void-packages/srcpkgs/salt/template
Toyam Cox 3b75185529 salt: update to 2017.7.2.
SECURITY FIX

CVE-2017-14695 Directory traversal vulnerability in minion id
validation in SaltStack. Allows remote minions with incorrect
credentials to authenticate to a master via a crafted minion
ID. Credit for discovering the security flaw goes to: Julian Brost
(julian@0x4a42.net)

CVE-2017-14696 Remote Denial of Service with a specially crafted
authentication request. Credit for discovering the security flaw
goes to: Julian Brost (julian@0x4a42.net)
2017-10-10 13:05:23 -04:00

29 lines
863 B
Bash

# Template file for 'salt'
pkgname=salt
version=2017.7.2
revision=1
build_style=python2-module
noarch=yes
pycompile_module="salt"
conf_files="/etc/salt/*"
hostmakedepends="python-devel"
makedepends="python-devel"
depends="python-yaml python-Jinja2 python-requests python-pyzmq python-crypto
python-M2Crypto python-tornado python-msgpack dmidecode pciutils"
#changelog="https://docs.saltstack.com/en/latest/topics/releases/${version}.html"
short_desc="Remote execution system, and configuration manager"
maintainer="Toyam Cox <Vaelatern@gmail.com>"
license="Apache-2.0"
homepage="http://saltstack.org/"
distfiles="$PYPI_SITE/s/salt/salt-${version}.tar.gz"
checksum=ff3bc7de5abf01b8acbd144db5811b00867179b2353f5c6f7f19241e2eff2840
post_install() {
vmkdir /etc/salt 0750
vcopy conf/* /etc/salt/
vsv salt-api
vsv salt-master
vsv salt-minion
vsv salt-syndic
}