diff options
author | Nicolas Iooss | 2019-09-30 21:00:54 +0200 |
---|---|---|
committer | Nicolas Iooss | 2019-09-30 21:00:54 +0200 |
commit | 3d15dac4874c7d888fb9497a45327fcf19c040b8 (patch) | |
tree | 92a75bc14c4a055dbcdef05a30db27b61d1c43fe | |
parent | 6de003a28cb2bb28d72a7b6cc786e7e2f5311b36 (diff) | |
download | aur-3d15dac4874c7d888fb9497a45327fcf19c040b8.tar.gz |
openssh-selinux 8.0p1-3 update
-rw-r--r-- | .SRCINFO | 13 | ||||
-rw-r--r-- | PKGBUILD | 12 | ||||
-rw-r--r-- | install | 20 | ||||
-rw-r--r-- | sshd.service | 3 |
4 files changed, 29 insertions, 19 deletions
@@ -1,8 +1,9 @@ pkgbase = openssh-selinux pkgdesc = Premier connectivity tool for remote login with the SSH protocol, with SELinux support pkgver = 8.0p1 - pkgrel = 2 + pkgrel = 3 url = https://www.openssh.com/portable.html + install = install arch = x86_64 groups = selinux license = custom:BSD @@ -14,8 +15,8 @@ pkgbase = openssh-selinux depends = libselinux optdepends = xorg-xauth: X11 forwarding optdepends = x11-ssh-askpass: input passphrase in X - provides = openssh=8.0p1-2 - provides = selinux-openssh=8.0p1-2 + provides = openssh=8.0p1-3 + provides = selinux-openssh=8.0p1-3 conflicts = openssh conflicts = selinux-openssh backup = etc/ssh/ssh_config @@ -24,18 +25,14 @@ pkgbase = openssh-selinux source = https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-8.0p1.tar.gz source = https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-8.0p1.tar.gz.asc source = sshdgenkeys.service - source = sshd@.service source = sshd.service - source = sshd.socket source = sshd.conf source = sshd.pam validpgpkeys = 59C2118ED206D927E667EBE3D3E5F56B6D920D30 sha256sums = bd943879e69498e8031eb6b7f44d08cdc37d59a7ab689aa0b437320c3481fd68 sha256sums = SKIP sha256sums = 4031577db6416fcbaacf8a26a024ecd3939e5c10fe6a86ee3f0eea5093d533b7 - sha256sums = 3a0845737207f4eda221c9c9fb64e766ade9684562d8ba4f705f7ae6826886e5 - sha256sums = c5ed9fa629f8f8dbf3bae4edbad4441c36df535088553fe82695c52d7bde30aa - sha256sums = de14363e9d4ed92848e524036d9e6b57b2d35cc77d377b7247c38111d2a3defd + sha256sums = e40f8b7c8e5e2ecf3084b3511a6c36d5b5c9f9e61f2bb13e3726c71dc7d4fbc7 sha256sums = 4effac1186cc62617f44385415103021f72f674f8b8e26447fc1139c670090f6 sha256sums = 64576021515c0a98b0aaf0a0ae02e0f5ebe8ee525b1e647ab68f369f81ecd846 @@ -10,7 +10,7 @@ pkgname=openssh-selinux pkgver=8.0p1 -pkgrel=2 +pkgrel=3 pkgdesc='Premier connectivity tool for remote login with the SSH protocol, with SELinux support' url='https://www.openssh.com/portable.html' license=('custom:BSD') @@ -26,22 +26,20 @@ groups=('selinux') validpgpkeys=('59C2118ED206D927E667EBE3D3E5F56B6D920D30') source=("https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/${pkgname/-selinux}-${pkgver}.tar.gz"{,.asc} 'sshdgenkeys.service' - 'sshd@.service' 'sshd.service' - 'sshd.socket' 'sshd.conf' 'sshd.pam') sha256sums=('bd943879e69498e8031eb6b7f44d08cdc37d59a7ab689aa0b437320c3481fd68' 'SKIP' '4031577db6416fcbaacf8a26a024ecd3939e5c10fe6a86ee3f0eea5093d533b7' - '3a0845737207f4eda221c9c9fb64e766ade9684562d8ba4f705f7ae6826886e5' - 'c5ed9fa629f8f8dbf3bae4edbad4441c36df535088553fe82695c52d7bde30aa' - 'de14363e9d4ed92848e524036d9e6b57b2d35cc77d377b7247c38111d2a3defd' + 'e40f8b7c8e5e2ecf3084b3511a6c36d5b5c9f9e61f2bb13e3726c71dc7d4fbc7' '4effac1186cc62617f44385415103021f72f674f8b8e26447fc1139c670090f6' '64576021515c0a98b0aaf0a0ae02e0f5ebe8ee525b1e647ab68f369f81ecd846') backup=('etc/ssh/ssh_config' 'etc/ssh/sshd_config' 'etc/pam.d/sshd') +install=install + build() { cd "${srcdir}/${pkgname/-selinux}-${pkgver}" @@ -86,9 +84,7 @@ package() { install -Dm644 LICENCE "${pkgdir}/usr/share/licenses/${pkgname}/LICENCE" install -Dm644 ../sshdgenkeys.service "${pkgdir}"/usr/lib/systemd/system/sshdgenkeys.service - install -Dm644 ../sshd@.service "${pkgdir}"/usr/lib/systemd/system/sshd@.service install -Dm644 ../sshd.service "${pkgdir}"/usr/lib/systemd/system/sshd.service - install -Dm644 ../sshd.socket "${pkgdir}"/usr/lib/systemd/system/sshd.socket install -Dm644 ../sshd.conf "${pkgdir}"/usr/lib/tmpfiles.d/sshd.conf install -Dm644 ../sshd.pam "${pkgdir}"/etc/pam.d/sshd diff --git a/install b/install new file mode 100644 index 000000000000..988e43f4e77f --- /dev/null +++ b/install @@ -0,0 +1,20 @@ +pre_upgrade() { + # Remove socket activation. See: https://bugs.archlinux.org/task/62248 + if (( $(vercmp $2 8.0p1-3) < 0 )); then + if systemctl is-enabled -q sshd.socket; then + cat <<EOF +==> This package no longer provides sshd.socket and sshd@.service; +==> copies of those files will be placed under /etc/systemd/system +==> but please migrate to sshd.service whenever possible. +EOF + src=/usr/lib/systemd/system + dst=/etc/systemd/system + for i in sshd.socket sshd\@.service; do + if [[ ! -e "$dst/$i" ]]; then + cp -v "$src/$i" "$dst/$i" + fi + done + systemctl reenable sshd.socket + fi + fi +} diff --git a/sshd.service b/sshd.service index 55ed95322da7..a893724f1767 100644 --- a/sshd.service +++ b/sshd.service @@ -12,6 +12,3 @@ Restart=always [Install] WantedBy=multi-user.target - -# This service file runs an SSH daemon that forks for each incoming connection. -# If you prefer to spawn on-demand daemons, use sshd.socket and sshd@.service. |