freebsd-ports/security/sudosh3/Makefile
Mikhail Teterin a4d51a600a Refactor the replay code to fix the reported vulnerability -- simply use mmap()
instead of a buffer.

Bump PORTREVISION.

While here, fix warnings -- well enough for gcc48 to be happy with ``-Wall -W''.

Approved by:	maintainer timeout (since February).
2013-05-21 16:29:19 +00:00

42 lines
972 B
Makefile

# Ports collection Makefile for: sudosh
# Date created: 10/28/2004
# Whom: cy@FreeBSD.org
#
# $FreeBSD$
#
PORTNAME= sudosh3
PORTVERSION= 3.2.0
PORTREVISION= 3
CATEGORIES= security
MASTER_SITES= SF/${PORTNAME}
MAINTAINER= cy@FreeBSD.org
COMMENT= Third version of the sudo shell
CONFLICTS= sudosh-*
RUN_DEPENDS= sudo:${PORTSDIR}/security/sudo
GNU_CONFIGURE= yes
EXTRACT_AFTER_ARGS= |${TAR} -xpf - --exclude 'getopt.*'
CONFIGURE_ARGS= --bindir="${PREFIX}/bin"
CONFIGURE_ARGS+= --sysconfdir="${PREFIX}/etc"
CONFIGURE_ARGS+= --program-transform-name=''
.if defined(SUDOSH_LOGDIR)
CONFIGURE_ARGS+= --with-logdir="${SUDOSH_LOGDIR}"
.else
CONFIGURE_ARGS+= --with-logdir=/var/log/sudosh
.endif
LDFLAGS+= -lutil
MAN1= sudosh.1
MAN5= sudosh.conf.5
MAN8= sudosh-replay.8
.include <bsd.port.pre.mk>
post-install:
@${TEST} -f ${PREFIX}/etc/sudosh.conf || ${CP} -p ${PREFIX}/etc/sudosh.conf.sample ${PREFIX}/etc/sudosh.conf
.include <bsd.port.post.mk>