summarylogtreecommitdiffstats
diff options
context:
space:
mode:
authorJan Cholasta2016-08-02 17:38:03 +0200
committerJan Cholasta2016-08-02 18:00:39 +0200
commitc6c2d053ac1831f0e10a364f2fbb7b003aa32082 (patch)
tree09c665c9ccd01800dc92b5d4b1218d504320de82
downloadaur-c6c2d053ac1831f0e10a364f2fbb7b003aa32082.tar.gz
Initial commit
-rw-r--r--.SRCINFO47
-rw-r--r--.gitignore7
-rw-r--r--0001-Adapt-to-Arch-Linux.patch288
-rw-r--r--PKGBUILD136
4 files changed, 478 insertions, 0 deletions
diff --git a/.SRCINFO b/.SRCINFO
new file mode 100644
index 00000000000..7216957e12c
--- /dev/null
+++ b/.SRCINFO
@@ -0,0 +1,47 @@
+pkgbase = authconfig
+ pkgdesc = Command line tool for setting up authentication from network services
+ pkgver = 6.2.10
+ pkgrel = 1
+ url = https://fedorahosted.org/authconfig/
+ arch = i686
+ arch = x86_64
+ license = GPL
+ makedepends = desktop-file-utils
+ makedepends = intltool
+ makedepends = perl-xml-parser
+ makedepends = python2
+ depends = libnewt
+ depends = libpwquality
+ depends = openssl
+ depends = pam>=0.99.10.0
+ depends = sssd>=1.13.0
+ conflicts = freeipa-client<2.2.0
+ conflicts = nss_ldap<254
+ conflicts = pam-krb5<1.49
+ conflicts = samba<3.0
+ backup = etc/conf.d/authconfig
+ backup = etc/pam.d/system-auth-ac
+ backup = etc/pam.d/system-login-ac
+ source = https://fedorahosted.org/releases/a/u/authconfig/authconfig-6.2.10.tar.bz2
+ source = 0001-Adapt-to-Arch-Linux.patch
+ sha256sums = b9897f526825107287687084bd414c565a42b23e1669df0bf1a82cc460d3b78f
+ sha256sums = bbecf678693b96489239b37236846ba1a8058285fdf68f47d674b534137ee119
+
+pkgname = authconfig
+
+pkgname = authconfig-gtk
+ pkgdesc = Graphical tool for setting up authentication from network services
+ depends = =6.2.10-1
+ depends = hicolor-icon-theme
+ depends = pygtk>=2.14.0
+ depends = python2-dbus
+ depends = usermode
+ backup = etc/pam.d/authconfig
+ backup = etc/pam.d/authconfig-gtk
+ backup = etc/pam.d/authconfig-tui
+ backup = etc/pam.d/system-config-authentication
+ backup = etc/security/console.apps/authconfig
+ backup = etc/security/console.apps/authconfig-gtk
+ backup = etc/security/console.apps/authconfig-tui
+ backup = etc/security/console.apps/system-config-authentication
+
diff --git a/.gitignore b/.gitignore
new file mode 100644
index 00000000000..5642e2f2619
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1,7 @@
+/*.tar.gz
+/*.tar.bz2
+/*.tar.xz
+/*.zip
+/*.7z
+/pkg/
+/src/
diff --git a/0001-Adapt-to-Arch-Linux.patch b/0001-Adapt-to-Arch-Linux.patch
new file mode 100644
index 00000000000..16e4395802b
--- /dev/null
+++ b/0001-Adapt-to-Arch-Linux.patch
@@ -0,0 +1,288 @@
