2013-01-29 23:02:22 +01:00
|
|
|
;;; GNU Guix --- Functional package management for GNU
|
|
|
|
;;; Copyright © 2013 Andreas Enge <andreas@enge.fr>
|
2014-03-21 09:04:37 +01:00
|
|
|
;;; Copyright © 2014 Mark H Weaver <mhw@netris.org>
|
2013-01-29 23:02:22 +01:00
|
|
|
;;;
|
|
|
|
;;; This file is part of GNU Guix.
|
|
|
|
;;;
|
|
|
|
;;; GNU Guix is free software; you can redistribute it and/or modify it
|
|
|
|
;;; under the terms of the GNU General Public License as published by
|
|
|
|
;;; the Free Software Foundation; either version 3 of the License, or (at
|
|
|
|
;;; your option) any later version.
|
|
|
|
;;;
|
|
|
|
;;; GNU Guix is distributed in the hope that it will be useful, but
|
|
|
|
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
;;; GNU General Public License for more details.
|
|
|
|
;;;
|
|
|
|
;;; You should have received a copy of the GNU General Public License
|
|
|
|
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
(define-module (gnu packages ssh)
|
|
|
|
#:use-module ((guix licenses)
|
|
|
|
#:renamer (symbol-prefix-proc 'license:))
|
|
|
|
#:use-module (gnu packages compression)
|
|
|
|
#:use-module (gnu packages gnupg)
|
2013-01-30 21:31:50 +01:00
|
|
|
#:use-module (gnu packages groff)
|
|
|
|
#:use-module (gnu packages openssl)
|
2013-12-15 23:27:56 +01:00
|
|
|
#:use-module (gnu packages elf)
|
2013-12-04 22:24:28 +01:00
|
|
|
#:use-module (gnu packages guile)
|
|
|
|
#:use-module (gnu packages pkg-config)
|
|
|
|
#:use-module (gnu packages autotools)
|
2014-03-01 15:41:18 +01:00
|
|
|
#:use-module (gnu packages texinfo)
|
2013-12-04 22:24:28 +01:00
|
|
|
#:use-module (gnu packages which)
|
2013-01-29 23:02:22 +01:00
|
|
|
#:use-module (guix packages)
|
|
|
|
#:use-module (guix download)
|
2013-11-27 23:52:53 +01:00
|
|
|
#:use-module (guix build-system gnu)
|
|
|
|
#:use-module (guix build-system cmake))
|
|
|
|
|
|
|
|
(define-public libssh
|
|
|
|
(package
|
|
|
|
(name "libssh")
|
2014-04-02 07:50:54 +02:00
|
|
|
(version "0.6.3")
|
2013-11-27 23:52:53 +01:00
|
|
|
(source (origin
|
|
|
|
(method url-fetch)
|
2014-04-02 07:50:54 +02:00
|
|
|
(uri (string-append "https://red.libssh.org/attachments/download/87/libssh-"
|
|
|
|
version ".tar.xz"))
|
2013-11-27 23:52:53 +01:00
|
|
|
(sha256
|
|
|
|
(base32
|
2014-04-02 07:50:54 +02:00
|
|
|
"1jyaj9h1iglvn02hrvcchbx8ycjpj8b91h8mi459k7q5jp2xgd9b"))))
|
2013-11-27 23:52:53 +01:00
|
|
|
(build-system cmake-build-system)
|
2013-12-04 00:29:19 +01:00
|
|
|
(arguments
|
|
|
|
'(#:configure-flags '("-DWITH_GCRYPT=ON"
|
2013-11-27 23:52:53 +01:00
|
|
|
|
2013-12-17 22:02:07 +01:00
|
|
|
;; Leave a valid RUNPATH upon install.
|
|
|
|
"-DCMAKE_SKIP_BUILD_RPATH=ON")
|
2013-12-04 00:29:19 +01:00
|
|
|
|
|
|
|
;; TODO: Add 'CMockery' and '-DWITH_TESTING=ON' for the test suite.
|
|
|
|
#:tests? #f
|
|
|
|
|
|
|
|
#:modules ((guix build cmake-build-system)
|
|
|
|
(guix build utils)
|
|
|
|
(guix build rpath))
|
|
|
|
#:imported-modules ((guix build gnu-build-system)
|
|
|
|
(guix build cmake-build-system)
|
|
|
|
(guix build utils)
|
|
|
|
(guix build rpath))
|
|
|
|
|
|
|
|
#:phases (alist-cons-after
|
|
|
|
'install 'augment-runpath
|
|
|
|
(lambda* (#:key outputs #:allow-other-keys)
|
|
|
|
;; libssh_threads.so NEEDs libssh.so, so add $libdir to its
|
|
|
|
;; RUNPATH.
|
|
|
|
(define (dereference file)
|
|
|
|
(let ((target (false-if-exception (readlink file))))
|
|
|
|
(if target
|
|
|
|
(dereference target)
|
|
|
|
file)))
|
|
|
|
|
|
|
|
(let* ((out (assoc-ref outputs "out"))
|
|
|
|
(lib (string-append out "/lib")))
|
|
|
|
(with-directory-excursion lib
|
|
|
|
(augment-rpath (dereference "libssh_threads.so")
|
|
|
|
lib))))
|
|
|
|
%standard-phases)))
|
2013-11-27 23:52:53 +01:00
|
|
|
(inputs `(("zlib" ,zlib)
|
2013-12-17 22:01:42 +01:00
|
|
|
;; Link against an older gcrypt, because libssh tries to access
|
|
|
|
;; fields of 'gcry_thread_cbs' that are now private:
|
|
|
|
;; src/threads.c:72:26: error: 'struct gcry_thread_cbs' has no member named 'mutex_init'
|
2013-12-18 14:11:01 +01:00
|
|
|
("libgcrypt", libgcrypt-1.5)))
|
2013-12-04 00:29:19 +01:00
|
|
|
(native-inputs `(("patchelf" ,patchelf)))
|
2013-11-27 23:52:53 +01:00
|
|
|
(synopsis "SSH client library")
|
|
|
|
(description
|
|
|
|
"libssh is a C library implementing the SSHv2 and SSHv1 protocol for
|
|
|
|
client and server implementations. With libssh, you can remotely execute
|
|
|
|
programs, transfer files, and use a secure and transparent tunnel for your
|
|
|
|
remote applications.")
|
|
|
|
(home-page "http://www.libssh.org")
|
|
|
|
(license license:lgpl2.1+)))
|
2013-01-29 23:02:22 +01:00
|
|
|
|
|
|
|
(define-public libssh2
|
|
|
|
(package
|
|
|
|
(name "libssh2")
|
|
|
|
(version "1.4.3")
|
|
|
|
(source (origin
|
|
|
|
(method url-fetch)
|
|
|
|
(uri (string-append
|
|
|
|
"http://www.libssh2.org/download/libssh2-"
|
|
|
|
version ".tar.gz"))
|
|
|
|
(sha256 (base32
|
|
|
|
"0vdr478dbhbdgnniqmirawjb7mrcxckn4slhhrijxnzrkmgziipa"))))
|
|
|
|
(build-system gnu-build-system)
|
2014-03-25 21:51:32 +01:00
|
|
|
;; The installed libssh2.pc file does not include paths to libgcrypt and
|
|
|
|
;; zlib libraries, so we need to propagate the inputs.
|
|
|
|
(propagated-inputs `(("libgcrypt" ,libgcrypt)
|
|
|
|
("zlib" ,zlib)))
|
|
|
|
(arguments '(#:configure-flags `("--with-libgcrypt")))
|
2013-01-29 23:02:22 +01:00
|
|
|
(synopsis "libssh2, a client-side C library implementing the SSH2 protocol")
|
|
|
|
(description
|
|
|
|
"libssh2 is a library intended to allow software developers access to
|
|
|
|
the SSH-2 protocol in an easy-to-use self-contained package. It can be built
|
|
|
|
into an application to perform many different tasks when communicating with
|
|
|
|
a server that supports the SSH-2 protocol.")
