rpms/myproxy/devel README.Fedora, NONE, 1.1 import.log, NONE, 1.1 myproxy.init, NONE, 1.1 myproxy.spec, NONE, 1.1 myproxy.sysconfig, NONE, 1.1 .cvsignore, 1.1, 1.2 sources, 1.1, 1.2
stevetraylen
stevetraylen at fedoraproject.org
Sun Oct 11 06:06:23 UTC 2009
- Previous message (by thread): rpms/vrq/devel import.log,1.1,1.2
- Next message (by thread): rpms/myproxy/EL-4 README.Fedora, NONE, 1.1 myproxy.init, NONE, 1.1 myproxy.spec, NONE, 1.1 myproxy.sysconfig, NONE, 1.1 .cvsignore, 1.1, 1.2 sources, 1.1, 1.2
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
Author: stevetraylen
Update of /cvs/pkgs/rpms/myproxy/devel
In directory cvs1.fedora.phx.redhat.com:/tmp/cvs-serv6996/devel
Modified Files:
.cvsignore sources
Added Files:
README.Fedora import.log myproxy.init myproxy.spec
myproxy.sysconfig
Log Message:
Import rhbz#52079
--- NEW FILE README.Fedora ---
You must install host certificates for myproxy-server.
These should be located at
/etc/grid-security/myproxy/hostcert.pem , permissions 644
/etc/grid-security/myproxy/hostkey.pem , permission 600
and owned by user/group myproxy/myproxy.
--- NEW FILE import.log ---
myproxy-4_8-4_fc11:HEAD:myproxy-4.8-4.fc11.src.rpm:1255241118
--- NEW FILE myproxy.init ---
#!/bin/sh
#
# myproxy-server - Server for X.509 Public Key Infrastructure (PKI) security credentials
#
# chkconfig: - 55 25
# description: Server for X.509 Public Key Infrastructure (PKI) security credentials
#
### BEGIN INIT INFO
# Provides: myproxy-server
# Required-Start: $local_fs $network $syslog
# Required-Stop: $local_fs $syslog
# Should-Start: $syslog
# Should-Stop: $network $syslog
# Default-Stop:
# Default-Start:
# Short-Description: Startup the MyProxy server daemon
# Description: Server for X.509 Public Key Infrastructure (PKI) security credentials
### END INIT INFO
# Source function library.
. /etc/rc.d/init.d/functions
exec="/usr/sbin/myproxy-server"
prog=$(basename $exec)
# Defaults
MYPROXY_USER=myproxy
MYPROXY_OPTIONS="-s /var/lib/myproxy"
X509_USER_CERT=/etc/grid-security/myproxy/hostcert.pem
X509_USER_KEY=/etc/grid-security/myproxy/hostkey.pem
# Override defaults here.
[ -e /etc/sysconfig/$prog ] && . /etc/sysconfig/$prog
# A few sanity checks
[ ! -r $X509_USER_KEY ] && echo -n "$prog: No hostkey file" && failure && echo && exit 5
[ ! -r $X509_USER_CERT ] && echo -n "$prog: No hostcert file" && failure && echo && exit 5
lockfile=/var/lock/subsys/$prog
start() {
echo -n $"Starting $prog: "
daemon --user $MYPROXY_USER X509_USER_CERT=$X509_USER_CERT X509_USER_KEY=$X509_USER_KEY $exec $MYPROXY_OPTIONS
retval=$?
echo
[ $retval -eq 0 ] && touch $lockfile
return $retval
}
stop() {
echo -n $"Stopping $prog: "
killproc $prog
retval=$?
