Commit graph

28 commits

Author SHA1 Message Date
Doug Barton
0175383f0a Fix a few "bad example" problems in the rc.d scripts that have been
propogated by copy and paste.

1. Primarily the "empty variable" default assignment, which is mostly
${name}_flags="", but fix a few others as well.
2. Where they are not already documented, add the existence of the _flags
(or other deleted empties) option to the comments, and in some cases add
comments from scratch.
3. Replace things that look like:
prefix=%%PREFIX%%
command=${prefix}/sbin/foo
to just use %%PREFIX%%. In many cases the $prefix variable is only used
once, and in some cases it is not used at all.
4. In a few cases remove ${name}_flags from command_args
5. Remove a long-stale comment about putting the port's rc.d script in
/etc/rc.d (which is no longer necessary).

No PORTREVISION bumps because all of these changes are noops.
2009-07-15 16:56:10 +00:00
Ion-Mihai Tetcu
9b1721159f load_rc_config before testing for empty vars.
Submitted by:	dougb@
2008-07-13 18:19:16 +00:00
Ion-Mihai Tetcu
9202b5995c - Honor NO* vars (noticed by ionbot)
- Silence some portlint warnings
- USE_RC_SUBR from the rc.d script
- Bump PORTREVISION

PR:		125131
Submitted by:	Philip M. Gollucci
2008-07-13 04:37:41 +00:00
Clement Laforet
5fec80adea - Update to 1.3.37-1.57 2007-03-18 17:13:58 +00:00
Clement Laforet
b5c6eb5f0e - Fix security issue in mod_rewrite.
All people using mod_rewrite are strongly encouraged to update.

An off-by-one flaw exists in the Rewrite module, mod_rewrite.
Depending on the manner in which Apache httpd was compiled, this
software defect may result in a vulnerability which, in combination
with certain types of Rewrite rules in the web server configuration
files, could be triggered remotely.  For vulnerable builds, the nature
of the vulnerability can be denial of service (crashing of web server
processes) or potentially allow arbitrary code execution.
This issue has been rated as having important security impact
by the Apache HTTP Server Security Team

Updates to latest versions will follow soon.

Notified by:	so@ (simon)
Obtained from:	Apache Security Team
Security: 	CVE-2006-3747
2006-07-27 20:26:29 +00:00
Doug Barton
c49d1a3273 Remove the FreeBSD KEYWORD from all rc.d scripts where it appears.
We have not checked for this KEYWORD for a long time now, so this
is a complete noop, and thus no PORTREVISION bump. Removing it at
this point is mostly for pedantic reasons, and partly to avoid
perpetuating this anachronism by copy and paste to future scripts.
2006-02-20 20:47:50 +00:00
Clement Laforet
18bf135afb - Update to 1.3.34+1.37
- Use new apache framework.
2006-01-14 13:59:20 +00:00
Clement Laforet
f22b2cf232 SECURITY: CVE-2005-3352 (cve.mitre.org)
mod_imap: Escape untrusted referer header before outputting in HTML
   to avoid potential cross-site scripting.  Change also made to
   ap_escape_html so we escape quotes.  Reported by JPCERT.
   [Mark Cox]

Reported by:	simon
2005-12-12 20:31:53 +00:00
Clement Laforet
486435e0e2 - Fix build with OpenSSL 0.9.8 2005-10-02 13:00:06 +00:00
Clement Laforet
f3682c0229 - Fix CAN-2005-2088
Obtained from:	Apache repository
2005-07-26 13:57:42 +00:00
Clement Laforet
803d50b3db - move default configuration files to ${EXAMPLESDIR} and keep
${PREFIX}/etc/apache clean.
2004-12-13 21:06:18 +00:00
Clement Laforet
c868f0d3f4 - Xmas for apache13-ssl!
Give it a rcNG startup script

Also requested by:	sem
2004-12-13 11:16:47 +00:00
Clement Laforet
5631a1f988 - Deal with httpsd.conf.bak files, like we did for apache2 previously in the day. 2004-11-29 20:14:52 +00:00
Clement Laforet
d2a6e8aee6 - Update to 1.3.33.1.55 2004-11-12 10:40:52 +00:00
Clement Laforet
858598c347 - Security Fix
mod_proxy buffer overflow  CAN-2004-0492

