File tiff.spec of Package tiff.32960

#
# spec file for package tiff
#
# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.

# Please submit bugfixes or comments via http://bugs.opensuse.org/
#

%define         asan_build 0
%define         debug_build 0

Name:           tiff
Version:        4.0.9
Release:        0
Summary:        Tools for Converting from and to the Tagged Image File Format
License:        HPND
Group:          Productivity/Graphics/Convertors
Url:            http://www.simplesystems.org/libtiff/
Source:         http://download.osgeo.org/libtiff/tiff-%{version}.tar.gz
Source2:        README.SUSE
Source3:        baselibs.conf
Patch0:         tiff-4.0.3-seek.patch
# http://bugzilla.maptools.org/show_bug.cgi?id=2442
Patch1:         tiff-4.0.3-compress-warning.patch
# Contained in upstream repo. See bsc#1046077 for commit IDs.
Patch2:         tiff-CVE-2017-9935,CVE-2018-17795.patch
Patch3:         tiff-4.0.9-bsc1081690-CVE-2018-5784.patch
Patch4:         tiff-CVE-2018-10963.patch
Patch5:         tiff-CVE-2017-18013.patch
Patch6:         tiff-CVE-2018-7456.patch
Patch7:         tiff-CVE-2017-11613,CVE-2018-16335,15209.patch
Patch8:         tiff-CVE-2018-8905.patch
Patch9:         tiff-CVE-2018-10779.patch
Patch10:        tiff-CVE-2018-17100.patch
Patch11:        tiff-CVE-2018-17101.patch
Patch12:        tiff-CVE-2018-18661.patch
Patch13:        tiff-CVE-2018-18557.patch
Patch14:        tiff-CVE-2018-12900.patch
Patch15:        tiff-CVE-2018-17000,19210.patch
Patch16:        tiff-CVE-2019-6128.patch
Patch17:        tiff-CVE-2019-7663.patch
Patch18:        tiff-CVE-2019-14973.patch
Patch19:        tiff-CVE-2020-35523.patch
Patch20:        tiff-CVE-2020-35524.patch
Patch21:        tiff-CVE-2020-19131.patch
Patch22:        tiff-CVE-2020-35521,CVE-2020-35522.patch
Patch23:        tiff-CVE-2022-22844.patch
Patch24:        tiff-CVE-2017-17095.patch
Patch25:        tiff-CVE-2019-17546.patch
Patch26:        tiff-CVE-2022-1056,CVE-2022-0891.patch
Patch27:        tiff-CVE-2022-0561,CVE-2022-34266.patch
Patch28:        tiff-CVE-2022-0562.patch
Patch29:        tiff-CVE-2022-0865.patch
Patch30:        tiff-CVE-2022-0909.patch
Patch31:        tiff-CVE-2022-0924.patch
Patch32:        tiff-CVE-2022-0908.patch
Patch33:        tiff-CVE-2022-2056,CVE-2022-2057,CVE-2022-2058.patch
Patch34:        tiff-CVE-2022-34526.patch
Patch35:        tiff-CVE-2022-2519,CVE-2022-2520,CVE-2022-2521.patch
Patch36:        tiff-CVE-2022-2867,CVE-2022-2868,CVE-2022-2869.patch
Patch37:        tiff-CVE-2022-3597,CVE-2022-3626,CVE-2022-3627.patch
Patch38:        tiff-CVE-2022-3599.patch
Patch39:        tiff-CVE-2022-3970.patch
Patch40:        tiff-CVE-2022-3598,3570.patch
Patch41:        tiff-CVE-2022-48281.patch
Patch42:        tiff-CVE-2023-0795,CVE-2023-0796,CVE-2023-0797,CVE-2023-0798,CVE-2023-0799.patch
Patch43:        tiff-CVE-2023-0800,CVE-2023-0801,CVE-2023-0802,CVE-2023-0803,CVE-2023-0804.patch
Patch44:        tiff-CVE-2023-38289.patch
Patch45:        tiff-CVE-2023-38288,CVE-2023-40745,CVE-2023-41175.patch
Patch46:        tiff-CVE-2023-3576.patch
Patch47:        tiff-CVE-2020-18768.patch
Patch48:        tiff-CVE-2023-26966.patch
Patch49:        tiff-CVE-2023-3618.patch
Patch50:        tiff-CVE-2023-2908.patch
Patch51:        tiff-CVE-2023-3316.patch
Patch52:        tiff-CVE-2023-2731.patch
Patch53:        tiff-CVE-2023-26965.patch
Patch54:        tiff-CVE-2022-40090.patch
Patch55:        tiff-CVE-2023-1916.patch
Patch56:        tiff-CVE-2023-52356.patch

BuildRequires:  gcc-c++
BuildRequires:  libjpeg-devel
BuildRequires:  libtool
BuildRequires:  zlib-devel
BuildRoot:      %{_tmppath}/%{name}-%{version}-build
%if 0%{?suse_version} > 1030
BuildRequires:  lzma-devel
%endif
%if 0%{?suse_version} <= 1000
BuildRequires:  pkgconfig
%endif
%if 0%{?suse_version} > 1000
BuildRequires:  pkg-config
%endif
# bug437293
%ifarch ppc64
Obsoletes:      tiff-64bit
%endif
%if 0%{?suse_version} > 1210
BuildRequires:  libjbig-devel
%endif

%description
This package contains the library and support programs for the TIFF
image format.

