SF.net SVN: gar:[27123] csw/mgar/pkg/openssh/branches
jake_goerzen at users.sourceforge.net
jake_goerzen at users.sourceforge.net
Tue Dec 3 00:35:48 CET 2024
Revision: 27123
http://sourceforge.net/p/gar/code/27123
Author: jake_goerzen
Date: 2024-12-02 23:35:47 +0000 (Mon, 02 Dec 2024)
Log Message:
-----------
openssh/branches/openssh-9.9p1: initial commit: openssh-9.9p1
Modified Paths:
--------------
csw/mgar/pkg/openssh/branches/openssh-9.9p1/Makefile
csw/mgar/pkg/openssh/branches/openssh-9.9p1/checksums
Added Paths:
-----------
csw/mgar/pkg/openssh/branches/openssh-9.9p1/
csw/mgar/pkg/openssh/branches/openssh-9.9p1/files/0031-Restore-tcpwrappers-libwrap-support.patch
Modified: csw/mgar/pkg/openssh/branches/openssh-9.9p1/Makefile
===================================================================
--- csw/mgar/pkg/openssh/trunk/Makefile 2017-07-04 09:22:08 UTC (rev 26241)
+++ csw/mgar/pkg/openssh/branches/openssh-9.9p1/Makefile 2024-12-02 23:35:47 UTC (rev 27123)
@@ -2,6 +2,7 @@
# OpenCSW build recipe for openssh
#
# Author: Yann Rouillard <yann at pleiades.fr.eu.org>
+# Copyright 2024 Jake Goerzen <jgoerzen at opencsw.org>
#
# Redistribution and/or use, with or without modification, is
# permitted. This software is without warranty of any kind. The
@@ -12,7 +13,7 @@
###### Package information #######
NAME = openssh
-VERSION = 6.7p1
+VERSION = 9.9p1
GSSKEX_PATCH_VERSION = 6.7p1
GSSKEX_PATCH_DATE = 20140907
GARTYPE = v2
@@ -35,7 +36,8 @@
CATALOGNAME_CSWopenssh = openssh
SPKG_DESC_CSWopenssh = OpenSSH Secure Shell server
BUILD_DEP_PKGS = CSWautoconf CSWlibssl-dev CSWlibz-dev
-RUNTIME_DEP_PKGS_CSWopenssh += CSWlibssl1-0-0
+RUNTIME_DEP_PKGS_CSWopenssh += CSWlibssl1-1
+RUNTIME_DEP_PKGS_CSWopenssh += CSWlibssp0
RUNTIME_DEP_PKGS_CSWopenssh += CSWlibz1
RUNTIME_DEP_PKGS_CSWopenssh += CSWlibkrb5-3
RUNTIME_DEP_PKGS_CSWopenssh += CSWlibcom-err3
@@ -47,11 +49,12 @@
RUNTIME_DEP_PKGS_CSWopenssh += $(RUNTIME_DEP_PKGS_CSWopenssh_$(GARCH))
RUNTIME_DEP_PKGS_CSWopenssh_sparc += CSWlibintl8
-OBSOLETED_BY_CSWopenssh = CSWossh
+GARCOMPILER += GNU
CATALOGNAME_CSWopenssh-client = openssh_client
SPKG_DESC_CSWopenssh-client = OpenSSH Secure Shell client
-RUNTIME_DEP_PKGS_CSWopenssh-client += CSWlibssl1-0-0
+RUNTIME_DEP_PKGS_CSWopenssh-client += CSWlibssl1-1
+RUNTIME_DEP_PKGS_CSWopenssh-client += CSWlibssp0
RUNTIME_DEP_PKGS_CSWopenssh-client += CSWlibz1
RUNTIME_DEP_PKGS_CSWopenssh-client += CSWlibkrb5-3
@@ -61,8 +64,6 @@
RUNTIME_DEP_PKGS_CSWopenssh-client += $(RUNTIME_DEP_PKGS_CSWopenssh-client_$(GARCH))
RUNTIME_DEP_PKGS_CSWopenssh-client_sparc += CSWlibintl8
-OBSOLETED_BY_CSWopenssh-client = CSWosshclient
-
PACKAGING_PLATFORMS = solaris10-sparc solaris10-i386
PKGFILES_CSWopenssh = $(sbindir)/.*
@@ -71,6 +72,7 @@
PKGFILES_CSWopenssh += $(mandir)/man8/sftp-server.8
PKGFILES_CSWopenssh += $(mandir)/man8/sshd.8
PKGFILES_CSWopenssh += $(libexecdir)/sftp-server
+PKGFILES_CSWopenssh += $(libexecdir)/sshd-session
PKGFILES_CSWopenssh += $(sysconfdir)/ssh/sshd_config.CSW
PKGFILES_CSWopenssh += $(sysconfdir)/ssh/moduli.CSW
PKGFILES_CSWopenssh += $(localstatedir)/empty
@@ -111,11 +113,12 @@
CHECKPKG_OVERRIDES_CSWopenssh += file-with-bad-content|/usr/local|root/opt/csw/share/doc/openssh/INSTALL
CHECKPKG_OVERRIDES_CSWopenssh += file-with-bad-content|/usr/share|root/var/opt/csw/svc/manifest/network/cswopenssh.xml
