summarylogtreecommitdiffstats
diff options
context:
space:
mode:
authorAlessandro Gario2016-12-30 16:45:48 +0100
committerAlessandro Gario2016-12-30 16:45:48 +0100
commit49fecb90fc79e76129ed664294db488c94c7cc6b (patch)
treec12408b4c36a80efeaee918ca382ddeeb84f8f74
parent8a2147f7ae4375d97114b5aa0c2c9b6efe0de640 (diff)
downloadaur-49fecb90fc79e76129ed664294db488c94c7cc6b.tar.gz
Updated to version 2.6.3
-rw-r--r--.SRCINFO10
-rw-r--r--PKGBUILD22
2 files changed, 17 insertions, 15 deletions
diff --git a/.SRCINFO b/.SRCINFO
index 59a530597728..681e79fbf1f1 100644
--- a/.SRCINFO
+++ b/.SRCINFO
@@ -13,13 +13,13 @@ pkgbase = cerbero-profiler
depends = openssl
depends = xcb-util-renderutil
provides = cerbero-profiler
- noextract = libpython3.4_3.4.0-2ubuntu1.1_amd64.deb
+ noextract = libpython3.4_3.4.3-1ubuntu1~14.04.5_amd64.deb
noextract = libpng12-0_1.2.50-1ubuntu2.14.04.2_amd64.deb
- source = https://store.cerbero.io/static/downloads/profiler/profiler_2.6.2.tar.gz
- source = http://security.ubuntu.com/ubuntu/pool/main/p/python3.4/libpython3.4_3.4.0-2ubuntu1.1_amd64.deb
+ source = https://store.cerbero.io/static/downloads/profiler/profiler_2.6.3.tar.gz
+ source = http://security.ubuntu.com/ubuntu/pool/main/p/python3.4/libpython3.4_3.4.3-1ubuntu1~14.04.5_amd64.deb
source = http://mirrors.kernel.org/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.50-1ubuntu2.14.04.2_amd64.deb
- sha1sums = c4517aac16d56aeca6a64e9bff06bf5496875ef3
- sha1sums = f3feb9e69cc02a0f4c7502e45db0f1f9c4e7c863
+ sha1sums = 37582657d452763a6b358f61f069268e8eabe844
+ sha1sums = a03f1df9695cb9c454f34301b5fd08dd20a5ba21
sha1sums = 0fd57a753a5e46659492187f804d6981158d8a00
pkgname = cerbero-profiler
diff --git a/PKGBUILD b/PKGBUILD
index 571cccbe6629..a0dc3d4b703d 100644
--- a/PKGBUILD
+++ b/PKGBUILD
@@ -6,8 +6,8 @@
#
pkgname=cerbero-profiler
-pkgver=2.6.2
-pkgrel=3
+pkgver=2.6.3
+pkgrel=1
pkgdesc="Cerbero Profiler is a tool designed primarily for malware and forensic analysis. It supports a huge number of file formats on which it performs analysis and lets the user inspect their internal layout."
arch=('x86_64')
url="http://cerbero.io/profiler"
@@ -17,27 +17,29 @@ provides=('cerbero-profiler')
#
# release tarball and external dependencies
-# this is where the sha1 hashes were obtained:
#
# 1. http://packages.ubuntu.com/uk/trusty-updates/amd64/libpng12-0/download
# 2. http://packages.ubuntu.com/trusty/amd64/libpython3.4/download
# 3. https://store.cerbero.io/profiler/download
#
-source=("https://store.cerbero.io/static/downloads/profiler/profiler_${pkgver}.tar.gz" 'http://security.ubuntu.com/ubuntu/pool/main/p/python3.4/libpython3.4_3.4.0-2ubuntu1.1_amd64.deb' 'http://mirrors.kernel.org/ubuntu/pool/main/libp/libpng/libpng12-0_1.2.50-1ubuntu2.14.04.2_amd64.deb')
-noextract=('libpython3.4_3.4.3-1ubuntu1~14.04.3_amd64.deb' 'libpng12-0_1.2.50-1ubuntu2.14.04.2_amd64.deb')
-sha1sums=('c4517aac16d56aeca6a64e9bff06bf5496875ef3' 'f3feb9e69cc02a0f4c7502e45db0f1f9c4e7c863' '0fd57a753a5e46659492187f804d6981158d8a00')
+python_package_name='libpython3.4_3.4.3-1ubuntu1~14.04.5_amd64.deb'
+libpng_package_name='libpng12-0_1.2.50-1ubuntu2.14.04.2_amd64.deb'
+
+source=("https://store.cerbero.io/static/downloads/profiler/profiler_${pkgver}.tar.gz" "http://security.ubuntu.com/ubuntu/pool/main/p/python3.4/${python_package_name}" "http://mirrors.kernel.org/ubuntu/pool/main/libp/libpng/${libpng_package_name}")
+noextract=("$python_package_name" "$libpng_package_name")
+sha1sums=('37582657d452763a6b358f61f069268e8eabe844' 'a03f1df9695cb9c454f34301b5fd08dd20a5ba21' '0fd57a753a5e46659492187f804d6981158d8a00')
prepare() {
# we have to manually extract our two external dependencies since
# they both contain files with the same names
- echo "Extracting: libpython3.4_3.4.0-2ubuntu1.1_amd64.deb"
- ar vx libpython3.4_3.4.0-2ubuntu1.1_amd64.deb >> /dev/null 2>&1
+ echo "Extracting: $python_package_name"
+ ar vx "$python_package_name" >> /dev/null 2>&1
tar xf data.tar.xz >> /dev/null 2>&1
- echo "Extracting: libpng12-0_1.2.50-1ubuntu2.14.04.2_amd64.deb"
- ar vx libpng12-0_1.2.50-1ubuntu2.14.04.2_amd64.deb >> /dev/null 2>&1
+ echo "Extracting: $libpng_package_name"
+ ar vx "$libpng_package_name" >> /dev/null 2>&1
tar xf data.tar.xz >> /dev/null 2>&1
}