/modules/pam/data/etc/security/pam_env.conf
deleted file mode 100644
index d0ba35c2..00000000
--- a/core/modules/pam/data/etc/security/pam_env.conf
+++ /dev/null
@@ -1,73 +0,0 @@
-#
-# This is the configuration file for pam_env, a PAM module to load in
-# a configurable list of environment variables for a
-#
-# The original idea for this came from Andrew G. Morgan ...
-#
-# Mmm. Perhaps you might like to write a pam_env module that reads a
-# default environment from a file? I can see that as REALLY
-# useful... Note it would be an "auth" module that returns PAM_IGNORE
-# for the auth part and sets the environment returning PAM_SUCCESS in
-# the setcred function...
-#
-#
-# What I wanted was the REMOTEHOST variable set, purely for selfish
-# reasons, and AGM didn't want it added to the SimpleApps login
-# program (which is where I added the patch). So, my first concern is
-# that variable, from there there are numerous others that might/would
-# be useful to be set: NNTPSERVER, LESS, PATH, PAGER, MANPAGER .....
-#
-# Of course, these are a different kind of variable than REMOTEHOST in
-# that they are things that are likely to be configured by
-# administrators rather than set by logging in, how to treat them both
-# in the same config file?
-#
-# Here is my idea:
-#
-# Each line starts with the variable name, there are then two possible
-# options for each variable DEFAULT and OVERRIDE.
-# DEFAULT allows and administrator to set the value of the
-# variable to some default value, if none is supplied then the empty
-# string is assumed. The OVERRIDE option tells pam_env that it should
-# enter in its value (overriding the default value) if there is one
-# to use. OVERRIDE is not used, "" is assumed and no override will be
-# done.
-#
-# VARIABLE [DEFAULT=[value]] [OVERRIDE=[value]]
-#
-# (Possibly non-existent) environment variables may be used in values
-# using the ${string} syntax and (possibly non-existent) PAM_ITEMs may
-# be used in values using the @{string} syntax. Both the $ and @
-# characters can be backslash escaped to be used as literal values
-# values can be delimited with "", escaped " not supported.
-# Note that many environment variables that you would like to use
-# may not be set by the time the module is called.
-# For example, HOME is used below several times, but
-# many PAM applications don't make it available by the time you need it.
-#
-#
-# First, some special variables
-#
-# Set the REMOTEHOST variable for any hosts that are remote, default
-# to "localhost" rather than not being set at all
-#REMOTEHOST DEFAULT=localhost OVERRIDE=@{PAM_RHOST}
-#
-# Set the DISPLAY variable if it seems reasonable
-#DISPLAY DEFAULT=${REMOTEHOST}:0.0 OVERRIDE=${DISPLAY}
-#
-#
-# Now some simple variables
-#
-#PAGER DEFAULT=less
-#MANPAGER DEFAULT=less
-#LESS DEFAULT="M q e h15 z23 b80"
-#NNTPSERVER DEFAULT=localhost
-#PATH DEFAULT=${HOME}/bin:/usr/local/bin:/bin\
-#:/usr/bin:/usr/local/bin/X11:/usr/bin/X11
-#
-# silly examples of escaped variables, just to show how they work.
