Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 9 Sep 1999 21:44:16 -0500 (CDT)
From:      hetzels@westbend.net
To:        FreeBSD-gnats-submit@freebsd.org
Subject:   ports/13673: Upgrade to 1.3.9 for Apache13-FP
Message-ID:  <199909100244.VAA59928@spare.westbend.net>

next in thread | raw e-mail | index | archive | help

>Number:         13673
>Category:       ports
>Synopsis:       Upgrade to 1.3.9 for Apache13-FP
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    freebsd-ports
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Thu Sep  9 19:50:01 PDT 1999
>Closed-Date:
>Last-Modified:
>Originator:     Scot W. Hetzel
>Release:        FreeBSD 3.2-RELEASE i386
>Organization:
West Bend Internet
>Environment:

>Description:

The attached patch upgrades the Apache13-FP port to use Apache 1.3.9.

This upgrade also includes the patch to suexec to enforce user limits as set
in /etc/login.conf (see ports/13606).

Two new patches need to added to the port:

	patch-as
	patch-au

patch-au corrects a problem when either ResourceConfig/AccessConfig is set to
the apache configuration file (${PREFIX}/etc/apache/httpd.conf).

Without this patch, if you set the apache server to listen to alterate ports the
server would fail to start and the error log would contain:

[crit] (48)Address already in use: make_sock: could not bind to port 8000

ResourceConfig/AccessConfig can't be set to /dev/null.  The fpsrvadm.exe
will not be able to obtain the DocumnetRoot from the ResourceConfig file (/dev/null).

Unfortunatley, the FrontPage Extentions haven't been upgraded to FP2000.

>How-To-Repeat:


>Fix:
	
Apply that attached patch, don't forget to import patches patch-as & patch-au


Index: apache13-fp/Makefile
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/Makefile,v
retrieving revision 1.14
diff -u -r1.14 Makefile
--- Makefile	1999/08/31 02:42:39	1.14
+++ Makefile	1999/09/10 02:01:49
@@ -39,7 +39,7 @@
 PATCH_DIST_ARGS=       -d ${WRKSRC}/src --forward --quiet -E ${PATCH_DIST_STRIP}
 .endif
 
-AP_VERS=	1.3.6
+AP_VERS=	1.3.9
 APACHE=		${DISTNAME}${EXTRACT_SUFX}
 FRONTPAGE=	fp30.bsdi3.tar.Z
 
@@ -56,43 +56,52 @@
 INSTALL_FILE=${INSTALL} -c -m 555 -o bin -g bin
 
 Y2K=		http://www.apache.org/docs/misc/FAQ.html#year2000
+Y2K+=           http://computingcentral.msn.com/guide/year2000/msy2k/productinfo/frontpage.asp
 
+PLIST=  ${WRKDIR}/PLIST
+
 #
 # Set APACHE_PERF_TUNING env. variable to YES to get maximum performance
 #
 
 HAS_CONFIGURE=  yes
-CONFIGURE_ARGS= \
-		 --prefix=${PREFIX} \
+CONFIGURE_ARGS=	 --prefix=${PREFIX} \
 		 --with-layout=GNU \
+		 --with-perl=${PERL} \
+		 --bindir=${PREFIX}/bin \
+		 --sbindir=${PREFIX}/sbin \
+		 --libexecdir=${PREFIX}/libexec/apache \
+		 --mandir=${PREFIX}/man \
 		 --sysconfdir=${PREFIX}/etc/apache \
+		 --datadir=${PREFIX}/www \
 		 --includedir=${PREFIX}/include/apache \
 		 --localstatedir=/var \
-		 --datadir=${PREFIX}/www \
-		 --proxycachedir=${PREFIX}/www/proxy \
-		 --libexecdir=${PREFIX}/libexec/apache \
+		 --runtimedir=/var/run \
+		 --logfiledir=/var/log \
+		 --proxycachedir=/var/spool/proxy \
 		 --without-confadjust \
-		 --enable-shared=remain \
 		 --enable-module=most \
 		 --enable-module=auth_db \
 		 --disable-module=auth_dbm \
 		 --add-module=${MOD_FP} \
-		 --enable-shared=frontpage
+		 --enable-shared=frontpage \
+		 --enable-shared=max
 
 # Currently perl version doesn't matter
 USE_PERL5=	 YES
-CONFIGURE_ARGS+= --with-perl=${PERL5}
 
-OPTIM=-DHARD_SERVER_LIMIT=512 \
--DDOCUMENT_LOCATION=\\"${PREFIX}/www/data/\\" \
--DDEFAULT_PATH=\\"/bin:/usr/bin:${PREFIX}/bin\\"
-
-.if defined(APACHE_PERF_TUNING) && ${APACHE_PERF_TUNING} == YES
-OPTIM+= -DBUFFERED_LOGS
-CFLAGS+= -O6 -fomit-frame-pointer
+OPTIM=		 -DHARD_SERVER_LIMIT=512 \
+		 -DDOCUMENT_LOCATION=\\"${PREFIX}/www/data/\\" \
+		 -DDEFAULT_PATH=\\"/bin:/usr/bin:${PREFIX}/bin\\"
+
+.if defined(APACHE_PERF_TUNING)
+OPTIM+= 	 -DBUFFERED_LOGS -DFD_SETSIZE=1024
+CFLAGS+=	 -O6 -funroll-loops -fstrength-reduce -fomit-frame-pointer \
+		 -fexpensive-optimizations -ffast-math
 .endif
 
-CONFIGURE_ENV= OPTIM='${OPTIM}'
+CONFIGURE_ENV=	 CFLAGS='${CFLAGS}' \
+		 OPTIM='${OPTIM}'
 
 MAN1=   dbmmanage.1 htdigest.1 htpasswd.1
 MAN8=   ab.8 apachectl.8 apxs.8 httpd.8 logresolve.8 rotatelogs.8
@@ -121,14 +130,36 @@
 post-extract:
 	@${ECHO} "===>  Extracting FrontPage install scripts"
 	@cd ${WRKSRC} && \
-	${EXTRACT_CMD} ${EXTRACT_BEFORE_ARGS} ${DISTDIR}/${FRONTPAGE} ${EXTRACT_AFTER_ARGS} ${FPINSTALL} ${CHANGESERVER}
+	${EXTRACT_CMD} ${EXTRACT_BEFORE_ARGS} ${DISTDIR}/${FRONTPAGE} \
+		${EXTRACT_AFTER_ARGS} ${FPINSTALL} ${CHANGESERVER}
+
+.if !defined(PATCH_DEBUG)
+post-patch:
+	@ cd ${WRKSRC} \
+		&& find . -type f -name "*.orig" -print | xargs ${RM} -f
+.endif
 
