[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[Bug 181801] Review Request: zeroinstall-injector



Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.

Summary: Review Request: zeroinstall-injector


https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=181801





------- Additional Comments From michel salim gmail com  2006-02-25 16:49 EST -------
So, as I posted on the mailing list, there is no clean way of using the signed
tarball that upstream provided.

This is the hackery I have so far; it works, has no side effect, but rpmlint is
deeply unhappy by the use of %{sourcedir}. Unless there is a cleaner solution
I'd suggest that either the curious user find the upstream and verify it himself.

%prep
# Decrypt upstream source, ignore error message due to unknown key
gpg --decrypt %{_sourcedir}/%{name}-%{version}.tar.gz.gpg >
%{_sourcedir}/%{name}-%{version}.tar.gz || true
# Point source to the decrypted tarball
mv %{_sourcedir}/%{name}-%{version}.tar.gz.gpg
%{_sourcedir}/%{name}-%{version}.tar.gz.gpgbak
mv %{_sourcedir}/%{name}-%{version}.tar.gz
%{_sourcedir}/%{name}-%{version}.tar.gz.gpg

%setup -q
# Restore upstream tarball
mv %{_sourcedir}/%{name}-%{version}.tar.gz.gpgbak
%{_sourcedir}/%{name}-%{version}.tar.gz


-- 
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the QA contact for the bug, or are watching the QA contact.


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]