[packages/openssh] - up to 6.7p1
arekm
arekm at pld-linux.org
Tue Oct 7 16:15:10 CEST 2014
commit f6a10c3774a3ceb388a0818f190523ca372209c5
Author: Arkadiusz Miśkiewicz <arekm at maven.pl>
Date: Tue Oct 7 16:15:07 2014 +0200
- up to 6.7p1
openssh-chroot.patch | 23 ++++++++++-------------
openssh.spec | 10 ++++------
2 files changed, 14 insertions(+), 19 deletions(-)
---
diff --git a/openssh.spec b/openssh.spec
index 55d217d..ef673d8 100644
--- a/openssh.spec
+++ b/openssh.spec
@@ -33,13 +33,13 @@ Summary(pt_BR.UTF-8): Implementação livre do SSH
Summary(ru.UTF-8): OpenSSH - свободная реализация протокола Secure Shell (SSH)
Summary(uk.UTF-8): OpenSSH - вільна реалізація протоколу Secure Shell (SSH)
Name: openssh
-Version: 6.6p1
-Release: 4
+Version: 6.7p1
+Release: 1
Epoch: 2
License: BSD
Group: Applications/Networking
Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/%{name}-%{version}.tar.gz
-# Source0-md5: 3e9800e6bca1fbac0eea4d41baa7f239
+# Source0-md5: 3246aa79317b1d23cae783a3bf8275d6
Source1: http://www.mif.pg.gda.pl/homepages/ankry/man-PLD/%{name}-non-english-man-pages.tar.bz2
# Source1-md5: 66943d481cc422512b537bcc2c7400d1
Source2: %{name}d.init
@@ -81,9 +81,8 @@ BuildRequires: automake
%{?with_kerberos5:BuildRequires: heimdal-devel >= 0.7}
%{?with_libedit:BuildRequires: libedit-devel}
%{?with_selinux:BuildRequires: libselinux-devel}
-BuildRequires: libwrap-devel
%{?with_ldap:BuildRequires: openldap-devel}
-BuildRequires: openssl-devel >= 0.9.7d
+BuildRequires: openssl-devel >= 0.9.8f
BuildRequires: pam-devel
%{?with_gtk:BuildRequires: pkgconfig}
BuildRequires: rpm >= 4.4.9-56
@@ -578,7 +577,6 @@ CPPFLAGS="%{rpmcppflags} -DCHROOT -std=gnu99"
--with-sandbox=seccomp_filter \
%endif
%{?with_selinux:--with-selinux} \
- --with-tcp-wrappers \
%if "%{pld_release}" == "ac"
--with-xauth=/usr/X11R6/bin/xauth
%else
diff --git a/openssh-chroot.patch b/openssh-chroot.patch
index 5dda773..3c93ac0 100644
--- a/openssh-chroot.patch
+++ b/openssh-chroot.patch
@@ -64,21 +64,21 @@
* poke the client this often to
--- ./session.c.org 2008-05-05 16:22:11.935003283 +0200
+++ ./session.c 2008-05-05 16:32:50.025507650 +0200
-@@ -1345,6 +1345,10 @@ void
- do_setusercontext(struct passwd *pw)
- {
- char *chroot_path, *tmp;
+@@ -1492,6 +1492,10 @@ do_setusercontext(struct passwd *pw)
+ #ifdef USE_LIBIAF
+ int doing_chroot = 0;
+ #endif
+#ifdef CHROOT
+ char *user_dir;
+ char *new_root;
+#endif /* CHROOT */
- #ifdef WITH_SELINUX
- /* Cache selinux status for later use */
-@@ -1425,8 +1429,28 @@ do_setusercontext(struct passwd *pw)
- /* Make sure we don't attempt to chroot again */
- free(options.chroot_directory);
- options.chroot_directory = NULL;
+ platform_setusercontext(pw);
+
+@@ -1534,6 +1538,25 @@ do_setusercontext(struct passwd *pw)
+ #ifdef USE_LIBIAF
+ doing_chroot = 1;
+ #endif
+#ifdef CHROOT
+ } else if (options.use_chroot) {
+ user_dir = xstrdup(pw->pw_dir);
@@ -100,10 +100,7 @@
+#endif /* CHROOT */
}
-+
#ifdef HAVE_LOGIN_CAP
- if (setusercontext(lc, pw, pw->pw_uid, LOGIN_SETUSER) < 0) {
- perror("unable to set user context (setuser)");
--- openssh-3.7.1p2/sshd_config 2003-09-02 14:51:18.000000000 +0200
+++ openssh-3.7.1p2.pius/sshd_config 2003-10-07 20:49:08.000000000 +0200
@@ -91,6 +91,10 @@
================================================================
---- gitweb:
http://git.pld-linux.org/gitweb.cgi/packages/openssh.git/commitdiff/f6a10c3774a3ceb388a0818f190523ca372209c5
More information about the pld-cvs-commit
mailing list