aboutsummaryrefslogtreecommitdiffstats
path: root/community/exiv2/APKBUILD
diff options
context:
space:
mode:
Diffstat (limited to 'community/exiv2/APKBUILD')
-rw-r--r--community/exiv2/APKBUILD83
1 files changed, 59 insertions, 24 deletions
diff --git a/community/exiv2/APKBUILD b/community/exiv2/APKBUILD
index 91683bc2638..cf95b187460 100644
--- a/community/exiv2/APKBUILD
+++ b/community/exiv2/APKBUILD
@@ -1,31 +1,48 @@
# Maintainer: Natanael Copa <ncopa@alpinelinux.org>
pkgname=exiv2
-pkgver=0.27.3
+pkgver=0.28.2
pkgrel=0
pkgdesc="Exif and Iptc metadata manipulation library and tools."
-url="https://exiv2.org"
+url="https://exiv2.org/"
arch="all"
-options="!check" # No test suite.
license="GPL-2.0-or-later"
depends_dev="expat-dev zlib-dev"
-makedepends="$depends_dev cmake"
+makedepends="$depends_dev cmake samurai"
+checkdepends="gtest-dev"
subpackages="$pkgname-dev $pkgname-doc"
-source="https://exiv2.org/builds/exiv2-$pkgver-Source.tar.gz"
-builddir="$srcdir"/$pkgname-$pkgver-Source
-
-prepare() {
- default_prepare
-
- # -fcf-protection=full is only usable on x86_64 and x86 since those
- # are the arches where Intel's CET Control-Flow Enforcement Technology
- # is available
- case "$CARCH" in
- x86_64|x86) ;;
- *) sed -i 's| -fcf-protection||g' cmake/compilerFlags.cmake ;;
- esac
-}
+source="https://github.com/Exiv2/exiv2/archive/refs/tags/v$pkgver/exiv2-v$pkgver.tar.gz"
# secfixes:
+# 0.28.2-r0:
+# - CVE-2024-24826
+# - CVE-2024-25112
+# 0.28.1-r0:
+# - CVE-2023-44398
+# 0.27.5-r0:
+# - CVE-2021-32815
+# - CVE-2021-34334
+# - CVE-2021-34335
+# - CVE-2021-37615
+# - CVE-2021-37616
+# - CVE-2021-37618
+# - CVE-2021-37619
+# - CVE-2021-37620
+# - CVE-2021-37621
+# - CVE-2021-37622
+# - CVE-2021-37623
+# 0.27.4-r0:
+# - CVE-2021-29464
+# 0.27.3-r2:
+# - CVE-2021-29463
+# - CVE-2021-29470
+# - CVE-2021-29473
+# - CVE-2021-29623
+# - CVE-2021-32617
+# 0.27.3-r1:
+# - CVE-2021-3482
+# - CVE-2021-29457
+# - CVE-2021-29458
+# - CVE-2021-31291
# 0.27.2-r6:
# - CVE-2019-20421
# 0.27.2-r2:
@@ -39,21 +56,39 @@ prepare() {
# - CVE-2019-13113
# - CVE-2019-13114
+prepare() {
+ default_prepare
+
+ # -fcf-protection=full is only usable on x86_64 and x86 since those
+ # are the arches where Intel's CET Control-Flow Enforcement Technology
+ # is available
+ # musl doesn't support it at all though, so there is no point to add it
+ sed -i 's| -fcf-protection||g' cmake/compilerFlags.cmake
+}
+
build() {
- cmake -B build . \
+ CFLAGS="$CFLAGS -flto=auto" \
+ CXXFLAGS="$CXXFLAGS -flto=auto" \
+ cmake -B build -G Ninja \
-DCMAKE_BUILD_TYPE=None \
-DCMAKE_INSTALL_PREFIX=/usr \
-DCMAKE_INSTALL_LIBDIR=lib \
- -DEXIV2_BUILD_SAMPLES=OFF
- make -C build
+ -DEXIV2_BUILD_SAMPLES=OFF \
+ -DEXIV2_ENABLE_BMFF=ON \
+ -DEXIV2_ENABLE_BROTLI=OFF \
+ -DEXIV2_ENABLE_INIH=OFF \
+ -DEXIV2_BUILD_UNIT_TESTS="$(want_check && echo ON || echo OFF)"
+ ninja -C build
}
check() {
- make -C build test
+ ninja -C build test
}
package() {
- make -C build DESTDIR="$pkgdir" install
+ DESTDIR="$pkgdir" ninja -C build install
}
-sha512sums="3f5758ee862b811eeb89cc75fc2bbd8bf10329efa2ce1e68555cdc7729faa6cfd1603e0cc859fbdbe6d8fd5e53bd9b9e6d869d8a20ed17497bf87ce78c005de9 exiv2-0.27.3-Source.tar.gz"
+sha512sums="
+197cc607c0271b5731714713283756250031cef81ba7ed5d9c3e222b4c2397966cc2bbdbceaae706598329dde6f8a9729597d0ae4c36ac264c76546942e4e37b exiv2-v0.28.2.tar.gz
+"