+post-configure:
+.if defined(SUEXEC)
+	${CP} ${PKGDIR}/PLIST ${PLIST}
+.else
+	${CAT} ${PKGDIR}/PLIST | grep -v sbin/suexec >${PLIST}
+.endif
+
 post-install:
-	@${ECHO} "Installing ${PREFIX}/etc/rc.d/apache.sh file."
-	@${CAT} ${FILESDIR}/apache.sh.tmpl | \
-		${SED} -e 's;PREFIX;${PREFIX};' -e 's;PERL5;${PERL};' \
-		> ${PREFIX}/etc/rc.d/apache.sh
-	@${CHMOD} 751 ${PREFIX}/etc/rc.d/apache.sh
+	@if [ ! -f ${PREFIX}/${FPINSTALL} ]; then \
+		${MAKE} fp-install ; \
+	fi
+	@if [ ! -f ${PREFIX}/etc/rc.d/apache.sh ]; then \
+		${ECHO} "Installing ${PREFIX}/etc/rc.d/apache.sh file."; \
+		${CAT} ${FILESDIR}/apache.sh.tmpl | \
+			${SED}	-e 's;PREFIX;${PREFIX};' \
+				-e 's;PERL5;${PERL};' \
+				> ${PREFIX}/etc/rc.d/apache.sh; \
+		${CHMOD} 751 ${PREFIX}/etc/rc.d/apache.sh; \
+	fi
+
+fp-install:
 	@${CAT} ${WRKSRC}/${FPINSTALL} | \
 		${SED} -e 's;PREFIX;${PREFIX};' > ${WRKDIR}/tmp.fpinstall
 	@${SH} ${WRKDIR}/tmp.fpinstall
Index: apache13-fp/files/md5
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/files/md5,v
retrieving revision 1.5
diff -u -r1.5 md5
--- md5	1999/05/03 01:50:57	1.5
+++ md5	1999/09/10 02:01:49
@@ -1,2 +1,2 @@
-MD5 (apache_1.3.6.tar.gz) = b4114ed78f296bfe424c4ba05dccc643
+MD5 (apache_1.3.9.tar.gz) = 880af89251943c67e3614bf2ffb89b32
 MD5 (fp30.bsdi3.tar.Z) = 344b956cca8f367099d7c33e8c7ba174
Index: apache13-fp/files/mod_frontpage.c
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/files/mod_frontpage.c,v
retrieving revision 1.1
diff -u -r1.1 mod_frontpage.c
--- mod_frontpage.c	1998/11/10 01:55:59	1.1
+++ mod_frontpage.c	1999/09/10 02:01:49
@@ -21,8 +21,8 @@
  * allow the exclusion or limitation of liability for consequential or
  * incidental damages, the above limitation may not apply to you.
  *
- * $Revision: 1.3 $
- * $Date: 1997/10/15 17:23:46 $
+ * $Revision: 1.1 $
+ * $Date: 1998/11/10 01:55:59 $
  *
  */
 
Index: apache13-fp/patches/patch-aa
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/patches/patch-aa,v
retrieving revision 1.4
diff -u -r1.4 patch-aa
--- patch-aa	1999/01/26 02:27:30	1.4
+++ patch-aa	1999/09/10 02:01:49
@@ -1,14 +1,15 @@
---- configure.orig	Sat Jan  2 07:19:41 1999
-+++ configure	Mon Jan 18 17:18:16 1999
-@@ -953,6 +953,7 @@
+--- configure.orig	Sat Aug 14 03:29:05 1999
++++ configure	Mon Sep  6 12:36:24 1999
+@@ -1084,7 +1084,7 @@
+ ##  UID/GID as production oriented as a web server in NIS anyway.
  ##
- ##  determine special configuration parameters
- ##
-+conf_user="nobody"
- conf_group="#-1"
+ conf_user="nobody"
+-conf_group="#-1"
++conf_group="nogroup"
  conf_port="80"
  conf_serveradmin="you@your.address"
-@@ -971,6 +972,9 @@
+ conf_servername="new.host.name"
+@@ -1109,6 +1109,9 @@
      conf_serveradmin="`$aux/buildinfo.sh -n %u@%h%d`"
      conf_servername="`$aux/buildinfo.sh -n %h%d`"
  fi
@@ -18,7 +19,7 @@
   
  ##
  ##  determine prefix-relative paths for directories
-@@ -1012,8 +1016,8 @@
+@@ -1153,8 +1156,8 @@
      echo "       DEFAULT_PIDLOG: ${runtimedir_relative}${thetarget}.pid"
      echo "   DEFAULT_SCOREBOARD: ${runtimedir_relative}${thetarget}.scoreboard"
      echo "     DEFAULT_LOCKFILE: ${runtimedir_relative}${thetarget}.lock"
@@ -29,15 +30,7 @@
      echo "    TYPES_CONFIG_FILE: ${sysconfdir_relative}mime.types"
      echo "   SERVER_CONFIG_FILE: ${sysconfdir_relative}${thetarget}.conf"
      echo "   ACCESS_CONFIG_FILE: ${sysconfdir_relative}access.conf"
-@@ -1068,6 +1072,7 @@
- -e "s%@suexec_uidmin@%$suexec_uidmin%g" \
- -e "s%@suexec_gidmin@%$suexec_gidmin%g" \
- -e "s%@suexec_safepath@%$suexec_safepath%g" \
-+-e "s%@conf_user@%$conf_user%g" \
- -e "s%@conf_group@%$conf_group%g" \
- -e "s%@conf_port@%$conf_port%g" \
- -e "s%@conf_serveradmin@%$conf_serveradmin%g" \
-@@ -1091,8 +1096,8 @@
+@@ -1244,8 +1247,8 @@
  echo "echo '-DDEFAULT_PIDLOG=\"${runtimedir_relative}${thetarget}.pid\"'" >>$src/apaci
  echo "echo '-DDEFAULT_SCOREBOARD=\"${runtimedir_relative}${thetarget}.scoreboard\"'" >>$src/apaci
  echo "echo '-DDEFAULT_LOCKFILE=\"${runtimedir_relative}${thetarget}.lock\"'" >>$src/apaci
Index: apache13-fp/patches/patch-ab
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/patches/patch-ab,v
retrieving revision 1.7
diff -u -r1.7 patch-ab
--- patch-ab	1999/06/09 08:04:36	1.7
+++ patch-ab	1999/09/10 02:01:49
@@ -1,30 +1,14 @@
---- Makefile.tmpl.orig	Mon Mar 15 18:38:46 1999
-+++ Makefile.tmpl	Sat Apr  3 15:25:47 1999
-@@ -113,13 +113,14 @@
- sysconfdir      = @sysconfdir@
- datadir         = @datadir@
- iconsdir        = $(datadir)/icons
--htdocsdir       = $(datadir)/htdocs
-+htdocsdir       = $(datadir)/data
- cgidir          = $(datadir)/cgi-bin
- includedir      = @includedir@
- localstatedir   = @localstatedir@
+--- Makefile.tmpl.orig	Fri Aug 13 01:58:18 1999
++++ Makefile.tmpl	Mon Sep  6 12:58:17 1999
+@@ -120,6 +120,7 @@
  runtimedir      = @runtimedir@
  logfiledir      = @logfiledir@
  proxycachedir   = @proxycachedir@
-+doc_prefix      = $(prefix)/share/doc/apache
++doc_prefix	= $(prefix)/share/doc/apache
  
