aboutsummaryrefslogtreecommitdiffstats
path: root/mail
diff options
context:
space:
mode:
authoranders <anders@FreeBSD.org>2002-04-06 23:26:04 +0800
committeranders <anders@FreeBSD.org>2002-04-06 23:26:04 +0800
commitefe0a6cbc7a5ec993159d4bd171ab45c9cf83592 (patch)
tree620b169fb36bd59449be8b1d6d37074659380228 /mail
parent60ed14974d019a83d15dfbd998ddda8adb5b9612 (diff)
downloadfreebsd-ports-gnome-efe0a6cbc7a5ec993159d4bd171ab45c9cf83592.tar.gz
freebsd-ports-gnome-efe0a6cbc7a5ec993159d4bd171ab45c9cf83592.tar.zst
freebsd-ports-gnome-efe0a6cbc7a5ec993159d4bd171ab45c9cf83592.zip
- Update checksum for imap-utils.tar.Z. Licenses updated, also some
minor changes applied. - Remove security warning. There has been a long time since last known vulnerability, and the author claims having taken preventive measures. (OKed by SO).
Diffstat (limited to 'mail')
-rw-r--r--mail/imap-uw/Makefile3
-rw-r--r--mail/imap-uw/distinfo2
-rw-r--r--mail/imap-uw/pkg-install23
3 files changed, 1 insertions, 27 deletions
diff --git a/mail/imap-uw/Makefile b/mail/imap-uw/Makefile
index 289e9747ddb9..d9808800e7f1 100644
--- a/mail/imap-uw/Makefile
+++ b/mail/imap-uw/Makefile
@@ -64,9 +64,6 @@ PLIST_SUB+= IMAPUTILS='@comment '
pre-extract:
@${SH} ${PKGREQ}.rev ${LOCALBASE}/include/c-client/portrevision.h ${PORTVERSION}
-.if !defined(BATCH) && !defined(PACKAGE_BUILDING)
- @${SH} ${PKGINSTALL} foo PRE-INSTALL || ${FALSE}
-.endif
pre-build:
.if defined(WITH_SSL)
diff --git a/mail/imap-uw/distinfo b/mail/imap-uw/distinfo
index 6784b67e9f5d..c2af1a272d70 100644
--- a/mail/imap-uw/distinfo
+++ b/mail/imap-uw/distinfo
@@ -1,2 +1,2 @@
MD5 (imap-2001a.tar.Z) = 42c5c8d049c209b15513a4f6ebba34d2
-MD5 (imap-utils.tar.Z) = 113cae14036d9fe70e7100b661cfdd73
+MD5 (imap-utils.tar.Z) = a54772a4954ecc145a5f962d8e6012bf
diff --git a/mail/imap-uw/pkg-install b/mail/imap-uw/pkg-install
deleted file mode 100644
index c7541a4b1940..000000000000
--- a/mail/imap-uw/pkg-install
+++ /dev/null
@@ -1,23 +0,0 @@
-#!/bin/sh
-TTY=/dev/tty
-
-if [ "X$PACKAGE_BUILDING" != "X" ]; then
- exit 0
-fi
-
-case $2 in
- POST-INSTALL)
- ;;
- PRE-INSTALL)
- if dialog --yesno "This port has been proven exploitable at several occasions (read up\non CERT advisories), leaving systems subject to remote root access.\nBefore installing this package, please consider:\n\na) Whether you really want to use this software. The integrity of\nyour system may be at risk.\n\nb) Using TCP Wrappers to protect your UW imap/pop daemons from being\npublicly available. Adding this to /etc/hosts.allow will make your\nimap and pop3 daemons accessible only from 192.168.0.0/24:\n\nimapd : 192.168.0.0/24 : allow\nimapd : ALL : deny\nipop3d : 192.168.0.0/24 : allow\nipop3d : ALL : deny\n\nFor more information about the hosts.allow file, read\nhosts_access(5). Please test that this setup works as expected.\n\nDo you wish to proceed with the build?" 24 72 < ${TTY} >${TTY} 2>&1; then
- exit 0
- else
- exit 1
- fi
- ;;
- *)
- echo "Unexpected argument $2!"
- exit 1
- ;;
-esac
-exit 0