mirror of the now-defunct rocklinux.org
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

68 lines
2.8 KiB

# --- ROCK-COPYRIGHT-NOTE-BEGIN ---
#
# This copyright note is auto-generated by ./scripts/Create-CopyPatch.
# Please add additional copyright information _after_ the line containing
# the ROCK-COPYRIGHT-NOTE-END tag. Otherwise it might get removed by
# the ./scripts/Create-CopyPatch script. Do not edit this copyright text!
#
# ROCK Linux: rock-src/package/rene/bsd-games/group-games.patch
# ROCK Linux is Copyright (C) 1998 - 2003 Clifford Wolf
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version. A copy of the GNU General Public
# License can be found at Documentation/COPYING.
#
# Many people helped and are helping developing ROCK Linux. Please
# have a look at http://www.rocklinux.org/ and the Documentation/TEAM
# file for details.
#
# --- ROCK-COPYRIGHT-NOTE-END ---
--- ./configure.orig Fri Jan 5 15:50:33 2001
+++ ./configure Fri Jan 5 16:00:46 2001
@@ -269,10 +269,10 @@
echo "more secure but means that the games will fail when trying to write"
echo "to their scorefiles."
-askperms "Binary" binary root root 0755
-askperms "Game with scorefile" score_game root root 0755 # or root games 2755?
+askperms "Binary" binary root games 2755
+askperms "Game with scorefile" score_game root games 2755
if building_in hunt; then
- askperms "Daemon" daemon root root 0755
+ askperms "Daemon" daemon root games 2755
fi
if building_in dm; then
askperms "Directory for hidden games" dmdir root games 0750
@@ -281,9 +281,9 @@
fi
askperms "Manpage" manpage root root 0644
askperms "Constant data" constdata root root 0644
-askperms "Variable data" vardata root root 0644 # or 0666?
+askperms "Variable data" vardata root games 0664
-ask "Permissions on variable data that should not be world readable" vardata_perms_priv 0640
+ask "Permissions on variable data that should not be world readable" vardata_perms_priv 0660
use_dot_so=
while test x$use_dot_so = x; do
@@ -417,7 +417,7 @@
echo "using. It may be more secure if this directory is not world"
echo "accessible (e.g. mode 2770)."
ask "Directory for sail temporary files" sail_dir "$varlibdir/sail"
- askperms "Sail directory" sail_dir root root 0750
+ askperms "Sail directory" sail_dir root games 0770
install_sail_dir=`echo "$install_sail_dir" |sed 's/install -c/install -d/'`
fi
@@ -455,7 +455,7 @@
echo "not work: you may want to choose permissions appropriate to the"
echo "security policy you are using (e.g. 2775 root.games for setgid"
echo "games)."
- askperms "Hack directory" hack_dir root root 0755
+ askperms "Hack directory" hack_dir root games 0775
install_hack_dir=`echo "$install_hack_dir" |sed 's/install -c/install -d/'`
fi