Hello community, here is the log from the commit of package yum-utils checked in at Mon May 21 15:09:03 CEST 2007. -------- --- yum-utils/yum-utils.changes 2007-05-03 23:17:28.000000000 +0200 +++ /mounts/work_src_done/NOARCH/yum-utils/yum-utils.changes 2007-05-21 13:32:11.334751000 +0200 @@ -1,0 +2,15 @@ +Mon May 21 13:29:30 CEST 2007 - cthiel@suse.de + +- update to version 1.1.4 + * plugins/security/security.py: Added patch by James Antill: It seems that + on RHEL5 there are update metadata entries with references == None (in + my FC6 testing they were always == []). This gives a traceback with the + current code. + * yumdownloader.py: removed crap from comment + * yumdownloader.py: make the '--source' work and make it a little smarter + so the 'reponame-source' are enabled automaticly for all enabled repos, + when '--source' is used. (rhbz #239528) + * plugins/security/security.py: Added patch to security plugin by Luke + Macken + +------------------------------------------------------------------- Old: ---- yum-utils-1.1.3.tar.bz2 New: ---- yum-utils-1.1.4.tar.bz2 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ yum-utils.spec ++++++ --- /var/tmp/diff_new_pack.D16900/_old 2007-05-21 15:08:59.000000000 +0200 +++ /var/tmp/diff_new_pack.D16900/_new 2007-05-21 15:08:59.000000000 +0200 @@ -1,5 +1,5 @@ # -# spec file for package yum-utils (Version 1.1.3) +# spec file for package yum-utils (Version 1.1.4) # # Copyright (c) 2007 SUSE LINUX Products GmbH, Nuernberg, Germany. # This file and all modifications and additions to the pristine @@ -12,7 +12,7 @@ Name: yum-utils BuildRequires: python-devel -Version: 1.1.3 +Version: 1.1.4 Release: 1 License: GNU General Public License (GPL) Group: System/Packages @@ -55,6 +55,18 @@ %{_mandir}/*/* %changelog +* Mon May 21 2007 - cthiel@suse.de +- update to version 1.1.4 + * plugins/security/security.py: Added patch by James Antill: It seems that + on RHEL5 there are update metadata entries with references == None (in + my FC6 testing they were always == []). This gives a traceback with the + current code. + * yumdownloader.py: removed crap from comment + * yumdownloader.py: make the '--source' work and make it a little smarter + so the 'reponame-source' are enabled automaticly for all enabled repos, + when '--source' is used. (rhbz #239528) + * plugins/security/security.py: Added patch to security plugin by Luke + Macken * Thu May 03 2007 - cthiel@suse.de - update to version 1.1.3 * New yum-security plugin by James Antill. ++++++ yum-utils-1.1.3.tar.bz2 -> yum-utils-1.1.4.tar.bz2 ++++++ diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yum-utils-1.1.3/ChangeLog new/yum-utils-1.1.4/ChangeLog --- old/yum-utils-1.1.3/ChangeLog 2007-05-01 19:18:11.000000000 +0200 +++ new/yum-utils-1.1.4/ChangeLog 2007-05-16 09:48:04.000000000 +0200 @@ -1,3 +1,38 @@ +2007-05-16 07:47 timlau + + * yum-utils.spec: bumped yum-utils version to 1.1.4 + +2007-05-16 07:41 timlau + + * plugins/security/security.py: Added patch by James Antill: + + It seems that on RHEL5 there are update metadata entries with + references == None (in my FC6 testing they were always == []). + This gives a traceback with the current code. + +2007-05-09 10:11 timlau + + * yumdownloader.py: removed crap from comment . + +2007-05-09 10:01 timlau + + * yumdownloader.py: make the '--source' work and make it a little + smarter so the 'reponame-source' are enabled automaticly for all + enabled repos, when '--source' is used. (rhbz #239528) + +2007-05-08 07:54 timlau + + * plugins/security/security.py: Added patch to security plugin by + Luke Macken + +2007-05-08 07:52 timlau + + * plugins/security/security.py: Added patch by James Antill. + +2007-05-01 17:19 timlau + + * ChangeLog: updated ChangeLog + 2007-05-01 17:19 timlau * yum-utils.spec: bumped yum-utils version to 1.1.3 diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yum-utils-1.1.3/ChangeLog.bak new/yum-utils-1.1.4/ChangeLog.bak --- old/yum-utils-1.1.3/ChangeLog.bak 2007-04-12 15:45:44.000000000 +0200 +++ new/yum-utils-1.1.4/ChangeLog.bak 2007-05-01 19:19:21.000000000 +0200 @@ -1,3 +1,74 @@ +2007-05-01 17:19 timlau + + * yum-utils.spec: bumped yum-utils version to 1.1.3 + +2007-05-01 16:42 skvidal + + * Makefile, yum-util-cli-template, yum-utils.spec: + - finish added debuginfo-install to makefile - add + yum-util-cli-template to repo and add it to %doc in spec file + - this is a template for folks to easily add more cli-based + yum-utils + +2007-05-01 16:35 skvidal + + * yum-utils.spec: + add debuginfo-install to spec file + +2007-05-01 16:33 skvidal + + * debuginfo-install.py: + add debuginfo-install to yum-utils + +2007-04-30 13:27 timlau + + * docs/: Makefile, reposync.1: Added reposync man page by Daniel de + Kok (#717) + +2007-04-30 10:31 timlau + + * reposync.py: Added gpgcheck option to reposync by Daniel de Kok + (#715) adding a "-g/--gpgcheck" option that removes a newly + downloaded package if the signature is not correct. + +2007-04-29 13:46 skvidal + + * docs/Makefile: + make sure man8 is made before installing the man page for + yum-security + +2007-04-24 05:25 timlau + + * updateonboot/yum-updateonboot.init: + Changed yum-updateonboot priorities to 25/75 -> 30/70 + + rhbz #235509 + +2007-04-21 12:01 timlau + + * plugins/downloadonly/downloadonly.py: fixed traceback when using + --downloaddir rhbz #237367 + +2007-04-20 10:25 timlau + + * yum-utils.spec, docs/Makefile, docs/yum-security.8, + plugins/security/security.conf, plugins/security/security.py: + Added security plugin written by James Antill <james@and.org> + +2007-04-19 06:13 lmacken + + * plugins/fastestmirror/: ChangeLog, fastestmirror.py: * Apr 19 + 2007 Luke Macken <lmacken@redhat.com> - 0.2.7 - Remove + TYPE_{INTERFACE,INTERACTIVE} + +2007-04-13 13:07 timlau + + * yumdownloader.py: create destdir if it not exists + +2007-04-12 13:46 timlau + + * ChangeLog: updated ChangeLog + 2007-04-12 13:45 timlau * ChangeLog: bumped yum-utils version to 1.1.2 diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yum-utils-1.1.3/plugins/security/security.py new/yum-utils-1.1.4/plugins/security/security.py --- old/yum-utils-1.1.3/plugins/security/security.py 2007-04-13 07:27:04.000000000 +0200 +++ new/yum-utils-1.1.4/plugins/security/security.py 2007-05-16 09:38:07.000000000 +0200 @@ -60,59 +60,88 @@ continue # No metadata found for this repo return md_info -def ysp_should_show_pkg(pkg, md, rname=None): - """ Do we want to show this package in sec-list. """ +def ysp__safe_refs(refs): + """ Sometimes refs == None, if so return the empty list here. + So we don't have to check everywhere. """ + if refs == None: + return [] + return refs + +def ysp_should_filter_pkg(opts, pkg, md, used_map): + """ Do the package filtering for should_show and should_keep. """ - md = md.get_notice((pkg.name, pkg.ver, pkg.rel)) - if not md: + def has_id(refs, ref_type, ref_ids): + ''' Check if the given ID is a match. ''' + for ref in ysp__safe_refs(refs): + if ref['type'] != ref_type: + continue + if ref['id'] not in ref_ids: + continue + used_map[ref_type][ref['id']] = True + return ref return None - md = md.get_metadata() - if not rname: + if opts.advisory and md['update_id'] in opts.advisory: + used_map['id'][md['update_id']] = True return md - if rname: - if rname == "security": - return md['type'] == 'security' - for ref in md['references']: - if ref['type'] != rname: - continue + elif opts.cve and has_id(md['references'], "cve", opts.cve): + return md + elif opts.bz and has_id(md['references'], "bugzilla", opts.bz): + return md + elif opts.security: + if md['type'] == 'security': return md - + elif not (opts.advisory or opts.cve or opts.bz or opts.security): + return md # This is only possible from should_show_pkg return None -def ysp_show_pkg_md_info(pkg, md, msg): - msg(pkg) - msg(' ID ' + md['update_id']) - msg(' Type ' + md['type']) - msg(' Issued ' + md['issued']) - if md['issued'] != md['updated']: - msg(' Updated ' + md['updated']) - if md['references']: - msg(' References') - for ref in md['references']: - if ref['type'] == 'cve': - txt = " CVE " + ref['id']; - elif ref['type'] == 'bugzilla': - txt = " BZ " + ref['id']; - else: - msg(" *" + ref['type']) - if 'summary' in ref: - if (len(txt) + len(ref['summary'])) <= 76: - msg("%s: %s" % (txt, ref['summary'])) - else: - msg("%s: %.