commit:     7a4f70f92522b2950fdd4a1fc18cb258e9f4af4c
Author:     Sam James <sam <AT> gentoo <DOT> org>
AuthorDate: Mon Sep 15 21:35:58 2025 +0000
Commit:     Sam James <sam <AT> gentoo <DOT> org>
CommitDate: Mon Sep 15 21:35:58 2025 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=7a4f70f9

dev-libs/libxml2: drop 2.13.8-r2

Bug: https://bugs.gentoo.org/962684
Signed-off-by: Sam James <sam <AT> gentoo.org>

 dev-libs/libxml2/Manifest                          |   1 -
 ...xml2-2.13.8-CVE-2025-49794-CVE-2025-49796.patch | 182 -------------------
 .../files/libxml2-2.13.8-CVE-2025-49795.patch      |  69 --------
 .../files/libxml2-2.13.8-CVE-2025-6021.patch       |  53 ------
 .../files/libxml2-2.13.8-CVE-2025-6170.patch       | 102 -----------
 dev-libs/libxml2/libxml2-2.13.8-r2.ebuild          | 195 ---------------------
 6 files changed, 602 deletions(-)

diff --git a/dev-libs/libxml2/Manifest b/dev-libs/libxml2/Manifest
index 76d1d85feb16..9ac5bab41fa3 100644
--- a/dev-libs/libxml2/Manifest
+++ b/dev-libs/libxml2/Manifest
@@ -1,4 +1,3 @@
-DIST libxml2-2.13.8.tar.xz 2423128 BLAKE2B 
9abe12acb2b619f8649dc4472c39d4c59074a83538bf1a534163737bf9e99e6387fec53404392c325102da1e77f53606f2679c47b7136d7f7541a8fcc6bcd995
 SHA512 
668e556404693f17e074bc31e2caa5e50bf003ee3cd81b61a51ea25e76efd7eff7ec70ff603eed87b9d9e9b2299673e6e8871798264113e660e703b74b58458f
 DIST libxml2-2.13.9.tar.xz 2426164 BLAKE2B 
b14cb6953983ee83b5de39b8d80f623edae6198541e996fbda3c88ea7c3f5b354f8e064b378231bd60e88e0ea143f44be860252007eaafd7290f6f781fc6e8aa
 SHA512 
62d4813860124c969f204aaf33b497105dbc32a6c5655f5a86168743660e10987d687d7e5e7ee49fdfdeb8f6ad9fa4503f81fcce2e4d459094895f02436d1b13
 DIST libxml2-2.14.6.tar.xz 2327580 BLAKE2B 
ad5d7cb64f8081559a671e9d79b3ebcd7313dada39d7f0c2854994153a9dff2ef85bc81336437f5881abe637bae51b62e9104b3a099113f4ee2252b604325291
 SHA512 
9a62230487255af7cdaf135cc8a0978dc82ff2ee8826f6b21cc8b39c8e0a6b9efeea1c12e6cb7ae3f869730fb4ed628158e2848dd512558fc5bf177c56862774
 DIST xmlts20130923.tar.gz 641522 BLAKE2B 
63a47bc69278ef510cd0b3779aed729e1b309e30efa0015d28ed051cc03f9dfddb447ab57b07b3393e8f47393d15473b0e199c34cb1f5f746b15ddfaa55670be
 SHA512 
d5c4d26b324ed21f4e0641cd7f8b76dbf9de80df8b519982e44d41c960df29fd03618e02e9693b2d11ad06d19c4a965274c95a048ec3b9653eacb919a7f8b733

diff --git 
a/dev-libs/libxml2/files/libxml2-2.13.8-CVE-2025-49794-CVE-2025-49796.patch 
b/dev-libs/libxml2/files/libxml2-2.13.8-CVE-2025-49794-CVE-2025-49796.patch
deleted file mode 100644
index bb8d7c1175a8..000000000000
--- a/dev-libs/libxml2/files/libxml2-2.13.8-CVE-2025-49794-CVE-2025-49796.patch
+++ /dev/null
@@ -1,182 +0,0 @@
-From 81cef8c5b5aec2acdf5707e57a6db0c8d1d0abca Mon Sep 17 00:00:00 2001
-From: Nick Wellnhofer <[email protected]>
-Date: Fri, 4 Jul 2025 14:28:26 +0200
-Subject: [PATCH] [CVE-2025-49794] [CVE-2025-49796] schematron: Fix
- xmlSchematronReportOutput
-
-Fix use-after-free (CVE-2025-49794) and type confusion (CVE-2025-49796)
-in xmlSchematronReportOutput.