|
|
|
|
(license license:bsd-3)
|
|
|
|
(home-page "http://www.libssh2.org/")))
|
2013-01-30 21:31:50 +01:00
|
|
|
|
|
|
|
(define-public openssh
|
|
|
|
(package
|
|
|
|
(name "openssh")
|
2014-03-21 09:04:37 +01:00
|
|
|
(version "6.6p1")
|
2013-01-30 21:31:50 +01:00
|
|
|
(source (origin
|
|
|
|
(method url-fetch)
|
|
|
|
(uri (string-append
|
|
|
|
"ftp://ftp.fr.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-"
|
|
|
|
version ".tar.gz"))
|
|
|
|
(sha256 (base32
|
2014-03-21 09:04:37 +01:00
|
|
|
"1fq3w86q05y5nn6z878wm312k0svaprw8k007188fd259dkg1ha8"))))
|
2013-01-30 21:31:50 +01:00
|
|
|
(build-system gnu-build-system)
|
|
|
|
(inputs `(("groff" ,groff)
|
|
|
|
("openssl" ,openssl)
|
|
|
|
("zlib" ,zlib)))
|
|
|
|
(arguments
|
|
|
|
`(#:test-target "tests"
|
|
|
|
#:phases
|
2014-03-31 01:09:10 +02:00
|
|
|
(alist-cons-after
|
|
|
|
'configure 'reset-/var/empty
|
|
|
|
(lambda* (#:key outputs #:allow-other-keys)
|
|
|
|
(let ((out (assoc-ref outputs "out")))
|
|
|
|
(substitute* "Makefile"
|
|
|
|
(("PRIVSEP_PATH=/var/empty")
|
|
|
|
(string-append "PRIVSEP_PATH=" out "/var/empty")))))
|
|
|
|
(alist-cons-before
|
|
|
|
'check 'patch-tests
|
|
|
|
(lambda _
|
|
|
|
;; remove tests that require the user sshd
|
|
|
|
(substitute* "regress/Makefile"
|
|
|
|
(("t10 t-exec") "t10")))
|
2013-01-30 21:31:50 +01:00
|
|
|
(alist-replace
|
|
|
|
'install
|
|
|
|
(lambda* (#:key (make-flags '()) #:allow-other-keys)
|
|
|
|
;; install without host keys and system configuration files
|
|
|
|
(zero? (apply system* "make" "install-nosysconf" make-flags)))
|
|
|
|
%standard-phases)))))
|
|
|
|
(synopsis "OpenSSH, a client and server for the secure shell (ssh) protocol")
|
|
|
|
(description
|
|
|
|
"The SSH2 protocol implemented in OpenSSH is standardised by the
|
|
|
|
IETF secsh working group and is specified in several RFCs and drafts.
|
|
|
|
It is composed of three layered components:
|
|
|
|
|
|
|
|
The transport layer provides algorithm negotiation and a key exchange.
|
|
|
|
The key exchange includes server authentication and results in a
|
|
|
|
cryptographically secured connection: it provides integrity, confidentiality
|
|
|
|
and optional compression.
|
|
|
|
|
|
|
|
The user authentication layer uses the established connection and relies on
|
|
|
|
the services provided by the transport layer. It provides several mechanisms
|
|
|
|
for user authentication. These include traditional password authentication
|
|
|
|
as well as public-key or host-based authentication mechanisms.
|
|
|
|
|
|
|
|
The connection layer multiplexes many different concurrent channels over the
|
|
|
|
authenticated connection and allows tunneling of login sessions and
|
|
|
|
TCP-forwarding. It provides a flow control service for these channels.
|
|
|
|
Additionally, various channel-specific options can be negotiated.")
|
|
|
|
(license (license:bsd-style "file://LICENSE"
|
|
|
|
"See LICENSE in the distribution."))
|
|
|
|
(home-page "http://www.openssh.org/")))
|
|
|
|
|
2013-12-04 22:24:28 +01:00
|
|
|
(define-public guile-ssh
|
|
|
|
(package
|
|
|
|
(name "guile-ssh")
|
2014-03-25 16:14:45 +01:00
|
|
|
(version "0.6.0")
|
2013-12-04 22:24:28 +01:00
|
|
|
(source (origin
|
|
|
|
(method url-fetch)
|
|
|
|
(uri (string-append
|
|
|
|
"https://github.com/artyom-poptsov/libguile-ssh/archive/v"
|
|
|
|
version ".tar.gz"))
|
|
|
|
(sha256
|
|
|
|
(base32
|
2014-03-25 16:14:45 +01:00
|
|
|
"1v4y5vrwg0g6804pzbr160zahlqvj7k7iwys2bdpfzp7m2i47siq"))))
|
2013-12-04 22:24:28 +01:00
|
|
|
(build-system gnu-build-system)
|
|
|
|
(arguments
|
|
|
|
'(#:phases (alist-cons-before
|
|
|
|
'configure 'autoreconf
|
|
|
|
(lambda* (#:key inputs #:allow-other-keys)
|
2014-03-01 15:41:18 +01:00
|
|
|
(substitute* "ssh/Makefile.am"
|
2013-12-04 22:24:28 +01:00
|
|
|
(("-lssh_threads" match)
|
|
|
|
(string-append "-L" (assoc-ref inputs "libssh")
|
|
|
|
"/lib " match)))
|
|
|
|
|
|
|
|
(zero? (system* "autoreconf" "-vfi")))
|
|
|
|
(alist-cons-after
|
|
|
|
'install 'fix-libguile-ssh-file-name
|
|
|
|
(lambda* (#:key outputs #:allow-other-keys)
|
|
|
|
(let* ((out (assoc-ref outputs "out"))
|
|
|
|
(libdir (string-append out "/lib"))
|
|
|
|
(guiledir (string-append out
|
|
|
|
"/share/guile/site/2.0")))
|
|
|
|
(substitute* (find-files guiledir ".scm")
|
|
|
|
(("\"libguile-ssh\"")
|
|
|
|
(string-append "\"" libdir "/libguile-ssh\"")))
|
|
|
|
|
|
|
|
;; Make sure it works.
