From: Peter Marko Date: Sat, 18 May 2024 21:29:53 +0000 (+0200) Subject: ncurses: switch to new mirror X-Git-Tag: uninative-4.6~546 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=ea801be31d051b558fde52f7d6dccf2cd416afb9;p=thirdparty%2Fopenembedded%2Fopenembedded-core.git ncurses: switch to new mirror github.com/mirror/ncurses is not updated for over a year. Switch to new mirror from Thomas Dickey (ncurses maintainer). Sources are identical. Updated upstream check regex by: * changed dot to underscore as this repo is tagged like this * added v prefix to not propose updates to some old tags * removed third part to not propose updates to development snapshots Signed-off-by: Peter Marko Signed-off-by: Richard Purdie --- diff --git a/meta/recipes-core/ncurses/ncurses.inc b/meta/recipes-core/ncurses/ncurses.inc index 761b6a3d312..3b72f3efdd6 100644 --- a/meta/recipes-core/ncurses/ncurses.inc +++ b/meta/recipes-core/ncurses/ncurses.inc @@ -13,7 +13,7 @@ BINCONFIG = "${bindir}/ncurses5-config ${bindir}/ncursesw5-config \ inherit autotools binconfig-disabled multilib_header pkgconfig # Upstream has useful patches at times at ftp://invisible-island.net/ncurses/ -SRC_URI = "git://github.com/mirror/ncurses.git;protocol=https;branch=master" +SRC_URI = "git://github.com/ThomasDickey/ncurses-snapshots.git;protocol=https;branch=master" EXTRA_AUTORECONF = "-I m4" diff --git a/meta/recipes-core/ncurses/ncurses_6.4.bb b/meta/recipes-core/ncurses/ncurses_6.4.bb index 97130c06d6f..61558ecfa8c 100644 --- a/meta/recipes-core/ncurses/ncurses_6.4.bb +++ b/meta/recipes-core/ncurses/ncurses_6.4.bb @@ -10,10 +10,10 @@ SRC_URI += "file://0001-tic-hang.patch \ file://CVE-2023-45918.patch \ " # commit id corresponds to the revision in package version -SRCREV = "79b9071f2be20a24c7be031655a5638f6032f29f" +SRCREV = "1003914e200fd622a27237abca155ce6bf2e6030" S = "${WORKDIR}/git" EXTRA_OECONF += "--with-abi-version=5" -UPSTREAM_CHECK_GITTAGREGEX = "(?P\d+(\.\d+)+)$" +UPSTREAM_CHECK_GITTAGREGEX = "v(?P\d+_\d+)$" # This is needed when using patchlevel versions like 6.1+20181013 #CVE_VERSION = "${@d.getVar("PV").split('+')[0]}.${@d.getVar("PV").split('+')[1]}"