summaryrefslogtreecommitdiffstats
path: root/audio/jalv/README
diff options
context:
space:
mode:
author B. Watson <yalhcru@gmail.com>2014-02-25 09:09:49 +0700
committer Willy Sudiarto Raharjo <willysr@slackbuilds.org>2014-02-25 09:10:49 +0700
commit5bc3c29c1021f3db774d3c85d90fd739e017ccc8 (patch)
treecd3b7c789c53b0dbcf6ff3089ef129a90d4eb090 /audio/jalv/README
parentcf82cee1bbc257fbeed5f76a09f0c390cb3c48b7 (diff)
downloadslackbuilds-5bc3c29c1021f3db774d3c85d90fd739e017ccc8.tar.gz
slackbuilds-5bc3c29c1021f3db774d3c85d90fd739e017ccc8.tar.xz
audio/jalv: Added (host for LV2 plugins).
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
Diffstat (limited to 'audio/jalv/README')
-rw-r--r--audio/jalv/README25
1 files changed, 25 insertions, 0 deletions
diff --git a/audio/jalv/README b/audio/jalv/README
new file mode 100644
index 0000000000..bc86f22d82
--- /dev/null
+++ b/audio/jalv/README
@@ -0,0 +1,25 @@
+jalv (host for LV2 plugins)
+
+Jalv is a simple but fully featured LV2 host for Jack. It runs LV2
+plugins and exposes their ports as Jack ports, essentially making any
+LV2 plugin function as a Jack application.
+
+Jalv is a small program which is useful, but also intended to be an
+appropriate test host for plugin development. It runs plugins from the
+command line with no user interaction, is light enough to run in valgrind,
+and is capable of dumping all plugin to/from UI communication in a human
+readable format.
+
+For testing with various host toolkits, there are several Jalv
+executables: jalv, jalv.gtk, jalv.gtkmm, and jalv.qt. The jalv and
+jalv.gtk programs are suitable for production use by users, the others
+are less complete and intended for developer testing only. By default,
+this SlackBuild only builds jalv (text) and jalv.gtk (gtk+-2.0). If you
+really want to build the other UIs, pass ALL_UIS=yes in the script's
+environment (and make sure you have gtkmm installed).
+
+This package uses POSIX filesystem capabilities to execute with
+elevated privileges (required for realtime audio processing). This
+may be considered a security/stability risk. Please read
+http://www.slackbuilds.org/caps/ for more information. To disable
+capabilities, pass SETCAP=no to the script.