!15 [sync] PR-14: upgrade to version 5.1.17

From: @openeuler-sync-bot 
Reviewed-by: @leeffo 
Signed-off-by: @leeffo
This commit is contained in:
openeuler-ci-bot 2023-08-23 03:04:44 +00:00 committed by Gitee
commit 0ea1a55294
No known key found for this signature in database
GPG Key ID: 173E9B9CA92EEF8F
6 changed files with 78 additions and 125 deletions

View File

@ -1,17 +1,17 @@
From c80d5bd5718c2d56bd8498ffae9b766f5a07f9c7 Mon Sep 17 00:00:00 2001 From 2e84087cd91a7a0b8b268d4e2d8c97f6c38afcb0 Mon Sep 17 00:00:00 2001
From: songmingliang <songmingliang@uniontech.com> From: leeffo <leeffo@yeah.net>
Date: Fri, 13 May 2022 18:11:36 +0800 Date: Tue, 21 Feb 2023 14:50:45 +0800
Subject: [PATCH] modify password policy Subject: [PATCH] deepin-pw-check modify password policy
--- ---
tool/pwd_conf_update.c | 154 +++++++++++++++++++++-------------------- tool/pwd_conf_update.c | 148 +++++++++++++++++++++--------------------
1 file changed, 78 insertions(+), 76 deletions(-) 1 file changed, 75 insertions(+), 73 deletions(-)
diff --git a/tool/pwd_conf_update.c b/tool/pwd_conf_update.c diff --git a/tool/pwd_conf_update.c b/tool/pwd_conf_update.c
index ddcb130..3f90ee6 100644 index ddcfca5..f30c2b8 100644
--- a/tool/pwd_conf_update.c --- a/tool/pwd_conf_update.c
+++ b/tool/pwd_conf_update.c +++ b/tool/pwd_conf_update.c
@@ -85,15 +85,15 @@ const _default_conf default_conf[] = { @@ -90,15 +90,15 @@ const _default_conf default_conf[] = {
[OS_EULER] = [OS_EULER] =
{ {
.min_length = 8, .min_length = 8,
@ -19,8 +19,7 @@ index ddcb130..3f90ee6 100644
+ .max_length = 511, + .max_length = 511,
.validate_policy = "1234567890;abcdefghijklmnopqrstuvwxyz;" .validate_policy = "1234567890;abcdefghijklmnopqrstuvwxyz;"
"ABCDEFGHIJKLMNOPQRSTUVWXYZ;!\"#$%&'()*+,-./" "ABCDEFGHIJKLMNOPQRSTUVWXYZ;!\"#$%&'()*+,-./"
- ":;<=>?@[\\]^_`{|}~/", ":;<=>?@[\\]^_`{|}~/",
+ ":;<=>?@[\\]^_`{|}~",
.validate_required = 3, .validate_required = 3,
.palindorme_num = 4, .palindorme_num = 4,
.word_check = 1, .word_check = 1,
@ -31,7 +30,7 @@ index ddcb130..3f90ee6 100644
.first_letter_uppercase = 0, .first_letter_uppercase = 0,
}, },
}; };
@@ -247,15 +247,15 @@ int update_conf(OS_TYPE os_type) { @@ -252,15 +252,15 @@ int update_conf(OS_TYPE os_type) {
} else { } else {
// 如果找到了该字段 // 如果找到了该字段
// 如果是服务器版,强制覆盖配置 // 如果是服务器版,强制覆盖配置
@ -39,7 +38,7 @@ index ddcb130..3f90ee6 100644
- // sprintf(append_string + offset, "STRONG_PASSWORD = %s\n", "true"); - // sprintf(append_string + offset, "STRONG_PASSWORD = %s\n", "true");
- // DEBUG("restore STRONG_PASSWORD"); - // DEBUG("restore STRONG_PASSWORD");
- // } else { - // } else {
+ if (OS_EULER == os_type) { + if (OS_SERVER == os_type) {
+ sprintf(append_string + offset, "STRONG_PASSWORD = %s\n", "true"); + sprintf(append_string + offset, "STRONG_PASSWORD = %s\n", "true");
+ DEBUG("restore STRONG_PASSWORD"); + DEBUG("restore STRONG_PASSWORD");
+ } else { + } else {
@ -52,7 +51,7 @@ index ddcb130..3f90ee6 100644
} }
offset = strlen(append_string); offset = strlen(append_string);
@@ -265,18 +265,18 @@ int update_conf(OS_TYPE os_type) { @@ -270,18 +270,18 @@ int update_conf(OS_TYPE os_type) {
default_conf[os_type].min_length); default_conf[os_type].min_length);
