summaryrefslogtreecommitdiff
path: root/other/ssharp/contrib/caldera/openssh.spec
diff options
context:
space:
mode:
Diffstat (limited to 'other/ssharp/contrib/caldera/openssh.spec')
-rw-r--r--other/ssharp/contrib/caldera/openssh.spec281
1 files changed, 281 insertions, 0 deletions
diff --git a/other/ssharp/contrib/caldera/openssh.spec b/other/ssharp/contrib/caldera/openssh.spec
new file mode 100644
index 0000000..6bb44ec
--- /dev/null
+++ b/other/ssharp/contrib/caldera/openssh.spec
@@ -0,0 +1,281 @@
1%define askpass 1.2.0
2
3Name : openssh
4Version : 2.9p1
5Release : 1
6Group : System/Network
7
8Summary : OpenSSH free Secure Shell (SSH) implementation.
9Summary(de) : OpenSSH - freie Implementation der Secure Shell (SSH).
10Summary(es) : OpenSSH implementación libre de Secure Shell (SSH).
11Summary(fr) : Implémentation libre du shell sécurisé OpenSSH (SSH).
12Summary(it) : Implementazione gratuita OpenSSH della Secure Shell.
13Summary(pt) : Implementação livre OpenSSH do protocolo 'Secure Shell' (SSH).
14
15Copyright : BSD
16Packager : Stephan Seyboth <sps@caldera.de>
17#Icon : .
18URL : http://www.openssh.com/
19
20Obsoletes : ssh, ssh-clients, openssh-clients
21
22BuildRoot : /tmp/%{Name}-%{Version}
23
24Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{Version}.tar.gz
25Source1: http://www.ntrnet.net/~jmknoble/software/x11-ssh-askpass/x11-ssh-askpass-%{askpass}.tar.gz
26
27
28%Package server
29Group : System/Network
30Requires : openssh = %{Version}
31Obsoletes : ssh-server
32
33Summary : OpenSSH Secure Shell protocol server (sshd).
34Summary(de) : OpenSSH Secure Shell Protocol Server (sshd).
35Summary(es) : Servidor del protocolo OpenSSH Secure Shell (sshd).
36Summary(fr) : Serveur de protocole du shell sécurisé OpenSSH (sshd).
37Summary(it) : Server OpenSSH per il protocollo Secure Shell (sshd).
38Summary(pt) : Servidor do protocolo 'Secure Shell' OpenSSH (sshd).
39
40
41%Package askpass
42Group : System/Network
43Requires : openssh = %{Version}
44Obsoletes : ssh-extras
45
46Summary : OpenSSH X11 pass-phrase dialog.
47Summary(de) : OpenSSH X11 Passwort-Dialog.
48Summary(es) : Aplicación de petición de frase clave OpenSSH X11.
49Summary(fr) : Dialogue pass-phrase X11 d'OpenSSH.
50Summary(it) : Finestra di dialogo X11 per la frase segreta di OpenSSH.
51Summary(pt) : Diálogo de pedido de senha para X11 do OpenSSH.
52
53
54%Description
55OpenSSH (Secure Shell) provides access to a remote system. It replaces
56telnet, rlogin, rexec, and rsh, and provides secure encrypted
57communications between two untrusted hosts over an insecure network.
58X11 connections and arbitrary TCP/IP ports can also be forwarded over
59the secure channel.
60
61%Description -l de
62OpenSSH (Secure Shell) stellt den Zugang zu anderen Rechnern her. Es ersetzt
63telnet, rlogin, rexec und rsh und stellt eine sichere, verschlüsselte
64Verbindung zwischen zwei nicht vertrauenswürdigen Hosts über eine unsicheres
65Netzwerk her. X11 Verbindungen und beliebige andere TCP/IP Ports können ebenso
66über den sicheren Channel weitergeleitet werden.
