1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-01-14 08:01:11 +01:00
slackware-current/source/d/rust-bindgen/fetch-sources.sh
Patrick J Volkerding 59f80800c2 Tue Apr 11 18:49:02 UTC 2023
a/mcelog-194-x86_64-1.txz:  Upgraded.
a/tcsh-6.24.08-x86_64-1.txz:  Upgraded.
d/meson-1.1.0-x86_64-1.txz:  Upgraded.
d/rust-bindgen-0.65.0-x86_64-1.txz:  Upgraded.
l/mozjs102-102.10.0esr-x86_64-1.txz:  Upgraded.
l/nodejs-19.9.0-x86_64-1.txz:  Upgraded.
l/parted-3.6-x86_64-1.txz:  Upgraded.
x/ibus-table-1.17.0-x86_64-1.txz:  Upgraded.
x/libXfixes-6.0.1-x86_64-1.txz:  Upgraded.
x/libXt-1.3.0-x86_64-1.txz:  Upgraded.
x/xf86-video-neomagic-1.3.1-x86_64-1.txz:  Added.
x/xf86-video-savage-2.4.0-x86_64-1.txz:  Added.
x/xwininfo-1.1.6-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-112.0-x86_64-1.txz:  Upgraded.
  This update contains security fixes and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/112.0/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-13
    https://www.mozilla.org/en-US/security/advisories/mfsa2023-13/#MFSA-TMP-2023-0001
    https://www.cve.org/CVERecord?id=CVE-2023-29531
    https://www.cve.org/CVERecord?id=CVE-2023-29532
    https://www.cve.org/CVERecord?id=CVE-2023-29533
    https://www.cve.org/CVERecord?id=CVE-2023-29534
    https://www.cve.org/CVERecord?id=CVE-2023-29535
    https://www.cve.org/CVERecord?id=CVE-2023-29536
    https://www.cve.org/CVERecord?id=CVE-2023-29537
    https://www.cve.org/CVERecord?id=CVE-2023-29538
    https://www.cve.org/CVERecord?id=CVE-2023-29539
    https://www.cve.org/CVERecord?id=CVE-2023-29540
    https://www.cve.org/CVERecord?id=CVE-2023-29541
    https://www.cve.org/CVERecord?id=CVE-2023-29542
    https://www.cve.org/CVERecord?id=CVE-2023-29543
    https://www.cve.org/CVERecord?id=CVE-2023-29544
    https://www.cve.org/CVERecord?id=CVE-2023-29545
    https://www.cve.org/CVERecord?id=CVE-2023-29546
    https://www.cve.org/CVERecord?id=CVE-2023-29547
    https://www.cve.org/CVERecord?id=CVE-2023-29548
    https://www.cve.org/CVERecord?id=CVE-2023-29549
    https://www.cve.org/CVERecord?id=CVE-2023-29550
    https://www.cve.org/CVERecord?id=CVE-2023-29551
  (* Security fix *)
2023-04-11 21:38:02 +02:00

35 lines
898 B
Bash
Executable file

#!/bin/bash
#VERSION=$1
VERSION=0.65.0
rm -rf rust-bindgen-*.tar.?z cargo-rust-bindgen*
echo "Downloading rust-bindgen-$VERSION..."
wget --content-disposition "https://github.com/rust-lang/rust-bindgen/archive/refs/tags/v$VERSION.tar.gz"
tar xf rust-bindgen-$VERSION.tar.gz
tar cf rust-bindgen-$VERSION.tar rust-bindgen-$VERSION
cd rust-bindgen-$VERSION
if ! [ -f /usr/bin/cargo-vendor-filterer ]; then
echo "WARNING: Creating unfiltered vendor libs tarball!"
cargo vendor
else
cargo vendor-filterer --platform="x86_64-unknown-linux-gnu" --platform="i686-unknown-linux-gnu"
fi
mv vendor ../cargo-rust-bindgen-$VERSION
cd ..
tar cf cargo-rust-bindgen-$VERSION.tar cargo-rust-bindgen-$VERSION
plzip -9 cargo-rust-bindgen-$VERSION.tar
plzip -9 rust-bindgen-$VERSION.tar
rm -rf rust-bindgen-$VERSION
rm -rf cargo-rust-bindgen-$VERSION
rm -f rust-bindgen-$VERSION.tar.gz