Hello community,
here is the log from the commit of package yum-utils
checked in at Mon May 21 15:09:03 CEST 2007.
--------
--- yum-utils/yum-utils.changes 2007-05-03 23:17:28.000000000 +0200
+++ /mounts/work_src_done/NOARCH/yum-utils/yum-utils.changes 2007-05-21 13:32:11.334751000 +0200
@@ -1,0 +2,15 @@
+Mon May 21 13:29:30 CEST 2007 - cthiel@suse.de
+
+- update to version 1.1.4
+ * plugins/security/security.py: Added patch by James Antill: It seems that
+ on RHEL5 there are update metadata entries with references == None (in
+ my FC6 testing they were always == []). This gives a traceback with the
+ current code.
+ * yumdownloader.py: removed crap from comment
+ * yumdownloader.py: make the '--source' work and make it a little smarter
+ so the 'reponame-source' are enabled automaticly for all enabled repos,
+ when '--source' is used. (rhbz #239528)
+ * plugins/security/security.py: Added patch to security plugin by Luke
+ Macken
+
+-------------------------------------------------------------------
Old:
----
yum-utils-1.1.3.tar.bz2
New:
----
yum-utils-1.1.4.tar.bz2
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ yum-utils.spec ++++++
--- /var/tmp/diff_new_pack.D16900/_old 2007-05-21 15:08:59.000000000 +0200
+++ /var/tmp/diff_new_pack.D16900/_new 2007-05-21 15:08:59.000000000 +0200
@@ -1,5 +1,5 @@
#
-# spec file for package yum-utils (Version 1.1.3)
+# spec file for package yum-utils (Version 1.1.4)
#
# Copyright (c) 2007 SUSE LINUX Products GmbH, Nuernberg, Germany.
# This file and all modifications and additions to the pristine
@@ -12,7 +12,7 @@
Name: yum-utils
BuildRequires: python-devel
-Version: 1.1.3
+Version: 1.1.4
Release: 1
License: GNU General Public License (GPL)
Group: System/Packages
@@ -55,6 +55,18 @@
%{_mandir}/*/*
%changelog
+* Mon May 21 2007 - cthiel@suse.de
+- update to version 1.1.4
+ * plugins/security/security.py: Added patch by James Antill: It seems that
+ on RHEL5 there are update metadata entries with references == None (in
+ my FC6 testing they were always == []). This gives a traceback with the
+ current code.
+ * yumdownloader.py: removed crap from comment
+ * yumdownloader.py: make the '--source' work and make it a little smarter
+ so the 'reponame-source' are enabled automaticly for all enabled repos,
+ when '--source' is used. (rhbz #239528)
+ * plugins/security/security.py: Added patch to security plugin by Luke
+ Macken
* Thu May 03 2007 - cthiel@suse.de
- update to version 1.1.3
* New yum-security plugin by James Antill.
++++++ yum-utils-1.1.3.tar.bz2 -> yum-utils-1.1.4.tar.bz2 ++++++
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yum-utils-1.1.3/ChangeLog new/yum-utils-1.1.4/ChangeLog
--- old/yum-utils-1.1.3/ChangeLog 2007-05-01 19:18:11.000000000 +0200
+++ new/yum-utils-1.1.4/ChangeLog 2007-05-16 09:48:04.000000000 +0200
@@ -1,3 +1,38 @@
+2007-05-16 07:47 timlau
+
+ * yum-utils.spec: bumped yum-utils version to 1.1.4
+
+2007-05-16 07:41 timlau
+
+ * plugins/security/security.py: Added patch by James Antill:
+
+ It seems that on RHEL5 there are update metadata entries with
+ references == None (in my FC6 testing they were always == []).
+ This gives a traceback with the current code.
+
+2007-05-09 10:11 timlau
+
+ * yumdownloader.py: removed crap from comment .
+
+2007-05-09 10:01 timlau
+
+ * yumdownloader.py: make the '--source' work and make it a little
+ smarter so the 'reponame-source' are enabled automaticly for all
+ enabled repos, when '--source' is used. (rhbz #239528)
+
+2007-05-08 07:54 timlau
+
+ * plugins/security/security.py: Added patch to security plugin by
+ Luke Macken
+
+2007-05-08 07:52 timlau
+
+ * plugins/security/security.py: Added patch by James Antill.
