The package rpms/oci-seccomp-bpf-hook.git has added or updated architecture specific content in its spec file (ExclusiveArch/ExcludeArch or %ifarch/%ifnarch) in commit(s): https://src.fedoraproject.org/cgit/rpms/oci-seccomp-bpf-hook.git/commit/?id=....
Change: +ExclusiveArch: x86_64 %{power64} aarch64 s390x
Thanks.
Full change: ============
commit 6081c692fd5e58730a3346fe51a982b8336033b0 Author: Fedora Release Engineering releng@fedoraproject.org Date: Wed Jan 29 19:51:33 2020 +0000
- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild
Signed-off-by: Fedora Release Engineering releng@fedoraproject.org
diff --git a/oci-seccomp-bpf-hook.spec b/oci-seccomp-bpf-hook.spec index 6b17f7d..2428887 100644 --- a/oci-seccomp-bpf-hook.spec +++ b/oci-seccomp-bpf-hook.spec @@ -31,7 +31,7 @@ ExclusiveArch: x86_64 %{power64} aarch64 s390x
Name: oci-seccomp-bpf-hook Version: 0.0.1 -Release: 0.4.git%{shortcommit0}%{?dist} +Release: 0.5.git%{shortcommit0}%{?dist} Summary: OCI Hook to generate seccomp json files based on EBF syscalls used by container License: ASL 2.0 URL: %{git0} @@ -110,6 +110,9 @@ export GOPATH=%{buildroot}/%{gopath}:$(pwd)/vendor:%{gopath} %{_mandir}/man1/%{name}.1*
%changelog +* Wed Jan 29 2020 Fedora Release Engineering releng@fedoraproject.org - 0.0.1-0.5.git3baa603a +- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild + * Tue Nov 05 2019 Jindrich Novy jnovy@redhat.com - 0.0.1-0.4.git3baa603a - limit arches to only those supported by bcc so that this can be built
commit 90438fc82bfd4b91fa63c9665e5767d0ea954495 Author: Jindrich Novy jnovy@redhat.com Date: Tue Nov 5 10:26:29 2019 +0100
oci-seccomp-bpf-hook-0.0.1-0.4.git3baa603a.fc32
- limit arches to only those supported by bcc so that this can be built
Signed-off-by: Jindrich Novy jnovy@redhat.com
diff --git a/oci-seccomp-bpf-hook.spec b/oci-seccomp-bpf-hook.spec index 33e2c2c..6b17f7d 100644 --- a/oci-seccomp-bpf-hook.spec +++ b/oci-seccomp-bpf-hook.spec @@ -26,9 +26,12 @@ %global commit0 3baa603ae910f2aad29ea694b78b2f7f34b5d5ce %global shortcommit0 %(c=%{commit0}; echo ${c:0:8})
+# bcc is built only for these arches +ExclusiveArch: x86_64 %{power64} aarch64 s390x + Name: oci-seccomp-bpf-hook Version: 0.0.1 -Release: 0.3.git%{shortcommit0}%{?dist} +Release: 0.4.git%{shortcommit0}%{?dist} Summary: OCI Hook to generate seccomp json files based on EBF syscalls used by container License: ASL 2.0 URL: %{git0} @@ -107,6 +110,9 @@ export GOPATH=%{buildroot}/%{gopath}:$(pwd)/vendor:%{gopath} %{_mandir}/man1/%{name}.1*
%changelog +* Tue Nov 05 2019 Jindrich Novy jnovy@redhat.com - 0.0.1-0.4.git3baa603a +- limit arches to only those supported by bcc so that this can be built + * Mon Nov 04 2019 Jindrich Novy jnovy@redhat.com - 0.0.1-0.3.git3baa603a - fix the license - should be ASL 2.0 - use %%gobuild
commit 9e1e594a77359220ddb09b7c3ae7269525a7d94b Author: Jindrich Novy jnovy@redhat.com Date: Tue Nov 5 09:50:15 2019 +0100
Initial import (#1768400).
diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..9ff90b0 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +/oci-seccomp-bpf-hook-3baa603a.tar.gz diff --git a/README.md b/README.md deleted file mode 100644 index c87d52e..0000000 --- a/README.md +++ /dev/null @@ -1,3 +0,0 @@ -# oci-seccomp-bpf-hook - -The oci-seccomp-bpf-hook package \ No newline at end of file diff --git a/oci-seccomp-bpf-hook.spec b/oci-seccomp-bpf-hook.spec new file mode 100644 index 0000000..33e2c2c --- /dev/null +++ b/oci-seccomp-bpf-hook.spec @@ -0,0 +1,121 @@ +%global with_devel 0 +%global with_bundled 1 +%global with_debug 1 +%global with_check 0 +%global with_unit_test 0 + +%if 0%{?with_debug} +%global _find_debuginfo_dwz_opts %{nil} +%global _dwz_low_mem_die_limit 0 +%else +%global debug_package %{nil} +%endif + +# %if ! 0% {?gobuild:1} +%define gobuild(o:) go build -tags="$BUILDTAGS" -ldflags "${LDFLAGS:-} -B 0x$(head -c20 /dev/urandom|od -An -tx1|tr -d ' \n')" -a -v -x %{?**}; +#% endif + +%global provider github +%global provider_tld com +%global project containers +%global repo oci-seccomp-bpf-hook +# https://github.com/containers/oci-seccomp-bpf-hook +%global provider_prefix %{provider}.%{provider_tld}/%{project}/%{repo} +%global import_path %{provider_prefix} +%global git0 https://%%7Bprovider%7D.%%7Bprovider_tld%7D/%%7Bproject%7D/%%7Brepo%7D +%global commit0 3baa603ae910f2aad29ea694b78b2f7f34b5d5ce +%global shortcommit0 %(c=%{commit0}; echo ${c:0:8}) + +Name: oci-seccomp-bpf-hook +Version: 0.0.1 +Release: 0.3.git%{shortcommit0}%{?dist} +Summary: OCI Hook to generate seccomp json files based on EBF syscalls used by container +License: ASL 2.0 +URL: %{git0} +Source0: %{git0}/archive/%{commit0}/%{repo}-%{shortcommit0}.tar.gz +# If go_compiler is not set to 1, there is no virtual provide. Use golang instead. +BuildRequires: %{?go_compiler:compiler(go-compiler)}%{!?go_compiler:golang} +BuildRequires: golang-github-cpuguy83-md2man +BuildRequires: glib2-devel +BuildRequires: glibc-devel +BuildRequires: bcc-devel +BuildRequires: git +BuildRequires: gpgme-devel +BuildRequires: libseccomp-devel +BuildRequires: make + +%description +%{summary} +%{repo} provides a library for applications looking to use +the Container Pod concept popularized by Kubernetes. + +%package remote +Summary: Remote Oci-Seccomp-Bpf client + +%description remote +%{summary} +%{repo} provides a library for applications looking to use +the Container Pod concept popularized by Kubernetes. + + +%prep +%autosetup -Sgit -n %{repo}-%{commit0} + +%build +mkdir _build +pushd _build +mkdir -p src/%{provider}.%{provider_tld}/%{project} +ln -s ../../../../ src/%{import_path} +popd +ln -s vendor src + +export GOPATH=$(pwd)/_build:$(pwd) +export GO111MODULE=off +export BUILDTAGS="" +BUILDTAGS=$BUILDTAGS %gobuild -o bin/%{name} %{import_path} +%{__make} docs + +%install +%{__make} DESTDIR=%{buildroot} PREFIX=%{_prefix} ETCDIR=%{buildroot}%{_sysconfdir} OCI-SECCOMP-BPF_VERSION=%{version} install + +%check +%if 0%{?with_check} && 0%{?with_unit_test} && 0%{?with_devel} +# Since we aren't packaging up the vendor directory we need to link +# back to it somehow. Hack it up so that we can add the vendor +# directory from BUILD dir as a gopath to be searched when executing +# tests from the BUILDROOT dir. +ln -s ./ ./vendor/src # ./vendor/src -> ./vendor + +export GOPATH=%{buildroot}/%{gopath}:$(pwd)/vendor:%{gopath} + +%if ! 0%{?gotest:1} +%global gotest go test +%endif + +%gotest %{import_path}/src/%{name} +%endif + +#define license tag if not already defined +%{!?_licensedir:%global license %doc} + +%files +%license LICENSE +%doc README.md +%dir %{_libexecdir}/oci/hooks.d +%{_libexecdir}/oci/hooks.d/%{name} +%{_datadir}/containers/oci/hooks.d/%{name}.json +%{_mandir}/man1/%{name}.1* + +%changelog +* Mon Nov 04 2019 Jindrich Novy jnovy@redhat.com - 0.0.1-0.3.git3baa603a +- fix the license - should be ASL 2.0 +- use %%gobuild + +* Mon Nov 04 2019 Jindrich Novy jnovy@redhat.com - 0.0.1-0.2.git3baa603a +- pull in golang deps as BR + +* Mon Sep 23 2019 Jindrich Novy jnovy@redhat.com - 0.0.1-0.1.git3baa603a +- fix spec file and build + +* Sun Sep 22 2019 Dan Walsh dwalsh@redhat.com - 0.0.1 +- Initial Version diff --git a/sources b/sources new file mode 100644 index 0000000..e7b445e --- /dev/null +++ b/sources @@ -0,0 +1 @@ +SHA512 (oci-seccomp-bpf-hook-3baa603a.tar.gz) = c2a6cbd5a16e2c60f8a2dabb377918d4e161e39570b42ec73de51eb139950b8be4b278b3952987af8df0b7327b06d5fcc1dc13bda35083b0c037b9ebc0f354af
arch-excludes@lists.fedoraproject.org