+From f18cee1f17886ef4d54ea44e4ecc34f45df6abb6 Mon Sep 17 00:00:00 2001
+From: Jan Cholasta <jcholast@redhat.com>
+Date: Thu, 28 Jul 2016 11:04:36 +0200
+Subject: [PATCH] Adapt to Arch Linux
+
+---
+ Makefile.am | 2 +-
+ authinfo.py | 51 +++++++++++-------------------------------------
+ man/en/Makefile.am | 2 +-
+ man/en/authconfig.8 | 8 ++++----
+ man/en/postlogin-ac.5 | 1 -
+ man/en/system-auth-ac.5 | 20 +++----------------
+ man/en/system-login-ac.5 | 1 +
+ 7 files changed, 21 insertions(+), 64 deletions(-)
+ delete mode 100644 man/en/postlogin-ac.5
+ create mode 100644 man/en/system-login-ac.5
+
+diff --git a/Makefile.am b/Makefile.am
+index 0bc08a8..ca066eb 100644
+--- a/Makefile.am
++++ b/Makefile.am
+@@ -51,7 +51,7 @@ install-data-local: authconfig.desktop
+ touch $(DESTDIR)/$(pamdir)/password-auth-ac
+ touch $(DESTDIR)/$(pamdir)/fingerprint-auth-ac
+ touch $(DESTDIR)/$(pamdir)/smartcard-auth-ac
+- touch $(DESTDIR)/$(pamdir)/postlogin-ac
++ touch $(DESTDIR)/$(pamdir)/system-login-ac
+ mkdir -p $(DESTDIR)/$(datadir)/applications
+ desktop-file-install \
+ --dir=$(DESTDIR)/$(datadir)/applications \
+diff --git a/authinfo.py b/authinfo.py
+index 4e05a95..0a875a4 100644
+--- a/authinfo.py
++++ b/authinfo.py
+@@ -60,8 +60,8 @@ SYSCONFDIR = "/etc"
+ AUTH_PAM_SERVICE = "system-auth"
+ AUTH_PAM_SERVICE_AC = "system-auth-ac"
+
+-POSTLOGIN_PAM_SERVICE = "postlogin"
+-POSTLOGIN_PAM_SERVICE_AC = "postlogin-ac"
++POSTLOGIN_PAM_SERVICE = "system-login"
++POSTLOGIN_PAM_SERVICE_AC = "system-login-ac"
+
+ PASSWORD_AUTH_PAM_SERVICE = "password-auth"
+ PASSWORD_AUTH_PAM_SERVICE_AC = "password-auth-ac"
+@@ -75,7 +75,7 @@ SMARTCARD_AUTH_PAM_SERVICE_AC = "smartcard-auth-ac"
+ SSSD_AUTHCONFIG_DOMAIN = "default"
+
+ if "lib64" in str(globals()["acutil"]):
+- LIBDIR = "/lib64"
++ LIBDIR = "/lib"
+ else:
+ LIBDIR = "/lib"
+
+@@ -1055,9 +1055,6 @@ class SafeFile:
+ self.file.flush()
+ os.fsync(self.file.fileno())
+ os.rename(self.file.name, self.filename)
+- if self.missing:
+- call(["/usr/sbin/restorecon", self.filename],
+- stderr=os.open('/dev/null', os.O_WRONLY))
+
+ def close(self):
+ # we may have renamed the temp file, need to catch OSError
+@@ -1147,13 +1144,6 @@ class FileBackup:
+ if rv and os.path.isfile(backuppath):
+ rv = self.safeCopy(backuppath, self.origPath)
+
+- try:
+- if rv:
+- call(["/usr/sbin/restorecon", self.origPath],
+- stderr=os.open('/dev/null', os.O_WRONLY))
+- except (IOError, OSError):
+- pass
+-
+ return rv
+
+ def readCache():
+@@ -1224,8 +1214,8 @@ class CacheBackup(FileBackup):
+ # indexes for the configs
+ (CFG_HESIOD, CFG_YP, CFG_LDAP, CFG_NSSLDAP, CFG_PAMLDAP, CFG_NSLCD, CFG_OPENLDAP, CFG_KRB5,