+
+2007-05-01 17:19 timlau
+
+ * ChangeLog: updated ChangeLog
+
2007-05-01 17:19 timlau
* yum-utils.spec: bumped yum-utils version to 1.1.3
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yum-utils-1.1.3/ChangeLog.bak new/yum-utils-1.1.4/ChangeLog.bak
--- old/yum-utils-1.1.3/ChangeLog.bak 2007-04-12 15:45:44.000000000 +0200
+++ new/yum-utils-1.1.4/ChangeLog.bak 2007-05-01 19:19:21.000000000 +0200
@@ -1,3 +1,74 @@
+2007-05-01 17:19 timlau
+
+ * yum-utils.spec: bumped yum-utils version to 1.1.3
+
+2007-05-01 16:42 skvidal
+
+ * Makefile, yum-util-cli-template, yum-utils.spec:
+ - finish added debuginfo-install to makefile - add
+ yum-util-cli-template to repo and add it to %doc in spec file
+ - this is a template for folks to easily add more cli-based
+ yum-utils
+
+2007-05-01 16:35 skvidal
+
+ * yum-utils.spec:
+ add debuginfo-install to spec file
+
+2007-05-01 16:33 skvidal
+
+ * debuginfo-install.py:
+ add debuginfo-install to yum-utils
+
+2007-04-30 13:27 timlau
+
+ * docs/: Makefile, reposync.1: Added reposync man page by Daniel de
+ Kok (#717)
+
+2007-04-30 10:31 timlau
+
+ * reposync.py: Added gpgcheck option to reposync by Daniel de Kok
+ (#715) adding a "-g/--gpgcheck" option that removes a newly
+ downloaded package if the signature is not correct.
+
+2007-04-29 13:46 skvidal
+
+ * docs/Makefile:
+ make sure man8 is made before installing the man page for
+ yum-security
+
+2007-04-24 05:25 timlau
+
+ * updateonboot/yum-updateonboot.init:
+ Changed yum-updateonboot priorities to 25/75 -> 30/70
+
+ rhbz #235509
+
+2007-04-21 12:01 timlau
+
+ * plugins/downloadonly/downloadonly.py: fixed traceback when using
+ --downloaddir rhbz #237367
+
+2007-04-20 10:25 timlau
+
+ * yum-utils.spec, docs/Makefile, docs/yum-security.8,
+ plugins/security/security.conf, plugins/security/security.py:
+ Added security plugin written by James Antill
+
+2007-04-19 06:13 lmacken
+
+ * plugins/fastestmirror/: ChangeLog, fastestmirror.py: * Apr 19
+ 2007 Luke Macken - 0.2.7 - Remove
+ TYPE_{INTERFACE,INTERACTIVE}
+
+2007-04-13 13:07 timlau
+
+ * yumdownloader.py: create destdir if it not exists
+
+2007-04-12 13:46 timlau
+
+ * ChangeLog: updated ChangeLog
+
2007-04-12 13:45 timlau
* ChangeLog: bumped yum-utils version to 1.1.2
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yum-utils-1.1.3/plugins/security/security.py new/yum-utils-1.1.4/plugins/security/security.py
--- old/yum-utils-1.1.3/plugins/security/security.py 2007-04-13 07:27:04.000000000 +0200
+++ new/yum-utils-1.1.4/plugins/security/security.py 2007-05-16 09:38:07.000000000 +0200
@@ -60,59 +60,88 @@
continue # No metadata found for this repo
return md_info
-def ysp_should_show_pkg(pkg, md, rname=None):
- """ Do we want to show this package in sec-list. """
+def ysp__safe_refs(refs):
+ """ Sometimes refs == None, if so return the empty list here.
+ So we don't have to check everywhere. """
+ if refs == None:
+ return []
+ return refs
+
+def ysp_should_filter_pkg(opts, pkg, md, used_map):
+ """ Do the package filtering for should_show and should_keep. """
- md = md.get_notice((pkg.name, pkg.ver, pkg.rel))
- if not md:
+ def has_id(refs, ref_type, ref_ids):
+ ''' Check if the given ID is a match. '''
+ for ref in ysp__safe_refs(refs):
+ if ref['type'] != ref_type:
+ continue
+ if ref['id'] not in ref_ids:
+ continue
+ used_map[ref_type][ref['id']] = True
+ return ref
return None
- md = md.get_metadata()
- if not rname:
+ if opts.advisory and md['update_id'] in opts.advisory:
+ used_map['id'][md['update_id']] = True
return md
- if rname:
- if rname == "security":
- return md['type'] == 'security'
- for ref in md['references']:
- if ref['type'] != rname:
- continue
+ elif opts.cve and has_id(md['references'], "cve", opts.cve):
+ return md
+ elif opts.bz and has_id(md['references'], "bugzilla", opts.bz):
+ return md
+ elif opts.security:
+ if md['type'] == 'security':
return md
