From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from pigeon.gentoo.org ([208.92.234.80] helo=lists.gentoo.org) by finch.gentoo.org with esmtp (Exim 4.60) (envelope-from ) id 1PMjti-0006Cq-NT for garchives@archives.gentoo.org; Sun, 28 Nov 2010 16:14:42 +0000 Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id B8E79E0655; Sun, 28 Nov 2010 16:14:40 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) by pigeon.gentoo.org (Postfix) with ESMTP id 7F22DE0655 for ; Sun, 28 Nov 2010 16:14:40 +0000 (UTC) Received: from flycatcher.gentoo.org (flycatcher.gentoo.org [81.93.255.6]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id E31EA1B410B for ; Sun, 28 Nov 2010 16:14:39 +0000 (UTC) Received: by flycatcher.gentoo.org (Postfix, from userid 544) id 7930D20054; Sun, 28 Nov 2010 16:14:38 +0000 (UTC) From: "Robin H. Johnson (robbat2)" To: gentoo-commits@lists.gentoo.org Reply-To: gentoo-dev@lists.gentoo.org, robbat2@gentoo.org Subject: [gentoo-commits] gentoo-x86 commit in profiles: use.local.desc X-VCS-Repository: gentoo-x86 X-VCS-Files: use.local.desc X-VCS-Directories: profiles X-VCS-Committer: robbat2 X-VCS-Committer-Name: Robin H. Johnson Content-Type: text/plain; charset=utf8 Message-Id: <20101128161438.7930D20054@flycatcher.gentoo.org> Date: Sun, 28 Nov 2010 16:14:38 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: quoted-printable X-Archives-Salt: edef2ee6-3acb-45b1-bd48-77b95f4969e0 X-Archives-Hash: c8b107b91e155fb3dd978d69f57f5d18 robbat2 10/11/28 16:14:38 Modified: use.local.desc Log: Automated update of use.local.desc Revision Changes Path 1.6190 var/cvsroot/gentoo-x86/profiles/use.local.desc file : http://sources.gentoo.org/viewvc.cgi//var/cvsroot/gentoo-x86/profi= les/use.local.desc?rev=3D1.6190&view=3Dmarkup plain: http://sources.gentoo.org/viewvc.cgi//var/cvsroot/gentoo-x86/profi= les/use.local.desc?rev=3D1.6190&content-type=3Dtext/plain diff : http://sources.gentoo.org/viewvc.cgi//var/cvsroot/gentoo-x86/profi= les/use.local.desc?r1=3D1.6189&r2=3D1.6190 Index: use.local.desc =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D RCS file: /var/cvsroot/gentoo-x86/profiles/use.local.desc,v retrieving revision 1.6189 retrieving revision 1.6190 diff -p -w -b -B -u -u -r1.6189 -r1.6190 --- use.local.desc 28 Nov 2010 14:54:21 -0000 1.6189 +++ use.local.desc 28 Nov 2010 16:14:38 -0000 1.6190 @@ -1,6 +1,6 @@ # Copyright 1999-2010 Gentoo Foundation. # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/profiles/use.local.desc,v 1.6189 2010= /11/28 14:54:21 robbat2 Exp $ +# $Header: /var/cvsroot/gentoo-x86/profiles/use.local.desc,v 1.6190 2010= /11/28 16:14:38 robbat2 Exp $ # This file contains descriptions of local USE flags, and the ebuilds wh= ich # contain them. # Keep it sorted (use "LC_ALL=3DC sort -t: -k1,1 -k2 | LC_ALL=3DC sort -= s -t/ -k1,1") @@ -3634,12 +3634,12 @@ sys-auth/pambase:consolekit - Enable pa sys-auth/pambase:cracklib - Enable pam_cracklib module on system authen= tication stack. This produces warnings when changing password to somethin= g easily crackable. It requires the same USE flag to be enabled on sys-li= bs/pam or system login might be impossible.=20 sys-auth/pambase:debug - Enable debug information logging on syslog(3) = for all the modules supporting this in the system authentication and syst= em login stacks.=20 sys-auth/pambase:gnome-keyring - Enable pam_gnome_keyring module on sys= tem login stack. This enables proper Gnome Keyring access to logins, whet= her they are done with the login shell, a Desktop Manager or a remote log= in systems such as SSH.=20 -sys-auth/pambase:kerberos - Enable pam_krb5 module on system auth stack= , as an alternative to pam_unix. If Kerberos authentication succeed, only= pam_unix will be ignore, and all the other modules will proceed as usual= , including Gnome Keyring and other session modules. It requires sys-libs= /pam as PAM implementation.=20 sys-auth/pambase:minimal - Disables the standard PAM modules that provi= de extra information to users on login; this includes pam_tally (and pam_= tally2 for Linux PAM 1.1 and later), pam_lastlog, pam_motd and other simi= lar modules. This might not be a good idea on a multi-user system but cou= ld reduce slightly the overhead on single-user non-networked systems.=20 sys-auth/pambase:mktemp - Enable pam_mktemp module on system auth stack= for session handling. This module creates a private temporary directory = for the user, and sets TMP and TMPDIR accordingly.=20 +sys-auth/pambase:pam_krb5 - Enable pam_krb5 module on system auth stack= , as an alternative to pam_unix. If Kerberos authentication succeed, only= pam_unix will be ignore, and all the other modules will proceed as usual= , including Gnome Keyring and other session modules. It requires sys-libs= /pam as PAM implementation.=20 +sys-auth/pambase:pam_ssh - Enable pam_ssh module on system auth stack f= or authentication and session handling. This module will accept as passwo= rd the passphrase of a private SSH key (one of ~/.ssh/id_rsa, ~/.ssh/id_d= sa or ~/.ssh/identity), and will spawn an ssh-agent instance to cache the= open key.=20 sys-auth/pambase:passwdqc - Enable pam_passwdqc module on system auth s= tack for password quality validation. This is an alternative to pam_crack= lib producing warnings, rejecting or providing example passwords when cha= nging your system password. It is used by default by OpenWall GNU/*/Linux= and by FreeBSD.=20 sys-auth/pambase:sha512 - Switch Linux-PAM's pam_unix module to use sha= 512 for passwords hashes rather than MD5. This option requires >=3Dsys-li= bs/pam-1.0.1 built against >=3Dsys-libs/glibc-2.7, if it's built against = an earlier version, it will silently be ignored, and MD5 hashes will be u= sed. All the passwords changed after this USE flag is enabled will be sav= ed to the shadow file hashed using SHA512 function. The password previous= ly saved will be left untouched. Please note that while SHA512-hashed pas= swords will still be recognised if the USE flag is removed, the shadow fi= le will not be compatible with systems using an earlier glibc version.=20 -sys-auth/pambase:ssh - Enable pam_ssh module on system auth stack for a= uthentication and session handling. This module will accept as password t= he passphrase of a private SSH key (one of ~/.ssh/id_rsa, ~/.ssh/id_dsa o= r ~/.ssh/identity), and will spawn an ssh-agent instance to cache the ope= n key.=20 sys-auth/polkit:introspection - Use dev-libs/gobject-introspection for i= ntrospection sys-block/gparted:btrfs - Include Btrfs support (sys-fs/btrfs-progs) sys-block/gparted:dmraid - Support for dmraid devices, also known as ATA= -RAID, or Fake RAID.