-
-Fixes #931.
-Fixes #933.
----
- result/schematron/cve-2025-49794_0.err |  2 ++
- result/schematron/cve-2025-49796_0.err |  2 ++
- schematron.c                           | 49 ++++++++++++++------------
- test/schematron/cve-2025-49794.sct     | 10 ++++++
- test/schematron/cve-2025-49794_0.xml   |  6 ++++
- test/schematron/cve-2025-49796.sct     |  9 +++++
- test/schematron/cve-2025-49796_0.xml   |  3 ++
- 7 files changed, 58 insertions(+), 23 deletions(-)
- create mode 100644 result/schematron/cve-2025-49794_0.err
- create mode 100644 result/schematron/cve-2025-49796_0.err
- create mode 100644 test/schematron/cve-2025-49794.sct
- create mode 100644 test/schematron/cve-2025-49794_0.xml
- create mode 100644 test/schematron/cve-2025-49796.sct
- create mode 100644 test/schematron/cve-2025-49796_0.xml
-
-diff --git a/result/schematron/cve-2025-49794_0.err 
b/result/schematron/cve-2025-49794_0.err
-new file mode 100644
-index 00000000..57752310
---- /dev/null
-+++ b/result/schematron/cve-2025-49794_0.err
-@@ -0,0 +1,2 @@
-+./test/schematron/cve-2025-49794_0.xml:2: element boo0: schematron error : 
/librar0/boo0 line 2:  
-+./test/schematron/cve-2025-49794_0.xml fails to validate
-diff --git a/result/schematron/cve-2025-49796_0.err 
b/result/schematron/cve-2025-49796_0.err
-new file mode 100644
-index 00000000..bf875ee0
---- /dev/null
-+++ b/result/schematron/cve-2025-49796_0.err
-@@ -0,0 +1,2 @@
-+./test/schematron/cve-2025-49796_0.xml:2: element boo0: schematron error : 
/librar0/boo0 line 2:  
-+./test/schematron/cve-2025-49796_0.xml fails to validate
-diff --git a/schematron.c b/schematron.c
-index da603402..6e2ceeb7 100644
---- a/schematron.c
-+++ b/schematron.c
-@@ -1414,27 +1414,15 @@ exit:
-  *                                                                      *
-  ************************************************************************/
- 
--static xmlNodePtr
-+static xmlXPathObjectPtr
- xmlSchematronGetNode(xmlSchematronValidCtxtPtr ctxt,
-                      xmlNodePtr cur, const xmlChar *xpath) {
--    xmlNodePtr node = NULL;
--    xmlXPathObjectPtr ret;
--
-     if ((ctxt == NULL) || (cur == NULL) || (xpath == NULL))
-         return(NULL);
- 
-     ctxt->xctxt->doc = cur->doc;
-     ctxt->xctxt->node = cur;
--    ret = xmlXPathEval(xpath, ctxt->xctxt);
--    if (ret == NULL)
--        return(NULL);
--
--    if ((ret->type == XPATH_NODESET) &&
--        (ret->nodesetval != NULL) && (ret->nodesetval->nodeNr > 0))
--        node = ret->nodesetval->nodeTab[0];
--
--    xmlXPathFreeObject(ret);
--    return(node);
-+    return(xmlXPathEval(xpath, ctxt->xctxt));
- }
- 
- /**
-@@ -1480,25 +1468,40 @@ xmlSchematronFormatReport(xmlSchematronValidCtxtPtr 
ctxt,
-             (child->type == XML_CDATA_SECTION_NODE))
-             ret = xmlStrcat(ret, child->content);
-         else if (IS_SCHEMATRON(child, "name")) {
-+            xmlXPathObject *obj = NULL;
-             xmlChar *path;
- 
-             path = xmlGetNoNsProp(child, BAD_CAST "path");
- 
-             node = cur;
-             if (path != NULL) {
--                node = xmlSchematronGetNode(ctxt, cur, path);
--                if (node == NULL)
--                    node = cur;
