hello world

This commit is contained in:
Timothee 'TTimo' Besset
2011-11-22 15:28:15 -06:00
commit fb1609f554
2155 changed files with 1017022 additions and 0 deletions

View File

@@ -0,0 +1 @@
2

View File

@@ -0,0 +1,224 @@
/*-
* Copyright (c) 1996 Søren Schmidt
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer
* in this position and unchanged.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. The name of the author may not be used to endorse or promote products
* derived from this software withough specific prior written permission
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*
* $FreeBSD: src/usr.bin/brandelf/brandelf.c,v 1.16 2000/07/02 03:34:08 imp Exp $
*/
#include <elf.h>
#include <fcntl.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <sys/errno.h>
#include <err.h>
/* These are defined on FreeBSD, but not on Linux */
#ifndef ELFOSABI_SYSV
#define ELFOSABI_SYSV 0
#endif
#ifndef ELFOSABI_LINUX
#define ELFOSABI_LINUX 3
#endif
#ifndef ELFOSABI_HURD
#define ELFOSABI_HURD 4
#endif
#ifndef ELFOSABI_SOLARIS
#define ELFOSABI_SOLARIS 6
#endif
#ifndef ELFOSABI_FREEBSD
#define ELFOSABI_FREEBSD 9
#endif
static int elftype(const char *);
static const char *iselftype(int);
static void printelftypes(void);
static void usage __P((void));
struct ELFtypes {
const char *str;
int value;
};
/* XXX - any more types? */
static struct ELFtypes elftypes[] = {
{ "FreeBSD", ELFOSABI_FREEBSD },
{ "Linux", ELFOSABI_LINUX },
{ "Solaris", ELFOSABI_SOLARIS },
{ "SVR4", ELFOSABI_SYSV }
};
int
main(int argc, char **argv)
{
const char *strtype = "FreeBSD";
int type = ELFOSABI_FREEBSD;
int retval = 0;
int ch, change = 0, verbose = 0, force = 0, listed = 0;
while ((ch = getopt(argc, argv, "f:lt:v")) != -1)
switch (ch) {
case 'f':
if (change)
errx(1, "f option incompatable with t option");
force = 1;
type = atoi(optarg);
if (errno == ERANGE || type < 0 || type > 255) {
warnx("invalid argument to option f: %s",
optarg);
usage();
}
break;
case 'l':
printelftypes();
listed = 1;
break;
case 'v':
verbose = 1;
break;
case 't':
if (force)
errx(1, "t option incompatable with f option");
change = 1;
strtype = optarg;
break;
default:
usage();
}
argc -= optind;
argv += optind;
if (!argc) {
if (listed)
exit(0);
else {
warnx("no file(s) specified");
usage();
}
}
if (!force && (type = elftype(strtype)) == -1) {
warnx("invalid ELF type '%s'", strtype);
printelftypes();
usage();
}
while (argc) {
int fd;
char buffer[EI_NIDENT];
if ((fd = open(argv[0], change || force ? O_RDWR : O_RDONLY, 0)) < 0) {
warn("error opening file %s", argv[0]);
retval = 1;
goto fail;
}
if (read(fd, buffer, EI_NIDENT) < EI_NIDENT) {
warnx("file '%s' too short", argv[0]);
retval = 1;
goto fail;
}
if (buffer[0] != ELFMAG0 || buffer[1] != ELFMAG1 ||
buffer[2] != ELFMAG2 || buffer[3] != ELFMAG3) {
warnx("file '%s' is not ELF format", argv[0]);
retval = 1;
goto fail;
}
if (!change && !force) {
fprintf(stdout,
"File '%s' is of brand '%s' (%u).\n",
argv[0], iselftype(buffer[EI_OSABI]),
buffer[EI_OSABI]);
if (!iselftype(type)) {
warnx("ELF ABI Brand '%u' is unknown",
type);
printelftypes();
}
}
else {
buffer[EI_OSABI] = type;
lseek(fd, 0, SEEK_SET);
if (write(fd, buffer, EI_NIDENT) != EI_NIDENT) {
warn("error writing %s %d", argv[0], fd);
retval = 1;
goto fail;
}
}
fail:
close(fd);
argc--;
argv++;
}
return retval;
}
static void
usage()
{
fprintf(stderr, "usage: brandelf [-f ELF ABI number] [-v] [-l] [-t string] file ...\n");
exit(1);
}
static const char *
iselftype(int elftype)
{
int elfwalk;
for (elfwalk = 0;
elfwalk < sizeof(elftypes)/sizeof(elftypes[0]);
elfwalk++)
if (elftype == elftypes[elfwalk].value)
return elftypes[elfwalk].str;
return 0;
}
static int
elftype(const char *elfstrtype)
{
int elfwalk;
for (elfwalk = 0;
elfwalk < sizeof(elftypes)/sizeof(elftypes[0]);
elfwalk++)
if (strcmp(elfstrtype, elftypes[elfwalk].str) == 0)
return elftypes[elfwalk].value;
return -1;
}
static void
printelftypes()
{
int elfwalk;
fprintf(stderr, "known ELF types are: ");
for (elfwalk = 0;
elfwalk < sizeof(elftypes)/sizeof(elftypes[0]);
elfwalk++)
fprintf(stderr, "%s(%u) ", elftypes[elfwalk].str,
elftypes[elfwalk].value);
fprintf(stderr, "\n");
}

View File

@@ -0,0 +1,30 @@
#
# Use this script to customize the installer bootstrap script
#
# override some defaults
# try to get root prior to running setup?
# 0: no
# 1: prompt, but run anyway if fails
# 2: require, abort if root fails
# 3: print SU_MESSAGE if not root, don't attempt any privilege upgrade
GET_ROOT=1
FATAL_ERROR="Error running installer. See http://zerowing.idsoftware.com/linux/doom/ for troubleshooting"
#XSU_ICON="-i icon.xpm"
SU_MESSAGE="The recommended install location (/usr/local/games) requires root permissions.\nPlease enter the root password or hit enter to continue install as current user."
XSU_MESSAGE="The recommended install location (/usr/local/games) requires root permissions.^Please enter the root password or hit cancel to continue install as current user."
rm -f /usr/local/games/tmp.$$ > /dev/null 2>&1
touch /usr/local/games/tmp.$$ > /dev/null 2>&1
status="$?"
if [ "$status" -eq 0 ]
then
rm -f /usr/local/games/tmp.$$
GET_ROOT=0
else
GET_ROOT=1
fi

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,290 @@
#! /bin/sh
#
# Product setup script
#
# Go to the proper setup directory (if not already there)
cd `dirname $0`
# defaults
FATAL_ERROR="Fatal error, no tech support email configured in this setup"
# try to get root prior to running setup?
# 0: no
# 1: prompt, but run anyway if fails
# 2: require, abort if root fails
GET_ROOT=0
XSU_ICON=""
# You may want to set USE_XHOST to 1 if you want an X11 application to
# be launched with root privileges right after installation
USE_XHOST=0
# this is the message for su call, printf
SU_MESSAGE="You need to run this installation as the super user.\nPlease enter the root password."
NULL=/dev/null
# See if we have the XPG4 utilities (Solaris)
if test -d /usr/xpg4/bin; then
PATH=/usr/xpg4/bin:$PATH
fi
# Return the appropriate architecture string
DetectARCH()
{
status=1
case `uname -m` in
amd64 | x86_64)
echo "amd64"
status=0;;
i?86 | i86*)
echo "x86"
status=0;;
90*/*)
echo "hppa"
status=0;;
*)
case `uname -s` in
IRIX*)
echo "mips"
status=0;;
AIX*)
echo "ppc"
status=0;;
*)
arch=`uname -p 2> /dev/null || uname -m`
if test "$arch" = powerpc; then
echo "ppc"
else
echo $arch
fi
status=0;;
esac
esac
return $status
}
# Return the appropriate version string
DetectLIBC()
{
status=1
if [ `uname -s` != Linux ]; then
echo "glibc-2.1"
return $status
fi
if [ -f `echo /lib/libc.so.6* | tail -n 1` ]; then
# I'm not using glibc-specific binaries
# this step even fails on amd64 gentoo, only has GLIBC_2.2 2.3 in it's strings
echo "glibc-2.1"
status=0
# if [ fgrep GLIBC_2.1 /lib/libc.so.6* 2> $NULL >> $NULL ]; then
# echo "glibc-2.1"
# status=0
# else
# echo "glibc-2.0"
# status=0
# fi
elif [ -f /lib/libc.so.5 ]; then
echo "libc5"
status=0
else
echo "unknown"
fi
return $status
}
DetectOS()
{
os=`uname -s`
if test "$os" = "OpenUNIX"; then
echo SCO_SV
else
echo $os
fi
return 0
}
# Detect the environment
arch=`DetectARCH`
libc=`DetectLIBC`
os=`DetectOS`
args=""
# Import preferences from a secondary script
if [ -f setup.data/config.sh ]; then
. setup.data/config.sh
elif [ -f SETUP.DAT/CONFIG.SH\;1 ]; then
# HP-UX and other systems unable to get LFN correctly
. SETUP.DAT/CONFIG.SH\;1
fi
# Add some standard paths for compatibility
PATH=$PATH:/usr/ucb
# call setup with -auth when ran through su/xsu
auth=0
if [ "$1" = "-auth" ]
then
auth=1
shift
fi
# Find the installation program
# try_run [-absolute] [-fatal] INSTALLER_NAME [PARAMETERS_PASSED]
# -absolute option: if what you are trying to execute has an absolute path
# NOTE: maybe try_run_absolute would be easier
# -fatal option: if you want verbose messages in case
# - the script could not be found
# - it's execution would fail
# INSTALLER_NAME: setup.gtk or setup
# PARAMETERS_PASSED: additional arguments passed to the setup script
try_run()
{
absolute=0
if [ "$1" = "-absolute" ]; then
absolute=1
shift
fi
fatal=0
# older bash < 2.* don't like == operator, using =
if [ "$1" = "-fatal" ]; then
# got fatal
fatal=1
shift
fi
setup=$1
shift
# First find the binary we want to run
failed=0
if [ "$absolute" -eq 0 ]
then
setup_bin="setup.data/bin/$os/$arch/$libc/$setup"
# trying $setup_bin
if [ ! -f "$setup_bin" ]; then
setup_bin="setup.data/bin/$os/$arch/$setup"
# libc dependant version failed, trying again
if [ ! -f "$setup_bin" ]; then
failed=1
fi
fi
if [ "$failed" -eq 1 ]; then
if [ "$fatal" -eq 1 ]; then
cat <<__EOF__
This installation doesn't support $libc on $os / $arch
(tried to run $setup)
$FATAL_ERROR
__EOF__
fi
return $failed
fi
# Try to run the binary ($setup_bin)
# The executable is here but we can't execute it from CD
# NOTE TTimo: this is dangerous, we also use $setup to store the name of the try_run
setup="$HOME/.setup$$"
rm -f "$setup"
cp "$setup_bin" "$setup"
chmod 700 "$setup"
trap "rm -f $setup" 1 2 3 15
fi
# echo Running "$setup" "$@"
if [ "$fatal" -eq 0 ]; then
"$setup" "$@"
failed="$?"
else
"$setup" "$@" 2>> $NULL
failed="$?"
fi
if [ "$absolute" -eq 0 ]
then
# don't attempt removal when we are passed an absolute path
# no, I don't want to imagine a faulty try_run as root on /bin/su
rm -f "$setup"
fi
return "$failed"
}
if [ "$GET_ROOT" -eq 3 ]
then
GOT_ROOT=`id -u`
if [ "$GOT_ROOT" != "0" ]
then
printf "$SU_MESSAGE\n"
echo "Press Enter to continue or Ctrl-C to abort"
read
fi
GET_ROOT=0
fi
# if we have not been through the auth yet, and if we need to get root, then prompt
if [ "$auth" -eq 0 ] && [ "$GET_ROOT" -ne 0 ]
then
GOT_ROOT=`id -u`
if [ "$GOT_ROOT" != "0" ]
then
if [ "$USE_XHOST" -eq 1 ]; then
xhost +127.0.0.1 2> $NULL > $NULL
fi
if [ "$GET_ROOT" -eq 1 ]
then
try_run xsu -e -a -u root -c "sh `pwd`/setup.sh -auth" $XSU_ICON -m "$XSU_MESSAGE"
else
try_run xsu -e -a -u root -c "sh `pwd`/setup.sh -auth" $XSU_ICON
fi
status="$?"
# echo "got $status"
# if try_run successfully executed xsu, it will return xsu's exit code
# xsu returns 2 if ran and cancelled (i.e. the user 'doesn't want' to auth)
# it will return 0 if the command was executed correctly
# summing up, if we get 1, something failed
if [ "$status" -eq 0 ]
then
# the auth command was properly executed
exit 0
elif [ "$status" -eq 1 ]
then
# xsu wasn't found, or failed to run
# if xsu actually ran and the auth was cancelled, $status is > 1
# try with su
# su will return 1 if auth failed
# we need to distinguish between su auth failed and su working, and still get setup.sh return code
printf "$SU_MESSAGE\n"
try_run -absolute /bin/su root -c "export DISPLAY=$DISPLAY;sh `pwd`/setup.sh -auth"
status="$?"
if [ "$status" -eq 1 ] && [ "$GET_ROOT" -eq 1 ]
then
echo "Running setup as user"
else
exit $status
fi
elif [ "$status" -eq 3 ]
then
if [ "$GET_ROOT" -eq 1 ]
then
echo "Running setup as user"
else
# the auth failed or was canceled
# we don't want to even start the setup if not root
echo "Please run this installation as the super user"
exit 1
fi
fi
# continue running as is
fi
fi
# run the setup program (setup.gtk first, then setup)
# except when trying setup.gtk first then console setup, always exit with 0
# if the setup was cancelled, it is not our problem
try_run setup.gtk $args $*
status="$?"
if [ "$status" -ne 0 ] && [ "$status" -ne 3 ]; then # setup.gtk couldn't connect to X11 server - ignore
try_run setup $args $*
status="$?"
if [ "$auth" -eq 1 ] && [ "$status" -ne 0 ]
then
# distinguish between failed su and failed su'ed setup.sh
exit 2
fi
exit $status
fi