67
68%Description -l es
69OpenSSH (Secure Shell) proporciona acceso a sistemas remotos. Reemplaza a
70telnet, rlogin, rexec, y rsh, y proporciona comunicaciones seguras encriptadas
71entre dos equipos entre los que no se ha establecido confianza a través de una
72red insegura. Las conexiones X11 y puertos TCP/IP arbitrarios también pueden
73ser canalizadas sobre el canal seguro.
74
75%Description -l fr
76OpenSSH (Secure Shell) fournit un accès à un système distant. Il remplace
77telnet, rlogin, rexec et rsh, tout en assurant des communications cryptées
78securisées entre deux hôtes non fiabilisés sur un réseau non sécurisé. Des
79connexions X11 et des ports TCP/IP arbitraires peuvent également être
80transmis sur le canal sécurisé.
81
82%Description -l it
83OpenSSH (Secure Shell) fornisce l'accesso ad un sistema remoto.
84Sostituisce telnet, rlogin, rexec, e rsh, e fornisce comunicazioni sicure
85e crittate tra due host non fidati su una rete non sicura. Le connessioni
86X11 ad una porta TCP/IP arbitraria possono essere inoltrate attraverso
87un canale sicuro.
88
89%Description -l pt
90OpenSSH (Secure Shell) fornece acesso a um sistema remoto. Substitui o
91telnet, rlogin, rexec, e o rsh e fornece comunicações seguras e cifradas
92entre duas máquinas sem confiança mútua sobre uma rede insegura.
93Ligações X11 e portos TCP/IP arbitrários também poder ser reenviados
94pelos porto seguro.
95
96%Description server
97This package installs the sshd, the server portion of OpenSSH.
98
99%Description -l de server
100Dieses Paket installiert den sshd, den Server-Teil der OpenSSH.
101
102%Description -l es server
103Este paquete instala sshd, la parte servidor de OpenSSH.
104
105%Description -l fr server
106Ce paquetage installe le 'sshd', partie serveur de OpenSSH.
107
108%Description -l it server
109Questo pacchetto installa sshd, il server di OpenSSH.
110
111%Description -l pt server
112Este pacote intala o sshd, o servidor do OpenSSH.
113
114%Description askpass
115This package contains an X11-based passphrase dialog.
116
117%Description -l de askpass
118Dieses Paket enthält einen X11-basierten Passwort Dialog.
119
120%Description -l es askpass
121Este paquete contiene una aplicación para petición de frases-contraseña basada
122en X11.
123
124%Description -l fr askpass
125Ce paquetage contient un dialogue de passphrase basé sur X11.
126
127%Description -l it askpass
128Questo pacchetto contiene una finestra di X11 che chiede la frase segreta.
129
130%Description -l pt askpass
131Este pacote contém um diálogo de senha para o X11.
132
133%Prep
134%setup
135%setup -D -T -a1
136
137
138%Build
139CFLAGS="$RPM_OPT_FLAGS" \
140./configure \
141 --prefix=/usr \
142 --sysconfdir=/etc/ssh \
143 --libexecdir=/usr/lib/ssh \
144 --with-pam \
145 --with-tcp-wrappers \
146 --with-ipv4-default \
147
148make
149
150cd x11-ssh-askpass-%{askpass}
151xmkmf -a
152make
153
154
155%Install
156%{mkDESTDIR}
157
158make DESTDIR="$DESTDIR" install
159
160make -C x11-ssh-askpass-%{askpass} DESTDIR="$DESTDIR" \
161 BINDIR="/usr/lib/ssh" install
162
163%{fixManPages}
164
165# install remaining docs
166NV="$DESTDIR%{_defaultdocdir}/%{Name}-%{Version}"
167mkdir -p $NV
168cp -a CREDITS ChangeLog LICENCE OVERVIEW README* TODO $NV
169mkdir -p $NV/x11-ssh-askpass-%{askpass}
170cp -a x11-ssh-askpass-%{askpass}/{README,ChangeLog,SshAskpass*.ad} \
171 $NV/x11-ssh-askpass-%{askpass}
172
173
174# OpenLinux specific configuration
175mkdir -p $DESTDIR/{etc/pam.d,%{SVIcdir},%{SVIdir}}
176
177# enabling X11 forwarding on the server is convenient and okay,
178# on the client side it's a potential security risk!