-+                obj = xmlSchematronGetNode(ctxt, cur, path);
-+                if ((obj != NULL) &&
-+                    (obj->type == XPATH_NODESET) &&
-+                    (obj->nodesetval != NULL) &&
-+                    (obj->nodesetval->nodeNr > 0))
-+                    node = obj->nodesetval->nodeTab[0];
-                 xmlFree(path);
-             }
- 
--            if ((node->ns == NULL) || (node->ns->prefix == NULL))
--                ret = xmlStrcat(ret, node->name);
--            else {
--                ret = xmlStrcat(ret, node->ns->prefix);
--                ret = xmlStrcat(ret, BAD_CAST ":");
--                ret = xmlStrcat(ret, node->name);
-+            switch (node->type) {
-+                case XML_ELEMENT_NODE:
-+                case XML_ATTRIBUTE_NODE:
-+                    if ((node->ns == NULL) || (node->ns->prefix == NULL))
-+                        ret = xmlStrcat(ret, node->name);
-+                    else {
-+                        ret = xmlStrcat(ret, node->ns->prefix);
-+                        ret = xmlStrcat(ret, BAD_CAST ":");
-+                        ret = xmlStrcat(ret, node->name);
-+                    }
-+                    break;
-+
-+                /* TODO: handle other node types */
-+                default:
-+                    break;
-             }
-+
-+            xmlXPathFreeObject(obj);
-         } else if (IS_SCHEMATRON(child, "value-of")) {
-             xmlChar *select;
-             xmlXPathObjectPtr eval;
-diff --git a/test/schematron/cve-2025-49794.sct 
b/test/schematron/cve-2025-49794.sct
-new file mode 100644
-index 00000000..7fc9ee3d
---- /dev/null
-+++ b/test/schematron/cve-2025-49794.sct
-@@ -0,0 +1,10 @@
-+<sch:schema xmlns:sch="http://purl.oclc.org/dsdl/schematron";>
-+    <sch:pattern id="">
-+        <sch:rule context="boo0">
-+            <sch:report test="not(0)">
-+                <sch:name path="&#9;e|namespace::*|e"/>
-+            </sch:report>
-+            <sch:report test="0"></sch:report>
-+        </sch:rule>
-+    </sch:pattern>
-+</sch:schema>
-diff --git a/test/schematron/cve-2025-49794_0.xml 
b/test/schematron/cve-2025-49794_0.xml
-new file mode 100644
-index 00000000..debc64ba
---- /dev/null
-+++ b/test/schematron/cve-2025-49794_0.xml
-@@ -0,0 +1,6 @@
-+<librar0>
-+    <boo0 t="">
-+        <author></author>
-+    </boo0>
-+    <ins></ins>
-+</librar0>
-diff --git a/test/schematron/cve-2025-49796.sct 
b/test/schematron/cve-2025-49796.sct
-new file mode 100644
-index 00000000..e9702d75
---- /dev/null
-+++ b/test/schematron/cve-2025-49796.sct
-@@ -0,0 +1,9 @@
-+<sch:schema xmlns:sch="http://purl.oclc.org/dsdl/schematron";>
-+    <sch:pattern id="">
-+        <sch:rule context="boo0">
-+            <sch:report test="not(0)">
-+                <sch:name path="/"/>
-+            </sch:report>
-+        </sch:rule>
-+    </sch:pattern>
-+</sch:schema>
-diff --git a/test/schematron/cve-2025-49796_0.xml 
b/test/schematron/cve-2025-49796_0.xml
-new file mode 100644
-index 00000000..be33c4ec
---- /dev/null
-+++ b/test/schematron/cve-2025-49796_0.xml
-@@ -0,0 +1,3 @@
-+<librar0>
-+    <boo0/>
-+</librar0>
--- 
-2.49.1
-

diff --git a/dev-libs/libxml2/files/libxml2-2.13.8-CVE-2025-49795.patch 
