Name: perl-Catalyst-Plugin-Authorization-Roles Version: 0.07 Release: 1%{?dist} Summary: Role based authorization for Catalyst based on Catalyst::Plugin::Authentication License: GPL+ or Artistic Group: Development/Libraries URL: http://search.cpan.org/dist/Catalyst-Plugin-Authorization-Roles/ Source0: http://www.cpan.org/authors/id/B/BR/BRICAS/Catalyst-Plugin-Authorization-Roles-%{version}.tar.gz BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n) BuildArch: noarch BuildRequires: perl >= 1:5.8.0 BuildRequires: perl(Catalyst::Plugin::Authentication) >= 0.10003 BuildRequires: perl(Catalyst::Runtime) >= 5.7 BuildRequires: perl(ExtUtils::MakeMaker) BuildRequires: perl(Set::Object) >= 1.14 BuildRequires: perl(Test::Exception) BuildRequires: perl(Test::More) BuildRequires: perl(UNIVERSAL::isa) >= 0.05 BuildRequires: perl(Test::Pod) BuildRequires: perl(Test::Pod::Coverage) Requires: perl(Catalyst::Plugin::Authentication) >= 0.10003 Requires: perl(Catalyst::Runtime) >= 5.7 Requires: perl(Set::Object) >= 1.14 Requires: perl(UNIVERSAL::isa) >= 0.05 Requires: perl(:MODULE_COMPAT_%(eval "`%{__perl} -V:version`"; echo $version)) %description Role based access control is very simple: every user has a list of roles, which that user is allowed to assume, and every restricted part of the app makes an assertion about the necessary roles. %prep %setup -q -n Catalyst-Plugin-Authorization-Roles-%{version} %build %{__perl} Makefile.PL INSTALLDIRS=vendor make %{?_smp_mflags} %install rm -rf $RPM_BUILD_ROOT make pure_install PERL_INSTALL_ROOT=$RPM_BUILD_ROOT find $RPM_BUILD_ROOT -type f -name .packlist -exec rm -f {} \; find $RPM_BUILD_ROOT -depth -type d -exec rmdir {} 2>/dev/null \; %{_fixperms} $RPM_BUILD_ROOT/* %check TEST_POD=1 make test %clean rm -rf $RPM_BUILD_ROOT %files %defattr(-,root,root,-) %doc Changes README %{perl_vendorlib}/* %{_mandir}/man3/* %changelog * Fri Dec 19 2008 Iain Arnell 0.07-1 - Specfile autogenerated by cpanspec 1.77. - BR Test::Pod and Test::Pod::Coverage