Commit graph

57 commits

Author SHA1 Message Date
wiz
2e6bec7127 Make it a separate warning if downloading the file
failed completely. Welcome to 1.30.
2004-04-14 09:04:15 +00:00
jschauma
91eda1f72c Rethink the nroff dilemma:
only regen on SunOS or AIX - the pre-generated pages _are_ mandoc type
pages, so we can use them on more platforms than just Irix.
2004-04-11 18:14:53 +00:00
jschauma
fde5d4152b Do this the right way: regen audit-packages.0 and then substitute as
regular
2004-04-09 16:06:59 +00:00
jschauma
18657fa1bb Add a pre-formatted catman page which is only used (copied into place)
under IRIX.  Other OS regen the catman page.

This addresses PR pkg/23452.

Since just depending on textproc/groff would pull in a large number of
packages (such as perl, ghostscript, tiff etc.), and since this is a very
important package that should NOT depend on all this gunk, Jeremy C. Reed
suggested this solution.

Ok agc.
2004-04-09 15:30:57 +00:00
jlam
56a6d12f07 Update security/audit-packages to 1.29. Changes from version 1.28 include
supporting using the FreeBSD "fetch" command to get the vulnerabilities
list.  Patch provided in PR 24371 by Michal Pasternak.
2004-02-09 03:56:34 +00:00
agc
3ad1bdbf06 Move WRKSRC definition away from the first paragraph in a Makefile. 2004-01-20 12:18:15 +00:00
jlam
a442099d05 This package never invokes the toolchain so it doesn't need buildlink[23].
Define NO_BUILDLINK to signify this to bsd.pkg.mk.
2004-01-19 15:15:08 +00:00
jlam
22645a942c bl3ify 2004-01-05 11:28:07 +00:00
agc
7ae16542a6 Update audit-packages to 1.28.
By popular demand, add a -v switch to audit-packages(8) which enables the
check for a package vulnerabilities file being unchanged for over 7 days.
To enable the check, -v must be specified on the command line:

	% audit-packages
	% audit-packages -v
	*** WARNING - /usr/distfiles/pkg-vulnerabilities more than a week old, continuing...
	%
2004-01-01 23:35:28 +00:00
erh
f3612f2fde AIX doesn't have mandoc, just like SunOS. 2003-12-12 21:40:32 +00:00
agc
a0207fa135 Whitespace fix, cosmetic only 2003-12-12 15:08:21 +00:00
agc
2dd92849cd Update audit-packages to version 1.27.
Difference from previous version (1.26):
+ if the vulnerability list is older than a week, just display a warning
message - don't consider this a fatal error.
2003-12-11 17:10:21 +00:00
wiz
dfa47a2ed3 Bump date for previous. Fix typo. 2003-12-03 09:31:01 +00:00
martti
ac3fc97117 Updated audit-packages to 1.26
Added support for audit-packages.conf. This file can be used
to define environment variables (e.g. FETCH_ARGS).
2003-12-03 04:58:01 +00:00
agc
49338b43ac Update audit-packages to 1.25.
+ get rid of unnecessary awk invocation in audit-packages, use shell
  construction instead, pointed out by enami tsugutomo. Cuts system and
  user execution times for audit-packages in half.
+ add (4-clause) licences to audit-packages and download-vulnerability-list
+ check integrity of pkg-vulnerabilities file in audit-packages by using
  the same construct as in download-vulnerability-list
+ CSE in error checking in audit-packages
+ properly terminate a case expression in download-vulnerability-list
2003-10-18 10:16:57 +00:00
agc
de7fca8939 Update audit-packages to 1.24:
Simplify quoting syntax in the awk command, so that gawk-3.1.3 (as found in
NetBSD-current) doesn't have a problem with a malformed escape sequence.

