Lines Matching +full:ldap +full:- +full:utils
2 %global libpsl_version %(pkg-config --modversion libpsl 2>/dev/null || echo 0)
3 %global libssh_version %(pkg-config --modversion libssh 2>/dev/null || echo 0)
4 %global openssl_version %({ pkg-config --modversion openssl 2>/dev/null || echo 0;} | sed 's|-|-0.|…
13 Source: https://curl.haxx.se/download/curl-%{version}.tar.xz
15 Patch1: backport-0101-curl-7.32.0-multilib.patch
16 Patch2: backport-CVE-2022-22576.patch
17 Patch3: backport-CVE-2022-27775.patch
18 Patch4: backport-CVE-2022-27776.patch
19 Patch5: backport-pre-CVE-2022-27774.patch
20 Patch6: backport-001-CVE-2022-27774.patch
21 Patch7: backport-002-CVE-2022-27774.patch
22 Patch8: backport-CVE-2022-27781.patch
23 Patch9: backport-pre-CVE-2022-27782.patch
24 Patch10: backport-CVE-2022-27782.patch
25 Patch11: backport-CVE-2022-32205.patch
26 Patch12: backport-CVE-2022-32206.patch
27 Patch13: backport-CVE-2022-32207.patch
28 Patch14: backport-CVE-2022-32208.patch
29 Patch15: backport-fix-configure-disable-http-auth-build-error.patch
30 Patch16: backport-CVE-2022-35252-cookie-reject-cookies-with-control-bytes.patch
31 Patch17: backport-CVE-2022-32221.patch
32 Patch18: backport-CVE-2022-42916.patch
33 Patch19: backport-CVE-2022-42915.patch
34 Patch20: backport-CVE-2022-43551-http-use-the-IDN-decoded-name-in-HSTS-checks.patch
35 Patch21: backport-CVE-2022-43552-smb-telnet-do-not-free-the-protocol-struct-in-_done.patch
36 Patch22: backport-0001-CVE-2023-23914-CVE-2023-23915.patch
37 Patch23: backport-0002-CVE-2023-23914-CVE-2023-23915.patch
38 Patch24: backport-0003-CVE-2023-23914-CVE-2023-23915.patch
39 Patch25: backport-0004-CVE-2023-23914-CVE-2023-23915.patch
40 Patch26: backport-0005-CVE-2023-23914-CVE-2023-23915.patch
41 Patch27: backport-0001-CVE-2023-23916.patch
42 Patch28: backport-0002-CVE-2023-23916.patch
43 Patch29: backport-CVE-2023-27533.patch
44 Patch30: backport-CVE-2023-27534-pre1.patch
45 Patch31: backport-CVE-2023-27534.patch
46 Patch32: backport-CVE-2023-27538.patch
47 Patch33: backport-CVE-2023-27535-pre1.patch
48 Patch34: backport-CVE-2023-27536.patch
49 Patch35: backport-CVE-2023-27535.patch
50 Patch36: backport-after-CVE-2022-32207-to-fix-build-error-when-user-don-t-use-glibc.patch
51 Patch37: backport-CVE-2023-28321.patch
52 Patch38: backport-CVE-2023-28322.patch
53 Patch39: backport-0001-CVE-2023-28320.patch
54 Patch40: backport-0002-CVE-2023-28320.patch
55 Patch41: backport-0003-CVE-2023-28320.patch
57 BuildRequires: automake brotli-devel coreutils gcc groff krb5-devel
58 BuildRequires: libidn2-devel libnghttp2-devel libpsl-devel
59 BuildRequires: libssh-devel make openldap-devel openssh-clients openssh-server
60 BuildRequires: openssl-devel perl-interpreter pkgconfig python3-devel sed
61 BuildRequires: stunnel zlib-devel gnutls-utils nghttp2 perl(IO::Compress::Gzip)
67 Requires: libcurl = %{version}-%{release}
68 Provides: curl-full = %{version}-%{release} webclient
72 command-line tool (curl) for transferring data using various protocols.