-
+ elif not (opts.advisory or opts.cve or opts.bz or opts.security):
+ return md # This is only possible from should_show_pkg
return None
-def ysp_show_pkg_md_info(pkg, md, msg):
- msg(pkg)
- msg(' ID ' + md['update_id'])
- msg(' Type ' + md['type'])
- msg(' Issued ' + md['issued'])
- if md['issued'] != md['updated']:
- msg(' Updated ' + md['updated'])
- if md['references']:
- msg(' References')
- for ref in md['references']:
- if ref['type'] == 'cve':
- txt = " CVE " + ref['id'];
- elif ref['type'] == 'bugzilla':
- txt = " BZ " + ref['id'];
- else:
- msg(" *" + ref['type'])
- if 'summary' in ref:
- if (len(txt) + len(ref['summary'])) <= 76:
- msg("%s: %s" % (txt, ref['summary']))
- else:
- msg("%s: %.*s..." % (txt, 73 -len(txt), ref['summary']))
- elif 'href' in ref and \
- (len(txt) + len(ref['href'])) <= 76:
- msg("%s - %s" % (txt, ref['href']))
- else:
- msg(txt)
+def ysp_has_info_md(rname, md):
+ if rname == "security":
+ if md['type'] == 'security':
+ return md
+ for ref in ysp__safe_refs(md['references']):
+ if ref['type'] != rname:
+ continue
+ return md
+
+def ysp_should_show_pkg(opts, pkg, md, used_map, rname=None):
+ """ Do we want to show this package in list-security. """
+
+ md = md.get_notice((pkg.name, pkg.ver, pkg.rel))
+ if not md:
+ return None
+
+ if rname and not ysp_has_info_md(rname, md):
+ return None
+ return ysp_should_filter_pkg(opts, pkg, md, used_map)
+
+def ysp_gen_used_map(opts):
+ used_map = {'bugzilla' : {}, 'cve' : {}, 'id' : {}}
+ for i in opts.advisory:
+ used_map['id'][i] = False
+ for i in opts.bz:
+ used_map['bugzilla'][i] = False
+ for i in opts.cve:
+ used_map['cve'][i] = False
+ return used_map
+
+def ysp_chk_used_map(used_map, msg):
+ for i in used_map['id']:
+ if not used_map['id'][i]:
+ msg('Advisory \"%s\" not found applicable for this system' % i)
+ for i in used_map['bugzilla']:
+ if not used_map['bugzilla'][i]:
+ msg('BZ \"%s\" not found applicable for this system' % i)
+ for i in used_map['cve']:
+ if not used_map['cve'][i]:
+ msg('CVE \"%s\" not found applicable for this system' % i)
class SecurityListCommands:
def getNames(self):
- return ['list-sec', 'list-security']
+ return ['list-security', 'list-sec']
def getUsage(self):
- return 'list-sec'
+ return self.getNames()[0]
def doCheck(self, base, basecmd, extcmds):
pass
@@ -120,9 +149,16 @@
def getRepos(self): # so we can act as a "conduit"
return self.repos
- def show_pkg(self, msg, pkg, md):
- ysp_show_pkg_md_info(pkg, md, msg)
- msg('')
+ def show_pkg(self, msg, pkg, md, disp=None):
+ # Make the list view much smaller
+ # ysp_show_pkg_md_info(pkg, md, msg)
+ if disp and ysp_has_info_md(disp, md):
+ for ref in ysp__safe_refs(md['references']):
+ if ref['type'] != disp:
+ continue
+ msg(" %s %-8s %s" % (str(ref['id']), md['type'], pkg))
+ else:
+ msg("%s %-8s %s" % (md['update_id'], md['type'], pkg))
def doCommand(self, base, basecmd, extcmds):
ygh = base.doPackageLists('updates')
@@ -135,79 +171,52 @@
def msg_warn(x):
logger.warn(x)
+ opts,cmdline = base.plugins.cmdline
ygh.updates.sort(key=lambda x: x.name)
- if not extcmds:
- for pkg in ygh.updates:
- md = ysp_should_show_pkg(pkg, md_info)
- if not md:
- continue
- self.show_pkg(msg, pkg, md)
+ used_map = ysp_gen_used_map(opts)
+ if False:
+ pass
elif len(extcmds) == 1 and (extcmds[0] == "bugzillas" or \
extcmds[0] == "bzs"):
- done = False
for pkg in ygh.updates:
- md = ysp_should_show_pkg(pkg, md_info, "bugzilla")
+ md = ysp_should_show_pkg(opts, pkg, md_info, used_map,
+ "bugzilla")
if not md:
continue
- if not done:
- msg(" ---- Bugzillas ----")
- done = True
- self.show_pkg(msg, pkg, md)
+ self.show_pkg(msg, pkg, md, "bugzilla")
elif len(extcmds) == 1 and extcmds[0] == "cves":
- done = False
for pkg in ygh.updates:
- md = ysp_should_show_pkg(pkg, md_info, "cve")
+ md = ysp_should_show_pkg(opts, pkg, md_info, used_map, "cve")
if not md:
continue
- if not done:
