aboutsummaryrefslogtreecommitdiffstats
path: root/www/zope211
Commit message (Collapse)AuthorAgeFilesLines
* 1. Use the link /usr/local/www/cgi-bin for installing the cgi scripts.alane2002-07-273-6/+20
| | | | | | | | | | 2. Maintainer changed to ports@geeksrus.net (alane@freebsd.org) due to maintainer timeouts on this port. 3. PORTREVISION bumped due to change in pkg-plist and install dirs. PR: 39687 Submitted by: ports@geeksrus.net Approved by: will
* 1. Redirect stderr to /dev/null as well as stdout in rc.d/zope.sh, so thatalane2002-06-202-2/+3
| | | | | | | | | | boot time startup does not fail. 2. Bump PORTREVSION (not in PR). PR: ports/37878 Submitted by: alane Reviewed by: will Approved by: will
* Upgrade to Zope 2.5.1nbm2002-05-094-25/+27
| | | | | PR: ports/37763 Submitted by: HAYASHI Yasushi <yasi@yasi.to>
* Implement the HotFix described atnbm2002-03-233-3/+11
| | | | | | | | | | | | | | | | http://www.zope.org/Products/Zope/Hotfix_2002-03-01/README.txt which says: ``The issue involves the checking of security for objects with proxy roles. The context of the owner user that created the object with proxy roles was not being taken into account when determining access to the object with proxy roles. This flaw could allow users defined in subfolders of a site with sufficient privileges to access objects at higher levels in the site that they would not normally be able to access.'' PR: 36103 Submitted by: HAYASHI Yasushi <yasi@yasi.to>
* Add install and deinstall scripts I forgot to commit last time.nbm2002-02-092-0/+49
| | | | Submitted by: HAYASHI Yasushi <yasi@yasi.to>
* Upgrade to 2.5.0 plus the security fix.nbm2002-02-064-145/+575
| | | | | PR: ports/34430 Submitted by: HAYASHI Yasushi <yasi@yasi.to>
* Use ${ECHO_CMD} instead of ${ECHO} where you mean the echo command;knu2002-01-291-1/+1
| | | | | | the ECHO macro is set to "echo" by default, but it is set to "true" if make(1) is invoked with the -s option while ECHO_CMD is always set to the echo command.
* Upgrade to 2.4.2nbm2001-10-203-4/+14
|
* Upgrade to Zope 2.4.1.nbm2001-09-103-211/+220
|
* Acqusition context checking hotfixnbm2001-08-053-5/+12
| | | | | | | | | ``The issue involves an error in the '_check_context' method of the AccessControl.User.BasicUser class. The bug made it possible to access Zope objects via acquisition that a user would not otherwise have access to. This issue could allow users with enough internal knowledge of Zope to perform actions higher in the object hierarchy than they should be able to.''
* Upgrade to 2.4.0.vanilla2001-07-263-110/+431
| | | | Approved by: nbm
* Update port to version 2.3.3.olgeni2001-07-053-12/+5
| | | | Approved by: nbm
* Add missing @dirrm for Hotfix_2001_05_01.olgeni2001-05-281-0/+1
|
* Actually install the 2001-05-01 Hotfix.nbm2001-05-032-2/+4
|
* Update to Zope 2.3.2 + Hotfix 2001-05-01nbm2001-05-033-4/+25
|
* Upgrade to Zope 2.3.1!nbm2001-03-313-65/+159
|
* Apply Zope hotfix: Hotfix_2001-03-08olgeni2001-03-103-3/+10
| | | | | | | | | | | | From the Zope site: The issue involves an error in the 'aq_inContextOf' method of objects that support acquisition. A recent change to the access validation machinery made this bug begin to affect security restrictions. The bug, with the change to validation, made it possible to access Zope objects via acquisition that a user would not otherwise have access to. This issue could allow users with enough internal knowledge of Zope to perform actions higher in the object hierarchy than they should be able to.
* More plist and Makefile fixes.olgeni2001-03-082-22/+18
| | | | | | | | | | | | | | | | | | | * Removed "access" from pkg-plist, it contains password data that should be preserved (I forgot this last time!). * In the "do-install" target, leave the "access" file unchanged if it already exists. * Remove the pre-deinstall comment: Data.fs is already preserved by pkg_delete anyway. * In the "install" target, use temporary file Data.fs.preserve to avoid overwriting Data.fs. "make deinstall/install" can now be safely used to perform upgrades. * Don't leave .o files around anymore. Approved by: maintainer
* Miscellaneous fixes.olgeni2001-03-072-25/+42
| | | | | | | | | | | | | | | | | | | | | | | | | * Changed the python15 dependency to USE_PYTHON=yes * Replaced PYTHON15 with PYTHON_CMD from bsd.python.mk * Added SAPACHE_CONFDIR, like the other Sxxx variables, to be used in the PLIST. APACHE_CONFDIR now depends on SAPACHE_CONFDIR * Added APACHE_CONFDIR and WEBBASEDIR to PLIST_SUB * Removed temporary file Zope.cgi.orig * Removed .cvsignore from var/ * Added/removed some files to the PLIST * Used @unexec rmdir to remove shared directories from PLIST * Removed the line with "grep". I didn't understand how it was supposed to work, I guess it should have been something like "cmp -s ...", but Data.fs cannot be equal to Data.fs.in anyway, because Zope adds some things to it the first time it's started (automatically imported packages from filesystem). * Removed temporary files from var/ at deinstall time (*.tmp, *.lock, *.soc, *.pid) * Sometimes the inituser file did not exist at deinstall time, so I deleted it with @unexec. It won't be included by "make package". * Added the Hotfix_2001-02-23 directory (@dirrm) * Used variables from PLIST_SUB instead of www and etc/apache (@dirrm) Approved by: maintainer
* Apply a Zope hotfix, fixing a potential security problem.nbm2001-03-043-3/+10
| | | | | | | | | | | | | | | | | | | | | From the Zope hotfix: This hotfix addresses and important security issue that affects Zope versions up to and including Zope 2.3.1 b1. The issue is related to ZClasses in that a user with through-the-web scripting capabilities on a Zope site can view and assign class attributes to ZClasses, possibly allowing them to make inappropriate changes to ZClass instances. This patch also fixes problems in the ObjectManager, PropertyManager, and PropertySheet classes related to mutability of method return values which could be perceived as a security problem. We *highly* recommend that any Zope site running versions of Zope up to and including 2.3.1 b1 have this hotfix product installed to mitigate these issues if the site is accessible by untrusted users who have through-the-web scripting privileges.
