diff options
-rw-r--r-- | .gitignore | 1 | ||||
-rw-r--r-- | python-pol.spec | 135 | ||||
-rw-r--r-- | sources | 1 |
3 files changed, 137 insertions, 0 deletions
@@ -0,0 +1 @@ +/pol-0.4.1.tar.gz diff --git a/python-pol.spec b/python-pol.spec new file mode 100644 index 0000000..95c34ec --- /dev/null +++ b/python-pol.spec @@ -0,0 +1,135 @@ +%global _empty_manifest_terminate_build 0 +Name: python-pol +Version: 0.4.1 +Release: 1 +Summary: pol, a modern password manager +License: GPL 3.0 +URL: https://getpol.org +Source0: https://mirrors.aliyun.com/pypi/web/packages/9e/73/be8e956f4609b9aa986135d074140338d44aef844c93cd60e48485c407a0/pol-0.4.1.tar.gz +BuildArch: noarch + + +%description +pol /pɵl/ is a password manager with two important features: +1. A nice commandline interface. Want to generate a password? Just type: + $ pol generate github "my username is John Doo" + Enter (append-)password: + Copied password to clipboard. Press any key to clear ... + This will generate a new password; copy it to the clipboard and store + it under the key *github* with the note *my username is John Doo*. + Want to retrieve the password you just stored? Just type: + $ pol copy github + Enter password: + note: 'my username is John Doo' + Copied secret to clipboard. Press any key to clear ... + See below for a description of all commands. +2. Hidden containers. The best way to keep a secret, is being able to + deny you are keeping one. Sometimes you are forced to give up your + passwords. For instance, by a criminal, government or employer. + Luckily a pol safe can have multiple containers. Each container is + opened by its own passwords. If someone does not have a password of a + container, he cannot prove the existence of the container in any way. + Even if he has multiple versions of your safe! Thus if you are forced + to open your pol safe, you can give a password to an uninteresting + container and keep your real secrets safe. + +%package -n python3-pol +Summary: pol, a modern password manager +Provides: python-pol +BuildRequires: python3-devel +BuildRequires: python3-setuptools +BuildRequires: python3-pip +%description -n python3-pol +pol /pɵl/ is a password manager with two important features: +1. A nice commandline interface. Want to generate a password? Just type: + $ pol generate github "my username is John Doo" + Enter (append-)password: + Copied password to clipboard. Press any key to clear ... + This will generate a new password; copy it to the clipboard and store + it under the key *github* with the note *my username is John Doo*. + Want to retrieve the password you just stored? Just type: + $ pol copy github + Enter password: + note: 'my username is John Doo' + Copied secret to clipboard. Press any key to clear ... + See below for a description of all commands. +2. Hidden containers. The best way to keep a secret, is being able to + deny you are keeping one. Sometimes you are forced to give up your + passwords. For instance, by a criminal, government or employer. + Luckily a pol safe can have multiple containers. Each container is + opened by its own passwords. If someone does not have a password of a + container, he cannot prove the existence of the container in any way. + Even if he has multiple versions of your safe! Thus if you are forced + to open your pol safe, you can give a password to an uninteresting + container and keep your real secrets safe. + +%package help +Summary: Development documents and examples for pol +Provides: python3-pol-doc +%description help +pol /pɵl/ is a password manager with two important features: +1. A nice commandline interface. Want to generate a password? Just type: + $ pol generate github "my username is John Doo" + Enter (append-)password: + Copied password to clipboard. Press any key to clear ... + This will generate a new password; copy it to the clipboard and store + it under the key *github* with the note *my username is John Doo*. + Want to retrieve the password you just stored? Just type: + $ pol copy github + Enter password: + note: 'my username is John Doo' + Copied secret to clipboard. Press any key to clear ... + See below for a description of all commands. +2. Hidden containers. The best way to keep a secret, is being able to + deny you are keeping one. Sometimes you are forced to give up your + passwords. For instance, by a criminal, government or employer. + Luckily a pol safe can have multiple containers. Each container is + opened by its own passwords. If someone does not have a password of a + container, he cannot prove the existence of the container in any way. + Even if he has multiple versions of your safe! Thus if you are forced + to open your pol safe, you can give a password to an uninteresting + container and keep your real secrets safe. + +%prep +%autosetup -n pol-0.4.1 + +%build +%py3_build + +%install +%py3_install +install -d -m755 %{buildroot}/%{_pkgdocdir} +if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi +if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi +if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi +if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi +pushd %{buildroot} +if [ -d usr/lib ]; then + find usr/lib -type f -printf "\"/%h/%f\"\n" >> filelist.lst +fi +if [ -d usr/lib64 ]; then + find usr/lib64 -type f -printf "\"/%h/%f\"\n" >> filelist.lst +fi +if [ -d usr/bin ]; then + find usr/bin -type f -printf "\"/%h/%f\"\n" >> filelist.lst +fi +if [ -d usr/sbin ]; then + find usr/sbin -type f -printf "\"/%h/%f\"\n" >> filelist.lst +fi +touch doclist.lst +if [ -d usr/share/man ]; then + find usr/share/man -type f -printf "\"/%h/%f.gz\"\n" >> doclist.lst +fi +popd +mv %{buildroot}/filelist.lst . +mv %{buildroot}/doclist.lst . + +%files -n python3-pol -f filelist.lst +%dir %{python3_sitelib}/* + +%files help -f doclist.lst +%{_docdir}/* + +%changelog +* Tue Jun 20 2023 Python_Bot <Python_Bot@openeuler.org> - 0.4.1-1 +- Package Spec generated @@ -0,0 +1 @@ +ac6090abd538a3b2b483ef833474457c pol-0.4.1.tar.gz |