diff options
Diffstat (limited to 'other/ssharp/contrib/caldera/openssh.spec')
| -rw-r--r-- | other/ssharp/contrib/caldera/openssh.spec | 281 |
1 files changed, 281 insertions, 0 deletions
diff --git a/other/ssharp/contrib/caldera/openssh.spec b/other/ssharp/contrib/caldera/openssh.spec new file mode 100644 index 0000000..6bb44ec --- /dev/null +++ b/other/ssharp/contrib/caldera/openssh.spec | |||
| @@ -0,0 +1,281 @@ | |||
| 1 | %define askpass 1.2.0 | ||
| 2 | |||
| 3 | Name : openssh | ||
| 4 | Version : 2.9p1 | ||
| 5 | Release : 1 | ||
| 6 | Group : System/Network | ||
| 7 | |||
| 8 | Summary : OpenSSH free Secure Shell (SSH) implementation. | ||
| 9 | Summary(de) : OpenSSH - freie Implementation der Secure Shell (SSH). | ||
| 10 | Summary(es) : OpenSSH implementación libre de Secure Shell (SSH). | ||
| 11 | Summary(fr) : Implémentation libre du shell sécurisé OpenSSH (SSH). | ||
| 12 | Summary(it) : Implementazione gratuita OpenSSH della Secure Shell. | ||
| 13 | Summary(pt) : Implementação livre OpenSSH do protocolo 'Secure Shell' (SSH). | ||
| 14 | |||
| 15 | Copyright : BSD | ||
| 16 | Packager : Stephan Seyboth <sps@caldera.de> | ||
| 17 | #Icon : . | ||
| 18 | URL : http://www.openssh.com/ | ||
| 19 | |||
| 20 | Obsoletes : ssh, ssh-clients, openssh-clients | ||
| 21 | |||
| 22 | BuildRoot : /tmp/%{Name}-%{Version} | ||
| 23 | |||
| 24 | Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{Version}.tar.gz | ||
| 25 | Source1: http://www.ntrnet.net/~jmknoble/software/x11-ssh-askpass/x11-ssh-askpass-%{askpass}.tar.gz | ||
| 26 | |||
| 27 | |||
| 28 | %Package server | ||
| 29 | Group : System/Network | ||
| 30 | Requires : openssh = %{Version} | ||
| 31 | Obsoletes : ssh-server | ||
| 32 | |||
| 33 | Summary : OpenSSH Secure Shell protocol server (sshd). | ||
| 34 | Summary(de) : OpenSSH Secure Shell Protocol Server (sshd). | ||
| 35 | Summary(es) : Servidor del protocolo OpenSSH Secure Shell (sshd). | ||
| 36 | Summary(fr) : Serveur de protocole du shell sécurisé OpenSSH (sshd). | ||
| 37 | Summary(it) : Server OpenSSH per il protocollo Secure Shell (sshd). | ||
| 38 | Summary(pt) : Servidor do protocolo 'Secure Shell' OpenSSH (sshd). | ||
| 39 | |||
| 40 | |||
| 41 | %Package askpass | ||
| 42 | Group : System/Network | ||
| 43 | Requires : openssh = %{Version} | ||
| 44 | Obsoletes : ssh-extras | ||
| 45 | |||
| 46 | Summary : OpenSSH X11 pass-phrase dialog. | ||
| 47 | Summary(de) : OpenSSH X11 Passwort-Dialog. | ||
| 48 | Summary(es) : Aplicación de petición de frase clave OpenSSH X11. | ||
| 49 | Summary(fr) : Dialogue pass-phrase X11 d'OpenSSH. | ||
| 50 | Summary(it) : Finestra di dialogo X11 per la frase segreta di OpenSSH. | ||
| 51 | Summary(pt) : Diálogo de pedido de senha para X11 do OpenSSH. | ||
| 52 | |||
| 53 | |||
| 54 | %Description | ||
| 55 | OpenSSH (Secure Shell) provides access to a remote system. It replaces | ||
| 56 | telnet, rlogin, rexec, and rsh, and provides secure encrypted | ||