- msg(" ---- CVEs ----")
- done = True
- self.show_pkg(msg, pkg, md)
+ self.show_pkg(msg, pkg, md, "cve")
elif len(extcmds) == 1 and (extcmds[0] == "security" or \
extcmds[0] == "sec"):
- done = False
for pkg in ygh.updates:
- md = ysp_should_show_pkg(pkg, md_info, "security")
+ md = ysp_should_show_pkg(opts, pkg, md_info, used_map,
+ "security")
if not md:
continue
- if not done:
- msg(" ---- Security ----")
- done = True
self.show_pkg(msg, pkg, md)
else:
- uids_done = {}
- for uid in extcmds:
- uids_done[uid] = False
+ opts.advisory += extcmds
+ used_map = ysp_gen_used_map(opts)
for pkg in ygh.updates:
- md = ysp_should_show_pkg(pkg, md_info)
+ md = ysp_should_show_pkg(opts, pkg, md_info, used_map)
if not md:
- continue
-
- if md['update_id'] in extcmds:
- uids_done[md['update_id']] = True
- self.show_pkg(msg, pkg, md)
- for uid in extcmds:
- if not uids_done[uid]:
- msg_warn('Advisory \"%s\" not found applicable'
- ' for this system' % uid)
+ continue
+ self.show_pkg(msg, pkg, md)
+ ysp_chk_used_map(used_map, msg)
# else:
# return 1, [str(PluginYumExit('Bad %s commands' % basecmd))]
return 0, [basecmd + ' done']
class SecurityInfoCommands(SecurityListCommands):
def getNames(self):
- return ['info-sec', 'info-security']
-
- def getUsage(self):
- return 'info-sec'
+ return ['info-security', 'info-sec']
- def show_pkg(self, msg, pkg, md):
- ysp_show_pkg_md_info(pkg, md, msg)
- if md['description'] != None:
- msg(' Description')
- msg(textwrap.fill(md['description'],
- width=75, expand_tabs=False,
- initial_indent=" ", subsequent_indent=" "))
+ def show_pkg(self, msg, pkg, md, disp=None):
+ msg(md)
msg('')
def config_hook(conduit):
@@ -267,33 +276,11 @@
def ysp_should_keep_pkg(opts, pkg, md, used_map):
""" Do we want to keep this package to satisfy the security limits. """
- def has_id(refs, ref_type, ref_ids):
- ''' Check if the given ID is a match. '''
- for ref in refs:
- if ref['type'] != ref_type:
- continue
- if ref['id'] not in ref_ids:
- continue
- used_map[ref_type][ref['id']] = True
- return ref
- return None
-
md = md.get_notice((pkg.name, pkg.ver, pkg.rel))
if not md:
return False
- md = md.get_metadata()
- if opts.advisory and md['update_id'] in opts.advisory:
- used_map['id'][md['update_id']] = True
- return True
- elif opts.cve and has_id(md['references'], "cve", opts.cve):
- return True
- elif opts.bz and has_id(md['references'], "bugzilla", opts.bz):
- return True
- elif opts.security:
- return md['type'] == 'security'
- else:
- return False
+ return ysp_should_filter_pkg(opts, pkg, md, used_map)
def ysp_check_func_enter(conduit):
""" Stuff we need to do in both list and update modes. """
@@ -314,12 +301,8 @@
if (args[0] == "update"):
ret = {"skip": ndata, "list_cmd": False}
if (args[0] == "list-sec") or (args[0] == "list-security"):
- if not ndata:
- conduit.error(2, 'Skipping security plugin arguments')
return (opts, {"skip": True, "list_cmd": True})
if (args[0] == "info-sec") or (args[0] == "info-security"):
- if not ndata:
- conduit.error(2, 'Skipping security plugin arguments')
return (opts, {"skip": True, "list_cmd": True})
if ret:
@@ -331,30 +314,6 @@
conduit.error(2, 'Skipping security plugin, other command')
return (opts, {"skip": True, "list_cmd": False, "msg": True})
-def ysp_gen_used_map(opts):
- used_map = {'bugzilla' : {}, 'cve' : {}, 'id' : {}}
- for i in opts.advisory:
- used_map['id'][i] = False
- for i in opts.bz:
- used_map['bugzilla'][i] = False
- for i in opts.cve:
- used_map['cve'][i] = False
- return used_map
-
-def ysp_chk_used_map(conduit, used_map):
- for i in used_map['id']:
- if not used_map['id'][i]:
- conduit.error(2, 'Advisory \"%s\" not found applicable'
- ' for this system' % i)
- for i in used_map['bugzilla']:
- if not used_map['bugzilla'][i]:
- conduit.error(2, 'BZ \"%s\" not found applicable'
- ' for this system' % i)
- for i in used_map['cve']:
- if not used_map['cve'][i]:
