]>
Commit | Line | Data |
---|---|---|
afb9165e | 1 | %define askpass 1.2.2 |
b1e2a48c | 2 | |
3 | Name : openssh | |
afb9165e | 4 | Version : 2.9p2 |
5 | Release : 3 | |
b1e2a48c | 6 | Group : System/Network |
7 | ||
8 | Summary : OpenSSH free Secure Shell (SSH) implementation. | |
9 | Summary(de) : OpenSSH - freie Implementation der Secure Shell (SSH). | |
10 | Summary(es) : OpenSSH implementación libre de Secure Shell (SSH). | |
11 | Summary(fr) : Implémentation libre du shell sécurisé OpenSSH (SSH). | |
12 | Summary(it) : Implementazione gratuita OpenSSH della Secure Shell. | |
13 | Summary(pt) : Implementação livre OpenSSH do protocolo 'Secure Shell' (SSH). | |
afb9165e | 14 | Summary(pt_BR) : Implementação livre OpenSSH do protocolo Secure Shell (SSH). |
b1e2a48c | 15 | |
16 | Copyright : BSD | |
17 | Packager : Stephan Seyboth <sps@caldera.de> | |
18 | #Icon : . | |
19 | URL : http://www.openssh.com/ | |
20 | ||
21 | Obsoletes : ssh, ssh-clients, openssh-clients | |
22 | ||
23 | BuildRoot : /tmp/%{Name}-%{Version} | |
24 | ||
25 | Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{Version}.tar.gz | |
26 | Source1: http://www.ntrnet.net/~jmknoble/software/x11-ssh-askpass/x11-ssh-askpass-%{askpass}.tar.gz | |
afb9165e | 27 | Source2: http://www.openssh.com/openssh-faq.html |
b1e2a48c | 28 | |
29 | ||
30 | %Package server | |
31 | Group : System/Network | |
32 | Requires : openssh = %{Version} | |
33 | Obsoletes : ssh-server | |
34 | ||
35 | Summary : OpenSSH Secure Shell protocol server (sshd). | |
afb9165e | 36 | Summary(de) : OpenSSH Secure Shell Protocol-Server (sshd). |
b1e2a48c | 37 | Summary(es) : Servidor del protocolo OpenSSH Secure Shell (sshd). |
38 | Summary(fr) : Serveur de protocole du shell sécurisé OpenSSH (sshd). | |
39 | Summary(it) : Server OpenSSH per il protocollo Secure Shell (sshd). | |
40 | Summary(pt) : Servidor do protocolo 'Secure Shell' OpenSSH (sshd). | |
afb9165e | 41 | Summary(pt_BR) : Servidor do protocolo Secure Shell OpenSSH (sshd). |
b1e2a48c | 42 | |
43 | ||
44 | %Package askpass | |
45 | Group : System/Network | |
46 | Requires : openssh = %{Version} | |
47 | Obsoletes : ssh-extras | |
48 | ||
49 | Summary : OpenSSH X11 pass-phrase dialog. | |
50 | Summary(de) : OpenSSH X11 Passwort-Dialog. | |
51 | Summary(es) : Aplicación de petición de frase clave OpenSSH X11. | |
52 | Summary(fr) : Dialogue pass-phrase X11 d'OpenSSH. | |
53 | Summary(it) : Finestra di dialogo X11 per la frase segreta di OpenSSH. | |
54 | Summary(pt) : Diálogo de pedido de senha para X11 do OpenSSH. | |
afb9165e | 55 | Summary(pt_BR) : Diálogo de pedido de senha para X11 do OpenSSH. |
b1e2a48c | 56 | |
57 | ||
58 | %Description | |
59 | OpenSSH (Secure Shell) provides access to a remote system. It replaces | |
60 | telnet, rlogin, rexec, and rsh, and provides secure encrypted | |
61 | communications between two untrusted hosts over an insecure network. | |
62 | X11 connections and arbitrary TCP/IP ports can also be forwarded over | |
63 | the secure channel. | |
64 | ||
65 | %Description -l de | |
66 | OpenSSH (Secure Shell) stellt den Zugang zu anderen Rechnern her. Es ersetzt | |
