mirror of
https://gitlab.alpinelinux.org/alpine/aports.git
synced 2025-08-05 13:27:09 +02:00
123 lines
2.6 KiB
Plaintext
123 lines
2.6 KiB
Plaintext
# Contributor: Andrew Wilcox <AWilcox@Wilcox-Tech.com>
|
|
# Maintainer: Natanael Copa <ncopa@alpinelinux.org>
|
|
pkgname=py3-django
|
|
_pkgname=Django
|
|
pkgver=4.2.1
|
|
pkgrel=0
|
|
pkgdesc="A high-level Python3 Web framework"
|
|
url="https://djangoproject.com/"
|
|
arch="noarch"
|
|
license="BSD-3-Clause"
|
|
depends="
|
|
python3
|
|
py3-asgiref
|
|
py3-sqlparse
|
|
tzdata
|
|
"
|
|
makedepends="
|
|
py3-gpep517
|
|
py3-setuptools
|
|
py3-wheel
|
|
"
|
|
options="!check" # some depends missing, others in community/testing
|
|
subpackages="$pkgname-pyc"
|
|
source="https://files.pythonhosted.org/packages/source/${_pkgname:0:1}/$_pkgname/$_pkgname-$pkgver.tar.gz"
|
|
builddir="$srcdir"/$_pkgname-$pkgver
|
|
|
|
replaces="py-django" # Backwards compatibility
|
|
provides="py-django=$pkgver-r$pkgrel" # Backwards compatibility
|
|
|
|
# secfixes:
|
|
# 3.2.18-r0:
|
|
# - CVE-2023-24580
|
|
# 3.2.17-r0:
|
|
# - CVE-2023-23969
|
|
# 3.2.16-r0:
|
|
# - CVE-2022-41323
|
|
# 3.2.15-r0:
|
|
# - CVE-2022-36359
|
|
# 3.2.14-r0:
|
|
# - CVE-2022-34265
|
|
# 3.2.13-r0:
|
|
# - CVE-2022-28346
|
|
# - CVE-2022-28347
|
|
# 3.2.12-r0:
|
|
# - CVE-2021-44420
|
|
# - CVE-2021-45115
|
|
# - CVE-2021-45116
|
|
# - CVE-2021-45452
|
|
# - CVE-2022-22818
|
|
# - CVE-2022-23833
|
|
# 3.1.13-r0:
|
|
# - CVE-2021-33203
|
|
# - CVE-2021-33571
|
|
# - CVE-2021-35042
|
|
# 3.1.8-r0:
|
|
# - CVE-2021-28658
|
|
# 3.1.7-r0:
|
|
# - CVE-2021-23336
|
|
# 3.1.6-r0:
|
|
# - CVE-2021-3281
|
|
# 3.1.1-r0:
|
|
# - CVE-2020-24583
|
|
# - CVE-2020-24584
|
|
# 3.0.7-r0:
|
|
# - CVE-2020-13254
|
|
# - CVE-2020-13596
|
|
# 1.11.29-r0:
|
|
# - CVE-2020-9402
|
|
# 1.11.28-r0:
|
|
# - CVE-2020-7471
|
|
# 1.11.27-r0:
|
|
# - CVE-2019-19844
|
|
# 1.11.23-r0:
|
|
# - CVE-2019-14232
|
|
# - CVE-2019-14233
|
|
# - CVE-2019-14234
|
|
# - CVE-2019-14235
|
|
# 1.11.22-r0:
|
|
# - CVE-2019-12781
|
|
# 1.8.16-r0:
|
|
# - CVE-2016-9013
|
|
# - CVE-2016-9014
|
|
# 1.10.7-r0:
|
|
# - CVE-2017-7233
|
|
# - CVE-2017-7234
|
|
# 1.11.5-r0:
|
|
# - CVE-2017-12794
|
|
# 1.11.10-r0:
|
|
# - CVE-2018-6188
|
|
# 1.11.11-r0:
|
|
# - CVE-2018-7536
|
|
# - CVE-2018-7537
|
|
# 1.11.15-r0:
|
|
# - CVE-2018-14574
|
|
# 1.11.18-r0:
|
|
# - CVE-2019-3498
|
|
# 1.11.19-r0:
|
|
# - CVE-2019-6975
|
|
# 1.11.21-r0:
|
|
# - CVE-2019-12308
|
|
|
|
build() {
|
|
gpep517 build-wheel \
|
|
--wheel-dir dist \
|
|
--output-fd 3 3>&1 >&2
|
|
}
|
|
|
|
check() {
|
|
python3 -m venv --clear --without-pip --system-site-packages testenv
|
|
testenv/bin/python3 -m installer dist/*.whl
|
|
testenv/bin/python3 -m pytest
|
|
}
|
|
|
|
package() {
|
|
python3 -m installer -d "$pkgdir" \
|
|
dist/*.whl
|
|
ln -s django-admin "$pkgdir"/usr/bin/django-admin-3
|
|
}
|
|
|
|
sha512sums="
|
|
eaa3f633f380e9a215e52bd40c2f7c7aed9f0a6122f5c9c07d954904dcb8ccc9ae8ed2e988742e2b1b3b32e626cf754ab4e0d2b4ed06f3b81ef7a38f0bd047ee Django-4.2.1.tar.gz
|
|
"
|