echo
[ $retval -eq 0 ] && rm -f $lockfile
return $retval
}
restart() {
stop
start
}
case "$1" in
start|stop|restart)
$1
;;
force-reload)
restart
;;
status)
status $prog
;;
try-restart|condrestart)
if status $prog >/dev/null ; then
restart
fi
;;
reload)
# If config can be reloaded without restarting, implement it here,
# remove the "exit", and add "reload" to the usage message below.
# For example:
status $prog >/dev/null || exit 7
killproc $prog -HUP
;;
*)
echo $"Usage: $0 {start|stop|status|restart|reload|try-restart|force-reload}"
exit 2
esac
--- NEW FILE myproxy.spec ---
%{!?_initddir: %global _initddir %{_initrddir}}
%ifarch alpha ia64 ppc64 s390x sparc64 x86_64
%global flavor gcc64pthr
%else
%global flavor gcc32pthr
%endif
Name: myproxy
Version: 4.8
Release: 4%{?dist}
Summary: Manage X.509 Public Key Infrastructure (PKI) security credentials
Group: System Environment/Daemons
License: NCSA and BSD and ASL 2.0
URL: http://grid.ncsa.illinois.edu/myproxy/
Source0: http://www.globus.org/ftppub/myproxy/myproxy-%{version}.tar.gz
Source1: myproxy.init
Source2: myproxy.sysconfig
Source3: README.Fedora
BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
BuildRequires: globus-gss-assist-devel > 3
BuildRequires: pam-devel
BuildRequires: graphviz
BuildRequires: voms-devel >= 1.9.12.1
BuildRequires: cyrus-sasl-devel
BuildRequires: openldap-devel >= 2.3
BuildRequires: grid-packaging-tools
BuildRequires: doxygen
%if "%{?rhel}" == "5"
BuildRequires: graphviz-gd
%endif
%if %{?fedora}%{!?fedora:0} >= 9
BuildRequires: tex(latex)
%else
%if %{?rhel}%{!?rhel:0} >= 6
BuildRequires: tex(latex)
%else
BuildRequires: tetex-latex
%endif
%endif
%description
MyProxy is open source software for managing X.509 Public Key Infrastructure
(PKI) security credentials (certificates and private keys). MyProxy
combines an online credential repository with an online certificate
authority to allow users to securely obtain credentials when and where needed.
Users run myproxy-logon to authenticate and obtain credentials, including
trusted CA certificates and Certificate Revocation Lists (CRLs).
%package client
Requires: myproxy = %{version}-%{release}
Requires: globus-proxy-utils
Requires: voms-clients
Summary: Manage X.509 Public Key Infrastructure (PKI) security credentials
Group: System Environment/Daemons
%description client
MyProxy is open source software for managing X.509 Public Key Infrastructure
(PKI) security credentials (certificates and private keys). MyProxy
combines an online credential repository with an online certificate
authority to allow users to securely obtain credentials when and where needed.
Users run myproxy-logon to authenticate and obtain credentials, including
trusted CA certificates and Certificate Revocation Lists (CRLs).
Package %{name}-client contains client utilities for MyProxy.
%package devel
Requires: myproxy = %{version}-%{release}
# in .el5 and 4 this dependency is not picked up
# automatically via pkgconfig
%if 0%{?el4}%{?el5}
Requires: globus-gss-assist-devel > 3
%endif
Summary: Develop X.509 Public Key Infrastructure (PKI) security credentials
Group: System Environment/Daemons
%description devel
MyProxy is open source software for managing X.509 Public Key Infrastructure
(PKI) security credentials (certificates and private keys). MyProxy
combines an online credential repository with an online certificate
authority to allow users to securely obtain credentials when and where needed.
Users run myproxy-logon to authenticate and obtain credentials, including
trusted CA certificates and Certificate Revocation Lists (CRLs).
Package %{name}-devel contains development files for MyProxy.
%package server
Requires(pre): shadow-utils
Requires(post): chkconfig
Requires(preun): chkconfig
Requires(preun): initscripts
Requires(postun): initscripts
Requires: myproxy = %{version}-%{release}
Summary: Server for X.509 Public Key Infrastructure (PKI) security credentials
Group: System Environment/Daemons
%description server
MyProxy is open source software for managing X.509 Public Key Infrastructure
(PKI) security credentials (certificates and private keys). MyProxy
combines an online credential repository with an online certificate
authority to allow users to securely obtain credentials when and where needed.