View File

@@ -0,0 +1,86 @@
DOOM 3 LIMITED USE SOFTWARE LICENSE AGREEMENT
This DOOM 3 Limited Use Software License Agreement (this "Agreement") is a legal agreement among you, the end-user, and Id Software, Inc. ("Id Software"), and Activision Publishing, Inc. ("Activision"). BY CONTINUING THE INSTALLATION OF THE FULL VERSION GAME PROGRAM ENTITLED DOOM 3 (THE "SOFTWARE"), BY LOADING OR RUNNING THE SOFTWARE, OR BY PLACING OR COPYING THE SOFTWARE ONTO YOUR COMPUTER HARD DRIVE, COMPUTER RAM OR OTHER STORAGE, YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS AGREEMENT.
1. Grant of License. Subject to the terms and provisions of this Agreement and so long as you fully comply at all times with this Agreement, Id Software grants to you the non-exclusive and limited right to use the Software only in executable or object code form. The term "Software" includes all elements of the Software, including, without limitation, data files and screen displays. You are not receiving any ownership or proprietary right, title, or interest in or to the Software or the copyrights, trademarks, or other rights related thereto. For purposes of the first sentence of this section, "use" means loading the Software into RAM and/or onto computer hard drive, as well as installation of the Software on a hard disk or other storage device, and means the uses permitted in sections 2 and 4 hereinbelow. You agree that the Software will not be downloaded, shipped, transferred, exported or re exported into any country in violation of the United States Export Administration Act (or any other law governing such matters) by you or anyone at your direction, and that you will not utilize and will not authorize anyone to utilize the Software in any other manner in violation of any applicable law. The Software shall not be downloaded or otherwise exported or re exported into (or to a national or resident of) any country to which the United States has embargoed goods, or to anyone or into any country who/that are prohibited, by applicable law, from receiving such property. In exercising your limited rights hereunder, you shall comply, at all times, with all applicable laws, regulations, ordinances, and statutes. Id Software reserves all rights not granted in this Agreement, including, without limitation, all rights to Id Software's trademarks.
2. Permitted New Creations. Subject to the terms and provisions of this Agreement and so long as you fully comply at all times with this Agreement, Id Software grants to you the non-exclusive and limited right to create for the Software (except any Software code) your own modifications (the "New Creations") that shall operate only with the Software (but not any demo, test, or other version of the Software). You may include within the New Creations certain textures and other images (the "Software Images") from the Software. You shall not create any New Creations that infringe against any third-party right or that are libelous, defamatory, obscene, false, misleading, or otherwise illegal or unlawful. You agree that the New Creations will not be downloaded, shipped, transferred, exported, or re exported into any country in violation of the United States Export Administration Act (or any other law governing such matters) by you or anyone at your direction, and that you will not utilize and will not authorize anyone to utilize the New Creations in any other manner in violation of any applicable law. The New Creations shall not be downloaded or otherwise exported or re exported into (or to a national or resident of) any country to which the United States has embargoed goods or to anyone or into any country who/that are prohibited, by applicable law, from receiving such property. You shall not rent, sell, lease, lend, offer on a pay-per-play basis, or otherwise commercially exploit or commercially distribute the New Creations. You are permitted to distribute, without any cost or charge, the New Creations only to other end-users so long as such distribution is not infringing against any third-party right and otherwise is not illegal or unlawful. As noted below, in the event you commit any breach of this Agreement, your license and this Agreement automatically shall terminate, without notice.
3. Prohibitions with Regard to the Software. You, whether directly or indirectly, shall not do any of the following acts:
a. rent the Software;
b. sell the Software;
c. lease or lend the Software;
d. offer the Software on a pay-per-play basis;
e. distribute the Software by any means, including, but not limited to, Internet or other electronic distribution, direct mail, retail, mail order, or other means;
f. in any other manner and through any medium whatsoever commercially exploit the Software or use the Software for any commercial purpose;
g. disassemble, reverse engineer, decompile, modify (except as permitted by section 2 hereinabove) or alter the Software;
h. translate the Software;
i. reproduce or copy the Software (except as permitted by section 4 hereinbelow);
j. publicly display the Software;
k. prepare or develop derivative works based upon the Software;
l. remove or alter any notices or other markings or legends, such as trademark or copyright notices, affixed on or within the Software or the Printed Materials (as defined in section 5 hereinbelow); or
m. remove, alter, modify, disable, or reduce any of the anti-piracy measures contained in the Software, including, without limitation, measures relating to multiplayer play.
4. Prohibition against Cheat Programs. Any attempt by you, either directly or indirectly, to circumvent or bypass any element of the Software to gain any advantage in multiplayer play of the Software is a material breach of this Agreement. It is a material breach of this Agreement for you, whether directly or indirectly, to create, develop, copy, reproduce, distribute, or otherwise make any use of any software program or any modification to the Software ("Cheat Program") itself that enables or allows the user thereof to obtain an advantage or otherwise exploit another Software player or user when playing the Software against other players or users on a local area network, any other network, or on the Internet. Hacking into the executable of the Software, modification of the Software, or any other use of the Software in connection with the creation, development, or use of any such unauthorized Cheat Program is a material breach of this Agreement. Cheat Programs include, but are not limited to, programs that allow Software players or users to see through walls or other level geometry; programs that allow Software players or users to change their rate of speed outside the allowable limits of the Software; programs that crash either and/or other Software players, users, PC clients, or network servers; programs that automatically target other Software players or users (commonly referred to as "aimbots") that automatically simulate Software player or user input for the purpose of gaining an advantage over other Software players or users; or any other program or modification that functions in a similar capacity or allows any prohibited conduct.
In the event you breach this section or otherwise breach this Agreement, your license and this Agreement automatically shall terminate, without notice, and you shall have no right to play the Software against other players or make any other use of the Software.
5. Permitted Copying. You may make only the following copies of the Software: (i) you may copy the Software from the CD ROM that you purchase onto your computer hard drive; (ii) you may copy the Software from your computer hard drive into your computer RAM; and (iii) you may make one (1) "back up" or archival copy of the Software on one (1) hard disk.
6. Intellectual Property Rights. Certain printed materials (the "Printed Materials") accompany the Software. The Software, the Printed Materials, and all copyrights, trademarks, and all other conceivable intellectual property rights related to the Software and the Printed Materials are owned by Id Software and are protected by United States copyright laws, international treaty provisions, and all applicable law, such as the Lanham Act. You must treat the Software and the Printed Materials like any other copyrighted material, as required by 17 U.S.C. § 101 et seq. and other applicable law. You agree to use your best efforts to see that any user of the Software licensed hereunder, the Printed Materials or the New Creations complies with this Agreement. You agree that you are receiving a copy of the Software and the Printed Materials by limited license only and not by sale and that the "first sale" doctrine of 17 U.S.C. § 109 does not apply to your receipt or use of the Software or the Printed Materials. This section shall survive the cancellation or termination of this Agreement.
7. NO ID SOFTWARE WARRANTIES. ID SOFTWARE DISCLAIMS ALL WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, AND ANY WARRANTY OF NON-INFRINGEMENT, WITH RESPECT TO THE SOFTWARE, THE PRINTED MATERIALS, THE SOFTWARE IMAGES, AND OTHERWISE. THE SOFTWARE IS PROVIDED "AS IS" AND WITHOUT WARRANTY. ID SOFTWARE DOES NOT WARRANT THAT THE SOFTWARE OR THE OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE OR THAT THE SOFTWARE WILL MEET YOUR SPECIFIC OR SPECIAL REQUIREMENTS. ADDITIONAL STATEMENTS, WHETHER ORAL OR WRITTEN, DO NOT CONSTITUTE WARRANTIES BY ID SOFTWARE AND SHOULD NOT BE RELIED UPON. This section shall survive the cancellation or termination of this Agreement.
8. Limited Activision Warranty. Activision warrants to the original consumer purchaser of the Software that the recording medium on which the Software is recorded will be free from defects in material and workmanship for ninety (90) days from the date of purchase. If the recording medium is found defective within ninety (90) days of original purchase, Activision agrees to replace, free of charge, any Software discovered to be defective within such period upon its receipt of the Software, postage paid, with the proof of the date of purchase, as long as the Software still is being manufactured by Activision. In the event that the Software no longer is available, Activision retains the right to substitute a similar game program of equal or greater value. This warranty is limited to the recording medium containing the Software as originally provided by Activision and is not applicable to normal wear and tear. This warranty shall not be applicable and shall be void if the defect has arisen through abuse, mistreatment, or neglect.
EXCEPT AS SET FORTH ABOVE, THIS WARRANTY IS IN LIEU OF ALL OTHER WARRANTIES, WHETHER ORAL OR WRITTEN, EXPRESS OR IMPLIED, INCLUDING ANY WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, AND NO OTHER REPRESENTATIONS OR CLAIMS OF ANY KIND SHALL BE BINDING ON OR OBLIGATE ACTIVISION.
When returning the Software for warranty replacement, the original Software disks must be sent only in protective packaging and include: (1) photocopy of your dated sales receipt; (2) your name and return address typed or clearly printed; (3) a brief note describing the defect, the problem(s) you are encountering, and the system on which you are running the Software; and (4) if you are returning the Software after the ninety (90) day warranty period, but within one (1) year after the date of purchase, please include check or money order for $10.00 U.S. (A$19 for Australia, or £10.00 for Europe) currency per CD or floppy disk replacement. Note: Certified mail recommended.
In the United States, send to:
Warranty Replacements
Activision, Inc.
P.O. Box 67713
Los Angeles, California 90067
In Europe, send to:
Warranty Replacements
Activision
Parliament House
St. Laurence Way
Slough, Berkshire SL1 2BW
United Kingdom
In Australia and Asia Pacific territories, send to:
Warranty Replacements
Activision
Level 5, 51 Rawson street
Epping, NSW 2121
Australia
9. Governing Law, Venue, Indemnity, and Liability Limitation. This Agreement shall be construed in accordance with and governed by the applicable laws of the State of Texas (but excluding conflicts of laws principles) and applicable United States federal law. Except as set forth below, exclusive venue for all litigation regarding this Agreement shall be in Dallas County, Texas, and you agree to submit to the jurisdiction of the federal and state courts in Dallas County, Texas, for any such litigation. Exclusive venue for all litigation involving Activision, but not involving Id Software, with regard to this Agreement shall be in Los Angeles County, California, and you agree to submit to the jurisdiction of the courts in Los Angeles, California, for any such litigation. You hereby agree to indemnify, defend and hold harmless Id Software and Activision and Id Software's and Activision's respective officers, employees, directors, agents, licensees (excluding you), sub-licensees (excluding you), successors, and assigns from and against all losses, lawsuits, damages, causes of action, and claims relating to and/or arising from the New Creations or the distribution or other use of the New Creations or relating to and/or arising from your breach of this Agreement. You agree that your unauthorized use of the Software Images, the Printed Materials, or the Software, or any part thereof, immediately and irreparably may damage Id Software such that Id Software could not be adequately compensated solely by a monetary award, and in such event, at Id Software's option, that Id Software shall be entitled to an injunctive order, in addition to all other available remedies, including a monetary award, to prohibit such unauthorized use without the necessity of Id Software posting bond or other security. IN ANY CASE, ID SOFTWARE, ACTIVISION, AND ID SOFTWARE AND ACTIVISION'S RESPECTIVE OFFICERS, EMPLOYEES, DIRECTORS, SHAREHOLDERS, REPRESENTATIVES, AGENTS, LICENSEES (EXCLUDING YOU), SUB-LICENSEES (EXCLUDING YOU), SUCCESSORS, AND ASSIGNS SHALL NOT BE LIABLE FOR LOSS OF DATA, LOSS OF PROFITS, LOST SAVINGS, SPECIAL, INCIDENTAL, CONSEQUENTIAL, INDIRECT OR PUNITIVE DAMAGES, OR ANY OTHER DAMAGES ARISING FROM ANY ALLEGED CLAIM FOR BREACH OF WARRANTY, BREACH OF CONTRACT, NEGLIGENCE, STRICT PRODUCT LIABILITY, OR OTHER LEGAL THEORY EVEN IF ID SOFTWARE, ACTIVISION, OR THEIR RESPECTIVE AGENT(S) HAVE BEEN ADVISED OF THE POSSIBILITY OF ANY SUCH DAMAGES, OR EVEN IF SUCH DAMAGES ARE FORESEEABLE, OR LIABLE FOR ANY CLAIM BY ANY OTHER PARTY. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to you. This section shall survive the cancellation or termination of this Agreement.
10. United States Government Restricted Rights. To the extent applicable, the United States Government shall have only those rights to use the Software and the Printed Materials as expressly stated and expressly limited and restricted in this Agreement, as provided in 48 C.F.R. §§ 227.7201 through 227.7204, inclusive.
11. General Provisions. Neither this Agreement nor any part or portion hereof shall be assigned or sublicensed by you. Id Software and Activision each may assign its respective rights under this Agreement in the assigning party's sole discretion. Should any provision of this Agreement be held to be void, invalid, unenforceable, or illegal by a court of competent jurisdiction, the validity and enforceability of the other provisions shall not be affected thereby. If any provision is determined to be unenforceable by a court of competent jurisdiction, you agree to a modification of such provision to provide for enforcement of the provision's intent, to the extent permitted by applicable law. Failure of Id Software or Activision to enforce any provision of this Agreement shall not constitute or be construed as a waiver of such provision or of the right to enforce such provision. IMMEDIATELY UPON YOUR FAILURE TO COMPLY WITH, OR YOUR BREACH OF ANY TERM OR PROVISION OF THIS AGREEMENT, YOUR LICENSE GRANTED HEREIN AND THIS AGREEMENT AUTOMATICALLY SHALL TERMINATE, WITHOUT NOTICE, AND ID SOFTWARE AND ACTIVISION MAY PURSUE ALL RELIEF AND REMEDIES AGAINST YOU THAT ARE AVAILABLE UNDER APPLICABLE LAW AND/OR THIS AGREEMENT. Immediately upon termination of this Agreement, any and all rights you are granted hereunder shall terminate, you shall have no right to use the Software, the Printed Materials, or the New Creations, in any manner, you immediately shall destroy all copies of the Software, the Printed Materials, and the New Creations in your possession, custody, or control, and all rights granted hereunder shall revert, without notice, to and be vested in Id Software.
YOU ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT, YOU UNDERSTAND THIS AGREEMENT, AND UNDERSTAND THAT BY CONTINUING THE INSTALLATION OF THE SOFTWARE, BY LOADING OR RUNNING THE SOFTWARE, OR BY PLACING OR COPYING THE SOFTWARE ONTO YOUR COMPUTER HARD DRIVE OR RAM, YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT. YOU FURTHER AGREE THAT, EXCEPT FOR WRITTEN SEPARATE AGREEMENTS, IF ANY, AMONG ID SOFTWARE, ACTIVISION, AND YOU, THIS AGREEMENT IS A COMPLETE AND EXCLUSIVE STATEMENT OF THE RIGHTS AND LIABILITIES OF THE PARTIES HERETO, RELATING TO THE SUBJECT MATTER HEREOF. THIS AGREEMENT SUPERSEDES ALL PRIOR ORAL AGREEMENTS, PROPOSALS, OR UNDERSTANDINGS, AND ANY OTHER COMMUNICATIONS, IF ANY, AMONG ID SOFTWARE, ACTIVISION, AND YOU RELATING TO THE SUBJECT MATTER OF THIS AGREEMENT.

