Changeset 1448 for spec/trunk/SPECS
- Timestamp:
- Jul 27, 2018, 6:43:51 PM (7 years ago)
- File:
-
- 1 edited
-
spec/trunk/SPECS/openssh.spec (modified) (22 diffs)
Legend:
- Unmodified
- Added
- Removed
-
spec/trunk/SPECS/openssh.spec
r203 r1448 1 # !!!! we need a way to deal with the sshd user. right now it needs to be added 2 # !!!! manually with klusrmgr 3 4 5 # Note: this .spec is borrowed from: 6 # https://src.fedoraproject.org/cgit/rpms/openssh.git/tree/openssh.spec 7 1 8 # Do we want SELinux & Audit 2 %define WITH_SELINUX 0 9 %global WITH_SELINUX 0 10 11 %global _hardened_build 1 3 12 4 13 # OpenSSH privilege separation requires a user & group ID 5 % definesshd_uid 746 % definesshd_gid 7414 %global sshd_uid 74 15 %global sshd_gid 74 7 16 8 17 # Do we want to disable building of gnome-askpass? (1=yes 0=no) 9 % defineno_gnome_askpass 118 %global no_gnome_askpass 1 10 19 11 20 # Do we want to link against a static libcrypto? (1=yes 0=no) 12 %define static_libcrypto 0 13 14 # Do we want smartcard support (1=yes 0=no) 15 #Smartcard support is broken from 5.4p1 16 %define scard 0 21 %global static_libcrypto 0 17 22 18 23 # Use GTK2 instead of GNOME in gnome-ssh-askpass 19 % definegtk2 024 %global gtk2 0 20 25 21 26 # Build position-independent executables (requires toolchain support)? 22 % definepie 027 %global pie 0 23 28 24 29 # Do we want kerberos5 support (1=yes 0=no) 25 % definekerberos5 030 %global kerberos5 0 26 31 27 32 # Do we want libedit support 28 %define libedit 0 29 30 # Do we want NSS tokens support 31 #NSS support is broken from 5.4p1 32 %define nss 0 33 34 # Whether or not /sbin/nologin exists. 35 %define nologin 1 33 %global libedit 0 34 35 # Do we want LDAP support 36 %global ldap 0 36 37 37 38 # Whether to build pam_ssh_agent_auth 38 % definepam_ssh_agent 039 %global pam_ssh_agent 0 39 40 40 41 # Reserve options to override askpass settings with: … … 51 52 %{?static_openssl:%global static_libcrypto 1} 52 53 53 # Options for Smartcard support: (needs libsectok and openssl-engine)54 # rpm -ba|--rebuild --define "smartcard 1"55 %{?smartcard:%global scard 1}56 57 54 # Is this a build for the rescue CD (without PAM, with MD5)? (1=yes 0=no) 58 55 %define rescue 0 … … 62 59 # Turn off some stuff for resuce builds 63 60 %if %{rescue} 64 %define kerberos5 0 65 %define libedit 0 66 %define pam_ssh_agent 0 67 %endif 61 %global kerberos5 0 62 %global libedit 0 63 %global pam_ssh_agent 0 64 %endif 65 66 # Do we want keycat package enabled 67 %global keycat 0 68 69 # Do we want cavs package enabled 70 %global cavs 0 68 71 69 72 # Do not forget to bump pam_ssh_agent_auth release if you rewind the main package release to 1 70 %define openssh_rel 1 71 %define pam_ssh_agent_rel 24 72 %define pam_ssh_agent_ver 0.9.2 73 74 Summary: An open source implementation of SSH protocol versions 1 and 2 