*s..." % (txt, 73 -len(txt), ref['summary'])) - elif 'href' in ref and \ - (len(txt) + len(ref['href'])) <= 76: - msg("%s - %s" % (txt, ref['href'])) - else: - msg(txt) +def ysp_has_info_md(rname, md): + if rname == "security": + if md['type'] == 'security': + return md + for ref in ysp__safe_refs(md['references']): + if ref['type'] != rname: + continue + return md + +def ysp_should_show_pkg(opts, pkg, md, used_map, rname=None): + """ Do we want to show this package in list-security. """ + + md = md.get_notice((pkg.name, pkg.ver, pkg.rel)) + if not md: + return None + + if rname and not ysp_has_info_md(rname, md): + return None + return ysp_should_filter_pkg(opts, pkg, md, used_map) + +def ysp_gen_used_map(opts): + used_map = {'bugzilla' : {}, 'cve' : {}, 'id' : {}} + for i in opts.advisory: + used_map['id'][i] = False + for i in opts.bz: + used_map['bugzilla'][i] = False + for i in opts.cve: + used_map['cve'][i] = False + return used_map + +def ysp_chk_used_map(used_map, msg): + for i in used_map['id']: + if not used_map['id'][i]: + msg('Advisory \"%s\" not found applicable for this system' % i) + for i in used_map['bugzilla']: + if not used_map['bugzilla'][i]: + msg('BZ \"%s\" not found applicable for this system' % i) + for i in used_map['cve']: + if not used_map['cve'][i]: + msg('CVE \"%s\" not found applicable for this system' % i) class SecurityListCommands: def getNames(self): - return ['list-sec', 'list-security'] + return ['list-security', 'list-sec'] def getUsage(self): - return 'list-sec' + return self.getNames()[0] def doCheck(self, base, basecmd, extcmds): pass @@ -120,9 +149,16 @@ def getRepos(self): # so we can act as a "conduit" return self.repos - def show_pkg(self, msg, pkg, md): - ysp_show_pkg_md_info(pkg, md, msg) - msg('') + def show_pkg(self, msg, pkg, md, disp=None): + # Make the list view much smaller + # ysp_show_pkg_md_info(pkg, md, msg) + if disp and ysp_has_info_md(disp, md): + for ref in ysp__safe_refs(md['references']): + if ref['type'] != disp: + continue + msg(" %s %-8s %s" % (str(ref['id']), md['type'], pkg)) + else: + msg("%s %-8s %s" % (md['update_id'], md['type'], pkg)) def doCommand(self, base, basecmd, extcmds): ygh = base.doPackageLists('updates') @@ -135,79 +171,52 @@ def msg_warn(x): logger.warn(x) + opts,cmdline = base.plugins.cmdline ygh.updates.sort(key=lambda x: x.name) - if not extcmds: - for pkg in ygh.updates: - md = ysp_should_show_pkg(pkg, md_info) - if not md: - continue - self.show_pkg(msg, pkg, md) + used_map = ysp_gen_used_map(opts) + if False: + pass elif len(extcmds) == 1 and (extcmds[0] == "bugzillas" or \ extcmds[0] == "bzs"): - done = False for pkg in ygh.updates: - md = ysp_should_show_pkg(pkg, md_info, "bugzilla") + md = ysp_should_show_pkg(opts, pkg, md_info, used_map, + "bugzilla") if not md: continue - if not done: - msg(" ---- Bugzillas ----") - done = True - self.show_pkg(msg, pkg, md) + self.show_pkg(msg, pkg, md, "bugzilla") elif len(extcmds) == 1 and extcmds[0] == "cves": - done = False for pkg in ygh.updates: - md = ysp_should_show_pkg(pkg, md_info, "cve") + md = ysp_should_show_pkg(opts, pkg, md_info, used_map, "cve") if not md: continue - if not done: - msg(" ---- CVEs ----") - done = True - self.show_pkg(msg, pkg, md) + self.show_pkg(msg, pkg, md, "cve") elif len(extcmds) == 1 and (extcmds[0] == "security" or \ extcmds[0] == "sec"): - done = False for pkg in ygh.updates: - md = ysp_should_show_pkg(pkg, md_info, "security") + md = ysp_should_show_pkg(opts, pkg, md_info, used_map, + "security") if not md: continue - if not done: - msg(" ---- Security ----") - done = True self.show_pkg(msg, pkg, md) else: - uids_done = {} - for uid in extcmds: - uids_done[uid] = False + opts.advisory += extcmds + used_map = ysp_gen_used_map(opts) for pkg in ygh.updates: - md = ysp_should_show_pkg(pkg, md_info) + md = ysp_should_show_pkg(opts, pkg, md_info, used_map) if not md: - continue - - if md['update_id'] in extcmds: - uids_done[md['update_id']] = True - self.show_pkg(msg, pkg, md) - for uid in extcmds: - if not uids_done[uid]: - msg_warn('Advisory \"%s\" not found applicable' - ' for this system' % uid) + continue + self.show_pkg(msg, pkg, md) + ysp_chk_used_map(used_map, msg) # else: # return 1, [str(PluginYumExit('Bad %s commands' % basecmd))] return 0, [basecmd + ' done'] class SecurityInfoCommands(SecurityListCommands): def getNames(self): - return ['info-sec', 'info-security'] - - def getUsage(self): - return 'info-sec' + return ['info-security', 'info-sec'] - def show_pkg(self, msg, pkg, md): - ysp_show_pkg_md_info(pkg, md, msg) - if md['description'] != None: - msg(' Description') - msg(textwrap.fill(md['description'], - width=75, expand_tabs=False, - initial_indent=" ", subsequent_indent=" ")) + def show_pkg(self, msg, pkg, md, disp=None): + msg(md) msg('') def config_hook(conduit): @@ -267,33 +276,11 @@ def ysp_should_keep_pkg(opts, pkg, md, used_map): """ Do we want to keep this package to satisfy the security limits. """ - def has_id(refs, ref_type, ref_ids): - ''' Check if the given ID is a match. ''' - for ref in refs: - if ref['type'] != ref_type: - continue - if ref['id'] not in ref_ids: - continue - used_map[ref_type][ref['id']] = True - return ref - return None - md = md.get_notice((pkg.name, pkg.ver, pkg.rel)) if not md: return False - md = md.get_metadata() - if opts.advisory and md['update_id'] in opts.advisory: - used_map['id'][md['update_id']] = True - return True - elif opts.cve and has_id(md['references'], "cve", opts.cve): - return True - elif opts.bz and has_id(md['references'], "bugzilla", opts.bz): - return True - elif opts.security: - return md['type'] == 'security' - else: - return False + return ysp_should_filter_pkg(opts, pkg, md, used_map) def ysp_check_func_enter(conduit): """ Stuff we need to do in both list and update modes. """ @@ -314,12 +301,8 @@ if (args[0] == "update"): ret = {"skip": ndata, "list_cmd": False} if (args[0] == "list-sec") or (args[0] == "list-security"): - if not ndata: - conduit.error(2, 'Skipping security plugin arguments') return (opts, {"skip": True, "list_cmd": True}) if (args[0] == "info-sec") or (args[0] == "info-security"): - if not ndata: - conduit.error(2, 'Skipping security plugin arguments') return (opts, {"skip": True, "list_cmd": True}) if ret: @@ -331,30 +314,6 @@ conduit.error(2, 'Skipping security plugin, other command') return (opts, {"skip": True, "list_cmd": False, "msg": True}) -def ysp_gen_used_map(opts): - used_map = {'bugzilla' : {}, 'cve' : {}, 'id' : {}} - for i in opts.advisory: - used_map['id'][i] = False - for i in opts.bz: - used_map['bugzilla'][i] = False - for i in opts.cve: - used_map['cve'][i] = False - return used_map - -def ysp_chk_used_map(conduit, used_map): - for i in used_map['id']: - if not used_map['id'][i]: - conduit.error(2, 'Advisory \"%s\" not found applicable' - ' for this system' % i) - for i in used_map['bugzilla']: - if not used_map['bugzilla'][i]: - conduit.error(2, 'BZ \"%s\" not found applicable' - ' for this system' % i) - for i in used_map['cve']: - if not used_map['cve'][i]: - conduit.error(2, 'CVE \"%s\" not found applicable' - ' for this system' % i) - def exclude_hook(conduit): ''' Yum Plugin Exclude Hook: @@ -382,7 +341,7 @@ for pkg in conduit.getPackages(): if not ysp_should_keep_pkg(opts, pkg, md_info, used_map): ysp_del_pkg(pkg) - ysp_chk_used_map(conduit, used_map) + ysp_chk_used_map(used_map, lambda x: conduit.error(2, x)) def preresolve_hook(conduit): ''' @@ -416,13 +375,12 @@ ysp_del_pkg(tspkg) else: cnt += 1 - ysp_chk_used_map(conduit, used_map) + ysp_chk_used_map(used_map, lambda x: conduit.error(2, x)) if cnt: conduit.info(2, 'Needed %d packages, for security' % (cnt)) else: conduit.info(2, 'No