slackware-current/source/x/libevdev/libevdev.SlackBuild

111 lines
3.5 KiB
Text
Raw Normal View History

#!/bin/bash
# Slackware build script for libevdev
# Copyright 2014 Robby Workman, Northport, Alabama, USA
# Copyright 2015, 2018, 2020, 2021 Patrick J. Volkerding, Sebeka, MN, USA
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
# permitted provided that the following conditions are met:
#
# 1. Redistributions of this script must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=libevdev
VERSION=${VERSION:-$(echo $PKGNAM-*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
Tue Nov 9 20:22:27 UTC 2021 a/dialog-1.3_20211107-x86_64-1.txz: Upgraded. ap/mariadb-10.5.13-x86_64-1.txz: Upgraded. This update fixes a security issue: Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MariaDB Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MariaDB Server as well as unauthorized update, insert or delete access to some of MariaDB Server accessible data. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604 (* Security fix *) kde/bluedevil-5.23.3-x86_64-1.txz: Upgraded. kde/breeze-5.23.3-x86_64-1.txz: Upgraded. kde/breeze-grub-5.23.3-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.23.3-x86_64-1.txz: Upgraded. kde/drkonqi-5.23.3-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.23.3-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.23.3-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.23.3-x86_64-1.txz: Upgraded. kde/kdecoration-5.23.3-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.23.3-x86_64-1.txz: Upgraded. kde/kdev-python-5.6.2-x86_64-4.txz: Added. kde/kgamma5-5.23.3-x86_64-1.txz: Upgraded. kde/khotkeys-5.23.3-x86_64-1.txz: Upgraded. kde/kinfocenter-5.23.3-x86_64-1.txz: Upgraded. kde/kmenuedit-5.23.3-x86_64-1.txz: Upgraded. kde/kscreen-5.23.3-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.23.3-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.23.3-x86_64-1.txz: Upgraded. kde/ksystemstats-5.23.3-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.23.3-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.23.3-x86_64-1.txz: Upgraded. kde/kwayland-server-5.23.3-x86_64-1.txz: Upgraded. kde/kwin-5.23.3-x86_64-1.txz: Upgraded. kde/kwrited-5.23.3-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.23.3-x86_64-1.txz: Upgraded. kde/libkscreen-5.23.3-x86_64-1.txz: Upgraded. kde/libksysguard-5.23.3-x86_64-1.txz: Upgraded. kde/milou-5.23.3-x86_64-1.txz: Upgraded. kde/oxygen-5.23.3-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.23.3-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.23.3-x86_64-1.txz: Upgraded. kde/plasma-disks-5.23.3-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.23.3-x86_64-1.txz: Upgraded. kde/plasma-integration-5.23.3-x86_64-1.txz: Upgraded. kde/plasma-nm-5.23.3-x86_64-1.txz: Upgraded. kde/plasma-pa-5.23.3-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.23.3-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.23.3-x86_64-1.txz: Upgraded. kde/plasma-vault-5.23.3-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.23.3-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.23.3-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.23.3-x86_64-1.txz: Upgraded. kde/powerdevil-5.23.3-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.23.3-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.23.3-x86_64-1.txz: Upgraded. kde/systemsettings-5.23.3-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.23.3-x86_64-1.txz: Upgraded. l/libxml2-2.9.12-x86_64-5.txz: Rebuilt. Applied upstream patch: [PATCH] Work around lxml API abuse. Thanks to brobr. x/libdrm-2.4.108-x86_64-1.txz: Upgraded. x/libevdev-1.12.0-x86_64-1.txz: Upgraded. xap/xsnow-3.3.2-x86_64-1.txz: Upgraded. Just in time for tomorrow night here in Minnesota. :-)
