* [gentoo-commits] repo/gentoo:master commit in: kde-frameworks/kimageformats/, kde-frameworks/kimageformats/files/
@ 2022-10-18 21:37 Andreas Sturmlechner
0 siblings, 0 replies; 3+ messages in thread
From: Andreas Sturmlechner @ 2022-10-18 21:37 UTC (permalink / raw
To: gentoo-commits
commit: 959799bb81f7b422193a758a05a90607cbb0394e
Author: Andreas Sturmlechner <asturm <AT> gentoo <DOT> org>
AuthorDate: Tue Oct 18 21:34:06 2022 +0000
Commit: Andreas Sturmlechner <asturm <AT> gentoo <DOT> org>
CommitDate: Tue Oct 18 21:37:30 2022 +0000
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=959799bb
kde-frameworks/kimageformats: More AVIF fixes, support 0.11.0
Backporting upstream commits:
bfb12093ad7a0624aa0b779bacf1377bd86c551d
f475a4b24a166d7582163753bc2f4f254257daed
Bug: https://bugs.gentoo.org/877501
Signed-off-by: Andreas Sturmlechner <asturm <AT> gentoo.org>
.../files/kimageformats-5.99.0-avif-0.11.0.patch | 51 ++++++++++++++++
.../files/kimageformats-5.99.0-avif-perf-3.patch | 70 ++++++++++++++++++++++
.../kimageformats/kimageformats-5.99.0-r2.ebuild | 47 +++++++++++++++
3 files changed, 168 insertions(+)
diff --git a/kde-frameworks/kimageformats/files/kimageformats-5.99.0-avif-0.11.0.patch b/kde-frameworks/kimageformats/files/kimageformats-5.99.0-avif-0.11.0.patch
new file mode 100644
index 000000000000..8f605331f365
--- /dev/null
+++ b/kde-frameworks/kimageformats/files/kimageformats-5.99.0-avif-0.11.0.patch
@@ -0,0 +1,51 @@
+From f475a4b24a166d7582163753bc2f4f254257daed Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Daniel=20Novomesk=C3=BD?= <dnovomesky@gmail.com>
+Date: Tue, 11 Oct 2022 14:36:17 +0200
+Subject: [PATCH] avif: revert 9ac923ad09316dcca0fc11e0be6b3dfc6cce6ca0 commit
+
+Changes to libavif's avifImageRGBToYUV() API were reverted too.
+---
+ src/imageformats/avif.cpp | 11 +----------
+ 1 file changed, 1 insertion(+), 10 deletions(-)
+
+diff --git a/src/imageformats/avif.cpp b/src/imageformats/avif.cpp
+index ccb4c56..7721c1b 100644
+--- a/src/imageformats/avif.cpp
++++ b/src/imageformats/avif.cpp
+@@ -336,7 +336,7 @@ bool QAVIFHandler::decode_one_frame()
+ rgb.format = AVIF_RGB_FORMAT_ARGB;
+ #endif
+
+-#if (AVIF_VERSION >= 80400) && (AVIF_VERSION <= 100100)
++#if AVIF_VERSION >= 80400
+ if (m_decoder->imageCount > 1) {
+ /* accelerate animated AVIF */
+ rgb.chromaUpsampling = AVIF_CHROMA_UPSAMPLING_FASTEST;
+@@ -351,12 +351,7 @@ bool QAVIFHandler::decode_one_frame()
+ rgb.rowBytes = result.bytesPerLine();
+ rgb.pixels = result.bits();
+
+-#if AVIF_VERSION >= 100101
+- // use faster decoding for animations
+- avifResult res = avifImageYUVToRGB(m_decoder->image, &rgb, (m_decoder->imageCount > 1) ? AVIF_CHROMA_UPSAMPLING_NEAREST : AVIF_YUV_TO_RGB_DEFAULT);
+-#else
+ avifResult res = avifImageYUVToRGB(m_decoder->image, &rgb);
+-#endif
+ if (res != AVIF_RESULT_OK) {
+ qWarning("ERROR in avifImageYUVToRGB: %s", avifResultToString(res));
+ return false;
+@@ -782,11 +777,7 @@ bool QAVIFHandler::write(const QImage &image)
+ }
+ }
+
+-#if AVIF_VERSION >= 100101
