| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
Notes:
svn path=/head/; revision=111131
|
|
|
|
|
|
|
| |
Spotted by: kris
Notes:
svn path=/head/; revision=110206
|
|
|
|
|
|
|
| |
Submitted by: HAYASHI Yasushi <yasi@yasi.to>
Notes:
svn path=/head/; revision=107724
|
|
|
|
|
|
|
|
|
|
| |
- Change global products directory location.
PR: 65760
Submitted by: maintainer
Notes:
svn path=/head/; revision=107721
|
|
|
|
|
|
|
| |
Reported by: bento's extras list
Notes:
svn path=/head/; revision=107344
|
|
|
|
|
|
|
|
|
| |
update PR.
Submitted by: Gerhard Schmidt <estartu@augusta.de>
Notes:
svn path=/head/; revision=106979
|
|
|
|
|
|
|
|
|
| |
PR: ports/63265
Submitted by: Gerhard Schmidt <estartu@augusta.de>
Approved by: crowds on python@ via perky (in general)
Notes:
svn path=/head/; revision=105919
|
|
|
|
| |
Notes:
svn path=/head/; revision=105747
|
|
|
|
| |
Notes:
svn path=/head/; revision=105255
|
|
|
|
|
|
|
|
| |
PR: 59000
Submitted by: Osma Suominen <ozone@sange.fi>
Notes:
svn path=/head/; revision=94666
|
|
|
|
|
|
|
|
| |
a package update is done. Also, install zope.sh.sample, and copy it to
zope.sh if zope.sh doesn't already exist.
Notes:
svn path=/head/; revision=87919
|
|
|
|
| |
Notes:
svn path=/head/; revision=87804
|
|
|
|
| |
Notes:
svn path=/head/; revision=86456
|
|
|
|
|
|
|
|
| |
PR: 54243
Submitted by: Tim Middleton <x@vex.net>
Notes:
svn path=/head/; revision=84497
|
|
|
|
|
|
|
|
| |
PR: 53313
Submitted by: "Miguel Mendez" <flynn@energyhq.es.eu.org>
Notes:
svn path=/head/; revision=83102
|
|
|
|
|
|
|
|
| |
PR: 52038
Submitted by: Miguel Mendez <flynn@energyhq.es.eu.org>
Notes:
svn path=/head/; revision=80729
|
|
|
|
| |
Notes:
svn path=/head/; revision=80309
|
|
|
|
| |
Notes:
svn path=/head/; revision=78716
|
|
|
|
|
|
|
|
|
|
| |
Requiem mors pacem pkg-comment,
And be calm ports tree.
E Nomini Patri, E Fili, E Spiritu Sancti.
Notes:
svn path=/head/; revision=77045
|
|
|
|
| |
Notes:
svn path=/head/; revision=74980
|
|
|
|
|
|
|
|
|
|
| |
the plist ;)
PR: 46168
Submitted by: Simon 'corecode' Schubert <corecode@eikonww2.eikon.e-technik.tu-muenchen.de>
Notes:
svn path=/head/; revision=72978
|
|
|
|
|
|
|
| |
than just bomb.
Notes:
svn path=/head/; revision=69341
|
|
|
|
|
|
|
|
| |
mail's case insensitive and will try to type that. Sorry folks, purely a
cosmetic change here, nothing to see, move along, move along....
Notes:
svn path=/head/; revision=69249
|
|
|
|
| |
Notes:
svn path=/head/; revision=69236
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
2. Maintainer changed to ports@geeksrus.net (alane@freebsd.org) due to
maintainer timeouts on this port.
3. PORTREVISION bumped due to change in pkg-plist and install dirs.
PR: 39687
Submitted by: ports@geeksrus.net
Approved by: will
Notes:
svn path=/head/; revision=63625
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
boot time startup does not fail.
2. Bump PORTREVSION (not in PR).
PR: ports/37878
Submitted by: alane
Reviewed by: will
Approved by: will
Notes:
svn path=/head/; revision=61603
|
|
|
|
|
|
|
|
| |
PR: ports/37763
Submitted by: HAYASHI Yasushi <yasi@yasi.to>
Notes:
svn path=/head/; revision=58725
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
http://www.zope.org/Products/Zope/Hotfix_2002-03-01/README.txt which
says:
``The issue involves the checking of security for objects with proxy
roles. The context of the owner user that created the object with
proxy roles was not being taken into account when determining access
to the object with proxy roles. This flaw could allow users defined
in subfolders of a site with sufficient privileges to access objects
at higher levels in the site that they would not normally be able to
access.''
PR: 36103
Submitted by: HAYASHI Yasushi <yasi@yasi.to>
Notes:
svn path=/head/; revision=56470
|
|
|
|
|
|
|
| |
Submitted by: HAYASHI Yasushi <yasi@yasi.to>
Notes:
svn path=/head/; revision=54402
|
|
|
|
|
|
|
|
| |
PR: ports/34430
Submitted by: HAYASHI Yasushi <yasi@yasi.to>
Notes:
svn path=/head/; revision=54249
|
|
|
|
|
|
|
|
|
| |
the ECHO macro is set to "echo" by default, but it is set to "true" if
make(1) is invoked with the -s option while ECHO_CMD is always set to
the echo command.
