From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id A13301382F6 for ; Fri, 8 Jul 2016 11:45:23 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id D20B1E0A40; Fri, 8 Jul 2016 11:45:22 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [140.211.166.183]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 6AFDCE0A40 for ; Fri, 8 Jul 2016 11:45:22 +0000 (UTC) Received: from oystercatcher.gentoo.org (unknown [IPv6:2a01:4f8:202:4333:225:90ff:fed9:fc84]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 681C3340E05 for ; Fri, 8 Jul 2016 11:45:21 +0000 (UTC) Received: from localhost.localdomain (localhost [127.0.0.1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id DC11C2424 for ; Fri, 8 Jul 2016 11:45:19 +0000 (UTC) From: "Jason Donenfeld" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Jason Donenfeld" Message-ID: <1467978331.0de9d67cd669435f7e1626d9b5a793958c4b97ec.zx2c4@gentoo> Subject: [gentoo-commits] repo/gentoo:master commit in: net-misc/wireguard/ X-VCS-Repository: repo/gentoo X-VCS-Files: net-misc/wireguard/wireguard-0.0.20160708.ebuild net-misc/wireguard/wireguard-9999.ebuild X-VCS-Directories: net-misc/wireguard/ X-VCS-Committer: zx2c4 X-VCS-Committer-Name: Jason Donenfeld X-VCS-Revision: 0de9d67cd669435f7e1626d9b5a793958c4b97ec X-VCS-Branch: master Date: Fri, 8 Jul 2016 11:45:19 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: c01ab324-7f66-4a7a-9283-4e4f2039a4b7 X-Archives-Hash: 639bb9ff17ee22b2cfba36712b3c3088 commit: 0de9d67cd669435f7e1626d9b5a793958c4b97ec Author: Jason A. Donenfeld gentoo org> AuthorDate: Fri Jul 8 11:44:30 2016 +0000 Commit: Jason Donenfeld gentoo org> CommitDate: Fri Jul 8 11:45:31 2016 +0000 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=0de9d67c net-misc/wireguard: add client.sh instructions Package-Manager: portage-2.3.0 net-misc/wireguard/wireguard-0.0.20160708.ebuild | 22 +++++++++++++++++++++- net-misc/wireguard/wireguard-9999.ebuild | 22 +++++++++++++++++++++- 2 files changed, 42 insertions(+), 2 deletions(-) diff --git a/net-misc/wireguard/wireguard-0.0.20160708.ebuild b/net-misc/wireguard/wireguard-0.0.20160708.ebuild index 671d4bb..f1bef43 100644 --- a/net-misc/wireguard/wireguard-0.0.20160708.ebuild +++ b/net-misc/wireguard/wireguard-0.0.20160708.ebuild @@ -51,7 +51,6 @@ src_compile() { src_install() { dodoc README.md - docompress -x /usr/share/doc/${PF}/examples dodoc -r contrib/examples linux-mod_src_install emake DESTDIR="${D}" PREFIX="${EPREFIX}/usr" -C src/tools install @@ -66,4 +65,25 @@ pkg_postinst() { ewarn ewarn " team@wireguard.io security@wireguard.io" ewarn + + einfo + einfo "After installing WireGuard, if you'd like to try sending some packets through" + einfo "WireGuard, you may use, for testing purposes only, the insecure client.sh" + einfo "test example script:" + einfo + einfo " \$ bzcat /usr/share/doc/${PF}/examples/ncat-client-server/client.sh.bz2 | sudo bash -" + einfo + einfo "This will automatically setup interface wg0, through a very insecure transport" + einfo "that is only suitable for demonstration purposes. You can then try loading the" + einfo "hidden website or sending pings:" + einfo + einfo " \$ chromium http://192.168.4.1" + einfo " \$ ping 192.168.4.1" + einfo + einfo "If you'd like to redirect your internet traffic, you can run it with the" + einfo "\"default-route\" argument. You may not use this server for any abusive or illegal" + einfo "purposes. It is for quick testing only." + einfo + einfo "More info on getting started can be found at: https://www.wireguard.io/quickstart/" + einfo } diff --git a/net-misc/wireguard/wireguard-9999.ebuild b/net-misc/wireguard/wireguard-9999.ebuild index 671d4bb..f1bef43 100644 --- a/net-misc/wireguard/wireguard-9999.ebuild +++ b/net-misc/wireguard/wireguard-9999.ebuild @@ -51,7 +51,6 @@ src_compile() { src_install() { dodoc README.md - docompress -x /usr/share/doc/${PF}/examples dodoc -r contrib/examples linux-mod_src_install emake DESTDIR="${D}" PREFIX="${EPREFIX}/usr" -C src/tools install @@ -66,4 +65,25 @@ pkg_postinst() { ewarn ewarn " team@wireguard.io security@wireguard.io" ewarn + + einfo + einfo "After installing WireGuard, if you'd like to try sending some packets through" + einfo "WireGuard, you may use, for testing purposes only, the insecure client.sh" + einfo "test example script:" + einfo + einfo " \$ bzcat /usr/share/doc/${PF}/examples/ncat-client-server/client.sh.bz2 | sudo bash -" + einfo + einfo "This will automatically setup interface wg0, through a very insecure transport" + einfo "that is only suitable for demonstration purposes. You can then try loading the" + einfo "hidden website or sending pings:" + einfo + einfo " \$ chromium http://192.168.4.1" + einfo " \$ ping 192.168.4.1" + einfo + einfo "If you'd like to redirect your internet traffic, you can run it with the" + einfo "\"default-route\" argument. You may not use this server for any abusive or illegal" + einfo "purposes. It is for quick testing only." + einfo + einfo "More info on getting started can be found at: https://www.wireguard.io/quickstart/" + einfo }