packages: sslh/sslh.spec (NEW)=?UTF-8?Q?=20?=- new

adamg adamg at pld-linux.org
Sat Feb 18 00:06:46 CET 2012


Author: adamg                        Date: Fri Feb 17 23:06:46 2012 GMT
Module: packages                      Tag: HEAD
---- Log message:
- new

---- Files affected:
packages/sslh:
   sslh.spec (NONE -> 1.1)  (NEW)

---- Diffs:

================================================================
Index: packages/sslh/sslh.spec
diff -u /dev/null packages/sslh/sslh.spec:1.1
--- /dev/null	Sat Feb 18 00:06:46 2012
+++ packages/sslh/sslh.spec	Sat Feb 18 00:06:41 2012
@@ -0,0 +1,113 @@
+# $Revision$, $Date$
+Summary:	sslh - ssl/ssh multiplexer
+Summary(pl.UTF-8):	multiplekser ssl/ssh
+Name:		sslh
+Version:	1.10
+Release:	0.1
+License:	GPL v2+
+Group:		Applications
+Source0:	http://www.rutschle.net/tech/%{name}-%{version}.tar.gz
+# Source0-md5:	bc34e9a4770d634633e70589c72708cc
+Source1:	%{name}.sysconfig
+Source2:	%{name}.init
+Source3:	%{name}.service
+Patch0:		%{name}-DESTDIR.patch
+Patch1:		%{name}-LDFLAGS.patch
+Patch2:		%{name}-pidfile.patch
+Patch3:		%{name}-man.patch
+URL:		http://www.rutschle.net/sslh.shtml
+BuildRequires:	libwrap-devel
+BuildRequires:	perl-tools-pod
+BuildRequires:	rpmbuild(macros) >= 1.644
+Requires:	systemd-units >= 38
+Requires(postun):	/usr/sbin/userdel
+Requires(postun):	/usr/sbin/groupdel
+Requires(pre):	/bin/id
+Requires(pre):	/usr/bin/getgid
+Requires(pre):	/usr/sbin/useradd
+Requires(pre):	/usr/sbin/groupadd
+Provides:	group(sslh)
+Provides:	user(sslh)
+BuildRoot:	%{tmpdir}/%{name}-%{version}-root-%(id -u -n)
+
+%description
+sslh accepts HTTPS, SSH, OpenVPN, tinc and XMPP connections on the
+same port. This makes it possible to connect to any of these servers
+on port 443 (e.g. from inside a corporate firewall, which almost never
+block port 443) while still serving HTTPS on that port.
+
+%description -l pl.UTF-8
+sslh akceptuje połączenia HTTPS, SSH, OpenVPN, tinc oraz XMPPP na tym
+samym porcie. Pozwala to na nawiązanie połączenie z którąkolwiek z
+tych usług na porcie 443 (n.p. zza firmowego firewalla, który rzadko
+kiedy blokuje połączenia na ten port) równolegle z usługami HTTPS.
+
+%prep
+%setup -q
+%patch0 -p1
+%patch1 -p1
+%patch2 -p1
+%patch3 -p1
+
+%build
+%{__make} \
+	CC="%{__cc}" \
+	CFLAGS="%{rpmcflags}" \
+	LDFLAGS="%{rpmldflags}" \
+	USELIBWRAP=1
+
+%install
+rm -rf $RPM_BUILD_ROOT
+install -d $RPM_BUILD_ROOT{/etc/{rc.d/init.d,sysconfig},%{systemdunitdir}}
+
+%{__make} install \
+	PREFIX="%{_prefix}" \
+	DESTDIR=$RPM_BUILD_ROOT
+
+install %{SOURCE1} $RPM_BUILD_ROOT/etc/sysconfig/sslh
+install %{SOURCE2} $RPM_BUILD_ROOT/etc/rc.d/init.d/sslh
+install %{SOURCE3} $RPM_BUILD_ROOT%{systemdunitdir}
+
+%clean
+rm -rf $RPM_BUILD_ROOT
+
+%pre
+%groupadd -g 277 sslh
+%useradd -u 277 -r -d /usr/share/empty -s /bin/false -c "sslh user" -g sslh sslh
+
+%post
+/sbin/chkconfig --add sslh
+%systemd_post %{name}.service
+
+%preun
+if [ "$1" = "0" ]; then
+	%service sslh stop
+	/sbin/chkconfig --del sslh
+fi
+%systemd_preun %{name}.service
+
+%postun
+if [ "$1" = "0" ]; then
+	%userremove sslh
+	%groupremove sslh
+fi
+%systemd_reload
+
+%files
+%defattr(644,root,root,755)
+%doc ChangeLog README*
+%attr(754,root,root) /etc/rc.d/init.d/sslh
+%config(noreplace) %verify(not md5 mtime size) /etc/sysconfig/sslh
+%attr(755,root,root) %{_sbindir}/*
+%{_mandir}/man8/sslh.8*
+%{systemdunitdir}/%{name}.service
+
+%define date	%(echo `LC_ALL="C" date +"%a %b %d %Y"`)
+%changelog
+* %{date} PLD Team <feedback at pld-linux.org>
+All persons listed below can be reached at <cvs_login>@pld-linux.org
+
+$Log$
+Revision 1.1  2012/02/17 23:06:41  adamg
+- new
+
================================================================


More information about the pld-cvs-commit mailing list