b/dev-libs/libxml2/files/libxml2-2.13.8-CVE-2025-49795.patch
deleted file mode 100644
index bc8497805377..000000000000
--- a/dev-libs/libxml2/files/libxml2-2.13.8-CVE-2025-49795.patch
+++ /dev/null
@@ -1,69 +0,0 @@
-From 62048278a4c5fdf14d287dfb400005c0a0caa69f Mon Sep 17 00:00:00 2001
-From: Michael Mann <[email protected]>
-Date: Sat, 21 Jun 2025 12:11:30 -0400
-Subject: [PATCH] [CVE-2025-49795] schematron: Fix null pointer dereference
- leading to DoS
-
-Fixes #932
----
- result/schematron/zvon16_0.err | 3 +++
- schematron.c                   | 5 +++++
- test/schematron/zvon16.sct     | 7 +++++++
- test/schematron/zvon16_0.xml   | 5 +++++
- 4 files changed, 20 insertions(+)
- create mode 100644 result/schematron/zvon16_0.err
- create mode 100644 test/schematron/zvon16.sct
- create mode 100644 test/schematron/zvon16_0.xml
-
-diff --git a/result/schematron/zvon16_0.err b/result/schematron/zvon16_0.err
-new file mode 100644
-index 00000000..3d052409
---- /dev/null
-+++ b/result/schematron/zvon16_0.err
-@@ -0,0 +1,3 @@
-+XPath error : Unregistered function
-+./test/schematron/zvon16_0.xml:2: element book: schematron error : 
/library/book line 2: Book 
-+./test/schematron/zvon16_0.xml fails to validate
-diff --git a/schematron.c b/schematron.c
-index 1de25deb..da603402 100644
---- a/schematron.c
-+++ b/schematron.c
-@@ -1506,6 +1506,11 @@ xmlSchematronFormatReport(xmlSchematronValidCtxtPtr 
ctxt,
-             select = xmlGetNoNsProp(child, BAD_CAST "select");
-             comp = xmlXPathCtxtCompile(ctxt->xctxt, select);
-             eval = xmlXPathCompiledEval(comp, ctxt->xctxt);
-+            if (eval == NULL) {
-+                xmlXPathFreeCompExpr(comp);
-+                xmlFree(select);
-+                return ret;
-+            }
- 
-             switch (eval->type) {
-             case XPATH_NODESET: {
-diff --git a/test/schematron/zvon16.sct b/test/schematron/zvon16.sct
-new file mode 100644
-index 00000000..f03848aa
---- /dev/null
-+++ b/test/schematron/zvon16.sct
-@@ -0,0 +1,7 @@
-+<sch:schema xmlns:sch="http://purl.oclc.org/dsdl/schematron";>
-+      <sch:pattern id="TestPattern">
-+              <sch:rule context="book">
-+                      <sch:report test="not(@available)">Book <sch:value-of 
select="falae()"/> test</sch:report>
-+              </sch:rule>
-+      </sch:pattern>
-+</sch:schema>
-diff --git a/test/schematron/zvon16_0.xml b/test/schematron/zvon16_0.xml
-new file mode 100644
-index 00000000..551e2d65
---- /dev/null
-+++ b/test/schematron/zvon16_0.xml
-@@ -0,0 +1,5 @@
-+<library>
-+      <book title="Test Book" id="bk101">
-+              <author>Test Author</author>
-+      </book>
-+</library>
--- 
-2.49.1
-

diff --git a/dev-libs/libxml2/files/libxml2-2.13.8-CVE-2025-6021.patch 
b/dev-libs/libxml2/files/libxml2-2.13.8-CVE-2025-6021.patch
deleted file mode 100644
index 215519a0a65f..000000000000
--- a/dev-libs/libxml2/files/libxml2-2.13.8-CVE-2025-6021.patch
+++ /dev/null
@@ -1,53 +0,0 @@
-From 17d950ae33c23f87692aa179bacedb6743f3188a Mon Sep 17 00:00:00 2001
-From: Nick Wellnhofer <[email protected]>
-Date: Tue, 27 May 2025 12:53:17 +0200
-Subject: [PATCH] [CVE-2025-6021] tree: Fix integer overflow in xmlBuildQName
-
-Fixes #926.