73 %global openssh_ver 7.7p1 74 %global openssh_rel 1 75 %global pam_ssh_agent_ver 0.10.3 76 %global pam_ssh_agent_rel 4 77 78 Summary: An open source implementation of SSH protocol versions 2 75 79 Name: openssh 76 Version: 5.9p180 Version: %{openssh_ver} 77 81 Release: %{openssh_rel}%{?dist}%{?rescue_rel} 78 82 URL: http://www.openssh.com/portable.html 79 80 Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz 81 82 Patch1: openssh-os2.diff 83 Vendor: bww bitwise works GmbH 84 85 #scm_source github http://github.com/bitwiseworks/%{name}-os2 master-os2 86 %scm_source git e:/Trees/%{name}/git master-os2 83 87 84 88 License: BSD 85 89 Group: Applications/Internet 86 BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)87 %if %{nologin}88 90 #Requires: /sbin/nologin 89 %endif90 91 91 92 #Requires: initscripts >= 5.20 … … 100 101 %endif 101 102 102 %if %{scard} 103 BuildRequires: sharutils 104 %endif 105 BuildRequires: perl, zlib-devel 106 #BuildRequires: audit-libs-devel 107 #BuildRequires: util-linux, groff, man 103 %if %{ldap} 104 BuildRequires: openldap-devel 105 %endif 106 BuildRequires: autoconf, automake, perl-generators, zlib-devel 107 #BuildRequires: perl-interpretor 108 #BuildRequires: audit-libs-devel >= 2.0.5 109 #BuildRequires: util-linux, groff 108 110 #BuildRequires: pam-devel 109 #BuildRequires: tcp_wrappers-devel 110 #BuildRequires: fipscheck-devel 111 #BuildRequires: fipscheck-devel >= 1.3.0 111 112 BuildRequires: openssl-devel >= 0.9.8j 113 #BuildRequires: perl-podlators 114 #BuildRequires: systemd-devel 115 BuildRequires: gcc 116 #BuildRequires: p11-kit-devel 117 #Recommends: p11-kit 112 118 113 119 %if %{kerberos5} … … 119 125 %endif 120 126 121 %if %{nss}122 BuildRequires: nss-devel123 %endif124 125 127 %if %{WITH_SELINUX} 126 Requires: libselinux >= 1.27.7127 BuildRequires: libselinux-devel >= 1.27.7128 Requires: libselinux >= 2.3-5 129 BuildRequires: libselinux-devel >= 2.3-5 128 130 Requires: audit-libs >= 1.0.8 129 131 BuildRequires: audit-libs >= 1.0.8 … … 131 133 132 134 #BuildRequires: xauth 133 BuildRequires: curl-devel ncurses-devel 135 # for tarball signature verification 136 #BuildRequires: gnupg2 134 137 135 138 %package clients … … 137 140 Requires: openssh = %{version}-%{release} 138 141 Group: Applications/Internet 142 #Requires: fipscheck-lib%{_isa} >= 1.3.0 143 #Requires: crypto-policies >= 20180306-1 139 144 140 145 %package server … … 142 147 Group: System Environment/Daemons 143 148 Requires: openssh = %{version}-%{release} 144 Requires(post): chkconfig >= 0.9, /sbin/service 145 Requires(pre): /usr/sbin/useradd 146 Requires: pam >= 1.0.1-3 149 #Requires(pre): /usr/sbin/useradd 150 #Requires: pam >= 1.0.1-3 151 #Requires: fipscheck-lib%{_isa} >= 1.3.0 152 #Requires: crypto-policies >= 20180306-1 153 #%{?systemd_requires} 154 155 %if %{ldap} 156 %package ldap 