summaryrefslogtreecommitdiff
path: root/www/apache13-ssl/files (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Fix a few "bad example" problems in the rc.d scripts that have beenDoug Barton2009-07-151-1/+0
| | | | | | | | | | | | | | | | | | | | propogated by copy and paste. 1. Primarily the "empty variable" default assignment, which is mostly ${name}_flags="", but fix a few others as well. 2. Where they are not already documented, add the existence of the _flags (or other deleted empties) option to the comments, and in some cases add comments from scratch. 3. Replace things that look like: prefix=%%PREFIX%% command=${prefix}/sbin/foo to just use %%PREFIX%%. In many cases the $prefix variable is only used once, and in some cases it is not used at all. 4. In a few cases remove ${name}_flags from command_args 5. Remove a long-stale comment about putting the port's rc.d script in /etc/rc.d (which is no longer necessary). No PORTREVISION bumps because all of these changes are noops.
* load_rc_config before testing for empty vars.Ion-Mihai Tetcu2008-07-131-2/+2
| | | | Submitted by: dougb@
* - Honor NO* vars (noticed by ionbot)Ion-Mihai Tetcu2008-07-132-0/+23
| | | | | | | | | - Silence some portlint warnings - USE_RC_SUBR from the rc.d script - Bump PORTREVISION PR: 125131 Submitted by: Philip M. Gollucci
* - Update to 1.3.37-1.57Clement Laforet2007-03-182-48/+0
|
* - Fix security issue in mod_rewrite.Clement Laforet2006-07-271-0/+13
| | | | | | | | | | | | | | | | | | | | All people using mod_rewrite are strongly encouraged to update. An off-by-one flaw exists in the Rewrite module, mod_rewrite. Depending on the manner in which Apache httpd was compiled, this software defect may result in a vulnerability which, in combination with certain types of Rewrite rules in the web server configuration files, could be triggered remotely. For vulnerable builds, the nature of the vulnerability can be denial of service (crashing of web server processes) or potentially allow arbitrary code execution. This issue has been rated as having important security impact by the Apache HTTP Server Security Team Updates to latest versions will follow soon. Notified by: so@ (simon) Obtained from: Apache Security Team Security: CVE-2006-3747
* Remove the FreeBSD KEYWORD from all rc.d scripts where it appears.Doug Barton2006-02-201-1/+1
| | | | | | | We have not checked for this KEYWORD for a long time now, so this is a complete noop, and thus no PORTREVISION bump. Removing it at this point is mostly for pedantic reasons, and partly to avoid perpetuating this anachronism by copy and paste to future scripts.
* - Update to 1.3.34+1.37Clement Laforet2006-01-142-95/+10
| | | | - Use new apache framework.
* SECURITY: CVE-2005-3352 (cve.mitre.org)Clement Laforet2005-12-121-0/+35
| | | | | | | | | mod_imap: Escape untrusted referer header before outputting in HTML to avoid potential cross-site scripting. Change also made to ap_escape_html so we escape quotes. Reported by JPCERT. [Mark Cox] Reported by: simon
* - Fix build with OpenSSL 0.9.8Clement Laforet2005-10-021-0/+14
|
* - Fix CAN-2005-2088Clement Laforet2005-07-261-0/+87
| | | | Obtained from: Apache repository
* - move default configuration files to ${EXAMPLESDIR} and keepClement Laforet2004-12-131-17/+27
| | | | ${PREFIX}/etc/apache clean.
* - Xmas for apache13-ssl!Clement Laforet2004-12-131-0/+62
| | | | | | Give it a rcNG startup script Also requested by: sem
* - Deal with httpsd.conf.bak files, like we did for apache2 previously in the ↵Clement Laforet2004-11-291-0/+15
| | | | day.
* - Update to 1.3.33.1.55Clement Laforet2004-11-121-118/+0
|
* - Security FixClement Laforet2004-06-111-0/+13
| | | | | | mod_proxy buffer overflow CAN-2004-0492 Shamefully stolen from: apache13-mod-ssl port
* Fix a bug in the parsing of Allow/Deny rules using IP addresses.Clement Laforet2004-03-081-0/+118
| | | | | | | http://www.vuxml.org/freebsd/09d418db-70fd-11d8-873f-0020ed76ef5a.html Reported by: nectar Obtained from: Apache CVS
* Rename patch.Clement Laforet2004-01-211-0/+0
| | | | | | | | post-patch-conf:httpd.conf-dist.orig => post-patch-conf:httpd.conf-dist Pointed out by: kris, Koop Mast <kwm@rainbow-runner.nl>
* Here's the patch.James E. Housley2003-11-121-0/+18
| | | | | | files/patch-FixPatch was missing too. Submitted by: MAINTAINER
* Changelog:James E. Housley2003-11-098-17/+207
| | | | | | | | | | | | | | | | | | | | | | | | | - Sync with apache13 layout (and some patches) - use DOCSDIR - Add no_zombies.patch - use DIST_SUBDIR=apache Removed files: - files/patch-aq - files/patch-ar Added files: - files/patch-httpd.conf-dist - files/post-patch-conf:httpd.conf-dist.orig - files/patch-FixPatch - files/patch-SSLpatch - files/patch-Makefile.tmpl - files/patch-src::modules::standard::mod_auth_db.module - files/patch-src::support::dbmanage - files/patch-src::support::log_server_status - files/patch-configure PR: 58403 Submitted By: MAINTAINER
* - Use user and group "www"Dirk Meyer2003-01-272-10/+32
| | | | | | | - fix PLIST - add patch from ports/36363 (from ryan@servercity.com) - verify ports/36361 - fix ports/36364
* Update to 1.3.26+ssl_1.48Dirk Meyer2002-09-153-53/+10
| | | | removed FORBIDDEN
* Patch buffer overflow described inJacques Vidrine2002-03-231-0/+27
| | | | <URL:http://www.apache-ssl.org/advisory-20020301.txt>.
* This is a part of update to 1.3.12+1.40. For the rest, please see theAkinori MUSHA2000-04-273-10/+29
| | | | | | | | | | | | | | | | | Makefile's commit log. (Actually I had a CVS problem, and Peter has fixed it for me) * * * * - Add patch-at to correctly build on FreeBSD 5.0+. PR: ports/17404 Submitted by: Khetan H. Gajjar <khetan@freebsd.os.org.za> - Mark `WWW:' in DESCR. Noticed by: portlint
* USE_OPENSSLKris Kennaway2000-02-121-1/+1
| | | | Submitted by: Jim Bloom <bloom@acm.org>
* Add a little fix to eliminate a install error, chgrp the right one.Foxfair Hu1999-11-031-0/+11
|
* Update this to version 1.3.9+1.37.Steve Price1999-09-271-0/+11
| | | | | PR: 13804 Submitted by: maintainer
* - Upgrade to Apache-SSL 1.35.Dirk Froemberg1999-06-021-12/+3
| | | | | | - include ${PREFIX}/include/openssl due to openssl upgrade. Submitted by: Ralf S. Engelschall <rse@FreeBSD.org>
* Upgrade to Apache 1.3.6 and Apache-SSL 1.32.Dirk Froemberg1999-04-101-0/+26
PR: ports/10966 Submitted by: Adam Laurie <adam@algroup.co.uk>