mirror of
https://gitlab.alpinelinux.org/alpine/aports.git
synced 2025-04-21 06:36:45 +02:00
270 lines
6.1 KiB
Text
270 lines
6.1 KiB
Text
# Contributor: Sergei Lukin <sergej.lukin@gmail.com>
|
|
# Contributor: Valery Kartel <valery.kartel@gmail.com>
|
|
# Contributor: Łukasz Jendrysik <scadu@yandex.com>
|
|
# Maintainer: Natanael Copa <ncopa@alpinelinux.org>
|
|
|
|
# RESTRICTED: Do NOT enable the rustls or hyper backends, as they depend on Rust
|
|
# and Rust is not yet available on all architectures. Any commit which changes
|
|
# this aport from arch=all WILL be reverted.
|
|
|
|
pkgname=curl
|
|
pkgver=8.13.0
|
|
pkgrel=1
|
|
pkgdesc="URL retrival utility and library"
|
|
url="https://curl.se/"
|
|
arch="all"
|
|
license="curl"
|
|
depends="ca-certificates-bundle"
|
|
depends_dev="
|
|
brotli-dev
|
|
c-ares-dev
|
|
libidn2-dev
|
|
libpsl-dev
|
|
nghttp2-dev
|
|
openssl-dev>3
|
|
zlib-dev
|
|
zstd-dev
|
|
"
|
|
checkdepends="nghttp2 python3"
|
|
makedepends_host="$depends_dev"
|
|
makedepends_build="groff perl"
|
|
subpackages="$pkgname-dbg $pkgname-static $pkgname-doc $pkgname-dev libcurl"
|
|
if [ -z "$BOOTSTRAP" ] && [ -z "$APORTS_BOOTSTRAP" ]; then
|
|
subpackages="$subpackages $pkgname-zsh-completion $pkgname-fish-completion"
|
|
fi
|
|
source="https://curl.se/download/curl-$pkgver.tar.xz
|
|
0001-http-In-alt-svc-negotiation-only-allow-supported-HTT.patch"
|
|
options="net" # Required for running tests
|
|
if [ -n "$BOOTSTRAP" ] || [ -n "$APORTS_BOOTSTRAP" ]; then
|
|
options="$options !check" # remove python3 dependency
|
|
fi
|
|
|
|
# secfixes:
|
|
# 8.12.0-r0:
|
|
# - CVE-2025-0167
|
|
# - CVE-2025-0665
|
|
# - CVE-2025-0725
|
|
# 8.11.1-r0:
|
|
# - CVE-2024-11053
|
|
# 8.11.0-r0:
|
|
# - CVE-2024-9681
|
|
# 8.10.0-r0:
|
|
# - CVE-2024-8096
|
|
# 8.9.1-r0:
|
|
# - CVE-2024-7264
|
|
# 8.9.0-r0:
|
|
# - CVE-2024-6197
|
|
# - CVE-2024-6874
|
|
# 8.7.1-r0:
|
|
# - CVE-2024-2004
|
|
# - CVE-2024-2379
|
|
# - CVE-2024-2398
|
|
# - CVE-2024-2466
|
|
# 8.6.0-r0:
|
|
# - CVE-2024-0853
|
|
# 8.5.0-r0:
|
|
# - CVE-2023-46218
|
|
# - CVE-2023-46219
|
|
# 8.4.0-r0:
|
|
# - CVE-2023-38545
|
|
# - CVE-2023-38546
|
|
# 8.3.0-r0:
|
|
# - CVE-2023-38039
|
|
# 8.1.0-r0:
|
|
# - CVE-2023-28319
|
|
# - CVE-2023-28320
|
|
# - CVE-2023-28321
|
|
