head	1.10;
access;
symbols
	RELEASE_8_3_0:1.8
	RELEASE_9_0_0:1.8
	RELEASE_7_4_0:1.7
	RELEASE_8_2_0:1.7
	RELEASE_6_EOL:1.7
	RELEASE_8_1_0:1.6
	RELEASE_7_3_0:1.5
	RELEASE_8_0_0:1.5
	RELEASE_7_2_0:1.5
	RELEASE_7_1_0:1.4
	RELEASE_6_4_0:1.4;
locks; strict;
comment	@# @;


1.10
date	2012.11.17.06.01.20;	author svnexp;	state Exp;
branches;
next	1.9;

1.9
date	2012.08.05.23.19.36;	author dougb;	state Exp;
branches;
next	1.8;

1.8
date	2011.09.23.22.25.18;	author amdmi3;	state Exp;
branches;
next	1.7;

1.7
date	2010.07.25.15.39.19;	author mm;	state Exp;
branches;
next	1.6;

1.6
date	2010.04.06.12.01.56;	author garga;	state Exp;
branches;
next	1.5;

1.5
date	2009.03.27.11.53.06;	author garga;	state Exp;
branches;
next	1.4;

1.4
date	2008.09.15.19.56.37;	author garga;	state Exp;
branches;
next	1.3;

1.3
date	2008.08.21.06.18.21;	author rafan;	state Exp;
branches;
next	1.2;

1.2
date	2008.08.19.16.40.16;	author mnag;	state Exp;
branches;
next	1.1;

1.1
date	2008.06.05.19.40.32;	author jadawin;	state Exp;
branches;
next	;


desc
@@


1.10
log
@Switch exporter over
@
text
@# New ports collection makefile for:	spybye
# Date created:				23 May 2008
# Whom:					pauls
#
# $FreeBSD: head/security/spybye/Makefile 302141 2012-08-05 23:19:36Z dougb $
#

PORTNAME=	spybye
PORTVERSION=	0.3
PORTREVISION=	2
CATEGORIES=	security www
MASTER_SITES=	http://www.monkey.org/~provos/

MAINTAINER=	pauls@@utdallas.edu
COMMENT=	A web proxy to detect malware

LIB_DEPENDS=	event-1.4:${PORTSDIR}/devel/libevent

OPTIONS=	CLAMAV "Enable CLAMAV support" off

USE_RC_SUBR=	spybye
GNU_CONFIGURE=	yes

MAN1=		spybye.1

.include <bsd.port.pre.mk>

.if defined(WITH_CLAMAV)
LIB_DEPENDS+=	clamav.7:${PORTSDIR}/security/clamav
CONFIGURE_ARGS+=	--with-libclamav=${PREFIX}/bin
.endif

.include <bsd.port.post.mk>
@


1.9
log
@SVN rev 302141 on 2012-08-05 23:19:36Z by dougb

Move the rc.d scripts of the form *.sh.in to *.in

Where necessary add $FreeBSD$ to the file

No PORTREVISION bump necessary because this is a no-op
@
text
@d5 1
a5 1
# $FreeBSD$
@


1.8
log
@- Add LDFLAGS to CONFIGURE_ENV and MAKE_ENV (as it was done with LDFLAGS)
- Fix all ports that add {CPP,LD}FLAGS to *_ENV to modify flags instead

PR:		157936
Submitted by:	myself
Exp-runs by:	pav
Approved by:	pav
@
text
@d21 1
a21 1
USE_RC_SUBR=	spybye.sh
@


1.7
log
@Update libevent to 1.4.14b

PR:		ports/147723
Approved by:	maintainer (timeout)
@
text
@a22 1
CONFIGURE_ENV=	LDFLAGS="${LDFLAGS}"
@


1.6
log
@Chase clamav's lib bump
@
text
@d10 1
a10 1
PORTREVISION=	1
@


1.5
log
@- Bump necessary PORTREVISIONS and fix some ports to new clamav API
@
text
@d30 1
a30 1
LIB_DEPENDS+=	clamav.6:${PORTSDIR}/security/clamav
@


1.4
log
@- Update security/clamav to 0.94 [1] and fix a remote DoS [2]
- Chase libclamav version bump on all dependant ports
- Bump necessary PORTREVISIONS
- Fix some BROKEN messages from ports that were already broken with clamav-0.93
- Mark security/klamav as BROKEN since it doesn't build with clamav-0.94

PR:		ports/127122 [1], ports/127310 [2]
Submitted by:	Gary Palmer <freebsd-gnats@@in-addr.com> [1], delphij [2]
Approved by:	portmgr (pav)
@
text
@d30 1
a30 1
LIB_DEPENDS+=	clamav.5:${PORTSDIR}/security/clamav
@


1.3
log
@Update CONFIGURE_ARGS for how we pass CONFIGURE_TARGET to configure script.
Specifically, newer autoconf (> 2.13) has different semantic of the
configure target. In short, one should use --build=CONFIGURE_TARGET
instead of CONFIGURE_TARGET directly. Otherwise, you will get a warning
and the old semantic may be removed in later autoconf releases.

To workaround this issue, many ports hack the CONFIGURE_TARGET variable
so that it contains the ``--build='' prefix.

To solve this issue, under the fact that some ports still have
configure script generated by the old autoconf, we use runtime detection
in the do-configure target so that the proper argument can be used.

Changes to Mk/*:
 - Add runtime detection magic in bsd.port.mk
 - Remove CONFIGURE_TARGET hack in various bsd.*.mk
 - USE_GNOME=gnometarget is now an no-op

Changes to individual ports, other than removing the CONFIGURE_TARGET hack:

= pkg-plist changed (due to the ugly CONFIGURE_TARGET prefix in * executables)
  - comms/gnuradio
  - science/abinit
  - science/elmer-fem
  - science/elmer-matc
  - science/elmer-meshgen2d
  - science/elmerfront
  - science/elmerpost

= use x86_64 as ARCH
  - devel/g-wrap

= other changes
  - print/magicfilter
    GNU_CONFIGURE -> HAS_CONFIGURE since it's not generated by autoconf

Total # of ports modified:  1,027
Total # of ports affected: ~7,000 (set GNU_CONFIGURE to yes)

PR:		126524 (obsoletes 52917)
Submitted by:	rafan
Tested on:	two pointyhat 7-amd64 exp runs (by pav)
Approved by:	portmgr (pav)
@
text
@d30 1
a30 1
LIB_DEPENDS+=	clamav:${PORTSDIR}/security/clamav
@


1.2
log
@- Update libevent dependency and bump PORTREVISION
@
text
@a23 1
CONFIGURE_TARGET=	--build=${MACHINE_ARCH}-portbld-freebsd${OSREL}
@


1.1
log
@SpyBye is a tool to help web masters determine if their web pages
are hosting browser exploits that can infect visiting users with
malware. It functions as an HTTP proxy server and intercepts all
browser requests. SpyBye uses a few simple rules to determine if
embedded links on your web page are harmlesss, unknown or maybe
even dangerous.

SpyBye analyzes all downloads in the background and provides you
with a warning notification whenever it encounters content that
is potentially malicious. At that point, you can click on the link
in the notification and receive a more detailed analysis of the web page.

WWW: http://www.spybye.org/

PR:		ports/123945
Submitted by:	Paul Schmel <pauls utdallas.edu>
Approved by:	tabthorpe (mentor)
@
text
@d10 1
d17 1
a17 1
BUILD_DEPENDS=	event_rpcgen.py:${PORTSDIR}/devel/libevent
@

