getsploit: 0.3.2_p20190322 bump

This commit is contained in:
Yury Martynov 2019-03-22 21:41:11 +03:00
parent f32054ade8
commit f59ea964d8
No known key found for this signature in database
GPG key ID: EBE62DD0CCEAE19E
4 changed files with 58 additions and 17 deletions

View file

@ -21,7 +21,7 @@ else
fi
RESTRICT="mirror"
LICENSE="LGPL-3"
LICENSE="GPL-3"
SLOT="0"
IUSE=""

View file

@ -17,7 +17,7 @@ if [[ ${PV} == *9999 ]]; then
KEYWORDS=""
else
SRC_URI="https://github.com/vulnersCom/getsploit/archive/${PV}.tar.gz -> ${P}.tar.gz"
KEYWORDS="~amd64 ~x86"
KEYWORDS="amd64 x86"
fi
RESTRICT="mirror"

View file

@ -0,0 +1,40 @@
# Copyright 1999-2019 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=7
PYTHON_COMPAT=( python{2_7,3_{5,6}} )
PYTHON_REQ_USE="sqlite"
inherit distutils-r1 git-r3
DESCRIPTION="Command line utility for searching and downloading exploits"
HOMEPAGE="https://github.com/vulnersCom/getsploit"
SRC_URI=""
if [[ ${PV} != *9999 ]]; then
EGIT_REPO_URI="https://github.com/vulnersCom/getsploit"
EGIT_COMMIT="${PV}"
EGIT_COMMIT="65258268d83e942d342cd75c6d6ddf39a2e9ec2b"
KEYWORDS="~amd64 ~x86"
else
EGIT_REPO_URI="https://github.com/vulnersCom/getsploit"
KEYWORDS=""
fi
RESTRICT="mirror"
LICENSE="LGPL-3"
SLOT="0"
IUSE=""
RDEPEND="${PYTHON_DEPS}
dev-python/clint[${PYTHON_USEDEP}]
dev-python/six[${PYTHON_USEDEP}]
dev-python/texttable[${PYTHON_USEDEP}]
dev-python/urllib3[${PYTHON_USEDEP}]
dev-python/vulners[${PYTHON_USEDEP}]"
pkg_postinst() {
elog
elog "See documentation: https://github.com/vulnersCom/getsploit#how-to-use"
elog
}

View file

@ -1,23 +1,24 @@
# Copyright 1999-2019 Gentoo Foundation
# Copyright 1999-2019 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
EAPI=7
PYTHON_COMPAT=( python3_{4,5,6,7} )
PYTHON_COMPAT=( python{2_7,3_{5,6}} )
PYTHON_REQ_USE="sqlite"
inherit eutils distutils-r1
inherit distutils-r1 git-r3
DESCRIPTION="Command line utility for searching and downloading exploits."
DESCRIPTION="Command line utility for searching and downloading exploits"
HOMEPAGE="https://github.com/vulnersCom/getsploit"
SRC_URI=""
if [[ ${PV} == *9999 ]]; then
inherit git-r3
if [[ ${PV} != *9999 ]]; then
EGIT_REPO_URI="https://github.com/vulnersCom/getsploit"
EGIT_COMMIT="${PV}"
EGIT_COMMIT="65258268d83e942d342cd75c6d6ddf39a2e9ec2b"
KEYWORDS="~amd64 ~x86"
else
EGIT_REPO_URI="https://github.com/vulnersCom/getsploit"
KEYWORDS=""
else
SRC_URI="https://github.com/vulnersCom/getsploit/archive/${PV}.tar.gz -> ${P}.tar.gz"
KEYWORDS="~amd64 ~x86"
fi
RESTRICT="mirror"
@ -25,12 +26,12 @@ LICENSE="LGPL-3"
SLOT="0"
IUSE=""
RDEPEND="${PYTHON_DEPS}"
src_prepare() {
eapply "${FILESDIR}"/${P}_add_support_user_home_dir.patch
eapply_user
}
RDEPEND="${PYTHON_DEPS}
dev-python/clint[${PYTHON_USEDEP}]
dev-python/six[${PYTHON_USEDEP}]
dev-python/texttable[${PYTHON_USEDEP}]
dev-python/urllib3[${PYTHON_USEDEP}]
dev-python/vulners[${PYTHON_USEDEP}]"
pkg_postinst() {
elog