74 %package -n libcurl
77 Requires: openssl-libs >= 1:%{openssl_version}
78 Provides: libcurl-full = %{version}-%{release}
79 Conflicts: curl < 7.66.0-3
81 %description -n libcurl
84 %package -n libcurl-devel
86 Requires: libcurl = %{version}-%{release}
87 Provides: curl-devel = %{version}-%{release}
88 Obsoletes: curl-devel < %{version}-%{release}
90 %description -n libcurl-devel
96 %autosetup -n %{name}-%{version} -p1
101 sed -e 's/^35$/35,52/' -i tests/data/test323
102 # use localhost6 instead of ip6-localhost in the curl test-suite
104 # avoid glob expansion in the trace output of `bash -x`
106 cmd="sed -e 's|ip6-localhost|localhost6|' -i tests/data/test[0-9]*"
113 aclocal -I m4
116 install -d build-full
117 export common_configure_opts="--cache-file=../config.cache \
118 --enable-symbol-hiding --enable-ipv6 --enable-threaded-resolver \
119 --with-gssapi --with-nghttp2 --with-ssl \
120 --with-ca-bundle=%{_sysconfdir}/pki/tls/certs/ca-bundle.crt"
126 cd build-full
128 --enable-ldap \
129 --enable-ldaps \
130 --enable-manual \
131 --with-brotli \
132 --with-libidn2 \
133 --with-libpsl \
134 --with-libssh
137 sed -e 's/^runpath_var=.*/runpath_var=/' \
138 -e 's/^hardcode_libdir_flag_spec=".*"$/hardcode_libdir_flag_spec=""/' \
139 -i build-full/libtool
141 %make_build V=1 -C build-full
144 # compile upstream test-cases
145 %make_build V=1 -C build-full/tests
147 # relax crypto policy for the test-suite to make it pass again (#1610888)
151 # make runtests.pl work for out-of-tree builds
157 # run the upstream test-suite for curl-full
159 cd build-${size}
165 perl -I../../tests ../../tests/runtests.pl -a -n -p -v '!flaky'
170 rm -f ${RPM_BUILD_ROOT}%{_libdir}/libcurl.{la,so}
173 install -D -m 644 docs/libcurl/libcurl.m4 $RPM_BUILD_ROOT%{_datadir}/aclocal/libcurl.m4
176 cd build-full
180 LD_LIBRARY_PATH="$RPM_BUILD_ROOT%{_libdir}:$LD_LIBRARY_PATH" %make_install -C scripts
183 # by fish-3.0.2-1.module_f31+3716+57207597 and would trigger a conflict
184 rm -rf ${RPM_BUILD_ROOT}%{_datadir}/fish
186 rm -f ${RPM_BUILD_ROOT}%{_libdir}/libcurl.a
187 rm -rf ${RPM_BUILD_ROOT}%{_libdir}/libcurl.la
191 %ldconfig_scriptlets -n libcurl
194 %defattr(-,root,root)
199 %files -n libcurl
200 %defattr(-,root,root)
202 %{_libdir}/libcurl.so.4.[0-9].[0-9]
204 %files -n libcurl-devel
205 %defattr(-,root,root)
208 %{_bindir}/curl-config*
215 %defattr(-,root,root)
220 %{_mandir}/man1/curl-config.1*
224 * Sat Jun 10 2023 zhouyihang <zhouyihang3@h-partners.com> - 7.79.1-19
225 - Type:bugfix
226 - CVE:NA
227 - SUG:NA
228 - DESC:disable valgrind in tests
230 * Thu Jun 08 2023 xingwei <xingwei14@h-partners.com> - 7.79.1-18
231 - Type:CVE
232 - CVE:CVE-2023-28320
233 - SUG:NA
234 - DESC:fix CVE-2023-28320
236 * Wed May 24 2023 xingwei <xingwei14@h-partners.com> - 7.79.1-17