DEBUG("set PASSWORD_MIN_LENGTH"); DEBUG("set PASSWORD_MIN_LENGTH");
} else { } else {
@ -62,7 +61,7 @@ index ddcb130..3f90ee6 100644
- // default_conf[os_type].min_length); - // default_conf[os_type].min_length);
- // DEBUG("restore PASSWORD_MIN_LENGTH"); - // DEBUG("restore PASSWORD_MIN_LENGTH");
- // } else { - // } else {
+ if (OS_EULER == os_type) { + if (OS_SERVER == os_type) {
+ sprintf(append_string + offset, + sprintf(append_string + offset,
+ "PASSWORD_MIN_LENGTH = %d\n", + "PASSWORD_MIN_LENGTH = %d\n",
+ default_conf[os_type].min_length); + default_conf[os_type].min_length);
@ -78,7 +77,7 @@ index ddcb130..3f90ee6 100644
} }
offset = strlen(append_string); offset = strlen(append_string);
@@ -286,38 +286,40 @@ int update_conf(OS_TYPE os_type) { @@ -291,18 +291,18 @@ int update_conf(OS_TYPE os_type) {
default_conf[os_type].max_length); default_conf[os_type].max_length);
DEBUG("set PASSWORD_MAX_LENGTH"); DEBUG("set PASSWORD_MAX_LENGTH");
} else { } else {
@ -88,7 +87,7 @@ index ddcb130..3f90ee6 100644
- // default_conf[os_type].max_length); - // default_conf[os_type].max_length);
- // DEBUG("restore PASSWORD_MAX_LENGTH"); - // DEBUG("restore PASSWORD_MAX_LENGTH");
- // } else { - // } else {
+ if (OS_EULER == os_type) { + if (OS_SERVER == os_type) {
+ sprintf(append_string + offset, + sprintf(append_string + offset,
+ "PASSWORD_MAX_LENGTH = %d\n", + "PASSWORD_MAX_LENGTH = %d\n",
+ default_conf[os_type].max_length); + default_conf[os_type].max_length);
@ -104,13 +103,7 @@ index ddcb130..3f90ee6 100644
} }
offset = strlen(append_string); offset = strlen(append_string);
if (iniparser_find_entry(dic, "Password:VALIDATE_POLICY") == 0) { @@ -315,14 +315,16 @@ int update_conf(OS_TYPE os_type) {
sprintf(append_string + offset,
- "VALIDATE_POLICY = \"%s\"\n",
+ "VALIDATE_POLICY = %s \n",
default_conf[os_type].validate_policy);
DEBUG("set VALIDATE_POLICY");
} else {
// char cmd[512]; // char cmd[512];
// sprintf(cmd, "sed \"/^VALIDATE_POLICY.*/\"d -i %s", PASSWD_CONF_FILE_PATH); // sprintf(cmd, "sed \"/^VALIDATE_POLICY.*/\"d -i %s", PASSWD_CONF_FILE_PATH);
// system(cmd); // system(cmd);
@ -135,7 +128,7 @@ index ddcb130..3f90ee6 100644
} }
offset = strlen(append_string); offset = strlen(append_string);
@@ -327,18 +329,18 @@ int update_conf(OS_TYPE os_type) { @@ -332,18 +334,18 @@ int update_conf(OS_TYPE os_type) {
default_conf[os_type].validate_required); default_conf[os_type].validate_required);
DEBUG("set VALIDATE_REQUIRED"); DEBUG("set VALIDATE_REQUIRED");
} else { } else {
@ -145,7 +138,7 @@ index ddcb130..3f90ee6 100644
- // default_conf[os_type].validate_required); - // default_conf[os_type].validate_required);
- // DEBUG("restore VALIDATE_REQUIRED"); - // DEBUG("restore VALIDATE_REQUIRED");
- // } else { - // } else {
+ if (OS_EULER == os_type) { + if (OS_SERVER == os_type) {
+ sprintf(append_string + offset, + sprintf(append_string + offset,
+ "VALIDATE_REQUIRED = %d\n", + "VALIDATE_REQUIRED = %d\n",
+ default_conf[os_type].validate_required); + default_conf[os_type].validate_required);
@ -161,7 +154,7 @@ index ddcb130..3f90ee6 100644
} }
offset = strlen(append_string); offset = strlen(append_string);
