# Maintainer: Natanael Copa pkgname=giflib pkgver=5.0.6 pkgrel=2 pkgdesc="A library for reading and writing gif images" url="http://sourceforge.net/projects/giflib/" arch="all" license="MIT" subpackages="$pkgname-dev $pkgname-doc $pkgname-utils" depends= makedepends="libx11-dev libsm-dev util-linux-dev xmlto" source="http://downloads.sourceforge.net/sourceforge/$pkgname/$pkgname-$pkgver.tar.bz2 xmlto-skip-validation.patch CVE-2016-3977.patch CVE-2015-7555.patch " _builddir="$srcdir"/$pkgname-$pkgver prepare() { cd "$_builddir" for i in $source; do case $i in *.patch) msg $i; patch -p1 -i "$srcdir"/$i || return 1;; esac done } build () { cd "$_builddir" ./configure \ --build=$CBUILD \ --host=$CHOST \ --prefix=/usr \ || return 1 make || return 1 MAJOR=`echo $pkgver | sed 's/\([0-9]\+\)\..*/\1/'` gcc -shared -Wl,-soname,libungif.so.${MAJOR} -Llib/.libs -lgif -o libungif.so.$pkgver || return 1 } package() { cd "$_builddir" make DESTDIR="$pkgdir" install || return 1 rm "$pkgdir"/usr/lib/*.la || return 1 install -Dm644 COPYING "$pkgdir"/usr/share/licenses/$pkgname/COPYING \ || return 1 install -m755 libungif.so.$pkgver "$pkgdir"/usr/lib/ || return 1 ln -sf libungif.so.$pkgver "$pkgdir"/usr/lib/libungif.so.4 || return 1 ln -sf libungif.so.4 "$pkgdir"/usr/lib/libungif.so || return 1 } utils() { pkgdesc="Programs for manipulating GIF format image files" mkdir -p "$subpkgdir"/usr mv "$pkgdir"/usr/bin "$subpkgdir"/usr/ } md5sums="603838feeed62e9eaa90415742adddf9 giflib-5.0.6.tar.bz2 e1ae3d46e40a8609231dea3075388d4a xmlto-skip-validation.patch ff293c617b58bc0741304fda1a329d4e CVE-2016-3977.patch 0db53bd9a66b8f03c63eb6f54abd672a CVE-2015-7555.patch" sha256sums="8909839ccbdfca75cfbe6a4db907b55978e11fb268a8f3cde24bd923a0f669ea giflib-5.0.6.tar.bz2 2244e339343d027044732e47bce2b0bdb3e6d9c472963748af4adb2304374022 xmlto-skip-validation.patch 17f2b56775a0cb2eae231bda819e940b8d144befbe1998af3d538ffc70baefce CVE-2016-3977.patch a0ff8ff588e95e2a4545ccb63d806de1a645c0e3296f5337e22d9acf2a595829 CVE-2015-7555.patch" sha512sums="117e20319f2df32bdf094678cdececad2b6f33a40baff172d4df68ade86547825ebca81186071bff51e60126692df84dbd7bb5cc4877ba68448f7c47a2cc2491 giflib-5.0.6.tar.bz2 36f92cb092ee9dc463aa1b6b9857d1a1591fa5ed6bf973b02385a979a7178cf2c1f7fc75d6474c2fa90c090e9659178ab8cfe6bb3e147425828a1b5a59ca6f06 xmlto-skip-validation.patch f945bec00e0ad00435a52e58af3b211b5cf2383a94e7564b6b7143c636a11b8819f2080eee8ccb6ce9921cf3bd215e3fa161888072d4b84647db2e9bded9dbe3 CVE-2016-3977.patch 5423fd0bd9ad327fc67c42f585981ccc8624186811b60b45149110c2899453f71fc7d2da59eaa55acb43bd7a2e7cc82fd99183808b3c7d36c494efa06368c9ea CVE-2015-7555.patch"