  libexecdir_relative   = @libexecdir_relative@
  
-@@ -134,6 +135,7 @@
- suexec_safepath = @suexec_safepath@
- 
- #   some substituted configuration parameters
-+conf_user        = @conf_user@
- conf_group       = @conf_group@
- conf_port        = @conf_port@
- conf_serveradmin = @conf_serveradmin@
-@@ -249,9 +251,9 @@
+@@ -255,9 +256,9 @@
  	$(MKDIR) $(root)$(mandir)/man1
  	$(MKDIR) $(root)$(mandir)/man8
  	$(MKDIR) $(root)$(sysconfdir)
@@ -34,32 +18,49 @@
 -	$(MKDIR) $(root)$(cgidir)
 +	$(MKDIR) $(root)$(cgidir).default
  	$(MKDIR) $(root)$(includedir)
+ 	$(MKDIR) $(root)$(includedir)/xml
  	$(MKDIR) $(root)$(runtimedir)
- 	$(MKDIR) $(root)$(logfiledir)
-@@ -294,9 +296,11 @@
- 			file=`echo $${mod} | sed -e 's;^.*/\([^/]*\);\1;'`; \
+@@ -313,19 +314,34 @@
  			echo "$(INSTALL_DSO) $(TOP)/$(SRC)/$${mod} $(root)$(libexecdir)/$${file}"; \
  			$(INSTALL_DSO) $(TOP)/$(SRC)/$${mod} $(root)$(libexecdir)/$${file}; \
--			name=`$(TOP)/$(AUX)/fmn.sh $(TOP)/$(SRC)/$${mod}`; \
--			echo dummy | awk '{ printf("LoadModule %-18s %s\n", modname, modpath); }' \
--			modname="$${name}" modpath="$(libexecdir_relative)$${file}" >>$(SRC)/.apaci.install.conf; \
-+			if [ "$${file}" != "mod_frontpage.so" ]; then \
-+				name=`$(TOP)/$(AUX)/fmn.sh $(TOP)/$(SRC)/$${mod}`; \
-+				echo dummy | awk '{ printf("LoadModule %-18s %s\n", modname, modpath); }' \
-+				modname="$${name}" modpath="$(libexecdir_relative)$${file}" >>$(SRC)/.apaci.install.conf; \
+ 			name=`$(TOP)/$(AUX)/fmn.sh $(TOP)/$(SRC)/$${mod}`; \
++			if [ ".$$name" = .frontpage_module ]; then \
++				echo "<IfDefine FRONTPAGE>" >>$(SRC)/.apaci.install.conf; \
++			fi; \
+ 			echo dummy | awk '{ printf("LoadModule %-18s %s\n", modname, modpath); }' \
+ 			modname="$${name}" modpath="$(libexecdir_relative)$${file}" >>$(SRC)/.apaci.install.conf; \
++			if [ ".$$name" = .frontpage_module ]; then \
++				echo "</IfDefine>" >>$(SRC)/.apaci.install.conf; \
 +			fi; \
  		done; \
  		echo "" >>$(SRC)/.apaci.install.conf; \
  		echo "#  Reconstruction of the complete module list from all available modules" >>$(SRC)/.apaci.install.conf; \
-@@ -304,6 +308,7 @@
+ 		echo "#  (static and shared ones) to achieve correct module execution order." >>$(SRC)/.apaci.install.conf; \
  		echo "#  [WHENEVER YOU CHANGE THE LOADMODULE SECTION ABOVE UPDATE THIS, TOO]" >>$(SRC)/.apaci.install.conf; \
  		echo "ClearModuleList" >>$(SRC)/.apaci.install.conf; \
- 		egrep "^[ 	]*(Add|Shared)Module" $(SRC)/Configuration.apaci |\
-+		egrep -v "mod_frontpage.so" |\
- 		sed	-e 's:SharedModule:AddModule:' \
- 			-e 's:modules/[^/]*/::' \
- 			-e 's:[ 	]lib: mod_:' \
-@@ -324,6 +329,7 @@
+-		egrep "^[ 	]*(Add|Shared)Module" $(SRC)/Configuration.apaci |\
+-		sed	-e 's:SharedModule:AddModule:' \
+-			-e 's:modules/[^/]*/::' \
+-			-e 's:[ 	]lib: mod_:' \
+-			-e 's:\.[soam].*$$:.c:' >>$(SRC)/.apaci.install.conf; \
++		for mod in `egrep "^[ 	]*(Add|Shared)Module" $(SRC)/Configuration.apaci |\
++			    sed	-e 's:[		]*SharedModule::' \
++				-e 's:[		]*AddModule::' \
++				-e 's:modules/[^/]*/::' \
++				-e 's:[ 	]lib: mod_:' \
++				-e 's:\.[soam].*$$:.c:'`; do \
++			if [ ".$$mod" = .mod_frontpage.c ]; then \
++				echo "<IfDefine FRONTPAGE>" >>$(SRC)/.apaci.install.conf; \
++			fi; \
++			echo "AddModule $$mod" >>$(SRC)/.apaci.install.conf; \
++			if [ ".$$mod" = .mod_frontpage.c ]; then \
++				echo "</IfDefine>" >>$(SRC)/.apaci.install.conf; \
++			fi; \
++		done; \
+ 	fi
+ 	@echo "<=== [programs]"
+ 
+@@ -394,6 +410,7 @@
  	echo "$(INSTALL_SCRIPT) $(TOP)/$(SRC)/support/apachectl[*] $(root)$(sbindir)/$${apachectl}"; \
  	sed -e 's;PIDFILE=.*;PIDFILE=$(runtimedir)/$(TARGET).pid;' \
  		-e 's;HTTPD=.*;HTTPD=$(sbindir)/$(TARGET);' \
@@ -67,7 +68,7 @@
  		< $(TOP)/$(SRC)/support/apachectl > $(TOP)/$(SRC)/.apaci.install.tmp && \
  		$(INSTALL_SCRIPT) $(TOP)/$(SRC)/.apaci.install.tmp $(root)$(sbindir)/$${apachectl}; \
  	echo "$(INSTALL_DATA) $(TOP)/$(SRC)/support/apachectl.8 $(root)$(mandir)/man8/$${apachectl}.8"; \
-@@ -379,25 +385,32 @@
+@@ -441,25 +458,33 @@
  #   icons and distributed CGI scripts.
  install-data:
  	@echo "===> [data: Installing initial data files]"
@@ -93,6 +94,7 @@
 -	-@if [ -f $(root)$(cgidir)/printenv ]; then \
 -		echo "[PRESERVING EXISTING DATA SUBDIR: $(root)$(cgidir)/]"; \
 -	else \
++	$(RM) $(root)$(htdocsdir).default
 +	$(LN) -s $(root)$(doc_prefix) $(root)$(htdocsdir).default
 +#	-@if [ -f $(root)$(cgidir)/printenv ]; then \
 +#		echo "[PRESERVING EXISTING DATA SUBDIR: $(root)$(cgidir)/]"; \
@@ -112,17 +114,17 @@
  	fi
  	@echo "Copying tree $(TOP)/icons/ -> $(root)$(iconsdir)/"; \
  	(cd $(TOP)/icons/ && $(TAR) $(TAROPT) - *) |\
-@@ -431,17 +444,20 @@
+@@ -493,15 +517,17 @@
  			-e 's;@@ServerRoot@@/icons;$(iconsdir);' \
  			-e 's;@@ServerRoot@@/cgi-bin;$(cgidir);' \
  			-e 's;@@ServerRoot@@/proxy;$(proxycachedir);' \
 +			-e 's;@@ServerRoot@@/srm.conf;$(sysconfdir)/$(TARGET).conf;' \
 +			-e 's;@@ServerRoot@@/access.conf;$(sysconfdir)/$(TARGET).conf;' \
  			-e 's;@@ServerRoot@@;$(prefix);g' \
- 			-e 's;httpd.conf;$(TARGET).conf;' \
- 			-e 's;logs/accept.lock;$(runtimedir)/$(TARGET).lock;' \
+ 			-e 's;httpd\.conf;$(TARGET).conf;' \
+ 			-e 's;logs/accept\.lock;$(runtimedir)/$(TARGET).lock;' \
  			-e 's;logs/apache_runtime_status;$(runtimedir)/$(TARGET).scoreboard;' \
- 			-e 's;logs/httpd.pid;$(runtimedir)/$(TARGET).pid;' \
+ 			-e 's;logs/httpd\.pid;$(runtimedir)/$(TARGET).pid;' \
 -			-e "s;logs/access_log;$(logfiledir)/$${target_prefix}access_log;" \
 -			-e "s;logs/error_log;$(logfiledir)/$${target_prefix}error_log;" \
 -			-e "s;logs/referer_log;$(logfiledir)/$${target_prefix}referer_log;" \
@@ -132,8 +134,5 @@
 +			-e "s;logs/referer_log;$(logfiledir)/httpd-referer.log;" \
 +			-e "s;logs/agent_log;$(logfiledir)/httpd-agent.log;" \
  			-e 's;conf/magic;$(sysconfdir)/magic;' \
- 			-e 's;conf/mime.types;$(sysconfdir)/mime.types;' \
-+			-e 's;User nobody;User $(conf_user);' \
- 			-e 's;Group #-1;Group $(conf_group);' \
- 			-e 's;Port 80;Port $(conf_port);' \
- 			-e 's;ServerAdmin you@your.address;ServerAdmin $(conf_serveradmin);' \
+ 			-e 's;conf/mime\.types;$(sysconfdir)/mime.types;' \
+ 			-e 's;User nobody;User $(conf_user);' \
Index: apache13-fp/patches/patch-ag
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/patches/patch-ag,v
retrieving revision 1.2
diff -u -r1.2 patch-ag
--- patch-ag	1999/01/26 02:27:30	1.2
+++ patch-ag	1999/09/10 02:01:49
@@ -1,5 +1,5 @@
---- conf/httpd.conf-dist.orig	Sat Dec 12 11:04:29 1998
-+++ conf/httpd.conf-dist	Mon Jan 18 17:18:16 1999
+--- conf/httpd.conf-dist.orig	Wed May  5 15:17:59 1999
++++ conf/httpd.conf-dist	Mon Sep  6 13:01:08 1999
 @@ -97,6 +97,13 @@
  #ResourceConfig conf/srm.conf
  #AccessConfig conf/access.conf
@@ -14,30 +14,7 @@
  #
  # Timeout: The number of seconds before receives and sends time out.
  #
-@@ -196,6 +203,22 @@
- # Example:
- # LoadModule foo_module libexec/mod_foo.so
- 
-+<IfDefine SSL>
-+### Uncomment the following if you wish to use SSL and you need RSAREF: ###
-+#LoadFile !librsaref.so.2
-+LoadFile !libcrypto.so.0
-+LoadFile !libssl.so.0
-+LoadModule ssl_module libexec/apache/mod_ssl.so
-+AddModule mod_ssl.c
-+</IfDefine>
-+
-+<IfDefine FRONTPAGE>
-+### We need to check if it matters when the frontpage ###
-+### module is loaded, before or after the SSL module? ###
-+LoadModule frontpage_module libexec/apache/mod_frontpage.so
-+AddModule mod_frontpage.c
-+</IfDefine>
-+
- #
- # ExtendedStatus controls whether Apache will generate "full" status
- # information (ExtendedStatus On) or just basic information (ExtendedStatus
-@@ -241,7 +264,7 @@
+@@ -246,7 +253,7 @@
  #  don't use Group #-1 on these systems!
  #
  User nobody
@@ -46,7 +23,7 @@
  
