App-DocKnot
view release on metacpan or search on metacpan
t/data/update/remctl/docknot.yaml view on Meta::CPAN
`configure`. To change this, you will need to run `perl Makefile.PL` in
the `perl` subdirectory of the build tree with appropriate options and
rebuild the module after running `make` and before running `make install`.
To also build the remctl PECL extension for PHP, pass the `--enable-php`
option to `configure`. The PHP PECL module build is handled by the normal
PHP extension build system and therefore will be installed into your local
PHP module directory. The configure script will look for `phpize` on your
`PATH` by default; if it's in some other directory, set the `PHPIZE`
environment variable to the full path or set it on the configure command
line. The configure script for the PECL extension will be run during the
build instead of during configure. This is unfortunately apparently
unavoidable given how the PECL build system works.
To also build the Python bindings for the libremctl client library, pass
the `--enable-python` option to configure. The Python module build is
handled by the normal Python extension build system, and therefore will be
installed into your local Python module directory regardless of the
`--prefix` argument to `configure`. To change this, you will need to run
`python setup.py install` by hand in the `python` directory with whatever
options you want to use.
To also build the Ruby bindings for the libremctl client library, pass
the `--enable-ruby` option to configure. The Ruby module build is handled
by the normal Ruby module build system, and therefore will be installed
into your local Ruby module directory regardless of the `--prefix`
argument to `configure`. To change this, override the `sitedir` variable on
the `make install` command line, as in:
```
make install sitedir=/opt/ruby
```
The remctl build system also supports a few other environment variables
that can be set to control aspects of the Perl, Python, and Ruby binding
build systems. These are primarily only of use when packaging the
software. For more information, a list of the variables, and their
effects, see the comment at the start of `Makefile.am`.
The Java client and server aren't integrated with the regular build
system. For information on building and installing them, see
`java/README`.
remctl will use pkg-config if it's available to find the build flags for
libevent. You can control which pkg-config binary and paths are used with
the normal pkg-config environment variables of `PKG_CONFIG`,
`PKG_CONFIG_PATH`, and `PKG_CONFIG_LIBDIR`, and you can override the
pkg-config results with `LIBEVENT_CFLAGS` and `LIBEVENT_LIBS`.
Alternately, you can bypass pkg-config by passing one or more of
`--with-libevent`, `--with-libevent-include`, and `--with-libevent-lib` to
indicate the install prefix, include directory, or library directory.
remctl will automatically build with PCRE support if pcre-config or the
PCRE library are found. You can pass `--with-pcre` to configure to
specify the root directory where PCRE is installed, or set the include and
library directories separately with `--with-pcre-include` and
`--with-pcre-lib`. You can also set `PCRE_CONFIG` to point to a different
pcre-config script, or do similar things as with `PATH_KRB5_CONFIG`
described below.
remctl will automatically build with GPUT support if the GPUT header and
library are found. You can pass `--with-gput` to configure to specify the
root directory where GPUT is installed, or set the include and library
directories separately with `--with-gput-include` and `--with-gput-lib`.
reduced_depends: true
type: Autoconf
copyrights:
- holder: Russ Allbery <eagle@eyrie.org>
years: 2015-2016, 2018
- holder: The Board of Trustees of the Leland Stanford Junior University
years: 2002-2014
description: |
remctl is a client/server application that supports remote execution of
specific commands, using Kerberos GSS-API for authentication and
confidentiality. The commands a given user can execute are controlled by
a configuration file and ACL files and can easily be tightly limited,
unlike with rsh. The mapping of command to backend program is done by the
configuration file, which allows some additional flexibility compared to
ssh command restrictions and works with Kerberos authentications rather
than being limited to public key authentications.
remctld is very similar to a CGI server that uses a different network
protocol than HTTP, always does strong authentication before executing the
desired command, and guarantees the data is encrypted on the network.
Alternately, you can think of it as a very simple combination of Kerberos
ssh and sudo, without most of the features of both but with simpler
authorization.
There are a lot of different client/server systems that do something
similar, including regular rsh, CGI, IBM's sysctl (not to be confused with
the Linux kernel call and configuration file of the same name), CERN's
arc, and more elaborate systems like MIT's Moira. remctl has the
advantage over many of these schemes of using GSS-API and being about as
simple as it possibly can be while still being useful. It doesn't require
any particular programming language, builds self-contained binaries, and
uses as minimal of a protocol as possible.
Both C and Java clients and servers are provided, as well as Perl, PHP,
and Python bindings for the C client library. For more information about
the Java client, see `java/README`. For more information about the PHP
bindings, see `php/README`. For more information about the Python
bindings, see `python/README`.
Also included in the remctl package is an alternate way of running the
remctl server: remctl-shell. This program is designed to be run as either
a shell or a forced command under ssh, using ssh for authentication and
communicating the authentication information to remctl-shell via either
environment variables or command-line arguments via the forced command
configuration. This version of the server uses simple ssh clients, rather
than using the remctl client program or libraries.
remctl was originally written by Anton Ushakov as a replacement for IBM's
sysctl, a client/server application with Kerberos v4 authentication that
allowed the client to run Tcl code on the server, protected by ACLs. At
Stanford, we used sysctl extensively, but mostly only to run external
programs, so remctl was developed as a Kerberos v5 equivalent that did
only the portions we needed.
Complete protocol documentation is available in `docs/protocol.html`.
Also present, as `docs/design.html`, is the original design document (now
somewhat out of date).
distribution:
packaging:
( run in 0.639 second using v1.01-cache-2.11-cpan-39bf76dae61 )