summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAlin Năstac <mrness@gentoo.org>2006-07-03 18:35:00 +0000
committerAlin Năstac <mrness@gentoo.org>2006-07-03 18:35:00 +0000
commit4e0461ba95890ef66309cadde716cf7ea02fd11d (patch)
tree3f0bebadaa2cf685eea9143f4694975ad78458ed /net-proxy
parentbreak out built_with_use test, wrap in has_version. fixes #136402 (diff)
downloadhistorical-4e0461ba95890ef66309cadde716cf7ea02fd11d.tar.gz
historical-4e0461ba95890ef66309cadde716cf7ea02fd11d.tar.bz2
historical-4e0461ba95890ef66309cadde716cf7ea02fd11d.zip
import from #138058
Package-Manager: portage-2.1-r1
Diffstat (limited to 'net-proxy')
-rw-r--r--net-proxy/sshproxy/ChangeLog11
-rw-r--r--net-proxy/sshproxy/Manifest30
-rw-r--r--net-proxy/sshproxy/files/digest-sshproxy-0.4.23
-rw-r--r--net-proxy/sshproxy/files/sshproxyd.initd19
-rw-r--r--net-proxy/sshproxy/metadata.xml19
-rw-r--r--net-proxy/sshproxy/sshproxy-0.4.2.ebuild55
6 files changed, 137 insertions, 0 deletions
diff --git a/net-proxy/sshproxy/ChangeLog b/net-proxy/sshproxy/ChangeLog
new file mode 100644
index 000000000000..73329846b103
--- /dev/null
+++ b/net-proxy/sshproxy/ChangeLog
@@ -0,0 +1,11 @@
+# ChangeLog for net-proxy/sshproxy
+# Copyright 1999-2006 Gentoo Foundation; Distributed under the GPL v2
+# $Header: /var/cvsroot/gentoo-x86/net-proxy/sshproxy/ChangeLog,v 1.1 2006/07/03 18:35:00 mrness Exp $
+
+*sshproxy-0.4.2 (03 Jul 2006)
+
+ 03 Jul 2006; Alin Nastac <mrness@gentoo.org> +files/sshproxyd.initd,
+ +metadata.xml, +sshproxy-0.4.2.ebuild:
+ Initial import from bug #138058, thanks to David Guerizec
+ <david@guerizec.net> which is also the author of sshproxy.
+
diff --git a/net-proxy/sshproxy/Manifest b/net-proxy/sshproxy/Manifest
new file mode 100644
index 000000000000..865d7039ed36
--- /dev/null
+++ b/net-proxy/sshproxy/Manifest
@@ -0,0 +1,30 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA1
+
+AUX sshproxyd.initd 350 RMD160 ae9d8b2fbd8310adf94e54934413315b3ea72bab SHA1 3c31326503682b5617d21676b28b605f1c8791b8 SHA256 4500a8344d174bbe961dbe15212549104da230cc8f84f6c66b14e17ed81f42c5
+MD5 a70c2c7914d08b23e410ba5ac72303e3 files/sshproxyd.initd 350
+RMD160 ae9d8b2fbd8310adf94e54934413315b3ea72bab files/sshproxyd.initd 350
+SHA256 4500a8344d174bbe961dbe15212549104da230cc8f84f6c66b14e17ed81f42c5 files/sshproxyd.initd 350
+DIST sshproxy-0.4.2.tar.gz 50596 RMD160 2598d5bf4f3aec26c3442bddc856df888caf3041 SHA1 4c9aff679d62f228892fe8a438eb67460cefe422 SHA256 d9e362ae367a8c2925c0d56a57dcab6e48649a8a05e789b362d6d076f0e20f0c
