| require sudo.inc |
| |
| SRC_URI = "https://www.sudo.ws/dist/sudo-${PV}.tar.gz \ |
| ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '${PAM_SRC_URI}', '', d)} \ |
| file://0001-Include-sys-types.h-for-id_t-definition.patch \ |
| file://CVE-2019-14287-1.patch \ |
| file://CVE-2019-14287-2.patch \ |
| " |
| |
| PAM_SRC_URI = "file://sudo.pam" |
| |
| SRC_URI[md5sum] = "b5c184b13b6b5de32af630af2fd013fd" |
| SRC_URI[sha256sum] = "7beb68b94471ef56d8a1036dbcdc09a7b58a949a68ffce48b83f837dd33e2ec0" |
| |
| DEPENDS += " virtual/crypt ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'libpam', '', d)}" |
| RDEPENDS_${PN} += " ${@bb.utils.contains('DISTRO_FEATURES', 'pam', 'pam-plugin-limits pam-plugin-keyinit', '', d)}" |
| |
| EXTRA_OECONF += " \ |
| ac_cv_type_rsize_t=no \ |
| ${@bb.utils.contains('DISTRO_FEATURES', 'pam', '--with-pam', '--without-pam', d)} \ |
| ${@bb.utils.contains('DISTRO_FEATURES', 'systemd', '--enable-tmpfiles.d=${nonarch_libdir}/tmpfiles.d', '--disable-tmpfiles.d', d)} \ |
| " |
| |
| do_install_append () { |
| if [ "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" ]; then |
| install -D -m 644 ${WORKDIR}/sudo.pam ${D}/${sysconfdir}/pam.d/sudo |
| if ${@bb.utils.contains('PACKAGECONFIG', 'pam-wheel', 'true', 'false', d)} ; then |
| echo 'auth required pam_wheel.so use_uid' >>${D}${sysconfdir}/pam.d/sudo |
| sed -i 's/# \(%wheel ALL=(ALL) ALL\)/\1/' ${D}${sysconfdir}/sudoers |
| fi |
| fi |
| |
| chmod 4111 ${D}${bindir}/sudo |
| chmod 0440 ${D}${sysconfdir}/sudoers |
| |
| # Explicitly remove the /run directory to avoid QA error |
| rmdir -p --ignore-fail-on-non-empty ${D}/run/sudo |
| } |
| |
| FILES_${PN} += "${nonarch_libdir}/tmpfiles.d" |
| FILES_${PN}-dev += "${libexecdir}/${BPN}/lib*${SOLIBSDEV} ${libexecdir}/${BPN}/*.la \ |
| ${libexecdir}/lib*${SOLIBSDEV} ${libexecdir}/*.la" |