[arch-commits] Commit in yubico-pam/trunk (5 files)

Christian Hesse eworm at archlinux.org
Thu Apr 16 14:57:00 UTC 2020


    Date: Thursday, April 16, 2020 @ 14:56:59
  Author: eworm
Revision: 615341

upgpkg: yubico-pam 2.26-2

rebuild old package

Added:
  yubico-pam/trunk/0001-fix_compiler_warning_in_pam_test_c.patch
  yubico-pam/trunk/0002-fix_implicit_declaration_warning_of_mkostemp.patch
  yubico-pam/trunk/0003-tests-add-a-http-1.1-header-to-the-ykval-mock.patch
Modified:
  yubico-pam/trunk/PKGBUILD
Deleted:
  yubico-pam/trunk/0001-util-make-sure-to-close-the-authfile-before-returnin.patch

-----------------------------------------------------------------+
 0001-fix_compiler_warning_in_pam_test_c.patch                   |  171 ++++++++++
 0001-util-make-sure-to-close-the-authfile-before-returnin.patch |   26 -
 0002-fix_implicit_declaration_warning_of_mkostemp.patch         |   24 +
 0003-tests-add-a-http-1.1-header-to-the-ykval-mock.patch        |   33 +
 PKGBUILD                                                        |   20 -
 5 files changed, 245 insertions(+), 29 deletions(-)

