#!/bin/sh
# Set initial variables:
CWD=`pwd`
TMP=/tmp
PKG=$TMP/package-portmap
VERSION=5.0
ARCH=alpha
BUILD=2

mkdir -p $PKG
( cd $TMP
tar xzf $CWD/portmap_5.tar.gz
cd portmap_5beta
chown -R root.root .
zcat $CWD/portmap_5-2.1.diff.gz | patch -p1
mkdir -p $PKG/usr/doc/portmap-5.0
cp -a BLURB CHANGES README $PKG/usr/doc/portmap-5.0
chmod 644 $PKG/usr/doc/portmap-5.0/*
make
strip portmap pmap_dump pmap_set
mkdir -p $PKG/sbin
cat portmap > $PKG/sbin/rpc.portmap
chmod 755 $PKG/sbin/rpc.portmap
chown -R root.bin $PKG/sbin
mkdir -p $PKG/usr/sbin
cat pmap_dump > $PKG/usr/sbin/pmap_dump
cat pmap_set > $PKG/usr/sbin/pmap_set
chmod 755 $PKG/usr/sbin/*
chown -R root.bin $PKG/usr/sbin
mkdir -p $PKG/usr/man/man8
for file in *.8 ; do
  cat ${file} | gzip -9c > $PKG/usr/man/man8/${file}.gz
done
( cd $PKG/usr/man/man8 ; ln -sf portmap.8.gz rpc.portmap.8.gz )
# Now let's add a recent version of /etc/rpc for good measure:
if [ -r /etc/rpc ]; then
  mkdir -p $PKG/etc
  cp -a /etc/rpc $PKG/etc/rpc
else
  echo "WARNING: no /etc/rpc on this system, can't include!"
  echo -n "hit enter..."
  read errorfodder
  echo
fi
mkdir -p $PKG/etc/rc.d
zcat $CWD/rc.portmap.gz > $PKG/etc/rc.d/rc.portmap.new
# Off by default.  I trust portmap (by itself) to not be a security problem,
# but better safe...
chmod 644 $PKG/etc/rc.d/rc.portmap.new
mkdir -p $PKG/install
cat $CWD/slack-desc > $PKG/install/slack-desc
zcat $CWD/doinst.sh.gz > $PKG/install/doinst.sh
cd $PKG
makepkg -l y -c n $TMP/portmap-$VERSION-$ARCH-$BUILD.tgz
) 2>&1 | tee $TMP/portmap.build.log
