Compare commits

...

1 Commits
c8 ... c10

Author SHA1 Message Date
4df0eed06a import OL munge-0.5.15-11.el10_1 2026-02-25 08:24:17 +00:00
11 changed files with 284 additions and 135 deletions

2
.gitignore vendored
View File

@ -1 +1 @@
SOURCES/munge-0.5.13.tar.xz
munge-0.5.15.tar.xz

View File

@ -1 +0,0 @@
bcb0b89e44c5c0ec21f4bcfaacb4493b82aace61 SOURCES/munge-0.5.13.tar.xz

19
README.md Normal file
View File

@ -0,0 +1,19 @@
# MUNGE
The munge package.
MUNGE (**M**UNGE **U**id '**N**' **G**id **E**mporium) is an authentication service for creating and validating credentials.
A secret key must be created before starting the service for the first time. This can be done with the following command:
```bash
sudo -u munge /usr/sbin/mungekey -v
```
Please read `man 8 mungekey` for more information.
In the second step you can start and enable the munge service.
```bash
systemctl start munge
systemctl enable munge
```

View File

@ -1,73 +0,0 @@
#! /bin/sh
# Generates a random key for munged
#
# (C) 2007 Gennaro Oliva
# You may freely distribute this file under the terms of the GNU General
# Public License, version 2 or later.
#Setting default random file
randomfile=/dev/urandom
#Usage message
usage="Try \`$0 -h' for more information."
#Help message
needhelp() {
echo Usage: create-munge-key [OPTION]...
echo Generates a random key for munged
echo List of options
echo " -f force overwriting existing old key"
echo " -r specify /dev/random as random file for key generation"
echo " default is /dev/urandom"
echo " -h display this help and exit"
}
#Parsing command line options
while getopts "hrf" options; do
case $options in
r ) randomfile=/dev/random;;
f ) force=yes;;
h ) needhelp
exit 0;;
\? ) echo $usage
exit 1;;
* ) echo $usage
exit 1;;
esac
done
if [ `id -u` != 0 ] ; then
echo "Please run create-munge-key as root."
exit 1
fi
#Checking random file presence
if [ ! -e $randomfile ] ; then
echo $0: cannot find random file $randomfile
exit 1
fi
#Checking if the user want to overwrite existing key file
if [ "$force" != "yes" ] && [ -e /etc/munge/munge.key ] ; then
echo The munge key /etc/munge/munge.key already exists
echo -n "Do you want to overwrite it? (y/N) "
read ans
if [ "$ans" != "y" -a "$ans" != "Y" ] ; then
exit 0
fi
fi
#Generating the key file and change owner and permissions
if [ "$randomfile" = "/dev/random" ] ; then
echo Please type on the keyboard, echo move your mouse,
echo utilize the disks. This gives the random number generator
echo a better chance to gain enough entropy.
fi
echo -n "Generating a pseudo-random key using $randomfile "
dd if=$randomfile bs=1 count=1024 > /etc/munge/munge.key \
2>/dev/null
chown munge:munge /etc/munge/munge.key
chmod 0400 /etc/munge/munge.key
echo completed.
exit 0

View File

@ -1,5 +0,0 @@
/var/log/munge/munged.log {
missingok
notifempty
copytruncate
}

76
dun.gpg Normal file
View File

@ -0,0 +1,76 @@
-----BEGIN PGP PUBLIC KEY BLOCK-----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=te3z
-----END PGP PUBLIC KEY BLOCK-----

16
munge-0.5.15.tar.xz.asc Normal file
View File

@ -0,0 +1,16 @@
-----BEGIN PGP SIGNATURE-----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=uuVp
-----END PGP SIGNATURE-----

