[mixxx] New upstream snapshot 2.4.0-0.9.beta.20231215git04b7dd1
by Uwe Klotz
commit c1178ed651195fab390ea9d8e8ccf10b1fb5944d
Author: Uwe Klotz <uwe.klotz(a)gmail.com>
Date: Sat Dec 16 16:11:28 2023 +0100
New upstream snapshot 2.4.0-0.9.beta.20231215git04b7dd1
mixxx.spec | 9 ++++++---
sources | 2 +-
2 files changed, 7 insertions(+), 4 deletions(-)
---
diff --git a/mixxx.spec b/mixxx.spec
index f570f9a..bbcff01 100644
--- a/mixxx.spec
+++ b/mixxx.spec
@@ -7,9 +7,9 @@
%global extraver beta
# Optional: Only used for untagged snapshot versions
-%global gitcommit 3223a7507e02f1567ad8271d4281ca753321df90
+%global gitcommit 04b7dd17dc1a5f9599ecdaf1267f82412b615db8
# Format: <yyyymmdd>
-%global gitcommitdate 20231119
+%global gitcommitdate 20231215
# Additional sources
%global libkeyfinder_version 2.2.6
@@ -28,7 +28,7 @@
Name: mixxx
Version: 2.4.0
-Release: 0.8%{?extraver:.%{extraver}}%{?snapinfo:.%{snapinfo}}%{?dist}
+Release: 0.9%{?extraver:.%{extraver}}%{?snapinfo:.%{snapinfo}}%{?dist}
Summary: Mixxx is open source software for DJ'ing
License: GPLv2+
URL: http://www.mixxx.org
@@ -224,6 +224,9 @@ appstreamcli \
%{_udevrulesdir}/69-%{name}-usb-uaccess.rules
%changelog
+* Sat Dec 16 2023 Uwe Klotz <uwe.klotz(a)gmail.com> - 2.4.0-0.9.beta.20231215git04b7dd1
+- New upstream snapshot 2.4.0-beta
+
* Tue Nov 21 2023 Uwe Klotz <uwe.klotz(a)gmail.com> - 2.4.0-0.8.beta.20231119git3223a75
- Patch .desktop file
diff --git a/sources b/sources
index 8eac00f..a739dfd 100644
--- a/sources
+++ b/sources
@@ -1,3 +1,3 @@
SHA512 (libdjinterop-0.20.1.tar.gz) = 2f75a57326cc958bce6634aba407707313cec646d1713c80d9286d9d2448a68dd304eacd02b38c237a6bb869f07b9b3d3b1cc7fcb7c3a9cdf6ba7515166be6cf
SHA512 (libkeyfinder-2.2.6.zip) = 23ffcc4da59019349824b60dd1b125d559f39d7731fe7f00cdc8f4a97a342fa59ef5183c4e272ff4c5fd06eaa89c581e07fdb26bcfd3c98cc42d2dcc29e13e1e
-SHA512 (mixxx-3223a7507e02f1567ad8271d4281ca753321df90.tar.gz) = 852b04e9a414aee5cbdb534658aeddcdfd96c1a32f17dcc525759cd1021032fd519578db8037d153f771b69f2fdd8378996e961ac2d545b864cc3f8f4243436a
+SHA512 (mixxx-04b7dd17dc1a5f9599ecdaf1267f82412b615db8.tar.gz) = 6621e053d1df8febffad2b3101144ff97d1e1f9457bcfc19b44140a89d6e9d18552c2ee7f207ba49b080f93a857216dafbd858c6890b3fdb3d5a588f93c06ac6
11 months, 1 week
[qarte/f38] Update to 5.7.0
by Martin Gansser
Summary of changes:
bee8eea... Update to 5.7.0 (*)
(*) This commit already existed in another branch; no separate mail sent
11 months, 1 week
[qarte/f39] Update to 5.7.0
by Martin Gansser
Summary of changes:
bee8eea... Update to 5.7.0 (*)
(*) This commit already existed in another branch; no separate mail sent
11 months, 1 week
[qarte] Update to 5.7.0
by Martin Gansser
commit bee8eea02075e401057a40f3cb08d69abc23a3f1
Author: Martin Gansser <mgansser(a)online.de>
Date: Sat Dec 16 11:34:10 2023 +0100
