diff options
author | mharmsen <mharmsen@c9f7a03b-bd48-0410-a16d-cbbf54688b0b> | 2011-08-30 16:40:39 +0000 |
---|---|---|
committer | mharmsen <mharmsen@c9f7a03b-bd48-0410-a16d-cbbf54688b0b> | 2011-08-30 16:40:39 +0000 |
commit | 0e7f1054dfe2102bf752c5281f8263d091c456cf (patch) | |
tree | 8fdac1eb09af72e1d0c20226eae058fd519acf7b /pki/scripts | |
parent | 790f8554e390cd9f52f3ee0936ee4d73a8529254 (diff) | |
download | pki-0e7f1054dfe2102bf752c5281f8263d091c456cf.tar.gz pki-0e7f1054dfe2102bf752c5281f8263d091c456cf.tar.xz pki-0e7f1054dfe2102bf752c5281f8263d091c456cf.zip |
Crafted "prepare_dogtag_pki" script, removed "prepare_pki" script, and updated
"build_dogtag_pki" script.
git-svn-id: svn+ssh://svn.fedorahosted.org/svn/pki/trunk@2191 c9f7a03b-bd48-0410-a16d-cbbf54688b0b
Diffstat (limited to 'pki/scripts')
-rwxr-xr-x | pki/scripts/build_dogtag_pki | 33 | ||||
-rwxr-xr-x | pki/scripts/prepare_dogtag_pki | 325 | ||||
-rwxr-xr-x | pki/scripts/prepare_pki | 189 |
3 files changed, 351 insertions, 196 deletions
diff --git a/pki/scripts/build_dogtag_pki b/pki/scripts/build_dogtag_pki index 9673b9478..c79eeb714 100755 --- a/pki/scripts/build_dogtag_pki +++ b/pki/scripts/build_dogtag_pki @@ -32,6 +32,7 @@ PKI_ARCH=`uname -p` NOARCH="noarch" # Set packaging variables +RPM_EXE="/bin/rpm" YUM_EXE="/usr/bin/yum" YUM_EXE_OPTIONS="-y --nogpgcheck install" RPM_DIR="RPMS" @@ -68,17 +69,35 @@ if [ ! -e "${PKI_SUDOERS}" ]; then exit 255 fi -# Check for the presence of the required sudoers command -PKI_SUDOERS_COMMAND="(root) NOPASSWD: ${YUM_EXE}" -PKI_SUDOERS_LINE="${PKI_USERNAME} ALL = NOPASSWD: ${YUM_EXE}" +# Check for the presence of the required sudoers command(s) +PKI_SUDOERS_COMMAND="(root) NOPASSWD: ALL" +PKI_SUDOERS_LINE="${PKI_USERNAME} NOPASSWD: ALL" +PKI_SUDOERS_RPM_COMMAND="(root) NOPASSWD: ${RPM_EXE}" +PKI_SUDOERS_RPM_LINE="${PKI_USERNAME} ALL = NOPASSWD: ${RPM_EXE}" +PKI_SUDOERS_YUM_COMMAND="(root) NOPASSWD: ${YUM_EXE}" +PKI_SUDOERS_YUM_LINE="${PKI_USERNAME} ALL = NOPASSWD: ${YUM_EXE}" printf "Checking if '${PKI_USERNAME}' has the appropriate '${PKI_SUDO}' permissions . . .\n" printf "[NOTE: A password prompt may appear requiring ${PKI_USERNAME}'s password.]