From 85874da2d4c1eb1d5fbcaeee6231c209fd9a6f25 Mon Sep 17 00:00:00 2001 From: MSVSphere Packaging Team Date: Wed, 24 Jul 2024 03:36:12 +0300 Subject: [PATCH] import ktls-utils-0.11-1.el9_4 --- .gitignore | 1 + .ktls-utils.metadata | 1 + SPECS/ktls-utils.spec | 81 +++++++++++++++++++++++++++++++++++++++++++ 3 files changed, 83 insertions(+) create mode 100644 .gitignore create mode 100644 .ktls-utils.metadata create mode 100644 SPECS/ktls-utils.spec diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..6f36639 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +SOURCES/ktls-utils-0.11.tar.gz diff --git a/.ktls-utils.metadata b/.ktls-utils.metadata new file mode 100644 index 0000000..5c29c7a --- /dev/null +++ b/.ktls-utils.metadata @@ -0,0 +1 @@ +9dae5134b7af7ebb14e518f9f4013a92bb44165e SOURCES/ktls-utils-0.11.tar.gz diff --git a/SPECS/ktls-utils.spec b/SPECS/ktls-utils.spec new file mode 100644 index 0000000..68866cb --- /dev/null +++ b/SPECS/ktls-utils.spec @@ -0,0 +1,81 @@ +%global forgeurl https://github.com/oracle/ktls-utils +%global baseversion 0.11 + +Name: ktls-utils +Version: %{baseversion} +Release: 1%{?dist} +Summary: TLS handshake agent for kernel sockets + +%forgemeta + +License: GPL-2.0-only AND (GPL-2.0-only OR BSD-3-Clause) +URL: %{forgeurl} + +# FIXME: is this a bug in the tagging scheme or forgesource macro? +Source0: %{forgeurl}/releases/download/%{name}-%{baseversion}/%{name}-%{baseversion}.tar.gz + +BuildRequires: bash systemd-rpm-macros +BuildRequires: gcc make coreutils +BuildRequires: pkgconfig(gnutls) >= 3.3.0 +BuildRequires: autoconf >= 2.69 +BuildRequires: automake +BuildRequires: pkgconfig(libkeyutils) +BuildRequires: pkgconfig(glib-2.0) >= 2.6 +BuildRequires: pkgconfig(libnl-3.0) >= 3.1 + +%description +In-kernel TLS consumers need a mechanism to perform TLS handshakes +on a connected socket to negotiate TLS session parameters that can +then be programmed into the kernel's TLS record protocol engine. + +This package of software provides a TLS handshake user agent that +listens for kernel requests and then materializes a user space +socket endpoint on which to perform these handshakes. The resulting +negotiated session parameters are passed back to the kernel via +standard kTLS socket options. + +%prep +%setup -q -n %{name}-%{baseversion} +%autopatch -p1 + +%build +./autogen.sh +%configure --with-systemd +%make_build + +%install +%make_install + +%files +%config(noreplace) %{_sysconfdir}/tlshd.conf +%{_sbindir}/tlshd +%{_mandir}/man5/tlshd.conf.5.gz +%{_mandir}/man8/tlshd.8.gz +%{_unitdir}/tlshd.service +%license COPYING +%doc README.md +%doc SECURITY.md + +%post +%systemd_post tlshd.service + +%preun +%systemd_preun tlshd.service + +%postun +%systemd_postun_with_restart tlshd.service + +%changelog +* Thu Jul 11 2024 Steve Dickson 0.11-1 +- Updated to the latest upstream release 0.11 (RHEL-47101) + +* Thu Feb 29 2024 Steve Dickson 0.10-0 +- Initial package +- Upstream contributions by: + - Chuck Lever + - Hannes Reinecke + - Jeff Layton + - Benjamin Coddington + - David Härdeman + - Tigran Mkrtchyan + - Moritz "WanzenBug" Wanzenböck