+ CFG_KRB, CFG_PAM_PKCS11, CFG_SMB, CFG_NSSWITCH, CFG_CACHE,
+- CFG_PAM, CFG_POSTLOGIN_PAM, CFG_PASSWORD_PAM, CFG_FINGERPRINT_PAM, CFG_SMARTCARD_PAM, CFG_AUTHCONFIG, CFG_NETWORK, CFG_LIBUSER, CFG_PWQUALITY,
+- CFG_LOGIN_DEFS, CFG_SSSD, CFG_SHADOW, CFG_PASSWD, CFG_GSHADOW, CFG_GROUP, CFG_DCONF, CFG_DCONF_LOCKS) = list(range(0, 30))
++ CFG_PAM, CFG_POSTLOGIN_PAM, CFG_AUTHCONFIG, CFG_NETWORK, CFG_LIBUSER, CFG_PWQUALITY,
++ CFG_LOGIN_DEFS, CFG_SSSD, CFG_SHADOW, CFG_PASSWD, CFG_GSHADOW, CFG_GROUP, CFG_DCONF, CFG_DCONF_LOCKS) = list(range(0, 27))
+ all_configs = [
+ FileBackup("hesiod.conf", SYSCONFDIR+"/hesiod.conf"),
+ FileBackup("yp.conf", SYSCONFDIR+"/yp.conf"),
+@@ -1241,12 +1231,9 @@ all_configs = [
+ FileBackup("nsswitch.conf", SYSCONFDIR+"/nsswitch.conf"),
+ CacheBackup("cacheenabled.conf", ""),
+ FileBackup("system-auth-ac", SYSCONFDIR+"/pam.d/"+AUTH_PAM_SERVICE_AC),
+- FileBackup("postlogin-ac", SYSCONFDIR+"/pam.d/"+POSTLOGIN_PAM_SERVICE_AC),
+- FileBackup("password-auth-ac", SYSCONFDIR+"/pam.d/"+PASSWORD_AUTH_PAM_SERVICE_AC),
+- FileBackup("fingerprint-auth-ac", SYSCONFDIR+"/pam.d/"+FINGERPRINT_AUTH_PAM_SERVICE_AC),
+- FileBackup("smartcard-auth-ac", SYSCONFDIR+"/pam.d/"+SMARTCARD_AUTH_PAM_SERVICE_AC),
+- FileBackup("authconfig", SYSCONFDIR+"/sysconfig/authconfig"),
+- FileBackup("network", SYSCONFDIR+"/sysconfig/network"),
++ FileBackup("system-login-ac", SYSCONFDIR+"/pam.d/"+POSTLOGIN_PAM_SERVICE_AC),
++ FileBackup("authconfig", SYSCONFDIR+"/conf.d/authconfig"),
++ FileBackup("nisdomainname", SYSCONFDIR+"/nisdomainname"),
+ FileBackup("libuser.conf", SYSCONFDIR+"/libuser.conf"),
+ FileBackup("pwquality.conf", SYSCONFDIR+"/security/pwquality.conf"),
+ FileBackup("login.defs", SYSCONFDIR+"/login.defs"),
+@@ -2436,7 +2423,7 @@ class AuthInfo:
+ except IOError:
+ return False
+
+- tmp = shv.getValue("NISDOMAIN")
++ tmp = shv.getValue("NISDOMAINNAME")
+ if tmp:
+ self.nisLocalDomain = tmp
+
+@@ -3881,8 +3868,7 @@ class AuthInfo:
+ pass
+
+ def checkPAMLinked(self):
+- for dest in [AUTH_PAM_SERVICE, POSTLOGIN_PAM_SERVICE, PASSWORD_AUTH_PAM_SERVICE,
+- FINGERPRINT_AUTH_PAM_SERVICE, SMARTCARD_AUTH_PAM_SERVICE]:
++ for dest in [AUTH_PAM_SERVICE, POSTLOGIN_PAM_SERVICE]:
+ dest = SYSCONFDIR + "/pam.d/" + dest
+ f = os.path.isfile(dest)
+ l = os.path.islink(dest)
+@@ -3967,9 +3953,6 @@ class AuthInfo:
+ self.module_missing = {}
+ self.writePAMService(STANDARD, CFG_PAM, AUTH_PAM_SERVICE_AC, AUTH_PAM_SERVICE)
+ self.writePAMService(POSTLOGIN, CFG_POSTLOGIN_PAM, POSTLOGIN_PAM_SERVICE_AC, POSTLOGIN_PAM_SERVICE)
+- self.writePAMService(PASSWORD_ONLY, CFG_PASSWORD_PAM, PASSWORD_AUTH_PAM_SERVICE_AC, PASSWORD_AUTH_PAM_SERVICE)
