################################################################################ # # spice # ################################################################################ SPICE_VERSION = 0.15.0 SPICE_SOURCE = spice-$(SPICE_VERSION).tar.bz2 SPICE_SITE = http://www.spice-space.org/download/releases/spice-server SPICE_LICENSE = LGPL-2.1+ SPICE_LICENSE_FILES = COPYING SPICE_CPE_ID_VENDOR = spice_project SPICE_INSTALL_STAGING = YES SPICE_DEPENDENCIES = \ host-pkgconf \ jpeg \ libglib2 \ openssl \ pixman \ spice-protocol # We disable everything for now, because the dependency tree can become # quite deep if we try to enable some features, and I have not tested that. SPICE_CONF_OPTS = \ --disable-gstreamer \ --disable-opengl \ --disable-smartcard \ --without-sasl \ --disable-manual \ --disable-tests SPICE_DEPENDENCIES += host-pkgconf ifeq ($(BR2_PACKAGE_LZ4),y) SPICE_CONF_OPTS += --enable-lz4 SPICE_DEPENDENCIES += lz4 else SPICE_CONF_OPTS += --disable-lz4 endif ifeq ($(BR2_PACKAGE_OPUS),y) SPICE_CONF_OPTS += --enable-opus SPICE_DEPENDENCIES += opus else SPICE_CONF_OPTS += --disable-opus endif # We need to tweak spice.pc because it /forgets/ (for static linking) that # it should link against libz and libjpeg. libz is pkg-config-aware, while # libjpeg isn't, hence the two-line tweak define SPICE_POST_INSTALL_STAGING_FIX_PC $(SED) 's/^\(Requires.private:.*\)$$/\1 zlib/; s/^\(Libs.private:.*\)$$/\1 -ljpeg/;' \ "$(STAGING_DIR)/usr/lib/pkgconfig/spice-server.pc" endef SPICE_POST_INSTALL_STAGING_HOOKS += SPICE_POST_INSTALL_STAGING_FIX_PC # It is currently not possible to detect if stack-protection is available # or not, because it requires support from both the compiler *and* the # C library, but the C library (eg. uClibc) can be compiled without that # support, even if gcc accepts the -fstack-protector-all option. # spice's ./configure only checks for gcc's -fstack-protector-all option, # so it misses the case where the C library doe not provide the requires # support. # A correct fix would be to fix spice's ./configure to also check the C # library, but it might be much more involved. # So, we simply disable it for now. After all, as uClibc's help puts it: # Note that NOEXECSTACK on a kernel with address space randomization # is generally sufficient to prevent most buffer overflow exploits # without increasing code size. SPICE_CONF_OPTS += gl_cv_warn__fstack_protector_all=no $(eval $(autotools-package))