1
0
mirror of https://github.com/dguglielmi/sunny-overlay.git synced 2025-12-06 09:32:37 +01:00

sys-kernel/dracut-openssh: Bump to 0.3

This commit is contained in:
2020-05-16 17:38:36 +02:00
parent 0dad9dcd07
commit 16e6c68e5d
7 changed files with 4 additions and 156 deletions

View File

@@ -1,6 +1,2 @@
AUX dracut-openssh.conf 505 BLAKE2B 812b38131fafa3c6974866a143178a941420e1f828589342a27029e95fb1f9d7251c45684f85fe9fe140a69e16e6331ddfc6e7d5d21f5ae53c65fe9bd7ef7854 SHA512 37c9678367cc379765e3db6aaeea5a298156428a21a36d7c6225b913214bd9b766304bc7c5f533c17ba039659902529ae492c523ef8c662a3bfed1d452fabc8b DIST dracut-openssh-0.3.tar.gz 13944 BLAKE2B 4116b892b2ed7988453d35cec2f2f3f73c56c24876d447d8f852fed1c820139a6ab9dab5a713e6e4d6664bc3f64a66422ce7ee453d5a294ba9e5ba30b20916eb SHA512 30b8dac3829574ecebc18f27ada22a5d9adbb5e61780d8aa9cd6dfbd55c06112174b482445dbe0b7c5d187a26963a6c31e4310f287d96220ff207918be3ba3c8
AUX module-setup.sh 2316 BLAKE2B 13d15f422adfde66eb979e23780c704e5a1e09f8e1feedee6e244b570c5d115b0828e272c1aa877ee09d59691855c8be79c672cea58abdde5c46f97b0e0b7db9 SHA512 df23c1dd830e28b39a3ec699a7edde072fd228e86f4b2aadbb792bda5bd086dc5c9194980e82693722742b9782d66629ac8900c1e524e9a291c3ca337c127f05 EBUILD dracut-openssh-0.3.ebuild 700 BLAKE2B 590a2bdc70ea05f47d706bfd526e8bc501780c2176c390a74a80be38702ad223701ee9a9b322ced3deb3834e5a02b602528c5647b9f518cfd6a2ae98a964d473 SHA512 f9682c82ed86bfaae0c1f5cded1a8b07704d4ac6237f9f736cd6a88a17b5af2e249e2b244cc52a00adec7f94897228c64c4ff6c45b7866c50973da3fb36e138d
AUX sshd-banner 70 BLAKE2B c3c868acc771e9a5546f624e1a05d4d64b02efecc5a018d3267bc250916c145794b3aef50eac3ece8ab0a9193d7d4282a471f1aad9ce47069b4d39df990b2ea9 SHA512 2d2bef16581d006deb2fadcdc2a3a9b4f720c3d8acac5f6624ea0fed2304fc3f84f497bde73297c687baefd0db7acdaa3c2c136ae90f798d558a8155db05245a
AUX sshd.service 312 BLAKE2B e4be767736d45d3ccbe3a6848d32ee6f9523f5e0641cf973da4501b5dcc7a41b9c127f208bb5125cef8683393d25729856652d94e7d5d8154b11a69300a4f860 SHA512 a4aaee86716a51c904ee95a08dae22c79a1153bfc8e1cb1cd15806a133200e3a7aacee9aa4abf0a749544ea898346b79454d6da30cef0ab42253bfbe9b83d866
AUX sshd_config 476 BLAKE2B f8f9b4536fc664bb4add6dd9718c70dbf45141004ead9662802c9352a71d1b0ccca55c2a69a1ca372818ad03563166868441edcd1c25c597f8ee30bd436bd446 SHA512 9039c83d3c37635d33e45004b1c9295f2a64355322114cea2f0600dd8f29c36e9b5d1b6a002c15a46b717a9de9797fea09a49f866c4a349d2e57300ac6bfa8e1
EBUILD dracut-openssh-0.2.ebuild 952 BLAKE2B 380e7ef3fd7f7ed3c8b62fd345bc215457baa5fbb85475b8a67e08155dce08db7372674ad44080ba3d82d1e727633934bebb716e8f824449f83fd9e8b8ac06cc SHA512 cd4bd8d41eac8bbcd5575367b974e4012568d8a934c2dbc7051920cd8ae20e2d147f74d1bdefbccecea5f485c229868c6a1b4f9ced869f38457775832723d804

View File

@@ -5,7 +5,7 @@ EAPI=7
DESCRIPTION="Dracut OpenSSH module" DESCRIPTION="Dracut OpenSSH module"
HOMEPAGE="https://github.com/dguglielmi/dracut-openssh" HOMEPAGE="https://github.com/dguglielmi/dracut-openssh"
SRC_URI="" SRC_URI="https://github.com/dguglielmi/dracut-openssh/archive/0.3.tar.gz -> ${P}.tar.gz"
LICENSE="GPL-3+" LICENSE="GPL-3+"
SLOT="0" SLOT="0"
@@ -19,21 +19,9 @@ DEPEND="!systemd-networkd? ( net-misc/dhcp )
sys-kernel/dracut" sys-kernel/dracut"
RDEPEND="${DEPEND}" RDEPEND="${DEPEND}"
S="${WORKDIR}"
src_install() { src_install() {
dodir /usr/lib/dracut/modules.d/48openssh emake PREFIX=${D} install
insinto /usr/lib/dracut/modules.d/48openssh
doins "${FILESDIR}"/sshd_config
doins "${FILESDIR}"/sshd-banner
doins "${FILESDIR}"/sshd.service
exeinto /usr/lib/dracut/modules.d/48openssh
doexe "${FILESDIR}/module-setup.sh"
insinto /etc/dracut.conf.d
doins "${FILESDIR}/dracut-openssh.conf"
if use systemd-networkd; then if use systemd-networkd; then
sed -i \ sed -i \
's@^#network_provider=.*@network_provider="systemd-networkd"@1' \ 's@^#network_provider=.*@network_provider="systemd-networkd"@1' \

