wok view xpad/receipt @ rev 499

Up: xine-lib (1.1.11) - Security (array index vulnerability)
author Christophe Lincoln <pankso@slitaz.org>
date Tue Mar 25 10:25:34 2008 +0100 (2008-03-25)
parents 4e795cf8f4ce
children 3e70d6e68647
line source
1 # SliTaz package receipt.
3 PACKAGE="xpad"
4 VERSION="2.12"
5 CATEGORY="utilities"
6 SHORT_DESC="Desktop note pad using GTK+ toolkit."
7 MAINTAINER="pankso@slitaz.org"
8 DEPENDS="gtk+"
9 TARBALL="$PACKAGE-$VERSION.tar.bz2"
10 WEB_SITE="http://xpad.sourceforge.net/"
11 WGET_URL="$SF_MIRROR/$PACKAGE/$TARBALL"
12 HANDBOOK_URL='http://www.slitaz.org/doc/handbook/utilities.html#xpad'
14 # Rules to configure and make the package.
15 compile_rules()
16 {
17 cd $src
18 ./configure --prefix=/usr --mandir=/usr/share/man \
19 $CONFIGURE_ARGS
20 make
21 make DESTDIR=$PWD/_pkg install
22 }
24 # Rules to gen a SliTaz package suitable for Tazpkg.
25 genpkg_rules()
26 {
27 mkdir -p $fs/usr
28 cp -a $_pkg/usr/bin $fs/usr
29 strip -s $fs/usr/bin/*
30 }