1
0
Fork 0
mirror of git://slackware.nl/current.git synced 2025-01-17 18:12:36 +01:00
slackware-current/source
Patrick J Volkerding a5f767fffe Thu Dec 22 03:40:55 UTC 2022
a/sysvinit-scripts-15.1-noarch-3.txz:  Rebuilt.
  rc.6: support an optional rc.firewall_shutdown script. Most firewall scripts
  don't need a formal shutdown, but in some cases it can be useful. If your
  rc.firewall script supports a stop parameter, the shutdown script should just
  contain "/etc/rc.d/rc.firewall stop", or rc.firewall_shutdown could also be
  a symlink to the rc.firewall script in that case. But how the script works
  is (like the rc.firewall script support) completely up to the admin.
  Thanks to metaed for the suggestion.
  Please note that contrary to the request, I placed this *after* the network
  is shut down to avoid removing firewall protection while the interfaces are
  still active. Whether it'll work in this place for metaed's (or anyone
  else's) needs, I'm not sure. It's a start. Feel free to weigh in on the LQ
  thread if you have any ideas for improvement, but the goal here is to keep
  this support as simple and flexible as possible.
d/nasm-2.16-x86_64-1.txz:  Upgraded.
d/parallel-20221222-noarch-1.txz:  Upgraded.
n/bind-9.18.10-x86_64-1.txz:  Upgraded.
n/curl-7.87.0-x86_64-1.txz:  Upgraded.
xap/mozilla-thunderbird-102.6.1-x86_64-1.txz:  Upgraded.
  This release contains a security fix and improvements.
  For more information, see:
    https://www.mozilla.org/en-US/thunderbird/102.6.1/releasenotes/
    https://www.mozilla.org/en-US/security/advisories/mfsa2022-54/
    https://www.cve.org/CVERecord?id=CVE-2022-46874
  (* Security fix *)
xfce/xfce4-screenshooter-1.10.0-x86_64-1.txz:  Upgraded.
2022-12-22 06:39:00 +01:00
..
a Thu Dec 22 03:40:55 UTC 2022 2022-12-22 06:39:00 +01:00
ap Sat Dec 17 02:40:06 UTC 2022 2022-12-17 04:39:07 +01:00
d Thu Dec 22 03:40:55 UTC 2022 2022-12-22 06:39:00 +01:00
e Thu Dec 8 22:48:34 UTC 2022 2022-12-09 00:41:09 +01:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Fri Oct 14 01:39:37 UTC 2022 2022-10-14 09:00:17 +02:00
k Mon Oct 24 18:57:53 UTC 2022 2022-10-25 07:00:17 +02:00
kde Tue Dec 20 20:40:18 UTC 2022 2022-12-20 22:34:22 +01:00
l Tue Dec 20 20:40:18 UTC 2022 2022-12-20 22:34:22 +01:00
n Sat Dec 17 21:14:11 UTC 2022 2022-12-17 23:32:53 +01:00
t Thu Oct 27 02:30:15 UTC 2022 2022-10-27 09:00:17 +02:00
tcl Wed Nov 23 19:51:17 UTC 2022 2022-11-24 07:00:17 +01:00
x Tue Dec 20 20:40:18 UTC 2022 2022-12-20 22:34:22 +01:00
xap Fri Dec 16 04:46:51 UTC 2022 2022-12-16 06:38:01 +01:00
xfce Thu Dec 22 03:40:55 UTC 2022 2022-12-22 06:39:00 +01:00
y Tue Sep 6 20:21:24 UTC 2022 2022-09-07 07:00:17 +02:00
buildlist-from-changelog.sh Fri Oct 8 03:23:28 UTC 2021 2021-10-08 08:59:45 +02:00
make_world.sh Wed Jun 8 19:15:34 UTC 2022 2022-06-09 07:00:13 +02:00
README.TXT Wed Feb 2 08:21:48 UTC 2022 2022-02-02 11:59:53 +01:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed, and ^ and $ mark the beginning and end of the pattern to match:

fuzzy:~# grep ^bin/cp$ /var/lib/pkgtools/packages/*
/var/lib/pkgtools/packages/coreutils-9.0-x86_64-3:bin/cp

From this, you can see that 'cp' came from the coreutils-9.0-x86_64-3 package.
The source will be found in a corresponding subdirectory. In this case, that
would be ./a/coreutils/.

All of these packages have scripts that extract, patch, and compile the source
automatically. These are the 'SlackBuild' scripts.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com