View File

@@ -0,0 +1,31 @@
DOOM III Linux Demo
===================
Minimum system requirements:
----------------------------
GNU/Linux system,
Pentium III, 1Ghz
256Mb RAM
Kernel 2.4, 2.6 is recommended
glibc 2.2.4 and up
3D card:
NV10 or R200 minimum hardware
OpenGL hardware acceleration
64 MB VRAM
sound card, OSS or Alsa, stereo sound and 5.1 are supported with both APIs
Alsa version 1.0.6 or above is required
Installation instructions:
--------------------------
By default, the setup will install the files to
/usr/local/games/doom3-demo
Start the demo with the command: doom3-demo
For troubleshooting and help, see:
http://zerowing.idsoftware.com/linux/

View File

@@ -0,0 +1,3 @@
#!/bin/sh
echo "If you read this, then something failed during the setup"
echo "See http://zerowing.idsoftware.com/linux/ for troubleshooting"

View File

@@ -0,0 +1,34 @@
#!/bin/sh
# create the wrapper
create_link()
{
echo "#!/bin/sh
# Needed to make symlinks/shortcuts work.
# the binaries must run with correct working directory
cd \"$1\"
export LD_LIBRARY_PATH=\$LD_LIBRARY_PATH:.
exec ./$BINARY \"\$@\"
" > "$1/$TARGET"
chmod a+x "$1/$TARGET"
# and then we must symlink to this
# can't be done from setup.xml because it would symlink the binary
if [ -n "$SETUP_SYMLINKSPATH" ] && [ -d "$SETUP_SYMLINKSPATH" ]
then
# the symlink might already exists, in case we will remove it
if [ -h "$SETUP_SYMLINKSPATH/$TARGET" ]
then
echo "Removing existing $TARGET symlink"
rm "$SETUP_SYMLINKSPATH/$TARGET"
fi
echo "Installing symlink $SETUP_SYMLINKSPATH/$TARGET -> $1/$TARGET"
ln -s "$1/$TARGET" "$SETUP_SYMLINKSPATH/$TARGET"
fi
}
BINARY=doom.x86
TARGET=doom3-demo
create_link "$1"

View File

@@ -0,0 +1,24 @@
<?xml version="1.0" standalone="yes"?>
<install product="M4_PRODUCT" desc="M4_DESC" version="M4_VERSION" postinstall="sh setup.data/postinstall.sh &quot;$@&quot;" nouninstall="yes">
<eula>
License.txt
</eula>
<readme>
README
</readme>
M4_PRODUCT
<option required="true">
M4_DESC
<binary arch="any" libs="any" symlink="doom3-demo">
doom3-demo
</binary>
<binary arch="any" libs="any">
doom.x86
</binary>
<files>
demo
gamex86.so
M4_LDD
</files>
</option>
</install>

View File

@@ -0,0 +1,55 @@
DOOM 3 SOFTWARE DEVELOPMENT KIT
LIMITED USE LICENSE AGREEMENT
This DOOM 3 Software Development Kit Limited Use License Agreement (this "Agreement") is a legal agreement among you, the end-user, and Id Software, Inc. ("Id Software"). BY CONTINUING THE DOWNLOAD OR INSTALLATION OF THIS SOFTWARE DEVELOPMENT KIT (THE "SOFTWARE") FOR THE GAME PROGRAM ENTITLED DOOM 3, BY LOADING OR RUNNING THE SOFTWARE, OR BY PLACING OR COPYING THE SOFTWARE ONTO YOUR COMPUTER HARD DRIVE, COMPUTER RAM, OR OTHER STORAGE, YOU ARE AGREEING TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT. YOU ACKNOWLEDGE AND UNDERSTAND THAT IN ORDER TO OPERATE THE SOFTWARE, YOU MUST HAVE THE FULL VERSION OF THE ID SOFTWARE GAME ENTITLED DOOM 3 INSTALLED ON YOUR COMPUTER.
1. Grant of License. Subject to the terms and provisions of this Agreement and so long as you fully comply at all times with this Agreement, Id Software grants to you the non-exclusive and limited right to use the Software only in executable or object code form. The term "Software" includes all elements of the Software, including, without limitation, data files and screen displays. You are not receiving any ownership or proprietary right, title, or interest in or to the Software or the copyrights, trademarks, or other rights related thereto. For purposes of the first sentence of this Section, "use" means loading the Software into RAM and/or onto computer hard drive, as well as installation of the Software on a hard disk or other storage device, and means the uses permitted in Sections 2 and 5 hereinbelow. You agree that the Software will not be downloaded, shipped, transferred, exported or re-exported into any country in violation of the United States Export Administration Act (or any other law governing such matters) by you or anyone at your direction, and that you will not utilize and will not authorize anyone to utilize the Software in any other manner in violation of any applicable law. The Software shall not be downloaded or otherwise exported or re-exported into (or to a national or resident of) any country to which the United States has embargoed goods, or to anyone or into any country who/that are prohibited, by applicable law, from receiving such property. In exercising your limited rights hereunder, you shall comply, at all times, with all applicable laws, regulations, ordinances, and statutes. Id Software reserves all rights not granted in this Agreement, including, without limitation, all rights to Id Software's trademarks.
2. Permitted New Creations. Subject to the terms and provisions of this Agreement and so long as you fully comply at all times with this Agreement, Id Software grants to you the non-exclusive and limited right to use the Software to create for the software game DOOM 3 your own modifications (the "New Creations") that shall operate only with DOOM 3 (but not any demo, test, or other version of DOOM 3). You may include within the New Creations certain textures and other images (the "Software Images") from the Software. You shall not create any New Creations that infringe against any third-party right or that are libelous, defamatory, obscene, false, misleading, or otherwise illegal or unlawful. You agree that the New Creations will not be downloaded, shipped, transferred, exported, or re-exported into any country in violation of the United States Export Administration Act (or any other law governing such matters) by you or anyone at your direction, and that you will not utilize and will not authorize anyone to utilize the New Creations in any other manner in violation of any applicable law. The New Creations shall not be downloaded or otherwise exported or re-exported into (or to a national or resident of) any country to which the United States has embargoed goods or to anyone or into any country who/that are prohibited, by applicable law, from receiving such property. You shall not rent, sell, lease, lend, offer on a pay-per-play basis, or otherwise commercially exploit or commercially distribute the New Creations. You are permitted to distribute, without any cost or charge, the New Creations only to other end-users so long as such distribution is not infringing against any third-party right and otherwise is not illegal or unlawful. As noted below, in the event you commit any breach of this Agreement, your license and this Agreement automatically shall terminate, without notice.
3. Prohibitions with Regard to the Software. You, whether directly or indirectly, shall not do any of the following acts:
a. rent the Software;
b. sell the Software;
c. lease or lend the Software;
d. offer the Software on a pay-per-play basis;
e. distribute the Software (except as permitted under Section 5 hereinbelow);
f. in any other manner and through any medium whatsoever commercially exploit the Software or use the Software for any commercial purpose;
g. disassemble, reverse engineer, decompile, modify (except as permitted under Section 2 hereinabove) or alter the Software;
h. translate the Software;
i. reproduce or copy the Software (except as permitted under Section 5 hereinbelow);
j. publicly display the Software;
k. prepare or develop derivative works based upon the Software;
l. remove or alter any notices or other markings or legends, such as trademark or copyright notices, affixed on or within the Software; or
m. remove, alter, modify, disable, or reduce any of the anti-piracy measures contained in the Software or in DOOM 3, including, without limitation, measures relating to multiplayer play.
4. Prohibition against Cheat Programs. Any attempt by you, either directly or indirectly, to circumvent or bypass any element of the Software to gain any advantage in multiplayer play of the Software is a material breach of this Agreement. It is a material breach of this Agreement for you, whether directly or indirectly, to create, develop, copy, reproduce, distribute, or otherwise make any use of any software program or any modification to the Software ("Cheat Program") itself that enables or allows the user thereof to obtain an advantage or otherwise exploit another Software player or user when playing the Software against other players or users on a local area network, any other network, or on the Internet. Hacking into the executable of the Software, modification of the Software, or any other use of the Software in connection with the creation, development, or use of any such unauthorized Cheat Program is a material breach of this Agreement. Cheat Programs include, but are not limited to, programs that allow Software players or users to see through walls or other level geometry; programs that allow Software players or users to change their rate of speed outside the allowable limits of the Software; programs that crash either and/or other Software players, users, PC clients, or network servers; programs that automatically target other Software players or users (commonly referred to as "aimbots") that automatically simulate Software player or user input for the purpose of gaining an advantage over other Software players or users; or any other program or modification that functions in a similar capacity or allows any prohibited conduct.
In the event you breach this Section or otherwise breach this Agreement, your license and this Agreement automatically shall terminate, without notice, and you shall have no right to play the Software against other players or make any other use of the Software.
5. Permitted Distribution and Copying. So long as this Agreement accompanies each copy you make of the Software, and so long as you comply fully at all times with this Agreement, Id Software grants to you the non-exclusive and limited right to copy the Software and to distribute such copies of the Software free of charge for non-commercial purposes that shall include the free-of-charge distribution of copies of the Software as mounted on the covers of magazines; provided, however, you shall not copy or distribute the Software in any infringing manner or in any manner that violates any law or third-party right, and you shall not distribute the Software together with any material that infringes against any third-party right or that is libelous, defamatory, obscene, false, misleading, or otherwise illegal or unlawful. Subject to the terms and conditions of this Agreement, you also may: (i) download one (1) copy of the Software or copy the Software from the CD ROM on which you received your copy of the Software onto your computer RAM; (ii) copy the Software from your computer RAM onto your computer hard drive; and (iii) make one (1) "backup" or archival copy of the Software on one (1) hard disk. In exercising your limited rights hereunder, you shall comply at all times with all applicable laws, regulations, ordinances, and statutes. Id Software reserves all rights not granted in this Agreement. You shall not distribute the Software commercially unless you first enter into a separate contract with Id Software, on terms and conditions determined in Id Software's sole discretion, and only upon your receipt of a written agreement executed by an authorized officer of Id Software.
6. Intellectual Property Rights. The Software and all copyrights, trademarks, and all other conceivable intellectual property rights related to the Software are owned by Id Software and are protected by United States copyright laws, international treaty provisions, and all applicable law, such as the Lanham Act. You must treat the Software like any other copyrighted material, as required by 17 U.S.C. § 101 et seq. and other applicable law. You agree to use your best efforts to see that any user of the Software licensed hereunder or the New Creations complies with this Agreement. You agree that you are receiving a copy of the Software by limited license only and not by sale and that the "first sale" doctrine of 17 U.S.C. § 109 does not apply to your receipt or use of the Software. This Section shall survive the cancellation or termination of this Agreement.
7. NO ID SOFTWARE WARRANTIES. ID SOFTWARE DISCLAIMS ALL WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, AND ANY WARRANTY OF NON-INFRINGEMENT, WITH RESPECT TO THE SOFTWARE, THE SOFTWARE IMAGES, AND OTHERWISE. THE SOFTWARE IS PROVIDED "AS IS" AND WITHOUT WARRANTY. ID SOFTWARE DOES NOT WARRANT THAT THE SOFTWARE OR THE OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE OR THAT THE SOFTWARE WILL MEET YOUR SPECIFIC OR SPECIAL REQUIREMENTS. ADDITIONAL STATEMENTS, WHETHER ORAL OR WRITTEN, DO NOT CONSTITUTE WARRANTIES BY ID SOFTWARE AND SHOULD NOT BE RELIED UPON. This Section shall survive the cancellation or termination of this Agreement.
8. Governing Law, Venue, Indemnity, and Liability Limitation. This Agreement shall be construed in accordance with and governed by the applicable laws of the State of Texas (but excluding conflicts of laws principles) and applicable United States federal law. Except as set forth below, exclusive venue for all litigation regarding this Agreement shall be in Dallas County, Texas, and you agree to submit to the jurisdiction of the federal and state courts in Dallas County, Texas, for any such litigation. You hereby agree to indemnify, defend and hold harmless Id Software and Id Software's officers, employees, directors, agents, licensees (excluding you), sub-licensees (excluding you), successors, and assigns from and against all losses, lawsuits, damages, causes of action, and claims relating to and/or arising from the New Creations or the distribution or other use of the New Creations or relating to and/or arising from your breach of this Agreement. You agree that your unauthorized use of the Software Images or the Software, or any part thereof, immediately and irreparably may damage Id Software such that Id Software could not be adequately compensated solely by a monetary award, and in such event, at Id Software's option, that Id Software shall be entitled to an injunctive order, in addition to all other available remedies, including a monetary award, to prohibit such unauthorized use without the necessity of Id Software posting bond or other security. IN ANY CASE, ID SOFTWARE AND ID SOFTWARE'S OFFICERS, EMPLOYEES, DIRECTORS, SHAREHOLDERS, REPRESENTATIVES, AGENTS, LICENSEES (EXCLUDING YOU), SUB-LICENSEES (EXCLUDING YOU), SUCCESSORS, AND ASSIGNS SHALL NOT BE LIABLE FOR LOSS OF DATA, LOSS OF PROFITS, LOST SAVINGS, SPECIAL, INCIDENTAL, CONSEQUENTIAL, INDIRECT OR PUNITIVE DAMAGES, OR ANY OTHER DAMAGES ARISING FROM ANY ALLEGED CLAIM FOR BREACH OF WARRANTY, BREACH OF CONTRACT, NEGLIGENCE, STRICT PRODUCT LIABILITY, OR OTHER LEGAL THEORY EVEN IF ID SOFTWARE OR ITS RESPECTIVE AGENT(S) HAVE BEEN ADVISED OF THE POSSIBILITY OF ANY SUCH DAMAGES, OR EVEN IF SUCH DAMAGES ARE FORESEEABLE, OR LIABLE FOR ANY CLAIM BY ANY OTHER PARTY. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to you. This Section shall survive the cancellation or termination of this Agreement.
9. United States Government Restricted Rights. To the extent applicable, the United States Government shall have only those rights to use the Software as expressly stated and expressly limited and restricted in this Agreement, as provided in 48 C.F.R. §§ 227.7201 through 227.7204, inclusive.
10. General Provisions. Neither this Agreement nor any part or portion hereof shall be assigned or sublicensed by you. Id Software may assign its rights under this Agreement in its sole discretion. Should any provision of this Agreement be held to be void, invalid, unenforceable, or illegal by a court of competent jurisdiction, the validity and enforceability of the other provisions shall not be affected thereby. If any provision is determined to be unenforceable by a court of competent jurisdiction, you agree to a modification of such provision to provide for enforcement of the provision's intent, to the extent permitted by applicable law. Failure of Id Software to enforce any provision of this Agreement shall not constitute or be construed as a waiver of such provision or of the right to enforce such provision. IMMEDIATELY UPON YOUR FAILURE TO COMPLY WITH, OR YOUR BREACH OF ANY TERM OR PROVISION OF THIS AGREEMENT, YOUR LICENSE GRANTED HEREIN AND THIS AGREEMENT AUTOMATICALLY SHALL TERMINATE, WITHOUT NOTICE, AND ID SOFTWARE MAY PURSUE ALL RELIEF AND REMEDIES AGAINST YOU THAT ARE AVAILABLE UNDER APPLICABLE LAW AND/OR THIS AGREEMENT. Immediately upon termination of this Agreement, any and all rights you are granted hereunder shall terminate, you shall have no right to use the Software or the New Creations, in any manner, you immediately shall destroy all copies of the Software and the New Creations in your possession, custody, or control, and all rights granted hereunder shall revert, without notice, to and be vested in Id Software.
YOU ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT, YOU UNDERSTAND THIS AGREEMENT, AND YOU UNDERSTAND THAT, BY CONTINUING THE DOWNLOAD OR INSTALLATION OF THE SOFTWARE, BY LOADING OR RUNNING THE SOFTWARE, OR BY PLACING OR COPYING THE SOFTWARE ONTO YOUR COMPUTER HARD DRIVE, COMPUTER RAM, OR OTHER STORAGE, YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT. YOU FURTHER AGREE THAT, EXCEPT FOR WRITTEN, SEPARATE AGREEMENTS, IF ANY, BETWEEN ID AND YOU, THIS AGREEMENT IS A COMPLETE AND EXCLUSIVE STATEMENT OF THE RIGHTS AND LIABILITIES OF THE PARTIES HERETO RELATING TO THE SUBJECT MATTER HEREOF. THIS AGREEMENT SUPERSEDES ALL PRIOR ORAL AGREEMENTS, PROPOSALS, OR UNDERSTANDINGS, AND ANY OTHER COMMUNICATIONS, IF ANY, BETWEEN ID AND YOU RELATING TO THE SUBJECT MATTER OF THIS AGREEMENT.