157 Summary: A LDAP support for open source SSH server daemon 158 Requires: openssh = %{version}-%{release} 159 Group: System Environment/Daemons 160 %endif 161 162 %if %{keycat} 163 %package keycat 164 Summary: A mls keycat backend for openssh 165 Requires: openssh = %{version}-%{release} 166 Group: System Environment/Daemons 167 %endif 147 168 148 169 %package askpass … … 153 174 Provides: openssh-askpass-gnome 154 175 176 %if %{cavs} 177 %package cavs 178 Summary: CAVS tests for FIPS validation 179 Group: Applications/Internet 180 Requires: openssh = %{version}-%{release} 181 %endif 182 183 %if %{pam_ssh_agent} 155 184 %package -n pam_ssh_agent_auth 156 185 Summary: PAM module for authentication with ssh-agent … … 159 188 Release: %{pam_ssh_agent_rel}.%{openssh_rel}%{?dist}%{?rescue_rel} 160 189 License: BSD 190 %endif 161 191 162 192 %description … … 185 215 securely connect to your SSH server. 186 216 217 %if %{ldap} 218 %description ldap 219 OpenSSH LDAP backend is a way how to distribute the authorized tokens 220 among the servers in the network. 221 %endif 222 223 %if %{keycat} 224 %description keycat 225 OpenSSH mls keycat is backend for using the authorized keys in the 226 openssh in the mls mode. 227 %endif 228 187 229 %description askpass 188 230 OpenSSH is a free version of SSH (Secure SHell), a program for logging … … 190 232 an X11 passphrase dialog for OpenSSH. 191 233 234 %if %{cavs} 235 %description cavs 236 This package contains test binaries and scripts to make FIPS validation 237 easier. Now contains CTR and KDF CAVS test driver. 238 %endif 239 240 %if %{pam_ssh_agent} 192 241 %description -n pam_ssh_agent_auth 193 242 This package contains a PAM module which can be used to authenticate … … 197 246 198 247 The module is most useful for su and sudo service stacks. 248 %endif 249 250 %debug_package 199 251 200 252 %prep 201 %s etup -q202 %patch1 -p1 -b .os2~ 203 253 %scm_setup 254 255 autoreconf -fvi 204 256 205 257 %build 206 export CONFIG_SHELL="/bin/sh" 207 export LIBS="-lurpo -lpthread" 258 export LDFLAGS="-Zhigh-mem -Zomf -Zargs-wild -Zargs-resp" 259 export LIBS="-lcx" 260 261 %if %{rescue} 262 CFLAGS="$CFLAGS -Os" 263 %endif 264 %if %{pie} 265 %ifarch s390 s390x sparc sparcv9 sparc64 266 CFLAGS="$CFLAGS -fPIC" 267 %else 268 CFLAGS="$CFLAGS -fpic" 269 %endif 270 SAVE_LDFLAGS="$LDFLAGS" 271 LDFLAGS="$LDFLAGS -pie -z relro -z now" 272 273 export CFLAGS 274 export LDFLAGS 275 276 %endif 277 %if %{kerberos5} 278 if test -r /@unixroot/etc/profile.d/krb5-devel.sh ; then 279 source /@unixroot/etc/profile.d/krb5-devel.sh 280 fi 281 krb5_prefix=`krb5-config --prefix` 282 if test "$krb5_prefix" != "%{_prefix}" ; then 283 CPPFLAGS="$CPPFLAGS -I${krb5_prefix}/include -I${krb5_prefix}/include/gssapi"; export CPPFLAGS 284 CFLAGS="$CFLAGS -I${krb5_prefix}/include -I${krb5_prefix}/include/gssapi" 