slackware-current/source/ap/soma/soma.SlackBuild

81 lines
2.7 KiB
Text
Raw Normal View History

#!/bin/sh
# Slackware build script for soma
# (C) 2010 David Woodfall <dave@tty1.uk>
Thu Nov 29 05:53:27 UTC 2018 a/sysvinit-scripts-2.1-noarch-23.txz: Rebuilt. rc.S: simplify test for F2FS filesystem on /. Thanks to GazL. ap/soma-3.2.0-noarch-1.txz: Upgraded. d/cmake-3.13.1-x86_64-1.txz: Upgraded. l/jansson-2.12-x86_64-1.txz: Upgraded. n/rp-pppoe-3.13-x86_64-1.txz: Upgraded. n/samba-4.9.3-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: CVE-2018-14629: Unprivileged adding of CNAME record causing loop in AD Internal DNS server CVE-2018-16841: Double-free in Samba AD DC KDC with PKINIT CVE-2018-16851: NULL pointer de-reference in Samba AD DC LDAP server CVE-2018-16852: NULL pointer de-reference in Samba AD DC DNS servers CVE-2018-16853: Samba AD DC S4U2Self crash in experimental MIT Kerberos configuration (unsupported) CVE-2018-16857: Bad password count in AD DC not always effective For more information, see: https://www.samba.org/samba/security/CVE-2018-14629.html https://www.samba.org/samba/security/CVE-2018-16841.html https://www.samba.org/samba/security/CVE-2018-16851.html https://www.samba.org/samba/security/CVE-2018-16852.html https://www.samba.org/samba/security/CVE-2018-16853.html https://www.samba.org/samba/security/CVE-2018-16857.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857 (* Security fix *) x/mesa-18.2.6-x86_64-1.txz: Upgraded. x/vulkan-sdk-1.1.92.1-x86_64-1.txz: Upgraded.
2018-11-29 06:53:27 +01:00
# Modifications (C) Patrick Volkerding
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
# permitted provided that the following conditions are met:
#
# 1. Redistributions of this script must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ''AS IS'' AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
cd $(dirname $0) ; CWD=$(pwd)
PRGNAM=soma
Mon Feb 8 05:13:26 UTC 2021 a/aaa_elflibs-15.0-x86_64-30.txz: Removed. Renamed to aaa_libraries. a/aaa_glibc-solibs-2.32-x86_64-2.txz: Added. This package has been renamed from glibc-solibs, which helps avoid trouble if someone upgrades using "upgradepkg --install-new */*.txz" by upgrading this package before aaa_libraries. Otherwise, if aaa_libraries is upgraded first any libraries in it that are linked against a newer version of glibc than the one installed on the system would refuse to load. a/aaa_libraries-15.0-x86_64-1.txz: Added. This package has been renamed from aaa_elflibs to insure that it will come after aaa_glibc-solibs when upgraded in alphabetical order. Upgraded: libcap.so.2.48, libelf-0.183.so, libglib-2.0.so.0.6600.6, libgmodule-2.0.so.0.6600.6, libgobject-2.0.so.0.6600.6, libgthread-2.0.so.0.6600.6. Added: libtirpc.so.3.0.0. a/btrfs-progs-5.10.1-x86_64-1.txz: Upgraded. a/glibc-solibs-2.32-x86_64-1.txz: Removed. Renamed to aaa_glibc-solibs. a/kernel-generic-5.10.14-x86_64-1.txz: Upgraded. a/kernel-huge-5.10.14-x86_64-1.txz: Upgraded. a/kernel-modules-5.10.14-x86_64-1.txz: Upgraded. ap/slackpkg-15.0-noarch-1.txz: Upgraded. These are some of the important changes (see the ChangeLog for more): Note that this slackpkg release contains a backwards-incompatible change to the blacklisting syntax (e.g. glibc ---> glibc-*). This changes the prior behavior of the blacklist function; previously, adding "glibc" to the blacklist would cause glibc, glibc-profile, glibc-zoneinfo, et al to be ignored by slackpkg. The new behavior is that *only* the glibc package is ignored. If you want to blacklist all packages whose names begin with glibc, you would need to add "glibc.*" to the blacklist now. Also note that any special characters, e.g. "+", will need to be escaped in the blacklist file. To blacklist entire package sets, a trailing slash is now required: e.g. kde/ Another backwards-incompatibility warning: check-updates will now return 1 if there are updates available - this will make it easier to use this feature with cron (thanks to Peter Hyman). Added support for Slackware-AArch64 (thanks to Stuart Winter). Added aaa_glibc-solibs and aaa_libraries to the "do these first" routine. Thanks to Robby Workman for the new slackpkg release! ap/soma-3.3.7-noarch-1.txz: Upgraded. Thanks to David Woodfall. ap/xorriso-1.5.4.pl02-x86_64-1.txz: Upgraded. d/help2man-1.48.1-x86_64-1.txz: Upgraded. d/kernel-headers-5.10.14-x86-1.txz: Upgraded. k/kernel-source-5.10.14-noarch-1.txz: Upgraded. l/elfutils-0.183-x86_64-1.txz: Upgraded. l/glibc-2.32-x86_64-2.txz: Rebuilt. l/glibc-i18n-2.32-x86_64-2.txz: Rebuilt. l/glibc-profile-2.32-x86_64-2.txz: Rebuilt. l/lcms2-2.12-x86_64-1.txz: Upgraded. l/libburn-1.5.4-x86_64-1.txz: Upgraded. x/xf86-input-wacom-0.40.0-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2021-02-08 06:13:26 +01:00