67 | telnet, rlogin, rexec und rsh und stellt eine sichere, verschlüsselte | |
68 | Verbindung zwischen zwei nicht vertrauenswürdigen Hosts über eine unsicheres | |
69 | Netzwerk her. X11 Verbindungen und beliebige andere TCP/IP Ports können ebenso | |
70 | über den sicheren Channel weitergeleitet werden. | |
71 | ||
72 | %Description -l es | |
73 | OpenSSH (Secure Shell) proporciona acceso a sistemas remotos. Reemplaza a | |
74 | telnet, rlogin, rexec, y rsh, y proporciona comunicaciones seguras encriptadas | |
75 | entre dos equipos entre los que no se ha establecido confianza a través de una | |
76 | red insegura. Las conexiones X11 y puertos TCP/IP arbitrarios también pueden | |
77 | ser canalizadas sobre el canal seguro. | |
78 | ||
79 | %Description -l fr | |
80 | OpenSSH (Secure Shell) fournit un accès à un système distant. Il remplace | |
81 | telnet, rlogin, rexec et rsh, tout en assurant des communications cryptées | |
82 | securisées entre deux hôtes non fiabilisés sur un réseau non sécurisé. Des | |
83 | connexions X11 et des ports TCP/IP arbitraires peuvent également être | |
84 | transmis sur le canal sécurisé. | |
85 | ||
86 | %Description -l it | |
87 | OpenSSH (Secure Shell) fornisce l'accesso ad un sistema remoto. | |
88 | Sostituisce telnet, rlogin, rexec, e rsh, e fornisce comunicazioni sicure | |
89 | e crittate tra due host non fidati su una rete non sicura. Le connessioni | |
90 | X11 ad una porta TCP/IP arbitraria possono essere inoltrate attraverso | |
91 | un canale sicuro. | |
92 | ||
93 | %Description -l pt | |
94 | OpenSSH (Secure Shell) fornece acesso a um sistema remoto. Substitui o | |
95 | telnet, rlogin, rexec, e o rsh e fornece comunicações seguras e cifradas | |
96 | entre duas máquinas sem confiança mútua sobre uma rede insegura. | |
97 | Ligações X11 e portos TCP/IP arbitrários também poder ser reenviados | |
afb9165e | 98 | pelo canal seguro. |
99 | ||
100 | %Description -l pt_BR | |
101 | O OpenSSH (Secure Shell) fornece acesso a um sistema remoto. Substitui o | |
102 | telnet, rlogin, rexec, e o rsh e fornece comunicações seguras e criptografadas | |
103 | entre duas máquinas sem confiança mútua sobre uma rede insegura. | |
104 | Ligações X11 e portas TCP/IP arbitrárias também podem ser reenviadas | |
105 | pelo canal seguro. | |
b1e2a48c | 106 | |
107 | %Description server | |
108 | This package installs the sshd, the server portion of OpenSSH. | |
109 | ||
110 | %Description -l de server | |
111 | Dieses Paket installiert den sshd, den Server-Teil der OpenSSH. | |
112 | ||
113 | %Description -l es server | |
114 | Este paquete instala sshd, la parte servidor de OpenSSH. | |
115 | ||
116 | %Description -l fr server | |
117 | Ce paquetage installe le 'sshd', partie serveur de OpenSSH. | |
118 | ||
119 | %Description -l it server | |
120 | Questo pacchetto installa sshd, il server di OpenSSH. | |
121 | ||
122 | %Description -l pt server | |
123 | Este pacote intala o sshd, o servidor do OpenSSH. | |
124 | ||
afb9165e | 125 | %Description -l pt_BR server |
126 | Este pacote intala o sshd, o servidor do OpenSSH. | |
127 | ||
b1e2a48c | 128 | %Description askpass |
