[Pkg-cups-devel] r348 - in cupsys/branches/cups-1.2/debian: .

Kenshi Muto kmuto at costa.debian.org
Sun Aug 13 04:39:01 UTC 2006


Author: kmuto
Date: Sun Aug 13 04:39:00 2006
New Revision: 348

Modified:
   cupsys/branches/cups-1.2/debian/changelog
   cupsys/branches/cups-1.2/debian/patches/44_fixconfdirperms.dpatch

Log:
hm, we have two choices to solve lppasswd permission problem. chown lp /etc/cups, or chown root+s /usr/bin/lppasswd. I select first one, if it's no problem

Modified: cupsys/branches/cups-1.2/debian/changelog
==============================================================================
--- cupsys/branches/cups-1.2/debian/changelog	(original)
+++ cupsys/branches/cups-1.2/debian/changelog	Sun Aug 13 04:39:00 2006
@@ -13,6 +13,9 @@
   * Provide an new package, "cupsys-dbg" to help chasing the
     problems at user's environment.
   * Increment compat to 5.
+  * 44_fixconfdirperms: set owner lp for /etc/cups directory.
+    And modify lppasswd.man to mention about Debian
+    specific changes. lppasswd command now work. (closes: #378062)
 
  -- Kenshi Muto <kmuto at debian.org>  Thu, 27 Jul 2006 23:40:54 +0900
 

Modified: cupsys/branches/cups-1.2/debian/patches/44_fixconfdirperms.dpatch
==============================================================================
--- cupsys/branches/cups-1.2/debian/patches/44_fixconfdirperms.dpatch	(original)
+++ cupsys/branches/cups-1.2/debian/patches/44_fixconfdirperms.dpatch	Sun Aug 13 04:39:00 2006
@@ -5,10 +5,21 @@
 ## DP: No description.
 
 @DPATCH@
-diff -urNad cups-1.2-ubuntu~/scheduler/conf.c cups-1.2-ubuntu/scheduler/conf.c
---- cups-1.2-ubuntu~/scheduler/conf.c	2006-06-27 15:59:30.000000000 +0200
-+++ cups-1.2-ubuntu/scheduler/conf.c	2006-06-27 15:59:51.000000000 +0200
-@@ -540,22 +540,10 @@
+diff -urNad cupsys-1.2.2~/man/lppasswd.man cupsys-1.2.2/man/lppasswd.man
+--- cupsys-1.2.2~/man/lppasswd.man	2006-08-13 04:26:43.000000000 +0000
++++ cupsys-1.2.2/man/lppasswd.man	2006-08-13 04:30:06.000000000 +0000
+@@ -59,6 +59,7 @@
+ that could grant super-user privileges to unprivileged users,
+ paranoid system administrators may wish to disable or change the
+ ownership of the program to an unprivileged account.
++(So Debian installs \fllppasswd\fR command with setuid to lp)
+ .SH SEE ALSO
+ \fIlp(1)\fR, \fIlpr(1)\fR,
+ .br
+diff -urNad cupsys-1.2.2~/scheduler/conf.c cupsys-1.2.2/scheduler/conf.c
+--- cupsys-1.2.2~/scheduler/conf.c	2006-08-13 04:30:05.000000000 +0000
++++ cupsys-1.2.2/scheduler/conf.c	2006-08-13 04:33:29.000000000 +0000
+@@ -548,22 +548,10 @@
  
        cupsdLogMessage(CUPSD_LOG_NOTICE,
                        "Group and SystemGroup cannot use the same groups!");
@@ -33,7 +44,7 @@
      }
    }
  
-@@ -609,21 +597,10 @@
+@@ -617,21 +605,10 @@
    if (ServerCertificate[0] != '/')
      cupsdSetStringf(&ServerCertificate, "%s/%s", ServerRoot, ServerCertificate);
  
@@ -55,12 +66,12 @@
  #  endif /* HAVE_LIBSSL || HAVE_GNUTLS */
  #endif /* HAVE_SSL */
  
-@@ -639,11 +616,13 @@
+@@ -647,11 +624,13 @@
    check_permissions(StateDir, "certs", RunUser ? 0711 : 0511, User,
                      SystemGroupIDs[0], 1, 1);
  
 -  check_permissions(ServerRoot, NULL, 0755, RunUser, Group, 1, 0);
-+  check_permissions(ServerRoot, NULL, 03755, RunUser, Group, 1, 0);
++  check_permissions(ServerRoot, NULL, 03755, User, Group, 1, 0);
    check_permissions(ServerRoot, "ppd", 0755, RunUser, Group, 1, 1);
    check_permissions(ServerRoot, "ssl", 0700, RunUser, Group, 1, 0);
 +  /* Never alter permissions of central conffile



More information about the Pkg-cups-devel mailing list