summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAlexander Verbovetsky <alik@ejik.org>2022-09-23 23:14:37 +0100
committerWilly Sudiarto Raharjo <willysr@slackbuilds.org>2022-09-25 13:59:42 +0700
commit5671b6c751d4282520af4319633c4032b053cfbc (patch)
tree7ae9ef27d4668ee3af43ab367c014ee8464de74c
parent37e54ff901f506839fb27c838a27d8188056b6a6 (diff)
downloadslackbuilds-5671b6c751d4282520af4319633c4032b053cfbc.tar.gz
system/pam_ssh: Added (unlock ssh keys on login)
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
-rw-r--r--system/pam_ssh/README6
-rw-r--r--system/pam_ssh/pam_ssh.SlackBuild109
-rw-r--r--system/pam_ssh/pam_ssh.info10
-rw-r--r--system/pam_ssh/slack-desc19
4 files changed, 144 insertions, 0 deletions
diff --git a/system/pam_ssh/README b/system/pam_ssh/README
new file mode 100644
index 0000000000..808382afe4
--- /dev/null
+++ b/system/pam_ssh/README
@@ -0,0 +1,6 @@
+The pam_ssh module provides single sign-on behavior for ssh.
+On login, the user types an ssh private key passphrase in place of,
+or in addition to the password. In the pam session phase, an
+ssh-agent process is started and keys are added. For the entire
+session, the user can ssh to other hosts that accept key
+authentication without typing any passwords.
diff --git a/system/pam_ssh/pam_ssh.SlackBuild b/system/pam_ssh/pam_ssh.SlackBuild
new file mode 100644
index 0000000000..c6d872657b
--- /dev/null
+++ b/system/pam_ssh/pam_ssh.SlackBuild
@@ -0,0 +1,109 @@
+#!/bin/bash
+
+# Slackware build script for pam_ssh
+
+# Copyright 2022, Alexander Verbovetsky, Moscow (Russia)
+# All rights reserved.
+#
+# Redistribution and use of this script, with or without modification, is
+# permitted provided that the following conditions are met:
+#
+# 1. Redistributions of this script must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+#
+# THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED
+# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
+# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
+# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
+# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
+# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
+# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+cd $(dirname $0) ; CWD=$(pwd)
+
+PRGNAM=pam_ssh
+VERSION=${VERSION:-2.3}
+BUILD=${BUILD:-1}
+TAG=${TAG:-_SBo}
+PKGTYPE=${PKGTYPE:-tgz}
+
+if [ -z "$ARCH" ]; then
+ case "$( uname -m )" in
+ i?86) ARCH=i586 ;;
+ arm*) ARCH=arm ;;
+ *) ARCH=$( uname -m ) ;;
+ esac
+fi
+
+if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
+ echo "$PRGNAM-$VERSION-$ARCH-$BUILD$TAG.$PKGTYPE"
+ exit 0
+fi
+
+TMP=${TMP:-/tmp/SBo}
+PKG=$TMP/package-$PRGNAM
+OUTPUT=${OUTPUT:-/tmp}
+
+if [ "$ARCH" = "i586" ]; then
+ SLKCFLAGS="-O2 -march=i586 -mtune=i686"
+ LIBDIRSUFFIX=""
+elif [ "$ARCH" = "i686" ]; then
+ SLKCFLAGS="-O2 -march=i686 -mtune=i686"
+ LIBDIRSUFFIX=""
+elif [ "$ARCH" = "x86_64" ]; then
+ SLKCFLAGS="-O2 -fPIC"
+ LIBDIRSUFFIX="64"
+else
+ SLKCFLAGS="-O2"
+ LIBDIRSUFFIX=""
+fi
+
+set -e
+
+rm -rf $PKG
+mkdir -p $TMP $PKG $OUTPUT
+cd $TMP
+rm -rf $PRGNAM-$VERSION
+tar xvf $CWD/$PRGNAM-$VERSION.tar.xz
+cd $PRGNAM-$VERSION
+chown -R root:root .