2021-11-09 21:22:27 +01:00
BUILD=${BUILD:-1}
if [ -z "$ARCH" ]; then
case "$( uname -m )" in
Tue Sep 3 21:07:09 UTC 2024 a/cryptsetup-2.7.5-x86_64-1.txz: Upgraded. a/kernel-firmware-20240903_7a7a88f-noarch-1.txz: Upgraded. a/openssl-solibs-3.3.2-x86_64-1.txz: Upgraded. ap/xfsdump-3.2.0-x86_64-1.txz: Upgraded. d/opencl-headers-2024.05.08-noarch-1.txz: Upgraded. d/ruby-3.3.5-x86_64-1.txz: Upgraded. l/mozjs115-115.15.0esr-x86_64-1.txz: Upgraded. n/openssl-3.3.2-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: Fixed possible denial of service in X.509 name checks. Fixed possible buffer overread in SSL_select_next_proto(). For more information, see: https://openssl-library.org/news/secadv/20240903.txt https://openssl-library.org/news/secadv/20240627.txt https://www.cve.org/CVERecord?id=CVE-2024-6119 https://www.cve.org/CVERecord?id=CVE-2024-5535 (* Security fix *) n/samba-4.21.0-x86_64-1.txz: Upgraded. x/libevdev-1.13.3-x86_64-1.txz: Upgraded. x/xterm-394-x86_64-1.txz: Upgraded. xap/mozilla-firefox-128.2.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/128.2.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-40/ https://www.cve.org/CVERecord?id=CVE-2024-8385 https://www.cve.org/CVERecord?id=CVE-2024-8381 https://www.cve.org/CVERecord?id=CVE-2024-8382 https://www.cve.org/CVERecord?id=CVE-2024-8383 https://www.cve.org/CVERecord?id=CVE-2024-8384 https://www.cve.org/CVERecord?id=CVE-2024-8386 https://www.cve.org/CVERecord?id=CVE-2024-8387 (* Security fix *) xap/seamonkey-2.53.19-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.19 (* Security fix *)
2024-09-03 23:07:09 +02:00
i?86) ARCH=i686 ;;
arm*) ARCH=arm ;;
*) ARCH=$( uname -m ) ;;
esac
fi
# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
# the name of the created package would be, and then exit. This information
# could be useful to other scripts.
if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
echo "$PKGNAM-$VERSION-$ARCH-$BUILD.txz"
exit 0
fi
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}
TMP=${TMP:-/tmp}
PKG=$TMP/package-$PKGNAM
Tue Sep 3 21:07:09 UTC 2024 a/cryptsetup-2.7.5-x86_64-1.txz: Upgraded. a/kernel-firmware-20240903_7a7a88f-noarch-1.txz: Upgraded. a/openssl-solibs-3.3.2-x86_64-1.txz: Upgraded. ap/xfsdump-3.2.0-x86_64-1.txz: Upgraded. d/opencl-headers-2024.05.08-noarch-1.txz: Upgraded. d/ruby-3.3.5-x86_64-1.txz: Upgraded. l/mozjs115-115.15.0esr-x86_64-1.txz: Upgraded. n/openssl-3.3.2-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: Fixed possible denial of service in X.509 name checks. Fixed possible buffer overread in SSL_select_next_proto(). For more information, see: https://openssl-library.org/news/secadv/20240903.txt https://openssl-library.org/news/secadv/20240627.txt https://www.cve.org/CVERecord?id=CVE-2024-6119 https://www.cve.org/CVERecord?id=CVE-2024-5535 (* Security fix *) n/samba-4.21.0-x86_64-1.txz: Upgraded. x/libevdev-1.13.3-x86_64-1.txz: Upgraded. x/xterm-394-x86_64-1.txz: Upgraded. xap/mozilla-firefox-128.2.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/128.2.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-40/ https://www.cve.org/CVERecord?id=CVE-2024-8385 https://www.cve.org/CVERecord?id=CVE-2024-8381 https://www.cve.org/CVERecord?id=CVE-2024-8382 https://www.cve.org/CVERecord?id=CVE-2024-8383 https://www.cve.org/CVERecord?id=CVE-2024-8384 https://www.cve.org/CVERecord?id=CVE-2024-8386 https://www.cve.org/CVERecord?id=CVE-2024-8387 (* Security fix *) xap/seamonkey-2.53.19-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.19 (* Security fix *)
