%autosetup for EPEL5
by Jason L Tibbitts III
I thought it was impossible. Then I thought it was merely impossible
without some terrible hacking. But now, after a bit of inspiration in
the shower this morning, I went ahead and implemented the complete
%autosetup functionality for EPEL5. Currently built as
epel-rpm-macros-5.3 but not yet pushed to testing.
As always, I welcome any testing. If these epel-rpm-macro packages can
get karma, folks could start using the things I'm adding sooner rather
than two weeks from now.
And if you want something added, please file a bugzilla ticket on the
epel-rpm-macros package and I'll have a look.
Since folks on IRC were curious as to how this is possible:
rpm >= 4.6 (i.e. EL6 and newer) provides two tables in the lua
namespace: patches and sources. %autosetup iterates over patches to
work its patch application magic. If you can somehow provide the
patches table in EL5's rpm, you can use the autosetup macros verbatim as
far as I can tell.
So I wrote some lua support functions to iterate over a range of
possible %SOURCEX and %PATCHX macros and stick anything found into the
appropriate table. One line added to the %autosetup definition calls
this function and everything else works. The whole thing is in
/etc/rpm/macros.zzz-epel in the %epel_macros_init() scaffolding and the
%elf_setup_patches() function.
By default it looks at all of %PATCH0 through %PATCH100000, which takes
an immeasurably small amount of time on my test VM. If you really want
to use Patch3141527: or whatever, you can set %el5_patches_limit in your
spec.
This is all working and tested; it can even prep rpm.spec from current
rawhide without problems.
- J<
8 years
Fedora EPEL 7 updates-testing report
by updates@fedoraproject.org
The following Fedora EPEL 7 Security updates need testing:
Age URL
389 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-1087 dokuwiki-0-0.24.20140929c.el7
151 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-dac7ed832f mcollective-2.8.4-1.el7
18 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-785fc9a2ea dropbear-2016.72-1.el7
13 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-961ab9f259 seamonkey-2.40-1.el7
5 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-6f910ca40d MUMPS-5.0.1-18.el7
4 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-9129aa0c6f python-rsa-3.4.1-1.el7
4 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-41437a502e libmaxminddb-1.2.0-1.el7
0 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-8f8696393e latex2rtf-2.3.10-1.el7
0 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-e710acc2b4 fuse-encfs-1.8.1-1.el7
The following builds have been pushed to Fedora EPEL 7 updates-testing
fuse-encfs-1.8.1-1.el7
krop-0.4.8-1.el7
latex2rtf-2.3.10-1.el7
libbson-1.3.5-1.el7
openscap-daemon-0.1.4-1.el7
php-composer-semver-1.4.0-1.el7
php-doctrine-doctrine-cache-bundle-1.3.0-1.el7
trustedqsl-2.2.1-1.el7
Details about builds:
================================================================================
fuse-encfs-1.8.1-1.el7 (FEDORA-EPEL-2016-e710acc2b4)
Encrypted pass-thru filesystem in userspace
--------------------------------------------------------------------------------
Update Information:
Update to 1.8.1.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1119122 - fuse-encfs is missing from EPEL 7
https://bugzilla.redhat.com/show_bug.cgi?id=1119122
[ 2 ] Bug #1097540 - fuse-encfs: multiple cryptography issues [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1097540
[ 3 ] Bug #906390 - Man page does not mention ENCFS6_CONFIG variable name.