Update to 5.7.0
qarte.spec | 5 ++++-
sources | 2 +-
2 files changed, 5 insertions(+), 2 deletions(-)
---
diff --git a/qarte.spec b/qarte.spec
index e6888c5..8a02359 100644
--- a/qarte.spec
+++ b/qarte.spec
@@ -2,7 +2,7 @@
%global __python %{__python3}
Name: qarte
-Version: 5.6.0
+Version: 5.7.0
Release: 1%{?dist}
Summary: A browser for arte.tv web site
License: GPLv3+
@@ -50,6 +50,9 @@ cp -pR locale %{buildroot}%{_datadir}
%{_datadir}/icons/hicolor/96x96/apps/%{name}.png
%changelog
+* Sat Dec 16 2023 Martin Gansser <martinkg(a)fedoraproject.org> - 5.7.0-1
+- Update to 5.7.0
+
* Thu Dec 07 2023 Martin Gansser <martinkg(a)fedoraproject.org> - 5.6.0-1
- Update to 5.6.0
diff --git a/sources b/sources
index ebabbae..43ec24b 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-SHA512 (qarte-5.6.0.tar.gz) = 788e627799ef01db88c24751000d777510e28ed255eb1630464a39e9a2ac6814733bb65636ee4d8608d6cc8f2306e437cf8b7f91aee28e4cb72c9276d4070479
+SHA512 (qarte-5.7.0.tar.gz) = d8e8c9bdbb5ac7bf39eea16e3df06feea87323aa40acc96340c8e5750e5a7ffc9e1895b0d3656107df4872cc792ee919739d51c42a4737e9279ddbf6bd4680c5
11 months, 1 week
[libheif-freeworld] Update to 1.17.5 (rhbz#2244583)
by Dominik Mierzejewski
commit ff3c6f9387b0ad4c76ae743f8754f0f8be542788
Author: Dominik Mierzejewski <dominik(a)greysector.net>
Date: Sat Dec 16 09:44:06 2023 +0100
Update to 1.17.5 (rhbz#2244583)
- Backport fixes for: CVE-2023-49460 (rhbz#2253575, rhbz#2253576)
CVE-2023-49462 (rhbz#2253567, rhbz#2253568)
CVE-2023-49463 (rhbz#2253565, rhbz#2253566)
CVE-2023-49464 (rhbz#2253562, rhbz#2253563)
- Enable HEVC decoding via libavcodec
26ec3953d46bb5756b97955661565bcbc6647abf.patch | 25 +++
56ef61d8daa55b56d782e5d8ab6f0ed31b98b494.patch | 24 +++
730a9d80bea3434f75c79e721878cc67f3889969.patch | 208 +++++++++++++++++++++++++
fd5b02aca3e29088bf0a1fc400bd661be4a6ed76.patch | 28 ++++
libheif-freeworld.spec | 26 +++-
sources | 2 +-
6 files changed, 309 insertions(+), 4 deletions(-)
---
diff --git a/26ec3953d46bb5756b97955661565bcbc6647abf.patch b/26ec3953d46bb5756b97955661565bcbc6647abf.patch
new file mode 100644
index 0000000..4d2ba07
--- /dev/null
+++ b/26ec3953d46bb5756b97955661565bcbc6647abf.patch
@@ -0,0 +1,25 @@
+From 26ec3953d46bb5756b97955661565bcbc6647abf Mon Sep 17 00:00:00 2001
+From: Dirk Farin <dirk.farin(a)gmail.com>
+Date: Thu, 14 Dec 2023 13:38:11 +0100
+Subject: [PATCH] fix #1042 (EXIF offset larger than data)
+
+---
+ examples/encoder_jpeg.cc | 5 +++++
+ 1 file changed, 5 insertions(+)
+
+diff --git a/examples/encoder_jpeg.cc b/examples/encoder_jpeg.cc
+index bbf24396ba..84f1d7ec9b 100644
+--- a/examples/encoder_jpeg.cc
++++ b/examples/encoder_jpeg.cc
+@@ -178,6 +178,11 @@ bool JpegEncoder::Encode(const struct heif_image_handle* handle,