+- res = avifImageRGBToYUV(avif, &rgb, AVIF_RGB_TO_YUV_DEFAULT);
+-#else
+ res = avifImageRGBToYUV(avif, &rgb);
+-#endif
+ if (res != AVIF_RESULT_OK) {
+ qWarning("ERROR in avifImageRGBToYUV: %s", avifResultToString(res));
+ return false;
+--
+GitLab
+
diff --git a/kde-frameworks/kimageformats/files/kimageformats-5.99.0-avif-perf-3.patch b/kde-frameworks/kimageformats/files/kimageformats-5.99.0-avif-perf-3.patch
new file mode 100644
index 000000000000..1cc9f2f99895
--- /dev/null
+++ b/kde-frameworks/kimageformats/files/kimageformats-5.99.0-avif-perf-3.patch
@@ -0,0 +1,70 @@
+From bfb12093ad7a0624aa0b779bacf1377bd86c551d Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Daniel=20Novomesk=C3=BD?= <dnovomesky@gmail.com>
+Date: Sat, 15 Oct 2022 20:03:56 +0200
+Subject: [PATCH] avif: indicate when all frames have been read
+
+---
+ src/imageformats/avif.cpp | 13 ++++++++++---
+ src/imageformats/avif_p.h | 1 +
+ 2 files changed, 11 insertions(+), 3 deletions(-)
+
+diff --git a/src/imageformats/avif.cpp b/src/imageformats/avif.cpp
+index 24aec84..cd3a08b 100644
+--- a/src/imageformats/avif.cpp
++++ b/src/imageformats/avif.cpp
+@@ -43,7 +43,7 @@ bool QAVIFHandler::canRead() const
+ if (m_parseState != ParseAvifError) {
+ setFormat("avif");
+
+- if (m_parseState == ParseAvifSuccess && m_decoder->imageIndex >= m_decoder->imageCount - 1) {
++ if (m_parseState == ParseAvifFinished) {
+ return false;
+ }
+
+@@ -74,7 +74,7 @@ bool QAVIFHandler::canRead(QIODevice *device)
+
+ bool QAVIFHandler::ensureParsed() const
+ {
+- if (m_parseState == ParseAvifSuccess || m_parseState == ParseAvifMetadata) {
++ if (m_parseState == ParseAvifSuccess || m_parseState == ParseAvifMetadata || m_parseState == ParseAvifFinished) {
+ return true;
+ }
+ if (m_parseState == ParseAvifError) {
+@@ -88,7 +88,7 @@ bool QAVIFHandler::ensureParsed() const
+
+ bool QAVIFHandler::ensureOpened() const
+ {
+- if (m_parseState == ParseAvifSuccess) {
++ if (m_parseState == ParseAvifSuccess || m_parseState == ParseAvifFinished) {
+ return true;
+ }
+ if (m_parseState == ParseAvifError) {
+@@ -459,6 +459,13 @@ bool QAVIFHandler::read(QImage *image)
+ *image = m_current_image;
+ if (imageCount() >= 2) {
+ m_must_jump_to_next_image = true;
++ if (m_decoder->imageIndex >= m_decoder->imageCount - 1) {
++ // all frames in animation have been read
++ m_parseState = ParseAvifFinished;
++ }
++ } else {
++ // the static image has been read
++ m_parseState = ParseAvifFinished;
+ }
+ return true;
+ }
+diff --git a/src/imageformats/avif_p.h b/src/imageformats/avif_p.h
+index 83fb547..46156bd 100644
+--- a/src/imageformats/avif_p.h
++++ b/src/imageformats/avif_p.h
+@@ -55,6 +55,7 @@ private:
+ ParseAvifNotParsed = 0,
+ ParseAvifSuccess = 1,
+ ParseAvifMetadata = 2,
++ ParseAvifFinished = 3,
+ };
+
+ ParseAvifState m_parseState;
+--
+GitLab
+
diff --git a/kde-frameworks/kimageformats/kimageformats-5.99.0-r2.ebuild b/kde-frameworks/kimageformats/kimageformats-5.99.0-r2.ebuild
new file mode 100644
index 000000000000..6be9f5b4f8b1