+# temporay disable to get around git issue on experiental* hosts
+NOGITPATCH = 1
-
###### Upstream and OpenCSW files information #######
-MASTER_SITES = ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/ http://www.sxw.org.uk/computing/patches/ http://www.mindrot.org/openssh_snap/
+MASTER_SITES = https://cdn.openbsd.org/pub/OpenBSD/OpenSSH/portable/ ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/ http://www.sxw.org.uk/computing/patches/ http://www.mindrot.org/openssh_snap/
UPSTREAM_MASTER_SITES = ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/
# We define upstream file regex so we can be notifed of new upstream software release
@@ -133,7 +136,7 @@
LICENSE = LICENCE
# The GSSAPI key exchange patch
-PATCHFILES = openssh-$(GSSKEX_PATCH_VERSION)-gsskex-all-$(GSSKEX_PATCH_DATE).patch
+#PATCHFILES = openssh-$(GSSKEX_PATCH_VERSION)-gsskex-all-$(GSSKEX_PATCH_DATE).patch
# Prevent TIOCSCTTY from being used to avoid error:
# ioctl(TIOCSCTTY): Invalid argument
@@ -141,7 +144,7 @@
# Fix a X11 forwarding bug on machine installed with ipv6 disabled
# see https://bugzilla.mindrot.org/show_bug.cgi?id=1457
-PATCHFILES += no_x_forwarding_bug.patch
+#PATCHFILES += no_x_forwarding_bug.patch
# Force openssh to not use /var/adm/lastlog but still prints last log information
# Workaround to fix https://www.opencsw.org/mantis/view.php?id=4494
@@ -155,21 +158,21 @@
# The regress/Makefile uses "id -un" to retrieve the id of the current user
# but that command doesn't work on Solaris, this patch fixes that issue
-PATCHFILES += fix-user-id-retrieval-for-solaris.patch
+#PATCHFILES += fix-user-id-retrieval-for-solaris.patch
# Disable unittest fuzz ed25519 sig as it doesn't work correctly under Solaris
# see: https://bugzilla.mindrot.org/show_bug.cgi?id=2271
-PATCHFILES += disable-unittest-fuzz-ed25519-sig.patch
+#PATCHFILES += disable-unittest-fuzz-ed25519-sig.patch
# Same thing for ed25519 key test, see: https://bugzilla.mindrot.org/show_bug.cgi?id=2297
-PATCHFILES += remote-unittest-key-ed25519.patch
+#PATCHFILES += remote-unittest-key-ed25519.patch
# Keep tcp wrapper support which was dropped from openssh since 6.7,
# so that ours users are not caught by surprise
-# Patch taken from Debian
-PATCHFILES += restore-tcp-wrappers.patch
+# Patch taken from OpenIndiana
+PATCHFILES += 0031-Restore-tcpwrappers-libwrap-support.patch
# documentation files to install (not a gar variable)
-DOCFILES = CREDITS ChangeLog ChangeLog.gssapi INSTALL LICENCE OVERVIEW README README.dns
+DOCFILES = CREDITS ChangeLog INSTALL LICENCE OVERVIEW README README.dns
DOCFILES += README.platform README.privsep README.tun TODO
# we're using conf handling class from the cswclassutils package
@@ -182,15 +185,25 @@
CONFIGURE_ARGS = $(DIRPATHS)
CONFIGURE_ARGS += --with-kerberos5=$(prefix)
CONFIGURE_ARGS += --sysconfdir=$(sysconfdir)/ssh
+#CONFIGURE_ARGS += --with-audit=bsm
+CONFIGURE_ARGS += --with-sandbox=solaris
CONFIGURE_ARGS += --with-solaris-contracts
+CONFIGURE_ARGS += --with-solaris-privs
+CONFIGURE_ARGS += --with-solaris-projects
CONFIGURE_ARGS += --with-pam
CONFIGURE_ARGS += --with-tcp-wrappers=$(prefix)
CONFIGURE_ARGS += --with-privsep-path=$(localstatedir)/empty
+# enable so ssh can connect to older systems (consoles, ILOMs, switches, etc..) See https://www.openssh.com/legacy.html for legacy options.