|
|
|
|
(setenv "GUILE_LOAD_PATH" guiledir)
|
|
|
|
(setenv "GUILE_LOAD_COMPILED_PATH" guiledir)
|
|
|
|
(system* "guile" "-c" "(use-modules (ssh session))")))
|
|
|
|
%standard-phases))
|
|
|
|
#:configure-flags (list (string-append "--with-guilesitedir="
|
|
|
|
(assoc-ref %outputs "out")
|
2014-03-01 15:41:18 +01:00
|
|
|
"/share/guile/site/2.0"))
|
|
|
|
|
2014-03-25 16:14:45 +01:00
|
|
|
;; Building the .go requires building libguile-ssh.so first.
|
|
|
|
#:parallel-build? #f
|
2014-03-01 15:41:18 +01:00
|
|
|
|
2014-03-25 16:14:45 +01:00
|
|
|
;; Tests are not parallel-safe.
|
|
|
|
#:parallel-tests? #f))
|
2013-12-04 22:24:28 +01:00
|
|
|
(native-inputs `(("autoconf" ,autoconf)
|
|
|
|
("automake" ,automake)
|
|
|
|
("libtool" ,libtool "bin")
|
2014-03-01 15:41:18 +01:00
|
|
|
("texinfo" ,texinfo)
|
2013-12-04 22:24:28 +01:00
|
|
|
("pkg-config" ,pkg-config)
|
|
|
|
("which" ,which)))
|
|
|
|
(inputs `(("guile" ,guile-2.0)
|
|
|
|
("libssh" ,libssh)))
|
|
|
|
(synopsis "Guile bindings to libssh")
|
|
|
|
(description
|
|
|
|
"Guile-SSH is a library that provides access to the SSH protocol for
|
|
|
|
programs written in GNU Guile interpreter. It is a wrapper to the underlying
|
|
|
|
libssh library.")
|
|
|
|
(home-page "https://github.com/artyom-poptsov/libguile-ssh")
|
|
|
|
(license license:gpl3+)))
|
2014-01-25 01:51:29 +01:00
|
|
|
|
|
|
|
(define-public corkscrew
|
|
|
|
(package
|
|
|
|
(name "corkscrew")
|
|
|
|
(version "2.0")
|
|
|
|
(source
|
|
|
|
(origin
|
|
|
|
(method url-fetch)
|
|
|
|
(uri (string-append "http://www.agroman.net/corkscrew/corkscrew-"
|
|
|
|
version ".tar.gz"))
|
|
|
|
(sha256 (base32
|
|
|
|
"1gmhas4va6gd70i2x2mpxpwpgww6413mji29mg282jms3jscn3qd"))))
|
|
|
|
(build-system gnu-build-system)
|
|
|
|
(arguments
|
|
|
|
;; Replace configure phase as the ./configure script does not link
|
|
|
|
;; CONFIG_SHELL and SHELL passed as parameters
|
|
|
|
'(#:phases
|
|
|
|
(alist-replace
|
|
|
|
'configure
|
|
|
|
(lambda* (#:key outputs inputs system target
|
|
|
|
#:allow-other-keys #:rest args)
|
|
|
|
(let* ((configure (assoc-ref %standard-phases 'configure))
|
|
|
|
(prefix (assoc-ref outputs "out"))
|
|
|
|
(bash (which "bash"))
|
|
|
|
;; Set --build and --host flags as the provided config.guess
|
|
|
|
;; is not able to detect them
|
|
|
|
(flags `(,(string-append "--prefix=" prefix)
|
|
|
|
,(string-append "--build=" system)
|
|
|
|
,(string-append "--host="
|
|
|
|
(or target system)))))
|
|
|
|
(setenv "CONFIG_SHELL" bash)
|
|
|
|
(zero? (apply system* bash
|
|
|
|
(string-append "." "/configure")
|
|
|
|
flags))))
|
|
|
|
%standard-phases)))
|
|
|
|
(home-page "http://www.agroman.net/corkscrew")
|
|
|
|
(synopsis "A tool for tunneling SSH through HTTP proxies")
|
|
|
|
(description
|
|
|
|
"Corkscrew allows creating TCP tunnels through HTTP proxies. WARNING:
|
|
|
|
At the moment only plain text authentication is supported, should you require
|
|
|
|
to use it with your HTTP proxy. Digest based authentication may be supported
|
|
|
|
in future and NTLM based authentication is most likey never be supported.")
|
|
|
|
(license license:gpl2+)))
|