  #
  # ServerAdmin: Your address, where problems with the server should be
-@@ -269,7 +292,7 @@
+@@ -274,7 +281,7 @@
  # documents. By default, all requests are taken from this directory, but
  # symbolic links and aliases may be used to point to other locations.
  #
@@ -55,24 +32,24 @@
  
  #
  # Each directory to which Apache has access, can be configured with respect
-@@ -310,7 +333,16 @@
+@@ -315,7 +322,16 @@
  # override. Can also be "All", or any combination of "Options", "FileInfo", 
  # "AuthConfig", and "Limit"
  #
-+<IfDefine !FRONTPAGE>
-     AllowOverride None
-+</IfDefine>
-+
 +<IfDefine FRONTPAGE>
 +### These are the Minimum options need by the FrontPage Module.
 +### With out these options set the FrontPage Client will not be
 +### able to access the server.
 +    AllowOverride AuthConfig Limit Indexes Options
 +</IfDefine>
++
++<IfDefine !FRONTPAGE>
+     AllowOverride None
++</IfDefine>
  
  #
  # Controls who can get stuff from this server.
-@@ -342,6 +374,15 @@
+@@ -347,6 +363,15 @@
  #    </Limit>
  #</Directory>
  
@@ -88,7 +65,7 @@
  #
  # DirectoryIndex: Name of the file or files to use as a pre-written HTML
  # directory index.  Separate multiple entries with spaces.
-@@ -459,7 +500,7 @@
+@@ -467,7 +492,7 @@
  # define per-<VirtualHost> access logfiles, transactions will be
  # logged therein and *not* in this file.
  #
@@ -97,7 +74,7 @@
  
  #
  # If you would like to have agent and referer logfiles, uncomment the
-@@ -472,7 +513,7 @@
+@@ -480,7 +505,7 @@
  # If you prefer a single logfile with access, agent, and referer information
  # (Combined Logfile Format) you can use the following directive.
  #
Index: apache13-fp/patches/patch-ak
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/patches/patch-ak,v
retrieving revision 1.3
diff -u -r1.3 patch-ak
--- patch-ak	1999/05/03 01:50:58	1.3
+++ patch-ak	1999/09/10 02:01:49
@@ -1,5 +1,5 @@
---- src/support/apachectl.orig	Tue Feb  9 12:00:34 1999
-+++ src/support/apachectl	Sat Apr  3 15:40:42 1999
+--- src/support/apachectl.orig	Tue Apr  6 15:36:33 1999
++++ src/support/apachectl	Mon Sep  6 13:01:08 1999
 @@ -27,6 +27,10 @@
  # the path to your httpd binary, including options if necessary
  HTTPD='/usr/local/apache/src/httpd'
@@ -20,20 +20,11 @@
  ERROR=0
  ARGV="$@"
  if [ "x$ARGV" = "x" ] ; then 
-@@ -50,7 +56,7 @@
-     # check for pidfile
-     if [ -f $PIDFILE ] ; then
- 	PID=`cat $PIDFILE`
--	if [ ! "x$PID" = "x" ] && kill -0 $PID; then
-+	if [ ! "x$PID" = "x" ] && kill -0 $PID > /dev/null 2>&1; then
- 	    STATUS="httpd (pid $PID) running"
- 	    RUNNING=1
- 	else
-@@ -75,6 +81,18 @@
+@@ -75,6 +81,30 @@
  	    ERROR=3
  	fi
  	;;
-+    startfp|start_frontpage|start-FP)
++    startfp|fpstart|start-FP)
 +        if [ $RUNNING -eq 1 ]; then
 +            echo "$0 $ARG: httpd (pid $PID) already running"
 +            continue
@@ -45,10 +36,22 @@
 +            ERROR=3
 +        fi
 +        ;;
++    startfpssl|start-FP-SSL)
++ 	if [ $RUNNING -eq 1 ]; then
++	    echo "$0 $ARG: httpd (pid $PID) already running"
++	    continue
++	fi
++	if $HTTPD -DFRONTPAGE -DSSL; then
++	    echo "$0 $ARG: httpd started"
++	else
++	   echo "$0 $ARG: httpd could not be started"
++	   ERROR=3
++	fi
++	;;
      stop)
  	if [ $RUNNING -eq 0 ]; then
  	    echo "$0 $ARG: $STATUS"
-@@ -82,6 +100,7 @@
+@@ -82,6 +112,7 @@
  	fi
  	if kill $PID ; then
  	    echo "$0 $ARG: httpd stopped"
@@ -56,11 +59,12 @@
  	else
  	    echo "$0 $ARG: httpd could not be stopped"
  	    ERROR=4
-@@ -153,6 +172,7 @@
+@@ -153,6 +184,8 @@
  	cat <<EOF
  
  start      - start httpd
-+startfp    - start httpd with FrontPage Extentions enabled
++startfp	   - start httpd with Frontpage enabled
++startfpssl - start httpd with Frontpage and SSL enabled
  stop       - stop httpd
  restart    - restart httpd if running by sending a SIGHUP or start if 
               not running
Index: apache13-fp/patches/patch-al
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/patches/patch-al,v
retrieving revision 1.2
diff -u -r1.2 patch-al
--- patch-al	1999/01/26 02:27:30	1.2
+++ patch-al	1999/09/10 02:01:49
@@ -1,11 +1,11 @@
---- src/support/log_server_status.orig	Fri Jan  1 13:05:34 1999
-+++ src/support/log_server_status	Mon Jan 18 17:18:16 1999
+--- src/support/log_server_status.orig	Fri Jun  4 19:54:19 1999
++++ src/support/log_server_status	Fri Sep  3 15:53:16 1999
 @@ -67,10 +67,10 @@
  #
  require 'sys/socket.ph';
  
