Changeset 1448 for spec/trunk/SPECS


Ignore:
Timestamp:
Jul 27, 2018, 6:43:51 PM (7 years ago)
Author:
Silvan Scherrer
Message:

spec: openssh: Release version 7.7p1-1.

File:
1 edited

Legend:

Unmodified
Added
Removed
  • spec/trunk/SPECS/openssh.spec

    r203 r1448  
     1# !!!! we need a way to deal with the sshd user. right now it needs to be added
     2# !!!! manually with klusrmgr
     3
     4
     5# Note: this .spec is borrowed from:
     6# https://src.fedoraproject.org/cgit/rpms/openssh.git/tree/openssh.spec
     7
    18# Do we want SELinux & Audit
    2 %define WITH_SELINUX 0
     9%global WITH_SELINUX 0
     10
     11%global _hardened_build 1
    312
    413# OpenSSH privilege separation requires a user & group ID
    5 %define sshd_uid    74
    6 %define sshd_gid    74
     14%global sshd_uid    74
     15%global sshd_gid    74
    716
    817# Do we want to disable building of gnome-askpass? (1=yes 0=no)
    9 %define no_gnome_askpass 1
     18%global no_gnome_askpass 1
    1019
    1120# Do we want to link against a static libcrypto? (1=yes 0=no)
    12 %define static_libcrypto 0
    13 
    14 # Do we want smartcard support (1=yes 0=no)
    15 #Smartcard support is broken from 5.4p1
    16 %define scard 0
     21%global static_libcrypto 0
    1722
    1823# Use GTK2 instead of GNOME in gnome-ssh-askpass
    19 %define gtk2 0
     24%global gtk2 0
    2025
    2126# Build position-independent executables (requires toolchain support)?
    22 %define pie 0
     27%global pie 0
    2328
    2429# Do we want kerberos5 support (1=yes 0=no)
    25 %define kerberos5 0
     30%global kerberos5 0
    2631
    2732# Do we want libedit support
    28 %define libedit 0
    29 
    30 # Do we want NSS tokens support
    31 #NSS support is broken from 5.4p1
    32 %define nss 0
    33 
    34 # Whether or not /sbin/nologin exists.
    35 %define nologin 1
     33%global libedit 0
     34
     35# Do we want LDAP support
     36%global ldap 0
    3637
    3738# Whether to build pam_ssh_agent_auth
    38 %define pam_ssh_agent 0
     39%global pam_ssh_agent 0
    3940
    4041# Reserve options to override askpass settings with:
     
    5152%{?static_openssl:%global static_libcrypto 1}
    5253
    53 # Options for Smartcard support: (needs libsectok and openssl-engine)
    54 # rpm -ba|--rebuild --define "smartcard 1"
    55 %{?smartcard:%global scard 1}
    56 
    5754# Is this a build for the rescue CD (without PAM, with MD5)? (1=yes 0=no)
    5855%define rescue 0
     
    6259# Turn off some stuff for resuce builds
    6360%if %{rescue}
    64 %define kerberos5 0
    65 %define libedit 0
    66 %define pam_ssh_agent 0
    67 %endif
     61%global kerberos5 0
     62%global libedit 0
     63%global pam_ssh_agent 0
     64%endif
     65
     66# Do we want keycat package enabled
     67%global keycat 0
     68
     69# Do we want cavs package enabled
     70%global cavs 0
    6871
    6972# Do not forget to bump pam_ssh_agent_auth release if you rewind the main package release to 1
    70 %define openssh_rel 1
    71 %define pam_ssh_agent_rel 24
    72 %define pam_ssh_agent_ver 0.9.2
    73 
    74 Summary: An open source implementation of SSH protocol versions 1 and 2
     73%global openssh_ver 7.7p1
     74%global openssh_rel 1
     75%global pam_ssh_agent_ver 0.10.3
     76%global pam_ssh_agent_rel 4
     77
     78Summary: An open source implementation of SSH protocol versions 2
    7579Name: openssh
    76 Version: 5.9p1
     80Version: %{openssh_ver}
    7781Release: %{openssh_rel}%{?dist}%{?rescue_rel}
    7882URL: http://www.openssh.com/portable.html
    79 
    80 Source0: ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-%{version}.tar.gz
    81 
    82 Patch1: openssh-os2.diff
     83Vendor: bww bitwise works GmbH
     84
     85#scm_source github http://github.com/bitwiseworks/%{name}-os2 master-os2
     86%scm_source git e:/Trees/%{name}/git master-os2
    8387
    8488License: BSD
    8589Group: Applications/Internet
    86 BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
    87 %if %{nologin}
    8890#Requires: /sbin/nologin
    89 %endif
    9091
    9192#Requires: initscripts >= 5.20
     
