diff options
author | Anders Nordby <anders@FreeBSD.org> | 2002-04-06 15:26:04 +0000 |
---|---|---|
committer | Anders Nordby <anders@FreeBSD.org> | 2002-04-06 15:26:04 +0000 |
commit | 0a8e4d6fa6e4a5669a66b370dcc84c75f66a35a1 (patch) | |
tree | f5bee20478d89783de267eb1da907e61eed623b5 /mail/imap-uw | |
parent | 8488effa1da743a1716aea2234ef66e9ee7ee6f8 (diff) | |
download | ports-0a8e4d6fa6e4a5669a66b370dcc84c75f66a35a1.tar.gz ports-0a8e4d6fa6e4a5669a66b370dcc84c75f66a35a1.zip |
Notes
Diffstat (limited to 'mail/imap-uw')
-rw-r--r-- | mail/imap-uw/Makefile | 3 | ||||
-rw-r--r-- | mail/imap-uw/distinfo | 2 | ||||
-rw-r--r-- | mail/imap-uw/pkg-install | 23 |
3 files changed, 1 insertions, 27 deletions
diff --git a/mail/imap-uw/Makefile b/mail/imap-uw/Makefile index 289e9747ddb9..d9808800e7f1 100644 --- a/mail/imap-uw/Makefile +++ b/mail/imap-uw/Makefile @@ -64,9 +64,6 @@ PLIST_SUB+= IMAPUTILS='@comment ' pre-extract: @${SH} ${PKGREQ}.rev ${LOCALBASE}/include/c-client/portrevision.h ${PORTVERSION} -.if !defined(BATCH) && !defined(PACKAGE_BUILDING) - @${SH} ${PKGINSTALL} foo PRE-INSTALL || ${FALSE} -.endif pre-build: .if defined(WITH_SSL) diff --git a/mail/imap-uw/distinfo b/mail/imap-uw/distinfo index 6784b67e9f5d..c2af1a272d70 100644 --- a/mail/imap-uw/distinfo +++ b/mail/imap-uw/distinfo @@ -1,2 +1,2 @@ MD5 (imap-2001a.tar.Z) = 42c5c8d049c209b15513a4f6ebba34d2 -MD5 (imap-utils.tar.Z) = 113cae14036d9fe70e7100b661cfdd73 +MD5 (imap-utils.tar.Z) = a54772a4954ecc145a5f962d8e6012bf diff --git a/mail/imap-uw/pkg-install b/mail/imap-uw/pkg-install deleted file mode 100644 index c7541a4b1940..000000000000 --- a/mail/imap-uw/pkg-install +++ /dev/null @@ -1,23 +0,0 @@ -#!/bin/sh -TTY=/dev/tty - -if [ "X$PACKAGE_BUILDING" != "X" ]; then - exit 0 -fi - -case $2 in - POST-INSTALL) - ;; - PRE-INSTALL) - if dialog --yesno "This port has been proven exploitable at several occasions (read up\non CERT advisories), leaving systems subject to remote root access.\nBefore installing this package, please consider:\n\na) Whether you really want to use this software. The integrity of\nyour system may be at risk.\n\nb) Using TCP Wrappers to protect your UW imap/pop daemons from being\npublicly available. Adding this to /etc/hosts.allow will make your\nimap and pop3 daemons accessible only from 192.168.0.0/24:\n\nimapd : 192.168.0.0/24 : allow\nimapd : ALL : deny\nipop3d : 192.168.0.0/24 : allow\nipop3d : ALL : deny\n\nFor more information about the hosts.allow file, read\nhosts_access(5). Please test that this setup works as expected.\n\nDo you wish to proceed with the build?" 24 72 < ${TTY} >${TTY} 2>&1; then - exit 0 - else - exit 1 - fi - ;; - *) - echo "Unexpected argument $2!" - exit 1 - ;; -esac -exit 0 |