* Upgrade to Zope 2.3.0. It requires the recent change to python15 fornbm2001-01-293-131/+381
| | | | the 'new' module.
* Update to Zope 2.2.5nbm2001-01-183-103/+74
|
* Upgrade to Zope 2.2.4, with 2000-12-08, 2000-12-15a, and 2000-12-18nbm2000-12-203-17/+46
| | | | | | | security hotfixes. All Zope users are encouraged to upgrade, or apply the hotfixes themselves.
* Add __init__.pyc's for the Hotfixes, since they seem to be created.nbm2000-11-041-0/+2
| | | | | | | Since this doesn't affect any functionality for port or packages users, I'll try avoid the PORTREVISION bump. Noticed by: bento
* Fix up my silly mistake of adding DIST_SUBDIR=zope at the last secondnbm2000-10-181-3/+3
| | | | | | | after testing. PR: 22050 Submitted by: Taoka Fumiyoshi <fmysh@ga2.so-net.ne.jp>
* Add two security hotfixes for Zope - more complex Zope internals stuffnbm2000-10-153-2/+19
| | | | | | which allows people who may edit DTML to gain higher privilege, and those who have higher privilege in some areas of the Zope tree to gain it in other areas.
* Upgrade to Zope 2.2.2nbm2000-09-193-17/+28
| | | | Also allow zope to be installed by non-root.
* Make Zope management work with non-SSL connections, but give an examplenbm2000-09-191-22/+28
| | | | | | | | of how to turn it on. Conditionalize the SSL usage on <IfDefine SSL>, since that's been a problem. Also make the rewrite use cgi-bin.default/Zope.cgi, but give an example of what to change if you move it to cgi-bin/Zope.cgi.
* Zope depends on python 1.5.2, and that is installed from lang/python15nbm2000-09-151-1/+1
| | | | now.
* Remove the zope data file if it is the same as installed.nbm2000-09-071-0/+1
|
* Fix numerous bugs in my upgrading to 2.2.1.nbm2000-09-071-8/+17
| | | | It may even work out the box now.
* Update to Zope 2.2.1.nbm2000-09-074-43/+55
| | | | | | | | Zope shutdown bug fixed. Reported by: Marc Rassbach <marc@milestonerdl.com> Reported by: Jimmy Olgeni <olgeni@uli.it> Zope startup bug fixed (I think).
* Update to 2.2.1b1, since there is a minor security problem in anythingnbm2000-08-153-32/+270
| | | | beforehand.
* Take over maintainership from Thomas for a while.nbm2000-08-091-1/+1
| | | | Approved by: thomas@hentschel.net (previous maintainer)
* Fix a type in the installation targetnbm2000-08-091-1/+1
| | | | | PR: ports/20486 Submitted by: thomas@hentschel.net
* Update to zope 2.2.0 to fix security hole.kris2000-08-052-4/+2
| | | | | Submitted by: James Howard <howardjp@wam.umd.edu> PR: 20144
* As threatened on freebsd-ports: all startup scripts know about the twotg2000-07-052-3/+19
| | | | | | | options `start' and `stop' now (unless I have forgotten any). This allows us to call the scripts from /etc/rc.shutdown with the correct option. The (42 or so) ports that already DTRT before are unchanged.
* Mark FORBIDDEN: someone needs to apply the hotfix as explained in thekris2000-06-201-0/+2
| | | | commit.
* Update to version 2.1.6.steve2000-05-294-1104/+1170
| | | | | PR: 18444 Submitted by: Thomas Hentschel <thomas@hentschel.net>
* Update with the new PORTNAME/PORTVERSION variablescpiazza2000-04-101-9/+10
|
* shrink to 24 lines (portlint)mharo2000-02-161-3/+0
|
* PREFIX -> LOCALBASE (portlint)mharo2000-02-161-1/+1
|
* ports@freebsd.org -> ports@FreeBSD.orgdirk2000-02-141-1/+1
|
* Update web information.billf1999-11-291-5/+7
| | | | | PR: ports/14982 Submitted by: KATO Tsuguru <tkato@prontomail.ne.jp>
* (1) Look for ${PREFIX}/sbin/apache instead of apache.billf1999-11-291-2/+1
| | | | | | Submitted by: David Kirchner <dpk@nwserv.com> (2) Remove CHMOD definition, we already do it in bsd.port.mk
* Fixup homepage in DESCR.steve1999-11-141-1/+1
| | | | | PR: 14789 Submitted by: Ade Lovett <ade@lovett.com>
* Initial import of zope version 2.0.0b5.steve1999-11-017-0/+1280
An object-based web application platform with database access. PR: 13324 Submitted by: Peter Cornelius <pcc@gmx.net>