Debian: More fixes for lintian

This commit is contained in:
zzz
2017-05-17 15:51:34 +00:00
parent 7d129215cf
commit a5551c1be3
9 changed files with 148 additions and 21 deletions

View File

@ -58,7 +58,7 @@ Public domain except as listed below:
PRNG:
Copyright (C) 2001, 2002, Free Software Foundation, Inc.
See licenses/LICENSE-LGPLv2.1.txt
See licenses/LICENSE-LGPLv2.1.txt or /usr/share/common-licenses/LGPL-2.1
HashCash code:
Copyright 2006 Gregory Rubin grrubin@gmail.com

View File

@ -30,9 +30,9 @@ Depends: ${java:Depends}, ${shlibs:Depends},
debconf,
i2p-router (>= 0.8.6-5),
libjbigi-jni,
lsb-base,
lsb-base (>= 3.0-6),
service-wrapper
Description: I2P anonymous network
Description: Anonymous network (I2P)
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no
@ -99,7 +99,7 @@ Suggests: tor
,syndie
,www-browser
,xul-ext-torbutton
Description: I2P router
Description: Router for I2P
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no

View File

@ -31,9 +31,9 @@ Depends: ${java:Depends}, ${shlibs:Depends},
debconf,
i2p-router (>= 0.8.6-5),
libjbigi-jni,
lsb-base,
lsb-base (>= 3.0-6),
service-wrapper
Description: I2P anonymous network
Description: Anonymous network (I2P)
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no
@ -100,7 +100,7 @@ Suggests: tor
,syndie
,www-browser
,xul-ext-torbutton
Description: I2P router
Description: Router for I2P
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no

127
debian-alt/precise/i2p.postinst Executable file
View File

@ -0,0 +1,127 @@
#!/bin/sh
set -e
I2PHOME=/var/lib/i2p
I2PSYSUSER=i2psvc
conffile="/etc/default/i2p"
systemdservice="/lib/systemd/system/i2p.service"
# Source debconf library -- we have a Depends line
# to make sure it is there...
. /usr/share/debconf/confmodule
db_version 2.0
case "$1" in
configure|reconfigure)
if [ ! -e $conffile ]; then
echo "# Defaults for i2p initscript (/etc/init.d/i2p" >> $conffile
echo "# This is a posix shell fragment" >> $conffile
echo >> $conffile
echo "# [automatically edited by postinst, do not change line format ]" >> $conffile
echo "# Run 'dpkg-reconfigure -plow i2p' to change these values." >> $conffile
echo >> $conffile
echo "RUN_DAEMON=" >> $conffile
echo "I2PUSER=" >> $conffile
echo "ULIMIT=" >> $conffile
echo "CONFINE_WITH_APPARMOR=" >> $conffile
echo "# The next value is also wrapper.java.maxmemory in /etc/i2p/wrapper.config" >> $conffile
echo "MEMORYLIMIT=" >> $conffile
fi
db_get i2p/daemon
RUN_DAEMON="$RET"
db_get i2p/user
I2PUSER="$RET"
db_get i2p/memory
MEMORYLIMIT="$RET"
db_get i2p/aa
CONFINE_WITH_APPARMOR="$RET"
cp -a -f $conffile $conffile.tmp
# If the admin deleted or commented some variables but then set them via debconf,
# (re-)add them to the conffile.
test -z "$RUN_DAEMON" || grep -Eq '^ *RUN_DAEMON=' $conffile || \
echo "RUN_DAEMON=" >> $conffile
test -z "$I2PUSER" || grep -Eq '^ *I2PUSER=' $conffile || \
echo "I2PUSER=" >> $conffile
test -z "$MEMORYLIMIT" || grep -Eq '^ *MEMORYLIMIT=' $conffile || \
echo "MEMORYLIMIT=" >> $conffile
test -z "$ULIMIT" || grep -Eq '^ *ULIMIT=' $conffile || \
echo "ULIMIT=" >> $conffile
test -z "$CONFINE_WITH_APPARMOR" || grep -Eq '^ *CONFINE_WITH_APPARMOR=' $conffile || \
echo "CONFINE_WITH_APPARMOR=" >> $conffile
if [ -z $RUN_DAEMON ]; then
RUN_DAEMON="false"
I2PUSER="i2psvc"
fi
sed -e "s/^ *RUN_DAEMON=.*/RUN_DAEMON=\"$RUN_DAEMON\"/" \
-e "s/^ *I2PUSER=.*/I2PUSER=\"$I2PUSER\"/" \
-e "s/^ *MEMORYLIMIT=.*/MEMORYLIMIT=\"$MEMORYLIMIT\"/" \
-e "s/^ *CONFINE_WITH_APPARMOR=.*/CONFINE_WITH_APPARMOR=\"$CONFINE_WITH_APPARMOR\"/" \
< $conffile > $conffile.tmp
mv -f $conffile.tmp $conffile
if [ -e "$systemdservice" ]; then
sed -e "s/User=.*/User=$I2PUSER/" < "$systemdservice" > "$systemdservice.tmp"
mv -f "$systemdservice.tmp" "$systemdservice"
chmod 0644 -f "$systemdservice"
if grep -q 'systemd' /proc/1/comm > /dev/null 2>&1; then
systemctl --system daemon-reload
if [ $RUN_DAEMON = 'true' ]; then
systemctl enable i2p.service
else
systemctl disable i2p.service
fi
fi
fi
sed -e "s/^ *wrapper\.java\.maxmemory=.*/wrapper\.java\.maxmemory=$MEMORYLIMIT/" \
< /etc/i2p/wrapper.config > /etc/i2p/wrapper.config.tmp
mv -f /etc/i2p/wrapper.config.tmp /etc/i2p/wrapper.config
chmod 0644 -f /etc/i2p/wrapper.config
# Older versions of adduser created the home directory.
# The version of adduser in Debian unstable does not.
[ -d $I2PHOME ] || mkdir -m0750 $I2PHOME
# Create user and group as a system user.
if getent passwd i2psvc > /dev/null 2>&1 ; then
groupadd -f $I2PSYSUSER || true
usermod -c "I2P Router Daemon" -d $I2PHOME -g $I2PSYSUSER -s "/bin/false" \
$I2PSYSUSER -e 1 > /dev/null 2>&1 || true
else
adduser --system --quiet --group --home $I2PHOME $I2PSYSUSER > /dev/null 2>&1
fi
[ -d /var/log/i2p ] || mkdir -m0750 /var/log/i2p
chown -f -R $I2PSYSUSER:i2psvc /var/log/i2p
# Has someone set the permissions with dpkg-statoverride? If so, obey them.
if ! dpkg-statoverride --list $I2PHOME > /dev/null 2>&1
then
chown -f -R $I2PSYSUSER:$I2PSYSUSER $I2PHOME
chmod -f u=rwx,g=rxs,o= $I2PHOME
fi
db_stop
;;
abort-upgrade|abort-remove|abort-deconfigure)
echo "Aborting upgrade"
exit 0
;;
*)
echo "postinst called with unknown argument \`$1'" >&2
exit 0
;;
esac
#DEBHELPER#
exit 0
# vim: tabstop=8 expandtab shiftwidth=4 softtabstop=4

