1 |
commit: ad8d70eefa33649860561489dd5cc7f52acb64ed |
2 |
Author: Michael Mair-Keimberger <m.mairkeimberger <AT> gmail <DOT> com> |
3 |
AuthorDate: Sun Sep 30 12:54:20 2018 +0000 |
4 |
Commit: Lars Wendler <polynomial-c <AT> gentoo <DOT> org> |
5 |
CommitDate: Wed Oct 31 08:06:10 2018 +0000 |
6 |
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ad8d70ee |
7 |
|
8 |
net-misc/openssh: remove unused patches |
9 |
|
10 |
Signed-off-by: Michael Mair-Keimberger <m.mairkeimberger <AT> gmail.com> |
11 |
Signed-off-by: Lars Wendler <polynomial-c <AT> gentoo.org> |
12 |
|
13 |
.../files/openssh-7.6_p1-hpn-x509-11.2-glue.patch | 50 ------------ |
14 |
.../openssh-7.6_p1-permitopen-x509-glue.patch | 44 ----------- |
15 |
.../openssh/files/openssh-7.6_p1-permitopen.patch | 49 ------------ |
16 |
.../openssh/files/openssh-7.6_p1-warnings.patch | 12 --- |
17 |
net-misc/openssh/files/sshd.rc6.5 | 89 ---------------------- |
18 |
5 files changed, 244 deletions(-) |
19 |
|
20 |
diff --git a/net-misc/openssh/files/openssh-7.6_p1-hpn-x509-11.2-glue.patch b/net-misc/openssh/files/openssh-7.6_p1-hpn-x509-11.2-glue.patch |
21 |
deleted file mode 100644 |
22 |
index 2ed6a7b54a6..00000000000 |
23 |
--- a/net-misc/openssh/files/openssh-7.6_p1-hpn-x509-11.2-glue.patch |
24 |
+++ /dev/null |
25 |
@@ -1,50 +0,0 @@ |
26 |
---- a/openssh-7.6p1-hpnssh14v12-r1/0003-support-dynamically-sized-receive-buffers.patch 2017-10-11 15:02:11.850912525 -0700 |
27 |
-+++ b/openssh-7.6p1-hpnssh14v12-r1/0003-support-dynamically-sized-receive-buffers.patch 2017-10-11 15:35:06.223424844 -0700 |
28 |
-@@ -907,9 +907,9 @@ |
29 |
- @@ -517,7 +544,7 @@ send_client_banner(int connection_out, int minor1) |
30 |
- { |
31 |
- /* Send our own protocol version identification. */ |
32 |
-- xasprintf(&client_version_string, "SSH-%d.%d-%.100s\r\n", |
33 |
--- PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_VERSION); |
34 |
--+ PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_RELEASE); |
35 |
-+ xasprintf(&client_version_string, "SSH-%d.%d-%.100s PKIX[%s]\r\n", |
36 |
-+- PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_VERSION, PACKAGE_VERSION); |
37 |
-++ PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_RELEASE, PACKAGE_VERSION); |
38 |
- if (atomicio(vwrite, connection_out, client_version_string, |
39 |
- strlen(client_version_string)) != strlen(client_version_string)) |
40 |
- fatal("write: %.100s", strerror(errno)); |
41 |
-@@ -918,11 +918,11 @@ |
42 |
- --- a/sshd.c |
43 |
- +++ b/sshd.c |
44 |
- @@ -367,7 +367,7 @@ sshd_exchange_identification(struct ssh *ssh, int sock_in, int sock_out) |
45 |
-- char remote_version[256]; /* Must be at least as big as buf. */ |
46 |
-+ } |
47 |
- |
48 |
-- xasprintf(&server_version_string, "SSH-%d.%d-%.100s%s%s\r\n", |
49 |
--- PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_VERSION, |
50 |
--+ PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_RELEASE, |
51 |
-+ xasprintf(&server_version_string, "SSH-%d.%d-%s%s%s%s\r\n", |
52 |
-+- PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_VERSION, pkix_comment, |
53 |
-++ PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_RELEASE, pkix_comment, |
54 |
- *options.version_addendum == '\0' ? "" : " ", |
55 |
- options.version_addendum); |
56 |
- |
57 |
-@@ -982,13 +982,14 @@ |
58 |
- index e093f623..83f0932d 100644 |
59 |
- --- a/version.h |