    100101%endif
    101102
    102 %if %{scard}
    103 BuildRequires: sharutils
    104 %endif
    105 BuildRequires: perl, zlib-devel
    106 #BuildRequires: audit-libs-devel
    107 #BuildRequires: util-linux, groff, man
     103%if %{ldap}
     104BuildRequires: openldap-devel
     105%endif
     106BuildRequires: autoconf, automake, perl-generators, zlib-devel
     107#BuildRequires: perl-interpretor
     108#BuildRequires: audit-libs-devel >= 2.0.5
     109#BuildRequires: util-linux, groff
    108110#BuildRequires: pam-devel
    109 #BuildRequires: tcp_wrappers-devel
    110 #BuildRequires: fipscheck-devel
     111#BuildRequires: fipscheck-devel >= 1.3.0
    111112BuildRequires: openssl-devel >= 0.9.8j
     113#BuildRequires: perl-podlators
     114#BuildRequires: systemd-devel
     115BuildRequires: gcc
     116#BuildRequires: p11-kit-devel
     117#Recommends: p11-kit
    112118
    113119%if %{kerberos5}
     
    119125%endif
    120126
    121 %if %{nss}
    122 BuildRequires: nss-devel
    123 %endif
    124 
    125127%if %{WITH_SELINUX}
    126 Requires: libselinux >= 1.27.7
    127 BuildRequires: libselinux-devel >= 1.27.7
     128Requires: libselinux >= 2.3-5
     129BuildRequires: libselinux-devel >= 2.3-5
    128130Requires: audit-libs >= 1.0.8
    129131BuildRequires: audit-libs >= 1.0.8
     
    131133
    132134#BuildRequires: xauth
    133 BuildRequires: curl-devel ncurses-devel
     135# for tarball signature verification
     136#BuildRequires: gnupg2
    134137
    135138%package clients
     
    137140Requires: openssh = %{version}-%{release}
    138141Group: Applications/Internet
     142#Requires: fipscheck-lib%{_isa} >= 1.3.0
     143#Requires: crypto-policies >= 20180306-1
    139144
    140145%package server
     
    142147Group: System Environment/Daemons
    143148Requires: openssh = %{version}-%{release}
    144 Requires(post): chkconfig >= 0.9, /sbin/service
    145 Requires(pre): /usr/sbin/useradd
    146 Requires: pam >= 1.0.1-3
     149#Requires(pre): /usr/sbin/useradd
     150#Requires: pam >= 1.0.1-3
     151#Requires: fipscheck-lib%{_isa} >= 1.3.0
     152#Requires: crypto-policies >= 20180306-1
     153#%{?systemd_requires}
     154
     155%if %{ldap}
     156%package ldap
     157Summary: A LDAP support for open source SSH server daemon
     158Requires: openssh = %{version}-%{release}
     159Group: System Environment/Daemons
     160%endif
     161
     162%if %{keycat}
     163%package keycat
     164Summary: A mls keycat backend for openssh
     165Requires: openssh = %{version}-%{release}
     166Group: System Environment/Daemons
     167%endif
    147168
    148169%package askpass
     