-#
-#DOLLAR DEFAULT=\$
-#DOLLARDOLLAR DEFAULT= OVERRIDE=\$${DOLLAR}
-#DOLLARPLUS DEFAULT=\${REMOTEHOST}${REMOTEHOST}
-#ATSIGN DEFAULT="" OVERRIDE=\@
diff --git a/core/modules/pam/data/opt/openslx/scripts/pam_script_auth b/core/modules/pam/data/opt/openslx/scripts/pam_script_auth
deleted file mode 100755
index 0e764f37..00000000
--- a/core/modules/pam/data/opt/openslx/scripts/pam_script_auth
+++ /dev/null
@@ -1,160 +0,0 @@
-#!/bin/ash
-
-# # # # # # # # # # # # # # # # # # #
-# Legacy script - present only for
-# backwards compat with old config.tgz
-# modules. Newer approach lies in
-# /opt/openslx/pam
-# # # # # # # # # # # # # # # # # # #
-
-# Needed as pam_script clears PATH
-export PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/opt/openslx/sbin:/opt/openslx/bin"
-
-# check if the script runs as root
-[ "x$(whoami)" != "xroot" ] && exit 0
-
-USER_UID=$(id -u "$PAM_USER")
-if [ -n "$USER_UID" ]; then
- PASSWD=$(getent passwd "$USER_UID")
-else
- PASSWD=$(getent passwd "$PAM_USER")
-fi
-USER_NAME=$(echo "$PASSWD" | awk -F ':' '{print $1}')
-USER_UID=$(echo "$PASSWD" | awk -F ':' '{print $3}')
-USER_GID=$(echo "$PASSWD" | awk -F ':' '{print $4}')
-USER_HOME=$(echo "$PASSWD" | awk -F ':' '{print $6}')
-[ -n "$USER_NAME" ] && PAM_USER="$USER_NAME"
-[ -z "$USER_UID" ] && USER_UID=$(id -u "$PAM_USER")
-[ -z "$USER_GID" ] && USER_GID=$(id -g "$PAM_USER")
-[ -z "$USER_HOME" ] && USER_HOME="/home/$PAM_USER"
-if [ -z "$USER_UID" -o -z "$USER_GID" ]; then
- slxlog "pam-get-ids" "Could not determine UID or GID for user '$PAM_USER'."
- exit 1
-fi
-
-# The user's non-persistent home directory mount point, which should be their linux home
-TEMP_HOME_DIR="$USER_HOME"
-
-# check if PAM_USER is root and skip if it is the case
-[ "x${PAM_USER}" == "xroot" ] && exit 0
-
-###############################################################################
-#
-# Preparations for volatile /home/
-#
-#
-# check if we already mounted the home directory
-if ! mount | grep -q -F " ${TEMP_HOME_DIR} "; then
- # no home, lets create it
- if ! mkdir -p "${TEMP_HOME_DIR}"; then
- slxlog "pam-global-mktemphome" "Could not create '${TEMP_HOME_DIR}'."
- exit 1
- fi
- # now make it a tmpfs
- if ! mount -t tmpfs -o "uid=${USER_UID},gid=${USER_GID},mode=0700,size=1024m" tmpfs "${TEMP_HOME_DIR}"; then
- slxlog "pam-global-tmpfstemphome" "Could not make a tmpfs on ${TEMP_HOME_DIR}"
- exit 1
- fi
- # mount another tmpfs into subdir so we can create files that the user cannot modify
- # but still read, while at the same time preventing any other user from reading it
- mkdir -p "${TEMP_HOME_DIR}/.openslx"
- mount -t tmpfs -o size=1m,uid=0,gid=0,mode=0755 tmpfs "${TEMP_HOME_DIR}/.openslx"
-fi
-
-###############################################################################
-#
-# Preparations for /home//PERSISTENT
-#
-#
-# Script to be sourced to mount the user's persistent home
-PERSISTENT_MOUNT_SCRIPT="/opt/openslx/scripts/pam_script_mount_persistent"
-# Script to be run in the user's context iff the persistent home could be mounted successfully
-PERSISTENT_MOUNT_USER_SCRIPT="/opt/openslx/scripts/pam_script_mount_persistent_user"
-# The user's persistent home directory mount point
-PERSISTENT_HOME_DIR="${TEMP_HOME_DIR}/PERSISTENT"
-
-# now lets see if we have a persistent directory mount script, and it's not already mounted
-if [ -e "${PERSISTENT_MOUNT_SCRIPT}" ] && ! mount | grep -q -F " ${PERSISTENT_HOME_DIR} "; then
- # seems we should try to mount...
