diff options
author | Nicolás Reynolds <fauno@kiwwwi.com.ar> | 2011-02-09 01:10:35 -0300 |
---|---|---|
committer | Nicolás Reynolds <fauno@kiwwwi.com.ar> | 2011-02-09 01:10:35 -0300 |
commit | 8ff88e2d3f96711e2564612c66c1f5cc41935a23 (patch) | |
tree | fd76a61c509c03d644b25706e084f49bb295885f /libre | |
parent | fd57ac302278966e056009d4a1a897b1fad3467f (diff) | |
download | abslibre-8ff88e2d3f96711e2564612c66c1f5cc41935a23.tar.gz abslibre-8ff88e2d3f96711e2564612c66c1f5cc41935a23.tar.bz2 abslibre-8ff88e2d3f96711e2564612c66c1f5cc41935a23.zip |
Moving gstreamer0.10-bad-libre-2010.12-2 from [libre-testing] to [libre]
Diffstat (limited to 'libre')
-rw-r--r-- | libre/filesystem/PKGBUILD | 95 | ||||
-rw-r--r-- | libre/filesystem/crypttab | 33 | ||||
-rw-r--r-- | libre/filesystem/filesystem.install | 59 | ||||
-rw-r--r-- | libre/filesystem/fstab | 6 | ||||
-rw-r--r-- | libre/filesystem/group | 30 | ||||
-rw-r--r-- | libre/filesystem/gshadow | 30 | ||||
-rw-r--r-- | libre/filesystem/host.conf | 8 | ||||
-rw-r--r-- | libre/filesystem/hosts | 9 | ||||
-rw-r--r-- | libre/filesystem/issue | 3 | ||||
-rw-r--r-- | libre/filesystem/ld.so.conf | 7 | ||||
-rw-r--r-- | libre/filesystem/modprobe.d.usb-load-ehci-first | 2 | ||||
-rw-r--r-- | libre/filesystem/motd | 0 | ||||
-rw-r--r-- | libre/filesystem/nsswitch.conf | 19 | ||||
-rw-r--r-- | libre/filesystem/passwd | 7 | ||||
-rw-r--r-- | libre/filesystem/profile | 27 | ||||
-rw-r--r-- | libre/filesystem/resolv.conf | 8 | ||||
-rw-r--r-- | libre/filesystem/securetty | 15 | ||||
-rw-r--r-- | libre/filesystem/shadow | 7 | ||||
-rw-r--r-- | libre/filesystem/shells | 9 |
19 files changed, 374 insertions, 0 deletions
diff --git a/libre/filesystem/PKGBUILD b/libre/filesystem/PKGBUILD new file mode 100644 index 000000000..bdfbee155 --- /dev/null +++ b/libre/filesystem/PKGBUILD @@ -0,0 +1,95 @@ +# $Id: PKGBUILD 103015 2010-12-14 07:09:05Z pierre $ +# Maintainer: Pierre Schmitz <pierre@archlinux.de> +# Maintainer (Parabola): fauno <fauno@kiwwwi.com.ar> + +pkgname=filesystem +pkgver=2010.12 +pkgrel=2 +pkgdesc='Base filesystem for Parabola' +arch=('any') +license=('GPL') +url='http://parabolagnulinux.org' +groups=('base') +install='filesystem.install' +depends=('iana-etc' 'bash' 'coreutils') +backup=('etc/fstab' 'etc/crypttab' 'etc/group' 'etc/hosts' 'etc/ld.so.conf' 'etc/passwd' + 'etc/shadow' 'etc/gshadow' 'etc/resolv.conf' 'etc/motd' 'etc/nsswitch.conf' + 'etc/shells' 'etc/host.conf' 'etc/securetty' 'etc/profile' 'etc/issue') +source=('group' 'issue' 'nsswitch.conf' 'securetty' 'host.conf' 'ld.so.conf' + 'passwd' 'shadow' 'fstab' 'crypttab' 'hosts' 'motd' 'resolv.conf' 'shells' + 'gshadow' 'profile' 'modprobe.d.usb-load-ehci-first') +md5sums=('75c7e1770305e1f3b75c52785c137611' + '140787c0dc6f3f1272cfd381b92b0155' + '13753e4e0964f3652b0cc60a28528bdf' + '4c4540eeb748bf1f71d631b8c1dcf0b3' + 'f28150d4c0b22a017be51b9f7f9977ed' + '6e488ffecc8ba142c0cf7e2d7aeb832e' + '8a9042a2cedf6b6b47eb8973f14289cb' + 'b8355d9d2782f424f4cedcf682651be0' + 'ef40305da5803ca69d22e428ffc2ab9b' + 'e5d8323a4dbee7a6d0d2a19cbf4b819f' + '7bc65f234dfb6abf24e7c3b03e86f4ff' + 'd41d8cd98f00b204e9800998ecf8427e' + '6f48288b6fcaf0065fcb7b0e525413e0' + '40dac0de4c6b99c8ca97effbd7527c84' + '59768b5f4080b96b67bcde5f66984ad5' + '51ac5c337236235bf8fe85a9b07b6db1' + '8098ffd9fbf890468d3198277596b85a') + +package() { + cd ${srcdir} + + # + # setup root filesystem + # + for d in bin boot dev etc home lib/modules media mnt sbin usr var opt srv/http sys; do + install -d -m755 ${pkgdir}/${d} + done + install -d -m555 ${pkgdir}/proc + install -d -m0750 ${pkgdir}/root + install -d -m1777 ${pkgdir}/tmp + # vsftpd won't run with write perms on /srv/ftp + install -d -m555 -g ftp ${pkgdir}/srv/ftp + + # setup /etc + install -d ${pkgdir}/etc/{ld.so.conf.d,skel,profile.d} + for f in fstab group host.conf hosts issue ld.so.conf motd nsswitch.conf passwd resolv.conf securetty shells profile; do + install -m644 ${srcdir}/${f} ${pkgdir}/etc/ + done + for f in gshadow shadow crypttab; do + install -m600 ${srcdir}/${f} ${pkgdir}/etc/ + done + touch ${pkgdir}/etc/arch-release + install -D -m644 ${srcdir}/modprobe.d.usb-load-ehci-first ${pkgdir}/etc/modprobe.d/usb-load-ehci-first.conf + + # setup /var + for d in cache/man local opt run log/old lib/misc empty; do + install -d -m755 ${pkgdir}/var/${d} + done + install -d -m1777 ${pkgdir}/var/{lock,tmp,spool/mail} + # allow setgid games to write scores + install -d -m775 -g games ${pkgdir}/var/games + ln -s spool/mail ${pkgdir}/var/mail + # prevent pacman from removing directory (FS#16886) + touch ${pkgdir}/var/empty/.keep + + + # + # setup /usr hierarchy + # + for d in bin include lib sbin share/misc src; do + install -d -m755 ${pkgdir}/usr/${d} + done + for d in $(seq 8); do + install -d -m755 ${pkgdir}/usr/share/man/man${d} + done + + + # + # setup /usr/local hierarchy + # + for d in bin etc games include lib man sbin share src; do + install -d -m755 ${pkgdir}/usr/local/${d} + done + ln -s ../man ${pkgdir}/usr/local/share/man +} diff --git a/libre/filesystem/crypttab b/libre/filesystem/crypttab new file mode 100644 index 000000000..dd6994b5a --- /dev/null +++ b/libre/filesystem/crypttab @@ -0,0 +1,33 @@ +# crypttab: Mappings for encrypted partitions +# +# Each mapped device will be created in /dev/mapper, so your /etc/fstab +# should use the /dev/mapper/{NAME} paths for encrypted devices. +# +# Each PASSWORD field can be an absolute pathname to a key file (starting +# with a slash, recommended) or a literal string that will be used as +# a passphrase. To use special characters in the passphrase, surround it +# by quotes, the usual bash quoting rules apply. +# There are two special keywords that cannot be used as passphrases: +# - ASK ask for a passphrase on boot +# - SWAP use a random key and create a swapspace afterwards +# WARNING: use the SWAP keyword carefully, as it overwrites the data +# on the specified partition +# +# To create a key file: +# hashalot -n 32 ripemd160 >/etc/crytfs.key +# or +# dd if=/dev/urandom of=/etc/cryptfs.key bs=256 count=1 +# +# To pass additional options to cryptsetup for non-LUKS partitions, use the +# fourth column. +# +# NOTE: Do not list your root (/) partition here, it must be set up +# beforehand by the initramfs (/etc/mkinitcpio.conf). + + +# NAME SOURCE DEVICE PASSWORD OPTIONS +#home /dev/hda4 mypassword +#data1 /dev/hda3 "my \"password\"" +#data2 /dev/hda5 /etc/cryptfs.key +#swap /dev/hdx4 SWAP -c aes-cbc-essiv:sha256 -s 256 +#vol /dev/hdb7 ASK diff --git a/libre/filesystem/filesystem.install b/libre/filesystem/filesystem.install new file mode 100644 index 000000000..4b2b261a4 --- /dev/null +++ b/libre/filesystem/filesystem.install @@ -0,0 +1,59 @@ +post_install() { + [ -f var/log/lastlog ] || : >var/log/lastlog + [ -f var/log/wtmp ] || : >var/log/wtmp + [ -f var/run/utmp ] || : >var/run/utmp + [ -f var/log/btmp ] || (: >var/log/btmp && bin/chmod 600 var/log/btmp) + # workaround for bug #7194 + # readded due to bug #9465 + # please do not remove! + bin/chmod 1777 var/spool/mail tmp var/tmp var/lock +} + +# args: <group> [options] +_addgroup() { + if ! bin/grep -q "^$1:" etc/group; then + usr/sbin/groupadd ${@} >/dev/null + fi +} + +# args: <group> [options] +_adduser() { + if ! bin/grep -q "^$1:" etc/passwd; then + usr/sbin/useradd ${@} >/dev/null + fi +} + +post_upgrade() { + post_install + + _addgroup optical -g 93 + _addgroup audio -g 92 + _addgroup video -g 91 + _addgroup floppy -g 94 + _addgroup storage -g 95 + _addgroup log -g 19 + _addgroup power -g 98 + _addgroup network -g 90 + _addgroup games -g 50 + _addgroup uucp -g 14 + _addgroup http -g 33 + _adduser http -u 33 -d /srv/http -g http -s /bin/false http + _addgroup scanner -g 96 + _addgroup rfkill -g 24 + + # sync gshadow to group (fixes FS#19869 + if ! bin/grep -q '^rfkill:' etc/gshadow; then + usr/sbin/grpconv >/dev/null + fi + + if ! bin/grep -q '^include /etc/ld.so.conf.d/\*.conf$' etc/ld.so.conf; then + bin/echo 'include /etc/ld.so.conf.d/*.conf' >> etc/ld.so.conf + fi + + # set "Last password change" > 0; otherwise su $user wont work + for user in bin daemon mail ftp http nobody; do + if LANG=C usr/bin/chage -l ${user} | bin/grep -q 'password must be changed'; then + usr/bin/chage -d 14871 ${user} + fi + done +} diff --git a/libre/filesystem/fstab b/libre/filesystem/fstab new file mode 100644 index 000000000..a23e7955b --- /dev/null +++ b/libre/filesystem/fstab @@ -0,0 +1,6 @@ +# +# /etc/fstab: static file system information +# +# <file system> <dir> <type> <options> <dump> <pass> +devpts /dev/pts devpts defaults 0 0 +shm /dev/shm tmpfs nodev,nosuid 0 0 diff --git a/libre/filesystem/group b/libre/filesystem/group new file mode 100644 index 000000000..4bd635c47 --- /dev/null +++ b/libre/filesystem/group @@ -0,0 +1,30 @@ +root:x:0:root +bin:x:1:root,bin,daemon +daemon:x:2:root,bin,daemon +sys:x:3:root,bin +adm:x:4:root,daemon +tty:x:5: +disk:x:6:root +lp:x:7:daemon +mem:x:8: +kmem:x:9: +wheel:x:10:root +ftp:x:11: +mail:x:12: +uucp:x:14: +log:x:19:root +locate:x:21: +rfkill:x:24: +smmsp:x:25: +http:x:33: +games:x:50: +network:x:90: +video:x:91: +audio:x:92: +optical:x:93: +floppy:x:94: +storage:x:95: +scanner:x:96: +power:x:98: +nobody:x:99: +users:x:100: diff --git a/libre/filesystem/gshadow b/libre/filesystem/gshadow new file mode 100644 index 000000000..06b488fe9 --- /dev/null +++ b/libre/filesystem/gshadow @@ -0,0 +1,30 @@ +root:::root +bin:::root,bin,daemon +daemon:::root,bin,daemon +sys:::root,bin +adm:::root,daemon +tty::: +disk:::root +lp:::daemon +mem::: +kmem::: +wheel:::root +ftp::: +mail::: +uucp::: +log:::root +locate::: +rfkill:x:: +smmsp::: +http::: +games::: +network:x:: +video:x:: +audio::: +optical::: +floppy:x:: +storage:x:: +scanner:x:: +power:x:: +nobody::: +users::: diff --git a/libre/filesystem/host.conf b/libre/filesystem/host.conf new file mode 100644 index 000000000..cf52fe561 --- /dev/null +++ b/libre/filesystem/host.conf @@ -0,0 +1,8 @@ +# +# /etc/host.conf +# + +order hosts,bind +multi on + +# End of file diff --git a/libre/filesystem/hosts b/libre/filesystem/hosts new file mode 100644 index 000000000..1747f9196 --- /dev/null +++ b/libre/filesystem/hosts @@ -0,0 +1,9 @@ +# +# /etc/hosts: static lookup table for host names +# + +#<ip-address> <hostname.domain.org> <hostname> +127.0.0.1 localhost.localdomain localhost +::1 localhost.localdomain localhost + +# End of file diff --git a/libre/filesystem/issue b/libre/filesystem/issue new file mode 100644 index 000000000..323abdbf7 --- /dev/null +++ b/libre/filesystem/issue @@ -0,0 +1,3 @@ +[H[2J +Parabola GNU/Linux-libre \r (\n) (\l) + diff --git a/libre/filesystem/ld.so.conf