Hello community,

here is the log from the commit of package perl-Crypt-Blowfish for 
openSUSE:Factory
checked in at Mon Sep 5 17:59:42 CEST 2011.



--------
--- perl-Crypt-Blowfish/perl-Crypt-Blowfish.changes     2010-12-05 
11:47:44.000000000 +0100
+++ perl-Crypt-Blowfish/perl-Crypt-Blowfish.changes     2011-08-27 
01:27:03.000000000 +0200
@@ -1,0 +2,7 @@
+Fri Aug 26 23:23:16 UTC 2011 - [email protected]
+
+- cpanspec
+- added bcond_with opt
+  o test optional pkgs via local build (osc build --with opt)
+
+-------------------------------------------------------------------

calling whatdependson for head-i586


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ perl-Crypt-Blowfish.spec ++++++
--- /var/tmp/diff_new_pack.IEwrpc/_old  2011-09-05 17:58:38.000000000 +0200
+++ /var/tmp/diff_new_pack.IEwrpc/_new  2011-09-05 17:58:38.000000000 +0200
@@ -1,7 +1,7 @@
 #
-# spec file for package perl-Crypt-Blowfish (Version 2.12)
+# spec file for package perl-Crypt-Blowfish
 #
-# Copyright (c) 2010 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2011 SUSE LINUX Products GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -15,51 +15,40 @@
 # Please submit bugfixes or comments via http://bugs.opensuse.org/
 #
 
-# norootforbuild
 
+%bcond_with opt
 
 Name:           perl-Crypt-Blowfish
-%define cpan_name Crypt-Blowfish
-Summary:        Perl Blowfish encryption module
 Version:        2.12
-Release:        7
+Release:        15
 License:        BSD3c
+%define cpan_name Crypt-Blowfish
+Summary:        Perl Blowfish encryption module
 Group:          Development/Libraries/Perl
 Url:            http://search.cpan.org/dist/Crypt-Blowfish/
-#Source:         
http://www.cpan.org/authors/id/D/DP/DPARIS/Crypt-Blowfish-2.12.tar.gz
-Source:         %{cpan_name}-%{version}.tar.bz2
+#Source:        
http://www.cpan.org/authors/id/D/DP/DPARIS/%{cpan_name}-%{version}.tar.gz
+Source:         Crypt-Blowfish-2.12.tar.bz2
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
-%{perl_requires}
 BuildRequires:  perl
 BuildRequires:  perl-macros
-#BuildRequires:  perl(Crypt::CBC) >= 1.22
-#
-Recommends:     perl(Crypt::CBC) >= 1.22
+%if %{with opt}
+BuildRequires:  perl(Crypt::CBC)
+%endif
+%if 0%{?suse_version} > 1010
+Recommends:     perl(Crypt::CBC)
+%endif
+%{perl_requires}
 
 %description
 Blowfish is capable of strong encryption and can use key sizes up to 56
 bytes (a 448 bit key). You're encouraged to take advantage of the full key
 size to ensure the strongest encryption possible from this module.
 
-Crypt::Blowfish has the following methods:
-
-     blocksize()
-     keysize()
-     encrypt()
-     decrypt()
-
-Authors:
---------
-     Original algorithm, Bruce Shneier. Original implementation, A.M. Kuchling.
-     Original Perl implementation, Systemics Ltd. Current maintenance by
-     W3Works, LLC.
-     Current revision and maintainer: Dave Paris <[email protected]>
-
 %prep
 %setup -q -n %{cpan_name}-%{version}
 
 %build
-%{__perl} Makefile.PL INSTALLDIRS=vendor OPTIMIZE="$RPM_OPT_FLAGS"
+%{__perl} Makefile.PL INSTALLDIRS=vendor OPTIMIZE="%{optflags}"
 %{__make} %{?_smp_mflags}
 
 %check
@@ -67,24 +56,14 @@
 
 %install
 %perl_make_install
-### since 11.4 perl_process_packlist
-### removes .packlist, perllocal.pod files
-%if 0%{?suse_version} > 1130
 %perl_process_packlist
-%else
-# do not perl_process_packlist
-# remove .packlist file
-%{__rm} -f $RPM_BUILD_ROOT%perl_vendorarch/auto/Crypt/Blowfish/.packlist
-# remove perllocal.pod file
-%{__rm} -f $RPM_BUILD_ROOT%perl_archlib/perllocal.pod
-%endif
 %perl_gen_filelist
 
 %clean
-%{__rm} -rf $RPM_BUILD_ROOT
+%{__rm} -rf %{buildroot}
 
 %files -f %{name}.files
-%defattr(-,root,root,-)
+%defattr(-,root,root,755)
 %doc Changes COPYRIGHT README
 
 %changelog


++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



Remember to have fun...

-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to