packages needed, for security') - sys.exit(0) if __name__ == '__main__': print "This is a plugin that is supposed to run from inside YUM" diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yum-utils-1.1.3/yumdownloader.py new/yum-utils-1.1.4/yumdownloader.py --- old/yum-utils-1.1.3/yumdownloader.py 2007-04-13 14:28:17.000000000 +0200 +++ new/yum-utils-1.1.4/yumdownloader.py 2007-05-09 12:11:26.000000000 +0200 @@ -60,20 +60,30 @@ sys.exit(50) self.repos.setCacheDir(cachedir) - # Setup yum (Ts, RPM db, Repo & Sack) self.doUtilYumSetup() + # Setup source repos + if opts.source: + self.setupSourceRepos() # Do the real action self.downloadPackages(opts) + def setupSourceRepos(self): + # enable the -source repos for enabled primary repos + archlist = rpmUtils.arch.getArchList() + ['src'] + for repo in self.repos.listEnabled(): + srcrepo = '%s-source' % repo.id + for r in self.repos.findRepos(srcrepo): + self.logger.info('Enabling %s repository' % r.id) + r.enable() + # Setup the repo + self._getRepos(thisrepo=r.id,doSetup=True) + # Setup pkgSack with 'src' in the archlist + self._getSacks(archlist=archlist,thisrepo=r.id) + + def downloadPackages(self,opts): - archlist = None - if opts.source: - archlist = rpmUtils.arch.getArchList() + ['src'] - - self.doSackSetup(archlist=archlist) - avail = self.pkgSack.returnPackages() toDownload = [] @@ -86,7 +96,6 @@ if len(unmatched) > 0: # if we get back anything in unmatched, it fails self.logger.error('No Match for argument %s' % pkg) continue - for newpkg in installable: # This is to fix Bug 469 # If there are matches to the package argument given but there Files old/yum-utils-1.1.3/yum-utils-1.1.3.tar.gz and new/yum-utils-1.1.4/yum-utils-1.1.3.tar.gz differ diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yum-utils-1.1.3/yum-utils.spec new/yum-utils-1.1.4/yum-utils.spec --- old/yum-utils-1.1.3/yum-utils.spec 2007-05-01 19:17:39.000000000 +0200 +++ new/yum-utils-1.1.4/yum-utils.spec 2007-05-16 09:46:28.000000000 +0200 @@ -1,6 +1,6 @@ Summary: Utilities based around the yum package manager Name: yum-utils -Version: 1.1.3 +Version: 1.1.4 Release: 1%{?dist} License: GPL Group: Development/Tools @@ -292,6 +292,9 @@ %changelog * Tue May 1 2007 Tim Lauridsen <tla@rasmil.dk> +- mark as 1.1.4 + +* Tue May 1 2007 Tim Lauridsen <tla@rasmil.dk> - mark as 1.1.3 * Tue May 1 2007 Seth Vidal <skvidal at linux.duke.edu> diff -urN --exclude=CVS --exclude=.cvsignore --exclude=.svn --exclude=.svnignore old/yum-utils-1.1.3/yum-utils.spec~ new/yum-utils-1.1.4/yum-utils.spec~ --- old/yum-utils-1.1.3/yum-utils.spec~ 1970-01-01 01:00:00.000000000 +0100 +++ new/yum-utils-1.1.4/yum-utils.spec~ 2007-05-01 19:19:11.000000000 +0200 @@ -0,0 +1,406 @@ +Summary: Utilities based around the yum package manager +Name: yum-utils +Version: 1.1.3 +Release: 1%{?dist} +License: GPL +Group: Development/Tools +Source: http://linux.duke.edu/yum/download/yum-utils/%{name}-%{version}.tar.gz +URL: http://linux.duke.edu/yum/download/yum-utils/ +BuildRoot: %{_tmppath}/%{name}-%{version}-%{release}-root-%(%{__id_u} -n) +BuildArch: noarch +Requires: python >= 2.4 , yum >= 3.1.1 + +%description +yum-utils is a collection of utilities and examples for the yum package +manager. It includes utilities by different authors that make yum easier and +more powerful to use. + +%package -n yum-updateonboot +Summary: Run yum update on system boot +Group: System Environment/Base +Requires: python, yum >= 2.4 +Requires(pre): chkconfig +Requires(post): chkconfig + +%description -n yum-updateonboot +Runs yum update on system boot. This allows machines that have been turned +off for an extended amount of time to become secure immediately, instead of +waiting until the next early morning cron job. + +%package -n yum-changelog +Summary: Yum plugin for viewing package changelogs before/after updating +Group: System Environment/Base +Requires: yum >= 3.0 + +%description -n yum-changelog +This plugin adds a command line option to allow viewing package changelog +deltas