Gentoo Archives: gentoo-commits

From: Lars Wendler <polynomial-c@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] repo/gentoo:master commit in: net-misc/openssh/files/
Date: Wed, 31 Oct 2018 08:06:23
Message-Id: 1540973170.ad8d70eefa33649860561489dd5cc7f52acb64ed.polynomial-c@gentoo
1 commit: ad8d70eefa33649860561489dd5cc7f52acb64ed
2 Author: Michael Mair-Keimberger <m.mairkeimberger <AT> gmail <DOT> com>
3 AuthorDate: Sun Sep 30 12:54:20 2018 +0000
4 Commit: Lars Wendler <polynomial-c <AT> gentoo <DOT> org>
5 CommitDate: Wed Oct 31 08:06:10 2018 +0000
6 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ad8d70ee
7
8 net-misc/openssh: remove unused patches
9
10 Signed-off-by: Michael Mair-Keimberger <m.mairkeimberger <AT> gmail.com>
11 Signed-off-by: Lars Wendler <polynomial-c <AT> gentoo.org>
12
13 .../files/openssh-7.6_p1-hpn-x509-11.2-glue.patch | 50 ------------
14 .../openssh-7.6_p1-permitopen-x509-glue.patch | 44 -----------
15 .../openssh/files/openssh-7.6_p1-permitopen.patch | 49 ------------
16 .../openssh/files/openssh-7.6_p1-warnings.patch | 12 ---
17 net-misc/openssh/files/sshd.rc6.5 | 89 ----------------------
18 5 files changed, 244 deletions(-)
19
20 diff --git a/net-misc/openssh/files/openssh-7.6_p1-hpn-x509-11.2-glue.patch b/net-misc/openssh/files/openssh-7.6_p1-hpn-x509-11.2-glue.patch
21 deleted file mode 100644
22 index 2ed6a7b54a6..00000000000
23 --- a/net-misc/openssh/files/openssh-7.6_p1-hpn-x509-11.2-glue.patch
24 +++ /dev/null
25 @@ -1,50 +0,0 @@
26 ---- a/openssh-7.6p1-hpnssh14v12-r1/0003-support-dynamically-sized-receive-buffers.patch 2017-10-11 15:02:11.850912525 -0700
27 -+++ b/openssh-7.6p1-hpnssh14v12-r1/0003-support-dynamically-sized-receive-buffers.patch 2017-10-11 15:35:06.223424844 -0700
28 -@@ -907,9 +907,9 @@
29 - @@ -517,7 +544,7 @@ send_client_banner(int connection_out, int minor1)
30 - {
31 - /* Send our own protocol version identification. */
32 -- xasprintf(&client_version_string, "SSH-%d.%d-%.100s\r\n",
33 --- PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_VERSION);
34 --+ PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_RELEASE);
35 -+ xasprintf(&client_version_string, "SSH-%d.%d-%.100s PKIX[%s]\r\n",
36 -+- PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_VERSION, PACKAGE_VERSION);
37 -++ PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_RELEASE, PACKAGE_VERSION);
38 - if (atomicio(vwrite, connection_out, client_version_string,
39 - strlen(client_version_string)) != strlen(client_version_string))
40 - fatal("write: %.100s", strerror(errno));
41 -@@ -918,11 +918,11 @@
42 - --- a/sshd.c
43 - +++ b/sshd.c
44 - @@ -367,7 +367,7 @@ sshd_exchange_identification(struct ssh *ssh, int sock_in, int sock_out)
45 -- char remote_version[256]; /* Must be at least as big as buf. */
46 -+ }
47 -
48 -- xasprintf(&server_version_string, "SSH-%d.%d-%.100s%s%s\r\n",
49 --- PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_VERSION,
50 --+ PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_RELEASE,
51 -+ xasprintf(&server_version_string, "SSH-%d.%d-%s%s%s%s\r\n",
52 -+- PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_VERSION, pkix_comment,
