From 3229331f66aa7498c18e36b2f6474bbe6a8f6d7d Mon Sep 17 00:00:00 2001
From: Diego Elio Pettenò <flameeyes@gentoo.org>
Date: Fri, 13 Mar 2009 13:43:59 +0000
Subject: Version bump. Package-Manager: portage-2.2_rc25/cvs/Linux x86_64

---
 app-admin/sudo/ChangeLog               |   8 +-
 app-admin/sudo/Manifest                |  12 +-
 app-admin/sudo/sudo-1.7.1_beta2.ebuild | 211 ---------------------------------
 app-admin/sudo/sudo-1.7.1_beta3.ebuild | 211 +++++++++++++++++++++++++++++++++
 4 files changed, 224 insertions(+), 218 deletions(-)
 delete mode 100644 app-admin/sudo/sudo-1.7.1_beta2.ebuild
 create mode 100644 app-admin/sudo/sudo-1.7.1_beta3.ebuild

(limited to 'app-admin')

diff --git a/app-admin/sudo/ChangeLog b/app-admin/sudo/ChangeLog
index 88ae70438af8..ac3726f6d3d8 100644
--- a/app-admin/sudo/ChangeLog
+++ b/app-admin/sudo/ChangeLog
@@ -1,6 +1,12 @@
 # ChangeLog for app-admin/sudo
 # Copyright 2002-2009 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/ChangeLog,v 1.164 2009/03/11 11:11:37 flameeyes Exp $
+# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/ChangeLog,v 1.165 2009/03/13 13:43:59 flameeyes Exp $
+
+*sudo-1.7.1_beta3 (13 Mar 2009)
+
+  13 Mar 2009; Diego E. Pettenò <flameeyes@gentoo.org>
+  -sudo-1.7.1_beta2.ebuild, +sudo-1.7.1_beta3.ebuild:
+  Version bump.
 
 *sudo-1.7.1_beta2 (11 Mar 2009)
 
diff --git a/app-admin/sudo/Manifest b/app-admin/sudo/Manifest
index 65d66f69eb4f..97a6ecba85e0 100644
--- a/app-admin/sudo/Manifest
+++ b/app-admin/sudo/Manifest
@@ -7,16 +7,16 @@ AUX sudo-skeychallengeargs.diff 567 RMD160 906ee43a7c2f21d1cf5130eac5c98ef083315
 AUX sudoers 1612 RMD160 f61c372791112feecae7e0a762a9aa9f30285099 SHA1 b27d644dcd9d7d3727db9355a81cebf7deaa6a7a SHA256 4ff5355e2d1dcac48bdd8420982a5b437546cd40b3dc445f9fbfb9464a4af1a0
 DIST sudo-1.6.9p17.tar.gz 593534 RMD160 4d1a4bb3558ddeaa4c8c095067a5696afb6ea50a SHA1 576a584eee413e12294cbd2ca6f445e51a1cb103 SHA256 1e2cd4ff684c6f542b7e392010021f36b201d074620dad4d7689da60f9c74596
 DIST sudo-1.7.0.tar.gz 744311 RMD160 62c1dbe97a4b46ea2352023ecb8b30dc4afedf58 SHA1 77bb230148b305e8608a3e552f1747507a84a55c SHA256 5f7de94287f39c8b3b8d86aed147967e9286f45740412004233858b637391978
-DIST sudo-1.7.1b2.tar.gz 752181 RMD160 5122b8d9f8d065b9e9d62cc2ea7a0f25623e4e8d SHA1 cfd16b52335bec71971066acea40e3b5ad7d3ec4 SHA256 d9b2c67b6af907146d7a577860cc745e2210b3b55ec306aa0f04d53cdbdb6cb7
+DIST sudo-1.7.1b3.tar.gz 754678 RMD160 4d80059b7ff38c694064a981ad73b1e1a7c816b6 SHA1 9772c7765a935b75daefd50927ee79f137794624 SHA256 914af92226d37cf6d72518e525842db52d31d443194ccb9d4f8f82c72dce5258
 EBUILD sudo-1.6.9_p17.ebuild 5894 RMD160 bcb3bb2f082b4e9c6995eec5ad3691d375bc50a1 SHA1 eb09c29f36e49fa50fcbcc55d0a6cd365ff73fa0 SHA256 7e569b5baec5228c5552a2bf56d704d9857f84c4110707dfcc2ee6a3824808c3
