slackware-current/source/n/httpd/doinst.sh
Patrick J Volkerding 6371ee337f Mon Sep 24 21:37:09 UTC 2018
d/Cython-0.28.5-x86_64-1.txz:  Upgraded.
d/help2man-1.47.7-x86_64-1.txz:  Upgraded.
d/meson-0.48.0-x86_64-1.txz:  Upgraded.
d/python-setuptools-40.4.3-x86_64-1.txz:  Upgraded.
l/M2Crypto-0.30.1-x86_64-1.txz:  Upgraded.
l/cairo-1.15.14-x86_64-1.txz:  Upgraded.
l/librsvg-2.44.4-x86_64-1.txz:  Upgraded.
l/pycairo-1.17.1-x86_64-1.txz:  Upgraded.
l/pycurl-7.43.0.2-x86_64-1.txz:  Upgraded.
l/pyparsing-2.2.1-x86_64-1.txz:  Upgraded.
n/ModemManager-1.8.2-x86_64-1.txz:  Upgraded.
n/bind-9.12.2_P2-x86_64-1.txz:  Upgraded.
  This update fixes security issues:
  There was a long-existing flaw in the documentation for ms-self, krb5-self,
  ms-subdomain, and krb5-subdomain rules in update-policy statements. Though
  the policies worked as intended, operators who configured their servers
  according to the misleading documentation may have thought zone updates were
  more restricted than they were; users of these rule types are advised to
  review the documentation and correct their configurations if necessary. New
  rule types matching the previously documented behavior will be introduced in
  a future maintenance release.
  named could crash during recursive processing of DNAME records when
  deny-answer-aliases was in use. This flaw is disclosed in CVE-2018-5740.
  For more information, see:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5740
  (* Security fix *)
n/httpd-2.4.35-x86_64-1.txz:  Upgraded.
  This release fixes bugs and regressions in httpd-2.4.34, adds an
  apache2ctl -> apachectl symlink, and no longer automatically
  overwrites rc.httpd when upgraded.
2018-09-25 09:00:30 +02:00

68 lines
1.9 KiB
Bash

#!/bin/sh
config() {
NEW="$1"
OLD="`dirname $NEW`/`basename $NEW .new`"
# If there's no config file by that name, mv it over:
if [ ! -r $OLD ]; then
mv $NEW $OLD
elif [ "`cat $OLD | md5sum`" = "`cat $NEW | md5sum`" ]; then # toss the redundant copy
rm $NEW
fi
# Otherwise, we leave the .new copy for the admin to consider...
}
preserve_perms() {
NEW="$1"
OLD="$(dirname ${NEW})/$(basename ${NEW} .new)"
if [ -e ${OLD} ]; then
cp -a ${OLD} ${NEW}.incoming
cat ${NEW} > ${NEW}.incoming
mv ${NEW}.incoming ${NEW}
fi
config ${NEW}
}
if [ ! -e var/log/httpd ]; then
mkdir -p var/log/httpd
chmod 755 var/log/httpd
fi
# Don't wipe out an existing document root with symlinks. If someone has
# replaced the symlinks that are created on a fresh installation, assume
# that they know what they are doing and leave things as-is.
if [ ! -e srv/www ]; then
( cd srv ; ln -sf /var/www www )
fi
if [ ! -e srv/httpd ]; then
( cd srv ; ln -sf /var/www httpd )
fi
# Once again, our intent is not to wipe out anyone's
# site, but building in Apache's docs tree is not as
# good an idea as picking a unique DocumentRoot.
#
# Still, we will do what we can here to mitigate
# possible site damage:
if [ -r var/www/htdocs/index.html ]; then
if [ ! -r "var/log/packages/httpd-*upgraded*" ]; then
if [ var/www/htdocs/index.html -nt var/log/packages/httpd-*-? ]; then
cp -a var/www/htdocs/index.html var/www/htdocs/index.html.bak.$$
fi
fi
fi
# Keep same perms when installing rc.httpd.new:
preserve_perms etc/rc.d/rc.httpd.new
# Handle config files. Unless this is a fresh installation, the
# admin will have to move the .new files into place to complete
# the package installation, as we don't want to clobber files that
# may contain local customizations.
config etc/httpd/httpd.conf.new
config etc/logrotate.d/httpd.new
for conf_file in etc/httpd/extra/*.new; do
config $conf_file
done
config var/www/htdocs/index.html.new