diff options
author | André Geraldo Vieira <andre.geraldo@gmail.com> | 2023-07-10 07:37:49 +0700 |
---|---|---|
committer | Willy Sudiarto Raharjo <willysr@slackbuilds.org> | 2023-07-10 07:37:49 +0700 |
commit | b34265e94b56d83dcbdd46dd7f1e51c72c08eb42 (patch) | |
tree | 48d07fef7413949b4e4d0b2ad9b40a37abeef60e /misc | |
parent | e37ec12f16cc8d620af116f37fb6a9d89b63c91a (diff) |
misc/pam-u2f: Added (PAM 2nd Factor).
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
Diffstat (limited to 'misc')
-rw-r--r-- | misc/pam-u2f/README | 6 | ||||
-rw-r--r-- | misc/pam-u2f/pam-u2f.SlackBuild | 116 | ||||
-rw-r--r-- | misc/pam-u2f/pam-u2f.info | 10 | ||||
-rw-r--r-- | misc/pam-u2f/slack-desc | 19 |
4 files changed, 151 insertions, 0 deletions
diff --git a/misc/pam-u2f/README b/misc/pam-u2f/README new file mode 100644 index 000000000000..00a0c4e7223e --- /dev/null +++ b/misc/pam-u2f/README @@ -0,0 +1,6 @@ +Pluggable Authentication Module (PAM) Universal 2nd Factor (U2F) + +This module implements PAM over U2F and FIDO2, providing an easy way +to integrate the YubiKey (or other U2F/FIDO2 compliant authenticators) +into your existing infrastructure. + diff --git a/misc/pam-u2f/pam-u2f.SlackBuild b/misc/pam-u2f/pam-u2f.SlackBuild new file mode 100644 index 000000000000..ba7944215313 --- /dev/null +++ b/misc/pam-u2f/pam-u2f.SlackBuild @@ -0,0 +1,116 @@ +#!/bin/bash + +# Slackware build script for pam-u2f + +# Copyright 2023 André Geraldo Vieira <andre.geraldo@gmail.com> +# All rights reserved. +# +# Redistribution and use of this script, with or without modification, is +# permitted provided that the following conditions are met: +# +# 1. Redistributions of this script must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# +# THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED +# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO +# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, +# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; +# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, +# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR +# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF +# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +cd $(dirname $0) ; CWD=$(pwd) + +PRGNAM=pam-u2f +VERSION=${VERSION:-1.3.0} +BUILD=${BUILD:-1} +TAG=${TAG:-_SBo} +PKGTYPE=${PKGTYPE:-tgz} + +if [ -z "$ARCH" ]; then + case "$( uname -m )" in + i?86) ARCH=i586 ;; + arm*) ARCH=arm ;; + *) ARCH=$( uname -m ) ;; + esac +fi + +if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then + echo "$PRGNAM-$VERSION-$ARCH-$BUILD$TAG.$PKGTYPE" + exit 0 +fi + +TMP=${TMP:-/tmp/SBo} +PKG=$TMP/package-$PRGNAM +OUTPUT=${OUTPUT:-/tmp} + +if [ "$ARCH" = "i586" ]; then + SLKCFLAGS="-O2 -march=i586 -mtune=i686" + LIBDIRSUFFIX="" +elif [ "$ARCH" = "i686" ]; then + SLKCFLAGS="-O2 -march=i686 -mtune=i686" + LIBDIRSUFFIX="" +elif [ "$ARCH" = "x86_64" ]; then + SLKCFLAGS="-O2 -fPIC" + LIBDIRSUFFIX="64" +elif [ "$ARCH" = "aarch64" ]; then + SLKCFLAGS="-O2 -fPIC" + LIBDIRSUFFIX="64" +else + SLKCFLAGS="-O2" + LIBDIRSUFFIX="" +fi + +set -e + +rm -rf $PKG +mkdir -p $TMP $PKG $OUTPUT +cd $TMP +rm -rf $PRGNAM-$VERSION +tar xvf $CWD/${PRGNAM//-/_}-$VERSION.tar.gz +cd ${PRGNAM//-/_}-$VERSION +chown -R root:root . +find -L . \ + \( -perm 777 -o -perm 775 -o -perm 750 -o -perm 711 -o -perm 555 \ + -o -perm 511 \) -exec chmod 755 {} \; -o \ + \( -perm 666 -o -perm 664 -o -perm 640 -o -perm 600 -o -perm 444 \ + -o -perm 440 -o -perm 400 \) -exec chmod 644 {} \; + +CFLAGS="$SLKCFLAGS" \ +CXXFLAGS="$SLKCFLAGS" \ +./configure \ + --prefix=/usr \ + --libdir=/usr/lib${LIBDIRSUFFIX} \ + --sysconfdir=/etc \ + --localstatedir=/var \ + --mandir=/usr/man \ + --docdir=/usr/doc/$PRGNAM-$VERSION \ + --disable-static \ + --with-pam-dir=/lib64/security \ + --build=$ARCH-slackware-linux + +make +make install DESTDIR=$PKG + +rm -f $PKG/{,usr/}lib${LIBDIRSUFFIX}/*.la + +find $PKG -print0 | xargs -0 file | grep -e "executable" -e "shared object" | grep ELF \ + | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null || true + +find $PKG/usr/man -type f -exec gzip -9 {} \; +for i in $( find $PKG/usr/man -type l ) ; do ln -s $( readlink $i ).gz $i.gz ; rm $i ; done + +mkdir -p $PKG/usr/doc/$PRGNAM-$VERSION +cp -a \ + AUTHORS COPYING ChangeLog NEWS README \ + $PKG/usr/doc/$PRGNAM-$VERSION +cat $CWD/$PRGNAM.SlackBuild > $PKG/usr/doc/$PRGNAM-$VERSION/$PRGNAM.SlackBuild + +mkdir -p $PKG/install +cat $CWD/slack-desc > $PKG/install/slack-desc + +cd $PKG +/sbin/makepkg -l y -c n $OUTPUT/$PRGNAM-$VERSION-$ARCH-$BUILD$TAG.$PKGTYPE diff --git a/misc/pam-u2f/pam-u2f.info b/misc/pam-u2f/pam-u2f.info new file mode 100644 index 000000000000..b5fb7b9d3ad4 --- /dev/null +++ b/misc/pam-u2f/pam-u2f.info @@ -0,0 +1,10 @@ +PRGNAM="pam-u2f" +VERSION="1.3.0" +HOMEPAGE="https://github.com/Yubico/pam-u2f" +DOWNLOAD="https://developers.yubico.com/pam-u2f/Releases/pam_u2f-1.3.0.tar.gz" +MD5SUM="e79696f5afb8f8f96c8344bffcf1edcc" +DOWNLOAD_x86_64="" +MD5SUM_x86_64="" +REQUIRES="libfido2" +MAINTAINER="André Geraldo Vieira" +EMAIL="andre.geraldo@gmail.com" diff --git a/misc/pam-u2f/slack-desc b/misc/pam-u2f/slack-desc new file mode 100644 index 000000000000..871ae8ad314b --- /dev/null +++ b/misc/pam-u2f/slack-desc @@ -0,0 +1,19 @@ +# HOW TO EDIT THIS FILE: +# The "handy ruler" below makes it easier to edit a package description. +# Line up the first '|' above the ':' following the base package name, and +# the '|' on the right side marks the last column you can put a character in. +# You must make exactly 11 lines for the formatting to be correct. It's also +# customary to leave one space after the ':' except on otherwise blank lines. + + |-----handy-ruler------------------------------------------------------| +pam-u2f: pam-u2f (This module implements PAM over U2F and FIDO2) +pam-u2f: +pam-u2f: Pluggable Authentication Module (PAM) Universal 2nd Factor (U2F) +pam-u2f: +pam-u2f: This module implements PAM over U2F and FIDO2, providing an easy way +pam-u2f: to integrate the YubiKey (or other U2F/FIDO2 compliant authenticators +pam-u2f: ) into your existing infrastructure. +pam-u2f: +pam-u2f: https://github.com/Yubico/pam-u2f +pam-u2f: +pam-u2f: |