Commit graph

122 commits

Author SHA1 Message Date
Jeremy Messenger
789d75c728 -Repocopy devel/libtool15 -> libtool22 and libltdl15 -> libltdl22.
-Update libtool and libltdl to 2.2.6a.
-Remove devel/libtool15 and devel/libltdl15.
-Fix ports build with libtool22/libltdl22.
-Bump ports that depend on libltdl22 due to shared library version change.
-Explain what to do update in the UPDATING.

It has been tested with GNOME2, XFCE4, KDE3, KDE4 and other many wm/desktop
and applications in the runtime.

With help:	marcus and kwm
Pointyhat-exp:	a few times by pav
Tested by:	pgollucci, "Romain Tartière" <romain@blogreen.org>, and
		a few MarcusCom CVS users. Also, I might have missed a few.
Repocopy by:	marcus
Approved by:	portmgr
2009-08-02 19:36:34 +00:00
Doug Barton
0175383f0a Fix a few "bad example" problems in the rc.d scripts that have been
propogated by copy and paste.

1. Primarily the "empty variable" default assignment, which is mostly
${name}_flags="", but fix a few others as well.
2. Where they are not already documented, add the existence of the _flags
(or other deleted empties) option to the comments, and in some cases add
comments from scratch.
3. Replace things that look like:
prefix=%%PREFIX%%
command=${prefix}/sbin/foo
to just use %%PREFIX%%. In many cases the $prefix variable is only used
once, and in some cases it is not used at all.
4. In a few cases remove ${name}_flags from command_args
5. Remove a long-stale comment about putting the port's rc.d script in
/etc/rc.d (which is no longer necessary).

No PORTREVISION bumps because all of these changes are noops.
2009-07-15 16:56:10 +00:00
Philip M. Gollucci
bdd3a866cc - Backport apr-util security fixes pending the 2.2.12 release (forthcomming)
Security:       http://www.vuxml.org/freebsd/eb9212f7-526b-11de-bbf2-001b77d09812
PR:             ports/135310
Submitted by:   Eygene Ryabinkin <rea-fbsd@codelabs.ru>
With Hat:       apache
2009-06-08 05:11:09 +00:00
Clement Laforet
a52a71b6f2 - Revert previous patch to "fix" missing rc.d scripts. It
actually breaks profiles.
- Fix CVE-2008-2939 for mod_proxy_ftp
  (XSS attacks when using wildcards in the path of the FTP URL)
- Bump PORTREVISION
2008-08-31 23:04:14 +00:00
Clement Laforet
9c3e5703b1 - Fix profiles support in startup script [1]
- move envvars support to the beginning of apache2_checkconfig() to be
  sure we're using envvars during configtest [2]

PR:             ports/116401 [1],
                ports/116329 [2]
Submitted by:   kevin brintnall <kbrint@rufus.net> [1],
                Ruud Althuizen <ruud@il.fontys.nl>
2007-09-18 19:18:09 +00:00
Clement Laforet
3f99c30a52 - Re-add apache2ssl_enable support
Noticed by:	 Oliver Brandmueller <ob at e-Gitt dot NET>
2007-09-10 14:48:36 +00:00
Clement Laforet
21219460d9 - Update to 2.0.61
- sync' startup script with www/apache22
2007-09-09 14:48:34 +00:00
Clement Laforet
cd04e0e4c7 - Add itk MPM
mpm-itk allows you to run each of your vhost under a separate UID and GID
  WWW: http://home.samfundet.no/~sesse/mpm-itk/
- use LD_CONFIG
2006-11-01 15:47:50 +00:00
Clement Laforet
ede0cf96ee - Update to 2.0.59 2006-08-05 20:16:14 +00:00
Clement Laforet
b5c6eb5f0e - Fix security issue in mod_rewrite.
All people using mod_rewrite are strongly encouraged to update.

An off-by-one flaw exists in the Rewrite module, mod_rewrite.
Depending on the manner in which Apache httpd was compiled, this
software defect may result in a vulnerability which, in combination
with certain types of Rewrite rules in the web server configuration
files, could be triggered remotely.  For vulnerable builds, the nature
of the vulnerability can be denial of service (crashing of web server
processes) or potentially allow arbitrary code execution.
This issue has been rated as having important security impact
by the Apache HTTP Server Security Team

Updates to latest versions will follow soon.

