# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4 # $Id $ PortSystem 1.0 PortGroup github 1.0 github.setup Yubico yubico-pam 2.21 checksums rmd160 d4a9a9ce4e48cc8070a6ee49552a87965a00e57b \ sha256 a218669a316ac53f40616182f94d9a2fc11448be63e6234d9b83056130848685 # I'm explicitly not marking this openmaintainer maintainers cal categories security description PAM module to authenticate against a YubiKey validation server or \ via challenge-response against a local YubiKey long_description \ The Yubico PAM module provides an easy way to integrate the YubiKey \ into your existing user authentication infrastructure. The module can \ be configured to validate YubiKeys against Yubico's YubiCloud \ infrastructure, a custom YubiKey validation server or it can be used \ for offline authentication with newer YubiKeys supporting a \ challenge-response protocol. platforms darwin license BSD depends_build port:pkgconfig \ port:asciidoc \ port:libxslt \ port:docbook-xsl depends_lib port:ykpers \ port:yubico-c-client use_autoreconf yes if {${os.platform} eq "darwin" && ${os.major} >= 15} { configure.args --with-pam-dir=${prefix}/lib/pam notes " On systems earlier than El Capitan, this port used to install pam_yubico.so in\ /usr/lib/pam directly for your convenience. With El Capitan's System Integrity\ Protection (\"rootless\"), this is no longer possible. The library is now\ installed in ${prefix}/lib/pam instead. You have to modify your PAM\ configuration to reference the library using it's absolute path\ ${prefix}/lib/pam/pam_yubico.so" } else { configure.args --with-pam-dir=/usr/lib/pam destroot.violate_mtree yes } configure.args-append --without-ldap post-destroot { # remove header which is unneeded, because there's no software linking # against yubico-pam and which clashes with a system header file delete ${destroot}${prefix}/include/util.h }