Dominique Leuenberger
31a2bc292e
- A file tests/test-images/gif-test-suite/max-width.gif from the test suite is correctly identified by clamav to be a malicious BC.Gif.Exploit.Agent-1425366.Agent. This is an intentional part of the test suite to ensure it has no negative side effects. On SLE, the package is built with clamav scanning, which then prevents a successful build. This change repacks the source package to a password-protected zip to bypass the clamav scanning for SLE (bsc#1159337), with following update: + Download upstream tarball through source service + Add pre_checkin.sh to convert tarball to zip file + Update spec-file to use the zip file as main source OBS-URL: https://build.opensuse.org/request/show/779402 OBS-URL: https://build.opensuse.org/package/show/GNOME:Factory/gdk-pixbuf?expand=0&rev=167
16 lines
815 B
Bash
16 lines
815 B
Bash
#!/bin/sh
|
|
|
|
# To update the package:
|
|
## 1. update the version tags in _service
|
|
## 2. run `osc service ra`; # get the upstream release, and set the version string in spec
|
|
## 3. run `./pre_checkin.sh`; # generate the zip file
|
|
## 4. edit changelog and commit the change # the tar.xz file generated by the step 2 is not necessarily to commit
|
|
|
|
EXTRACTDIR=$(mktemp -d);
|
|
BASENAME=$(grep ^Name\: gdk-pixbuf.spec | cut -d: -f2 | sed 's/[[:space:]]//g');
|
|
VERSION=$(grep ^Version\: gdk-pixbuf.spec | cut -d: -f2 | sed 's/[[:space:]]//g');
|
|
|
|
tar xvfJ $BASENAME-$VERSION.tar.xz -C $EXTRACTDIR;
|
|
pushd $EXTRACTDIR/$BASENAME-$VERSION && zip -r -P gecko $BASENAME-$VERSION.zip * && popd && mv $EXTRACTDIR/$BASENAME-$VERSION/$BASENAME-$VERSION.zip .;
|
|
rm -fr $EXTRACTDIR && rm -fr $BASENAME-$VERSION.tar.xz;
|