diff options
author | 2015-08-08 13:49:04 -0700 | |
---|---|---|
committer | 2015-08-08 17:38:18 -0700 | |
commit | 56bd759df1d0c750a065b8c845e93d5dfa6b549d (patch) | |
tree | 3f91093cdb475e565ae857f1c5a7fd339e2d781e /net-fs/cifs-utils/files | |
download | gentoo-56bd759df1d0c750a065b8c845e93d5dfa6b549d.tar.gz gentoo-56bd759df1d0c750a065b8c845e93d5dfa6b549d.tar.bz2 gentoo-56bd759df1d0c750a065b8c845e93d5dfa6b549d.zip |
proj/gentoo: Initial commit
This commit represents a new era for Gentoo:
Storing the gentoo-x86 tree in Git, as converted from CVS.
This commit is the start of the NEW history.
Any historical data is intended to be grafted onto this point.
Creation process:
1. Take final CVS checkout snapshot
2. Remove ALL ChangeLog* files
3. Transform all Manifests to thin
4. Remove empty Manifests
5. Convert all stale $Header$/$Id$ CVS keywords to non-expanded Git $Id$
5.1. Do not touch files with -kb/-ko keyword flags.
Signed-off-by: Robin H. Johnson <robbat2@gentoo.org>
X-Thanks: Alec Warner <antarus@gentoo.org> - did the GSoC 2006 migration tests
X-Thanks: Robin H. Johnson <robbat2@gentoo.org> - infra guy, herding this project
X-Thanks: Nguyen Thai Ngoc Duy <pclouds@gentoo.org> - Former Gentoo developer, wrote Git features for the migration
X-Thanks: Brian Harring <ferringb@gentoo.org> - wrote much python to improve cvs2svn
X-Thanks: Rich Freeman <rich0@gentoo.org> - validation scripts
X-Thanks: Patrick Lauer <patrick@gentoo.org> - Gentoo dev, running new 2014 work in migration
X-Thanks: Michał Górny <mgorny@gentoo.org> - scripts, QA, nagging
X-Thanks: All of other Gentoo developers - many ideas and lots of paint on the bikeshed
Diffstat (limited to 'net-fs/cifs-utils/files')
3 files changed, 113 insertions, 0 deletions
diff --git a/net-fs/cifs-utils/files/cifs-utils-5.5-initialize_rc_var_properly.patch b/net-fs/cifs-utils/files/cifs-utils-5.5-initialize_rc_var_properly.patch new file mode 100644 index 000000000000..2faa853e0a58 --- /dev/null +++ b/net-fs/cifs-utils/files/cifs-utils-5.5-initialize_rc_var_properly.patch @@ -0,0 +1,38 @@ +From 0eb3daa4b17ee64b464594f1a5d413ecb364957c Mon Sep 17 00:00:00 2001 +From: Jeff Layton <jlayton@samba.org> +Date: Thu, 14 Jun 2012 10:59:18 -0400 +Subject: [PATCH 1/1] mount.cifs: set rc to 0 in libcap toggle_dac_capability + +Thus spake Jochen: + +The mount.cifs program from the cifs-utils package 5.5 did not work on +my Linux system. It just exited without an error message and did not +mount anything. + +[...] + +I think, when this variable rc is now used in this function, it has also +to be properly initialized there. + +Reported-by: Jochen Roderburg <roderburg@uni-koeln.de> +Signed-off-by: Jeff Layton <jlayton@samba.org> +--- + mount.cifs.c | 2 +- + 1 files changed, 1 insertions(+), 1 deletions(-) + +diff --git a/mount.cifs.c b/mount.cifs.c +index a1b0454..6f3f382 100644 +--- a/mount.cifs.c ++++ b/mount.cifs.c +@@ -495,7 +495,7 @@ free_caps: + static int + toggle_dac_capability(int writable, int enable) + { +- int rc; ++ int rc = 0; + cap_t caps; + cap_value_t capability = writable ? CAP_DAC_OVERRIDE : CAP_DAC_READ_SEARCH; + +-- +1.7.0.4 + diff --git a/net-fs/cifs-utils/files/cifs-utils-5.9-set-parsed_info-got_user-when-a-cred-file.patch