Update package specs for e-sword 12.2.0

This commit is contained in:
Thomas A. Christensen II 2020-12-10 13:48:32 -07:00
parent 06aec538ce
commit 7cc2def612
Signed by: millironx
GPG key ID: 139C07724802BC5D
3 changed files with 13 additions and 5 deletions

Binary file not shown.

View file

@ -4,7 +4,7 @@
<metadata>
<!-- == PACKAGE SPECIFIC SECTION == -->
<id>e-sword</id>
<version>12.1.0</version>
<version>12.2.0</version>
<owners>MillironX</owners>
<packageSourceUrl>https://github.com/MillironX/chocolatey-packages</packageSourceUrl>
@ -15,12 +15,20 @@
<authors>Rick Meyers</authors>
<projectUrl>https://e-sword.net/</projectUrl>
<iconUrl>https://www.e-sword.net/images/applogo.png</iconUrl>
<copyright>2019 Rick Meyers</copyright>
<copyright>2020 Rick Meyers</copyright>
<docsUrl>https://e-sword.net/training.html</docsUrl>
<tags>esword bible christianity</tags>
<summary>The Sword of the LORD with an electronic edge</summary>
<description>e-Sword is a fast and effective way to study the Bible. e-Sword is feature rich and user friendly with more capabilities than you would expect in a free Bible study app.</description>
<releaseNotes>**Downloader** updated to accommodate the AMG Publishers titles now being sold through eStudySource.</releaseNotes>
<releaseNotes>
New **Dim Light** greenish background color which may ease eye strain for
some people.
**Bible Search** improved to locate words that include accents on the first or
last character.
User-made **Bible modules** can now include footnotes in the text and database.
</releaseNotes>
</metadata>
<files>
<file src="tools\**" target="tools" />

View file

@ -1,6 +1,6 @@
$ErrorActionPreference = 'Stop'; # stop on all errors
$toolsDir = "$(Split-Path -parent $MyInvocation.MyCommand.Definition)"
$url = 'https://e-sword.net/files/e-sword_1210_setup.exe' # download url, HTTPS preferred
$url = 'https://e-sword.net/files/e-sword_1220_setup.exe' # download url, HTTPS preferred
$packageArgs = @{
packageName = $env:ChocolateyPackageName
@ -8,7 +8,7 @@ $packageArgs = @{
fileType = 'EXE'
url = $url
softwareName = 'e-Sword'
checksum = '3D3E01C1F289D4E6F4B83D1416650CCF572B615BA799CC9764D3B6259E6CEBBF'
checksum = '26aa2ae3342ae214b4598d031f1cd0c3d237bec1fb69419349c0560532e9769d'
checksumType = 'sha256'
validExitCodes= @(0, 3010, 1641)
silentArgs = '/s /v"/qn"'