Index: head/security/cvechecker/Makefile =================================================================== --- head/security/cvechecker/Makefile (revision 452275) +++ head/security/cvechecker/Makefile (revision 452276) @@ -1,46 +1,47 @@ # Created by: Stefan Esser # $FreeBSD$ PORTNAME= cvechecker DISTVERSIONPREFIX= v DISTVERSION= 3.8 +PORTREVISION= 1 CATEGORIES= security MAINTAINER= se@FreeBSD.org COMMENT= Check CVE database for vulnerabilities affecting installed packages LICENSE= GPLv3 LIB_DEPENDS= libargp.so:devel/argp-standalone \ libconfig.so:devel/libconfig RUN_DEPENDS= bash:shells/bash MAKE_ENV+= LDADD=-largp USES= autoreconf pkgconfig shebangfix SHEBANG_FILES= scripts/cverules scripts/cvegenversdat GNU_CONFIGURE= yes CONFIGURE_ARGS= --localstatedir=/var/db bash_OLD_CMD+= /bin/sh OPTIONS_MULTI= DB OPTIONS_MULTI_DB= MYSQL SQLITE OPTIONS_DEFAULT= SQLITE DB_DESC= CVE Database MYSQL_USES= mysql ssl MYSQL_CONFIGURE_ENABLE= mysql SQLITE_USES= sqlite SQLITE_CONFIGURE_ENABLE= sqlite3 USE_GITHUB= yes GH_ACCOUNT= sjvermeu post-stage: ${MV} ${STAGEDIR}${PREFIX}/etc/cvechecker.conf ${STAGEDIR}${PREFIX}/etc/cvechecker.conf.sample .include Index: head/security/cvechecker/files/patch-scripts_pullcves =================================================================== --- head/security/cvechecker/files/patch-scripts_pullcves (nonexistent) +++ head/security/cvechecker/files/patch-scripts_pullcves (revision 452276) @@ -0,0 +1,48 @@ +--- scripts/pullcves.orig 2017-03-27 16:42:38 UTC ++++ scripts/pullcves +@@ -44,17 +44,11 @@ then + exit 1; + fi + +-wget -V > /dev/null 2>&1; +-if [ $? -ne 0 ]; +-then +- echo "This script requires wget to be available on the system and reachable in a directory mentioned in the PATH variable." +- exit 1; +-fi + + DATADIR=$(awk -F'=' '/^datadir/ {print $2}' ${CONFFILE} | awk -F'"' '{print $2}'); + CVECACHE=$(awk -F'=' '/^cvecache/ {print $2}' ${CONFFILE} | awk -F'"' '{print $2}'); + DLLOCATION=$(awk -F'=' '/^version_url/ {print $2}' ${CONFFILE} | awk -F'"' '{print $2}'); +-WGETCMD="wget --no-check-certificate"; ++FETCHCMD="fetch -q" + DLCVE=0; + DLDAT=0; + COMMAND=$1; +@@ -68,7 +69,7 @@ do + if [ ! -f ${CVECACHE}/nvdcve-2.0-20${YEAR}.xml ]; + then + printf "Downloading nvdcve-2.0-20${YEAR}.xml... "; +- ${WGETCMD} -q -O ${CVECACHE}/nvdcve-2.0-20${YEAR}.xml.gz http://static.nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-20${YEAR}.xml.gz; ++ ${FETCHCMD} -o ${CVECACHE}/nvdcve-2.0-20${YEAR}.xml.gz http://static.nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-20${YEAR}.xml.gz; + gunzip -c ${CVECACHE}/nvdcve-2.0-20${YEAR}.xml.gz > ${CVECACHE}/nvdcve-2.0-20${YEAR}.xml && rm ${CVECACHE}/nvdcve-2.0-20${YEAR}.xml.gz; + printf "ok\nConverting nvdcve-2.0-20${YEAR}.xml to CSV... "; + xsltproc ${DATADIR}/nvdcve2simple.xsl ${CVECACHE}/nvdcve-2.0-20${YEAR}.xml > ${CVECACHE}/nvdcve-2.0-20${YEAR}.csv; +@@ -85,7 +86,7 @@ else + CKSUM=$(cksum nvdcve-2.0-Modified.xml 2>/dev/null); + fi + printf "Downloading nvdcve-2.0-Modified.xml... "; +-${WGETCMD} -q -N http://static.nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz; ++${FETCHCMD} -i nvdcve-2.0-Modified.xml http://static.nvd.nist.gov/feeds/xml/cve/nvdcve-2.0-Modified.xml.gz; + gunzip -c nvdcve-2.0-Modified.xml.gz > nvdcve-2.0-Modified.xml && rm nvdcve-2.0-Modified.xml.gz; + CKSUM2=$(cksum nvdcve-2.0-Modified.xml 2>/dev/null); + if [ "${CKSUM2}" != "${CKSUM}" ] || [ -f nvdcve-2.0-Modified.xml.1 ]; +@@ -113,7 +114,7 @@ fi + + CKSUM=$(cksum versions.dat 2>/dev/null); + printf "Downloading versions.dat... "; +-${WGETCMD} -q -N ${DLLOCATION}; ++${FETCHCMD} -i versions.dat ${DLLOCATION}; + CKSUM2=$(cksum versions.dat 2>/dev/null); + if [ "${CKSUM}" != "${CKSUM2}" ] || [ -f versions.dat.1 ]; + then Property changes on: head/security/cvechecker/files/patch-scripts_pullcves ___________________________________________________________________ Added: fbsd:nokeywords ## -0,0 +1 ## +yes \ No newline at end of property Added: svn:eol-style ## -0,0 +1 ## +native \ No newline at end of property Added: svn:mime-type ## -0,0 +1 ## +text/plain \ No newline at end of property