https://bugzilla.redhat.com/show_bug.cgi?id=906390
[ 4 ] Bug #1307518 - fuse-encfs: FTBFS in rawhide
https://bugzilla.redhat.com/show_bug.cgi?id=1307518
[ 5 ] Bug #1234255 - New version available - 1.8.1
https://bugzilla.redhat.com/show_bug.cgi?id=1234255
--------------------------------------------------------------------------------
================================================================================
krop-0.4.8-1.el7 (FEDORA-EPEL-2016-f8be77734f)
Tool to crop PDF files with an eye towards eReaders
--------------------------------------------------------------------------------
Update Information:
initial package, version 0.4.8
--------------------------------------------------------------------------------
================================================================================
latex2rtf-2.3.10-1.el7 (FEDORA-EPEL-2016-8f8696393e)
LaTeX to RTF converter that handles equations, figures, and cross-references
--------------------------------------------------------------------------------
Update Information:
Update to 2.3.10 for CVE-2015-8106
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1282492 - CVE-2015-8106 latex2rtf: Format string vulnerability in CmdKeywords
https://bugzilla.redhat.com/show_bug.cgi?id=1282492
--------------------------------------------------------------------------------
================================================================================
libbson-1.3.5-1.el7 (FEDORA-EPEL-2016-ee0053ba0c)
Building, parsing, and iterating BSON documents
--------------------------------------------------------------------------------
Update Information:
There are no changes in the code. We deliver this release only because of the
new version string.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1322634 - libbson-1.3.5 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1322634
--------------------------------------------------------------------------------
================================================================================
openscap-daemon-0.1.4-1.el7 (FEDORA-EPEL-2016-b1a9816d56)
Manages continuous SCAP scans of your infrastructure
--------------------------------------------------------------------------------
Update Information:
upgrade to the latest upstream release
--------------------------------------------------------------------------------
================================================================================
php-composer-semver-1.4.0-1.el7 (FEDORA-EPEL-2016-10800026f4)
Semver library that offers utilities, version constraint parsing and validation
--------------------------------------------------------------------------------
Update Information:
**Version 1.4.0** * Added: getters on MultiConstraint
--------------------------------------------------------------------------------
================================================================================
php-doctrine-doctrine-cache-bundle-1.3.0-1.el7 (FEDORA-EPEL-2016-2a482d28b1)
Symfony2 Bundle for Doctrine Cache
--------------------------------------------------------------------------------
Update Information:
### 1.3.0 * Added apcu driver * Added predis driver * Fixed mangling issue with
memcache driver * Reorganized documentation * Added persistent id to memcache
driver ### 1.2.2 * Made Symfony Security ACL an optional dependency ### 1.2.1
* Relaxed Symfony requirements allowing old installs ### 1.2.0 * Fixes
[#47](https://github.com/doctrine/DoctrineCacheBundle/pull/47)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1279828 - php-doctrine-doctrine-cache-bundle-1.3.0 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1279828
--------------------------------------------------------------------------------
================================================================================
trustedqsl-2.2.1-1.el7 (FEDORA-EPEL-2016-6e0cdac6d2)
TrustedQSL ham-radio applications
--------------------------------------------------------------------------------
Update Information:
TQSL changes Defects Corrected: When installing a .TQ6 file succeeded, TQSL
would delete any other certificate files for that callsign, under the assumption
that they were no longer needed. If an operator with a pending callsign
certificate request would then install a TQ6 file for their former callsign
certificate (one that was being renewed), the private key for the pending
renewal could be deleted. This would cause the subsequent TQ6 file to fail to
install. TQSL no longer deletes anything unless it can verfify on-line with LoTW
that the installed certificate is the current one. When uploading logs, TQSL
would always display the progress bar. This should not have been done when
signing via the command line when batch mode (-x or -q) was enabled. TQSL 2.2.1
no longer displays the progress bar for these operations. When using the
language selection dialog, TQSL could cause the main window to close and re-
appear on a different area of the screen. The window location is now preserved
when the language is changed. In addition, TQSL doesn't destroy and re-create