Shamefully stolen from: apache13-mod-ssl port
2004-06-11 12:19:05 +00:00
Clement Laforet
0fef1447c7 Fix a bug in the parsing of Allow/Deny rules using IP addresses.
http://www.vuxml.org/freebsd/09d418db-70fd-11d8-873f-0020ed76ef5a.html

Reported by:        nectar
Obtained from:      Apache CVS
2004-03-08 13:29:47 +00:00
Clement Laforet
3891f2a4ca Rename patch.
post-patch-conf:httpd.conf-dist.orig =>
			post-patch-conf:httpd.conf-dist

Pointed out by:     kris,
                    Koop Mast <kwm@rainbow-runner.nl>
2004-01-21 09:32:13 +00:00
James E. Housley
4921dc1ff5 Here's the patch.
files/patch-FixPatch was missing too.

Submitted by:	MAINTAINER
2003-11-12 21:09:27 +00:00
James E. Housley
6a57e829a1 Changelog:
- Sync with apache13 layout (and some patches)
	- use DOCSDIR
	- Add no_zombies.patch
	- use DIST_SUBDIR=apache

Removed files:
	- files/patch-aq
	- files/patch-ar

Added files:
	- files/patch-httpd.conf-dist
	- files/post-patch-conf:httpd.conf-dist.orig
	- files/patch-FixPatch
	- files/patch-SSLpatch
	- files/patch-Makefile.tmpl
	- files/patch-src::modules::standard::mod_auth_db.module
	- files/patch-src::support::dbmanage
	- files/patch-src::support::log_server_status
	- files/patch-configure

PR:		58403
Submitted By:	MAINTAINER
2003-11-09 00:42:20 +00:00
Dirk Meyer
b6f8a04382 - Use user and group "www"
- fix PLIST
- add patch from ports/36363 (from ryan@servercity.com)
- verify ports/36361
- fix ports/36364
2003-01-27 17:05:36 +00:00
Dirk Meyer
dfb29e227b Update to 1.3.26+ssl_1.48
removed FORBIDDEN
2002-09-15 12:34:16 +00:00
Jacques Vidrine
a337ff9ae5 Patch buffer overflow described in
<URL:http://www.apache-ssl.org/advisory-20020301.txt>.
2002-03-23 19:34:54 +00:00
Akinori MUSHA
790df40d4c This is a part of update to 1.3.12+1.40. For the rest, please see the
Makefile's commit log.

(Actually I had a CVS problem, and Peter has fixed it for me)

		*		*		*		*

- Add patch-at to correctly build on FreeBSD 5.0+.

PR:		ports/17404
Submitted by:	Khetan H. Gajjar <khetan@freebsd.os.org.za>

- Mark `WWW:' in DESCR.

Noticed by:	portlint
2000-04-27 16:14:49 +00:00
Kris Kennaway
9d59123ac1 USE_OPENSSL
Submitted by:	Jim Bloom <bloom@acm.org>
2000-02-12 09:02:44 +00:00
Foxfair Hu
70b4ef167a Add a little fix to eliminate a install error, chgrp the right one. 1999-11-03 06:58:40 +00:00
Steve Price
e3b6d84e85 Update this to version 1.3.9+1.37.
PR:		13804
Submitted by:	maintainer
1999-09-27 02:21:33 +00:00
Dirk Froemberg
01055309bf - Upgrade to Apache-SSL 1.35.
- include ${PREFIX}/include/openssl due to openssl upgrade.

Submitted by:	Ralf S. Engelschall <rse@FreeBSD.org>
1999-06-02 07:20:46 +00:00
Dirk Froemberg
8b20e64d2c Upgrade to Apache 1.3.6 and Apache-SSL 1.32.
PR:		ports/10966
Submitted by:	Adam Laurie <adam@algroup.co.uk>
1999-04-10 07:53:03 +00:00