Added: 0001-fix_compiler_warning_in_pam_test_c.patch
===================================================================
--- 0001-fix_compiler_warning_in_pam_test_c.patch	                        (rev 0)
+++ 0001-fix_compiler_warning_in_pam_test_c.patch	2020-04-16 14:56:59 UTC (rev 615341)
@@ -0,0 +1,171 @@
+From 9341f3477ad24cded99ada8dd48b6010293fa112 Mon Sep 17 00:00:00 2001
+From: Tero Paloheimo <tero.paloheimo at iki.fi>
+Date: Wed, 24 Oct 2018 16:23:47 +0300
+Subject: [PATCH] Fix compiler warning in pam_test.c
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+Compiler cannot find the declaration for pm_sm_authenticate and prints
+the following warning (split due to long line):
+pam_test.c:184:10: warning: implicit declaration of function
+‘pam_sm_authenticate’; did you mean ‘pam_authenticate’?
+[-Wimplicit-function-declaration]
+---
+ tests/pam_test.c | 42 +++++++++++++++++++++++-------------------
+ 1 file changed, 23 insertions(+), 19 deletions(-)
+
+diff --git a/tests/pam_test.c b/tests/pam_test.c
+index fbeb0f4..d88dc70 100644
+--- a/tests/pam_test.c
++++ b/tests/pam_test.c
+@@ -48,6 +48,10 @@ struct pam_modutil_privs {
+ };
+ #endif
+ 
++int
++pam_sm_authenticate (pam_handle_t * pamh,
++                     int flags, int argc, const char **argv);
++
+ #define YKVAL_PORT1 "17502"
+ #define YKVAL_PORT2 "30559"
+ #define LDAP_PORT "52825"
+@@ -181,7 +185,7 @@ static int test_authenticate1(void) {
+     "authfile="AUTHFILE,
+     "debug",
+   };
+-  return pam_sm_authenticate(0, 0, sizeof(cfg) / sizeof(char*), cfg);
++  return pam_sm_authenticate((pam_handle_t *)0, 0, sizeof(cfg) / sizeof(char*), cfg);
+ }
+ 
+ static int test_authenticate2(void) {
+@@ -191,7 +195,7 @@ static int test_authenticate2(void) {
+     "authfile="AUTHFILE,
+     "debug",
+   };
+-  return pam_sm_authenticate(0, 0, sizeof(cfg) / sizeof(char*), cfg);
++  return pam_sm_authenticate((pam_handle_t *)0, 0, sizeof(cfg) / sizeof(char*), cfg);
+ }
+ 
+ static int test_authenticate3(void) {
+@@ -201,7 +205,7 @@ static int test_authenticate3(void) {
+     "authfile="AUTHFILE,
+     "debug",
+   };
+-  return pam_sm_authenticate(4, 0, sizeof(cfg) / sizeof(char*), cfg);
++  return pam_sm_authenticate((pam_handle_t *)4, 0, sizeof(cfg) / sizeof(char*), cfg);
+ }
+ 
+ static int test_authenticate4(void) {
+@@ -211,7 +215,7 @@ static int test_authenticate4(void) {
+     "authfile="AUTHFILE,
+     "debug",
+   };
+-  return pam_sm_authenticate(5, 0, sizeof(cfg) / sizeof(char*), cfg);
++  return pam_sm_authenticate((pam_handle_t *)5, 0, sizeof(cfg) / sizeof(char*), cfg);
+ }
+ 
+ static int test_authenticate5(void) {
+@@ -221,7 +225,7 @@ static int test_authenticate5(void) {
+     "authfile="AUTHFILE,
+     "debug",
+   };
+-  return pam_sm_authenticate(6, 0, sizeof(cfg) / sizeof(char*), cfg);
++  return pam_sm_authenticate((pam_handle_t *)6, 0, sizeof(cfg) / sizeof(char*), cfg);
+ }
+ 
+ static int test_fail_authenticate1(void) {
+@@ -231,7 +235,7 @@ static int test_fail_authenticate1(void) {
+     "authfile="AUTHFILE,
+     "debug"
+   };
+-  return pam_sm_authenticate(1, 0, sizeof(cfg) / sizeof(char*), cfg);
++  return pam_sm_authenticate((pam_handle_t *)1, 0, sizeof(cfg) / sizeof(char*), cfg);
+ }
+ 
+ static int test_fail_authenticate2(void) {
+@@ -241,7 +245,7 @@ static int test_fail_authenticate2(void) {
+     "authfile="AUTHFILE,
+     "debug"
+   };
+-  return pam_sm_authenticate(2, 0, sizeof(cfg) / sizeof(char*), cfg);
++  return pam_sm_authenticate((pam_handle_t *)2, 0, sizeof(cfg) / sizeof(char*), cfg);
+ }
+ 
+ static int test_fail_authenticate3(void) {
+@@ -251,7 +255,7 @@ static int test_fail_authenticate3(void) {
+     "authfile="AUTHFILE,
+     "debug"
+   };
+-  return pam_sm_authenticate(3, 0, sizeof(cfg) / sizeof(char*), cfg);
++  return pam_sm_authenticate((pam_handle_t *)3, 0, sizeof(cfg) / sizeof(char*), cfg);
+ }
+ 
+ static int test_firstpass_authenticate(void) {
+@@ -262,7 +266,7 @@ static int test_firstpass_authenticate(void) {
+     "use_first_pass",
+     "debug"
+   };
+-  return pam_sm_authenticate(8, 0, sizeof(cfg) / sizeof(char*), cfg);
++  return pam_sm_authenticate((pam_handle_t *)8, 0, sizeof(cfg) / sizeof(char*), cfg);
+ }
+ 
+ static int test_firstpass_fail(void) {
+@@ -273,7 +277,7 @@ static int test_firstpass_fail(void) {
+     "use_first_pass",
+     "debug"
+   };
+-  return pam_sm_authenticate(9, 0, sizeof(cfg) / sizeof(char*), cfg);
++  return pam_sm_authenticate((pam_handle_t *)9, 0, sizeof(cfg) / sizeof(char*), cfg);
+ }
+ 
+ static int test_firstpass_fail2(void) {
+@@ -284,39 +288,39 @@ static int test_firstpass_fail2(void) {
+     "use_first_pass",
+     "debug"
+   };
+-  return pam_sm_authenticate(10, 0, sizeof(cfg) / sizeof(char*), cfg);
++  return pam_sm_authenticate((pam_handle_t *)10, 0, sizeof(cfg) / sizeof(char*), cfg);
+ }
+ 
+ static int test_authenticate_ldap1(void) {
+-  return pam_sm_authenticate(0, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
++  return pam_sm_authenticate((pam_handle_t *)0, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
+ }
+ 
+ static int test_authenticate_ldap_fail1(void) {
+-  return pam_sm_authenticate(1, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
++  return pam_sm_authenticate((pam_handle_t *)1, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
+ }
+ 
+ static int test_authenticate_ldap_fail2(void) {
+-  return pam_sm_authenticate(2, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
++  return pam_sm_authenticate((pam_handle_t *)2, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
+ }
+ 
+ static int test_authenticate_ldap2(void) {
+-  return pam_sm_authenticate(4, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
++  return pam_sm_authenticate((pam_handle_t *)4, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
+ }
+ 
+ static int test_authenticate_ldap3(void) {
+-  return pam_sm_authenticate(4, 0, sizeof(ldap_cfg2) / sizeof(char*), ldap_cfg2);
++  return pam_sm_authenticate((pam_handle_t *)4, 0, sizeof(ldap_cfg2) / sizeof(char*), ldap_cfg2);
+ }
+ 
+ static int test_authenticate_ldap4(void) {
+-  return pam_sm_authenticate(5, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
++  return pam_sm_authenticate((pam_handle_t *)5, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
+ }
+ 
+ static int test_authenticate_ldap5(void) {
+-  return pam_sm_authenticate(6, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
++  return pam_sm_authenticate((pam_handle_t *)6, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
+ }
+ 
+ static int test_authenticate_ldap6(void) {
+-  return pam_sm_authenticate(7, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
++  return pam_sm_authenticate((pam_handle_t *)7, 0, sizeof(ldap_cfg) / sizeof(char*), ldap_cfg);
+ }
+ 
+ static pid_t run_mock(const char *port, const char *type) {

