Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 30 Sep 2019 20:38:30 +0000 (UTC)
From:      Rodrigo Osorio <rodrigo@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r513412 - in head/security: . pam_script pam_script/files
Message-ID:  <201909302038.x8UKcUdc083015@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: rodrigo
Date: Mon Sep 30 20:38:30 2019
New Revision: 513412
URL: https://svnweb.freebsd.org/changeset/ports/513412

Log:
  New port security/pam_script
  
  PAM script module allows to hook user space scripts on PAM events
  
  PR:		240669
  Submitted by:	Natalino Picone <natalino.picone@nozominetworks.com>

Added:
  head/security/pam_script/
  head/security/pam_script/Makefile   (contents, props changed)
  head/security/pam_script/distinfo   (contents, props changed)
  head/security/pam_script/files/
  head/security/pam_script/files/patch-etc_pam__script   (contents, props changed)
  head/security/pam_script/pkg-descr   (contents, props changed)
  head/security/pam_script/pkg-plist   (contents, props changed)
Modified:
  head/security/Makefile

Modified: head/security/Makefile
==============================================================================
--- head/security/Makefile	Mon Sep 30 20:38:19 2019	(r513411)
+++ head/security/Makefile	Mon Sep 30 20:38:30 2019	(r513412)
@@ -740,6 +740,7 @@
     SUBDIR += pam_pseudo
     SUBDIR += pam_pwdfile
     SUBDIR += pam_require
+    SUBDIR += pam_script
     SUBDIR += pam_search_list
     SUBDIR += pam_ssh_agent_auth
     SUBDIR += pam_yubico

Added: head/security/pam_script/Makefile
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/pam_script/Makefile	Mon Sep 30 20:38:30 2019	(r513412)
@@ -0,0 +1,40 @@
+# $FreeBSD$
+
+PORTNAME=	pam_script
+PORTVERSION=	1.1.9
+CATEGORIES=	security
+MASTER_SITES=	GH
+
+MAINTAINER=	natalino.picone@nozominetworks.com
+COMMENT=	PAM script module allows to hook user space scripts on PAM events
+
+LICENSE=	GPLv2+
+LICENSE_FILE=	${WRKSRC}/COPYING
+
+USES=	autoreconf libtool shebangfix
+USE_GITHUB=	yes
+
+SHEBANG_FILES=	etc/tally
+
+GH_ACCOUNT=	jeroennijhof
+GH_PROJECT=	pam_script
+GH_TAGNAME=	1.1.9
+
+GNU_CONFIGURE=	yes
+PATCHDIR=	${.CURDIR}/files
+
+do-install:
+	${MKDIR} ${STAGEDIR}${PREFIX}/etc/pam-script.d
+	${INSTALL_LIB} ${WRKSRC}/.libs/pam_script.so ${STAGEDIR}${PREFIX}/lib/pam_script.so
+	${INSTALL_SCRIPT} ${WRKSRC}/etc/pam_script ${STAGEDIR}${PREFIX}/etc/pam_script
+.for i in etc/logscript etc/tally
+	${INSTALL_SCRIPT} ${WRKSRC}/${i} ${STAGEDIR}${PREFIX}/etc/pam-script.d
+.endfor
+
+post-install:
+	@${MKDIR} ${STAGEDIR}${DOCSDIR}
+.for i in AUTHORS COPYING ChangeLog README NEWS etc/README.pam_script etc/README.examples
+	${INSTALL_DATA} ${WRKSRC}/${i} ${STAGEDIR}${DOCSDIR}
+.endfor
+
+.include <bsd.port.mk>

Added: head/security/pam_script/distinfo
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/pam_script/distinfo	Mon Sep 30 20:38:30 2019	(r513412)
@@ -0,0 +1,3 @@
+TIMESTAMP = 1568808393
+SHA256 (jeroennijhof-pam_script-1.1.9_GH0.tar.gz) = 0aab103d318e3048ccc6f8285950f99284c814f996d2dcbcae8f10d3b8bd8cfe
+SIZE (jeroennijhof-pam_script-1.1.9_GH0.tar.gz) = 34890

Added: head/security/pam_script/files/patch-etc_pam__script
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/pam_script/files/patch-etc_pam__script	Mon Sep 30 20:38:30 2019	(r513412)
@@ -0,0 +1,27 @@
+--- etc/pam_script.orig	2017-08-10 17:20:16 UTC
++++ etc/pam_script
+@@ -21,7 +21,7 @@ PAMSCRIPTDIR=${PAMSCRIPTDIR:-$basedir/pam-script.d}
+ 
+ goodperms () {
+ 	local path="$1"
+-	stat_output=`/usr/bin/stat -c "%A:%u:%g" "$path"`
++	stat_output=`/usr/bin/stat -f "%SLp%SMp%SHp:%u:%g" "$path"`
+ 	if [ $? -ne 0 ]; then
+ 		echo "$0: Could not stat path $path" 1>&2
+ 		return 1
+@@ -106,13 +106,11 @@ rmlink () {
+ 	# $4 xpamscript
+ 
+ 	if [ x$1 = xlink ]; then
+-		(cd $PAMSCRIPTDIR;
+-			[ -e $4_$2 ] || [ -e $3 ] && \
++		([ -e $4_$2 ] || [ -e $3 ] && \
+ 			( [ $verbose = 1 ] && echo ln -s $3 $4_$2;
+ 			ln -s $3 $4_$2))
+ 	elif [ x$1 = xremove ]; then
+-		(cd $PAMSCRIPTDIR;
+-			[ -e $4_$2 ] && \
++		([ -e $4_$2 ] && \
+ 			( [ $verbose = 1 ] && echo rm -f $4_$2;
+ 			rm -f $4_$2))
+ 	fi

Added: head/security/pam_script/pkg-descr
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/pam_script/pkg-descr	Mon Sep 30 20:38:30 2019	(r513412)
@@ -0,0 +1,7 @@
+PAM-script allows you to execute scripts during authorization,
+passwd changes, or session opening or closing.
+
+So if you need extra work done after login you can use this pam
+module to execute a session script.
+
+WWW: https://github.com/jeroennijhof/pam_script

Added: head/security/pam_script/pkg-plist
==============================================================================
--- /dev/null	00:00:00 1970	(empty, because file is newly added)
+++ head/security/pam_script/pkg-plist	Mon Sep 30 20:38:30 2019	(r513412)
@@ -0,0 +1,12 @@
+@dir(root,wheel,0755) etc/pam-script.d
+@(root,wheel,0755) etc/pam_script
+@(root,wheel,0755) etc/pam-script.d/logscript
+@(root,wheel,0755) etc/pam-script.d/tally
+lib/pam_script.so
+%%DOCSDIR%%/AUTHORS
+%%DOCSDIR%%/COPYING
+%%DOCSDIR%%/ChangeLog
+%%DOCSDIR%%/NEWS
+%%DOCSDIR%%/README.pam_script
+%%DOCSDIR%%/README
+%%DOCSDIR%%/README.examples



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201909302038.x8UKcUdc083015>