- # create the PERSISTENT directory and give to user
- if ! mkdir -p "${PERSISTENT_HOME_DIR}"; then
- slxlog "pam-global-mkpersistent" "Could not create '${PERSISTENT_HOME_DIR}'."
- else
- # everything seems ok, call mount script
- . "${PERSISTENT_MOUNT_SCRIPT}" \
- || slxlog "pam-global-sourcepersistent" "Could not source '${PERSISTENT_MOUNT_SCRIPT}'."
- if [ -n "${REAL_ACCOUNT}" ]; then
- echo "${REAL_ACCOUNT}" > "${TEMP_HOME_DIR}/.openslx/account"
- chmod 0644 "${TEMP_HOME_DIR}/.openslx/account"
- fi
- fi
-fi # end "mount-home-script-exists"
-
-
-# Just try to delete the persistent dir. If the mount was successful, it will not work
-# If it was not successful, it will be removed so the user doesn't think he can store
-# anything in there
-rmdir "${PERSISTENT_HOME_DIR}" 2> /dev/null
-
-# Write warning message to tmpfs home
-if [ -d "${PERSISTENT_HOME_DIR}" ]; then
- # create a WARNING.txt for the user with hint to PERSISTENT
- cat > "${TEMP_HOME_DIR}/WARNING.txt" < "${TEMP_HOME_DIR}/WARNING.txt" </SHARE
-#
-#
-# Script to be sourced to mount the common share folder
-COMMON_SHARE_MOUNT_SCRIPT="/opt/openslx/scripts/pam_script_mount_common_share"
-# User specific mount point for the common share
-COMMON_SHARE_MOUNT_POINT="${TEMP_HOME_DIR}/SHARE"
-
-# check for common share mount script, exit if we don't have one
-if [ -e "${COMMON_SHARE_MOUNT_SCRIPT}" ] && ! mount | grep -q -F " ${COMMON_SHARE_MOUNT_POINT} "; then
- # create the SHARE directory
- if ! mkdir -p "${COMMON_SHARE_MOUNT_POINT}"; then
- slxlog "pam-global-mkshare" "Could not create '${COMMON_SHARE_MOUNT_POINT}'."
- elif ! chown "${USER_UID}:${USER_GID}" "${COMMON_SHARE_MOUNT_POINT}"; then
- slxlog "pam-global-chshare" "Could not chown '${COMMON_SHARE_MOUNT_POINT}' to '${PAM_USER}'."
- else
- COMMON_SHARE_MOUNT_POINT="${COMMON_SHARE_MOUNT_POINT}" \
- PAM_USER="${PAM_USER}" \
- PAM_AUTHTOK="${PAM_AUTHTOK}" \
- USER_UID="${USER_UID}" \
- USER_GID="${USER_GID}" \
- /bin/ash "${COMMON_SHARE_MOUNT_SCRIPT}" \
- || slxlog "pam-global-sourceshare" "Could not execute '${COMMON_SHARE_MOUNT_SCRIPT}'."
- fi
-fi
-# Just try to delete the common share dir. If the mount was successful, it will not work
-rmdir "${COMMON_SHARE_MOUNT_POINT}" 2> /dev/null
-
-#
-# source the stuff in pam_script_auth.d, if it exists
-#
-if [ -d "/opt/openslx/scripts/pam_script_auth.d" ]; then
- for HOOK in $(ls "/opt/openslx/scripts/pam_script_auth.d"); do
- # source it, in case of failure do nothing since these scripts are non-critical
- ( . "/opt/openslx/scripts/pam_script_auth.d/$HOOK" ) || slxlog "pam-source-hooks" "Could not source '$HOOK'."