--- /dev/null
+++ b/kde-frameworks/kimageformats/kimageformats-5.99.0-r2.ebuild
@@ -0,0 +1,47 @@
+# Copyright 1999-2022 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+ECM_QTHELP="false"
+PVCUT=$(ver_cut 1-2)
+QTMIN=5.15.5
+VIRTUALX_REQUIRED="test"
+inherit ecm frameworks.kde.org
+
+DESCRIPTION="Framework providing additional format plugins for Qt's image I/O system"
+
+LICENSE="LGPL-2+"
+KEYWORDS="~amd64 ~arm ~arm64 ~ppc64 ~riscv ~x86"
+IUSE="avif eps heif jpegxl openexr raw"
+
+DEPEND="
+ >=dev-qt/qtgui-${QTMIN}:5
+ =kde-frameworks/karchive-${PVCUT}*:5
+ avif? ( >=media-libs/libavif-0.8.2:= )
+ eps? ( >=dev-qt/qtprintsupport-${QTMIN}:5 )
+ heif? ( >=media-libs/libheif-1.10.0:= )
+ jpegxl? ( media-libs/libjxl )
+ openexr? ( >=media-libs/openexr-3:= )
+ raw? ( media-libs/libraw:= )
+"
+RDEPEND="${DEPEND}"
+
+DOCS=( src/imageformats/AUTHORS )
+
+PATCHES=(
+ "${FILESDIR}"/${P}-avif-perf-{1,2,3}.patch
+ "${FILESDIR}"/${P}-avif-0.11.0.patch
+)
+
+src_configure() {
+ local mycmakeargs=(
+ -DKIMAGEFORMATS_JXL=$(usex jpegxl)
+ $(cmake_use_find_package avif libavif)
+ $(cmake_use_find_package eps Qt5PrintSupport)
+ -DKIMAGEFORMATS_HEIF=$(usex heif)
+ $(cmake_use_find_package openexr OpenEXR)
+ $(cmake_use_find_package raw LibRaw)
+ )
+ ecm_src_configure
+}
^ permalink raw reply related [flat|nested] 3+ messages in thread
* [gentoo-commits] repo/gentoo:master commit in: kde-frameworks/kimageformats/, kde-frameworks/kimageformats/files/
@ 2023-01-30 14:44 Andreas Sturmlechner
0 siblings, 0 replies; 3+ messages in thread
From: Andreas Sturmlechner @ 2023-01-30 14:44 UTC (permalink / raw
To: gentoo-commits
commit: 631dcc854482ebd56ee3e642d96ea30ad1d87e82
Author: Andreas Sturmlechner <asturm <AT> gentoo <DOT> org>
AuthorDate: Mon Jan 30 10:36:30 2023 +0000
Commit: Andreas Sturmlechner <asturm <AT> gentoo <DOT> org>
CommitDate: Mon Jan 30 14:44:05 2023 +0000
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=631dcc85
kde-frameworks/kimageformats: heif: reject invalid files with zero size
Upstream commit b654f20ecebc30ab73022a6b32c2fd1cef162ea6
See also: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50850
Bug: https://bugs.gentoo.org/891927
Signed-off-by: Andreas Sturmlechner <asturm <AT> gentoo.org>
....102.0-heif-reject-invalid-files-w-0-size.patch | 31 +++++++++++++++
.../kimageformats/kimageformats-5.102.0-r1.ebuild | 46 ++++++++++++++++++++++
2 files changed, 77 insertions(+)
diff --git a/kde-frameworks/kimageformats/files/kimageformats-5.102.0-heif-reject-invalid-files-w-0-size.patch b/kde-frameworks/kimageformats/files/kimageformats-5.102.0-heif-reject-invalid-files-w-0-size.patch
new file mode 100644
index 000000000000..809d11ce382f
--- /dev/null
+++ b/kde-frameworks/kimageformats/files/kimageformats-5.102.0-heif-reject-invalid-files-w-0-size.patch
@@ -0,0 +1,31 @@
+From b654f20ecebc30ab73022a6b32c2fd1cef162ea6 Mon Sep 17 00:00:00 2001
+From: =?UTF-8?q?Daniel=20Novomesk=C3=BD?= <dnovomesky@gmail.com>
+Date: Sun, 29 Jan 2023 16:16:52 +0100
