gdk-pixbuf/pre_checkin.sh
Dominique Leuenberger 31a2bc292e Accepting request 779402 from home:yfjiang:branches:GNOME:Factory
- A file tests/test-images/gif-test-suite/max-width.gif from the
  test suite is correctly identified by clamav to be a malicious
  BC.Gif.Exploit.Agent-1425366.Agent. This is an intentional part
  of the test suite to ensure it has no negative side effects.
  On SLE, the package is built with clamav scanning, which then
  prevents a successful build. This change repacks the source
  package to a password-protected zip to bypass the clamav scanning
  for SLE (bsc#1159337), with following update:
  + Download upstream tarball through source service
  + Add pre_checkin.sh to convert tarball to zip file
  + Update spec-file to use the zip file as main source

OBS-URL: https://build.opensuse.org/request/show/779402
OBS-URL: https://build.opensuse.org/package/show/GNOME:Factory/gdk-pixbuf?expand=0&rev=167
2020-02-27 11:55:09 +00:00

16 lines
815 B
Bash

#!/bin/sh
# To update the package:
## 1. update the version tags in _service
## 2. run `osc service ra`; # get the upstream release, and set the version string in spec
## 3. run `./pre_checkin.sh`; # generate the zip file
## 4. edit changelog and commit the change # the tar.xz file generated by the step 2 is not necessarily to commit
EXTRACTDIR=$(mktemp -d);
BASENAME=$(grep ^Name\: gdk-pixbuf.spec | cut -d: -f2 | sed 's/[[:space:]]//g');
VERSION=$(grep ^Version\: gdk-pixbuf.spec | cut -d: -f2 | sed 's/[[:space:]]//g');
tar xvfJ $BASENAME-$VERSION.tar.xz -C $EXTRACTDIR;
pushd $EXTRACTDIR/$BASENAME-$VERSION && zip -r -P gecko $BASENAME-$VERSION.zip * && popd && mv $EXTRACTDIR/$BASENAME-$VERSION/$BASENAME-$VERSION.zip .;
rm -fr $EXTRACTDIR && rm -fr $BASENAME-$VERSION.tar.xz;