before or after updating packages. + +%package -n yum-fastestmirror +Summary: Yum plugin which chooses fastest repository from a mirrorlist +Group: System Environment/Base +Requires: yum >= 3.0 + +%description -n yum-fastestmirror +This plugin sorts each repository's mirrorlist by connection speed +prior to downloading packages. + +%package -n yum-fedorakmod +Summary: Yum plugin to handle fedora kernel modules. +Group: System Environment/Base +Requires: yum >= 3.0 + +%description -n yum-fedorakmod +Plugin for Yum to handle installation of kmod-foo type of kernel modules, when new kernel versions +are installed. +kmod-foo kernel modules is described by the Fedora Extras packaging standards. + +%package -n yum-protectbase +Summary: Yum plugin to protect packages from certain repositories. +Group: System Environment/Base +Requires: yum >= 3.0 + +%description -n yum-protectbase +This plugin allows certain repositories to be protected. Packages in the +protected repositories can't be overridden by packages in non-protected +repositories even if the non-protected repo has a later version. + +%package -n yum-versionlock +Summary: Yum plugin to lock specified packages from being updated +Group: System Environment/Base +Requires: yum >= 3.0 + +%description -n yum-versionlock +This plugin allows certain packages specified in a file to be protected from being updated by +newer versions. + +%package -n yum-tsflags +Summary: Yum plugin to add tsflags by a commandline option +Group: System Environment/Base +Requires: yum >= 3.0 + +%description -n yum-tsflags +This plugin allows you to specify optional transaction flags on the yum +command line + +%package -n yum-kernel-module +Summary: Yum plugin to handle kernel-module-foo type of kernel module +Group: System Environment/Base +Requires: yum >= 3.0 + +%description -n yum-kernel-module +This plugin handle installation of kernel-module-foo type of kernel modules when new version of +kernels are installed. + + +%package -n yum-downloadonly +Summary: Yum plugin to add downloadonly command option +Group: System Environment/Base +Requires: yum >= 3.0 + +%description -n yum-downloadonly +This plugin adds a --downloadonly flag to yum so that yum will only download +the packages and not install/update them. + +%package -n yum-allowdowngrade +Summary: Yum plugin to enable manual downgrading of packages +Group: System Environment/Base +Requires: yum >= 3.0 + +%description -n yum-allowdowngrade +This plugin adds a --allow-downgrade flag to yum to make it possible to +manually downgrade packages to specific versions. + +%package -n yum-skip-broken +Summary: Yum plugin to handle skiping packages with dependency problems +Group: System Environment/Base +Requires: yum >= 3.0 + +%description -n yum-skip-broken +This plugin adds a --skip-broken to yum to make it possible to +check packages for dependency problems and skip the one with problems. + +%package -n yum-priorities +Summary: plugin to give priorities to packages from different repos +Group: System Environment/Base +Requires: yum >= 3.0 + +%description -n yum-priorities +This plugin allows repositories to have different priorities. +Packages in a repository with a lower priority can't be overridden by packages +from a repository with a higher priority even if repo has a later version. + +%package -n yum-refresh-updatesd +Summary: Tell yum-updatesd to check for updates when yum exits +Group: System Environment/Base +Requires: yum >= 3.0 + +%description -n yum-refresh-updatesd +yum-refresh-updatesd tells yum-updatesd to check for updates when yum exits. +This way, if you run 'yum list updates' and yum says there's a new version +of (for example) zsh available, puplet will almost instantly update itself +to reflect this. + +%package -n yum-merge-conf +Summary: Yum plugin to merge configuration changes when installing packages +Group: System Environment/Base +Requires: yum >= 3.0 + +%description -n yum-merge-conf +This yum plugin adds the "--merge-conf" command line