the main window when the language is not changed. Updating the LoTW
configuration file could fail if the user's home directory contained non-ASCII
characters (Windows only). TQSL now handles this properly for such users. TQSL
now ensures that the password prompt window appears on top of other windows when
a password is requested while signing a log. This will cause the main TQSL
window to appear along with the password prompt. No change will be seen if there
is no password set on the associated callsign certificate. TQSL would reject
Cabrillo "Light" mode QSOs (300 GHz) as having an invalid frequency. TQSL now
accepts these as valid. TQSL could misinterpret unrecognized ADIF MODE/SUBMODE
entries in an ADIF file by not using the user���s ADIF mode settings. TQSL now
will use the mode maps when a mode/submode is not recognized. There was a
defect on OSX that would cause an incorrect error message to be displayed when
an incorrect password was entered for a callsign certificate. TQSL now displays
an appropriate error message in this circumstance. Restoring an incorrect .TQ6
file when there was a pending callsign certificate request could cause the
pending request to be deleted. TQSL now rejects the invalid TQ6 file and takes
no other action. Major feature Additions: The callsign certificate properties
displays now include "Replaced" and "Expired" indicators. TQSL now attempts to
cleanly close out the duplicates database when the window is closed while a
signing operation is underway. TQSL now allows an alternate layout for the user
interface that moves the status log to a separate tab. This is useful for users
with long lists of station locations or callsign certificates. The TQSL
duplicate QSO tracking was updated to allow reporting of station location
changes when the same QSO is signed from more than one station location. This
makes it less likely that an operator will mistakenly re-upload an already QSLd
contact with incorrect station location information. The TQSL ADIF editor was
updated to automatically select the appropriate band when a frequency is
entered.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1304113 - trustedqsl-2.2.1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1304113
--------------------------------------------------------------------------------
8 years
Fedora EPEL 6 updates-testing report
by updates@fedoraproject.org
The following Fedora EPEL 6 Security updates need testing:
Age URL
285 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-6828 chicken-4.9.0.1-4.el6
267 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7031 python-virtualenv-12.0.7-1.el6
261 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-7168 rubygem-crack-0.3.2-2.el6
192 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-8148 optipng-0.7.5-5.el6
192 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-8156 nagios-4.0.8-1.el6
151 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-e2b4b5b2fb mcollective-2.8.4-1.el6
123 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2015-35e240edd9 thttpd-2.25b-24.el6
21 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-44de0606ef python-tgcaptcha2-0.3.1-1.el6
15 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-8fbd838843 dropbear-2016.72-1.el6
15 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-7640e3144a proftpd-1.3.3g-9.el6
13 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-a83c92dee3 seamonkey-2.40-1.el6
8 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-30a8346813 vtun-3.0.1-10.el6
5 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-c463c181f1 MUMPS-5.0.1-18.el6
5 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-292f24b5c5 exim-4.84.2-1.el6
4 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-c3550220fe python-rsa-3.4.1-1.el6
0 https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2016-0d0163d5fd latex2rtf-2.3.10-1.el6
The following builds have been pushed to Fedora EPEL 6 updates-testing
epel-rpm-macros-6-6
latex2rtf-2.3.10-1.el6
perl-Net-SSLGlue-1.055-4.el6
sslh-1.18-1.el6
trustedqsl-2.2.1-1.el6
Details about builds:
================================================================================
epel-rpm-macros-6-6 (FEDORA-EPEL-2016-7c8a4eb5b6)
Extra Packages for Enterprise Linux RPM macros
--------------------------------------------------------------------------------
Update Information:
Adds the following macros: * %epel * %rpmmacrodir macros. * %autosetup (and
various accompanying macros)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1320497 - RFE: implement %epel macro
https://bugzilla.redhat.com/show_bug.cgi?id=1320497
--------------------------------------------------------------------------------
================================================================================
latex2rtf-2.3.10-1.el6 (FEDORA-EPEL-2016-0d0163d5fd)
LaTeX to RTF converter that handles equations, figures, and cross-references
--------------------------------------------------------------------------------
Update Information:
Update to 2.3.10 for CVE-2015-8106