+EBUILD sshproxy-0.4.2.ebuild 1550 RMD160 4393b8e852a66e3216bf3d7b18f7b582e6e1f586 SHA1 40c137da6555f13aa19d7f2f07cb408fad80684d SHA256 19894dc6bbab17164042eec6b837686e5ad6557f1247df56c29738e6fa1c9b22
+MD5 704570d6a2ae17fe4bf6df945cfbb0f6 sshproxy-0.4.2.ebuild 1550
+RMD160 4393b8e852a66e3216bf3d7b18f7b582e6e1f586 sshproxy-0.4.2.ebuild 1550
+SHA256 19894dc6bbab17164042eec6b837686e5ad6557f1247df56c29738e6fa1c9b22 sshproxy-0.4.2.ebuild 1550
+MISC ChangeLog 474 RMD160 4380fb9ee6bfd30ae27a01b0ca545fb4a4d1172f SHA1 c11d78d0ba3380412a9e3c876386bbc4256c804b SHA256 7a3b39e8442eb10f36b2de4faa7ec576500ba685a5f1af665416992182f726b1
+MD5 72f514a1c6adf2d0398b290d29d30b1e ChangeLog 474
+RMD160 4380fb9ee6bfd30ae27a01b0ca545fb4a4d1172f ChangeLog 474
+SHA256 7a3b39e8442eb10f36b2de4faa7ec576500ba685a5f1af665416992182f726b1 ChangeLog 474
+MISC metadata.xml 1233 RMD160 a95b010856b0ba9c54eecb3726d2014e645ad60d SHA1 fe0116aa0442c685eb09901850e7d5fbcc8a0137 SHA256 5dc949731b1ef27fb9a2822f065ff1bc1e0d0126af04d7091429fb05e49a7257
+MD5 b88fa69e1a1ddb51ae0d6967893efa22 metadata.xml 1233
+RMD160 a95b010856b0ba9c54eecb3726d2014e645ad60d metadata.xml 1233
+SHA256 5dc949731b1ef27fb9a2822f065ff1bc1e0d0126af04d7091429fb05e49a7257 metadata.xml 1233
+MD5 0fbb881a770d80531fc1af962d585b32 files/digest-sshproxy-0.4.2 241
+RMD160 0f113c6cab0f6ae155576cb806b81312760e069e files/digest-sshproxy-0.4.2 241
+SHA256 d82bc45d648caace6fab4558ca89b2b484aeddf09c098a249c35b91cf09cea7b files/digest-sshproxy-0.4.2 241
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v1.4.3 (GNU/Linux)
+
+iD4DBQFEqWNg3sf9c6kjmR8RAifrAKCZjUyQnaOzZdPhx4RTlzH+jcQyqwCY4pd/
+lnZ1OgcGFMdhRdMbjUodcQ==
+=AxXO
+-----END PGP SIGNATURE-----
diff --git a/net-proxy/sshproxy/files/digest-sshproxy-0.4.2 b/net-proxy/sshproxy/files/digest-sshproxy-0.4.2
new file mode 100644
index 000000000000..839f913238c8
--- /dev/null
+++ b/net-proxy/sshproxy/files/digest-sshproxy-0.4.2
@@ -0,0 +1,3 @@
+MD5 fce42652f7f0cf18ee33f92512cae676 sshproxy-0.4.2.tar.gz 50596
+RMD160 2598d5bf4f3aec26c3442bddc856df888caf3041 sshproxy-0.4.2.tar.gz 50596
+SHA256 d9e362ae367a8c2925c0d56a57dcab6e48649a8a05e789b362d6d076f0e20f0c sshproxy-0.4.2.tar.gz 50596
diff --git a/net-proxy/sshproxy/files/sshproxyd.initd b/net-proxy/sshproxy/files/sshproxyd.initd
new file mode 100644
index 000000000000..b1f2909b0284
--- /dev/null
+++ b/net-proxy/sshproxy/files/sshproxyd.initd
@@ -0,0 +1,19 @@
+#!/sbin/runscript
+
+depend() {
+ need net
+ use logger
+}
+
+start() {
+ ebegin "Starting SSH Proxy daemon"
+ start-stop-daemon --start --exec /usr/bin/sshproxyd -- \
+ --daemon --user sshproxy --pid /var/run/sshproxyd.pid
+ eend $?
