2020-01-30 11:30:51 +01:00
|
|
|
#
|
|
|
|
# spec file for package dbus-1-devel-doc
|
|
|
|
#
|
|
|
|
# Copyright (c) 2020 SUSE LLC
|
|
|
|
#
|
|
|
|
# All modifications and additions to the file contributed by third parties
|
|
|
|
# remain the property of their copyright owners, unless otherwise agreed
|
|
|
|
# upon. The license for this file, and modifications and additions to the
|
|
|
|
# file, is the same license as for the pristine package itself (unless the
|
|
|
|
# license for the pristine package is not an Open Source License, in which
|
|
|
|
# case the license is the MIT License). An "Open Source License" is a
|
|
|
|
# license that conforms to the Open Source Definition (Version 1.9)
|
|
|
|
# published by the Open Source Initiative.
|
|
|
|
|
|
|
|
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
|
|
|
#
|
|
|
|
|
|
|
|
|
|
|
|
%define with_systemd 1
|
|
|
|
%define _name dbus
|
|
|
|
%define _libname libdbus-1-3
|
|
|
|
# Temporary code to disable service restart on update sflees@suse.de boo#1020301
|
|
|
|
%global _backup %{_sysconfdir}/sysconfig/services.rpmbak.%{name}-%{version}-%{release}
|
|
|
|
%bcond_without selinux
|
|
|
|
Name: dbus-1-devel-doc
|
Accepting request 821367 from home:elimat:branches:Base:System
- Update to 1.12.20
* On Unix, avoid a use-after-free if two usernames have the same
numeric uid. In older versions this could lead to a crash (denial of
service) or other undefined behaviour, possibly including incorrect
authorization decisions if <policy group=...> is used.
Like Unix filesystems, D-Bus' model of identity cannot distinguish
between users of different names with the same numeric uid, so this
configuration is not advisable on systems where D-Bus will be used.
Thanks to Daniel Onaca.
(dbus#305, dbus!166; Simon McVittie)
- From 1.12.18
* CVE-2020-12049: If a message contains more file descriptors than can
be sent, close those that did get through before reporting error.
Previously, a local attacker could cause the system dbus-daemon (or
another system service with its own DBusServer) to run out of file
descriptors, by repeatedly connecting to the server and sending fds that
would get leaked.
Thanks to Kevin Backhouse of GitHub Security Lab.
(dbus#294, GHSL-2020-057; Simon McVittie)
* Fix a crash when the dbus-daemon is terminated while one or more
monitors are active (dbus#291, dbus!140; Simon McVittie)
* The dbus-send(1) man page now documents --bus and --peer instead of
the old --address synonym for --peer, which has been deprecated since
the introduction of --bus and --peer in 1.7.6
(fd.o #48816, dbus!115; Chris Morin)
* Fix a wrong environment variable name in dbus-daemon(1)
(dbus#275, dbus!122; Mubin, Philip Withnall)
* Fix formatting of dbus_message_append_args example
(dbus!126, Felipe Franciosi)
* Avoid a test failure on Linux when built in a container as uid 0, but
without the necessary privileges to increase resource limits
(dbus!58, Debian #908092; Simon McVittie)
* When building with CMake, cope with libX11 in a non-standard location
(dbus!129, Tuomo Rinne)
- Run spec-cleaner
OBS-URL: https://build.opensuse.org/request/show/821367
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=293
2020-07-17 02:09:42 +02:00
|
|
|
Version: 1.12.20
|
2020-01-30 11:30:51 +01:00
|
|
|
Release: 0
|
|
|
|
Summary: Developer documentation package for D-Bus
|
|
|
|
License: GPL-2.0-or-later OR AFL-2.1
|
Accepting request 821367 from home:elimat:branches:Base:System
- Update to 1.12.20
* On Unix, avoid a use-after-free if two usernames have the same
numeric uid. In older versions this could lead to a crash (denial of
service) or other undefined behaviour, possibly including incorrect
authorization decisions if <policy group=...> is used.
Like Unix filesystems, D-Bus' model of identity cannot distinguish
between users of different names with the same numeric uid, so this
configuration is not advisable on systems where D-Bus will be used.
Thanks to Daniel Onaca.
(dbus#305, dbus!166; Simon McVittie)
- From 1.12.18
* CVE-2020-12049: If a message contains more file descriptors than can
be sent, close those that did get through before reporting error.
Previously, a local attacker could cause the system dbus-daemon (or
another system service with its own DBusServer) to run out of file
descriptors, by repeatedly connecting to the server and sending fds that
would get leaked.
Thanks to Kevin Backhouse of GitHub Security Lab.
