Dominique Leuenberger
31a2bc292e
- A file tests/test-images/gif-test-suite/max-width.gif from the test suite is correctly identified by clamav to be a malicious BC.Gif.Exploit.Agent-1425366.Agent. This is an intentional part of the test suite to ensure it has no negative side effects. On SLE, the package is built with clamav scanning, which then prevents a successful build. This change repacks the source package to a password-protected zip to bypass the clamav scanning for SLE (bsc#1159337), with following update: + Download upstream tarball through source service + Add pre_checkin.sh to convert tarball to zip file + Update spec-file to use the zip file as main source OBS-URL: https://build.opensuse.org/request/show/779402 OBS-URL: https://build.opensuse.org/package/show/GNOME:Factory/gdk-pixbuf?expand=0&rev=167
10 lines
299 B
Plaintext
10 lines
299 B
Plaintext
<services>
|
|
<service name="download_url" mode="disabled">
|
|
<param name="protocol">https</param>
|
|
<param name="host">download.gnome.org</param>
|
|
<param name="path">sources/gdk-pixbuf/2.40/gdk-pixbuf-2.40.0.tar.xz</param>
|
|
</service>
|
|
<service name="set_version" mode="disabled" />
|
|
</services>
|
|
|