diff options
author | Jan Cholasta | 2016-08-02 17:38:03 +0200 |
---|---|---|
committer | Jan Cholasta | 2016-08-02 18:00:39 +0200 |
commit | c6c2d053ac1831f0e10a364f2fbb7b003aa32082 (patch) | |
tree | 09c665c9ccd01800dc92b5d4b1218d504320de82 | |
download | aur-c6c2d053ac1831f0e10a364f2fbb7b003aa32082.tar.gz |
Initial commit
-rw-r--r-- | .SRCINFO | 47 | ||||
-rw-r--r-- | .gitignore | 7 | ||||
-rw-r--r-- | 0001-Adapt-to-Arch-Linux.patch | 288 | ||||
-rw-r--r-- | PKGBUILD | 136 |
4 files changed, 478 insertions, 0 deletions
diff --git a/.SRCINFO b/.SRCINFO new file mode 100644 index 000000000000..7216957e12c0 --- /dev/null +++ b/.SRCINFO @@ -0,0 +1,47 @@ +pkgbase = authconfig + pkgdesc = Command line tool for setting up authentication from network services + pkgver = 6.2.10 + pkgrel = 1 + url = https://fedorahosted.org/authconfig/ + arch = i686 + arch = x86_64 + license = GPL + makedepends = desktop-file-utils + makedepends = intltool + makedepends = perl-xml-parser + makedepends = python2 + depends = libnewt + depends = libpwquality + depends = openssl + depends = pam>=0.99.10.0 + depends = sssd>=1.13.0 + conflicts = freeipa-client<2.2.0 + conflicts = nss_ldap<254 + conflicts = pam-krb5<1.49 + conflicts = samba<3.0 + backup = etc/conf.d/authconfig + backup = etc/pam.d/system-auth-ac + backup = etc/pam.d/system-login-ac + source = https://fedorahosted.org/releases/a/u/authconfig/authconfig-6.2.10.tar.bz2 + source = 0001-Adapt-to-Arch-Linux.patch + sha256sums = b9897f526825107287687084bd414c565a42b23e1669df0bf1a82cc460d3b78f + sha256sums = bbecf678693b96489239b37236846ba1a8058285fdf68f47d674b534137ee119 + +pkgname = authconfig + +pkgname = authconfig-gtk + pkgdesc = Graphical tool for setting up authentication from network services + depends = =6.2.10-1 + depends = hicolor-icon-theme + depends = pygtk>=2.14.0 + depends = python2-dbus + depends = usermode + backup = etc/pam.d/authconfig + backup = etc/pam.d/authconfig-gtk + backup = etc/pam.d/authconfig-tui + backup = etc/pam.d/system-config-authentication + backup = etc/security/console.apps/authconfig + backup = etc/security/console.apps/authconfig-gtk + backup = etc/security/console.apps/authconfig-tui + backup = etc/security/console.apps/system-config-authentication + diff --git a/.gitignore b/.gitignore new file mode 100644 index 000000000000..5642e2f2619b --- /dev/null +++ b/.gitignore @@ -0,0 +1,7 @@ +/*.tar.gz +/*.tar.bz2 +/*.tar.xz +/*.zip +/*.7z +/pkg/ +/src/ diff --git a/0001-Adapt-to-Arch-Linux.patch b/0001-Adapt-to-Arch-Linux.patch new file mode 100644 index 000000000000..16e4395802ba --- /dev/null +++ b/0001-Adapt-to-Arch-Linux.patch @@ -0,0 +1,288 @@ +From f18cee1f17886ef4d54ea44e4ecc34f45df6abb6 Mon Sep 17 00:00:00 2001 +From: Jan Cholasta <jcholast@redhat.com> +Date: Thu, 28 Jul 2016 11:04:36 +0200 +Subject: [PATCH] Adapt to Arch Linux + +--- + Makefile.am | 2 +- + authinfo.py | 51 +++++++++++------------------------------------- + man/en/Makefile.am | 2 +- + man/en/authconfig.8 | 8 ++++---- + man/en/postlogin-ac.5 | 1 - + man/en/system-auth-ac.5 | 20 +++---------------- + man/en/system-login-ac.5 | 1 + + 7 files changed, 21 