    153174Provides: openssh-askpass-gnome
    154175
     176%if %{cavs}
     177%package cavs
     178Summary: CAVS tests for FIPS validation
     179Group: Applications/Internet
     180Requires: openssh = %{version}-%{release}
     181%endif
     182
     183%if %{pam_ssh_agent}
    155184%package -n pam_ssh_agent_auth
    156185Summary: PAM module for authentication with ssh-agent
     
    159188Release: %{pam_ssh_agent_rel}.%{openssh_rel}%{?dist}%{?rescue_rel}
    160189License: BSD
     190%endif
    161191
    162192%description
     
    185215securely connect to your SSH server.
    186216
     217%if %{ldap}
     218%description ldap
     219OpenSSH LDAP backend is a way how to distribute the authorized tokens
     220among the servers in the network.
     221%endif
     222
     223%if %{keycat}
     224%description keycat
     225OpenSSH mls keycat is backend for using the authorized keys in the
     226openssh in the mls mode.
     227%endif
     228
    187229%description askpass
    188230OpenSSH is a free version of SSH (Secure SHell), a program for logging
     
    190232an X11 passphrase dialog for OpenSSH.
    191233
     234%if %{cavs}
     235%description cavs
     236This package contains test binaries and scripts to make FIPS validation
     237easier. Now contains CTR and KDF CAVS test driver.
     238%endif
     239
     240%if %{pam_ssh_agent}
    192241%description -n pam_ssh_agent_auth
    193242This package contains a PAM module which can be used to authenticate
     
    197246
    198247The module is most useful for su and sudo service stacks.
     248%endif
     249
     250%debug_package
    199251
    200252%prep
    201 %setup -q
    202 %patch1 -p1 -b .os2~
    203 
     253%scm_setup
     254
     255autoreconf -fvi
    204256
    205257%build
    206 export CONFIG_SHELL="/bin/sh"
    207 export LIBS="-lurpo -lpthread"
     258export LDFLAGS="-Zhigh-mem -Zomf -Zargs-wild -Zargs-resp"
     259export LIBS="-lcx"
     260
     261%if %{rescue}
     262CFLAGS="$CFLAGS -Os"
     263%endif
     264%if %{pie}
     265%ifarch s390 s390x sparc sparcv9 sparc64
     266CFLAGS="$CFLAGS -fPIC"
     267%else
     268CFLAGS="$CFLAGS -fpic"
     269%endif
     270SAVE_LDFLAGS="$LDFLAGS"
     271LDFLAGS="$LDFLAGS -pie -z relro -z now"
     272
     273export CFLAGS
     274export LDFLAGS
     275
     276%endif
     277%if %{kerberos5}
     278if test -r /@unixroot/etc/profile.d/krb5-devel.sh ; then
     279        source /@unixroot/etc/profile.d/krb5-devel.sh
     280fi
     281krb5_prefix=`krb5-config --prefix`
     282if test "$krb5_prefix" != "%{_prefix}" ; then
     283        CPPFLAGS="$CPPFLAGS -I${krb5_prefix}/include -I${krb5_prefix}/include/gssapi"; export CPPFLAGS
     284        CFLAGS="$CFLAGS -I${krb5_prefix}/include -I${krb5_prefix}/include/gssapi"
     285        LDFLAGS="$LDFLAGS -L${krb5_prefix}/%{_lib}"; export LDFLAGS
     286else
     287        krb5_prefix=
     288        CPPFLAGS="-I%{_includedir}/gssapi"; export CPPFLAGS
     289        CFLAGS="$CFLAGS -I%{_includedir}/gssapi"
     290fi
     291%endif
     292
     293# not used configure switches
     294#       --with-systemd \
     295#       --with-default-pkcs11-provider=yes \
    208296
    209297%configure \
     
    218306        --without-zlib-version-check \
    219307        --with-ssl-engine \
     308        --with-ipaddr-display \
     309        --with-pie=no \
    220310        --disable-utmp \
    221311        --disable-utmpx \
    222312        --disable-wtmp \
    223313        --disable-wtmpx \
    224         --disable-libutil \
    225         --disable-pututline \
    226         --disable-pututxline \
    227 %if %{nss}
    228         --with-nss \
    229 %endif
    230 %if %{scard}
    231         --with-smartcard \
     314        --with-mantype=man \
     315%if %{ldap}
     316        --with-ldap \
    232317%endif
    233318%if %{rescue}
     
    238323%if %{WITH_SELINUX}
    239324        --with-selinux --with-linux-audit \
     325        --with-sandbox=seccomp_filter \
    240326%endif
    241327%if %{kerberos5}
     
    245331%endif
    246332%if %{libedit}
    247         --with-libedit \
     333        --with-libedit
    248334%else
    249         --without-libedit \
    250 %endif
    251         "--cache-file=%{_topdir}/cache/%{name}-%{_target_cpu}.cache"
     335        --without-libedit
     336%endif
    252337
    253338%if %{static_libcrypto}
     
    268353pushd contrib
    269354if [ $gtk2 = yes ] ; then
    270         make gnome-ssh-askpass2
     355        CFLAGS="$CFLAGS %{?__global_ldflags}" \
     356            make gnome-ssh-askpass2
    271357        mv gnome-ssh-askpass2 gnome-ssh-askpass
    272358else
    273         make gnome-ssh-askpass1
     359        CFLAGS="$CFLAGS %{?__global_ldflags}"
     360            make gnome-ssh-askpass1
    274361        mv gnome-ssh-askpass1 gnome-ssh-askpass
    275362fi
     
    277364%endif
    278365
    279 %if %{pam_ssh_agent}
    280 pushd pam_ssh_agent_auth-%{pam_ssh_agent_ver}
    281 LDFLAGS="$SAVE_LDFLAGS"
    282 %configure --with-selinux --libexecdir=/%{_lib}/security
    283 make
    284 popd
    285 %endif
    286 
    287366# Add generation of HMAC checksums of the final stripped binaries
    288 %define __spec_install_post_000 \
    289     %{?__debug_package:%{__debug_install_post}} \
    290     %{__arch_install_post} \
    291     %{__os_install_post} \
    292     fipshmac $RPM_BUILD_ROOT%{_bindir}/ssh \
    293     fipshmac $RPM_BUILD_ROOT%{_sbindir}/sshd \
    294 %{nil}
     367#%global __spec_install_post \
     368#    %{?__debug_package:%{__debug_install_post}} \
     369#    %{__arch_install_post} \
     370#    %{__os_install_post} \
     371#    fipshmac -d $RPM_BUILD_ROOT%{_libdir}/fipscheck $RPM_BUILD_ROOT%{_bindir}/ssh $RPM_BUILD_ROOT%{_sbindir}/sshd \
     372#%{nil}
     373
     374%check
     375#to run tests use "--with check"
     376%if %{?_with_check:1}%{!?_with_check:0}
     377make tests
     378%endif
    295379
    296380%install
    297381rm -rf $RPM_BUILD_ROOT
    298382mkdir -p -m755 $RPM_BUILD_ROOT%{_sysconfdir}/ssh
     383mkdir -p -m755 $RPM_BUILD_ROOT%{_sysconfdir}/ssh/ssh_config.d
    299384mkdir -p -m755 $RPM_BUILD_ROOT%{_libexecdir}/openssh
    300385mkdir -p -m755 $RPM_BUILD_ROOT%{_var}/empty/sshd
    301386make install DESTDIR=$RPM_BUILD_ROOT
     387rm -f $RPM_BUILD_ROOT%{_sysconfdir}/ssh/ldap.conf
    302388
    303389install -d $RPM_BUILD_ROOT%{_sysconfdir}/pam.d/
    304 install -d $RPM_BUILD_ROOT%{_sysconfdir}/rc.d/init.d
     390install -d $RPM_BUILD_ROOT%{_sysconfdir}/sysconfig
    305391install -d $RPM_BUILD_ROOT%{_libexecdir}/openssh
    306 #install -m644 %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}/pam.d/sshd
    307 #install -m755 %{SOURCE3} $RPM_BUILD_ROOT%{_sysconfdir}/rc.d/init.d/sshd
    308392install -m755 contrib/ssh-copy-id $RPM_BUILD_ROOT%{_bindir}/
    309 mkdir -p -m755 $RPM_BUILD_ROOT%{_mandir}/man1
    310393install contrib/ssh-copy-id.1 $RPM_BUILD_ROOT%{_mandir}/man1/
    311394
    312395%if ! %{no_gnome_askpass}
    313 install -s contrib/gnome-ssh-askpass $RPM_BUILD_ROOT%{_libexecdir}/openssh/gnome-ssh-askpass
    314 %endif
    315 
    316 %if ! %{scard}
    317         rm -f $RPM_BUILD_ROOT%{_datadir}/openssh/Ssh.bin
     396install contrib/gnome-ssh-askpass $RPM_BUILD_ROOT%{_libexecdir}/openssh/gnome-ssh-askpass
    318397%endif
    319398
     