----
- tree.c | 12 +++++++++---
- 1 file changed, 9 insertions(+), 3 deletions(-)
-
-diff --git a/tree.c b/tree.c
-index f097cf87..5bc95b8a 100644
---- a/tree.c
-+++ b/tree.c
-@@ -47,6 +47,10 @@
- #include "private/error.h"
- #include "private/tree.h"
- 
-+#ifndef SIZE_MAX
-+  #define SIZE_MAX ((size_t)-1)
-+#endif
-+
- int __xmlRegisterCallbacks = 0;
- 
- /************************************************************************
-@@ -167,10 +171,10 @@ xmlGetParameterEntityFromDtd(const xmlDtd *dtd, const 
xmlChar *name) {
- xmlChar *
- xmlBuildQName(const xmlChar *ncname, const xmlChar *prefix,
-             xmlChar *memory, int len) {
--    int lenn, lenp;
-+    size_t lenn, lenp;
-     xmlChar *ret;
- 
--    if (ncname == NULL) return(NULL);
-+    if ((ncname == NULL) || (len < 0)) return(NULL);
-     if (prefix == NULL) return((xmlChar *) ncname);
- 
- #ifdef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
-@@ -181,8 +185,10 @@ xmlBuildQName(const xmlChar *ncname, const xmlChar 
*prefix,
- 
-     lenn = strlen((char *) ncname);
-     lenp = strlen((char *) prefix);
-+    if (lenn >= SIZE_MAX - lenp - 1)
-+        return(NULL);
- 
--    if ((memory == NULL) || (len < lenn + lenp + 2)) {
-+    if ((memory == NULL) || ((size_t) len < lenn + lenp + 2)) {
-       ret = (xmlChar *) xmlMallocAtomic(lenn + lenp + 2);
-       if (ret == NULL)
-           return(NULL);
--- 
-2.49.1
-

diff --git a/dev-libs/libxml2/files/libxml2-2.13.8-CVE-2025-6170.patch 
b/dev-libs/libxml2/files/libxml2-2.13.8-CVE-2025-6170.patch
deleted file mode 100644
index df01188e03ab..000000000000
--- a/dev-libs/libxml2/files/libxml2-2.13.8-CVE-2025-6170.patch
+++ /dev/null
@@ -1,102 +0,0 @@
-From 5e9ec5c107d3f5b5179c3dbc19df43df041cd55b Mon Sep 17 00:00:00 2001
-From: Michael Mann <[email protected]>
-Date: Fri, 20 Jun 2025 23:05:00 -0400
-Subject: [PATCH] [CVE-2025-6170] Fix potential buffer overflows of interactive
- shell
-
-Fixes #941
----
- debugXML.c                       | 15 ++++++++++-----
- result/scripts/long_command      |  8 ++++++++
- test/scripts/long_command.script |  6 ++++++
- test/scripts/long_command.xml    |  1 +
- 4 files changed, 25 insertions(+), 5 deletions(-)
- create mode 100644 result/scripts/long_command
- create mode 100644 test/scripts/long_command.script
- create mode 100644 test/scripts/long_command.xml
-
-diff --git a/debugXML.c b/debugXML.c
-index ed56b0f8..452b9573 100644
---- a/debugXML.c
-+++ b/debugXML.c
-@@ -1033,6 +1033,10 @@ xmlCtxtDumpOneNode(xmlDebugCtxtPtr ctxt, xmlNodePtr 
node)
-     xmlCtxtGenericNodeCheck(ctxt, node);
- }
- 
-+#define MAX_PROMPT_SIZE     500
-+#define MAX_ARG_SIZE        400
-+#define MAX_COMMAND_SIZE    100
-+
- /**
-  * xmlCtxtDumpNode:
-  * @output:  the FILE * for the output
-@@ -2795,10 +2799,10 @@ void
- xmlShell(xmlDocPtr doc, const char *filename, xmlShellReadlineFunc input,
-          FILE * output)
- {
--    char prompt[500] = "/ > ";
-+    char prompt[MAX_PROMPT_SIZE] = "/ > ";
-     char *cmdline = NULL, *cur;
--    char command[100];
--    char arg[400];
-+    char command[MAX_COMMAND_SIZE];
-+    char arg[MAX_ARG_SIZE];
-     int i;
-     xmlShellCtxtPtr ctxt;
-     xmlXPathObjectPtr list;
