jonathancammack / rpms / openssh

Forked from rpms/openssh 6 months ago
Clone
0d83e7
commit 5481d0b4036b33b92c372ee36258ed11bff57d5d
0d83e7
Author: Jakub Jelen <jjelen@redhat.com>
0d83e7
Date:   Thu Feb 27 10:07:33 2020 +0100
0d83e7
0d83e7
    Mark the RDomain configuration option unsupported on non-openbsd builds
0d83e7
0d83e7
diff --git a/servconf.c b/servconf.c
0d83e7
index db80e943..153d2525 100644
0d83e7
--- a/servconf.c
0d83e7
+++ b/servconf.c
0d83e7
@@ -698,7 +698,11 @@ static struct {
0d83e7
 	{ "fingerprinthash", sFingerprintHash, SSHCFG_GLOBAL },
0d83e7
 	{ "disableforwarding", sDisableForwarding, SSHCFG_ALL },
0d83e7
 	{ "exposeauthinfo", sExposeAuthInfo, SSHCFG_ALL },
0d83e7
+#if defined(__OpenBSD__)
0d83e7
 	{ "rdomain", sRDomain, SSHCFG_ALL },
0d83e7
+#else
0d83e7
+	{ "rdomain", sUnsupported, SSHCFG_ALL },
0d83e7
+#endif
0d83e7
 	{ "casignaturealgorithms", sCASignatureAlgorithms, SSHCFG_ALL },
0d83e7
 	{ NULL, sBadOption, 0 }
0d83e7
 };
0d83e7
@@ -2841,7 +2845,9 @@ dump_config(ServerOptions *o)
0d83e7
 	    o->hostkeyalgorithms : KEX_DEFAULT_PK_ALG);
0d83e7
 	dump_cfg_string(sPubkeyAcceptedKeyTypes, o->pubkey_key_types ?
0d83e7
 	    o->pubkey_key_types : KEX_DEFAULT_PK_ALG);
0d83e7
+#if defined(__OpenBSD__)
0d83e7
 	dump_cfg_string(sRDomain, o->routing_domain);
0d83e7
+#endif
0d83e7
 
0d83e7
 	/* string arguments requiring a lookup */
0d83e7
 	dump_cfg_string(sLogLevel, log_level_name(o->log_level));
0d83e7
diff --git a/sshd_config.5 b/sshd_config.5
0d83e7
index 5dca8981..766e9b90 100644
0d83e7
--- a/sshd_config.5
0d83e7
+++ b/sshd_config.5
0d83e7
@@ -1542,6 +1542,7 @@ will be bound to this
0d83e7
 If the routing domain is set to
0d83e7
 .Cm \&%D ,
0d83e7
 then the domain in which the incoming connection was received will be applied.
0d83e7
+This feature is available on OpenBSD only.
0d83e7
 .It Cm SetEnv
0d83e7
 Specifies one or more environment variables to set in child sessions started
0d83e7
 by