    331410sed -i -e "s|$RPM_BUILD_ROOT||g" $RPM_BUILD_ROOT%{_mandir}/man*/*
    332411
    333 rm -f README.nss.nss-keys
    334 %if ! %{nss}
    335 rm -f README.nss
    336 %endif
    337 
    338412%if %{pam_ssh_agent}
    339413pushd pam_ssh_agent_auth-%{pam_ssh_agent_ver}
     
    341415popd
    342416%endif
    343 %clean
    344 rm -rf $RPM_BUILD_ROOT
     417
     418%pre
     419#getent group ssh_keys >/dev/null || groupadd -r ssh_keys || :
    345420
    346421%pre server
    347 %if %{nologin}
    348 /usr/sbin/useradd -c "Privilege-separated SSH" -u %{sshd_uid} \
    349         -s /sbin/nologin -r -d /var/empty/sshd sshd 2> /dev/null || :
    350 %else
    351 /usr/sbin/useradd -c "Privilege-separated SSH" -u %{sshd_uid} \
    352         -s /dev/null -r -d /var/empty/sshd sshd 2> /dev/null || :
    353 %endif
     422#getent group sshd >/dev/null || groupadd -g %{sshd_uid} -r sshd || :
     423#getent passwd sshd >/dev/null || \
     424#  useradd -c "Privilege-separated SSH" -u %{sshd_uid} -g sshd \
     425#  -s /sbin/nologin -r -d /var/empty/sshd sshd 2> /dev/null || :
    354426
    355427%post server
    356 /sbin/chkconfig --add sshd
     428#%systemd_post sshd.service sshd.socket
     429
     430%preun server
     431#%systemd_preun sshd.service sshd.socket
    357432
    358433%postun server
    359 /sbin/service sshd condrestart > /dev/null 2>&1 || :
    360 
    361 %preun server
    362 if [ "$1" = 0 ]
    363 then
    364         /sbin/service sshd stop > /dev/null 2>&1 || :
    365         /sbin/chkconfig --del sshd
    366 fi
     434#%systemd_postun_with_restart sshd.service
    367435
    368436%files
    369 %defattr(-,root,root)
    370 %doc CREDITS ChangeLog INSTALL LICENCE OVERVIEW PROTOCOL* README* TODO
    371 #WARNING*
     437%license LICENCE
     438%doc CREDITS INSTALL OVERVIEW PROTOCOL* README* TODO
     439#doc ChangeLog
    372440%attr(0755,root,root) %dir %{_sysconfdir}/ssh
    373 %attr(0600,root,root) %config(noreplace) %{_sysconfdir}/ssh/moduli
     441%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ssh/moduli
    374442%if ! %{rescue}
    375443%attr(0755,root,root) %{_bindir}/ssh-keygen.exe
    376 %attr(0644,root,root) %{_mandir}/cat1/ssh-keygen.1*
     444%attr(0644,root,root) %{_mandir}/man1/ssh-keygen.1*
    377445%attr(0755,root,root) %dir %{_libexecdir}/openssh
    378 %attr(4755,root,root) %{_libexecdir}/openssh/ssh-keysign.exe
    379 %attr(0644,root,root) %{_mandir}/cat8/ssh-keysign.8*
    380 %endif
    381 %if %{scard}
    382 %attr(0755,root,root) %dir %{_datadir}/openssh
    383 %attr(0644,root,root) %{_datadir}/openssh/Ssh.bin
     446%attr(2555,root,ssh_keys) %{_libexecdir}/openssh/ssh-keysign.exe
     447%attr(0644,root,root) %{_mandir}/man8/ssh-keysign.8*
    384448%endif
    385449
    386450%files clients
    387 %defattr(-,root,root)
    388451%attr(0755,root,root) %{_bindir}/ssh.exe
    389452#%attr(0644,root,root) %{_bindir}/.ssh.hmac
    390 %attr(0644,root,root) %{_mandir}/cat1/ssh.1*
     453%attr(0644,root,root) %{_mandir}/man1/ssh.1*
    391454%attr(0755,root,root) %{_bindir}/scp.exe
    392 %attr(0644,root,root) %{_mandir}/cat1/scp.1*
     455%attr(0644,root,root) %{_mandir}/man1/scp.1*
    393456%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/ssh/ssh_config
    394 %attr(0755,root,root) %{_bindir}/slogin.exe
    395 %attr(0644,root,root) %{_mandir}/cat1/slogin.1*
    396 %attr(0644,root,root) %{_mandir}/cat5/ssh_config.5*
     457%dir %attr(0755,root,root) %{_sysconfdir}/ssh/ssh_config.d/
     458%attr(0644,root,root) %{_mandir}/man5/ssh_config.5*
    397459%if ! %{rescue}
    398 %attr(2755,root,nobody) %{_bindir}/ssh-agent.exe
     460%attr(0755,root,root) %{_bindir}/ssh-agent.exe
    399461%attr(0755,root,root) %{_bindir}/ssh-add.exe
    400462%attr(0755,root,root) %{_bindir}/ssh-keyscan.exe
     
