You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

79 lines
2.6 KiB

##
## postgresql-acl.spec -- OpenPKG RPM Package Specification
## Copyright (c) 2000-2022 OpenPKG Project <http://openpkg.org/>
##
## Permission to use, copy, modify, and distribute this software for
## any purpose with or without fee is hereby granted, provided that
## the above copyright notice and this permission notice appear in all
## copies.
##
## THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
## WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
## MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
## IN NO EVENT SHALL THE AUTHORS AND COPYRIGHT HOLDERS AND THEIR
## CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
## SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
## LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
## USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
## ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
## OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
## OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
## SUCH DAMAGE.
##
# package information
Name: postgresql-acl
Summary: PostgreSQL Extension: Access Control List (ACL)
URL: https://github.com/arkhipov/acl
Vendor: Vladislav Arkhipov
Packager: OpenPKG Project
Distribution: OpenPKG Community
Class: EVAL
Group: Database
License: BSD
Version: 1.0.2
Release: 20160617
# list of sources
Source0: https://github.com/arkhipov/acl/archive/%{version}.tar.gz
# build information
BuildPreReq: OpenPKG, openpkg >= 20160101
PreReq: OpenPKG, openpkg >= 20160101
BuildPreReq: postgresql
PreReq: postgresql
%description
This is a PostgreSQL extension for restricting access to rows in
tables based on an authenticated user. Access Control List (ACL) has
become the de-facto standard for implementing a security model in
modern applications. Complex scenarios can be handled by using ACLs
without having a complex permission model at the application level.
%track
prog postgresql-acl = {
version = %{version}
url = https://github.com/arkhipov/acl/releases
regex = (__VER__)\.tar\.gz
}
%prep
%setup -q -n acl-%{version}
%build
%{l_make} %{l_mflags} \
USE_PGXS=1 \
CC="%{l_cc}" \
CFLAGS="%{l_cflags -O}" \
CPPFLAGS="%{l_cppflags}" \
LDFLAGS="%{l_ldflags}" \
acl.so
%install
%{l_make} %{l_mflags} install DESTDIR=$RPM_BUILD_ROOT
%{l_rpmtool} files -v -ofiles -r$RPM_BUILD_ROOT %{l_files_std}
%files -f files
%clean