Blame SOURCES/0015-curl-7.76.1-tests-openssh.patch

372e18
From 85a8c0e9992cee271145ecf009f60b9bee9b7a60 Mon Sep 17 00:00:00 2001
372e18
From: Kamil Dudka <kdudka@redhat.com>
372e18
Date: Wed, 15 Sep 2021 09:59:14 +0200
372e18
Subject: [PATCH] tests/sshserver.pl: make it work with openssh-8.7p1
372e18
372e18
... by not using options with no argument where an argument is required:
372e18
372e18
=== Start of file tests/log/ssh_server.log
372e18
curl_sshd_config line 6: no argument after keyword "DenyGroups"
372e18
curl_sshd_config line 7: no argument after keyword "AllowGroups"
372e18
curl_sshd_config line 10: Deprecated option AuthorizedKeysFile2
372e18
curl_sshd_config line 29: Deprecated option KeyRegenerationInterval
372e18
curl_sshd_config line 39: Deprecated option RhostsRSAAuthentication
372e18
curl_sshd_config line 40: Deprecated option RSAAuthentication
372e18
curl_sshd_config line 41: Deprecated option ServerKeyBits
372e18
curl_sshd_config line 45: Deprecated option UseLogin
372e18
curl_sshd_config line 56: no argument after keyword "AcceptEnv"
372e18
curl_sshd_config: terminating, 3 bad configuration options
372e18
=== End of file tests/log/ssh_server.log
372e18
372e18
=== Start of file log/sftp_server.log
372e18
curl_sftp_config line 33: Unsupported option "rhostsrsaauthentication"
372e18
curl_sftp_config line 34: Unsupported option "rsaauthentication"
372e18
curl_sftp_config line 52: no argument after keyword "sendenv"
372e18
curl_sftp_config: terminating, 1 bad configuration options
372e18
Connection closed.
372e18
Connection closed
372e18
=== End of file log/sftp_server.log
372e18
372e18
Closes #7724
372e18
372e18
Upstream-commit: ab78d2c679dfb37b27e89f42ad050c3153fa7513
372e18
Signed-off-by: Kamil Dudka <kdudka@redhat.com>
372e18
---
372e18
 tests/sshserver.pl | 14 --------------
372e18
 1 file changed, 14 deletions(-)
372e18
372e18
diff --git a/tests/sshserver.pl b/tests/sshserver.pl
372e18
index 9441939..2afaace 100644
372e18
--- a/tests/sshserver.pl
372e18
+++ b/tests/sshserver.pl
372e18
@@ -428,9 +428,7 @@ if ($sshdid =~ /OpenSSH-Windows/) {
372e18
 #  ssh daemon configuration file options we might use and version support
372e18
 #
372e18
 #  AFSTokenPassing                  : OpenSSH 1.2.1 and later [1]
372e18
-#  AcceptEnv                        : OpenSSH 3.9.0 and later
372e18
 #  AddressFamily                    : OpenSSH 4.0.0 and later
372e18
-#  AllowGroups                      : OpenSSH 1.2.1 and later
372e18
 #  AllowTcpForwarding               : OpenSSH 2.3.0 and later
372e18
 #  AllowUsers                       : OpenSSH 1.2.1 and later
372e18
 #  AuthorizedKeysFile               : OpenSSH 2.9.9 and later
372e18
@@ -441,7 +439,6 @@ if ($sshdid =~ /OpenSSH-Windows/) {
372e18
 #  ClientAliveCountMax              : OpenSSH 2.9.0 and later
372e18
 #  ClientAliveInterval              : OpenSSH 2.9.0 and later
372e18
 #  Compression                      : OpenSSH 3.3.0 and later
372e18
-#  DenyGroups                       : OpenSSH 1.2.1 and later
372e18
 #  DenyUsers                        : OpenSSH 1.2.1 and later
372e18
 #  ForceCommand                     : OpenSSH 4.4.0 and later [3]
372e18
 #  GatewayPorts                     : OpenSSH 2.1.0 and later
372e18
@@ -534,9 +531,6 @@ if ($sshdid =~ /OpenSSH-Windows/) {
372e18
     push @cfgarr, "AllowUsers $username";
372e18
 }
372e18
 
372e18
-push @cfgarr, 'DenyGroups';
372e18
-push @cfgarr, 'AllowGroups';
372e18
-push @cfgarr, '#';
372e18
 push @cfgarr, "AuthorizedKeysFile $clipubkeyf_config";
372e18
 push @cfgarr, "AuthorizedKeysFile2 $clipubkeyf_config";
372e18
 push @cfgarr, "HostKey $hstprvkeyf_config";
372e18
@@ -684,9 +678,6 @@ push @cfgarr, '#';
372e18
 #***************************************************************************
372e18
 # Options that might be supported or not in sshd OpenSSH 2.9.9 and later
372e18
 #
372e18
-if(sshd_supports_opt('AcceptEnv','')) {
372e18
-    push @cfgarr, 'AcceptEnv';
372e18
-}
372e18
 if(sshd_supports_opt('AddressFamily','any')) {
372e18
     # Address family must be specified before ListenAddress
372e18
     splice @cfgarr, 14, 0, 'AddressFamily any';
372e18
@@ -873,7 +864,6 @@ if ($sshdid =~ /OpenSSH-Windows/) {
372e18
 #  RemoteForward                     : OpenSSH 1.2.1 and later [3]
372e18
 #  RhostsRSAAuthentication           : OpenSSH 1.2.1 and later
372e18
 #  RSAAuthentication                 : OpenSSH 1.2.1 and later
372e18
-#  SendEnv                           : OpenSSH 3.9.0 and later
372e18
 #  ServerAliveCountMax               : OpenSSH 3.8.0 and later
372e18
 #  ServerAliveInterval               : OpenSSH 3.8.0 and later
372e18
 #  SmartcardDevice                   : OpenSSH 2.9.9 and later [1][3]
372e18
@@ -1028,10 +1018,6 @@ if((($sshid =~ /OpenSSH/) && ($sshvernum >= 370)) ||
372e18
     push @cfgarr, 'RekeyLimit 1G';
372e18
 }
372e18
 
372e18
-if(($sshid =~ /OpenSSH/) && ($sshvernum >= 390)) {
372e18
-    push @cfgarr, 'SendEnv';
372e18
-}
372e18
-
372e18
 if((($sshid =~ /OpenSSH/) && ($sshvernum >= 380)) ||
372e18
    (($sshid =~ /SunSSH/) && ($sshvernum >= 120))) {
372e18
     push @cfgarr, 'ServerAliveCountMax 3';
372e18
-- 
372e18
2.34.1
372e18