+ uint32_t skip = (exifdata[0]<<24) | (exifdata[1]<<16) | (exifdata[2]<<8) | exifdata[3];
+ skip += 4;
+
++ if (skip > exifsize) {
++ fprintf(stderr, "Invalid EXIF data (offset too large)\n");
++ return false;
++ }
++
+ uint8_t* ptr = exifdata + skip;
+ size_t size = exifsize - skip;
+
diff --git a/56ef61d8daa55b56d782e5d8ab6f0ed31b98b494.patch b/56ef61d8daa55b56d782e5d8ab6f0ed31b98b494.patch
new file mode 100644
index 0000000..966b215
--- /dev/null
+++ b/56ef61d8daa55b56d782e5d8ab6f0ed31b98b494.patch
@@ -0,0 +1,24 @@
+From 2bf226a300951e6897ee7267d0dd379ba5ad7287 Mon Sep 17 00:00:00 2001
+From: Brad Hards <bradh(a)frogmouth.net>
+Date: Thu, 30 Nov 2023 19:55:18 +1100
+Subject: [PATCH] uncompressed: protect against broken uncC box component
+ references
+
+---
+ libheif/uncompressed_image.cc | 3 +++
+ 1 file changed, 3 insertions(+)
+
+diff --git a/libheif/uncompressed_image.cc b/libheif/uncompressed_image.cc
+index 5218165b23..c91e5dba4f 100644
+--- a/libheif/uncompressed_image.cc
++++ b/libheif/uncompressed_image.cc
+@@ -534,6 +534,9 @@ int UncompressedImageCodec::get_luma_bits_per_pixel_from_configuration_unci(cons
+ int alternate_channel_bits = 0;
+ for (Box_uncC::Component component : uncC_box->get_components()) {
+ uint16_t component_index = component.component_index;
++ if (component_index >= cmpd_box->get_components().size()) {
++ return -1;
++ }
+ auto component_type = cmpd_box->get_components()[component_index].component_type;
+ switch (component_type) {
+ case component_type_monochrome:
diff --git a/730a9d80bea3434f75c79e721878cc67f3889969.patch b/730a9d80bea3434f75c79e721878cc67f3889969.patch
new file mode 100644
index 0000000..c1464c4
--- /dev/null
+++ b/730a9d80bea3434f75c79e721878cc67f3889969.patch
@@ -0,0 +1,208 @@
+From 730a9d80bea3434f75c79e721878cc67f3889969 Mon Sep 17 00:00:00 2001
+From: Dirk Farin <dirk.farin(a)gmail.com>
+Date: Thu, 14 Dec 2023 16:09:05 +0100
+Subject: [PATCH] fix integer overflows when reading EXIF tags (fixes #1043)
+ (CVE-2023-49462)
+
+---
+ examples/encoder_jpeg.cc | 2 +-
+ libheif/exif.cc | 78 +++++++++++++++++++++-------------------
+ libheif/exif.h | 4 +--
+ 3 files changed, 44 insertions(+), 40 deletions(-)
+
+diff --git a/examples/encoder_jpeg.cc b/examples/encoder_jpeg.cc
+index 84f1d7ec9b..41a0eefad6 100644
+--- a/examples/encoder_jpeg.cc
++++ b/examples/encoder_jpeg.cc
+@@ -187,7 +187,7 @@ bool JpegEncoder::Encode(const struct heif_image_handle* handle,
+ size_t size = exifsize - skip;
+
+ // libheif by default normalizes the image orientation, so that we have to set the EXIF Orientation to "Horizontal (normal)"
+- modify_exif_orientation_tag_if_it_exists(ptr, (int)size, 1);
++ modify_exif_orientation_tag_if_it_exists(ptr, size, 1);
+
+ // We have to limit the size for the memcpy, otherwise GCC warns that we exceed the maximum size.