View File

@@ -0,0 +1,21 @@
DOOM III Linux SDK
==================
The DOOM build system is based on scons ( a make replacement )
http://www.scons.org/
packages are available for most recent distributions
To build, invoke scons from the src/ directory
use 'scons -h' for build configuration options
scons 0.96 or newer is required for build
Release 1.3.1 is compiled with gcc 4.0. Note that you can specify the compiler by setting CC and CXX on the command line. If you use a different gcc release line than 4.x, you may run into ABI issues.
Links
-----
Doom III Linux FAQ:
http://zerowing.idsoftware.com/linux/doom/
Doom III mod developement resources:
http://www.iddevnet.com/

View File

@@ -0,0 +1,17 @@
#
# Use this script to customize the installer bootstrap script
#
# override some defaults
# try to get root prior to running setup?
# 0: no
# 1: prompt, but run anyway if fails
# 2: require, abort if root fails
GET_ROOT=0
FATAL_ERROR="Error running installer. See http://zerowing.idsoftware.com/linux/ for troubleshooting"
#XSU_ICON="-i icon.xpm"
#SU_MESSAGE="It is recommended to run this installation as root.\nPlease enter the root password, or hit return to continue as user"

View File

@@ -0,0 +1,19 @@
<?xml version="1.0" standalone="yes"?>
<install product="doom3-sdk" desc="DOOM III SDK" version="M4_VERSION" nouninstall="yes">
<eula>
License.SDK.txt
</eula>
<readme>
README.SDK.txt
</readme>
doom3-sdk
<option required="true">
DOOM III SDK
<files>
MayaSetupStuff.zip
src
base
vehicles
</files>
</option>
</install>

View File

@@ -0,0 +1,86 @@
DOOM 3 LIMITED USE SOFTWARE LICENSE AGREEMENT
This DOOM 3 Limited Use Software License Agreement (this "Agreement") is a legal agreement among you, the end-user, and Id Software, Inc. ("Id Software"), and Activision Publishing, Inc. ("Activision"). BY CONTINUING THE INSTALLATION OF THE FULL VERSION GAME PROGRAM ENTITLED DOOM 3 (THE "SOFTWARE"), BY LOADING OR RUNNING THE SOFTWARE, OR BY PLACING OR COPYING THE SOFTWARE ONTO YOUR COMPUTER HARD DRIVE, COMPUTER RAM OR OTHER STORAGE, YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS AGREEMENT.
1. Grant of License. Subject to the terms and provisions of this Agreement and so long as you fully comply at all times with this Agreement, Id Software grants to you the non-exclusive and limited right to use the Software only in executable or object code form. The term "Software" includes all elements of the Software, including, without limitation, data files and screen displays. You are not receiving any ownership or proprietary right, title, or interest in or to the Software or the copyrights, trademarks, or other rights related thereto. For purposes of the first sentence of this section, "use" means loading the Software into RAM and/or onto computer hard drive, as well as installation of the Software on a hard disk or other storage device, and means the uses permitted in sections 2 and 4 hereinbelow. You agree that the Software will not be downloaded, shipped, transferred, exported or re exported into any country in violation of the United States Export Administration Act (or any other law governing such matters) by you or anyone at your direction, and that you will not utilize and will not authorize anyone to utilize the Software in any other manner in violation of any applicable law. The Software shall not be downloaded or otherwise exported or re exported into (or to a national or resident of) any country to which the United States has embargoed goods, or to anyone or into any country who/that are prohibited, by applicable law, from receiving such property. In exercising your limited rights hereunder, you shall comply, at all times, with all applicable laws, regulations, ordinances, and statutes. Id Software reserves all rights not granted in this Agreement, including, without limitation, all rights to Id Software's trademarks.
2. Permitted New Creations. Subject to the terms and provisions of this Agreement and so long as you fully comply at all times with this Agreement, Id Software grants to you the non-exclusive and limited right to create for the Software (except any Software code) your own modifications (the "New Creations") that shall operate only with the Software (but not any demo, test, or other version of the Software). You may include within the New Creations certain textures and other images (the "Software Images") from the Software. You shall not create any New Creations that infringe against any third-party right or that are libelous, defamatory, obscene, false, misleading, or otherwise illegal or unlawful. You agree that the New Creations will not be downloaded, shipped, transferred, exported, or re exported into any country in violation of the United States Export Administration Act (or any other law governing such matters) by you or anyone at your direction, and that you will not utilize and will not authorize anyone to utilize the New Creations in any other manner in violation of any applicable law. The New Creations shall not be downloaded or otherwise exported or re exported into (or to a national or resident of) any country to which the United States has embargoed goods or to anyone or into any country who/that are prohibited, by applicable law, from receiving such property. You shall not rent, sell, lease, lend, offer on a pay-per-play basis, or otherwise commercially exploit or commercially distribute the New Creations. You are permitted to distribute, without any cost or charge, the New Creations only to other end-users so long as such distribution is not infringing against any third-party right and otherwise is not illegal or unlawful. As noted below, in the event you commit any breach of this Agreement, your license and this Agreement automatically shall terminate, without notice.
3. Prohibitions with Regard to the Software. You, whether directly or indirectly, shall not do any of the following acts:
a. rent the Software;
b. sell the Software;
c. lease or lend the Software;
d. offer the Software on a pay-per-play basis;
e. distribute the Software by any means, including, but not limited to, Internet or other electronic distribution, direct mail, retail, mail order, or other means;
f. in any other manner and through any medium whatsoever commercially exploit the Software or use the Software for any commercial purpose;
g. disassemble, reverse engineer, decompile, modify (except as permitted by section 2 hereinabove) or alter the Software;
h. translate the Software;
i. reproduce or copy the Software (except as permitted by section 4 hereinbelow);
j. publicly display the Software;
k. prepare or develop derivative works based upon the Software;
l. remove or alter any notices or other markings or legends, such as trademark or copyright notices, affixed on or within the Software or the Printed Materials (as defined in section 5 hereinbelow); or
m. remove, alter, modify, disable, or reduce any of the anti-piracy measures contained in the Software, including, without limitation, measures relating to multiplayer play.
4. Prohibition against Cheat Programs. Any attempt by you, either directly or indirectly, to circumvent or bypass any element of the Software to gain any advantage in multiplayer play of the Software is a material breach of this Agreement. It is a material breach of this Agreement for you, whether directly or indirectly, to create, develop, copy, reproduce, distribute, or otherwise make any use of any software program or any modification to the Software ("Cheat Program") itself that enables or allows the user thereof to obtain an advantage or otherwise exploit another Software player or user when playing the Software against other players or users on a local area network, any other network, or on the Internet. Hacking into the executable of the Software, modification of the Software, or any other use of the Software in connection with the creation, development, or use of any such unauthorized Cheat Program is a material breach of this Agreement. Cheat Programs include, but are not limited to, programs that allow Software players or users to see through walls or other level geometry; programs that allow Software players or users to change their rate of speed outside the allowable limits of the Software; programs that crash either and/or other Software players, users, PC clients, or network servers; programs that automatically target other Software players or users (commonly referred to as "aimbots") that automatically simulate Software player or user input for the purpose of gaining an advantage over other Software players or users; or any other program or modification that functions in a similar capacity or allows any prohibited conduct.
In the event you breach this section or otherwise breach this Agreement, your license and this Agreement automatically shall terminate, without notice, and you shall have no right to play the Software against other players or make any other use of the Software.
5. Permitted Copying. You may make only the following copies of the Software: (i) you may copy the Software from the CD ROM that you purchase onto your computer hard drive; (ii) you may copy the Software from your computer hard drive into your computer RAM; and (iii) you may make one (1) "back up" or archival copy of the Software on one (1) hard disk.
6. Intellectual Property Rights. Certain printed materials (the "Printed Materials") accompany the Software. The Software, the Printed Materials, and all copyrights, trademarks, and all other conceivable intellectual property rights related to the Software and the Printed Materials are owned by Id Software and are protected by United States copyright laws, international treaty provisions, and all applicable law, such as the Lanham Act. You must treat the Software and the Printed Materials like any other copyrighted material, as required by 17 U.S.C. § 101 et seq. and other applicable law. You agree to use your best efforts to see that any user of the Software licensed hereunder, the Printed Materials or the New Creations complies with this Agreement. You agree that you are receiving a copy of the Software and the Printed Materials by limited license only and not by sale and that the "first sale" doctrine of 17 U.S.C. § 109 does not apply to your receipt or use of the Software or the Printed Materials. This section shall survive the cancellation or termination of this Agreement.
7. NO ID SOFTWARE WARRANTIES. ID SOFTWARE DISCLAIMS ALL WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, AND ANY WARRANTY OF NON-INFRINGEMENT, WITH RESPECT TO THE SOFTWARE, THE PRINTED MATERIALS, THE SOFTWARE IMAGES, AND OTHERWISE. THE SOFTWARE IS PROVIDED "AS IS" AND WITHOUT WARRANTY. ID SOFTWARE DOES NOT WARRANT THAT THE SOFTWARE OR THE OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE OR THAT THE SOFTWARE WILL MEET YOUR SPECIFIC OR SPECIAL REQUIREMENTS. ADDITIONAL STATEMENTS, WHETHER ORAL OR WRITTEN, DO NOT CONSTITUTE WARRANTIES BY ID SOFTWARE AND SHOULD NOT BE RELIED UPON. This section shall survive the cancellation or termination of this Agreement.
8. Limited Activision Warranty. Activision warrants to the original consumer purchaser of the Software that the recording medium on which the Software is recorded will be free from defects in material and workmanship for ninety (90) days from the date of purchase. If the recording medium is found defective within ninety (90) days of original purchase, Activision agrees to replace, free of charge, any Software discovered to be defective within such period upon its receipt of the Software, postage paid, with the proof of the date of purchase, as long as the Software still is being manufactured by Activision. In the event that the Software no longer is available, Activision retains the right to substitute a similar game program of equal or greater value. This warranty is limited to the recording medium containing the Software as originally provided by Activision and is not applicable to normal wear and tear. This warranty shall not be applicable and shall be void if the defect has arisen through abuse, mistreatment, or neglect.
EXCEPT AS SET FORTH ABOVE, THIS WARRANTY IS IN LIEU OF ALL OTHER WARRANTIES, WHETHER ORAL OR WRITTEN, EXPRESS OR IMPLIED, INCLUDING ANY WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, AND NO OTHER REPRESENTATIONS OR CLAIMS OF ANY KIND SHALL BE BINDING ON OR OBLIGATE ACTIVISION.
When returning the Software for warranty replacement, the original Software disks must be sent only in protective packaging and include: (1) photocopy of your dated sales receipt; (2) your name and return address typed or clearly printed; (3) a brief note describing the defect, the problem(s) you are encountering, and the system on which you are running the Software; and (4) if you are returning the Software after the ninety (90) day warranty period, but within one (1) year after the date of purchase, please include check or money order for $10.00 U.S. (A$19 for Australia, or £10.00 for Europe) currency per CD or floppy disk replacement. Note: Certified mail recommended.
In the United States, send to:
Warranty Replacements
Activision, Inc.
P.O. Box 67713
Los Angeles, California 90067
In Europe, send to:
Warranty Replacements
Activision
Parliament House
St. Laurence Way
Slough, Berkshire SL1 2BW
United Kingdom
In Australia and Asia Pacific territories, send to:
Warranty Replacements
Activision
Level 5, 51 Rawson street
Epping, NSW 2121
Australia
9. Governing Law, Venue, Indemnity, and Liability Limitation. This Agreement shall be construed in accordance with and governed by the applicable laws of the State of Texas (but excluding conflicts of laws principles) and applicable United States federal law. Except as set forth below, exclusive venue for all litigation regarding this Agreement shall be in Dallas County, Texas, and you agree to submit to the jurisdiction of the federal and state courts in Dallas County, Texas, for any such litigation. Exclusive venue for all litigation involving Activision, but not involving Id Software, with regard to this Agreement shall be in Los Angeles County, California, and you agree to submit to the jurisdiction of the courts in Los Angeles, California, for any such litigation. You hereby agree to indemnify, defend and hold harmless Id Software and Activision and Id Software's and Activision's respective officers, employees, directors, agents, licensees (excluding you), sub-licensees (excluding you), successors, and assigns from and against all losses, lawsuits, damages, causes of action, and claims relating to and/or arising from the New Creations or the distribution or other use of the New Creations or relating to and/or arising from your breach of this Agreement. You agree that your unauthorized use of the Software Images, the Printed Materials, or the Software, or any part thereof, immediately and irreparably may damage Id Software such that Id Software could not be adequately compensated solely by a monetary award, and in such event, at Id Software's option, that Id Software shall be entitled to an injunctive order, in addition to all other available remedies, including a monetary award, to prohibit such unauthorized use without the necessity of Id Software posting bond or other security. IN ANY CASE, ID SOFTWARE, ACTIVISION, AND ID SOFTWARE AND ACTIVISION'S RESPECTIVE OFFICERS, EMPLOYEES, DIRECTORS, SHAREHOLDERS, REPRESENTATIVES, AGENTS, LICENSEES (EXCLUDING YOU), SUB-LICENSEES (EXCLUDING YOU), SUCCESSORS, AND ASSIGNS SHALL NOT BE LIABLE FOR LOSS OF DATA, LOSS OF PROFITS, LOST SAVINGS, SPECIAL, INCIDENTAL, CONSEQUENTIAL, INDIRECT OR PUNITIVE DAMAGES, OR ANY OTHER DAMAGES ARISING FROM ANY ALLEGED CLAIM FOR BREACH OF WARRANTY, BREACH OF CONTRACT, NEGLIGENCE, STRICT PRODUCT LIABILITY, OR OTHER LEGAL THEORY EVEN IF ID SOFTWARE, ACTIVISION, OR THEIR RESPECTIVE AGENT(S) HAVE BEEN ADVISED OF THE POSSIBILITY OF ANY SUCH DAMAGES, OR EVEN IF SUCH DAMAGES ARE FORESEEABLE, OR LIABLE FOR ANY CLAIM BY ANY OTHER PARTY. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to you. This section shall survive the cancellation or termination of this Agreement.
10. United States Government Restricted Rights. To the extent applicable, the United States Government shall have only those rights to use the Software and the Printed Materials as expressly stated and expressly limited and restricted in this Agreement, as provided in 48 C.F.R. §§ 227.7201 through 227.7204, inclusive.
11. General Provisions. Neither this Agreement nor any part or portion hereof shall be assigned or sublicensed by you. Id Software and Activision each may assign its respective rights under this Agreement in the assigning party's sole discretion. Should any provision of this Agreement be held to be void, invalid, unenforceable, or illegal by a court of competent jurisdiction, the validity and enforceability of the other provisions shall not be affected thereby. If any provision is determined to be unenforceable by a court of competent jurisdiction, you agree to a modification of such provision to provide for enforcement of the provision's intent, to the extent permitted by applicable law. Failure of Id Software or Activision to enforce any provision of this Agreement shall not constitute or be construed as a waiver of such provision or of the right to enforce such provision. IMMEDIATELY UPON YOUR FAILURE TO COMPLY WITH, OR YOUR BREACH OF ANY TERM OR PROVISION OF THIS AGREEMENT, YOUR LICENSE GRANTED HEREIN AND THIS AGREEMENT AUTOMATICALLY SHALL TERMINATE, WITHOUT NOTICE, AND ID SOFTWARE AND ACTIVISION MAY PURSUE ALL RELIEF AND REMEDIES AGAINST YOU THAT ARE AVAILABLE UNDER APPLICABLE LAW AND/OR THIS AGREEMENT. Immediately upon termination of this Agreement, any and all rights you are granted hereunder shall terminate, you shall have no right to use the Software, the Printed Materials, or the New Creations, in any manner, you immediately shall destroy all copies of the Software, the Printed Materials, and the New Creations in your possession, custody, or control, and all rights granted hereunder shall revert, without notice, to and be vested in Id Software.
YOU ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT, YOU UNDERSTAND THIS AGREEMENT, AND UNDERSTAND THAT BY CONTINUING THE INSTALLATION OF THE SOFTWARE, BY LOADING OR RUNNING THE SOFTWARE, OR BY PLACING OR COPYING THE SOFTWARE ONTO YOUR COMPUTER HARD DRIVE OR RAM, YOU AGREE TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT. YOU FURTHER AGREE THAT, EXCEPT FOR WRITTEN SEPARATE AGREEMENTS, IF ANY, AMONG ID SOFTWARE, ACTIVISION, AND YOU, THIS AGREEMENT IS A COMPLETE AND EXCLUSIVE STATEMENT OF THE RIGHTS AND LIABILITIES OF THE PARTIES HERETO, RELATING TO THE SUBJECT MATTER HEREOF. THIS AGREEMENT SUPERSEDES ALL PRIOR ORAL AGREEMENTS, PROPOSALS, OR UNDERSTANDINGS, AND ANY OTHER COMMUNICATIONS, IF ANY, AMONG ID SOFTWARE, ACTIVISION, AND YOU RELATING TO THE SUBJECT MATTER OF THIS AGREEMENT.

