summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/pam/libpam_1.7.1.bb
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-extended/pam/libpam_1.7.1.bb')
-rw-r--r--meta/recipes-extended/pam/libpam_1.7.1.bb170
1 files changed, 170 insertions, 0 deletions
diff --git a/meta/recipes-extended/pam/libpam_1.7.1.bb b/meta/recipes-extended/pam/libpam_1.7.1.bb
new file mode 100644
index 0000000000..565b00c264
--- /dev/null
+++ b/meta/recipes-extended/pam/libpam_1.7.1.bb
@@ -0,0 +1,170 @@
1DISABLE_STATIC = ""
2SUMMARY = "Linux-PAM (Pluggable Authentication Modules)"
3DESCRIPTION = "Linux-PAM (Pluggable Authentication Modules for Linux), a flexible mechanism for authenticating users"
4HOMEPAGE = "https://fedorahosted.org/linux-pam/"
5BUGTRACKER = "https://fedorahosted.org/linux-pam/newticket"
6SECTION = "base"
7# PAM is dual licensed under GPL and BSD.
8# /etc/pam.d comes from Debian libpam-runtime in 2009-11 (at that time
9# libpam-runtime-1.0.1 is GPL-2.0-or-later), by openembedded
10LICENSE = "GPL-2.0-or-later | BSD-3-Clause"
11LIC_FILES_CHKSUM = "file://COPYING;md5=7eb5c1bf854e8881005d673599ee74d3 \
12 file://libpamc/License;md5=a4da476a14c093fdc73be3c3c9ba8fb3 \
13 "
14
15SRC_URI = "${GITHUB_BASE_URI}/download/v${PV}/Linux-PAM-${PV}.tar.xz \
16 file://99_pam \
17 file://pam.d/common-account \
18 file://pam.d/common-auth \
19 file://pam.d/common-password \
20 file://pam.d/common-session \
21 file://pam.d/common-session-noninteractive \
22 file://pam.d/other \
23 file://run-ptest \
24 file://pam-volatiles.conf \
25 "
26
27SRC_URI[sha256sum] = "21dbcec6e01dd578f14789eac9024a18941e6f2702a05cf91b28c232eeb26ab0"
28
29DEPENDS = "bison-native flex-native libxml2-native virtual/crypt"
30
31EXTRA_OEMESON = "-Ddocs=disabled -Dsecuredir=${base_libdir}/security"
32
33S = "${UNPACKDIR}/Linux-PAM-${PV}"
34
35inherit meson gettext pkgconfig systemd ptest github-releases
36
37PACKAGECONFIG ??= ""
38PACKAGECONFIG[audit] = "-Daudit=enabled,-Daudit=disabled,audit,"
39PACKAGECONFIG[userdb] = "-Dpam_userdb=enabled -Ddb=gdbm,-Dpam_userdb=disabled,gdbm,"
40PACKAGECONFIG[selinux] = "-Dselinux=enabled,-Dselinux=disabled,libselinux,"
41
42PACKAGES += "${PN}-runtime ${PN}-xtests"
43FILES:${PN} = " \
44 ${libdir}/lib*${SOLIBS} \
45 ${nonarch_libdir}/tmpfiles.d/*.conf \
46"
47FILES:${PN}-dev += "${base_libdir}/security/*.la ${libdir}/*.la ${libdir}/lib*${SOLIBSDEV}"
48FILES:${PN}-runtime = "${sysconfdir} ${sbindir} ${nonarch_libdir}/systemd/system"
49FILES:${PN}-xtests = "${datadir}/Linux-PAM/xtests"
50
51# libpam installs /etc/environment for use with the pam_env plugin. Make sure it is
52# packaged with the pam-plugin-env package to avoid breaking installations which
53# install that file via other packages
54FILES:pam-plugin-env = "${sysconfdir}/environment"
55
56PACKAGES_DYNAMIC += "^${MLPREFIX}pam-plugin-.*"
57
58def get_multilib_bit(d):
59 baselib = d.getVar('baselib') or ''
60 return baselib.replace('lib', '')
61
62libpam_suffix = "suffix${@get_multilib_bit(d)}"
63
64RPROVIDES:${PN} += "${PN}-${libpam_suffix}"
65RPROVIDES:${PN}-runtime += "${PN}-runtime-${libpam_suffix}"
66
67RDEPENDS:${PN}-runtime = "${PN}-${libpam_suffix} \
68 ${MLPREFIX}pam-plugin-deny-${libpam_suffix} \
69 ${MLPREFIX}pam-plugin-permit-${libpam_suffix} \
70 ${MLPREFIX}pam-plugin-warn-${libpam_suffix} \
71 ${MLPREFIX}pam-plugin-unix-${libpam_suffix} \
72 ${@bb.utils.contains('PACKAGECONFIG', 'selinux', '${MLPREFIX}pam-plugin-selinux-${libpam_suffix}', '', d)} \
73 "
74RDEPENDS:${PN}-xtests = "${PN}-${libpam_suffix} \
