]> andersk Git - openssh.git/blame - contrib/caldera/openssh.spec
- (djm) More makefile infrastructre for smartcard support, also based
[openssh.git] / contrib / caldera / openssh.spec
CommitLineData
afb9165e 1%define askpass 1.2.2
b1e2a48c 2
3Name : openssh
afb9165e 4Version : 2.9p2
5Release : 3
b1e2a48c 6Group : System/Network
7
8Summary : OpenSSH free Secure Shell (SSH) implementation.
9Summary(de) : OpenSSH - freie Implementation der Secure Shell (SSH).
10Summary(es) : OpenSSH implementación libre de Secure Shell (SSH).
11Summary(fr) : Implémentation libre du shell sécurisé OpenSSH (SSH).
12Summary(it) : Implementazione gratuita OpenSSH della Secure Shell.
13Summary(pt) : Implementação livre OpenSSH do protocolo 'Secure Shell' (SSH).
afb9165e 14Summary(pt_BR) : Implementação livre OpenSSH do protocolo Secure Shell (SSH).
b1e2a48c 15
16Copyright : BSD
17Packager : Stephan Seyboth <sps@caldera.de>
18#Icon : .
19URL : http://www.openssh.com/
20
21Obsoletes : ssh, ssh-clients, openssh-clients
22
23BuildRoot : /tmp/%{Name}-%{Version}
24
25Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{Version}.tar.gz
26Source1: http://www.ntrnet.net/~jmknoble/software/x11-ssh-askpass/x11-ssh-askpass-%{askpass}.tar.gz
afb9165e 27Source2: http://www.openssh.com/openssh-faq.html
b1e2a48c 28
29
30%Package server
31Group : System/Network
32Requires : openssh = %{Version}
33Obsoletes : ssh-server
34
35Summary : OpenSSH Secure Shell protocol server (sshd).
afb9165e 36Summary(de) : OpenSSH Secure Shell Protocol-Server (sshd).
b1e2a48c 37Summary(es) : Servidor del protocolo OpenSSH Secure Shell (sshd).
38Summary(fr) : Serveur de protocole du shell sécurisé OpenSSH (sshd).
39Summary(it) : Server OpenSSH per il protocollo Secure Shell (sshd).
40Summary(pt) : Servidor do protocolo 'Secure Shell' OpenSSH (sshd).
afb9165e 41Summary(pt_BR) : Servidor do protocolo Secure Shell OpenSSH (sshd).
b1e2a48c 42
43
44%Package askpass
45Group : System/Network
46Requires : openssh = %{Version}
47Obsoletes : ssh-extras
48
49Summary : OpenSSH X11 pass-phrase dialog.
50Summary(de) : OpenSSH X11 Passwort-Dialog.
51Summary(es) : Aplicación de petición de frase clave OpenSSH X11.
52Summary(fr) : Dialogue pass-phrase X11 d'OpenSSH.
53Summary(it) : Finestra di dialogo X11 per la frase segreta di OpenSSH.
54Summary(pt) : Diálogo de pedido de senha para X11 do OpenSSH.
afb9165e 55Summary(pt_BR) : Diálogo de pedido de senha para X11 do OpenSSH.
b1e2a48c 56
57
58%Description
59OpenSSH (Secure Shell) provides access to a remote system. It replaces
60telnet, rlogin, rexec, and rsh, and provides secure encrypted
61communications between two untrusted hosts over an insecure network.
62X11 connections and arbitrary TCP/IP ports can also be forwarded over
63the secure channel.
64
65%Description -l de
66OpenSSH (Secure Shell) stellt den Zugang zu anderen Rechnern her. Es ersetzt
67telnet, rlogin, rexec und rsh und stellt eine sichere, verschlüsselte
68Verbindung zwischen zwei nicht vertrauenswürdigen Hosts über eine unsicheres
69Netzwerk her. X11 Verbindungen und beliebige andere TCP/IP Ports können ebenso
70über den sicheren Channel weitergeleitet werden.
71
72%Description -l es
73OpenSSH (Secure Shell) proporciona acceso a sistemas remotos. Reemplaza a
74telnet, rlogin, rexec, y rsh, y proporciona comunicaciones seguras encriptadas
75entre dos equipos entre los que no se ha establecido confianza a través de una
76red insegura. Las conexiones X11 y puertos TCP/IP arbitrarios también pueden
77ser canalizadas sobre el canal seguro.
78
79%Description -l fr
80OpenSSH (Secure Shell) fournit un accès à un système distant. Il remplace
81telnet, rlogin, rexec et rsh, tout en assurant des communications cryptées
82securisées entre deux hôtes non fiabilisés sur un réseau non sécurisé. Des
83connexions X11 et des ports TCP/IP arbitraires peuvent également être
84transmis sur le canal sécurisé.
85
86%Description -l it
87OpenSSH (Secure Shell) fornisce l'accesso ad un sistema remoto.
88Sostituisce telnet, rlogin, rexec, e rsh, e fornisce comunicazioni sicure
89e crittate tra due host non fidati su una rete non sicura. Le connessioni
90X11 ad una porta TCP/IP arbitraria possono essere inoltrate attraverso
91un canale sicuro.
92
93%Description -l pt
94OpenSSH (Secure Shell) fornece acesso a um sistema remoto. Substitui o
95telnet, rlogin, rexec, e o rsh e fornece comunicações seguras e cifradas
96entre duas máquinas sem confiança mútua sobre uma rede insegura.
97Ligações X11 e portos TCP/IP arbitrários também poder ser reenviados
afb9165e 98pelo canal seguro.
99
100%Description -l pt_BR
101O OpenSSH (Secure Shell) fornece acesso a um sistema remoto. Substitui o
102telnet, rlogin, rexec, e o rsh e fornece comunicações seguras e criptografadas
103entre duas máquinas sem confiança mútua sobre uma rede insegura.
104Ligações X11 e portas TCP/IP arbitrárias também podem ser reenviadas
105pelo canal seguro.
b1e2a48c 106
107%Description server
108This package installs the sshd, the server portion of OpenSSH.
109
110%Description -l de server
111Dieses Paket installiert den sshd, den Server-Teil der OpenSSH.
112
113%Description -l es server
114Este paquete instala sshd, la parte servidor de OpenSSH.
115
116%Description -l fr server
117Ce paquetage installe le 'sshd', partie serveur de OpenSSH.
118
119%Description -l it server
120Questo pacchetto installa sshd, il server di OpenSSH.
121
122%Description -l pt server
123Este pacote intala o sshd, o servidor do OpenSSH.
124
afb9165e 125%Description -l pt_BR server
126Este pacote intala o sshd, o servidor do OpenSSH.
127
b1e2a48c 128%Description askpass
129This package contains an X11-based passphrase dialog.
130
131%Description -l de askpass
132Dieses Paket enthält einen X11-basierten Passwort Dialog.
133
134%Description -l es askpass
135Este paquete contiene una aplicación para petición de frases-contraseña basada
136en X11.
137
138%Description -l fr askpass
139Ce paquetage contient un dialogue de passphrase basé sur X11.
140
141%Description -l it askpass
142Questo pacchetto contiene una finestra di X11 che chiede la frase segreta.
143
144%Description -l pt askpass
145Este pacote contém um diálogo de senha para o X11.
146
afb9165e 147%Description -l pt_BR askpass
148Este pacote contem um diálogo de frase-senha para o X11.
149
b1e2a48c 150%Prep
151%setup
152%setup -D -T -a1
153
154
155%Build
156CFLAGS="$RPM_OPT_FLAGS" \
157./configure \
158 --prefix=/usr \
159 --sysconfdir=/etc/ssh \
160 --libexecdir=/usr/lib/ssh \
161 --with-pam \
162 --with-tcp-wrappers \
163 --with-ipv4-default \
1877dc0c 164
165make
166
b1e2a48c 167cd x11-ssh-askpass-%{askpass}
afb9165e 168./configure
169xmkmf
170make includes
1877dc0c 171make
b1e2a48c 172
173
174%Install
175%{mkDESTDIR}
176
177make DESTDIR="$DESTDIR" install
178
179make -C x11-ssh-askpass-%{askpass} DESTDIR="$DESTDIR" \
180 BINDIR="/usr/lib/ssh" install
181
182%{fixManPages}
183
184# install remaining docs
185NV="$DESTDIR%{_defaultdocdir}/%{Name}-%{Version}"
186mkdir -p $NV
187cp -a CREDITS ChangeLog LICENCE OVERVIEW README* TODO $NV
afb9165e 188cp %{SOURCE2} $NV/faq.html
b1e2a48c 189mkdir -p $NV/x11-ssh-askpass-%{askpass}
afb9165e 190cp -a x11-ssh-askpass-%{askpass}/{README,ChangeLog,TODO,SshAskpass*.ad} \
b1e2a48c 191 $NV/x11-ssh-askpass-%{askpass}
192
193
194# OpenLinux specific configuration
195mkdir -p $DESTDIR/{etc/pam.d,%{SVIcdir},%{SVIdir}}
196
197# enabling X11 forwarding on the server is convenient and okay,
198# on the client side it's a potential security risk!
