%global _empty_manifest_terminate_build 0 Name: python-snallygaster Version: 0.0.12 Release: 1 Summary: Tool to scan for secret files on HTTP servers License: CC0 URL: https://github.com/hannob/snallygaster Source0: https://mirrors.nju.edu.cn/pypi/web/packages/65/16/59949030d2d69ae72fcea8206adfcc1a9e1a596f20f0ff9e1893b8d3fe5d/snallygaster-0.0.12.tar.gz BuildArch: noarch Requires: python3-urllib3 Requires: python3-beautifulsoup4 Requires: python3-dnspython %description snallygaster is a tool that looks for files accessible on web servers that shouldn't be public and can pose a security risk. Typical examples include publicly accessible git repositories, backup files potentially containing passwords or database dumps. In addition, it contains a few checks for other security vulnerabilities. As an introduction to these kinds of issues you may want to watch this talk: * [Attacking with HTTP Requests](https://www.youtube.com/watch?v=Bppr9rbmwz4) See the [TESTS.md](TESTS.md) file for an overview of all tests and links to further information about the issues. %package -n python3-snallygaster Summary: Tool to scan for secret files on HTTP servers Provides: python-snallygaster BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-snallygaster snallygaster is a tool that looks for files accessible on web servers that shouldn't be public and can pose a security risk. Typical examples include publicly accessible git repositories, backup files potentially containing passwords or database dumps. In addition, it contains a few checks for other security vulnerabilities. As an introduction to these kinds of issues you may want to watch this talk: * [Attacking with HTTP Requests](https://www.youtube.com/watch?v=Bppr9rbmwz4) See the [TESTS.md](TESTS.md) file for an overview of all tests and links to further information about the issues. %package help Summary: Development documents and examples for snallygaster Provides: python3-snallygaster-doc %description help snallygaster is a tool that looks for files accessible on web servers that shouldn't be public and can pose a security risk. Typical examples include publicly accessible git repositories, backup files potentially containing passwords or database dumps. In addition, it contains a few checks for other security vulnerabilities. As an introduction to these kinds of issues you may want to watch this talk: * [Attacking with HTTP Requests](https://www.youtube.com/watch?v=Bppr9rbmwz4) See the [TESTS.md](TESTS.md) file for an overview of all tests and links to further information about the issues. %prep %autosetup -n snallygaster-0.0.12 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "/%h/%f\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "/%h/%f\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "/%h/%f.gz\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-snallygaster -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Thu Mar 09 2023 Python_Bot - 0.0.12-1 - Package Spec generated