| 57 | communications between two untrusted hosts over an insecure network. | ||
| 58 | X11 connections and arbitrary TCP/IP ports can also be forwarded over | ||
| 59 | the secure channel. | ||
| 60 | |||
| 61 | %Description -l de | ||
| 62 | OpenSSH (Secure Shell) stellt den Zugang zu anderen Rechnern her. Es ersetzt | ||
| 63 | telnet, rlogin, rexec und rsh und stellt eine sichere, verschlüsselte | ||
| 64 | Verbindung zwischen zwei nicht vertrauenswürdigen Hosts über eine unsicheres | ||
| 65 | Netzwerk her. X11 Verbindungen und beliebige andere TCP/IP Ports können ebenso | ||
| 66 | über den sicheren Channel weitergeleitet werden. | ||
| 67 | |||
| 68 | %Description -l es | ||
| 69 | OpenSSH (Secure Shell) proporciona acceso a sistemas remotos. Reemplaza a | ||
| 70 | telnet, rlogin, rexec, y rsh, y proporciona comunicaciones seguras encriptadas | ||
| 71 | entre dos equipos entre los que no se ha establecido confianza a través de una | ||
| 72 | red insegura. Las conexiones X11 y puertos TCP/IP arbitrarios también pueden | ||
| 73 | ser canalizadas sobre el canal seguro. | ||
| 74 | |||
| 75 | %Description -l fr | ||
| 76 | OpenSSH (Secure Shell) fournit un accès à un système distant. Il remplace | ||
| 77 | telnet, rlogin, rexec et rsh, tout en assurant des communications cryptées | ||
| 78 | securisées entre deux hôtes non fiabilisés sur un réseau non sécurisé. Des | ||
| 79 | connexions X11 et des ports TCP/IP arbitraires peuvent également être | ||
| 80 | transmis sur le canal sécurisé. | ||
| 81 | |||
| 82 | %Description -l it | ||
| 83 | OpenSSH (Secure Shell) fornisce l'accesso ad un sistema remoto. | ||
| 84 | Sostituisce telnet, rlogin, rexec, e rsh, e fornisce comunicazioni sicure | ||
| 85 | e crittate tra due host non fidati su una rete non sicura. Le connessioni | ||
| 86 | X11 ad una porta TCP/IP arbitraria possono essere inoltrate attraverso | ||
| 87 | un canale sicuro. | ||
| 88 | |||
| 89 | %Description -l pt | ||
| 90 | OpenSSH (Secure Shell) fornece acesso a um sistema remoto. Substitui o | ||
| 91 | telnet, rlogin, rexec, e o rsh e fornece comunicações seguras e cifradas | ||
| 92 | entre duas máquinas sem confiança mútua sobre uma rede insegura. | ||
| 93 | Ligações X11 e portos TCP/IP arbitrários também poder ser reenviados | ||
| 94 | pelos porto seguro. | ||
| 95 | |||
| 96 | %Description server | ||
| 97 | This package installs the sshd, the server portion of OpenSSH. | ||
| 98 | |||
| 99 | %Description -l de server | ||
| 100 | Dieses Paket installiert den sshd, den Server-Teil der OpenSSH. | ||
| 101 | |||
| 102 | %Description -l es server | ||
| 103 | Este paquete instala sshd, la parte servidor de OpenSSH. | ||
| 104 | |||
| 105 | %Description -l fr server | ||
| 106 | Ce paquetage installe le 'sshd', partie serveur de OpenSSH. | ||
| 107 | |||
| 108 | %Description -l it server | ||
| 109 | Questo pacchetto installa sshd, il server di OpenSSH. | ||
| 110 | |||
| 111 | %Description -l pt server | ||