+ if (size>0x1000000) {
+diff --git a/libheif/exif.cc b/libheif/exif.cc
+index ded0a2d29a..82c3cd1328 100644
+--- a/libheif/exif.cc
++++ b/libheif/exif.cc
+@@ -25,12 +25,12 @@
+ #define DEFAULT_EXIF_ORIENTATION 1
+ #define EXIF_TAG_ORIENTATION 0x112
+
++// Note: As far as I can see, it is not defined in the EXIF standard whether the offsets and counts of the IFD is signed or unsigned.
++// We assume that these are all unsigned.
+
+-static int32_t read32(const uint8_t* data, int size, int pos, bool littleEndian)
++static uint32_t read32(const uint8_t* data, uint32_t size, uint32_t pos, bool littleEndian)
+ {
+- if (pos + 4 > size) {
+- return -1;
+- }
++ assert(pos <= size - 4);
+
+ const uint8_t* p = data + pos;
+
+@@ -43,28 +43,24 @@ static int32_t read32(const uint8_t* data, int size, int pos, bool littleEndian)
+ }
+
+
+-static int32_t read16(const uint8_t* data, int size, int pos, bool littleEndian)
++static uint16_t read16(const uint8_t* data, uint32_t size, uint32_t pos, bool littleEndian)
+ {
+- if (pos + 2 > size) {
+- return -1;
+- }
++ assert(pos <= size - 2);
+
+ const uint8_t* p = data + pos;
+
+ if (littleEndian) {
+- return (p[1] << 8) | p[0];
++ return static_cast<uint16_t>((p[1] << 8) | p[0]);
+ }
+ else {
+- return (p[0] << 8) | p[1];
++ return static_cast<uint16_t>((p[0] << 8) | p[1]);
+ }
+ }
+
+
+-static void write16(uint8_t* data, int size, int pos, uint16_t value, bool littleEndian)
++static void write16(uint8_t* data, uint32_t size, uint32_t pos, uint16_t value, bool littleEndian)
+ {
+- if (pos + 2 > size) {
+- return;
+- }
++ assert(pos <= size - 2);
+
+ uint8_t* p = data + pos;
+
+@@ -78,16 +74,16 @@ static void write16(uint8_t* data, int size, int pos, uint16_t value, bool littl
+ }
+ }
+
+-
+-static int find_exif_tag(const uint8_t* exif, int size, uint16_t query_tag, bool* out_littleEndian)
++// Returns 0 if the query_tag was not found.
++static uint32_t find_exif_tag(const uint8_t* exif, uint32_t size, uint16_t query_tag, bool* out_littleEndian)
+ {
+ if (size < 4) {
+- return -1;
++ return 0;
+ }
+
+ if ((exif[0] != 'I' && exif[0] != 'M') ||
+ (exif[1] != 'I' && exif[1] != 'M')) {
+- return -1;
++ return 0;
+ }
+
+ bool littleEndian = (exif[0] == 'I');
+@@ -95,14 +91,22 @@ static int find_exif_tag(const uint8_t* exif, int size, uint16_t query_tag, boo
+ assert(out_littleEndian);
+ *out_littleEndian = littleEndian;
+
+- int offset = read32(exif, size, 4, littleEndian);
+- if (offset < 0) {
+- return -1;
++ uint32_t offset = read32(exif, size, 4, littleEndian);
++
++ if (size - 2 < offset) {
++ return 0;
+ }
+
+- int cnt = read16(exif, size, offset, littleEndian);
+- if (cnt < 1) {
+- return -1;
++ uint16_t cnt = read16(exif, size, offset, littleEndian);
++
++ // Does the IFD table fit into our memory range? We need this to prevent an underflow in the following statement.
++ if (2U + cnt * 12U > size) {
++ return 0;
++ }
++
++ // end of IFD table would exceed the end of the EXIF data
++ if (size - 2U - cnt * 12U > offset) {
++ return 0;
+ }
+
+ for (int i = 0; i < cnt; i++) {
+@@ -114,20 +118,20 @@ static int find_exif_tag(const uint8_t* exif, int size, uint16_t query_tag, boo
+
+ // TODO: do we have to also scan the next IFD table ?