\n" +# NOTE: If 'ALL' commands are NOT sudo enabled, then at least BOTH +# of the 'RPM' and 'YUM' commands MUST be sudo enabled! `${PKI_SUDO} -l | grep "${PKI_SUDOERS_COMMAND}" > /dev/null 2>&1` if [ $? -ne 0 ]; then - printf "The '$0' script requires that the\n" - printf "'${PKI_SUDOERS}' file MUST contain this line:\n\n" - printf " '${PKI_SUDOERS_LINE}'\n\n" - exit 255 + sudo_commands=2 + `${PKI_SUDO} -l | grep "${PKI_SUDOERS_RPM_COMMAND}" > /dev/null 2>&1` + if [ $? -ne 0 ]; then + sudo_commands=`expr ${sudo_commands} - 1` + fi + `${PKI_SUDO} -l | grep "${PKI_SUDOERS_YUM_COMMAND}" > /dev/null 2>&1` + if [ $? -ne 0 ]; then + sudo_commands=`expr ${sudo_commands} - 1` + fi + if [ ${sudo_commands} -ne 2 ]; then + printf "The '$0' script requires that the\n" + printf "'${PKI_SUDOERS}' file MUST contain BOTH of these lines:\n\n" + printf " '${PKI_SUDOERS_RPM_LINE}'\n" + printf " '${PKI_SUDOERS_YUM_LINE}'\n\n" + exit 255 + fi fi # Set 'composition scripts' variables diff --git a/pki/scripts/prepare_dogtag_pki b/pki/scripts/prepare_dogtag_pki new file mode 100755 index 000000000..ce7738787 --- /dev/null +++ b/pki/scripts/prepare_dogtag_pki @@ -0,0 +1,325 @@ +#!/bin/bash +# BEGIN COPYRIGHT BLOCK +# (C) 2011 Red Hat, Inc. +# All rights reserved. +# END COPYRIGHT BLOCK + +# Always switch into the base directory of this +# shell script prior to executing it so that all +# of its output is written to this directory +cd `dirname $0` + +# +# Usage statement +# + +Usage() +{ + printf "\n" + printf "Usage: $0 [-skip_directory_server_installation]\n\n" +} + +# +# Check for command line argument validity +# +skip_directory_server_installation=0 +if [ $# -gt 1 ] ; then + printf "ERROR: Incorrect number of parameters!\n" + Usage + exit 255 +elif [ $# -eq 1 ] ; then + if [ $1 != "-skip_directory_server_installation" ] ; then + printf "ERROR: Incorrect parameters usage!\n" + Usage + exit 255 + else + skip_directory_server_installation=1 + fi +fi + +# Retrieve the name of this base directory +PKI_PWD=`pwd` + +# Establish the name of the machine +PKI_HOSTNAME=`hostname` + +# Set pre-defined variables +ROOT_UID=0 + +# This script may ONLY be run on Linux! +PKI_OS=`uname` +if [ "${PKI_OS}" != "Linux" ]; then + printf "The '$0' script is ONLY executable\n" + printf "on a 'Linux' machine!\n" + exit 255 +fi + +# For Fedora machines, compute the FEDORA_VERSION +if [ -e /etc/fedora-release ]; then + FEDORA_VERSION=`rpm -qf --qf='%{VERSION}' /etc/fedora-release | tr -d [A-Z] | tr -d [a-z]` +else + # For now, just give FEDORA_VERSION a bogus value if not using Fedora. + FEDORA_VERSION=9999 +fi + +# Set Linux variables +PKI_PLATFORM="LINUX" +RPM_EXE="/bin/rpm" +YUM_EXE="/usr/bin/yum" +YUM_EXE_OPTIONS="-y install" + +# Set sudo variables +PKI_SUDO="/usr/bin/sudo" +PKI_SUDOERS="/etc/sudoers" + +# Set user identity variables +PKI_EUID=`/usr/bin/id -u` +PKI_UID=`/usr/bin/id -ur` +PKI_USERNAME=`/usr/bin/id -un` + +# Make sure that this script is NOT being run as root! +if [ ${PKI_UID} -eq ${ROOT_UID} ] || + [ ${PKI_EUID} -eq ${ROOT_UID} ]; then + printf "The '$0' script may NOT be run as root!