View File

@ -1,37 +1,57 @@
## START: Set by rpmautospec
## (rpmautospec version 0.6.5)
## RPMAUTOSPEC: autorelease, autochangelog
%define autorelease(e:s:pb:n) %{?-p:0.}%{lua:
release_number = 11;
base_release_number = tonumber(rpm.expand("%{?-b*}%{!?-b:1}"));
print(release_number + base_release_number - 1);
}%{?-e:.%{-e*}}%{?-s:.%{-s*}}%{!?-n:%{?dist}}
## END: Set by rpmautospec
%bcond_without check
Name: munge
Version: 0.5.13
Release: 3%{?dist}
Version: 0.5.15
Release: %autorelease
Summary: Enables uid & gid authentication across a host cluster
# The libs and devel package is GPLv3+ and LGPLv3+ where as the main package is GPLv3 only.
License: GPLv3+ and LGPLv3+
URL: https://dun.github.io/munge/
Source0: https://github.com/dun/munge/releases/download/munge-%{version}/munge-%{version}.tar.xz
Source1: create-munge-key
Source2: munge.logrotate
Source1: https://github.com/dun/munge/releases/download/%{name}-%{version}/%{name}-%{version}.tar.xz.asc
Source2: https://github.com/dun.gpg
Source3: munge.sysusers
Source4: README.md
Patch01: Fix-buffer-overflow-when-unpacking-message-address-l.patch
BuildRequires: make
BuildRequires: gcc
BuildRequires: git-core
BuildRequires: gnupg2
BuildRequires: systemd-rpm-macros
BuildRequires: zlib-devel bzip2-devel openssl-devel
Requires: munge-libs = %{version}-%{release}
Requires: logrotate
Requires(pre): shadow-utils
%if %{with check}
BuildRequires: procps-ng
BuildRequires: util-linux
%endif
Requires(post): systemd
Requires(preun): systemd
Requires(postun): systemd
%{?systemd_requires}
%{?sysusers_requires_compat}
%description
MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating
and validating credentials. It is designed to be highly scalable for use
in an HPC cluster environment.
It allows a process to authenticate the UID and GID of another local or
remote process within a group of hosts having common users and groups.
These hosts form a security realm that is defined by a shared cryptographic
key. Clients within this security realm can create and validate credentials
without the use of root privileges, reserved ports, or platform-specific
MUNGE (MUNGE Uid 'N' Gid Emporium) is an authentication service for creating
and validating credentials. It is designed to be highly scalable for use
in an HPC cluster environment.
It allows a process to authenticate the UID and GID of another local or
remote process within a group of hosts having common users and groups.
These hosts form a security realm that is defined by a shared cryptographic
key. Clients within this security realm can create and validate credentials
without the use of root privileges, reserved ports, or platform-specific
methods.
%package devel
@ -49,33 +69,28 @@ Runtime libraries for using MUNGE.
%prep
%setup -q
%patch -P 1 -p1
cp -p %{SOURCE1} create-munge-key
cp -p %{SOURCE2} munge.logrotate
%{gpgverify} --keyring='%{SOURCE2}' --signature='%{SOURCE1}' --data='%{SOURCE0}'
%autosetup -N -S git
cp "%{SOURCE4}" README-Fedora.md
%autopatch
%build
%configure --disable-static --with-crypto-lib=openssl
echo "d /run/munge 0755 munge munge -" > src/etc/munge.tmpfiles.conf.in
%configure --disable-static --with-crypto-lib=openssl --runstatedir="%{_rundir}" --with-systemdunitdir="%{_unitdir}" --with-sysconfigdir="%{_sysconfdir}/sysconfig/" --with-logrotateddir="%{_sysconfdir}/logrotate.d/"
# Get rid of some rpaths for /usr/sbin
sed -i 's|^hardcode_libdir_flag_spec=.*|hardcode_libdir_flag_spec=""|g' libtool
sed -i 's|^runpath_var=LD_RUN_PATH|runpath_var=DIE_RPATH_DIE|g' libtool
make %{?_smp_mflags}
%make_build
%install
%make_install
# Install extra files.
install -p -m 755 create-munge-key %{buildroot}/%{_sbindir}/create-munge-key
install -p -D -m 644 munge.logrotate %{buildroot}/%{_sysconfdir}/logrotate.d/munge
install -p -D -m 0644 %{SOURCE3} %{buildroot}%{_sysusersdir}/munge.conf
# rm unneeded files.
rm %{buildroot}/%{_sysconfdir}/sysconfig/munge