View File

@@ -0,0 +1,53 @@
DOOM III Linux
==============
Minimum system requirements:
----------------------------
GNU/Linux system,
Pentium III, 1Ghz
256Mb RAM
Kernel 2.4, 2.6 is recommended
glibc 2.2.4 and up
3D card:
NV10 or R200 minimum hardware
OpenGL hardware acceleration
64 MB VRAM
sound card, OSS or Alsa, stereo sound and 5.1 are supported with both APIs
Alsa version 1.0.6 or above is required
A licensed copy of Doom III retail for Windows
In order to play the additional Resurrection of Evil Expansion Pack, a licensed copy of the Expansion Pack for Windows
Installation instructions:
--------------------------
The following files need to be copied from the win32 install CDs
to your base/ directory ( md5 sums provided below as reference )
by default, /usr/local/games/doom3/base
71b8d37b2444d3d86a36fd61783844fe base/pak000.pk4
4bc4f3ba04ec2b4f4837be40e840a3c1 base/pak001.pk4
fa84069e9642ad9aa4b49624150cc345 base/pak002.pk4
f22d8464997924e4913e467e7d62d5fe base/pak003.pk4
38561a3c73f93f2e6fd31abf1d4e9102 base/pak004.pk4
If you are also installing the Resurrection of Evil Expansion Pack,
you need to copy the following file to your d3xp/ directory
by default, /usr/local/games/doom3/d3xp
a883fef0fd10aadeb73d34c462ff865d d3xp/pak000.pk4
Localization is not supported on Linux ( only english ), you should not copy over any of the zpak files.
Start the game with the command: doom3
Start the dedicated server with the command: doom3-dedicated
If installed, you can start the Expansion Pack directly from the command line with the command: doom3 +set fs_game d3xp
Or you can select it in the mods menu of the base game.
For troubleshooting and help, see:
http://zerowing.idsoftware.com/linux/

View File

@@ -0,0 +1,3 @@
#!/bin/sh
echo "If you read this, then something failed during the setup"
echo "See http://zerowing.idsoftware.com/linux/ for troubleshooting"

View File

@@ -0,0 +1,3 @@
#!/bin/sh
echo "If you read this, then something failed during the setup"
echo "See http://zerowing.idsoftware.com/linux/ for troubleshooting"

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.3 KiB

View File

@@ -0,0 +1,17 @@
#!/bin/sh
# opening URLs into your favorite web browser
# feel free to tweak this to your needs
if [ x`which firefox` != x ]
then
firefox "$1"
elif [ x`which mozilla` != x ]
then
mozilla "$1"
elif [ x`which opera` != x ]
then
opera "$1"
else
xterm -e lynx "$1"
fi

View File

@@ -0,0 +1,39 @@
#!/bin/sh
# create the wrapper
create_link()
{
echo "#!/bin/sh
# Needed to make symlinks/shortcuts work.
# the binaries must run with correct working directory
cd \"$1\"
export LD_LIBRARY_PATH=\$LD_LIBRARY_PATH:.
exec ./$BINARY \"\$@\"
" > "$1/$TARGET"
chmod a+x "$1/$TARGET"
# and then we must symlink to this
# can't be done from setup.xml because it would symlink the binary
if [ -n "$SETUP_SYMLINKSPATH" ] && [ -d "$SETUP_SYMLINKSPATH" ]
then
# the symlink might already exists, in case we will remove it
if [ -h "$SETUP_SYMLINKSPATH/$TARGET" ]
then
echo "Removing existing $TARGET symlink"
rm "$SETUP_SYMLINKSPATH/$TARGET"
fi
echo "Installing symlink $SETUP_SYMLINKSPATH/$TARGET -> $1/$TARGET"
ln -s "$1/$TARGET" "$SETUP_SYMLINKSPATH/$TARGET"
fi
}
BINARY=doom.x86
TARGET=doom3
create_link "$1"
BINARY=doomded.x86
TARGET=doom3-dedicated
create_link "$1"
chmod +x "$1/openurl.sh"

View File

@@ -0,0 +1,42 @@
<?xml version="1.0" standalone="yes"?>
<install product="M4_PRODUCT" desc="M4_DESC" version="M4_VERSION" postinstall="sh setup.data/postinstall.sh &quot;$@&quot;" nouninstall="yes" nopromptoverwrite="yes">
<eula>
License.txt
</eula>
<readme>
README
</readme>
M4_PRODUCT
<option required="true">
M4_DESC
<binary arch="any" libs="any" symlink="doom3" icon="doom3.png" play="no">
doom3
</binary>
<binary arch="any" libs="any" symlink="doom3-dedicated" icon="doom3.png" play="no">
doom3-dedicated
</binary>
<binary arch="any" libs="any" play="no">
doom.x86
doomded.x86
</binary>
<files>
base
d3xp
pb
M4_LDD
version.info
openurl.sh
doom3.png
CHANGES
</files>
</option>
<option install="true">
PunkBuster client/server files
<eula>
pb/PB_EULA.txt
</eula>
<files>
pb/
</files>
</option>
</install>

View File

@@ -0,0 +1,36 @@
? install
? to
? image/setup.data/bin
Index: Makefile.in
===================================================================
RCS file: /cvs/cvsroot/loki_setup/Makefile.in,v
retrieving revision 1.32
diff -u -r1.32 Makefile.in
--- Makefile.in 4 Aug 2004 03:12:34 -0000 1.32
+++ Makefile.in 9 Aug 2004 10:16:22 -0000
@@ -65,7 +65,8 @@
CARBON_LIBS = $(COMMON_LIBS) @LIBS@ @CARBON_LIBS@
CONSOLE_LIBS = $(LIBS) @CONSOLE_LIBS@
-all: do-plugins @DO_DIALOG@ setup setup.gtk uninstall xsu
+#all: do-plugins @DO_DIALOG@ setup setup.gtk uninstall xsu
+all: do-plugins @DO_DIALOG@ setup
testxml: testxml.o
$(CC) $(LDFLAGS) -o $@ $^ $(LIBS)
@@ -139,6 +140,7 @@
ifeq ($(DYN_PLUGINS),true)
$(MAKE) -C plugins install
endif
+ mkdir -p install to image/setup.data/bin/$(os)/$(arch)/$(libc)
@if [ -d image/setup.data/bin/$(os)/$(arch)/$(libc) ]; then \
cp setup image/setup.data/bin/$(os)/$(arch); \
strip image/setup.data/bin/$(os)/$(arch)/setup; \
@@ -155,6 +157,7 @@
else \
echo No directory to copy the binary files to.; \
fi
+ echo installed to image/setup.data/bin/$(os)/$(arch)/$(libc)
install-image: all
ifeq ($(DYN_PLUGINS),true)

Binary file not shown.

Binary file not shown.

View File

@@ -0,0 +1,170 @@
--- loki_setup/CHANGES 2004-11-20 07:43:42.000000000 -0600
+++ loki_setup.zinx/CHANGES 2005-03-16 16:56:46.400205504 -0600
@@ -1,4 +1,6 @@
Current:
+Christopher Lais (Id Software) - Wed Mar 16 08:09:59 CST 2005
+ * Fix handling of invalid password in xsu
Ryan C. Gordon (icculus.org) - Sat Nov 20 08:42:16 EST 2004
* Minor carbon_ui tweaks and corrections to update function.
Ludwig Nussel - Wed Nov 10 14:21:21 PST 2004
--- loki_setup/xsu.c 2003-07-02 14:40:39.000000000 -0500
+++ loki_setup.zinx/xsu.c 2005-03-16 16:36:17.752988272 -0600
@@ -37,6 +37,7 @@
#include "xsu.h"
static int term = -1;
+static int term_status = 0;
static gint
exec_su_failed (gpointer user_data)
@@ -79,22 +80,25 @@
if ( sig == SIGCHLD && term > 0 ) {
int status;
pid_t pid = wait(&status);
+
+ close(term); term = -1;
+ term_status = status;
+
if ( WIFEXITED(status) ) {
#ifdef DEBUG
fprintf(stderr,"Child %d returned\n", pid);
#endif
- gtk_exit(WEXITSTATUS(status));
+ /* This is handled at the end of xsu_process */
+ return;
} else if ( WIFSIGNALED(status) ) {
#ifdef DEBUG
fprintf(stderr,"Xsu: subprocess %d has died from signal %d\n", pid, WTERMSIG(status));
#endif
gtk_exit(EXIT_ERROR);
+ } else {
+ fprintf(stderr, "Xsu: got SIGCHLD from %d for unknown reason (%08x)\n", pid, status);
+ gtk_exit(EXIT_ERROR);
}
- close(term); term = -1;
-
- while (gtk_events_pending ())
- gtk_main_iteration ();
- gtk_main_quit ();
}
}
@@ -135,22 +139,27 @@
gchar *buffer;
char *argv[6], c;
fd_set fds;
- struct timeval delay = { 0, 10*1000 }; /* 10 ms wait */
+ struct timeval delay;
#ifdef DEBUG
printf("void xsu_perform()\n");
#endif
+ gtk_widget_hide (gtk_xsu_window);
+
+ if (password == NULL)
+ return;
+
/* 0.2.1 *
Minor security fix. Password would remain in memory if we don't
clean the password textbox.
*/
- gtk_entry_set_text(GTK_ENTRY(gtk_password_textbox),"");
- gtk_widget_hide (gtk_xsu_window);
-
- if (password == NULL)
- return;
+ password_return = g_strdup_printf ("%s\n", password);
+ /* Technically, we aren't supposed to modify this, but it should
+ usually be OK because we're explicitly clearing it afterwards. */
+ memset (password, 0, strlen (password));
+ gtk_entry_set_text(GTK_ENTRY(gtk_password_textbox),"");
/* xsu 0.2.1 *
Option to set the DISPLAY environment
@@ -177,6 +186,9 @@
argv[2] = "-c";
argv[3] = buffer;
argv[4] = NULL;
+#ifdef DEBUG
+ fprintf(stderr, "%s %s -c %s\n", su_command, username, buffer);
+#endif
term = exec_program(su_command, argv);
/* We are not a gnome-application anymore but under control of su */
@@ -231,33 +243,65 @@
fprintf(stderr, "Got it!\n");
#endif
- /* Discard any remaining characters on stdin */
- for(;;) {
+ /* Slurp up any extra characters immediately after the password prompt,
+ because su might clear the buffer after we send the password if we
+ don't. */
+ for (;;) {
FD_ZERO(&fds);
FD_SET(term, &fds);
- if ( select(term+1, &fds, NULL, NULL, &delay) ) {
- if ( read(term, &c, 1) <= 0 )
- break;
+
+ delay.tv_sec = 0;
+ delay.tv_usec = 10*1000; /* 10 ms wait */
+
+ if (select(term+1, &fds, NULL, NULL, &delay) > 0) {
+ if (read(term, &c, 1) < 0)
+ break;
} else
break;
}
- password_return = g_strdup_printf ("%s\n", password);
#ifdef DEBUG
fprintf(stderr,"Sending password\n");
#endif
/* 0.2.2 *
Minor security fix, clear the password from memory
*/
- memset (password, 0, strlen (password));
if ( write(term, password_return, strlen(password_return)) < 0 ) {
perror("write");
}
+
memset (password_return, 0, strlen (password_return));
g_free (password_return); password_return = NULL;
- g_free (password); password = NULL;
- //gtk_main();
+ /* Eat up any output, and wait for a SIGCHLD saying su exited */
+ while (term >= 0) {
+ FD_ZERO(&fds);
+ FD_SET(term, &fds);
+
+ delay.tv_sec = 0;
+ delay.tv_usec = 10*1000; /* 10 ms wait */
+
+ if ( select(term+1, &fds, NULL, NULL, &delay) > 0 ) {
+ read(term, &c, 1);
+#ifdef DEBUG
+ fprintf(stderr, "read from pty: %02x\n", c);
+#endif
+ }
+
+ while (gtk_events_pending ())
+ gtk_main_iteration ();
+ }
+
+ if (WIFEXITED(term_status) && WEXITSTATUS(term_status)) {
+ /* su failed, so ask for the password again */
+#ifdef DEBUG
+ fprintf(stderr, "returning control to gtk\n");
+#endif
+ gtk_widget_show (gtk_xsu_window);
+ } else {
+ /* Exit normally */
+ gtk_main_quit();
+ }
}