199%{fixUP} -vg $DESTDIR/etc/ssh/sshd_config 'X11Forwarding no' \
200 'X11Forwarding yes'
201
afb9165e 202cat <<-EOF >> $DESTDIR/etc/ssh/ssh_config
203
204 # This retains the old behaviour of trying the SSH1 protocol
205 # before the more secure SSH2 one. Note that the SSH2 keys are
206 # stored in a different format so you will have to generate and
207 # distribute a new public/private key pair to migrate. See the
208 # ssh(1) man-page for details
209 Host *
210 Protocol 1,2
211EOF
212
b1e2a48c 213install -m644 contrib/caldera/sshd.pam $DESTDIR/etc/pam.d/sshd
214# FIXME: disabled, find out why this doesn't work with nis
215%{fixUP} -vg $DESTDIR/etc/pam.d/sshd '(.*pam_limits.*)' '#$1'
216
217install -m 0755 contrib/caldera/sshd.init $DESTDIR%{SVIdir}/sshd
218%{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@SVIdir\@:%{SVIdir}:'
219%{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@sysconfdir\@:/etc/ssh:'
220
221cat <<-EoD > $DESTDIR%{SVIcdir}/sshd
222 IDENT=sshd
223 DESCRIPTIVE="OpenSSH secure shell daemon"
224 # This service will be marked as 'skipped' on boot if there
225 # is no host key. Use ssh-host-keygen to generate one
226 ONBOOT="yes"
227 OPTIONS=""
228EoD
229
230SKG=$DESTDIR/usr/sbin/ssh-host-keygen
231install -m 0755 contrib/caldera/ssh-host-keygen $SKG
232%{fixUP} -T $SKG -e 's:\@sysconfdir\@:/etc/ssh:'
233%{fixUP} -T $SKG -e 's:\@sshkeygen\@:/usr/bin/ssh-keygen:'
234
235
236# generate file lists
237%{mkLists} -c %{Name}
238%{mkLists} -d %{Name} << 'EOF'
239/etc/ssh base
240^/etc/ IGNORED
241%{_defaultdocdir}/$ IGNORED
242askpass askpass
243* default
244EOF
245%{mkLists} -a -f %{Name} << 'EOF'
246^/etc * prefix(%%config)
247/usr/X11R6/lib/X11/app-defaults IGNORED
248[Aa]skpass askpass
249%{_defaultdocdir}/%{Name}-%{Version}/ base
250ssh-keygen base
251sshd server
252sftp-server server
253.* base
254EOF
255
256
257%Clean
258%{rmDESTDIR}
259
260
261%Post
262# Generate host key when none is present to get up and running,
263# both client and server require this for host-based auth!
264# ssh-host-keygen checks for existing keys.
265/usr/sbin/ssh-host-keygen
266: # to protect the rpm database
267
268
269%Post server
270if [ -x %{LSBinit}-install ]; then
271 %{LSBinit}-install sshd
1877dc0c 272else
b1e2a48c 273 lisa --SysV-init install sshd S55 3:4:5 K45 0:1:2:6
1877dc0c 274fi
275
b1e2a48c 276! %{SVIdir}/sshd status || %{SVIdir}/sshd restart
277: # to protect the rpm database
278
279
280%PreUn server
281[ "$1" = 0 ] || exit 0
282
283! %{SVIdir}/sshd status || %{SVIdir}/sshd stop
284: # to protect the rpm database
285
286
287%PostUn server
288if [ -x %{LSBinit}-remove ]; then
289 %{LSBinit}-remove sshd
290else
291 lisa --SysV-init remove sshd $1
1877dc0c 292fi
b1e2a48c 293: # to protect the rpm database
1877dc0c 294
b1e2a48c 295
296%Files -f files-%{Name}-base
1877dc0c 297%defattr(-,root,root)
b1e2a48c 298
299
300%Files server -f files-%{Name}-server
1877dc0c 301%defattr(-,root,root)
b1e2a48c 302
303
304%Files askpass -f files-%{Name}-askpass
1877dc0c 305%defattr(-,root,root)
1877dc0c 306
b1e2a48c 307
308%ChangeLog
309* Mon Jan 01 1998 ...
310Template Version: 1.31
311
312$Id$
This page took 0.122339 seconds and 5 git commands to generate.