[Pkg-shadow-commits] sid/debian changelog,1.40,1.41 passwd.config,1.1,1.2 passwd.templates,1.1,1.2

Martin Quinson pkg-shadow-devel@lists.alioth.debian.org
Wed, 11 May 2005 11:32:54 +0000


Update of /cvsroot/pkg-shadow/sid/debian
In directory haydn:/tmp/cvs-serv16865

Modified Files:
	changelog passwd.config passwd.templates 
Log Message:
kill md5 question from passwd.templates since it is assumed true (and not asked) in the config since a whole while

Index: changelog
===================================================================
RCS file: /cvsroot/pkg-shadow/sid/debian/changelog,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -d -r1.40 -r1.41
--- changelog	11 May 2005 11:22:28 -0000	1.40
+++ changelog	11 May 2005 11:32:52 -0000	1.41
@@ -5,6 +5,8 @@
       Closes: #283729
     - Enable login for GNU/Hurd in rules. First patch from Robert Millan.
       Closes: #249372
+    - Cleanup passwd debconf stuff as md5 passwords are assumed since
+      1:4.0.3-19 and the resolution of #223664.
   * Debian specific programs fixes:
     - NONE
   * Upstream bugs not fixed in upstream releases or CVS:

Index: passwd.templates
===================================================================
RCS file: /cvsroot/pkg-shadow/sid/debian/passwd.templates,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -d -r1.1 -r1.2
--- passwd.templates	20 Mar 2005 14:48:28 -0000	1.1
+++ passwd.templates	11 May 2005 11:32:52 -0000	1.2
@@ -83,11 +83,3 @@
  that can only be read by special programs. The use of shadow passwords
  is strongly recommended. However, if you're going to use NIS you could
  run into trouble.
-
-Template: passwd/md5
-Type: boolean
-Default: false
-_Description: Enable md5 passwords?
- Md5 passwords are more secure and allow for passwords longer than 8
- characters to be used. However, they can cause compatibility problems if
- you are using NIS or sharing password files with older systems.

Index: passwd.config
===================================================================
RCS file: /cvsroot/pkg-shadow/sid/debian/passwd.config,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -d -r1.1 -r1.2
--- passwd.config	20 Mar 2005 14:48:28 -0000	1.1
+++ passwd.config	11 May 2005 11:32:52 -0000	1.2
@@ -65,12 +65,7 @@
 	# This is very annoying. chpasswd cannot handle generating md5
 	# passwords as it is not PAM-aware. Thus, I have to work around
 	# that by crypting the password myself if md5 is used.
-#	db_get passwd/md5
-#	if [ "$RET" = true ]; then
-		USE_MD5=1
-#	else
-#		USE_MD5=''
-#	fi
+	USE_MD5=1
 	export USE_MD5
 	perl -e '
 		sub CreateCryptSalt {
@@ -110,28 +105,7 @@
 		db_input low passwd/shadow || true
 	;;
 	1)	
-# 		# Turn md5 passwords on/off now, so the two passwords set
-# 		# below can use it.
-# 		db_get passwd/md5
-# 		for file in /etc/pam.d/*; do
-# 			if [ -e $file ]; then
-# 				if [ "$RET" = true ]; then
-# 					# On.
-# 					if ! egrep -q "^password.*pam_(unix|ldap)\.so.*md5" $file ; then
-# 						sed 's/^\(password.*\)/\1 md5/' \
-# 							< $file > $file.new
-# 						mv -f $file.new $file
-# 					fi
-# 				else
-# 					# Off.
-# 					if egrep -q "^password.*pam_(unix|ldap)\.so.*md5" $file ; then
-# 						sed 's/^\(password.*\)md5/\1/' \
-# 							< $file > $file.new
-# 						mv -f $file.new $file
-# 					fi
-# 				fi
-# 			fi
-# 		done
+	# md5 passwords are now on by default. This step is dead.
 	:
 	;;
 	2)