View File

@@ -0,0 +1,341 @@
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your
freedom to share and change it. By contrast, the GNU General Public
License is intended to guarantee your freedom to share and change free
software--to make sure the software is free for all its users. This
General Public License applies to most of the Free Software
Foundation's software and to any other program whose authors commit to
using it. (Some other Free Software Foundation software is covered by
the GNU Library General Public License instead.) You can apply it to
your programs, too.
When we speak of free software, we are referring to freedom, not
price. Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
this service if you wish), that you receive source code or can get it
if you want it, that you can change the software or use pieces of it
in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid
anyone to deny you these rights or to ask you to surrender the rights.
These restrictions translate to certain responsibilities for you if you
distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether
gratis or for a fee, you must give the recipients all the rights that
you have. You must make sure that they, too, receive or can get the
source code. And you must show them these terms so they know their
rights.
We protect your rights with two steps: (1) copyright the software, and
(2) offer you this license which gives you legal permission to copy,
distribute and/or modify the software.
Also, for each author's protection and ours, we want to make certain
that everyone understands that there is no warranty for this free
software. If the software is modified by someone else and passed on, we
want its recipients to know that what they have is not the original, so
that any problems introduced by others will not reflect on the original
authors' reputations.
Finally, any free program is threatened constantly by software
patents. We wish to avoid the danger that redistributors of a free
program will individually obtain patent licenses, in effect making the
program proprietary. To prevent this, we have made it clear that any
patent must be licensed for everyone's free use or not licensed at all.
The precise terms and conditions for copying, distribution and
modification follow.
GNU GENERAL PUBLIC LICENSE
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains
a notice placed by the copyright holder saying it may be distributed
under the terms of this General Public License. The "Program", below,
refers to any such program or work, and a "work based on the Program"
means either the Program or any derivative work under copyright law:
that is to say, a work containing the Program or a portion of it,
either verbatim or with modifications and/or translated into another
language. (Hereinafter, translation is included without limitation in
the term "modification".) Each licensee is addressed as "you".
Activities other than copying, distribution and modification are not
covered by this License; they are outside its scope. The act of
running the Program is not restricted, and the output from the Program
is covered only if its contents constitute a work based on the
Program (independent of having been made by running the Program).
Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's
source code as you receive it, in any medium, provided that you
conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the
notices that refer to this License and to the absence of any warranty;
and give any other recipients of the Program a copy of this License
along with the Program.
You may charge a fee for the physical act of transferring a copy, and
you may at your option offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion
of it, thus forming a work based on the Program, and copy and
distribute such modifications or work under the terms of Section 1
above, provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices
stating that you changed the files and the date of any change.
b) You must cause any work that you distribute or publish, that in
whole or in part contains or is derived from the Program or any
part thereof, to be licensed as a whole at no charge to all third
parties under the terms of this License.
c) If the modified program normally reads commands interactively
when run, you must cause it, when started running for such
interactive use in the most ordinary way, to print or display an
announcement including an appropriate copyright notice and a
notice that there is no warranty (or else, saying that you provide
a warranty) and that users may redistribute the program under
these conditions, and telling the user how to view a copy of this
License. (Exception: if the Program itself is interactive but
does not normally print such an announcement, your work based on
the Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If
identifiable sections of that work are not derived from the Program,
and can be reasonably considered independent and separate works in
themselves, then this License, and its terms, do not apply to those
sections when you distribute them as separate works. But when you
distribute the same sections as part of a whole which is a work based
on the Program, the distribution of the whole must be on the terms of
this License, whose permissions for other licensees extend to the
entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest
your rights to work written entirely by you; rather, the intent is to
exercise the right to control the distribution of derivative or
collective works based on the Program.
In addition, mere aggregation of another work not based on the Program
with the Program (or with a work based on the Program) on a volume of
a storage or distribution medium does not bring the other work under
the scope of this License.
3. You may copy and distribute the Program (or a work based on it,
under Section 2) in object code or executable form under the terms of
Sections 1 and 2 above provided that you also do one of the following:
a) Accompany it with the complete corresponding machine-readable
source code, which must be distributed under the terms of Sections
1 and 2 above on a medium customarily used for software interchange; or,
b) Accompany it with a written offer, valid for at least three
years, to give any third party, for a charge no more than your
cost of physically performing source distribution, a complete
machine-readable copy of the corresponding source code, to be
distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange; or,
c) Accompany it with the information you received as to the offer
to distribute corresponding source code. (This alternative is
allowed only for noncommercial distribution and only if you
received the program in object code or executable form with such
an offer, in accord with Subsection b above.)
The source code for a work means the preferred form of the work for
making modifications to it. For an executable work, complete source
code means all the source code for all modules it contains, plus any
associated interface definition files, plus the scripts used to
control compilation and installation of the executable. However, as a
special exception, the source code distributed need not include
anything that is normally distributed (in either source or binary
form) with the major components (compiler, kernel, and so on) of the
operating system on which the executable runs, unless that component
itself accompanies the executable.
If distribution of executable or object code is made by offering
access to copy from a designated place, then offering equivalent
access to copy the source code from the same place counts as
distribution of the source code, even though third parties are not
compelled to copy the source along with the object code.
4. You may not copy, modify, sublicense, or distribute the Program
except as expressly provided under this License. Any attempt
otherwise to copy, modify, sublicense or distribute the Program is
void, and will automatically terminate your rights under this License.
However, parties who have received copies, or rights, from you under
this License will not have their licenses terminated so long as such
parties remain in full compliance.
5. You are not required to accept this License, since you have not
signed it. However, nothing else grants you permission to modify or
distribute the Program or its derivative works. These actions are
prohibited by law if you do not accept this License. Therefore, by
modifying or distributing the Program (or any work based on the
Program), you indicate your acceptance of this License to do so, and
all its terms and conditions for copying, distributing or modifying
the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the
Program), the recipient automatically receives a license from the
original licensor to copy, distribute or modify the Program subject to
these terms and conditions. You may not impose any further
restrictions on the recipients' exercise of the rights granted herein.
You are not responsible for enforcing compliance by third parties to
this License.
7. If, as a consequence of a court judgment or allegation of patent
infringement or for any other reason (not limited to patent issues),
conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot
distribute so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you
may not distribute the Program at all. For example, if a patent
license would not permit royalty-free redistribution of the Program by
all those who receive copies directly or indirectly through you, then
the only way you could satisfy both it and this License would be to
refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under
any particular circumstance, the balance of the section is intended to
apply and the section as a whole is intended to apply in other
circumstances.
It is not the purpose of this section to induce you to infringe any
patents or other property right claims or to contest validity of any
such claims; this section has the sole purpose of protecting the
integrity of the free software distribution system, which is
implemented by public license practices. Many people have made
generous contributions to the wide range of software distributed
through that system in reliance on consistent application of that
system; it is up to the author/donor to decide if he or she is willing
to distribute software through any other system and a licensee cannot
impose that choice.
This section is intended to make thoroughly clear what is believed to
be a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in
certain countries either by patents or by copyrighted interfaces, the
original copyright holder who places the Program under this License
may add an explicit geographical distribution limitation excluding
those countries, so that distribution is permitted only in or among
countries not thus excluded. In such case, this License incorporates
the limitation as if written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions
of the General Public License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.
Each version is given a distinguishing version number. If the Program
specifies a version number of this License which applies to it and "any
later version", you have the option of following the terms and conditions
either of that version or of any later version published by the Free
Software Foundation. If the Program does not specify a version number of
this License, you may choose any version ever published by the Free Software
Foundation.
10. If you wish to incorporate parts of the Program into other free
programs whose distribution conditions are different, write to the author
to ask for permission. For software which is copyrighted by the Free
Software Foundation, write to the Free Software Foundation; we sometimes
make exceptions for this. Our decision will be guided by the two goals
of preserving the free status of all derivatives of our free software and
of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest
possible use to the public, the best way to achieve this is to make it
free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest
to attach them to the start of each source file to most effectively
convey the exclusion of warranty; and each file should have at least
the "copyright" line and a pointer to where the full notice is found.
<one line to give the program's name and a brief idea of what it does.>
Copyright (C) 19yy <name of author>
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this
when it starts in an interactive mode:
Gnomovision version 69, Copyright (C) 19yy name of author
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
This is free software, and you are welcome to redistribute it
under certain conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate
parts of the General Public License. Of course, the commands you use may
be called something other than `show w' and `show c'; they could even be
mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your
school, if any, to sign a "copyright disclaimer" for the program, if
necessary. Here is a sample; alter the names:
Yoyodyne, Inc., hereby disclaims all copyright interest in the program
`Gnomovision' (which makes passes at compilers) written by James Hacker.
<signature of Ty Coon>, 1 April 1989
Ty Coon, President of Vice
This General Public License does not permit incorporating your program into
proprietary programs. If your program is a subroutine library, you may
consider it more useful to permit linking proprietary applications with the
library. If this is what you want to do, use the GNU Library General
Public License instead of this License.

View File

@@ -0,0 +1,307 @@
The following was generated from http://www.megastep.org/makeself/
-----------------------
makeself - Make self-extractable archives on Unix
[1]makeself.sh is a small shell script that generates a
self-extractable tar.gz archive from a directory. The resulting file
appears as a shell script (many of those have a .run suffix), and can
be launched as is. The archive will then uncompress itself to a
temporary directory and an optional arbitrary command will be executed
(for example an installation script). This is pretty similar to
archives generated with WinZip Self-Extractor in the Windows world.
Makeself archives also include checksums for integrity self-validation
(CRC and/or MD5 checksums).
The makeself.sh script itself is used only to create the archives from
a directory of files. The resultant archive is actually a compressed
(using gzip, bzip2, or compress) TAR archive, with a small shell
script stub at the beginning. This small stub performs all the steps
of extracting the files, running the embedded command, and removing
the temporary files when it's all over. All what the user has to do to
install the software contained in such an archive is to "run" the
archive, i.e sh nice-software.run. I recommend using the "run" (which
was introduced by some Makeself archives released by Loki Software) or
"sh" suffix for such archives not to confuse the users, since they
know it's actually shell scripts (with quite a lot of binary data
attached to it though!).
I am trying to keep the code of this script as portable as possible,
i.e it's not relying on any bash-specific features and only calls
commands that are installed on any functioning UNIX-compatible system.
This script as well as the archives it generates should run on any
Unix flavor, with any compatible Bourne shell, provided of course that
the compression programs are available.
As of version 2.1, Makeself has been rewritten and tested on the
following platforms :
* Linux (all distributions)
* Sun Solaris (8 tested)
* HP-UX (tested on 11.0 and 11i on HPPA RISC)
* SCO OpenUnix and OpenServer
* IBM AIX 5.1L
* MacOS X (Darwin)
* SGI IRIX 6.5
* FreeBSD
* UnicOS / Cray
If you successfully run Makeself and/or archives created with it on
another system, then [2]let me know!
Examples of publicly available archives made using makeself are :
* Game patches and installers for [3]Id Software games like Quake 3
for Linux or Return To Castle Wolfenstien ;
* All game patches released by [4]Loki Software for the Linux
version of popular games ;
* The [5]nVidia drivers for Linux
* The [6]Makeself distribution itself ;-)
* and countless others...
Important note for Apache users: By default, most Web servers will
think that Makeself archives are regular text files and thus they may
show up as text in a Web browser. The correct way to prevent this is
to add a MIME type for this file format, like so (in httpd.conf) :
AddType application/x-makeself .run
Important note for recent GNU/Linux distributions: Archives created
with Makeself prior to v2.1.2 were using an old syntax for the head
and tail Unix commands that is being progressively obsoleted in their
GNU forms. Therefore you may have problems uncompressing some of these
archives. A workaround for this is to set the environment variable
$_POSIX2_VERSION to enable the old syntax, i.e. :
export _POSIX2_VERSION=199209
Usage
The syntax of makeself is the following:
makeself.sh [args] archive_dir file_name label startup_script
[script_args]
* args are optional options for Makeself. The available ones are :
+ --version : Prints the version number on stdout, then exits
immediately
+ --gzip : Use gzip for compression (is the default on
platforms on which gzip is commonly available, like Linux)
+ --bzip2 : Use bzip2 instead of gzip for better compression.
The bzip2 command must be available in the command path. I
recommend that you set the prefix to something like
'.bz2.run' for the archive, so that potential users know that
they'll need bzip2 to extract it.
+ --compress : Use the UNIX "compress" command to compress the
data. This should be the default on all platforms that don't
have gzip available.
+ --nocomp : Do not use any compression for the archive, which
will then be an uncompressed TAR.
+ --notemp : The generated archive will not extract the files
to a temporary directory, but in a new directory created in
the current directory. This is better to distribute software
packages that may extract and compile by themselves (i.e.
launch the compilation through the embedded script).
+ --current : Files will be extracted to the current directory,
instead of in a subdirectory. This option implies --notemp
above.
+ --follow : Follow the symbolic links inside of the archive
directory, i.e. store the files that are being pointed to
instead of the links themselves.
+ --append (new in 2.1.x): Append data to an existing archive,
instead of creating a new one. In this mode, the settings
from the original archive are reused (compression type,
label, embedded script), and thus don't need to be specified
again on the command line.
+ --header : Makeself 2.0 uses a separate file to store the
header stub, called "makeself-header.sh". By default, it is
assumed that it is stored in the same location as
makeself.sh. This option can be used to specify its actual
location if it is stored someplace else.
+ --copy : Upon extraction, the archive will first extract
itself to a temporary directory. The main application of this
is to allow self-contained installers stored in a Makeself
archive on a CD, when the installer program will later need
to unmount the CD and allow a new one to be inserted. This
prevents "Filesystem busy" errors for installers that span
multiple CDs.
+ --nox11 : Disable the automatic spawning of a new terminal in
X11.
+ --nowait : When executed from a new X11 terminal, disable the
user prompt at the end of the script execution.
+ --nomd5 and --nocrc : Disable the creation of a MD5 / CRC
checksum for the archive. This speeds up the extraction
process if integrity checking is not necessary.
+ --lsm file : Provide and LSM file to makeself, that will be
embedded in the generated archive. LSM files are describing a
software package in a way that is easily parseable. The LSM
entry can then be later retrieved using the '-lsm' argument
to the archive. An exemple of a LSM file is provided with
Makeself.
* archive_dir is the name of the directory that contains the files
to be archived
* file_name is the name of the archive to be created
* label is an arbitrary text string describing the package. It will
be displayed while extracting the files.
* startup_script is the command to be executed from within the
directory of extracted files. Thus, if you wish to execute a
program contain in this directory, you must prefix your command
with "./". For example, ./program will be fine. The script_args
are additionnal arguments for this command.
Here is an example, assuming the user has a package image stored in a
/home/joe/mysoft, and he wants to generate a self-extracting package
named mysoft.sh, which will launch the "setup" script initially stored
in /home/joe/mysoft :
makeself.sh /home/joe/mysoft mysoft.sh "Joe's Nice Software Package"
./setup
Here is also how I created the [7]makeself.run archive which contains
the Makeself distribution :
makeself.sh --notemp makeself makeself.run "Makeself by Stephane
Peter" echo "Makeself has extracted itself"
Archives generated with Makeself 2.1 can be passed the following
arguments:
* --keep : Prevent the files to be extracted in a temporary
directory that will be removed after the embedded script's
execution. The files will then be extracted in the current working
directory and will stay here until you remove them.
* --verbose : Will prompt the user before executing the embedded
command
* --target dir : Allows to extract the archive in an arbitrary
place.
* --nox11 : Do not spawn a X11 terminal.
* --confirm : Prompt the user for confirmation before running the
embedded command.
* --info : Print out general information about the archive (does not
extract).
* --lsm : Print out the LSM entry, if it is present.
* --list : List the files in the archive.
* --check : Check the archive for integrity using the embedded
checksums. Does not extract the archive.
* --nochown : By default, a "chown -R" command is run on the target
directory after extraction, so that all files belong to the
current user. This is mostly needed if you are running as root, as
tar will then try to recreate the initial user ownerships. You may
disable this behavior with this flag.
* --tar : Run the tar command on the contents of the archive, using
the following arguments as parameter for the command.
* --noexec : Do not run the embedded script after extraction.
Any subsequent arguments to the archive will be passed as additional
arguments to the embedded command. You should explicitly use the --
special command-line construct before any such options to make sure
that Makeself will not try to interpret them.
License
Makeself is covered by the [8]GNU General Public License (GPL) version
2 and above. Archives generated by Makeself don't have to be placed
under this license (although I encourage it ;-)), since the archive
itself is merely data for Makeself.
Download
Get the latest official distribution [9]here (version 2.1.3).
The latest development version can be grabbed from the Loki Setup CVS
module, at [10]cvs.icculus.org.
Version history
* v1.0: Initial public release
* v1.1: The archive can be passed parameters that will be passed on
to the embedded script, thanks to John C. Quillan
* v1.2: Cosmetic updates, support for bzip2 compression and
non-temporary archives. Many ideas thanks to Francois Petitjean.
* v1.3: More patches from Bjarni R. Einarsson and Francois
Petitjean: Support for no compression (--nocomp), script is no
longer mandatory, automatic launch in an xterm, optional verbose
output, and -target archive option to indicate where to extract
the files.
* v1.4: Many patches from Francois Petitjean: improved UNIX
compatibility, automatic integrity checking, support of LSM files
to get info on the package at run time..
* v1.5.x: A lot of bugfixes, and many other patches, including
automatic verification through the usage of checksums. Version
1.5.5 was the stable release for a long time, even though the Web
page didn't get updated ;-). Makeself was also officially made a
part of the [11]Loki Setup installer, and its source is being
maintained as part of this package.
* v2.0: Complete internal rewrite of Makeself. The command-line
parsing was vastly improved, the overall maintenance of the
package was greatly improved by separating the stub from
makeself.sh. Also Makeself was ported and tested to a variety of
Unix platforms.
* v2.0.1: First public release of the new 2.0 branch. Prior versions
are officially obsoleted. This release introduced the '--copy'
argument that was introduced in response to a need for the
[12]UT2K3 Linux installer.
* v2.1.0: Big change : Makeself can now support multiple embedded
tarballs, each stored separately with their own checksums. An
existing archive can be updated with the --append flag. Checksums
are also better managed, and the --nochown option for archives
appeared.
* v2.1.1: Fixes related to the Unix compression (compress command).
Some Linux distributions made the insane choice to make it
unavailable, even though gzip is capable of uncompressing these
files, plus some more bugfixes in the extraction and checksum
code.
* v2.1.2: Some bug fixes. Use head -n to avoid problems with POSIX
conformance.
* v2.1.3: Bug fixes with the command line when spawning terminals.
Added --tar, --noexec for archives. Added --nomd5 and --nomd5 to
avoid creating checksums in archives. The embedded script is now
run through "eval". The --info output now includes the command
used to create the archive. A man page was contributed by Bartosz
Fenski.
Links
* Check out the [13]"Loki setup" installer, used to install many
Linux games and other applications, and of which I am the
co-author. Since the demise of Loki, I am now the official
maintainer of the project, and it is now being hosted on
[14]icculus.org, as well as a bunch of other ex-Loki projects (and
a lot of other good stuff!).
* Bjarni R. Einarsson also wrote the setup.sh installer script,
inspired by Makeself. [15]Check it out !
Contact
This script was written by [16]Stéphane Peter (megastep at
megastep.org) I welcome any enhancements and suggestions.
Contributions were included from John C. Quillan, Bjarni R. Einarsson,
Francois Petitjean, and Ryan C. Gordon, thanks to them! If you think I
forgot your name, don't hesitate to contact me.
icculus.org also has a [17]Bugzilla server available that allows bug
reports to be submitted for Loki setup, and since Makeself is a part
of Loki setup, you can submit bug reports from there!
_________________________________________________________________
[18]Stéphane Peter
Last modified: Sun May 2 00:08:49 PDT 2004
References
1. http://www.megastep.org/makeself/makeself.run
2. mailto:megastep@REMOVEME.megastep.org
3. http://www.idsoftware.com/
4. http://www.lokigames.com/products/myth2/updates.php3
5. http://www.nvidia.com/
6. http://www.megastep.org/makeself/makeself.run
7. http://www.megastep.org/makeself/makeself.run
8. http://www.gnu.org/copyleft/gpl.html
9. http://www.megastep.org/makeself/makeself-2.1.3.run
10. http://cvs.icculus.org/
11. http://www.icculus.org/loki_setup/
12. http://www.unrealtournament2003.com/
13. http://www.icculus.org/loki_setup/
14. http://www.icculus.org/
15. http://www.mmedia.is/~bre/programs/setup.sh/
16. mailto:megastep@@megastep.org
17. https://bugzilla.icculus.org/
18. mailto:megastep@@megastep.org

