gdk-pixbuf/_service
Dominique Leuenberger 31a2bc292e Accepting request 779402 from home:yfjiang:branches:GNOME:Factory
- A file tests/test-images/gif-test-suite/max-width.gif from the
  test suite is correctly identified by clamav to be a malicious
  BC.Gif.Exploit.Agent-1425366.Agent. This is an intentional part
  of the test suite to ensure it has no negative side effects.
  On SLE, the package is built with clamav scanning, which then
  prevents a successful build. This change repacks the source
  package to a password-protected zip to bypass the clamav scanning
  for SLE (bsc#1159337), with following update:
  + Download upstream tarball through source service
  + Add pre_checkin.sh to convert tarball to zip file
  + Update spec-file to use the zip file as main source

OBS-URL: https://build.opensuse.org/request/show/779402
OBS-URL: https://build.opensuse.org/package/show/GNOME:Factory/gdk-pixbuf?expand=0&rev=167
2020-02-27 11:55:09 +00:00

10 lines
299 B
Plaintext

<services>
<service name="download_url" mode="disabled">
<param name="protocol">https</param>
<param name="host">download.gnome.org</param>
<param name="path">sources/gdk-pixbuf/2.40/gdk-pixbuf-2.40.0.tar.xz</param>
</service>
<service name="set_version" mode="disabled" />
</services>