 EBUILD sudo-1.7.0.ebuild 6427 RMD160 a72db64faa291f1e84e2a331c0769422624c7ebe SHA1 21747f3f78de0e5ad2e8f28e42b5d6974ad0eb00 SHA256 054832bd50f025d1418757aaffe9d811abff539759c69ff5caf312ab20e94987
-EBUILD sudo-1.7.1_beta2.ebuild 6393 RMD160 742c1d8a1197d9a502f1d42d6342f16cec7203ba SHA1 716ed37101d4840bd7a4ff0c7eb14e79716cbe90 SHA256 c490c85034f3b2b44bae66d030c262d648a7820ae4f07320c69d47700b32e2ad
-MISC ChangeLog 22754 RMD160 c82dc005b88b40cbf561e9b0bb07351b45889876 SHA1 192a14fe3873bc15464ad93572d24f4907500c68 SHA256 57a723563c11f1732746a60f522ecd0a297d9ef60bf112169122e1471d8004b7
+EBUILD sudo-1.7.1_beta3.ebuild 6393 RMD160 f67e0ffc62311443f179a04fd137eedf3e5724f3 SHA1 244eabafb9c1a26acb56fe67bb6044d57d8ddce4 SHA256 ebca2870e3c588857ecbdf786427133d5e16cad76108247e577ac8a84d1ef3ac
+MISC ChangeLog 22914 RMD160 10d2202e47c946ef8506049fbc27bc1531e078b6 SHA1 9cdc03eef03069ec3b1dd7b8d793c226f0df8d26 SHA256 2e3185f3f3ad4a34ce127fba9a2ab706128b2ca5f0a3c6ea11eb5e617a2c6643
 MISC metadata.xml 501 RMD160 74dd36daa51d7ad5ce1659f0279e1245cd1ef4bc SHA1 e447d21dc61ee4a6de8cc0f66aa28aa422d9990a SHA256 5f399b83a90977486ff92847caa884d16f8b71705fd0d2203acb35f56c9a6db6
 -----BEGIN PGP SIGNATURE-----
 Version: GnuPG v2.0.10 (GNU/Linux)
 
-iEYEARECAAYFAkm3nIIACgkQAiZjviIA2Xgv/gCghyoxrE6RujWnfixAzn/x2ffa
-ZakAnAlU9fqifvpN/sK4GKkoYYiMrHY1
-=MoIx
+iEYEARECAAYFAkm6Y0sACgkQAiZjviIA2XiLLgCg20WUm5dyF3EFSwgvhIDGKZ57
+N9gAoPSsJGIb+cJc6BwJG8VkOI3ne1a/
+=hUOT
 -----END PGP SIGNATURE-----
diff --git a/app-admin/sudo/sudo-1.7.1_beta2.ebuild b/app-admin/sudo/sudo-1.7.1_beta2.ebuild
deleted file mode 100644
index a60dc872a177..000000000000
--- a/app-admin/sudo/sudo-1.7.1_beta2.ebuild
+++ /dev/null
@@ -1,211 +0,0 @@
-# Copyright 1999-2009 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.7.1_beta2.ebuild,v 1.1 2009/03/11 11:11:37 flameeyes Exp $
-
-inherit eutils pam confutils
-
-MY_P=${P/_/}
-MY_P=${MY_P/beta/b}
-
-case "${P}" in
-	*_beta* | *_rc*)
-		uri_prefix=beta/
-		;;
-	*)
-		uri_prefix=""
-		;;
-esac
-
-DESCRIPTION="Allows users or groups to run commands as other users"
-HOMEPAGE="http://www.sudo.ws/"
-SRC_URI="ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz"
-LICENSE="Sudo"
-SLOT="0"
-KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~sparc-fbsd ~x86 ~x86-fbsd"
-IUSE="pam skey offensive ldap selinux"
-
-DEPEND="pam? ( virtual/pam )
-	ldap? (
-		>=net-nds/openldap-2.1.30-r1
-		dev-libs/cyrus-sasl
-	)
-	skey? ( >=sys-auth/skey-1.1.5-r1 )
-	virtual/editor
-	virtual/mta"
-RDEPEND="selinux? ( sec-policy/selinux-sudo )
-	ldap? ( dev-lang/perl )
-	pam? ( sys-auth/pambase )
-	${DEPEND}"
-DEPEND="${DEPEND} sys-devel/bison"
-
-S=${WORKDIR}/${MY_P}
-
-pkg_setup() {
-	confutils_use_conflict skey pam
-}
-
-src_unpack() {
-	unpack ${A}; cd "${S}"
-
-	# compatability fix.
