checkpolicy/checkpolicy.spec

80 lines
2.6 KiB
RPMSpec
Raw Normal View History

#
# spec file for package checkpolicy
#
# Copyright (c) 2013 SUSE LINUX Products GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via http://bugs.opensuse.org/
#
%define libsepol_ver 2.1.9
BuildRequires: bison
BuildRequires: flex-old
BuildRequires: libselinux-devel
BuildRequires: libsepol-devel-static >= %{libsepol_ver}
Name: checkpolicy
Version: 2.1.12
Release: 0
Url: http://userspace.selinuxproject.org/
Summary: SELinux policy compiler
License: GPL-2.0+
Group: Productivity/Security
#Source: http://userspace.selinuxproject.org/releases/20120216/%{name}-%{version}.tgz
Source: http://pkgs.fedoraproject.org/lookaside/pkgs/checkpolicy/%{name}-%{version}.tgz
Patch0: %{name}-rhat.patch
BuildRoot: %{_tmppath}/%{name}-%{version}-build
%description
Security-enhanced Linux is a feature of the Linux(R) kernel and a
number of utilities with enhanced security functionality designed to
add mandatory access controls to Linux. The Security-enhanced Linux
kernel contains new architectural components originally developed to
improve the security of the Flask operating system. These architectural
components provide general support for the enforcement of many kinds of
mandatory access control policies, including those based on the
concepts of Type Enforcement(R), Role-based Access Control, and
Multi-level Security.
This package contains checkpolicy, the SELinux policy compiler. Only
required for building policies.
%prep
%setup -q
%patch0 -p1
%build
make clean
make LIBDIR="%{_libdir}" CFLAGS="$RPM_OPT_FLAGS" %{?_smp_mflags}
cd test
make LIBDIR="%{_libdir}" CFLAGS="$RPM_OPT_FLAGS" %{?_smp_mflags}
%install
mkdir -p $RPM_BUILD_ROOT%{_bindir}
make LIBDIR="%{_libdir}" DESTDIR="$RPM_BUILD_ROOT" install
install test/dismod $RPM_BUILD_ROOT%{_bindir}/sedismod
install test/dispol $RPM_BUILD_ROOT%{_bindir}/sedispol
%files
%defattr(-,root,root)
%doc COPYING ChangeLog
%{_bindir}/checkpolicy
%{_bindir}/checkmodule
%{_mandir}/man8/checkpolicy.*
%{_mandir}/man8/checkmodule.*
%{_bindir}/sedismod
%{_bindir}/sedispol
%changelog