1b7dade2d4
Scrapy 1.5.2: * *Security bugfix*: Telnet console extension can be easily exploited by rogue websites POSTing content to http://localhost:6023, we haven't found a way to exploit it from Scrapy, but it is very easy to trick a browser to do so and elevates the risk for local development environment. *The fix is backwards incompatible*, it enables telnet user-password authentication by default with a random generated password. If you can't upgrade right away, please consider setting :setting:TELNET_CONSOLE_PORT out of its default value. See :ref:telnet console <topics-telnetconsole> documentation for more info * Backport CI build failure under GCE environemnt due to boto import error.
31 lines
1.1 KiB
Makefile
31 lines
1.1 KiB
Makefile
# $NetBSD: Makefile,v 1.7 2019/01/24 14:11:48 adam Exp $
|
|
|
|
DISTNAME= Scrapy-1.5.2
|
|
PKGNAME= ${PYPKGPREFIX}-${DISTNAME:tl}
|
|
CATEGORIES= www python
|
|
MASTER_SITES= ${MASTER_SITE_PYPI:=S/Scrapy/}
|
|
|
|
MAINTAINER= pkgsrc-users@NetBSD.org
|
|
HOMEPAGE= https://scrapy.org/
|
|
COMMENT= High-level Web Crawling and Web Scraping framework
|
|
LICENSE= modified-bsd
|
|
|
|
DEPENDS+= ${PYPKGPREFIX}-OpenSSL-[0-9]*:../../security/py-OpenSSL
|
|
DEPENDS+= ${PYPKGPREFIX}-cssselect-[0-9]*:../../textproc/py-cssselect
|
|
DEPENDS+= ${PYPKGPREFIX}-lxml-[0-9]*:../../textproc/py-lxml
|
|
DEPENDS+= ${PYPKGPREFIX}-parsel>=1.1.0:../../www/py-parsel
|
|
DEPENDS+= ${PYPKGPREFIX}-pydispatcher>=2.0.5:../../devel/py-pydispatcher
|
|
DEPENDS+= ${PYPKGPREFIX}-queuelib-[0-9]*:../../devel/py-queuelib
|
|
DEPENDS+= ${PYPKGPREFIX}-service_identity-[0-9]*:../../security/py-service_identity
|
|
DEPENDS+= ${PYPKGPREFIX}-six>=1.5.2:../../lang/py-six
|
|
DEPENDS+= ${PYPKGPREFIX}-twisted>=13.1.0:../../net/py-twisted
|
|
DEPENDS+= ${PYPKGPREFIX}-w3lib>=1.17.0:../../www/py-w3lib
|
|
|
|
USE_LANGUAGES= # none
|
|
|
|
post-install:
|
|
cd ${DESTDIR}${PREFIX}/bin && \
|
|
${MV} scrapy scrapy-${PYVERSSUFFIX} || ${TRUE}
|
|
|
|
.include "../../lang/python/egg.mk"
|
|
.include "../../mk/bsd.pkg.mk"
|