]> andersk Git - openssh.git/blame - contrib/caldera/openssh.spec
- (djm) Update version.h and spec files for HEAD
[openssh.git] / contrib / caldera / openssh.spec
CommitLineData
cbaa3d44 1
2# Some of this will need re-evaluation post-LSB. The SVIdir is there
3# because the link appeared broken. The rest is for easy compilation,
4# the tradeoff open to discussion. (LC957)
5
6%define SVIdir /etc/rc.d/init.d
7%{!?_defaultdocdir:%define _defaultdocdir %{_prefix}/share/doc/packages}
8%{!?SVIcdir:%define SVIcdir /etc/sysconfig/daemons}
9
10%define _mandir %{_prefix}/share/man/en
11%define _sysconfdir /etc/ssh
12%define _libexecdir %{_libdir}/ssh
13
8029e7fc 14# Do we want to disable root_login? (1=yes 0=no)
15%define no_root_login 0
16
cbaa3d44 17#old cvs stuff. please update before use. may be deprecated.
18%define use_stable 1
19%if %{use_stable}
67c4ea7d 20 %define version 3.7.1p2
7c6d759d 21 %define cvs %{nil}
263c65df 22 %define release 1
7c6d759d 23%else
cbaa3d44 24 %define version 2.9.9p2
25 %define cvs cvs20011009
7c6d759d 26 %define release 0r1
27%endif
28%define xsa x11-ssh-askpass
29%define askpass %{xsa}-1.2.4.1
b1e2a48c 30
8029e7fc 31# OpenSSH privilege separation requires a user & group ID
32%define sshd_uid 67
33%define sshd_gid 67
34
b1e2a48c 35Name : openssh
7c6d759d 36Version : %{version}%{cvs}
37Release : %{release}
b1e2a48c 38Group : System/Network
39
7c6d759d 40Summary : OpenSSH free Secure Shell (SSH) implementation.
cbaa3d44 41Summary(de) : OpenSSH - freie Implementation der Secure Shell (SSH).
42Summary(es) : OpenSSH implementación libre de Secure Shell (SSH).
43Summary(fr) : Implémentation libre du shell sécurisé OpenSSH (SSH).
44Summary(it) : Implementazione gratuita OpenSSH della Secure Shell.
45Summary(pt) : Implementação livre OpenSSH do protocolo 'Secure Shell' (SSH).
46Summary(pt_BR) : Implementação livre OpenSSH do protocolo Secure Shell (SSH).
b1e2a48c 47
48Copyright : BSD
7c6d759d 49Packager : Raymund Will <ray@caldera.de>
b1e2a48c 50URL : http://www.openssh.com/
51
52Obsoletes : ssh, ssh-clients, openssh-clients
53
cbaa3d44 54BuildRoot : /tmp/%{name}-%{version}
55BuildRequires : XFree86-imake
b1e2a48c 56
cbaa3d44 57# %{use_stable}==1: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable
58# %{use_stable}==0: :pserver:cvs@bass.directhit.com:/cvs/openssh_cvs
59Source0: see-above:/.../openssh-%{version}.tar.gz
60%if %{use_stable}
61Source1: see-above:/.../openssh-%{version}.tar.gz.sig
7c6d759d 62%endif
63Source2: http://www.ntrnet.net/~jmknoble/software/%{xsa}/%{askpass}.tar.gz
64Source3: http://www.openssh.com/faq.html
b1e2a48c 65
b1e2a48c 66%Package server
67Group : System/Network
cbaa3d44 68Requires : openssh = %{version}
b1e2a48c 69Obsoletes : ssh-server
70
71Summary : OpenSSH Secure Shell protocol server (sshd).
cbaa3d44 72Summary(de) : OpenSSH Secure Shell Protocol-Server (sshd).
73Summary(es) : Servidor del protocolo OpenSSH Secure Shell (sshd).
74Summary(fr) : Serveur de protocole du shell sécurisé OpenSSH (sshd).
75Summary(it) : Server OpenSSH per il protocollo Secure Shell (sshd).
76Summary(pt) : Servidor do protocolo 'Secure Shell' OpenSSH (sshd).
77Summary(pt_BR) : Servidor do protocolo Secure Shell OpenSSH (sshd).
b1e2a48c 78
79
80%Package askpass
81Group : System/Network
cbaa3d44 82Requires : openssh = %{version}
7c6d759d 83URL : http://www.ntrnet.net/~jmknoble/software/x11-ssh-askpass/
b1e2a48c 84Obsoletes : ssh-extras
85
86Summary : OpenSSH X11 pass-phrase dialog.
cbaa3d44 87Summary(de) : OpenSSH X11 Passwort-Dialog.