Users run myproxy-logon to authenticate and obtain credentials, including
trusted CA certificates and Certificate Revocation Lists (CRLs).
Package %{name}-server contains the MyProxy server.
# Create a sepeate admin clients package since they
# not needed for normal operation and pull in
# a load of perl dependencies.
%package admin
Requires: myproxy-server = %{version}-%{release}
Summary: Server for X.509 Public Key Infrastructure (PKI) security credentials
Group: System Environment/Daemons
%description admin
MyProxy is open source software for managing X.509 Public Key Infrastructure
(PKI) security credentials (certificates and private keys). MyProxy
combines an online credential repository with an online certificate
authority to allow users to securely obtain credentials when and where needed.
Users run myproxy-logon to authenticate and obtain credentials, including
trusted CA certificates and Certificate Revocation Lists (CRLs).
Package %{name}-admin contains the MyProxy server admin commands.
%package doc
Requires: myproxy = %{version}-%{release}
Summary: Documentation for X.509 Public Key Infrastructure (PKI) security credentials
Group: Documentation
%description doc
MyProxy is open source software for managing X.509 Public Key Infrastructure
(PKI) security credentials (certificates and private keys). MyProxy
combines an online credential repository with an online certificate
authority to allow users to securely obtain credentials when and where needed.
Users run myproxy-logon to authenticate and obtain credentials, including
trusted CA certificates and Certificate Revocation Lists (CRLs).
Package %{name}-doc contains the MyProxy documentation.
%prep
%setup -q
cp -p %{SOURCE1} .
cp -p %{SOURCE2} .
cp -p %{SOURCE3} .
%build
rm -f doxygen/Doxyfile*
rm -f doxygen/Makefile.am
rm -f pkgdata/Makefile.am
rm -f globus_automake*
for f in `find . -name Makefile.am` ; do
sed -e 's!^flavorinclude_HEADERS!include_HEADERS!' \
-e 's!\(lib[a-zA-Z_]*\)_$(GLOBUS_FLAVOR_NAME)\.la!\1.la!g' \
-e 's!^\(lib[a-zA-Z_]*\)___GLOBUS_FLAVOR_NAME__la_!\1_la_!' -i $f
done
sed -e "s!<With_Flavors!<With_Flavors ColocateLibraries=\"no\"!" \
-i pkgdata/pkg_data_src.gpt.in
%{_datadir}/globus/globus-bootstrap.sh
%configure --with-flavor=%{flavor} --enable-doxygen --with-openldap=%{_usr} \
--with-voms=%{_usr} \
--with-kerberos5=%{_usr} --with-sasl2=%{_usr}
make %{?_smp_mflags}
%install
rm -rf $RPM_BUILD_ROOT
make install DESTDIR=$RPM_BUILD_ROOT
GLOBUSPACKAGEDIR=$RPM_BUILD_ROOT%{_datadir}/globus/packages
find $RPM_BUILD_ROOT%{_libdir} -name 'lib*.la' -exec rm -v '{}' \;
sed '/lib.*\.la$/d' -i $GLOBUSPACKAGEDIR/%{name}/%{flavor}_rtl.filelist
# Remove static libraries (.a files)
find $RPM_BUILD_ROOT%{_libdir} -name 'lib*.a' -exec rm -v '{}' \;
sed '/lib.*\.a$/d' -i $GLOBUSPACKAGEDIR/%{name}/%{flavor}_dev.filelist
# Put documentation in Fedora defaults and alter GPT package lists.
mkdir -p $RPM_BUILD_ROOT%{_defaultdocdir}/%{name}-doc-%{version}/extras
mv $RPM_BUILD_ROOT%{_defaultdocdir}/%{name}/{refman.pdf,html} \
$RPM_BUILD_ROOT%{_defaultdocdir}/%{name}-doc-%{version}/.
