Author: qboosh                       Date: Sun Oct  8 13:13:30 2006 GMT
Module: SPECS                         Tag: HEAD
---- Log message:
- pl

---- Files affected:
SPECS:
   ruby-password.spec (1.4 -> 1.5) 

---- Diffs:

================================================================
Index: SPECS/ruby-password.spec
diff -u SPECS/ruby-password.spec:1.4 SPECS/ruby-password.spec:1.5
--- SPECS/ruby-password.spec:1.4        Wed Sep 27 22:43:10 2006
+++ SPECS/ruby-password.spec    Sun Oct  8 15:13:25 2006
@@ -1,5 +1,6 @@
 # $Revision$, $Date$
 Summary:       Ruby password manipulation library
+Summary(pl):   Biblioteka operacji na hasłach dla języka Ruby
 Name:          ruby-password
 Version:       0.5.3
 Release:       1
@@ -11,7 +12,6 @@
 URL:           http://www.caliban.org/ruby/ruby-password.shtml
 BuildRequires: cracklib-devel
 BuildRequires: cracklib-dicts
-BuildRequires: cracklib-dicts
 BuildRequires: rpmbuild(macros) >= 1.277
 BuildRequires: ruby-devel
 Requires:      cracklib-dicts
@@ -26,6 +26,13 @@
 password generation, phonemic password generation (for easy
 memorisation by human-beings) and the encryption of passwords.
 
+%description -l pl
+Ruby/Password to zestaw metod do operacji na hasłach dla języka Ruby.
+Obsługuje ręczne wprowadzanie haseł z klawiatury zarówno w trybie
+buforowanym jak i niebuforowanym, sprawdzanie jakości haseł, losowe
+generowanie haseł, generowanie haseł fonematycznych (do łatwego
+zapamiętania dla ludzi) oraz szyfrowanie haseł.
+
 %prep
 %setup -q
 %patch0 -p1
@@ -67,6 +74,9 @@
 All persons listed below can be reached at <cvs_login>@pld-linux.org
 
 $Log$
+Revision 1.5  2006/10/08 13:13:25  qboosh
+- pl
+
 Revision 1.4  2006/09/27 20:43:10  glen
 - adapter, cleanup
 
================================================================

---- CVS-web:
    http://cvs.pld-linux.org/SPECS/ruby-password.spec?r1=1.4&r2=1.5&f=u

_______________________________________________
pld-cvs-commit mailing list
[email protected]
http://lists.pld-linux.org/mailman/listinfo/pld-cvs-commit

Reply via email to