# Copyright 1999-2005 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 # $Header: /var/cvsroot/gentoo-x86/net-nds/openldap/openldap-2.2.23.ebuild,v 1.4 2005/09/22 19:57:41 robbat2 Exp $ inherit eutils DESCRIPTION="LDAP suite of application and development tools" HOMEPAGE="http://www.OpenLDAP.org/" SRC_URI="mirror://openldap/openldap-release/${P}.tgz" LICENSE="OPENLDAP" SLOT="0" IUSE="berkdb crypt debug gdbm ipv6 odbc perl readline samba sasl slp ssl tcpd" #In portage for testing only, hardmasked in package.mask KEYWORDS="~alpha ~amd64 ~ia64 ~ppc ~ppc64 ~sparc ~x86" DEPEND=">=sys-libs/ncurses-5.1 >=sys-apps/sed-4 tcpd? ( >=sys-apps/tcp-wrappers-7.6 ) ssl? ( >=dev-libs/openssl-0.9.6 ) readline? ( >=sys-libs/readline-4.1 ) sasl? ( >=dev-libs/cyrus-sasl-2.1.7-r3 ) odbc? ( dev-db/unixODBC ) slp? ( >=net-libs/openslp-1.0 ) perl? ( >=dev-lang/perl-5.6 ) samba? ( >=dev-libs/openssl-0.9.6 )" # note that the 'samba' USE flag pulling in OpenSSL is NOT an error. OpenLDAP # uses OpenSSL for LanMan/NTLM hashing (which is used in some enviroments, like # mine at work)! # Robin H. Johnson March 8, 2004 # if USE=berkdb # pull in sys-libs/db # else if USE=gdbm # pull in sys-libs/gdbm # else # pull in sys-libs/db DEPEND_BERKDB=">=sys-libs/db-4.2.52_p1" DEPEND_GDBM=">=sys-libs/gdbm-1.8.0" DEPEND="${DEPEND} berkdb? ( ${DEPEND_BERKDB} ) !berkdb? ( gdbm? ( ${DEPEND_GDBM} ) !gdbm? ( ${DEPEND_BERKDB} ) )" #DEPEND="${DEPEND} !${l}" eerror " 4. emerge unmerge '<=net-nds/openldap-2.1*'" eerror " 5. mv /var/lib/openldap-data/ /var/lib/openldap-data,2.1/" eerror " 6. emerge '>=net-nds/openldap-2.2'" eerror " 7. etc-update, and ensure that you apply the changes" eerror " 8. slapadd -l ${l}" eerror " 9. chown ldap:ldap /var/lib/openldap-data/*" eerror "10. /etc/init.d/slapd start" eerror "11. check that your data is intact." eerror "12. set up the new replication system." eerror "" eerror "This install will not proceed until /var/lib/openldap-data/ is" eerror "at least moved out of the way." exit 1 fi } pkg_preinst() { enewgroup ldap 439 enewuser ldap 439 -1 /usr/lib/openldap ldap } src_unpack() { unpack ${A} # According to MDK, the link order needs to be changed so that # on systems w/ MD5 passwords the system crypt library is used # (the net result is that "passwd" can be used to change ldap passwords w/ # proper pam support) sed -ie 's/$(SECURITY_LIBS) $(LDIF_LIBS) $(LUTIL_LIBS)/$(LUTIL_LIBS) $(SECURITY_LIBS) $(LDIF_LIBS)/' \ ${S}/servers/slapd/Makefile.in # Fix up DB-4.0 linking problem # remember to autoconf! this expands configure by 500 lines (4 lines to m4 # stuff). EPATCH_OPTS="-p1 -d ${S}" epatch ${FILESDIR}/${PN}-2.2.14-db40.patch # supersedes old fix for bug #31202 EPATCH_OPTS="-p1 -d ${S}" epatch ${FILESDIR}/${PN}-2.2.14-perlthreadsfix.patch # fix up stuff for newer autoconf that simulates autoconf-2.13, but doesn't # do it perfectly. cd ${S}/build ln -s shtool install ln -s shtool install.sh # reconf for db40 fixes. cd ${S} WANT_AUTOCONF="2.1" autoconf } src_compile() { local myconf myconf="${myconf} --enable-ldbm" myconf_berkdb='--enable-bdb --with-ldbm-api=berkeley' myconf_gdbm='--disable-bdb --with-ldbm-api=gdbm' if use berkdb; then einfo "Using Berkeley DB for local backend" myconf="${myconf} ${myconf_berkdb}" elif use gdbm; then einfo "Using GDBM for local backend" myconf="${myconf} ${myconf_gdbm}" else ewarn "Neither gdbm or berkdb USE flags present, falling back to" ewarn "Berkeley DB for local