Hello community,
here is the log from the commit of package feh for openSUSE:Factory checked in at 2017-11-08 15:11:36
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/feh (Old)
and /work/SRC/openSUSE:Factory/.feh.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "feh"
Wed Nov 8 15:11:36 2017 rev:16 rq:539756 version:2.22.2
Changes:
--------
--- /work/SRC/openSUSE:Factory/feh/feh.changes 2017-11-07 10:02:27.744584634 +0100
+++ /work/SRC/openSUSE:Factory/.feh.new/feh.changes 2017-11-08 15:15:53.741427805 +0100
@@ -1,0 +2,13 @@
+Wed Nov 8 03:41:37 UTC 2017 - aavindraa@gmail.com
+
+- update to 2.22.2
+ * Fix HTTPS certificate errors on some systems (broken in 2.22)
+
+-------------------------------------------------------------------
+Tue Nov 7 11:22:45 UTC 2017 - aavindraa@gmail.com
+
+- update to 2.22.1
+ * Allow ~/.fehbg to be sourced (instead of executed) from other
+ shell scripts again (broken in 2.22)
+
+-------------------------------------------------------------------
Old:
----
feh-2.22.tar.bz2
feh-2.22.tar.bz2.asc
New:
----
feh-2.22.2.tar.bz2
feh-2.22.2.tar.bz2.asc
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ feh.spec ++++++
--- /var/tmp/diff_new_pack.6bxSsP/_old 2017-11-08 15:15:54.769390285 +0100
+++ /var/tmp/diff_new_pack.6bxSsP/_new 2017-11-08 15:15:54.773390139 +0100
@@ -17,7 +17,7 @@
Name: feh
-Version: 2.22
+Version: 2.22.2
Release: 0
Summary: Fast and Lightweight Image Viewer
License: MIT AND LGPL-2.0+
++++++ feh-2.22.tar.bz2 -> feh-2.22.2.tar.bz2 ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/feh-2.22/ChangeLog new/feh-2.22.2/ChangeLog
--- old/feh-2.22/ChangeLog 2017-11-04 15:03:43.000000000 +0100
+++ new/feh-2.22.2/ChangeLog 2017-11-07 17:40:24.000000000 +0100
@@ -1,3 +1,14 @@
+Tue, 07 Nov 2017 17:36:26 +0100 Daniel Friesel
+
+* Release v2.22.2
+ * Fix HTTPS certificate errors on some systems (broken in 2.22)
+
+Tue, 07 Nov 2017 07:51:48 +0100 Daniel Friesel
+
+* Release v2.22.1
+ * Allow ~/.fehbg to be sourced (instead of executed) from other shell
+ scripts again (broken in 2.22)
+
Sat, 04 Nov 2017 14:55:38 +0100 Daniel Friesel
* Release v2.22
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/feh-2.22/config.mk new/feh-2.22.2/config.mk
--- old/feh-2.22/config.mk 2017-11-04 15:03:43.000000000 +0100
+++ new/feh-2.22.2/config.mk 2017-11-07 17:40:24.000000000 +0100
@@ -1,5 +1,5 @@
PACKAGE ?= feh
-VERSION ?= 2.22
+VERSION ?= 2.22.2
app ?= 0
cam ?= 0
@@ -76,7 +76,7 @@
MAN_EXIF = disabled
endif
-MAN_DATE ?= November 04, 2017
+MAN_DATE ?= November 07, 2017
# Uncomment this to use dmalloc
#CFLAGS += -DWITH_DMALLOC
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/feh-2.22/src/imlib.c new/feh-2.22.2/src/imlib.c
--- old/feh-2.22/src/imlib.c 2017-11-04 15:03:43.000000000 +0100
+++ new/feh-2.22.2/src/imlib.c 2017-11-07 17:40:24.000000000 +0100
@@ -429,7 +429,7 @@
if (opt.insecure_ssl) {
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYPEER, 0);
curl_easy_setopt(curl, CURLOPT_SSL_VERIFYHOST, 0);
- } else {
+ } else if (getenv("CURL_CA_BUNDLE") != NULL) {
// Allow the user to specify custom CA certificates.
curl_easy_setopt(curl, CURLOPT_CAINFO,
getenv("CURL_CA_BUNDLE"));
@@ -467,7 +467,7 @@
char *feh_http_load_image(char *url)
{
weprintf(
- "Cannot load image %s\n Please recompile with libcurl support",
+ "Cannot load image %s\nPlease recompile feh with libcurl support",
url
);
return NULL;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/feh-2.22/src/wallpaper.c new/feh-2.22.2/src/wallpaper.c
--- old/feh-2.22/src/wallpaper.c 2017-11-04 15:03:43.000000000 +0100
+++ new/feh-2.22.2/src/wallpaper.c 2017-11-07 17:40:24.000000000 +0100
@@ -436,7 +436,7 @@
if ((fp = fopen(path, "w")) == NULL) {
weprintf("Can't write to %s", path);
} else {
- fputs("#!/bin/sh\nexec ", fp);
+ fputs("#!/bin/sh\n", fp);
if (use_filelist) {
for (int i = 0; i < cmdargc; i++) {
fputs(shell_escape(cmdargv[i]), fp);