Notified by:	so@ (simon)
Obtained from:	Apache Security Team
Security: 	CVE-2006-3747
2006-07-27 20:26:29 +00:00
Clement Laforet
d8348f8d1d - Remove obsolete patch which add support to Windows Update Service when
apache acts as a proxy.

Reported by:    Bjoern Voigt <bjoern@cs.tu-berlin.de>
2006-05-10 19:50:26 +00:00
Clement Laforet
a06a227db3 - Fix build with WITH_KQUEUE_SUPPORT
Pointed out by:	Marian Cerny <cerny@icomvision.com>
2006-05-02 07:55:27 +00:00
Clement Laforet
98d01ce7d2 Oops I forgot to "cvs rm" a secfix
Spotted by:	krion
2006-05-01 11:33:17 +00:00
Clement Laforet
c19a553306 - Update to 2.0.58 2006-05-01 09:24:56 +00:00
Doug Barton
c49d1a3273 Remove the FreeBSD KEYWORD from all rc.d scripts where it appears.
We have not checked for this KEYWORD for a long time now, so this
is a complete noop, and thus no PORTREVISION bump. Removing it at
this point is mostly for pedantic reasons, and partly to avoid
perpetuating this anachronism by copy and paste to future scripts.
2006-02-20 20:47:50 +00:00
Clement Laforet
c5d4c969c8 Cleanups and fixes
- remove useless options (and fix thread stuff) [1]
- move print-closest-mirror to bsd.apache.mk
- move threads configure options out of Makefile.modules
- Fix stupid logic to disable v4mapped address [2]
- and more...

Submitted/spotted by:   many, Hirohisa Yamaguchi <umq@ueo.co.jp> [1]
                        ume[2]
PR:                     ports/91813 [1]
2006-01-15 18:58:38 +00:00
Clement Laforet
19784a80b9 SECURITY: CVE-2005-3352 (cve.mitre.org)
mod_imap: Escape untrusted referer header before outputting in HTML
     to avoid potential cross-site scripting.  Change also made to
     ap_escape_html so we escape quotes.  Reported by JPCERT.
     [Mark Cox]

Reported by:    simon
2005-12-12 20:35:19 +00:00
Clement Laforet
54b5eedff9 - resync' with www/apache2 2005-12-03 23:04:21 +00:00
Clement Laforet
b85846c6d1 - Don't rerun the apache2.sh rc script on restart's, just stop and start
normally

PR:		ports/86402
Submitted by:	Jarrod Sayers <jarrod@netleader.com.au>
2005-10-30 20:51:56 +00:00
Clement Laforet
f5baa45806 - Update to 2.0.55 2005-10-14 13:54:09 +00:00
Clement Laforet
fa30142737 - Sync with www/apache2 2005-09-10 14:45:03 +00:00
Clement Laforet
45df42849e - Add fix for CAN-2005-2088
From Changelog:
  *) SECURITY: CAN-2005-2088
     core: If a request contains both Transfer-Encoding and Content-Length
     headers, remove the Content-Length, mitigating some HTTP Request
     Splitting/Spoofing attacks.  [Paul Querna, Joe Orton]

- Rename previous patch to CVE ID
- bump PORTREVISION

Security:       CAN-2005-2088
Obtained From: Apache repository
2005-07-26 10:10:35 +00:00
Clement Laforet
7a67d06cd1 Security: fix a buffer overrun in ssl_callback_SSLVerify_CRL()
Reported by:	thierry
2005-07-26 08:25:13 +00:00
Clement Laforet
b9be9d957f - Remove debug line. 2005-06-01 17:49:31 +00:00
Clement Laforet
8978d00aab - Add support for multiple instances of apache2 to startup script.
It's a little bit experimental, but it works.
2005-06-01 17:47:53 +00:00
Clement Laforet
d20de50ad7 - Sync with www/apache2 2005-05-22 09:09:42 +00:00
Clement Laforet
2e6e1ded1c - Update to 2.0.53
- Download bz2'd tarball [1]
- Add print-closest-mirrors target.
  It allows you to find the 6 (3 http/3 ftp) closest mirror,
  base on http://www.apache.org/dyn/closer.cgi/httpd/
  make print-closest-mirrors >> /etc/make.conf automatically add
  the six closest mirror to the head of ${MASTER_SITE_APACHE_HTTPD}.

Requested by:	delphij
2005-02-08 15:17:06 +00:00
Clement Laforet
ae9562845c - Add support for databases/db43 in apache2[1] and apache21.
- rename files/patch-srclib:apr-utils:build:dbm.m4 to
  files/patch-srclib:apr-util:build:dbm.m4

Based on PR:		ports/76152 [1]
Submitted by:		Sunpoet Po-Chuan Hsieh <sunpoet@sunpoet.net> [1]
2005-01-17 20:30:08 +00:00
Clement Laforet
4e80ec5376 o startup script:
- Use apache{2,21}flags variable in apache{2,21}_checkconfig().
  It fixes restart when apache2ssl_enable is set to YES in rc.conf
  and httpd.conf is "old" (i.e. non -DSSL safe) [1]

o Makefile
- split post-install target to add install-startup-script:
  User can now upgrade startup script without reinstalling apache2.
  NOTE: this is NOT package-safe and NOT supported, even if in most of
  cases they're no risk.

Noticed by:     many [1]
2005-01-11 13:45:05 +00:00
Clement Laforet
d77a69574f - Fix a bug in mod_ssl. When client aborts connection, mod_ssl still try
to send its data, ad vitam eternam.

Noticed by:	Didier Bringer <bringer at echo dot fr>
Patched by:	Bruno Ducrot <ducrot at poupinou dot org>
2004-12-17 22:24:05 +00:00
Clement Laforet
2ab76c8193 - Remove useless APR_FROM_PORTS check in post-install
- Add support for modular sbin/envvars
  You can now put your own scripts you want to execute at envvars
  stage in ${PREFIX}/etc/apache2/envvars.d
  Only script ending by *.env are run.

  Example:
	/usr/local/etc/apache2/envvars.d/mod_python3.env

Discussed with:	perky on -apache@
2004-12-17 17:52:20 +00:00
Clement Laforet
be4ae2c39a - Remove installation of unused highperformance*.conf
- Move examples config files to ${EXAMPLESDIR}
- Relax permissions on ${PREFIX}/www instead of ${PREFIX}/www/data
2004-12-12 11:48:55 +00:00
Clement Laforet
c95fdac48a - Rename patch file. 2004-12-11 16:01:42 +00:00
Clement Laforet
7c168732cc - As discussed on apache@, don't create httpd.conf.bak, and remove stalled
httpd.conf.bak file at deinstall time.
2004-11-29 09:38:45 +00:00
Clement Laforet
c5d3398e2f - minor cleanups. 2004-11-13 18:23:34 +00:00
Clement Laforet
791aa3191a - Fix memory consumption DoS, CVE CAN-2004-0942
Reported by:    josef
Obtained from:  Apache CVS
2004-11-10 18:24:44 +00:00
Clement Laforet
3a52300e23 - Fix previous patch :-)
Huge pointy hat to: me
Noticed by:	Meno Abels <meno.abels@adviser.com>
2004-11-04 11:53:41 +00:00
Clement Laforet
d189d69fdd - Fix apache2 build, I hope...
Noticed by:  many
Committed from: EuroBSDcon Hotel's bar.
Pointy hat to:	me
Under supervision from: mat, thierry, erwin (former mentor)
2004-10-30 19:44:41 +00:00
Clement Laforet
fa4c5a2a41 util_ald_cache_purge() fails to relink the cache entries during a cache purge.
So apply the official patch
2004-10-30 15:32:53 +00:00
Clement Laforet
17deeb0cd6 - Use ${WWWOWN} and ${WWWGRP} for apache's user. (instead of harcoded
www/www).
  It should help to keep consistancy in www-related ports.
2004-10-13 14:03:06 +00:00
Clement Laforet
310abe64ef - Yet Another Security Fix
Fix CAN-2004-0885:

  * modules/ssl/ssl_engine_kernel.c (ssl_hook_Access): Ensure that a
  correct cipher suite has been negotiated, else deny access.

  * modules/ssl/ssl_engine_init.c (ssl_init_ctx_protocol): With OpenSSL
  0.9.7, prevent session resumption during a renegotiation to force the
  client to negotiate a new (and acceptable) cipher suite.

