51 Commits

Author SHA1 Message Date
rpointel
0a646eda76 update to 1.9.6 and 1.8.13.
sounds good jasper@.
2016-05-09 17:21:05 +00:00
rpointel
c175731a5a bugfix releases to 1.9.5 and 1.8.12.
ok jasper@
More information: https://www.djangoproject.com/weblog/2016/apr/01/bugfix-releases/
2016-04-08 16:13:30 +00:00
rpointel
0aada50d4f bugfix releases to 1.8.11 and 1.9.4.
Details: https://www.djangoproject.com/weblog/2016/mar/05/bugfix-releases/
ok jasper@
2016-03-31 19:06:23 +00:00
jasper
cc18c4125c security updates to latest releases, addressing https://www.djangoproject.com/weblog/2016/mar/01/security-releases/
ok rpointel@ (MAINTAINER)
2016-03-10 09:31:07 +00:00
rpointel
90f926efa6 update django to 1.9.2 and 1.8.9.
ok jasper@ benoit@
2016-02-02 20:23:09 +00:00
jasper
c11eabb3d5 instruct portroach to track this particular branch of django 2016-01-08 21:32:42 +00:00
rpointel
708638dc16 update django lts to 1.8.8 and stable to 1.9.1 (bugfixes releases).
More info: https://www.djangoproject.com/weblog/2016/jan/02/bugfix-releases-issued/
remove the maintainer from his request.
modify pkg/README for stable, idea from shadchin@.
ok shadchin@.
2016-01-04 19:38:30 +00:00
rpointel
4d4bbfd27c update django to 1.8.7 and 1.7.11.
ok aja@
2015-11-30 12:26:20 +00:00
rpointel
39ad32740a update to 1.8.6.
ok aja@.
2015-11-11 09:15:04 +00:00
rpointel
c0093af19f update django-lts to 1.8.5.
ok aja@.
2015-10-11 15:05:50 +00:00
sthen
af28ee77da bump REVISION for setuptools dep change. 2015-09-29 10:52:53 +00:00
ajacoutot
d4b131c08c Don't substitute MODPY_VERSION for releases/1.3.4.txt ; it will break
whenever our default python3 will change.
2015-09-21 16:30:18 +00:00
jasper
1bc95afbcb - security update to django-1.7.10
* CVE-2015-5963, Denial-of-service possibility in logout() view by filling session store
* CVE-2015-5964, Additional fixes in relation to CVE-2015-5963

https://www.djangoproject.com/weblog/2015/aug/18/security-releases/

ok rpointel@
2015-08-20 11:28:46 +00:00
jasper
395e5ee5f0 - security update to django-1.8.4
* CVE-2015-5963, Denial-of-service possibility in logout() view by filling session store

https://www.djangoproject.com/weblog/2015/aug/18/security-releases/

ok rpointel@
2015-08-20 11:26:54 +00:00
rpointel
440c38e540 add py-django-lts version 1.8.3 and create a structure with a Makefile.inc.
from me and some tweaks by jasper@. ok jasper@ (thanks).
2015-07-27 20:01:01 +00:00
jasper
2c4bde425a Security update to django-1.7.9
https://www.djangoproject.com/weblog/2015/jul/08/security-releases/
2015-07-24 14:30:13 +00:00
rpointel
c60b3a96c3 update django to 1.7.7 (security fix).
details: https://docs.djangoproject.com/en/1.7/releases/1.7.7/
2015-04-10 04:51:25 +00:00
jasper
5e91600570 - switch to MODPY_PI 2015-04-02 14:21:12 +00:00
rpointel
3beb88ee9c Update Django to 1.7.6, security fix.
Release note: https://www.djangoproject.com/weblog/2015/mar/09/security-releases/
2015-03-15 07:15:09 +00:00
rpointel
2285cf5ea6 Update django to 1.7.4.
ok aja@.
Release notes: https://docs.djangoproject.com/en/1.7/releases/1.7.4/
2015-02-10 09:49:48 +00:00
jasper
b5e3131521 security update to 1.5.8
https://www.djangoproject.com/weblog/2014/may/14/security-releases-issued/

ok sthen@
2014-05-22 11:20:18 +00:00
benoit
2a60a24766 Django 1.5.5 fixes a couple security-related bugs and several other bugs in
the 1.5 series. For more info, see
https://docs.djangoproject.com/en/1.5/releases/1.5.5/

From Ryan Boggs (maintainer)
2013-10-28 14:37:53 +00:00
sthen
7cbdf093de SECURITY update to Django 1.5.4, fixes DoS via passing large passwords,
directory traversal, code execution in django.contrib.sessions, and XSS.
For more info, see
https://docs.djangoproject.com/en/1.5/releases/1.5.4/
https://docs.djangoproject.com/en/1.5/releases/1.5.3/
https://docs.djangoproject.com/en/1.5/releases/1.5.2/

From maintainer Ryan Boggs, ok armani@
2013-10-23 08:19:52 +00:00
benoit
8e9872ea09 - update py-django to 1.5.1
- update HOMEPAGE, MASTER_SITES and README
- regen PLIST

tweaks and ok from Ryan Boggs (maintainer)
2013-05-13 08:59:22 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
sthen
195eaac041 SECURITY update; py-Django 1.4.5
https://www.djangoproject.com/weblog/2013/feb/19/security/

- Host header poisoning: an attacker could cause Django to generate
and display URLs that link to arbitrary domains.