- done
-fi
-
-exit 0
-
diff --git a/core/modules/pam/data/opt/openslx/scripts/pam_script_ses_close b/core/modules/pam/data/opt/openslx/scripts/pam_script_ses_close
deleted file mode 100755
index 80b496d6..00000000
--- a/core/modules/pam/data/opt/openslx/scripts/pam_script_ses_close
+++ /dev/null
@@ -1,27 +0,0 @@
-#!/bin/ash
-
-# # # # # # # # # # # # # # # # # # #
-# Legacy script - present only for
-# backwards compat with old config.tgz
-# modules. Newer approach lies in
-# /opt/openslx/pam
-# # # # # # # # # # # # # # # # # # #
-
-# Needed as pam_script clears PATH
-export PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/opt/openslx/sbin:/opt/openslx/bin"
-
-# can only work if script is run as root
-[ "x$(whoami)" = "xroot" ] || exit 0
-
-[ "x${PAM_SERVICE%greeter}" != "x${PAM_SERVICE}" ] && exit 0
-
-# source hooks if there are any
-if [ -d "/opt/openslx/scripts/pam_script_ses_close.d" ]; then
- for HOOK in $(ls "/opt/openslx/scripts/pam_script_ses_close.d"); do
- # failure is non-critical
- . "/opt/openslx/scripts/pam_script_ses_close.d/$HOOK" || slxlog "pam-sesclose-hooks" "Could not source '$HOOK'."
- done
-fi
-
-exit 0
-
diff --git a/core/modules/pam/data/opt/openslx/scripts/pam_script_ses_open b/core/modules/pam/data/opt/openslx/scripts/pam_script_ses_open
deleted file mode 100755
index 0050758c..00000000
--- a/core/modules/pam/data/opt/openslx/scripts/pam_script_ses_open
+++ /dev/null
@@ -1,25 +0,0 @@
-#!/bin/ash
-
-# # # # # # # # # # # # # # # # # # #
-# Legacy script - present only for
-# backwards compat with old config.tgz
-# modules. Newer approach lies in
-# /opt/openslx/pam
-# # # # # # # # # # # # # # # # # # #
-
-# Needed as pam_script clears PATH
-export PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/opt/openslx/sbin:/opt/openslx/bin"
-
-# just exit for greeter sessions
-[ "x${PAM_SERVICE%greeter}" != "x${PAM_SERVICE}" ] && exit 0
-
-# source the stuff in pam_script_ses_open.d, if it exists
-if [ -d "/opt/openslx/scripts/pam_script_ses_open.d" ]; then
- for HOOK in $(ls "/opt/openslx/scripts/pam_script_ses_open.d"); do
- # source it, in case of failure do nothing since these scripts are non-critical
- . "/opt/openslx/scripts/pam_script_ses_open.d/$HOOK" || slxlog "pam-source-hooks" "Could not source '$HOOK'."
- done
-fi
-
-exit 0
-
diff --git a/core/modules/pam/module.build b/core/modules/pam/module.build
index c099bc1e..41f4f680 100644
--- a/core/modules/pam/module.build
+++ b/core/modules/pam/module.build
@@ -8,20 +8,6 @@ fetch_source() {
build() {
mkdir -p "$MODULE_BUILD_DIR/opt/openslx/bin"
gcc -o "$MODULE_BUILD_DIR/opt/openslx/bin/sslconnect" "$MODULE_DIR/sslconnect.c" -lssl -lcrypto -O3 || perror "Could not compile sslconnect.c"
-
- # build pam-script separatly since we use a source tarball
-
- # HACK: find pam_unix.so in MODULE_BUILD_DIR to see where to put pam_script
- cde "${MODULE_WORK_DIR}/src/pam_script"
- for i in 1 2 3; do # FUCK THIS BRAIN DAMAGE!
- libtoolize
- automake --add-missing
- autoreconf
- aclocal
- autoheader
- done
- ./configure --prefix=/ --sysconfdir=/etc/pam-script --libdir="$SYS_PAM_MODULES_PATH" || perror "pam-script: ./configure failed."
- make DESTDIR="${MODULE_BUILD_DIR}" install || perror "pam-script: make install to ${MODULE_BUILD_DIR} failed."
