.gear/rules | 5 +++ .gear/slirp4netns.spec | 51 ++++++++++++++++++++++ .../tags/e315ea4b006d9b80ece15fa49c28db39edd0dfb0 | 20 +++++++++ .gear/tags/list | 1 + 4 files changed, 77 insertions(+) diff --git a/.gear/rules b/.gear/rules new file mode 100644 index 0000000..08868eb --- /dev/null +++ b/.gear/rules @@ -0,0 +1,5 @@ +tar: v@version@:. name=@name@-@version@ +diff: v@version@:. . name=@name@-@version@-alt.patch +copy?: .gear/*.patch +copy?: .gear/*.diff +spec: .gear/slirp4netns.spec diff --git a/.gear/slirp4netns.spec b/.gear/slirp4netns.spec new file mode 100644 index 0000000..4e46bc5 --- /dev/null +++ b/.gear/slirp4netns.spec @@ -0,0 +1,51 @@ +Name: slirp4netns +Version: 1.1.12 +Release: alt1 +Summary: User-mode networking for unprivileged network namespaces + +Group: System/Configuration/Other +License: GPLv2 +Url: https://github.com/rootless-containers/slirp4netns +Source: %name-%version.tar +Patch: %name-%version-alt.patch + +BuildRequires: libglib2-devel libcap-devel libseccomp-devel libslirp-devel + +%description +Starting with Linux 3.8, unprivileged users can create +network_namespaces(7) along with user_namespaces(7). However, +unprivileged network namespaces had not been very useful, because +creating veth(4) pairs across the host and network namespaces still +requires the root privileges. (i.e. No internet connection) + +slirp4netns allows connecting a network namespace to the Internet in a +completely unprivileged way, by connecting a TAP device in a network +namespace to the usermode TCP/IP stack ("slirp"). + +%prep +%setup +%patch -p1 + +%build +%autoreconf +%configure +%make_build + +%install +%makeinstall_std + +%files +%_bindir/%name +%doc README.md +%_man1dir/%name.* + + +%changelog +* Mon Jan 31 2022 Mikhail Gordeev 1.1.12-alt1 +- 1.1.12 + +* Sat Dec 7 2019 Terechkov Evgenii 0.4.2-alt1 +- 0.4.2 + +* Sat Jun 8 2019 Terechkov Evgenii 0.3.0-alt1 +- Initial build for ALT Linux Sisyphus diff --git a/.gear/tags/e315ea4b006d9b80ece15fa49c28db39edd0dfb0 b/.gear/tags/e315ea4b006d9b80ece15fa49c28db39edd0dfb0 new file mode 100644 index 0000000..b6419de --- /dev/null +++ b/.gear/tags/e315ea4b006d9b80ece15fa49c28db39edd0dfb0 @@ -0,0 +1,20 @@ +object 7a104a101aa3278a2152351a082a6df71f57c9a3 +type commit +tag v1.1.12 +tagger Akihiro Suda 1627980647 +0900 + +v1.1.12 +-----BEGIN PGP SIGNATURE----- + +iQGzBAABCgAdFiEEwCDqh2zk4Gx6uVrvSVJMb59jjxoFAmEJA2oACgkQSVJMb59j +jxp4Qgv9GTMZbnFOAwGDQMMExh79hkiD/oRTSOfCZXfDHC2Eww+5nD2n/qzAEyrp +1OkS1MlXhJuBg96UgYlhgJtdP8vrDZG3iT/2xeZtwoxWcgLFFiQRSL+DPrbCgJwv +BhycMhEt4rjXOC1A0V76zDXxVVmq5HS9kBxnCKlkFLzh5BaF/JxJe2TNRIBMC2ID +pFEP1ZcvZqDyjKD8yw9J3160wN37XG0FsMm67RUZ9AcE8PniPu4ympfN6LtSSDg1 +M4fiuopqgKtKVa5y4qj4FgWvlR/fRt/RPu5CTnaUyPrZDCfx7qtuLlZT+/VoDv1l +k/VCQhzBIybjeZXUhUVLSjbySS+QF6FEIzvVvnof2CscU8eNxsrA19UnLD6MQZa4 +PSh+YhrRVsAS8/0XWY5ikFHnZPOdrj7GJ3dnuyTI8cAn0fyNfZW6zI1UaNE7zawk +Rs6wuS8KyPWo2dWYYcVFrU4ruZm47ivwICK4ZUONDB+zlsz4n93t7UGdFmYyDgcE +d129ZlSj +=VvXQ +-----END PGP SIGNATURE----- diff --git a/.gear/tags/list b/.gear/tags/list new file mode 100644 index 0000000..de8d219 --- /dev/null +++ b/.gear/tags/list @@ -0,0 +1 @@ +e315ea4b006d9b80ece15fa49c28db39edd0dfb0 v1.1.12