+}
+
+stop() {
+ ebegin "Stopping SSH Proxy daemon"
+ start-stop-daemon --quiet --stop --pidfile /var/run/sshproxyd.pid
+ eend $?
+}
diff --git a/net-proxy/sshproxy/metadata.xml b/net-proxy/sshproxy/metadata.xml
new file mode 100644
index 000000000000..fffc04ca5c00
--- /dev/null
+++ b/net-proxy/sshproxy/metadata.xml
@@ -0,0 +1,19 @@
+<?xml version = '1.0' encoding = 'UTF-8'?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+ <herd>net-proxy</herd>
+ <longdescription>
+sshproxy is a pure python implementation of an ssh proxy. It allows users to connect to remote sites without having to remember
+or even know the password or key of the remote sites. There are 2 possible scenarios which could possibly interest you.
+
+ Scenario 1: Team mode
+If you're in charge of a lot of remote sites, and your company has several administrators to do some remote administration tasks,
+then no user will ever need to know the password or key of the servers he administrates. When an employee quits your company,
+you just have to delete his entry in the proxy database, and he will never be able to connect to the remote site.
+
+ Scenario 2: Forwarding mode
+You want to allow some people to connect through your firewall to a range of server inside your DMZ or LAN, but you don't want to
+open one port for each server. What you can do is open the sshproxy port and setup the password database to proxy each
+external user to it's own desktop, or create groups of users allowed to connect to your DMZ servers.
+</longdescription>
+</pkgmetadata>
diff --git a/net-proxy/sshproxy/sshproxy-0.4.2.ebuild b/net-proxy/sshproxy/sshproxy-0.4.2.ebuild
new file mode 100644
index 000000000000..4b3a9ad7bbe7
--- /dev/null
+++ b/net-proxy/sshproxy/sshproxy-0.4.2.ebuild
@@ -0,0 +1,55 @@
+# Copyright 1999-2006 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/net-proxy/sshproxy/sshproxy-0.4.2.ebuild,v 1.1 2006/07/03 18:35:00 mrness Exp $
+
+inherit distutils
+
+DESCRIPTION="sshproxy is an ssh gateway to apply ACLs on ssh connections"
+HOMEPAGE="http://penguin.fr/sshproxy/"
+SRC_URI="http://penguin.fr/sshproxy/download/${P}.tar.gz"
+
+LICENSE="GPL-2"
+SLOT="0"
+KEYWORDS="~amd64 ~x86"
+IUSE="mysql"
+
+DEPEND=">=dev-lang/python-2.4.0
+ >=dev-python/paramiko-1.6
+ mysql? ( >=dev-python/mysql-python-1.2.0 )"
+
+pkg_setup() {
+ enewgroup sshproxy
+ enewuser sshproxy -1 -1 /var/lib/sshproxy sshproxy
+}
+
+src_install () {
+ distutils_src_install
+
+ diropts -o sshproxy -g sshproxy -m0750
+ dodir /var/lib/sshproxy
+ keepdir /var/lib/sshproxy
+
+ # init/conf files for sshproxy daemon
+ newinitd "${FILESDIR}/sshproxyd.initd" sshproxyd
+}
+
+pkg_postinst () {
+ pkg_setup #for creating the user when installed from binary package
+
+ distutils_pkg_postinst
+
+ echo
+ einfo "If this is your first installation, run"
+ einfo " emerge --config =${CATEGORY}/${PF}"
+ einfo "to initialize the backend."
+ echo
+ einfo "There is no need to install sshproxy on a client machine."
+ einfo "You can connect to a SSH server using this proxy by running"
+ einfo " ssh -tp PROXY_PORT PROXY_HOST REMOTE_USER@REMOTE_HOST"
+}
+
+pkg_config() {
+ HOME=/var/lib/sshproxy INITD_STARTUP="/etc/init.d/sshproxyd start" \
+ chroot "${ROOT}" /usr/bin/sshproxyd --wizard
+ chown -R sshproxy:sshproxy "${ROOT}/var/lib/sshproxy"
+}