| 112 | Este pacote intala o sshd, o servidor do OpenSSH. | ||
| 113 | |||
| 114 | %Description askpass | ||
| 115 | This package contains an X11-based passphrase dialog. | ||
| 116 | |||
| 117 | %Description -l de askpass | ||
| 118 | Dieses Paket enthält einen X11-basierten Passwort Dialog. | ||
| 119 | |||
| 120 | %Description -l es askpass | ||
| 121 | Este paquete contiene una aplicación para petición de frases-contraseña basada | ||
| 122 | en X11. | ||
| 123 | |||
| 124 | %Description -l fr askpass | ||
| 125 | Ce paquetage contient un dialogue de passphrase basé sur X11. | ||
| 126 | |||
| 127 | %Description -l it askpass | ||
| 128 | Questo pacchetto contiene una finestra di X11 che chiede la frase segreta. | ||
| 129 | |||
| 130 | %Description -l pt askpass | ||
| 131 | Este pacote contém um diálogo de senha para o X11. | ||
| 132 | |||
| 133 | %Prep | ||
| 134 | %setup | ||
| 135 | %setup -D -T -a1 | ||
| 136 | |||
| 137 | |||
| 138 | %Build | ||
| 139 | CFLAGS="$RPM_OPT_FLAGS" \ | ||
| 140 | ./configure \ | ||
| 141 | --prefix=/usr \ | ||
| 142 | --sysconfdir=/etc/ssh \ | ||
| 143 | --libexecdir=/usr/lib/ssh \ | ||
| 144 | --with-pam \ | ||
| 145 | --with-tcp-wrappers \ | ||
| 146 | --with-ipv4-default \ | ||
| 147 | |||
| 148 | make | ||
| 149 | |||
| 150 | cd x11-ssh-askpass-%{askpass} | ||
| 151 | xmkmf -a | ||
| 152 | make | ||
| 153 | |||
| 154 | |||
| 155 | %Install | ||
| 156 | %{mkDESTDIR} | ||
| 157 | |||
| 158 | make DESTDIR="$DESTDIR" install | ||
| 159 | |||
| 160 | make -C x11-ssh-askpass-%{askpass} DESTDIR="$DESTDIR" \ | ||
| 161 | BINDIR="/usr/lib/ssh" install | ||
| 162 | |||
| 163 | %{fixManPages} | ||
| 164 | |||
| 165 | # install remaining docs | ||
| 166 | NV="$DESTDIR%{_defaultdocdir}/%{Name}-%{Version}" | ||
| 167 | mkdir -p $NV | ||
| 168 | cp -a CREDITS ChangeLog LICENCE OVERVIEW README* TODO $NV | ||
| 169 | mkdir -p $NV/x11-ssh-askpass-%{askpass} | ||
| 170 | cp -a x11-ssh-askpass-%{askpass}/{README,ChangeLog,SshAskpass*.ad} \ | ||
| 171 | $NV/x11-ssh-askpass-%{askpass} | ||
| 172 | |||
| 173 | |||
| 174 | # OpenLinux specific configuration | ||
| 175 | mkdir -p $DESTDIR/{etc/pam.d,%{SVIcdir},%{SVIdir}} | ||
| 176 | |||
| 177 | # enabling X11 forwarding on the server is convenient and okay, | ||
| 178 | # on the client side it's a potential security risk! | ||
| 179 | %{fixUP} -vg $DESTDIR/etc/ssh/sshd_config 'X11Forwarding no' \ | ||
| 180 | 'X11Forwarding yes' | ||
| 181 | |||
| 182 | install -m644 contrib/caldera/sshd.pam $DESTDIR/etc/pam.d/sshd | ||
| 183 | # FIXME: disabled, find out why this doesn't work with nis | ||
| 184 | %{fixUP} -vg $DESTDIR/etc/pam.d/sshd '(.*pam_limits.*)' '#$1' | ||
| 185 | |||
| 186 | install -m 0755 contrib/caldera/sshd.init $DESTDIR%{SVIdir}/sshd | ||
| 187 | %{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@SVIdir\@:%{SVIdir}:' | ||
| 188 | %{fixUP} -T $DESTDIR/%{SVIdir} -e 's:\@sysconfdir\@:/etc/ssh:' | ||
| 189 | |||
