diff options
author | atatat <atatat@pkgsrc.org> | 2002-12-22 20:04:30 +0000 |
---|---|---|
committer | atatat <atatat@pkgsrc.org> | 2002-12-22 20:04:30 +0000 |
commit | 3e074711b21f9fdff3c54eae3d6844ef95ca8c4e (patch) | |
tree | 17c41e602be3e6d18fa04b0ade85839851161bce /sysutils | |
parent | bdcbbcd6a88b867562c3538720d0da601eda5aaa (diff) | |
download | pkgsrc-3e074711b21f9fdff3c54eae3d6844ef95ca8c4e.tar.gz |
Upgrade lsof pkg to 4.66. Notable changes are:
...
Implemented the HASNOSOCKSECURITY compile-time
option. When it and HASSECURITY are defined, lsof
will be built to list only the user's open files,
but will also list anyone else's open socket files,
provided the "-i" option selects their listing.
Updated the Customize script to ask about setting
HASNOSOCKSECURITY. Left it undefined in all dialect
machine.h header files. This change was requested
by Kenneth Stailey <kstailey@speakeasy.net> for
use with ntop.
...
Improved lsof help (-h) and version (-v) information
reporting.
...
In order to the provide a simple pkgsrc hook for the new
HASNOSOCKSECURITY option, we provide the LSOF_LESS_SECURE_SOCKETS
setting (as a complement to the LSOF_MORE_SECURE option we already
have).
Diffstat (limited to 'sysutils')
-rw-r--r-- | sysutils/lsof/Makefile | 7 | ||||
-rw-r--r-- | sysutils/lsof/distinfo | 8 | ||||
-rw-r--r-- | sysutils/lsof/patches/patch-aa | 23 |
3 files changed, 26 insertions, 12 deletions
diff --git a/sysutils/lsof/Makefile b/sysutils/lsof/Makefile index 587874b8afb..7f6ebc258ab 100644 --- a/sysutils/lsof/Makefile +++ b/sysutils/lsof/Makefile @@ -1,7 +1,7 @@ -# $NetBSD: Makefile,v 1.56 2002/10/12 03:13:39 atatat Exp $ +# $NetBSD: Makefile,v 1.57 2002/12/22 20:04:30 atatat Exp $ # -DISTNAME= lsof_4.65 +DISTNAME= lsof_4.66 PKGNAME= ${DISTNAME:S/_/-/} TMPWRK= ${WRKDIR}/${DISTNAME} WRKSRC= ${WRKDIR}/${DISTNAME}/${SRCBALL_NAME} @@ -22,7 +22,8 @@ CONFIGURE_SCRIPT= ./Configure CONFIGURE_ARGS= -n ${LOWER_OPSYS} CONFIGURE_ENV+= LSOF_CC="${CC} ${CFLAGS}" MAKE_FLAGS+= LSOF_BLDCMT="NetBSD pkgsrc rocks!" -CPPFLAGS+= -DLSOF_MORE_SECURE=${LSOF_MORE_SECURE} +CPPFLAGS+= -DLSOF_MORE_SECURE=${LSOF_MORE_SECURE} \ + -DLSOF_LESS_SECURE_SOCKETS=${LSOF_LESS_SECURE_SOCKETS} OSVERSION_SPECIFIC= yes SRCBALL_NAME= ${DISTNAME}_src diff --git a/sysutils/lsof/distinfo b/sysutils/lsof/distinfo index 9499cfb954f..55d942b7cce 100644 --- a/sysutils/lsof/distinfo +++ b/sysutils/lsof/distinfo @@ -1,5 +1,5 @@ -$NetBSD: distinfo,v 1.21 2002/10/12 03:13:40 atatat Exp $ +$NetBSD: distinfo,v 1.22 2002/12/22 20:04:30 atatat Exp $ -SHA1 (lsof_4.65.tar.gz) = 776be55320f65377547511a5bf9d8a8958bd465c -Size (lsof_4.65.tar.gz) = 948408 bytes -SHA1 (patch-aa) = 1946122860ad68f1c5e07f6ae82a147eb51e01c5 +SHA1 (lsof_4.66.tar.gz) = 7bf3b88ed059d01a01034fcd93db74d8e63b7c8f +Size (lsof_4.66.tar.gz) = 954609 bytes +SHA1 (patch-aa) = 6d3e16a2634041af0f1028b805a0e959c9c2bc80 diff --git a/sysutils/lsof/patches/patch-aa b/sysutils/lsof/patches/patch-aa index b5fd81579f1..51174f1defc 100644 --- a/sysutils/lsof/patches/patch-aa +++ b/sysutils/lsof/patches/patch-aa @@ -1,11 +1,13 @@ -$NetBSD: patch-aa,v 1.19 2002/09/13 15:53:10 tron Exp $ +$NetBSD: patch-aa,v 1.20 2002/12/22 20:04:31 atatat Exp $ If LSOF_MORE_SECURE is non-zero, compile lsof with security, and -only let unprivileged (non-root) users view their own open files +only let unprivileged (non-root) users view their own open files. +Set LSOF_LESS_SECURE_SOCKETS to non-zero in order to allow non-root +users to see open sockets, even when LSOF_MORE_SECURE is set. ---- dialects/n+obsd/machine.h 2001/04/30 09:23:38 1.1 -+++ dialects/n+obsd/machine.h 2001/04/30 10:06:24 -@@ -373,7 +373,9 @@ +--- dialects/n+obsd/machine.h.orig Tue Dec 3 13:23:54 2002 ++++ dialects/n+obsd/machine.h +@@ -371,7 +371,9 @@ * (the one that its user logged on with) of the lsof process. */ @@ -16,3 +18,14 @@ only let unprivileged (non-root) users view their own open files /* +@@ -380,7 +382,9 @@ + * listing is selected by the "-i" option. + */ + +-/* #define HASNOSOCKSECURITY 1 */ ++#if LSOF_LESS_SECURE_SOCKETS ++#define HASNOSOCKSECURITY 1 ++#endif + + + /* |