\n" + exit 255 +fi + +# Check for the presence of the 'sudo' executable +if [ ! -x "${PKI_SUDO}" ]; then + printf "The '$0' script requires the '${PKI_SUDO}' executable\n" + printf "to be available on '${PKI_HOSTNAME}'!\n" + exit 255 +fi + +# Check for the presence of the 'sudoers' file +if [ ! -e "${PKI_SUDOERS}" ]; then + printf "The '$0' script requires the '${PKI_SUDOERS}' file\n" + printf "to be available on '${PKI_HOSTNAME}'!\n" + exit 255 +fi + +# Check for the presence of the required sudoers command(s) +PKI_SUDOERS_COMMAND="(root) NOPASSWD: ALL" +PKI_SUDOERS_LINE="${PKI_USERNAME} NOPASSWD: ALL" +PKI_SUDOERS_RPM_COMMAND="(root) NOPASSWD: ${RPM_EXE}" +PKI_SUDOERS_RPM_LINE="${PKI_USERNAME} ALL = NOPASSWD: ${RPM_EXE}" +PKI_SUDOERS_YUM_COMMAND="(root) NOPASSWD: ${YUM_EXE}" +PKI_SUDOERS_YUM_LINE="${PKI_USERNAME} ALL = NOPASSWD: ${YUM_EXE}" +printf "Checking if '${PKI_USERNAME}' has the appropriate '${PKI_SUDO}' permissions . . .\n" +printf "[NOTE: A password prompt may appear requiring ${PKI_USERNAME}'s password.]\n" +# NOTE: If 'ALL' commands are NOT sudo enabled, then at least BOTH +# of the 'RPM' and 'YUM' commands MUST be sudo enabled! +`${PKI_SUDO} -l | grep "${PKI_SUDOERS_COMMAND}" > /dev/null 2>&1` +if [ $? -ne 0 ]; then + sudo_commands=2 + `${PKI_SUDO} -l | grep "${PKI_SUDOERS_RPM_COMMAND}" > /dev/null 2>&1` + if [ $? -ne 0 ]; then + sudo_commands=`expr ${sudo_commands} - 1` + fi + `${PKI_SUDO} -l | grep "${PKI_SUDOERS_YUM_COMMAND}" > /dev/null 2>&1` + if [ $? -ne 0 ]; then + sudo_commands=`expr ${sudo_commands} - 1` + fi + if [ ${sudo_commands} -ne 2 ]; then + printf "The '$0' script requires that the\n" + printf "'${PKI_SUDOERS}' file MUST contain BOTH of these lines:\n\n" + printf " '${PKI_SUDOERS_RPM_LINE}'\n" + printf " '${PKI_SUDOERS_YUM_LINE}'\n\n" + exit 255 + fi +fi + +###################################### +# Establish PKI Development Packages # +###################################### + +# Language Development +GCC="gcc" +GPLUSPLUS="gcc-c++" +JAVA="java-1.6.0-openjdk" +JAVAC="java-1.6.0-openjdk-devel" +PERL="perl" + +# Language Development Support Utilities +JPACKAGE_UTILS="jpackage-utils" +PKGCONFIG="pkgconfig" + +# Build Utilities +ANT="ant" +CMAKE="cmake" +MAKE="make" +M4="m4" + +# Packaging Utilities +RPM="rpm" +RPM_BUILD="rpm-build" +YUM="yum" +YUM_UTILS="yum-utils" + +# Compression Utilities +GZIP="gzip" +TAR="tar" +ZIP="zip" +ZLIB="zlib" +ZLIB="zlib-devel" + +# Fetching Utilities +CURL="curl" +WGET="wget" + +# Revision Control Utilities +CVS="cvs" +GIT="git" +SVN="subversion" + +# Miscellaneous Utilities +CHKCONFIG="chkconfig" +INITSCRIPTS="initscripts" +OPENSSH_CLIENTS="openssh-clients" +#SENDMAIL="sendmail" + +# Create a catch-all variable for PKI Development Packages +PKI_DEVELOPMENT_PACKAGES="${GCC} ${GPLUSPLUS} ${JAVA} ${JAVAC} ${PERL} ${JPACKAGE_UTILS} ${PKGCONFIG} ${ANT} ${CMAKE} ${MAKE} ${M4} ${RPM} ${RPM_BUILD} ${YUM} ${YUM_UTILS} ${GZIP} ${TAR} ${ZIP} ${ZLIB} ${CURL} ${WGET} ${CVS} ${GIT} ${SVN} ${CHKCONFIG} ${INITSCRIPTS} ${OPENSSH_CLIENTS} ${SENDMAIL}" + + +################################## +# Establish PKI Support Packages # +################################## + +# Apache Packages +APR="apr" +APR_DEVEL="apr-devel" +APR_UTIL="apr-util" +APR_UTIL_DEVEL="apr-util-devel" +EXPAT="expat" +EXPAT_DEVEL="expat-devel" +HTTPD="httpd" +HTTPD_DEVEL="httpd-devel" +HTTPD_TOOLS="httpd-tools" +PCRE="pcre" +PCRE_DEVEL="pcre-devel" + +# Tomcat Packages +TOMCAT6="tomcat6" +TOMCAT6_LIB="tomcat6-lib" +if [ ${FEDORA_VERSION} -ge 14 ]; then + APACHE_COMMONS_LANG="apache-commons-daemon" + APACHE_COMMONS_LANG="apache-commons-lang" + APACHE_COMMONS_LOGGING="apache-commons-logging" +else + APACHE_COMMONS_LANG="jakarta-commons-daemon" + APACHE_COMMONS_LANG="jakarta-commons-lang" + APACHE_COMMONS_LOGGING="jakarta-commons-logging" +fi +JAKARTA_COMMONS_COLLECTIONS="jakarta-commons-collections" +JAKARTA_COMMONS_DBCP="jakarta-commons-dbcp" +JAKARTA_COMMONS_POOL="jakarta-commons-pool" + +# Cross-Platform Packages +NSPR="nspr" +NSPR_DEVEL="nspr-devel" + +# Cryptographic Packages +NSS="nss" +NSS_DEVEL="nss-devel" +NSS_TOOLS="nss-tools" + +# Tomcat Cryptographic Bridge Packages +JSS="jss" +JSS_JAVADOC="jss-javadoc" +TOMCATJSS="tomcatjss" + +# Apache Cryptographic Bridge Packages +MOD_NSS="mod_nss" +MOD_PERL="mod_perl" +MOD_REVOCATOR="mod_revocator" + +# Console Packages +IDM_CONSOLE_FRAMEWORK="idm-console-framework" + +# LDAP Support Packages +CYRUS_SASL="cyrus-sasl" +CYRUS_SASL_DEVEL="cyrus-sasl-devel" +LDAPJDK="ldapjdk" +OPENLDAP="openldap" +OPENLDAP_CLIENTS="openldap-clients" +OPENLDAP_DEVEL="openldap-devel" + +# Operating System Utilities +OSUTIL="osutil" + +# Perl Modules +PERL_CRYPT_SSLEAY="perl-Crypt-SSLeay" +PERL_DBD_SQLITE="perl-DBD-SQLite" +PERL_DBI="perl-DBI" +PERL_HTML_PARSER="perl-HTML-Parser" +PERL_HTML_TAGSET="perl-HTML-Tagset" +PERL_LIBWWW_PERL="perl-libwww-perl" +PERL_MOZILLA_LDAP="perl-Mozilla-LDAP" +PERL_PARSE_RECDESCENT="perl-Parse-RecDescent" +PERL_URI="perl-URI" +PERL_XML_NAMESPACESUPPORT="perl-XML-NamespaceSupport" +PERL_XML_PARSER="perl-XML-Parser" +PERL_XML_SAX="perl-XML-SAX" +PERL_XML_SIMPLE="perl-XML-Simple" + +# PKI Clients +ESC="esc" + +# Security Packages +SVRCORE="svrcore" +SVRCORE_DEVEL="svrcore-devel" + +# SELinux Packages +POLICYCOREUTILS="policycoreutils" +SELINUX_POLICY_DEVEL="selinux-policy-devel" +SELINUX_POLICY_TARGETED="selinux-policy-targeted" + +# SQLite Packages +SQLITE="sqlite" +SQLITE_DEVEL="sqlite-devel" + +# Velocity Packages +VELOCITY="velocity" +BCEL="bcel" +JAKARTA_ORO="jakarta-oro" +JDOM="jdom" +LOG4J="log4j" +REGEXP="regexp" +WERKEN_XPATH="werken-xpath" +XALAN_J2="xalan-j2" +XERCES_J2="xerces-j2" +XML_COMMONS_APIS="xml-commons-apis" +XML_COMMONS_RESOLVER="xml-commons-resolver" + +# Create a catch-all variable for PKI Support Packages +PKI_SUPPORT_PACKAGES="${APR} ${APR_DEVEL} ${APR_UTIL} ${APR_UTIL_DEVEL} ${EXPAT} ${EXPAT_DEVEL} ${HTTPD} ${HTTPD_DEVEL} ${HTTPD_TOOLS} ${PCRE} ${PCRE_DEVEL} ${TOMCAT6} ${TOMCAT6_LIB} ${APACHE_COMMONS_LANG} ${APACHE_COMMONS_LANG} ${APACHE_COMMONS_LOGGING} ${JAKARTA_COMMONS_COLLECTIONS} ${JAKARTA_COMMONS_DBCP} ${JAKARTA_COMMONS_POOL} ${NSPR} ${NSPR_DEVEL} ${NSS} ${NSS_DEVEL} ${NSS_TOOLS} ${JSS} ${JSS_JAVADOC} ${TOMCATJSS} ${MOD_NSS} ${MOD_PERL} ${MOD_REVOCATOR} ${IDM_CONSOLE_FRAMEWORK} ${CYRUS_SASL} ${CYRUS_SASL_DEVEL} ${LDAPJDK} ${OPENLDAP} ${OPENLDAP_CLIENTS} ${OPENLDAP_DEVEL} ${OSUTIL} ${PERL_CRYPT_SSLEAY} ${PERL_DBD_SQLITE} ${PERL_DBI} ${PERL_HTML_PARSER} ${PERL_HTML_TAGSET} ${PERL_LIBWWW_PERL} ${PERL_MOZILLA_LDAP} ${PERL_PARSE_RECDESCENT} ${PERL_URI} ${PERL_XML_NAMESPACESUPPORT} ${PERL_XML_PARSER} ${PERL_XML_SAX} ${PERL_XML_SIMPLE} ${ESC} ${SVRCORE} ${SVRCORE_DEVEL} ${POLICYCOREUTILS} ${SELINUX_POLICY_DEVEL} ${SELINUX_POLICY_TARGETED} ${SQLITE} ${SQLITE_DEVEL} ${VELOCITY} ${BCEL} ${JAKARTA_ORO} ${JDOM} ${LOG4J} ${REGEXP} ${WERKEN_XPATH} ${XALAN_J2} ${XERCES_J2} ${XML_COMMONS_APIS} ${XML_COMMONS_RESOLVER}" + +########################################### +# Establish PKI Installation Dependencies # +########################################### + +# LDAP Packages (for non-remote use) +LDAP="389-ds" +LDAP_ADMIN="389-admin" +LDAP_ADMIN_CONSOLE="389-admin-console" +LDAP_ADMIN_CONSOLE_DOC="389-admin-console-doc" +LDAP_ADMINUTIL="389-adminutil" +LDAP_BASE="389-ds-base" +LDAP_CONSOLE="389-console" +LDAP_DS_CONSOLE="389-ds-console" +LDAP_DS_CONSOLE_DOC="389-ds-console-doc" +LDAP_DSGW="389-dsgw" + +# Create