Update Parent Docker Image Version(s) #321
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Updated Docker Image(s)$1 }' \t\t| xargs -rt apk add --no-network --virtual .python-rundeps \t; \tapk del --no-network .build-deps; \t\tpython3 --version # buildkit",\n "comment": "buildkit.dockerfile.v0"\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "RUN /bin/sh -c set -eux; \tfor src in idle3 pydoc3 python3 python3-config; do \t\tdst=\"$ (echo \"$src\" | tr -d 3)\"; \t\t[ -s \"/usr/local/bin/$src\" ]; \t\t[ ! -e \"/usr/local/bin/$dst\" ]; \t\tln -svT \"$src\" \"/usr/local/bin/$dst\"; \tdone # buildkit",\n "comment": "buildkit.dockerfile.v0"\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "ENV PYTHON_PIP_VERSION=23.0.1",\n "comment": "buildkit.dockerfile.v0",\n "empty_layer": true\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "ENV PYTHON_SETUPTOOLS_VERSION=58.1.0",\n "comment": "buildkit.dockerfile.v0",\n "empty_layer": true\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "ENV PYTHON_GET_PIP_URL=https://github.com/pypa/get-pip/raw/e03e1607ad60522cf34a92e834138eb89f57667c/public/get-pip.py",\n "comment": "buildkit.dockerfile.v0",\n "empty_layer": true\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "ENV PYTHON_GET_PIP_SHA256=ee09098395e42eb1f82ef4acb231a767a6ae85504a9cf9983223df0a7cbd35d7",\n "comment": "buildkit.dockerfile.v0",\n "empty_layer": true\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "RUN /bin/sh -c set -eux; \t\twget -O get-pip.py \"$PYTHON_GET_PIP_URL\"; \techo \"$PYTHON_GET_PIP_SHA256 *get-pip.py\" | sha256sum -c -; \t\texport PYTHONDONTWRITEBYTECODE=1; \t\tpython get-pip.py \t\t--disable-pip-version-check \t\t--no-cache-dir \t\t--no-compile \t\t\"pip==$PYTHON_PIP_VERSION\" \t\t\"setuptools==$PYTHON_SETUPTOOLS_VERSION\" \t; \trm -f get-pip.py; \t\tpip --version # buildkit",\n "comment": "buildkit.dockerfile.v0"\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "CMD [\"python3\"]",\n "comment": "buildkit.dockerfile.v0",\n "empty_layer": true\n }\n ],\n "os": "linux",\n "rootfs": {\n "type": "layers",\n "diff_ids": [\n "sha256:78561cef0761903dd2f7d09856150a6d4fb48967a8f113f3e33d79effbf59a07",\n "sha256:ae872c5ee3e0a6d76a2de640d91d0239e78aa97560a5f4cf77fb331f49f2b74f",\n "sha256:d326c156f81c53fe7d0d5d209652fe4310db16bec05400603969e8946372e55a",\n "sha256:c11116983ed688909eadcc910adb2fe99e71fd770169e4914e79f0e633beed8d",\n "sha256:eb3bacf7e30b35765d983d6914a138442b46104989748ad77d4a32bdcdbc392a"\n ]\n },\n "config": {\n "Cmd": [\n "python3"\n ],\n "Env": [\n "PATH=/usr/local/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",\n "LANG=C.UTF-8",\n "GPG_KEY=E3FF2839C048B25C084DEBE9B26995E310250568",\n "PYTHON_VERSION=3.9.19",\n "PYTHON_PIP_VERSION=23.0.1",\n "PYTHON_SETUPTOOLS_VERSION=58.1.0",\n "PYTHON_GET_PIP_URL=https://github.com/pypa/get-pip/raw/e03e1607ad60522cf34a92e834138eb89f57667c/public/get-pip.py",\n "PYTHON_GET_PIP_SHA256=ee09098395e42eb1f82ef4acb231a767a6ae85504a9cf9983223df0a7cbd35d7"\n ],\n "ArgsEscaped": true\n }\n }\n },\n "Results": [\n {\n "Target": "python:3.9-alpine@sha256:d7a5800c8b846cee989d1605c9e045ac9ca2a72edb6f26296d9065b752ae4bbb (alpine 3.20.2)",\n "Class": "os-pkgs",\n "Type": "alpine"\n },\n {\n "Target": "Python",\n "Class": "lang-pkgs",\n "Type": "python-pkg",\n "Vulnerabilities": [\n {\n "VulnerabilityID": "CVE-2023-5752",\n "PkgName": "pip",\n "PkgPath": "usr/local/lib/python3.9/site-packages/pip-23.0.1.dist-info/METADATA",\n "PkgIdentifier": {\n "PURL": "pkg:pypi/pip@23.0.1",\n "UID": "cca250be3966c909"\n },\n "InstalledVersion": "23.0.1",\n "FixedVersion": "23.3",\n "Status": "fixed",\n "Layer": {\n "Digest": "sha256:fb800bab7c104e705cc46da75158ffdb10c4e36d75db185473226ec2d688079d",\n "DiffID": "sha256:eb3bacf7e30b35765d983d6914a138442b46104989748ad77d4a32bdcdbc392a"\n },\n "SeveritySource": "ghsa",\n "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2023-5752",\n "DataSource": {\n "ID": "ghsa",\n "Name": "GitHub Security Advisory pip",\n "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Apip"\n },\n "Title": "pip: Mercurial configuration injectable in repo revision when installing via pip",\n "Description": "When installing a package from a Mercurial VCS URL (ie \"pip install \nhg+...\") with pip prior to v23.3, the specified Mercurial revision could\n be used to inject arbitrary configuration options to the \"hg clone\" \ncall (ie \"--config\"). Controlling the Mercurial configuration can modify\n how and which repository is installed. This vulnerability does not \naffect users who aren't installing from Mercurial.\n",\n "Severity": "MEDIUM",\n "CweIDs": [\n "CWE-77"\n ],\n "VendorSeverity": {\n "amazon": 2,\n "bitnami": 1,\n "ghsa": 2,\n "nvd": 1,\n "redhat": 1\n },\n "CVSS": {\n "bitnami": {\n "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",\n "V3Score": 3.3\n },\n "ghsa": {\n "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",\n "V3Score": 5.5\n },\n "nvd": {\n "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",\n "V3Score": 3.3\n },\n "redhat": {\n "V3Vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",\n "V3Score": 3.3\n }\n },\n "References": [\n "https://access.redhat.com/security/cve/CVE-2023-5752",\n "https://github.com/pypa/advisory-database/tree/main/vulns/pip/PYSEC-2023-228.yaml",\n "https://github.com/pypa/pip",\n "https://github.com/pypa/pip/commit/389cb799d0da9a840749fcd14878928467ed49b4",\n "https://github.com/pypa/pip/pull/12306",\n "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/622OZXWG72ISQPLM5Y57YCVIMWHD4C3U",\n "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/622OZXWG72ISQPLM5Y57YCVIMWHD4C3U/",\n "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65UKKF5LBHEFDCUSPBHUN4IHYX7SRMHH",\n "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65UKKF5LBHEFDCUSPBHUN4IHYX7SRMHH/",\n "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXUVMJM25PUAZRQZBF54OFVKTY3MINPW",\n "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXUVMJM25PUAZRQZBF54OFVKTY3MINPW/",\n "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFC2SPFG5FLCZBYY2K3T5MFW2D22NG6E",\n "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KFC2SPFG5FLCZBYY2K3T5MFW2D22NG6E/",\n "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YBSB3SUPQ3VIFYUMHPO3MEQI4BJAXKCZ",\n "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YBSB3SUPQ3VIFYUMHPO3MEQI4BJAXKCZ/",\n "https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL",\n "https://mail.python.org/archives/list/security-announce@python.org/thread/F4PL35U6X4VVHZ5ILJU3PWUWN7H7LZXL/",\n "https://nvd.nist.gov/vuln/detail/CVE-2023-5752",\n "https://www.cve.org/CVERecord?id=CVE-2023-5752"\n ],\n "PublishedDate": "2023-10-25T18:17:44.867Z",\n "LastModifiedDate": "2024-06-10T18:15:24.66Z"\n },\n {\n "VulnerabilityID": "CVE-2022-40897",\n "PkgName": "setuptools",\n "PkgPath": "usr/local/lib/python3.9/site-packages/setuptools-58.1.0.dist-info/METADATA",\n "PkgIdentifier": {\n "PURL": "pkg:pypi/setuptools@58.1.0",\n "UID": "bddff95f77a9bd25"\n },\n "InstalledVersion": "58.1.0",\n "FixedVersion": "65.5.1",\n "Status": "fixed",\n "Layer": {\n "Digest": "sha256:fb800bab7c104e705cc46da75158ffdb10c4e36d75db185473226ec2d688079d",\n "DiffID": "sha256:eb3bacf7e30b35765d983d6914a138442b46104989748ad77d4a32bdcdbc392a"\n },\n "SeveritySource": "ghsa",\n "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2022-40897",\n "DataSource": {\n "ID": "ghsa",\n "Name": "GitHub Security Advisory pip",\n "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Apip"\n },\n "Title": "pypa-setuptools: Regular Expression Denial of Service (ReDoS) in package_index.py",\n "Description": "Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.",\n "Severity": "HIGH",\n "CweIDs": [\n "CWE-1333"\n ],\n "VendorSeverity": {\n "alma": 2,\n "amazon": 2,\n "bitnami": 2,\n "cbl-mariner": 2,\n "ghsa": 3,\n "nvd": 2,\n "oracle-oval": 2,\n "photon": 2,\n "redhat": 2,\n "rocky": 2,\n "ubuntu": 2\n },\n "CVSS": {\n "bitnami": {\n "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",\n "V3Score": 5.9\n },\n "ghsa": {\n "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",\n "V3Score": 7.5\n },\n "nvd": {\n "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",\n "V3Score": 5.9\n },\n "redhat": {\n "V3Vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",\n "V3Score": 5.9\n }\n },\n "References": [\n "https://access.redhat.com/errata/RHSA-2023:0952",\n "https://access.redhat.com/security/cve/CVE-2022-40897",\n "https://bugzilla.redhat.com/2158559",\n "https://bugzilla.redhat.com/show_bug.cgi?id=2158559",\n "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40897",\n "https://errata.almalinux.org/9/ALSA-2023-0952.html",\n "https://errata.rockylinux.org/RLSA-2023:0952",\n "https://github.com/pypa/setuptools",\n "https://github.com/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py#L200",\n "https://github.com/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be",\n "https://github.com/pypa/setuptools/compare/v65.5.0...v65.5.1",\n "https://github.com/pypa/setuptools/issues/3659",\n "https://linux.oracle.com/cve/CVE-2022-40897.html",\n "https://linux.oracle.com/errata/ELSA-2024-2987.html",\n "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R",\n "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R/",\n "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H",\n "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H/",\n "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R",\n "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H",\n "https://nvd.nist.gov/vuln/detail/CVE-2022-40897",\n "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages",\n "https://pyup.io/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/",\n "https://pyup.io/vulnerabilities/CVE-2022-40897/52495",\n "https://pyup.io/vulnerabilities/CVE-2022-40897/52495/",\n "https://security.netapp.com/advisory/ntap-20230214-0001",\n "https://security.netapp.com/advisory/ntap-20230214-0001/",\n "https://security.netapp.com/advisory/ntap-20240621-0006",\n "https://security.netapp.com/advisory/ntap-20240621-0006/",\n "https://setuptools.pypa.io/en/latest",\n "https://ubuntu.com/security/notices/USN-5817-1",\n "https://www.cve.org/CVERecord?id=CVE-2022-40897"\n ],\n "PublishedDate": "2022-12-23T00:15:13.987Z",\n "LastModifiedDate": "2024-06-21T19:15:23.877Z"\n },\n {\n "VulnerabilityID": "CVE-2024-6345",\n "PkgName": "setuptools",\n "PkgPath": "usr/local/lib/python3.9/site-packages/setuptools-58.1.0.dist-info/METADATA",\n "PkgIdentifier": {\n "PURL": "pkg:pypi/setuptools@58.1.0",\n "UID": "bddff95f77a9bd25"\n },\n "InstalledVersion": "58.1.0",\n "FixedVersion": "70.0.0",\n "Status": "fixed",\n "Layer": {\n "Digest": "sha256:fb800bab7c104e705cc46da75158ffdb10c4e36d75db185473226ec2d688079d",\n "DiffID": "sha256:eb3bacf7e30b35765d983d6914a138442b46104989748ad77d4a32bdcdbc392a"\n },\n "SeveritySource": "ghsa",\n "PrimaryURL": "https://avd.aquasec.com/nvd/cve-2024-6345",\n "DataSource": {\n "ID": "ghsa",\n "Name": "GitHub Security Advisory pip",\n "URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Apip"\n },\n "Title": "pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools",\n "Description": "A vulnerability in the package_index module of pypa/setuptools versions up to 69.1.1 allows for remote code execution via its download functions. These functions, which are used to download packages from URLs provided by users or retrieved from package index servers, are susceptible to code injection. If these functions are exposed to user-controlled inputs, such as package URLs, they can execute arbitrary commands on the system. The issue is fixed in version 70.0.",\n "Severity": "HIGH",\n "CweIDs": [\n "CWE-94"\n ],\n "VendorSeverity": {\n "ghsa": 3,\n "photon": 3,\n "redhat": 3\n },\n "CVSS": {\n "ghsa": {\n "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",\n "V3Score": 8.8\n },\n "redhat": {\n "V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",\n "V3Score": 8.8\n }\n },\n "References": [\n "https://access.redhat.com/security/cve/CVE-2024-6345",\n "https://github.com/pypa/setuptools",\n "https://github.com/pypa/setuptools/commit/88807c7062788254f654ea8c03427adc859321f0",\n "https://github.com/pypa/setuptools/pull/4332",\n "https://huntr.com/bounties/d6362117-ad57-4e83-951f-b8141c6e7ca5",\n "https://nvd.nist.gov/vuln/detail/CVE-2024-6345",\n "https://www.cve.org/CVERecord?id=CVE-2024-6345"\n ],\n "PublishedDate": "2024-07-15T01:15:01.73Z",\n "LastModifiedDate": "2024-07-15T13:00:34.853Z"\n }\n ]\n }\n ]\n}\n", "status": "success"}
2024-08-02 | python:3.9-alpine@sha256:d7a5800c8b846cee989d1605c9e045ac9ca2a72edb6f26296d9065b752ae4bbb
{"output": "{\n "SchemaVersion": 2,\n "CreatedAt": "2024-08-02T15:27:16.132222513Z",\n "ArtifactName": "python:3.9-alpine@sha256:d7a5800c8b846cee989d1605c9e045ac9ca2a72edb6f26296d9065b752ae4bbb",\n "ArtifactType": "container_image",\n "Metadata": {\n "OS": {\n "Family": "alpine",\n "Name": "3.20.2"\n },\n "ImageID": "sha256:f214f2d92214f673c96aa471957456460d1e8a2b390ebfbf43895ca5c9ab093e",\n "DiffIDs": [\n "sha256:78561cef0761903dd2f7d09856150a6d4fb48967a8f113f3e33d79effbf59a07",\n "sha256:ae872c5ee3e0a6d76a2de640d91d0239e78aa97560a5f4cf77fb331f49f2b74f",\n "sha256:d326c156f81c53fe7d0d5d209652fe4310db16bec05400603969e8946372e55a",\n "sha256:c11116983ed688909eadcc910adb2fe99e71fd770169e4914e79f0e633beed8d",\n "sha256:eb3bacf7e30b35765d983d6914a138442b46104989748ad77d4a32bdcdbc392a"\n ],\n "RepoDigests": [\n "python@sha256:d7a5800c8b846cee989d1605c9e045ac9ca2a72edb6f26296d9065b752ae4bbb"\n ],\n "ImageConfig": {\n "architecture": "amd64",\n "created": "2024-07-08T02:10:08Z",\n "history": [\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "/bin/sh -c #(nop) ADD file:99093095d62d0421541d882f9ceeddb2981fe701ec0aa9d2c08480712d5fed21 in / "\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "/bin/sh -c #(nop) CMD [\"/bin/sh\"]",\n "empty_layer": true\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "ENV PATH=/usr/local/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",\n "comment": "buildkit.dockerfile.v0",\n "empty_layer": true\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "ENV LANG=C.UTF-8",\n "comment": "buildkit.dockerfile.v0",\n "empty_layer": true\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "RUN /bin/sh -c set -eux; \tapk add --no-cache \t\tca-certificates \t\ttzdata \t; # buildkit",\n "comment": "buildkit.dockerfile.v0"\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "ENV GPG_KEY=E3FF2839C048B25C084DEBE9B26995E310250568",\n "comment": "buildkit.dockerfile.v0",\n "empty_layer": true\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "ENV PYTHON_VERSION=3.9.19",\n "comment": "buildkit.dockerfile.v0",\n "empty_layer": true\n },\n {\n "created": "2024-07-08T02:10:08Z",\n "created_by": "RUN /bin/sh -c set -eux; \t\tapk add --no-cache --virtual .build-deps \t\tgnupg \t\ttar \t\txz \t\t\t\tbluez-dev \t\tbzip2-dev \t\tdpkg-dev dpkg \t\texpat-dev \t\tfindutils \t\tgcc \t\tgdbm-dev \t\tlibc-dev \t\tlibffi-dev \t\tlibnsl-dev \t\tlibtirpc-dev \t\tlinux-headers \t\tmake \t\tncurses-dev \t\topenssl-dev \t\tpax-utils \t\treadline-dev \t\tsqlite-dev \t\ttcl-dev \t\ttk \t\ttk-dev \t\tutil-linux-dev \t\txz-dev \t\tzlib-dev \t; \t\twget -O python.tar.xz \"https://www.python.org/ftp/python/${PYTHON_VERSION%%[a-z]}/Python-$PYTHON_VERSION.tar.xz\"; \twget -O python.tar.xz.asc \"https://www.python.org/ftp/python/${PYTHON_VERSION%%[a-z]}/Python-$PYTHON_VERSION.tar.xz.asc\"; \tGNUPGHOME=\"$(mktemp -d)\"; export GNUPGHOME; \tgpg --batch --keyserver hkps://keys.openpgp.org --recv-keys \"$GPG_KEY\"; \tgpg --batch --verify python.tar.xz.asc python.tar.xz; \tgpgconf --kill all; \trm -rf \"$GNUPGHOME\" python.tar.xz.asc; \tmkdir -p /usr/src/python; \ttar --extract --directory /usr/src/python --strip-components=1 --file python.tar.xz; \trm python.tar.xz; \t\tcd /usr/src/python; \tgnuArch=\"$(dpkg-architecture --query DEB_BUILD_GNU_TYPE)\"; \t./configure \t\t--build=\"$gnuArch\" \t\t--enable-loadable-sqlite-extensions \t\t--enable-optimizations \t\t--enable-option-checking=fatal \t\t--enable-shared \t\t--with-system-expat \t\t--without-ensurepip \t; \tnproc=\"$(nproc)\"; \tEXTRA_CFLAGS=\"-DTHREAD_STACK_SIZE=0x100000\"; \tLDFLAGS=\"${LDFLAGS:--Wl},--strip-all\"; \tmake -j \"$nproc\" \t\t\"EXTRA_CFLAGS=${EXTRA_CFLAGS:-}\" \t\t\"LDFLAGS=${LDFLAGS:-}\" \t\t\"PROFILE_TASK=${PROFILE_TASK:-}\" \t; \trm python; \tmake -j \"$nproc\" \t\t\"EXTRA_CFLAGS=${EXTRA_CFLAGS:-}\" \t\t\"LDFLAGS=${LDFLAGS:--Wl},-rpath='\\$\\$ORIGIN/../lib'\" \t\t\"PROFILE_TASK=${PROFILE_TASK:-}\" \t\tpython \t; \tmake install; \t\tcd /; \trm -rf /usr/src/python; \t\tfind /usr/local -depth \t\t\\( \t\t\t\\( -type d -a \\( -name test -o -name tests -o -name idle_test \\) \\) \t\t\t-o \\( -type f -a \\( -name '.pyc' -o -name '.pyo' -o -name 'libpython*.a' \\) \\) \t\t\\) -exec rm -rf '{}' + \t; \t\tfind /usr/local -type f -executable -not \\( -name 'tkinter' \\) -exec scanelf --needed --nobanner --format '%n#p' '{}' ';' \t\t| tr ',' '\\n' \t\t| sort -u \t\t| awk 'system(\"[ -e /usr/local/lib/\" $1 \" ]\") == 0 { next } { print \"so:\"