ca6257ce12
Update to 1.2.9.1 which addresses a security vulnerability in the IAX2 channel driver (chan_iax2). The vulnerability affects all users with IAX2 clients that might be compromised or used by a malicious user, and can lead to denial of service attacks and random Asterisk server crashes via a relatively trivial exploit. From: maintainer Stuart Henderson <stu@spacehopper.org>
40 lines
1.3 KiB
Makefile
40 lines
1.3 KiB
Makefile
# $OpenBSD: Makefile,v 1.9 2006/06/12 19:04:10 naddy Exp $
|
|
|
|
COMMENT= "open source PBX"
|
|
DISTNAME= asterisk-1.2.9.1
|
|
CATEGORIES= telephony
|
|
MASTER_SITES= ftp://ftp.digium.com/pub/asterisk/
|
|
|
|
HOMEPAGE= http://www.asterisk.org/
|
|
|
|
MAINTAINER= Stuart Henderson <stu@spacehopper.org>
|
|
|
|
# GPL
|
|
PERMIT_DISTFILES_CDROM= Yes
|
|
PERMIT_DISTFILES_FTP= Yes
|
|
PERMIT_PACKAGE_CDROM= Yes
|
|
PERMIT_PACKAGE_FTP= Yes
|
|
WANTLIB= c crypto m ncurses pthread ssl z
|
|
|
|
MAKE_FLAGS= CC="${CC} ${CFLAGS}"
|
|
|
|
NO_REGRESS= Yes
|
|
USE_GMAKE= Yes
|
|
|
|
MAKE_ENV+= SYSCONFDIR='${SYSCONFDIR}' MAKEFLAGS+=-DWITHOUT_ZAPTEL
|
|
|
|
post-install:
|
|
${INSTALL_DATA_DIR} ${PREFIX}/share/doc/asterisk
|
|
${INSTALL_DATA_DIR} ${PREFIX}/share/examples/asterisk/agi
|
|
${INSTALL_DATA_DIR} ${PREFIX}/share/examples/asterisk/default
|
|
${INSTALL_DATA_DIR} ${PREFIX}/share/examples/asterisk/openbsd
|
|
${INSTALL_DATA} ${WRKSRC}/{BUGS,SECURITY} ${PREFIX}/share/doc/asterisk
|
|
${INSTALL_DATA} ${WRKSRC}/doc/README.* ${PREFIX}/share/doc/asterisk
|
|
${INSTALL_DATA} ${WRKSRC}/doc/*.txt ${PREFIX}/share/doc/asterisk
|
|
${INSTALL_DATA} ${WRKSRC}/agi/agi-test.agi \
|
|
${PREFIX}/share/examples/asterisk/agi
|
|
${INSTALL_DATA} ${WRKSRC}/configs/* ${PREFIX}/share/examples/asterisk/default
|
|
${INSTALL_DATA} ${FILESDIR}/*.sample ${PREFIX}/share/examples/asterisk/openbsd
|
|
|
|
.include <bsd.port.mk>
|