+CONFIGURE_ARGS += --enable-dsa-keys
+
# We don't want to use lazy load because of
# the chroot usage by sshd
EXTRA_LD_OPTIONS = -z nolazyload
+# disable tests temporary
+TEST_SCRIPTS =
+
TEST_TARGET = tests
include gar/category.mk
Modified: csw/mgar/pkg/openssh/branches/openssh-9.9p1/checksums
===================================================================
--- csw/mgar/pkg/openssh/trunk/checksums 2017-07-04 09:22:08 UTC (rev 26241)
+++ csw/mgar/pkg/openssh/branches/openssh-9.9p1/checksums 2024-12-02 23:35:47 UTC (rev 27123)
@@ -1 +1 @@
-3246aa79317b1d23cae783a3bf8275d6 openssh-6.7p1.tar.gz
+1893c9b712eb8c55ec2d5146e7323b92 openssh-9.9p1.tar.gz
Added: csw/mgar/pkg/openssh/branches/openssh-9.9p1/files/0031-Restore-tcpwrappers-libwrap-support.patch
===================================================================
--- csw/mgar/pkg/openssh/branches/openssh-9.9p1/files/0031-Restore-tcpwrappers-libwrap-support.patch (rev 0)
+++ csw/mgar/pkg/openssh/branches/openssh-9.9p1/files/0031-Restore-tcpwrappers-libwrap-support.patch 2024-12-02 23:35:47 UTC (rev 27123)
@@ -0,0 +1,140 @@
+diff -wpruN --no-dereference '--exclude=*.orig' a~/configure.ac a/configure.ac
+--- a~/configure.ac 1970-01-01 00:00:00
++++ a/configure.ac 1970-01-01 00:00:00
+@@ -1672,6 +1672,62 @@ else
+ AC_MSG_RESULT([no])
+ fi
+
++# Check whether user wants TCP wrappers support
++TCPW_MSG="no"
++AC_ARG_WITH([tcp-wrappers],
++ [ --with-tcp-wrappers[[=PATH]] Enable tcpwrappers support (optionally in PATH)],
++ [
++ if test "x$withval" != "xno" ; then
++ saved_LIBS="$LIBS"
++ saved_LDFLAGS="$LDFLAGS"
++ saved_CPPFLAGS="$CPPFLAGS"
++ if test -n "${withval}" && \
++ test "x${withval}" != "xyes"; then
++ if test -d "${withval}/lib"; then
++ if test -n "${need_dash_r}"; then
++ LDFLAGS="-L${withval}/lib -R${withval}/lib ${LDFLAGS}"
++ else
++ LDFLAGS="-L${withval}/lib ${LDFLAGS}"
++ fi
++ else
++ if test -n "${need_dash_r}"; then
++ LDFLAGS="-L${withval} -R${withval} ${LDFLAGS}"
++ else
++ LDFLAGS="-L${withval} ${LDFLAGS}"
++ fi
++ fi
++ if test -d "${withval}/include"; then
++ CPPFLAGS="-I${withval}/include ${CPPFLAGS}"
++ else
++ CPPFLAGS="-I${withval} ${CPPFLAGS}"
++ fi
++ fi
++ LIBS="-lwrap $LIBS"
++ AC_MSG_CHECKING([for libwrap])
++ AC_LINK_IFELSE([AC_LANG_PROGRAM([[
++#include <sys/types.h>
++#include <sys/socket.h>
++#include <netinet/in.h>
++#include <tcpd.h>
++int deny_severity = 0, allow_severity = 0;
++ ]], [[
++ hosts_access(0);
++ ]])], [
++ AC_MSG_RESULT([yes])
++ AC_DEFINE([LIBWRAP], [1],
++ [Define if you want
++ TCP Wrappers support])
