## ## openssh.spec -- OpenPKG RPM Specification ## Copyright (c) 2000-2002 Cable & Wireless Deutschland GmbH ## Copyright (c) 2000-2002 The OpenPKG Project ## Copyright (c) 2000-2002 Ralf S. Engelschall ## ## Permission to use, copy, modify, and distribute this software for ## any purpose with or without fee is hereby granted, provided that ## the above copyright notice and this permission notice appear in all ## copies. ## ## THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED ## WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF ## MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. ## IN NO EVENT SHALL THE AUTHORS AND COPYRIGHT HOLDERS AND THEIR ## CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, ## SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT ## LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF ## USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ## ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, ## OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT ## OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF ## SUCH DAMAGE. ## # package options %ifndef with_pam %define with_pam no %endif %ifndef with_pcre %define with_pcre no %endif %ifndef with_skey %define with_skey no %endif # package information Name: openssh Summary: Secure Shell (SSH) URL: http://www.openssh.com/ Vendor: The OpenBSD Project Packager: The OpenPKG Project Distribution: OpenPKG [REL] Group: Cryptography License: BSD Version: 3.1p1 Release: 20020312 # list of sources Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz Source1: fakesyslog.tar.gz Source2: rc.openssh Source3: sshd_config Source4: ssh_config Source5: ssh-askpass # build information Prefix: %{l_prefix} BuildRoot: %{l_buildroot} BuildPreReq: OpenPKG, openpkg >= 20020206, perl, openssl, zlib %if "%{with_pam}" == "yes" BuildPreReq: PAM PreReq: PAM %endif %if "%{with_pcre}" == "yes" BuildPreReq: pcre %endif %if "%{with_skey}" == "yes" BuildPreReq: skey %endif PreReq: OpenPKG, openpkg >= 20020206 AutoReq: no AutoReqProv: no %description Secure Shell (SSH) is a facility for logging into a remote machine and for remotely executing commands on a remote machine. It is intended to replace rlogin(1) and rsh(1), and provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP/IP ports can also be forwarded over the secure channel. OpenSSH is OpenBSD's rework of the last free version of SSH, bringing it up to date in terms of security and features, as well as removing all patented algorithms to separate libraries (OpenSSL). Options: with_pam=%{with_pam} with_pcre=%{with_pcre} with_skey=%{with_skey} %prep %setup0 -q -c -a 0 %setup1 -q -T -D -a 1 %build # build faked syslog(3) library fakesyslogdir="`pwd`/fakesyslog" ( cd fakesyslog CC="%{l_cc}" \ CFLAGS="%{l_cflags -O}" \ ./configure \ --with-logfile=%{l_prefix}/var/openssh/sshd.log %{l_make} %{l_mflags} ) # build OpenSSH ( cd openssh-%{version} inc="-I%{l_prefix}/include" lib="-L%{l_prefix}/lib -L$fakesyslogdir" %if "%{with_pam}" == "yes" inc="$inc -I`%{l_prefix}/etc/rc --query pam_incdir`" lib="$lib -L`%{l_prefix}/etc/rc --query pam_libdir`" %endif CC="%{l_cc}" \ CFLAGS="%{l_cflags -O} $inc" \ CPPFLAGS="$inc" \ LDFLAGS="$lib" \ LIBS="-lcrypt -lfakesyslog" \ ./configure \ --prefix=%{l_prefix} \ --sbindir=%{l_prefix}/bin \ --mandir=%{l_prefix}/man \ --infodir=%{l_prefix}/info \ --sysconfdir=%{l_prefix}/etc/openssh \ --libexecdir=%{l_prefix}/libexec/openssh \ --localstatedir=%{l_prefix}/var/openssh \ --with-pid-dir=%{l_prefix}/var/openssh \ --with-ssl-dir=%{l_prefix} \ %if "%{with_pcre}" == "yes" --with-pcre=%{l_prefix} \ %endif %if "%{with_skey}" == "yes" --with-skey=%{l_prefix} \ %endif %if "%{with_pam}" == "yes" --with-pam \ %else --without-pam \ %endif --with-md5-passwords \ --with-zlib=%{l_prefix} \ --with-ipv4-default \ --without-smartcard \ --without-kerberos4 \ --disable-suid-ssh \ --without-rsh \ --with-mantype=man \ --with-default-path=%{l_prefix}/bin:/bin:/usr/bin:/usr/local/bin # build package %{l_make} %{l_mflags -O} ) %install rm -rf $RPM_BUILD_ROOT # perform standard installation procedure of OpenSSH ( cd openssh-%{version} %{l_make} %{l_mflags} install DESTDIR=$RPM_BUILD_ROOT ) # strip down installation tree rm -rf $RPM_BUILD_ROOT%{l_prefix}/share rm -f $RPM_BUILD_ROOT%{l_prefix}/bin/slogin rm -f $RPM_BUILD_ROOT%{l_prefix}/man/man1/slogin.1 strip $RPM_BUILD_ROOT%{l_prefix}/bin/* 2> /dev/null || true strip $RPM_BUILD_ROOT%{l_prefix}/libexec/openssh/* 2> /dev/null || true # install ssh-askpass wrapper %{l_shtool} install -c -m 755 -e 's;@l_prefix@;%{l_prefix};g' \ %{SOURCE ssh-askpass} $RPM_BUILD_ROOT%{l_prefix}/libexec/openssh/ # make sure the state directory exists %{l_shtool} mkdir -f -p -m 755 $RPM_BUILD_ROOT%{l_prefix}/var/openssh # install run-command script %{l_shtool} mkdir -f -p -m 755 $RPM_BUILD_ROOT%{l_prefix}/etc/rc.d %{l_shtool} install -c -m 755 -e 's;@l_prefix@;%{l_prefix};g' \ -e 's;@l_musr@;%{l_musr};g' -e 's;@l_mgrp@;%{l_mgrp};g' \ %{SOURCE rc.openssh} $RPM_BUILD_ROOT%{l_prefix}/etc/rc.d/ # install reasonable ssh server and client configuration files case "%{l_target}" in *-freebsd* ) uselogin=yes; printmotd=no ;; *-linux* ) uselogin=yes; printmotd=no ;; *-solaris* ) uselogin=no; printmotd=yes ;; # "uselogin" does not work on Solaris! esac %{l_shtool} install -c -m 644 \ -e 's;@l_prefix@;%{l_prefix};g' \ -e "s;@uselogin@;$uselogin;" \ -e "s;@printmotd@;$printmotd;" \ %{SOURCE sshd_config} $RPM_BUILD_ROOT%{l_prefix}/etc/openssh/ %{l_shtool} install -c -m 644 -e 's;@l_prefix@;%{l_prefix};g' \ %{SOURCE ssh_config} $RPM_BUILD_ROOT%{l_prefix}/etc/openssh/ # determine installation files %{l_rpmtool} files -v -ofiles -r$RPM_BUILD_ROOT \ %{l_files_std} \ '%config %{l_prefix}/etc/openssh/*' %files -f files %clean rm -rf $RPM_BUILD_ROOT %post # generate server RSA key if [ ! -f "$RPM_INSTALL_PREFIX/etc/openssh/ssh_host_key" -o \ ! -s "$RPM_INSTALL_PREFIX/etc/openssh/ssh_host_key" ] ; then $RPM_INSTALL_PREFIX/bin/ssh-keygen -t rsa1 -b 1024 \ -f $RPM_INSTALL_PREFIX/etc/openssh/ssh_host_key \ -N '' -C `hostname` 1>&2 fi # generate server DSA key if [ ! -f "$RPM_INSTALL_PREFIX/etc/openssh/ssh_host_dsa_key" -o \ ! -s "$RPM_INSTALL_PREFIX/etc/openssh/ssh_host_dsa_key" ] ; then $RPM_INSTALL_PREFIX/bin/ssh-keygen -t dsa -d \ -f $RPM_INSTALL_PREFIX/etc/openssh/ssh_host_dsa_key \ -N '' -C `hostname` 1>&2 fi # add PAM configuration entry %if "%{with_pam}" == "yes" $RPM_INSTALL_PREFIX/sbin/pamtool -a -s -n "openssh" %endif %preun # remove PAM configuration entry %if "%{with_pam}" == "yes" $RPM_INSTALL_PREFIX/sbin/pamtool -r -s -n "openssh" %endif