a catch-all variable for LDAP Packages +if [ ${skip_directory_server_installation} -eq 1 ]; then + LDAP_PACKAGES="" +else + LDAP_PACKAGES="${LDAP} ${LDAP_ADMIN} ${LDAP_ADMIN_CONSOLE} ${LDAP_ADMIN_CONSOLE_DOC} ${LDAP_ADMINUTIL} ${LDAP_BASE} ${LDAP_CONSOLE} ${LDAP_DS_CONSOLE} ${LDAP_DS_CONSOLE_DOC} ${LDAP_DSGW}" +fi + + +# Build and install PKI Development Packages, PKI Support Packages, and +# optionally, LDAP Packages +${PKI_SUDO} ${YUM_EXE} ${YUM_EXE_OPTIONS} ${PKI_DEVELOPMENT_PACKAGES} ${PKI_SUPPORT_PACKAGES} ${LDAP_PACKAGES} + diff --git a/pki/scripts/prepare_pki b/pki/scripts/prepare_pki deleted file mode 100755 index 6027e44dd..000000000 --- a/pki/scripts/prepare_pki +++ /dev/null @@ -1,189 +0,0 @@ -#!/bin/bash -# BEGIN COPYRIGHT BLOCK -# (C) 2007 Red Hat, Inc. -# All rights reserved. -# END COPYRIGHT BLOCK - -# Always switch into the base directory of this -# shell script prior to executing it so that all -# of its output is written to this directory -cd `dirname $0` - -# Retrieve the name of this base directory -PKI_PWD=`pwd` - -# Establish the name of the machine -PKI_HOSTNAME=`hostname` - -# Set pre-defined variables -ROOT_UID=0 - -# This script may ONLY be run on Linux! -PKI_OS=`uname` -if [ "${PKI_OS}" != "Linux" ]; then - printf "The '$0' script is ONLY executable\n" - printf "on a 'Linux' machine!\n" - exit 255 -fi - -# For Fedora machines, compute the FEDORA_VERSION -if [ -e /etc/fedora-release ]; then - FEDORA_VERSION=`rpm -qf --qf='%{VERSION}' /etc/fedora-release | tr -d [A-Z] | tr -d [a-z]` -else - # For now, just give FEDORA_VERSION a bogus value if not using Fedora. - FEDORA_VERSION=9999 -fi - -# Set Linux variables -PKI_PLATFORM="LINUX" -PKI_UPDATE="/usr/bin/yum" -PKI_UPDATE_OPTIONS="-y install" -PKI_UPDATE_DIR="" - -# Set sudo variables -PKI_SUDO="/usr/bin/sudo" -PKI_SUDOERS="/etc/sudoers" - -# Set user identity variables -PKI_EUID=`/usr/bin/id -u` -PKI_UID=`/usr/bin/id -ur` -PKI_USERNAME=`/usr/bin/id -un` - -# Make sure that this script is NOT being run as root! -if [ ${PKI_UID} -eq ${ROOT_UID} ] || - [ ${PKI_EUID} -eq ${ROOT_UID} ]; then - printf "The '$0' script may NOT be run as root!\n" - exit 255 -fi - -# Check for the presence of the 'sudo' executable -if [ ! -x "${PKI_SUDO}" ]; then - printf "The '$0' script requires the '${PKI_SUDO}' executable\n" - printf "to be available on '${PKI_HOSTNAME}'!\n" - exit 255 -fi - -# Check for the presence of the 'sudoers' file -if [ ! -e "${PKI_SUDOERS}" ]; then - printf "The '$0' script requires the '${PKI_SUDOERS}' file\n" - printf "to be available on '${PKI_HOSTNAME}'!