Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 102370 Details for
Bug 154440
Openssh sftplogging patch for 4.4p1 is here!
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
openssh-4.4_p1-r7.ebuild w/ "sftplogging" use flag
openssh-4.4_p1-r7.ebuild (text/plain), 5.93 KB, created by
Zrajm C Akfohg
on 2006-11-19 19:27:31 UTC
(
hide
)
Description:
openssh-4.4_p1-r7.ebuild w/ "sftplogging" use flag
Filename:
MIME Type:
Creator:
Zrajm C Akfohg
Created:
2006-11-19 19:27:31 UTC
Size:
5.93 KB
patch
obsolete
># Copyright 1999-2006 Gentoo Foundation ># Distributed under the terms of the GNU General Public License v2 ># $Header: /var/cvsroot/gentoo-x86/net-misc/openssh/openssh-4.4_p1-r6.ebuild,v 1.4 2006/11/08 23:15:58 iluxa Exp $ > ># This is a version of `net-misc/openssh-4.4_p1-r6', modified by Zrajm C Akfohg ># to include the USE flag `sftplogging', again. It applies sftplogging patch ># from http://sftplogging.sourceforge.net/, but otherwise does everything ># exactly like its predecessor. /zrajm@klingonska.org [2006-11-19] > >WANT_AUTOCONF="latest" >WANT_AUTOMAKE="latest" ># Please leave pam at end, so that dopamd and newpamd from eutils eclass are not used >inherit eutils flag-o-matic ccc multilib autotools pam > ># Make it more portable between straight releases ># and _p? releases. >PARCH=${P/_/} > >X509_PATCH="${PARCH}+x509-5.5.1.diff.gz" >SECURID_PATCH="${PARCH}+SecurID_v1.3.2.patch" >LDAP_PATCH="${PARCH/-4.4p1/-lpk-4.4p1}-0.3.7.patch" >SFTPLOGGING_PATCH="${PARCH}.sftplogging-v1.5.patch" >HPN_PATCH="${PARCH}-hpn12v13.diff.gz" > >DESCRIPTION="Port of OpenBSD's free SSH release" >HOMEPAGE="http://www.openssh.com/" >SRC_URI="mirror://openbsd/OpenSSH/portable/${PARCH}.tar.gz > X509? ( http://roumenpetrov.info/openssh/x509-5.5.1/${X509_PATCH} ) > ldap? ( http://dev.inversepath.com/openssh-lpk/${LDAP_PATCH} ) > sftplogging? ( http://sftplogging.sourceforge.net/download/v1.5/${SFTPLOGGING_PATCH} ) > hpn? ( http://www.psc.edu/networking/projects/hpn-ssh/${HPN_PATCH} ) > smartcard? ( http://omniti.com/~jesus/projects/${SECURID_PATCH} )" > >LICENSE="as-is" >SLOT="0" >KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~sparc-fbsd ~x86 ~x86-fbsd" >IUSE="static pam tcpd kerberos skey selinux chroot X509 ldap smartcard sftplogging hpn libedit X" > >RDEPEND="pam? ( virtual/pam ) > kerberos? ( virtual/krb5 ) > selinux? ( >=sys-libs/libselinux-1.28 ) > skey? ( >=app-admin/skey-1.1.5-r1 ) > ldap? ( net-nds/openldap ) > libedit? ( || ( dev-libs/libedit sys-freebsd/freebsd-lib ) ) > >=dev-libs/openssl-0.9.6d > >=sys-libs/zlib-1.2.3 > smartcard? ( dev-libs/opensc ) > tcpd? ( >=sys-apps/tcp-wrappers-7.6 ) > X? ( x11-apps/xauth ) > userland_GNU? ( sys-apps/shadow )" >DEPEND="${RDEPEND} > dev-util/pkgconfig > virtual/os-headers > sys-devel/autoconf" >PROVIDE="virtual/ssh" > >S=${WORKDIR}/${PARCH} > >pkg_setup() { > # this sucks, but i'd rather have people unable to `emerge -u openssh` > # than not be able to log in to their server any more > local fail="" > [[ -z ${X509_PATCH} ]] && use X509 && fail="${fail} X509" > [[ -z ${SECURID_PATCH} ]] && use smartcard && fail="${fail} smartcard" > if [[ -n ${fail} ]] ; then > eerror "Sorry, but this version does not yet support features" > eerror "that you requested: ${fail}" > eerror "Please mask ${PF} for now and check back later:" > eerror " # echo '=${CATEGORY}/${PF}' >> /etc/portage/package.mask" > die "booooo" > fi >} > >src_unpack() { > unpack ${PARCH}.tar.gz > cd "${S}" > > sed -i \ > -e '/_PATH_XAUTH/s:/usr/X11R6/bin/xauth:/usr/bin/xauth:' \ > pathnames.h || die > > # fix autoconf lib checking for SELinux > epatch "${FILESDIR}/openssh-4.4p1-selinux-ac.diff" > > use X509 && epatch "${DISTDIR}"/${X509_PATCH} "${FILESDIR}"/${P}-x509-hpn-glue.patch > use sftplogging && epatch "${DISTDIR}"/${SFTPLOGGING_PATCH} > use chroot && epatch "${FILESDIR}"/openssh-4.3_p1-chroot.patch > use smartcard && epatch "${FILESDIR}"/openssh-3.9_p1-opensc.patch > if ! use X509 ; then > if [[ -n ${SECURID_PATCH} ]] && use smartcard ; then > epatch "${DISTDIR}"/${SECURID_PATCH} \ > "${FILESDIR}"/${PN}-4.3_p2-securid-updates.patch \ > "${FILESDIR}"/${PN}-4.3_p2-securid-hpn-glue.patch > use ldap && epatch "${FILESDIR}"/openssh-4.0_p1-smartcard-ldap-happy.patch > fi > if use ldap ; then > use sftplogging \ > && ewarn "Sorry, sftplogging and ldap don't get along, disabling ldap" \ > || epatch "${DISTDIR}"/${LDAP_PATCH} "${FILESDIR}"/${P}-ldap-hpn-glue.patch > fi > elif [[ -n ${SECURID_PATCH} ]] && use smartcard || use ldap ; then > ewarn "Sorry, X509 and smartcard/ldap don't get along, disabling smartcard/ldap" > fi > [[ -n ${HPN_PATCH} ]] && use hpn && epatch "${DISTDIR}"/${HPN_PATCH} > > sed -i '/LD.*ssh-keysign/s:$: '$(bindnow-flags)':' Makefile.in || die "setuid" > > sed -i "s:-lcrypto:$(pkg-config --libs openssl):" configure{,.ac} || die > > eautoreconf >} > >src_compile() { > addwrite /dev/ptmx > addpredict /etc/skey/skeykeys #skey configure code triggers this > > local myconf="" > if use static ; then > append-ldflags -static > use pam && ewarn "Disabling pam support becuse of static flag" > myconf="${myconf} --without-pam" > else > myconf="${myconf} $(use_with pam)" > fi > > econf \ > --with-ldflags="${LDFLAGS}" \ > --disable-strip \ > --sysconfdir=/etc/ssh \ > --libexecdir=/usr/$(get_libdir)/misc \ > --datadir=/usr/share/openssh \ > --disable-suid-ssh \ > --with-privsep-path=/var/empty \ > --with-privsep-user=sshd \ > --with-md5-passwords \ > $(use_with ldap) \ > $(use_with libedit) \ > $(use_with kerberos kerberos5 /usr) \ > $(use_with tcpd tcp-wrappers) \ > $(use_with selinux) \ > $(use_with skey) \ > $(use_with smartcard opensc) \ > ${myconf} \ > || die "bad configure" > emake || die "compile problem" >} > >src_install() { > emake install-nokeys DESTDIR="${D}" || die > fperms 600 /etc/ssh/sshd_config > dobin contrib/ssh-copy-id > newinitd "${FILESDIR}"/sshd.rc6 sshd > newconfd "${FILESDIR}"/sshd.confd sshd > keepdir /var/empty > > newpamd "${FILESDIR}"/sshd.pam_include sshd > dosed "/^#Protocol /s:.*:Protocol 2:" /etc/ssh/sshd_config > use pam \ > && dosed "/^#UsePAM /s:.*:UsePAM yes:" /etc/ssh/sshd_config \ > && dosed "/^#PasswordAuthentication /s:.*:PasswordAuthentication no:" /etc/ssh/sshd_config > > doman contrib/ssh-copy-id.1 > dodoc ChangeLog CREDITS OVERVIEW README* TODO sshd_config >} > >pkg_postinst() { > enewgroup sshd 22 > enewuser sshd 22 -1 /var/empty sshd > > ewarn "Remember to merge your config files in /etc/ssh/ and then" > ewarn "restart sshd: '/etc/init.d/sshd restart'." > if use pam ; then > echo > ewarn "Please be aware users need a valid shell in /etc/passwd" > ewarn "in order to be allowed to login." > fi >}
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 154440
: 102370