# Generated from have-i-been-pwned-1.2.0.gem by gem2rpm -*- rpm-spec -*- %global gem_name have-i-been-pwned Name: rubygem-%{gem_name} Version: 1.2.0 Release: 1%{?dist} Summary: Check to see if your passwords are safe License: MIT URL: https://github.com/Dales-Lab/haveibeenpwned-ruby-sdk Source0: https://rubygems.org/gems/%{gem_name}-%{version}.gem BuildRequires: ruby(release) BuildRequires: rubygems-devel BuildRequires: ruby >= 2.0.0 # BuildRequires: rubygem(simplecov) # BuildRequires: rubygem(codecov) >= 0.1.10 # BuildRequires: rubygem(mocha) # BuildRequires: rubygem(test-unit) BuildArch: noarch %description A simple gem to check and see if a given password was compromised by a hack. Special thanks to Troy Hunt for facilitating haveibeenpwned. %package doc Summary: Documentation for %{name} Requires: %{name} = %{version}-%{release} BuildArch: noarch %description doc Documentation for %{name}. %prep %setup -q -n %{gem_name}-%{version} %build # Create the gem as gem install only works on a gem file gem build ../%{gem_name}-%{version}.gemspec # %%gem_install compiles any C extensions and installs the gem into ./%%gem_dir # by default, so that we can move it into the buildroot in %%install %gem_install %install mkdir -p %{buildroot}%{gem_dir} cp -a .%{gem_dir}/* \ %{buildroot}%{gem_dir}/ %check pushd .%{gem_instdir} # ruby -e 'Dir.glob "./test/**/*_test.rb", &method(:require)' popd %files %dir %{gem_instdir} %exclude %{gem_instdir}/.gitignore %{gem_instdir}/.simplecov %exclude %{gem_instdir}/.travis.yml %license %{gem_instdir}/LICENSE %{gem_instdir}/bin %{gem_instdir}/codecov.yml %{gem_libdir} %exclude %{gem_cache} %{gem_spec} %files doc %doc %{gem_docdir} %{gem_instdir}/Gemfile %doc %{gem_instdir}/README.md %{gem_instdir}/Rakefile %{gem_instdir}/have-i-been-pwned.gemspec %{gem_instdir}/test %changelog * Mon Sep 13 2021 mockbuilder - 1.2.0-1 - Initial package