aboutsummaryrefslogtreecommitdiffstats
path: root/main/mupdf/APKBUILD
diff options
context:
space:
mode:
authorNatanael Copa <ncopa@alpinelinux.org>2016-11-08 09:14:37 +0000
committerNatanael Copa <ncopa@alpinelinux.org>2016-11-08 10:59:51 +0000
commit74177660e2e3837ac3e626feb56df294d260faa9 (patch)
treebf1cc109d4f5dc2642d44b1363e544c6acd553e0 /main/mupdf/APKBUILD
parent6184d6e1987702994f035b50749e98654ff0e392 (diff)
downloadaports-74177660e2e3837ac3e626feb56df294d260faa9.tar.bz2
aports-74177660e2e3837ac3e626feb56df294d260faa9.tar.xz
main/mupdf: move from testing
needed by cups-filters
Diffstat (limited to 'main/mupdf/APKBUILD')
-rw-r--r--main/mupdf/APKBUILD89
1 files changed, 89 insertions, 0 deletions
diff --git a/main/mupdf/APKBUILD b/main/mupdf/APKBUILD
new file mode 100644
index 0000000000..725d305ac9
--- /dev/null
+++ b/main/mupdf/APKBUILD
@@ -0,0 +1,89 @@
+# Contributor: Sören Tempel <soeren+alpine@soeren-tempel.net>
+# Maintainer: Michael Zhou <zhoumichaely@gmail.com>
+pkgname=mupdf
+pkgver=1.9a
+pkgrel=7
+pkgdesc="A lightweight PDF and XPS viewer"
+url="http://mupdf.com"
+arch="all"
+license="AGPL3+"
+depends=""
+makedepends="freetype-dev jpeg-dev jbig2dec-dev libx11-dev libxext-dev
+ openjpeg-dev harfbuzz-dev glfw-dev"
+subpackages="$pkgname-doc $pkgname-dev $pkgname-x11:_x11
+ $pkgname-gl:_gl $pkgname-tools:_tools"
+source="http://mupdf.com/downloads/archive/$pkgname-$pkgver-source.tar.gz
+ shared-lib.patch
+ openjpeg-2.1.1.patch
+ CVE-2016-6265.patch
+ CVE-2016-6525.patch
+ "
+
+builddir="$srcdir/$pkgname-$pkgver-source"
+prepare() {
+ default_prepare || return 1
+
+ cd "$builddir"
+ for file in thirdparty/*; do
+ [ "${file##*/}" != "mujs" ] && rm -rf "$file"
+ done
+
+ sed '/^JBIG2DEC_CFLAGS :=/s|$| -I./include/mupdf|' \
+ -i Makethird || return 1
+}
+
+build() {
+ make HAVE_GLFW=yes SYS_GLFW_LIBS="-lglfw -lGL" \
+ prefix=/usr -C "$builddir" || return 1
+}
+
+package() {
+ make HAVE_GLFW=yes \
+ prefix=/usr DESTDIR="$pkgdir" \
+ -C "$builddir" install || return 1
+
+ ln -s libmupdf.so.0 "$pkgdir"/usr/lib/libmupdf.so
+ ln -s libmupdfthird.so.0 "$pkgdir"/usr/lib/libmupdfthird.so
+}
+
+_x11() {
+ pkgdesc="A lightweight PDF and XPS viewer with X11 backend"
+ depends="mupdf"
+ mkdir -p "$subpkgdir"/usr/bin
+ mv "$pkgdir"/usr/bin/mupdf-x11 \
+ "$subpkgdir"/usr/bin/ || return 1
+ ln -s /usr/bin/mupdf-x11 "$subpkgdir"/usr/bin/mupdf
+}
+
+_gl() {
+ pkgdesc="A lightweight PDF and XPS viewer with OpenGL backend"
+ depends="mupdf"
+ mkdir -p "$subpkgdir"/usr/bin
+ mv "$pkgdir"/usr/bin/mupdf-gl \
+ "$subpkgdir"/usr/bin/ || return 1
+}
+
+_tools() {
+ pkgdesc="Tools for a lightweight PDF and XPS viewer"
+ depends="mupdf"
+ mkdir -p "$subpkgdir"/usr/bin
+ mv "$pkgdir"/usr/bin/mutool \
+ "$pkgdir"/usr/bin/mujstest \
+ "$subpkgdir"/usr/bin/ || return 1
+}
+
+md5sums="658b90788a57d858dcb069cf326e11c3 mupdf-1.9a-source.tar.gz
+8c4c5ec03c3df7e87a672c79302f6df5 shared-lib.patch
+ba8b6171c4ae38662632259e1c496da1 openjpeg-2.1.1.patch
+57b78ee32e4b341d93b29778c55f4ab6 CVE-2016-6265.patch
+52db3b30aa98a5d15599a87038992e80 CVE-2016-6525.patch"
+sha256sums="8015c55f4e6dd892d3c50db4f395c1e46660a10b460e2ecd180a497f55bbc4cc mupdf-1.9a-source.tar.gz
+3ff3c9413c4c1005db7e41a085ce8e72ee1e956e8d1538a615f51f86f8bb1d14 shared-lib.patch
+46f91311ce2f2972986d6d2f4a57fec5e1a556de494e52226206781942522894 openjpeg-2.1.1.patch
+287b9e4764d680a66b04040c24e3f982f5aa5fce263749794df0fa57ef4f18a8 CVE-2016-6265.patch
+83ab00f0d6bd5e07c286a97a815fa38e9d98df7b5d9925e6cf6fc12e20f5c31c CVE-2016-6525.patch"
+sha512sums="9f804fd65c2dc6b7a3bd73961b1f1a8bf93d52903cccf6302acd6982dfa433125a3b8e77b808984921aee097877280fa21aafb87468cd0a8e4cfa900284a262b mupdf-1.9a-source.tar.gz
+bc38cc6935ed1c5941773e0671bea25d33897c1018c30f11ff3a1ec1e583276597f521b9e526f9bd38a6f9a1e76aa3e52782995ded72a618d07811abcd7ca734 shared-lib.patch
+6eb33da5f05c5e5d8fa2af7223261153769b454d535128056015819c164ff59d068354680ebc135c2221f2ae7a3b6ec99833247bfefa83e9a4bab09f243452f1 openjpeg-2.1.1.patch
+a69d1db475c25f3a298c3cf3ab4858ca9298087bc9839caacc65e3bc7695c0e3dd600e3c7f5c6cd042ceb536a2cf90404c4f13a90ad0e266791cbcf329873992 CVE-2016-6265.patch
+2d8300f93bfe4cf11d817b38e3879ca7eaa704e58274930ee1368f5f1e13cc9baac786421feec0d5a720dd0cbe6cd8b0d94f4a91f2dd762e6e3923fea9deb4bf CVE-2016-6525.patch"