VERSION=${VERSION:-3.3.7}
ARCH=noarch
BUILD=${BUILD:-3}
# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
# the name of the created package would be, and then exit. This information
# could be useful to other scripts.
if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
echo "$PRGNAM-$VERSION-$ARCH-$BUILD$TAG.${PKGTYPE:-txz}"
exit 0
fi
Tue Nov 29 20:56:03 UTC 2022 a/cryptsetup-2.6.0-x86_64-1.txz: Upgraded. a/kernel-firmware-20221123_cdf9499-noarch-1.txz: Upgraded. kde/bluedevil-5.26.4-x86_64-1.txz: Upgraded. kde/breeze-5.26.4-x86_64-1.txz: Upgraded. kde/breeze-grub-5.26.4-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.26.4-x86_64-1.txz: Upgraded. kde/drkonqi-5.26.4-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.26.4-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.26.4-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.26.4-x86_64-1.txz: Upgraded. kde/kdecoration-5.26.4-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.26.4-x86_64-1.txz: Upgraded. kde/kgamma5-5.26.4-x86_64-1.txz: Upgraded. kde/khotkeys-5.26.4-x86_64-1.txz: Upgraded. kde/kinfocenter-5.26.4-x86_64-1.txz: Upgraded. kde/kmenuedit-5.26.4-x86_64-1.txz: Upgraded. kde/kpipewire-5.26.4-x86_64-1.txz: Upgraded. kde/kscreen-5.26.4-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.26.4-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.26.4-x86_64-1.txz: Upgraded. kde/ksystemstats-5.26.4-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.26.4-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.26.4-x86_64-1.txz: Upgraded. kde/kwin-5.26.4-x86_64-1.txz: Upgraded. kde/kwrited-5.26.4-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.26.4-x86_64-1.txz: Upgraded. kde/libkscreen-5.26.4-x86_64-1.txz: Upgraded. kde/libksysguard-5.26.4-x86_64-1.txz: Upgraded. kde/milou-5.26.4-x86_64-1.txz: Upgraded. kde/oxygen-5.26.4-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.26.4-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.26.4-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.26.4-x86_64-1.txz: Upgraded. kde/plasma-disks-5.26.4-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.26.4-x86_64-1.txz: Upgraded. kde/plasma-integration-5.26.4-x86_64-1.txz: Upgraded. kde/plasma-nm-5.26.4-x86_64-1.txz: Upgraded. kde/plasma-pa-5.26.4-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.26.4-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.26.4-x86_64-1.txz: Upgraded. kde/plasma-vault-5.26.4-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.26.4.1-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.26.4-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.26.4-x86_64-1.txz: Upgraded. kde/powerdevil-5.26.4-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.26.4-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.26.4-x86_64-1.txz: Upgraded. kde/systemsettings-5.26.4-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.26.4-x86_64-1.txz: Upgraded. l/glib2-2.74.2-x86_64-2.txz: Rebuilt. Patched to fix C++ API. Thanks to 0XBF. l/wavpack-5.6.0-x86_64-1.txz: Upgraded. n/iputils-20221126-x86_64-1.txz: Upgraded. n/libmbim-1.28.2-x86_64-1.txz: Upgraded. x/libime-1.0.16-x86_64-1.txz: Upgraded. x/xterm-377-x86_64-1.txz: Upgraded. xap/mozilla-firefox-107.0.1-x86_64-1.txz: Upgraded. This is a bugfix release. For more information, see: https://www.mozilla.org/en-US/firefox/107.0.1/releasenotes/
2022-11-29 21:56:03 +01:00
TMP=${TMP:-/tmp}
PKG=$TMP/package-$PRGNAM
OUTPUT=${OUTPUT:-$TMP}
set -e
rm -rf $PKG
mkdir -p $TMP $PKG $OUTPUT
cd $TMP
rm -rf $PRGNAM-$VERSION
tar xfv $CWD/$PRGNAM-$VERSION.tar.gz
cd $PRGNAM-$VERSION
chown -R root:root .