%package -n libtiff5
Summary:        The Tiff Library (with JPEG and compression support)
Group:          System/Libraries
Provides:       libtiff = %{version}
# bug437293
%ifarch ppc64
Obsoletes:      libtiff-64bit
%endif
#

%description -n libtiff5
This package includes the tiff libraries. To link a program with
libtiff, you will have to add -ljpeg and -lz to include the necessary
libjpeg and libz in the linking process.

%package -n libtiff-devel
Summary:        Development Tools for Programs which will use the libtiff Library
Group:          Development/Libraries/C and C++
Requires:       glibc-devel
Requires:       libstdc++-devel
Requires:       libtiff5 = %{version}
# bug437293
%ifarch ppc64
Obsoletes:      tiff-devel-64bit
%endif
#

%description -n libtiff-devel
This package contains the header files and static libraries for
developing programs which will manipulate TIFF format image files using
the libtiff library.

%prep
%setup -q
%patch0 -p1
%patch1 -p1
%patch2 -p1
%patch3 -p1
%patch4 -p1
%patch5 -p1
%patch6 -p1
%patch7 -p1
%patch8 -p1
%patch9 -p1
%patch10 -p1
%patch11 -p1
%patch12 -p1
%patch13 -p1
%patch14 -p1
%patch15 -p1
%patch16 -p1
%patch17 -p1
%patch18 -p1
%patch19 -p1
%patch20 -p1
%patch21 -p1
%patch22 -p1
%patch23 -p1
%patch24 -p1
%patch25 -p1
%patch26 -p1
%patch27 -p1
%patch28 -p1
%patch29 -p1
%patch30 -p1
%patch31 -p1
%patch32 -p1
%patch33 -p1
%patch34 -p1
%patch35 -p1
%patch36 -p1
%patch37 -p1
%patch38 -p1
%patch39 -p1
%patch40 -p1
%patch41 -p1
%patch42 -p1
%patch43 -p1
%patch44 -p1
%patch45 -p1
%patch46 -p1
%patch47 -p1
%patch48 -p1
%patch49 -p1
%patch50 -p1
%patch51 -p1
%patch52 -p1
%patch53 -p1
%patch54 -p1
%patch55 -p1
%patch56 -p1

%build
CFLAGS="%{optflags} -fPIE"
%if %{debug_build}
CFLAGS="$CFLAGS -O0"
%endif
%configure --disable-static
%if %{asan_build}
find -name Makefile | xargs sed -i 's/\(^CFLAGS.*\)/\1 -fsanitize=address/'
%endif
make %{?_smp_mflags} LDFLAGS="-pie"

%install
mkdir -p %{buildroot}/{%{_mandir}/{man1,man3},usr/{bin,lib,include}}
make DESTDIR=%{buildroot} install %{?_smp_mflags}
for f in `find %{buildroot}/%{_mandir} -type f -print ` ; do
  if [ `wc -l <$f` -eq 1 ] && grep -q "^\.so " $f ; then
    linkto=`sed -e "s|^\.so ||" $f`
    [ -f "`dirname $f`/$linkto" ] && ln -sf "$linkto" $f
  fi
done

cp %{SOURCE2} .
rm -rf %{buildroot}%{_datadir}/doc/tiff*
find %{buildroot} -type f -name "*.la" -delete -print
find html -name "Makefile*" | xargs rm

%check
%if %{asan_build}
# ASAN needs /proc to be mounted
exit 0
%endif
for i in tools test; do
	(cd $i && make %{?_smp_mflags} check)
done

%post -n libtiff5 -p /sbin/ldconfig

%postun -n libtiff5 -p /sbin/ldconfig

%files
%defattr(-,root,root)
%{_bindir}/*
%doc html
%doc README COPYRIGHT VERSION ChangeLog TODO RELEASE-DATE
%{_mandir}/man1/*

%files -n libtiff5
%defattr(-,root,root)
%doc README COPYRIGHT README.SUSE
%{_libdir}/*.so.*

%files -n libtiff-devel
%defattr(-,root,root)
%{_includedir}/*
%{_libdir}/*.so
%{_libdir}/pkgconfig/*.pc
%{_mandir}/man3/*

%changelog
openSUSE Build Service is sponsored by