Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 6 Nov 2016 20:35:19 +0000 (UTC)
From:      Ruslan Makhmatkhanov <rm@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r425580 - in head/security/sqlmap: . files
Message-ID:  <201611062035.uA6KZJTC051241@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: rm
Date: Sun Nov  6 20:35:19 2016
New Revision: 425580
URL: https://svnweb.freebsd.org/changeset/ports/425580

Log:
  security/sqlmap: update to 1.0.10
  
  - switch to pypi and drastically simplify the port
  - switch to installing with distutils/autoplist
  - remove PORTDOCS as no docs is in tarball anymore

Deleted:
  head/security/sqlmap/files/
  head/security/sqlmap/pkg-plist
Modified:
  head/security/sqlmap/Makefile
  head/security/sqlmap/distinfo
  head/security/sqlmap/pkg-descr

Modified: head/security/sqlmap/Makefile
==============================================================================
--- head/security/sqlmap/Makefile	Sun Nov  6 20:30:49 2016	(r425579)
+++ head/security/sqlmap/Makefile	Sun Nov  6 20:35:19 2016	(r425580)
@@ -2,58 +2,23 @@
 # $FreeBSD$
 
 PORTNAME=	sqlmap
-PORTVERSION=	1.0.4.19
+PORTVERSION=	1.0.10
 CATEGORIES=	security python
+MASTER_SITES=	CHEESESHOP
 
 MAINTAINER=	rm@FreeBSD.org
 COMMENT=	Automatic SQL injection tool
 
 LICENSE=	GPLv2
 
-USE_GITHUB=	yes
-GH_TUPLE=	sqlmapproject:sqlmap:aa21550
-
 NO_ARCH=	yes
-USES=		python:2.7 shebangfix
+USES=		python:-2.7 shebangfix
+USE_PYTHON=	autoplist distutils
 SHEBANG_FILES=	*.py
-SUB_FILES=	sqlmap.sh
-SUB_LIST=	PYTHON_CMD=${PYTHON_CMD} \
-		PATH=${PYTHONPREFIX_SITELIBDIR}/sqlmap
-PORTDOCS=	*
 
 OPTIONS_DEFINE=	MSF
 MSF_DESC=	Enable Metasploit Framework integration
 
 MSF_RUN_DEPENDS=	msfcli:security/metasploit
 
-do-build:
-	@${PYTHON_CMD} -m compileall ${WRKSRC}
-	@${PYTHON_CMD} -O -m compileall ${WRKSRC}
-	${MKDIR} ${WRKDIR}/build/extra/
-	${MV} ${WRKSRC}/doc/ ${WRKDIR}/build/
-	${MV} ${WRKSRC}/README.md ${WRKDIR}/build/doc/
-	${MV} ${WRKSRC}/sqlmap.conf ${WRKDIR}/build/
-
-# remove development files
-.for f in .gitattributes .gitignore .travis.yml
-	${RM} ${WRKSRC}/${f}
-.endfor
-
-# move non-python files out of WRKSRC
-.for f in runcmd shellcodeexec
-	${MV} ${WRKSRC}/extra/${f} ${WRKDIR}/build/extra/${f}
-.endfor
-	${MV} ${WRKSRC}/udf ${WRKDIR}/build/extra/
-
-do-install:
-	@${MKDIR} ${STAGEDIR}${DOCSDIR}
-	( cd ${WRKDIR}/build/doc/ && ${COPYTREE_SHARE} . ${STAGEDIR}${DOCSDIR} )
-
-	@${MKDIR} ${STAGEDIR}${PYTHONPREFIX_SITELIBDIR}/sqlmap/extra
-	( cd ${WRKDIR}/build/extra/ && ${COPYTREE_SHARE} . ${STAGEDIR}${DATADIR} )
-	( cd ${WRKSRC} && ${COPYTREE_SHARE} . ${STAGEDIR}${PYTHONPREFIX_SITELIBDIR}/sqlmap )
-
-	${INSTALL_DATA} ${WRKDIR}/build/sqlmap.conf ${STAGEDIR}${PREFIX}/etc/sqlmap.conf.sample
-	${INSTALL_SCRIPT} ${WRKDIR}/sqlmap.sh ${STAGEDIR}${PREFIX}/bin/sqlmap
-
 .include <bsd.port.mk>

Modified: head/security/sqlmap/distinfo
==============================================================================
--- head/security/sqlmap/distinfo	Sun Nov  6 20:30:49 2016	(r425579)
+++ head/security/sqlmap/distinfo	Sun Nov  6 20:35:19 2016	(r425580)
@@ -1,2 +1,3 @@
-SHA256 (sqlmapproject-sqlmap-1.0.4.19-aa21550_GH0.tar.gz) = da88388efca67a8aae1da348613df632b6c4528696c3047794c601a193bcbe28
-SIZE (sqlmapproject-sqlmap-1.0.4.19-aa21550_GH0.tar.gz) = 6700105
+TIMESTAMP = 1478463224
+SHA256 (sqlmap-1.0.10.tar.gz) = b6233a42eefef9a90bdee665ebfdecbc838f97ef3f8b9f48fc12fc2fbacf9855
+SIZE (sqlmap-1.0.10.tar.gz) = 6725526

Modified: head/security/sqlmap/pkg-descr
==============================================================================
--- head/security/sqlmap/pkg-descr	Sun Nov  6 20:30:49 2016	(r425579)
+++ head/security/sqlmap/pkg-descr	Sun Nov  6 20:35:19 2016	(r425580)
@@ -1,8 +1,7 @@
 sqlmap is an automatic SQL injection tool entirely developed in Python. It is
-capable to perform an extensive database management system back-end
-fingerprint, retrieve remote DBMS databases, usernames, tables, columns,
-enumerate entire DBMS, read system files and much more taking advantage of web
-application programming security flaws that lead to SQL injection
-vulnerabilities.
+capable to perform an extensive database management system back-end fingerprint,
+retrieve remote DBMS databases, usernames, tables, columns, enumerate entire
+DBMS, read system files and much more taking advantage of web application
+programming security flaws that lead to SQL injection vulnerabilities.
 
 WWW: http://sqlmap.org/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201611062035.uA6KZJTC051241>