]> andersk Git - openssh.git/blame - contrib/caldera/openssh.spec
Sync version numbers with stable branch
[openssh.git] / contrib / caldera / openssh.spec
CommitLineData
e3d5570b 1%define askpass 1.2.4.1
b1e2a48c 2
3Name : openssh
cc2572fc 4Version : 2.9.9p2
afb9165e 5Release : 3
b1e2a48c 6Group : System/Network
7
8Summary : OpenSSH free Secure Shell (SSH) implementation.
9Summary(de) : OpenSSH - freie Implementation der Secure Shell (SSH).
10Summary(es) : OpenSSH implementación libre de Secure Shell (SSH).
11Summary(fr) : Implémentation libre du shell sécurisé OpenSSH (SSH).
12Summary(it) : Implementazione gratuita OpenSSH della Secure Shell.
13Summary(pt) : Implementação livre OpenSSH do protocolo 'Secure Shell' (SSH).
afb9165e 14Summary(pt_BR) : Implementação livre OpenSSH do protocolo Secure Shell (SSH).
b1e2a48c 15
16Copyright : BSD
17Packager : Stephan Seyboth <sps@caldera.de>
18#Icon : .
19URL : http://www.openssh.com/
20
21Obsoletes : ssh, ssh-clients, openssh-clients
22
23BuildRoot : /tmp/%{Name}-%{Version}
24
25Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{Version}.tar.gz
26Source1: http://www.ntrnet.net/~jmknoble/software/x11-ssh-askpass/x11-ssh-askpass-%{askpass}.tar.gz
afb9165e 27Source2: http://www.openssh.com/openssh-faq.html
b1e2a48c 28
29
30%Package server
31Group : System/Network
32Requires : openssh = %{Version}
33Obsoletes : ssh-server
34
35Summary : OpenSSH Secure Shell protocol server (sshd).
afb9165e 36Summary(de) : OpenSSH Secure Shell Protocol-Server (sshd).
b1e2a48c 37Summary(es) : Servidor del protocolo OpenSSH Secure Shell (sshd).
38Summary(fr) : Serveur de protocole du shell sécurisé OpenSSH (sshd).
39Summary(it) : Server OpenSSH per il protocollo Secure Shell (sshd).
40Summary(pt) : Servidor do protocolo 'Secure Shell' OpenSSH (sshd).
afb9165e 41Summary(pt_BR) : Servidor do protocolo Secure Shell OpenSSH (sshd).
b1e2a48c 42
43
44%Package askpass
45Group : System/Network
46Requires : openssh = %{Version}
47Obsoletes : ssh-extras
48
49Summary : OpenSSH X11 pass-phrase dialog.
50Summary(de) : OpenSSH X11 Passwort-Dialog.
51Summary(es) : Aplicación de petición de frase clave OpenSSH X11.
52Summary(fr) : Dialogue pass-phrase X11 d'OpenSSH.
53Summary(it) : Finestra di dialogo X11 per la frase segreta di OpenSSH.
54Summary(pt) : Diálogo de pedido de senha para X11 do OpenSSH.
afb9165e 55Summary(pt_BR) : Diálogo de pedido de senha para X11 do OpenSSH.
b1e2a48c 56
57
58%Description
59OpenSSH (Secure Shell) provides access to a remote system. It replaces
60telnet, rlogin, rexec, and rsh, and provides secure encrypted
61communications between two untrusted hosts over an insecure network.
62X11 connections and arbitrary TCP/IP ports can also be forwarded over
63the secure channel.
64
65%Description -l de
66OpenSSH (Secure Shell) stellt den Zugang zu anderen Rechnern her. Es ersetzt
67telnet, rlogin, rexec und rsh und stellt eine sichere, verschlüsselte
68Verbindung zwischen zwei nicht vertrauenswürdigen Hosts über eine unsicheres
69Netzwerk her. X11 Verbindungen und beliebige andere TCP/IP Ports können ebenso
70über den sicheren Channel weitergeleitet werden.
71
72%Description -l es
73OpenSSH (Secure Shell) proporciona acceso a sistemas remotos. Reemplaza a
74telnet, rlogin, rexec, y rsh, y proporciona comunicaciones seguras encriptadas
75entre dos equipos entre los que no se ha establecido confianza a través de una
76red insegura. Las conexiones X11 y puertos TCP/IP arbitrarios también pueden
77ser canalizadas sobre el canal seguro.
