mirror of
git://slackware.nl/current.git
synced 2024-11-16 07:48:02 +01:00
6371ee337f
d/Cython-0.28.5-x86_64-1.txz: Upgraded. d/help2man-1.47.7-x86_64-1.txz: Upgraded. d/meson-0.48.0-x86_64-1.txz: Upgraded. d/python-setuptools-40.4.3-x86_64-1.txz: Upgraded. l/M2Crypto-0.30.1-x86_64-1.txz: Upgraded. l/cairo-1.15.14-x86_64-1.txz: Upgraded. l/librsvg-2.44.4-x86_64-1.txz: Upgraded. l/pycairo-1.17.1-x86_64-1.txz: Upgraded. l/pycurl-7.43.0.2-x86_64-1.txz: Upgraded. l/pyparsing-2.2.1-x86_64-1.txz: Upgraded. n/ModemManager-1.8.2-x86_64-1.txz: Upgraded. n/bind-9.12.2_P2-x86_64-1.txz: Upgraded. This update fixes security issues: There was a long-existing flaw in the documentation for ms-self, krb5-self, ms-subdomain, and krb5-subdomain rules in update-policy statements. Though the policies worked as intended, operators who configured their servers according to the misleading documentation may have thought zone updates were more restricted than they were; users of these rule types are advised to review the documentation and correct their configurations if necessary. New rule types matching the previously documented behavior will be introduced in a future maintenance release. named could crash during recursive processing of DNAME records when deny-answer-aliases was in use. This flaw is disclosed in CVE-2018-5740. For more information, see: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5740 (* Security fix *) n/httpd-2.4.35-x86_64-1.txz: Upgraded. This release fixes bugs and regressions in httpd-2.4.34, adds an apache2ctl -> apachectl symlink, and no longer automatically overwrites rc.httpd when upgraded.
68 lines
1.9 KiB
Bash
68 lines
1.9 KiB
Bash
#!/bin/sh
|
|
|
|
config() {
|
|
NEW="$1"
|
|
OLD="`dirname $NEW`/`basename $NEW .new`"
|
|
# If there's no config file by that name, mv it over:
|
|
if [ ! -r $OLD ]; then
|
|
mv $NEW $OLD
|
|
elif [ "`cat $OLD | md5sum`" = "`cat $NEW | md5sum`" ]; then # toss the redundant copy
|
|
rm $NEW
|
|
fi
|
|
# Otherwise, we leave the .new copy for the admin to consider...
|
|
}
|
|
|
|
preserve_perms() {
|
|
NEW="$1"
|
|
OLD="$(dirname ${NEW})/$(basename ${NEW} .new)"
|
|
if [ -e ${OLD} ]; then
|
|
cp -a ${OLD} ${NEW}.incoming
|
|
cat ${NEW} > ${NEW}.incoming
|
|
mv ${NEW}.incoming ${NEW}
|
|
fi
|
|
config ${NEW}
|
|
}
|
|
|
|
if [ ! -e var/log/httpd ]; then
|
|
mkdir -p var/log/httpd
|
|
chmod 755 var/log/httpd
|
|
fi
|
|
|
|
# Don't wipe out an existing document root with symlinks. If someone has
|
|
# replaced the symlinks that are created on a fresh installation, assume
|
|
# that they know what they are doing and leave things as-is.
|
|
if [ ! -e srv/www ]; then
|
|
( cd srv ; ln -sf /var/www www )
|
|
fi
|
|
if [ ! -e srv/httpd ]; then
|
|
( cd srv ; ln -sf /var/www httpd )
|
|
fi
|
|
|
|
# Once again, our intent is not to wipe out anyone's
|
|
# site, but building in Apache's docs tree is not as
|
|
# good an idea as picking a unique DocumentRoot.
|
|
#
|
|
# Still, we will do what we can here to mitigate
|
|
# possible site damage:
|
|
if [ -r var/www/htdocs/index.html ]; then
|
|
if [ ! -r "var/log/packages/httpd-*upgraded*" ]; then
|
|
if [ var/www/htdocs/index.html -nt var/log/packages/httpd-*-? ]; then
|
|
cp -a var/www/htdocs/index.html var/www/htdocs/index.html.bak.$$
|
|
fi
|
|
fi
|
|
fi
|
|
|
|
# Keep same perms when installing rc.httpd.new:
|
|
preserve_perms etc/rc.d/rc.httpd.new
|
|
|
|
# Handle config files. Unless this is a fresh installation, the
|
|
# admin will have to move the .new files into place to complete
|
|
# the package installation, as we don't want to clobber files that
|
|
# may contain local customizations.
|
|
config etc/httpd/httpd.conf.new
|
|
config etc/logrotate.d/httpd.new
|
|
for conf_file in etc/httpd/extra/*.new; do
|
|
config $conf_file
|
|
done
|
|
config var/www/htdocs/index.html.new
|
|
|