Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
No build reason found for standard:i586
SUSE:SLE-12:Update
libcap.29614
libcap.spec
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File libcap.spec of Package libcap.29614
# # spec file for package libcap # # Copyright (c) 2023 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed # upon. The license for this file, and modifications and additions to the # file, is the same license as for the pristine package itself (unless the # license for the pristine package is not an Open Source License, in which # case the license is the MIT License). An "Open Source License" is a # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. # Please submit bugfixes or comments via https://bugs.opensuse.org/ # Name: libcap Summary: Library for Capabilities (linux-privs) Support License: BSD-3-Clause OR GPL-2.0-only Group: System/Libraries Version: 2.26 Release: 0 Source: https://www.kernel.org/pub/linux/libs/security/linux-privs/libcap2/libcap-%{version}.tar.xz Source2: baselibs.conf URL: https://sites.google.com/site/fullycapable/ Patch: CVE-2023-2603.patch BuildRoot: %{_tmppath}/%{name}-%{version}-build BuildRequires: libattr-devel %if 0%{?suse_version} > 1030 BuildRequires: fdupes %endif %define debug_package_requires libcap2 = %{version}-%{release} %description Capabilities are a measure to limit the omnipotence of the superuser. Currently a program started by root or setuid root has the power to do anything. Capabilities (Linux-Privs) provide a more fine-grained access control. Without kernel patches, you can use this library to drop capabilities within setuid binaries. If you use patches, this can be done automatically by the kernel. %package -n libcap2 Summary: Library for Capabilities (linux-privs) Support Group: System/Libraries %description -n libcap2 Capabilities are a measure to limit the omnipotence of the superuser. Currently a program started by root or setuid root has the power to do anything. Capabilities (Linux-Privs) provide a more fine-grained access control. Without kernel patches, you can use this library to drop capabilities within setuid binaries. If you use patches, this can be done automatically by the kernel. %package devel Summary: Development files for libcap Group: Development/Libraries/C and C++ Requires: glibc-devel Requires: libcap2 = %{version} %description devel Development files (Headers, libraries for static linking, etc) for libcap. libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities. Install libcap-devel if you want to develop or compile applications using libcap. %package progs Summary: Libcap utility programs Group: System/Filesystems Requires: libcap2 = %{version} %description progs This package contains utility programs handling capabilities via libcap. %prep %setup -q %autopatch -p1 %build make prefix=%{_prefix} lib=%{_lib} LIBDIR=/%{_lib} SBINDIR=/sbin \ INCDIR=%{_includedir} MANDIR=%{_mandir} DEBUG="-g %{optflags}" %install make install RAISE_SETFCAP=no \ DESTDIR=%{buildroot} \ LIBDIR=/%{_lib} \ SBINDIR=/sbin \ INCDIR=%{_includedir} \ MANDIR=%{_mandir} \ PKGCONFIGDIR=%{_libdir}/pkgconfig # remove unneeded files rm -f %{buildroot}/%{_lib}/*.*a # drop pkgconfig to resemble with the former SLE12 package rm -f %{buildroot}%{_libdir}/pkgconfig/*.pc # libcap.so symlink hack; similar to the former SLE12 package rm -f %{buildroot}/%{_lib}/*.so mkdir -p %{buildroot}%{_libdir} ln -s /%{_lib}/libcap.so.2 %{buildroot}%{_libdir}/libcap.so %fdupes -s $RPM_BUILD_ROOT %post -n libcap2 -p /sbin/ldconfig %postun -n libcap2 -p /sbin/ldconfig %files -n libcap2 %defattr(-,root,root) /%{_lib}/libcap.so.* %files progs %defattr(-,root,root) %{_mandir}/man1/* %{_mandir}/man8/* /sbin/* %files devel %defattr(-,root,root) %doc License README CHANGELOG %{_includedir}/sys/capability.h %{_libdir}/*.so %{_mandir}/man3/* %changelog
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor