/[gentoo-x86]/net-misc/openssh/openssh-5.1_p1-r2.ebuild
Gentoo

Contents of /net-misc/openssh/openssh-5.1_p1-r2.ebuild

Parent Directory Parent Directory | Revision Log Revision Log


Revision 1.14 - (show annotations) (download)
Fri Apr 23 03:31:46 2010 UTC (9 years, 5 months ago) by vapier
Branch: MAIN
CVS Tags: HEAD
Changes since 1.13: +1 -1 lines
FILE REMOVED
old
(Portage version: 2.2_rc67/cvs/Linux x86_64)

1 # Copyright 1999-2009 Gentoo Foundation
2 # Distributed under the terms of the GNU General Public License v2
3 # $Header: /var/cvsroot/gentoo-x86/net-misc/openssh/openssh-5.1_p1-r2.ebuild,v 1.13 2009/08/13 06:30:33 vapier Exp $
4
5 inherit eutils flag-o-matic multilib autotools pam
6
7 # Make it more portable between straight releases
8 # and _p? releases.
9 PARCH=${P/_/}
10
11 X509_PATCH="${PARCH}+x509-6.1.1.diff.gz"
12 LDAP_PATCH="${PARCH/openssh/openssh-lpk}-0.3.10.patch.gz"
13 HPN_PATCH="${PARCH}-hpn13v5.diff.gz"
14
15 DESCRIPTION="Port of OpenBSD's free SSH release"
16 HOMEPAGE="http://www.openssh.org/"
17 SRC_URI="mirror://openbsd/OpenSSH/portable/${PARCH}.tar.gz
18 http://www.sxw.org.uk/computing/patches/openssh-5.0p1-gsskex-20080404.patch
19 ${LDAP_PATCH:+ldap? ( mirror://gentoo/${LDAP_PATCH} )}
20 ${X509_PATCH:+X509? ( http://roumenpetrov.info/openssh/x509-6.1.1/${X509_PATCH} )}
21 ${HPN_PATCH:+hpn? ( http://www.psc.edu/networking/projects/hpn-ssh/${HPN_PATCH} )}"
22 #${LDAP_PATCH:+ldap? ( http://dev.inversepath.com/openssh-lpk/${LDAP_PATCH} )}
23
24 LICENSE="as-is"
25 SLOT="0"
26 KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc ~sparc-fbsd x86 ~x86-fbsd"
27 IUSE="static pam tcpd kerberos skey selinux X509 ldap smartcard hpn libedit X"
28
29 RDEPEND="pam? ( virtual/pam )
30 kerberos? ( virtual/krb5 )
31 selinux? ( >=sys-libs/libselinux-1.28 )
32 skey? ( >=sys-auth/skey-1.1.5-r1 )
33 ldap? ( net-nds/openldap )
34 libedit? ( dev-libs/libedit )
35 >=dev-libs/openssl-0.9.6d
36 >=sys-libs/zlib-1.2.3
37 smartcard? ( dev-libs/opensc )
38 tcpd? ( >=sys-apps/tcp-wrappers-7.6 )
39 X? ( x11-apps/xauth )
40 userland_GNU? ( sys-apps/shadow )"
41 DEPEND="${RDEPEND}
42 dev-util/pkgconfig
43 virtual/os-headers
44 sys-devel/autoconf"
45 RDEPEND="${RDEPEND}
46 pam? ( sys-auth/pambase )"
47 PROVIDE="virtual/ssh"
48
49 S=${WORKDIR}/${PARCH}
50
51 pkg_setup() {
52 # this sucks, but i'd rather have people unable to `emerge -u openssh`
53 # than not be able to log in to their server any more
54 maybe_fail() { [[ -z ${!2} ]] && use ${1} && echo ${1} ; }
55 local fail="
56 $(maybe_fail X509 X509_PATCH)
57 $(maybe_fail ldap LDAP_PATCH)
58 "
59 fail=$(echo ${fail})
60 if [[ -n ${fail} ]] ; then
61 eerror "Sorry, but this version does not yet support features"
62 eerror "that you requested: ${fail}"
63 eerror "Please mask ${PF} for now and check back later:"
64 eerror " # echo '=${CATEGORY}/${PF}' >> /etc/portage/package.mask"
65 die "booooo"
66 fi
67 }
68
69 src_unpack() {
70 unpack ${PARCH}.tar.gz
71 cd "${S}"
72
73 sed -i \
74 -e '/_PATH_XAUTH/s:/usr/X11R6/bin/xauth:/usr/bin/xauth:' \
75 pathnames.h || die
76
77 use X509 && epatch "${DISTDIR}"/${X509_PATCH} "${FILESDIR}"/${PN}-5.1_p1-x509-{headers,hpn-glue}.patch
