Ravenports generated: 20 Nov 2019 10:14
[ravenports.git] / bucket_5E / doas
1 # Buildsheet autogenerated by ravenadm tool -- Do not edit.
2
3 NAMEBASE=               doas
4 VERSION=                6.2p2
5 KEYWORDS=               security
6 VARIANTS=               standard
7 SDESC[standard]=        Simple sudo alternative from OpenBSD
8 HOMEPAGE=               https://github.com/slicer69/doas
9 CONTACT=                Omar_Polo[omar.polo@europecom.net]
10
11 DOWNLOAD_GROUPS=        main
12 SITES[main]=            GITHUB/slicer69:doas:6.2p2
13 DISTFILE[1]=            generated:main
14 DF_INDEX=               1
15 SPKGS[standard]=        single
16
17 OPTIONS_AVAILABLE=      none
18 OPTIONS_STANDARD=       none
19
20 BUILD_DEPENDS=          byacc:single:standard
21 BUILDRUN_DEPENDS=       openpam:single:standard
22
23 USES=                   gmake
24
25 LICENSE=                BSD2CLAUSE:single
26 LICENSE_FILE=           BSD2CLAUSE:{{WRKDIR}}/LICENSE
27 LICENSE_SCHEME=         solo
28
29 FPC_EQUIVALENT=         security/doas
30
31 do-install:
32         ${INSTALL_PROGRAM} ${WRKSRC}/doas ${STAGEDIR}${PREFIX}/bin
33         ${INSTALL_MAN} ${WRKSRC}/doas.1 ${STAGEDIR}${PREFIX}/share/man/man1
34         ${INSTALL_MAN} ${WRKSRC}/doas.conf.5 ${STAGEDIR}${PREFIX}/share/man/man5
35
36 [FILE:215:descriptions/desc.single]
37 The doas program allows users to run commands as another user (usually
38 root). The doas program was written by the OpenBSD team to provide a
39 lightweight, simplified (and more secure) alternative to the sudo command.
40
41
42 [FILE:105:distinfo]
43 b8dc7e3357d12335ab6890d8303523862112416136bb50f170400cf5746dfd16        25634 slicer69-doas-6.2p2.tar.gz
44
45
46 [FILE:74:manifests/plist.single]
47 @(,,4555) bin/doas
48 share/man/man1/doas.1.gz
49 share/man/man5/doas.conf.5.gz
50
51
52 [FILE:1279:patches/patch-Makefile]
53 --- Makefile.orig       2019-10-12 15:07:28 UTC
54 +++ Makefile
55 @@ -9,11 +9,11 @@ OPT?=-O2
56  # Can set GLOBAL_PATH here to set PATH for target user.
57  # TARGETPATH=-DGLOBAL_PATH=\"/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:\"
58  CFLAGS+=-Wall $(OPT) -DUSE_PAM -DDOAS_CONF=\"${SYSCONFDIR}/doas.conf\" $(TARGETPATH)
59 +CFLAGS+=-DOPENPAM
60  CPPFLAGS+=-include compat/compat.h
61  LDFLAGS+=-lpam
62  UNAME_S := $(shell uname -s)
63  ifeq ($(UNAME_S),Linux)
64 -    LDFLAGS+=-lpam_misc
65      CPPFLAGS+=-Icompat
66      CFLAGS+=-D_GNU_SOURCE
67      COMPAT+=closefrom.o errc.o getprogname.o setprogname.o strlcat.o strlcpy.o strtonum.o verrc.o
68 @@ -23,11 +23,15 @@ ifeq ($(UNAME_S),FreeBSD)
69      CFLAGS+=-DHAVE_LOGIN_CAP_H
70      LDFLAGS+=-lutil
71  endif
72 +ifeq ($(UNAME_S),DragonFly)
73 +    CFLAGS+=-DHAVE_LOGIN_CAP_H
74 +    LDFLAGS+=-lutil
75 +endif
76  ifeq ($(UNAME_S),SunOS)
77      SAFE_PATH?=/bin:/sbin:/usr/bin:/usr/sbin:$(PREFIX)/bin:$(PREFIX)/sbin
78      GLOBAL_PATH?=/bin:/sbin:/usr/bin:/usr/sbin:$(PREFIX)/bin:$(PREFIX)/sbin
79      CPPFLAGS+=-Icompat
80 -    CFLAGS+=-DSOLARIS_PAM -DSAFE_PATH=\"$(SAFE_PATH)\" -DGLOBAL_PATH=\"$(GLOBAL_PATH)\"
81 +    CFLAGS+=-DSAFE_PATH=\"$(SAFE_PATH)\" -DGLOBAL_PATH=\"$(GLOBAL_PATH)\"
82      COMPAT=errc.o pm_pam_conv.o setresuid.o verrc.o
83      OBJECTS+=$(COMPAT:%.o=compat/%.o)
84  endif
85
86
87 [FILE:274:patches/patch-compat_compat.h]
88 --- compat/compat.h.orig        2019-10-12 15:07:28 UTC
89 +++ compat/compat.h
90 @@ -1,7 +1,7 @@
91  #include <sys/types.h>
92  #include <stdarg.h>
93  
94 -#if !defined(__NetBSD__)
95 +#if !defined(__NetBSD__) && !defined(__DragonFly__) && !defined(__FreeBSD__)
96  void closefrom(int lowfd);
97  #endif
98  
99
100
101 [FILE:1075:patches/patch-doas.c]
102 --- doas.c.orig 2019-10-12 15:07:28 UTC
103 +++ doas.c
104 @@ -199,7 +199,7 @@ checkconfig(const char *confpath, int ar
105         struct rule *rule;
106          int status;
107  
108 -       #if defined(__linux__) || defined(__FreeBSD__)
109 +       #if defined(__linux__) || defined(__FreeBSD__) || defined(__DragonFly__)
110         status = setresuid(uid, uid, uid);
111         #else
112         status = setreuid(uid, uid);
113 @@ -515,7 +515,7 @@ main(int argc, char **argv)
114             LOGIN_SETUSER) != 0)
115                 errx(1, "failed to set user context for target");
116  #else
117 -       #if defined(__linux__) || defined(__FreeBSD__)
118 +       #if defined(__linux__) || defined(__FreeBSD__) || defined(__DragonFly__)
119         if (setresgid(target_pw->pw_gid, target_pw->pw_gid, target_pw->pw_gid) == -1)
120                 err(1, "setresgid");
121         #else
122 @@ -524,7 +524,7 @@ main(int argc, char **argv)
123         #endif
124         if (initgroups(target_pw->pw_name, target_pw->pw_gid) == -1)
125                 err(1, "initgroups");
126 -       #if defined(__linux__) || defined(__FreeBSD__)
127 +       #if defined(__linux__) || defined(__FreeBSD__) || defined(__DragonFly__)
128         if (setresuid(target, target, target) == -1)
129                 err(1, "setresuid");
130         #else
131