@@ -348,18 +350,18 @@ int update_conf(OS_TYPE os_type) { @@ -353,18 +355,18 @@ int update_conf(OS_TYPE os_type) {
default_conf[os_type].palindorme_num); default_conf[os_type].palindorme_num);
DEBUG("set PALINDROME_NUM"); DEBUG("set PALINDROME_NUM");
} else { } else {
@ -171,7 +164,7 @@ index ddcb130..3f90ee6 100644
- // default_conf[os_type].palindorme_num); - // default_conf[os_type].palindorme_num);
- // DEBUG("restore PALINDROME_NUM"); - // DEBUG("restore PALINDROME_NUM");
- // } else { - // } else {
+ if (OS_EULER == os_type) { + if (OS_SERVER == os_type) {
+ sprintf(append_string + offset, + sprintf(append_string + offset,
+ "PALINDROME_NUM = %d\n", + "PALINDROME_NUM = %d\n",
+ default_conf[os_type].palindorme_num); + default_conf[os_type].palindorme_num);
@ -187,7 +180,7 @@ index ddcb130..3f90ee6 100644
} }
offset = strlen(append_string); offset = strlen(append_string);
@@ -367,14 +369,14 @@ int update_conf(OS_TYPE os_type) { @@ -372,14 +374,14 @@ int update_conf(OS_TYPE os_type) {
sprintf(append_string + offset, "WORD_CHECK = %d\n", default_conf[os_type].word_check); sprintf(append_string + offset, "WORD_CHECK = %d\n", default_conf[os_type].word_check);
DEBUG("set WORD_CHECK"); DEBUG("set WORD_CHECK");
} else { } else {
@ -195,7 +188,7 @@ index ddcb130..3f90ee6 100644
- // sprintf(append_string + offset, "WORD_CHECK = %d\n", - // sprintf(append_string + offset, "WORD_CHECK = %d\n",
- // default_conf[os_type].word_check); DEBUG("restore WORD_CHECK"); - // default_conf[os_type].word_check); DEBUG("restore WORD_CHECK");
- // } else { - // } else {
+ if (OS_EULER == os_type) { + if (OS_SERVER == os_type) {
+ sprintf(append_string + offset, "WORD_CHECK = %d\n", + sprintf(append_string + offset, "WORD_CHECK = %d\n",
+ default_conf[os_type].word_check); DEBUG("restore WORD_CHECK"); + default_conf[os_type].word_check); DEBUG("restore WORD_CHECK");
+ } else { + } else {
@ -207,7 +200,7 @@ index ddcb130..3f90ee6 100644
} }
offset = strlen(append_string); offset = strlen(append_string);
@@ -384,18 +386,18 @@ int update_conf(OS_TYPE os_type) { @@ -389,18 +391,18 @@ int update_conf(OS_TYPE os_type) {
default_conf[os_type].monotone_same_character_num); default_conf[os_type].monotone_same_character_num);
DEBUG("set MONOTONE_CHARACTER_NUM"); DEBUG("set MONOTONE_CHARACTER_NUM");
} else { } else {
@ -217,7 +210,7 @@ index ddcb130..3f90ee6 100644
- // default_conf[os_type].monotone_same_character_num); - // default_conf[os_type].monotone_same_character_num);
- // DEBUG("restore MONOTONE_CHARACTER_NUM"); - // DEBUG("restore MONOTONE_CHARACTER_NUM");
- // } else { - // } else {
+ if (OS_EULER == os_type) { + if (OS_SERVER == os_type) {
+ sprintf(append_string + offset, + sprintf(append_string + offset,
+ "MONOTONE_CHARACTER_NUM = %d\n", + "MONOTONE_CHARACTER_NUM = %d\n",
+ default_conf[os_type].monotone_same_character_num); + default_conf[os_type].monotone_same_character_num);
@ -233,7 +226,7 @@ index ddcb130..3f90ee6 100644
} }
offset = strlen(append_string); offset = strlen(append_string);
@@ -405,18 +407,18 @@ int update_conf(OS_TYPE os_type) { @@ -410,18 +412,18 @@ int update_conf(OS_TYPE os_type) {
default_conf[os_type].consecutive_same_character_num); default_conf[os_type].consecutive_same_character_num);
DEBUG("set CONSECUTIVE_SAME_CHARACTER_NUM"); DEBUG("set CONSECUTIVE_SAME_CHARACTER_NUM");
} else { } else {
@ -243,7 +236,7 @@ index ddcb130..3f90ee6 100644
- // default_conf[os_type].consecutive_same_character_num); - // default_conf[os_type].consecutive_same_character_num);
- // DEBUG("restore CONSECUTIVE_SAME_CHARACTER_NUM"); - // DEBUG("restore CONSECUTIVE_SAME_CHARACTER_NUM");
- // } else { - // } else {
+ if (OS_EULER == os_type) { + if (OS_SERVER == os_type) {
+ sprintf(append_string + offset, + sprintf(append_string + offset,
+ "CONSECUTIVE_SAME_CHARACTER_NUM = %d\n", + "CONSECUTIVE_SAME_CHARACTER_NUM = %d\n",
+ default_conf[os_type].consecutive_same_character_num); + default_conf[os_type].consecutive_same_character_num);
@ -259,7 +252,7 @@ index ddcb130..3f90ee6 100644
} }
offset = strlen(append_string); offset = strlen(append_string);
@@ -424,14 +426,14 @@ int update_conf(OS_TYPE os_type) { @@ -429,14 +431,14 @@ int update_conf(OS_TYPE os_type) {
sprintf(append_string + offset, "DICT_PATH = %s\n", ""); sprintf(append_string + offset, "DICT_PATH = %s\n", "");
DEBUG("set DICT_PATH"); DEBUG("set DICT_PATH");
} else { } else {
@ -267,7 +260,7 @@ index ddcb130..3f90ee6 100644
- // sprintf(append_string + offset, "DICT_PATH = %s\n", ""); - // sprintf(append_string + offset, "DICT_PATH = %s\n", "");
- // DEBUG("restore DICT_PATH"); - // DEBUG("restore DICT_PATH");
- // } else { - // } else {
+ if (OS_EULER == os_type) { + if (OS_SERVER == os_type) {
+ sprintf(append_string + offset, "DICT_PATH = %s\n", ""); + sprintf(append_string + offset, "DICT_PATH = %s\n", "");
+ DEBUG("restore DICT_PATH"); + DEBUG("restore DICT_PATH");
+ } else { + } else {
@ -279,7 +272,7 @@ index ddcb130..3f90ee6 100644
} }
offset = strlen(append_string); offset = strlen(append_string);
@@ -439,15 +441,15 @@ int update_conf(OS_TYPE os_type) { @@ -444,15 +446,15 @@ int update_conf(OS_TYPE os_type) {
sprintf(append_string + offset, "FIRST_LETTER_UPPERCASE = %s\n", "false"); sprintf(append_string + offset, "FIRST_LETTER_UPPERCASE = %s\n", "false");
DEBUG("set FIRST_LETTER_UPPERCASE"); DEBUG("set FIRST_LETTER_UPPERCASE");
} else { } else {
@ -287,7 +280,7 @@ index ddcb130..3f90ee6 100644
- // sprintf(append_string + offset, "FIRST_LETTER_UPPERCASE = %s\n", "false"); - // sprintf(append_string + offset, "FIRST_LETTER_UPPERCASE = %s\n", "false");
- // DEBUG("restore FIRST_LETTER_UPPERCASE"); - // DEBUG("restore FIRST_LETTER_UPPERCASE");
- // } else { - // } else {
+ if (OS_EULER == os_type) { + if (OS_SERVER == os_type) {
+ sprintf(append_string + offset, "FIRST_LETTER_UPPERCASE = %s\n", "false"); + sprintf(append_string + offset, "FIRST_LETTER_UPPERCASE = %s\n", "false");
+ DEBUG("restore FIRST_LETTER_UPPERCASE"); + DEBUG("restore FIRST_LETTER_UPPERCASE");
+ } else { + } else {
@ -300,13 +293,6 @@ index ddcb130..3f90ee6 100644
} }
DEBUG("append string :%s", append_string); DEBUG("append string :%s", append_string);
@@ -491,4 +493,4 @@ int main(int argc, char **argv) {
}
return 0;
-}
\ No newline at end of file
+}
-- --
2.27.0 2.20.1

