mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-26 05:02:18 +00:00
Add an confirmation screen describing the known security holes in
imap.
This commit is contained in:
parent
ed14606656
commit
44de293c27
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=27868
@ -41,6 +41,11 @@ PLIST_SUB= SHLIBNAME=${SHLIBNAME} SHLIBBASE=${SHLIBBASE}
|
||||
SHLIBNAME= lib${SHLIBBASE}.so.${SHLIBMAJ}.0
|
||||
.endif
|
||||
|
||||
pre-extract:
|
||||
.if !defined(BATCH) && !defined(PACKAGE_BUILDING)
|
||||
@${SH} ${PKGDIR}/INSTALL foo PRE-INSTALL || ${FALSE}
|
||||
.endif
|
||||
|
||||
post-configure:
|
||||
@${ECHO_MSG} ">> The c-client shared library will be named ${SHLIBNAME}"
|
||||
.if ${PAMAUTH} != "no"
|
||||
|
20
mail/imap-uw/pkg-install
Normal file
20
mail/imap-uw/pkg-install
Normal file
@ -0,0 +1,20 @@
|
||||
#!/bin/sh
|
||||
TTY=/dev/tty
|
||||
|
||||
case $2 in
|
||||
POST-INSTALL)
|
||||
;;
|
||||
PRE-INSTALL)
|
||||
if dialog --yesno "This port is not safe to use on a system which does not\nprovide shell access to users who can retrieve mail via IMAP.\nimapd contains buffer overflows which a user can exploit\nafter they have logged into imap to get access to their\naccount on the machine. If your imap users have shell access\nanyway, this is not a significant vulnerability.\n\nDo you wish to proceed with the build?" 13 65 < ${TTY} >${TTY} 2>&1; then
|
||||
exit 0
|
||||
else
|
||||
exit 1
|
||||
fi
|
||||
;;
|
||||
*)
|
||||
echo "Unexpected argument $2!"
|
||||
exit 1
|
||||
;;
|
||||
esac
|
||||
exit 0
|
||||
|
Loading…
Reference in New Issue
Block a user