backend" myconf="${myconf} ${myconf_berkdb}" fi # enable slapd/slurpd servers myconf="${myconf} --enable-ldap" myconf="${myconf} --enable-slapd --enable-slurpd" # basic stuff myconf="${myconf} --enable-syslog" use debug && myconf="${myconf} --enable-debug" # there is no disable-debug # extra functionality myconf="${myconf} --enable-dynamic --enable-modules" myconf="${myconf} --enable-rewrite --enable-rlookups" myconf="${myconf} --enable-passwd --enable-phonetic" myconf="${myconf} --enable-dnssrv --enable-ldap" myconf="${myconf} --enable-meta --enable-monitor" myconf="${myconf} --enable-null --enable-shell" myconf="${myconf} --enable-local --enable-proctitle" myconf="${myconf} --enable-hdb --enable-dyngroup" myconf="${myconf} --enable-aci --enable-proxycache" myconf="${myconf} --enable-cleartext --enable-slapi" # disabled options: # --with-bdb-module=dynamic # --enable-dnsserv # alas, for BSD only: # --with-fetch for i in crypt ipv6 readline perl slp; do myconf="${myconf} `use_enable ${i}`" done myconf="${myconf} `use_with sasl cyrus-sasl` `use_enable sasl spasswd`" myconf="${myconf} `use_enable tcpd wrappers` `use_enable odbc sql`" myconf="${myconf} `use_with ssl tls` `use_with samba lmpasswd`" econf \ --libexecdir=/usr/lib/openldap \ ${myconf} || die "configure failed" make depend || die "make depend failed" make || die "make failed" } src_test() { einfo "Doing tests" cd tests ; make tests || die "make tests failed" } src_install() { make DESTDIR=${D} install || die "make install failed" dodoc ANNOUNCEMENT CHANGES COPYRIGHT README LICENSE docinto rfc ; dodoc doc/rfc/*.txt # make state directories for x in data slurp ldbm; do keepdir /var/lib/openldap-${x} fowners ldap:ldap /var/lib/openldap-${x} fperms 0700 /var/lib/openldap-${x} done # manually remove /var/tmp references in .la # because it is packaged with an ancient libtool for x in ${D}/usr/lib/lib*.la; do sed -i -e "s:-L${S}[/]*libraries::" ${x} done # change slapd.pid location in configuration file keepdir /var/run/openldap fowners ldap:ldap /var/run/openldap fperms 0755 /var/run/openldap for f in /etc/openldap/slapd.conf /etc/openldap/slapd.conf.default; do sed -e "s:/var/lib/run/slapd.:/var/run/openldap/slapd.:" -i ${D}/${f} sed -e "/database\tbdb$/acheckpoint 32 30 # " -i ${D}/${f} fowners root:ldap ${f} fperms 0640 ${f} done # install our own init scripts exeinto /etc/init.d newexe ${FILESDIR}/2.0/slapd slapd newexe ${FILESDIR}/2.0/slurpd slurpd insinto /etc/conf.d newins ${FILESDIR}/2.0/slapd.conf slapd # install MDK's ssl cert script if use ssl || use samba; then dodir /etc/openldap/ssl exeinto /etc/openldap/ssl doexe ${FILESDIR}/gencert.sh fi } pkg_postinst() { if use ssl; then # make a self-signed ssl cert (if there isn't one there already) if [ ! -e /etc/openldap/ssl/ldap.pem ] then cd /etc/openldap/ssl yes "" | sh gencert.sh chmod 640 ldap.pem chown root:ldap ldap.pem else einfo "An LDAP cert already appears to exist, no creating" fi fi # Since moving to running openldap as user ldap there are some # permissions problems with directories and files. # Let's make sure these permissions are correct. chown ldap:ldap /var/run/openldap chmod 0755 /var/run/openldap chown root:ldap /etc/openldap/slapd.conf{,.default} chmod 0640 /etc/openldap/slapd.conf{,.default} chown ldap:ldap /var/lib/openldap-{data,ldbm,slurp} if use ssl; then ewarn "Self-signed SSL certificates are treated harshly by OpenLDAP 2.[12]" ewarn "add 'TLS_REQCERT never' if you want to use them." fi }