}
post_copy() {
diff --git a/core/modules/pam/module.conf b/core/modules/pam/module.conf
index 7789139d..2dcfdd84 100644
--- a/core/modules/pam/module.conf
+++ b/core/modules/pam/module.conf
@@ -18,7 +18,6 @@ REQUIRED_LIBRARIES="
nsswitch
static
libnfsidmap
- pam_script
"
REQUIRED_DIRECTORIES="
/etc/security
@@ -26,6 +25,3 @@ REQUIRED_DIRECTORIES="
REQUIRED_SYSTEM_FILES="
/etc/login.defs
"
-REQUIRED_GIT="
- https://github.com/jeroennijhof/pam_script.git
-"
diff --git a/core/modules/pam/module.conf.centos b/core/modules/pam/module.conf.centos
deleted file mode 100644
index 3a8b2dcc..00000000
--- a/core/modules/pam/module.conf.centos
+++ /dev/null
@@ -1,37 +0,0 @@
-#!/bin/bash
-# erase generic conf settings
-REQUIRED_BINARIES=""
-REQUIRED_FILES=""
-REQUIRED_INSTALLED_PACKAGES="
- pam
- pam-devel
- pam_krb5
- libnfsidmap
- nss-mdns
- openssl-devel
- nfs-utils
- glibc
-"
-REQUIRED_CONTENT_PACKAGES="
- pam
- pam-devel
- pam_krb5
- libnfsidmap
- nss-mdns
- nfs-utils
- glibc
-"
-REQUIRED_LIBRARIES+="
- libnss_compat
- libnss_db
- libnss_dns
- libnss_files
- libnss_nis
-"
-REQUIRED_DIRECTORIES+="
- /$LIB64
-"
-REQUIRED_SYSTEM_FILES+="
- $SYS_PAM_MODULES_PATH
-"
-
diff --git a/core/modules/pam/module.conf.debian b/core/modules/pam/module.conf.debian
index 470163e2..b7f19d07 100644
--- a/core/modules/pam/module.conf.debian
+++ b/core/modules/pam/module.conf.debian
@@ -8,7 +8,6 @@ REQUIRED_INSTALLED_PACKAGES="
libssl-dev
ldap-utils
nfs-common
- libpam0g-dev
cifs-utils
libtool
"
diff --git a/core/modules/pam/module.conf.opensuse b/core/modules/pam/module.conf.opensuse
deleted file mode 100644
index df07be2c..00000000
--- a/core/modules/pam/module.conf.opensuse
+++ /dev/null
@@ -1,45 +0,0 @@
-#!/bin/bash
-REQUIRED_INSTALLED_PACKAGES="
- pam
- pam_krb5
- pam-devel
- nss-pam-ldapd
- nss-mdns
- pam-modules
- libopenssl-devel
- openldap2-client
- nfsidmap
- nfs-client
- glibc
- pam-devel
-"
-REQUIRED_CONTENT_PACKAGES="
- pam
- pam_krb5
- pam-devel
- pam-modules
- nss-pam-ldapd
- nss-mdns
- openldap2-client
- nfsidmap
- nfs-client
- glibc
-"
-REQUIRED_BINARIES+="
- mkhomedir_helper
-"
-REQUIRED_LIBRARIES+="
- libnss_compat
- libnss_db
- libnss_dns
- libnss_files
- libnss_nis
-"
-REQUIRED_DIRECTORIES+="
- /$LIB64
- /usr/$LIB64
-"
-REQUIRED_SYSTEM_FILES+="
- /$LIB64/security
-"
-
diff --git a/core/modules/pam/module.conf.ubuntu b/core/modules/pam/module.conf.ubuntu
index 8e934bd3..54133526 100644
--- a/core/modules/pam/module.conf.ubuntu
+++ b/core/modules/pam/module.conf.ubuntu
@@ -9,7 +9,6 @@ REQUIRED_INSTALLED_PACKAGES="
ldap-utils
libnfsidmap2
nfs-common
- libpam0g-dev
cifs-utils
libtool
"
diff --git a/core/modules/pam/module.conf.ubuntu.16 b/core/modules/pam/module.conf.ubuntu.16
deleted file mode 100644
index 4d09bbd5..00000000
--- a/core/modules/pam/module.conf.ubuntu.16
+++ /dev/null
@@ -1,42 +0,0 @@
-#!/bin/bash
-# TODO fix and re-add ncp support !