# - CVE-2023-28322
|
|
# 8.0.0-r0:
|
|
# - CVE-2023-27533
|
|
# - CVE-2023-27534
|
|
# - CVE-2023-27535
|
|
# - CVE-2023-27536
|
|
# - CVE-2023-27537
|
|
# - CVE-2023-27538
|
|
# 7.88.0-r0:
|
|
# - CVE-2023-23914
|
|
# - CVE-2023-23915
|
|
# - CVE-2023-23916
|
|
# 7.87.0-r0:
|
|
# - CVE-2022-43551
|
|
# - CVE-2022-43552
|
|
# 7.86.0-r0:
|
|
# - CVE-2022-32221
|
|
# - CVE-2022-35260
|
|
# - CVE-2022-42915
|
|
# - CVE-2022-42916
|
|
# 7.85.0-r0:
|
|
# - CVE-2022-35252
|
|
# 7.84.0-r0:
|
|
# - CVE-2022-32205
|
|
# - CVE-2022-32206
|
|
# - CVE-2022-32207
|
|
# - CVE-2022-32208
|
|
# 7.83.1-r0:
|
|
# - CVE-2022-27778
|
|
# - CVE-2022-27779
|
|
# - CVE-2022-27780
|
|
# - CVE-2022-27781
|
|
# - CVE-2022-27782
|
|
# - CVE-2022-30115
|
|
# 7.83.0-r0:
|
|
# - CVE-2022-22576
|
|
# - CVE-2022-27774
|
|
# - CVE-2022-27775
|
|
# - CVE-2022-27776
|
|
# 7.79.0-r0:
|
|
# - CVE-2021-22945
|
|
# - CVE-2021-22946
|
|
# - CVE-2021-22947
|
|
# 7.78.0-r0:
|
|
# - CVE-2021-22922
|
|
# - CVE-2021-22923
|
|
# - CVE-2021-22924
|
|
# - CVE-2021-22925
|
|
# 7.77.0-r0:
|
|
# - CVE-2021-22898
|
|
# - CVE-2021-22901
|
|
# 7.76.0-r0:
|
|
# - CVE-2021-22876
|
|
# - CVE-2021-22890
|
|
# 7.74.0-r0:
|
|
# - CVE-2020-8284
|
|
# - CVE-2020-8285
|
|
# - CVE-2020-8286
|
|
# 7.72.0-r0:
|
|
# - CVE-2020-8231
|
|
# 7.71.0-r0:
|
|
# - CVE-2020-8169
|
|
# - CVE-2020-8177
|
|
# 7.66.0-r0:
|
|
# - CVE-2019-5481
|
|
# - CVE-2019-5482
|
|
# 7.65.0-r0:
|
|
# - CVE-2019-5435
|
|
# - CVE-2019-5436
|
|
# 7.64.0-r0:
|
|
# - CVE-2018-16890
|
|
# - CVE-2019-3822
|
|
# - CVE-2019-3823
|
|
# 7.62.0-r0:
|
|
# - CVE-2018-16839
|
|
# - CVE-2018-16840
|
|
# - CVE-2018-16842
|
|
# 7.61.1-r0:
|
|
# - CVE-2018-14618
|
|
# 7.61.0-r0:
|
|
# - CVE-2018-0500
|
|
# 7.60.0-r0:
|
|
# - CVE-2018-1000300
|
|
# - CVE-2018-1000301
|
|
# 7.59.0-r0:
|
|
# - CVE-2018-1000120
|
|
# - CVE-2018-1000121
|
|
# - CVE-2018-1000122
|
|
# 7.57.0-r0:
|
|
# - CVE-2017-8816
|
|
# - CVE-2017-8817
|
|
# - CVE-2017-8818
|
|
# 7.56.1-r0:
|
|
# - CVE-2017-1000257
|
|
# 7.55.0-r0:
|
|
# - CVE-2017-1000099
|
|
# - CVE-2017-1000100
|
|
# - CVE-2017-1000101
|
|
# 7.54.0-r0:
|
|
# - CVE-2017-7468
|
|
# 7.53.1-r2:
|
|
# - CVE-2017-7407
|
|
# 7.53.0-r0:
|
|
# - CVE-2017-2629
|
|
# 7.52.1-r0:
|
|
# - CVE-2016-9594
|
|
# 7.51.0-r0:
|
|
# - CVE-2016-8615
|
