Hello community,

here is the log from the commit of package libsecprog for openSUSE:Factory 
checked in at 2011-11-28 14:49:23
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/libsecprog (Old)
 and      /work/SRC/openSUSE:Factory/.libsecprog.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "libsecprog", Maintainer is "[email protected]"

Changes:
--------
--- /work/SRC/openSUSE:Factory/libsecprog/libsecprog.changes    2011-11-22 
17:48:25.000000000 +0100
+++ /work/SRC/openSUSE:Factory/.libsecprog.new/libsecprog.changes       
2011-11-28 14:49:25.000000000 +0100
@@ -1,0 +2,8 @@
+Tue Nov 22 15:39:28 UTC 2011 - [email protected]
+
+- Remove redundant/unwanted tags/section (cf. specfile guidelines)
+- Use %_smp_mflags for parallel building
+- Employ shlib packaging
+- Simply filelists, attrs are not needed
+
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ libsecprog.spec ++++++
--- /var/tmp/diff_new_pack.0qfoyJ/_old  2011-11-28 14:49:26.000000000 +0100
+++ /var/tmp/diff_new_pack.0qfoyJ/_new  2011-11-28 14:49:26.000000000 +0100
@@ -18,7 +18,8 @@
 
 
 Name:           libsecprog
-Url:            http://www.suse.de/~thomas/projects/secproglib/index.html
+%define lname  libsecprog0
+URL:            http://www.suse.de/~thomas/projects/secproglib/index.html
 Summary:        Secure Replacements for Problematic C Functions
 Version:        0.8
 Release:        142
@@ -37,17 +38,24 @@
 safe_reopen() or sigprotection(), that can be used for developing
 exposed applications.
 
+%package -n %lname
+Summary:        Secure Replacements for Problematic C Functions
+Group:          System/Libraries
+# O/P added 2011-11-27
+Obsoletes:      libsecprog < %version-%release
+Provides:       libsecprog = %version-%release
 
-
-Authors:
---------
-    Thomas Biege <[email protected]>
+%description -n %lname
+The "Secure Programming Library" provides several functions that should
+serve as a replacement for problematic C functions from glibc. Besides
+the replacement functions, there are some helper functions, such as
+safe_reopen() or sigprotection(), that can be used for developing
+exposed applications.
 
 %package devel
-License:        GPL v2 or later
 Group:          Development/Libraries/C and C++
 Summary:        Secure Replacements for Problematic C Functions
-Requires:       %{name} = %{version} glibc-devel
+Requires:       %lname = %version, glibc-devel
 
 %description devel
 The "Secure Programming Library" provides several functions that should
@@ -56,12 +64,6 @@
 safe_reopen() or sigprotection()) that can be used for developing
 exposed applications.
 
-
-
-Authors:
---------
-    Thomas Biege <[email protected]>
-
 %prep
 %setup -q -n libsecprog
 %patch1 -p1
@@ -71,28 +73,25 @@
 autoreconf --install
 export CFLAGS="$RPM_OPT_FLAGS"
 %configure --disable-static --with-pic
-make
+make %{?_smp_mflags}
 
 %install
 make DESTDIR=$RPM_BUILD_ROOT install
+rm -f "%buildroot/%_libdir"/*.la
 
-%clean
-rm -rf $RPM_BUILD_ROOT
-
-%post -p /sbin/ldconfig
+%post -n %lname -p /sbin/ldconfig
 
-%postun -p /sbin/ldconfig
+%postun -n %lname -p /sbin/ldconfig
 
-%files
+%files -n %lname
 %defattr(-,root,root)
 %doc AUTHORS COPYING ChangeLog INSTALL NEWS README
-%attr(555,root,root) %{_libdir}/libsecprog.so.*
+%_libdir/libsecprog.so.0*
 
 %files devel
 %defattr(-,root,root)
-%attr(555,root,root) %{_libdir}/libsecprog.so
-%attr(444,root,root) /usr/include/secprog.h
-%doc %attr(444,root,root) %{_mandir}/man3/secprog.3.*
-%exclude %{_libdir}/libsecprog.la
+%_libdir/libsecprog.so
+%_includedir/secprog.h
+%_mandir/man*/*
 
 %changelog

-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to