With thanks to Johnny Lam for testing with an older version of gawk.
2003-10-17 09:45:28 +00:00
grant
3222b9705d missed a pkg-vulnerabilities filename 2003-09-16 14:50:47 +00:00
grant
8701611d07 netbsd.org -> NetBSD.org. 2003-09-16 14:47:49 +00:00
grant
651a74f47a correct name of pkg-vulnerabilities file; netbsd.org -> NetBSD.org;
add missing word; bump date.
2003-09-16 14:46:52 +00:00
grant
6152558d3d ftp.netbsd.org -> ftp.NetBSD.org 2003-09-16 14:33:01 +00:00
agc
4842dd4749 Update audit-packages to 1.23.
Use the first word of ${FETCH_CMD} to determine which utility is used.

Addresses PR 22760 from Todd Vierling.
2003-09-16 09:06:03 +00:00
agc
1cbfd70c0e Update audit-packages to 1.22:
Make an informational message clearer.
2003-09-16 07:21:01 +00:00
seb
336d68c05a Update to version 1.21.
download-vulnerability-list(8) now needs digest(1).
Hence put digest package as a runtime dependency of audit-packages
package.
2003-09-12 12:57:10 +00:00
agc
4b67b74873 Update audit-packages to 1.20.
Support wget and curl as FETCH_CMDs, as discussed in PR 19103.
2003-09-09 17:31:34 +00:00
tron
1665e3992f Fix inconsistent filename for "pkg-vulnerabilities" file in
"audit-packages" script. Bump package version again.
2003-09-03 15:06:59 +00:00
agc
d61816fcb2 Update audit-packages to 1.18.
Changes from previous version:

+ rely on an embedded sha1 digest to tell whether the vulnerabilities
  file has been damaged in transit or received successfully, rather than
  trusting that the file will not grow smaller

+ use the new filename "pkg-vulnerabilities"

+ use definitions from defs.${OPSYS}.mk in the download-vulnerability-list
  script

+ at installation time, don't rely on "ln -sf" to DTRT - explicitly call
  "rm -f" before attempting the symbolc link

With thanks to seb@ for testing.
2003-09-02 10:20:27 +00:00
agc
47409ab810 Update audit-packages to 1.17.
Instead of using the number of bytes to determine whether or not the
file has shrunk, use the number of lines.  This will allow for
spelling corrections, login name of committers being shorter than
others, etc.  This is a temporary measure until a better distribution
mechanism is used.  Suggested by David Brownlee.
2003-08-22 10:11:57 +00:00
martti
8cee801716 COMMENT should start with a capital letter. 2003-07-21 17:10:16 +00:00
grant
ca3be631f2 s/netbsd.org/NetBSD.org/ 2003-07-17 22:50:55 +00:00
aymeric
4e85e41fb2 Remove NO_MTREE=yes
It broke installation of audit-packages as the first package in the system.
Okayed by Alistair.
2003-07-09 13:01:59 +00:00
wiz
1072aade83 -f the symlinks. Requested by Jeremy C. Reed. 2003-06-12 19:52:26 +00:00
wiz
6dacb668a8 Add man page supplied by Jeremy C. Reed in PR 21865, with some fixes by me.
Bump to 1.16.
2003-06-12 06:59:30 +00:00
seb
cef8d73c43 Update to version 1.15.
The directory ${PKGVULNDIR)} holding the 'vulnerabilities' file
which default value is determined at configure time can now be
overridden at runtime from the environment.

