blob: 346662de7d94b4a859bf4a7afedb170360d93fb7 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
|
# Contributor: Łukasz Jendrysik
# Contributor: Carlo Landmeter <clandmeter@gmail.com>
# Maintainer: Natanael Copa <ncopa@alpinelinux.org>
pkgname=monit
pkgver=5.25.2
pkgrel=1
pkgdesc="Managing and monitoring on a UNIX system"
url="http://mmonit.com/monit/"
arch="all"
license="AGPL"
makedepends="openssl-dev zlib-dev"
subpackages="$pkgname-doc $pkgname-openrc"
source="http://mmonit.com/monit/dist/monit-$pkgver.tar.gz
$pkgname.initd
CVE-2019-11454.patch
CVE-2019-11455.patch
"
builddir="$srcdir"/$pkgname-$pkgver
# secfixes:
# 5.25.2-r1:
# - CVE-2019-11454
# - CVE-2019-11455
check() {
cd "$builddir"
make check
}
build() {
cd "$builddir"
./configure \
--build=$CBUILD \
--host=$CHOST \
--prefix=/usr \
--sysconfdir=/etc \
--mandir=/usr/share/man \
--localstatedir=/var \
--without-pam
make
}
package() {
cd "$builddir"
make DESTDIR="$pkgdir" install
install -Dm 755 "$srcdir"/$pkgname.initd \
"$pkgdir"/etc/init.d/$pkgname
install -Dm 644 "$builddir"/monitrc \
"$pkgdir"/etc/monitrc
sed -i '/allow @monit/s/^/#/' \
"$pkgdir"/etc/monitrc
sed -i '/allow @users readonly/s/^/#/' \
"$pkgdir"/etc/monitrc
# monit checks for strict permissions of monitrc at startup
chmod 600 "$pkgdir"/etc/monitrc
}
sha512sums="e9b6ce60bf82c2564a084fc42b65ef432ee35855cad038fe6ae209047abaa1c54cabb4cd75c8a85c1102844a1b90c3c5f8ddbbd56711665b9bea616bcc02ec86 monit-5.25.2.tar.gz
94d67a995c6028d48cb729a60157ab42f2a3c15d59284f1de56c35b44bf83929ba9c42a5cbfe3bb4df0def70465cf3dff0ad6e532b6a02805840dc57785e1cc9 monit.initd
8325384c70e47a7f1da75998c0f86f23578592d43469bdff7823e2be5eb8de75eb2b7234edd1bacbd0d28aa0fdb264aafbf437aceb0c8718d2dbac1c41892a7f CVE-2019-11454.patch
86050e4ec84100e15220ef3b4b821f67109b8db3410dc695ce2d1977b9442d2d273e9c44093ba5426dc7465cfc39fc872edc3c2b33c70b82df0b926744056b2e CVE-2019-11455.patch"
|