option. With this option, +Yum will ask you what to do with config files which have changed on updating a +package. + +%package -n yum-security +Summary: Yum plugin to enable security filters +Group: System Environment/Base +Requires: yum >= 3.0.5 + +%description -n yum-security +This plugin adds ther options --security, --cve, --bz and --advisory flags +to yum and the list-security and info-security commands. +The options make it possible to limit list/upgrade of packages to specific +security relevant ones. The commands give you the security information. + + +%prep +%setup -q + +%install +rm -rf $RPM_BUILD_ROOT +make DESTDIR=$RPM_BUILD_ROOT install +make -C updateonboot DESTDIR=$RPM_BUILD_ROOT install + +# Plugins to install +plugins="changelog fastestmirror fedorakmod protectbase versionlock tsflags kernel-module downloadonly allowdowngrade skip-broken priorities refresh-updatesd merge-conf security" +mkdir -p $RPM_BUILD_ROOT/%{_sysconfdir}/yum/pluginconf.d/ $RPM_BUILD_ROOT/usr/lib/yum-plugins/ + +cd plugins +for plug in $plugins; do + install -m 644 $plug/*.conf $RPM_BUILD_ROOT/%{_sysconfdir}/yum/pluginconf.d/ + install -m 644 $plug/*.py $RPM_BUILD_ROOT/usr/lib/yum-plugins/ +done + +%clean +rm -rf $RPM_BUILD_ROOT + +%post -n yum-updateonboot +/sbin/chkconfig --add yum-updateonboot >/dev/null 2>&1 || :; + +%preun -n yum-updateonboot +if [ $1 = 0 ]; then + /sbin/service yum-updateonboot stop >/dev/null 2>&1 || :; + /sbin/chkconfig --del yum-updateonboot >/dev/null 2>&1 || :; +fi + +%files +%defattr(-, root, root) +%doc README yum-util-cli-template +%doc COPYING +%doc plugins/README +%{_bindir}/debuginfo-install +%{_bindir}/package-cleanup +%{_bindir}/repoclosure +%{_bindir}/repomanage +%{_bindir}/repoquery +%{_bindir}/repotrack +%{_bindir}/reposync +%{_bindir}/repo-graph +%{_bindir}/repo-rss +%{_bindir}/yumdownloader +%{_bindir}/yum-builddep +%{_mandir}/man1/* + +%files -n yum-updateonboot +%defattr(-, root, root) +%doc updateonboot/README +%config(noreplace) %{_sysconfdir}/sysconfig/yum-updateonboot +%{_initrddir}/yum-updateonboot + +%files -n yum-changelog +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/changelog.conf +/usr/lib/yum-plugins/changelog.* +%{_mandir}/man1/yum-changelog.1.* +%{_mandir}/man5/yum-changelog.conf.5.* + +%files -n yum-fastestmirror +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/fastestmirror.conf +/usr/lib/yum-plugins/fastestmirror.* + +%files -n yum-fedorakmod +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/fedorakmod.conf +/usr/lib/yum-plugins/fedorakmod.* + +%files -n yum-protectbase +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/protectbase.conf +/usr/lib/yum-plugins/protectbase.* + +%files -n yum-versionlock +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/versionlock.conf +/usr/lib/yum-plugins/versionlock.* + +%files -n yum-tsflags +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/tsflags.conf +/usr/lib/yum-plugins/tsflags.* + +%files -n yum-kernel-module +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/kernel-module.conf +/usr/lib/yum-plugins/kernel-module.* + +%files -n yum-downloadonly +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/downloadonly.conf +/usr/lib/yum-plugins/downloadonly.* + +%files -n yum-allowdowngrade +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/allowdowngrade.conf +/usr/lib/yum-plugins/allowdowngrade.* + +%files -n yum-skip-broken +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/skip-broken.conf +/usr/lib/yum-plugins/skip-broken.* + +%files -n yum-priorities +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/priorities.conf +/usr/lib/yum-plugins/priorities.* + +%files -n yum-refresh-updatesd +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/refresh-updatesd.conf +/usr/lib/yum-plugins/refresh-updatesd.* + +%files -n yum-merge-conf +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/merge-conf.conf +/usr/lib/yum-plugins/merge-conf.* + +%files -n yum-security +%defattr(-, root, root) +%config(noreplace) %{_sysconfdir}/yum/pluginconf.d/security.conf +/usr/lib/yum-plugins/security.