diff options
Diffstat (limited to 'community/lua-http/APKBUILD')
-rw-r--r-- | community/lua-http/APKBUILD | 20 |
1 files changed, 16 insertions, 4 deletions
diff --git a/community/lua-http/APKBUILD b/community/lua-http/APKBUILD index 166a8438054..a1cbc148945 100644 --- a/community/lua-http/APKBUILD +++ b/community/lua-http/APKBUILD @@ -2,20 +2,29 @@ # Maintainer: Jakub Jirutka <jakub@jirutka.cz> pkgname=lua-http pkgver=0.4 -pkgrel=1 +pkgrel=2 pkgdesc="HTTP Library for Lua that supports HTTP(S) 1.0, 1.1 and 2.0" url="https://github.com/daurnimator/lua-http" arch="noarch" license="MIT" depends="lua-binaryheap lua-cqueues lua-basexx lua-fifo lua-lpeg lua-lpeg_patterns>=0.5 lua-ossl" +makedepends="lua-bit32 lua-compat53" checkdepends="lua-busted lua5.1-compat53 lua5.2-compat53 lua5.1-bit32 luajit" source="$pkgname-$pkgver.tar.gz::https://github.com/daurnimator/lua-http/archive/v$pkgver.tar.gz - fix-cookie-spec-test.patch" + fix-cookie-spec-test.patch + $pkgname-fix-tls-test.patch::https://github.com/daurnimator/lua-http/commit/169c1a7586d39be1bf0d98b69934e8e8b08a87cd.patch + fix-request-spec.patch + CVE-2023-4540.patch + " + +# secfixes: +# 0.4-r2: +# - CVE-2023-4540 case "$CARCH" in # FIXME: Some tests fail with "Address not available". - # and ppc64le hangs - aarch64|arm*|ppc64le|mips*) options="!check";; + # ppc64le hangs, riscv64 doesn't have luajit + aarch64|arm*|ppc64le|riscv64) options="!check";; esac _luaversions="5.1 5.2 5.3" @@ -60,4 +69,7 @@ _subpackage() { sha512sums=" 3933c36e2d439c81ba4506d3ab1dd53a85ba3cd641abbd945210bdc6b6edb3e01516adb473cf59c5c194d9f45e7de9196e31265318d01c5b7684bb5e87dbd26a lua-http-0.4.tar.gz 32208d4389d4f1930a2e3b73868ab3070940e4e4819624556050356624718bbcb71b2da4fd9334ed2171eb14c3ed134d2ce201600948fd2372afca09ea2104b5 fix-cookie-spec-test.patch +01d558cb2f900bf751557652c04f651326cb352d975c4be1aaeff9126d2c4aebebf61b89327f3508f90df66ba8086a4704ba63000a1ea5a854bb1e08853b94dd lua-http-fix-tls-test.patch +a9f98c2428dc595a595beb522a2d725696c8080331cb6326da07ad79148a5482c725a22a753752eab94121e62e4647f3fe9b99ebc5954e142ccedaf631c38673 fix-request-spec.patch +6cc7b0c63f508e141492c2d72e49cc6e91f0a2efb16d3616d03f8ae56a1d1a9a97d68c837a6215505b191c70e5f6c5247946bffaafee85d7d09c895bc1feafe3 CVE-2023-4540.patch " |