1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
|
# Copyright 2013-2019 Lawrence Livermore National Security, LLC and other
# Spack Project Developers. See the top-level COPYRIGHT file for details.
#
# SPDX-License-Identifier: (Apache-2.0 OR MIT)
from spack import *
class Libpng(AutotoolsPackage):
"""libpng is the official PNG reference library."""
homepage = "http://www.libpng.org/pub/png/libpng.html"
url = "http://download.sourceforge.net/libpng/libpng-1.6.34.tar.gz"
list_url = "https://sourceforge.net/projects/libpng/files/"
list_depth = 2
version('1.6.34', '03fbc5134830240104e96d3cda648e71')
version('1.6.29', '68553080685f812d1dd7a6b8215c37d8')
version('1.6.28', '897ccec1ebfb0922e83c2bfaa1be8748')
version('1.6.27', '58698519e9f6126c1caeefc28dbcbd5f')
# From http://www.libpng.org/pub/png/libpng.html (2017-01-04)
# Virtually all libpng versions through 1.6.26, 1.5.27,
# 1.4.19, 1.2.56, and 1.0.66, respectively, have a
# null-pointer-dereference bug in png_set_text_2() when an
# image-editing application adds, removes, and re-adds text
# chunks to a PNG image. (This bug does not affect pure
# viewers, nor are there any known editors that could trigger
# it without interactive user input. It has been assigned ID
# CVE-2016-10087.) The vulnerability is fixed in versions
# 1.6.27, 1.5.28, 1.4.20, 1.2.57, and 1.0.67, released on 29
# December 2016.
# Required for qt@3
version('1.2.57', 'dfcda3603e29dcc11870c48f838ef75b')
depends_on('zlib@1.0.4:') # 1.2.5 or later recommended
def configure_args(self):
args = [
# not honored, see
# https://sourceforge.net/p/libpng/bugs/210/#33f1
# '--with-zlib=' + self.spec['zlib'].prefix,
'CPPFLAGS={0}'.format(self.spec['zlib'].headers.include_flags),
'LDFLAGS={0}'.format(self.spec['zlib'].libs.search_flags)
]
return args
def check(self):
# Libpng has both 'check' and 'test' targets that are aliases.
# Only need to run the tests once.
make('check')
|