View File

@@ -0,0 +1,6 @@
What needs to be done next :
- Generic compression code (thru a user-defined command)
- Collect names of directories potentially containing md5 program. GUESS_MD5_PATH
Stéphane Peter <megastep@megastep.org>

View File

@@ -0,0 +1,373 @@
cat << EOF > "$archname"
#!/bin/sh
# This script was generated using Makeself $MS_VERSION
CRCsum="$CRCsum"
MD5="$MD5sum"
TMPROOT=\${TMPDIR:=/tmp}
label="$LABEL"
script="$SCRIPT"
scriptargs="$SCRIPTARGS"
targetdir="$archdirname"
filesizes="$filesizes"
keep=$KEEP
print_cmd_arg=""
if type printf > /dev/null; then
print_cmd="printf"
elif test -x /usr/ucb/echo; then
print_cmd="/usr/ucb/echo"
else
print_cmd="echo"
fi
MS_Printf()
{
\$print_cmd \$print_cmd_arg "\$1"
}
MS_Progress()
{
while read a; do
MS_Printf .
done
}
MS_dd()
{
blocks=\`expr \$3 / 1024\`
bytes=\`expr \$3 % 1024\`
dd if="\$1" ibs=\$2 skip=1 obs=1024 conv=sync 2> /dev/null | \\
{ test \$blocks -gt 0 && dd ibs=1024 obs=1024 count=\$blocks ; \\
test \$bytes -gt 0 && dd ibs=1 obs=1024 count=\$bytes ; } 2> /dev/null
}
MS_Help()
{
cat << EOH >&2
Makeself version $MS_VERSION
1) Getting help or info about \$0 :
\$0 --help Print this message
\$0 --info Print embedded info : title, default target directory, embedded script ...
\$0 --lsm Print embedded lsm entry (or no LSM)
\$0 --list Print the list of files in the archive
\$0 --check Checks integrity of the archive
2) Running \$0 :
\$0 [options] [--] [additional arguments to embedded script]
with following options (in that order)
--confirm Ask before running embedded script
--noexec Do not run embedded script
--keep Do not erase target directory after running
the embedded script
--nox11 Do not spawn an xterm
--nochown Do not give the extracted files to the current user
--target NewDirectory Extract in NewDirectory
--tar arg1 [arg2 ...] Access the contents of the archive through the tar command
-- Following arguments will be passed to the embedded script
EOH
}
MS_Check()
{
OLD_PATH=\$PATH
PATH=\${GUESS_MD5_PATH:-"\$OLD_PATH:/bin:/usr/bin:/sbin:/usr/local/ssl/bin:/usr/local/bin:/opt/openssl/bin"}
MD5_PATH=\`exec 2>&-; which md5sum || type md5sum\`
MD5_PATH=\${MD5_PATH:-\`exec 2>&-; which md5 || type md5\`}
PATH=\$OLD_PATH
MS_Printf "Verifying archive integrity..."
offset=\`head -n $SKIP "\$1" | wc -c | tr -d " "\`
verb=\$2
i=1
for s in \$filesizes
do
crc=\`echo \$CRCsum | cut -d" " -f\$i\`
if test -x "\$MD5_PATH"; then
md5=\`echo \$MD5 | cut -d" " -f\$i\`
if test \$md5 = "00000000000000000000000000000000"; then
test x\$verb = xy && echo " \$1 does not contain an embedded MD5 checksum." >&2
else
md5sum=\`MS_dd "\$1" \$offset \$s | "\$MD5_PATH" | cut -b-32\`;
if test "\$md5sum" != "\$md5"; then
echo "Error in MD5 checksums: \$md5sum is different from \$md5" >&2
exit 2
else
test x\$verb = xy && MS_Printf " MD5 checksums are OK." >&2
fi
crc="0000000000"; verb=n
fi
fi
if test \$crc = "0000000000"; then
test x\$verb = xy && echo " \$1 does not contain a CRC checksum." >&2
else
sum1=\`MS_dd "\$1" \$offset \$s | CMD_ENV=xpg4 cksum | awk '{print \$1}'\`
if test "\$sum1" = "\$crc"; then
test x\$verb = xy && MS_Printf " CRC checksums are OK." >&2
else
echo "Error in checksums: \$sum1 is different from \$crc"
exit 2;
fi
fi
i=\`expr \$i + 1\`
offset=\`expr \$offset + \$s\`
done
echo " All good."
}
UnTAR()
{
tar \$1vf - 2>&1 || { echo Extraction failed. > /dev/tty; kill -15 \$$; }
}
finish=true
xterm_loop=
nox11=$NOX11
copy=$COPY
ownership=y
verbose=n
initargs="\$@"
while true
do
case "\$1" in
-h | --help)
MS_Help
exit 0
;;
--info)
echo Identification: "\$label"
echo Target directory: "\$targetdir"
echo Uncompressed size: $USIZE KB
echo Compression: $COMPRESS
echo Date of packaging: $DATE
echo Built with Makeself version $MS_VERSION on $OSTYPE
echo Build command was: "$MS_COMMAND"
if test x\$script != x; then
echo Script run after extraction:
echo " " \$script \$scriptargs
fi
if test x"$copy" = xcopy; then
echo "Archive will copy itself to a temporary location"
fi
if test x"$KEEP" = xy; then
echo "directory \$targetdir is permanent"
else
echo "\$targetdir will be removed after extraction"
fi
exit 0
;;
--dumpconf)
echo LABEL=\"\$label\"
echo SCRIPT=\"\$script\"
echo SCRIPTARGS=\"\$scriptargs\"
echo archdirname=\"$archdirname\"
echo KEEP=$KEEP
echo COMPRESS=$COMPRESS
echo filesizes=\"\$filesizes\"
echo CRCsum=\"\$CRCsum\"
echo MD5sum=\"\$MD5\"
echo OLDUSIZE=$USIZE
echo OLDSKIP=`expr $SKIP + 1`
exit 0
;;
--lsm)
cat << EOLSM
EOF
eval "$LSM_CMD"
cat << EOF >> "$archname"
EOLSM
exit 0
;;
--list)
echo Target directory: \$targetdir
offset=\`head -n $SKIP "\$0" | wc -c | tr -d " "\`
for s in \$filesizes
do
MS_dd "\$0" \$offset \$s | eval "$GUNZIP_CMD" | UnTAR t
offset=\`expr \$offset + \$s\`
done
exit 0
;;
--tar)
offset=\`head -n $SKIP "\$0" | wc -c | tr -d " "\`
arg1="\$2"
shift 2
for s in \$filesizes
do
MS_dd "\$0" \$offset \$s | eval "$GUNZIP_CMD" | tar "\$arg1" - \$*
offset=\`expr \$offset + \$s\`
done
exit 0
;;
--check)
MS_Check "\$0" y
exit 0
;;
--confirm)
verbose=y
shift
;;
--noexec)
script=""
shift
;;
--keep)
keep=y
shift
;;
--target)
keep=y
targetdir=\${2:-.}
shift 2
;;
--nox11)
nox11=y
shift
;;
--nochown)
ownership=n
shift
;;
--xwin)
finish="echo Press Return to close this window...; read junk"
xterm_loop=1
shift
;;
--phase2)
copy=phase2
shift
;;
--)
shift
break ;;
-*)
echo Unrecognized flag : "\$1" >&2
MS_Help
exit 1
;;
*)
break ;;
esac
done
case "\$copy" in
copy)
tmpdir=\$TMPROOT/makeself.\$RANDOM.\`date +"%y%m%d%H%M%S"\`.\$\$
mkdir "\$tmpdir" || {
echo "Could not create temporary directory \$tmpdir" >&2
exit 1
}
SCRIPT_COPY="\$tmpdir/makeself"
echo "Copying to a temporary location..." >&2
cp "\$0" "\$SCRIPT_COPY"
chmod +x "\$SCRIPT_COPY"
cd "\$TMPROOT"
exec "\$SCRIPT_COPY" --phase2
;;
phase2)
finish="\$finish ; rm -rf \`dirname \$0\`"
;;
esac
if test "\$nox11" = "n"; then
if tty -s; then # Do we have a terminal?
:
else
if test x"\$DISPLAY" != x -a x"\$xterm_loop" = x; then # No, but do we have X?
if xset q > /dev/null 2>&1; then # Check for valid DISPLAY variable
GUESS_XTERMS="xterm rxvt dtterm eterm Eterm kvt konsole aterm"
for a in \$GUESS_XTERMS; do
if type \$a >/dev/null 2>&1; then
XTERM=\$a
break
fi
done
chmod a+x \$0 || echo Please add execution rights on \$0
if test \`echo "\$0" | cut -c1\` = "/"; then # Spawn a terminal!
exec \$XTERM -title "\$label" -e "\$0" --xwin "\$initargs"
else
exec \$XTERM -title "\$label" -e "./\$0" --xwin "\$initargs"
fi
fi
fi
fi
fi
if test "\$targetdir" = "."; then
tmpdir="."
else
if test "\$keep" = y; then
echo "Creating directory \$targetdir" >&2
tmpdir="\$targetdir"
dashp="-p"
else
tmpdir="\$TMPROOT/selfgz\$\$\$RANDOM"
dashp=""
fi
mkdir \$dashp \$tmpdir || {
echo 'Cannot create target directory' \$tmpdir >&2
echo 'You should try option --target OtherDirectory' >&2
eval \$finish
exit 1
}
fi
location="\`pwd\`"
if test x\$SETUP_NOCHECK != x1; then
MS_Check "\$0"
fi
offset=\`head -n $SKIP "\$0" | wc -c | tr -d " "\`
if test x"\$verbose" = xy; then
MS_Printf "About to extract $USIZE KB in \$tmpdir ... Proceed ? [Y/n] "
read yn
if test x"\$yn" = xn; then
eval \$finish; exit 1
fi
fi
MS_Printf "Uncompressing \$label"
res=3
if test "\$keep" = n; then
trap 'echo Signal caught, cleaning up >&2; cd \$TMPROOT; /bin/rm -rf \$tmpdir; eval \$finish; exit 15' 1 2 3 15
fi
for s in \$filesizes
do
if MS_dd "\$0" \$offset \$s | eval "$GUNZIP_CMD" | ( cd "\$tmpdir"; UnTAR x ) | MS_Progress; then
if test x"\$ownership" = xy; then
(PATH=/usr/xpg4/bin:\$PATH; cd "\$tmpdir"; chown -R \`id -u\` .; chgrp -R \`id -g\` .)
fi
else
echo
echo "Unable to decompress \$0" >&2
eval \$finish; exit 1
fi
offset=\`expr \$offset + \$s\`
done
echo
cd "\$tmpdir"
res=0
if test x"\$script" != x; then
if test x"\$verbose" = xy; then
MS_Printf "OK to execute: \$script \$scriptargs \$* ? [Y/n] "
read yn
if test x"\$yn" = x -o x"\$yn" = xy -o x"\$yn" = xY; then
eval \$script \$scriptargs \$*; res=\$?;
fi
else
eval \$script \$scriptargs \$*; res=\$?
fi
if test \$res -ne 0; then
test x"\$verbose" = xy && echo "The program '\$script' returned an error code (\$res)" >&2
fi
fi
if test "\$keep" = n; then
cd \$TMPROOT
/bin/rm -rf \$tmpdir
fi
eval \$finish; exit \$res
EOF

