summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSergey Popov <pinkbyte@gentoo.org>2012-11-10 08:54:02 +0000
committerSergey Popov <pinkbyte@gentoo.org>2012-11-10 08:54:02 +0000
commit1b464acb4763099f6e4ab29d6f197d80534695eb (patch)
tree4da35db693d72a146fe0325b94de732eec9603d4 /net-analyzer
parentAdd ~amd64-linux keyword (diff)
downloadgentoo-2-1b464acb4763099f6e4ab29d6f197d80534695eb.tar.gz
gentoo-2-1b464acb4763099f6e4ab29d6f197d80534695eb.tar.bz2
gentoo-2-1b464acb4763099f6e4ab29d6f197d80534695eb.zip
Remove myself from metadata.xml - herd will be enough
(Portage version: 2.2.0_alpha142/cvs/Linux x86_64, unsigned Manifest commit)
Diffstat (limited to 'net-analyzer')
-rw-r--r--net-analyzer/mausezahn/ChangeLog5
-rw-r--r--net-analyzer/mausezahn/metadata.xml4
2 files changed, 4 insertions, 5 deletions
diff --git a/net-analyzer/mausezahn/ChangeLog b/net-analyzer/mausezahn/ChangeLog
index a413f72bf509..dcaed738171f 100644
--- a/net-analyzer/mausezahn/ChangeLog
+++ b/net-analyzer/mausezahn/ChangeLog
@@ -1,6 +1,9 @@
# ChangeLog for net-analyzer/mausezahn
# Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/net-analyzer/mausezahn/ChangeLog,v 1.1 2012/10/17 16:57:26 pinkbyte Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-analyzer/mausezahn/ChangeLog,v 1.2 2012/11/10 08:54:02 pinkbyte Exp $
+
+ 10 Nov 2012; Sergey Popov <pinkbyte@gentoo.org> metadata.xml:
+ Remove myself from metadata.xml - herd will be enough
*mausezahn-0.40 (17 Oct 2012)
diff --git a/net-analyzer/mausezahn/metadata.xml b/net-analyzer/mausezahn/metadata.xml
index 04f72257e7b7..911058e5c9eb 100644
--- a/net-analyzer/mausezahn/metadata.xml
+++ b/net-analyzer/mausezahn/metadata.xml
@@ -2,10 +2,6 @@
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<herd>netmon</herd>
- <maintainer>
- <email>pinkbyte@gentoo.org</email>
- <name>Sergey Popov</name>
- </maintainer>
<longdescription lang="en">
Mausezahn is a free fast traffic generator written in C which allows you to send nearly every possible and impossible packet.
It is mainly used to test VoIP or multicast networks but also for security audits to check whether your systems are hardened enough for specific attacks.