diff options
author | Alin Năstac <mrness@gentoo.org> | 2006-07-03 18:35:00 +0000 |
---|---|---|
committer | Alin Năstac <mrness@gentoo.org> | 2006-07-03 18:35:00 +0000 |
commit | 4e0461ba95890ef66309cadde716cf7ea02fd11d (patch) | |
tree | 3f0bebadaa2cf685eea9143f4694975ad78458ed /net-proxy | |
parent | break out built_with_use test, wrap in has_version. fixes #136402 (diff) | |
download | historical-4e0461ba95890ef66309cadde716cf7ea02fd11d.tar.gz historical-4e0461ba95890ef66309cadde716cf7ea02fd11d.tar.bz2 historical-4e0461ba95890ef66309cadde716cf7ea02fd11d.zip |
import from #138058
Package-Manager: portage-2.1-r1
Diffstat (limited to 'net-proxy')
-rw-r--r-- | net-proxy/sshproxy/ChangeLog | 11 | ||||
-rw-r--r-- | net-proxy/sshproxy/Manifest | 30 | ||||
-rw-r--r-- | net-proxy/sshproxy/files/digest-sshproxy-0.4.2 | 3 | ||||
-rw-r--r-- | net-proxy/sshproxy/files/sshproxyd.initd | 19 | ||||
-rw-r--r-- | net-proxy/sshproxy/metadata.xml | 19 | ||||
-rw-r--r-- | net-proxy/sshproxy/sshproxy-0.4.2.ebuild | 55 |
6 files changed, 137 insertions, 0 deletions
diff --git a/net-proxy/sshproxy/ChangeLog b/net-proxy/sshproxy/ChangeLog new file mode 100644 index 000000000000..73329846b103 --- /dev/null +++ b/net-proxy/sshproxy/ChangeLog @@ -0,0 +1,11 @@ +# ChangeLog for net-proxy/sshproxy +# Copyright 1999-2006 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/net-proxy/sshproxy/ChangeLog,v 1.1 2006/07/03 18:35:00 mrness Exp $ + +*sshproxy-0.4.2 (03 Jul 2006) + + 03 Jul 2006; Alin Nastac <mrness@gentoo.org> +files/sshproxyd.initd, + +metadata.xml, +sshproxy-0.4.2.ebuild: + Initial import from bug #138058, thanks to David Guerizec + <david@guerizec.net> which is also the author of sshproxy. + diff --git a/net-proxy/sshproxy/Manifest b/net-proxy/sshproxy/Manifest new file mode 100644 index 000000000000..865d7039ed36 --- /dev/null +++ b/net-proxy/sshproxy/Manifest @@ -0,0 +1,30 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + +AUX sshproxyd.initd 350 RMD160 ae9d8b2fbd8310adf94e54934413315b3ea72bab SHA1 3c31326503682b5617d21676b28b605f1c8791b8 SHA256 4500a8344d174bbe961dbe15212549104da230cc8f84f6c66b14e17ed81f42c5 +MD5 a70c2c7914d08b23e410ba5ac72303e3 files/sshproxyd.initd 350 +RMD160 ae9d8b2fbd8310adf94e54934413315b3ea72bab files/sshproxyd.initd 350 +SHA256 4500a8344d174bbe961dbe15212549104da230cc8f84f6c66b14e17ed81f42c5 files/sshproxyd.initd 350 +DIST sshproxy-0.4.2.tar.gz 50596 RMD160 2598d5bf4f3aec26c3442bddc856df888caf3041 SHA1 4c9aff679d62f228892fe8a438eb67460cefe422 SHA256 d9e362ae367a8c2925c0d56a57dcab6e48649a8a05e789b362d6d076f0e20f0c +EBUILD sshproxy-0.4.2.ebuild 1550 RMD160 4393b8e852a66e3216bf3d7b18f7b582e6e1f586 SHA1 40c137da6555f13aa19d7f2f07cb408fad80684d SHA256 19894dc6bbab17164042eec6b837686e5ad6557f1247df56c29738e6fa1c9b22 +MD5 704570d6a2ae17fe4bf6df945cfbb0f6 sshproxy-0.4.2.ebuild 1550 +RMD160 4393b8e852a66e3216bf3d7b18f7b582e6e1f586 sshproxy-0.4.2.ebuild 1550 +SHA256 19894dc6bbab17164042eec6b837686e5ad6557f1247df56c29738e6fa1c9b22 sshproxy-0.4.2.ebuild 1550 +MISC ChangeLog 474 RMD160 4380fb9ee6bfd30ae27a01b0ca545fb4a4d1172f SHA1 c11d78d0ba3380412a9e3c876386bbc4256c804b SHA256 7a3b39e8442eb10f36b2de4faa7ec576500ba685a5f1af665416992182f726b1 +MD5 72f514a1c6adf2d0398b290d29d30b1e ChangeLog 474 +RMD160 4380fb9ee6bfd30ae27a01b0ca545fb4a4d1172f ChangeLog 474 +SHA256 7a3b39e8442eb10f36b2de4faa7ec576500ba685a5f1af665416992182f726b1 ChangeLog 474 +MISC metadata.xml 1233 RMD160 a95b010856b0ba9c54eecb3726d2014e645ad60d SHA1 fe0116aa0442c685eb09901850e7d5fbcc8a0137 SHA256 5dc949731b1ef27fb9a2822f065ff1bc1e0d0126af04d7091429fb05e49a7257 +MD5 b88fa69e1a1ddb51ae0d6967893efa22 metadata.xml 1233 +RMD160 a95b010856b0ba9c54eecb3726d2014e645ad60d metadata.xml 1233 +SHA256 5dc949731b1ef27fb9a2822f065ff1bc1e0d0126af04d7091429fb05e49a7257 metadata.xml 1233 +MD5 0fbb881a770d80531fc1af962d585b32 files/digest-sshproxy-0.4.2 241 +RMD160 0f113c6cab0f6ae155576cb806b81312760e069e files/digest-sshproxy-0.4.2 241 +SHA256 d82bc45d648caace6fab4558ca89b2b484aeddf09c098a249c35b91cf09cea7b files/digest-sshproxy-0.4.2 241 +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1.4.3 (GNU/Linux) + +iD4DBQFEqWNg3sf9c6kjmR8RAifrAKCZjUyQnaOzZdPhx4RTlzH+jcQyqwCY4pd/ +lnZ1OgcGFMdhRdMbjUodcQ== +=AxXO +-----END PGP SIGNATURE----- diff --git a/net-proxy/sshproxy/files/digest-sshproxy-0.4.2 b/net-proxy/sshproxy/files/digest-sshproxy-0.4.2 new file mode 100644 index 000000000000..839f913238c8 --- /dev/null +++ b/net-proxy/sshproxy/files/digest-sshproxy-0.4.2 @@ -0,0 +1,3 @@ +MD5 fce42652f7f0cf18ee33f92512cae676 sshproxy-0.4.2.tar.gz 50596 +RMD160 2598d5bf4f3aec26c3442bddc856df888caf3041 sshproxy-0.4.2.tar.gz 50596 +SHA256 d9e362ae367a8c2925c0d56a57dcab6e48649a8a05e789b362d6d076f0e20f0c sshproxy-0.4.2.tar.gz 50596 diff --git a/net-proxy/sshproxy/files/sshproxyd.initd b/net-proxy/sshproxy/files/sshproxyd.initd new file mode 100644 index 000000000000..b1f2909b0284 --- /dev/null +++ b/net-proxy/sshproxy/files/sshproxyd.initd @@ -0,0 +1,19 @@ +#!/sbin/runscript + +depend() { + need net + use logger +} + +start() { + ebegin "Starting SSH Proxy daemon" + start-stop-daemon --start --exec /usr/bin/sshproxyd -- \ + --daemon --user sshproxy --pid /var/run/sshproxyd.pid + eend $? +} + +stop() { + ebegin "Stopping SSH Proxy daemon" + start-stop-daemon --quiet --stop --pidfile /var/run/sshproxyd.pid + eend $? +} diff --git a/net-proxy/sshproxy/metadata.xml b/net-proxy/sshproxy/metadata.xml new file mode 100644 index 000000000000..fffc04ca5c00 --- /dev/null +++ b/net-proxy/sshproxy/metadata.xml @@ -0,0 +1,19 @@ +<?xml version = '1.0' encoding = 'UTF-8'?