#
rm %{buildroot}/%{_initddir}/munge
# Exclude .la files
# Exclude .la files
rm %{buildroot}/%{_libdir}/libmunge.la
@ -84,22 +99,25 @@ chmod 700 %{buildroot}%{_var}/lib/munge %{buildroot}%{_var}/log/munge
chmod 700 %{buildroot}%{_sysconfdir}/munge
# Create and empty key file and pid file to be marked as a ghost file below.
# i.e it is not actually included in the rpm, only the record
# i.e it is not actually included in the rpm, only the record
# of it is.
touch %{buildroot}%{_var}/run/munge/munged.pid
mv %{buildroot}%{_var}/run %{buildroot}
mkdir -p %{buildroot}%{_rundir}/munge
touch %{buildroot}%{_rundir}/munge/munged.pid
%check
%if %{with check}
%make_build check \
LD_LIBRARY_PATH=%{buildroot}%{_libdir} \
root=/tmp/munge-$$ VERBOSE=t verbose=t
%endif
%pre
%sysusers_create_compat %{SOURCE3}
%preun
%systemd_preun munge.service
%pre
getent group munge >/dev/null || groupadd -r munge
getent passwd munge >/dev/null || \
useradd -r -g munge -d %{_var}/run/munge -s /sbin/nologin \
-c "Runs Uid 'N' Gid Emporium" munge
exit 0
%post
%systemd_post munge.service
@ -113,26 +131,29 @@ exit 0
%{_bindir}/remunge
%{_bindir}/unmunge
%{_sbindir}/munged
%{_sbindir}/create-munge-key
%{_sbindir}/mungekey
%{_mandir}/man1/munge.1.gz
%{_mandir}/man1/remunge.1.gz
%{_mandir}/man1/unmunge.1.gz
%{_mandir}/man7/munge.7.gz
%{_mandir}/man8/munged.8.gz
%{_mandir}/man8/mungekey.8.gz
%{_unitdir}/munge.service
%attr(0700,munge,munge) %dir %{_var}/log/munge
%attr(0700,munge,munge) %dir %{_var}/lib/munge
%attr(0700,munge,munge) %dir %{_sysconfdir}/munge
%attr(0755,munge,munge) %dir /run/munge/
%attr(0755,munge,munge) %ghost %dir /run/munge/
%attr(0644,munge,munge) %ghost /run/munge/munged.pid
%config(noreplace) %{_tmpfilesdir}/munge.conf
%{_sysusersdir}/munge.conf
%config(noreplace) %{_sysconfdir}/logrotate.d/munge
%config(noreplace) %{_sysconfdir}/sysconfig/munge
%license COPYING COPYING.LESSER
%doc README-Fedora.md
%doc AUTHORS
%doc JARGON META NEWS QUICKSTART README
%doc JARGON NEWS QUICKSTART README
%doc doc
%files libs
@ -161,16 +182,110 @@ exit 0
%changelog
* Sun Feb 15 2026 Kamal Heib <kheib@redhat.com> - 0.5.13-3
## START: Generated by rpmautospec
* Sun Feb 15 2026 Kamal Heib <kheib@redhat.com> - 0.5.15-11
- Fix CVE-2026-25506
- Resolves: RHEL-148521
* Fri Apr 24 2020 Honggang Li <honli@redhat.com> - 0.5.13-2
- Don't create temporary files in legacy directory
- Resolves: bz1805956
* Tue Oct 29 2024 Troy Dawson <tdawson@redhat.com> - 0.5.15-10
- Bump release for October 2024 mass rebuild:
* Thu Jul 19 2018 Jarod Wilson <jarod@redhat.com> - 0.5.13-1
- Update to upstream 0.5.13 release
* Fri Aug 09 2024 Brian Chae <bchae@redhat.com> - 0.5.15-9
- Adding files for c10s gating test
* Mon Jun 24 2024 Troy Dawson <tdawson@redhat.com> - 0.5.15-8
- Bump release for June 2024 mass rebuild
* Thu Jan 25 2024 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.15-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Sun Jan 21 2024 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.15-6
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild
* Thu Jul 20 2023 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.15-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
* Thu Jan 19 2023 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.15-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_38_Mass_Rebuild
* Fri Aug 19 2022 Debarshi Ray <debarshir@gnome.org> - 0.5.15-3
- Remove redundant Requires(pre)
* Mon Jul 25 2022 Ankur Sinha (Ankur Sinha Gmail) <sanjay.ankur@gmail.com> - 0.5.15-2
- fix: correct failing test
* Mon Jul 25 2022 Ankur Sinha (Ankur Sinha Gmail) <sanjay.ankur@gmail.com> - 0.5.15-1
- feat: update to 0.5.15 (fixes rhbz#2100309)
* Thu Jul 21 2022 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.14-8
- Rebuilt for https://fedoraproject.org/wiki/Fedora_37_Mass_Rebuild
* Thu Jan 20 2022 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.14-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_36_Mass_Rebuild
