195eaac041
https://www.djangoproject.com/weblog/2013/feb/19/security/ - Host header poisoning: an attacker could cause Django to generate and display URLs that link to arbitrary domains. - Formset denial-of-service: an attacker can abuse Django's tracking of the number of forms in a formset to cause a denial-of-service attack. - XML attacks: Django's serialization framework was vulnerable to attacks via XML entity expansion and external references. - Data leakage via admin history log: Django's admin interface could expose supposedly-hidden information via its history log.
36 lines
845 B
Makefile
36 lines
845 B
Makefile
# $OpenBSD: Makefile,v 1.26 2013/03/02 12:47:49 sthen Exp $
|
|
|
|
COMMENT = high-level Python web framework
|
|
|
|
MODPY_EGG_VERSION = 1.4.5
|
|
LNAME = django
|
|
DISTNAME = Django-${MODPY_EGG_VERSION}
|
|
PKGNAME = py-${LNAME}-${MODPY_EGG_VERSION}
|
|
CATEGORIES = www
|
|
|
|
HOMEPAGE = http://www.djangoproject.com/
|
|
|
|
MAINTAINER = Ryan Boggs <rmboggs@gmail.com>
|
|
|
|
# BSD License
|
|
PERMIT_PACKAGE_CDROM = Yes
|
|
PERMIT_PACKAGE_FTP = Yes
|
|
PERMIT_DISTFILES_CDROM = Yes
|
|
PERMIT_DISTFILES_FTP = Yes
|
|
|
|
MASTER_SITES = ${HOMEPAGE}/m/releases/${MODPY_EGG_VERSION:R}/
|
|
|
|
MODULES = lang/python
|
|
|
|
SUBST_VARS += LNAME
|
|
|
|
post-install:
|
|
${INSTALL_DATA_DIR} ${PREFIX}/share/doc/${LNAME}
|
|
cd ${WRKSRC}/docs && pax -rw * ${PREFIX}/share/doc/${LNAME}
|
|
|
|
do-regress:
|
|
cd ${WRKSRC} && env LC_CTYPE=en_US.UTF-8 PYTHONPATH=. \
|
|
${MODPY_BIN} tests/runtests.py --settings=test_sqlite
|
|
|
|
.include <bsd.port.mk>
|