View | Details | Raw Unified | Return to bug 242750
Collapse All | Expand All

(-)sysutils/py-pypsexec/Makefile (+22 lines)
Line 0 Link Here
1
# $FreeBSD$
2
3
PORTNAME=	pypsexec
4
PORTVERSION=	0.1.0
5
CATEGORIES=	sysutils python
6
MASTER_SITES=	CHEESESHOP
7
PKGNAMEPREFIX=	${PYTHON_PKGNAMEPREFIX}
8
9
MAINTAINER=	rozhuk.im@gmail.com
10
COMMENT=	Run commands on a remote Windows host using SMB/RPC
11
12
LICENSE=	MIT
13
14
RUN_DEPENDS=	${PYTHON_PKGNAMEPREFIX}smbprotocol>=0:net/py-smbprotocol@${PY_FLAVOR} \
15
		${PYTHON_PKGNAMEPREFIX}six>0:devel/py-six@${PY_FLAVOR}
16
17
USES=		python
18
USE_PYTHON=	autoplist concurrent distutils
19
20
NO_ARCH=	yes
21
22
.include <bsd.port.mk>
(-)sysutils/py-pypsexec/distinfo (+3 lines)
Line 0 Link Here
1
TIMESTAMP = 1574433126
2
SHA256 (pypsexec-0.1.0.tar.gz) = 0d4c54dfba4082ccd2ebb56c7ea7368b2cd533e2722838af0bf7fc9d7afa785d
3
SIZE (pypsexec-0.1.0.tar.gz) = 156994
(-)sysutils/py-pypsexec/pkg-descr (+14 lines)
Line 0 Link Here
1
This library can run commands on a remote Windows host through Python.
2
This means that it can be run on any host with Python and does not
3
require any binaries to be present or a specific OS. It uses SMB/RPC to
4
executable commands in a similar fashion to the popular PsExec tool.
5
More details on this tool can be read on this blog post.
6
7
The executable wrapper that is sent to the service is based on the
8
PAExec library. PAExec is an free, redistributable and open source
9
equivalent to Microsoft's PsExec application. This program is stored as
10
a binary in this package and is used to run the remote service and
11
start the process execution.
12
13
14
WWW: https://github.com/jborean93/pypsexec

Return to bug 242750