insertions(+), 64 deletions(-) + delete mode 100644 man/en/postlogin-ac.5 + create mode 100644 man/en/system-login-ac.5 + +diff --git a/Makefile.am b/Makefile.am +index 0bc08a8..ca066eb 100644 +--- a/Makefile.am ++++ b/Makefile.am +@@ -51,7 +51,7 @@ install-data-local: authconfig.desktop + touch $(DESTDIR)/$(pamdir)/password-auth-ac + touch $(DESTDIR)/$(pamdir)/fingerprint-auth-ac + touch $(DESTDIR)/$(pamdir)/smartcard-auth-ac +- touch $(DESTDIR)/$(pamdir)/postlogin-ac ++ touch $(DESTDIR)/$(pamdir)/system-login-ac + mkdir -p $(DESTDIR)/$(datadir)/applications + desktop-file-install \ + --dir=$(DESTDIR)/$(datadir)/applications \ +diff --git a/authinfo.py b/authinfo.py +index 4e05a95..0a875a4 100644 +--- a/authinfo.py ++++ b/authinfo.py +@@ -60,8 +60,8 @@ SYSCONFDIR = "/etc" + AUTH_PAM_SERVICE = "system-auth" + AUTH_PAM_SERVICE_AC = "system-auth-ac" + +-POSTLOGIN_PAM_SERVICE = "postlogin" +-POSTLOGIN_PAM_SERVICE_AC = "postlogin-ac" ++POSTLOGIN_PAM_SERVICE = "system-login" ++POSTLOGIN_PAM_SERVICE_AC = "system-login-ac" + + PASSWORD_AUTH_PAM_SERVICE = "password-auth" + PASSWORD_AUTH_PAM_SERVICE_AC = "password-auth-ac" +@@ -75,7 +75,7 @@ SMARTCARD_AUTH_PAM_SERVICE_AC = "smartcard-auth-ac" + SSSD_AUTHCONFIG_DOMAIN = "default" + + if "lib64" in str(globals()["acutil"]): +- LIBDIR = "/lib64" ++ LIBDIR = "/lib" + else: + LIBDIR = "/lib" + +@@ -1055,9 +1055,6 @@ class SafeFile: + self.file.flush() + os.fsync(self.file.fileno()) + os.rename(self.file.name, self.filename) +- if self.missing: +- call(["/usr/sbin/restorecon", self.filename], +- stderr=os.open('/dev/null', os.O_WRONLY)) + + def close(self): + # we may have renamed the temp file, need to catch OSError +@@ -1147,13 +1144,6 @@ class FileBackup: + if rv and os.path.isfile(backuppath): + rv = self.safeCopy(backuppath, self.origPath) + +- try: +- if rv: +- call(["/usr/sbin/restorecon", self.origPath], +- stderr=os.open('/dev/null', os.O_WRONLY)) +- except (IOError, OSError): +- pass +- + return rv + + def readCache(): +@@ -1224,8 +1214,8 @@ class CacheBackup(FileBackup): + # indexes for the configs + (CFG_HESIOD, CFG_YP, CFG_LDAP, CFG_NSSLDAP, CFG_PAMLDAP, CFG_NSLCD, CFG_OPENLDAP, CFG_KRB5, + CFG_KRB, CFG_PAM_PKCS11, CFG_SMB, CFG_NSSWITCH, CFG_CACHE, +- CFG_PAM, CFG_POSTLOGIN_PAM, CFG_PASSWORD_PAM, CFG_FINGERPRINT_PAM, CFG_SMARTCARD_PAM, CFG_AUTHCONFIG, CFG_NETWORK, CFG_LIBUSER, CFG_PWQUALITY, +- CFG_LOGIN_DEFS, CFG_SSSD, CFG_SHADOW, CFG_PASSWD, CFG_GSHADOW, CFG_GROUP, CFG_DCONF, CFG_DCONF_LOCKS) = list(range(0, 30)) ++ CFG_PAM, CFG_POSTLOGIN_PAM, CFG_AUTHCONFIG, CFG_NETWORK, CFG_LIBUSER, CFG_PWQUALITY, ++ CFG_LOGIN_DEFS, CFG_SSSD, CFG_SHADOW, CFG_PASSWD, CFG_GSHADOW, CFG_GROUP, CFG_DCONF, CFG_DCONF_LOCKS) = list(range(0, 27)) + all_configs = [ + FileBackup("hesiod.conf", SYSCONFDIR+"/hesiod.conf"), + FileBackup("yp.conf", SYSCONFDIR+"/yp.conf"), +@@ -1241,12 +1231,9 @@ all_configs = [ + FileBackup("nsswitch.conf", SYSCONFDIR+"/nsswitch.conf"), + CacheBackup("cacheenabled.conf", ""), + FileBackup("system-auth-ac", SYSCONFDIR+"/pam.d/"+AUTH_PAM_SERVICE_AC), +- FileBackup("postlogin-ac", SYSCONFDIR+"/pam.d/"+POSTLOGIN_PAM_SERVICE_AC), +- FileBackup("password-auth-ac", SYSCONFDIR+"/pam.d/"+PASSWORD_AUTH_PAM_SERVICE_AC), +- FileBackup("fingerprint-auth-ac", SYSCONFDIR+"/pam.d/"+FINGERPRINT_AUTH_PAM_SERVICE_AC), +- FileBackup("smartcard-auth-ac", SYSCONFDIR+"/pam.d/"+SMARTCARD_AUTH_PAM_SERVICE_AC), +- FileBackup("authconfig", SYSCONFDIR+"/sysconfig/authconfig"), +- FileBackup("network", SYSCONFDIR+"/sysconfig/network"), ++ FileBackup("system-login-ac", SYSCONFDIR+"/pam.d/"+POSTLOGIN_PAM_SERVICE_AC), ++ FileBackup("authconfig", SYSCONFDIR+"/conf.d/authconfig"), ++ FileBackup("nisdomainname", SYSCONFDIR+"/nisdomainname"), + FileBackup("libuser.conf", SYSCONFDIR+"/libuser.conf"), + FileBackup("pwquality.conf", SYSCONFDIR+"/security/pwquality.conf"), + FileBackup("login.defs", SYSCONFDIR+"/login.defs"), +@@ -2436,7 +2423,7 @@ class AuthInfo: + except IOError: + return False + +- tmp = shv.getValue("NISDOMAIN") ++ tmp = shv.getValue("NISDOMAINNAME") + if tmp: + self.nisLocalDomain = tmp + +@@ -3881,8 +3868,7 @@ class AuthInfo: + pass + + def checkPAMLinked(self): +- for dest in [AUTH_PAM_SERVICE, POSTLOGIN_PAM_SERVICE, PASSWORD_AUTH_PAM_SERVICE, +- FINGERPRINT_AUTH_PAM_SERVICE, SMARTCARD_AUTH_PAM_SERVICE]: ++ for dest in [AUTH_PAM_SERVICE, POSTLOGIN_PAM_SERVICE]: + dest = SYSCONFDIR + "/pam.d/" + dest + f = os.path.isfile(dest) + l = os.path.islink(dest) +@@ -3967,9 +3953,6 @@ class AuthInfo: + self.module_missing = {} + self.writePAMService(STANDARD, CFG_PAM, AUTH_PAM_SERVICE_AC, AUTH_PAM_SERVICE) + self.writePAMService(POSTLOGIN, CFG_POSTLOGIN_PAM, POSTLOGIN_PAM_SERVICE_AC, POSTLOGIN_PAM_SERVICE) +- self.writePAMService(PASSWORD_ONLY, CFG_PASSWORD_PAM, PASSWORD_AUTH_PAM_SERVICE_AC, PASSWORD_AUTH_PAM_SERVICE) +- self.writePAMService(FINGERPRINT, CFG_FINGERPRINT_PAM, FINGERPRINT_AUTH_PAM_SERVICE_AC, FINGERPRINT_AUTH_PAM_SERVICE) +- self.writePAMService(SMARTCARD, CFG_SMARTCARD_PAM, SMARTCARD_AUTH_PAM_SERVICE_AC, SMARTCARD_AUTH_PAM_SERVICE) + return True + + def writeSysconfig(self): +@@ -4024,7 +4007,7 @@ class AuthInfo: + except IOError: + return False + +- shv.setValue("NISDOMAIN", self.nisDomain) ++ shv.setValue("NISDOMAINNAME", self.nisDomain) + + shv.write(0o644) + shv.close() +@@ -4364,7 +4347,6 @@ class AuthInfo: + if not nostart: + os.system("/bin/domainname " + self.nisDomain) + try: +- os.system("[[ $(getsebool allow_ypbind) == *off* ]] && setsebool -P allow_ypbind 1") + os.stat(PATH_RPCBIND) + Service.enable("rpcbind") + if not nostart: +@@ -4383,7 +4365,6 @@ class AuthInfo: + if not nostart: + os.system("/bin/domainname \"(none)\"") + try: +- os.system("[[ $(getsebool allow_ypbind) == *on* ]] && setsebool -P allow_ypbind 0") + os.stat(PATH_YPBIND) + if not nostart: + try: +@@ -4400,16 +4381,6 @@ class AuthInfo: + not self.implicitSSSD, + PATH_NSLCD, + "nslcd", nostart) +- if self.enableLDAP: +- try: +- os.system("[[ $(getsebool authlogin_nsswitch_use_ldap) == *off* ]] && setsebool -P authlogin_nsswitch_use_ldap 1") +- except OSError: +- pass +- else: +- try: +- os.system("[[ $(getsebool authlogin_nsswitch_use_ldap) == *on* ]] && setsebool -P authlogin_nsswitch_use_ldap 0") +- except OSError: +- pass + return True + + def toggleWinbindService(self, nostart): +diff --git a/man/en/Makefile.am b/man/en/Makefile.am +index f8139af..5445e78 100644 +--- a/man/en/Makefile.am ++++ b/man/en/Makefile.am +@@ -1,4 +1,4 @@ + man8_MANS = authconfig.8 authconfig-tui.8 authconfig-gtk.8 system-config-authentication.8 \ + cacertdir_rehash.8 +-man5_MANS = system-auth-ac.5 fingerprint-auth-ac.5 password-auth-ac.5 smartcard-auth-ac.5 postlogin-ac.5 ++man5_MANS = system-auth-ac.5 fingerprint-auth-ac.5 password-auth-ac.5 smartcard-auth-ac.5 system-login-ac.5 + EXTRA_DIST = $(man8_MANS) $(man5_MANS) +diff --git a/man/en/authconfig.8 b/man/en/authconfig.8 +index 45e6f2b..d38a731 100644 +--- a/man/en/authconfig.8 ++++ b/man/en/authconfig.8 +@@ -11,7 +11,7 @@ authconfig, authconfig-tui \- an interface for configuring system authentication + .in -7 + .SH DESCRIPTION + \fBauthconfig\fR provides a simple method of configuring +-/etc/sysconfig/network to handle NIS, as well as /etc/passwd and ++/etc/nisdomainname to handle NIS, as well as /etc/passwd and + /etc/shadow, the files used for shadow password support. Basic LDAP, + Kerberos 5, and Winbind client configuration is also provided. + +@@ -70,7 +70,7 @@ Kerberos (\fB--enablekrb5\fR) for authentication. + + In case \fISSSD\fR does not support some feature of the legacy services that are + required for the site configuration, the use of the legacy services can be forced +-by setting FORCELEGACY=yes in \fB/etc/sysconfig/authconfig\fP. ++by setting FORCELEGACY=yes in \fB/etc/conf.d/authconfig\fP. + + The list of options mentioned here in the manual page is not exhaustive, please + refer to \fBauthconfig --help\fR for the complete list of the options. +@@ -129,7 +129,7 @@ return the same codes as \fBauthconfig\fR. + .PD 0 + .TP + .TP +-.FN /etc/sysconfig/authconfig ++.FN /etc/conf.d/authconfig + Used to track whether or not particular authentication mechanisms are enabled. + Currently includes variables named USESHADOW, USEMD5, USEKERBEROS, USELDAPAUTH, + USESMBAUTH, USEWINBIND, USEWINBINDAUTH, USEHESIOD, USENIS, USELDAP, and others. +@@ -142,7 +142,7 @@ Used for shadow password support. + .FN /etc/yp.conf + Configuration file for NIS support. + .TP +-.FN /etc/sysconfig/network ++.FN /etc/nisdomainname + Another configuration file for NIS support. + .TP + .FN /etc/ldap.conf +diff --git a/man/en/postlogin-ac.5 b/man/en/postlogin-ac.5 +deleted file mode 100644 +index 3550f54..0000000 +--- a/man/en/postlogin-ac.5 ++++ /dev/null +@@ -1 +0,0 @@ +-.so man5/system-auth-ac.5 +diff --git a/man/en/system-auth-ac.5 b/man/en/system-auth-ac.5 +index 8c55e19..c1b7aaf 100644 +--- a/man/en/system-auth-ac.5 ++++ b/man/en/system-auth-ac.5 +@@ -1,8 +1,7 @@ + .TH SYSTEM-AUTH-AC 5 "2010 March 31" "Red Hat, Inc." + .SH NAME + +-system-auth-ac, password-auth-ac, smartcard-auth-ac, +-fingerprint-auth-ac, postlogin-ac \- Common configuration files for ++system-auth-ac, system-login-ac \- Common configuration files for + PAMified services written by authconfig(8) + + .SH SYNOPSIS +@@ -29,23 +28,10 @@ and writes the configuration to this file. The symlink is not changed on + subsequent configuration changes even if it points elsewhere. This