53 -++ PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_RELEASE, pkix_comment,
54 - *options.version_addendum == '\0' ? "" : " ",
55 - options.version_addendum);
56 -
57 -@@ -982,13 +982,14 @@
58 - index e093f623..83f0932d 100644
59 - --- a/version.h
60 - +++ b/version.h
61 --@@ -3,4 +3,5 @@
62 -+@@ -3,3 +3,6 @@
63 - #define SSH_VERSION "OpenSSH_7.6"
64 -
65 -- #define SSH_PORTABLE "p1"
66 ---#define SSH_RELEASE SSH_VERSION SSH_PORTABLE
67 -+-#define SSH_RELEASE PACKAGE_STRING ", " SSH_VERSION "p1"
68 -++#define SSH_PORTABLE "p1"
69 - +#define SSH_HPN "-hpn14v12"
70 -++#define SSH_X509 "-PKIXSSH-11.0"
71 --+#define SSH_RELEASE SSH_VERSION SSH_PORTABLE SSH_HPN
72 -++#define SSH_RELEASE PACKAGE_STRING ", " SSH_VERSION "p1" SSH_HPN
73 - --
74 - 2.14.2
75 -
76
77 diff --git a/net-misc/openssh/files/openssh-7.6_p1-permitopen-x509-glue.patch b/net-misc/openssh/files/openssh-7.6_p1-permitopen-x509-glue.patch
78 deleted file mode 100644
79 index 9d8f9a6cdef..00000000000
80 --- a/net-misc/openssh/files/openssh-7.6_p1-permitopen-x509-glue.patch
81 +++ /dev/null
82 @@ -1,44 +0,0 @@
83 ---- a/openssh-7.6p1+x509-11.2.diff 2018-03-13 10:48:08.755434051 -0700
84 -+++ b/openssh-7.6p1+x509-11.2.diff 2018-03-13 10:51:27.217980071 -0700
85 -@@ -29025,13 +29025,6 @@
86 - diff -ruN openssh-7.6p1/servconf.c openssh-7.6p1+x509-11.2/servconf.c
87 - --- openssh-7.6p1/servconf.c 2017-10-02 22:34:26.000000000 +0300
88 - +++ openssh-7.6p1+x509-11.2/servconf.c 2018-02-11 12:07:01.000000000 +0200
89 --@@ -1,5 +1,5 @@
90 --
91 ---/* $OpenBSD: servconf.c,v 1.312 2017/10/02 19:33:20 djm Exp $ */
92 --+/* $OpenBSD: servconf.c,v 1.313 2017/10/04 18:49:30 djm Exp $ */
93 -- /*
94 -- * Copyright (c) 1995 Tatu Ylonen <ylo@××××××.fi>, Espoo, Finland
95 -- * All rights reserved
96 - @@ -9,6 +9,29 @@
97 - * software must be clearly marked as such, and if the derived work is
98 - * incompatible with the protocol description in the RFC file, it must be
99 -@@ -29467,27 +29460,6 @@
100 - case sAllowUsers:
101 - while ((arg = strdelim(&cp)) && *arg != '\0') {
102 - if (options->num_allow_users >= MAX_ALLOW_USERS)
103 --@@ -1663,9 +1931,9 @@
104 -- if (!arg || *arg == '\0')
105 -- fatal("%s line %d: missing PermitOpen specification",
106 -- filename, linenum);
107 --- i = options->num_permitted_opens; /* modified later */
108 --+ value = options->num_permitted_opens; /* modified later */
109 -- if (strcmp(arg, "any") == 0 || strcmp(arg, "none") == 0) {
110 --- if (*activep && i == 0) {
111 --+ if (*activep && value == 0) {
112 -- options->num_permitted_opens = 1;
113 -- options->permitted_opens = xcalloc(1,
114 -- sizeof(*options->permitted_opens));
115 --@@ -1683,7 +1951,7 @@
116 -- if (arg == NULL || ((port = permitopen_port(arg)) < 0))
117 -- fatal("%s line %d: bad port number in "
118 -- "PermitOpen", filename, linenum);
119 --- if (*activep && i == 0) {
120 --+ if (*activep && value == 0) {
121 -- options->permitted_opens = xrecallocarray(
122 -- options->permitted_opens,
123 -- options->num_permitted_opens,
124 - @@ -1885,11 +2153,20 @@
125 -
126 - case sDeprecated:
127