- conduit.error(2, 'CVE \"%s\" not found applicable'
- ' for this system' % i)
-
def exclude_hook(conduit):
'''
Yum Plugin Exclude Hook:
@@ -382,7 +341,7 @@
for pkg in conduit.getPackages():
if not ysp_should_keep_pkg(opts, pkg, md_info, used_map):
ysp_del_pkg(pkg)
- ysp_chk_used_map(conduit, used_map)
+ ysp_chk_used_map(used_map, lambda x: conduit.error(2, x))
def preresolve_hook(conduit):
'''
@@ -416,13 +375,12 @@
ysp_del_pkg(tspkg)
else:
cnt += 1
- ysp_chk_used_map(conduit, used_map)
+ ysp_chk_used_map(used_map, lambda x: conduit.error(2, x))
if cnt:
conduit.info(2, 'Needed %d packages, for security' % (cnt))
else:
conduit.info(2, 'No packages needed, for security')
- sys.exit(0)
if __name__ == '__main__':
print "This is a plugin that is supposed to run from inside YUM"
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yum-utils-1.1.3/yumdownloader.py new/yum-utils-1.1.4/yumdownloader.py
--- old/yum-utils-1.1.3/yumdownloader.py 2007-04-13 14:28:17.000000000 +0200
+++ new/yum-utils-1.1.4/yumdownloader.py 2007-05-09 12:11:26.000000000 +0200
@@ -60,20 +60,30 @@
sys.exit(50)
self.repos.setCacheDir(cachedir)
-
# Setup yum (Ts, RPM db, Repo & Sack)
self.doUtilYumSetup()
+ # Setup source repos
+ if opts.source:
+ self.setupSourceRepos()
# Do the real action
self.downloadPackages(opts)
+ def setupSourceRepos(self):
+ # enable the -source repos for enabled primary repos
+ archlist = rpmUtils.arch.getArchList() + ['src']
+ for repo in self.repos.listEnabled():
+ srcrepo = '%s-source' % repo.id
+ for r in self.repos.findRepos(srcrepo):
+ self.logger.info('Enabling %s repository' % r.id)
+ r.enable()
+ # Setup the repo
+ self._getRepos(thisrepo=r.id,doSetup=True)
+ # Setup pkgSack with 'src' in the archlist
+ self._getSacks(archlist=archlist,thisrepo=r.id)
+
+
def downloadPackages(self,opts):
- archlist = None
- if opts.source:
- archlist = rpmUtils.arch.getArchList() + ['src']
-
- self.doSackSetup(archlist=archlist)
-
avail = self.pkgSack.returnPackages()
toDownload = []
@@ -86,7 +96,6 @@
if len(unmatched) > 0: # if we get back anything in unmatched, it fails
self.logger.error('No Match for argument %s' % pkg)
continue
-
for newpkg in installable:
# This is to fix Bug 469
# If there are matches to the package argument given but there
Files old/yum-utils-1.1.3/yum-utils-1.1.3.tar.gz and new/yum-utils-1.1.4/yum-utils-1.1.3.tar.gz differ
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yum-utils-1.1.3/yum-utils.spec new/yum-utils-1.1.4/yum-utils.spec
--- old/yum-utils-1.1.3/yum-utils.spec 2007-05-01 19:17:39.000000000 +0200
+++ new/yum-utils-1.1.4/yum-utils.spec 2007-05-16 09:46:28.000000000 +0200
@@ -1,6 +1,6 @@
Summary: Utilities based around the yum package manager
Name: yum-utils
-Version: 1.1.3
+Version: 1.1.4
Release: 1%{?dist}
License: GPL
Group: Development/Tools
@@ -292,6 +292,9 @@
%changelog
* Tue May 1 2007 Tim Lauridsen
+- mark as 1.1.4
+
+* Tue May 1 2007 Tim Lauridsen
- mark as 1.1.3
* Tue May 1 2007 Seth Vidal <skvidal at linux.duke.edu>
diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yum-utils-1.1.3/yum-utils.spec~ new/yum-utils-1.1.4/yum-utils.spec~
--- old/yum-utils-1.1.3/yum-utils.spec~ 1970-01-01 01:00:00.000000000 +0100
+++ new/yum-utils-1.1.4/yum-utils.spec~ 2007-05-01 19:19:11.000000000 +0200
@@ -0,0 +1,406 @@
+Summary: Utilities based around the yum package manager
+Name: yum-utils
+Version: 1.1.3
+Release: 1%{?dist}
+License: GPL
+Group: Development/Tools
+Source: http://linux.duke.edu/yum/download/yum-utils/%{name}-%{version}.tar.gz
+URL: http://linux.duke.edu/yum/download/yum-utils/
+BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n)
+BuildArch: noarch
+Requires: python >= 2.4 , yum >= 3.1.1
+
+%description
+yum-utils is a collection of utilities and examples for the yum package
+manager. It includes utilities by different authors that make yum easier and
+more powerful to use.
