@@ -28,12 +28,11 @@ a performance issues.
2828%build
2929PATH=" %{pginstdir}/bin;$PATH " ; export PATH
3030CFLAGS=" ${CFLAGS:-% optflags} " ; export CFLAGS
31-
32- USE_PGXS= 1 make %{?_smp_mflags }
31+ make USE_PGXS=1 PG_CONFIG=%{pginstdir }/bin/pg_config %{?_smp_mflags }
3332
3433%install
3534rm -rf %{buildroot }
36- make USE_PGXS=1 DESTDIR=%{buildroot } install
35+ make install DESTDIR=%{buildroot } PG_CONFIG=%{ pginstdir }/bin/pg_config %{? _smp_mflags }
3736
3837%clean
3938rm -rf %{buildroot }
@@ -42,8 +41,11 @@ rm -rf %{buildroot}
4241%defattr(644,root,root,755)
4342%doc README.md
4443%{pginstdir }/lib/plpgsql_check.so
45- %{pginstdir }/share/extension/plpgsql_check--2.0 .sql
44+ %{pginstdir }/share/extension/plpgsql_check--2.1 .sql
4645%{pginstdir }/share/extension/plpgsql_check.control
46+ %{pginstdir }/lib/bitcode/* .bc
47+ %{pginstdir }/lib/bitcode/plpgsql_check/src/* .bc
48+ %{pginstdir }/share/extension/* .control
4749
4850%changelog
4951* Wed Dec 29 2021 - Pavel Stehule <pavel.stehule@gmail.com> 2.1.0
@@ -113,7 +115,7 @@ rm -rf %{buildroot}
113115- better check of dynamic SQL when it is const string
114116- check of SQL injection vulnerability of stmt expression at EXECUTE stmt
115117
116- * Fri Dec 23 2018 - Pavel STEHULE <pavel.stehule@gmail.com> 1.4.2-1
118+ * Sun Dec 23 2018 - Pavel STEHULE <pavel.stehule@gmail.com> 1.4.2-1
117119- metada fix
118120
119121* Fri Dec 21 2018 - Pavel STEHULE <pavel.stehule@gmail.com> 1.4.1-1
@@ -137,7 +139,7 @@ rm -rf %{buildroot}
137139- fix some bugs and false alarms
138140- PostgreSQL 11 support
139141
140- * Fri Now 11 2016 - Pavel STEHULE <pavel.stehule@gmail.com> 1.2.0-1
142+ * Fri Nov 11 2016 - Pavel STEHULE <pavel.stehule@gmail.com> 1.2.0-1
141143- support extra warnings - shadowed variables
142144
143145* Thu Aug 25 2016 - Pavel STEHULE <pavel.stehule@gmail.com> 1.0.5-1
0 commit comments