60 |
- +++ b/version.h |
61 |
--@@ -3,4 +3,5 @@ |
62 |
-+@@ -3,3 +3,6 @@ |
63 |
- #define SSH_VERSION "OpenSSH_7.6" |
64 |
- |
65 |
-- #define SSH_PORTABLE "p1" |
66 |
---#define SSH_RELEASE SSH_VERSION SSH_PORTABLE |
67 |
-+-#define SSH_RELEASE PACKAGE_STRING ", " SSH_VERSION "p1" |
68 |
-++#define SSH_PORTABLE "p1" |
69 |
- +#define SSH_HPN "-hpn14v12" |
70 |
-++#define SSH_X509 "-PKIXSSH-11.0" |
71 |
--+#define SSH_RELEASE SSH_VERSION SSH_PORTABLE SSH_HPN |
72 |
-++#define SSH_RELEASE PACKAGE_STRING ", " SSH_VERSION "p1" SSH_HPN |
73 |
- -- |
74 |
- 2.14.2 |
75 |
- |
76 |
|
77 |
diff --git a/net-misc/openssh/files/openssh-7.6_p1-permitopen-x509-glue.patch b/net-misc/openssh/files/openssh-7.6_p1-permitopen-x509-glue.patch |
78 |
deleted file mode 100644 |
79 |
index 9d8f9a6cdef..00000000000 |
80 |
--- a/net-misc/openssh/files/openssh-7.6_p1-permitopen-x509-glue.patch |
81 |
+++ /dev/null |
82 |
@@ -1,44 +0,0 @@ |
83 |
---- a/openssh-7.6p1+x509-11.2.diff 2018-03-13 10:48:08.755434051 -0700 |
84 |
-+++ b/openssh-7.6p1+x509-11.2.diff 2018-03-13 10:51:27.217980071 -0700 |
85 |
-@@ -29025,13 +29025,6 @@ |
86 |
- diff -ruN openssh-7.6p1/servconf.c openssh-7.6p1+x509-11.2/servconf.c |
87 |
- --- openssh-7.6p1/servconf.c 2017-10-02 22:34:26.000000000 +0300 |
88 |
- +++ openssh-7.6p1+x509-11.2/servconf.c 2018-02-11 12:07:01.000000000 +0200 |
89 |
--@@ -1,5 +1,5 @@ |
90 |
-- |
91 |
---/* $OpenBSD: servconf.c,v 1.312 2017/10/02 19:33:20 djm Exp $ */ |
92 |
--+/* $OpenBSD: servconf.c,v 1.313 2017/10/04 18:49:30 djm Exp $ */ |
93 |
-- /* |
94 |
-- * Copyright (c) 1995 Tatu Ylonen <ylo@××××××.fi>, Espoo, Finland |
95 |
-- * All rights reserved |
96 |
- @@ -9,6 +9,29 @@ |
97 |
- * software must be clearly marked as such, and if the derived work is |
98 |
- * incompatible with the protocol description in the RFC file, it must be |
99 |
-@@ -29467,27 +29460,6 @@ |
100 |
- case sAllowUsers: |
101 |
- while ((arg = strdelim(&cp)) && *arg != '\0') { |
102 |
- if (options->num_allow_users >= MAX_ALLOW_USERS) |
103 |
--@@ -1663,9 +1931,9 @@ |
104 |
-- if (!arg || *arg == '\0') |
105 |
-- fatal("%s line %d: missing PermitOpen specification", |
106 |
-- filename, linenum); |
107 |
--- i = options->num_permitted_opens; /* modified later */ |
108 |
--+ value = options->num_permitted_opens; /* modified later */ |
109 |
-- if (strcmp(arg, "any") == 0 || strcmp(arg, "none") == 0) { |
110 |
--- if (*activep && i == 0) { |
111 |
--+ if (*activep && value == 0) { |
112 |
-- options->num_permitted_opens = 1; |
113 |
-- options->permitted_opens = xcalloc(1, |
114 |
-- sizeof(*options->permitted_opens)); |
115 |
--@@ -1683,7 +1951,7 @@ |
116 |
-- if (arg == NULL || ((port = permitopen_port(arg)) < 0)) |
117 |
-- fatal("%s line %d: bad port number in " |
118 |
-- "PermitOpen", filename, linenum); |
119 |
--- if (*activep && i == 0) { |
120 |
--+ if (*activep && value == 0) { |
121 |
-- options->permitted_opens = xrecallocarray( |
122 |
-- options->permitted_opens, |
123 |
-- options->num_permitted_opens, |
124 |
- @@ -1885,11 +2153,20 @@ |
125 |
- |
126 |
- case sDeprecated: |
127 |
|
128 |
diff --git a/net-misc/openssh/files/openssh-7.6_p1-permitopen.patch b/net-misc/openssh/files/openssh-7.6_p1-permitopen.patch |
129 |
deleted file mode 100644 |
130 |
index 5dc96d4d0a3..00000000000 |
131 |
--- a/net-misc/openssh/files/openssh-7.6_p1-permitopen.patch |