b/libre/filesystem/ld.so.conf new file mode 100644 index 000000000..dfac45683 --- /dev/null +++ b/libre/filesystem/ld.so.conf @@ -0,0 +1,7 @@ +# +# /etc/ld.so.conf +# + +include /etc/ld.so.conf.d/*.conf + +# End of file diff --git a/libre/filesystem/modprobe.d.usb-load-ehci-first b/libre/filesystem/modprobe.d.usb-load-ehci-first new file mode 100644 index 000000000..3b5db0e7a --- /dev/null +++ b/libre/filesystem/modprobe.d.usb-load-ehci-first @@ -0,0 +1,2 @@ +install ohci_hcd /sbin/modprobe ehci_hcd ; /sbin/modprobe --ignore-install ohci_hcd $CMDLINE_OPTS +install uhci_hcd /sbin/modprobe ehci_hcd ; /sbin/modprobe --ignore-install uhci_hcd $CMDLINE_OPTS diff --git a/libre/filesystem/motd b/libre/filesystem/motd new file mode 100644 index 000000000..e69de29bb --- /dev/null +++ b/libre/filesystem/motd diff --git a/libre/filesystem/nsswitch.conf b/libre/filesystem/nsswitch.conf new file mode 100644 index 000000000..6e459adb6 --- /dev/null +++ b/libre/filesystem/nsswitch.conf @@ -0,0 +1,19 @@ +# Begin /etc/nsswitch.conf + +passwd: files +group: files +shadow: files + +publickey: files + +hosts: files dns +networks: files + +protocols: files +services: files +ethers: files +rpc: files + +netgroup: files + +# End /etc/nsswitch.conf diff --git a/libre/filesystem/passwd b/libre/filesystem/passwd new file mode 100644 index 000000000..a4a24e34f --- /dev/null +++ b/libre/filesystem/passwd @@ -0,0 +1,7 @@ +root:x:0:0:root:/root:/bin/bash +bin:x:1:1:bin:/bin:/bin/false +daemon:x:2:2:daemon:/sbin:/bin/false +mail:x:8:12:mail:/var/spool/mail:/bin/false +ftp:x:14:11:ftp:/srv/ftp:/bin/false +http:x:33:33:http:/srv/http:/bin/false +nobody:x:99:99:nobody:/:/bin/false diff --git a/libre/filesystem/profile b/libre/filesystem/profile new file mode 100644 index 000000000..ccc07a4e5 --- /dev/null +++ b/libre/filesystem/profile @@ -0,0 +1,27 @@ +# /etc/profile + +#Set our umask +umask 022 + +# Set our default path +PATH="/usr/local/bin:/usr/bin:/bin:/usr/local/sbin:/usr/sbin:/sbin" +export PATH + +# Load profiles from /etc/profile.d +if test -d /etc/profile.d/; then + for profile in /etc/profile.d/*.sh; do + test -r $profile && . $profile + done + unset profile +fi + +# Source global bash config +if test "$PS1" && test "$BASH" && test -r /etc/bash.bashrc; then + . /etc/bash.bashrc +fi + +# Termcap is outdated, old, and crusty, kill it. +unset TERMCAP + +# Man is much better than us at figuring this out +unset MANPATH diff --git a/libre/filesystem/resolv.conf b/libre/filesystem/resolv.conf new file mode 100644 index 000000000..cecafba03 --- /dev/null +++ b/libre/filesystem/resolv.conf @@ -0,0 +1,8 @@ +# +# /etc/resolv.conf +# + +#search <yourdomain.tld> +#nameserver <ip> + +# End of file diff --git a/libre/filesystem/securetty b/libre/filesystem/securetty new file mode 100644 index 000000000..5a2235ce7 --- /dev/null +++ b/libre/filesystem/securetty @@ -0,0 +1,15 @@ +# +# /etc/securetty +# + +console +tty1 +tty2 +tty3 +tty4 +tty5 +tty6 +ttyS0 +hvc0 + +# End of file diff --git a/libre/filesystem/shadow b/libre/filesystem/shadow new file mode 100644 index 000000000..ccab68d33 --- /dev/null +++ b/libre/filesystem/shadow @@ -0,0 +1,7 @@ +root::14871:::::: +bin:x:14871:::::: +daemon:x:14871:::::: +mail:x:14871:::::: +ftp:x:14871:::::: +http:x:14871:::::: +nobody:x:14871:::::: diff --git a/libre/filesystem/shells b/libre/filesystem/shells new file mode 100644 index 000000000..ff9e38348 --- /dev/null +++ b/libre/filesystem/shells @@ -0,0 +1,9 @@ +# +# /etc/shells +# + +/bin/sh +/bin/bash +/bin/dash + +# End of file |