aboutsummaryrefslogtreecommitdiffstats
path: root/security/freebsd-update/Makefile
blob: 59b1c28d3b49fd7c4b3ae2b94f51c57f9da44683 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
# New ports collection makefile for:    FreeBSD Update Client
# Date created:             21 March 2003
# Whom:                 cperciva@daemonology.net
#
# $FreeBSD$
#

PORTNAME=   freebsd-update
PORTVERSION=    1.5
CATEGORIES= security
MASTER_SITES=   http://www.daemonology.net/freebsd-update/

MAINTAINER= cperciva@daemonology.net
COMMENT=    Fetches and installs binary updates to FreeBSD

RUN_DEPENDS=    bspatch:${PORTSDIR}/misc/bsdiff
# This is a critical security port.  If it breaks, Bad Things will happen.
# Under no circumstances should this port ever be modified without approval
# from the maintainer or security-officer, even for "cosmetic" fixes.

# The RSA code has only been tested on i386; I don't *think* there are
# any word-size or endian issues, but I'm not sure.  Since nobody is
# building updates for non-i386 platforms anyway, this won't hurt anyone.

ONLY_FOR_ARCHS= i386

MAN5=       freebsd-update.conf.5
MAN8=       freebsd-update.8
PLIST_FILES=    sbin/freebsd-update     \
        sbin/freebsd-update-verify  \
        etc/freebsd-update.conf.sample
PLIST_DIRS= freebsd-update

PKGMESSAGE= ${WRKDIR}/pkg-message

.ifdef NOPORTDOCS
MAKE_ENV+=  NODOCS=yes
.else
PORTDOCS=   LICENSE README VERSION
.endif

post-extract:
    ${SED} -e "s#PREFIX=/usr/local#PREFIX=${PREFIX}#g" \
        ${WRKSRC}/freebsd-update > ${WRKSRC}/freebsd-update.new
    ${MV} ${WRKSRC}/freebsd-update.new ${WRKSRC}/freebsd-update
    @${SED} -e "s=%%PREFIX%%=${PREFIX}=g" ${FILESDIR}/pkg-message \
        > ${PKGMESSAGE}

post-install:
    @${CAT} ${PKGMESSAGE}

.include <bsd.port.mk>