View File

@@ -1,18 +0,0 @@
# Dracut OpenSSH configuration
#
#sshd_opts="-e -p 22"
#
#authorized_keys="/root/.ssh/authorized_keys"
#
#dsa_host_key="/etc/ssh/ssh_host_dsa_key"
#ecdsa_host_key="/etc/ssh/ssh_host_ecdsa_key"
#ed25519_host_key="/etc/ssh/ssh_host_ed25519_key"
#rsa_host_key="/etc/ssh/ssh_host_rsa_key"
#
# select network provider
# auto: autodetect network provider
# systemd-networkd: systemd network provider
# network: dracut default provider
#network_provider="auto"
#
#systemd_networkd_files="/etc/systemd/network/*"

View File

@@ -1,86 +0,0 @@
#!/bin/bash
net_provider() {
[ -z ${network_provider} ] && network_provider="auto"
if [ "${network_provider}" = "auto" ]; then
if systemctl -q is-active systemd-networkd; then
network_provider="systemd-networkd"
else
network_provider="network"
fi
fi
echo ${network_provider}
}
# called by dracut
check() {
#check for sshd
require_binaries sshd || return 1
return 0
}
# called by dracut
depends() {
echo $(net_provider)
return 0
}
# called by dracut
install() {
[ -z ${authorized_keys} ] && authorized_keys="/root/.ssh/authorized_keys"
[ -z ${sshd_opts} ] && sshd_opts="-e -p 22"
[ -z ${dsa_host_key} ] && dsa_host_key="/etc/ssh/ssh_host_dsa_key"
[ -z ${ecdsa_host_key} ] && ecdsa_host_key="/etc/ssh/ssh_host_ecdsa_key"
[ -z ${ed25519_host_key} ] && ed25519_host_key="/etc/ssh/ssh_host_ed25519_key"
[ -z ${rsa_host_key} ] && rsa_host_key="/etc/ssh/ssh_host_rsa_key"
[ -z ${systemd_networkd_files} ] && systemd_networkd_files="/etc/systemd/network/*"
local keytype keyfile
for keytype in dsa ecdsa ed25519 rsa; do
case ${keytype} in
dsa) keyfile=${dsa_host_key} ;;
ecdsa) keyfile=${ecdsa_host_key} ;;
ed25519) keyfile=${ed25519_host_key} ;;
rsa) keyfile=${rsa_host_key} ;;
esac
[ -f ${keyfile} ] && inst_simple "${keyfile}" /etc/ssh/ssh_host_${keytype}_key
done
inst_simple "${moddir}/sshd_config" /etc/ssh/sshd_config
inst_simple "${moddir}/sshd-banner" /etc/ssh/sshd-banner
inst_simple "$(which sshd)"
inst_simple "${moddir}/sshd.service" ${systemdsystemunitdir}/sshd.service
mkdir -p "${initdir}/etc/sysconfig"
echo "SSHD_OPTS=\"${sshd_opts}\"" > "${initdir}/etc/sysconfig/sshd"
if [ ! -r "${authorized_keys}" ]; then
dfatal "No authorized_keys found!"
return 1
fi
inst_simple ${authorized_keys} /root/.ssh/authorized_keys
getent passwd sshd >> "${initdir}/etc/passwd"
getent group sshd >> "${initdir}/etc/group"
mkdir -p -m 0755 "${initdir}$(getent passwd sshd | cut -d':' -f6)"
systemctl -q --root "${initdir}" enable sshd
mkdir -p -m 0755 "${initdir}/var/log"
touch "${initdir}/var/log/lastlog"
local nf
if [ "$(net_provider)" = "systemd-networkd" ]; then
for nf in ${systemd_networkd_files}; do
inst_simple "${nf}"
done
fi
return 0
}

View File

@@ -1,2 +0,0 @@
To unlock LUKS volume type "systemd-tty-ask-password-agent" command.

View File

@@ -1,19 +0,0 @@
[Unit]
Description=OpenSSH server daemon
DefaultDependencies=no
Before=cryptsetup.target
[Service]
Type=simple
EnvironmentFile=-/etc/sysconfig/sshd
ExecStart=/usr/sbin/sshd -D $SSHD_OPTS
ExecReload=/bin/kill -HUP $MAINPID
KillMode=process
Restart=on-failure
RestartSec=42s
[Install]
WantedBy=sysinit.target

View File

@@ -1,11 +0,0 @@
SyslogFacility AUTHPRIV
PermitRootLogin prohibit-password
AuthorizedKeysFile .ssh/authorized_keys
AuthenticationMethods publickey
UsePAM no
X11Forwarding no
Banner /etc/ssh/sshd-banner
AcceptEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES
AcceptEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT
AcceptEnv LC_IDENTIFICATION LC_ALL LANGUAGE