sed -i "s!/share/doc/%{name}/html/!/share/doc/%{name}-doc-%{version}/html/!" $GLOBUSPACKAGEDIR/%{name}/noflavor_doc.filelist
sed -i "s!/share/doc/%{name}/refman.pdf!/share/doc/%{name}-doc-%{version}/refman.pdf!" $GLOBUSPACKAGEDIR/%{name}/noflavor_doc.filelist
# We are going to zip the man pages later in the package so we need to
# correct the gpt data in anticipation.
sed -i "s!\(/share/man/.*\)!\1.gz!" $GLOBUSPACKAGEDIR/%{name}/noflavor_doc.filelist
for FILE in login.html myproxy-accepted-credentials-mapapp myproxy-cert-checker myproxy-certificate-mapapp \
myproxy-certreq-checker myproxy-crl.cron myproxy.cron myproxy-get-delegation.cgi \
myproxy-get-trustroots.cron myproxy-passphrase-policy myproxy-revoke
do
mv $RPM_BUILD_ROOT%{_usr}/share/%{name}/$FILE \
$RPM_BUILD_ROOT%{_defaultdocdir}/%{name}-doc-%{version}/extras/.
sed -i "s!%{name}/${FILE}!doc/%{name}-doc-%{version}/extras/${FILE}!" $GLOBUSPACKAGEDIR/%{name}/noflavor_data.filelist
done
mkdir -p $RPM_BUILD_ROOT%{_defaultdocdir}/%{name}-%{version}
for FILE in INSTALL LICENSE LICENSE.* PROTOCOL README VERSION
do
mv $RPM_BUILD_ROOT%{_usr}/share/%{name}/$FILE \
$RPM_BUILD_ROOT%{_defaultdocdir}/%{name}-%{version}/.
sed -i "s!%{name}/${FILE}!doc/%{name}-%{version}/${FILE}!" $GLOBUSPACKAGEDIR/%{name}/noflavor_data.filelist
done
# Remove irrelavent example configuration files.
for FILE in etc.inetd.conf.modifications etc.init.d.myproxy.nonroot etc.services.modifications \
etc.xinetd.myproxy etc.init.d.myproxy
do
rm $RPM_BUILD_ROOT%{_usr}/share/%{name}/$FILE
sed -i "/share\/%{name}\/$FILE/d" $GLOBUSPACKAGEDIR/%{name}/noflavor_data.filelist
done
# Generate pkg-config file from GPT metadata
mkdir -p $RPM_BUILD_ROOT%{_libdir}/pkgconfig
%{_datadir}/globus/globus-gpt2pkg-config pkgdata/pkg_data_%{flavor}_dev.gpt > \
$RPM_BUILD_ROOT%{_libdir}/pkgconfig/%{name}.pc
# Move example configuration file into place.
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}
mv $RPM_BUILD_ROOT%{_datadir}/%{name}/myproxy-server.config \
$RPM_BUILD_ROOT%{_sysconfdir}
sed -i "/share\/%{name}\/myproxy-server.config/d" $GLOBUSPACKAGEDIR/%{name}/noflavor_data.filelist
mkdir -p $RPM_BUILD_ROOT%{_initddir}
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/sysconfig
install -m 755 myproxy.init $RPM_BUILD_ROOT%{_initddir}/myproxy-server
install -m 644 myproxy.sysconfig $RPM_BUILD_ROOT%{_sysconfdir}/sysconfig/myproxy-server