78
79%Description -l fr
80OpenSSH (Secure Shell) fournit un accès à un système distant. Il remplace
81telnet, rlogin, rexec et rsh, tout en assurant des communications cryptées
82securisées entre deux hôtes non fiabilisés sur un réseau non sécurisé. Des
83connexions X11 et des ports TCP/IP arbitraires peuvent également être
84transmis sur le canal sécurisé.
85
86%Description -l it
87OpenSSH (Secure Shell) fornisce l'accesso ad un sistema remoto.
88Sostituisce telnet, rlogin, rexec, e rsh, e fornisce comunicazioni sicure
89e crittate tra due host non fidati su una rete non sicura. Le connessioni
90X11 ad una porta TCP/IP arbitraria possono essere inoltrate attraverso
91un canale sicuro.
92
93%Description -l pt
94OpenSSH (Secure Shell) fornece acesso a um sistema remoto. Substitui o
95telnet, rlogin, rexec, e o rsh e fornece comunicações seguras e cifradas
96entre duas máquinas sem confiança mútua sobre uma rede insegura.
97Ligações X11 e portos TCP/IP arbitrários também poder ser reenviados
afb9165e 98pelo canal seguro.
99
100%Description -l pt_BR
101O OpenSSH (Secure Shell) fornece acesso a um sistema remoto. Substitui o
102telnet, rlogin, rexec, e o rsh e fornece comunicações seguras e criptografadas
103entre duas máquinas sem confiança mútua sobre uma rede insegura.
104Ligações X11 e portas TCP/IP arbitrárias também podem ser reenviadas
105pelo canal seguro.
b1e2a48c 106
107%Description server
108This package installs the sshd, the server portion of OpenSSH.
109
110%Description -l de server
111Dieses Paket installiert den sshd, den Server-Teil der OpenSSH.
112
113%Description -l es server
114Este paquete instala sshd, la parte servidor de OpenSSH.
115
116%Description -l fr server
117Ce paquetage installe le 'sshd', partie serveur de OpenSSH.
118
119%Description -l it server
120Questo pacchetto installa sshd, il server di OpenSSH.
121
122%Description -l pt server
123Este pacote intala o sshd, o servidor do OpenSSH.
124
afb9165e 125%Description -l pt_BR server
126Este pacote intala o sshd, o servidor do OpenSSH.
127
b1e2a48c 128%Description askpass
129This package contains an X11-based passphrase dialog.
130
131%Description -l de askpass
132Dieses Paket enthält einen X11-basierten Passwort Dialog.
133
134%Description -l es askpass
135Este paquete contiene una aplicación para petición de frases-contraseña basada
136en X11.
137
138%Description -l fr askpass
139Ce paquetage contient un dialogue de passphrase basé sur X11.
140
141%Description -l it askpass
142Questo pacchetto contiene una finestra di X11 che chiede la frase segreta.
143
144%Description -l pt askpass
145Este pacote contém um diálogo de senha para o X11.
146
afb9165e 147%Description -l pt_BR askpass
148Este pacote contem um diálogo de frase-senha para o X11.
149
b1e2a48c 150%Prep
151%setup
152%setup -D -T -a1
153
154
155%Build
156CFLAGS="$RPM_OPT_FLAGS" \
157./configure \
158 --prefix=/usr \
159 --sysconfdir=/etc/ssh \
160 --libexecdir=/usr/lib/ssh \
4b255446 161 --datadir=/usr/share/openssh \
b1e2a48c 162 --with-pam \
163 --with-tcp-wrappers \
164 --with-ipv4-default \
1877dc0c 165
166make
167
b1e2a48c 168cd x11-ssh-askpass-%{askpass}
afb9165e 169./configure
170xmkmf
171make includes
1877dc0c 172make
b1e2a48c 173
174
175%Install
176%{mkDESTDIR}
177
178make DESTDIR="$DESTDIR" install
179
180make -C x11-ssh-askpass-%{askpass} DESTDIR="$DESTDIR" \
181 BINDIR="/usr/lib/ssh" install
182
183%{fixManPages}
184
185# install remaining docs
186NV="$DESTDIR%{_defaultdocdir}/%{Name}-%{Version}"
187mkdir -p $NV
188cp -a CREDITS ChangeLog LICENCE OVERVIEW README* TODO $NV
afb9165e 189cp %{SOURCE2} $NV/faq.html
b1e2a48c 190mkdir -p $NV/x11-ssh-askpass-%{askpass}
afb9165e 191cp -a x11-ssh-askpass-%{askpass}/{README,ChangeLog,TODO,SshAskpass*.ad} \
b1e2a48c 192 $NV/x11-ssh-askpass-%{askpass}
193
194
195# OpenLinux specific configuration
196mkdir -p $DESTDIR/{etc/pam.d,%{SVIcdir},%{SVIdir}}
197
198# enabling X11 forwarding on the server is convenient and okay,
199# on the client side it's a potential security risk!