find . \
\( -perm 777 -o -perm 775 -o -perm 711 -o -perm 555 -o -perm 511 \) \
-exec chmod 755 {} \+ -o \
\( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \
-exec chmod 644 {} \+
cat $CWD/soma.desktop.strip.trailing.whitespace.diff | patch -p1 || exit 1
mkdir -p \
$PKG/install \
$PKG/etc/soma/themes \
$PKG/etc/soma/genres \
$PKG/usr/doc/$PRGNAM-$VERSION
install -m 755 -D soma $PKG/usr/bin/soma
install -m 644 -D options.conf.new $PKG/etc/soma/
install -m 644 -D stations.conf.new $PKG/etc/soma/
install -m 644 -D themes/* $PKG/etc/soma/themes/
install -m 644 -D genres/* $PKG/etc/soma/genres/
install -m 644 -D soma.desktop $PKG/usr/share/applications/soma.desktop
Thu Nov 29 05:53:27 UTC 2018 a/sysvinit-scripts-2.1-noarch-23.txz: Rebuilt. rc.S: simplify test for F2FS filesystem on /. Thanks to GazL. ap/soma-3.2.0-noarch-1.txz: Upgraded. d/cmake-3.13.1-x86_64-1.txz: Upgraded. l/jansson-2.12-x86_64-1.txz: Upgraded. n/rp-pppoe-3.13-x86_64-1.txz: Upgraded. n/samba-4.9.3-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: CVE-2018-14629: Unprivileged adding of CNAME record causing loop in AD Internal DNS server CVE-2018-16841: Double-free in Samba AD DC KDC with PKINIT CVE-2018-16851: NULL pointer de-reference in Samba AD DC LDAP server CVE-2018-16852: NULL pointer de-reference in Samba AD DC DNS servers CVE-2018-16853: Samba AD DC S4U2Self crash in experimental MIT Kerberos configuration (unsupported) CVE-2018-16857: Bad password count in AD DC not always effective For more information, see: https://www.samba.org/samba/security/CVE-2018-14629.html https://www.samba.org/samba/security/CVE-2018-16841.html https://www.samba.org/samba/security/CVE-2018-16851.html https://www.samba.org/samba/security/CVE-2018-16852.html https://www.samba.org/samba/security/CVE-2018-16853.html https://www.samba.org/samba/security/CVE-2018-16857.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857 (* Security fix *) x/mesa-18.2.6-x86_64-1.txz: Upgraded. x/vulkan-sdk-1.1.92.1-x86_64-1.txz: Upgraded.
2018-11-29 06:53:27 +01:00
cp -a README *.txt $PKG/usr/doc/$PRGNAM-$VERSION
cat $CWD/slack-desc > $PKG/install/slack-desc
zcat $CWD/doinst.sh.gz > $PKG/install/doinst.sh
cd $PKG
Thu Nov 29 05:53:27 UTC 2018 a/sysvinit-scripts-2.1-noarch-23.txz: Rebuilt. rc.S: simplify test for F2FS filesystem on /. Thanks to GazL. ap/soma-3.2.0-noarch-1.txz: Upgraded. d/cmake-3.13.1-x86_64-1.txz: Upgraded. l/jansson-2.12-x86_64-1.txz: Upgraded. n/rp-pppoe-3.13-x86_64-1.txz: Upgraded. n/samba-4.9.3-x86_64-1.txz: Upgraded. This update fixes bugs and security issues: CVE-2018-14629: Unprivileged adding of CNAME record causing loop in AD Internal DNS server CVE-2018-16841: Double-free in Samba AD DC KDC with PKINIT CVE-2018-16851: NULL pointer de-reference in Samba AD DC LDAP server CVE-2018-16852: NULL pointer de-reference in Samba AD DC DNS servers CVE-2018-16853: Samba AD DC S4U2Self crash in experimental MIT Kerberos configuration (unsupported) CVE-2018-16857: Bad password count in AD DC not always effective For more information, see: https://www.samba.org/samba/security/CVE-2018-14629.html https://www.samba.org/samba/security/CVE-2018-16841.html https://www.samba.org/samba/security/CVE-2018-16851.html https://www.samba.org/samba/security/CVE-2018-16852.html https://www.samba.org/samba/security/CVE-2018-16853.html https://www.samba.org/samba/security/CVE-2018-16857.html https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16841 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16851 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16853 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16857 (* Security fix *) x/mesa-18.2.6-x86_64-1.txz: Upgraded. x/vulkan-sdk-1.1.92.1-x86_64-1.txz: Upgraded.
2018-11-29 06:53:27 +01:00
/sbin/makepkg -l y -c n $OUTPUT/$PRGNAM-$VERSION-$ARCH-$BUILD.${PKGTYPE:-txz}