Dominique Leuenberger
31a2bc292e
- A file tests/test-images/gif-test-suite/max-width.gif from the test suite is correctly identified by clamav to be a malicious BC.Gif.Exploit.Agent-1425366.Agent. This is an intentional part of the test suite to ensure it has no negative side effects. On SLE, the package is built with clamav scanning, which then prevents a successful build. This change repacks the source package to a password-protected zip to bypass the clamav scanning for SLE (bsc#1159337), with following update: + Download upstream tarball through source service + Add pre_checkin.sh to convert tarball to zip file + Update spec-file to use the zip file as main source OBS-URL: https://build.opensuse.org/request/show/779402 OBS-URL: https://build.opensuse.org/package/show/GNOME:Factory/gdk-pixbuf?expand=0&rev=167 |
||
---|---|---|
_service | ||
.gitattributes | ||
.gitignore | ||
baselibs.conf | ||
gdk-pixbuf-2.40.0.zip | ||
gdk-pixbuf-rpmlintrc | ||
gdk-pixbuf.changes | ||
gdk-pixbuf.spec | ||
macros.gdk-pixbuf | ||
pre_checkin.sh | ||
README.SUSE |
README for bi-architecture 64 bit platforms users ================================================= The gdk-pixbuf loaders are different, based on the architecture of the package. To update the cache of gdk-pixbuf loaders, run: + for 32 bit version: /usr/bin/gdk-pixbuf-query-loaders + for 64 bit version: /usr/bin/gdk-pixbuf-query-loaders-64