--$wherelog = "/var/log/graph/";  # Logs will be like "/var/log/graph/960312"
-+$wherelog = "/var/log/httpd-status-";  # Logs will be like "/var/log/httpd-status-960312"
+-$wherelog = "/var/log/graph/";  # Logs will be like "/var/log/graph/19960312"
++$wherelog = "/var/log/httpd-status-";
  $server = "localhost";          # Name of server, could be "www.foo.com"
  $port = "80";                   # Port on server
 -$request = "/status/?auto";     # Request to send
@@ -13,13 +13,8 @@
  
  sub tcp_connect
  {
-@@ -93,11 +93,11 @@
- ### Main
- 
- {
--	$date=`date +%y%m%d:%H%M%S`;
-+	$date=`LC_TIME=C date +%y%m%d:%H%M%S`;
- 	chop($date);
+@@ -100,7 +100,7 @@
+ 	chomp($date);
  	($day,$time)=split(/:/,$date);
  	$res=&tcp_connect($server,$port);
 -	open(OUT,">>$wherelog$day");
Index: apache13-fp/patches/patch-at
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/patches/patch-at,v
retrieving revision 1.1
diff -u -r1.1 patch-at
--- patch-at	1999/01/26 02:27:30	1.1
+++ patch-at	1999/09/10 02:01:49
@@ -1,12 +1,12 @@
---- src/support/apxs.pl.orig	Fri Jan  1 16:00:15 1999
-+++ src/support/apxs.pl	Mon Jan 18 17:18:17 1999
-@@ -393,8 +393,7 @@
-         }
+--- src/support/apxs.pl.orig	Thu Aug 19 22:57:08 1999
++++ src/support/apxs.pl	Thu Aug 19 23:02:17 1999
+@@ -426,8 +426,7 @@
          my $t = $f;
          $t =~ s|^.+/([^/]+)$|$1|;
--        push(@cmds, "cp $f $CFG_LIBEXECDIR/$t");
--        push(@cmds, "chmod 755 $CFG_LIBEXECDIR/$t");
-+        push(@cmds, "install -c -m 555 -o root -g wheel $f $CFG_LIBEXECDIR/$t");
+         if ($opt_i) {
+-	    push(@cmds, "cp $f $CFG_LIBEXECDIR/$t");
+-	    push(@cmds, "chmod 755 $CFG_LIBEXECDIR/$t");
++	    push(@cmds, "install -c -m 555 -o root -g wheel $f $CFG_LIBEXECDIR/$t");
+         }
  