128 diff --git a/net-misc/openssh/files/openssh-7.6_p1-permitopen.patch b/net-misc/openssh/files/openssh-7.6_p1-permitopen.patch
129 deleted file mode 100644
130 index 5dc96d4d0a3..00000000000
131 --- a/net-misc/openssh/files/openssh-7.6_p1-permitopen.patch
132 +++ /dev/null
133 @@ -1,49 +0,0 @@
134 -From 69bda0228861f3dacd4fb3d28b60ce9d103d254b Mon Sep 17 00:00:00 2001
135 -From: "djm@×××××××.org" <djm@×××××××.org>
136 -Date: Wed, 4 Oct 2017 18:49:30 +0000
137 -Subject: [PATCH] upstream commit
138 -
139 -fix (another) problem in PermitOpen introduced during the
140 -channels.c refactor: the third and subsequent arguments to PermitOpen were
141 -being silently ignored; ok markus@
142 -
143 -Upstream-ID: 067c89f1f53cbc381628012ba776d6861e6782fd
144 ----
145 - servconf.c | 8 ++++----
146 - 1 file changed, 4 insertions(+), 4 deletions(-)
147 -
148 -diff --git a/servconf.c b/servconf.c
149 -index 2c321a4a..95686295 100644
150 ---- a/servconf.c
151 -+++ b/servconf.c
152 -@@ -1,5 +1,5 @@
153 -
154 --/* $OpenBSD: servconf.c,v 1.312 2017/10/02 19:33:20 djm Exp $ */
155 -+/* $OpenBSD: servconf.c,v 1.313 2017/10/04 18:49:30 djm Exp $ */
156 - /*
157 - * Copyright (c) 1995 Tatu Ylonen <ylo@××××××.fi>, Espoo, Finland
158 - * All rights reserved
159 -@@ -1663,9 +1663,9 @@ process_server_config_line(ServerOptions *options, char *line,
160 - if (!arg || *arg == '\0')
161 - fatal("%s line %d: missing PermitOpen specification",
162 - filename, linenum);
163 -- i = options->num_permitted_opens; /* modified later */
164 -+ value = options->num_permitted_opens; /* modified later */
165 - if (strcmp(arg, "any") == 0 || strcmp(arg, "none") == 0) {
166 -- if (*activep && i == 0) {
167 -+ if (*activep && value == 0) {
168 - options->num_permitted_opens = 1;
169 - options->permitted_opens = xcalloc(1,
170 - sizeof(*options->permitted_opens));
171 -@@ -1683,7 +1683,7 @@ process_server_config_line(ServerOptions *options, char *line,
172 - if (arg == NULL || ((port = permitopen_port(arg)) < 0))
173 - fatal("%s line %d: bad port number in "
174 - "PermitOpen", filename, linenum);
175 -- if (*activep && i == 0) {
176 -+ if (*activep && value == 0) {
177 - options->permitted_opens = xrecallocarray(
178 - options->permitted_opens,
179 - options->num_permitted_opens,
180 ---
181 -2.16.1
182 -
183
184 diff --git a/net-misc/openssh/files/openssh-7.6_p1-warnings.patch b/net-misc/openssh/files/openssh-7.6_p1-warnings.patch
185 deleted file mode 100644
186 index 5843dd162cd..00000000000
187 --- a/net-misc/openssh/files/openssh-7.6_p1-warnings.patch
188 +++ /dev/null
189 @@ -1,12 +0,0 @@
190 -diff --git a/openbsd-compat/freezero.c b/openbsd-compat/freezero.c
191 -index 3af8f4a7..7f6bc7fa 100644
192 ---- a/openbsd-compat/freezero.c
193 -+++ b/openbsd-compat/freezero.c
194 -@@ -14,6 +14,7 @@
195 - * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
196 - */
197 -
198 -+#include <string.h>
199 - #include "includes.h"
200 -
201 - #ifndef HAVE_FREEZERO
202
203 diff --git a/net-misc/openssh/files/sshd.rc6.5 b/net-misc/openssh/files/sshd.rc6.5
204 deleted file mode 100644
205 index 044cbe7268f..00000000000
206 --- a/net-misc/openssh/files/sshd.rc6.5
207 +++ /dev/null
