Commit graph

12 commits

Author SHA1 Message Date
Doug Barton
0175383f0a Fix a few "bad example" problems in the rc.d scripts that have been
propogated by copy and paste.

1. Primarily the "empty variable" default assignment, which is mostly
${name}_flags="", but fix a few others as well.
2. Where they are not already documented, add the existence of the _flags
(or other deleted empties) option to the comments, and in some cases add
comments from scratch.
3. Replace things that look like:
prefix=%%PREFIX%%
command=${prefix}/sbin/foo
to just use %%PREFIX%%. In many cases the $prefix variable is only used
once, and in some cases it is not used at all.
4. In a few cases remove ${name}_flags from command_args
5. Remove a long-stale comment about putting the port's rc.d script in
/etc/rc.d (which is no longer necessary).

No PORTREVISION bumps because all of these changes are noops.
2009-07-15 16:56:10 +00:00
Pav Lucistnik
00dd1ca2e3 - Fix rc script to have overridable apache_flags and apache_pidfile
PR:		ports/104465
Reported by:	Andrey Alakozov <aa29@mail.ru>
Submitted by:	Volker <volker@vwsoft.com>
Approved by:	maintainer timeout (apache; 5 months)

- While here, modernize USE_RC_SUBR usage
2007-03-14 20:21:31 +00:00
Clement Laforet
a571f6486f - Update apache to 1.3.37
- Fix CONFLICTS
2006-07-30 09:12:41 +00:00
Clement Laforet
b5c6eb5f0e - Fix security issue in mod_rewrite.
All people using mod_rewrite are strongly encouraged to update.

An off-by-one flaw exists in the Rewrite module, mod_rewrite.
Depending on the manner in which Apache httpd was compiled, this
software defect may result in a vulnerability which, in combination
with certain types of Rewrite rules in the web server configuration
files, could be triggered remotely.  For vulnerable builds, the nature
of the vulnerability can be denial of service (crashing of web server
processes) or potentially allow arbitrary code execution.
This issue has been rated as having important security impact
by the Apache HTTP Server Security Team

Updates to latest versions will follow soon.

Notified by:	so@ (simon)
Obtained from:	Apache Security Team
Security: 	CVE-2006-3747
2006-07-27 20:26:29 +00:00
Clement Laforet
6e84112a9f - update apache to 1.3.36
- bump HARD_SERVER_LIMIT to 2048
- drop broken WITH*_EXPAT support.
  we always depend on expat from ports (based on [1])

PR:             ports/81183 [1]
Submitted by:   Martin Nilsson <martin@svenskabutiker.se>
2006-07-18 08:19:53 +00:00
Doug Barton
c49d1a3273 Remove the FreeBSD KEYWORD from all rc.d scripts where it appears.
We have not checked for this KEYWORD for a long time now, so this
is a complete noop, and thus no PORTREVISION bump. Removing it at
this point is mostly for pedantic reasons, and partly to avoid
perpetuating this anachronism by copy and paste to future scripts.
2006-02-20 20:47:50 +00:00
Doug Barton
ffde46cbf9 Now that new style rc.d scripts are being run as part of the
base rcorder, hard coded variable values in these scripts
are overriding the values in /etc/rc.conf[.local] (due to
the way that variables from the latter are read at boot time).

Therefore, change the boot scripts to set default values only
if the variable is unset in /etc/rc.conf[.local]. This will
allow the service to start at boot time if it's been enabled
as the user would expect.

This change will be a noop for users who have systems that
have not yet been upgraded to the new rc.d code in the base.

In many cases there are other variables in the scripts that
should get similar treatment, however I did not change
anything other than the _enable lines. I'll leave the rest
up to the maintainers to do as they see fit.

Bump PORTREVISION to make sure that users and packages
pick up this change.
2006-01-07 06:29:57 +00:00
Clement Laforet
f22b2cf232 SECURITY: CVE-2005-3352 (cve.mitre.org)
mod_imap: Escape untrusted referer header before outputting in HTML
   to avoid potential cross-site scripting.  Change also made to
   ap_escape_html so we escape quotes.  Reported by JPCERT.
   [Mark Cox]

Reported by:	simon
2005-12-12 20:31:53 +00:00
Clement Laforet
68ea4fafa1 - Update apache to 1.3.34 2005-11-01 11:17:44 +00:00
Clement Laforet
f3682c0229 - Fix CAN-2005-2088
Obtained from:	Apache repository
2005-07-26 13:57:42 +00:00
Clement Laforet
ba1c22411a - Add missing man page
- Don't create httpd.conf.bak
- Set MAINTAINER to apache@
2005-02-08 13:09:39 +00:00
Pav Lucistnik
2c2aa04c45 Add apache13-modperl, an Apache web server with mod_perl statically compiled in.
PR:		ports/67051
Submitted by:	Rod Taylor <ports@rbt.ca>
2004-06-05 14:25:18 +00:00