allows + system administrators to override the configuration written by authconfig. + +-The authconfig now writes the authentication modules also into additional PAM +-configuration files \fB/etc/pam.d/password-auth-ac\fR, +-\fB/etc/pam.d/smartcard-auth-ac\fR, and \fB/etc/pam.d/fingerprint-auth-ac\fR. +-These configuration files contain only modules which perform +-authentication with the respective kinds of authentication tokens. +-For example \fB/etc/pam.d/smartcard-auth[-ac]\fR will not contain +-\fBpam_unix\fR and \fBpam_ldap\fR modules and \fB/etc/pam.d/password-auth[-ac]\fR +-will not contain \fBpam_pkcs11\fR and \fBpam_fprintd\fR modules. +- +-The file \fB/etc/pam.d/postlogin-ac\fR contains common services ++The file \fB/etc/pam.d/system-login-ac\fR contains common services + to be invoked after login. An example can be a module that encrypts an + user's filesystem or user's keyring and is decrypted by his password. + +-The PAM configuration files of services which are accessed by remote +-connections such as sshd or ftpd now include the \fB/etc/pam.d/password-auth\fR +-configuration file instead of \fB/etc/pam.d/system-auth\fR. +- + + .SH EXAMPLE + Configure system to use pam_tally2 for configuration of maximum number of +@@ -78,4 +64,4 @@ session include system-auth-ac + None known. + + .SH "SEE ALSO" +-authconfig(8), authconfig-gtk(8), pam(8), system-auth(5) ++authconfig(8), authconfig-gtk(8), pam(8) +diff --git a/man/en/system-login-ac.5 b/man/en/system-login-ac.5 +new file mode 100644 +index 0000000..3550f54 +--- /dev/null ++++ b/man/en/system-login-ac.5 +@@ -0,0 +1 @@ ++.so man5/system-auth-ac.5 +-- +2.7.4 + diff --git a/PKGBUILD b/PKGBUILD new file mode 100644 index 000000000000..3a9cf82f4be3 --- /dev/null +++ b/PKGBUILD @@ -0,0 +1,136 @@ +# Maintainer: Jan Cholasta <grubber at grubber cz> +# Contributor: François Steinmetz <francois.steinmetz@gmail.com> +# Contributor: Zdenek Janecek <jan.zdenek@gmail.com> +# Based on Fedora authconfig.spec + +pkgname=(authconfig authconfig-gtk) +pkgver=6.2.10 +pkgrel=1 +pkgdesc='Command line tool for setting up authentication from network services' +arch=('i686' 'x86_64') +url='https://fedorahosted.org/authconfig/' +license=('GPL') +depends=('libnewt' 'libpwquality' 'openssl' 'pam>=0.99.10.0' 'sssd>=1.13.0') +makedepends=('desktop-file-utils' + 'intltool' + 'perl-xml-parser' + 'python2') +conflicts=('freeipa-client<2.2.0' 'nss_ldap<254' 'pam-krb5<1.49' 'samba<3.0') +backup=(etc/conf.d/authconfig + etc/pam.d/system-auth-ac + etc/pam.d/system-login-ac) +source=("https://fedorahosted.org/releases/a/u/authconfig/${pkgname}-${pkgver}.tar.bz2" + 0001-Adapt-to-Arch-Linux.patch) +sha256sums=('b9897f526825107287687084bd414c565a42b23e1669df0bf1a82cc460d3b78f' + 'bbecf678693b96489239b37236846ba1a8058285fdf68f47d674b534137ee119') + +prepare() { + cd "${pkgbase}-${pkgver}" + + rm -f man/en/system-login-ac.5 + + patch -p1 <"$srcdir"/0001-Adapt-to-Arch-Linux.patch + + autoreconf -fi +} + +build() { + cd "${pkgbase}-${pkgver}" + + PYTHONREV=2 ./configure --prefix=/usr \ + --sysconfdir=/etc \ + --localstatedir=/var \ + --sbindir=/usr/bin + make sysconfigdir=/etc/conf.d + + mkdir -p _install + make install sysconfigdir=/etc/conf.d DESTDIR="$PWD"/_install + + find _install/usr/share -name '*.mo' | xargs ./utf8ify-mo + + rm -f _install/usr/lib/python*/site-packages/acutil.a + rm -f _install/usr/lib/python*/site-packages/acutil.la + rm -f _install/usr/share/"$pkgbase"/authconfig-tui.py + ln -s authconfig.py _install/usr/share/"$pkgbase"/authconfig-tui.py + + sed -ri '1s/python/python2/' _install/usr/share/"$pkgbase"/*.py +} + +package_authconfig() { + cd "${pkgbase}-${pkgver}" + + local _file + for _file in _install/etc/conf.d/authconfig \ + _install/etc/pam.d/system-auth-ac \ + _install/etc/pam.d/system-login-ac \ + _install/usr/bin/authconfig \ + _install/usr/bin/authconfig-tui \ + _install/usr/bin/cacertdir_rehash \ + _install/usr/lib/python2.*/site-packages/acutil.so \ + _install/usr/share/"$pkgbase"/authconfig.py* \ + _install/usr/share/"$pkgbase"/authconfig-tui.py* \ + _install/usr/share/"$pkgbase"/authinfo.py* \ + _install/usr/share/"$pkgbase"/dnsclient.py* \ + _install/usr/share/"$pkgbase"/msgarea.py* \ + _install/usr/share/"$pkgbase"/shvfile.py* \ + _install/usr/share/locale/*/*/authconfig.mo \ + _install/usr/share/man/man5/* \ + _install/usr/share/man/man8/authconfig.* \ + _install/usr/share/man/man8/authconfig-tui.* \ + _install/usr/share/man/man8/cacertdir_rehash.* \ + _install/var/lib/authconfig + do + _file="${_file#_install/}" + mkdir -p "$pkgdir"/"${_file%/*}" + mv _install/"$_file" "$pkgdir"/"$_file" + done + + chmod 700 "$pkgdir"/var/lib/authconfig + + install -D -m644 -t"$pkgdir"/usr/share/doc/"$pkgname" COPYING \ + NOTES \ + README.samba3 \ + TODO +} + +package_authconfig-gtk() { + pkgdesc='Graphical tool for setting up authentication from network services' + depends=("${pkgbase}=${pkgver}-${pkgrel}" + 'hicolor-icon-theme' + 'pygtk>=2.14.0' + 'python2-dbus' + 'usermode') + backup=(etc/pam.d/authconfig + etc/pam.d/authconfig-gtk + etc/pam.d/authconfig-tui + etc/pam.d/system-config-authentication + etc/security/console.apps/authconfig + etc/security/console.apps/authconfig-gtk + etc/security/console.apps/authconfig-tui + etc/security/console.apps/system-config-authentication) + + cd "${pkgbase}-${pkgver}" + + local _file + for _file in _install/etc/pam.d/authconfig \ + _install/etc/pam.d/authconfig-gtk \ + _install/etc/pam.d/authconfig-tui \ + _install/etc/pam.d/system-config-authentication \ + _install/etc/security/console.apps/authconfig \ + _install/etc/security/console.apps/authconfig-gtk \ + _install/etc/security/console.apps/authconfig-tui \ + _install/etc/security/console.apps/system-config-authentication \ + _install/usr/bin/authconfig-gtk \ + _install/usr/bin/system-config-authentication \ + _install/usr/share/"$pkgbase"/authconfig.glade \ + _install/usr/share/"$pkgbase"/authconfig-gtk.py* \ + _install/usr/share/applications/* \ + _install/usr/share/icons/hicolor/*/apps/system-config-authentication.* \ + _install/usr/share/man/man8/authconfig-gtk.* \ + _install/usr/share/man/man8/system-config-authentication.* + do + _file="${_file#_install/}" + mkdir -p "$pkgdir"/"${_file%/*}" + mv _install/"$_file" "$pkgdir"/"$_file" + done +} |