\n" - exit 255 -fi - -# Check for the presence of the required sudoers command -PKI_SUDOERS_COMMAND="(root) NOPASSWD: ${RPM_EXE}" -PKI_SUDOERS_LINE="${PKI_USERNAME} ALL = NOPASSWD: ${RPM_EXE}" -printf "Checking if '${PKI_USERNAME}' has the appropriate '${PKI_SUDO}' permissions . . .\n" -printf "[NOTE: A password prompt may appear requiring ${PKI_USERNAME}'s password.]\n" -`${PKI_SUDO} -l | grep "${PKI_SUDOERS_COMMAND}" > /dev/null 2>&1` -if [ $? -ne 0 ]; then - printf "The '$0' script requires that the\n" - printf "'${PKI_SUDOERS}' file MUST contain this line:\n\n" - printf " '${PKI_SUDOERS_LINE}'\n\n" - exit 255 -fi - -# Establish PKI support package names -NSPR=nspr -NSPR_DEVEL=nspr-devel -NSS=nss -NSS_DEVEL=nss-devel -NSS_TOOLS=nss-tools -JSS=jss -JSS_JAVADOC=jss-javadoc -SVRCORE=svrcore -SVRCORE_DEVEL=svrcore-devel -CYRUS_SASL=cyrus-sasl -CYRUS_SASL_DEVEL=cyrus-sasl-devel -OPENLDAP=openldap -OPENLDAP_DEVEL=openldap-devel -OPENLDAP_CLIENTS=openldap-tools -PERL=perl -APR=apr -PCRE=pcre -EXPAT=expat -APR_UTIL=apr-util -HTTPD=httpd -MOD_NSS=mod_nss -MOD_PERL=mod_perl -PERL_PARSE_RECDESCENT=perl-Parse-RecDescent -PERL_HTML_TAGSET=perl-HTML-Tagset -PERL_HTML_PARSER=perl-HTML-Parser -PERL_URI=perl-URI -PERL_LIBWWW_PERL=perl-libwww-perl -PERL_XML_PARSER=perl-XML-Parser -PERL_XML_SIMPLE=perl-XML-Simple -PERL_XML_NAMESPACESUPPORT=perl-XML-NamespaceSupport -PERL_XML_SAX=perl-XML-SAX -JPACKAGE_UTILS=jpackage-utils -JAKARTA_COMMONS_LOGGING=jakarta-commons-logging -TOMCAT5_SERVLET_2_4_API=tomcat5-servlet-2.4-api -JAKARTA_COMMONS_COLLECTIONS=jakarta-commons-collections -JAKARTA_COMMONS_BEANUTILS=jakarta-commons-beanutils -JAKARTA_COMMONS_DIGESTER=jakarta-commons-digester -ORO=oro -CLASSPATHX_JAF=classpathx-jaf -LDAPJDK=ldapjdk -JAKARTA_COMMONS_POOL=jakarta-commons-pool -JAKARTA_COMMONS_FILEUPLOAD=jakarta-commons-fileupload -XML_COMMONS=xml-commons -XML_COMMONS_APIS=xml-commons-apis -REGEXP=regexp -BCEL=bcel -JAKARTA_COMMONS_DBCP=jakarta-commons-dbcp -TOMCAT5_JASPER=tomcat5-jasper -JAKARTA_COMMONS_DISCOVERY=jakarta-commons-discovery -JAKARTA_COMMONS_HTTPCLIENT3=jakarta-commons-httpclient3 -JMS=jms -JAKARTA_COMMONS_LAUNCHER=jakarta-commons-launcher -JAKARTA_COMMONS_EL=jakarta-commons-el -JAKARTA_COMMONS_DAEMON=jakarta-commons-daemon -if [ ${FEDORA_VERSION} -eq 6 ]; then - # Required by Fedora Core 6 - GNU_CRYPTO_SASL_JDK1_4=gnu-crypto-sasl-jdk1.4 -else - GNU_CRYPTO_SASL_JDK1_4= -fi -CLASSPATHX_MAIL=classpathx-mail -XERCES_J2=xerces-j2 -XALAN_J2=xalan-j2 -LOG4J=log4j -XML_COMMONS_RESOLVER=xml-commons-resolver -AVALON_LOGKIT=avalon-logkit -AVALON_FRAMEWORK=avalon-framework -JDOM=jdom -WERKEN_XPATH=werken-xpath -VELOCITY=velocity -ANT=ant -WSDL4J=wsdl4j -AXIS=axis -MX4J=mx4j -GERONIMO_SPECS=geronimo-specs -JAKARTA_COMMONS_MODELER=jakarta-commons-modeler -IDM_CONSOLE_FRAMEWORK=idm-console-framework -TOMCAT5=tomcat5 -TOMCATJSS=tomcatjss -MAKE=make -M4=m4 -POLICYCOREUTILS=policycoreutils -SELINUX_POLICY_DEVEL=selinux-policy-devel -SELINUX_POLICY_TARGETED=selinux-policy-targeted -READLINE=readline -READLINE_DEVEL=readline-devel -NCURSES=ncurses -NCURSES_DEVEL=ncurses-devel -TCL=tcl -TCL_DEVEL=tcl-devel -SQLITE=sqlite -SQLITE_DEVEL=sqlite-devel -PERL_DBI=perl-DBI -PERL_DBD_SQLITE=perl-DBD-SQLite -PCRE_DEVEL=pcre-devel -EXPAT_DEVEL=expat-devel -APR_DEVEL=apr-devel -APR_UTIL_DEVEL=apr-util-devel -HTTPD_DEVEL=httpd-devel - -# Build and install PKI support packages -${PKI_SUDO} ${PKI_UPDATE} ${PKI_UPDATE_OPTIONS} ${NSPR} ${NSPR_DEVEL} ${NSS} ${NSS_DEVEL} ${NSS_TOOLS} ${JSS} ${JSS_JAVADOC} ${SVRCORE} ${SVRCORE_DEVEL} ${CYRUS_SASL} ${CYRUS_SASL_DEVEL} ${OPENLDAP} ${OPENLDAP_DEVEL} ${OPENLDAP_CLIENTS} ${PERL} ${APR} ${PCRE} ${EXPAT} ${APR_UTIL} ${HTTPD} ${MOD_NSS} ${MOD_PERL} ${PERL_PARSE_RECDESCENT} ${PERL_HTML_TAGSET} ${PERL_HTML_PARSER} ${PERL_URI} ${PERL_LIBWWW_PERL} ${PERL_XML_PARSER} ${PERL_XML_SIMPLE} ${PERL_XML_NAMESPACESUPPORT} ${PERL_XML_SAX} ${JPACKAGE_UTILS} ${JAKARTA_COMMONS_LOGGING} ${TOMCAT5_SERVLET_2_4_API} ${JAKARTA_COMMONS_COLLECTIONS} ${JAKARTA_COMMONS_BEANUTILS} ${JAKARTA_COMMONS_DIGESTER} ${ORO} ${CLASSPATHX_JAF} ${LDAPJDK} ${JAKARTA_COMMONS_POOL} ${JAKARTA_COMMONS_FILEUPLOAD} ${XML_COMMONS} ${XML_COMMONS_APIS} ${REGEXP} ${BCEL} ${JAKARTA_COMMONS_DBCP} ${TOMCAT5_JASPER} ${JAKARTA_COMMONS_DISCOVERY} ${JAKARTA_COMMONS_HTTPCLIENT3} ${JMS} ${JAKARTA_COMMONS_LAUNCHER} ${JAKARTA_COMMONS_EL} ${JAKARTA_COMMONS_DAEMON} ${GNU_CRYPTO_SASL_JDK1_4} ${CLASSPATHX_MAIL} ${XERCES_J2} ${XALAN_J2} ${LOG4J} ${XML_COMMONS_RESOLVER} ${AVALON_LOGKIT} ${AVALON_FRAMEWORK} ${JDOM} ${WERKEN_XPATH} ${VELOCITY} ${ANT} ${WSDL4J} ${AXIS} ${MX4J} ${GERONIMO_SPECS} ${JAKARTA_COMMONS_MODELER} ${IDM_CONSOLE_FRAMEWORK} ${TOMCAT5} ${TOMCATJSS} ${MAKE} ${M4} ${POLICYCOREUTILS} ${SELINUX_POLICY_DEVEL} ${SELINUX_POLICY_TARGETED} ${READLINE} ${READLINE_DEVEL} ${NCURSES} ${NCURSES_DEVEL} ${TCL} ${TCL_DEVEL} ${SQLITE} ${SQLITE_DEVEL} ${PERL_DBI} ${PERL_DBD_SQLITE} ${PCRE_DEVEL} ${EXPAT_DEVEL} ${APR_DEVEL} ${APR_UTIL_DEVEL} ${HTTPD_DEVEL} - |