-@@ -2856,7 +2860,8 @@ xmlShell(xmlDocPtr doc, const char *filename, 
xmlShellReadlineFunc input,
-             cur++;
-         i = 0;
-         while ((*cur != ' ') && (*cur != '\t') &&
--               (*cur != '\n') && (*cur != '\r')) {
-+               (*cur != '\n') && (*cur != '\r') &&
-+               (i < (MAX_COMMAND_SIZE - 1))) {
-             if (*cur == 0)
-                 break;
-             command[i++] = *cur++;
-@@ -2871,7 +2876,7 @@ xmlShell(xmlDocPtr doc, const char *filename, 
xmlShellReadlineFunc input,
-         while ((*cur == ' ') || (*cur == '\t'))
-             cur++;
-         i = 0;
--        while ((*cur != '\n') && (*cur != '\r') && (*cur != 0)) {
-+        while ((*cur != '\n') && (*cur != '\r') && (*cur != 0) && (i < 
(MAX_ARG_SIZE-1))) {
-             if (*cur == 0)
-                 break;
-             arg[i++] = *cur++;
-diff --git a/result/scripts/long_command b/result/scripts/long_command
-new file mode 100644
-index 00000000..e6f00708
---- /dev/null
-+++ b/result/scripts/long_command
-@@ -0,0 +1,8 @@
-+/ > b > b > Object is a Node Set :
-+Set contains 1 nodes:
-+1  ELEMENT a:c
-+b > Unknown command 
This_is_a_really_long_command_string_designed_to_test_the_limits_of_the_memory_that_stores_the_comm
-+b > b > Unknown command ess_currents_of_time_and_existence
-+b > <?xml version="1.0"?>
-+<a xmlns:a="bar"><b 
xmlns:a="foo">Navigating_the_labyrinthine_corridors_of_human_cognition_one_often_encounters_the_perplexing_paradox_that_the_more_we_delve_into_the_intricate_dance_of_neural_pathways_and_synaptic_firings_the_further_we_seem_to_stray_from_a_truly_holistic_understanding_of_consciousness_a_phenomenon_that_remains_as_elusive_as_a_moonbeam_caught_in_a_spiderweb_yet_undeniably_shapes_every_fleeting_thought_every_prof</b></a>
-+b > 
-\ No newline at end of file
-diff --git a/test/scripts/long_command.script 
b/test/scripts/long_command.script
-new file mode 100644
-index 00000000..00f6df09
---- /dev/null
-+++ b/test/scripts/long_command.script
-@@ -0,0 +1,6 @@
-+cd a/b
-+set <a:c/>
-+xpath //*[namespace-uri()="foo"]
-+This_is_a_really_long_command_string_designed_to_test_the_limits_of_the_memory_that_stores_the_command_please_dont_crash
 foo
-+set 
Navigating_the_labyrinthine_corridors_of_human_cognition_one_often_encounters_the_perplexing_paradox_that_the_more_we_delve_into_the_intricate_dance_of_neural_pathways_and_synaptic_firings_the_further_we_seem_to_stray_from_a_truly_holistic_understanding_of_consciousness_a_phenomenon_that_remains_as_elusive_as_a_moonbeam_caught_in_a_spiderweb_yet_undeniably_shapes_every_fleeting_thought_every_profound_emotion_and_every_grand_aspiration_that_propels_our_species_ever_onward_through_the_relentless_currents_of_time_and_existence
-+save -
-diff --git a/test/scripts/long_command.xml b/test/scripts/long_command.xml
-new file mode 100644
-index 00000000..1ba44016
---- /dev/null
-+++ b/test/scripts/long_command.xml
-@@ -0,0 +1 @@
-+<a xmlns:a="bar"><b xmlns:a="foo"/></a>
--- 
-2.49.1
-

diff --git a/dev-libs/libxml2/libxml2-2.13.8-r2.ebuild 
b/dev-libs/libxml2/libxml2-2.13.8-r2.ebuild
deleted file mode 100644
index bd58bcf0ee41..000000000000
--- a/dev-libs/libxml2/libxml2-2.13.8-r2.ebuild
+++ /dev/null
