mirror of
https://gitlab.alpinelinux.org/alpine/aports.git
synced 2026-04-19 12:42:30 +02:00
229 lines
5.0 KiB
Plaintext
229 lines
5.0 KiB
Plaintext
# Contributor: Sergei Lukin <sergej.lukin@gmail.com>
|
|
# Contributor: Valery Kartel <valery.kartel@gmail.com>
|
|
# Contributor: Łukasz Jendrysik <scadu@yandex.com>
|
|
# Maintainer: Natanael Copa <ncopa@alpinelinux.org>
|
|
|
|
# RESTRICTED: Do NOT enable the rustls or hyper backends, as they depend on Rust
|
|
# and Rust is not yet available on all architectures. Any commit which changes
|
|
# this aport from arch=all WILL be reverted.
|
|
|
|
pkgname=curl
|
|
pkgver=8.4.0
|
|
pkgrel=0
|
|
pkgdesc="URL retrival utility and library"
|
|
url="https://curl.se/"
|
|
arch="all"
|
|
license="curl"
|
|
depends="ca-certificates"
|
|
depends_dev="
|
|
brotli-dev
|
|
c-ares-dev
|
|
libidn2-dev
|
|
nghttp2-dev
|
|
openssl-dev>3
|
|
zlib-dev
|
|
"
|
|
checkdepends="nghttp2 python3"
|
|
makedepends_host="$depends_dev"
|
|
makedepends_build="groff perl"
|
|
subpackages="$pkgname-dbg $pkgname-static $pkgname-doc $pkgname-dev libcurl"
|
|
[ -z "$BOOTSTRAP" ] && subpackages="$subpackages $pkgname-zsh-completion $pkgname-fish-completion"
|
|
source="
|
|
https://curl.se/download/curl-$pkgver.tar.xz
|
|
"
|
|
options="net" # Required for running tests
|
|
[ -n "$BOOTSTRAP" ] && options="$options !check" # remove python3 dependency
|
|
|
|
# secfixes:
|
|
# 8.4.0-r0:
|
|
# - CVE-2023-38545
|
|
# - CVE-2023-38546
|
|
# 8.3.0-r0:
|
|
# - CVE-2023-38039
|
|
# 8.1.0-r0:
|
|
# - CVE-2023-28319
|
|
# - CVE-2023-28320
|
|
# - CVE-2023-28321
|
|
# - CVE-2023-28322
|
|
# 8.0.0-r0:
|
|
# - CVE-2023-27533
|
|
# - CVE-2023-27534
|
|
# - CVE-2023-27535
|
|
# - CVE-2023-27536
|
|
# - CVE-2023-27537
|
|
# - CVE-2023-27538
|
|
# 7.88.0-r0:
|
|
# - CVE-2023-23914
|
|
# - CVE-2023-23915
|
|
# - CVE-2023-23916
|
|
# 7.87.0-r0:
|
|
# - CVE-2022-43551
|
|
# - CVE-2022-43552
|
|
# 7.86.0-r0:
|
|
# - CVE-2022-32221
|
|
# - CVE-2022-35260
|
|
# - CVE-2022-42915
|
|
# - CVE-2022-42916
|
|
# 7.85.0-r0:
|
|
# - CVE-2022-35252
|
|
# 7.84.0-r0:
|
|
# - CVE-2022-32205
|
|
# - CVE-2022-32206
|
|
# - CVE-2022-32207
|
|
# - CVE-2022-32208
|
|
# 7.83.1-r0:
|
|
# - CVE-2022-27778
|
|
# - CVE-2022-27779
|
|
# - CVE-2022-27780
|
|
# - CVE-2022-27781
|
|
# - CVE-2022-27782
|
|
# - CVE-2022-30115
|
|
# 7.83.0-r0:
|
|
# - CVE-2022-22576
|
|
# - CVE-2022-27774
|
|
# - CVE-2022-27775
|
|
# - CVE-2022-27776
|
|
# 7.79.0-r0:
|
|
# - CVE-2021-22945
|
|
# - CVE-2021-22946
|
|
# - CVE-2021-22947
|
|
# 7.78.0-r0:
|
|
# - CVE-2021-22922
|
|
# - CVE-2021-22923
|
|
# - CVE-2021-22924
|
|
# - CVE-2021-22925
|
|
# 7.77.0-r0:
|
|
# - CVE-2021-22898
|
|
# - CVE-2021-22901
|
|
# 7.76.0-r0:
|
|
# - CVE-2021-22876
|
|
# - CVE-2021-22890
|
|
# 7.74.0-r0:
|
|
# - CVE-2020-8284
|