View File

@@ -0,0 +1,76 @@
.TH "makeself" "1" "2.1.3"
.SH "NAME"
makeself \- An utility to generate self-extractable archives.
.SH "SYNTAX"
.LP
.B makeself [\fIoptions\fP] archive_dir file_name label
.B [\fIstartup_script\fP] [\fIargs\fP]
.SH "DESCRIPTION"
.LP
This program is a free (GPL) utility designed to create self-extractable
archives from a directory.
.br
.SH "OPTIONS"
.LP
The following options are supported.
.LP
.TP 15
.B -v, --version
Prints out the makeself version number and exits.
.TP
.B -h, --help
Print out help information.
.TP
.B --gzip
Compress using gzip (default if detected).
.TP
.B --bzip2
Compress using bzip2.
.TP
.B --compress
Compress using the UNIX 'compress' command.
.TP
.B --nocomp
Do not compress the data.
.TP
.B --notemp
The archive will create archive_dir in the current directory and
uncompress in ./archive_dir.
.TP
.B --copy
Upon extraction, the archive will first copy itself to a temporary directory.
.TP
.B --append
Append more files to an existing makeself archive.
The label and startup scripts will then be ignored.
.TP
.B --current
Files will be extracted to the current directory. Implies --notemp.
.TP
.B --header file
Specify location of the header script.
.TP
.B --follow
Follow the symlinks in the archive.
.TP
.B --nox11
Disable automatic spawn of an xterm if running in X11.
.TP
.B --nowait
Do not wait for user input after executing embedded program from an xterm.
.TP
.B --nomd5
Do not create a MD5 checksum for the archive.
.TP
.B --nocrc
Do not create a CRC32 checksum for the archive.
.TP
.B --lsm file
LSM file describing the package.
.PD
.SH "AUTHORS"
.LP
Makeself has been written by Stéphane Peter <megastep@megastep.org>.
.BR
This man page was originally written by Bartosz Fenski <fenio@o2.pl> for the
Debian GNU/Linux distribution (but it may be used by others).

View File

@@ -0,0 +1,16 @@
Begin3
Title: makeself.sh
Version: 2.1
Description: makeself.sh is a shell script that generates a self-extractable
tar.gz archive from a directory. The resulting file appears as a shell
script, and can be launched as is. The archive will then uncompress
itself to a temporary directory and an arbitrary command will be
executed (for example an installation script). This is pretty similar
to archives generated with WinZip Self-Extractor in the Windows world.
Keywords: Installation archive tar winzip
Author: Stéphane Peter (megastep@megastep.org)
Maintained-by: Stéphane Peter (megastep@megastep.org)
Original-site: http://www.megastep.org/makeself/
Platform: Unix
Copying-policy: GPL
End

View File

@@ -0,0 +1,374 @@
#!/bin/sh
#
# Makeself version 2.1.x
# by Stephane Peter <megastep@megastep.org>
#
# $Id: makeself.sh,v 1.51 2004/09/07 22:16:53 megastep Exp $
#
# Utility to create self-extracting tar.gz archives.
# The resulting archive is a file holding the tar.gz archive with
# a small Shell script stub that uncompresses the archive to a temporary
# directory and then executes a given script from withing that directory.
#
# Makeself home page: http://www.megastep.org/makeself/
#
# Version 2.0 is a rewrite of version 1.0 to make the code easier to read and maintain.
#
# Version history :
# - 1.0 : Initial public release
# - 1.1 : The archive can be passed parameters that will be passed on to
# the embedded script, thanks to John C. Quillan
# - 1.2 : Package distribution, bzip2 compression, more command line options,
# support for non-temporary archives. Ideas thanks to Francois Petitjean
# - 1.3 : More patches from Bjarni R. Einarsson and Francois Petitjean:
# Support for no compression (--nocomp), script is no longer mandatory,
# automatic launch in an xterm, optional verbose output, and -target
# archive option to indicate where to extract the files.
# - 1.4 : Improved UNIX compatibility (Francois Petitjean)
# Automatic integrity checking, support of LSM files (Francois Petitjean)
# - 1.5 : Many bugfixes. Optionally disable xterm spawning.
# - 1.5.1 : More bugfixes, added archive options -list and -check.
# - 1.5.2 : Cosmetic changes to inform the user of what's going on with big
# archives (Quake III demo)
# - 1.5.3 : Check for validity of the DISPLAY variable before launching an xterm.
# More verbosity in xterms and check for embedded command's return value.
# Bugfix for Debian 2.0 systems that have a different "print" command.
# - 1.5.4 : Many bugfixes. Print out a message if the extraction failed.
# - 1.5.5 : More bugfixes. Added support for SETUP_NOCHECK environment variable to
# bypass checksum verification of archives.
# - 1.6.0 : Compute MD5 checksums with the md5sum command (patch from Ryan Gordon)
# - 2.0 : Brand new rewrite, cleaner architecture, separated header and UNIX ports.
# - 2.0.1 : Added --copy
# - 2.1.0 : Allow multiple tarballs to be stored in one archive, and incremental updates.
# Added --nochown for archives
# Stopped doing redundant checksums when not necesary
# - 2.1.1 : Work around insane behavior from certain Linux distros with no 'uncompress' command
# Cleaned up the code to handle error codes from compress. Simplified the extraction code.
# - 2.1.2 : Some bug fixes. Use head -n to avoid problems.
# - 2.1.3 : Bug fixes with command line when spawning terminals.
# Added --tar for archives, allowing to give arbitrary arguments to tar on the contents of the archive.
# Added --noexec to prevent execution of embedded scripts.
# Added --nomd5 and --nocrc to avoid creating checksums in archives.
# Added command used to create the archive in --info output.
# Run the embedded script through eval.
# - 2.1.4 : Fixed --info output.
# Generate random directory name when extracting files to . to avoid problems. (Jason Trent)
# Better handling of errors with wrong permissions for the directory containing the files. (Jason Trent)
# Avoid some race conditions (Ludwig Nussel)
#
# (C) 1998-2004 by Stéphane Peter <megastep@megastep.org>
#
# This software is released under the terms of the GNU GPL version 2 and above
# Please read the license at http://www.gnu.org/copyleft/gpl.html
#
MS_VERSION=2.1.4
MS_COMMAND="$0"
for f in "${1+"$@"}"; do
MS_COMMAND="$MS_COMMAND \\\\
\\\"$f\\\""
done
# Procedures
MS_Usage()
{
echo "Usage: $0 [params] archive_dir file_name label [startup_script] [args]"
echo "params can be one or more of the following :"
echo " --version | -v : Print out Makeself version number and exit"
echo " --help | -h : Print out this help message"
echo " --gzip : Compress using gzip (default if detected)"
echo " --bzip2 : Compress using bzip2 instead of gzip"
echo " --compress : Compress using the UNIX 'compress' command"
echo " --nocomp : Do not compress the data"
echo " --notemp : The archive will create archive_dir in the"
echo " current directory and uncompress in ./archive_dir"
echo " --copy : Upon extraction, the archive will first copy itself to"
echo " a temporary directory"
echo " --append : Append more files to an existing Makeself archive"
echo " The label and startup scripts will then be ignored"
echo " --current : Files will be extracted to the current directory."
echo " Implies --notemp."
echo " --nomd5 : Don't calculate an MD5 for archive"
echo " --nocrc : Don't calculate a CRC for archive"
echo " --header file : Specify location of the header script"
echo " --follow : Follow the symlinks in the archive"
echo " --nox11 : Disable automatic spawn of a xterm"
echo " --nowait : Do not wait for user input after executing embedded"
echo " program from an xterm"
echo " --lsm file : LSM file describing the package"
echo
echo "Do not forget to give a fully qualified startup script name"
echo "(i.e. with a ./ prefix if inside the archive)."
exit 1
}
# Default settings
if type gzip 2>&1 > /dev/null; then
COMPRESS=gzip
else
COMPRESS=Unix
fi
KEEP=n
CURRENT=n
NOX11=n
APPEND=n
COPY=none
TAR_ARGS=cvf
HEADER=`dirname $0`/makeself-header.sh
# LSM file stuff
LSM_CMD="echo No LSM. >> \"\$archname\""
while true
do
case "$1" in
--version | -v)
echo Makeself version $MS_VERSION
exit 0
;;
--bzip2)
COMPRESS=bzip2
shift
;;
--gzip)
COMPRESS=gzip
shift
;;
--compress)
COMPRESS=Unix
shift
;;
--nocomp)
COMPRESS=none
shift
;;
--notemp)
KEEP=y
shift
;;
--copy)
COPY=copy
shift
;;
--current)
CURRENT=y
KEEP=y
shift
;;
--header)
HEADER="$2"
shift 2
;;
--follow)
TAR_ARGS=cvfh
shift
;;
--nox11)
NOX11=y
shift
;;
--nowait)
shift
;;
--nomd5)
NOMD5=y
shift
;;
--nocrc)
NOCRC=y
shift
;;
--append)
APPEND=y
shift
;;
--lsm)
LSM_CMD="cat \"$2\" >> \"\$archname\""
shift 2
;;
-h | --help)
MS_Usage
;;
-*)
echo Unrecognized flag : "$1"
MS_Usage
;;
*)
break
;;
esac
done
archdir="$1"
archname="$2"
if test "$APPEND" = y; then
if test $# -lt 2; then
MS_Usage
fi
# Gather the info from the original archive
OLDENV=`sh "$archname" --dumpconf`
if test $? -ne 0; then
echo "Unable to update archive: $archname" >&2
exit 1
else
eval "$OLDENV"
fi
else
if test "$KEEP" = n -a $# = 3; then
echo "ERROR: Making a temporary archive with no embedded command does not make sense!" >&2
echo
MS_Usage
fi
# We don't really want to create an absolute directory...
if test "$CURRENT" = y; then
archdirname="."
else
archdirname=`basename "$1"`
fi
if test $# -lt 3; then
MS_Usage
fi
LABEL="$3"
SCRIPT="$4"
test x$SCRIPT = x || shift 1
shift 3
SCRIPTARGS="$*"
fi
if test "$KEEP" = n -a "$CURRENT" = y; then
echo "ERROR: It is A VERY DANGEROUS IDEA to try to combine --notemp and --current." >&2
exit 1
fi
case $COMPRESS in
gzip)
GZIP_CMD="gzip -c9"
GUNZIP_CMD="gzip -cd"
;;
bzip2)
GZIP_CMD="bzip2 -9"
GUNZIP_CMD="bzip2 -d"
;;
Unix)
GZIP_CMD="compress -cf"
GUNZIP_CMD="exec 2>&-; uncompress -c || test \\\$? -eq 2 || gzip -cd"
;;
none)
GZIP_CMD="cat"
GUNZIP_CMD="cat"
;;
esac
tmpfile="${TMPDIR:=/tmp}/mkself$$"
if test -f $HEADER; then
oldarchname="$archname"
archname="$tmpfile"
# Generate a fake header to count its lines
SKIP=0
. $HEADER
SKIP=`cat "$tmpfile" |wc -l`
# Get rid of any spaces
SKIP=`expr $SKIP`
rm -f "$tmpfile"
echo Header is $SKIP lines long >&2
archname="$oldarchname"
else
echo "Unable to open header file: $HEADER" >&2
exit 1
fi
echo
if test "$APPEND" = n; then
if test -f "$archname"; then
echo "WARNING: Overwriting existing file: $archname" >&2
fi
fi
USIZE=`du -ks $archdir | cut -f1`
DATE=`LC_ALL=C date`
if test "." = "$archdirname"; then
if test "$KEEP" = n; then
archdirname="makeself-$$-`date +%Y%m%d%H%M%S`"
fi
fi
echo About to compress $USIZE KB of data...
echo Adding files to archive named \"$archname\"...
(cd "$archdir" && ( tar $TAR_ARGS - * | eval "$GZIP_CMD" ) >> "$tmpfile") || { echo Aborting: Archive directory not found or temporary file: "$tmpfile" could not be created.; rm -f "$tmpfile"; exit 1; }
echo >> "$tmpfile" >&- # try to close the archive
fsize=`cat "$tmpfile" | wc -c | tr -d " "`
# Compute the checksums
md5sum=00000000000000000000000000000000
crcsum=0000000000
if test "$NOCRC" = y; then
echo "skipping crc at user request"
else
crcsum=`cat "$tmpfile" | CMD_ENV=xpg4 cksum | sed -e 's/ /Z/' -e 's/ /Z/' | cut -dZ -f1`
echo "CRC: $crcsum"
fi
# Try to locate a MD5 binary
OLD_PATH=$PATH
PATH=${GUESS_MD5_PATH:-"$OLD_PATH:/bin:/usr/bin:/sbin:/usr/local/ssl/bin:/usr/local/bin:/opt/openssl/bin"}
MD5_PATH=`type -p md5sum`
MD5_PATH=${MD5_PATH:-`type -p md5`}
PATH=$OLD_PATH
if test "$NOMD5" = y; then
echo "skipping md5sum at user request"
else
if test -x "$MD5_PATH"; then
md5sum=`cat "$tmpfile" | "$MD5_PATH" | cut -b-32`;
echo "MD5: $md5sum"
else
echo "MD5: none, md5sum binary not found"
fi
fi
if test "$APPEND" = y; then
mv "$archname" "$archname".bak || exit
# Prepare entry for new archive
filesizes="$filesizes $fsize"
CRCsum="$CRCsum $crcsum"
MD5sum="$MD5sum $md5sum"
USIZE=`expr $USIZE + $OLDUSIZE`
# Generate the header
. $HEADER
# Append the original data
tail -n +$OLDSKIP "$archname".bak >> "$archname"
# Append the new data
cat "$tmpfile" >> "$archname"
chmod +x "$archname"
rm -f "$archname".bak
echo Self-extractible archive \"$archname\" successfully updated.
else
filesizes="$fsize"
CRCsum="$crcsum"
MD5sum="$md5sum"
# Generate the header
. $HEADER
# Append the compressed tar data after the stub
echo
cat "$tmpfile" >> "$archname"
chmod +x "$archname"
echo Self-extractible archive \"$archname\" successfully created.
fi
rm -f "$tmpfile"

View File

@@ -0,0 +1,7 @@
#!/bin/sh
# Grab the Makeself web page
echo The following was generated from http://www.megastep.org/makeself/ > README
echo ----------------------- >> README
echo >> README
lynx -dump http://www.megastep.org/makeself/ >> README