aboutsummaryrefslogtreecommitdiffstats
path: root/main/giflib/APKBUILD
blob: 2f7dd1860ca3609358b9c8b2b24e7bd29c0368c4 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
# Maintainer: Natanael Copa <ncopa@alpinelinux.org>
pkgname=giflib
pkgver=5.1.1
pkgrel=0
pkgdesc="A library for reading and writing gif images"
url="http://sourceforge.net/projects/giflib/"
arch="all"
license="MIT"
subpackages="$pkgname-dev $pkgname-doc $pkgname-utils"
depends=
makedepends="libx11-dev libsm-dev util-linux-dev xmlto"
source="http://downloads.sourceforge.net/sourceforge/$pkgname/$pkgname-$pkgver.tar.bz2
	xmlto-skip-validation.patch
	CVE-2015-7555.patch
	CVE-2016-3977.patch
	"

_builddir="$srcdir"/$pkgname-$pkgver
prepare() {
	cd "$_builddir"
	for i in $source; do
		case $i in
		*.patch) msg $i; patch -p1 -i "$srcdir"/$i || return 1;;
		esac
	done
}

build () {
	cd "$_builddir"
	./configure \
		--build=$CBUILD \
		--host=$CHOST \
		--prefix=/usr \
		|| return 1
	make || return 1
	MAJOR=`echo $pkgver | sed 's/\([0-9]\+\)\..*/\1/'`
	gcc -shared -Wl,-soname,libungif.so.${MAJOR} -Llib/.libs -lgif -o libungif.so.$pkgver || return 1
}

package() {
	cd "$_builddir"
	make DESTDIR="$pkgdir" install || return 1
	rm "$pkgdir"/usr/lib/*.la || return 1
	install -Dm644 COPYING "$pkgdir"/usr/share/licenses/$pkgname/COPYING \
		|| return 1

	install -m755 libungif.so.$pkgver "$pkgdir"/usr/lib/ || return 1
	ln -sf libungif.so.$pkgver "$pkgdir"/usr/lib/libungif.so.4 || return 1
	ln -sf libungif.so.4 "$pkgdir"/usr/lib/libungif.so || return 1
}

utils() {
	pkgdesc="Programs for manipulating GIF format image files"
	mkdir -p "$subpkgdir"/usr
	mv "$pkgdir"/usr/bin "$subpkgdir"/usr/
}

md5sums="1c39333192712788c6568c78a949f13e  giflib-5.1.1.tar.bz2
e1ae3d46e40a8609231dea3075388d4a  xmlto-skip-validation.patch
0db53bd9a66b8f03c63eb6f54abd672a  CVE-2015-7555.patch
2a05db226e22dd92c9895337746793e5  CVE-2016-3977.patch"
sha256sums="391014aceb21c8b489dc7b0d0b6a917c4e32cc014ce2426d47ca376d02fe2ffc  giflib-5.1.1.tar.bz2
2244e339343d027044732e47bce2b0bdb3e6d9c472963748af4adb2304374022  xmlto-skip-validation.patch
a0ff8ff588e95e2a4545ccb63d806de1a645c0e3296f5337e22d9acf2a595829  CVE-2015-7555.patch
998ff08a394cb2475529c18bffe9bdaeab38a835958f6881fd74ecb3ad1fa9a2  CVE-2016-3977.patch"
sha512sums="9d9cba004c1402c7c547b7a7f35485fe03b0bc3637102b9eba96d1dea2984415fccdff4a6463215af82e2d3817d75bdd64ae7a96d4acc98b4904e5e5f352dd3e  giflib-5.1.1.tar.bz2
36f92cb092ee9dc463aa1b6b9857d1a1591fa5ed6bf973b02385a979a7178cf2c1f7fc75d6474c2fa90c090e9659178ab8cfe6bb3e147425828a1b5a59ca6f06  xmlto-skip-validation.patch
5423fd0bd9ad327fc67c42f585981ccc8624186811b60b45149110c2899453f71fc7d2da59eaa55acb43bd7a2e7cc82fd99183808b3c7d36c494efa06368c9ea  CVE-2015-7555.patch
06a9d37c08a37233f1b66784ea51fa0b5ed3908431845f5ca36bbcb81c8cf7a5b9e58d5ea92ce0ea7f23c0310508452dafbf143a4888d3cce0733555ed52c467  CVE-2016-3977.patch"