* Tue Sep 14 2021 Sahana Prasad <sahana@redhat.com> - 0.5.14-6
- Rebuilt with OpenSSL 3.0.0
* Thu Jul 22 2021 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.14-5
- Rebuilt for https://fedoraproject.org/wiki/Fedora_35_Mass_Rebuild
* Fri Apr 30 2021 Ankur Sinha <ankursinha AT fedoraproject DOT org> - 0.5.14-4
- Correct readme
- Include patches to fix build on s390x
- https://bugzilla.redhat.com/show_bug.cgi?id=1923337
- Include additional sources
* Tue Mar 02 2021 Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> - 0.5.14-3
- Rebuilt for updated systemd-rpm-macros
See https://pagure.io/fesco/issue/2583.
* Tue Jan 26 2021 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.14-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
* Wed Nov 18 2020 Ankur Sinha <ankursinha AT fedoraproject DOT org> - 0.5.14-1
- remove tmpfiles.d
- make %%_rundir,
- improve readme
- Mark /run/munge as ghost also
* Tue Nov 17 2020 Ankur Sinha <ankursinha AT fedoraproject DOT org> - 0.5.14-1
- Update to latest release
- Remove unneeded files
- Update Readme.
- Enable gpgverify
- Enable tests
* Tue Sep 29 2020 Ankur Sinha <ankursinha AT fedoraproject DOT org> - 0.5.13-10
- Fix spec + build
* Tue Jul 28 2020 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.13-9
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
* Mon Feb 10 2020 Zbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl> - 0.5.13-8
- Provide a sysusers.d file to get user() and group() provides
(see https://fedoraproject.org/wiki/Changes/Adopting_sysusers.d_format).
* Wed Jan 29 2020 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.13-7
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
* Thu Nov 28 2019 Gerd Pokorra <gp@zimt.uni-siegen.de> - 0.5.13-6
- updating line in /usr/lib/tmpfiles.d/munge.conf: /var/run/munge /run/munge
- add license tag
- add requires logrotate
* Wed Nov 27 2019 Gerd Pokorra <gp@zimt.uni-siegen.de> - 0.5.13-5
- built with OpenSSL (not libgcrypt)
* Thu Jul 25 2019 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.13-4
- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild
* Fri Feb 01 2019 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.13-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild
* Fri Jul 13 2018 Fedora Release Engineering <releng@fedoraproject.org> - 0.5.13-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild
* Thu May 17 2018 Steve Traylen <steve.traylen@cern.ch> - 0.5.13-1
- Escape macros in %%changelog
* Fri Feb 09 2018 Igor Gnatenko <ignatenkobrain@fedoraproject.org> - 0.5.12-9
- Escape macros in %%changelog
@ -267,7 +382,7 @@ exit 0
- rhbz#530128 Move runtime libs to a new -libs package.
ldconfig moved to new -libs package as a result.
* Sat Sep 26 2009 Steve Traylen <steve.traylen@cern.ch> - 0.5.8-6
- Patch for rhbz #525732 - Loads /etc/sysconfig/munge
- Patch for rhbz #525732 - Loads /etc/sysconfig/munge
correctly.
- Mark pid file as ghost file on oses that support that.
- Permisions on pid directory to 755
@ -293,7 +408,7 @@ exit 0
- chmod /var/lib/munge /var/log/munge and /etc/munge to 700.
- Apply patch to not error when GPL_LICENSED is not set.
- Patch service script to print error on if munge.key not present
on start only and with a better error.
on start only and with a better error.
- Remove dont-exit-form-lib.patch. munge is expecting munge to
do this.
- Remove libgcrypt-devel from BuildRequires, uses openssl by
@ -304,4 +419,4 @@ exit 0
* Fri Jun 12 2009 Steve Traylen <steve@traylen.net> - 0.5.8-1
- First Build
## END: Generated by rpmautospec

1
munge.sysusers Normal file
View File

@ -0,0 +1 @@
u munge - "Runs Uid 'N' Gid Emporium" /run/munge /sbin/nologin

1
sources Normal file
View File

@ -0,0 +1 @@
SHA512 (munge-0.5.15.tar.xz) = 266af1cf2df30f6bd7338527bd69736c0cf91e7390e7bbeea9a225af4829d456907be77a1e77ecef4716f2fff634d144d4b3d5cc3d0afc12f5c2d1acfd6974e1