+- self.writePAMService(FINGERPRINT, CFG_FINGERPRINT_PAM, FINGERPRINT_AUTH_PAM_SERVICE_AC, FINGERPRINT_AUTH_PAM_SERVICE)
+- self.writePAMService(SMARTCARD, CFG_SMARTCARD_PAM, SMARTCARD_AUTH_PAM_SERVICE_AC, SMARTCARD_AUTH_PAM_SERVICE)
+ return True
+
+ def writeSysconfig(self):
+@@ -4024,7 +4007,7 @@ class AuthInfo:
+ except IOError:
+ return False
+
+- shv.setValue("NISDOMAIN", self.nisDomain)
++ shv.setValue("NISDOMAINNAME", self.nisDomain)
+
+ shv.write(0o644)
+ shv.close()
+@@ -4364,7 +4347,6 @@ class AuthInfo:
+ if not nostart:
+ os.system("/bin/domainname " + self.nisDomain)
+ try:
+- os.system("[[ $(getsebool allow_ypbind) == *off* ]] && setsebool -P allow_ypbind 1")
+ os.stat(PATH_RPCBIND)
+ Service.enable("rpcbind")
+ if not nostart:
+@@ -4383,7 +4365,6 @@ class AuthInfo:
+ if not nostart:
+ os.system("/bin/domainname \"(none)\"")
+ try:
+- os.system("[[ $(getsebool allow_ypbind) == *on* ]] && setsebool -P allow_ypbind 0")
+ os.stat(PATH_YPBIND)
+ if not nostart:
+ try:
+@@ -4400,16 +4381,6 @@ class AuthInfo:
+ not self.implicitSSSD,
+ PATH_NSLCD,
+ "nslcd", nostart)
+- if self.enableLDAP:
+- try:
+- os.system("[[ $(getsebool authlogin_nsswitch_use_ldap) == *off* ]] && setsebool -P authlogin_nsswitch_use_ldap 1")
+- except OSError:
+- pass
+- else:
+- try:
+- os.system("[[ $(getsebool authlogin_nsswitch_use_ldap) == *on* ]] && setsebool -P authlogin_nsswitch_use_ldap 0")
+- except OSError:
+- pass
+ return True
+
+ def toggleWinbindService(self, nostart):
+diff --git a/man/en/Makefile.am b/man/en/Makefile.am
+index f8139af..5445e78 100644
+--- a/man/en/Makefile.am
++++ b/man/en/Makefile.am
+@@ -1,4 +1,4 @@
+ man8_MANS = authconfig.8 authconfig-tui.8 authconfig-gtk.8 system-config-authentication.8 \
+ cacertdir_rehash.8
+-man5_MANS = system-auth-ac.5 fingerprint-auth-ac.5 password-auth-ac.5 smartcard-auth-ac.5 postlogin-ac.5
++man5_MANS = system-auth-ac.5 fingerprint-auth-ac.5 password-auth-ac.5 smartcard-auth-ac.5 system-login-ac.5
+ EXTRA_DIST = $(man8_MANS) $(man5_MANS)
+diff --git a/man/en/authconfig.8 b/man/en/authconfig.8
+index 45e6f2b..d38a731 100644
+--- a/man/en/authconfig.8
++++ b/man/en/authconfig.8
+@@ -11,7 +11,7 @@ authconfig, authconfig-tui \- an interface for configuring system authentication
+ .in -7
+ .SH DESCRIPTION
+ \fBauthconfig\fR provides a simple method of configuring
+-/etc/sysconfig/network to handle NIS, as well as /etc/passwd and
++/etc/nisdomainname to handle NIS, as well as /etc/passwd and
+ /etc/shadow, the files used for shadow password support. Basic LDAP,
+ Kerberos 5, and Winbind client configuration is also provided.