| 190 | cat <<-EoD > $DESTDIR%{SVIcdir}/sshd | ||
| 191 | IDENT=sshd | ||
| 192 | DESCRIPTIVE="OpenSSH secure shell daemon" | ||
| 193 | # This service will be marked as 'skipped' on boot if there | ||
| 194 | # is no host key. Use ssh-host-keygen to generate one | ||
| 195 | ONBOOT="yes" | ||
| 196 | OPTIONS="" | ||
| 197 | EoD | ||
| 198 | |||
| 199 | SKG=$DESTDIR/usr/sbin/ssh-host-keygen | ||
| 200 | install -m 0755 contrib/caldera/ssh-host-keygen $SKG | ||
| 201 | %{fixUP} -T $SKG -e 's:\@sysconfdir\@:/etc/ssh:' | ||
| 202 | %{fixUP} -T $SKG -e 's:\@sshkeygen\@:/usr/bin/ssh-keygen:' | ||
| 203 | |||
| 204 | |||
| 205 | # generate file lists | ||
| 206 | %{mkLists} -c %{Name} | ||
| 207 | %{mkLists} -d %{Name} << 'EOF' | ||
| 208 | /etc/ssh base | ||
| 209 | ^/etc/ IGNORED | ||
| 210 | %{_defaultdocdir}/$ IGNORED | ||
| 211 | askpass askpass | ||
| 212 | * default | ||
| 213 | EOF | ||
| 214 | %{mkLists} -a -f %{Name} << 'EOF' | ||
| 215 | ^/etc * prefix(%%config) | ||
| 216 | /usr/X11R6/lib/X11/app-defaults IGNORED | ||
| 217 | [Aa]skpass askpass | ||
| 218 | %{_defaultdocdir}/%{Name}-%{Version}/ base | ||
| 219 | ssh-keygen base | ||
| 220 | sshd server | ||
| 221 | sftp-server server | ||
| 222 | .* base | ||
| 223 | EOF | ||
| 224 | |||
| 225 | |||
| 226 | %Clean | ||
| 227 | %{rmDESTDIR} | ||
| 228 | |||
| 229 | |||
| 230 | %Post | ||
| 231 | # Generate host key when none is present to get up and running, | ||
| 232 | # both client and server require this for host-based auth! | ||
| 233 | # ssh-host-keygen checks for existing keys. | ||
| 234 | /usr/sbin/ssh-host-keygen | ||
| 235 | : # to protect the rpm database | ||
| 236 | |||
| 237 | |||
| 238 | %Post server | ||
| 239 | if [ -x %{LSBinit}-install ]; then | ||
| 240 | %{LSBinit}-install sshd | ||
| 241 | else | ||
| 242 | lisa --SysV-init install sshd S55 3:4:5 K45 0:1:2:6 | ||
| 243 | fi | ||
| 244 | |||
| 245 | ! %{SVIdir}/sshd status || %{SVIdir}/sshd restart | ||
| 246 | : # to protect the rpm database | ||
| 247 | |||
| 248 | |||
| 249 | %PreUn server | ||
| 250 | [ "$1" = 0 ] || exit 0 | ||
| 251 | |||
| 252 | ! %{SVIdir}/sshd status || %{SVIdir}/sshd stop | ||
| 253 | : # to protect the rpm database | ||
| 254 | |||
| 255 | |||
| 256 | %PostUn server | ||
| 257 | if [ -x %{LSBinit}-remove ]; then | ||
| 258 | %{LSBinit}-remove sshd | ||
| 259 | else | ||
| 260 | lisa --SysV-init remove sshd $1 | ||
| 261 | fi | ||
| 262 | : # to protect the rpm database | ||
| 263 | |||
| 264 | |||
| 265 | %Files -f files-%{Name}-base | ||
| 266 | %defattr(-,root,root) | ||
| 267 | |||
| 268 | |||
| 269 | %Files server -f files-%{Name}-server | ||
| 270 | %defattr(-,root,root) | ||
| 271 | |||
| 272 | |||
| 273 | %Files askpass -f files-%{Name}-askpass | ||
| 274 | %defattr(-,root,root) | ||
| 275 | |||
| 276 | |||
| 277 | %ChangeLog | ||
| 278 | * Mon Jan 01 1998 ... | ||
| 279 | Template Version: 1.31 | ||
| 280 | |||
| 281 | $Id: openssh.spec,v 1.1.1.1 2001/09/19 14:44:59 stealth Exp $ | ||
