Hello community,

here is the log from the commit of package radamsa for openSUSE:Factory checked 
in at 2016-04-05 10:43:51
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/radamsa (Old)
 and      /work/SRC/openSUSE:Factory/.radamsa.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "radamsa"

Changes:
--------
--- /work/SRC/openSUSE:Factory/radamsa/radamsa.changes  2015-10-08 
08:26:14.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.radamsa.new/radamsa.changes     2016-04-05 
10:43:53.000000000 +0200
@@ -1,0 +2,5 @@
+Sat Mar 26 12:13:41 UTC 2016 - [email protected]
+
+- Small spec file cleanup
+
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ radamsa.spec ++++++
--- /var/tmp/diff_new_pack.4alDQB/_old  2016-04-05 10:43:54.000000000 +0200
+++ /var/tmp/diff_new_pack.4alDQB/_new  2016-04-05 10:43:54.000000000 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package radamsa
 #
-# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -29,7 +29,13 @@
 BuildRoot:      %{_tmppath}/%{name}-%{version}-build
 
 %description
-Radamsa is a test case generator for robustness testing, aka a fuzzer. It can 
be used to test how well a program can stand malformed and potentially 
malicious inputs. It operates based on given sample inputs and thus requires 
minimal effort to set up. The main selling points of radamsa are that it is 
easy to use, contains several old and new fuzzing algorithms, is easy to script 
from command line and has already been used to find a slew of bugs in programs 
that actually matter.
+Radamsa is a test case generator for robustness testing, aka a fuzzer. It
+can be used to test how well a program can stand malformed and potentially
+malicious inputs. It operates based on given sample inputs and thus
+requires minimal effort to set up. The main selling points of radamsa are
+that it is easy to use, contains several old and new fuzzing algorithms, is
+easy to script from command line and has already been used to find a slew
+of bugs in programs that actually matter.
 
 %prep
 %setup -q
@@ -38,12 +44,12 @@
 make %{?_smp_mflags} CFLAGS="%{optflags}"
 
 %install
-make DESTDIR=%{buildroot} install %{?_smp_mflags}
+make %{?_smp_mflags} DESTDIR=%{buildroot} install
 
 %files
 %defattr(-,root,root)
+%doc LICENCE readme.txt
 %{_bindir}/%{name}
-%{_mandir}/man1/%{name}.1.*
-%doc readme.txt LICENCE
+%{_mandir}/man1/%{name}.1%{ext_man}
 
 %changelog




Reply via email to