    402464%attr(0755,root,root) %{_bindir}/ssh-copy-id
    403465%attr(0755,root,root) %{_libexecdir}/openssh/ssh-pkcs11-helper.exe
    404 %attr(0644,root,root) %{_mandir}/cat1/ssh-agent.1*
    405 %attr(0644,root,root) %{_mandir}/cat1/ssh-add.1*
    406 %attr(0644,root,root) %{_mandir}/cat1/ssh-keyscan.1*
    407 %attr(0644,root,root) %{_mandir}/cat1/sftp.1*
     466%attr(0644,root,root) %{_mandir}/man1/ssh-agent.1*
     467%attr(0644,root,root) %{_mandir}/man1/ssh-add.1*
     468%attr(0644,root,root) %{_mandir}/man1/ssh-keyscan.1*
     469%attr(0644,root,root) %{_mandir}/man1/sftp.1*
    408470%attr(0644,root,root) %{_mandir}/man1/ssh-copy-id.1*
    409 %attr(0644,root,root) %{_mandir}/cat8/ssh-pkcs11-helper.8*
     471%attr(0644,root,root) %{_mandir}/man8/ssh-pkcs11-helper.8*
    410472%endif
    411473
    412474%if ! %{rescue}
    413475%files server
    414 %defattr(-,root,root)
    415476%dir %attr(0711,root,root) %{_var}/empty/sshd
    416477%attr(0755,root,root) %{_sbindir}/sshd.exe
    417 #%attr(0644,root,root) %{_sbindir}/.sshd.hmac
     478#%attr(0644,root,root) %{_libdir}/fipscheck/.sshd.hmac
    418479%attr(0755,root,root) %{_libexecdir}/openssh/sftp-server.exe
    419 %attr(0644,root,root) %{_mandir}/cat5/sshd_config.5*
    420 %attr(0644,root,root) %{_mandir}/cat5/moduli.5*
    421 %attr(0644,root,root) %{_mandir}/cat8/sshd.8*
    422 %attr(0644,root,root) %{_mandir}/cat8/sftp-server.8*
     480#%attr(0755,root,root) %{_libexecdir}/openssh/sshd-keygen.exe
     481%attr(0644,root,root) %{_mandir}/man5/sshd_config.5*
     482%attr(0644,root,root) %{_mandir}/man5/moduli.5*
     483%attr(0644,root,root) %{_mandir}/man8/sshd.8*
     484%attr(0644,root,root) %{_mandir}/man8/sftp-server.8*
    423485%attr(0600,root,root) %config(noreplace) %{_sysconfdir}/ssh/sshd_config
    424486#%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/pam.d/sshd
    425487#%attr(0755,root,root) %{_sysconfdir}/rc.d/init.d/sshd
     488#%attr(0644,root,root) %{_unitdir}/sshd.service
     489#%attr(0644,root,root) %{_unitdir}/sshd@.service
     490#%attr(0644,root,root) %{_unitdir}/sshd.socket
     491#%attr(0644,root,root) %{_unitdir}/sshd-keygen@.service
     492#%attr(0644,root,root) %{_unitdir}/sshd-keygen.target
     493#%attr(0644,root,root) %{_tmpfilesdir}/openssh.conf
     494%endif
     495
     496%if %{ldap}
     497%files ldap
     498%doc HOWTO.ldap-keys openssh-lpk-openldap.schema openssh-lpk-sun.schema ldap.conf
     499%doc openssh-lpk-openldap.ldif openssh-lpk-sun.ldif
     500%attr(0755,root,root) %{_libexecdir}/openssh/ssh-ldap-helper
     501%attr(0755,root,root) %{_libexecdir}/openssh/ssh-ldap-wrapper
     502%attr(0644,root,root) %{_mandir}/man8/ssh-ldap-helper.8*
     503%attr(0644,root,root) %{_mandir}/man5/ssh-ldap.conf.5*
     504%endif
     505
     506%if %{keycat}
     507%files keycat
     508%doc HOWTO.ssh-keycat
     509%attr(0755,root,root) %{_libexecdir}/openssh/ssh-keycat.exe
     510%attr(0644,root,root) %config(noreplace) %{_sysconfdir}/pam.d/ssh-keycat
    426511%endif
    427512
    428513%if ! %{no_gnome_askpass}
    429514%files askpass
    430 %defattr(-,root,root)
    431515%attr(0644,root,root) %{_sysconfdir}/profile.d/gnome-ssh-askpass.*
    432516%attr(0755,root,root) %{_libexecdir}/openssh/gnome-ssh-askpass
     