+Subject: [PATCH] heif: reject invalid files with zero size
+
+---
+ src/imageformats/heif.cpp | 8 ++++++++
+ 1 file changed, 8 insertions(+)
+
+diff --git a/src/imageformats/heif.cpp b/src/imageformats/heif.cpp
+index 3365d92..c938c0d 100644
+--- a/src/imageformats/heif.cpp
++++ b/src/imageformats/heif.cpp
+@@ -449,6 +449,14 @@ bool HEIFHandler::ensureDecoder()
+ return false;
+ }
+
++ if ((heif_image_handle_get_width(handle) == 0) || (heif_image_handle_get_height(handle) == 0)) {
++ m_parseState = ParseHeicError;
++ heif_image_handle_release(handle);
++ heif_context_free(ctx);
++ qWarning() << "HEIC image has zero dimension";
++ return false;
++ }
++
+ const bool hasAlphaChannel = heif_image_handle_has_alpha_channel(handle);
+ const int bit_depth = heif_image_handle_get_luma_bits_per_pixel(handle);
+ heif_chroma chroma;
+--
+GitLab
+
diff --git a/kde-frameworks/kimageformats/kimageformats-5.102.0-r1.ebuild b/kde-frameworks/kimageformats/kimageformats-5.102.0-r1.ebuild
new file mode 100644
index 000000000000..fef1628f46c6
--- /dev/null
+++ b/kde-frameworks/kimageformats/kimageformats-5.102.0-r1.ebuild
@@ -0,0 +1,46 @@
+# Copyright 1999-2023 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+ECM_QTHELP="false"
+PVCUT=$(ver_cut 1-2)
+QTMIN=5.15.5
+VIRTUALX_REQUIRED="test"
+inherit ecm frameworks.kde.org
+
+DESCRIPTION="Framework providing additional format plugins for Qt's image I/O system"
+
+LICENSE="LGPL-2+"
+KEYWORDS="~amd64 ~arm ~arm64 ~loong ~ppc64 ~riscv ~x86"
+IUSE="avif eps heif jpegxl openexr raw"
+
+RDEPEND="
+ >=dev-qt/qtgui-${QTMIN}:5
+ =kde-frameworks/karchive-${PVCUT}*:5
+ avif? ( >=media-libs/libavif-0.8.2:= )
+ eps? ( >=dev-qt/qtprintsupport-${QTMIN}:5 )
+ heif? ( >=media-libs/libheif-1.10.0:= )
+ jpegxl? ( media-libs/libjxl )
+ openexr? ( >=media-libs/openexr-3:= )
+ raw? ( media-libs/libraw:= )
+"
+DEPEND="${RDEPEND}
+ test? ( heif? ( media-libs/libheif[x265] ) )
+"
+
+DOCS=( src/imageformats/AUTHORS )
+
+PATCHES=( "${FILESDIR}/${P}-heif-reject-invalid-files-w-0-size.patch" )
+
+src_configure() {
+ local mycmakeargs=(
+ -DKIMAGEFORMATS_JXL=$(usex jpegxl)
+ $(cmake_use_find_package avif libavif)
+ $(cmake_use_find_package eps Qt5PrintSupport)
+ -DKIMAGEFORMATS_HEIF=$(usex heif)
+ $(cmake_use_find_package openexr OpenEXR)
+ $(cmake_use_find_package raw LibRaw)
+ )
+ ecm_src_configure
+}
^ permalink raw reply related [flat|nested] 3+ messages in thread
* [gentoo-commits] repo/gentoo:master commit in: kde-frameworks/kimageformats/, kde-frameworks/kimageformats/files/
@ 2023-07-25 9:04 Andreas Sturmlechner
0 siblings, 0 replies; 3+ messages in thread
From: Andreas Sturmlechner @ 2023-07-25 9:04 UTC (permalink / raw
To: gentoo-commits
commit: e22db0940a068cc4c0e137d3e8247b368a5c8734
Author: Andreas Sturmlechner <asturm <AT> gentoo <DOT> org>
AuthorDate: Tue Jul 25 08:52:40 2023 +0000
Commit: Andreas Sturmlechner <asturm <AT> gentoo <DOT> org>
CommitDate: Tue Jul 25 09:04:47 2023 +0000
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=e22db094
kde-frameworks/kimageformats: psd: Fix UB type punning