285 LDFLAGS="$LDFLAGS -L${krb5_prefix}/%{_lib}"; export LDFLAGS 286 else 287 krb5_prefix= 288 CPPFLAGS="-I%{_includedir}/gssapi"; export CPPFLAGS 289 CFLAGS="$CFLAGS -I%{_includedir}/gssapi" 290 fi 291 %endif 292 293 # not used configure switches 294 # --with-systemd \ 295 # --with-default-pkcs11-provider=yes \ 208 296 209 297 %configure \ … … 218 306 --without-zlib-version-check \ 219 307 --with-ssl-engine \ 308 --with-ipaddr-display \ 309 --with-pie=no \ 220 310 --disable-utmp \ 221 311 --disable-utmpx \ 222 312 --disable-wtmp \ 223 313 --disable-wtmpx \ 224 --disable-libutil \ 225 --disable-pututline \ 226 --disable-pututxline \ 227 %if %{nss} 228 --with-nss \ 229 %endif 230 %if %{scard} 231 --with-smartcard \ 314 --with-mantype=man \ 315 %if %{ldap} 316 --with-ldap \ 232 317 %endif 233 318 %if %{rescue} … … 238 323 %if %{WITH_SELINUX} 239 324 --with-selinux --with-linux-audit \ 325 --with-sandbox=seccomp_filter \ 240 326 %endif 241 327 %if %{kerberos5} … … 245 331 %endif 246 332 %if %{libedit} 247 --with-libedit \333 --with-libedit 248 334 %else 249 --without-libedit \ 250 %endif 251 "--cache-file=%{_topdir}/cache/%{name}-%{_target_cpu}.cache" 335 --without-libedit 336 %endif 252 337 253 338 %if %{static_libcrypto} … … 268 353 pushd contrib 269 354 if [ $gtk2 = yes ] ; then 270 make gnome-ssh-askpass2 355 CFLAGS="$CFLAGS %{?__global_ldflags}" \ 356 make gnome-ssh-askpass2 271 357 mv gnome-ssh-askpass2 gnome-ssh-askpass 272 358 else 273 make gnome-ssh-askpass1 359 CFLAGS="$CFLAGS %{?__global_ldflags}" 360 make gnome-ssh-askpass1 274 361 mv gnome-ssh-askpass1 gnome-ssh-askpass 275 362 fi … … 277 364 %endif 278 365 279 %if %{pam_ssh_agent}280 pushd pam_ssh_agent_auth-%{pam_ssh_agent_ver}281 LDFLAGS="$SAVE_LDFLAGS"282 %configure --with-selinux --libexecdir=/%{_lib}/security283 make284 popd285 %endif286 287 366 # Add generation of HMAC checksums of the final stripped binaries 288 %define __spec_install_post_000 \ 289 %{?__debug_package:%{__debug_install_post}} \ 290 %{__arch_install_post} \ 291 %{__os_install_post} \ 292 fipshmac $RPM_BUILD_ROOT%{_bindir}/ssh \ 293 fipshmac $RPM_BUILD_ROOT%{_sbindir}/sshd \ 294 %{nil} 367 #%global __spec_install_post \ 368 # %{?__debug_package:%{__debug_install_post}} \ 369 # %{__arch_install_post} \ 370 # %{__os_install_post} \ 371 # fipshmac -d $RPM_BUILD_ROOT%{_libdir}/fipscheck $RPM_BUILD_ROOT%{_bindir}/ssh $RPM_BUILD_ROOT%{_sbindir}/sshd \ 372 #%{nil} 373 374 %check 375 #to run tests use "--with check" 376 %if %{?_with_check:1}%{!?