+
+@@ -70,7 +70,7 @@ Kerberos (\fB--enablekrb5\fR) for authentication.
+
+ In case \fISSSD\fR does not support some feature of the legacy services that are
+ required for the site configuration, the use of the legacy services can be forced
+-by setting FORCELEGACY=yes in \fB/etc/sysconfig/authconfig\fP.
++by setting FORCELEGACY=yes in \fB/etc/conf.d/authconfig\fP.
+
+ The list of options mentioned here in the manual page is not exhaustive, please
+ refer to \fBauthconfig --help\fR for the complete list of the options.
+@@ -129,7 +129,7 @@ return the same codes as \fBauthconfig\fR.
+ .PD 0
+ .TP
+ .TP
+-.FN /etc/sysconfig/authconfig
++.FN /etc/conf.d/authconfig
+ Used to track whether or not particular authentication mechanisms are enabled.
+ Currently includes variables named USESHADOW, USEMD5, USEKERBEROS, USELDAPAUTH,
+ USESMBAUTH, USEWINBIND, USEWINBINDAUTH, USEHESIOD, USENIS, USELDAP, and others.
+@@ -142,7 +142,7 @@ Used for shadow password support.
+ .FN /etc/yp.conf
+ Configuration file for NIS support.
+ .TP
+-.FN /etc/sysconfig/network
++.FN /etc/nisdomainname
+ Another configuration file for NIS support.
+ .TP
+ .FN /etc/ldap.conf
+diff --git a/man/en/postlogin-ac.5 b/man/en/postlogin-ac.5
+deleted file mode 100644
+index 3550f54..0000000
+--- a/man/en/postlogin-ac.5
++++ /dev/null
+@@ -1 +0,0 @@
+-.so man5/system-auth-ac.5
+diff --git a/man/en/system-auth-ac.5 b/man/en/system-auth-ac.5
+index 8c55e19..c1b7aaf 100644
+--- a/man/en/system-auth-ac.5
++++ b/man/en/system-auth-ac.5
+@@ -1,8 +1,7 @@
+ .TH SYSTEM-AUTH-AC 5 "2010 March 31" "Red Hat, Inc."
+ .SH NAME
+
+-system-auth-ac, password-auth-ac, smartcard-auth-ac,
+-fingerprint-auth-ac, postlogin-ac \- Common configuration files for
++system-auth-ac, system-login-ac \- Common configuration files for
+ PAMified services written by authconfig(8)
+
+ .SH SYNOPSIS
+@@ -29,23 +28,10 @@ and writes the configuration to this file. The symlink is not changed on
+ subsequent configuration changes even if it points elsewhere. This allows
+ system administrators to override the configuration written by authconfig.
+
+-The authconfig now writes the authentication modules also into additional PAM
+-configuration files \fB/etc/pam.d/password-auth-ac\fR,
+-\fB/etc/pam.d/smartcard-auth-ac\fR, and \fB/etc/pam.d/fingerprint-auth-ac\fR.
+-These configuration files contain only modules which perform
+-authentication with the respective kinds of authentication tokens.
+-For example \fB/etc/pam.d/smartcard-auth[-ac]\fR will not contain
+-\fBpam_unix\fR and \fBpam_ldap\fR modules and \fB/etc/pam.d/password-auth[-ac]\fR
+-will not contain \fBpam_pkcs11\fR and \fBpam_fprintd\fR modules.
