Hello community, here is the log from the commit of package libsecprog for openSUSE:Factory checked in at 2011-11-28 14:49:23 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/libsecprog (Old) and /work/SRC/openSUSE:Factory/.libsecprog.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "libsecprog", Maintainer is "[email protected]" Changes: -------- --- /work/SRC/openSUSE:Factory/libsecprog/libsecprog.changes 2011-11-22 17:48:25.000000000 +0100 +++ /work/SRC/openSUSE:Factory/.libsecprog.new/libsecprog.changes 2011-11-28 14:49:25.000000000 +0100 @@ -1,0 +2,8 @@ +Tue Nov 22 15:39:28 UTC 2011 - [email protected] + +- Remove redundant/unwanted tags/section (cf. specfile guidelines) +- Use %_smp_mflags for parallel building +- Employ shlib packaging +- Simply filelists, attrs are not needed + +------------------------------------------------------------------- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ libsecprog.spec ++++++ --- /var/tmp/diff_new_pack.0qfoyJ/_old 2011-11-28 14:49:26.000000000 +0100 +++ /var/tmp/diff_new_pack.0qfoyJ/_new 2011-11-28 14:49:26.000000000 +0100 @@ -18,7 +18,8 @@ Name: libsecprog -Url: http://www.suse.de/~thomas/projects/secproglib/index.html +%define lname libsecprog0 +URL: http://www.suse.de/~thomas/projects/secproglib/index.html Summary: Secure Replacements for Problematic C Functions Version: 0.8 Release: 142 @@ -37,17 +38,24 @@ safe_reopen() or sigprotection(), that can be used for developing exposed applications. +%package -n %lname +Summary: Secure Replacements for Problematic C Functions +Group: System/Libraries +# O/P added 2011-11-27 +Obsoletes: libsecprog < %version-%release +Provides: libsecprog = %version-%release - -Authors: --------- - Thomas Biege <[email protected]> +%description -n %lname +The "Secure Programming Library" provides several functions that should +serve as a replacement for problematic C functions from glibc. Besides +the replacement functions, there are some helper functions, such as +safe_reopen() or sigprotection(), that can be used for developing +exposed applications. %package devel -License: GPL v2 or later Group: Development/Libraries/C and C++ Summary: Secure Replacements for Problematic C Functions -Requires: %{name} = %{version} glibc-devel +Requires: %lname = %version, glibc-devel %description devel The "Secure Programming Library" provides several functions that should @@ -56,12 +64,6 @@ safe_reopen() or sigprotection()) that can be used for developing exposed applications. - - -Authors: --------- - Thomas Biege <[email protected]> - %prep %setup -q -n libsecprog %patch1 -p1 @@ -71,28 +73,25 @@ autoreconf --install export CFLAGS="$RPM_OPT_FLAGS" %configure --disable-static --with-pic -make +make %{?_smp_mflags} %install make DESTDIR=$RPM_BUILD_ROOT install +rm -f "%buildroot/%_libdir"/*.la -%clean -rm -rf $RPM_BUILD_ROOT - -%post -p /sbin/ldconfig +%post -n %lname -p /sbin/ldconfig -%postun -p /sbin/ldconfig +%postun -n %lname -p /sbin/ldconfig -%files +%files -n %lname %defattr(-,root,root) %doc AUTHORS COPYING ChangeLog INSTALL NEWS README -%attr(555,root,root) %{_libdir}/libsecprog.so.* +%_libdir/libsecprog.so.0* %files devel %defattr(-,root,root) -%attr(555,root,root) %{_libdir}/libsecprog.so -%attr(444,root,root) /usr/include/secprog.h -%doc %attr(444,root,root) %{_mandir}/man3/secprog.3.* -%exclude %{_libdir}/libsecprog.la +%_libdir/libsecprog.so +%_includedir/secprog.h +%_mandir/man*/* %changelog -- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