+
+- return -1;
++ return 0;
+ }
+
+
+-void modify_exif_tag_if_it_exists(uint8_t* exif, int size, uint16_t modify_tag, uint16_t modify_value)
++void modify_exif_tag_if_it_exists(uint8_t* exif, uint32_t size, uint16_t modify_tag, uint16_t modify_value)
+ {
+ bool little_endian;
+- int pos = find_exif_tag(exif, size, modify_tag, &little_endian);
+- if (pos < 0) {
++ uint32_t pos = find_exif_tag(exif, size, modify_tag, &little_endian);
++ if (pos == 0) {
+ return;
+ }
+
+- int type = read16(exif, size, pos + 2, little_endian);
+- int count = read32(exif, size, pos + 4, little_endian);
++ uint16_t type = read16(exif, size, pos + 2, little_endian);
++ uint32_t count = read32(exif, size, pos + 4, little_endian);
+
+ if (type == EXIF_TYPE_SHORT && count == 1) {
+ write16(exif, size, pos + 8, modify_value, little_endian);
+@@ -135,26 +139,26 @@ void modify_exif_tag_if_it_exists(uint8_t* exif, int size, uint16_t modify_tag,
+ }
+
+
+-void modify_exif_orientation_tag_if_it_exists(uint8_t* exifData, int size, uint16_t orientation)
++void modify_exif_orientation_tag_if_it_exists(uint8_t* exifData, uint32_t size, uint16_t orientation)
+ {
+ modify_exif_tag_if_it_exists(exifData, size, EXIF_TAG_ORIENTATION, orientation);
+ }
+
+
+-int read_exif_orientation_tag(const uint8_t* exif, int size)
++int read_exif_orientation_tag(const uint8_t* exif, uint32_t size)
+ {
+ bool little_endian;
+- int pos = find_exif_tag(exif, size, EXIF_TAG_ORIENTATION, &little_endian);
+- if (pos < 0) {
++ uint32_t pos = find_exif_tag(exif, size, EXIF_TAG_ORIENTATION, &little_endian);
++ if (pos == 0) {
+ return DEFAULT_EXIF_ORIENTATION;
+ }
+
+- int type = read16(exif, size, pos + 2, little_endian);
+- int count = read32(exif, size, pos + 4, little_endian);
++ uint16_t type = read16(exif, size, pos + 2, little_endian);
++ uint32_t count = read32(exif, size, pos + 4, little_endian);
+
+ if (type == EXIF_TYPE_SHORT && count == 1) {
+ return read16(exif, size, pos + 8, little_endian);
+ }
+
+ return DEFAULT_EXIF_ORIENTATION;
+-}
+\ No newline at end of file
++}
+diff --git a/libheif/exif.h b/libheif/exif.h
+index e877eaf5b1..7598c65534 100644
+--- a/libheif/exif.h
++++ b/libheif/exif.h
+@@ -24,8 +24,8 @@
+ #include <vector>
+ #include <cinttypes>
+
+-int read_exif_orientation_tag(const uint8_t* exif, int size);
++int read_exif_orientation_tag(const uint8_t* exif, uint32_t size);
+
+-void modify_exif_orientation_tag_if_it_exists(uint8_t* exifData, int size, uint16_t orientation);
++void modify_exif_orientation_tag_if_it_exists(uint8_t* exifData, uint32_t size, uint16_t orientation);
+
+ #endif //LIBHEIF_EXIF_H
diff --git a/fd5b02aca3e29088bf0a1fc400bd661be4a6ed76.patch b/fd5b02aca3e29088bf0a1fc400bd661be4a6ed76.patch
new file mode 100644
index 0000000..dc12b43
--- /dev/null
+++ b/fd5b02aca3e29088bf0a1fc400bd661be4a6ed76.patch
@@ -0,0 +1,28 @@
+From fd5b02aca3e29088bf0a1fc400bd661be4a6ed76 Mon Sep 17 00:00:00 2001
