blob: d77aec2964340f752a5b6eb03706cf5430b0488a [file] [log] [blame]
Andrew Geisslereff27472021-10-29 15:35:00 -05001SUMMARY = "User space tools for kernel auditing"
2DESCRIPTION = "The audit package contains the user space utilities for \
3storing and searching the audit records generated by the audit subsystem \
4in the Linux kernel."
5HOMEPAGE = "http://people.redhat.com/sgrubb/audit/"
6SECTION = "base"
Andrew Geissler9aee5002022-03-30 16:27:02 +00007LICENSE = "GPL-2.0-or-later & LGPL-2.0-or-later"
Andrew Geisslereff27472021-10-29 15:35:00 -05008LIC_FILES_CHKSUM = "file://COPYING;md5=94d55d512a9ba36caa9b7df079bae19f"
9
Andrew Geissler595f6302022-01-24 19:11:47 +000010SRC_URI = "git://github.com/linux-audit/${BPN}-userspace.git;branch=master;protocol=https \
Andrew Geisslereff27472021-10-29 15:35:00 -050011 file://Fixed-swig-host-contamination-issue.patch \
12 file://auditd \
13 file://auditd.service \
14 file://audit-volatile.conf \
15"
16
17S = "${WORKDIR}/git"
Patrick Williams03907ee2022-05-01 06:28:52 -050018SRCREV = "f60b2d8f55c74be798a7f5bcbd6c587987f2578a"
Andrew Geisslereff27472021-10-29 15:35:00 -050019
20inherit autotools python3native update-rc.d systemd
21
22UPDATERCPN = "auditd"
23INITSCRIPT_NAME = "auditd"
24INITSCRIPT_PARAMS = "defaults"
25
26SYSTEMD_PACKAGES = "auditd"
27SYSTEMD_SERVICE:auditd = "auditd.service"
28
29DEPENDS = "python3 tcp-wrappers libcap-ng linux-libc-headers swig-native"
30
31EXTRA_OECONF = " --with-libwrap \
32 --enable-gssapi-krb5=no \
33 --with-libcap-ng=yes \
34 --with-python3=yes \
35 --libdir=${base_libdir} \
36 --sbindir=${base_sbindir} \
37 --without-python \
38 --without-golang \
39 --disable-zos-remote \
40 --with-arm=yes \
41 --with-aarch64=yes \
42 "
43
44EXTRA_OEMAKE = "PYLIBVER='python${PYTHON_BASEVERSION}' \
45 PYINC='${STAGING_INCDIR}/$(PYLIBVER)' \
46 pyexecdir=${libdir}/python${PYTHON_BASEVERSION}/site-packages \
47 STDINC='${STAGING_INCDIR}' \
48 pkgconfigdir=${libdir}/pkgconfig \
49 "
50
51SUMMARY:audispd-plugins = "Plugins for the audit event dispatcher"
52DESCRIPTION:audispd-plugins = "The audispd-plugins package provides plugins for the real-time \
53interface to the audit system, audispd. These plugins can do things \
54like relay events to remote machines or analyze events for suspicious \
55behavior."
56
57PACKAGES =+ "audispd-plugins"
58PACKAGES += "auditd ${PN}-python"
59
60FILES:${PN} = "${sysconfdir}/libaudit.conf ${base_libdir}/libaudit.so.1* ${base_libdir}/libauparse.so.*"
61FILES:auditd = "${bindir}/* ${base_sbindir}/* ${sysconfdir}/* ${datadir}/audit/*"
62FILES:audispd-plugins = "${sysconfdir}/audit/audisp-remote.conf \
63 ${sysconfdir}/audit/plugins.d/au-remote.conf \
64 ${sysconfdir}/audit/plugins.d/syslog.conf \
65 ${base_sbindir}/audisp-remote \
66 ${base_sbindir}/audisp-syslog \
67 ${localstatedir}/spool/audit \
68 "
69FILES:${PN}-dbg += "${libdir}/python${PYTHON_BASEVERSION}/*/.debug"
70FILES:${PN}-python = "${libdir}/python${PYTHON_BASEVERSION}"
71
72CONFFILES:auditd = "${sysconfdir}/audit/audit.rules"
Andrew Geisslereff27472021-10-29 15:35:00 -050073
74do_install:append() {
75 rm -f ${D}/${libdir}/python${PYTHON_BASEVERSION}/site-packages/*.a
76 rm -f ${D}/${libdir}/python${PYTHON_BASEVERSION}/site-packages/*.la
77
78 # reuse auditd config
79 [ ! -e ${D}/etc/default ] && mkdir ${D}/etc/default
80 mv ${D}/etc/sysconfig/auditd ${D}/etc/default
81 rmdir ${D}/etc/sysconfig/
82
83 # replace init.d
84 install -D -m 0755 ${WORKDIR}/auditd ${D}/etc/init.d/auditd
85 rm -rf ${D}/etc/rc.d
86
87 if ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', 'true', 'false', d)}; then
88 # install systemd unit files
89 install -d ${D}${systemd_unitdir}/system
90 install -m 0644 ${WORKDIR}/auditd.service ${D}${systemd_unitdir}/system
91
92 install -d ${D}${sysconfdir}/tmpfiles.d/
93 install -m 0644 ${WORKDIR}/audit-volatile.conf ${D}${sysconfdir}/tmpfiles.d/
94 fi
95
96 # audit-2.5 doesn't install any rules by default, so we do that here
97 mkdir -p ${D}/etc/audit ${D}/etc/audit/rules.d
98 cp ${S}/rules/10-base-config.rules ${D}/etc/audit/rules.d/audit.rules
99
100 chmod 750 ${D}/etc/audit ${D}/etc/audit/rules.d
101 chmod 640 ${D}/etc/audit/auditd.conf ${D}/etc/audit/rules.d/audit.rules
102
103 # Based on the audit.spec "Copy default rules into place on new installation"
104 cp ${D}/etc/audit/rules.d/audit.rules ${D}/etc/audit/audit.rules
105
106 # Create /var/spool/audit directory for audisp-remote
107 install -m 0700 -d ${D}${localstatedir}/spool/audit
108}