File: control

package info (click to toggle)
cloudsql-proxy 1.13-1
  • links: PTS, VCS
  • area: main
  • in suites: buster
  • size: 320 kB
  • sloc: sh: 131; makefile: 27
file content (48 lines) | stat: -rw-r--r-- 2,091 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
Source: cloudsql-proxy
Section: devel
Priority: optional
Maintainer: Debian Go Packaging Team <pkg-go-maintainers@lists.alioth.debian.org>
Uploaders: Manoj Srivastava <srivasta@debian.org>
Build-Depends: debhelper (>= 12),
               dh-golang,
               golang-any,
               golang-bazil-fuse-dev,
               golang-github-go-sql-driver-mysql-dev (>= 1.4),
               golang-golang-x-crypto-dev,
               golang-golang-x-net-dev,
               golang-golang-x-oauth2-google-dev,
               golang-golang-x-sys-dev,
               golang-google-api-dev,
               golang-google-cloud-dev,
               golang-pq-dev
Standards-Version: 4.3.0
Homepage: https://github.com/GoogleCloudPlatform/cloudsql-proxy
Vcs-Browser: https://salsa.debian.org/go-team/packages/cloudsql-proxy
Vcs-Git: https://salsa.debian.org/go-team/packages/cloudsql-proxy.git
XS-Go-Import-Path: github.com/GoogleCloudPlatform/cloudsql-proxy
Testsuite: autopkgtest-pkg-go

Package: cloudsql-proxy
Architecture: any
Recommends: fuse
Built-Using: ${misc:Built-Using}
Depends: ${misc:Depends},
         ${shlibs:Depends}
Description: connect securely to a 2nd generation Cloud SQL DB
 The Cloud SQL Proxy allows a user with the appropriate permissions to
 connect to a Second Generation Google Cloud SQL database without having
 to deal with IP whitelisting or SSL certificates manually. It works by
 opening unix/tcp sockets on the local machine and proxying
 connections to the associated Cloud SQL instances when the sockets
 are used.
 .
 Optional functionality can be enabled (--fuse) with access to `/dev/fuse`
 as well as the `fusermount` binary.
 .
 By default, the proxy will authenticate under the default service account
 of the Compute Engine VM it is running on. Therefore, the VM must have at
 least the sqlservice.admin API scope
 ("https://www.googleapis.com/auth/sqlservice.admin")
 and the associated project must have the SQL Admin API enabled.  The default
 service account must also have at least WRITER/EDITOR privileges to any
 projects of target SQL instances.