From d7b670532ea14852840c4daf76a88f103379b692 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Elan=20Ruusam=C3=A4e?= Date: Wed, 25 Sep 2013 20:27:09 +0300 Subject: [PATCH] new, version 0.9.4 created with gem2rpm --- ruby-safe_yaml.spec | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) create mode 100644 ruby-safe_yaml.spec diff --git a/ruby-safe_yaml.spec b/ruby-safe_yaml.spec new file mode 100644 index 0000000..e8c8561 --- /dev/null +++ b/ruby-safe_yaml.spec @@ -0,0 +1,34 @@ +%define pkgname safe_yaml +Summary: Parse YAML safely +Name: ruby-%{pkgname} +Version: 0.9.4 +Release: 1 +License: MIT +Group: Development/Languages +Source0: http://rubygems.org/downloads/%{pkgname}-%{version}.gem +# Source0-md5: 9788eb941a0935853679ee186a3d481b +URL: http://dtao.github.com/safe_yaml/ +BuildRequires: rpm-rubyprov +BuildRequires: rpmbuild(macros) >= 1.656 +BuildArch: noarch +BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n) + +%description +Parse YAML safely, without that pesky arbitrary object deserialization +vulnerability + +%prep +%setup -q -n %{pkgname}-%{version} + +%install +rm -rf $RPM_BUILD_ROOT +install -d $RPM_BUILD_ROOT%{ruby_vendorlibdir} +cp -a lib/* $RPM_BUILD_ROOT%{ruby_vendorlibdir} + +%clean +rm -rf $RPM_BUILD_ROOT + +%files +%defattr(644,root,root,755) +%{ruby_vendorlibdir}/safe_yaml.rb +%{ruby_vendorlibdir}/safe_yaml -- 2.44.0