sasl/saslauthd.conf

Tue, 29 Mar 2011 20:04:34 +0200

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Tue, 29 Mar 2011 20:04:34 +0200
changeset 334
4a34d7a82eab
permissions
-rw-r--r--

Rework package yet again, correcting and introducing new buildconf logic:
Conditionally disable bootstrap stage comparison correctly, correct
english grammar, better find system as(1) and ld(1), indotruce detailed
optimization option messages, more completely guess cpu types, allow
profiled bootstrapping without a preinstalled GCC because many other
compilers have long since implemented 64-bit arithmetic, instruct make
to build sequentially (not in sparallel) when building a profiled
bootstrap as GCC online documents recommend, and generally improve
comment blocks.

The single most important correction in this changeset relates to the
GCC changed optimization policy since at least GCC 4.5, in which -march
is always passed and not always correctly guessed. In the case of this
package, allowing GCC to guess the architecture leads to wild build
errors at various subcomponents (zlib, libgcc, libiberty...) and
bootstrap stages. It seems quite platform specific, and the safest
approach to correcting this seems to be explicitly always specifying the
-march argument when bootstrapping GCC. Because the best choice 'native'
is not available when bootstrapping using a foreign (non GCC) compiler,
a guess is made according to rpmmacros l_platform in that case.

It is questionable as to whether these recent optimization changes
on the part of GCC or this package are compatible with each other,
or if either are complete or correct at all. At least applying these
corrections allows this package to build again in most cases test.

michael@144 1 ##
michael@144 2 ## saslauthd.conf -- SASL Authentication Daemon Configuration
michael@144 3 ##
michael@144 4
michael@144 5 # white space separated list of LDAP servers
michael@144 6 ldap_servers: ldap://127.0.0.1
michael@144 7
michael@144 8 # authentication for restricted LDAP servers
michael@144 9 #ldap_bind_dn: cn=operator,ou=Profile,o=example.com
michael@144 10 #ldap_bind_pw: secret
michael@144 11
michael@144 12 # LDAP version to use (2|3)
michael@144 13 #ldap_version 3
michael@144 14
michael@144 15 # LDAP timeout
michael@144 16 #ldap_timeout 5
michael@144 17
michael@144 18 # LDAP aliases (search|find|always|never)
michael@144 19 ldap_deref: never
michael@144 20
michael@144 21 # follow LDAP referrals ?
michael@144 22 ldap_referrals: no
michael@144 23
michael@144 24 # restart LDAP I/O operations that fail ?
michael@144 25 ldap_restart: yes
michael@144 26
michael@144 27 # search scope (sub|one|base)
michael@144 28 #ldap_scope: sub
michael@144 29
michael@144 30 # starting point for a search
michael@144 31 ldap_search_base: MUST-SPECIFY
michael@144 32
michael@144 33 # authenticate against LDAP (bind|custom|fastbind)
michael@144 34 ldap_auth_method: bind
michael@144 35
michael@144 36 # Filter LDAP records, %u = username, %r = realm
michael@144 37 # if ldap_auth_method is 'bind' the filter searches for the DN
michael@144 38 # otherwise the filter searches for the userPassword attribute
michael@144 39 #ldap_filter: uid=%u
michael@144 40
michael@144 41 # debugging LDAP operation
michael@144 42 #ldap_debug 0
michael@144 43
michael@144 44 # require and verify server certificate
michael@144 45 #ldap_tls_check_peer: no
michael@144 46 #ldap_tls_cacert_file:
michael@144 47 #ldap_tls_cacert_dir:
michael@144 48
michael@144 49 # list of SSL/TLS ciphers to allow
michael@144 50 #ldap_tls_ciphers: DEFAULT
michael@144 51
michael@144 52 # files containing client certificate and key
michael@144 53 #ldap_tls_cert:
michael@144 54 #ldap_tls_key:
michael@144 55

mercurial