2024-09-03 23:07:09 +02:00
if [ "$ARCH" = "i686" ]; then
SLKCFLAGS="-O2 -march=pentium4 -mtune=generic"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "x86_64" ]; then
Tue Sep 3 21:07:09 UTC 2024 a/cryptsetup-2.7.5-x86_64-1.txz: Upgraded. a/kernel-firmware-20240903_7a7a88f-noarch-1.txz: Upgraded. a/openssl-solibs-3.3.2-x86_64-1.txz: Upgraded. ap/xfsdump-3.2.0-x86_64-1.txz: Upgraded. d/opencl-headers-2024.05.08-noarch-1.txz: Upgraded. d/ruby-3.3.5-x86_64-1.txz: Upgraded. l/mozjs115-115.15.0esr-x86_64-1.txz: Upgraded. n/openssl-3.3.2-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: Fixed possible denial of service in X.509 name checks. Fixed possible buffer overread in SSL_select_next_proto(). For more information, see: https://openssl-library.org/news/secadv/20240903.txt https://openssl-library.org/news/secadv/20240627.txt https://www.cve.org/CVERecord?id=CVE-2024-6119 https://www.cve.org/CVERecord?id=CVE-2024-5535 (* Security fix *) n/samba-4.21.0-x86_64-1.txz: Upgraded. x/libevdev-1.13.3-x86_64-1.txz: Upgraded. x/xterm-394-x86_64-1.txz: Upgraded. xap/mozilla-firefox-128.2.0esr-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.mozilla.org/en-US/firefox/128.2.0/releasenotes/ https://www.mozilla.org/security/advisories/mfsa2024-40/ https://www.cve.org/CVERecord?id=CVE-2024-8385 https://www.cve.org/CVERecord?id=CVE-2024-8381 https://www.cve.org/CVERecord?id=CVE-2024-8382 https://www.cve.org/CVERecord?id=CVE-2024-8383 https://www.cve.org/CVERecord?id=CVE-2024-8384 https://www.cve.org/CVERecord?id=CVE-2024-8386 https://www.cve.org/CVERecord?id=CVE-2024-8387 (* Security fix *) xap/seamonkey-2.53.19-x86_64-1.txz: Upgraded. This update contains security fixes and improvements. For more information, see: https://www.seamonkey-project.org/releases/seamonkey2.53.19 (* Security fix *)
2024-09-03 23:07:09 +02:00
SLKCFLAGS="-O2 -march=x86-64 -mtune=generic -fPIC"
LIBDIRSUFFIX="64"
else
SLKCFLAGS="-O2"
LIBDIRSUFFIX=""
fi
rm -rf $PKG
mkdir -p $TMP $PKG $OUTPUT
cd $TMP
rm -rf $PKGNAM-$VERSION
tar xvf $CWD/$PKGNAM-$VERSION.tar.?z || exit 1
cd $PKGNAM-$VERSION || exit 1
chown -R root:root .
find -L . \
\( -perm 777 -o -perm 775 -o -perm 750 -o -perm 711 -o -perm 555 \
-o -perm 511 \) -exec chmod 755 {} \+ -o \
\( -perm 666 -o -perm 664 -o -perm 640 -o -perm 600 -o -perm 444 \
-o -perm 440 -o -perm 400 \) -exec chmod 644 {} \+
CFLAGS="$SLKCFLAGS" \
CXXFLAGS="$SLKCFLAGS" \
./configure \
--prefix=/usr \
--libdir=/usr/lib${LIBDIRSUFFIX} \
--sysconfdir=/etc \
--localstatedir=/var \
--mandir=/usr/man \
--docdir=/usr/doc/$PKGNAM-$VERSION \
--build=$ARCH-slackware-linux || exit 1
make $NUMJOBS || exit 1
make install DESTDIR=$PKG || exit 1
# Don't ship .la files:
rm -f $PKG/{,usr/}lib${LIBDIRSUFFIX}/*.la
# Don't ship the static library:
rm -f $PKG/usr/lib${LIBDIRSUFFIX}/*.a
find $PKG -print0 | xargs -0 file | grep -e "executable" -e "shared object" | \
grep ELF | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null || true
find $PKG/usr/man -type f -exec gzip -9 {} \+
for i in $( find $PKG/usr/man -type l ) ; do ln -s $( readlink $i ).gz $i.gz ; rm $i ; done
mkdir -p $PKG/usr/doc/$PKGNAM-$VERSION
cp -a COPYING* README* $PKG/usr/doc/$PKGNAM-$VERSION
mkdir -p $PKG/install
cat $CWD/slack-desc > $PKG/install/slack-desc
cd $PKG
/sbin/makepkg -l y -c n $TMP/$PKGNAM-$VERSION-$ARCH-$BUILD.txz