-REQUIRED_INSTALLED_PACKAGES="
- libpam-cap
- krb5-user
- krb5-config
- libpam-krb5
- libssl-dev
- ldap-utils
- libnfsidmap2
- nfs-common
- libpam0g-dev
- cifs-utils
-"
-REQUIRED_CONTENT_PACKAGES="
- libpam0g
- libpam-modules
- libpam-modules-bin
- libpam-cap
- libldap-2.4-2
- krb5-user
- krb5-config
- libpam-krb5
- ldap-utils
- libnfsidmap2
- nfs-common
- cifs-utils
- keyutils
-"
-REQUIRED_BINARIES+="
- mount.cifs
-"
-REQUIRED_DIRECTORIES+="
- $SYS_PAM_MODULES_PATH
- /lib
- /usr/lib
-"
-REQUIRED_SYSTEM_FILES+="
- /etc/securetty
- /etc/pam.conf
- /etc/default/locale
-"
diff --git a/core/modules/pam/module.conf.ubuntu.17 b/core/modules/pam/module.conf.ubuntu.17
deleted file mode 100644
index 4d09bbd5..00000000
--- a/core/modules/pam/module.conf.ubuntu.17
+++ /dev/null
@@ -1,42 +0,0 @@
-#!/bin/bash
-# TODO fix and re-add ncp support !
-REQUIRED_INSTALLED_PACKAGES="
- libpam-cap
- krb5-user
- krb5-config
- libpam-krb5
- libssl-dev
- ldap-utils
- libnfsidmap2
- nfs-common
- libpam0g-dev
- cifs-utils
-"
-REQUIRED_CONTENT_PACKAGES="
- libpam0g
- libpam-modules
- libpam-modules-bin
- libpam-cap
- libldap-2.4-2
- krb5-user
- krb5-config
- libpam-krb5
- ldap-utils
- libnfsidmap2
- nfs-common
- cifs-utils
- keyutils
-"
-REQUIRED_BINARIES+="
- mount.cifs
-"
-REQUIRED_DIRECTORIES+="
- $SYS_PAM_MODULES_PATH
- /lib
- /usr/lib
-"
-REQUIRED_SYSTEM_FILES+="
- /etc/securetty
- /etc/pam.conf
- /etc/default/locale
-"
diff --git a/core/modules/pam/module.conf.ubuntu.18 b/core/modules/pam/module.conf.ubuntu.18
deleted file mode 100644
index 7f0fcaca..00000000
--- a/core/modules/pam/module.conf.ubuntu.18
+++ /dev/null
@@ -1,43 +0,0 @@
-#!/bin/bash
-
-REQUIRED_INSTALLED_PACKAGES="
- libpam-cap
- krb5-user
- krb5-config
- libpam-krb5
- libssl-dev
- ldap-utils
- libnfsidmap2
- nfs-common
- libpam0g-dev
- cifs-utils
- libtool
-"
-REQUIRED_CONTENT_PACKAGES="
- libpam0g
- libpam-modules
- libpam-modules-bin
- libpam-cap
- libldap-2.4-2
- krb5-user
- krb5-config
- libpam-krb5
- ldap-utils
- libnfsidmap2
- nfs-common
- cifs-utils
- keyutils
-"
-REQUIRED_BINARIES+="
- mount.cifs
-"
-REQUIRED_DIRECTORIES+="
- $SYS_PAM_MODULES_PATH
- /lib
- /usr/lib
-"
-REQUIRED_SYSTEM_FILES+="
- /etc/securetty
- /etc/pam.conf
- /etc/default/locale
-"
--
cgit v1.2.3-55-g7522