_with_check:0} 377 make tests 378 %endif 295 379 296 380 %install 297 381 rm -rf $RPM_BUILD_ROOT 298 382 mkdir -p -m755 $RPM_BUILD_ROOT%{_sysconfdir}/ssh 383 mkdir -p -m755 $RPM_BUILD_ROOT%{_sysconfdir}/ssh/ssh_config.d 299 384 mkdir -p -m755 $RPM_BUILD_ROOT%{_libexecdir}/openssh 300 385 mkdir -p -m755 $RPM_BUILD_ROOT%{_var}/empty/sshd 301 386 make install DESTDIR=$RPM_BUILD_ROOT 387 rm -f $RPM_BUILD_ROOT%{_sysconfdir}/ssh/ldap.conf 302 388 303 389 install -d $RPM_BUILD_ROOT%{_sysconfdir}/pam.d/ 304 install -d $RPM_BUILD_ROOT%{_sysconfdir}/ rc.d/init.d390 install -d $RPM_BUILD_ROOT%{_sysconfdir}/sysconfig 305 391 install -d $RPM_BUILD_ROOT%{_libexecdir}/openssh 306 #install -m644 %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pam.d/sshd307 #install -m755 %{SOURCE3} $RPM_BUILD_ROOT%{_sysconfdir}/rc.d/init.d/sshd308 392 install -m755 contrib/ssh-copy-id $RPM_BUILD_ROOT%{_bindir}/ 309 mkdir -p -m755 $RPM_BUILD_ROOT%{_mandir}/man1310 393 install contrib/ssh-copy-id.1 $RPM_BUILD_ROOT%{_mandir}/man1/ 311 394 312 395 %if ! %{no_gnome_askpass} 313 install -s contrib/gnome-ssh-askpass $RPM_BUILD_ROOT%{_libexecdir}/openssh/gnome-ssh-askpass 314 %endif 315 316 %if ! %{scard} 317 rm -f $RPM_BUILD_ROOT%{_datadir}/openssh/Ssh.bin 396 install contrib/gnome-ssh-askpass $RPM_BUILD_ROOT%{_libexecdir}/openssh/gnome-ssh-askpass 318 397 %endif 319 398 … … 331 410 sed -i -e "s|$RPM_BUILD_ROOT||g" $RPM_BUILD_ROOT%{_mandir}/man*/* 332 411 333 rm -f README.nss.nss-keys334 %if ! %{nss}335 rm -f README.nss336 %endif337 338 412 %if %{pam_ssh_agent} 339 413 pushd pam_ssh_agent_auth-%{pam_ssh_agent_ver} … … 341 415 popd 342 416 %endif 343 %clean 344 rm -rf $RPM_BUILD_ROOT 417 418 %pre 419 #getent group ssh_keys >/dev/null || groupadd -r ssh_keys || : 345 420 346 421 %pre server 347 %if %{nologin} 348 /usr/sbin/useradd -c "Privilege-separated SSH" -u %{sshd_uid} \ 349 -s /sbin/nologin -r -d /var/empty/sshd sshd 2> /dev/null || : 350 %else 351 /usr/sbin/useradd -c "Privilege-separated SSH" -u %{sshd_uid} \ 352 -s /dev/null -r -d /var/empty/sshd sshd 2> /dev/null || : 353 %endif 422 #getent group sshd >/dev/null || groupadd -g %{sshd_uid} -r sshd || : 423 #getent passwd sshd >/dev/null || \ 424 # useradd -c "Privilege-separated SSH" -u %{sshd_uid} -g sshd \ 425 # -s /sbin/nologin -r -d /var/empty/sshd sshd 2> /dev/null || : 354 426 355 427 %post server 356 /sbin/chkconfig --add sshd 428 #%systemd_post sshd.service sshd.socket 429 430 %preun server 431 #%systemd_preun sshd.service sshd.socket 357 432 358 433 %postun server 359 /sbin/service sshd condrestart > /dev/null 2>&1 || : 360 361 %preun server 362 if [ "$1" = 0 ] 363 then 364 /sbin/service sshd stop > /dev/null 2>&1 || : 365 /sbin/chkconfig --del sshd 366 fi 434 #%systemd_postun_with_restart sshd.service 367 435 368 436 %files 369 % defattr(-,root,root)370 %doc CREDITS ChangeLog INSTALL LICENCEOVERVIEW PROTOCOL* README* TODO371 # WARNING*437 %license LICENCE 438 %doc CREDITS INSTALL OVERVIEW PROTOCOL* README* TODO 439 #doc ChangeLog 372 440 %attr(0755,root,root) %dir %{_sysconfdir}/ssh 373 %attr(06 00,root,root) %config(noreplace) %{_sysconfdir}/ssh/moduli441 %attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ssh/moduli 374 442 %if ! %{rescue} 375 443 %attr(0755,root,root) %{_bindir}/ssh-keygen.exe 376 %attr(0644,root,root) %{_mandir}/ cat1/ssh-keygen.1*444 %attr(0644,root,root) %{_mandir}/man1/ssh-keygen.1* 377 445 %attr(0755,root,root) %dir %{_libexecdir}/openssh 378 %attr(4755,root,root) %{_libexecdir}/openssh/ssh-keysign.exe 379 %attr(0644,root,root) %{_mandir}/cat8/ssh-keysign.8* 380 %endif 381 %if %{scard} 382 %attr(0755,root,root) %dir %{_datadir}/openssh 383 %attr(0644,root,root) %{_datadir}/openssh/Ssh.bin 446 %attr(2555,root,ssh_keys) %{_libexecdir}/openssh/ssh-keysign.exe 447 %attr(0644,root,root) %{_mandir}/man8/ssh-keysign.8* 384 448 %endif 385 449 386 450 %files clients 387 %defattr(-,root,root)388 451 %attr(0755,root,root) %{_bindir}/ssh.exe 389 452 #%attr(0644,root,root) %{_bindir}/.ssh.hmac 390 %attr(0644,root,root) %{_mandir}/ cat1/ssh.1*453 %attr(0644,root,root) %{_mandir}/man1/ssh.1* 391 454 %attr(0755,root,root) %{_bindir}/scp.exe 392 %attr(0644,root,root) %{_mandir}/ cat1/scp.1*455 %attr(0644,root,root) %{_mandir}/man1/scp.1* 393 456 %attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ssh/ssh_config 394 %attr(0755,root,root) %{_bindir}/slogin.exe 395 %attr(0644,root,root) %{_mandir}/cat1/slogin.1* 396 %attr(0644,root,root) %{_mandir}/cat5/ssh_config.5* 457 %dir %attr(0755,root,root) %{_sysconfdir}/ssh/ssh_config.d/ 458 %attr(0644,root,root) %{_mandir}/man5/ssh_config.5* 397 459 %if ! %{rescue} 398 %attr( 2755,root,nobody) %{_bindir}/ssh-agent.exe460 %attr(0755,root,root) %{_bindir}/ssh-agent.exe 399 461 %attr(0755,root,root) %{_bindir}/ssh-add.exe 400 462 %attr(0755,root,root) %{_bindir}/ssh-keyscan.exe … … 402 464 %attr(0755,root,root) %{_bindir}/ssh-copy-id 403 465 %attr(0755,root,root) %{_libexecdir}/openssh/ssh-pkcs11-helper.exe 404 %attr(0644,root,root) %{_mandir}/ cat1/ssh-agent.1*405 %attr(0644,root,root) %{_mandir}/ cat1/ssh-add.1*406 %attr(0644,root,root) %{_mandir}/ cat1/ssh-keyscan.1*407 %attr(0644,root,root) %{_mandir}/ cat1/sftp.1*466 %attr(0644,root,root) %{_mandir}/man1/ssh-agent.1* 467 %attr(0644,root,root) %{_mandir}/man1/ssh-add.1* 468 %attr(0644,root,root) %{_mandir}/man1/ssh-keyscan.1* 469 %attr(0644,root,root) %{_mandir}/man1/sftp.1* 408 470 %attr(0644,root,root) %{_mandir}/man1/ssh-copy-id.1* 409 %attr(0644,root,root) %{_mandir}/ cat8/ssh-pkcs11-helper.8*471 %attr(0644,root,root) %{_mandir}/man8/ssh-pkcs11-helper.8* 410 472 %endif 411 473 412 474 %if ! %{rescue} 413 475 %files server 414 %defattr(-,root,root)415 476 %dir %attr(0711,root,root) %{_var}/empty/sshd 416 477 %attr(0755,root,root) %{_sbindir}/sshd.exe 417 #%attr(0644,root,root) %{_ sbindir}/.sshd.hmac478 #%attr(0644,root,root) %{_libdir}/fipscheck/.sshd.hmac 418 479 %attr(0755,root,root) %{_libexecdir}/openssh/sftp-server.exe 419 %attr(0644,root,root) %{_mandir}/cat5/sshd_config.5* 