slackware-current/source/l/aom/fetch-aom.sh

53 lines
1.9 KiB
Bash
Raw Normal View History

#!/bin/sh
# Copyright 2024 Patrick J. Volkerding, Sebeka, Minnesota, USA
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
# permitted provided that the following conditions are met:
#
# 1. Redistributions of this script must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
PKGNAM=aom
# Pull a stable branch + patches
Tue Jun 11 21:09:01 UTC 2024 ap/alsa-utils-1.2.12-x86_64-1.txz: Upgraded. ap/cups-2.4.9-x86_64-1.txz: Upgraded. This update fixes bugs and a security issue: When starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. For more information, see: https://www.cve.org/CVERecord?id=CVE-2024-35235 (* Security fix *) l/alsa-lib-1.2.12-x86_64-1.txz: Upgraded. l/alsa-plugins-1.2.12-x86_64-1.txz: Upgraded. l/aom-3.9.1-x86_64-1.txz: Upgraded. l/mozjs115-115.12.0esr-x86_64-1.txz: Upgraded. xap/mozilla-firefox-127.0-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/127.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-25/ https://www.cve.org/CVERecord?id=CVE-2024-5687 https://www.cve.org/CVERecord?id=CVE-2024-5688 https://www.cve.org/CVERecord?id=CVE-2024-5689 https://www.cve.org/CVERecord?id=CVE-2024-5690 https://www.cve.org/CVERecord?id=CVE-2024-5691 https://www.cve.org/CVERecord?id=CVE-2024-5692 https://www.cve.org/CVERecord?id=CVE-2024-5693 https://www.cve.org/CVERecord?id=CVE-2024-5694 https://www.cve.org/CVERecord?id=CVE-2024-5695 https://www.cve.org/CVERecord?id=CVE-2024-5696 https://www.cve.org/CVERecord?id=CVE-2024-5697 https://www.cve.org/CVERecord?id=CVE-2024-5698 https://www.cve.org/CVERecord?id=CVE-2024-5699 https://www.cve.org/CVERecord?id=CVE-2024-5700 https://www.cve.org/CVERecord?id=CVE-2024-5701 (* Security fix *) xfce/xfce4-settings-4.18.6-x86_64-1.txz: Upgraded.
2024-06-11 23:09:01 +02:00
BRANCH=${1:-3.9.1}
# Clear download area:
rm -rf ${PKGNAM}
# Clone repository:
git clone https://aomedia.googlesource.com/aom
# checkout $BRANCH:
( cd ${PKGNAM}
git checkout v${BRANCH} || exit 1
)
HEADISAT="$( cd ${PKGNAM} && git log -1 --format=%h )"
DATE="$( cd ${PKGNAM} && git log -1 --format=%cd --date=format:%Y%m%d )"
LONGDATE="$( cd ${PKGNAM} && git log -1 --format=%cd --date=format:%c )"
# Cleanup. We're not packing up the whole git repo.
( cd ${PKGNAM} && find . -type d -name ".git*" -exec rm -rf {} \; 2> /dev/null )
mv ${PKGNAM} ${PKGNAM}-${BRANCH}
tar cf ${PKGNAM}-${BRANCH}.tar ${PKGNAM}-${BRANCH}
plzip -9 -f ${PKGNAM}-${BRANCH}.tar
rm -rf ${PKGNAM}-${BRANCH}
touch -d "$LONGDATE" ${PKGNAM}-${BRANCH}.tar.lz
echo
echo "${PKGNAM} branch $BRANCH with HEAD at $HEADISAT packaged as ${PKGNAM}-${BRANCH}.tar.lz"
echo