88Summary(es) : Aplicación de petición de frase clave OpenSSH X11.
89Summary(fr) : Dialogue pass-phrase X11 d'OpenSSH.
90Summary(it) : Finestra di dialogo X11 per la frase segreta di OpenSSH.
91Summary(pt) : Diálogo de pedido de senha para X11 do OpenSSH.
92Summary(pt_BR) : Diálogo de pedido de senha para X11 do OpenSSH.
b1e2a48c 93
94
cbaa3d44 95%Description
96OpenSSH (Secure Shell) provides access to a remote system. It replaces
97telnet, rlogin, rexec, and rsh, and provides secure encrypted
98communications between two untrusted hosts over an insecure network.
99X11 connections and arbitrary TCP/IP ports can also be forwarded over
100the secure channel.
101
102%Description -l de
103OpenSSH (Secure Shell) stellt den Zugang zu anderen Rechnern her. Es ersetzt
104telnet, rlogin, rexec und rsh und stellt eine sichere, verschlüsselte
105Verbindung zwischen zwei nicht vertrauenswürdigen Hosts über eine unsicheres
106Netzwerk her. X11 Verbindungen und beliebige andere TCP/IP Ports können ebenso
107über den sicheren Channel weitergeleitet werden.
108
109%Description -l es
110OpenSSH (Secure Shell) proporciona acceso a sistemas remotos. Reemplaza a
111telnet, rlogin, rexec, y rsh, y proporciona comunicaciones seguras encriptadas
112entre dos equipos entre los que no se ha establecido confianza a través de una
113red insegura. Las conexiones X11 y puertos TCP/IP arbitrarios también pueden
114ser canalizadas sobre el canal seguro.
115
116%Description -l fr
117OpenSSH (Secure Shell) fournit un accès à un système distant. Il remplace
118telnet, rlogin, rexec et rsh, tout en assurant des communications cryptées
119securisées entre deux hôtes non fiabilisés sur un réseau non sécurisé. Des
120connexions X11 et des ports TCP/IP arbitraires peuvent également être
121transmis sur le canal sécurisé.
122
123%Description -l it
124OpenSSH (Secure Shell) fornisce l'accesso ad un sistema remoto.
125Sostituisce telnet, rlogin, rexec, e rsh, e fornisce comunicazioni sicure
126e crittate tra due host non fidati su una rete non sicura. Le connessioni
127X11 ad una porta TCP/IP arbitraria possono essere inoltrate attraverso
128un canale sicuro.
129
130%Description -l pt
131OpenSSH (Secure Shell) fornece acesso a um sistema remoto. Substitui o
132telnet, rlogin, rexec, e o rsh e fornece comunicações seguras e cifradas
133entre duas máquinas sem confiança mútua sobre uma rede insegura.
134Ligações X11 e portos TCP/IP arbitrários também poder ser reenviados
135pelo canal seguro.
136
137%Description -l pt_BR
138O OpenSSH (Secure Shell) fornece acesso a um sistema remoto. Substitui o
139telnet, rlogin, rexec, e o rsh e fornece comunicações seguras e criptografadas
140entre duas máquinas sem confiança mútua sobre uma rede insegura.
141Ligações X11 e portas TCP/IP arbitrárias também podem ser reenviadas
142pelo canal seguro.
143
144%Description server
145This package installs the sshd, the server portion of OpenSSH.
146
147%Description -l de server
148Dieses Paket installiert den sshd, den Server-Teil der OpenSSH.
149
150%Description -l es server
151Este paquete instala sshd, la parte servidor de OpenSSH.
152
153%Description -l fr server
154Ce paquetage installe le 'sshd', partie serveur de OpenSSH.
155
156%Description -l it server
157Questo pacchetto installa sshd, il server di OpenSSH.
158
159%Description -l pt server
160Este pacote intala o sshd, o servidor do OpenSSH.
161
162%Description -l pt_BR server
163Este pacote intala o sshd, o servidor do OpenSSH.
164
165%Description askpass
166This package contains an X11-based pass-phrase dialog used per
167default by ssh-add(1). It is based on %{askpass}
168by Jim Knoble <jmknoble@pobox.com>.
169
7c6d759d 170
cbaa3d44 171%Prep
172%setup %([ -z "%{cvs}" ] || echo "-n %{name}_cvs") -a2
173%if ! %{use_stable}
7c6d759d 174 autoreconf
175%endif
b1e2a48c 176
177
178%Build
179CFLAGS="$RPM_OPT_FLAGS" \
cbaa3d44 180%configure \
b1e2a48c 181 --with-pam \
182 --with-tcp-wrappers \
183 --with-ipv4-default \
8029e7fc 184 --with-privsep-path=%{_var}/empty/sshd \
cbaa3d44 185 #leave this line for easy edits.