Deleted: 0001-util-make-sure-to-close-the-authfile-before-returnin.patch
===================================================================
--- 0001-util-make-sure-to-close-the-authfile-before-returnin.patch	2020-04-16 14:52:51 UTC (rev 615340)
+++ 0001-util-make-sure-to-close-the-authfile-before-returnin.patch	2020-04-16 14:56:59 UTC (rev 615341)
@@ -1,26 +0,0 @@
-From 0f6ceabab0a8849b47f67d727aa526c2656089ba Mon Sep 17 00:00:00 2001
-From: Klas Lindfors <klas at yubico.com>
-Date: Tue, 3 Apr 2018 09:19:53 +0200
-Subject: [PATCH 1/1] util: make sure to close the authfile before returning
- success
-
-fixes #136
-
-Signed-off-by: Christian Hesse <mail at eworm.de>
----
- util.c | 2 ++
- 1 file changed, 2 insertions(+)
-
-diff --git a/util.c b/util.c
-index 6cb4a79..32bca06 100644
---- a/util.c
-+++ b/util.c
-@@ -167,6 +167,8 @@ check_user_token (const char *authfile,
- 		{
- 		  if(verbose)
- 		      D (debug_file, "Match user/token as %s/%s", username, otp_id);
-+
-+		  fclose(opwfile);
- 		  return AUTH_FOUND;
- 		}
- 	    }

Added: 0002-fix_implicit_declaration_warning_of_mkostemp.patch
===================================================================
--- 0002-fix_implicit_declaration_warning_of_mkostemp.patch	                        (rev 0)
+++ 0002-fix_implicit_declaration_warning_of_mkostemp.patch	2020-04-16 14:56:59 UTC (rev 615341)
@@ -0,0 +1,24 @@
+From be2fdfdada6d419b4b80de2449e845d323516f72 Mon Sep 17 00:00:00 2001
+From: Tero Paloheimo <tero.paloheimo at iki.fi>
+Date: Tue, 1 Jan 2019 21:53:24 +0200
+Subject: [PATCH] Fix implicit declaration warning of mkostemp
+
+mkostemp() requires the _GNU_SOURCE feature test macro.
+See man 3 mkostemp.
+---
+ pam_yubico.c | 2 ++
+ 1 file changed, 2 insertions(+)
+
+diff --git a/pam_yubico.c b/pam_yubico.c
+index 2c6c5d9..1dbad63 100644
+--- a/pam_yubico.c
++++ b/pam_yubico.c
+@@ -28,6 +28,8 @@
+  * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+  */
+ 
++#define _GNU_SOURCE
++
+ #include <stdio.h>
+ #include <stdlib.h>
+ #include <stdarg.h>