+From: zhailiangliang <zhailiangliang(a)loongson.cn>
+Date: Thu, 14 Dec 2023 16:42:14 +0800
+Subject: [PATCH] fix null pointer dereference in
+ libheif/uncompressed_image.cc:758
+
+---
+ libheif/uncompressed_image.cc | 7 +++++++
+ 1 file changed, 7 insertions(+)
+
+diff --git a/libheif/uncompressed_image.cc b/libheif/uncompressed_image.cc
+index c91e5dba4f..487d4cedbe 100644
+--- a/libheif/uncompressed_image.cc
++++ b/libheif/uncompressed_image.cc
+@@ -616,6 +616,13 @@ Error UncompressedImageCodec::decode_uncompressed_image(const std::shared_ptr<co
+ if (error) {
+ return error;
+ }
++
++ if (!(uncompressed_data.data())) {
++ return Error(heif_error_Invalid_input,
++ heif_suberror_Unspecified,
++ "Invalid data: uncompressed_data.data() is null for uncompressed codec");
++ }
++
+ uint32_t width = 0;
+ uint32_t height = 0;
+ bool found_ispe = false;
diff --git a/libheif-freeworld.spec b/libheif-freeworld.spec
index b43fb4c..d912405 100644
--- a/libheif-freeworld.spec
+++ b/libheif-freeworld.spec
@@ -1,17 +1,26 @@
%bcond_with check
Name: libheif-freeworld
-Version: 1.16.2
-Release: 2%{?dist}
+Version: 1.17.5
+Release: 1%{?dist}
Summary: HEVC support for HEIF and AVIF file format decoder and encoder
License: LGPL-3.0-or-later and MIT
URL: https://github.com/strukturag/libheif
Source0: %{url}/archive/v%{version}/libheif-%{version}.tar.gz
+# fix for CVE-2023-49460 (https://github.com/strukturag/libheif/issues/1046)
+Patch10: https://github.com/strukturag/libheif/commit/fd5b02aca3e29088bf0a1fc400bd...
+# fix for CVE-2023-49462 (https://github.com/strukturag/libheif/issues/1043)
+Patch11: https://github.com/strukturag/libheif/commit/730a9d80bea3434f75c79e721878...
+# fix for CVE-2023-49463 (https://github.com/strukturag/libheif/issues/1042)
+Patch12: https://github.com/strukturag/libheif/commit/26ec3953d46bb5756b9795566156...
+# fix for CVE-2023-49464 (https://github.com/strukturag/libheif/issues/1044)
+Patch13: https://github.com/strukturag/libheif/commit/56ef61d8daa55b56d782e5d8ab6f...
BuildRequires: cmake
BuildRequires: gcc-c++
BuildRequires: ninja-build
+BuildRequires: pkgconfig(libavcodec)
BuildRequires: pkgconfig(libde265)
BuildRequires: pkgconfig(x265)
%if %{with check}
@@ -41,8 +50,11 @@ rm -rf third-party/
%if %{with check}
-DBUILD_TESTING=ON \
-DWITH_REDUCED_VISIBILITY=OFF \
+ -DWITH_FFMPEG_DECODER=ON \
-DWITH_LIBDE265=ON -DWITH_X265=ON \
%else
+ -DWITH_FFMPEG_DECODER=ON \
+ -DWITH_FFMPEG_DECODER_PLUGIN=ON \
-DWITH_LIBDE265_PLUGIN:BOOL=ON -DWITH_X265_PLUGIN:BOOL=ON \
%endif
-DWITH_EXAMPLES:BOOL=OFF \
@@ -57,7 +69,6 @@ rm -rv .%{_includedir}/libheif
rm -rv .%{_libdir}/cmake/libheif
rm -rv .%{_libdir}/libheif.so*
rm -v .%{_libdir}/pkgconfig/libheif.pc
-rm -rv .%{_datadir}/thumbnailers
popd
%if %{with check}
@@ -68,10 +79,19 @@ popd
%files
%license COPYING
%doc README.md
+%{_libdir}/libheif/libheif-ffmpegdec.so
%{_libdir}/libheif/libheif-libde265.so
%{_libdir}/libheif/libheif-x265.so