75 ${MLPREFIX}pam-plugin-access-${libpam_suffix} \
76 ${MLPREFIX}pam-plugin-debug-${libpam_suffix} \
77 ${MLPREFIX}pam-plugin-pwhistory-${libpam_suffix} \
78 ${MLPREFIX}pam-plugin-succeed-if-${libpam_suffix} \
79 ${MLPREFIX}pam-plugin-time-${libpam_suffix} \
80 bash coreutils"
81
82# FIXME: Native suffix breaks here, disable it for now
83RRECOMMENDS:${PN} = "${PN}-runtime-${libpam_suffix}"
84RRECOMMENDS:${PN}:class-native = ""
85
86python populate_packages:prepend () {
87 def pam_plugin_hook(file, pkg, pattern, format, basename):
88 pn = d.getVar('PN')
89 libpam_suffix = d.getVar('libpam_suffix')
90
91 rdeps = d.getVar('RDEPENDS:' + pkg)
92 if rdeps:
93 rdeps = rdeps + " " + pn + "-" + libpam_suffix
94 else:
95 rdeps = pn + "-" + libpam_suffix
96 d.setVar('RDEPENDS:' + pkg, rdeps)
97
98 provides = d.getVar('RPROVIDES:' + pkg)
99 if provides:
100 provides = provides + " " + pkg + "-" + libpam_suffix
101 else:
102 provides = pkg + "-" + libpam_suffix
103 d.setVar('RPROVIDES:' + pkg, provides)
104
105 mlprefix = d.getVar('MLPREFIX') or ''
106 dvar = d.expand('${WORKDIR}/package')
107 pam_libdir = d.expand('${base_libdir}/security')
108 pam_sbindir = d.expand('${sbindir}')
109 pam_filterdir = d.expand('${base_libdir}/security/pam_filter')
110 pam_pkgname = mlprefix + 'pam-plugin%s'
111
112 do_split_packages(d, pam_libdir, r'^pam(.*)\.so$', pam_pkgname,
113 'PAM plugin for %s', hook=pam_plugin_hook, extra_depends='', prepend=True)
114 do_split_packages(d, pam_filterdir, r'^(.*)$', 'pam-filter-%s', 'PAM filter for %s', extra_depends='')
115}
116
117do_install:append() {
118 # don't install /var/run when populating rootfs. Do it through volatile
119 rm -rf ${D}${localstatedir}
120
121 if ${@bb.utils.contains('DISTRO_FEATURES','sysvinit','false','true',d)}; then
122 rm -rf ${D}${sysconfdir}/init.d/
123 rm -rf ${D}${sysconfdir}/rc*
124 install -d ${D}${nonarch_libdir}/tmpfiles.d
125 install -m 0644 ${UNPACKDIR}/pam-volatiles.conf \
126 ${D}${nonarch_libdir}/tmpfiles.d/pam.conf
127 else
128 install -d ${D}${sysconfdir}/default/volatiles
129 install -m 0644 ${UNPACKDIR}/99_pam \
130 ${D}${sysconfdir}/default/volatiles/
131 fi
132
133 install -d ${D}${sysconfdir}/pam.d/
134 install -m 0644 ${UNPACKDIR}/pam.d/* ${D}${sysconfdir}/pam.d/
135
136 # The lsb requires unix_chkpwd has setuid permission
137 chmod 4755 ${D}${sbindir}/unix_chkpwd
138
139 if ${@bb.utils.contains('DISTRO_FEATURES','systemd','true','false',d)}; then
140 echo "session optional pam_systemd.so" >> ${D}${sysconfdir}/pam.d/common-session
141 fi
142}
143
144do_install_ptest() {
145 mkdir -p ${D}${PTEST_PATH}/tests
146 find ${B}/tests -maxdepth 1 -type f -exec cp {} ${D}${PTEST_PATH}/tests \;
147 install -m 0644 ${S}/tests/confdir ${D}${PTEST_PATH}/tests
148}
149
150pkg_postinst:${PN}() {
151 if [ -z "$D" ] && [ -e /etc/init.d/populate-volatile.sh ] ; then
152 /etc/init.d/populate-volatile.sh update
153 fi
154}
155
156inherit features_check
157ANY_OF_DISTRO_FEATURES = "pam systemd"
158
159BBCLASSEXTEND = "nativesdk native"
160
161CONFFILES:${PN}-runtime += "${sysconfdir}/pam.d/common-session"
162CONFFILES:${PN}-runtime += "${sysconfdir}/pam.d/common-auth"
163CONFFILES:${PN}-runtime += "${sysconfdir}/pam.d/common-password"
164CONFFILES:${PN}-runtime += "${sysconfdir}/pam.d/common-session-noninteractive"
165CONFFILES:${PN}-runtime += "${sysconfdir}/pam.d/common-account"
166CONFFILES:${PN}-runtime += "${sysconfdir}/security/limits.conf"
167
168GITHUB_BASE_URI = "https://github.com/linux-pam/linux-pam/releases"
169
170CVE_PRODUCT = "linux-pam"