60d27b1449
A password disclosure vulnerability (CVE-2006-5867, fetchmail's using unsafe logins or omitting TLS) and a denial of service vulnerability (CVE-2006-5974, fetchmail crashes, dereferencing the null page, when rejecting a message sent to an MDA). Fetchmail 6.3.6 also fixes several regressions and long-standing bugs. Details: https://lists.berlios.de/pipermail/fetchmail-announce/2007-January/000042.html tests & ok jasper@, simon@
47 lines
1.3 KiB
Makefile
47 lines
1.3 KiB
Makefile
# $OpenBSD: Makefile,v 1.109 2007/01/09 10:35:42 bernd Exp $
|
|
|
|
COMMENT= "mail retrieval utility for POP2, POP3, KPOP, IMAP and more"
|
|
|
|
DISTNAME= fetchmail-6.3.6
|
|
CATEGORIES= mail
|
|
MASTER_SITES= ${MASTER_SITE_BERLIOS:=fetchmail/}
|
|
|
|
HOMEPAGE= http://fetchmail.berlios.de/
|
|
|
|
MAINTAINER= Bernd Ahlers <bernd@openbsd.org>
|
|
|
|
# GPL
|
|
PERMIT_PACKAGE_CDROM= Yes
|
|
PERMIT_PACKAGE_FTP= Yes
|
|
PERMIT_DISTFILES_CDROM= Yes
|
|
PERMIT_DISTFILES_FTP= Yes
|
|
WANTLIB= c crypto krb5 ssl
|
|
|
|
MODULES= devel/gettext
|
|
|
|
SEPARATE_BUILD= concurrent
|
|
CONFIGURE_STYLE= gnu
|
|
CONFIGURE_ARGS= --enable-inet6 --with-ssl \
|
|
--with-kerberos5 --enable-NTLM
|
|
|
|
EXTRACT_SUFX= .tar.bz2
|
|
|
|
DOCS= FAQ NOTES FEATURES README COPYING fetchmail-FAQ.html \
|
|
fetchmail-features.html design-notes.html todo.html
|
|
|
|
pre-patch:
|
|
@sed -e "s|@PREFIX@|${LOCALBASE}|" \
|
|
${FILESDIR}/fetchmailconf > ${WRKDIR}/fetchmailconf
|
|
@tbl ${WRKSRC}/fetchmail.man > ${WRKSRC}/fetchmail.tbl && \
|
|
cp -f ${WRKSRC}/fetchmail.tbl ${WRKSRC}/fetchmail.man
|
|
|
|
post-install:
|
|
${INSTALL_DATA_DIR} ${PREFIX}/share/doc/fetchmail
|
|
@cd ${PREFIX}/man/man1 && ln -sf fetchmail.1 fetchmailconf.1
|
|
cd ${WRKSRC} && ${INSTALL_DATA} ${DOCS} ${PREFIX}/share/doc/fetchmail
|
|
${INSTALL_SCRIPT} ${WRKSRC}/fetchmailconf.py \
|
|
${PREFIX}/libexec/fetchmailconf.bin
|
|
${INSTALL_SCRIPT} ${WRKDIR}/fetchmailconf ${PREFIX}/bin
|
|
|
|
.include <bsd.port.mk>
|