%changelog
+* Fri Dec 15 2023 Dominik Mierzejewski <dominik(a)greysector.net> - 1.17.5-2
+- Update to 1.17.5 (rhbz#2244583)
+- Backport fixes for: CVE-2023-49460 (rhbz#2253575, rhbz#2253576)
+ CVE-2023-49462 (rhbz#2253567, rhbz#2253568)
+ CVE-2023-49463 (rhbz#2253565, rhbz#2253566)
+ CVE-2023-49464 (rhbz#2253562, rhbz#2253563)
+- Enable HEVC decoding via libavcodec
+
* Fri Sep 08 2023 Dominik Mierzejewski <dominik(a)greysector.net> - 1.16.2-2
- Enable uncompressed codec (rhbz#2237849)
- Run tests conditionally (requires making all symbols visible)
diff --git a/sources b/sources
index e321e03..7a5642d 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-SHA512 (libheif-1.16.2.tar.gz) = ef32fced3a66d888caf2202b55bc4c81094045abfd2806216bbf0c359a30663c500ed5e33a9cef316bcfd933498e87753e9af6b3c179e84c370efd62900493c0
+SHA512 (libheif-1.17.5.tar.gz) = e17f990fcb4b3ebfec19cbf304ae8f9b00a3d33aaf46802eff8b3c21c614ccd02cb0a92960324b4c579e579021615c88d16efe6df84a171ddbc05313d2c73931
11 months, 1 week
[obs-studio-freeworld] Drop vlc video plugin as it moved to Fedora
by Neal Gompa
commit c27e59ac6c696e6af38df2380af19aee5f1d6ef6
Author: Neal Gompa <ngompa(a)fedoraproject.org>
Date: Fri Dec 15 09:06:15 2023 -0500
Drop vlc video plugin as it moved to Fedora
obs-studio-freeworld.spec | 37 ++++---------------------------------
1 file changed, 4 insertions(+), 33 deletions(-)
---
diff --git a/obs-studio-freeworld.spec b/obs-studio-freeworld.spec
index 51317b8..0bc701c 100644
--- a/obs-studio-freeworld.spec
+++ b/obs-studio-freeworld.spec
@@ -12,7 +12,6 @@
%bcond_with vpl
%endif
-%bcond_without vlc
%bcond_without x264
%global obswebsocket_version 5.3.3
@@ -25,7 +24,7 @@
Name: obs-studio-freeworld
Version: 30.0.0
-Release: 2%{?dist}
+Release: 3%{?dist}
Summary: Open Broadcaster Software Studio -- Freeworld plugins
# OBS itself is GPL-2.0-or-later, while various plugin dependencies are of various other licenses
@@ -104,9 +103,6 @@ BuildRequires: qt6-qtwayland-devel
BuildRequires: speexdsp-devel
BuildRequires: swig
BuildRequires: systemd-devel
-%if %{with vlc}
-BuildRequires: vlc-devel
-%endif
BuildRequires: wayland-devel
BuildRequires: websocketpp-devel
%if %{with x264}
@@ -173,30 +169,6 @@ streaming or recording AVC/H.264 video.
# --------------------------------------------------------------------------
-%package -n obs-studio-plugin-vlc-video
-Summary: Open Broadcaster Software Studio - VLC-based video plugin
-License: GPL-2.0-or-later
-BuildRequires: vlc-devel
-# We dlopen() libvlc
-Requires: libvlc.so.%{libvlc_soversion}%{?lib64_suffix}
-Requires: obs-studio%{?_isa} >= %{version}
-Supplements: obs-studio%{?_isa}
-
-
-%description -n obs-studio-plugin-vlc-video
-Open Broadcaster Software is free and open source software
-for video recording and live streaming.
-
-This package contains the plugin for using VLC to embed video
-as an overlay in a video stream or recording.
