Compare commits
2 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
fbb00bd666 | ||
|
|
563812345d |
8
Makefile
8
Makefile
@@ -15,7 +15,7 @@ export URL = http://www.openssh.com/
|
|||||||
BRIEF = OpenSSH client and server
|
BRIEF = OpenSSH client and server
|
||||||
DESC = OpenSSH is the premier connectivity tool for remote login with the \
|
DESC = OpenSSH is the premier connectivity tool for remote login with the \
|
||||||
SSH protocol.
|
SSH protocol.
|
||||||
SNAPVER = 4
|
SNAPVER = 6
|
||||||
|
|
||||||
ARCHIVE := $(PWD)/SRC/$(shell ls SRC|egrep '(bz2|gz|tar|xz)$$'|tail -1)
|
ARCHIVE := $(PWD)/SRC/$(shell ls SRC|egrep '(bz2|gz|tar|xz)$$'|tail -1)
|
||||||
TYPE := $(shell file -ib $(ARCHIVE)|cut -d';' -f1|tr -d '\n')
|
TYPE := $(shell file -ib $(ARCHIVE)|cut -d';' -f1|tr -d '\n')
|
||||||
@@ -41,21 +41,25 @@ $(CLIENTROOT): $(SRCDIR)/sshd
|
|||||||
fi
|
fi
|
||||||
cd $(SRCDIR) && make install DESTDIR=$(CLIENTROOT) && \
|
cd $(SRCDIR) && make install DESTDIR=$(CLIENTROOT) && \
|
||||||
install -v -d -m 755 $(CLIENTROOT)/usr/share/doc/openssh && \
|
install -v -d -m 755 $(CLIENTROOT)/usr/share/doc/openssh && \
|
||||||
|
install -v -d -m 755 $(CLIENTROOT)/usr/share/openssh && \
|
||||||
install -v -m 755 contrib/ssh-copy-id $(CLIENTROOT)/usr/bin && \
|
install -v -m 755 contrib/ssh-copy-id $(CLIENTROOT)/usr/bin && \
|
||||||
install -v -m 644 contrib/ssh-copy-id.1 \
|
install -v -m 644 contrib/ssh-copy-id.1 \
|
||||||
$(CLIENTROOT)/usr/share/man/man1 && \
|
$(CLIENTROOT)/usr/share/man/man1 && \
|
||||||
install -v -m644 INSTALL LICENCE OVERVIEW README* \
|
install -v -m644 INSTALL LICENCE OVERVIEW README* \
|
||||||
$(CLIENTROOT)/usr/share/doc/openssh && \
|
$(CLIENTROOT)/usr/share/doc/openssh && \
|
||||||
gzip $(CLIENTROOT)/usr/share/doc/openssh/* && \
|
gzip $(CLIENTROOT)/usr/share/doc/openssh/* && \
|
||||||
|
mv -v $(CLIENTROOT)/etc/ssh/ssh_config \
|
||||||
|
$(CLIENTROOT)/usr/share/openssh && \
|
||||||
install -v -d $(SERVER)/SNAP && \
|
install -v -d $(SERVER)/SNAP && \
|
||||||
install -v -d $(SERVERROOT) && \
|
install -v -d $(SERVERROOT) && \
|
||||||
install -v -d -m 755 $(SERVERROOT)/etc/{ssh,init.d} && \
|
install -v -d -m 755 $(SERVERROOT)/etc/{ssh,init.d} && \
|
||||||
install -v -d -m 755 $(SERVERROOT)/usr/{libexec,sbin} && \
|
install -v -d -m 755 $(SERVERROOT)/usr/{libexec,sbin} && \
|
||||||
install -v -d -m 755 $(SERVERROOT)/usr/share/man/man{5,8} && \
|
install -v -d -m 755 $(SERVERROOT)/usr/share/man/man{5,8} && \
|
||||||
|
install -v -d -m 755 $(SERVERROOT)/usr/share/openssh && \
|
||||||
install -v -m 755 $(PWD)/SNAP/sshd.init \
|