129 | This package contains an X11-based passphrase dialog. | |
130 | ||
131 | %Description -l de askpass | |
132 | Dieses Paket enthält einen X11-basierten Passwort Dialog. | |
133 | ||
134 | %Description -l es askpass | |
135 | Este paquete contiene una aplicación para petición de frases-contraseña basada | |
136 | en X11. | |
137 | ||
138 | %Description -l fr askpass | |
139 | Ce paquetage contient un dialogue de passphrase basé sur X11. | |
140 | ||
141 | %Description -l it askpass | |
142 | Questo pacchetto contiene una finestra di X11 che chiede la frase segreta. | |
143 | ||
144 | %Description -l pt askpass | |
145 | Este pacote contém um diálogo de senha para o X11. | |
146 | ||
afb9165e | 147 | %Description -l pt_BR askpass |
148 | Este pacote contem um diálogo de frase-senha para o X11. | |
149 | ||
b1e2a48c | 150 | %Prep |
151 | %setup | |
152 | %setup -D -T -a1 | |
153 | ||
154 | ||
155 | %Build | |
156 | CFLAGS="$RPM_OPT_FLAGS" \ | |
157 | ./configure \ | |
158 | --prefix=/usr \ | |
159 | --sysconfdir=/etc/ssh \ | |
160 | --libexecdir=/usr/lib/ssh \ | |
4b255446 | 161 | --datadir=/usr/share/openssh \ |
b1e2a48c | 162 | --with-pam \ |
163 | --with-tcp-wrappers \ | |
164 | --with-ipv4-default \ | |
1877dc0c | 165 | |
166 | make | |
167 | ||
b1e2a48c | 168 | cd x11-ssh-askpass-%{askpass} |
afb9165e | 169 | ./configure |
170 | xmkmf | |
171 | make includes | |
1877dc0c | 172 | make |
b1e2a48c | 173 | |
174 | ||
175 | %Install | |
176 | %{mkDESTDIR} | |
177 | ||
178 | make DESTDIR="$DESTDIR" install | |
179 | ||
180 | make -C x11-ssh-askpass-%{askpass} DESTDIR="$DESTDIR" \ | |
181 | BINDIR="/usr/lib/ssh" install | |
182 | ||
183 | %{fixManPages} | |
184 | ||
185 | # install remaining docs | |
186 | NV="$DESTDIR%{_defaultdocdir}/%{Name}-%{Version}" | |
187 | mkdir -p $NV | |
188 | cp -a CREDITS ChangeLog LICENCE OVERVIEW README* TODO $NV | |
afb9165e | 189 | cp %{SOURCE2} $NV/faq.html |
b1e2a48c | 190 | mkdir -p $NV/x11-ssh-askpass-%{askpass} |
afb9165e | 191 | cp -a x11-ssh-askpass-%{askpass}/{README,ChangeLog,TODO,SshAskpass*.ad} \ |
b1e2a48c | 192 | $NV/x11-ssh-askpass-%{askpass} |
193 | ||
194 | ||
195 | # OpenLinux specific configuration | |
196 | mkdir -p $DESTDIR/{etc/pam.d,%{SVIcdir},%{SVIdir}} | |
197 | ||
198 | # enabling X11 forwarding on the server is convenient and okay, | |
199 | # on the client side it's a potential security risk! | |
200 | %{fixUP} -vg $DESTDIR/etc/ssh/sshd_config 'X11Forwarding no' \ | |
201 | 'X11Forwarding yes' | |
202 | ||
afb9165e | 203 | cat <<-EOF >> $DESTDIR/etc/ssh/ssh_config |
204 | ||
205 | # This retains the old behaviour of trying the SSH1 protocol | |
206 | # before the more secure SSH2 one. Note that the SSH2 keys are | |
207 | # stored in a different format so you will have to generate and | |
208 | # distribute a new public/private key pair to migrate. See the | |
209 | # ssh(1) man-page for details | |
210 | Host * | |
211 | Protocol 1,2 | |
212 | EOF | |
213 | ||
b1e2a48c | 214 | install -m644 contrib/caldera/sshd.pam $DESTDIR/etc/pam.d/sshd |
215 | # FIXME: disabled, find out why this doesn't work with nis | |
