Hello community,

here is the log from the commit of package pam_userpass for openSUSE:Factory 
checked in at 2019-11-28 10:17:30
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/pam_userpass (Old)
 and      /work/SRC/openSUSE:Factory/.pam_userpass.new.26869 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "pam_userpass"

Thu Nov 28 10:17:30 2019 rev:19 rq:751485 version:1.0.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/pam_userpass/pam_userpass.changes        
2012-04-23 16:12:17.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.pam_userpass.new.26869/pam_userpass.changes     
2019-11-28 10:17:45.647639379 +0100
@@ -1,0 +2,6 @@
+Mon Nov 11 13:41:44 UTC 2019 - Martin Pluskal <[email protected]>
+
+- Cleanup spec file
+- Use url for sources
+
+-------------------------------------------------------------------

Old:
----
  pam_userpass-1.0.2.tar.bz2

New:
----
  pam_userpass-1.0.2.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ pam_userpass.spec ++++++
--- /var/tmp/diff_new_pack.hXhOAW/_old  2019-11-28 10:17:46.107639384 +0100
+++ /var/tmp/diff_new_pack.hXhOAW/_new  2019-11-28 10:17:46.111639384 +0100
@@ -1,7 +1,7 @@
 #
-# spec file for package pam_userpass (Version 1.0.2)
+# spec file for package pam_userpass
 #
-# Copyright (c) 2010 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -12,28 +12,23 @@
 # license that conforms to the Open Source Definition (Version 1.9)
 # published by the Open Source Initiative.
 
-# Please submit bugfixes or comments via http://bugs.opensuse.org/
+# Please submit bugfixes or comments via https://bugs.opensuse.org/
 #
 
-# norootforbuild
-
 
 Name:           pam_userpass
-Url:            http://www.openwall.com/pam/
-BuildRequires:  pam-devel
-License:        ISC
-Group:          System/Libraries
-Requires:       pam
-Provides:       pam-modules:/%_lib/security/pam_userpass.so
-AutoReqProv:    on
 Version:        1.0.2
-Release:        43
+Release:        0
 Summary:        Uses PAM Binary Prompts to Ask Applications for 
Username/Password
-Source0:        pam_userpass-1.0.2.tar.bz2
+License:        ISC
+URL:            https://www.openwall.com/pam/
+Source0:        
https://www.openwall.com/pam/modules/pam_userpass/pam_userpass-%{version}.tar.gz
 Source1:        baselibs.conf
 Source50:       dlopen.sh
 Patch0:         pam_userpass-1.0.diff
-BuildRoot:      %{_tmppath}/%{name}-%{version}-build
+BuildRequires:  pam-devel
+Requires:       pam
+Provides:       pam-modules:/%{_lib}/security/pam_userpass.so
 
 %description
 PAM (Pluggable Authentication Modules) is a system security tool that
@@ -43,48 +38,39 @@
 pam_userpass uses PAM binary prompts to ask the application for the
 username and password.
 
-
-
 %prep
-%setup   
-%patch0
+%autosetup
 
 %build
 EXTRA_CFLAGS="-fno-strict-aliasing -Iinclude"
-# ia64 is noexecstack by default
-%ifnarch ia64
-    EXTRA_CFLAGS="$EXTRA_CFLAGS -Wa,--noexecstack"
-%endif
-make CFLAGS="$RPM_OPT_FLAGS $EXTRA_CFLAGS -fPIC -DHAVE_SHADOW -DLINUX_PAM"
+make %{?_smp_mflags} CFLAGS="%{optflags} $EXTRA_CFLAGS -fPIC -DHAVE_SHADOW 
-DLINUX_PAM"
 
 %install
-mkdir -p $RPM_BUILD_ROOT/%{_lib}/security
-make DESTDIR=$RPM_BUILD_ROOT install
+mkdir -p %{buildroot}/%{_lib}/security
+%make_install
 #
 # Remove stuff we don't wish to have now:
 #
-rm -rf $RPM_BUILD_ROOT/usr/{include,lib}
-rm -rf $RPM_BUILD_ROOT/%{_lib}/security/*.la
+rm -rf %{buildroot}%{_prefix}/{include,lib}
+find %{buildroot} -type f -name "*.la" -delete -print
 #
 # On 64bit archs, we need to move same libraries ourself:
 #
-if [ %_lib = lib64 ]; then
-  mv $RPM_BUILD_ROOT/lib/security/* $RPM_BUILD_ROOT/%{_lib}/security/
+if [ %{_lib} = lib64 ]; then
+  mv %{buildroot}/lib/security/* %{buildroot}/%{_lib}/security/
 fi
 # Check for module problems.  Specifically, check that every module we just
 # installed can actually be loaded by a minimal PAM-aware application.
-for module in $RPM_BUILD_ROOT/%{_lib}/security/pam*.so ; do
+for module in %{buildroot}/%{_lib}/security/pam*.so ; do
    if ! sh $RPM_SOURCE_DIR/dlopen.sh -lpam -ldl ${module} ; then
       exit 1
    fi
 done
 
-%clean
-rm -rf $RPM_BUILD_ROOT
-
 %files 
 %defattr(-,root,root,755)
-%doc LICENSE README conf/* 
+%license LICENSE
+%doc README conf/*
 %attr(755,root,root) /%{_lib}/security/pam_*.so
 
 %changelog


Reply via email to