-	epatch "${FILESDIR}"/${PN}-skeychallengeargs.diff
-
-	# additional variables to disallow, should user disable env_reset.
-
-	# NOTE: this is not a supported mode of operation, these variables
-	#       are added to the blacklist as a convenience to administrators
-	#       who fail to heed the warnings of allowing untrusted users
-	#       to access sudo.
-	#
-	#       there is *no possible way* to foresee all attack vectors in
-	#       all possible applications that could potentially be used via
-	#       sudo, these settings will just delay the inevitable.
-	#
-	#       that said, I will accept suggestions for variables that can
-	#       be misused in _common_ interpreters or libraries, such as
-	#       perl, bash, python, ruby, etc., in the hope of dissuading
-	#       a casual attacker.
-
-	# XXX: perl should be using suid_perl.
-	# XXX: users can remove/add more via env_delete and env_check.
-	# XXX: <?> = probably safe enough for most circumstances.
-
-	einfo "Blacklisting common variables (env_delete)..."
-		sudo_bad_var() {
-			local target='env.c' marker='\*initial_badenv_table\[\]'
-
-			ebegin "	$1"
-			sed -i 's#\(^.*'${marker}'.*$\)#\1\n\t"'${1}'",#' "${S}"/${target}
-			eend $?
-		}
-
-		sudo_bad_var 'PERLIO_DEBUG'   # perl, write debug to file.
-		sudo_bad_var 'FPATH'          # ksh, search path for functions.
-		sudo_bad_var 'NULLCMD'        # zsh, command on null-redir. <?>
-		sudo_bad_var 'READNULLCMD'    # zsh, command on null-redir. <?>
-		sudo_bad_var 'GLOBIGNORE'     # bash, glob paterns to ignore. <?>
-		sudo_bad_var 'PYTHONHOME'     # python, module search path.
-		sudo_bad_var 'PYTHONPATH'     # python, search path.
-		sudo_bad_var 'PYTHONINSPECT'  # python, allow inspection.
-		sudo_bad_var 'RUBYLIB'        # ruby, lib load path.
-		sudo_bad_var 'RUBYOPT'        # ruby, cl options.
-		sudo_bad_var 'ZDOTDIR'        # zsh, path to search for dotfiles.
-	einfo "...done."
-
-	# prevent binaries from being stripped.
-	sed -i 's/\($(INSTALL).*\) -s \(.*[(sudo|visudo)]\)/\1 \2/g' Makefile.in
-
-	# remove useless c++ checks
-	epunt_cxx
-}
-
-src_compile() {
-	local line ROOTPATH
-
-	# FIXME: secure_path is a compile time setting. using ROOTPATH
-	# is not perfect, env-update may invalidate this, but until it
-	# is available as a sudoers setting this will have to do.
-	einfo "Setting secure_path..."
-
-		# why not use grep? variable might be expanded from other variables
-		# declared in that file. cannot just source the file, would override
-		# any variables already set.
-		eval `PS4= bash -x /etc/profile.env 2>&1 | \
-			while read line; do
-				case $line in
-					ROOTPATH=*) echo $line; break;;
-					*) continue;;
-				esac
-			done`  && einfo "	Found ROOTPATH..." || \
-				ewarn "	Failed to find ROOTPATH, please report this."
