openbsd-ports/sysutils/monit/pkg/INSTALL
brad b844c54ecb upgrade to monit 4.2.1
There exists security vulnerabilites in the monit HTTP interface,
which could allow an attacker in the worst case to gain root access
to the system. This issue only affect monit if monit is started
with http server support.

From: Robert Nagy <thuglife at bsd dot hu>

No response from MAINTAINER.
2004-04-13 08:57:59 +00:00

65 lines
1.4 KiB
Plaintext

#!/bin/sh
# $OpenBSD: INSTALL,v 1.3 2004/04/13 08:57:59 brad Exp $
#
# Pre/post-installation setup of monit
# exit on errors, use a sane path and install prefix
#
set -e
PATH=/bin:/usr/bin:/sbin:/usr/sbin
PREFIX=${PKG_PREFIX:-/usr/local}
CONFIG_FILE=${SYSCONFDIR}/monitrc
SAMPLE_CONFIG_FILE=$PREFIX/share/examples/monit/monitrc
do_notice()
{
echo
echo "+------------"
echo "| The existing $1 configuration file in $CONFIG_FILE,"
echo "| has NOT been changed."
echo "| You may want to compare it to the current sample"
echo "| file in $SAMPLE_CONFIG_FILE,"
echo "| and update your configuration as needed."
echo "+------------"
}
do_install()
{
install -o root -g wheel -m 0600 $SAMPLE_CONFIG_FILE $CONFIG_FILE
echo
echo "+------------"
echo "| The $1 configuration file has been installed"
echo "| into $CONFIG_FILE. Please view this file and"
echo "| change the configuration to meet your needs."
echo "| You can also place it in ~/.monitrc."
echo "+------------"
}
# verify proper execution
#
if [ $# -ne 2 ]; then
echo "usage: $0 distname { PRE-INSTALL | POST-INSTALL }" >&2
exit 1
fi
# Verify/process the command
#
case $2 in
PRE-INSTALL)
: nothing to pre-install for this port
;;
POST-INSTALL)
if [ ! -f $CONFIG_FILE ]; then
do_install $1
else
do_notice $1
fi
;;
*)
echo "usage: $0 distname { PRE-INSTALL | POST-INSTALL }" >&2
exit 1
;;
esac
exit 0