Notes:
svn path=/head/; revision=53960
|
|
|
|
| |
Notes:
svn path=/head/; revision=48965
|
|
|
|
| |
Notes:
svn path=/head/; revision=47599
|
|
|
|
|
|
|
|
|
|
|
|
| |
``The issue involves an error in the '_check_context' method of the
AccessControl.User.BasicUser class. The bug made it possible to access
Zope objects via acquisition that a user would not otherwise have access
to. This issue could allow users with enough internal knowledge of Zope
to perform actions higher in the object hierarchy than they should be
able to.''
Notes:
svn path=/head/; revision=45808
|
|
|
|
|
|
|
| |
Approved by: nbm
Notes:
svn path=/head/; revision=45493
|
|
|
|
|
|
|
| |
Approved by: nbm
Notes:
svn path=/head/; revision=44764
|
|
|
|
| |
Notes:
svn path=/head/; revision=43169
|
|
|
|
| |
Notes:
svn path=/head/; revision=42208
|
|
|
|
| |
Notes:
svn path=/head/; revision=42207
|
|
|
|
| |
Notes:
svn path=/head/; revision=40657
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
From the Zope site:
The issue involves an error in the 'aq_inContextOf' method of objects that
support acquisition. A recent change to the access validation machinery
made this bug begin to affect security restrictions. The bug, with the
change to validation, made it possible to access Zope objects via
acquisition that a user would not otherwise have access to. This issue
could allow users with enough internal knowledge of Zope to perform actions
higher in the object hierarchy than they should be able to.
Notes:
svn path=/head/; revision=39416
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Removed "access" from pkg-plist, it contains password data that
should be preserved (I forgot this last time!).
* In the "do-install" target, leave the "access" file unchanged if it
already exists.
* Remove the pre-deinstall comment: Data.fs is already preserved by
pkg_delete anyway.
* In the "install" target, use temporary file Data.fs.preserve to avoid
overwriting Data.fs. "make deinstall/install" can now be safely used to
perform upgrades.
* Don't leave .o files around anymore.
Approved by: maintainer
Notes:
svn path=/head/; revision=39249
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Changed the python15 dependency to USE_PYTHON=yes
* Replaced PYTHON15 with PYTHON_CMD from bsd.python.mk
* Added SAPACHE_CONFDIR, like the other Sxxx variables, to be used in the
PLIST. APACHE_CONFDIR now depends on SAPACHE_CONFDIR
* Added APACHE_CONFDIR and WEBBASEDIR to PLIST_SUB
* Removed temporary file Zope.cgi.orig
* Removed .cvsignore from var/
* Added/removed some files to the PLIST
* Used @unexec rmdir to remove shared directories from PLIST
* Removed the line with "grep". I didn't understand how it was supposed to
work, I guess it should have been something like "cmp -s ...", but
Data.fs cannot be equal to Data.fs.in anyway, because Zope adds some
things to it the first time it's started (automatically imported
packages from filesystem).
* Removed temporary files from var/ at deinstall time (*.tmp, *.lock, *.soc,
*.pid)
* Sometimes the inituser file did not exist at deinstall time, so I
deleted it with @unexec. It won't be included by "make package".
* Added the Hotfix_2001-02-23 directory (@dirrm)
* Used variables from PLIST_SUB instead of www and etc/apache (@dirrm)
Approved by: maintainer
Notes:
svn path=/head/; revision=39152
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
From the Zope hotfix:
This hotfix addresses and important security issue that affects Zope
versions up to and including Zope 2.3.1 b1.
The issue is related to ZClasses in that a user with through-the-web
scripting capabilities on a Zope site can view and assign class
attributes to ZClasses, possibly allowing them to make inappropriate
changes to ZClass instances.
This patch also fixes problems in the ObjectManager, PropertyManager,
and PropertySheet classes related to mutability of method return values
which could be perceived as a security problem.
We *highly* recommend that any Zope site running versions of Zope up to
and including 2.3.1 b1 have this hotfix product installed to mitigate
these issues if the site is accessible by untrusted users who have
through-the-web scripting privileges.
Notes:
svn path=/head/; revision=39027
|
|
|
|
|
|
|
| |
the 'new' module.
Notes:
svn path=/head/; revision=37748
|
|
|
|
| |
Notes:
svn path=/head/; revision=37293
|
|
|
|
|
|
|
|
|
|
| |
security hotfixes.
All Zope users are encouraged to upgrade, or apply the hotfixes
themselves.
Notes:
svn path=/head/; revision=36150
|
|
|
|
|
|
|
|
|
|
| |
Since this doesn't affect any functionality for port or packages users,
I'll try avoid the PORTREVISION bump.
Noticed by: bento
Notes:
svn path=/head/; revision=34796
|
|
|
|
|
|
|
|
|
|
| |
after testing.
PR: 22050
Submitted by: Taoka Fumiyoshi <fmysh@ga2.so-net.ne.jp>
Notes:
svn path=/head/; revision=33950
|
|
|
|
|
|
|
|
|
| |
which allows people who may edit DTML to gain higher privilege, and
those who have higher privilege in some areas of the Zope tree to gain
it in other areas.
Notes:
svn path=/head/; revision=33844
|