diff options
Diffstat (limited to 'meta-oe/recipes-security/audit/audit_4.1.3.bb')
| -rw-r--r-- | meta-oe/recipes-security/audit/audit_4.1.3.bb | 106 |
1 files changed, 0 insertions, 106 deletions
diff --git a/meta-oe/recipes-security/audit/audit_4.1.3.bb b/meta-oe/recipes-security/audit/audit_4.1.3.bb deleted file mode 100644 index 12636045d4..0000000000 --- a/meta-oe/recipes-security/audit/audit_4.1.3.bb +++ /dev/null | |||
| @@ -1,106 +0,0 @@ | |||
| 1 | SUMMARY = "User space tools for kernel auditing" | ||
| 2 | DESCRIPTION = "The audit package contains the user space utilities for \ | ||
| 3 | storing and searching the audit records generated by the audit subsystem \ | ||
| 4 | in the Linux kernel." | ||
| 5 | HOMEPAGE = "http://people.redhat.com/sgrubb/audit/" | ||
| 6 | SECTION = "base" | ||
| 7 | LICENSE = "GPL-2.0-or-later & LGPL-2.0-or-later" | ||
| 8 | LIC_FILES_CHKSUM = "file://COPYING;md5=94d55d512a9ba36caa9b7df079bae19f" | ||
| 9 | |||
| 10 | SRC_URI = "git://github.com/linux-audit/${BPN}-userspace.git;branch=master;protocol=https \ | ||
| 11 | file://0001-Fixed-swig-host-contamination-issue.patch \ | ||
| 12 | file://auditd \ | ||
| 13 | " | ||
| 14 | |||
| 15 | SRCREV = "dfda9708910e4e72412e68d638087b29522df386" | ||
| 16 | |||
| 17 | inherit autotools python3targetconfig update-rc.d systemd | ||
| 18 | |||
| 19 | UPDATERCPN = "auditd" | ||
| 20 | INITSCRIPT_NAME = "auditd" | ||
| 21 | INITSCRIPT_PARAMS = "defaults" | ||
| 22 | |||
| 23 | SYSTEMD_PACKAGES = "auditd" | ||
| 24 | SYSTEMD_SERVICE:auditd = "auditd.service audit-rules.service" | ||
| 25 | |||
| 26 | DEPENDS = "python3 libcap-ng linux-libc-headers swig-native python3-setuptools-native coreutils-native" | ||
| 27 | |||
| 28 | EXTRA_OECONF = " \ | ||
| 29 | --with-libcap-ng \ | ||
| 30 | --with-python3 \ | ||
| 31 | --with-arm \ | ||
| 32 | --with-aarch64 \ | ||
| 33 | --with-riscv \ | ||
| 34 | --without-golang \ | ||
| 35 | --disable-gssapi-krb5 \ | ||
| 36 | --disable-zos-remote \ | ||
| 37 | --sbindir=${base_sbindir} \ | ||
| 38 | --runstatedir=/run \ | ||
| 39 | " | ||
| 40 | |||
| 41 | EXTRA_OEMAKE = " \ | ||
| 42 | PYTHON=python3 \ | ||
| 43 | pythondir=${PYTHON_SITEPACKAGES_DIR} \ | ||
| 44 | pyexecdir=${PYTHON_SITEPACKAGES_DIR} \ | ||
| 45 | STDINC='${STAGING_INCDIR}' \ | ||
| 46 | " | ||
| 47 | |||
| 48 | SUMMARY:audispd-plugins = "Plugins for the audit event dispatcher" | ||
| 49 | DESCRIPTION:audispd-plugins = "The audispd-plugins package provides plugins for the real-time \ | ||
| 50 | interface to the audit system, audispd. These plugins can do things \ | ||
| 51 | like relay events to remote machines or analyze events for suspicious \ | ||
| 52 | behavior." | ||
| 53 | |||
| 54 | PACKAGES =+ "audispd-plugins" | ||
| 55 | PACKAGES += "auditd ${PN}-python" | ||
| 56 | |||
| 57 | FILES:${PN} = "${sysconfdir}/libaudit.conf ${libdir}/libau*.so.*" | ||
| 58 | FILES:auditd = "${bindir}/* ${base_sbindir}/* ${sysconfdir}/* \ | ||
| 59 | ${datadir}/audit-rules/* ${libexecdir}/* \ | ||
| 60 | ${nonarch_libdir}/tmpfiles.d/*.conf" | ||
| 61 | FILES:audispd-plugins = "${sysconfdir}/audit/audisp-remote.conf \ | ||
| 62 | ${sysconfdir}/audit/plugins.d/au-remote.conf \ | ||
| 63 | ${sysconfdir}/audit/plugins.d/syslog.conf \ | ||
| 64 | ${base_sbindir}/audisp-remote \ | ||
| 65 | ${base_sbindir}/audisp-syslog \ | ||
| 66 | ${localstatedir}/spool/audit \ | ||
| 67 | " | ||
| 68 | FILES:${PN}-dbg += "${libdir}/python${PYTHON_BASEVERSION}/*/.debug" | ||
| 69 | FILES:${PN}-python = "${libdir}/python${PYTHON_BASEVERSION}" | ||
| 70 | |||
| 71 | CONFFILES:auditd = "${sysconfdir}/audit/audit.rules" | ||
| 72 | |||
| 73 | do_configure:prepend() { | ||
| 74 | sed -e 's|buf\[];|buf[0];|g' ${STAGING_INCDIR}/linux/audit.h > ${S}/lib/audit.h | ||
| 75 | sed -i -e 's|#include <linux/audit.h>|#include "audit.h"|g' ${S}/lib/libaudit.h | ||
| 76 | } | ||
| 77 | |||
| 78 | do_install:append() { | ||
| 79 | sed -i -e 's|#include "audit.h"|#include <linux/audit.h>|g' ${D}${includedir}/libaudit.h | ||
| 80 | |||
| 81 | # Install default rules | ||
| 82 | install -d -m 750 ${D}/etc/audit | ||
| 83 | install -d -m 750 ${D}/etc/audit/rules.d | ||
| 84 | |||
| 85 | install -m 0640 ${S}/rules/10-base-config.rules ${D}/etc/audit/rules.d/audit.rules | ||
| 86 | |||
| 87 | # Based on the audit.spec "Copy default rules into place on new installation" | ||
| 88 | install -m 0640 ${D}/etc/audit/rules.d/audit.rules ${D}/etc/audit/audit.rules | ||
| 89 | |||
| 90 | if ${@bb.utils.contains('DISTRO_FEATURES', 'sysvinit', 'true', 'false', d)}; then | ||
| 91 | install -D -m 0755 ${UNPACKDIR}/auditd ${D}/etc/init.d/auditd | ||
| 92 | fi | ||
| 93 | |||
| 94 | if ! ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then | ||
| 95 | rm -rf ${D}${nonarch_libdir}/systemd | ||
| 96 | rm -rf ${D}${nonarch_libdir}/tmpfiles.d | ||
| 97 | |||
| 98 | # Remove empty directory when enable multilib | ||
| 99 | rmdir --ignore-fail-on-non-empty ${D}${nonarch_libdir} | ||
| 100 | fi | ||
| 101 | |||
| 102 | # Create /var/spool/audit directory for audisp-remote | ||
| 103 | install -d -m 0700 ${D}${localstatedir}/spool/audit | ||
| 104 | } | ||
| 105 | |||
| 106 | CVE_PRODUCT = "linux:audit" | ||