+
+%package -n yum-updateonboot
+Summary: Run yum update on system boot
+Group: System Environment/Base
+Requires: python, yum >= 2.4
+Requires(pre): chkconfig
+Requires(post): chkconfig
+
+%description -n yum-updateonboot
+Runs yum update on system boot. This allows machines that have been turned
+off for an extended amount of time to become secure immediately, instead of
+waiting until the next early morning cron job.
+
+%package -n yum-changelog
+Summary: Yum plugin for viewing package changelogs before/after updating
+Group: System Environment/Base
+Requires: yum >= 3.0
+
+%description -n yum-changelog
+This plugin adds a command line option to allow viewing package changelog
+deltas before or after updating packages.
+
+%package -n yum-fastestmirror
+Summary: Yum plugin which chooses fastest repository from a mirrorlist
+Group: System Environment/Base
+Requires: yum >= 3.0
+
+%description -n yum-fastestmirror
+This plugin sorts each repository's mirrorlist by connection speed
+prior to downloading packages.
+
+%package -n yum-fedorakmod
+Summary: Yum plugin to handle fedora kernel modules.
+Group: System Environment/Base
+Requires: yum >= 3.0
+
+%description -n yum-fedorakmod
+Plugin for Yum to handle installation of kmod-foo type of kernel modules, when new kernel versions
+are installed.
+kmod-foo kernel modules is described by the Fedora Extras packaging standards.
+
+%package -n yum-protectbase
+Summary: Yum plugin to protect packages from certain repositories.
+Group: System Environment/Base
+Requires: yum >= 3.0
+
+%description -n yum-protectbase
+This plugin allows certain repositories to be protected. Packages in the
+protected repositories can't be overridden by packages in non-protected
+repositories even if the non-protected repo has a later version.
+
+%package -n yum-versionlock
+Summary: Yum plugin to lock specified packages from being updated
+Group: System Environment/Base
+Requires: yum >= 3.0
+
+%description -n yum-versionlock
+This plugin allows certain packages specified in a file to be protected from being updated by
+newer versions.
+
+%package -n yum-tsflags
+Summary: Yum plugin to add tsflags by a commandline option
+Group: System Environment/Base
+Requires: yum >= 3.0
+
+%description -n yum-tsflags
+This plugin allows you to specify optional transaction flags on the yum
+command line
+
+%package -n yum-kernel-module
+Summary: Yum plugin to handle kernel-module-foo type of kernel module
+Group: System Environment/Base
+Requires: yum >= 3.0
+
+%description -n yum-kernel-module
+This plugin handle installation of kernel-module-foo type of kernel modules when new version of
+kernels are installed.
+
+
+%package -n yum-downloadonly
+Summary: Yum plugin to add downloadonly command option
+Group: System Environment/Base
+Requires: yum >= 3.0
+
+%description -n yum-downloadonly
+This plugin adds a --downloadonly flag to yum so that yum will only download
+the packages and not install/update them.
+
+%package -n yum-allowdowngrade
+Summary: Yum plugin to enable manual downgrading of packages
+Group: System Environment/Base
+Requires: yum >= 3.0
+
+%description -n yum-allowdowngrade
+This plugin adds a --allow-downgrade flag to yum to make it possible to
+manually downgrade packages to specific versions.
+
+%package -n yum-skip-broken
+Summary: Yum plugin to handle skiping packages with dependency problems
+Group: System Environment/Base
+Requires: yum >= 3.0
+
+%description -n yum-skip-broken
+This plugin adds a --skip-broken to yum to make it possible to
+check packages for dependency problems and skip the one with problems.
+
+%package -n yum-priorities
+Summary: plugin to give priorities to packages from different repos
+Group: System Environment/Base
+Requires: yum >= 3.0
+
+%description -n yum-priorities
+This plugin allows repositories to have different priorities.
+Packages in a repository with a lower priority can't be overridden by packages
+from a repository with a higher priority even if repo has a later version.
+
+%package -n yum-refresh-updatesd
+Summary: Tell yum-updatesd to check for updates when yum exits
+Group: System Environment/Base
+Requires: yum >= 3.0
+
+%description -n yum-refresh-updatesd
+yum-refresh-updatesd tells yum-updatesd to check for updates when yum exits.