132 |
+++ /dev/null |
133 |
@@ -1,49 +0,0 @@ |
134 |
-From 69bda0228861f3dacd4fb3d28b60ce9d103d254b Mon Sep 17 00:00:00 2001 |
135 |
-From: "djm@×××××××.org" <djm@×××××××.org> |
136 |
-Date: Wed, 4 Oct 2017 18:49:30 +0000 |
137 |
-Subject: [PATCH] upstream commit |
138 |
- |
139 |
-fix (another) problem in PermitOpen introduced during the |
140 |
-channels.c refactor: the third and subsequent arguments to PermitOpen were |
141 |
-being silently ignored; ok markus@ |
142 |
- |
143 |
-Upstream-ID: 067c89f1f53cbc381628012ba776d6861e6782fd |
144 |
---- |
145 |
- servconf.c | 8 ++++---- |
146 |
- 1 file changed, 4 insertions(+), 4 deletions(-) |
147 |
- |
148 |
-diff --git a/servconf.c b/servconf.c |
149 |
-index 2c321a4a..95686295 100644 |
150 |
---- a/servconf.c |
151 |
-+++ b/servconf.c |
152 |
-@@ -1,5 +1,5 @@ |
153 |
- |
154 |
--/* $OpenBSD: servconf.c,v 1.312 2017/10/02 19:33:20 djm Exp $ */ |
155 |
-+/* $OpenBSD: servconf.c,v 1.313 2017/10/04 18:49:30 djm Exp $ */ |
156 |
- /* |
157 |
- * Copyright (c) 1995 Tatu Ylonen <ylo@××××××.fi>, Espoo, Finland |
158 |
- * All rights reserved |
159 |
-@@ -1663,9 +1663,9 @@ process_server_config_line(ServerOptions *options, char *line, |
160 |
- if (!arg || *arg == '\0') |
161 |
- fatal("%s line %d: missing PermitOpen specification", |
162 |
- filename, linenum); |
163 |
-- i = options->num_permitted_opens; /* modified later */ |
164 |
-+ value = options->num_permitted_opens; /* modified later */ |
165 |
- if (strcmp(arg, "any") == 0 || strcmp(arg, "none") == 0) { |
166 |
-- if (*activep && i == 0) { |
167 |
-+ if (*activep && value == 0) { |
168 |
- options->num_permitted_opens = 1; |
169 |
- options->permitted_opens = xcalloc(1, |
170 |
- sizeof(*options->permitted_opens)); |
171 |
-@@ -1683,7 +1683,7 @@ process_server_config_line(ServerOptions *options, char *line, |
172 |
- if (arg == NULL || ((port = permitopen_port(arg)) < 0)) |
173 |
- fatal("%s line %d: bad port number in " |
174 |
- "PermitOpen", filename, linenum); |
175 |
-- if (*activep && i == 0) { |
176 |
-+ if (*activep && value == 0) { |
177 |
- options->permitted_opens = xrecallocarray( |
178 |
- options->permitted_opens, |
179 |
- options->num_permitted_opens, |
180 |
--- |
181 |
-2.16.1 |
182 |
- |
183 |
|
184 |
diff --git a/net-misc/openssh/files/openssh-7.6_p1-warnings.patch b/net-misc/openssh/files/openssh-7.6_p1-warnings.patch |
185 |
deleted file mode 100644 |
186 |
index 5843dd162cd..00000000000 |
187 |
--- a/net-misc/openssh/files/openssh-7.6_p1-warnings.patch |
188 |
+++ /dev/null |
189 |
@@ -1,12 +0,0 @@ |
190 |
-diff --git a/openbsd-compat/freezero.c b/openbsd-compat/freezero.c |
191 |
-index 3af8f4a7..7f6bc7fa 100644 |
192 |
---- a/openbsd-compat/freezero.c |
193 |
-+++ b/openbsd-compat/freezero.c |
194 |
-@@ -14,6 +14,7 @@ |
195 |
- * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
196 |
- */ |
197 |
- |
198 |
-+#include <string.h> |
199 |
- #include "includes.h" |
200 |
- |
201 |
- #ifndef HAVE_FREEZERO |
202 |
|
203 |
diff --git a/net-misc/openssh/files/sshd.rc6.5 b/net-misc/openssh/files/sshd.rc6.5 |
204 |
deleted file mode 100644 |
205 |
index 044cbe7268f..00000000000 |
206 |
--- a/net-misc/openssh/files/sshd.rc6.5 |
207 |
+++ /dev/null |
208 |
@@ -1,89 +0,0 @@ |
209 |
-#!/sbin/openrc-run |
210 |
-# Copyright 1999-2018 Gentoo Foundation |
211 |
