5577114318
- Fixed CVE-2017-11610. A vulnerability was found where an authenticated client can send a malicious XML-RPC request to ``supervisord`` that will run arbitrary shell commands on the server. The commands will be run as the same user as ``supervisord``. Depending on how ``supervisord`` has been configured, this may be root. See https://github.com/Supervisor/supervisor/issues/964 for details.
29 lines
907 B
Makefile
29 lines
907 B
Makefile
# $NetBSD: Makefile,v 1.3 2017/07/25 08:17:08 adam Exp $
|
|
|
|
DISTNAME= supervisor-3.3.3
|
|
PKGNAME= ${PYPKGPREFIX}-${DISTNAME}
|
|
CATEGORIES= sysutils
|
|
MASTER_SITES= ${MASTER_SITE_PYPI:=s/supervisor/}
|
|
|
|
MAINTAINER= pkgsrc-users@NetBSD.org
|
|
HOMEPAGE= http://supervisord.org/
|
|
COMMENT= System for controlling process state under UNIX
|
|
LICENSE= original-bsd
|
|
|
|
DEPENDS+= ${PYPKGPREFIX}-meld3>=0.6.5:../../www/py-meld3
|
|
# TEST_DEPENDS
|
|
BUILD_DEPENDS+= ${PYPKGPREFIX}-mock-[0-9]*:../../devel/py-mock
|
|
|
|
# as of 3.3.1, explicitly only supports 2.x
|
|
PYTHON_VERSIONS_ACCEPTED= 27
|
|
|
|
REPLACE_PYTHON+= supervisor/scripts/*.py
|
|
SUBST_CLASSES+= python
|
|
SUBST_SED.python+= -e "s,<<PYTHON>>,${PYTHONBIN},"
|
|
SUBST_FILES.python+= supervisor/tests/fixtures/*.py
|
|
SUBST_MESSAGE.python= Fixing path to python.
|
|
SUBST_STAGE.python= pre-build
|
|
|
|
.include "../../lang/python/application.mk"
|
|
.include "../../lang/python/egg.mk"
|
|
.include "../../mk/bsd.pkg.mk"
|