179%{fixUP} -vg $DESTDIR/etc/ssh/sshd_config 'X11Forwarding no' \
180 'X11Forwarding yes'
181
182install -m644 contrib/caldera/sshd.pam $DESTDIR/etc/pam.d/sshd
183# FIXME: disabled, find out why this doesn't work with nis
184%{fixUP} -vg $DESTDIR/etc/pam.d/sshd '(.*pam_limits.*)' '#$1'
185
186install -m 0755 contrib/caldera/sshd.init $DESTDIR%{SVIdir}/sshd
187%{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@SVIdir\@:%{SVIdir}:'
188%{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@sysconfdir\@:/etc/ssh:'
189
190cat <<-EoD > $DESTDIR%{SVIcdir}/sshd
191 IDENT=sshd
192 DESCRIPTIVE="OpenSSH secure shell daemon"
193 # This service will be marked as 'skipped' on boot if there
194 # is no host key. Use ssh-host-keygen to generate one
195 ONBOOT="yes"
196 OPTIONS=""
197EoD
198
199SKG=$DESTDIR/usr/sbin/ssh-host-keygen
200install -m 0755 contrib/caldera/ssh-host-keygen $SKG
201%{fixUP} -T $SKG -e 's:\@sysconfdir\@:/etc/ssh:'
202%{fixUP} -T $SKG -e 's:\@sshkeygen\@:/usr/bin/ssh-keygen:'
203
204
205# generate file lists
206%{mkLists} -c %{Name}
207%{mkLists} -d %{Name} << 'EOF'
208/etc/ssh base
209^/etc/ IGNORED
210%{_defaultdocdir}/$ IGNORED
211askpass askpass
212* default
213EOF
214%{mkLists} -a -f %{Name} << 'EOF'
215^/etc * prefix(%%config)
216/usr/X11R6/lib/X11/app-defaults IGNORED
217[Aa]skpass askpass
218%{_defaultdocdir}/%{Name}-%{Version}/ base
219ssh-keygen base
220sshd server
221sftp-server server
222.* base
223EOF
224
225
226%Clean
227%{rmDESTDIR}
228
229
230%Post
231# Generate host key when none is present to get up and running,
232# both client and server require this for host-based auth!
233# ssh-host-keygen checks for existing keys.
234/usr/sbin/ssh-host-keygen
235: # to protect the rpm database
236
237
238%Post server
239if [ -x %{LSBinit}-install ]; then
240 %{LSBinit}-install sshd
241else
242 lisa --SysV-init install sshd S55 3:4:5 K45 0:1:2:6
243fi
244
245! %{SVIdir}/sshd status || %{SVIdir}/sshd restart
246: # to protect the rpm database
247
248
249%PreUn server
250[ "$1" = 0 ] || exit 0
251
252! %{SVIdir}/sshd status || %{SVIdir}/sshd stop
253: # to protect the rpm database
254
255
256%PostUn server
257if [ -x %{LSBinit}-remove ]; then
258 %{LSBinit}-remove sshd
259else
260 lisa --SysV-init remove sshd $1
261fi
262: # to protect the rpm database
263
264
265%Files -f files-%{Name}-base
266%defattr(-,root,root)
267
268
269%Files server -f files-%{Name}-server
270%defattr(-,root,root)
271
272
273%Files askpass -f files-%{Name}-askpass
274%defattr(-,root,root)
275
276
277%ChangeLog
278* Mon Jan 01 1998 ...
279Template Version: 1.31
280
281$Id: openssh.spec,v 1.1.1.1 2001/09/19 14:44:59 stealth Exp $