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> + <herd>net-proxy</herd> + <longdescription> +sshproxy is a pure python implementation of an ssh proxy. It allows users to connect to remote sites without having to remember +or even know the password or key of the remote sites. There are 2 possible scenarios which could possibly interest you. + + Scenario 1: Team mode +If you're in charge of a lot of remote sites, and your company has several administrators to do some remote administration tasks, +then no user will ever need to know the password or key of the servers he administrates. When an employee quits your company, +you just have to delete his entry in the proxy database, and he will never be able to connect to the remote site. + + Scenario 2: Forwarding mode +You want to allow some people to connect through your firewall to a range of server inside your DMZ or LAN, but you don't want to +open one port for each server. What you can do is open the sshproxy port and setup the password database to proxy each +external user to it's own desktop, or create groups of users allowed to connect to your DMZ servers. +</longdescription> +</pkgmetadata> diff --git a/net-proxy/sshproxy/sshproxy-0.4.2.ebuild b/net-proxy/sshproxy/sshproxy-0.4.2.ebuild new file mode 100644 index 000000000000..4b3a9ad7bbe7 --- /dev/null +++ b/net-proxy/sshproxy/sshproxy-0.4.2.ebuild @@ -0,0 +1,55 @@ +# Copyright 1999-2006 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/net-proxy/sshproxy/sshproxy-0.4.2.ebuild,v 1.1 2006/07/03 18:35:00 mrness Exp $ + +inherit distutils + +DESCRIPTION="sshproxy is an ssh gateway to apply ACLs on ssh connections" +HOMEPAGE="http://penguin.fr/sshproxy/" +SRC_URI="http://penguin.fr/sshproxy/download/${P}.tar.gz" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="~amd64 ~x86" +IUSE="mysql" + +DEPEND=">=dev-lang/python-2.4.0 + >=dev-python/paramiko-1.6 + mysql? ( >=dev-python/mysql-python-1.2.0 )" + +pkg_setup() { + enewgroup sshproxy + enewuser sshproxy -1 -1 /var/lib/sshproxy sshproxy +} + +src_install () { + distutils_src_install + + diropts -o sshproxy -g sshproxy -m0750 + dodir /var/lib/sshproxy + keepdir /var/lib/sshproxy + + # init/conf files for sshproxy daemon + newinitd "${FILESDIR}/sshproxyd.initd" sshproxyd +} + +pkg_postinst () { + pkg_setup #for creating the user when installed from binary package + + distutils_pkg_postinst + + echo + einfo "If this is your first installation, run" + einfo " emerge --config =${CATEGORY}/${PF}" + einfo "to initialize the backend." + echo + einfo "There is no need to install sshproxy on a client machine." + einfo "You can connect to a SSH server using this proxy by running" + einfo " ssh -tp PROXY_PORT PROXY_HOST REMOTE_USER@REMOTE_HOST" +} + +pkg_config() { + HOME=/var/lib/sshproxy INITD_STARTUP="/etc/init.d/sshproxyd start" \ + chroot "${ROOT}" /usr/bin/sshproxyd --wizard + chown -R sshproxy:sshproxy "${ROOT}/var/lib/sshproxy" +} |