View File

@ -1,34 +0,0 @@
From f43960d62583c6e177079b3bab6795450cee3092 Mon Sep 17 00:00:00 2001
From: songmingliang <songmingliang@uniontech.com>
Date: Mon, 20 Jun 2022 13:48:00 +0800
Subject: [PATCH] delete blank
---
tool/pwd_conf_update.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/tool/pwd_conf_update.c b/tool/pwd_conf_update.c
index 3f90ee6..cb417df 100644
--- a/tool/pwd_conf_update.c
+++ b/tool/pwd_conf_update.c
@@ -303,7 +303,7 @@ int update_conf(OS_TYPE os_type) {
if (iniparser_find_entry(dic, "Password:VALIDATE_POLICY") == 0) {
sprintf(append_string + offset,
- "VALIDATE_POLICY = %s \n",
+ "VALIDATE_POLICY = %s\n",
default_conf[os_type].validate_policy);
DEBUG("set VALIDATE_POLICY");
} else {
@@ -312,7 +312,7 @@ int update_conf(OS_TYPE os_type) {
// system(cmd);
if (OS_EULER == os_type) {
sprintf(append_string + offset,
- "VALIDATE_POLICY = %s \n",
+ "VALIDATE_POLICY = %s\n",
default_conf[os_type].validate_policy);
DEBUG("set VALIDATE_POLICY after delete");
} else {
--
2.27.0

Binary file not shown.

Binary file not shown.

View File

@ -7,8 +7,8 @@
%endif %endif
Name: deepin-pw-check Name: deepin-pw-check
Version: 5.1.4 Version: 5.1.17
Release: 2 Release: 1
Summary: Used to check password and manager the configuration for password. Summary: Used to check password and manager the configuration for password.
License: GPL-3.0 License: GPL-3.0
URL: https://github.com/linuxdeepin/%{name} URL: https://github.com/linuxdeepin/%{name}
@ -18,7 +18,6 @@ Source2: dde.conf
Patch1000: 0001-fix-for-UonioTech.patch Patch1000: 0001-fix-for-UonioTech.patch
Patch1001: 1000-deepin-pw-check-modify-password-policy.patch Patch1001: 1000-deepin-pw-check-modify-password-policy.patch
Patch1002: 1001-deepin-pw-check-uos-delete-blank.patch
BuildRequires: golang BuildRequires: golang
BuildRequires: pam-devel BuildRequires: pam-devel
@ -47,7 +46,6 @@ this interface is designed to adapt to fingerprint, face and other authenticatio
%setup -q %setup -q
%patch1000 -p1 %patch1000 -p1
%patch1001 -p1 %patch1001 -p1
%patch1002 -p1
tar -xf %{SOURCE1} tar -xf %{SOURCE1}
@ -93,6 +91,9 @@ install -Dm644 %{SOURCE2} %{buildroot}%{_sysconfdir}/deepin/dde.conf
%{_includedir}/deepin_pw_check.h %{_includedir}/deepin_pw_check.h
%changelog %changelog
* Tue Jul 25 2023 leeffo <liweiganga@uniontech.com> - 5.1.17-1
- upgrade to version 5.1.17
* Wed Jun 28 2023 liweigang <liweiganga@uniontech.com> - 5.1.4-2 * Wed Jun 28 2023 liweigang <liweiganga@uniontech.com> - 5.1.4-2
- feat: update golang.org/x/sys - feat: update golang.org/x/sys

Binary file not shown.