summaryrefslogtreecommitdiffstats
path: root/meta-webserver/recipes-webadmin/webmin/webmin_1.750.bb
Commit message (Collapse)AuthorAgeFilesLines
* webmin: upgrade to version 1.801Derek Straka2016-08-051-155/+0
| | | | | Signed-off-by: Derek Straka <derek@asterius.io> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* webmin: adjust mysql module default configDiego Rondini2016-02-251-0/+1
| | | | | | | | Default config of the mysql Webmin module uses paths of a manually installed MySQL. This commit adjusts paths to the ones used by MariaDB in OE. Signed-off-by: Diego Rondini <diego.ml@zoho.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* webmin: remove perl-module-sdbm from RDEPENDSQi.Chen@windriver.com2015-10-231-1/+1
| | | | | | | | | | Remove 'perl-module-sdbm' from RDEPENDS as perl don't build out this module. This also fixes the following warning. WARNING: QA Issue: webmin rdepends on perl-module-sdbm, but it isn't a build dependency? [build-deps] Signed-off-by: Chen Qi <Qi.Chen@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* webmin: fix QA host-user-contaminatedAnders Darander2015-10-231-1/+4
| | | | | | | | | | | | | | Due to the way most files were installed, using cp ..., during packaging we got spammed with messages like: WARNING: QA Issue: webmin: /webmin-module-fail2ban/usr/lib/webmin/webmin/fail2ban/lang/no is owned by gid 100, which is the same as the user running bitbake. This may be due to host contamination [host-user-contaminated] WARNING: QA Issue: webmin: /webmin-module-system-status/usr/lib/webmin/webmin/system-status/lang/no is owned by gid 100, which is the same as the user running bitbake. This may be due to host contamination [host-user-contaminated] Do the install in a similar way as is done in bin_package.bbclass. By doing that, we're not getting any QA-errors from host-user-contaminated. Signed-off-by: Anders Darander <anders@chargestorm.se> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* webmin: upgrade to 1.750Roy Li2015-06-081-0/+151
1. Upgrade to fix the CVE: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1377 2. update the patch remove-startup-option.patch Signed-off-by: Roy Li <rongqing.li@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>