Credits:	Hartmut Keil, Joe Orton
2004-10-13 09:17:38 +00:00
Clement Laforet
ee5d3c413a - Update to 2.0.52
- Use "PORTDOCS= #" and get rid of docs entry in plist.
- Support for FreeBSD 6 in apr
- Move of cache modules from THREADS to EXPERIMENTAL category and make
  sure we enable THREADS modules (cgid only) when a threaded MPM is
  selected.
- Resurect WITH_EXTRA_MODULES knob
- powerlogo.gif is now hosted by FreeBSD mirrors
- WITH_<category> is definitively no longer supported.
- Add Includes dir when installed via a package [1]

PR:             ports/72309 [1]
Submitted by:   Christian Kratzer <ck at cksoft dot de> [1]
2004-10-12 08:27:40 +00:00
Clement Laforet
222ecfdf5d Security fixes [1]:
*) SECURITY: CAN-2004-0786 (cve.mitre.org)
     Fix an input validation issue in apr-util which could be
     triggered by malformed IPv6 literal addresses.  [Joe Orton]

  *) SECURITY: CAN-2004-0747 (cve.mitre.org)
     Fix buffer overflow in expansion of environment variables in
     configuration file parsing.  [Andr<E9> Malo]

  *) SECURITY: CAN-2004-0809 (cve.mitre.org)
     mod_dav_fs: Fix a segfault in the handling of an indirect lock
     refresh.  PR 31183.  [Joe Orton]

- Update documentation (finally!) and fix WITH_<CATEGORY>_MODULES
  for special modules like LDAP or SSL [2]

Noticed by:     nectar [1]
Requested by:   Emile Heitor <imil at home dot imil dot net> [2]
Approved by:    portmgr (marcus)
2004-09-15 16:54:37 +00:00
Clement Laforet
83d8251d79 - Add a sanity check on apache2 configuration files before reloading or
restarting apache2 (to avoid an expected failure on restart)
2004-08-23 15:44:51 +00:00
Clement Laforet
a4dd64d032 - Backport security fixes in ssl_engine_io.c
* [SECURITY] mod_ssl: Fix potential input filter segfaults in
  SPECULATIVE mode. (rollback handling for AP_MODE_SPECULATIVE)
  "This issue has possible security implications; it's been assigned CVE
  CAN-2004-0751 (cve.mitre.org)."
  http://issues.apache.org/bugzilla/show_bug.cgi?id=30134

* [SECURITY] mod_ssl: Fix potential infinite loop.
  (potential infinite loop in ssl_io_input_getline if connection is
  aborted without inctx->rc being set.)
  http://issues.apache.org/bugzilla/show_bug.cgi?id=27945
  http://issues.apache.org/bugzilla/show_bug.cgi?id=29690

Obtained from:  Apache CVS (httpd-2.0 HEAD)
2004-08-18 19:40:07 +00:00
Clement Laforet
696614c16d - Bump PORTREVISION for all previous changes
- Allow access to /home if mod_userdir is loaded
- We don't need apache2libs.sh if apr is installed from ports.
- Add recent changes to UPGRADING
2004-08-17 12:41:26 +00:00
Clement Laforet
9e23477bc7 Remove our config.layout support. FreeBSD layout is in apache2's one
since 2.0.48
2004-08-07 20:25:02 +00:00
Clement Laforet
7d02c7c2aa - Add ldconfig -m to apache2's apr libs (install time and boot time)
Requested by, discussed with: lev
2004-08-05 21:46:17 +00:00
Clement Laforet
b26a90a102 apache2 NG patch 1/5.
o Changes in httpd.conf
  - mod_userdir:
        . set Userdir if mod_userdir is loaded [1]
        . Userdir is denied for users from /etc/ftpusers
  - set more "secure" permissions.
    By default, policy is to deny access to filesystem.
    You HAVE to _ENABLE_ access to your filesystem in httpd.conf.
  - Add an "Includes" directory to ${PREFIX}/etc/apache2/
    to make configuration more flexible
    ${PREFIX}/etc/apache2/*.conf files are now automatically loaded.

o apache.sh
  - be closer to apachectl, apache.sh need envvars [2]
    It should restore subversion behavior.

Partially submitted by:
                kuriyama [1],
                Gregory (Grisha) Trubetskoy <grisha at apache dot org> [2]

Future changes are mostly written, they should be committed during the
week-end.
If you're interrested in changes, feel free contact me.
2004-07-30 17:04:47 +00:00
Clement Laforet
c6f9f34532 - Update experimental apr/kqueue patch
Obtained from:	apr CVS
2004-07-13 09:53:43 +00:00