summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTim Harder <radhermit@gentoo.org>2012-09-08 01:38:25 +0000
committerTim Harder <radhermit@gentoo.org>2012-09-08 01:38:25 +0000
commit1733b36400080f5e404fb41c90ebec513ceaeac6 (patch)
treed49f595e34346ddb63ef6f1e7796d6ecfb10ed78 /app-forensics
parentRemove redundant metadata. (diff)
downloadgentoo-2-1733b36400080f5e404fb41c90ebec513ceaeac6.tar.gz
gentoo-2-1733b36400080f5e404fb41c90ebec513ceaeac6.tar.bz2
gentoo-2-1733b36400080f5e404fb41c90ebec513ceaeac6.zip
Remove redundant maintainer from metadata.
(Portage version: 2.2.0_alpha124/cvs/Linux x86_64)
Diffstat (limited to 'app-forensics')
-rw-r--r--app-forensics/mac-robber/ChangeLog5
-rw-r--r--app-forensics/mac-robber/metadata.xml4
2 files changed, 4 insertions, 5 deletions
diff --git a/app-forensics/mac-robber/ChangeLog b/app-forensics/mac-robber/ChangeLog
index 0b612889a741..9a30906d7d0e 100644
--- a/app-forensics/mac-robber/ChangeLog
+++ b/app-forensics/mac-robber/ChangeLog
@@ -1,6 +1,9 @@
# ChangeLog for app-forensics/mac-robber
# Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/app-forensics/mac-robber/ChangeLog,v 1.8 2012/02/17 07:53:22 radhermit Exp $
+# $Header: /var/cvsroot/gentoo-x86/app-forensics/mac-robber/ChangeLog,v 1.9 2012/09/08 01:38:25 radhermit Exp $
+
+ 08 Sep 2012; Tim Harder <radhermit@gentoo.org> metadata.xml:
+ Remove redundant maintainer from metadata.
17 Feb 2012; Tim Harder <radhermit@gentoo.org> -mac-robber-1.00.ebuild:
Remove old.
diff --git a/app-forensics/mac-robber/metadata.xml b/app-forensics/mac-robber/metadata.xml
index 39c63700da50..5790805f68ac 100644
--- a/app-forensics/mac-robber/metadata.xml
+++ b/app-forensics/mac-robber/metadata.xml
@@ -2,10 +2,6 @@
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<herd>forensics</herd>
-<maintainer>
- <email>forensics@gentoo.org</email>
- <name>Forensics Herd</name>
-</maintainer>
<longdescription>
mac-robber is a digital forensics and incident response tool that collects data from allocated files in a mounted file system.
The data can be used by the mactime tool in The Sleuth Kit to make a timeline of file activity. The mac-robber tool is based on