Skip to content

Commit

Permalink
security/pam_u2f: New port
Browse files Browse the repository at this point in the history
This module implements PAM over U2F and FIDO2, providing an easy way to
integrate the YubiKey (or other U2F/FIDO2 compliant authenticators) into
your existing infrastructure.
  • Loading branch information
smortex committed Mar 6, 2023
1 parent 9a3b076 commit 3cbf478
Show file tree
Hide file tree
Showing 4 changed files with 39 additions and 0 deletions.
1 change: 1 addition & 0 deletions security/Makefile
Expand Up @@ -732,6 +732,7 @@
SUBDIR += pam_script
SUBDIR += pam_search_list
SUBDIR += pam_ssh_agent_auth
SUBDIR += pam_u2f
SUBDIR += pam_yubico
SUBDIR += pamtester
SUBDIR += paperkey
Expand Down
32 changes: 32 additions & 0 deletions security/pam_u2f/Makefile
@@ -0,0 +1,32 @@
PORTNAME= pam_u2f
DISTVERSIONPREFIX=${PORTNAME}-
DISTVERSION= 1.2.1
CATEGORIES= security

MAINTAINER= romain@FreeBSD.org
COMMENT= Pluggable Authentication Module for U2F and FIDO2
WWW= https://developers.yubico.com/pam-u2f/

LICENSE= BSD2CLAUSE
LICENSE_FILE= ${WRKSRC}/COPYING

BUILD_DEPENDS= a2x:textproc/asciidoc
LIB_DEPENDS= libfido2.so:security/libfido2

USES= autoreconf libtool pkgconfig ssl
USE_GITHUB= yes
GH_ACCOUNT= Yubico
GH_PROJECT= pam-u2f
GNU_CONFIGURE= yes
CONFIGURE_ARGS= --with-pam-dir=${PREFIX}/lib

PLIST_FILES= bin/pamu2fcfg \
lib/pam_u2f.so \
man/man1/pamu2fcfg.1.gz \
man/man8/pam_u2f.8.gz

.if !exists(/usr/libdata/pkgconfig/libcrypto.pc)
CONFIGURE_ENV= LIBCRYPTO_CFLAGS="-I${OPENSSLINC}" LIBCRYPTO_LIBS="-L${OPENSSLLIB} -lcrypto"
.endif

.include <bsd.port.mk>
3 changes: 3 additions & 0 deletions security/pam_u2f/distinfo
@@ -0,0 +1,3 @@
TIMESTAMP = 1678046721
SHA256 (Yubico-pam-u2f-pam_u2f-1.2.1_GH0.tar.gz) = 2983d9fff6107219c1adcc4cbb2b563bbf6b7975aa642b34c5508f7924bdc450
SIZE (Yubico-pam-u2f-pam_u2f-1.2.1_GH0.tar.gz) = 81481
3 changes: 3 additions & 0 deletions security/pam_u2f/pkg-descr
@@ -0,0 +1,3 @@
This module implements PAM over U2F and FIDO2, providing an easy way to
integrate the YubiKey (or other U2F/FIDO2 compliant authenticators) into your
existing infrastructure.

0 comments on commit 3cbf478

Please sign in to comment.