+-
+-The file \fB/etc/pam.d/postlogin-ac\fR contains common services
++The file \fB/etc/pam.d/system-login-ac\fR contains common services
+ to be invoked after login. An example can be a module that encrypts an
+ user's filesystem or user's keyring and is decrypted by his password.
+
+-The PAM configuration files of services which are accessed by remote
+-connections such as sshd or ftpd now include the \fB/etc/pam.d/password-auth\fR
+-configuration file instead of \fB/etc/pam.d/system-auth\fR.
+-
+
+ .SH EXAMPLE
+ Configure system to use pam_tally2 for configuration of maximum number of
+@@ -78,4 +64,4 @@ session include system-auth-ac
+ None known.
+
+ .SH "SEE ALSO"
+-authconfig(8), authconfig-gtk(8), pam(8), system-auth(5)
++authconfig(8), authconfig-gtk(8), pam(8)
+diff --git a/man/en/system-login-ac.5 b/man/en/system-login-ac.5
+new file mode 100644
+index 0000000..3550f54
+--- /dev/null
++++ b/man/en/system-login-ac.5
+@@ -0,0 +1 @@
++.so man5/system-auth-ac.5
+--
+2.7.4
+
diff --git a/PKGBUILD b/PKGBUILD
new file mode 100644
index 00000000000..3a9cf82f4be
--- /dev/null
+++ b/PKGBUILD
@@ -0,0 +1,136 @@
+# Maintainer: Jan Cholasta <grubber at grubber cz>
+# Contributor: Fran├žois Steinmetz <francois.steinmetz@gmail.com>
+# Contributor: Zdenek Janecek <jan.zdenek@gmail.com>
+# Based on Fedora authconfig.spec
+
+pkgname=(authconfig authconfig-gtk)
+pkgver=6.2.10
+pkgrel=1
+pkgdesc='Command line tool for setting up authentication from network services'
+arch=('i686' 'x86_64')
+url='https://fedorahosted.org/authconfig/'
+license=('GPL')
+depends=('libnewt' 'libpwquality' 'openssl' 'pam>=0.99.10.0' 'sssd>=1.13.0')
+makedepends=('desktop-file-utils'
+ 'intltool'
+ 'perl-xml-parser'
+ 'python2')
+conflicts=('freeipa-client<2.2.0' 'nss_ldap<254' 'pam-krb5<1.49' 'samba<3.0')
+backup=(etc/conf.d/authconfig
+ etc/pam.d/system-auth-ac
+ etc/pam.d/system-login-ac)
+source=("https://fedorahosted.org/releases/a/u/authconfig/${pkgname}-${pkgver}.tar.bz2"
+ 0001-Adapt-to-Arch-Linux.patch)
+sha256sums=('b9897f526825107287687084bd414c565a42b23e1669df0bf1a82cc460d3b78f'
+ 'bbecf678693b96489239b37236846ba1a8058285fdf68f47d674b534137ee119')
+
+prepare() {
+ cd "${pkgbase}-${pkgver}"
+
+ rm -f man/en/system-login-ac.5
+
+ patch -p1 <"$srcdir"/0001-Adapt-to-Arch-Linux.patch
+
+ autoreconf -fi
+}
+
+build() {
+ cd "${pkgbase}-${pkgver}"
+
+ PYTHONREV=2 ./configure --prefix=/usr \
+ --sysconfdir=/etc \
+ --localstatedir=/var \
+ --sbindir=/usr/bin
+ make sysconfigdir=/etc/conf.d
+
+ mkdir -p _install
+ make install sysconfigdir=/etc/conf.d DESTDIR="$PWD"/_install
+
+ find _install/usr/share -name '*.mo' | xargs ./utf8ify-mo
+
+ rm -f _install/usr/lib/python*/site-packages/acutil.a
+ rm -f _install/usr/lib/python*/site-packages/acutil.la
+ rm -f _install/usr/share/"$pkgbase"/authconfig-tui.py