b/net-fs/cifs-utils/files/cifs-utils-5.9-set-parsed_info-got_user-when-a-cred-file.patch new file mode 100644 index 000000000000..d06ae015d038 --- /dev/null +++ b/net-fs/cifs-utils/files/cifs-utils-5.9-set-parsed_info-got_user-when-a-cred-file.patch @@ -0,0 +1,31 @@ +From: Jeff Layton <jlayton@samba.org> +Date: Sun, 13 Jan 2013 03:02:01 +0000 (-0500) +Subject: mount.cifs: set parsed_info->got_user when a cred file supplies a username +X-Git-Url: https://gitweb.samba.org/?p=cifs-utils.git;a=commitdiff_plain;h=1a01f7c4b90695211d12291d7a24bec05b1f2922 + +mount.cifs: set parsed_info->got_user when a cred file supplies a username + +commit 85d18a1ed introduced a regression when using a credentials file. +It set the username in the parsed mount info properly, but didn't set +the "got_user" flag in it. + +Also, fix an incorrect strlcpy length specifier in open_cred_file. + +Reported-by: "Mantas M." <grawity@gmail.com> +Signed-off-by: Jeff Layton <jlayton@samba.org> +--- + +diff --git a/mount.cifs.c b/mount.cifs.c +index c7c3055..40b77e9 100644 +--- a/mount.cifs.c ++++ b/mount.cifs.c +@@ -581,7 +581,8 @@ static int open_cred_file(char *file_name, + switch (parse_cred_line(line_buf + i, &temp_val)) { + case CRED_USER: + strlcpy(parsed_info->username, temp_val, +- sizeof(parsed_info->domain)); ++ sizeof(parsed_info->username)); ++ parsed_info->got_user = 1; + break; + case CRED_PASS: + i = set_password(parsed_info, temp_val); diff --git a/net-fs/cifs-utils/files/cifs-utils-6.1-hardcoded-path.patch b/net-fs/cifs-utils/files/cifs-utils-6.1-hardcoded-path.patch new file mode 100644 index 000000000000..c2e2ea21d81e --- /dev/null +++ b/net-fs/cifs-utils/files/cifs-utils-6.1-hardcoded-path.patch @@ -0,0 +1,44 @@ +From 4e315f6a02a4edb259b33bcf0665eba259fee2f2 Mon Sep 17 00:00:00 2001 +From: =?utf8?q?Micha=C5=82=20G=C3=B3rny?= <mgorny@gentoo.org> +Date: Tue, 30 Jul 2013 10:00:26 +0200 +Subject: [PATCH] Do not rely on hardcoded path to systemd-ask-password. +MIME-Version: 1.0 +Content-Type: text/plain; charset=utf8 +Content-Transfer-Encoding: 8bit + +Relying on hardcoded /bin/systemd-ask-password path breaks systemd that +install systemd-ask-password in /usr/bin. Since both paths are supposed +to be in ${PATH} and popen() passes the command to shell, just pass +'systemd-ask-password' and let the shell find it. + +Fixes: https://bugzilla.samba.org/show_bug.cgi?id=10054 +Signed-off-by: MichaŠGórny <mgorny@gentoo.org> +--- + mount.cifs.c | 4 ++-- + 1 files changed, 2 insertions(+), 2 deletions(-) + +diff --git a/mount.cifs.c b/mount.cifs.c +index e76beee..7206dcb 100644 +--- a/mount.cifs.c ++++ b/mount.cifs.c +@@ -1626,7 +1626,7 @@ drop_child_privs(void) + } + + /* +- * If systemd is running and /bin/systemd-ask-password -- ++ * If systemd is running and systemd-ask-password -- + * is available, then use that else fallback on getpass(..) + * + * Returns: @input or NULL on error +@@ -1649,7 +1649,7 @@ get_password(const char *prompt, char *input, int capacity) + FILE *ask_pass_fp = NULL; + + cmd = ret = NULL; +- if (asprintf(&cmd, "/bin/systemd-ask-password \"%s\"", prompt) >= 0) { ++ if (asprintf(&cmd, "systemd-ask-password \"%s\"", prompt) >= 0) { + ask_pass_fp = popen (cmd, "re"); + free (cmd); + } +-- +1.7.0.4 + |