mkdir -p $RPM_BUILD_ROOT%{_var}/lib/myproxy
# Create a directory to hold myproxy owned host certificates.
mkdir -p $RPM_BUILD_ROOT%{_sysconfdir}/grid-security/myproxy
%clean
rm -rf $RPM_BUILD_ROOT
%check
# Check that the entries in gpt filelists are all present.
GLOBUSPACKAGEDIR=$RPM_BUILD_ROOT%{_datadir}/globus/packages
for LIST in $GLOBUSPACKAGEDIR/%{name}/*.filelist
do
for FILE in $(cat $LIST)
do
if [ ! -r $RPM_BUILD_ROOT%{_usr}$FILE ] ; then
echo "Check failed:"
echo "Filelist $LIST contains:"
echo "$FILE"
echo "which is not present at:"
echo $RPM_BUILD_ROOT%{_usr}$FILE
exit 1
fi
done
done
%post -p /sbin/ldconfig
%postun -p /sbin/ldconfig
%pre server
getent group myproxy >/dev/null || groupadd -r myproxy
getent passwd myproxy >/dev/null || \
useradd -r -g myproxy -d %{_var}/lib/myproxy -s /sbin/nologin \
-c "User to run the MyProxy service" myproxy
exit 0
%post server
/sbin/chkconfig --add myproxy-server
%preun server
if [ $1 = 0 ] ; then
/sbin/service myproxy-server stop >/dev/null 2>&1
/sbin/chkconfig --del myproxy-server
fi
%postun server
if [ "$1" -ge "1" ] ; then
/sbin/service myproxy-server condrestart >/dev/null 2>&1 || :
fi
%files
%defattr(-,root,root,-)
%{_datadir}/globus/packages/%{name}
%doc %{_defaultdocdir}/%{name}-%{version}
%{_libdir}/libmyproxy.so.4
%{_libdir}/libmyproxy.so.4.0.8
%files client
%defattr(-,root,root,-)
%{_bindir}/myproxy-change-pass-phrase
%{_bindir}/myproxy-destroy
%{_bindir}/myproxy-get-delegation
%{_bindir}/myproxy-get-trustroots
%{_bindir}/myproxy-info
%{_bindir}/myproxy-init
%{_bindir}/myproxy-logon
%{_bindir}/myproxy-retrieve
%{_bindir}/myproxy-store
%{_mandir}/man1/myproxy-change-pass-phrase.1.gz
%{_mandir}/man1/myproxy-destroy.1.gz
%{_mandir}/man1/myproxy-get-delegation.1.gz
%{_mandir}/man1/myproxy-info.1.gz
%{_mandir}/man1/myproxy-init.1.gz
%{_mandir}/man1/myproxy-logon.1.gz
%{_mandir}/man1/myproxy-retrieve.1.gz
%{_mandir}/man1/myproxy-store.1.gz
%files server
%defattr(-,root,root,-)
