You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

82 lines
2.9 KiB

##
## splint.spec -- OpenPKG RPM Package Specification
## Copyright (c) 2000-2022 OpenPKG Project <http://openpkg.org/>
##
## Permission to use, copy, modify, and distribute this software for
## any purpose with or without fee is hereby granted, provided that
## the above copyright notice and this permission notice appear in all
## copies.
##
## THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
## WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
## MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
## IN NO EVENT SHALL THE AUTHORS AND COPYRIGHT HOLDERS AND THEIR
## CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
## SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
## LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
## USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
## ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
## OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
## OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
## SUCH DAMAGE.
##
# package information
Name: splint
Summary: C/C++ Source Lint Checker
URL: http://www.splint.org/
Vendor: Larch
Packager: OpenPKG Project
Distribution: OpenPKG Community
Class: BASE
Group: Debugging
License: GPL
Version: 3.1.2
Release: 20080101
# list of sources
Source0: http://www.splint.org/downloads/splint-%{version}.src.tgz
# build information
BuildPreReq: OpenPKG, openpkg >= 20160101, gcc, make, flex
PreReq: OpenPKG, openpkg >= 20160101
%description
Splint is a tool for statically checking C programs for security
vulnerabilities and programming mistakes. Splint does many of
the traditional lint checks including unused declarations, type
inconsistencies, use before definition, unreachable code, ignored
return values, execution paths with no return, likely infinite
loops, and fall through cases. More powerful checks are made
possible by additional information given in source code annotations.
Annotations are stylized comments that document assumptions about
functions, variables, parameters and types. In addition to the
checks specifically enabled by annotations, many of the traditional
lint checks are improved by exploiting this additional information.
%track
prog splint = {
version = %{version}
url = http://www.splint.org/downloads/
regex = splint-(__VER__)\.src\.tgz
}
%prep
%setup -q
%build
CC="%{l_cc}" \
CFLAGS="%{l_cflags -O}" \
./configure \
--prefix=%{l_prefix}
%{l_make} %{l_mflags}
%install
%{l_make} %{l_mflags} install AM_MAKEFLAGS="DESTDIR=$RPM_BUILD_ROOT"
strip $RPM_BUILD_ROOT%{l_prefix}/bin/* >/dev/null 2>&1 || true
%{l_rpmtool} files -v -ofiles -r$RPM_BUILD_ROOT %{l_files_std}
%files -f files
%clean