@@ -1,195 +0,0 @@
-# Copyright 1999-2025 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=8
-
-# Note: Please bump in sync with dev-libs/libxslt
-
-PYTHON_COMPAT=( python3_{11..14} )
-PYTHON_REQ_USE="xml(+)"
-inherit autotools python-r1 multilib-minimal
-
-XSTS_HOME="https://www.w3.org/XML/2004/xml-schema-test-suite";
-XSTS_NAME_1="xmlschema2002-01-16"
-XSTS_NAME_2="xmlschema2004-01-14"
-XSTS_TARBALL_1="xsts-2002-01-16.tar.gz"
-XSTS_TARBALL_2="xsts-2004-01-14.tar.gz"
-XMLCONF_TARBALL="xmlts20130923.tar.gz"
-
-DESCRIPTION="XML C parser and toolkit"
-HOMEPAGE="https://gitlab.gnome.org/GNOME/libxml2/-/wikis/home";
-if [[ ${PV} == 9999 ]] ; then
-       EGIT_REPO_URI="https://gitlab.gnome.org/GNOME/libxml2";
-       inherit git-r3
-else
-       inherit gnome.org
-       KEYWORDS="~alpha amd64 arm arm64 ~hppa ~loong ~m68k ~mips ppc ppc64 
~riscv ~s390 ~sparc x86 ~amd64-linux ~x86-linux ~arm64-macos ~ppc-macos 
~x64-macos ~x64-solaris"
-fi
-
-SRC_URI+="
-       test? (
-               ${XSTS_HOME}/${XSTS_NAME_1}/${XSTS_TARBALL_1}
-               ${XSTS_HOME}/${XSTS_NAME_2}/${XSTS_TARBALL_2}
-               https://www.w3.org/XML/Test/${XMLCONF_TARBALL}
-       )
-"
-S="${WORKDIR}/${PN}-${PV%_rc*}"
-
-LICENSE="MIT"
-SLOT="2"
-IUSE="examples icu lzma +python readline static-libs test"
-RESTRICT="!test? ( test )"
-REQUIRED_USE="python? ( ${PYTHON_REQUIRED_USE} )"
-
-RDEPEND="
-       virtual/libiconv
-       >=sys-libs/zlib-1.2.8-r1:=[${MULTILIB_USEDEP}]
-       icu? ( >=dev-libs/icu-51.2-r1:=[${MULTILIB_USEDEP}] )
-       lzma? ( >=app-arch/xz-utils-5.0.5-r1:=[${MULTILIB_USEDEP}] )
-       python? ( ${PYTHON_DEPS} )
-       readline? ( sys-libs/readline:= )
-"
-DEPEND="${RDEPEND}"
-BDEPEND="virtual/pkgconfig"
-
-if [[ ${PV} == 9999 ]] ; then
-       BDEPEND+=" dev-build/gtk-doc-am"
-fi
-
-MULTILIB_CHOST_TOOLS=(
-       /usr/bin/xml2-config
-)
-
-PATCHES=(
-       "${FILESDIR}"/${PN}-2.12.9-icu-pkgconfig.patch
-       "${FILESDIR}"/${PN}-2.13.8-CVE-2025-49794-CVE-2025-49796.patch
-       "${FILESDIR}"/${PN}-2.13.8-CVE-2025-49795.patch
-       "${FILESDIR}"/${PN}-2.13.8-CVE-2025-6021.patch
-       "${FILESDIR}"/${PN}-2.13.8-CVE-2025-6170.patch
-
-)
-
-src_unpack() {
-       if [[ ${PV} == 9999 ]] ; then
-               git-r3_src_unpack
-       else
-               local tarname=${P/_rc/-rc}.tar.xz
-
-               # ${A} isn't used to avoid unpacking of test tarballs into 
${WORKDIR},
-               # as they are needed as tarballs in ${S}/xstc instead and not 
unpacked
-               unpack ${tarname}
-
-               if [[ -n ${PATCHSET_VERSION} ]] ; then
-                       unpack ${PN}-${PATCHSET_VERSION}.tar.xz
-               fi
-       fi
-
-       cd "${S}" || die
-
-       if use test ; then
-               cp "${DISTDIR}/${XSTS_TARBALL_1}" \
-                       "${DISTDIR}/${XSTS_TARBALL_2}" \
-                       "${S}"/xstc/ \
-                       || die "Failed to install test tarballs"
-               unpack ${XMLCONF_TARBALL}
-       fi
-}
-
-src_prepare() {
-       default
-
-       # Please do not remove, as else we get references to PORTAGE_TMPDIR
-       # in /usr/lib/python?.?/site-packages/libxml2mod.la among things.
