slackware-current/source/l/speex/speex.SlackBuild

158 lines
4.6 KiB
Text
Raw Normal View History

#!/bin/bash
Thu Jun 23 05:30:51 UTC 2022 a/kernel-generic-5.18.6-x86_64-1.txz: Upgraded. a/kernel-huge-5.18.6-x86_64-1.txz: Upgraded. a/kernel-modules-5.18.6-x86_64-1.txz: Upgraded. a/openssl-solibs-1.1.1p-x86_64-1.txz: Upgraded. ap/sudo-1.9.11p3-x86_64-1.txz: Upgraded. d/kernel-headers-5.18.6-x86-1.txz: Upgraded. k/kernel-source-5.18.6-noarch-1.txz: Upgraded. l/espeak-ng-1.51.1-x86_64-1.txz: Upgraded. l/libidn-1.40-x86_64-1.txz: Upgraded. l/mlt-7.8.0-x86_64-1.txz: Upgraded. l/openal-soft-1.22.1-x86_64-1.txz: Upgraded. l/pulseaudio-16.1-x86_64-1.txz: Upgraded. l/speex-1.2.1-x86_64-1.txz: Upgraded. l/speexdsp-1.2.1-x86_64-1.txz: Upgraded. n/ca-certificates-20220622-noarch-1.txz: Upgraded. This update provides the latest CA certificates to check for the authenticity of SSL connections. n/openssl-1.1.1p-x86_64-1.txz: Upgraded. In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. For more information, see: https://www.openssl.org/news/secadv/20220621.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068 (* Security fix *) x/ibus-table-1.16.9-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2022-06-23 07:30:51 +02:00
# Copyright 2017, 2018, 2022 Patrick J. Volkerding, Sebeka, Minnesota, USA
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
# permitted provided that the following conditions are met:
#
# 1. Redistributions of this script must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=speex
Thu Jun 23 05:30:51 UTC 2022 a/kernel-generic-5.18.6-x86_64-1.txz: Upgraded. a/kernel-huge-5.18.6-x86_64-1.txz: Upgraded. a/kernel-modules-5.18.6-x86_64-1.txz: Upgraded. a/openssl-solibs-1.1.1p-x86_64-1.txz: Upgraded. ap/sudo-1.9.11p3-x86_64-1.txz: Upgraded. d/kernel-headers-5.18.6-x86-1.txz: Upgraded. k/kernel-source-5.18.6-noarch-1.txz: Upgraded. l/espeak-ng-1.51.1-x86_64-1.txz: Upgraded. l/libidn-1.40-x86_64-1.txz: Upgraded. l/mlt-7.8.0-x86_64-1.txz: Upgraded. l/openal-soft-1.22.1-x86_64-1.txz: Upgraded. l/pulseaudio-16.1-x86_64-1.txz: Upgraded. l/speex-1.2.1-x86_64-1.txz: Upgraded. l/speexdsp-1.2.1-x86_64-1.txz: Upgraded. n/ca-certificates-20220622-noarch-1.txz: Upgraded. This update provides the latest CA certificates to check for the authenticity of SSL connections. n/openssl-1.1.1p-x86_64-1.txz: Upgraded. In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. For more information, see: https://www.openssl.org/news/secadv/20220621.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068 (* Security fix *) x/ibus-table-1.16.9-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2022-06-23 07:30:51 +02:00
SRCNAM=speex-Speex
VERSION=${VERSION:-$(echo $SRCNAM-*.tar.?z | rev | cut -f 3- -d . | rev | cut -f 3- -d -)}
BUILD=${BUILD:-1}
# Automatically determine the architecture we're building on:
if [ -z "$ARCH" ]; then
case "$(uname -m)" in
i?86) ARCH=i586 ;;