+This way, if you run 'yum list updates' and yum says there's a new version
+of (for example) zsh available, puplet will almost instantly update itself
+to reflect this.
+
+%package -n yum-merge-conf
+Summary: Yum plugin to merge configuration changes when installing packages
+Group: System Environment/Base
+Requires: yum >= 3.0
+
+%description -n yum-merge-conf
+This yum plugin adds the "--merge-conf" command line option. With this option,
+Yum will ask you what to do with config files which have changed on updating a
+package.
+
+%package -n yum-security
+Summary: Yum plugin to enable security filters
+Group: System Environment/Base
+Requires: yum >= 3.0.5
+
+%description -n yum-security
+This plugin adds ther options --security, --cve, --bz and --advisory flags
+to yum and the list-security and info-security commands.
+The options make it possible to limit list/upgrade of packages to specific
+security relevant ones. The commands give you the security information.
+
+
+%prep
+%setup -q
+
+%install
+rm -rf $RPM_BUILD_ROOT
+make DESTDIR=$RPM_BUILD_ROOT install
+make -C updateonboot DESTDIR=$RPM_BUILD_ROOT install
+
+# Plugins to install
+plugins="changelog fastestmirror fedorakmod protectbase versionlock tsflags kernel-module downloadonly allowdowngrade skip-broken priorities refresh-updatesd merge-conf security"
+mkdir -p $RPM_BUILD_ROOT/%{_sysconfdir}/yum/pluginconf.d/ $RPM_BUILD_ROOT/usr/lib/yum-plugins/
+
+cd plugins
+for plug in $plugins; do
+ install -m 644 $plug/*.conf $RPM_BUILD_ROOT/%{_sysconfdir}/yum/pluginconf.d/
+ install -m 644 $plug/*.py $RPM_BUILD_ROOT/usr/lib/yum-plugins/
+done
+
+%clean
+rm -rf $RPM_BUILD_ROOT
+
+%post -n yum-updateonboot
+/sbin/chkconfig --add yum-updateonboot >/dev/null 2>&1 || :;
+
+%preun -n yum-updateonboot
+if [ $1 = 0 ]; then
+ /sbin/service yum-updateonboot stop >/dev/null 2>&1 || :;
+ /sbin/chkconfig --del yum-updateonboot >/dev/null 2>&1 || :;
+fi
+
+%files
+%defattr(-, root, root)
+%doc README yum-util-cli-template
+%doc COPYING
+%doc plugins/README
+%{_bindir}/debuginfo-install
+%{_bindir}/package-cleanup
+%{_bindir}/repoclosure
+%{_bindir}/repomanage
+%{_bindir}/repoquery
+%{_bindir}/repotrack
+%{_bindir}/reposync
+%{_bindir}/repo-graph
+%{_bindir}/repo-rss
+%{_bindir}/yumdownloader
+%{_bindir}/yum-builddep
+%{_mandir}/man1/*
+
+%files -n yum-updateonboot
+%defattr(-, root, root)
+%doc updateonboot/README
+%config(noreplace) %{_sysconfdir}/sysconfig/yum-updateonboot
+%{_initrddir}/yum-updateonboot
+
+%files -n yum-changelog
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/changelog.conf
+/usr/lib/yum-plugins/changelog.*
+%{_mandir}/man1/yum-changelog.1.*
+%{_mandir}/man5/yum-changelog.conf.5.*
+
+%files -n yum-fastestmirror
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/fastestmirror.conf
+/usr/lib/yum-plugins/fastestmirror.*
+
+%files -n yum-fedorakmod
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/fedorakmod.conf
+/usr/lib/yum-plugins/fedorakmod.*
+
+%files -n yum-protectbase
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/protectbase.conf
+/usr/lib/yum-plugins/protectbase.*
+
+%files -n yum-versionlock
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/versionlock.conf
+/usr/lib/yum-plugins/versionlock.*
+
+%files -n yum-tsflags
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/tsflags.conf
+/usr/lib/yum-plugins/tsflags.*
+
+%files -n yum-kernel-module
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/kernel-module.conf
+/usr/lib/yum-plugins/kernel-module.*
+
+%files -n yum-downloadonly
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/downloadonly.conf
+/usr/lib/yum-plugins/downloadonly.*
+
+%files -n yum-allowdowngrade
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/allowdowngrade.conf
+/usr/lib/yum-plugins/allowdowngrade.*
+
+%files -n yum-skip-broken
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/skip-broken.conf
+/usr/lib/yum-plugins/skip-broken.*
+
+%files -n yum-priorities
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/priorities.conf
+/usr/lib/yum-plugins/priorities.*
+
+%files -n yum-refresh-updatesd
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/refresh-updatesd.conf
+/usr/lib/yum-plugins/refresh-updatesd.*
+
+%files -n yum-merge-conf
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/merge-conf.conf
+/usr/lib/yum-plugins/merge-conf.*
+
+%files -n yum-security
+%defattr(-, root, root)
+%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/security.conf
+/usr/lib/yum-plugins/security.*
+%{_mandir}/man8/yum-security.8.*
+
+%changelog
+* Tue May 1 2007 Tim Lauridsen
+- mark as 1.1.3
+
+* Tue May 1 2007 Seth Vidal <skvidal at linux.duke.edu>
+- added debuginfo-install
+
+* Fri Apr 20 2007 Tim Lauridsen
+- Added security plugin written by James Antill
+
+* Thu Apr 12 2007 Tim Lauridsen
+- mark as 1.1.2
+- Added merge-conf plugin written by Aurelien Bompard
+
+* Mon Feb 19 2007 Tim Lauridsen
+- mark it as 1.1.1
+
+* Mon Feb 19 2007 Tim Lauridsen
+- mark it as 1.1.0 (again)
+
+* Thu Feb 15 2007 Tim Lauridsen
+- removed versionlock.list installation.