|
# - CVE-2020-8285
|
|
# - CVE-2020-8286
|
|
# 7.72.0-r0:
|
|
# - CVE-2020-8231
|
|
# 7.71.0-r0:
|
|
# - CVE-2020-8169
|
|
# - CVE-2020-8177
|
|
# 7.66.0-r0:
|
|
# - CVE-2019-5481
|
|
# - CVE-2019-5482
|
|
# 7.65.0-r0:
|
|
# - CVE-2019-5435
|
|
# - CVE-2019-5436
|
|
# 7.64.0-r0:
|
|
# - CVE-2018-16890
|
|
# - CVE-2019-3822
|
|
# - CVE-2019-3823
|
|
# 7.62.0-r0:
|
|
# - CVE-2018-16839
|
|
# - CVE-2018-16840
|
|
# - CVE-2018-16842
|
|
# 7.61.1-r0:
|
|
# - CVE-2018-14618
|
|
# 7.61.0-r0:
|
|
# - CVE-2018-0500
|
|
# 7.60.0-r0:
|
|
# - CVE-2018-1000300
|
|
# - CVE-2018-1000301
|
|
# 7.59.0-r0:
|
|
# - CVE-2018-1000120
|
|
# - CVE-2018-1000121
|
|
# - CVE-2018-1000122
|
|
# 7.57.0-r0:
|
|
# - CVE-2017-8816
|
|
# - CVE-2017-8817
|
|
# - CVE-2017-8818
|
|
# 7.56.1-r0:
|
|
# - CVE-2017-1000257
|
|
# 7.55.0-r0:
|
|
# - CVE-2017-1000099
|
|
# - CVE-2017-1000100
|
|
# - CVE-2017-1000101
|
|
# 7.54.0-r0:
|
|
# - CVE-2017-7468
|
|
# 7.53.1-r2:
|
|
# - CVE-2017-7407
|
|
# 7.53.0-r0:
|
|
# - CVE-2017-2629
|
|
# 7.52.1-r0:
|
|
# - CVE-2016-9594
|
|
# 7.51.0-r0:
|
|
# - CVE-2016-8615
|
|
# - CVE-2016-8616
|
|
# - CVE-2016-8617
|
|
# - CVE-2016-8618
|
|
# - CVE-2016-8619
|
|
# - CVE-2016-8620
|
|
# - CVE-2016-8621
|
|
# - CVE-2016-8622
|
|
# - CVE-2016-8623
|
|
# - CVE-2016-8624
|
|
# - CVE-2016-8625
|
|
# 7.50.3-r0:
|
|
# - CVE-2016-7167
|
|
# 7.50.2-r0:
|
|
# - CVE-2016-7141
|
|
# 7.50.1-r0:
|
|
# - CVE-2016-5419
|
|
# - CVE-2016-5420
|
|
# - CVE-2016-5421
|
|
# 7.36.0-r0:
|
|
# - CVE-2014-0138
|
|
# - CVE-2014-0139
|
|
# 0:
|
|
# - CVE-2021-22897
|
|
|
|
build() {
|
|
./configure \
|
|
--build=$CBUILD \
|
|
--host=$CHOST \
|
|
--prefix=/usr \
|
|
--enable-ares \
|
|
--enable-ipv6 \
|
|
--enable-unix-sockets \
|
|
--enable-static \
|
|
--with-libidn2 \
|
|
--with-nghttp2 \
|
|
--with-openssl \
|
|
--disable-ldap \
|
|
--with-pic \
|
|
--enable-websockets \
|
|
--without-libssh2 # https://bugs.alpinelinux.org/issues/10222
|
|
make
|
|
|
|
# generation of completions is not supported when cross-compiling.
|
|
if [ -z "$BOOTSTRAP" ]; then
|
|
make -C scripts/
|
|
fi
|
|
}
|
|
|
|
check() {
|
|
make -C tests nonflaky-test
|
|
}
|
|
|
|
package() {
|
|
# depends on exactly the same build of libcurl
|
|
depends="libcurl=$pkgver-r$pkgrel"
|
|
|
|
make install DESTDIR="$pkgdir"
|
|
if [ -z "$BOOTSTRAP" ]; then
|
|
install -Dm644 scripts/_curl -t \
|
|
"$pkgdir"/usr/share/zsh/site-functions/
|
|
install -Dm644 scripts/curl.fish -t \
|
|
"$pkgdir"/usr/share/fish/vendor_completions.d/
|
|
fi
|
|
}
|
|
|
|
libcurl() {
|
|
pkgdesc="The multiprotocol file transfer library"
|
|
|
|
amove usr/lib
|
|
}
|
|
|
|
sha512sums="
|
|
7027dbf3b759b39d6ec9c4da58fadd254e84bb93bff599541b3bc3135bad4c2955c6237d7ddd60973f9f1a6948bc32d7e312985fb50658bc958b9f22fee74f2b curl-8.4.0.tar.xz
|
|
"
|