          #   determine module symbolname and filename
-         my $filename = '';
Index: apache13-fp/patches/patch-fd
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/patches/patch-fd,v
retrieving revision 1.2
diff -u -r1.2 patch-fd
--- patch-fd	1998/11/10 01:56:00	1.2
+++ patch-fd	1999/09/10 02:01:50
@@ -1,59 +1,55 @@
-*** src/support/suexec.h.orig	Tue Mar 31 06:54:09 1998
---- src/support/suexec.h	Thu May 21 19:18:25 1998
-***************
-*** 56,61 ****
---- 56,72 ----
-   */
-  
-  /*
-+  * "FPEXE modification made on 98.05.21 by Scot Hetzel (hetzels@westbend.net)
-+  * based on previous FPEXE modifications supplied by Mark Wormgoor
-+  * (riddles@ipe.nl)
-+  *
-+  * Changes were made in order to use Suexec and Frontpage 98 at the same time.
-+  * After we change to the target_uid and target_gid.  We check if cmd = FPEXE,
-+  * if it does then we execute the cmd without performing any further tests.
-+  *
-+  */ 
-+ 
-+ /*
-   * suexec.h -- user-definable variables for the suexec wrapper code.
-   */
-  
-***************
-*** 129,134 ****
---- 140,173 ----
-   */
-  #ifndef DOC_ROOT
-  #define DOC_ROOT "/usr/local/apache/htdocs"
-+ #endif
-+ 
-+ /*
-+  * FPEXE, FPSTUB
-+  * FPSTUBDIR -- We are running frontpage and we don't need to run
-+  *              fpexe suid, since it's already set suid.  Also, the
-+  *              dir-rights are incorrect and so on...
-+  */
-+ #ifndef FPEXE
-+ #define FPEXE "fpexe"
-+ #endif
-+ 
-+ #ifndef FPSTUB
-+ #define FPSTUB "/usr/local/frontpage/version3.0/apache-fp/_vti_bin/fpexe"
-+ #endif
-+ 
-+ #ifndef FPSTUBDIR
-+ #define FPSTUBDIR "/usr/local/frontpage/currentversion/apache-fp/_vti_bin"
-+ #endif
-+ 
-+ /*
-+  * SYSTEM_CGI -- Define as the cgi directory for system-wide CGI's
-+  *               Note that UID/GID of the cgi or the directory are
-+  *		 NOT matched if they're in this directory, although
-+  *		 all the other checks still apply. Caveat Emptor.
+--- src/support/suexec.h.orig	Fri Jan  1 13:05:35 1999
++++ src/support/suexec.h	Mon Sep  6 13:12:55 1999
+@@ -56,6 +56,17 @@
+  */
+ 
+ /*
++ * "FPEXE modification made on 98.05.21 by Scot Hetzel (hetzels@westbend.net)
++ * based on previous FPEXE modifications supplied by Mark Wormgoor
++ * (riddles@ipe.nl)
++ *
++ * Changes were made in order to use Suexec and Frontpage 98 at the same time.
++ * After we change to the target_uid and target_gid.  We check if cmd = FPEXE,
++ * if it does then we execute the cmd without performing any further tests.
++ *
 + */ 
-+ #ifndef SYSTEM_CGI
-+ #define SYSTEM_CGI "/usr/local/www/cgi-bin"
-  #endif
-  
-  /*
++
++/*
+  * suexec.h -- user-definable variables for the suexec wrapper code.
+  *             (See README.configure on how to customize these variables.)
+  */
+@@ -130,6 +141,34 @@
+  */
+ #ifndef DOC_ROOT
+ #define DOC_ROOT "/usr/local/apache/htdocs"
++#endif
++
++/*
++ * FPEXE, FPSTUB
++ * FPSTUBDIR -- We are running frontpage and we don't need to run
++ *              fpexe suid, since it's already set suid.  Also, the
++ *              dir-rights are incorrect and so on...
++ */
++#ifndef FPEXE
++#define FPEXE "fpexe"
++#endif
++
++#ifndef FPSTUB
++#define FPSTUB "/usr/local/frontpage/version3.0/apache-fp/_vti_bin/fpexe"
++#endif
++
++#ifndef FPSTUBDIR
++#define FPSTUBDIR "/usr/local/frontpage/currentversion/apache-fp/_vti_bin"
++#endif
++
++/*
++ * SYSTEM_CGI -- Define as the cgi directory for system-wide CGI's
++ *               Note that UID/GID of the cgi or the directory are
++ *		 NOT matched if they're in this directory, although
++ *		 all the other checks still apply. Caveat Emptor.
++*/ 
++#ifndef SYSTEM_CGI
++#define SYSTEM_CGI "/usr/local/www/cgi-bin"
+ #endif
+ 
+ /*
Index: apache13-fp/patches/patch-fe
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/patches/patch-fe,v
retrieving revision 1.2
diff -u -r1.2 patch-fe
--- patch-fe	1998/11/10 01:56:00	1.2
+++ patch-fe	1999/09/10 02:01:50
@@ -1,146 +1,168 @@
-*** src/support/suexec.c.orig	Tue Apr 21 15:14:06 1998
---- src/support/suexec.c	Fri May 22 17:59:43 1998
-***************
-*** 70,75 ****
---- 70,98 ----
-   *
-   *
-   */
+--- src/support/suexec.c.orig	Mon Jun 21 19:51:41 1999
++++ src/support/suexec.c	Thu Sep  9 18:58:04 1999
+@@ -70,11 +70,35 @@
+  *
+  *
+  */
++/*
++ * "System" CGI modification 97.05.10 by Rick Franchuk (rickf@netnation.com)
++ *
++ * I found that while it's great to make scripts run under the UID and GID
++ * specified in httpd.conf or what /etc/passwd says is 'cool', suEXEC can
++ * really put a damper on 'System' cgi's, forcing copies of the scripts
++ * to be installed into users' home directories. That didn't seem very
++ * fitting... so I changed it so that the target UID check is disabled in
++ * a system directory #defined in suexec+.h. I hope you all find it useful.
++ *
++ * The docroot check had to be bypassed to allow functionality for VirtualHost
++ * entries. I'm somewhat suprised noone encountered that behavior before.
++ */
 + /*
-+  * "System" CGI modification 97.05.10 by Rick Franchuk (rickf@netnation.com)
-+  *
-+  * I found that while it's great to make scripts run under the UID and GID
-+  * specified in httpd.conf or what /etc/passwd says is 'cool', suEXEC can
-+  * really put a damper on 'System' cgi's, forcing copies of the scripts
-+  * to be installed into users' home directories. That didn't seem very
-+  * fitting... so I changed it so that the target UID check is disabled in
-+  * a system directory #defined in suexec+.h. I hope you all find it useful.
-+  *
-+  * The docroot check had to be bypassed to allow functionality for VirtualHost
-+  * entries. I'm somewhat suprised noone encountered that behavior before.
-+  */
-+  /*
-+  * "FPEXE modification made on 98.05.19 by Scot Hetzel (hetzels@westbend.net)
-+  * based on previous FPEXE modifications supplied by Mark Wormgoor
-+  * (riddles@ipe.nl)
-+  *
-+  * Changes were made in order to use Suexec and Frontpage 98 at the same time.
-+  * After we change to the target_uid and target_gid.  We check if cmd = FPEXE,
-+  * if it does then we execute the cmd without performing any further tests.
-+  *
-+  */ 
-  
-  #include "conf.h"
-  #include <sys/param.h>
-***************
-*** 393,398 ****
---- 416,429 ----
-      }
-  
-      /*
-+      * We logged everything, changed to the target uid/gid, and know the
-+      * user is ok.  We run fpexe now and bail out before anything goes wrong.
-+      */
-+ #ifdef FPEXE
-+      if ((strcmp(cmd, FPEXE)) != NULL) {
-+ #endif 
-+ 
-+     /*
-       * Get the current working directory, as well as the proper
-       * document root (dependant upon whether or not it is a
-       * ~userdir request).  Error out if we cannot get either one,
-***************
-*** 423,432 ****
---- 454,468 ----
-  	}
-      }
-  
-+     /*
-+      * This section must be commented out to work properly with
-+      * VirtualHosts running CGI in thier own directories.
-+      *
-      if ((strncmp(cwd, dwd, strlen(dwd))) != 0) {
-  	log_err("command not in docroot (%s/%s)\n", cwd, cmd);
-  	exit(114);
-      }
-+      */
-  
-      /*
-       * Stat the cwd and verify it is a directory, or error out.
-***************
-*** 472,477 ****
---- 508,516 ----
-       * Error out if the target name/group is different from
-       * the name/group of the cwd or the program.
-       */
-+ #ifdef SYSTEM_CGI
-+     if (strncmp(cwd, SYSTEM_CGI, strlen(SYSTEM_CGI))) {
-+ #endif
-      if ((uid != dir_info.st_uid) ||
-  	(gid != dir_info.st_gid) ||
-  	(uid != prg_info.st_uid) ||
-***************
-*** 482,487 ****
---- 521,530 ----
-  		prg_info.st_uid, prg_info.st_gid);
-  	exit(120);
-      }
-+ #ifdef SYSTEM_CGI
-+     }
-+ #endif
-+ 
-      /*
-       * Error out if the program is not executable for the user.
-       * Otherwise, she won't find any error in the logs except for
-***************
-*** 493,498 ****
---- 536,584 ----
-      }
-  
-      clean_env();
-+ 
-+ #ifdef FPEXE
-+     }
-+     else {
-+ 
-+         /* The following taken from mod_frontpage.c to check permissions */
-+ 
-+         /*
-+          * We can't stat the stub dir.  Make sure the stub directory is not
-+          * owned by root and not group/world writable
-+          */