Upstream commit c3a91c3bc62bdd913c55dd83f4e1159ed25310c5
KDE-bug: https://bugs.kde.org/show_bug.cgi?id=471829
Bug: https://bugs.gentoo.org/910062
Signed-off-by: Andreas Sturmlechner <asturm <AT> gentoo.org>
...geformats-5.108.0-psd-fix-UB-type-punning.patch | 89 ++++++++++++++++++++++
.../kimageformats/kimageformats-5.108.0-r1.ebuild | 45 +++++++++++
2 files changed, 134 insertions(+)
diff --git a/kde-frameworks/kimageformats/files/kimageformats-5.108.0-psd-fix-UB-type-punning.patch b/kde-frameworks/kimageformats/files/kimageformats-5.108.0-psd-fix-UB-type-punning.patch
new file mode 100644
index 000000000000..68d853a5f447
--- /dev/null
+++ b/kde-frameworks/kimageformats/files/kimageformats-5.108.0-psd-fix-UB-type-punning.patch
@@ -0,0 +1,89 @@
+From c3a91c3bc62bdd913c55dd83f4e1159ed25310c5 Mon Sep 17 00:00:00 2001
+From: Mirco Miranda <mirco.miranda@systemceramics.com>
+Date: Sun, 16 Jul 2023 08:03:58 +0000
+Subject: [PATCH] psd: Fix UB type punning
+
+BUGS: 471829
+---
+ src/imageformats/psd.cpp | 33 ++++++++++++++++++++++++++-------
+ 1 file changed, 26 insertions(+), 7 deletions(-)
+
+diff --git a/src/imageformats/psd.cpp b/src/imageformats/psd.cpp
+index 7280aea..b0c76e2 100644
+--- a/src/imageformats/psd.cpp
++++ b/src/imageformats/psd.cpp
+@@ -42,6 +42,7 @@
+ #include <QColorSpace>
+
+ #include <cmath>
++#include <cstring>
+
+ typedef quint32 uint;
+ typedef quint16 ushort;
+@@ -808,6 +809,26 @@ inline quint32 xchg(quint32 v) {
+ #endif
+ }
+
++inline float xchg(float v)
++{
++#if Q_BYTE_ORDER == Q_LITTLE_ENDIAN
++# ifdef Q_CC_MSVC
++ float *pf = &v;
++ quint32 f = xchg(*reinterpret_cast<quint32*>(pf));
++ quint32 *pi = &f;
++ return *reinterpret_cast<float*>(pi);
++# else
++ quint32 t;
++ std::memcpy(&t, &v, sizeof(quint32));
++ t = xchg(t);
++ std::memcpy(&v, &t, sizeof(quint32));
++ return v;
++# endif
++#else
++ return v; // never tested
++#endif
++}
++
+ template<class T>
+ inline void planarToChunchy(uchar *target, const char *source, qint32 width, qint32 c, qint32 cn)
+ {
+@@ -818,15 +839,13 @@ inline void planarToChunchy(uchar *target, const char *source, qint32 width, qin
+ }
+ }
+
+-template<class T, T min = 0, T max = 1>
+-inline void planarToChunchyFloat(uchar *target, const char *source, qint32 width, qint32 c, qint32 cn)
++template<class T>
++inline void planarToChunchyFloatToUInt16(uchar *target, const char *source, qint32 width, qint32 c, qint32 cn)
+ {
+ auto s = reinterpret_cast<const T*>(source);
+ auto t = reinterpret_cast<quint16*>(target);
+ for (qint32 x = 0; x < width; ++x) {
+- auto tmp = xchg(s[x]);
+- auto ftmp = (*reinterpret_cast<float*>(&tmp) - double(min)) / (double(max) - double(min));
+- t[x * cn + c] = quint16(std::min(ftmp * std::numeric_limits<quint16>::max() + 0.5, double(std::numeric_limits<quint16>::max())));
++ t[x * cn + c] = quint16(std::min(xchg(s[x]) * std::numeric_limits<quint16>::max() + 0.5, double(std::numeric_limits<quint16>::max())));
+ }
+ }
+