As a side effect the strings substituted at configure time in
files/{audit-packages,download-vulnerability-list} are now of the
form '@VAR@' and not '${VAR}'.
2003-05-21 14:07:45 +00:00
jmmv
92e726795a Make the PKGVULNDIR variable more generic, so one can choose where to
store the vulnerabilities file.  This variable was already recognized by
audit-packages but not by bsd.pkg.mk which hardcoded DISTDIR.
2003-04-25 20:05:18 +00:00
jmmv
0916498c1b Place WRKSRC where it belongs, to make pkglint happy; ok'ed by wiz. 2003-03-29 12:40:00 +00:00
uebayasi
f79202d866 Change directory before ${FETCH_CMD} as mk/bsd.pkg.mk does. This avoids a
fetch error if FETCH_CMD is e.g. ``curl -O''.  No functional changes.
2002-12-13 11:18:14 +00:00
wiz
e8817c9088 Complete standardization of messages according to latest pkglint. 2002-09-24 12:29:55 +00:00
wiz
99b08f151f Add chmod a+r after downloading the new vulnerability file.
Addresses part of pkg/17368.
Bump to 1.14.
2002-07-04 23:51:26 +00:00
kim
c1bd0953b5 Make sure we get the grandchild output before the script exits. 2002-06-04 23:01:34 +00:00
lukem
7780aa8486 Store vulnerabilities file in ${PKGVULNDIR} instead of ${DISTDIR}, in case
the latter is not appropriate.  The former defaults to the latter.
Bump version to 1.12.  Per discussion with Alistair Crooks.
2002-04-26 12:45:23 +00:00
agc
919d708cb0 Make sure this package installs properly. Pointed out in mail by
Toru TAKAMIZU <ttaka@ma1.seikyou.ne.jp>
2002-02-06 13:05:48 +00:00
agc
4854c9d84e Don't hardcode the PKG_DBDIR value at package installation time.
Bump version to 1.11
2001-12-29 10:07:30 +00:00
wiz
1fe04142cc Add RCS Ids. 2001-12-17 18:08:21 +00:00
zuntum
c72c1cf5f9 Move pkg/ files into package's toplevel directory 2001-11-01 00:57:41 +00:00
wiz
681e1a69a4 Apply patch from pkg/13295; seems not to hurt NetBSD, and should help
Solaris. Bump to 1.10.
2001-06-25 18:31:19 +00:00
wiz
0ebe24556a Fix warning output if new file is smaller than old one.
Noted by Kimmo Suominen. Bump to 1.9.
2001-06-06 23:37:52 +00:00
agc
0db172cd34 Update audit-packages to 1.8:
Fix a problem which occurs if the vulnerability list does not already exist.

This fixes PR 12763 from Brian de Alwis (bsd@cs.ubc.ca), albeit in a
slightly different manner.  (I also added a check for the existence of
the new vulnerabilities file, in case it was not downloaded for some
reason).
2001-04-27 08:40:53 +00:00
agc
15e9ce8614 Update to version 1.7 of audit-packages.
Incorporates the following changes from Anne Bennett
(anne@alcor.concordia.ca) in PR 12538:

(1) Running download-vulnerability-list as it stands from cron will
    spam the sysadmin with ftp output.  Easy to fix: redirect output
    to /dev/null as per the example in pkg/MESSAGE.  Problem: now
    we lose some error messages as well.  Patch: make sure error
    complaints in that script are spouted to STDERR, not STDOUT.
(3) Minor readability issue: set the source location for the
    vulnerability list in a variable at the top of the script.
(4) PR 12457 reported that audit-packages complained spuriously
    when the vulnerability list had not been updated in over a
    week, and suggested touching it as a solution.  This loses
    the information of when the file was really last updated.
    I'd prefer to always "mv" the new file into place, and use
    mtime instead of ctime in the file freshness test.

I did this part of the PR differently, as I was worried about
incomplete vulnerability lists being downloaded, and overwriting an
existing vulnerability list:

(2) ftp failure in download-vulnerability-list is not being detected
    properly by the current "${FETCH_CMD} .. || (complain; exit 1)"
    test.  Patch: test for a non-zero vulnerability file instead.
    Don't forget to remove any zero-length droppings, if any.

We know that the vulnerability list size will increase, and not
decrease, so test the size of the newly-downloaded file.  If the new
file is smaller than the existing file, then a bad transfer has taken
place - log this fact, and remove the new list.
2001-04-24 09:32:13 +00:00
agc
f8d07c2f7f Bump audit-packages to 1.6.
Always touch the downloaded vulnerability list, so that the audit-packages
script doesn't moan erroneously.

From Jim Bernard, in PR 12457.
2001-04-02 10:35:25 +00:00
agc
8f1bcba149 Clean up temporary vulnerabilities file, if it's the same as the existing
one - addresses 2nd part of PR 12457, from Jim Bernard.
2001-03-27 10:54:33 +00:00