-+         if ((lstat(FPSTUBDIR, &dir_info) == -1       ||
-+             dir_info.st_uid                          ||
-+             (dir_info.st_mode & (S_IWGRP | S_IWOTH)) ||
-+             (!S_ISDIR(dir_info.st_mode)))) {
-+             /*
-+              * User recovery: set directory to be owned by by root with
-+              * permissions r*x*-x*-x.
-+              */
-+             log_err("Incorrect permissions on stub directory \"%-.1024s\"",
-+                     FPSTUBDIR);
-+             exit (250);
-+         }
-+ 
-+         /*
-+ 	 * We can't stat the stub.  Make sure the stub is not owned by root,
-+          * set-uid, set-gid, and is not group/world writable or executable.
-+          */
-+         if ((stat(cmd, &prg_info) == -1    ||
-+             prg_info.st_uid                          ||
-+             !(prg_info.st_mode & S_ISUID)            ||
-+             (prg_info.st_mode & S_ISGID)             ||
-+             (prg_info.st_mode & (S_IWGRP | S_IWOTH)) ||
-+             !(prg_info.st_mode & (S_IXGRP | S_IXOTH)))) {
-+             /*
-+              * User recovery: set stub to be owned by by root with permissions
-+              * r*s*-x*-x.
-+              */
-+             log_err("Incorrect permissions on stub \"%-.1024s\"", cmd);
-+             exit (251);
-+         }
-+     }
-+ #endif  
-  
-      /* 
-       * Be sure to close the log file so the CGI can't
++ * "FPEXE modification made on 98.05.19 by Scot Hetzel (hetzels@westbend.net)
++ * based on previous FPEXE modifications supplied by Mark Wormgoor
++ * (riddles@ipe.nl)
++ *
++ * Changes were made in order to use Suexec and Frontpage 98 at the same time.
++ * After we change to the target_uid and target_gid.  We check if cmd = FPEXE,
++ * if it does then we execute the cmd without performing any further tests.
++ *
++ */ 
+ 
+ #include "ap_config.h"
+ #include <sys/param.h>
+ #include <sys/stat.h>
+ #include <sys/types.h>
++#include <login_cab.h>
+ 
+ #include <stdarg.h>
+ 
+@@ -250,6 +274,7 @@
+     char *cmd;			/* command to be executed    */
+     char cwd[AP_MAXPATH];	/* current working directory */
+     char dwd[AP_MAXPATH];	/* docroot working directory */
++    login_cap_t *lc;		/* user resource limits      */
+     struct passwd *pw;		/* password entry holder     */
+     struct group *gr;		/* group entry holder        */
+     struct stat dir_info;	/* directory info holder     */
+@@ -404,6 +429,19 @@
+     }
+ 
+     /*
++     * Apply user resource limits based on login class.
++     */
++    if ((lc = login_getclassbyname(pw->pw_class, pw)) == NULL) {
++	log_err("login_getclassbyname() failed\n");
++	exit(248);
++    }
++
++    if ((setusercontext(lc, pw, uid, LOGIN_SETRESOURCES)) != 0) {
++	log_err("setusercontext() failed\n");
++	exit(249);
++    }
++
++    /*
+      * Change UID/GID here so that the following tests work over NFS.
+      *
+      * Initialize the group access list for the target user,
+@@ -423,6 +461,14 @@
+     }
+ 
+     /*
++     * We logged everything, changed to the target uid/gid, and know the
++     * user is ok.  We run fpexe now and bail out before anything goes wrong.
++     */
++#ifdef FPEXE
++     if ((strcmp(cmd, FPEXE)) != NULL) {
++#endif 
++
++    /*
+      * Get the current working directory, as well as the proper
+      * document root (dependant upon whether or not it is a
+      * ~userdir request).  Error out if we cannot get either one,
+@@ -453,10 +499,15 @@
+ 	}
+     }
+ 
++    /*
++     * This section must be commented out to work properly with
++     * VirtualHosts running CGI in thier own directories.
++     *
+     if ((strncmp(cwd, dwd, strlen(dwd))) != 0) {
+ 	log_err("command not in docroot (%s/%s)\n", cwd, cmd);
+ 	exit(114);
+     }
++     */
+ 
+     /*
+      * Stat the cwd and verify it is a directory, or error out.
+@@ -502,6 +553,9 @@
+      * Error out if the target name/group is different from
+      * the name/group of the cwd or the program.
+      */
++#ifdef SYSTEM_CGI
++    if (strncmp(cwd, SYSTEM_CGI, strlen(SYSTEM_CGI))) {
++#endif
+     if ((uid != dir_info.st_uid) ||
+ 	(gid != dir_info.st_gid) ||
+ 	(uid != prg_info.st_uid) ||
+@@ -513,6 +567,10 @@
+ 		prg_info.st_uid, prg_info.st_gid);
+ 	exit(120);
+     }
++#ifdef SYSTEM_CGI
++    }
++#endif
++
+     /*
+      * Error out if the program is not executable for the user.
+      * Otherwise, she won't find any error in the logs except for
+@@ -524,6 +582,49 @@
+     }
+ 
+     clean_env();
++
++#ifdef FPEXE
++    }
++    else {
++
++        /* The following taken from mod_frontpage.c to check permissions */
++
++        /*
++         * We can't stat the stub dir.  Make sure the stub directory is not
++         * owned by root and not group/world writable
++         */
++        if ((lstat(FPSTUBDIR, &dir_info) == -1       ||
++            dir_info.st_uid                          ||
++            (dir_info.st_mode & (S_IWGRP | S_IWOTH)) ||
++            (!S_ISDIR(dir_info.st_mode)))) {
++            /*
++             * User recovery: set directory to be owned by by root with
++             * permissions r*x*-x*-x.
++             */
++            log_err("Incorrect permissions on stub directory \"%-.1024s\"",
++                    FPSTUBDIR);
++            exit (250);
++        }
++
++        /*
++	 * We can't stat the stub.  Make sure the stub is not owned by root,
++         * set-uid, set-gid, and is not group/world writable or executable.
++         */
++        if ((stat(cmd, &prg_info) == -1    ||
++            prg_info.st_uid                          ||
++            !(prg_info.st_mode & S_ISUID)            ||
++            (prg_info.st_mode & S_ISGID)             ||
++            (prg_info.st_mode & (S_IWGRP | S_IWOTH)) ||
++            !(prg_info.st_mode & (S_IXGRP | S_IXOTH)))) {
++            /*
++             * User recovery: set stub to be owned by by root with permissions
++             * r*s*-x*-x.
++             */
++            log_err("Incorrect permissions on stub \"%-.1024s\"", cmd);
++            exit (251);
++        }
++    }
++#endif  
+ 
+     /* 
+      * Be sure to close the log file so the CGI can't
Index: apache13-fp/patches/patch-fh
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/patches/patch-fh,v
retrieving revision 1.1
diff -u -r1.1 patch-fh
--- patch-fh	1998/11/10 01:56:00	1.1
+++ patch-fh	1999/09/10 02:01:50
@@ -1,24 +1,16 @@
-*** src/include/httpd.h.orig	Thu May 21 19:37:29 1998
---- src/include/httpd.h	Fri May 22 16:57:19 1998
-***************
-*** 689,695 ****
-  
-      char *unparsed_uri;		/* the uri without any parsing performed */
-      char *uri;			/* the path portion of the URI */
-!     char *filename;
-      char *path_info;
-      char *args;			/* QUERY_ARGS, if any */
-      struct stat finfo;		/* ST_MODE set to zero if no such file */
---- 689,700 ----
-  
-      char *unparsed_uri;		/* the uri without any parsing performed */
-      char *uri;			/* the path portion of the URI */
-!     char *execfilename;		/* physical filename to exec */
-!     char *filename;		/* logical filename to exec -- always the same
-! 				 * except for FrontPage CGI programs where we
-! 				 * will execute the CGI program in
-! 				 * /usr/local/frontpage....
-! 				 */
-      char *path_info;
-      char *args;			/* QUERY_ARGS, if any */
-      struct stat finfo;		/* ST_MODE set to zero if no such file */
+--- src/include/httpd.h.orig	Mon Aug 16 12:57:53 1999
++++ src/include/httpd.h	Mon Sep  6 13:12:55 1999
+@@ -774,7 +774,12 @@
+ 
+     char *unparsed_uri;		/* the uri without any parsing performed */
+     char *uri;			/* the path portion of the URI */
+-    char *filename;
++    char *execfilename;		/* physical filename to exec */
++    char *filename;		/* logical filename to exec -- always the same
++				 * except for FrontPage CGI programs where we
++				 * will execute the CGI program in
++				 * /usr/local/frontpage....
++				 */
+     char *path_info;
+     char *args;			/* QUERY_ARGS, if any */
+     struct stat finfo;		/* ST_MODE set to zero if no such file */
Index: apache13-fp/patches/patch-fi
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/patches/patch-fi,v
retrieving revision 1.2
diff -u -r1.2 patch-fi
--- patch-fi	1999/05/03 01:50:59	1.2
