homebrew-core/Formula/ptunnel.rb

33 lines
1.2 KiB
Ruby

class Ptunnel < Formula
desc "Tunnel over ICMP"
homepage "https://www.cs.uit.no/~daniels/PingTunnel/"
url "https://www.cs.uit.no/~daniels/PingTunnel/PingTunnel-0.72.tar.gz"
sha256 "b318f7aa7d88918b6269d054a7e26f04f97d8870f47bd49a76cb2c99c73407a4"
bottle do
cellar :any_skip_relocation
rebuild 1
sha256 "67bd833b70dc704ab565d526fd99044e122a4e2fcd583b083db0a5f642d46041" => :high_sierra
sha256 "048404c7b3fe3365abfc24fb623bf9548ed7e61458a00148348bbdc2f5f12f33" => :sierra
sha256 "516181dbd16539c1f8817d65637bd42cc951d551e1a3b61a4d83dc6c71dc6397" => :el_capitan
sha256 "72db3faba8fbd7c268acf22d02ae0df4dbb5dde2db8a17ca4d62b2293d0763e0" => :yosemite
sha256 "a39ae93cf1d20d9a24cf194d8b1fde7166b64276056cb084824d4291bd3f8faf" => :mavericks
end
def install
system "make", "install", "prefix=#{prefix}"
end
def caveats; <<-EOS.undent
Normally, ptunnel uses raw sockets and must be run as root (using sudo, for example).
Alternatively, you can try using the -u flag to start ptunnel in 'unprivileged' mode,
but this is not recommended. See https://www.cs.uit.no/~daniels/PingTunnel/ for details.
EOS
end
test do
assert_match "v #{version}", shell_output("#{bin}/ptunnel -h", 1)
end
end