blob: 59b1c28d3b49fd7c4b3ae2b94f51c57f9da44683 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
|
# New ports collection makefile for: FreeBSD Update Client
# Date created: 21 March 2003
# Whom: cperciva@daemonology.net
#
# $FreeBSD$
#
PORTNAME= freebsd-update
PORTVERSION= 1.5
CATEGORIES= security
MASTER_SITES= http://www.daemonology.net/freebsd-update/
MAINTAINER= cperciva@daemonology.net
COMMENT= Fetches and installs binary updates to FreeBSD
RUN_DEPENDS= bspatch:${PORTSDIR}/misc/bsdiff
# This is a critical security port. If it breaks, Bad Things will happen.
# Under no circumstances should this port ever be modified without approval
# from the maintainer or security-officer, even for "cosmetic" fixes.
# The RSA code has only been tested on i386; I don't *think* there are
# any word-size or endian issues, but I'm not sure. Since nobody is
# building updates for non-i386 platforms anyway, this won't hurt anyone.
ONLY_FOR_ARCHS= i386
MAN5= freebsd-update.conf.5
MAN8= freebsd-update.8
PLIST_FILES= sbin/freebsd-update \
sbin/freebsd-update-verify \
etc/freebsd-update.conf.sample
PLIST_DIRS= freebsd-update
PKGMESSAGE= ${WRKDIR}/pkg-message
.ifdef NOPORTDOCS
MAKE_ENV+= NODOCS=yes
.else
PORTDOCS= LICENSE README VERSION
.endif
post-extract:
${SED} -e "s#PREFIX=/usr/local#PREFIX=${PREFIX}#g" \
${WRKSRC}/freebsd-update > ${WRKSRC}/freebsd-update.new
${MV} ${WRKSRC}/freebsd-update.new ${WRKSRC}/freebsd-update
@${SED} -e "s=%%PREFIX%%=${PREFIX}=g" ${FILESDIR}/pkg-message \
> ${PKGMESSAGE}
post-install:
@${CAT} ${PKGMESSAGE}
.include <bsd.port.mk>
|