Tue Sep 6 20:21:24 UTC 2022 a/cracklib-2.9.8-x86_64-1.txz: Upgraded. a/gawk-5.2.0-x86_64-1.txz: Upgraded. a/grep-3.8-x86_64-1.txz: Upgraded. a/kernel-firmware-20220902_2f2f018-noarch-1.txz: Upgraded. a/kernel-generic-5.19.7-x86_64-1.txz: Upgraded. a/kernel-huge-5.19.7-x86_64-1.txz: Upgraded. a/kernel-modules-5.19.7-x86_64-1.txz: Upgraded. a/pcmciautils-018-x86_64-5.txz: Rebuilt. rc.pcmcia: change fgrep to grep -F. a/pkgtools-15.1-noarch-1.txz: Upgraded. removepkg: change fgrep to grep -F. a/sysvinit-functions-8.53-x86_64-6.txz: Rebuilt. /etc/rc.d/init.d/functions: change egrep to grep -E. a/sysvinit-scripts-15.1-noarch-2.txz: Rebuilt. rc.cpufreq: command-line choice should take priority over /etc/default/cpufreq. Thanks to af7567. rc.6: change egrep to grep -E. ap/sqlite-3.39.3-x86_64-1.txz: Upgraded. ap/vim-9.0.0396-x86_64-1.txz: Upgraded. Fixed use after free. Thanks to marav for the heads-up. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3099 (* Security fix *) d/autoconf-2.71-noarch-2.txz: Rebuilt. doinst.sh: change fgrep to grep -F. d/autoconf-archive-2022.09.03-noarch-1.txz: Upgraded. d/automake-1.16.5-noarch-2.txz: Rebuilt. doinst.sh: change fgrep to grep -F. d/kernel-headers-5.19.7-x86-1.txz: Upgraded. d/libtool-2.4.7-x86_64-4.txz: Rebuilt. doinst.sh: change fgrep to grep -F. d/meson-0.63.2-x86_64-1.txz: Upgraded. d/vala-0.56.3-x86_64-1.txz: Upgraded. k/kernel-source-5.19.7-noarch-1.txz: Upgraded. kde/bluedevil-5.25.5-x86_64-1.txz: Upgraded. kde/breeze-5.25.5-x86_64-1.txz: Upgraded. kde/breeze-grub-5.25.5-x86_64-1.txz: Upgraded. kde/breeze-gtk-5.25.5-x86_64-1.txz: Upgraded. kde/drkonqi-5.25.5-x86_64-1.txz: Upgraded. kde/kactivitymanagerd-5.25.5-x86_64-1.txz: Upgraded. kde/kde-cli-tools-5.25.5-x86_64-1.txz: Upgraded. kde/kde-gtk-config-5.25.5-x86_64-1.txz: Upgraded. kde/kdecoration-5.25.5-x86_64-1.txz: Upgraded. kde/kdeplasma-addons-5.25.5-x86_64-1.txz: Upgraded. kde/kgamma5-5.25.5-x86_64-1.txz: Upgraded. kde/khotkeys-5.25.5-x86_64-1.txz: Upgraded. kde/kinfocenter-5.25.5-x86_64-1.txz: Upgraded. kde/kmenuedit-5.25.5-x86_64-1.txz: Upgraded. kde/kscreen-5.25.5-x86_64-1.txz: Upgraded. kde/kscreenlocker-5.25.5-x86_64-1.txz: Upgraded. kde/ksshaskpass-5.25.5-x86_64-1.txz: Upgraded. kde/ksystemstats-5.25.5-x86_64-1.txz: Upgraded. kde/kwallet-pam-5.25.5-x86_64-1.txz: Upgraded. kde/kwayland-integration-5.25.5-x86_64-1.txz: Upgraded. kde/kwin-5.25.5-x86_64-1.txz: Upgraded. kde/kwrited-5.25.5-x86_64-1.txz: Upgraded. kde/layer-shell-qt-5.25.5-x86_64-1.txz: Upgraded. kde/libkscreen-5.25.5-x86_64-1.txz: Upgraded. kde/libksysguard-5.25.5-x86_64-1.txz: Upgraded. kde/milou-5.25.5-x86_64-1.txz: Upgraded. kde/oxygen-5.25.5-x86_64-1.txz: Upgraded. kde/oxygen-sounds-5.25.5-x86_64-1.txz: Upgraded. kde/plasma-browser-integration-5.25.5-x86_64-1.txz: Upgraded. kde/plasma-desktop-5.25.5-x86_64-1.txz: Upgraded. kde/plasma-disks-5.25.5-x86_64-1.txz: Upgraded. kde/plasma-firewall-5.25.5-x86_64-1.txz: Upgraded. kde/plasma-integration-5.25.5-x86_64-1.txz: Upgraded. kde/plasma-nm-5.25.5-x86_64-1.txz: Upgraded. kde/plasma-pa-5.25.5-x86_64-1.txz: Upgraded. kde/plasma-sdk-5.25.5-x86_64-1.txz: Upgraded. kde/plasma-systemmonitor-5.25.5-x86_64-1.txz: Upgraded. kde/plasma-vault-5.25.5-x86_64-1.txz: Upgraded. kde/plasma-wayland-protocols-1.8.0-x86_64-1.txz: Upgraded. kde/plasma-workspace-5.25.5-x86_64-1.txz: Upgraded. kde/plasma-workspace-wallpapers-5.25.5-x86_64-1.txz: Upgraded. kde/polkit-kde-agent-1-5.25.5-x86_64-1.txz: Upgraded. kde/powerdevil-5.25.5-x86_64-1.txz: Upgraded. kde/qqc2-breeze-style-5.25.5-x86_64-1.txz: Upgraded. kde/sddm-kcm-5.25.5-x86_64-1.txz: Upgraded. kde/systemsettings-5.25.5-x86_64-1.txz: Upgraded. kde/xdg-desktop-portal-kde-5.25.5-x86_64-1.txz: Upgraded. l/fluidsynth-2.2.9-x86_64-1.txz: Upgraded. l/libsoup3-3.0.8-x86_64-1.txz: Upgraded. l/libssh-0.10.3-x86_64-1.txz: Upgraded. l/neon-0.32.3-x86_64-1.txz: Upgraded. l/slang-2.3.3-x86_64-1.txz: Upgraded. n/nmap-7.93-x86_64-1.txz: Upgraded. x/ibus-m17n-1.4.11-x86_64-1.txz: Upgraded. x/libXft-2.3.5-x86_64-1.txz: Upgraded. xap/mozilla-firefox-104.0.2-x86_64-1.txz: Upgraded. This is a bugfix release. For more information, see: https://www.mozilla.org/en-US/firefox/104.0.2/releasenotes/ xap/vim-gvim-9.0.0396-x86_64-1.txz: Upgraded. xfce/xfce4-pulseaudio-plugin-0.4.4-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2022-09-06 22:21:24 +02:00
arm*) readelf /usr/bin/file -A | grep -E -q "Tag_CPU.*[4,5]" && ARCH=arm || ARCH=armv7hl ;;
# Unless $ARCH is already set, use uname -m for all other archs:
*) ARCH=$(uname -m) ;;
esac
export ARCH
fi
# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
# the name of the created package would be, and then exit. This information
# could be useful to other scripts.
if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
echo "$PKGNAM-$(echo $VERSION | tr '-' '_')-$ARCH-$BUILD.txz"
exit 0
fi
Fri Sep 21 18:51:07 UTC 2018 a/eudev-3.2.6-x86_64-1.txz: Upgraded. a/glibc-solibs-2.28-x86_64-2.txz: Upgraded. a/grub-2.02-x86_64-3.txz: Rebuilt. Patched to fix compatibility with recent xfsprogs. Thanks to Markus Wiesner. a/kernel-generic-4.14.71-x86_64-1.txz: Upgraded. a/kernel-huge-4.14.71-x86_64-1.txz: Upgraded. a/kernel-modules-4.14.71-x86_64-1.txz: Upgraded. ap/opus-tools-0.2-x86_64-1.txz: Upgraded. ap/sqlite-3.25.1-x86_64-1.txz: Upgraded. d/icecream-20180905_cdc6ff8-x86_64-1.txz: Upgraded. d/kernel-headers-4.14.71-x86-1.txz: Upgraded. d/llvm-7.0.0-x86_64-1.txz: Upgraded. Shared library .so-version bump. k/kernel-source-4.14.71-noarch-1.txz: Upgraded. l/ffmpeg-3.4.4-x86_64-2.txz: Rebuilt. Don't try to link with Samba since the latest version is not compatible. l/glibc-2.28-x86_64-2.txz: Upgraded. All packages have been patched where needed for glibc-2.28 and compile tested here. Thanks to nobodino for the help. l/glibc-i18n-2.28-x86_64-2.txz: Upgraded. l/glibc-profile-2.28-x86_64-2.txz: Upgraded. l/gst-plugins-base-1.14.3-x86_64-1.txz: Upgraded. l/gst-plugins-good-1.14.3-x86_64-1.txz: Upgraded. l/gst-plugins-libav-1.14.3-x86_64-1.txz: Upgraded. l/gstreamer-1.14.3-x86_64-1.txz: Upgraded. l/imagemagick-6.9.10_11-x86_64-1.txz: Upgraded. l/libopusenc-0.2-x86_64-1.txz: Added. l/librsvg-2.44.3-x86_64-1.txz: Upgraded. l/opus-1.3_rc2-x86_64-1.txz: Upgraded. l/opusfile-0.11-x86_64-1.txz: Upgraded. l/soprano-2.9.4-x86_64-3.txz: Rebuilt. Recompiled to drop virtuoso dependency. l/virtuoso-ose-6.1.8-x86_64-9.txz: Removed. Even KDE4 has migrated away from actually using this for anything. The last thing in Slackware that was dependent on it was Soprano, which has been recompiled to no longer use it. n/postfix-3.3.1-x86_64-2.txz: Rebuilt. Recompiled so that it quits whining about OpenSSL. Thanks to shastah. x/mesa-18.2.1-x86_64-1.txz: Upgraded. Compiled against llvm-7.0.0. x/xf86-video-vmware-13.3.0-x86_64-2.txz: Rebuilt. Recompiled against llvm-7.0.0. x/xterm-336-x86_64-1.txz: Upgraded. extra/pure-alsa-system/ffmpeg-3.4.4-x86_64-2_alsa.txz: Rebuilt. Don't try to link with Samba since the latest version is not compatible. extra/pure-alsa-system/gst-plugins-good-1.14.3-x86_64-1_alsa.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2018-09-21 20:51:07 +02:00
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}
if [ "$ARCH" = "i586" ]; then
SLKCFLAGS="-O2 -march=i586 -mtune=i686"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "i686" ]; then
SLKCFLAGS="-O2 -march=i686"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "s390" ]; then
SLKCFLAGS="-O2"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "x86_64" ]; then
SLKCFLAGS="-O2 -fPIC"
LIBDIRSUFFIX="64"
elif [ "$ARCH" = "armv7hl" ]; then
SLKCFLAGS="-O3 -march=armv7-a -mfpu=vfpv3-d16"
LIBDIRSUFFIX=""
else
SLKCFLAGS="-O2"
LIBDIRSUFFIX=""
fi
TMP=${TMP:-/tmp}
PKG=$TMP/package-$PKGNAM
rm -rf $PKG
mkdir -p $TMP $PKG
cd $TMP
Thu Jun 23 05:30:51 UTC 2022 a/kernel-generic-5.18.6-x86_64-1.txz: Upgraded. a/kernel-huge-5.18.6-x86_64-1.txz: Upgraded. a/kernel-modules-5.18.6-x86_64-1.txz: Upgraded. a/openssl-solibs-1.1.1p-x86_64-1.txz: Upgraded. ap/sudo-1.9.11p3-x86_64-1.txz: Upgraded. d/kernel-headers-5.18.6-x86-1.txz: Upgraded. k/kernel-source-5.18.6-noarch-1.txz: Upgraded. l/espeak-ng-1.51.1-x86_64-1.txz: Upgraded. l/libidn-1.40-x86_64-1.txz: Upgraded. l/mlt-7.8.0-x86_64-1.txz: Upgraded. l/openal-soft-1.22.1-x86_64-1.txz: Upgraded. l/pulseaudio-16.1-x86_64-1.txz: Upgraded. l/speex-1.2.1-x86_64-1.txz: Upgraded. l/speexdsp-1.2.1-x86_64-1.txz: Upgraded. n/ca-certificates-20220622-noarch-1.txz: Upgraded. This update provides the latest CA certificates to check for the authenticity of SSL connections. n/openssl-1.1.1p-x86_64-1.txz: Upgraded. In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. For more information, see: https://www.openssl.org/news/secadv/20220621.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068 (* Security fix *) x/ibus-table-1.16.9-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2022-06-23 07:30:51 +02:00
rm -rf $SRCNAM-$VERSION
tar xvf $CWD/$SRCNAM-$VERSION.tar.?z || exit 1
cd $SRCNAM-$VERSION || exit 1
chown -R root:root .