+@@ -1140,7 +1159,7 @@ static bool LoadPSD(QDataStream &stream, const PSDHeader &header, QImage &img)
+ } else if (header.depth == 16) {
+ planarToChunchy<quint16>(scanLine, rawStride.data(), header.width, c, header.channel_count);
+ } else if (header.depth == 32) {
+- planarToChunchyFloat<quint32>(scanLine, rawStride.data(), header.width, c, header.channel_count);
++ planarToChunchyFloatToUInt16<float>(scanLine, rawStride.data(), header.width, c, header.channel_count);
+ }
+ }
+
+@@ -1204,7 +1223,7 @@ static bool LoadPSD(QDataStream &stream, const PSDHeader &header, QImage &img)
+ } else if (header.depth == 16) { // 16-bits integer images: Grayscale, RGB/RGBA
+ planarToChunchy<quint16>(scanLine, rawStride.data(), header.width, c, imgChannels);
+ } else if (header.depth == 32) { // 32-bits float images: Grayscale, RGB/RGBA (coverted to equivalent integer 16-bits)
+- planarToChunchyFloat<quint32>(scanLine, rawStride.data(), header.width, c, imgChannels);
++ planarToChunchyFloatToUInt16<float>(scanLine, rawStride.data(), header.width, c, imgChannels);
+ }
+ }
+ }
+--
+GitLab
+
diff --git a/kde-frameworks/kimageformats/kimageformats-5.108.0-r1.ebuild b/kde-frameworks/kimageformats/kimageformats-5.108.0-r1.ebuild
new file mode 100644
index 000000000000..06b7edcba3c2
--- /dev/null
+++ b/kde-frameworks/kimageformats/kimageformats-5.108.0-r1.ebuild
@@ -0,0 +1,45 @@
+# Copyright 1999-2023 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+ECM_QTHELP="false"
+PVCUT=$(ver_cut 1-2)
+QTMIN=5.15.9
+inherit ecm frameworks.kde.org
+
+DESCRIPTION="Framework providing additional format plugins for Qt's image I/O system"
+
+LICENSE="LGPL-2+"
+KEYWORDS="~amd64 ~arm ~arm64 ~loong ~ppc64 ~riscv ~x86"
+IUSE="avif eps heif jpegxl openexr raw"
+
+RDEPEND="
+ >=dev-qt/qtgui-${QTMIN}:5
+ =kde-frameworks/karchive-${PVCUT}*:5
+ avif? ( >=media-libs/libavif-0.8.2:= )
+ eps? ( >=dev-qt/qtprintsupport-${QTMIN}:5 )
+ heif? ( >=media-libs/libheif-1.10.0:= )
+ jpegxl? ( media-libs/libjxl )
+ openexr? ( >=media-libs/openexr-3:= )
+ raw? ( media-libs/libraw:= )
+"
+DEPEND="${RDEPEND}
+ test? ( heif? ( media-libs/libheif[x265] ) )
+"
+
+DOCS=( src/imageformats/AUTHORS )
+
+PATCHES=( "${FILESDIR}/${P}-psd-fix-UB-type-punning.patch" ) # 5.109
+
+src_configure() {
+ local mycmakeargs=(
+ -DKIMAGEFORMATS_JXL=$(usex jpegxl)
+ $(cmake_use_find_package avif libavif)
+ $(cmake_use_find_package eps Qt5PrintSupport)
+ -DKIMAGEFORMATS_HEIF=$(usex heif)
+ $(cmake_use_find_package openexr OpenEXR)
+ $(cmake_use_find_package raw LibRaw)
+ )
+ ecm_src_configure
+}
^ permalink raw reply related [flat|nested] 3+ messages in thread
end of thread, other threads:[~2023-07-25 9:04 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-10-18 21:37 [gentoo-commits] repo/gentoo:master commit in: kde-frameworks/kimageformats/, kde-frameworks/kimageformats/files/ Andreas Sturmlechner
-- strict thread matches above, loose matches on Subject: below --
2023-01-30 14:44 Andreas Sturmlechner
2023-07-25 9:04 Andreas Sturmlechner
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox