1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
|
# Copyright 1999-2005 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/net-nds/openldap/openldap-2.1.30-r6.ebuild,v 1.8 2005/12/13 23:16:15 ferdy Exp $
inherit eutils
DESCRIPTION="LDAP suite of application and development tools"
HOMEPAGE="http://www.OpenLDAP.org/"
SRC_URI="mirror://openldap/openldap-release/${P}.tgz"
LICENSE="OPENLDAP"
SLOT="0"
KEYWORDS="alpha amd64 ~arm hppa ~ia64 ~mips ppc ppc64 ~s390 sparc x86"
IUSE="berkdb crypt debug gdbm ipv6 odbc perl readline samba sasl slp ssl tcpd selinux"
DEPEND=">=sys-libs/ncurses-5.1
>=sys-apps/sed-4
tcpd? ( >=sys-apps/tcp-wrappers-7.6 )
ssl? ( >=dev-libs/openssl-0.9.6 )
readline? ( >=sys-libs/readline-4.1 )
sasl? ( >=dev-libs/cyrus-sasl-2.1.7-r3 )
odbc? ( dev-db/unixODBC )
slp? ( >=net-libs/openslp-1.0 )
perl? ( >=dev-lang/perl-5.6 )
samba? ( >=dev-libs/openssl-0.9.6 )"
# note that the 'samba' USE flag pulling in OpenSSL is NOT an error. OpenLDAP
# uses OpenSSL for LanMan/NTLM hashing (which is used in some enviroments, like
# mine at work)!
# Robin H. Johnson <robbat2@gentoo.org> March 8, 2004
# if USE=berkdb
# pull in sys-libs/db
# else if USE=gdbm
# pull in sys-libs/gdbm
# else
# pull in sys-libs/db
DEPEND="${DEPEND}
berkdb? ( >=sys-libs/db-4.1.25_p1-r3 )
!berkdb? (
gdbm? ( >=sys-libs/gdbm-1.8.0 )
!gdbm? ( >=sys-libs/db-4.1.25_p1-r3 )
)"
RDEPEND="
${DEPEND}
selinux? ( sec-policy/selinux-openldap )"
pkg_preinst() {
enewgroup ldap 439
enewuser ldap 439 -1 /usr/lib/openldap ldap
}
pkg_setup() {
if built_with_use dev-lang/perl minimal ; then
die "You must have a complete (USE='-minimal') Perl install to use the perl backend!"
fi
}
src_unpack() {
unpack ${A}
# According to MDK, the link order needs to be changed so that
# on systems w/ MD5 passwords the system crypt library is used
# (the net result is that "passwd" can be used to change ldap passwords w/
# proper pam support)
sed -ie 's/$(SECURITY_LIBS) $(LDIF_LIBS) $(LUTIL_LIBS)/$(LUTIL_LIBS) $(SECURITY_LIBS) $(LDIF_LIBS)/' \
${S}/servers/slapd/Makefile.in
# Fix up DB-4.0 linking problem
# remember to autoconf! this expands configure by 500 lines (4 lines to m4
# stuff).
epatch ${FILESDIR}/${PN}-2.1.30-db40.patch
epatch ${FILESDIR}/${PN}-2.1.30-tls-activedirectory-hang-fix.patch
# Security bug #96767
# http://bugzilla.padl.com/show_bug.cgi?id=210
EPATCH_OPTS="-p1 -d ${S}" epatch ${FILESDIR}/${PN}-2.2.26-tls-fix-connection-test.patch