find . \
\( -perm 777 -o -perm 775 -o -perm 711 -o -perm 555 -o -perm 511 \) \
-exec chmod 755 {} \+ -o \
\( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \
-exec chmod 644 {} \+
# Configure:
Thu Jun 23 05:30:51 UTC 2022 a/kernel-generic-5.18.6-x86_64-1.txz: Upgraded. a/kernel-huge-5.18.6-x86_64-1.txz: Upgraded. a/kernel-modules-5.18.6-x86_64-1.txz: Upgraded. a/openssl-solibs-1.1.1p-x86_64-1.txz: Upgraded. ap/sudo-1.9.11p3-x86_64-1.txz: Upgraded. d/kernel-headers-5.18.6-x86-1.txz: Upgraded. k/kernel-source-5.18.6-noarch-1.txz: Upgraded. l/espeak-ng-1.51.1-x86_64-1.txz: Upgraded. l/libidn-1.40-x86_64-1.txz: Upgraded. l/mlt-7.8.0-x86_64-1.txz: Upgraded. l/openal-soft-1.22.1-x86_64-1.txz: Upgraded. l/pulseaudio-16.1-x86_64-1.txz: Upgraded. l/speex-1.2.1-x86_64-1.txz: Upgraded. l/speexdsp-1.2.1-x86_64-1.txz: Upgraded. n/ca-certificates-20220622-noarch-1.txz: Upgraded. This update provides the latest CA certificates to check for the authenticity of SSL connections. n/openssl-1.1.1p-x86_64-1.txz: Upgraded. In addition to the c_rehash shell command injection identified in CVE-2022-1292, further circumstances where the c_rehash script does not properly sanitise shell metacharacters to prevent command injection were found by code review. When the CVE-2022-1292 was fixed it was not discovered that there are other places in the script where the file names of certificates being hashed were possibly passed to a command executed through the shell. For more information, see: https://www.openssl.org/news/secadv/20220621.txt https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068 (* Security fix *) x/ibus-table-1.16.9-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2022-06-23 07:30:51 +02:00
if [ ! -r configure ]; then
if [ -x ./autogen.sh ]; then
NOCONFIGURE=1 ./autogen.sh
else
autoreconf -vif
fi
fi
CFLAGS="$SLKCFLAGS" \
./configure \
--prefix=/usr \
--sysconfdir=/etc \
--libdir=/usr/lib${LIBDIRSUFFIX} \
--mandir=/usr/man \
--infodir=/usr/info \
--docdir=/usr/doc/${PKGNAM}-$VERSION \
--disable-static \
--enable-binaries \
--build=$ARCH-slackware-linux || exit 1
# Build and install:
make $NUMJOBS || make || exit 1
make install DESTDIR=$PKG || exit 1
# Don't ship .la files:
rm -f $PKG/usr/lib${LIBDIRSUFFIX}/*.la
# Strip binaries:
( cd $PKG
find . | xargs file | grep "executable" | grep ELF | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null
find . | xargs file | grep "shared object" | grep ELF | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null
)
# Add a documentation directory:
mkdir -p $PKG/usr/doc/${PKGNAM}-$VERSION
cp -a \
AUTHORS COPYING* ChangeLog NEWS* README* TODO \
$PKG/usr/doc/${PKGNAM}-$VERSION
# Compress and link manpages, if any:
if [ -d $PKG/usr/man ]; then
( cd $PKG/usr/man
for manpagedir in $(find . -type d -name "man*") ; do
( cd $manpagedir
for eachpage in $( find . -type l -maxdepth 1 | grep -v '\.gz$') ; do
ln -s $( readlink $eachpage ).gz $eachpage.gz
rm $eachpage
done
gzip -9 *.?
)
done
)
fi
# If there's a ChangeLog, installing at least part of the recent history
# is useful, but don't let it get totally out of control:
if [ -r ChangeLog ]; then
DOCSDIR=$(echo $PKG/usr/doc/${PKGNAM}-$VERSION)
cat ChangeLog | head -n 1000 > $DOCSDIR/ChangeLog
touch -r ChangeLog $DOCSDIR/ChangeLog
fi
mkdir -p $PKG/install
cat $CWD/slack-desc > $PKG/install/slack-desc
cd $PKG
/sbin/makepkg -l y -c n $TMP/$PKGNAM-$(echo $VERSION | tr '-' '_')-$ARCH-$BUILD.txz