# Copyright 1999-2013 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 # $Header: /var/cvsroot/gentoo-x86/net-misc/openssh/openssh-5.9_p1-r4.ebuild,v 1.16 2013/12/11 09:37:15 radhermit Exp $ EAPI="2" inherit eutils user flag-o-matic multilib autotools pam systemd # Make it more portable between straight releases # and _p? releases. PARCH=${P/_} HPN_PATCH="${PARCH}-hpn13v11.diff.gz" LDAP_PATCH="${PARCH/-/-lpk-}-0.3.14.patch.gz" X509_VER="7.0" X509_PATCH="${PARCH}+x509-${X509_VER}.diff.gz" DESCRIPTION="Port of OpenBSD's free SSH release" HOMEPAGE="http://www.openssh.org/" SRC_URI="mirror://openbsd/OpenSSH/portable/${PARCH}.tar.gz ${HPN_PATCH:+hpn? ( http://www.psc.edu/networking/projects/hpn-ssh/${HPN_PATCH} mirror://gentoo/${HPN_PATCH} )} ${LDAP_PATCH:+ldap? ( mirror://gentoo/${LDAP_PATCH} )} ${X509_PATCH:+X509? ( http://roumenpetrov.info/openssh/x509-${X509_VER}/${X509_PATCH} )} " LICENSE="BSD GPL-2" SLOT="0" KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~sparc-fbsd ~x86-fbsd" IUSE="bindist ${HPN_PATCH:++}hpn kerberos ldap libedit pam selinux skey static tcpd X X509" RDEPEND="pam? ( virtual/pam ) kerberos? ( virtual/krb5 ) selinux? ( >=sys-libs/libselinux-1.28 ) skey? ( >=sys-auth/skey-1.1.5-r1 ) ldap? ( net-nds/openldap ) libedit? ( dev-libs/libedit ) >=dev-libs/openssl-0.9.6d:0[bindist=] >=sys-libs/zlib-1.2.3 tcpd? ( >=sys-apps/tcp-wrappers-7.6 ) X? ( x11-apps/xauth ) userland_GNU? ( virtual/shadow )" DEPEND="${RDEPEND} virtual/pkgconfig virtual/os-headers sys-devel/autoconf" RDEPEND="${RDEPEND} pam? ( >=sys-auth/pambase-20081028 )" S=${WORKDIR}/${PARCH} pkg_setup() { # this sucks, but i'd rather have people unable to `emerge -u openssh` # than not be able to log in to their server any more maybe_fail() { [[ -z ${!2} ]] && echo ${1} ; } local fail=" $(use X509 && maybe_fail X509 X509_PATCH) $(use ldap && maybe_fail ldap LDAP_PATCH) $(use hpn && maybe_fail hpn HPN_PATCH) " fail=$(echo ${fail}) if [[ -n ${fail} ]] ; then eerror "Sorry, but this version does not yet support features" eerror "that you requested: ${fail}" eerror "Please mask ${PF} for now and check back later:" eerror " # echo '=${CATEGORY}/${PF}' >> /etc/portage/package.mask" die "booooo" fi } src_prepare() { sed -i \ -e '/_PATH_XAUTH/s:/usr/X11R6/bin/xauth:/usr/bin/xauth:' \ pathnames.h || die # keep this as we need it to avoid the conflict between LPK and HPN changing # this file. cp version.h version.h.pristine # don't break .ssh/authorized_keys2 for fun sed -i '/^AuthorizedKeysFile/s:^:#:' sshd_config || die epatch "${FILESDIR}"/${PN}-5.9_p1-drop-openssl-check.patch epatch "${FILESDIR}"/${PN}-5.9_p1-sshd-gssapi-multihomed.patch #378361 if use X509 ; then pushd .. >/dev/null epatch "${FILESDIR}"/${PN}-5.9_p1-x509-glue.patch popd >/dev/null epatch "${WORKDIR}"/${X509_PATCH%.*} epatch "${FILESDIR}"/${PN}-5.8_p1-x509-hpn-glue.patch fi if ! use X509 ; then if [[ -n ${LDAP_PATCH} ]] && use ldap ; then epatch "${WORKDIR}"/${LDAP_PATCH%.*} #epatch "${FILESDIR}"/${PN}-5.2p1-ldap-stdargs.diff #266654 - merged # version.h patch conflict avoidence mv version.h version.h.lpk cp -f version.h.pristine version.h fi else use ldap && ewarn "Sorry, X509 and LDAP conflict internally, disabling LDAP" fi epatch "${FILESDIR}"/${PN}-4.7_p1-GSSAPI-dns.patch #165444 integrated into gsskex if [[ -n ${HPN_PATCH} ]] && use hpn; then epatch "${WORKDIR}"/${HPN_PATCH%.*} epatch "${FILESDIR}"/${PN}-5.6_p1-hpn-progressmeter.patch # version.h patch conflict avoidence mv version.h version.h.hpn cp -f version.h.pristine version.h # The AES-CTR multithreaded variant is broken, and causes random hangs # when combined background threading and control sockets. To avoid # this, we change the internal table to use the non-multithread version # for the meantime. Do NOT remove this in new versions. See bug #354113 # comment #6 for testcase. # Upstream reference: http://www.psc.edu/networking/projects/hpn-ssh/ ## Additionally, the MT-AES-CTR mode cipher replaces the default ST-AES-CTR mode ## cipher. Be aware that if the client process is forked using the -f command line ## option the process will hang as the parent thread gets 'divorced' from the key ## generation threads. This issue will be resolved as soon as possible sed -i \ -e '/aes...