1877dc0c 186
cbaa3d44 187%__make CFLAGS="$RPM_OPT_FLAGS"
1877dc0c 188
7c6d759d 189cd %{askpass}
cbaa3d44 190%configure \
191 #leave this line for easy edits.
192
afb9165e 193xmkmf
cbaa3d44 194%__make includes
195%__make
b1e2a48c 196
197
198%Install
cbaa3d44 199[ %{buildroot} != "/" ] && rm -rf %{buildroot}
b1e2a48c 200
16c14233 201make install DESTDIR=%{buildroot}
cbaa3d44 202%makeinstall -C %{askpass} \
203 BINDIR=%{_libexecdir} \
204 MANPATH=%{_mandir} \
205 DESTDIR=%{buildroot}
b1e2a48c 206
207# OpenLinux specific configuration
cbaa3d44 208mkdir -p %{buildroot}{/etc/pam.d,%{SVIcdir},%{SVIdir}}
8029e7fc 209mkdir -p %{buildroot}%{_var}/empty/sshd
b1e2a48c 210
211# enabling X11 forwarding on the server is convenient and okay,
cbaa3d44 212# on the client side it's a potential security risk!
8029e7fc 213%__perl -pi -e 's:#X11Forwarding no:X11Forwarding yes:g' \
214 %{buildroot}%{_sysconfdir}/sshd_config
215
216%if %{no_root_login}
217%__perl -pi -e 's:#PermitRootLogin yes:PermitRootLogin no:g' \
cbaa3d44 218 %{buildroot}%{_sysconfdir}/sshd_config
8029e7fc 219%endif
cbaa3d44 220
221install -m644 contrib/caldera/sshd.pam %{buildroot}/etc/pam.d/sshd
222# FIXME: disabled, find out why this doesn't work with nis
223%__perl -pi -e 's:(.*pam_limits.*):#$1:' \
224 %{buildroot}/etc/pam.d/sshd
afb9165e 225
cbaa3d44 226install -m 0755 contrib/caldera/sshd.init %{buildroot}%{SVIdir}/sshd
b1e2a48c 227
cbaa3d44 228# the last one is needless, but more future-proof
229find %{buildroot}%{SVIdir} -type f -exec \
230 %__perl -pi -e 's:\@SVIdir\@:%{SVIdir}:g;\
231 s:\@sysconfdir\@:%{_sysconfdir}:g; \
232 s:/usr/sbin:%{_sbindir}:g'\
233 \{\} \;
b1e2a48c 234
cbaa3d44 235cat <<-EoD > %{buildroot}%{SVIcdir}/sshd
b1e2a48c 236 IDENT=sshd
237 DESCRIPTIVE="OpenSSH secure shell daemon"
238 # This service will be marked as 'skipped' on boot if there
cbaa3d44 239 # is no host key. Use ssh-host-keygen to generate one
b1e2a48c 240 ONBOOT="yes"
241 OPTIONS=""
242EoD
243
cbaa3d44 244SKG=%{buildroot}%{_sbindir}/ssh-host-keygen
b1e2a48c 245install -m 0755 contrib/caldera/ssh-host-keygen $SKG
cbaa3d44 246# Fix up some path names in the keygen toy^Hol
247 %__perl -pi -e 's:\@sysconfdir\@:%{_sysconfdir}:g; \
248 s:\@sshkeygen\@:%{_bindir}/ssh-keygen:g' \
249 %{buildroot}%{_sbindir}/ssh-host-keygen
7c6d759d 250
cbaa3d44 251# This looks terrible. Expect it to change.
7c6d759d 252# install remaining docs
cbaa3d44 253DocD="%{buildroot}%{_defaultdocdir}/%{name}-%{version}"
7c6d759d 254mkdir -p $DocD/%{askpass}
cbaa3d44 255cp -a CREDITS ChangeLog LICENCE OVERVIEW README* TODO $DocD
256install -p -m 0444 %{SOURCE3} $DocD/faq.html
7c6d759d 257cp -a %{askpass}/{README,ChangeLog,TODO,SshAskpass*.ad} $DocD/%{askpass}
cbaa3d44 258%if %{use_stable}
259 cp -p %{askpass}/%{xsa}.man $DocD/%{askpass}/%{xsa}.1
260%else
261 cp -p %{askpass}/%{xsa}.man %{buildroot}%{_mandir}man1/%{xsa}.1
262 ln -s %{xsa}.1 %{buildroot}%{_mandir}man1/ssh-askpass.1
263%endif
7c6d759d 264
cbaa3d44 265find %{buildroot}%{_mandir} -type f -not -name '*.gz' -print0 | xargs -0r %__gzip -9nf
266rm %{buildroot}%{_mandir}/man1/slogin.1 && \
267 ln -s %{_mandir}/man1/ssh.1.gz \
268 %{buildroot}%{_mandir}/man1/slogin.1.gz
b1e2a48c 269
270
271%Clean
cbaa3d44 272#%{rmDESTDIR}
273[ %{buildroot} != "/" ] && rm -rf %{buildroot}
b1e2a48c 274
275%Post
276# Generate host key when none is present to get up and running,
277# both client and server require this for host-based auth!