Added: 0003-tests-add-a-http-1.1-header-to-the-ykval-mock.patch
===================================================================
--- 0003-tests-add-a-http-1.1-header-to-the-ykval-mock.patch	                        (rev 0)
+++ 0003-tests-add-a-http-1.1-header-to-the-ykval-mock.patch	2020-04-16 14:56:59 UTC (rev 615341)
@@ -0,0 +1,33 @@
+From 7926f8dd41c007cbe19751d4ecfd0618dd937962 Mon Sep 17 00:00:00 2001
+From: Klas Lindfors <klas at yubico.com>
+Date: Thu, 16 Apr 2020 10:59:35 +0200
+Subject: [PATCH 1/1] tests: add a http/1.1 header to the ykval mock
+
+it lies a bit more convincingly like this
+fixes #202
+---
+ tests/aux/ykval.pl | 5 +++--
+ 1 file changed, 3 insertions(+), 2 deletions(-)
+
+diff --git a/tests/aux/ykval.pl b/tests/aux/ykval.pl
+index d7f2b1c..60f980d 100755
+--- a/tests/aux/ykval.pl
++++ b/tests/aux/ykval.pl
+@@ -54,7 +54,8 @@ warn "YKVAL mockup started on $port";
+ while(1) {
+   my $clientsocket = $socket->accept();
+   my $clientdata = <$clientsocket>;
+-  my $ret = "h=ZrU7UfjwazJVf5ay1P/oC3XCQlI=\n";
++  my $ret = "HTTP/1.1 200 OK\n\n";
++  $ret .= "h=ZrU7UfjwazJVf5ay1P/oC3XCQlI=\n";
+ 
+   if($clientdata =~ m/nonce=([a-zA-Z0-9]+).*otp=([cbdefghijklnrtuv]+)/) {
+     my $nonce = $1;
+@@ -71,6 +72,6 @@ while(1) {
+   } else {
+     $ret .= "status=MISSING_PARAMETER";
+   }
+-  print $clientsocket "\n$ret\n";
++  print $clientsocket "$ret\n";
+   close $clientsocket;
+ }

Modified: PKGBUILD
===================================================================
--- PKGBUILD	2020-04-16 14:52:51 UTC (rev 615340)
+++ PKGBUILD	2020-04-16 14:56:59 UTC (rev 615341)
@@ -3,7 +3,7 @@
 pkgname=yubico-pam
 _shortname=pam_yubico
 pkgver=2.26
-pkgrel=1
+pkgrel=2
 pkgdesc='Yubico YubiKey PAM module'
 arch=('x86_64')
 url='https://github.com/Yubico/yubico-pam'
@@ -13,10 +13,24 @@
 provides=("${_shortname}")
 conflicts=("${_shortname}")
 validpgpkeys=('0A3B0262BCA1705307D5FF06BCA00FD4B2168C0A') # Klas Lindfors <klas at yubico.com>
-source=("https://developers.yubico.com/${pkgname}/Releases/${_shortname}-${pkgver}.tar.gz"{,.sig})
+source=("https://developers.yubico.com/${pkgname}/Releases/${_shortname}-${pkgver}.tar.gz"{,.sig}
+        '0001-fix_compiler_warning_in_pam_test_c.patch'
+        '0002-fix_implicit_declaration_warning_of_mkostemp.patch'
+        '0003-tests-add-a-http-1.1-header-to-the-ykval-mock.patch')
 sha256sums=('2de96495963fefd72b98243952ca5d5ec513e702c596e54bc667ef6b5e252966'
-            'SKIP')
+            'SKIP'
+            '151f57fcb7df2661a16f2ef840f805067a84b746b8683177e1a52581e7ffc19b'
+            'eacbe45d4580e4987ebb4d8e3f13e5df26be974d43731d811c858234ba4363d0'
+            '8773e6d5ca76cb46b6f1e7d37123f8116f6062b5ba3e537a140f20afcb205c31')
 
+prepare() {
+	cd "${_shortname}-${pkgver}"
+
+	patch -Np1 < ../0001-fix_compiler_warning_in_pam_test_c.patch
+	patch -Np1 < ../0002-fix_implicit_declaration_warning_of_mkostemp.patch
+	patch -Np1 < ../0003-tests-add-a-http-1.1-header-to-the-ykval-mock.patch
+}
+
 build() {
 	cd "${_shortname}-${pkgver}"
 



More information about the arch-commits mailing list