* Merge from Debian unstable, remaining changes:
- debian/libpam-modules.postinst: Add PATH to /etc/environment if it's
not present there or in /etc/security/pam_env.conf. (should send to
Debian).
- debian/libpam0g.postinst: only ask questions during update-manager when
there are non-default services running.
- debian/patches-applied/series: Ubuntu patches are as below ...
- debian/patches-applied/ubuntu-rlimit_nice_correction: Explicitly
initialise RLIMIT_NICE rather than relying on the kernel limits.
- Change Vcs-Bzr to point at the Ubuntu branch.
- debian/patches-applied/pam_motd-legal-notice: display the contents of
/etc/legal once, then set a flag in the user's homedir to prevent
showing it again.
- debian/update-motd.5, debian/libpam-modules.manpages: add a manpage
for update-motd, with some best practices and notes of explanation.
- debian/patches/update-motd-manpage-ref: add a reference in pam_motd(8)
to update-motd(5)
pam (1.1.2-2) unstable; urgency=low
* debian/patches-applied/hurd_no_setfsuid: handle some new calls to
setfsuid in pam_xauth that I overlooked, so that the build works again
on non-Linux. Closes: #613630.
pam (1.1.2-1) unstable; urgency=low
* New upstream release.
- Add support for NSS groups to pam_group. Closes: #589019,
LP: #297408.
- Support cross-building the package. Thanks to Neil Williams
<email address hidden> for the patch. Closes: #284854.
* debian/rules: pass getconf LFS_CFLAGS so that we get a 64-bit rlimit
interface. Closes: #579402.
* Drop patches conditional_module,_conditional_man and
mkhomedir_linking.patch, which are included upstream.
* debian/patches/hurd_no_setfsuid: pam_env and pam_mail now also use
setfsuid, so patch them to be likewise Hurd-safe.
* Update debian/source.lintian-overrides to clean up some spurious
warnings.
* debian/libpam-modules.postinst: if any 'min=n' options are found in
/etc/pam.d/common-password, convert them on upgrade to 'minlen=n' for
compatibility with upstream.
* debian/NEWS: document the disappearance of 'min=n', in case users have
encoded this option elsewhere outside of /etc/pam.d/common-password.
* debian/patches/007_modules_pam_unix: drop compatibility handling of
'max=' no-op; use of this option will now log an error, as warned three
years ago.
* Bump Standards-Version to 3.9.1.
* Add lintian overrides for a few more spurious warnings.
* debian/patches-applied/no_PATH_MAX_on_hurd: define PATH_MAX for
compatibility when it's not already set. Closes: #552043.
* debian/local/pam-auth-update: Don't try to pass embedded newlines to
debconf; backslash-escape them instead and use CAPB escape.
* debian/local/pam-auth-update: sort additional module options before
writing them out, so that we don't wind up with a different config file
on every invocation. Thanks to Jim Paris <email address hidden> for the patch.
Closes: #594123.
* debian/libpam-runtime.{postinst,templates}: since 1.1.2-1 is targeted
for post-squeeze, we don't need to support upgrades from 1.0.1-6 to
1.0.1-10 anymore. Drop the debconf error note about having configured
your system with a lack of authentication, so that translators don't
spend any more time on it.
* Updated debconf translations:
- Swedish, thanks to Martin Bagge <email address hidden> (closes: #575875)
pam (1.1.1-7) UNRELEASED; urgency=low
* Updated debconf translations:
- Italian, thanks to Nicole B. <email address hidden> (closes: #602112)
-- Steve Langasek <email address hidden> Thu, 17 Feb 2011 16:15:47 -0800
This bug was fixed in the package pam - 1.1.2-2ubuntu1
---------------
pam (1.1.2-2ubuntu1) natty; urgency=low
* Merge from Debian unstable, remaining changes: libpam- modules. postinst: Add PATH to /etc/environment if it's pam_env. conf. (should send to libpam0g. postinst: only ask questions during update-manager when patches- applied/ series: Ubuntu patches are as below ... patches- applied/ ubuntu- rlimit_ nice_correction : Explicitly patches- applied/ pam_motd- legal-notice: display the contents of update- motd.5, debian/ libpam- modules. manpages: add a manpage patches/ update- motd-manpage- ref: add a reference in pam_motd(8)
- debian/
not present there or in /etc/security/
Debian).
- debian/
there are non-default services running.
- debian/
- debian/
initialise RLIMIT_NICE rather than relying on the kernel limits.
- Change Vcs-Bzr to point at the Ubuntu branch.
- debian/
/etc/legal once, then set a flag in the user's homedir to prevent
showing it again.
- debian/
for update-motd, with some best practices and notes of explanation.
- debian/
to update-motd(5)
pam (1.1.2-2) unstable; urgency=low
* debian/ patches- applied/ hurd_no_ setfsuid: handle some new calls to
setfsuid in pam_xauth that I overlooked, so that the build works again
on non-Linux. Closes: #613630.
pam (1.1.2-1) unstable; urgency=low
* New upstream release. module, _conditional_ man and linking. patch, which are included upstream. patches/ hurd_no_ setfsuid: pam_env and pam_mail now also use source. lintian- overrides to clean up some spurious libpam- modules. postinst: if any 'min=n' options are found in pam.d/common- password, convert them on upgrade to 'minlen=n' for d/common- password. patches/ 007_modules_ pam_unix: drop compatibility handling of patches- applied/ no_PATH_ MAX_on_ hurd: define PATH_MAX for local/pam- auth-update: Don't try to pass embedded newlines to local/pam- auth-update: sort additional module options before libpam- runtime. {postinst, templates} : since 1.1.2-1 is targeted
- Add support for NSS groups to pam_group. Closes: #589019,
LP: #297408.
- Support cross-building the package. Thanks to Neil Williams
<email address hidden> for the patch. Closes: #284854.
* debian/rules: pass getconf LFS_CFLAGS so that we get a 64-bit rlimit
interface. Closes: #579402.
* Drop patches conditional_
mkhomedir_
* debian/
setfsuid, so patch them to be likewise Hurd-safe.
* Update debian/
warnings.
* debian/
/etc/
compatibility with upstream.
* debian/NEWS: document the disappearance of 'min=n', in case users have
encoded this option elsewhere outside of /etc/pam.
* debian/
'max=' no-op; use of this option will now log an error, as warned three
years ago.
* Bump Standards-Version to 3.9.1.
* Add lintian overrides for a few more spurious warnings.
* debian/
compatibility when it's not already set. Closes: #552043.
* debian/
debconf; backslash-escape them instead and use CAPB escape.
* debian/
writing them out, so that we don't wind up with a different config file
on every invocation. Thanks to Jim Paris <email address hidden> for the patch.
Closes: #594123.
* debian/
for post-squeeze, we don't need to support upgrades from 1.0.1-6 to
1.0.1-10 anymore. Drop the debconf error note about having configured
your system with a lack of authentication, so that translators don't
spend any more time on it.
* Updated debconf translations:
- Swedish, thanks to Martin Bagge <email address hidden> (closes: #575875)
pam (1.1.1-7) UNRELEASED; urgency=low
* Updated debconf translations:
- Italian, thanks to Nicole B. <email address hidden> (closes: #602112)
-- Steve Langasek <email address hidden> Thu, 17 Feb 2011 16:15:47 -0800