278# ssh-host-keygen checks for existing keys.
279/usr/sbin/ssh-host-keygen
280: # to protect the rpm database
281
8029e7fc 282%pre server
283%{_sbindir}/groupadd -g %{sshd_gid} sshd 2>/dev/null || :
284%{_sbindir}/useradd -d /var/empty/sshd -s /bin/false -u %{sshd_uid} \
285 -c "SSH Daemon virtual user" -g sshd sshd 2>/dev/null || :
286: # to protect the rpm database
b1e2a48c 287
288%Post server
289if [ -x %{LSBinit}-install ]; then
290 %{LSBinit}-install sshd
1877dc0c 291else
f0c180c3 292 lisa --SysV-init install sshd S55 2:3:4:5 K45 0:1:6
1877dc0c 293fi
294
b1e2a48c 295! %{SVIdir}/sshd status || %{SVIdir}/sshd restart
296: # to protect the rpm database
297
298
299%PreUn server
300[ "$1" = 0 ] || exit 0
301
302! %{SVIdir}/sshd status || %{SVIdir}/sshd stop
303: # to protect the rpm database
304
305
306%PostUn server
307if [ -x %{LSBinit}-remove ]; then
308 %{LSBinit}-remove sshd
309else
310 lisa --SysV-init remove sshd $1
1877dc0c 311fi
b1e2a48c 312: # to protect the rpm database
1877dc0c 313
b1e2a48c 314
cbaa3d44 315%Files
1877dc0c 316%defattr(-,root,root)
cbaa3d44 317%dir %{_sysconfdir}
318%config %{_sysconfdir}/ssh_config
57872969 319%{_bindir}/scp
320%{_bindir}/sftp
321%{_bindir}/ssh
322%{_bindir}/slogin
323%{_bindir}/ssh-add
324%attr(2755,root,nobody) %{_bindir}/ssh-agent
325%{_bindir}/ssh-keygen
326%{_bindir}/ssh-keyscan
cbaa3d44 327%dir %{_libexecdir}
16c14233 328%attr(4711,root,root) %{_libexecdir}/ssh-keysign
cbaa3d44 329%{_sbindir}/ssh-host-keygen
330%dir %{_defaultdocdir}/%{name}-%{version}
331%{_defaultdocdir}/%{name}-%{version}/CREDITS
332%{_defaultdocdir}/%{name}-%{version}/ChangeLog
333%{_defaultdocdir}/%{name}-%{version}/LICENCE
334%{_defaultdocdir}/%{name}-%{version}/OVERVIEW
335%{_defaultdocdir}/%{name}-%{version}/README*
336%{_defaultdocdir}/%{name}-%{version}/TODO
337%{_defaultdocdir}/%{name}-%{version}/faq.html
338%{_mandir}/man1/*
16c14233 339%{_mandir}/man8/ssh-keysign.8.gz
340%{_mandir}/man5/ssh_config.5.gz
cbaa3d44 341
342%Files server
1877dc0c 343%defattr(-,root,root)
57872969 344%dir %{_var}/empty/sshd
cbaa3d44 345%config %{SVIdir}/sshd
346%config /etc/pam.d/sshd
347%config %{_sysconfdir}/moduli
348%config %{_sysconfdir}/sshd_config
349%config %{SVIcdir}/sshd
350%{_libexecdir}/sftp-server
351%{_sbindir}/sshd
16c14233 352%{_mandir}/man5/sshd_config.5.gz
cbaa3d44 353%{_mandir}/man8/sftp-server.8.gz
354%{_mandir}/man8/sshd.8.gz
355
356%Files askpass
1877dc0c 357%defattr(-,root,root)
cbaa3d44 358%{_libexecdir}/ssh-askpass
359%{_libexecdir}/x11-ssh-askpass
360%{_defaultdocdir}/%{name}-%{version}/%{askpass}
361
7c6d759d 362
b1e2a48c 363%ChangeLog
364* Mon Jan 01 1998 ...
cbaa3d44 365Template Version: 1.31
b1e2a48c 366
367$Id$
This page took 0.298232 seconds and 5 git commands to generate.