install -v -m 755 $(PWD)/SNAP/sshd.init \
|
||||||
$(SERVERROOT)/etc/init.d/sshd && \
|
$(SERVERROOT)/etc/init.d/sshd && \
|
||||||
mv -v $(CLIENTROOT)/etc/ssh/sshd_config \
|
mv -v $(CLIENTROOT)/etc/ssh/sshd_config \
|
||||||
$(SERVERROOT)/etc/ssh/sshd_config && \
|
$(SERVERROOT)/usr/share/openssh/sshd_config && \
|
||||||
mv -v $(CLIENTROOT)/usr/libexec/sftp-server \
|
mv -v $(CLIENTROOT)/usr/libexec/sftp-server \
|
||||||
$(SERVERROOT)/usr/libexec/sftp-server && \
|
$(SERVERROOT)/usr/libexec/sftp-server && \
|
||||||
mv -v $(CLIENTROOT)/usr/sbin/sshd \
|
mv -v $(CLIENTROOT)/usr/sbin/sshd \
|
||||||
|
|||||||
@@ -1,9 +1,10 @@
|
|||||||
#!/bin/sh
|
#!/bin/sh
|
||||||
|
|
||||||
### BEGIN INIT INFO
|
### BEGIN INIT INFO
|
||||||
# Provides: sshd
|
# Provides: sshd
|
||||||
# Required-Start: $network $syslog
|
# Required-Start: $network $syslog
|
||||||
# Required-Stop: $network $syslog
|
# Required-Stop: $network $syslog
|
||||||
|
# Should-Start:
|
||||||
|
# Should-Stop:
|
||||||
# Default-Start: 3 4 5
|
# Default-Start: 3 4 5
|
||||||
# Default-Stop: 0 1 2 6
|
# Default-Stop: 0 1 2 6
|
||||||
# Short-Description: OpenBSD Secure Shell server
|
# Short-Description: OpenBSD Secure Shell server
|
||||||
@@ -12,38 +13,45 @@
|
|||||||
. /lib/lsb/init-functions
|
. /lib/lsb/init-functions
|
||||||
|
|
||||||
DAEMON=/usr/sbin/sshd
|
DAEMON=/usr/sbin/sshd
|
||||||
|
PIDFILE=/var/run/sshd.pid
|
||||||
check_privsep_dir() {
|
PRIVSEPDIR=/var/run/sshd
|
||||||
# Create the PrivSep empty dir if necessary
|
|
||||||
if [ ! -d /var/run/sshd ]; then
|
|
||||||
mkdir /var/run/sshd
|
|
||||||
chmod 0755 /var/run/sshd
|
|
||||||
fi
|
|
||||||
}
|
|
||||||
|
|
||||||
case "$1" in
|
case "$1" in
|
||||||
start)
|
start)
|
||||||
check_privsep_dir
|
log_init_msg "Starting OpenBSD Secure Shell server"
|
||||||
log_info_msg "Starting OpenBSD Secure Shell server"
|
|
||||||
$DAEMON && log_success_msg || log_failure_msg
|
if [ ! -d "$PRIVSEPDIR" ]; then
|
||||||
|
mkdir "$PRIVSEPDIR" || error=1
|
||||||
|
fi
|
||||||
|
|
||||||
|
chmod 0755 "$PRIVSEPDIR" || error=1
|
||||||
|
start_daemon "$DAEMON" || error=1
|
||||||
|
|
||||||
|
[ -z "$error" ] && log_success_msg || log_failure_msg
|
||||||
|
|
||||||
|
exit $error
|
||||||
;;
|
;;
|
||||||
stop)
|
stop)
|
||||||
log_info_msg "Stopping OpenBSD Secure Shell server"
|
log_init_msg "Stopping OpenBSD Secure Shell server"
|
||||||
|
|
||||||
if ! test -f /var/run/sshd.pid; then
|
killproc "$DAEMON" -TERM && log_success_msg || log_failure_msg
|
||||||
echo -n " - No sshd running"
|
;;
|
||||||
log_warning_msg
|
reload|restart)
|
||||||
|