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1282492 - CVE-2015-8106 latex2rtf: Format string vulnerability in CmdKeywords
https://bugzilla.redhat.com/show_bug.cgi?id=1282492
--------------------------------------------------------------------------------
================================================================================
perl-Net-SSLGlue-1.055-4.el6 (FEDORA-EPEL-2016-d6ea31e69d)
Add/extend SSL support for common perl modules
--------------------------------------------------------------------------------
Update Information:
Fixing harmless warning caused $LWP::Protocol::https::VERSION missing in el6.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1322572 - Version bump to 1.055 causes warnings on el6
https://bugzilla.redhat.com/show_bug.cgi?id=1322572
--------------------------------------------------------------------------------
================================================================================
sslh-1.18-1.el6 (FEDORA-EPEL-2016-0801e02c8f)
Applicative protocol(SSL/SSH) multiplexer
--------------------------------------------------------------------------------
Update Information:
Update to upstream 1.18
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1322188 - sslh-v1.18 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1322188
--------------------------------------------------------------------------------
================================================================================
trustedqsl-2.2.1-1.el6 (FEDORA-EPEL-2016-12b5acf8ff)
TrustedQSL ham-radio applications
--------------------------------------------------------------------------------
Update Information:
TQSL changes Defects Corrected: When installing a .TQ6 file succeeded, TQSL
would delete any other certificate files for that callsign, under the assumption
that they were no longer needed. If an operator with a pending callsign
certificate request would then install a TQ6 file for their former callsign
certificate (one that was being renewed), the private key for the pending
renewal could be deleted. This would cause the subsequent TQ6 file to fail to
install. TQSL no longer deletes anything unless it can verfify on-line with LoTW
that the installed certificate is the current one. When uploading logs, TQSL
would always display the progress bar. This should not have been done when
signing via the command line when batch mode (-x or -q) was enabled. TQSL 2.2.1
no longer displays the progress bar for these operations. When using the
language selection dialog, TQSL could cause the main window to close and re-
appear on a different area of the screen. The window location is now preserved
when the language is changed. In addition, TQSL doesn't destroy and re-create
the main window when the language is not changed. Updating the LoTW
configuration file could fail if the user's home directory contained non-ASCII
characters (Windows only). TQSL now handles this properly for such users. TQSL
now ensures that the password prompt window appears on top of other windows when
a password is requested while signing a log. This will cause the main TQSL
window to appear along with the password prompt. No change will be seen if there
is no password set on the associated callsign certificate. TQSL would reject
Cabrillo "Light" mode QSOs (300 GHz) as having an invalid frequency. TQSL now
accepts these as valid. TQSL could misinterpret unrecognized ADIF MODE/SUBMODE
entries in an ADIF file by not using the user���s ADIF mode settings. TQSL now
will use the mode maps when a mode/submode is not recognized. There was a
defect on OSX that would cause an incorrect error message to be displayed when
an incorrect password was entered for a callsign certificate. TQSL now displays
an appropriate error message in this circumstance. Restoring an incorrect .TQ6
file when there was a pending callsign certificate request could cause the
pending request to be deleted. TQSL now rejects the invalid TQ6 file and takes
no other action. Major feature Additions: The callsign certificate properties
displays now include "Replaced" and "Expired" indicators. TQSL now attempts to
cleanly close out the duplicates database when the window is closed while a
signing operation is underway. TQSL now allows an alternate layout for the user
interface that moves the status log to a separate tab. This is useful for users
with long lists of station locations or callsign certificates. The TQSL
duplicate QSO tracking was updated to allow reporting of station location
changes when the same QSO is signed from more than one station location. This
makes it less likely that an operator will mistakenly re-upload an already QSLd
contact with incorrect station location information. The TQSL ADIF editor was
updated to automatically select the appropriate band when a frequency is
entered.
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1304113 - trustedqsl-2.2.1 is available
https://bugzilla.redhat.com/show_bug.cgi?id=1304113
--------------------------------------------------------------------------------
8 years