++ SSHDLIBS="$SSHDLIBS -lwrap"
++ TCPW_MSG="yes"
++ ], [
++ AC_MSG_ERROR([*** libwrap missing])
++
++ ])
++ LIBS="$saved_LIBS"
++ fi
++ ]
++)
++
+ # Check whether user wants to use ldns
+ LDNS_MSG="no"
+ AC_ARG_WITH(ldns,
+@@ -5725,6 +5781,7 @@ echo " PAM support
+ echo " OSF SIA support: $SIA_MSG"
+ echo " KerberosV support: $KRB5_MSG"
+ echo " SELinux support: $SELINUX_MSG"
++echo " TCP Wrappers support: $TCPW_MSG"
+ echo " libedit support: $LIBEDIT_MSG"
+ echo " libldns support: $LDNS_MSG"
+ echo " Solaris process contract support: $SPC_MSG"
+diff -wpruN --no-dereference '--exclude=*.orig' a~/sshd-session.c a/sshd-session.c
+--- a~/sshd-session.c 1970-01-01 00:00:00
++++ a/sshd-session.c 1970-01-01 00:00:00
+@@ -70,6 +70,11 @@
+ #include <prot.h>
+ #endif
+
++#ifdef LIBWRAP
++#include <tcpd.h>
++#include <syslog.h>
++#endif /* LIBWRAP */
++
+ #include "xmalloc.h"
+ #include "ssh.h"
+ #include "ssh2.h"
+@@ -1271,6 +1276,25 @@ main(int ac, char **av)
+ audit_connection_from(ssh, remote_ip, remote_port);
+ #endif
+
++#ifdef LIBWRAP
++ int allow_severity = options.log_facility|LOG_INFO;
++ int deny_severity = options.log_facility|LOG_WARNING;
++ /* Check whether logins are denied from this host. */
++ if (ssh_packet_connection_is_on_socket(ssh)) {
++ struct request_info req;
++
++ request_init(&req, RQ_DAEMON, __progname, RQ_FILE, sock_in, 0);
++ fromhost(&req);
++
++ if (!hosts_access(&req)) {
++ debug("Connection refused by tcp wrapper");
++ refuse(&req);
++ /* NOTREACHED */
++ fatal("libwrap refuse returns");
++ }
++ }
++#endif /* LIBWRAP */
++
+ rdomain = ssh_packet_rdomain_in(ssh);
+
+ /* Log the connection. */
+diff -wpruN --no-dereference '--exclude=*.orig' a~/sshd.8 a/sshd.8
+--- a~/sshd.8 1970-01-01 00:00:00
++++ a/sshd.8 1970-01-01 00:00:00
+@@ -925,6 +925,12 @@ the user's home directory becomes access
+ This file should be writable only by the user, and need not be
+ readable by anyone else.
+ .Pp
++.It Pa /etc/hosts.allow
++.It Pa /etc/hosts.deny
++Access controls that should be enforced by tcp-wrappers are defined here.
++Further details are described in
++.Xr hosts_access 5 .
++.Pp
+ .It Pa /etc/hosts.equiv
+ This file is for host-based authentication (see
+ .Xr ssh 1 ) .
+@@ -1052,6 +1058,7 @@ Each SSHv2 userauth type has its own PAM
+ .Xr ssh-keygen 1 ,
+ .Xr ssh-keyscan 1 ,
+ .Xr chroot 2 ,
++.Xr hosts_access 5 ,
+ .Xr login.conf 5 ,
+ .Xr moduli 5 ,
+ .Xr sshd_config 5 ,
+
This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site.
More information about the devel
mailing list