-ctr.*SSH_CIPHER_SSH2/s,evp_aes_ctr_mt,evp_aes_128_ctr,' \ cipher.c || die fi sed -i "s:-lcrypto:$(pkg-config --libs openssl):" configure{,.ac} || die # Disable PATH reset, trust what portage gives us. bug 254615 sed -i -e 's:^PATH=/:#PATH=/:' configure || die epatch_user #473004 # Now we can build a sane merged version.h ( sed '/^#define SSH_RELEASE/d' version.h.* | sort -u printf '#define SSH_RELEASE SSH_VERSION SSH_PORTABLE %s %s\n' \ "$([ -e version.h.hpn ] && echo SSH_HPN)" \ "$([ -e version.h.lpk ] && echo SSH_LPK)" ) > version.h eautoreconf } static_use_with() { local flag=$1 if use static && use ${flag} ; then ewarn "Disabling '${flag}' support because of USE='static'" # rebuild args so that we invert the first one (USE flag) # but otherwise leave everything else working so we can # just leverage use_with shift [[ -z $1 ]] && flag="${flag} ${flag}" set -- !${flag} "$@" fi use_with "$@" } src_configure() { addwrite /dev/ptmx addpredict /etc/skey/skeykeys #skey configure code triggers this use static && append-ldflags -static econf \ --with-ldflags="${LDFLAGS}" \ --disable-strip \ --sysconfdir=/etc/ssh \ --libexecdir=/usr/$(get_libdir)/misc \ --datadir=/usr/share/openssh \ --with-privsep-path=/var/empty \ --with-privsep-user=sshd \ --with-md5-passwords \ --with-ssl-engine \ $(static_use_with pam) \ $(static_use_with kerberos kerberos5 /usr) \ ${LDAP_PATCH:+$(use X509 || ( use ldap && use_with ldap ))} \ $(use_with libedit) \ $(use_with selinux) \ $(use_with skey) \ $(use_with tcpd tcp-wrappers) } src_install() { emake install-nokeys DESTDIR="${D}" || die fperms 600 /etc/ssh/sshd_config dobin contrib/ssh-copy-id || die newinitd "${FILESDIR}"/sshd.rc6.3 sshd newconfd "${FILESDIR}"/sshd.confd sshd keepdir /var/empty # not all openssl installs support ecc, or are functional #352645 if ! grep -q '#define OPENSSL_HAS_ECC 1' config.h ; then elog "dev-libs/openssl was built with 'bindist' - disabling ecdsa support" dosed 's:&& gen_key ecdsa::' /etc/init.d/sshd || die fi newpamd "${FILESDIR}"/sshd.pam_include.2 sshd if use pam ; then sed -i \ -e "/^#UsePAM /s:.*:UsePAM yes:" \ -e "/^#PasswordAuthentication /s:.*:PasswordAuthentication no:" \ -e "/^#PrintMotd /s:.*:PrintMotd no:" \ -e "/^#PrintLastLog /s:.*:PrintLastLog no:" \ "${D}"/etc/ssh/sshd_config || die "sed of configuration file failed" fi # This instruction is from the HPN webpage, # Used for the server logging functionality if [[ -n ${HPN_PATCH} ]] && use hpn ; then keepdir /var/empty/dev fi if ! use X509 && [[ -n ${LDAP_PATCH} ]] && use ldap ; then insinto /etc/openldap/schema/ newins openssh-lpk_openldap.schema openssh-lpk.schema fi doman contrib/ssh-copy-id.1 dodoc ChangeLog CREDITS OVERVIEW README* TODO sshd_config diropts -m 0700 dodir /etc/skel/.ssh systemd_dounit "${FILESDIR}"/sshd.{service,socket} || die systemd_newunit "${FILESDIR}"/sshd_at.service 'sshd@.service' || die } src_test() { local t tests skipped failed passed shell tests="interop-tests compat-tests" skipped="" shell=$(egetshell ${UID}) if [[ ${shell} == */nologin ]] || [[ ${shell} == */false ]] ; then elog "Running the full OpenSSH testsuite" elog "requires a usable shell for the 'portage'" elog "user, so we will run a subset only." skipped="${skipped} tests" else tests="${tests} tests" fi # It will also attempt to write to the homedir .ssh local sshhome=${T}/homedir mkdir -p "${sshhome}"/.ssh for t in ${tests} ; do # Some tests read from stdin ... HOMEDIR="${sshhome}" \ emake -k -j1 ${t}