-
-%files -n obs-studio-plugin-vlc-video
-%license COPYING
-%{_libdir}/obs-plugins/vlc-video.so
-%{_datadir}/obs/obs-plugins/vlc-video/
-
-# --------------------------------------------------------------------------
-
%prep
%setup -q -n %{origname}-%{?snapdate:%{commit}}%{!?snapdate:%{version_no_tilde}}
@@ -256,9 +228,7 @@ cp plugins/obs-qsv11/obs-qsv11-LICENSE.txt .fedora-rpm/licenses/plugins/
-DUNIX_STRUCTURE=1 -GNinja \
-DCMAKE_SKIP_RPATH=1 \
-DBUILD_BROWSER=OFF \
-%if ! %{with vlc}
-DENABLE_VLC=OFF \
-%endif
-DENABLE_JACK=ON \
-DENABLE_LIBFDK=ON \
-DENABLE_AJA=OFF \
@@ -278,8 +248,6 @@ mkdir -p preserve/%{_datadir}/obs/obs-plugins
# Preserve plugin files to install
mv %{buildroot}%{_libdir}/obs-plugins/obs-x264.so preserve/%{_libdir}/obs-plugins
mv %{buildroot}%{_datadir}/obs/obs-plugins/obs-x264 preserve/%{_datadir}/obs/obs-plugins
-mv %{buildroot}%{_libdir}/obs-plugins/vlc-video.so preserve/%{_libdir}/obs-plugins
-mv %{buildroot}%{_datadir}/obs/obs-plugins/vlc-video preserve/%{_datadir}/obs/obs-plugins
# Purge installed buildroot
rm -rf %{buildroot}/*
@@ -289,6 +257,9 @@ mv preserve/%{_prefix} %{buildroot}
%changelog
+* Fri Dec 15 2023 Neal Gompa <ngompa(a)fedoraproject.org> - 30.0.0-3
+- Drop vlc video plugin as it moved to Fedora
+
* Thu Nov 16 2023 Dominik Mierzejewski <dominik(a)greysector.net> - 30.0.0-2
- sync with Fedora
11 months, 1 week
[vlc] Moved to fedora
by Leigh Scott
commit 86ffc50fc322b8d9c6e72fbb31e2d1b02cae1b30
Author: Leigh Scott <leigh123linux(a)gmail.com>
Date: Fri Dec 15 09:30:08 2023 +0000
Moved to fedora
.gitignore | 2 -
...by-ref.-from-getConnectionEndpointAddress.patch | 50 -
...ss-libdvdread-6.1.2-supports-UTF-8-paths-.patch | 74 -
0001-Use-SYSTEM-wide-ciphers-for-gnutls.patch | 38 -
0001-po-Fixup-invalid-format-string.patch | 45 -
Lower-libgcrypt-to-1.5.3.patch | 44 -
Remove_legacy_caca.patch | 98 -
...port-for-thread-callbacks-for-older-gcryp.patch | 94 -
Revert-taglib-wav-fix-RIFF-INFO-tags-parsing.patch | 84 -
Switch-to-Fedora-lua-5.1.patch | 36 -
dead.package | 1 +
fix-dav1d-1.0.patch | 149 -
mmal_20.patch | 13821 -------------------
mmal_chain.patch | 14 -
notify-don-t-depend-on-any-GTK-version.patch | 101 -
sources | 1 -
vlc-libplacebo-5.patch | 131 -
vlc-onevpl.patch | 24 -
vlc.spec | 2378 ----
19 files changed, 1 insertion(+), 17184 deletions(-)
---
diff --git a/dead.package b/dead.package
new file mode 100644
index 0000000..9c61d12
--- /dev/null
+++ b/dead.package
@@ -0,0 +1 @@
+Moved to fedora
11 months, 1 week
[vlc-bittorrent] Moved to fedora
by Leigh Scott
commit 6ef77ce9b159a79d140a8a2c9619e0520f2c5dc5
Author: Leigh Scott <leigh123linux(a)gmail.com>
Date: Fri Dec 15 09:22:14 2023 +0000
Moved to fedora
.gitignore | 1 -
dead.package | 1 +
sources | 1 -
vlc-bittorrent.spec | 120 ----------------------------------------------------
4 files changed, 1 insertion(+), 122 deletions(-)
---
diff --git a/dead.package b/dead.package
new file mode 100644
index 0000000..9c61d12
--- /dev/null
+++ b/dead.package
@@ -0,0 +1 @@
+Moved to fedora
11 months, 1 week