View File

@ -32,9 +32,9 @@ Depends: ${java:Depends}, ${shlibs:Depends},
debconf,
i2p-router (>= 0.8.6-5),
libjbigi-jni,
lsb-base,
lsb-base (>= 3.0-6),
service-wrapper
Description: I2P anonymous network
Description: Anonymous network (I2P)
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no
@ -101,7 +101,7 @@ Suggests: tor
,syndie
,www-browser
,xul-ext-torbutton
Description: I2P router
Description: Router for I2P
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no

View File

@ -28,9 +28,9 @@ Depends: ${java:Depends}, ${shlibs:Depends},
debconf,
i2p-router (>= 0.8.6-5),
libjbigi-jni,
lsb-base,
lsb-base (>= 3.0-6),
service-wrapper
Description: I2P anonymous network
Description: Anonymous network (I2P)
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no
@ -98,7 +98,7 @@ Suggests: tor
,syndie
,www-browser
,xul-ext-torbutton
Description: I2P router
Description: Router for I2P
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no

View File

@ -31,9 +31,9 @@ Depends: ${java:Depends}, ${shlibs:Depends},
debconf,
i2p-router (>= 0.8.6-5),
libjbigi-jni,
lsb-base,
lsb-base (>= 3.0-6),
service-wrapper
Description: I2P anonymous network
Description: Anonymous network (I2P)
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no
@ -102,7 +102,7 @@ Suggests: tor
,syndie
,www-browser
,xul-ext-torbutton
Description: I2P router
Description: Router for I2P
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no

6
debian/control vendored
View File

@ -30,9 +30,9 @@ Depends: ${java:Depends}, ${shlibs:Depends},
debconf,
i2p-router (>= 0.8.6-5),
libjbigi-jni,
lsb-base,
lsb-base (>= 3.0-6),
service-wrapper
Description: I2P anonymous network
Description: Anonymous network (I2P)
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no
@ -102,7 +102,7 @@ Suggests: tor
,syndie
,www-browser
,xul-ext-torbutton
Description: I2P router
Description: Router for I2P
I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no

4
debian/i2p.postinst vendored
View File

@ -74,9 +74,9 @@ case "$1" in
if grep -q 'systemd' /proc/1/comm > /dev/null 2>&1; then
systemctl --system daemon-reload
if [ $RUN_DAEMON = 'true' ]; then
systemctl enable i2p.service
deb-systemd-helper enable i2p.service
else
systemctl disable i2p.service
deb-systemd-helper disable i2p.service
fi
fi
fi