# supersedes old fix for bug #31202
cd ${S}
epatch ${FILESDIR}/${PN}-2.1.27-perlthreadsfix.patch
# fix up stuff for newer autoconf that simulates autoconf-2.13, but doesn't
# do it perfectly.
cd ${S}/build
ln -s shtool install
ln -s shtool install.sh
# ximian connector 1.4.7 ntlm patch
cd ${S}
epatch ${FILESDIR}/${PN}-2.1.30-ximian_connector.patch
export WANT_AUTOMAKE="1.9"
export WANT_AUTOCONF="2.5"
#make files ready for new autoconf
EPATCH_OPTS="-p0 -d ${S}" epatch ${FILESDIR}/${PN}-2.1.30-autoconf25.patch
# reconf compat and current for RPATH solve
cd ${WORKDIR}/${S}
einfo "Running libtoolize on ${S}"
libtoolize --copy --force
einfo "Running aclocal on ${S}"
aclocal || die "aclocal failed"
EPATCH_OPTS="-p0 -d ${S}" epatch ${FILESDIR}/${PN}-2.1.30-rpath.patch
einfo "Running autoconf on ${S}"
autoconf || die "autoconf failed"
}
src_compile() {
local myconf
# enable debugging to syslog
use debug && myconf="${myconf} --enable-debug"
myconf="${myconf} --enable-syslog"
# enable slapd/slurpd servers
myconf="${myconf} --enable-ldap"
myconf="${myconf} --enable-slapd --enable-slurpd"
myconf="${myconf} `use_enable crypt`"
myconf="${myconf} `use_enable ipv6`"
myconf="${myconf} `use_with sasl cyrus-sasl` `use_enable sasl spasswd`"
myconf="${myconf} `use_with readline`"
myconf="${myconf} `use_with ssl tls` `use_with samba lmpasswd`"
myconf="${myconf} `use_enable tcpd wrappers`"
myconf="${myconf} `use_enable odbc sql`"
myconf="${myconf} `use_enable perl`"
myconf="${myconf} `use_enable slp`"
myconf="${myconf} --enable-ldbm"
myconf_berkdb='--enable-bdb --with-ldbm-api=berkeley'
myconf_gdbm='--disable-bdb --with-ldbm-api=gdbm'
if use berkdb; then
einfo "Using Berkeley DB for local backend"
myconf="${myconf} ${myconf_berkdb}"
elif use gdbm; then
einfo "Using GDBM for local backend"
myconf="${myconf} ${myconf_gdbm}"
else
ewarn "Neither gdbm or berkdb USE flags present, falling back to"
ewarn "Berkeley DB for local backend"
myconf="${myconf} ${myconf_berkdb}"
fi
# alas, for BSD only
#myconf="${myconf} --with-fetch"
myconf="${myconf} --enable-dynamic --enable-modules"
myconf="${myconf} --enable-rewrite --enable-rlookups"
myconf="${myconf} --enable-passwd --enable-phonetic"
myconf="${myconf} --enable-dnssrv --enable-ldap"
myconf="${myconf} --enable-meta --enable-monitor"
myconf="${myconf} --enable-null --enable-shell"
myconf="${myconf} --enable-local --enable-proctitle"
# disabled options
# --with-bdb-module=dynamic
# --enable-dnsserv --with-dnsserv-module=dynamic
econf \
--enable-static \
--enable-shared \
--libexecdir=/usr/lib/openldap \
${myconf} || die "configure failed"
make depend || die "make depend failed"
make || die "make failed"
}
src_test() {
einfo "Doing tests"
cd tests ; make tests || die "make tests failed"
}
src_install() {
make DESTDIR=${D} install || die "make install failed"
dodoc ANNOUNCEMENT CHANGES COPYRIGHT README LICENSE
docinto rfc ; dodoc doc/rfc/*.txt
# make state directories
for x in data slurp ldbm; do
keepdir /var/lib/openldap-${x}
fowners ldap:ldap /var/lib/openldap-${x}
fperms 0700 /var/lib/openldap-${x}
done
# manually remove /var/tmp references in .la
# because it is packaged with an ancient libtool
for x in ${D}/usr/lib/lib*.la; do
sed -i -e "s:-L${S}[/]*libraries::" ${x}
done
# change slapd.pid location in configuration file
keepdir /var/run/openldap
fowners ldap:ldap /var/run/openldap
fperms 0755 /var/run/openldap
for f in /etc/openldap/slapd.conf /etc/openldap/slapd.conf.default; do
sed -e "s:/var/lib/slapd.:/var/run/openldap/slapd.:" -i ${D}/${f}
sed -e "/database\tbdb$/acheckpoint 32 30 # <kbyte> <min>" -i ${D}/${f}
fowners root:ldap ${f}
fperms 0640 ${f}
done
# install our own init scripts
exeinto /etc/init.d
newexe ${FILESDIR}/2.0/slapd slapd
newexe ${FILESDIR}/2.0/slurpd slurpd
insinto /etc/conf.d
newins ${FILESDIR}/2.0/slapd.conf slapd
# install MDK's ssl cert script
if use ssl || use samba; then
dodir /etc/openldap/ssl
exeinto /etc/openldap/ssl
doexe ${FILESDIR}/gencert.sh
fi
}
pkg_postinst() {
if use ssl; then
# make a self-signed ssl cert (if there isn't one there already)
if [ ! -e /etc/openldap/ssl/ldap.pem ]
then
cd /etc/openldap/ssl
yes "" | sh gencert.sh
chmod 640 ldap.pem
chown root:ldap ldap.pem
else
einfo "An LDAP cert already appears to exist, no creating"
fi
fi
# Since moving to running openldap as user ldap there are some
# permissions problems with directories and files.
# Let's make sure these permissions are correct.
chown ldap:ldap /var/run/openldap
chmod 0755 /var/run/openldap
chown root:ldap /etc/openldap/slapd.conf
chmod 0640 /etc/openldap/slapd.conf
chown root:ldap /etc/openldap/slapd.conf.default
chmod 0640 /etc/openldap/slapd.conf.default
chown ldap:ldap /var/lib/openldap-{data,ldbm,slurp}
# notes from bug #41297, bug #41039
ewarn "If you are upgrading from OpenLDAP 2.0, major changes have occured:"
ewarn "- bind_anon_dn is now disabled by default for security"
ewarn " add 'allow bind_anon_dn' to your config for the old behavior."
ewarn "- Default schemas have changed, you should slapcat your entire DB to"
ewarn " a file, delete your DB, and then slapadd it again. Alternatively"
ewarn " you can try slapindex which should work in almost all cases. Be"
ewarn " sure to check the permissions on the database files afterwards!"
if use ssl; then
ewarn "- Self-signed SSL certificates are treated harshly by OpenLDAP 2.1"
ewarn " add 'TLS_REQCERT never' if you want to use them."
fi
}
|