200%{fixUP} -vg $DESTDIR/etc/ssh/sshd_config 'X11Forwarding no' \
201 'X11Forwarding yes'
202
afb9165e 203cat <<-EOF >> $DESTDIR/etc/ssh/ssh_config
204
205 # This retains the old behaviour of trying the SSH1 protocol
206 # before the more secure SSH2 one. Note that the SSH2 keys are
207 # stored in a different format so you will have to generate and
208 # distribute a new public/private key pair to migrate. See the
209 # ssh(1) man-page for details
210 Host *
211 Protocol 1,2
212EOF
213
b1e2a48c 214install -m644 contrib/caldera/sshd.pam $DESTDIR/etc/pam.d/sshd
215# FIXME: disabled, find out why this doesn't work with nis
216%{fixUP} -vg $DESTDIR/etc/pam.d/sshd '(.*pam_limits.*)' '#$1'
217
218install -m 0755 contrib/caldera/sshd.init $DESTDIR%{SVIdir}/sshd
219%{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@SVIdir\@:%{SVIdir}:'
220%{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@sysconfdir\@:/etc/ssh:'
221
222cat <<-EoD > $DESTDIR%{SVIcdir}/sshd
223 IDENT=sshd
224 DESCRIPTIVE="OpenSSH secure shell daemon"
225 # This service will be marked as 'skipped' on boot if there
226 # is no host key. Use ssh-host-keygen to generate one
227 ONBOOT="yes"
228 OPTIONS=""
229EoD
230
231SKG=$DESTDIR/usr/sbin/ssh-host-keygen
232install -m 0755 contrib/caldera/ssh-host-keygen $SKG
233%{fixUP} -T $SKG -e 's:\@sysconfdir\@:/etc/ssh:'
234%{fixUP} -T $SKG -e 's:\@sshkeygen\@:/usr/bin/ssh-keygen:'
235
236
237# generate file lists
238%{mkLists} -c %{Name}
239%{mkLists} -d %{Name} << 'EOF'
240/etc/ssh base
241^/etc/ IGNORED
242%{_defaultdocdir}/$ IGNORED
243askpass askpass
244* default
245EOF
246%{mkLists} -a -f %{Name} << 'EOF'
247^/etc * prefix(%%config)
248/usr/X11R6/lib/X11/app-defaults IGNORED
249[Aa]skpass askpass
250%{_defaultdocdir}/%{Name}-%{Version}/ base
251ssh-keygen base
252sshd server
253sftp-server server
254.* base
255EOF
256
257
258%Clean
259%{rmDESTDIR}
260
261
262%Post
263# Generate host key when none is present to get up and running,
264# both client and server require this for host-based auth!
265# ssh-host-keygen checks for existing keys.
266/usr/sbin/ssh-host-keygen
267: # to protect the rpm database
268
269
270%Post server
271if [ -x %{LSBinit}-install ]; then
272 %{LSBinit}-install sshd
1877dc0c 273else
b1e2a48c 274 lisa --SysV-init install sshd S55 3:4:5 K45 0:1:2:6
1877dc0c 275fi
276
b1e2a48c 277! %{SVIdir}/sshd status || %{SVIdir}/sshd restart
278: # to protect the rpm database
279
280
281%PreUn server
282[ "$1" = 0 ] || exit 0
283
284! %{SVIdir}/sshd status || %{SVIdir}/sshd stop
285: # to protect the rpm database
286
287
288%PostUn server
289if [ -x %{LSBinit}-remove ]; then
290 %{LSBinit}-remove sshd
291else
292 lisa --SysV-init remove sshd $1
1877dc0c 293fi
b1e2a48c 294: # to protect the rpm database
1877dc0c 295
b1e2a48c 296
297%Files -f files-%{Name}-base
1877dc0c 298%defattr(-,root,root)
b1e2a48c 299
300
301%Files server -f files-%{Name}-server
1877dc0c 302%defattr(-,root,root)
b1e2a48c 303
304
305%Files askpass -f files-%{Name}-askpass
1877dc0c 306%defattr(-,root,root)
1877dc0c 307
b1e2a48c 308
309%ChangeLog
310* Mon Jan 01 1998 ...
311Template Version: 1.31
312
313$Id$
This page took 0.127427 seconds and 5 git commands to generate.