+find -L . \
+ \( -perm 777 -o -perm 775 -o -perm 750 -o -perm 711 -o -perm 555 \
+ -o -perm 511 \) -exec chmod 755 {} \; -o \
+ \( -perm 666 -o -perm 664 -o -perm 640 -o -perm 600 -o -perm 444 \
+ -o -perm 440 -o -perm 400 \) -exec chmod 644 {} \;
+
+sed -i 's/^const ge25519 ge25519_base;$/extern const ge25519 ge25519_base;/' \
+ ge25519.h
+
+CFLAGS="$SLKCFLAGS" \
+CXXFLAGS="$SLKCFLAGS" \
+./configure \
+ --prefix=/usr \
+ --mandir=/usr/man \
+ --with-pam-dir=/lib${LIBDIRSUFFIX}/security \
+ --build=$ARCH-slackware-linux
+
+make
+make install DESTDIR=$PKG
+
+rm -f $PKG/lib${LIBDIRSUFFIX}/security/*.la
+
+find $PKG -print0 | xargs -0 file | grep -e "executable" -e "shared object" | grep ELF \
+ | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null || true
+
+find $PKG/usr/man -type f -exec gzip -9 {} \;
+for i in $( find $PKG/usr/man -type l ) ; do ln -s $( readlink $i ).gz $i.gz ; rm $i ; done
+
+mkdir -p $PKG/usr/doc/$PRGNAM-$VERSION
+cp -a AUTHORS ChangeLog NEWS README TODO $PKG/usr/doc/$PRGNAM-$VERSION
+cat $CWD/$PRGNAM.SlackBuild > $PKG/usr/doc/$PRGNAM-$VERSION/$PRGNAM.SlackBuild
+
+mkdir -p $PKG/install
+cat $CWD/slack-desc > $PKG/install/slack-desc
+
+cd $PKG
+/sbin/makepkg -l y -c n $OUTPUT/$PRGNAM-$VERSION-$ARCH-$BUILD$TAG.$PKGTYPE
diff --git a/system/pam_ssh/pam_ssh.info b/system/pam_ssh/pam_ssh.info
new file mode 100644
index 0000000000..78752f5417
--- /dev/null
+++ b/system/pam_ssh/pam_ssh.info
@@ -0,0 +1,10 @@
+PRGNAM="pam_ssh"
+VERSION="2.3"
+HOMEPAGE="http://pam-ssh.sourceforge.net"
+DOWNLOAD="https://sourceforge.net/projects/pam-ssh/files/pam_ssh/2.3/pam_ssh-2.3.tar.xz"
+MD5SUM="a46976953119c81f4fc9cf039963ac8a"
+DOWNLOAD_x86_64=""
+MD5SUM_x86_64=""
+REQUIRES=""
+MAINTAINER="Alexander Verbovetsky"
+EMAIL="alik@ejik.org"
diff --git a/system/pam_ssh/slack-desc b/system/pam_ssh/slack-desc
new file mode 100644
index 0000000000..885b4e4756
--- /dev/null
+++ b/system/pam_ssh/slack-desc
@@ -0,0 +1,19 @@
+# HOW TO EDIT THIS FILE:
+# The "handy ruler" below makes it easier to edit a package description.
+# Line up the first '|' above the ':' following the base package name, and
+# the '|' on the right side marks the last column you can put a character in.
+# You must make exactly 11 lines for the formatting to be correct. It's also
+# customary to leave one space after the ':' except on otherwise blank lines.
+
+ |-----handy-ruler------------------------------------------------------|
+pam_ssh: pam_ssh (unlock ssh keys on login)
+pam_ssh:
+pam_ssh: The pam_ssh module provides single sign-on behavior for ssh.
+pam_ssh: On login, the user types an ssh private key passphrase in place of,
+pam_ssh: or in addition to the password. In the pam session phase, an
+pam_ssh: ssh-agent process is started and keys are added. For the entire
+pam_ssh: session, the user can ssh to other hosts that accept key
+pam_ssh: authentication without typing any passwords.
+pam_ssh:
+pam_ssh: Homepage: http://pam-ssh.sourceforge.net
+pam_ssh: