ports/82288: maintainer-update: www/lighttpd (1.3.13 to 1.3.14)
Pav Lucistnik
pav at FreeBSD.org
Thu Jun 16 08:05:36 UTC 2005
Sergey Matveychuk píše v čt 16. 06. 2005 v 10:15 +0400:
> Pav Lucistnik wrote:
> > Synopsis: maintainer-update: www/lighttpd (1.3.13 to 1.3.14)
> >
> > State-Changed-From-To: open->closed
> > State-Changed-By: pav
> > State-Changed-When: Wed Jun 15 21:09:33 GMT 2005
> > State-Changed-Why:
> > Committed, thanks!
> >
> > http://www.freebsd.org/cgi/query-pr.cgi?pr=82288
>
> OPTIONS= OPENSSL "Enable SSL support" on \
> OPENLDAP "Enable LDAP support" off \
> MYSQL "Enable MYSQL support" off \
> IPV6 "Disable IPV6 support" off
>
> .if !defined(WITHOUT_OPENSSL)
> USE_OPENSSL= yes
> .endif
>
> .include <bsd.port.pre.mk>
>
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> This will not work. WITHOUT_OPENSSL will never be setted.
>
> There is a workaround for OPENSSL:
>
> .include <bsd.port.pre.mk>
>
> .if !defined(WITHOUT_SSL)
> .include "${PORTSDIR}/Mk/bsd.openssl.mk"
> USE_OPENSSL= yes
> CONFIGURE_ARGS+= --with-openssl
> .endif
Yech, I was wondering the same. Thank you, I committed this workaround!
Clever...
Still, proper fix should be devised for this problem.
--
Pav Lucistnik <pav at oook.cz>
<pav at FreeBSD.org>
It's the classic Microsoft security-bulletin formula: "The vulnerability is
important (never dangerous); you have nothing to fear and no reason to regret
trusting us; we have no intention of apologizing for it or even explaining it
adequately; now go get your patch, shut up, and be grateful nothing bad has
happened.
-- The Register
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 187 bytes
Desc: This is a digitally signed message part
URL: <http://lists.freebsd.org/pipermail/freebsd-ports-bugs/attachments/20050616/5b4b991d/attachment.sig>
More information about the freebsd-ports-bugs
mailing list