From 409baa647330db263a5f9429642e1fed69afd76c Mon Sep 17 00:00:00 2001 From: Vitezslav Crhonek Date: Tue, 14 Oct 2025 10:31:04 +0200 Subject: [PATCH] Eliminate use of obsolete %patchN syntax Related: RHEL-118292 --- openwsman.spec | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/openwsman.spec b/openwsman.spec index 6ce9b34..4ead52e 100644 --- a/openwsman.spec +++ b/openwsman.spec @@ -128,15 +128,15 @@ You can use it to send shell commands to a remote Windows hosts. %prep %setup -q -%patch1 -p1 -b .pamsetup -%patch2 -p1 -b .ruby-binding-build -%patch3 -p1 -b .openssl-1.1-fix -%patch4 -p1 -b .http-status-line -%patch5 -p1 -b .libcurl-error-codes-update -%patch6 -p1 -b .CVE-2019-3816 -%patch7 -p1 -b .CVE-2019-3833 -%patch8 -p1 -b .update-ssleay-conf -%patch9 -p1 -b .http-unauthorized-improve +%patch -P1 -p1 -b .pamsetup +%patch -P2 -p1 -b .ruby-binding-build +%patch -P3 -p1 -b .openssl-1.1-fix +%patch -P4 -p1 -b .http-status-line +%patch -P5 -p1 -b .libcurl-error-codes-update +%patch -P6 -p1 -b .CVE-2019-3816 +%patch -P7 -p1 -b .CVE-2019-3833 +%patch -P8 -p1 -b .update-ssleay-conf +%patch -P9 -p1 -b .http-unauthorized-improve %build # Removing executable permissions on .c and .h files to fix rpmlint warnings.