www-servers/copyparty: Bump to 1.20.2

Signed-off-by: Esteve Varela Colominas <esteve.varela@gmail.com>
This commit is contained in:
Esteve Varela Colominas
2026-01-20 21:37:47 +01:00
parent d599171d4a
commit c46b647061
2 changed files with 33 additions and 21 deletions

View File

@@ -1,2 +1,2 @@
DIST copyparty-1.19.23.tar.gz 1662026 BLAKE2B ba6ff615f407f5afdc26dc1bcd21a05ff8c0737630e04b3dbf7c0e82c656621b0d6376390fd2da6487b213662d2f3574180b381de3e352281a982e110dacb7cc SHA512 0477ddac96038dac3e82d5af3266917d73716d436794d48e902d6785739abf3130992426f21e19fef37f0d8a2e1bf63b13c6e8e8348a58dfefeac166a6c5a3b1
DIST copyparty-1.20.1.tar.gz 1702376 BLAKE2B 1d4abd99740e90124efc7bce6602a223b41609f67c1ffa8d8dbd4abf84c5f29a68a06a9a9da6fb6311a67460eab3502f935c21cc80429b3e7f55b4ac2ba4eab0 SHA512 8323f0a796ba4f227255fed43c20986741117542ad35aea494d2cd1e614cc591b4d36cc266c58cbf3911cc056c112dbd92e339708319efbf082d9661e6ef5a96
DIST copyparty-1.20.2.tar.gz 1711250 BLAKE2B d9d74ae3f26a8797a567adc3a9e4219f8119d5ac24d9054bbd6ce027687821eb4240095d16f9be0a46d24f8eb3905fb36d3a2d0fd8c2c1feb15a0f60906a8790 SHA512 c179b49b4d2199c9bf62f3419a0176f6a2850da945cfd4360710bc961395f9b854fcaff733d0bf67201b33567b5b0bbe2932221b64032f20490407b6282e9e1c

View File

@@ -30,26 +30,26 @@ DOC_CONTENTS="\
# TODO: This package is unfinished and lacks some features
- Service scripts:
- contrib/openrc/copyparty: Hardcodes /usr/local/bin, runs as root, exposes /mnt as RW (!?)
- contrib/systemd/copyparty.service: Hardcodes /usr/local/bin, runs as root, in /var/lib/copyparty
- contrib/systemd/copyparty@.service: Runs as an arbitrary user, in /var/lib/copyparty-jail, at boot
- contrib/systemd/copyparty-user.service: User service, runs in /var/lib/copyparty-jail
Ideally, both systemd and openrc scripts would have the same behavior.
I also think it'd be sane to default to a new user/group named copyparty,
and create /var/lib/copyparty with the correct permissions.
-- contrib/openrc/copyparty: Hardcodes /usr/local/bin, runs as root, exposes /mnt as RW (!?)
-- contrib/systemd/copyparty.service: Hardcodes /usr/local/bin, runs as root, in /var/lib/copyparty
-- contrib/systemd/copyparty@.service: Runs as an arbitrary user, in /var/lib/copyparty-jail, at boot
-- contrib/systemd/copyparty-user.service: User service, runs in /var/lib/copyparty-jail
Ideally, both systemd and openrc scripts would have the same behavior.
I also think it'd be sane to default to a new user/group named copyparty,
and create /var/lib/copyparty with the correct permissions.
- Default configuration: There's a bunch of examples, find them using:
\`find docs contrib -name '*.conf'\`.
Ideally one of these would be installed as /etc/copyparty.conf, and an
/etc/copyparty.d directory would be created. I'm not sure what would be
acceptable defaults.
\`find docs contrib -name '*.conf'\`.
Ideally one of these would be installed as /etc/copyparty.conf, and an
/etc/copyparty.d directory would be created. I'm not sure what would be
acceptable defaults.
- Jailing the service with prisonparty/bubbleparty: This program is very
feature-packed, and has a decent security track record, but just has a
massive attack surface with serious repercussions. Some packages provide a
'prisonparty' service, which runs the program in a chroot. This script
hardcodes a lot of things that I'm not sure will work on gentoo, and would
need matching openrc/systemd services as well.
feature-packed, and has a decent security track record, but just has a
massive attack surface with serious repercussions. Some packages provide a
'prisonparty' service, which runs the program in a chroot. This script
hardcodes a lot of things that I'm not sure will work on gentoo, and would
need matching openrc/systemd services as well.
# Note about TLS and certificates
@@ -80,10 +80,9 @@ docker. Additionally, it's difficult to package npm dependencies in gentoo.
https://gist.github.com/mid-kid/cc7c0c2e1c188c8b135663d547e3dd35"
src_prepare() {
# Reuse the bundled copy of fusepy for partyfuse
# patched in scripts/deps-docker/Dockerfile (under "build fusepy")
sed -e '/from fuse import/s/fuse/copyparty.web.deps.&/' \
-i bin/partyfuse.py || die
# Use a $TMPDIR for testing, not /dev/shm
sed -e 's/\["\/dev\/shm"[^]]*\]/[]/' \
-i tests/util.py || die
distutils-r1_src_prepare
}
@@ -95,6 +94,13 @@ python_test() {
python_install() {
distutils-r1_python_install
# Reuse the bundled copy of fusepy for partyfuse
# patched in scripts/deps-docker/Dockerfile (under "build fusepy")
sed -e "1a$(printf '%s\\n' \
'import copyparty.web.deps.fuse as fuse,sys,os' \
'sys.path.append(os.path.dirname(fuse.__file__))' \
)" -i "${D}$(python_get_scriptdir)/partyfuse" || die
# Useful utilities listed in bin/README.md
# These need to be executed inside the server's data directory
# Installed into /usr/libexec as not a single other package installs them
@@ -147,6 +153,12 @@ good-but-slow image thumbnails, read audio/media tags" media-video/ffmpeg
optfeature "read .avif images with pillow (rarely useful)" dev-python/pillow[avif]
#optfeature "read RAW images" rawpy # rawpy not packaged (yet)
# Optfeatures from pyproject.toml:project.optional-dependencies not listed above
optfeature "sftp protocol support" dev-python/paramiko
optfeature "ftp protocol support" dev-python/pyftpdlib
optfeature "ftps protocol support" "dev-python/pyftpdlib dev-python/pyopenssl"
#optfeature "tftp protocol support" partftpy # partftpy not packaged (yet)
# Additional programs not detected above
optfeature "automatically generate SSL certificate at startup" app-crypt/cfssl
optfeature "scrypt password hashing" dev-lang/python[ssl] # hashlib.scrypt()