Hello community, here is the log from the commit of package radamsa for openSUSE:Factory checked in at 2016-04-05 10:43:51 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/radamsa (Old) and /work/SRC/openSUSE:Factory/.radamsa.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "radamsa" Changes: -------- --- /work/SRC/openSUSE:Factory/radamsa/radamsa.changes 2015-10-08 08:26:14.000000000 +0200 +++ /work/SRC/openSUSE:Factory/.radamsa.new/radamsa.changes 2016-04-05 10:43:53.000000000 +0200 @@ -1,0 +2,5 @@ +Sat Mar 26 12:13:41 UTC 2016 - [email protected] + +- Small spec file cleanup + +------------------------------------------------------------------- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ radamsa.spec ++++++ --- /var/tmp/diff_new_pack.4alDQB/_old 2016-04-05 10:43:54.000000000 +0200 +++ /var/tmp/diff_new_pack.4alDQB/_new 2016-04-05 10:43:54.000000000 +0200 @@ -1,7 +1,7 @@ # # spec file for package radamsa # -# Copyright (c) 2015 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2016 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -29,7 +29,13 @@ BuildRoot: %{_tmppath}/%{name}-%{version}-build %description -Radamsa is a test case generator for robustness testing, aka a fuzzer. It can be used to test how well a program can stand malformed and potentially malicious inputs. It operates based on given sample inputs and thus requires minimal effort to set up. The main selling points of radamsa are that it is easy to use, contains several old and new fuzzing algorithms, is easy to script from command line and has already been used to find a slew of bugs in programs that actually matter. +Radamsa is a test case generator for robustness testing, aka a fuzzer. It +can be used to test how well a program can stand malformed and potentially +malicious inputs. It operates based on given sample inputs and thus +requires minimal effort to set up. The main selling points of radamsa are +that it is easy to use, contains several old and new fuzzing algorithms, is +easy to script from command line and has already been used to find a slew +of bugs in programs that actually matter. %prep %setup -q @@ -38,12 +44,12 @@ make %{?_smp_mflags} CFLAGS="%{optflags}" %install -make DESTDIR=%{buildroot} install %{?_smp_mflags} +make %{?_smp_mflags} DESTDIR=%{buildroot} install %files %defattr(-,root,root) +%doc LICENCE readme.txt %{_bindir}/%{name} -%{_mandir}/man1/%{name}.1.* -%doc readme.txt LICENCE +%{_mandir}/man1/%{name}.1%{ext_man} %changelog
