FreeBSD Bugzilla – Attachment 210088 Details for
Bug 242750
[NEW PORT] sysutils/py-pypsexec: Run commands on a remote Windows host using SMB/RPC
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
pypsexec
py-pypsexec.patch (text/plain), 1.98 KB, created by
Ivan Rozhuk
on 2019-12-21 00:20:51 UTC
(
hide
)
Description:
pypsexec
Filename:
MIME Type:
Creator:
Ivan Rozhuk
Created:
2019-12-21 00:20:51 UTC
Size:
1.98 KB
patch
obsolete
>Index: sysutils/py-pypsexec/Makefile >=================================================================== >--- sysutils/py-pypsexec/Makefile (nonexistent) >+++ sysutils/py-pypsexec/Makefile (working copy) >@@ -0,0 +1,22 @@ >+# $FreeBSD$ >+ >+PORTNAME= pypsexec >+PORTVERSION= 0.1.0 >+CATEGORIES= sysutils python >+MASTER_SITES= CHEESESHOP >+PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX} >+ >+MAINTAINER= rozhuk.im@gmail.com >+COMMENT= Run commands on a remote Windows host using SMB/RPC >+ >+LICENSE= MIT >+ >+RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}smbprotocol>=0:net/py-smbprotocol@${PY_FLAVOR} \ >+ ${PYTHON_PKGNAMEPREFIX}six>0:devel/py-six@${PY_FLAVOR} >+ >+USES= python >+USE_PYTHON= autoplist concurrent distutils >+ >+NO_ARCH= yes >+ >+.include <bsd.port.mk> >Index: sysutils/py-pypsexec/distinfo >=================================================================== >--- sysutils/py-pypsexec/distinfo (nonexistent) >+++ sysutils/py-pypsexec/distinfo (working copy) >@@ -0,0 +1,3 @@ >+TIMESTAMP = 1574433126 >+SHA256 (pypsexec-0.1.0.tar.gz) = 0d4c54dfba4082ccd2ebb56c7ea7368b2cd533e2722838af0bf7fc9d7afa785d >+SIZE (pypsexec-0.1.0.tar.gz) = 156994 >Index: sysutils/py-pypsexec/pkg-descr >=================================================================== >--- sysutils/py-pypsexec/pkg-descr (nonexistent) >+++ sysutils/py-pypsexec/pkg-descr (working copy) >@@ -0,0 +1,14 @@ >+This library can run commands on a remote Windows host through Python. >+This means that it can be run on any host with Python and does not >+require any binaries to be present or a specific OS. It uses SMB/RPC to >+executable commands in a similar fashion to the popular PsExec tool. >+More details on this tool can be read on this blog post. >+ >+The executable wrapper that is sent to the service is based on the >+PAExec library. PAExec is an free, redistributable and open source >+equivalent to Microsoft's PsExec application. This program is stored as >+a binary in this package and is used to run the remote service and >+start the process execution. >+ >+ >+WWW: https://github.com/jborean93/pypsexec
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 242750
:
210088
|
251159