237 - Type:CVE
238 - CVE:CVE-2023-28321,CVE-2023-28322
239 - SUG:NA
240 - DESC:fix CVE-2023-28321,CVE-2023-28322
242 * Wed Apr 19 2023 gaihuiying <eaglegai@163.com> - 7.79.1-16
243 - Type:bugfix
244 - CVE:NA
245 - SUG:NA
246 - DESC:backport to fix build error when user don't use glibc
248 * Wed Mar 22 2023 xingwei <xingwei14@h-partners.com> - 7.79.1-15
249 - Type:cves
250 - CVE:CVE-2023-27533 CVE-2023-27534 CVE-2023-27535 CVE-2023-27536 CVE-2023-27538
251 - SUG:NA
252 - DESC:fix CVE-2023-27533 CVE-2023-27534 CVE-2023-27535 CVE-2023-27536 CVE-2023-27538
254 * Sat Feb 18 2023 xinghe <xinghe2@h-partners.com> - 7.79.1-14
255 - Type:cves
256 - CVE:CVE-2023-23914 CVE-2023-23915 CVE-2023-23916
257 - SUG:NA
258 - DESC:fix CVE-2023-23914 CVE-2023-23915 CVE-2023-23916
260 * Thu Dec 22 2022 zhouyihang <zhouyihang3@h-partners.com> - 7.79.1-13
261 - Type:cves
262 - CVE:CVE-2022-43551 CVE-2022-43552
263 - SUG:NA
264 - DESC:fix CVE-2022-43551 CVE-2022-43552
266 * Thu Oct 27 2022 yanglu <yanglu72@h-partners.com> - 7.79.1-12
267 - Type:cves
268 - CVE:CVE-2022-32221 CVE-2022-42915 CVE-2022-42916
269 - SUG:NA
270 - DESC:fix CVE-2022-32221 CVE-2022-42915 CVE-2022-42916
272 * Tue Oct 11 2022 huangduirong <huangduirong@huawei.com> - 7.79.1-11
273 - Type:bugfix
274 - ID:NA
275 - SUG:NA
276 - DESC:Move autoreconf to build
278 * Thu Sep 01 2022 zhouyihang <zhouyihang3@h-partners.com> - 7.79.1-10
279 - Type:cves
280 - CVE:CVE-2022-35252
281 - SUG:NA
282 - DESC:fix CVE-2022-35252
284 * Mon Jul 25 2022 gaihuiying <eaglegai@163.com> - 7.79.1-9
285 - Type:bugfix
286 - CVE:NA
287 - SUG:NA
288 - DESC:fix build error when add --disable-http-auth configure option
290 * Tue Jul 05 2022 gaihuiying <eaglegai@163.com> - 7.79.1-8
291 - Type:cves
292 - CVE:CVE-2022-32207
293 - SUG:NA
294 - DESC:fix CVE-2022-32207 better
296 * Wed Jun 29 2022 gaihuiying <eaglegai@163.com> - 7.79.1-7
297 - Type:cves
298 - CVE:CVE-2022-32205 CVE-2022-32206 CVE-2022-32207 CVE-2022-32208
299 - SUG:NA
300 - DESC:fix CVE-2022-32205 CVE-2022-32206 CVE-2022-32207 CVE-2022-32208
302 * Tue May 17 2022 gaihuiying <eaglegai@163.com> - 7.79.1-6
303 - Type:cves
304 - CVE:CVE-2022-27781 CVE-2022-27782
305 - SUG:NA
306 - DESC:fix CVE-2022-27781 CVE-2022-27782
308 * Fri May 06 2022 gaihuiying <eaglegai@163.com> - 7.79.1-5
309 - Type:cves
310 - CVE:CVE-2022-22576 CVE-2022-27774 CVE-2022-27775 CVE-2022-27776
311 - SUG:NA
312 - DESC:fix CVE-2022-22576 CVE-2022-27774 CVE-2022-27775 CVE-2022-27776
314 * Tue Feb 22 2022 gaoxingwang <gaoxingwang@huawei.com> - 7.79.1-4
315 - Type:bugfix
316 - CVE:NA
317 - SUG:NA
318 - DESC:fix dict and neg telnet server start fail in upstream testcase
320 * Mon Jan 24 2022 gaoxingwang <gaoxingwang@huawei.com> - 7.79.1-3
321 - Type:bugfix
322 - CVE:NA
323 - SUG:NA
324 - DESC:enable check in spec