-
-		# remove duplicate path entries from $1
-		cleanpath() {
-			local i=1 x n IFS=:
-			local -a paths;	paths=($1)
-
-			for ((n=${#paths[*]}-1;i<=n;i++)); do
-				for ((x=0;x<i;x++)); do
-					test "${paths[i]}" == "${paths[x]}" && {
-						einfo "	Duplicate entry ${paths[i]} removed..." 1>&2
-						unset paths[i]; continue 2; }
-				done; # einfo "	Adding ${paths[i]}..." 1>&2
-			done; echo "${paths[*]}"
-		}
-
-		ROOTPATH=$(cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}})
-
-		# strip gcc path (bug #136027)
-		rmpath() {
-			declare e newpath oldpath=${!1} PATHvar=$1 thisp IFS=:
-			shift
-			for thisp in $oldpath; do
-				for e; do [[ $thisp == $e ]] && continue 2; done
-				newpath=$newpath:$thisp
-			done
-			eval $PATHvar='${newpath#:}'
-		}
-
-		rmpath ROOTPATH '*/gcc-bin/*'
-
-	einfo "...done."
-
-	# XXX: --disable-path-info closes an info leak, but may be confusing.
-	# XXX: /bin/vi may not be available, make nano visudo's default.
-	econf --with-secure-path="${ROOTPATH}" \
-		--with-editor=/bin/nano \
-		--with-env-editor \
-		$(use_with offensive insults) \
-		$(use_with offensive all-insults) \
-		$(use_with pam) \
-		$(use_with skey) \
-		$(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \
-		$(use_with ldap) || die
-
-	emake || die
-}
-
-src_install() {
-	emake DESTDIR="${D}" install || die
-	dodoc ChangeLog HISTORY PORTING README TROUBLESHOOTING \
-		UPGRADE WHATSNEW sample.sudoers sample.syslog.conf
-
-	if use ldap; then
-		dodoc README.LDAP schema.OpenLDAP
-		dosbin sudoers2ldif
-
-		cat - > "${T}"/ldap.conf.sudo <<EOF
-# See ldap.conf(5) and README.LDAP for details\n"
-# This file should only be readable by root\n\n"
-# supported directives: host, port, ssl, ldap_version\n"
-# uri, binddn, bindpw, sudoers_base, sudoers_debug\n"
-# tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key
-EOF
-
-		insinto /etc
-		doins "${T}"/ldap.conf.sudo
-		fperms 0440 /etc/ldap.conf.sudo
-	fi
-
-	pamd_mimic system-auth sudo auth account password session
-
-	insinto /etc
-	doins "${S}"/sudoers
-	fperms 0440 /etc/sudoers
-}
-
-pkg_postinst() {
-	if use ldap; then
-		ewarn
-		ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration."
-		ewarn
-		if egrep -q '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf; then
-			ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly"
-			ewarn "configured in /etc/nsswitch.conf."
