Port details |
- mod_accesscookie Supply access control based cookies stored in a MySQL database
- 0.4 www
=0 0.4Version of this port present on the latest quarterly branch. DEPRECATED: upstream is gone
This port expired on: 2011-01-02
- Maintainer: apache@FreeBSD.org
 - Port Added: 2004-04-16 15:57:41
- Last Update: 2011-01-03 14:38:01
- SVN Revision: UNKNOWN
- License: not specified in port
- Description:
- This module restricts access in the same way as an 'allow from'
does (it is derived form this module :), by checking for the exinstence of
a cookie. If a cookie is present it compares it to cookies found in a
mySQL database. If it can find a equivalent cookie there, access is
granted, else access is denied.
cgit ¦ GitHub ¦ GitHub ¦ GitLab ¦ 
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - There is no configure plist information for this port.
- Dependency lines:
-
- ap13-mod_accessCookie>0:www/mod_accesscookie
- No installation instructions:
- This port has been deleted.
- PKGNAME: ap13-mod_accessCookie
- Flavors: there is no flavor information for this port.
- distinfo:
- There is no distinfo for this port.
No package information for this port in our database- Sometimes this happens. Not all ports have packages. Perhaps there is a build error. Check the fallout link:

- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- apxs : www/apache13
- Runtime dependencies:
-
- apxs : www/apache13
- Library dependencies:
-
- mysqlclient.14 : databases/mysql41-client
- There are no ports dependent upon this port
Configuration Options:
- No options to configure
- Options name:
- N/A
- FreshPorts was unable to extract/find any pkg message
- Master Sites:
|
Number of commits found: 8
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
0.4 03 Jan 2011 14:38:01
 |
garga  |
Remove expired ports:
2011-01-01 audio/emphasis: abandoned upstream
2011-01-01 converters/ecore-txt: abandoned upstream
2011-01-01 deskutils/estickies: abandoned upstream
2011-01-01 devel/ecore-job: abandoned upstream
2011-01-01 devel/engrave: abandoned upstream
2011-01-01 devel/evfs: abandoned upstream
2011-01-01 devel/ruby-ecore: abandoned upstream
2011-01-01 graphics/exhibit: abandoned upstream
2011-01-01 graphics/epsilon: abandoned upstream
2011-01-01 graphics/esmart: abandoned upstream
2011-01-01 graphics/ruby-edje: abandoned upstream
2011-01-01 graphics/ruby-esmart: abandoned upstream
2011-01-01 graphics/ruby-evas: abandoned upstream (Only the first 15 lines of the commit message are shown above ) |
0.4 20 Oct 2010 03:24:22
 |
pgollucci  |
- Set EXPIRATION_DATE, DEPRECATED for mod_ ports who's upstream is toast
With Hat: apache@ |
0.4 17 May 2009 07:24:35
 |
pgollucci  |
- Mark SAFE apache@ ports MAKE_JOBS_SAFE=yes |
0.4 04 Dec 2005 14:14:41
 |
clement  |
----------------------------------------------------------------------
ports/www/mod_accesscookie/distinfo CVS:
ports/www/mod_access_referer/distinfo CVS:
ports/www/mod_access_identd/distinfo CVS:
ports/www/mod_auth_cookie_mysql/distinfo CVS:
ports/www/mod_auth_imap/distinfo CVS:
ports/www/mod_auth_useragent/distinfo CVS: ports/www/mod_curb/distinfo
ports/www/mod_macro/distinfo CVS:
----------------------------------------------------------------------
Force commit to note that those ports has also been SHA256'ified |
0.4 04 Dec 2005 14:08:56
 |
clement  |
- Fix a condition in bsd.apache.mk
- all apache 1.3 only modules maintained by apache@ are now bsd.apache.mk
compliant |
0.4 04 Dec 2005 00:18:15
 |
clement  |
- prepare removal of www/apache2 in favor of www/apache20 for naming
consistency
- add entries in UPDATING (for apache22 too)
PR: ports/78119
Repocopied by: marcus |
0.4 18 Aug 2004 16:21:56
 |
clement  |
- Assign maintainership to freshly created apache@ mailing list |
0.4 16 Apr 2004 15:57:00
 |
clement  |
Add mod_accessCookie 0.4.
This module restricts access in the same way as an 'allow from'
does (it is derived form this module :), by checking for the exinstence of
a cookie. If a cookie is present it compares it to cookies found in a
mySQL database. If it can find a equivalent cookie there, access is
granted, else access is denied. |
Number of commits found: 8
|