78 use smartcard && epatch "${FILESDIR}"/openssh-3.9_p1-opensc.patch
79 if ! use X509 ; then
80 if [[ -n ${LDAP_PATCH} ]] && use ldap ; then
81 # The patch for bug 210110 64-bit stuff is now included.
82 epatch "${DISTDIR}"/${LDAP_PATCH}
83 epatch "${FILESDIR}"/${PN}-5.1_p1-ldap-hpn-glue.patch
84 fi
85 #epatch "${DISTDIR}"/openssh-5.0p1-gsskex-20080404.patch #115553 #216932
86 else
87 use ldap && ewarn "Sorry, X509 and ldap don't get along, disabling ldap"
88 fi
89 epatch "${FILESDIR}"/${PN}-4.7_p1-GSSAPI-dns.patch #165444 integrated into gsskex
90 [[ -n ${HPN_PATCH} ]] && use hpn && epatch "${DISTDIR}"/${HPN_PATCH}
91 epatch "${FILESDIR}"/${PN}-4.7p1-selinux.diff #191665
92
93 sed -i "s:-lcrypto:$(pkg-config --libs openssl):" configure{,.ac} || die
94
95 epatch "${FILESDIR}"/${P}-null-banner.patch #244222
96 epatch "${FILESDIR}"/${P}-escaped-banner.patch #244222
97 epatch "${FILESDIR}"/${P}-better-ssp-check.patch
98
99 eautoreconf
100 }
101
102 src_compile() {
103 addwrite /dev/ptmx
104 addpredict /etc/skey/skeykeys #skey configure code triggers this
105
106 local myconf=""
107 if use static ; then
108 append-ldflags -static
109 use pam && ewarn "Disabling pam support becuse of static flag"
110 myconf="${myconf} --without-pam"
111 else
112 myconf="${myconf} $(use_with pam)"
113 fi
114
115 econf \
116 --with-ldflags="${LDFLAGS}" \
117 --disable-strip \
118 --sysconfdir=/etc/ssh \
119 --libexecdir=/usr/$(get_libdir)/misc \
120 --datadir=/usr/share/openssh \
121 --with-privsep-path=/var/empty \
122 --with-privsep-user=sshd \
123 --with-md5-passwords \
124 --with-ssl-engine \
125 ${LDAP_PATCH:+$(use ldap && use_with ldap)} \
126 $(use_with libedit) \
127 $(use_with kerberos kerberos5 /usr) \
128 $(use_with tcpd tcp-wrappers) \
129 $(use_with selinux) \
130 $(use_with skey) \
131 $(use_with smartcard opensc) \
132 ${myconf} \
133 || die "bad configure"
134 emake || die "compile problem"
135 }
136
137 src_install() {
138 emake install-nokeys DESTDIR="${D}" || die
139 fperms 600 /etc/ssh/sshd_config
140 dobin contrib/ssh-copy-id
141 newinitd "${FILESDIR}"/sshd.rc6 sshd
142 newconfd "${FILESDIR}"/sshd.confd sshd
143 keepdir /var/empty
144
145 newpamd "${FILESDIR}"/sshd.pam_include.2 sshd
146 use pam \
147 && dosed "/^#UsePAM /s:.*:UsePAM yes:" /etc/ssh/sshd_config \
148 && dosed "/^#PasswordAuthentication /s:.*:PasswordAuthentication no:" /etc/ssh/sshd_config
149
150 doman contrib/ssh-copy-id.1
151 dodoc ChangeLog CREDITS OVERVIEW README* TODO sshd_config
152
153 diropts -m 0700
154 dodir /etc/skel/.ssh
155 }
156
157 pkg_postinst() {
158 enewgroup sshd 22
159 enewuser sshd 22 -1 /var/empty sshd
160
161 # help fix broken perms caused by older ebuilds.
162 # can probably cut this after the next stage release.
163 chmod u+x "${ROOT}"/etc/skel/.ssh >& /dev/null
164
165 ewarn "Remember to merge your config files in /etc/ssh/ and then"
166 ewarn "reload sshd: '/etc/init.d/sshd reload'."
167 if use pam ; then
168 echo
169 ewarn "Please be aware users need a valid shell in /etc/passwd"
170 ewarn "in order to be allowed to login."
171 fi
172 }

  ViewVC Help
Powered by ViewVC 1.1.20