420 %attr(0644,root,root) %{_mandir}/cat5/moduli.5* 421 %attr(0644,root,root) %{_mandir}/cat8/sshd.8* 422 %attr(0644,root,root) %{_mandir}/cat8/sftp-server.8* 480 #%attr(0755,root,root) %{_libexecdir}/openssh/sshd-keygen.exe 481 %attr(0644,root,root) %{_mandir}/man5/sshd_config.5* 482 %attr(0644,root,root) %{_mandir}/man5/moduli.5* 483 %attr(0644,root,root) %{_mandir}/man8/sshd.8* 484 %attr(0644,root,root) %{_mandir}/man8/sftp-server.8* 423 485 %attr(0600,root,root) %config(noreplace) %{_sysconfdir}/ssh/sshd_config 424 486 #%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/pam.d/sshd 425 487 #%attr(0755,root,root) %{_sysconfdir}/rc.d/init.d/sshd 488 #%attr(0644,root,root) %{_unitdir}/sshd.service 489 #%attr(0644,root,root) %{_unitdir}/sshd@.service 490 #%attr(0644,root,root) %{_unitdir}/sshd.socket 491 #%attr(0644,root,root) %{_unitdir}/sshd-keygen@.service 492 #%attr(0644,root,root) %{_unitdir}/sshd-keygen.target 493 #%attr(0644,root,root) %{_tmpfilesdir}/openssh.conf 494 %endif 495 496 %if %{ldap} 497 %files ldap 498 %doc HOWTO.ldap-keys openssh-lpk-openldap.schema openssh-lpk-sun.schema ldap.conf 499 %doc openssh-lpk-openldap.ldif openssh-lpk-sun.ldif 500 %attr(0755,root,root) %{_libexecdir}/openssh/ssh-ldap-helper 501 %attr(0755,root,root) %{_libexecdir}/openssh/ssh-ldap-wrapper 502 %attr(0644,root,root) %{_mandir}/man8/ssh-ldap-helper.8* 503 %attr(0644,root,root) %{_mandir}/man5/ssh-ldap.conf.5* 504 %endif 505 506 %if %{keycat} 507 %files keycat 508 %doc HOWTO.ssh-keycat 509 %attr(0755,root,root) %{_libexecdir}/openssh/ssh-keycat.exe 510 %attr(0644,root,root) %config(noreplace) %{_sysconfdir}/pam.d/ssh-keycat 426 511 %endif 427 512 428 513 %if ! %{no_gnome_askpass} 429 514 %files askpass 430 %defattr(-,root,root)431 515 %attr(0644,root,root) %{_sysconfdir}/profile.d/gnome-ssh-askpass.* 432 516 %attr(0755,root,root) %{_libexecdir}/openssh/gnome-ssh-askpass … … 434 518 %endif 435 519 520 %if %{cavs} 521 %files cavs 522 %attr(0755,root,root) %{_libexecdir}/openssh/ctr-cavstest.exe 523 %attr(0755,root,root) %{_libexecdir}/openssh/ssh-cavs.exe 524 %attr(0755,root,root) %{_libexecdir}/openssh/ssh-cavs_driver.pl 525 %endif 526 436 527 %if %{pam_ssh_agent} 437 528 %files -n pam_ssh_agent_auth 438 %defattr(-,root,root) 439 %doc pam_ssh_agent_auth-%{pam_ssh_agent_ver}/OPENSSH_LICENSE 529 %license pam_ssh_agent_auth-%{pam_ssh_agent_ver}/OPENSSH_LICENSE 440 530 %attr(0755,root,root) /%{_lib}/security/pam_ssh_agent_auth.so 441 %attr(0644,root,root) %{_mandir}/ cat8/pam_ssh_agent_auth.8*531 %attr(0644,root,root) %{_mandir}/man8/pam_ssh_agent_auth.8* 442 532 %endif 443 533 444 534 %changelog 535 * Fri Jul 27 2018 Silvan Scherrer <silvan.scherrer@aroa.ch> 7.7p1-1 536 - Update to version 1.0.2o. 537 - moved source to github
Note:
See TracChangeset
for help on using the changeset viewer.