log_init_msg "Restarting OpenBSD Secure Shell server"
|
||||||
|
|
||||||
|
killproc -p "$PIDFILE" "$DAEMON" -HUP && log_success_msg || log_failure_msg
|
||||||
|
;;
|
||||||
|
status)
|
||||||
|
pid=$(pidofproc -p "$PIDFILE" "$DAEMON")
|
||||||
|
|
||||||
|
if [ "$?" -ne 0 ]; then
|
||||||
|
echo "OpenBSD Secure Shell server not running"
|
||||||
else
|
else
|
||||||
kill -TERM $(cat /var/run/sshd.pid) && log_success_msg || log_failure_msg
|
echo "OpenBSD Secure Shell server running with PID: $pid"
|
||||||
fi
|
fi
|
||||||
;;
|
;;
|
||||||
restart)
|
|
||||||
$0 stop
|
|
||||||
sleep 1
|
|
||||||
$0 start
|
|
||||||
;;
|
|
||||||
*)
|
*)
|
||||||
echo "Usage: $0 [start|stop|restart]"
|
echo "Usage: $0 [start|stop|reload|restart|status]"
|
||||||
exit 1
|
exit 1
|
||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
|
|||||||
14
SNAP/usher
14
SNAP/usher
@@ -1,5 +1,7 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
case $1 in
|
case $1 in
|
||||||
preinst)
|
preinst)
|
||||||
exit 0
|
exit 0
|
||||||
@@ -16,7 +18,7 @@ case $1 in
|
|||||||
fi
|
fi
|
||||||
if ! chroot ${TARGET} 'getent passwd sshd 2>&1 > /dev/null'; then
|
if ! chroot ${TARGET} 'getent passwd sshd 2>&1 > /dev/null'; then
|
||||||
if chroot ${TARGET} 'useradd -c "sshd PrivSep" \
|
if chroot ${TARGET} 'useradd -c "sshd PrivSep" \
|
||||||
-d /var/lib/sshd -g sshd -s /bin/false -u 50 sshd'; then
|
-d /var/run/sshd -g sshd -s /bin/false -u 50 sshd'; then
|
||||||
echo 'Created user sshd'
|
echo 'Created user sshd'
|
||||||
else
|
else
|
||||||
echo 'Failed to create user sshd!'
|
echo 'Failed to create user sshd!'
|
||||||
@@ -37,7 +39,7 @@ case $1 in
|
|||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
if ! getent passwd sshd 2>&1 > /dev/null; then
|
if ! getent passwd sshd 2>&1 > /dev/null; then
|
||||||
if useradd -c 'sshd PrivSep' -d /var/lib/sshd -g sshd \
|
if useradd -c 'sshd PrivSep' -d /var/run/sshd -g sshd \
|
||||||
-s /bin/false -u 50 sshd; then
|
-s /bin/false -u 50 sshd; then
|
||||||
echo 'Created user sshd'
|
echo 'Created user sshd'
|
||||||
else
|
else
|
||||||
@@ -50,6 +52,14 @@ case $1 in
|
|||||||
ssh-keygen -A
|
ssh-keygen -A
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
if [ ! -f ${TARGET}/etc/ssh/ssh_config ]; then
|
||||||
|
cp ${TARGET}/usr/share/openssh/ssh_config ${TARGET}/etc/ssh
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ ! -f ${TARGET}/etc/ssh/sshd_config ]; then
|
||||||
|
cp ${TARGET}/usr/share/openssh/sshd_config ${TARGET}/etc/ssh
|
||||||
|
fi
|
||||||
;;
|
;;
|
||||||
prerm)
|
prerm)
|
||||||
exit 0
|
exit 0
|
||||||
|
|||||||
Reference in New Issue
Block a user