diff options
-rw-r--r-- | pambase-no-systemd-home/PKGBUILD | 11 | ||||
-rw-r--r-- | pambase-no-systemd-home/system-auth.patch | 20 |
2 files changed, 20 insertions, 11 deletions
diff --git a/pambase-no-systemd-home/PKGBUILD b/pambase-no-systemd-home/PKGBUILD index 073d75f32..4189940df 100644 --- a/pambase-no-systemd-home/PKGBUILD +++ b/pambase-no-systemd-home/PKGBUILD @@ -2,12 +2,12 @@ arch=('any') pkgname=pambase-no-systemd-home -pkgver=20221020 -pkgrel=1 +pkgver=20230918 +pkgrel=2 source=("http://ftp.gwdg.de/pub/linux/archlinux/core/os/x86_64/pambase-$pkgver-${pkgrel%.*}-any.pkg.tar.zst" system-auth.patch) -sha512sums=('3141e4c4d68befad53455b46a3dd7f74096b0d7b39429155d5f4bf397458aa101708cbf654753c32a9af0c4e448838bc534618e1660763164f46d9a1059e731c' - '1577816a179dd7c5e460cf673022a5cc7bb3ffadcbbb6b00e2452587e39a8b184692e4517c4d43018a6e28d185397a2adcf0aed3744f773d77e41e37871875f8') +sha256sums=('1cdb46ea999313aa3c17dc571ecbc4a3125c4021a9139bb36994c9eb287056b3' + 'cb5bf16f32ad1557412cc2399bb12108d731c9a10b07bb6891fef3aca1484219') provides=("pambase=$pkgver-${pkgrel%.*}") conflicts=('pambase') pkgdesc='bla' @@ -24,9 +24,6 @@ package() { pkgdesc|url|license) eval "$var"'="$value"' ;; - backup) - backup+=("$value") - ;; esac done < "$srcdir/.PKGINFO" } diff --git a/pambase-no-systemd-home/system-auth.patch b/pambase-no-systemd-home/system-auth.patch index e890a2093..788378ed1 100644 --- a/pambase-no-systemd-home/system-auth.patch +++ b/pambase-no-systemd-home/system-auth.patch @@ -1,6 +1,14 @@ ---- a/etc/pam.d/system-auth 2021-06-17 18:57:25.959996395 +0200 -+++ b/etc/pam.d/system-auth 2021-06-17 18:58:31.533329725 +0200 -@@ -11,12 +11,10 @@ +--- a/etc/pam.d/system-auth 2024-08-15 10:00:08.000000000 +0200 ++++ b/etc/pam.d/system-auth 2024-12-16 12:33:39.096773722 +0100 +@@ -3,7 +3,6 @@ + auth required pam_faillock.so preauth + # Optionally use requisite above if you do not want to prompt for the password + # on locked accounts. +--auth [success=2 default=ignore] pam_systemd_home.so + auth [success=1 default=bad] pam_unix.so try_first_pass nullok + auth [default=die] pam_faillock.so authfail + auth optional pam_permit.so +@@ -12,16 +11,13 @@ # If you drop the above call to pam_faillock.so the lock will be done also # on non-consecutive authentication failures. @@ -10,6 +18,10 @@ account required pam_time.so --password [success=1 default=ignore] pam_systemd_home.so - password required pam_unix.so try_first_pass nullok shadow sha512 + password required pam_unix.so try_first_pass nullok shadow password optional pam_permit.so +--session optional pam_systemd_home.so + session required pam_limits.so + session required pam_unix.so + session optional pam_permit.so |