summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--.gitignore1
-rw-r--r--python-tracprivatetickets.spec142
-rw-r--r--sources1
3 files changed, 144 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore
index e69de29..b963af1 100644
--- a/.gitignore
+++ b/.gitignore
@@ -0,0 +1 @@
+/TracPrivateTickets-2.3.0.tar.gz
diff --git a/python-tracprivatetickets.spec b/python-tracprivatetickets.spec
new file mode 100644
index 0000000..fa334a5
--- /dev/null
+++ b/python-tracprivatetickets.spec
@@ -0,0 +1,142 @@
+%global _empty_manifest_terminate_build 0
+Name: python-TracPrivateTickets
+Version: 2.3.0
+Release: 1
+Summary: Modified ticket security for Trac.
+License: BSD 3-Clause
+URL: https://trac-hacks.org/wiki/PrivateTicketsPlugin
+Source0: https://mirrors.aliyun.com/pypi/web/packages/bf/da/aa5552e0869e3b93d09d85fd2f6f3600ebc74563a5fc74a3d9ca3547dbb3/TracPrivateTickets-2.3.0.tar.gz
+BuildArch: noarch
+
+Requires: python3-Trac
+
+%description
+Allow users to only see tickets they are associated with.
+There are three main permissions for this plugin: ``TICKET_VIEW_REPORTER``,
+``TICKET_VIEW_CC``, and ``TICKET_VIEW_OWNER``. ``TICKET_VIEW_SELF`` is an
+alias for all three of these.
+With each permission, users will only be able to see tickets where they are
+the person mentioned in the permission. So if a user has
+``TICKET_VIEW_REPORTER``, they can only see tickets they reported. For
+``TICKET_VIEW_CC``, they just have to be included in the CC list.
+There are also group-based permissions: ``TICKET_VIEW_REPORTER_GROUP``,
+``TICKET_VIEW_CC_GROUP``, and ``TICKET_VIEW_OWNER_GROUP``. These work in a
+similar way to their non-group counterparts, except that you are granted
+access if you share a group with the target user. For example, if ticket 1 was
+reported by Allan, and Allan and Bob are both in the group company_foo, and
+Bob has ``TICKET_VIEW_REPORTER_GROUP``, then Bob will be able to see ticket 1
+since he shares a group with the reporter. Each group-based permission is also
+an alias for the normal one, so you do not have to grant both.
+``TICKET_VIEW_GROUP`` is an alias for all the group-based permissions (and
+therefore all the normal ones as well).
+These extra permissions can only deny access, not allow it. This means the
+user must still have ``TICKET_VIEW`` granted as normal.
+Finally, users with ``TRAC_ADMIN`` will not be restricted by this plugin.
+The meta-user "anonymous" also cannot be restricted by this plugin, as their
+identity isn't known to be checked. Be sure to not grant ``TICKET_VIEW`` to
+anonymous, or unauthenticated users will be able to see all tickets.
+
+%package -n python3-TracPrivateTickets
+Summary: Modified ticket security for Trac.
+Provides: python-TracPrivateTickets
+BuildRequires: python3-devel
+BuildRequires: python3-setuptools
+BuildRequires: python3-pip
+%description -n python3-TracPrivateTickets
+Allow users to only see tickets they are associated with.
+There are three main permissions for this plugin: ``TICKET_VIEW_REPORTER``,
+``TICKET_VIEW_CC``, and ``TICKET_VIEW_OWNER``. ``TICKET_VIEW_SELF`` is an
+alias for all three of these.
+With each permission, users will only be able to see tickets where they are
+the person mentioned in the permission. So if a user has
+``TICKET_VIEW_REPORTER``, they can only see tickets they reported. For
+``TICKET_VIEW_CC``, they just have to be included in the CC list.
+There are also group-based permissions: ``TICKET_VIEW_REPORTER_GROUP``,
+``TICKET_VIEW_CC_GROUP``, and ``TICKET_VIEW_OWNER_GROUP``. These work in a
+similar way to their non-group counterparts, except that you are granted
+access if you share a group with the target user. For example, if ticket 1 was
+reported by Allan, and Allan and Bob are both in the group company_foo, and
+Bob has ``TICKET_VIEW_REPORTER_GROUP``, then Bob will be able to see ticket 1
+since he shares a group with the reporter. Each group-based permission is also
+an alias for the normal one, so you do not have to grant both.
+``TICKET_VIEW_GROUP`` is an alias for all the group-based permissions (and
+therefore all the normal ones as well).
+These extra permissions can only deny access, not allow it. This means the
+user must still have ``TICKET_VIEW`` granted as normal.
+Finally, users with ``TRAC_ADMIN`` will not be restricted by this plugin.
+The meta-user "anonymous" also cannot be restricted by this plugin, as their
+identity isn't known to be checked. Be sure to not grant ``TICKET_VIEW`` to
+anonymous, or unauthenticated users will be able to see all tickets.
+
+%package help
+Summary: Development documents and examples for TracPrivateTickets
+Provides: python3-TracPrivateTickets-doc
+%description help
+Allow users to only see tickets they are associated with.
+There are three main permissions for this plugin: ``TICKET_VIEW_REPORTER``,
+``TICKET_VIEW_CC``, and ``TICKET_VIEW_OWNER``. ``TICKET_VIEW_SELF`` is an
+alias for all three of these.
+With each permission, users will only be able to see tickets where they are
+the person mentioned in the permission. So if a user has
+``TICKET_VIEW_REPORTER``, they can only see tickets they reported. For
+``TICKET_VIEW_CC``, they just have to be included in the CC list.
+There are also group-based permissions: ``TICKET_VIEW_REPORTER_GROUP``,
+``TICKET_VIEW_CC_GROUP``, and ``TICKET_VIEW_OWNER_GROUP``. These work in a
+similar way to their non-group counterparts, except that you are granted
+access if you share a group with the target user. For example, if ticket 1 was
+reported by Allan, and Allan and Bob are both in the group company_foo, and
+Bob has ``TICKET_VIEW_REPORTER_GROUP``, then Bob will be able to see ticket 1
+since he shares a group with the reporter. Each group-based permission is also
+an alias for the normal one, so you do not have to grant both.
+``TICKET_VIEW_GROUP`` is an alias for all the group-based permissions (and
+therefore all the normal ones as well).
+These extra permissions can only deny access, not allow it. This means the
+user must still have ``TICKET_VIEW`` granted as normal.
+Finally, users with ``TRAC_ADMIN`` will not be restricted by this plugin.
+The meta-user "anonymous" also cannot be restricted by this plugin, as their
+identity isn't known to be checked. Be sure to not grant ``TICKET_VIEW`` to
+anonymous, or unauthenticated users will be able to see all tickets.
+
+%prep
+%autosetup -n TracPrivateTickets-2.3.0
+
+%build
+%py3_build
+
+%install
+%py3_install
+install -d -m755 %{buildroot}/%{_pkgdocdir}
+if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi
+if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi
+if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi
+if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi
+pushd %{buildroot}
+if [ -d usr/lib ]; then
+ find usr/lib -type f -printf "\"/%h/%f\"\n" >> filelist.lst
+fi
+if [ -d usr/lib64 ]; then
+ find usr/lib64 -type f -printf "\"/%h/%f\"\n" >> filelist.lst
+fi
+if [ -d usr/bin ]; then
+ find usr/bin -type f -printf "\"/%h/%f\"\n" >> filelist.lst
+fi
+if [ -d usr/sbin ]; then
+ find usr/sbin -type f -printf "\"/%h/%f\"\n" >> filelist.lst
+fi
+touch doclist.lst
+if [ -d usr/share/man ]; then
+ find usr/share/man -type f -printf "\"/%h/%f.gz\"\n" >> doclist.lst
+fi
+popd
+mv %{buildroot}/filelist.lst .
+mv %{buildroot}/doclist.lst .
+
+%files -n python3-TracPrivateTickets -f filelist.lst
+%dir %{python3_sitelib}/*
+
+%files help -f doclist.lst
+%{_docdir}/*
+
+%changelog
+* Tue Jun 20 2023 Python_Bot <Python_Bot@openeuler.org> - 2.3.0-1
+- Package Spec generated
diff --git a/sources b/sources
new file mode 100644
index 0000000..7601875
--- /dev/null
+++ b/sources
@@ -0,0 +1 @@
+22627578607b9ab6630e39960e63cf5e TracPrivateTickets-2.3.0.tar.gz