From 7eb893cb946eeffb5dfe37b6ead444359469b04c Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C3=89ric=20Gaspar?= <46165813+ericgaspar@users.noreply.github.com> Date: Wed, 31 Aug 2022 23:21:00 +0200 Subject: [PATCH] Update install --- scripts/install | 8 -------- 1 file changed, 8 deletions(-) diff --git a/scripts/install b/scripts/install index 8ac2dc8..8ad274c 100644 --- a/scripts/install +++ b/scripts/install @@ -87,14 +87,6 @@ ynh_app_setting_set --app=$app --key=final_path --value=$final_path # Download, check integrity, uncompress and patch the source from app.src ynh_setup_source --dest_dir="$final_path/app" -ynh_script_progression --message="Patching CVE-2022-29360 code vulnerability..." --weight=1 -# Deploy CVE-2022-29360 patch -version=$(ynh_app_upstream_version) -# FIXME because we need to apply the patch manually with --binary flag -# while we should be able to simply use the patching feature of ynh_setup_source -ynh_add_config --template="../sources/patches/app-CVE-2022-29360.patch.template" --destination="../sources/patches/FIXMEapp-CVE-2022-29360.patch" -patch --silent --binary $final_path/app/rainloop/v/$version/app/libraries/MailSo/Base/HtmlUtils.php < ../sources/patches/FIXMEapp-CVE-2022-29360.patch - #================================================= # PHP-FPM CONFIGURATION #=================================================