- Formset denial-of-service: an attacker can abuse Django's tracking
of the number of forms in a formset to cause a denial-of-service attack.

- XML attacks: Django's serialization framework was vulnerable to
attacks via XML entity expansion and external references.

- Data leakage via admin history log: Django's admin interface could
expose supposedly-hidden information via its history log.
2013-03-02 12:47:49 +00:00
rpointel
3577e6272a update django to 1.4.3.
ok Ryan Boggs (maintainer).
2012-12-29 07:16:38 +00:00
gsoares
622f0916bb SECURITY update for py-django-1.4.2
diff submitted by Ryan Boggs (MAINTAINER), thanks!

This update fixes a security issue related to host header poisoning.
more details at: ttps://www.djangoproject.com/weblog/2012/oct/17/security/
2012-10-20 16:00:58 +00:00
jasper
0b8889a1de SECURITY UPDATE to 1.4.1, fixes CVE-2012-3442 CVE-2012-3443 CVE-2012-3444
Django Cross-Site Scripting and Two Denial of Service Vulnerabilities

from ryan boggs (MAINTAINER)
2012-08-24 17:01:32 +00:00
rpointel
301f0c2a42 Update django to 1.4, ok Ryan Boggs (maintainer).
release notes: https://docs.djangoproject.com/en/dev/releases/1.4/
2012-05-10 20:04:48 +00:00
espie
58fffade54 normalize pkgpath 2011-09-16 12:00:05 +00:00
rpointel
d9c94aa811 bump after default python version switch 2011-06-08 18:15:28 +00:00
rpointel
622d1fe42b Modify PLIST for pkg-readme, replaced py-${LNAME}-${MODPY_EGG_VERSION}
by ${FULLPKGNAME}. Bump revision.
ok Ryan Boggs (maintainer), landry@.
2011-06-07 05:15:40 +00:00
ajacoutot
f982995f2b Add a consistent header that substitutes FULLPKGNAME for the READMEs.
ok jasper@ sthen@
2011-06-02 13:41:36 +00:00
rpointel
50e0636f2c Update Django to 1.3.
From Piotr Sikora, ok Ryan Boggs (MAINTAINER), discussed with me and landry@.
2011-04-24 18:40:03 +00:00
jasper
27ef93b489 - update py-django to 1.2.5
from ryan boggs (MAINTAINER)
2011-03-10 09:29:10 +00:00
jasper
84ff9e5db1 Security fixes for django that address CVE-2011-069{6,7,8}.
Patches from upstream svn, via ryan boggs (MAINTAINER)
ok espie@
2011-02-11 11:45:48 +00:00
rpointel
5be9e1992c Update django to 1.2.4 from Ryan Boggs (Maintainer).
Add spaces around variables.

SECURITY FIX :
http://www.djangoproject.com/weblog/2010/dec/22/security/
2011-01-02 22:04:09 +00:00
armani
44cd673bfc Update django to 1.2.3, from maintainer Ryan Boggs
go for it sthen@
2010-10-05 09:03:19 +00:00
sthen
61146ec4f9 bumps for python 2010-08-30 22:02:33 +00:00
sthen
d476f25ae9 Update to 1.2.1, from maintainer Ryan Boggs, also tested by armani@ 2010-07-16 07:41:41 +00:00
ajacoutot
ce7c969358 Stupid poor blank lines, stupid poor blank lines... 2010-04-15 14:58:24 +00:00
steven
55ff289558 security update to 1.1.1
description at http://www.djangoproject.com/weblog/2009/oct/09/security/

from maintainer Ryan Boggs
2009-10-10 17:09:03 +00:00
sthen
5d7fe94df7 Update to 1.1, from maintainer Ryan Boggs. 2009-09-18 13:16:51 +00:00
ian
8a6df1f0ef Upgrade to 1.0.2, and switch maintainer to Ryan Boggs, with approval of old maintainer. 2009-06-03 17:02:54 +00:00
jasper
c9657ef17b another batch of missing bumps 2009-03-25 13:52:31 +00:00
wcmaier
2e43c8cea1 Update to 0.96.2, which includes a SECURITY FIX (XSS in admin interface).
From MAINTAINER Darrin Chandler <dwchandler at stilyagin at com>.
Use MODPY_EGG_VERSION while here.

ok merdely@
2008-05-24 04:17:11 +00:00
martynas
4ed5988446 remove lang/python category from individual ports 2007-12-10 21:07:51 +00:00
merdely
6393f4e72e Update to 0.96.1.
Fixes an i18n vuln leading to possible DoS, described at
http://www.djangoproject.com/weblog/2007/oct/26/security-fix/

From MAINTAINER (Darren Chandler)
"go ahead" jasper@
2007-11-08 22:00:36 +00:00
steven
9bfed1ac43 bump PKGNAME after python version switch 2007-10-08 08:22:38 +00:00