# -*- coding: utf-8; mode: tcl; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- vim:fenc=utf-8:ft=tcl:et:sw=4:ts=4:sts=4 PortSystem 1.0 PortGroup github 1.0 github.setup Yubico yubico-pam 2.27 checksums rmd160 535104ee7a68d048de604a9ba3d89a92c661eb72 \ sha256 77700a2e5619aeeda5a30019c37acfa146f2716a9d346495d59d8bcb9feb8379 \ size 81401 # I'm explicitly not marking this openmaintainer maintainers {cal @neverpanic} categories security description PAM module to authenticate against a YubiKey validation server or \ via challenge-response against a local YubiKey long_description \ The Yubico PAM module provides an easy way to integrate the YubiKey \ into your existing user authentication infrastructure. The module can \ be configured to validate YubiKeys against Yubico's YubiCloud \ infrastructure, a custom YubiKey validation server or it can be used \ for offline authentication with newer YubiKeys supporting a \ challenge-response protocol. platforms darwin license BSD depends_build port:pkgconfig \ port:asciidoc \ port:libxslt \ port:docbook-xsl-nons depends_lib port:ykpers \ port:yubico-c-client use_autoreconf yes if {${os.platform} eq "darwin" && ${os.major} >= 15} { configure.args --with-pam-dir=${prefix}/lib/pam notes " On systems earlier than El Capitan, this port used to install pam_yubico.so in\ /usr/lib/pam directly for your convenience. With El Capitan's System Integrity\ Protection (\"rootless\"), this is no longer possible. The library is now\ installed in ${prefix}/lib/pam instead. You have to modify your PAM\ configuration to reference the library using it's absolute path\ ${prefix}/lib/pam/pam_yubico.so" } else { configure.args --with-pam-dir=/usr/lib/pam destroot.violate_mtree yes } configure.args-append --without-ldap post-destroot { # remove header which is unneeded, because there's no software linking # against yubico-pam and which clashes with a system header file delete ${destroot}${prefix}/include/util.h }