%{_sbindir}/myproxy-server
%{_initddir}/myproxy-server
%config(noreplace) %{_sysconfdir}/myproxy-server.config
%config(noreplace) %{_sysconfdir}/sysconfig/myproxy-server
# myproxy-server wants exactly 700 permission on its data
# which is just fine.
%attr(0700,myproxy,myproxy) %dir %{_var}/lib/myproxy
%dir %{_sysconfdir}/grid-security
%dir %{_sysconfdir}/grid-security/myproxy
%{_mandir}/man8/myproxy-server.8.gz
%{_mandir}/man5/myproxy-server.config.5.gz
%doc README.Fedora
%files admin
%defattr(-,root,root,-)
%{_sbindir}/myproxy-admin-addservice
%{_sbindir}/myproxy-admin-adduser
%{_sbindir}/myproxy-admin-change-pass
%{_sbindir}/myproxy-admin-load-credential
%{_sbindir}/myproxy-admin-query
%{_sbindir}/myproxy-replicate
%{_sbindir}/myproxy-server-setup
%{_sbindir}/myproxy-test
%{_sbindir}/myproxy-test-replicate
%{_mandir}/man8/myproxy-admin-addservice.8.gz
%{_mandir}/man8/myproxy-admin-adduser.8.gz
%{_mandir}/man8/myproxy-admin-change-pass.8.gz
%{_mandir}/man8/myproxy-admin-load-credential.8.gz
%{_mandir}/man8/myproxy-admin-query.8.gz
%{_mandir}/man8/myproxy-replicate.8.gz
%files doc
%defattr(-,root,root,-)
%doc %{_defaultdocdir}/%{name}-doc-%{version}
%files devel
%defattr(-,root,root,-)
%{_includedir}/globus/myproxy.h
%{_includedir}/globus/myproxy_authorization.h
%{_includedir}/globus/myproxy_constants.h
%{_includedir}/globus/myproxy_creds.h
%{_includedir}/globus/myproxy_delegation.h
%{_includedir}/globus/myproxy_log.h
%{_includedir}/globus/myproxy_protocol.h
%{_includedir}/globus/myproxy_read_pass.h
%{_includedir}/globus/myproxy_sasl_client.h
%{_includedir}/globus/myproxy_sasl_server.h
%{_includedir}/globus/myproxy_server.h
%{_includedir}/globus/verror.h
%{_libdir}/libmyproxy.so
%{_libdir}/pkgconfig/myproxy.pc
%changelog
* Wed Oct 7 2009 Steve Traylen <steve.traylen at cern.ch> - 4.8-4
- Add ASL 2.0 license as well.
- Explicitly add /etc/grid-security to files list
- For .el4/5 build only add globus-gss-assist-devel as requirment
to myproxy-devel package.
* Thu Oct 1 2009 Steve Traylen <steve.traylen at cern.ch> - 4.8-3
- Set _initddir for .el4 and .el5 building.
* Mon Sep 21 2009 Steve Traylen <steve.traylen at cern.ch> - 4.8-2
- Require version of voms with fixed ABI.
* Sun Sep 10 2009 Steve Traylen <steve.traylen at cern.ch> - 4.8-1
- Increase version to upstream 4.8
- Remove voms-header-location.patch since fixed upstream now.
- Include directory /etc/grid-security/myproxy
* Mon Jun 22 2009 Steve Traylen <steve.traylen at cern.ch> - 4.7-1
- Initial version.
--- NEW FILE myproxy.sysconfig ---
# Any environment for MyProxy Startup.
# Override these defaults here.
## MYPROXY_USER=myproxy
## MYPROXY_OPTIONS="-s /var/lib/myproxy"
## X509_USER_CERT=/etc/grid-security/myproxy/hostcert.pem
## X509_USER_KEY=/etc/grid-security/myproxy/hostkey.pem
Index: .cvsignore
===================================================================
RCS file: /cvs/pkgs/rpms/myproxy/devel/.cvsignore,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -p -r1.1 -r1.2
--- .cvsignore 10 Oct 2009 22:08:18 -0000 1.1
+++ .cvsignore 11 Oct 2009 06:06:20 -0000 1.2
@@ -0,0 +1 @@
+myproxy-4.8.tar.gz
Index: sources
===================================================================
RCS file: /cvs/pkgs/rpms/myproxy/devel/sources,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -p -r1.1 -r1.2
--- sources 10 Oct 2009 22:08:18 -0000 1.1
+++ sources 11 Oct 2009 06:06:22 -0000 1.2
@@ -0,0 +1 @@
+85f29d553bfec5fa5f2042440542524f myproxy-4.8.tar.gz
- Previous message (by thread): rpms/vrq/devel import.log,1.1,1.2
- Next message (by thread): rpms/myproxy/EL-4 README.Fedora, NONE, 1.1 myproxy.init, NONE, 1.1 myproxy.spec, NONE, 1.1 myproxy.sysconfig, NONE, 1.1 .cvsignore, 1.1, 1.2 sources, 1.1, 1.2
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the fedora-extras-commits
mailing list