From: Elan Ruusamäe Date: Wed, 25 Sep 2013 17:27:09 +0000 (+0300) Subject: new, version 0.9.4 X-Git-Tag: auto/th/ruby-safe_yaml-0.9.4-1~2 X-Git-Url: http://git.pld-linux.org/gitweb.cgi?a=commitdiff_plain;h=d7b670532ea14852840c4daf76a88f103379b692;p=packages%2Fruby-safe_yaml.git new, version 0.9.4 created with gem2rpm --- d7b670532ea14852840c4daf76a88f103379b692 diff --git a/ruby-safe_yaml.spec b/ruby-safe_yaml.spec new file mode 100644 index 0000000..e8c8561 --- /dev/null +++ b/ruby-safe_yaml.spec @@ -0,0 +1,34 @@ +%define pkgname safe_yaml +Summary: Parse YAML safely +Name: ruby-%{pkgname} +Version: 0.9.4 +Release: 1 +License: MIT +Group: Development/Languages +Source0: http://rubygems.org/downloads/%{pkgname}-%{version}.gem +# Source0-md5: 9788eb941a0935853679ee186a3d481b +URL: http://dtao.github.com/safe_yaml/ +BuildRequires: rpm-rubyprov +BuildRequires: rpmbuild(macros) >= 1.656 +BuildArch: noarch +BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n) + +%description +Parse YAML safely, without that pesky arbitrary object deserialization +vulnerability + +%prep +%setup -q -n %{pkgname}-%{version} + +%install +rm -rf $RPM_BUILD_ROOT +install -d $RPM_BUILD_ROOT%{ruby_vendorlibdir} +cp -a lib/* $RPM_BUILD_ROOT%{ruby_vendorlibdir} + +%clean +rm -rf $RPM_BUILD_ROOT + +%files +%defattr(644,root,root,755) +%{ruby_vendorlibdir}/safe_yaml.rb +%{ruby_vendorlibdir}/safe_yaml