+ ln -s authconfig.py _install/usr/share/"$pkgbase"/authconfig-tui.py
+
+ sed -ri '1s/python/python2/' _install/usr/share/"$pkgbase"/*.py
+}
+
+package_authconfig() {
+ cd "${pkgbase}-${pkgver}"
+
+ local _file
+ for _file in _install/etc/conf.d/authconfig \
+ _install/etc/pam.d/system-auth-ac \
+ _install/etc/pam.d/system-login-ac \
+ _install/usr/bin/authconfig \
+ _install/usr/bin/authconfig-tui \
+ _install/usr/bin/cacertdir_rehash \
+ _install/usr/lib/python2.*/site-packages/acutil.so \
+ _install/usr/share/"$pkgbase"/authconfig.py* \
+ _install/usr/share/"$pkgbase"/authconfig-tui.py* \
+ _install/usr/share/"$pkgbase"/authinfo.py* \
+ _install/usr/share/"$pkgbase"/dnsclient.py* \
+ _install/usr/share/"$pkgbase"/msgarea.py* \
+ _install/usr/share/"$pkgbase"/shvfile.py* \
+ _install/usr/share/locale/*/*/authconfig.mo \
+ _install/usr/share/man/man5/* \
+ _install/usr/share/man/man8/authconfig.* \
+ _install/usr/share/man/man8/authconfig-tui.* \
+ _install/usr/share/man/man8/cacertdir_rehash.* \
+ _install/var/lib/authconfig
+ do
+ _file="${_file#_install/}"
+ mkdir -p "$pkgdir"/"${_file%/*}"
+ mv _install/"$_file" "$pkgdir"/"$_file"
+ done
+
+ chmod 700 "$pkgdir"/var/lib/authconfig
+
+ install -D -m644 -t"$pkgdir"/usr/share/doc/"$pkgname" COPYING \
+ NOTES \
+ README.samba3 \
+ TODO
+}
+
+package_authconfig-gtk() {
+ pkgdesc='Graphical tool for setting up authentication from network services'
+ depends=("${pkgbase}=${pkgver}-${pkgrel}"
+ 'hicolor-icon-theme'
+ 'pygtk>=2.14.0'
+ 'python2-dbus'
+ 'usermode')
+ backup=(etc/pam.d/authconfig
+ etc/pam.d/authconfig-gtk
+ etc/pam.d/authconfig-tui
+ etc/pam.d/system-config-authentication
+ etc/security/console.apps/authconfig
+ etc/security/console.apps/authconfig-gtk
+ etc/security/console.apps/authconfig-tui
+ etc/security/console.apps/system-config-authentication)
+
+ cd "${pkgbase}-${pkgver}"
+
+ local _file
+ for _file in _install/etc/pam.d/authconfig \
+ _install/etc/pam.d/authconfig-gtk \
+ _install/etc/pam.d/authconfig-tui \
+ _install/etc/pam.d/system-config-authentication \
+ _install/etc/security/console.apps/authconfig \
+ _install/etc/security/console.apps/authconfig-gtk \
+ _install/etc/security/console.apps/authconfig-tui \
+ _install/etc/security/console.apps/system-config-authentication \
+ _install/usr/bin/authconfig-gtk \
+ _install/usr/bin/system-config-authentication \
+ _install/usr/share/"$pkgbase"/authconfig.glade \
+ _install/usr/share/"$pkgbase"/authconfig-gtk.py* \
+ _install/usr/share/applications/* \
+ _install/usr/share/icons/hicolor/*/apps/system-config-authentication.* \
+ _install/usr/share/man/man8/authconfig-gtk.* \
+ _install/usr/share/man/man8/system-config-authentication.*
+ do
+ _file="${_file#_install/}"
+ mkdir -p "$pkgdir"/"${_file%/*}"
+ mv _install/"$_file" "$pkgdir"/"$_file"
+ done
+}