
This adds SPDX license headers in place of the wide assortment of things currently in our script headers. We default to GPL-2.0-only except for the oeqa code where it was clearly submitted and marked as MIT on the most part or some scripts which had the "or later" GPL versioning. The patch also drops other obsolete bits of file headers where they were encoountered such as editor modelines, obsolete maintainer information or the phrase "All rights reserved" which is now obsolete and not required in copyright headers (in this case its actually confusing for licensing as all rights were not reserved). More work is needed for OE-Core but this takes care of the bulk of the scripts and meta/lib directories. The top level LICENSE files are tweaked to match the new structure and the SPDX naming. (From OE-Core rev: f8c9c511b5f1b7dbd45b77f345cb6c048ae6763e) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
4.4 KiB
Executable File
#!/bin/bash
oe-git-proxy is a simple tool to be via GIT_PROXY_COMMAND. It uses socat
to make SOCKS5 or HTTPS proxy connections.
It uses ALL_PROXY or all_proxy or http_proxy to determine the proxy server,
protocol, and port.
It uses NO_PROXY to skip using the proxy for a comma delimited list of
hosts, host globs (*.example.com), IPs, or CIDR masks (192.168.1.0/24). It
is known to work with both bash and dash shells.
Example ALL_PROXY values:
ALL_PROXY=socks://socks.example.com:1080
ALL_PROXY=https://proxy.example.com:8080
Copyright (c) 2013, Intel Corporation.
SPDX-License-Identifier: GPL-2.0-only
AUTHORS
Darren Hart dvhart@linux.intel.com
if [ $# -lt 2 -o "$1" = '--help' -o "$1" = '-h' ] ; then echo 'oe-git-proxy: error: the following arguments are required: host port' echo 'Usage: oe-git-proxy host port' echo '' echo 'OpenEmbedded git-proxy - a simple tool to be used via GIT_PROXY_COMMAND.' echo 'It uses socat to make SOCKS or HTTPS proxy connections.' echo 'It uses ALL_PROXY to determine the proxy server, protocol, and port.' echo 'It uses NO_PROXY to skip using the proxy for a comma delimited list' echo 'of hosts, host globs (*.example.com), IPs, or CIDR masks (192.168.1.0/24).' echo 'It is known to work with both bash and dash shells.runs native tools' echo '' echo 'arguments:' echo ' host proxy host to use' echo ' port proxy port to use' echo '' echo 'options:' echo ' -h, --help show this help message and exit' echo '' exit 2 fi
Locate the netcat binary
SOCAT=$(which socat 2>/dev/null) if [ $? -ne 0 ]; then echo "ERROR: socat binary not in PATH" 1>&2 exit 1 fi METHOD=""
Test for a valid IPV4 quad with optional bitmask
valid_ipv4() { echo $1 | egrep -q "^([1-9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])(.([0-9]|[1-9][0-9]|1[0-9][0-9]|2[0-4][0-9]|25[0-5])){3}(/(3[0-2]|[1-2]?[0-9]))?$" return $? }
Convert an IPV4 address into a 32bit integer
ipv4_val() { IP="$1" SHIFT=24 VAL=0 for B in ${IP//./ }; do VAL=$(($VAL+$(($B<<$SHIFT)))) SHIFT=$(($SHIFT-8)) done echo "$VAL" }
Determine if two IPs are equivalent, or if the CIDR contains the IP
match_ipv4() { CIDR=$1 IP=$2
if [ -z "${IP%%$CIDR}" ]; then
return 0
fi
# Determine the mask bitlength
BITS=${CIDR##*/}
[ "$BITS" != "$CIDR" ] || BITS=32
if [ -z "$BITS" ]; then
return 1
fi
IPVAL=$(ipv4_val $IP)
IP2VAL=$(ipv4_val ${CIDR%%/*})
# OR in the unmasked bits
for i in $(seq 0 $((32-$BITS))); do
IP2VAL=$(($IP2VAL|$((1<<$i))))
IPVAL=$(($IPVAL|$((1<<$i))))
done
if [ $IPVAL -eq $IP2VAL ]; then
return 0
fi
return 1
}
Test to see if GLOB matches HOST
match_host() { HOST=$1 GLOB=$2
if [ -z "${HOST%%$GLOB}" ]; then
return 0
fi
# Match by netmask
if valid_ipv4 $GLOB; then
for HOST_IP in $(getent ahostsv4 $HOST | grep ' STREAM ' | cut -d ' ' -f 1) ; do
if valid_ipv4 $HOST_IP; then
match_ipv4 $GLOB $HOST_IP
if [ $? -eq 0 ]; then
return 0
fi
fi
done
fi
return 1
}
If no proxy is set or needed, just connect directly
METHOD="TCP:$1:$2"
[ -z "${ALL_PROXY}" ] && ALL_PROXY=$all_proxy [ -z "${ALL_PROXY}" ] && ALL_PROXY=$http_proxy
if [ -z "$ALL_PROXY" ]; then exec $SOCAT STDIO $METHOD fi
Connect directly to hosts in NO_PROXY
for H in "${NO_PROXY//,/ }"; do if match_host $1 "$H"; then exec $SOCAT STDIO $METHOD fi done
Proxy is necessary, determine protocol, server, and port
extract protocol
PROTO=${ALL_PROXY%://*}
strip protocol:// from string
ALL_PROXY=${ALL_PROXY#*://}
extract host & port parts:
1) drop username/password
PROXY=${ALL_PROXY##*@}
2) remove optional trailing /?
PROXY=${PROXY%%/*}
3) extract optional port
PORT=${PROXY##*:} if [ "$PORT" = "$PROXY" ]; then PORT="" fi
4) remove port
PROXY=${PROXY%%:*}
extract username & password
PROXYAUTH="${ALL_PROXY%@*}" [ "$PROXYAUTH" = "$ALL_PROXY" ] && PROXYAUTH= [ -n "${PROXYAUTH}" ] && PROXYAUTH=",proxyauth=${PROXYAUTH}"
if [ "$PROTO" = "socks" ] || [ "$PROTO" = "socks4a" ]; then if [ -z "$PORT" ]; then PORT="1080" fi METHOD="SOCKS4A:$PROXY:$1:$2,socksport=$PORT" elif [ "$PROTO" = "socks4" ]; then if [ -z "$PORT" ]; then PORT="1080" fi METHOD="SOCKS4:$PROXY:$1:$2,socksport=$PORT" else # Assume PROXY (http, https, etc) if [ -z "$PORT" ]; then PORT="8080" fi METHOD="PROXY:$PROXY:$1:$2,proxyport=${PORT}${PROXYAUTH}" fi
exec $SOCAT STDIO "$METHOD"