208 @@ -1,89 +0,0 @@
209 -#!/sbin/openrc-run
210 -# Copyright 1999-2018 Gentoo Foundation
211 -# Distributed under the terms of the GNU General Public License v2
212 -
213 -extra_commands="checkconfig"
214 -extra_started_commands="reload"
215 -
216 -: ${SSHD_CONFDIR:=${RC_PREFIX%/}/etc/ssh}
217 -: ${SSHD_CONFIG:=${SSHD_CONFDIR}/sshd_config}
218 -: ${SSHD_PIDFILE:=${RC_PREFIX%/}/run/${SVCNAME}.pid}
219 -: ${SSHD_BINARY:=${RC_PREFIX%/}/usr/sbin/sshd}
220 -: ${SSHD_KEYGEN_BINARY:=${RC_PREFIX%/}/usr/bin/ssh-keygen}
221 -
222 -command="${SSHD_BINARY}"
223 -pidfile="${SSHD_PIDFILE}"
224 -command_args="${SSHD_OPTS} -o PidFile=${pidfile} -f ${SSHD_CONFIG}"
225 -
226 -# Wait one second (length chosen arbitrarily) to see if sshd actually
227 -# creates a PID file, or if it crashes for some reason like not being
228 -# able to bind to the address in ListenAddress (bug 617596).
229 -: ${SSHD_SSD_OPTS:=--wait 1000}
230 -start_stop_daemon_args="${SSHD_SSD_OPTS}"
231 -
232 -depend() {
233 - # Entropy can be used by ssh-keygen, among other things, but
234 - # is not strictly required (bug 470020).
235 - use logger dns entropy
236 - if [ "${rc_need+set}" = "set" ] ; then
237 - : # Do nothing, the user has explicitly set rc_need
238 - else
239 - local x warn_addr
240 - for x in $(awk '/^ListenAddress/{ print $2 }' "$SSHD_CONFIG" 2>/dev/null) ; do
241 - case "${x}" in
242 - 0.0.0.0|0.0.0.0:*) ;;
243 - ::|\[::\]*) ;;
244 - *) warn_addr="${warn_addr} ${x}" ;;
245 - esac
246 - done
247 - if [ -n "${warn_addr}" ] ; then
248 - need net
249 - ewarn "You are binding an interface in ListenAddress statement in your sshd_config!"
250 - ewarn "You must add rc_need=\"net.FOO\" to your ${RC_PREFIX%/}/etc/conf.d/sshd"
251 - ewarn "where FOO is the interface(s) providing the following address(es):"
252 - ewarn "${warn_addr}"
253 - fi
254 - fi
255 -}
256 -
257 -checkconfig() {
258 - checkpath --directory "${RC_PREFIX%/}/var/empty"
259 -
260 - if [ ! -e "${SSHD_CONFIG}" ] ; then
261 - eerror "You need an ${SSHD_CONFIG} file to run sshd"
262 - eerror "There is a sample file in /usr/share/doc/openssh"
263 - return 1
264 - fi
265 -
266 - ${SSHD_KEYGEN_BINARY} -A || return 2
267 -
268 - "${command}" -t ${command_args} || return 3
269 -}
270 -
271 -start_pre() {
272 - # If this isn't a restart, make sure that the user's config isn't
273 - # busted before we try to start the daemon (this will produce
274 - # better error messages than if we just try to start it blindly).
275 - #
276 - # If, on the other hand, this *is* a restart, then the stop_pre
277 - # action will have ensured that the config is usable and we don't
278 - # need to do that again.
279 - if [ "${RC_CMD}" != "restart" ] ; then
280 - checkconfig || return $?
281 - fi
282 -}
283 -
284 -stop_pre() {
285 - # If this is a restart, check to make sure the user's config
286 - # isn't busted before we stop the running daemon.
287 - if [ "${RC_CMD}" = "restart" ] ; then
288 - checkconfig || return $?
289 - fi
290 -}
291 -
292 -reload() {
293 - checkconfig || return $?
294 - ebegin "Reloading ${SVCNAME}"
295 - start-stop-daemon --signal HUP --pidfile "${pidfile}"
296 - eend $?
297 -}