+++ patch-fi	1999/09/10 02:01:50
@@ -1,5 +1,5 @@
---- src/main/http_request.c.orig	Sun Mar  7 09:05:36 1999
-+++ src/main/http_request.c	Sat Apr  3 16:02:26 1999
+--- src/main/http_request.c.orig	Fri May 21 07:16:21 1999
++++ src/main/http_request.c	Mon Sep  6 13:12:55 1999
 @@ -187,6 +187,8 @@
  	return OK;
      }
@@ -9,7 +9,7 @@
  #ifdef HAVE_DRIVE_LETTERS
      /* If the directory is x:\, then we don't want to strip
       * the trailing slash since x: is not a valid directory.
-@@ -509,6 +511,7 @@
+@@ -511,6 +513,7 @@
              res = ap_parse_htaccess(&htaccess_conf, r, overrides_here,
                                   ap_pstrdup(r->pool, test_dirname),
                                   sconf->access_name);
Index: apache13-fp/patches/patch-fj
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/patches/patch-fj,v
retrieving revision 1.1
diff -u -r1.1 patch-fj
--- patch-fj	1998/11/10 01:56:00	1.1
+++ patch-fj	1999/09/10 02:01:50
@@ -1,19 +1,11 @@
-*** src/main/util.c.orig	Sat May  9 09:27:27 1998
---- src/main/util.c	Fri May 22 16:57:19 1998
-***************
-*** 582,588 ****
-      char *res;
-  
-      for (x = 0; (*line)[x]; x++) {
-! 	if (ap_isspace((*line)[x])) {
-  	    pos = x;
-  	    break;
-  	}
---- 582,588 ----
-      char *res;
-  
-      for (x = 0; (*line)[x]; x++) {
-! 	if (ap_isspace((*line)[x]) && ((*line)[x] & 0x80)==0) {
-  	    pos = x;
-  	    break;
-  	}
+--- src/main/util.c.orig	Sat Aug 14 03:35:50 1999
++++ src/main/util.c	Mon Sep  6 13:12:55 1999
+@@ -635,7 +635,7 @@
+     char *res;
+ 
+     for (x = 0; (*line)[x]; x++) {
+-	if (ap_isspace((*line)[x])) {
++	if (ap_isspace((*line)[x]) && ((*line)[x] & 0x80)==0) {
+ 	    pos = x;
+ 	    break;
+ 	}
Index: apache13-fp/pkg/PLIST
===================================================================
RCS file: /home/ncvs/ports/www/apache13-fp/pkg/PLIST,v
retrieving revision 1.7
diff -u -r1.7 PLIST
--- PLIST	1999/06/09 08:05:03	1.7
+++ PLIST	1999/09/10 02:01:50
@@ -2,10 +2,15 @@
 bin/htdigest
 bin/htpasswd
 etc/apache/access.conf.default
+@exec if [ ! -f %B/access.conf ]; then cp %D/%F %B/access.conf ; fi
 etc/apache/httpd.conf.default
+@exec if [ ! -f %B/httpd.conf ]; then cp %D/%F %B/httpd.conf ; fi
 etc/apache/magic.default
+@exec if [ ! -f %B/magic ]; then cp %D/%F %B/magic ; fi
 etc/apache/mime.types.default
+@exec if [ ! -f %B/mime.types ]; then cp %D/%F %B/mime.types ; fi
 etc/apache/srm.conf.default
+@exec if [ ! -f %B/srm.conf ]; then cp %D/%F %B/srm.conf ; fi
 etc/rc.d/apache.sh
 include/apache/alloc.h
 include/apache/ap.h
@@ -15,6 +20,7 @@
 include/apache/ap_ctype.h
 include/apache/ap_md5.h
 include/apache/ap_mmn.h
+include/apache/ap_sha1.h
 include/apache/buff.h
 include/apache/compat.h
 include/apache/conf.h
@@ -39,20 +45,50 @@
 include/apache/util_md5.h
 include/apache/util_script.h
 include/apache/util_uri.h
+include/apache/xml/asciitab.h
+include/apache/xml/hashtable.h
+include/apache/xml/iasciitab.h
+include/apache/xml/latin1tab.h
+include/apache/xml/nametab.h
+include/apache/xml/utf8tab.h
+include/apache/xml/xmldef.h
+include/apache/xml/xmlparse.h
+include/apache/xml/xmlrole.h
+include/apache/xml/xmltok.h
+include/apache/xml/xmltok_impl.h
+libexec/apache/httpd.exp
 libexec/apache/libproxy.so
+libexec/apache/mod_access.so
+libexec/apache/mod_actions.so
+libexec/apache/mod_alias.so
+libexec/apache/mod_asis.so
+libexec/apache/mod_auth.so
 libexec/apache/mod_auth_anon.so
 libexec/apache/mod_auth_db.so
+libexec/apache/mod_autoindex.so
 libexec/apache/mod_cern_meta.so
+libexec/apache/mod_cgi.so
 libexec/apache/mod_digest.so
+libexec/apache/mod_dir.so
+libexec/apache/mod_env.so
 libexec/apache/mod_expires.so
 libexec/apache/mod_frontpage.so
 libexec/apache/mod_headers.so
+libexec/apache/mod_imap.so
+libexec/apache/mod_include.so
 libexec/apache/mod_info.so
+libexec/apache/mod_log_config.so
+libexec/apache/mod_mime.so
 libexec/apache/mod_mime_magic.so
+libexec/apache/mod_negotiation.so
 libexec/apache/mod_rewrite.so
+libexec/apache/mod_setenvif.so
 libexec/apache/mod_speling.so
+libexec/apache/mod_status.so
 libexec/apache/mod_unique_id.so
+libexec/apache/mod_userdir.so
 libexec/apache/mod_usertrack.so
+libexec/apache/mod_vhost_alias.so
 sbin/ab
 sbin/apachectl
 sbin/apxs
@@ -128,6 +164,7 @@
 share/doc/apache/manual/mod/mod_auth_anon.html
 share/doc/apache/manual/mod/mod_auth_db.html
 share/doc/apache/manual/mod/mod_auth_dbm.html
+share/doc/apache/manual/mod/mod_auth_digest.html
 share/doc/apache/manual/mod/mod_autoindex.html
 share/doc/apache/manual/mod/mod_browser.html
 share/doc/apache/manual/mod/mod_cern_meta.html
@@ -162,6 +199,7 @@
 share/doc/apache/manual/mod/mod_unique_id.html
 share/doc/apache/manual/mod/mod_userdir.html
 share/doc/apache/manual/mod/mod_usertrack.html
+share/doc/apache/manual/mod/mod_vhost_alias.html
 share/doc/apache/manual/multilogs.html
 share/doc/apache/manual/new_features_1_0.html
 share/doc/apache/manual/new_features_1_1.html
@@ -302,8 +340,10 @@
 www/icons/uuencoded.gif
 www/icons/world1.gif
 www/icons/world2.gif
-@exec mkdir -p %D/www/proxy
+@exec if [ ! -d /var/spool/apache ] ; then mkdir -p /var/spool/apache ; echo " change owner & group of /var/spool/apache to the owner & group the Apache Server uses in httpd.conf" ; fi
+@unexec rm -rf /var/spool/apache
 @dirrm etc/apache
+@dirrm include/apache/xml
 @dirrm include/apache
 @dirrm libexec/apache
 @dirrm share/doc/apache/manual/images
@@ -316,7 +356,6 @@
 @dirrm www/cgi-bin.default
 @dirrm www/icons/small
 @dirrm www/icons
-@dirrm www/proxy
 @dirrm www
 frontpage/version3.0/LICENSE.TXT
 frontpage/version3.0/change_server.sh
diff -u apache13-fp/patches/patch-as.orig apache13-fp/patches/patch-as
--- apache13-fp/patches/patch-as.orig	Wed Sep  8 19:39:51 1999
+++ apache13-fp/patches/patch-as	Thu Sep  9 21:01:49 1999
@@ -0,0 +1,11 @@
+--- config.layout.orig	Thu Jul 29 13:12:43 1999
++++ config.layout	Thu Aug 19 22:30:39 1999
+@@ -41,7 +41,7 @@
+     sysconfdir:    $prefix/etc+
+     datadir:       $prefix/share+
+     iconsdir:      $datadir/icons
+-    htdocsdir:     $datadir/htdocs
++    htdocsdir:     $datadir/data
+     cgidir:        $datadir/cgi-bin
+     includedir:    $prefix/include+
+     localstatedir: $prefix/var+
diff -u apache13-fp/patches/patch-au.orig apache13-fp/patches/patch-au
--- apache13-fp/patches/patch-au.orig	Wed Sep  8 19:39:51 1999
+++ apache13-fp/patches/patch-au	Thu Sep  9 21:01:49 1999
@@ -0,0 +1,48 @@
+--- src/main/http_core.c.orig	Mon Aug  9 02:29:29 1999
++++ src/main/http_core.c	Sun Aug 22 16:09:12 1999
+@@ -1832,6 +1832,32 @@
+     return NULL;
+ }
+ 
++static const char *set_resource_access_config(cmd_parms *cmd, void *dummy,
++					      char *arg)
++{
++    int offset = (int)(long)cmd->info;
++    char *struct_ptr = (char *)cmd->server;
++
++    const char *err = ap_check_cmd_context(cmd,
++					   NOT_IN_DIR_LOC_FILE|NOT_IN_LIMIT);
++
++    if (err != NULL) {
++	return err;
++    }
++
++   /* Prevent recursive read of SERVER_CONFIG_FILE
++    * If ResourceConfig/AccessConfig is equal to SERVER_CONFIG_FILE
++    * then set it to /dev/null 
++    */
++    if (strcmp(arg,SERVER_CONFIG_FILE)) {
++	*(char **)(struct_ptr + offset) = "/dev/null";
++    }
++    else {
++	*(char **)(struct_ptr + offset) = arg;
++    }
++    return NULL;
++}
++
+ static const char *server_type(cmd_parms *cmd, void *dummy, char *arg)
+ {
+     const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY);
+@@ -2820,10 +2846,10 @@
+     "A file for Apache to maintain runtime process management information"},
+ { "LockFile", set_lockfile, NULL, RSRC_CONF, TAKE1,
+     "The lockfile used when Apache needs to lock the accept() call"},
+-{ "AccessConfig", set_server_string_slot,
++{ "AccessConfig", set_resource_access_config,
+   (void *)XtOffsetOf (server_rec, access_confname), RSRC_CONF, TAKE1,
+   "The filename of the access config file" },
+-{ "ResourceConfig", set_server_string_slot,
++{ "ResourceConfig", set_resource_access_config,
+   (void *)XtOffsetOf (server_rec, srm_confname), RSRC_CONF, TAKE1,
+   "The filename of the resource config file" },
+ { "ServerAlias", set_server_alias, NULL, RSRC_CONF, RAW_ARGS,

>Release-Note:
>Audit-Trail:
>Unformatted:


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199909100244.VAA59928>