* +%{_mandir}/man8/yum-security.8.* + +%changelog +* Tue May 1 2007 Tim Lauridsen <tla@rasmil.dk> +- mark as 1.1.3 + +* Tue May 1 2007 Seth Vidal <skvidal at linux.duke.edu> +- added debuginfo-install + +* Fri Apr 20 2007 Tim Lauridsen <tla@rasmil.dk> +- Added security plugin written by James Antill <james@and.org> + +* Thu Apr 12 2007 Tim Lauridsen <tla@rasmil.dk> +- mark as 1.1.2 +- Added merge-conf plugin written by Aurelien Bompard <abompard@fedoraproject.org> + +* Mon Feb 19 2007 Tim Lauridsen <tla@rasmil.dk> +- mark it as 1.1.1 + +* Mon Feb 19 2007 Tim Lauridsen <tla@rasmil.dk> +- mark it as 1.1.0 (again) + +* Thu Feb 15 2007 Tim Lauridsen <tla@rasmil.dk> +- removed versionlock.list installation. + +* Wed Feb 14 2007 Tim Lauridsen <tla@rasmil.dk> +- Added versionlock.list installation. +- fixed skip-broken description (--ignore-broken -> --skip-broken) + +* Tue Feb 13 2007 James Bowes <jbowes@redhat.com> +- Add yum-refresh-updatesd plugin + +* Thu Feb 8 2007 Tim Lauridsen <tla@rasmil.dk> +- Added man dirs to yum-changelog files section + +* Wed Feb 7 2007 Tim Lauridsen <tla@rasmil.dk> +- mark it as 1.1.0 +- Requires: yum >= 3.1.1 for yum-utils. + +* Tue Feb 6 2007 Tim Lauridsen <tla@rasmil.dk> +- Added %%{?dist} tag + +* Sun Dec 31 2006 Tim Lauridsen <tla@rasmil.dk> +- mark it as 1.0.2 + +* Tue Oct 31 2006 Tim Lauridsen <tla@rasmil.dk> +- mark it as 1.0.1 + +* Fri Oct 27 2006 Tim Lauridsen <tla@rasmil.dk> +- Added priorities plugin written by Daniel de Kok <danieldk at pobox.com> + +* Wed Oct 4 2006 Seth Vidal <skvidal at linux.duke.edu> +- mark it as 1.0 +- change requires for the packages to yum 3.0 + +* Wed Sep 27 2006 Tim Lauridsen <tla@rasmil.dk> +- added skip-broken plugin + +* Tue Sep 05 2006 Panu Matilainen <pmatilai@laiskianen.org> +- added allowdowngrade plugin + +* Sun Aug 13 2006 Seth Vidal <skvidal at linux.duke.edu> +- fix the plugins/ doc issue + +* Sat May 6 2006 Seth Vidal <skvidal at linux.duke.edu> +- bump version number +- added yum-downloadonly plugin +- fix minor item in tsflags description + +* Sat Apr 29 2006 Seth Vidal <skvidal at linux.duke.edu> +- add reposync + +* Fri Apr 28 2006 Tim Lauridsen <tla@rasmil.dk> +- added yum-fedorakmod plugin subpackage +- added yum-protectbase plugin subpackage. +- added yum-versionlock plugin subpackage. +- added yum-tsflags plugin subpackage. +- added yum-kernel-module plugin subpackage +- changed .py to .* in files sections for plugin subpackages to build rpms without error. + +* Thu Feb 23 2006 Seth Vidal <skvidal at linux.duke.edu> +- changed some of the yum version dependencies + +* Fri Feb 10 2006 Seth Vidal <skvidal@linux.duke.edu> +- added repotrack to utils +- bumped version for 2.5.X-compatible release + +* Tue Jan 10 2006 Brian Long <brilong@cisco.com> +- bump version to 0.4 +- add yum-fastestmirror subpackage + +* Mon Oct 17 2005 Panu Matilainen <pmatilai@laiskiainen.org> +- add repoquery man page + +* Sat Sep 17 2005 Panu Matilainen <pmatilai@laiskiainen.org> +- version 0.3.1 +- various enhancements and fixes to repoquery +- avoid tracebacks in yumex and pup when changelog plugin is enabled + +* Mon Jul 25 2005 Panu Matilainen <pmatilai@laiskiainen.org> +- bump version to 0.3 +- add yum-changelog subpackage +- add plugins as documentation to the main package +- require yum >= 2.3.4 (for getCacheDir) + +* Tue Jun 21 2005 Gijs Hollestelle <gijs@gewis.nl> +- Added missing GPL COPYING file + +* Wed Jun 1 2005 Seth Vidal <skvidal@phy.duke.edu> +- 0.2 + +* Mon May 23 2005 Panu Matilainen <pmatilai@laiskiainen.org> +- add yum-updateboot subpackage + +* Mon May 16 2005 Gijs Hollestelle <gijs@gewis.nl> +- first version based on the mock spec file ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Remember to have fun... --------------------------------------------------------------------- To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-commit+help@opensuse.org
participants (1)
-
root@Hilbert.suse.de