-       #elibtoolize
-
-       eautoreconf
-}
-
-multilib_src_configure() {
-       libxml2_configure() {
-               ECONF_SOURCE="${S}" econf \
-                       $(use_with icu) \
-                       $(use_with lzma) \
-                       $(use_enable static-libs static) \
-                       $(multilib_native_use_with readline) \
-                       $(multilib_native_use_with readline history) \
-                       --with-legacy \
-                       "$@"
-       }
-
-       # Build python bindings separately
-       libxml2_configure --without-python
-
-       multilib_is_native_abi && use python &&
-               python_foreach_impl run_in_build_dir libxml2_configure 
--with-python
-}
-
-libxml2_py_emake() {
-       pushd "${BUILD_DIR}"/python >/dev/null || die
-
-       emake top_builddir="${NATIVE_BUILD_DIR}" "$@"
-
-       popd >/dev/null || die
-}
-
-multilib_src_compile() {
-       default
-
-       if multilib_is_native_abi && use python ; then
-               NATIVE_BUILD_DIR="${BUILD_DIR}"
-               python_foreach_impl run_in_build_dir libxml2_py_emake all
-       fi
-}
-
-multilib_src_test() {
-       ln -s "${S}"/xmlconf || die
-
-       emake check
-
-       multilib_is_native_abi && use python &&
-               python_foreach_impl run_in_build_dir libxml2_py_emake check
-}
-
-multilib_src_install() {
-       emake DESTDIR="${D}" install
-
-       multilib_is_native_abi && use python &&
-               python_foreach_impl run_in_build_dir libxml2_py_emake 
DESTDIR="${D}" install
-
-       # Hack until automake release is made for the optimise fix
-       # 
https://git.savannah.gnu.org/cgit/automake.git/commit/?id=bde43d0481ff540418271ac37012a574a4fcf097
-       multilib_is_native_abi && use python && python_foreach_impl 
python_optimize
-}
-
-multilib_src_install_all() {
-       einstalldocs
-
-       if ! use examples ; then
-               rm -rf "${ED}"/usr/share/doc/${PF}/examples || die
-               rm -rf "${ED}"/usr/share/doc/${PF}/python/examples || die
-       fi
-
-       rm -rf "${ED}"/usr/share/doc/${PN}-python-${PVR} || die
-
-       find "${ED}" -name '*.la' -delete || die
-}
-
-pkg_postinst() {
-       # We don't want to do the xmlcatalog during stage1, as xmlcatalog will 
not
-       # be in / and stage1 builds to ROOT=/tmp/stage1root. This fixes bug 
#208887.
-       if [[ -n "${ROOT}" ]]; then
-               elog "Skipping XML catalog creation for stage building (bug 
#208887)."
-       else
-               # Need an XML catalog, so no-one writes to a non-existent one
-               CATALOG="${EROOT}/etc/xml/catalog"
-
-               # We don't want to clobber an existing catalog though,
-               # only ensure that one is there
-               # <[email protected]>
-               if [[ ! -e "${CATALOG}" ]]; then
-                       [[ -d "${EROOT}/etc/xml" ]] || mkdir -p 
"${EROOT}/etc/xml"
-                       "${EPREFIX}"/usr/bin/xmlcatalog --create > "${CATALOG}"
-                       einfo "Created XML catalog in ${CATALOG}"
-               fi
-       fi
-}

Reply via email to