|
# - CVE-2016-8616
|
|
# - CVE-2016-8617
|
|
# - CVE-2016-8618
|
|
# - CVE-2016-8619
|
|
# - CVE-2016-8620
|
|
# - CVE-2016-8621
|
|
# - CVE-2016-8622
|
|
# - CVE-2016-8623
|
|
# - CVE-2016-8624
|
|
# - CVE-2016-8625
|
|
# 7.50.3-r0:
|
|
# - CVE-2016-7167
|
|
# 7.50.2-r0:
|
|
# - CVE-2016-7141
|
|
# 7.50.1-r0:
|
|
# - CVE-2016-5419
|
|
# - CVE-2016-5420
|
|
# - CVE-2016-5421
|
|
# 7.36.0-r0:
|
|
# - CVE-2014-0138
|
|
# - CVE-2014-0139
|
|
# 0:
|
|
# - CVE-2021-22897
|
|
|
|
build() {
|
|
./configure \
|
|
--build=$CBUILD \
|
|
--host=$CHOST \
|
|
--prefix=/usr \
|
|
--enable-ares \
|
|
--enable-ipv6 \
|
|
--enable-unix-sockets \
|
|
--enable-static \
|
|
--with-libidn2 \
|
|
--with-nghttp2 \
|
|
--with-openssl \
|
|
--with-ca-bundle=/etc/ssl/cert.pem \
|
|
--with-ca-path=/etc/ssl/certs \
|
|
--with-zsh-functions-dir \
|
|
--with-fish-functions-dir \
|
|
--disable-ldap \
|
|
--with-pic \
|
|
--enable-websockets \
|
|
--without-libssh2 # https://bugs.alpinelinux.org/issues/10222
|
|
make
|
|
|
|
# generation of completions is not supported when cross-compiling.
|
|
if [ -z "$BOOTSTRAP" ] && [ -z "$APORTS_BOOTSTRAP" ]; then
|
|
make -C scripts/
|
|
fi
|
|
}
|
|
|
|
check() {
|
|
make -C tests
|
|
make -j1 -C tests TFLAGS="-j$JOBS" nonflaky-test
|
|
}
|
|
|
|
package() {
|
|
# depends on exactly the same build of libcurl
|
|
depends="libcurl=$pkgver-r$pkgrel"
|
|
|
|
make install DESTDIR="$pkgdir"
|
|
if [ -z "$BOOTSTRAP" ] && [ -z "$APORTS_BOOTSTRAP" ]; then
|
|
install -Dm644 scripts/_curl -t \
|
|
"$pkgdir"/usr/share/zsh/site-functions/
|
|
install -Dm644 scripts/curl.fish -t \
|
|
"$pkgdir"/usr/share/fish/vendor_completions.d/
|
|
fi
|
|
}
|
|
|
|
libcurl() {
|
|
pkgdesc="The multiprotocol file transfer library"
|
|
|
|
amove usr/lib
|
|
}
|
|
|
|
dev() {
|
|
default_dev
|
|
# Used by trurl
|
|
install -Dm755 -t "$subpkgdir"/usr/bin "$builddir"/scripts/cd2nroff
|
|
}
|
|
|
|
sha512sums="
|
|
d266e460f162ee455b56726e5b7247b2d1aa5265ae12081513fc0c5c79e785a594097bc71d505dc9bcd2c2f6f1ff6f4bab9dbd9d120bb76d06c5be8521a8ca7d curl-8.13.0.tar.xz
|
|
e0d0a2038968aec8e0d1a2301cbb2f64df5a78d31a3722fb01192bc2537297ca6651ad8641d8f2dd0e8242667b1f78cba9e519172403dd74a06b7de448316d5f 0001-http-In-alt-svc-negotiation-only-allow-supported-HTT.patch
|
|
"
|