summarylogtreecommitdiffstats
diff options
context:
space:
mode:
authorNicolas Iooss2019-09-30 21:00:54 +0200
committerNicolas Iooss2019-09-30 21:00:54 +0200
commit3d15dac4874c7d888fb9497a45327fcf19c040b8 (patch)
tree92a75bc14c4a055dbcdef05a30db27b61d1c43fe
parent6de003a28cb2bb28d72a7b6cc786e7e2f5311b36 (diff)
downloadaur-3d15dac4874c7d888fb9497a45327fcf19c040b8.tar.gz
openssh-selinux 8.0p1-3 update
-rw-r--r--.SRCINFO13
-rw-r--r--PKGBUILD12
-rw-r--r--install20
-rw-r--r--sshd.service3
4 files changed, 29 insertions, 19 deletions
diff --git a/.SRCINFO b/.SRCINFO
index c07ab7eb394f..a3bbd92e81f3 100644
--- a/.SRCINFO
+++ b/.SRCINFO
@@ -1,8 +1,9 @@
pkgbase = openssh-selinux
pkgdesc = Premier connectivity tool for remote login with the SSH protocol, with SELinux support
pkgver = 8.0p1
- pkgrel = 2
+ pkgrel = 3
url = https://www.openssh.com/portable.html
+ install = install
arch = x86_64
groups = selinux
license = custom:BSD
@@ -14,8 +15,8 @@ pkgbase = openssh-selinux
depends = libselinux
optdepends = xorg-xauth: X11 forwarding
optdepends = x11-ssh-askpass: input passphrase in X
- provides = openssh=8.0p1-2
- provides = selinux-openssh=8.0p1-2
+ provides = openssh=8.0p1-3
+ provides = selinux-openssh=8.0p1-3
conflicts = openssh
conflicts = selinux-openssh
backup = etc/ssh/ssh_config
@@ -24,18 +25,14 @@ pkgbase = openssh-selinux
source = https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-8.0p1.tar.gz
source = https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-8.0p1.tar.gz.asc
source = sshdgenkeys.service
- source = sshd@.service
source = sshd.service
- source = sshd.socket
source = sshd.conf
source = sshd.pam
validpgpkeys = 59C2118ED206D927E667EBE3D3E5F56B6D920D30
sha256sums = bd943879e69498e8031eb6b7f44d08cdc37d59a7ab689aa0b437320c3481fd68
sha256sums = SKIP
sha256sums = 4031577db6416fcbaacf8a26a024ecd3939e5c10fe6a86ee3f0eea5093d533b7
- sha256sums = 3a0845737207f4eda221c9c9fb64e766ade9684562d8ba4f705f7ae6826886e5
- sha256sums = c5ed9fa629f8f8dbf3bae4edbad4441c36df535088553fe82695c52d7bde30aa
- sha256sums = de14363e9d4ed92848e524036d9e6b57b2d35cc77d377b7247c38111d2a3defd
+ sha256sums = e40f8b7c8e5e2ecf3084b3511a6c36d5b5c9f9e61f2bb13e3726c71dc7d4fbc7
sha256sums = 4effac1186cc62617f44385415103021f72f674f8b8e26447fc1139c670090f6
sha256sums = 64576021515c0a98b0aaf0a0ae02e0f5ebe8ee525b1e647ab68f369f81ecd846
diff --git a/PKGBUILD b/PKGBUILD
index 0a735e8f784d..7c2487c7ac32 100644
--- a/PKGBUILD
+++ b/PKGBUILD
@@ -10,7 +10,7 @@
pkgname=openssh-selinux
pkgver=8.0p1
-pkgrel=2
+pkgrel=3
pkgdesc='Premier connectivity tool for remote login with the SSH protocol, with SELinux support'
url='https://www.openssh.com/portable.html'
license=('custom:BSD')
@@ -26,22 +26,20 @@ groups=('selinux')
validpgpkeys=('59C2118ED206D927E667EBE3D3E5F56B6D920D30')
source=("https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/${pkgname/-selinux}-${pkgver}.tar.gz"{,.asc}
'sshdgenkeys.service'
- 'sshd@.service'
'sshd.service'
- 'sshd.socket'
'sshd.conf'
'sshd.pam')
sha256sums=('bd943879e69498e8031eb6b7f44d08cdc37d59a7ab689aa0b437320c3481fd68'
'SKIP'
'4031577db6416fcbaacf8a26a024ecd3939e5c10fe6a86ee3f0eea5093d533b7'
- '3a0845737207f4eda221c9c9fb64e766ade9684562d8ba4f705f7ae6826886e5'
- 'c5ed9fa629f8f8dbf3bae4edbad4441c36df535088553fe82695c52d7bde30aa'
- 'de14363e9d4ed92848e524036d9e6b57b2d35cc77d377b7247c38111d2a3defd'
+ 'e40f8b7c8e5e2ecf3084b3511a6c36d5b5c9f9e61f2bb13e3726c71dc7d4fbc7'
'4effac1186cc62617f44385415103021f72f674f8b8e26447fc1139c670090f6'
'64576021515c0a98b0aaf0a0ae02e0f5ebe8ee525b1e647ab68f369f81ecd846')
backup=('etc/ssh/ssh_config' 'etc/ssh/sshd_config' 'etc/pam.d/sshd')
+install=install
+
build() {
cd "${srcdir}/${pkgname/-selinux}-${pkgver}"
@@ -86,9 +84,7 @@ package() {
install -Dm644 LICENCE "${pkgdir}/usr/share/licenses/${pkgname}/LICENCE"
install -Dm644 ../sshdgenkeys.service "${pkgdir}"/usr/lib/systemd/system/sshdgenkeys.service
- install -Dm644 ../sshd@.service "${pkgdir}"/usr/lib/systemd/system/sshd@.service
install -Dm644 ../sshd.service "${pkgdir}"/usr/lib/systemd/system/sshd.service
- install -Dm644 ../sshd.socket "${pkgdir}"/usr/lib/systemd/system/sshd.socket
install -Dm644 ../sshd.conf "${pkgdir}"/usr/lib/tmpfiles.d/sshd.conf
install -Dm644 ../sshd.pam "${pkgdir}"/etc/pam.d/sshd
diff --git a/install b/install
new file mode 100644
index 000000000000..988e43f4e77f
--- /dev/null
+++ b/install
@@ -0,0 +1,20 @@
+pre_upgrade() {
+ # Remove socket activation. See: https://bugs.archlinux.org/task/62248
+ if (( $(vercmp $2 8.0p1-3) < 0 )); then
+ if systemctl is-enabled -q sshd.socket; then
+ cat <<EOF
+==> This package no longer provides sshd.socket and sshd@.service;
+==> copies of those files will be placed under /etc/systemd/system
+==> but please migrate to sshd.service whenever possible.
+EOF
+ src=/usr/lib/systemd/system
+ dst=/etc/systemd/system
+ for i in sshd.socket sshd\@.service; do
+ if [[ ! -e "$dst/$i" ]]; then
+ cp -v "$src/$i" "$dst/$i"
+ fi
+ done
+ systemctl reenable sshd.socket
+ fi
+ fi
+}
diff --git a/sshd.service b/sshd.service
index 55ed95322da7..a893724f1767 100644
--- a/sshd.service
+++ b/sshd.service
@@ -12,6 +12,3 @@ Restart=always
[Install]
WantedBy=multi-user.target
-
-# This service file runs an SSH daemon that forks for each incoming connection.
-# If you prefer to spawn on-demand daemons, use sshd.socket and sshd@.service.