(dbus#294, GHSL-2020-057; Simon McVittie)
* Fix a crash when the dbus-daemon is terminated while one or more
monitors are active (dbus#291, dbus!140; Simon McVittie)
* The dbus-send(1) man page now documents --bus and --peer instead of
the old --address synonym for --peer, which has been deprecated since
the introduction of --bus and --peer in 1.7.6
(fd.o #48816, dbus!115; Chris Morin)
* Fix a wrong environment variable name in dbus-daemon(1)
(dbus#275, dbus!122; Mubin, Philip Withnall)
* Fix formatting of dbus_message_append_args example
(dbus!126, Felipe Franciosi)
* Avoid a test failure on Linux when built in a container as uid 0, but
without the necessary privileges to increase resource limits
(dbus!58, Debian #908092; Simon McVittie)
* When building with CMake, cope with libX11 in a non-standard location
(dbus!129, Tuomo Rinne)
- Run spec-cleaner
OBS-URL: https://build.opensuse.org/request/show/821367
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=293
2020-07-17 02:09:42 +02:00
|
|
|
URL: https://dbus.freedesktop.org/
|
2020-01-30 11:30:51 +01:00
|
|
|
Source0: http://dbus.freedesktop.org/releases/dbus/%{_name}-%{version}.tar.gz
|
|
|
|
Source1: http://dbus.freedesktop.org/releases/dbus/%{_name}-%{version}.tar.gz.asc
|
|
|
|
Source2: dbus-1.keyring
|
|
|
|
Source3: baselibs.conf
|
|
|
|
Source4: dbus-1.desktop
|
|
|
|
Patch0: feature-suse-log-deny.patch
|
|
|
|
# PATCH-FIX-OPENSUSE coolo@suse.de -- force a feature configure won't accept without x11 in buildrequires
|
|
|
|
Patch1: feature-suse-do-autolaunch.patch
|
|
|
|
# Patch-Feature-opensuse sflees@suse.de, users shouldn't be allowed to start / stop the dbus service.
|
|
|
|
Patch2: feature-suse-refuse-manual-start-stop.patch
|
|
|
|
BuildRequires: doxygen
|
|
|
|
BuildRequires: libexpat-devel >= 2.1.0
|
|
|
|
BuildRequires: xmlto
|
|
|
|
Requires: dbus-1 = %{version}
|
|
|
|
BuildArch: noarch
|
|
|
|
|
|
|
|
%description
|
|
|
|
D-Bus is a message bus system, a simple way for applications to talk to
|
|
|
|
one another. D-BUS supplies both a system daemon and a
|
|
|
|
per-user-login-session daemon. Also, the message bus is built on top of
|
|
|
|
a general one-to-one message passing framework, which can be used by
|
|
|
|
any two apps to communicate directly (without going through the message
|
|
|
|
bus daemon).
|
|
|
|
|
|
|
|
%prep
|
|
|
|
%setup -q -n %{_name}-%{version}
|
|
|
|
%autopatch -p1
|
|
|
|
|
|
|
|
%build
|
|
|
|
echo 'HTML_TIMESTAMP=NO' >> Doxyfile.in
|
|
|
|
# Skip generation of API doc manpages we do not ship
|
|
|
|
echo 'GENERATE_MAN=NO' >> Doxyfile.in
|
|
|
|
|
|
|
|
%configure \
|
|
|
|
--disable-static \
|
|
|
|
--libexecdir=%{_libexecdir}/dbus-1 \
|
|
|
|
--enable-doxygen-docs \
|
|
|
|
--with-console-auth-dir=/run/dbus/at_console/ \
|
|
|
|
--with-system-pid-file=/run/dbus/pid \
|
|
|
|
--with-system-socket=/run/dbus/system_bus_socket \
|
|
|
|
--with-systemdsystemunitdir=%{_unitdir} \
|
|
|
|
--with-systemduserunitdir=%{_userunitdir} \
|
|
|
|
--without-x
|
|
|
|
|
|
|
|
doxygen -u
|
Accepting request 821367 from home:elimat:branches:Base:System
- Update to 1.12.20
* On Unix, avoid a use-after-free if two usernames have the same
numeric uid. In older versions this could lead to a crash (denial of
service) or other undefined behaviour, possibly including incorrect
authorization decisions if <policy group=...> is used.
Like Unix filesystems, D-Bus' model of identity cannot distinguish
between users of different names with the same numeric uid, so this
configuration is not advisable on systems where D-Bus will be used.
Thanks to Daniel Onaca.