    434518%endif
    435519
     520%if %{cavs}
     521%files cavs
     522%attr(0755,root,root) %{_libexecdir}/openssh/ctr-cavstest.exe
     523%attr(0755,root,root) %{_libexecdir}/openssh/ssh-cavs.exe
     524%attr(0755,root,root) %{_libexecdir}/openssh/ssh-cavs_driver.pl
     525%endif
     526
    436527%if %{pam_ssh_agent}
    437528%files -n pam_ssh_agent_auth
    438 %defattr(-,root,root)
    439 %doc pam_ssh_agent_auth-%{pam_ssh_agent_ver}/OPENSSH_LICENSE
     529%license pam_ssh_agent_auth-%{pam_ssh_agent_ver}/OPENSSH_LICENSE
    440530%attr(0755,root,root) /%{_lib}/security/pam_ssh_agent_auth.so
    441 %attr(0644,root,root) %{_mandir}/cat8/pam_ssh_agent_auth.8*
     531%attr(0644,root,root) %{_mandir}/man8/pam_ssh_agent_auth.8*
    442532%endif
    443533
    444534%changelog
     535* Fri Jul 27 2018 Silvan Scherrer <silvan.scherrer@aroa.ch> 7.7p1-1
     536- Update to version 1.0.2o.
     537- moved source to github
Note: See TracChangeset for help on using the changeset viewer.