-			ewarn
-			ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:"
-			ewarn "  sudoers: ldap files"
-			ewarn
-		fi
-	fi
-}
diff --git a/app-admin/sudo/sudo-1.7.1_beta3.ebuild b/app-admin/sudo/sudo-1.7.1_beta3.ebuild
new file mode 100644
index 000000000000..130c148dad12
--- /dev/null
+++ b/app-admin/sudo/sudo-1.7.1_beta3.ebuild
@@ -0,0 +1,211 @@
+# Copyright 1999-2009 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/app-admin/sudo/sudo-1.7.1_beta3.ebuild,v 1.1 2009/03/13 13:43:59 flameeyes Exp $
+
+inherit eutils pam confutils
+
+MY_P=${P/_/}
+MY_P=${MY_P/beta/b}
+
+case "${P}" in
+	*_beta* | *_rc*)
+		uri_prefix=beta/
+		;;
+	*)
+		uri_prefix=""
+		;;
+esac
+
+DESCRIPTION="Allows users or groups to run commands as other users"
+HOMEPAGE="http://www.sudo.ws/"
+SRC_URI="ftp://ftp.sudo.ws/pub/sudo/${uri_prefix}${MY_P}.tar.gz"
+LICENSE="Sudo"
+SLOT="0"
+KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~sparc-fbsd ~x86 ~x86-fbsd"
+IUSE="pam skey offensive ldap selinux"
+
+DEPEND="pam? ( virtual/pam )
+	ldap? (
+		>=net-nds/openldap-2.1.30-r1
+		dev-libs/cyrus-sasl
+	)
+	skey? ( >=sys-auth/skey-1.1.5-r1 )
+	virtual/editor
+	virtual/mta"
+RDEPEND="selinux? ( sec-policy/selinux-sudo )
+	ldap? ( dev-lang/perl )
+	pam? ( sys-auth/pambase )
+	${DEPEND}"
+DEPEND="${DEPEND} sys-devel/bison"
+
+S=${WORKDIR}/${MY_P}
+
+pkg_setup() {
+	confutils_use_conflict skey pam
+}
+
+src_unpack() {
+	unpack ${A}; cd "${S}"
+
+	# compatability fix.
+	epatch "${FILESDIR}"/${PN}-skeychallengeargs.diff
+
+	# additional variables to disallow, should user disable env_reset.
+
+	# NOTE: this is not a supported mode of operation, these variables
+	#       are added to the blacklist as a convenience to administrators
+	#       who fail to heed the warnings of allowing untrusted users
+	#       to access sudo.
+	#
+	#       there is *no possible way* to foresee all attack vectors in
+	#       all possible applications that could potentially be used via
+	#       sudo, these settings will just delay the inevitable.
+	#
+	#       that said, I will accept suggestions for variables that can
+	#       be misused in _common_ interpreters or libraries, such as
+	#       perl, bash, python, ruby, etc., in the hope of dissuading
+	#       a casual attacker.
+
+	# XXX: perl should be using suid_perl.
+	# XXX: users can remove/add more via env_delete and env_check.
+	# XXX: <?> = probably safe enough for most circumstances.
+
+	einfo "Blacklisting common variables (env_delete)..."
+		sudo_bad_var() {
+			local target='env.c' marker='\*initial_badenv_table\[\]'
+
+			ebegin "	$1"
+			sed -i 's#\(^.*'${marker}'.*$\)#\1\n\t"'${1}'",#' "${S}"/${target}
+			eend $?
+		}
+
+		sudo_bad_var 'PERLIO_DEBUG'   # perl, write debug to file.
+		sudo_bad_var 'FPATH'          # ksh, search path for functions.
+		sudo_bad_var 'NULLCMD'        # zsh, command on null-redir. <?>
+		sudo_bad_var 'READNULLCMD'    # zsh, command on null-redir. <?>
+		sudo_bad_var 'GLOBIGNORE'     # bash, glob paterns to ignore. <?>
+		sudo_bad_var 'PYTHONHOME'     # python, module search path.
+		sudo_bad_var 'PYTHONPATH'     # python, search path.
+		sudo_bad_var 'PYTHONINSPECT'  # python, allow inspection.
+		sudo_bad_var 'RUBYLIB'        # ruby, lib load path.
+		sudo_bad_var 'RUBYOPT'        # ruby, cl options.
+		sudo_bad_var 'ZDOTDIR'        # zsh, path to search for dotfiles.
+	einfo "...done."
+
+	# prevent binaries from being stripped.
+	sed -i 's/\($(INSTALL).*\) -s \(.*[(sudo|visudo)]\)/\1 \2/g' Makefile.in
+
+	# remove useless c++ checks
+	epunt_cxx
+}
+
+src_compile() {
+	local line ROOTPATH
+
+	# FIXME: secure_path is a compile time setting. using ROOTPATH
+	# is not perfect, env-update may invalidate this, but until it
+	# is available as a sudoers setting this will have to do.
+	einfo "Setting secure_path..."
+
+		# why not use grep? variable might be expanded from other variables
+		# declared in that file. cannot just source the file, would override
+		# any variables already set.
+		eval `PS4= bash -x /etc/profile.env 2>&1 | \
+			while read line; do
+				case $line in
+					ROOTPATH=*) echo $line; break;;
+					*) continue;;
+				esac
+			done`  && einfo "	Found ROOTPATH..." || \
+				ewarn "	Failed to find ROOTPATH, please report this."
+
+		# remove duplicate path entries from $1
+		cleanpath() {
+			local i=1 x n IFS=:
+			local -a paths;	paths=($1)
+
+			for ((n=${#paths[*]}-1;i<=n;i++)); do
+				for ((x=0;x<i;x++)); do
+					test "${paths[i]}" == "${paths[x]}" && {
+						einfo "	Duplicate entry ${paths[i]} removed..." 1>&2
+						unset paths[i]; continue 2; }
+				done; # einfo "	Adding ${paths[i]}..." 1>&2
+			done; echo "${paths[*]}"
+		}
+
+		ROOTPATH=$(cleanpath /bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin:/opt/bin${ROOTPATH:+:${ROOTPATH}})
+
+		# strip gcc path (bug #136027)
+		rmpath() {
+			declare e newpath oldpath=${!1} PATHvar=$1 thisp IFS=:
+			shift
+			for thisp in $oldpath; do
+				for e; do [[ $thisp == $e ]] && continue 2; done
+				newpath=$newpath:$thisp
+			done
+			eval $PATHvar='${newpath#:}'
+		}
+
+		rmpath ROOTPATH '*/gcc-bin/*'
+
+	einfo "...done."
+
+	# XXX: --disable-path-info closes an info leak, but may be confusing.
+	# XXX: /bin/vi may not be available, make nano visudo's default.
+	econf --with-secure-path="${ROOTPATH}" \
+		--with-editor=/bin/nano \
+		--with-env-editor \
+		$(use_with offensive insults) \
+		$(use_with offensive all-insults) \
+		$(use_with pam) \
+		$(use_with skey) \
+		$(use_with ldap ldap_conf_file /etc/ldap.conf.sudo) \
+		$(use_with ldap) || die
+
+	emake || die
+}
+
+src_install() {
+	emake DESTDIR="${D}" install || die
+	dodoc ChangeLog HISTORY PORTING README TROUBLESHOOTING \
+		UPGRADE WHATSNEW sample.sudoers sample.syslog.conf
+
+	if use ldap; then
+		dodoc README.LDAP schema.OpenLDAP
+		dosbin sudoers2ldif
+
+		cat - > "${T}"/ldap.conf.sudo <<EOF
+# See ldap.conf(5) and README.LDAP for details\n"
+# This file should only be readable by root\n\n"
+# supported directives: host, port, ssl, ldap_version\n"
+# uri, binddn, bindpw, sudoers_base, sudoers_debug\n"
+# tls_{checkpeer,cacertfile,cacertdir,randfile,ciphers,cert,key
+EOF
+
+		insinto /etc
+		doins "${T}"/ldap.conf.sudo
+		fperms 0440 /etc/ldap.conf.sudo
+	fi
+
+	pamd_mimic system-auth sudo auth account password session
+
+	insinto /etc
+	doins "${S}"/sudoers
+	fperms 0440 /etc/sudoers
+}
+
+pkg_postinst() {
+	if use ldap; then
+		ewarn
+		ewarn "sudo uses the /etc/ldap.conf.sudo file for ldap configuration."
+		ewarn
+		if egrep -q '^[[:space:]]*sudoers:' "${ROOT}"/etc/nsswitch.conf; then
+			ewarn "In 1.7 series, LDAP is no more consulted, unless explicitly"
+			ewarn "configured in /etc/nsswitch.conf."
+			ewarn
+			ewarn "To make use of LDAP, add this line to your /etc/nsswitch.conf:"
+			ewarn "  sudoers: ldap files"
+			ewarn
+		fi
+	fi
+}
-- 
cgit v1.2.3-65-gdbad