(dbus#305, dbus!166; Simon McVittie)
- From 1.12.18
* CVE-2020-12049: If a message contains more file descriptors than can
be sent, close those that did get through before reporting error.
Previously, a local attacker could cause the system dbus-daemon (or
another system service with its own DBusServer) to run out of file
descriptors, by repeatedly connecting to the server and sending fds that
would get leaked.
Thanks to Kevin Backhouse of GitHub Security Lab.
(dbus#294, GHSL-2020-057; Simon McVittie)
* Fix a crash when the dbus-daemon is terminated while one or more
monitors are active (dbus#291, dbus!140; Simon McVittie)
* The dbus-send(1) man page now documents --bus and --peer instead of
the old --address synonym for --peer, which has been deprecated since
the introduction of --bus and --peer in 1.7.6
(fd.o #48816, dbus!115; Chris Morin)
* Fix a wrong environment variable name in dbus-daemon(1)
(dbus#275, dbus!122; Mubin, Philip Withnall)
* Fix formatting of dbus_message_append_args example
(dbus!126, Felipe Franciosi)
* Avoid a test failure on Linux when built in a container as uid 0, but
without the necessary privileges to increase resource limits
(dbus!58, Debian #908092; Simon McVittie)
* When building with CMake, cope with libX11 in a non-standard location
(dbus!129, Tuomo Rinne)
- Run spec-cleaner
OBS-URL: https://build.opensuse.org/request/show/821367
OBS-URL: https://build.opensuse.org/package/show/Base:System/dbus-1?expand=0&rev=293
2020-07-17 02:09:42 +02:00
|
|
|
%make_build -C doc
|
2020-01-30 11:30:51 +01:00
|
|
|
|
|
|
|
%install
|
|
|
|
%make_install -C doc
|
|
|
|
|
|
|
|
# Remove manpages for commandline tools (shipped in main package)
|
|
|
|
rm -Rf %{buildroot}/%{_mandir}/man1/*
|
|
|
|
rmdir -p --ignore-fail-on-non-empty %{buildroot}/%{_mandir}/man1
|
|
|
|
|
|
|
|
# Remove DTDs (shipped in devel subpackage)
|
|
|
|
rm -Rf %{buildroot}/%{_datadir}/xml/dbus-1/*dtd
|
|
|
|
rmdir -p --ignore-fail-on-non-empty %{buildroot}/%{_datadir}/xml/dbus-1
|
|
|
|
|
|
|
|
mkdir -p %{buildroot}/%{_datadir}/susehelp/meta/Development/Libraries/
|
|
|
|
install -m 0644 %{SOURCE4} \
|
|
|
|
%{buildroot}/%{_datadir}/susehelp/meta/Development/Libraries/dbus-1.desktop
|
|
|
|
mkdir -p %{buildroot}/%{_libdir}/pkgconfig
|
|
|
|
mkdir -p %{buildroot}/lib/dbus-1/system-services
|
|
|
|
|
|
|
|
mkdir -p %{buildroot}%{_datadir}/doc/dbus/examples/
|
|
|
|
install -m 0644 tools/GetAllMatchRules.py %{buildroot}%{_datadir}/doc/dbus/examples/
|
|
|
|
install -m 0644 bus/example-*-stats.conf %{buildroot}%{_datadir}/doc/dbus/examples/
|
|
|
|
|
|
|
|
%files
|
|
|
|
%dir %{_datadir}/doc/dbus
|
|
|
|
%dir %{_datadir}/doc/dbus/examples
|
|
|
|
%{_datadir}/doc/dbus/api/
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus-faq.html
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus-specification.html
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus-test-plan.html
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus-tutorial.html
|
|
|
|
%doc %{_datadir}/doc/dbus/diagram.*
|
|
|
|
%doc %{_datadir}/doc/dbus/system-activation.txt
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus-cleanup-sockets.1.html
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus-daemon.1.html
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus-launch.1.html
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus-run-session.1.html
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus-monitor.1.html
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus-send.1.html
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus-uuidgen.1.html
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus.devhelp2
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus-test-tool.1.html
|
|
|
|
%doc %{_datadir}/doc/dbus/dbus-update-activation-environment.1.html
|
|
|
|
%doc %{_datadir}/doc/dbus/examples/GetAllMatchRules.py
|
|
|
|
%doc %{_datadir}/doc/dbus/examples/example-session-disable-stats.conf
|
|
|
|
%doc %{_datadir}/doc/dbus/examples/example-system-enable-stats.conf
|
|
|
|
%doc doc/*.txt doc/file-boilerplate.c doc/TODO
|
|
|
|
%{_datadir}/susehelp
|
|
|
|
|
|
|
|
%changelog
|