-# Distributed under the terms of the GNU General Public License v2 |
212 |
- |
213 |
-extra_commands="checkconfig" |
214 |
-extra_started_commands="reload" |
215 |
- |
216 |
-: ${SSHD_CONFDIR:=${RC_PREFIX%/}/etc/ssh} |
217 |
-: ${SSHD_CONFIG:=${SSHD_CONFDIR}/sshd_config} |
218 |
-: ${SSHD_PIDFILE:=${RC_PREFIX%/}/run/${SVCNAME}.pid} |
219 |
-: ${SSHD_BINARY:=${RC_PREFIX%/}/usr/sbin/sshd} |
220 |
-: ${SSHD_KEYGEN_BINARY:=${RC_PREFIX%/}/usr/bin/ssh-keygen} |
221 |
- |
222 |
-command="${SSHD_BINARY}" |
223 |
-pidfile="${SSHD_PIDFILE}" |
224 |
-command_args="${SSHD_OPTS} -o PidFile=${pidfile} -f ${SSHD_CONFIG}" |
225 |
- |
226 |
-# Wait one second (length chosen arbitrarily) to see if sshd actually |
227 |
-# creates a PID file, or if it crashes for some reason like not being |
228 |
-# able to bind to the address in ListenAddress (bug 617596). |
229 |
-: ${SSHD_SSD_OPTS:=--wait 1000} |
230 |
-start_stop_daemon_args="${SSHD_SSD_OPTS}" |
231 |
- |
232 |
-depend() { |
233 |
- # Entropy can be used by ssh-keygen, among other things, but |
234 |
- # is not strictly required (bug 470020). |
235 |
- use logger dns entropy |
236 |
- if [ "${rc_need+set}" = "set" ] ; then |
237 |
- : # Do nothing, the user has explicitly set rc_need |
238 |
- else |
239 |
- local x warn_addr |
240 |
- for x in $(awk '/^ListenAddress/{ print $2 }' "$SSHD_CONFIG" 2>/dev/null) ; do |
241 |
- case "${x}" in |
242 |
- 0.0.0.0|0.0.0.0:*) ;; |
243 |
- ::|\[::\]*) ;; |
244 |
- *) warn_addr="${warn_addr} ${x}" ;; |
245 |
- esac |
246 |
- done |
247 |
- if [ -n "${warn_addr}" ] ; then |
248 |
- need net |
249 |
- ewarn "You are binding an interface in ListenAddress statement in your sshd_config!" |
250 |
- ewarn "You must add rc_need=\"net.FOO\" to your ${RC_PREFIX%/}/etc/conf.d/sshd" |
251 |
- ewarn "where FOO is the interface(s) providing the following address(es):" |
252 |
- ewarn "${warn_addr}" |
253 |
- fi |
254 |
- fi |
255 |
-} |
256 |
- |
257 |
-checkconfig() { |
258 |
- checkpath --directory "${RC_PREFIX%/}/var/empty" |
259 |
- |
260 |
- if [ ! -e "${SSHD_CONFIG}" ] ; then |
261 |
- eerror "You need an ${SSHD_CONFIG} file to run sshd" |
262 |
- eerror "There is a sample file in /usr/share/doc/openssh" |
263 |
- return 1 |
264 |
- fi |
265 |
- |
266 |
- ${SSHD_KEYGEN_BINARY} -A || return 2 |
267 |
- |
268 |
- "${command}" -t ${command_args} || return 3 |
269 |
-} |
270 |
- |
271 |
-start_pre() { |
272 |
- # If this isn't a restart, make sure that the user's config isn't |
273 |
- # busted before we try to start the daemon (this will produce |
274 |
- # better error messages than if we just try to start it blindly). |
275 |
- # |
276 |
- # If, on the other hand, this *is* a restart, then the stop_pre |
277 |
- # action will have ensured that the config is usable and we don't |
278 |
- # need to do that again. |
279 |
- if [ "${RC_CMD}" != "restart" ] ; then |
280 |
- checkconfig || return $? |
281 |
- fi |
282 |
-} |
283 |
- |
284 |
-stop_pre() { |
285 |
- # If this is a restart, check to make sure the user's config |
286 |
- # isn't busted before we stop the running daemon. |
287 |
- if [ "${RC_CMD}" = "restart" ] ; then |
288 |
- checkconfig || return $? |
289 |
- fi |
290 |
-} |
291 |
- |
292 |
-reload() { |
293 |
- checkconfig || return $? |
294 |
- ebegin "Reloading ${SVCNAME}" |
295 |
- start-stop-daemon --signal HUP --pidfile "${pidfile}" |
296 |
- eend $? |
297 |
-} |