Пакет perl-Passwd-Linux: Specfile

#
#   - Passwd::Linux -
#   This spec file was automatically generated by cpan2rpm [ver: 2.027]
#   (ALT Linux revision)
#   The following arguments were used:
#       Passwd-Linux
#   For more information on cpan2rpm please visit: http://perl.arix.com/
#

%define module Passwd-Linux
%define m_distro Passwd-Linux
%define m_name Passwd::Linux
%define m_author_id unknown
%define _enable_test 1

Name: perl-Passwd-Linux
Version: 1.2
Release: alt1.1.1

Summary: Perl module for manipulating the passwd and shadow files

License: Artistic
Group: Development/Perl
Url: http://www.cpan.org

Packager: Igor Zubkov <icesik@altlinux.ru>

Source: http://search.cpan.org//CPAN/authors/id/E/EE/EESTABROO/%m_distro-%version.tar.gz

# Automatically added by buildreq on Thu Dec 13 2007
BuildRequires: perl-devel

%description
Passwd::Linux provides additional password routines.  It augments the getpw* functions with setpwinfo, modpwinfo, rmpwnam, mgetpwnam.  You need to run the functions as root or as someone who has permission to read/modify the shadow file.

setpwinfo and modpwinfo are called with arrays containing (in order):
 name, crypted_password, uid, gid, gecos, home_directory, shell, [ days_since_epoch_password_last_change, days_before_password_may_be_changed, days_after_which_password_must_be_changed, days_before_expire_user_is_warned, days_after_expire_password_is_disabled, days_since_epoch_account_is_disabled ]
 The optional fields are filled in as <days since the epoch>, 0, 99999, 7, <empty>, <empty>, when not given a value.
 Read the shadow manpage for additional details of the optional fields from the shadow file

rmpwnam is called with a list of names to remove

mgetpwnam returns the same array that getpwnam returns without the 'unused' age or comment fields it also returns the crypted password and the other shadow file fields if run with root permissions.

setpwinfo does a create/modify of the user.
modpwinfo only does a modify, it will return an error if the user doesn't exist.

rmpwnam removes the users with the given logins from both the password and shadow files.

You must be running as root in order to use this module. If it successfully completes an operation and you are not root then you have a huge security problem on your box.

This module as distributed does not allow operations to occur on uid 0 files

Return values:
  < 0	system error occurred, error value should be in $!
    0   no error
    1   operation attempt on uid 0
    2   user does not exist

%prep
%setup -q -n %m_distro-%version

rm -f test.pl

%build
%perl_vendor_build

%install
%perl_vendor_install

%files
%perl_vendor_archlib/*

%changelog
* Sun Nov 07 2010 Vladimir Lettiev <crux@altlinux.ru> 1.2-alt1.1.1
- rebuilt with perl 5.12

* Tue Oct 07 2008 Igor Vlasenko <viy@altlinux.ru> 1.2-alt1.1
- NMU: fix for perlarchdir ownership

* Thu Dec 13 2007 Igor Zubkov <icesik@altlinux.org> 1.2-alt1
- first build for ALT Linux Sisyphus