+
+* Wed Feb 14 2007 Tim Lauridsen
+- Added versionlock.list installation.
+- fixed skip-broken description (--ignore-broken -> --skip-broken)
+
+* Tue Feb 13 2007 James Bowes
+- Add yum-refresh-updatesd plugin
+
+* Thu Feb 8 2007 Tim Lauridsen
+- Added man dirs to yum-changelog files section
+
+* Wed Feb 7 2007 Tim Lauridsen
+- mark it as 1.1.0
+- Requires: yum >= 3.1.1 for yum-utils.
+
+* Tue Feb 6 2007 Tim Lauridsen
+- Added %%{?dist} tag
+
+* Sun Dec 31 2006 Tim Lauridsen
+- mark it as 1.0.2
+
+* Tue Oct 31 2006 Tim Lauridsen
+- mark it as 1.0.1
+
+* Fri Oct 27 2006 Tim Lauridsen
+- Added priorities plugin written by Daniel de Kok <danieldk at pobox.com>
+
+* Wed Oct 4 2006 Seth Vidal <skvidal at linux.duke.edu>
+- mark it as 1.0
+- change requires for the packages to yum 3.0
+
+* Wed Sep 27 2006 Tim Lauridsen
+- added skip-broken plugin
+
+* Tue Sep 05 2006 Panu Matilainen
+- added allowdowngrade plugin
+
+* Sun Aug 13 2006 Seth Vidal <skvidal at linux.duke.edu>
+- fix the plugins/ doc issue
+
+* Sat May 6 2006 Seth Vidal <skvidal at linux.duke.edu>
+- bump version number
+- added yum-downloadonly plugin
+- fix minor item in tsflags description
+
+* Sat Apr 29 2006 Seth Vidal <skvidal at linux.duke.edu>
+- add reposync
+
+* Fri Apr 28 2006 Tim Lauridsen
+- added yum-fedorakmod plugin subpackage
+- added yum-protectbase plugin subpackage.
+- added yum-versionlock plugin subpackage.
+- added yum-tsflags plugin subpackage.
+- added yum-kernel-module plugin subpackage
+- changed .py to .* in files sections for plugin subpackages to build rpms without error.
+
+* Thu Feb 23 2006 Seth Vidal <skvidal at linux.duke.edu>
+- changed some of the yum version dependencies
+
+* Fri Feb 10 2006 Seth Vidal
+- added repotrack to utils
+- bumped version for 2.5.X-compatible release
+
+* Tue Jan 10 2006 Brian Long
+- bump version to 0.4
+- add yum-fastestmirror subpackage
+
+* Mon Oct 17 2005 Panu Matilainen
+- add repoquery man page
+
+* Sat Sep 17 2005 Panu Matilainen
+- version 0.3.1
+- various enhancements and fixes to repoquery
+- avoid tracebacks in yumex and pup when changelog plugin is enabled
+
+* Mon Jul 25 2005 Panu Matilainen
+- bump version to 0.3
+- add yum-changelog subpackage
+- add plugins as documentation to the main package
+- require yum >= 2.3.4 (for getCacheDir)
+
+* Tue Jun 21 2005 Gijs Hollestelle
+- Added missing GPL COPYING file
+
+* Wed Jun 1 2005 Seth Vidal
+- 0.2
+
+* Mon May 23 2005 Panu Matilainen
+- add yum-updateboot subpackage
+
+* Mon May 16 2005 Gijs Hollestelle
+- first version based on the mock spec file
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Remember to have fun...
---------------------------------------------------------------------
To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-commit+help@opensuse.org