326 * Thu Jan 20 2022 yanglu <yanglu72@huawei.com> - 7.79.1-2
327 - Type:bugfix
328 - CVE:NA
329 - SUG:NA
330 - DESC:delete useless patch
332 * Tue Dec 14 2021 yanglu <yanglu72@huawei.com> - 7.79.1-1
333 - Type:requirement
334 - CVE:NA
335 - SUG:NA
336 - DESC:update curl to 7.79.1
338 * Wed Sep 29 2021 yanglu <yanglu72@huawei.com> - 7.77.0-3
339 - Type:CVE
340 - CVE:CVE-2021-22945 CVE-2021-22946 CVE-2021-22947
341 - SUG:NA
342 - DESC:fix CVE-2021-22945 CVE-2021-22946CVE-2021-22947
344 * Fri Aug 13 2021 gaihuiying <gaihuiying1@huawei.com> - 7.77.0-2
345 - Type:CVE
346 - CVE:CVE-2021-22925 CVE-2021-22926
347 - SUG:NA
348 - DESC:fix CVE-2021-22925 CVE-2021-22926
350 * Thu Jul 8 2021 gaihuiying <gaihuiying1@huawei.com> - 7.77.0-1
351 - Type:requirement
352 - CVE:NA
353 - SUG:NA
354 - DESC:update curl to 7.77.0
356 * Tue Jun 8 2021 gaihuiying <gaihuiying1@huawei.com> - 7.71.1-9
357 - Type:CVE
358 - CVE:CVE-2021-22897 CVE-2021-22898
359 - SUG:NA
360 - DESC:fix CVE-2021-22897 CVE-2021-22898
362 * Tue Apr 20 2021 gaihuiying <gaihuiying1@huawei.com> - 7.71.1-8
363 - Type:CVE
364 - CVE:CVE-2021-22890
365 - SUG:NA
366 - DESC:fix CVE-2021-22890
368 * Thu Apr 8 2021 xieliuhua <xieliuhua@huawei.com> - 7.71.1-7
369 - Type:CVE
370 - CVE:CVE-2021-22876
371 - SUG:NA
372 - DESC:fix CVE-2021-22876
374 * Tue Jan 26 2021 wangxiaopeng <wangxiaopeng7@huawei.com> - 7.71.1-6
375 - Type:CVE
376 - CVE:CVE-2020-8285
377 - SUG:NA
378 - DESC:fix CVE-2020-8285
380 * Tue Jan 19 2021 xielh2000 <xielh2000@163.com> - 7.71.1-5
381 - Type:CVE
382 - CVE:CVE-2020-8286
383 - SUG:NA
384 - DESC:fix CVE-2020-8286
386 * Mon Jan 18 2021 xihaochen <xihaochen@huawei.com> - 7.71.1-4
387 - Type:CVE
388 - CVE:CVE-2020-8284
389 - SUG:NA
390 - DESC:fix CVE-2020-8284
392 * Tue Jan 5 2021 gaihuiying <gaihuiying1@huawei.com> - 7.71.1-3
393 - Type:bugfix
394 - ID:NA
395 - SUG:NA
396 - DESC:fix downgrade error
398 * Mon Dec 28 2020 liuxin <liuxin264@huawei.com> - 7.71.1-2
399 - Type:cves
400 - ID:CVE-2020-8231
401 - SUG:NA
402 - DESC:fix CVE-2020-8231
404 * Fri Jul 24 2020 zhujunhao <zhujunhao8@huawei.com> - 7.71.1-1
405 - Update to 7.71.1
407 * Thu Apr 9 2020 songnannan <songnannan2@huawei.com> - 7.66.0-3
408 - split out the libcurl and libcurl-devel package
410 * Tue Mar 17 2020 chenzhen <chenzhen44@huawei.com> - 7.66.0-2
411 - Type:cves
412 - ID:CVE-2019-15601
413 - SUG:NA
414 - DESC:fix CVE-2019-15601
416 * Sat Jan 11 2020 openEuler Buildteam <buildteam@openeuler.org> - 7.66.0-1
417 - update to 7.66.0
419 * Sat Dec 21 2019 openEuler Buildteam <buildteam@openeuler.org> - 7.61.1-4
420 - Type:cves
421 - ID:CVE-2019-5481 CVE-2019-5482
422 - SUG:NA
423 - DESC:fix CVE-2019-5481 CVE-2019-5482
425 * Wed Sep 18 2019 guanyanjie <guanyanjie@huawei.com> - 7.61.1-3
426 - Init for openEuler