python-hacking-help-4.0.0-4.oe2203sp40>    fb ;G|`u` P sN@V)/jՖ'YMXIsZ,SU}˴Hd4bQ\Hp,hHçNU캢FHvFOIIi\Ч%ja[GsEJ wfe9#8]a2  E;޽UB;oNSF! >C3Bb3B}%RMCzH 0$~$6P2/>j}a!XvQ).@D9ٟSצq^6qc' Ctt AxQJ342b63765b1dc6d34d086478108f6b01c06a4d8681d69d14500ff51bc853eacf8d1b45414e559433d899b2e8aff8a74c2ff7d38efP q-\h W>: ? d ( P 39@ p             P| G(c8l9|:FG H I X Y\( ]X ^b d e f l t u v (z = P T Z  Cpython-hacking-help4.0.04.oe2203sp4OpenStack Hacking Guideline Enforcementhacking is a set of flake8 plugins that test and enforce the `OpenStack StyleGuide `_ Hacking pins its dependencies, as a new release of some dependency can break hacking based gating jobs. This is because new versions of dependencies can introduce new rules, or make existing rules stricter.fbdc-64g.compass-ciCApache-2.0http://openeuler.orgUnspecifiedhttps://docs.openstack.org/hacking/latest/linuxnoarch\"k"lLAA큤A큤A큤A큤fb__v__v__v_v__v_v_vd4c466a735af8d3ef41d96a356929a3be947a6cf23e48b33ebf83b5aaa1d18f885a91fad0caca8b2992516ca9b68167549ba3ad4cfc9bf0568921aea77d7fd63aa6b1d907119ffa4b43f31e5c171a3cb3e707eab8176c77c23a9061b0fa96161cef5d50d93c3b379953d8a5a0cb5ab6a2a09ee26a078b3c2bd72fff463539125923c2078032f75b0f7558bbcbebd142c9ef16181660bb693595ef0b1175dd3747b656f388349829d0d97f05fe9a0afae9566966e0574a7363c17b10183bb61c1addd2d498f11a922dd8abda8fa511141583994492ad9e018c8b360883f4e5fddrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootpython-hacking-4.0.0-4.oe2203sp4.src.rpmpython-hacking-helppython3-hacking-doc    rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.17.0``]`J@_wangxiyuan - 4.0.0-4openstack-sig zhangy Python_Bot - Correct requires position in spec- Remove requirements- Add buildrequires- Package Spec generateddc-64g.compass-ci 1717741467 4.0.0-4.oe2203sp4python-hackingdocrequirements.txtsourceconf.pycontributorcontributing.rstindex.rstuserhacking.rstindex.rstusage.rst/usr/share/doc//usr/share/doc/python-hacking//usr/share/doc/python-hacking/doc//usr/share/doc/python-hacking/doc/source//usr/share/doc/python-hacking/doc/source/contributor//usr/share/doc/python-hacking/doc/source/user/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2noarch-openEuler-linux-gnudirectoryASCII textxt7_utf-8d2859bc0104495d0a2d7bdbcd2860cec5aaa961bf600c60ea951ff656b684aebed521c600160d784f000fe507f923fb11fd08eb76df1a172a3fc6cc49e20f6d5?`7zXZ !#,_ ] b2u jӫ`(y,~1xY{4޾8FS<۵E_W?!䠓#J} (D?s#PE)PD(R&cAau(PB~rVKFT"Ԍ387P!JT@pUt-O EO=ǣY ` +iOhqNg 7RqxuCh qWPk`Q]PA=%}K t 54:+jM67I:*JXF[ .ca'Br ^~3'BkE-Vs zw) 8n0sx]$9ׁ>һ&J-*]'>xɟ/ ''m 'HF Dsbe*ɌjggtaP?:MwPK y5ql35v燮uGM0n/ǜYcؘۉ8y<cƻBIVV8D|g[+23U`Dֲq޺HWBJJǚc5(Y/iaV?jM enyŠPC"oVƪW  ВfdXJ R]r؈=9lֆh]q#]ahi.k'?7xS%7}W<| Y/m#(-K17Qx?:(?A0+'8d-,Uz`Ezb ܔ)(@L -XbT΃IbK#l}eE]|oqKCh1Tp~6 e#?Mb݃3 !1Ru1(ӱ$g> p4BH ?mֽ8MssrU#~5֫Ѝ{uz Hp.q3v#tdQo5P0Ms (% p~*Q؈0L#y7;BPF:}`C>=٥KHvhSx+<+[3ɮ0B,bi~n#u8>2r<.G_`d}$XYMZWqҪ*@F #Aim7GUF vO"(邐1YHˇ+e̾X?I@ew5aW/ JfvN#pݚUЎkW}ATRKU;d]6Gz3`*ҝљ Z<\'Y*f⥂+<CQ%iAO_"L[242;6+yk#C"uQ %pi}\=k3&l3 -lHo1zgFm_ex26[G c^d&2}ND/&n zϳ į&t]ҿoc)> nSѪ2vhr=}6Z>D1r +u]v[W^h+[e= 4(:}i^]k@-:b=R``ׄP?ЎmrlĞ 6H YZ