216 | %{fixUP} -vg $DESTDIR/etc/pam.d/sshd '(.*pam_limits.*)' '#$1' | |
217 | ||
218 | install -m 0755 contrib/caldera/sshd.init $DESTDIR%{SVIdir}/sshd | |
219 | %{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@SVIdir\@:%{SVIdir}:' | |
220 | %{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@sysconfdir\@:/etc/ssh:' | |
221 | ||
222 | cat <<-EoD > $DESTDIR%{SVIcdir}/sshd | |
223 | IDENT=sshd | |
224 | DESCRIPTIVE="OpenSSH secure shell daemon" | |
225 | # This service will be marked as 'skipped' on boot if there | |
226 | # is no host key. Use ssh-host-keygen to generate one | |
227 | ONBOOT="yes" | |
228 | OPTIONS="" | |
229 | EoD | |
230 | ||
231 | SKG=$DESTDIR/usr/sbin/ssh-host-keygen | |
232 | install -m 0755 contrib/caldera/ssh-host-keygen $SKG | |
233 | %{fixUP} -T $SKG -e 's:\@sysconfdir\@:/etc/ssh:' | |
234 | %{fixUP} -T $SKG -e 's:\@sshkeygen\@:/usr/bin/ssh-keygen:' | |
235 | ||
236 | ||
237 | # generate file lists | |
238 | %{mkLists} -c %{Name} | |
239 | %{mkLists} -d %{Name} << 'EOF' | |
240 | /etc/ssh base | |
241 | ^/etc/ IGNORED | |
242 | %{_defaultdocdir}/$ IGNORED | |
243 | askpass askpass | |
244 | * default | |
245 | EOF | |
246 | %{mkLists} -a -f %{Name} << 'EOF' | |
247 | ^/etc * prefix(%%config) | |
248 | /usr/X11R6/lib/X11/app-defaults IGNORED | |
249 | [Aa]skpass askpass | |
250 | %{_defaultdocdir}/%{Name}-%{Version}/ base | |
251 | ssh-keygen base | |
252 | sshd server | |
253 | sftp-server server | |
254 | .* base | |
255 | EOF | |
256 | ||
257 | ||
258 | %Clean | |
259 | %{rmDESTDIR} | |
260 | ||
261 | ||
262 | %Post | |
263 | # Generate host key when none is present to get up and running, | |
264 | # both client and server require this for host-based auth! | |
265 | # ssh-host-keygen checks for existing keys. | |
266 | /usr/sbin/ssh-host-keygen | |
267 | : # to protect the rpm database | |
268 | ||
269 | ||
270 | %Post server | |
271 | if [ -x %{LSBinit}-install ]; then | |
272 | %{LSBinit}-install sshd | |
1877dc0c | 273 | else |
b1e2a48c | 274 | lisa --SysV-init install sshd S55 3:4:5 K45 0:1:2:6 |
1877dc0c | 275 | fi |
276 | ||
b1e2a48c | 277 | ! %{SVIdir}/sshd status || %{SVIdir}/sshd restart |
278 | : # to protect the rpm database | |
279 | ||
280 | ||
281 | %PreUn server | |
282 | [ "$1" = 0 ] || exit 0 | |
283 | ||
284 | ! %{SVIdir}/sshd status || %{SVIdir}/sshd stop | |
285 | : # to protect the rpm database | |
286 | ||
287 | ||
288 | %PostUn server | |
289 | if [ -x %{LSBinit}-remove ]; then | |
290 | %{LSBinit}-remove sshd | |
291 | else | |
292 | lisa --SysV-init remove sshd $1 | |
1877dc0c | 293 | fi |
b1e2a48c | 294 | : # to protect the rpm database |
1877dc0c | 295 | |
b1e2a48c | 296 | |
297 | %Files -f files-%{Name}-base | |
1877dc0c | 298 | %defattr(-,root,root) |
b1e2a48c | 299 | |
300 | ||
301 | %Files server -f files-%{Name}-server | |
1877dc0c | 302 | %defattr(-,root,root) |
b1e2a48c | 303 | |
304 | ||
305 | %Files askpass -f files-%{Name}-askpass | |
1877dc0c | 306 | %defattr(-,root,root) |
1877dc0c | 307 | |
b1e2a48c | 308 | |
309 | %ChangeLog | |
310 | * Mon Jan 01 1998 ... | |
311 | Template Version: 1.31 | |
312 | ||
313 | $Id$ |