diff options
author | Diego Elio Pettenò <flameeyes@gentoo.org> | 2012-06-16 18:00:11 +0000 |
---|---|---|
committer | Diego Elio Pettenò <flameeyes@gentoo.org> | 2012-06-16 18:00:11 +0000 |
commit | d8c124f5698684ebf837c99b61ef0b7c2be78d8b (patch) | |
tree | 88c72e8b682fd39e94dddee91cd9f8c9c1d1eb7a /www-apache | |
parent | Mask dev-perl/Tie-RegexpHash for removal (#421461) (diff) | |
download | historical-d8c124f5698684ebf837c99b61ef0b7c2be78d8b.tar.gz historical-d8c124f5698684ebf837c99b61ef0b7c2be78d8b.tar.bz2 historical-d8c124f5698684ebf837c99b61ef0b7c2be78d8b.zip |
Version bump.
Package-Manager: portage-2.2.0_alpha110/cvs/Linux x86_64
Diffstat (limited to 'www-apache')
-rw-r--r-- | www-apache/modsecurity-crs/ChangeLog | 8 | ||||
-rw-r--r-- | www-apache/modsecurity-crs/Manifest | 16 | ||||
-rw-r--r-- | www-apache/modsecurity-crs/modsecurity-crs-2.2.5.ebuild | 78 |
3 files changed, 96 insertions, 6 deletions
diff --git a/www-apache/modsecurity-crs/ChangeLog b/www-apache/modsecurity-crs/ChangeLog index 2ef8379ad8f7..b6187e09237b 100644 --- a/www-apache/modsecurity-crs/ChangeLog +++ b/www-apache/modsecurity-crs/ChangeLog @@ -1,6 +1,12 @@ # ChangeLog for www-apache/modsecurity-crs # Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/ChangeLog,v 1.20 2012/03/25 13:51:30 ranger Exp $ +# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/ChangeLog,v 1.21 2012/06/16 18:00:11 flameeyes Exp $ + +*modsecurity-crs-2.2.5 (16 Jun 2012) + + 16 Jun 2012; Diego E. Pettenò <flameeyes@gentoo.org> + +modsecurity-crs-2.2.5.ebuild: + Version bump. 25 Mar 2012; Brent Baude <ranger@gentoo.org> modsecurity-crs-2.2.4.ebuild: Marking modsecurity-crs-2.2.4 ppc for bug 409199 diff --git a/www-apache/modsecurity-crs/Manifest b/www-apache/modsecurity-crs/Manifest index 12d8d6d04a52..188abbbf4f16 100644 --- a/www-apache/modsecurity-crs/Manifest +++ b/www-apache/modsecurity-crs/Manifest @@ -4,15 +4,21 @@ Hash: SHA1 DIST modsecurity-crs_2.1.2.tar.gz 173951 RMD160 4c4b23388e0455afb12cd0eed8d8d01bf5ca9392 SHA1 206bcb2392477187696efbad788cd86e722303db SHA256 78216d659b13dc18ab25bd6e01d58e5b636edf6a20666629f462e2fabea068a7 DIST modsecurity-crs_2.2.3.tar.gz 293253 RMD160 d5148c0ff00258072b7149eb82d818503e16d057 SHA1 a8ab729f97e477ecc680427ed58865fa6b03b41d SHA256 307005d09c57476cbf0bf3881845c27d056723be01cdbdf25f839759c48a2833 DIST modsecurity-crs_2.2.4.tar.gz 289549 RMD160 ec202b488c3b8447a8d4d6ceb4d1d09d97b14027 SHA1 399d3b43016dba815cd9f1d0cf3dd2c2ac48ad7d SHA256 f9d9734de4e6d7f7b568b598ac7ab40ccaab19af5dc8efc662d6f3194575da35 +DIST modsecurity-crs_2.2.5.tar.gz 295400 RMD160 61d61bc5b9cebd666a66da65ca7d1b365ded111e SHA1 8e6f8494e0856eb729297d05409cc960e79c3370 SHA256 7036b73d5656333b777ea725b8ae4fbea56ca01c12106297e2e2f54a2084b210 EBUILD modsecurity-crs-2.1.2.ebuild 2113 RMD160 38e3ec68256f80326f992a8ee5c0444f2928ff00 SHA1 76d42bdb021da80385705050173ff22be1308fdd SHA256 f07fc795b1a9d85f61d4c7c017e277a32fb28242be4e5d3d581f26406816c0ef EBUILD modsecurity-crs-2.2.3.ebuild 2122 RMD160 9f9c386d93dac79850f8b04899f2d14a4940ddd0 SHA1 bd4e32f74d33f9b0bb64a919b1ad2e6017339fc2 SHA256 38b92180b4d203d1bf9c1c33edbd5e40aeff0a1c1a3d37fc3b70ce6ed79f9bcb EBUILD modsecurity-crs-2.2.4.ebuild 2119 RMD160 04a6bb1a362c465711459a5ef833f6cd69a5c097 SHA1 e43b9f64e8984f0c73ace2096f89af11844e9c24 SHA256 32b8bfa7ac324af76f09a3436f7e3c7cf7796320c0fe206bbf7ba5ffbbc27583 -MISC ChangeLog 3281 RMD160 939adecfbeb1cfc1fe5e1bf58845c47c28ef272f SHA1 de2148591b9cf20fe766e3ee2418460f8ed94af0 SHA256 4f422c0c7fa9bd1971c90684a4ce771abddc76c8b24ce8426f3d491e7eb985f2 +EBUILD modsecurity-crs-2.2.5.ebuild 2123 RMD160 6cea5c8a5b6970c23a2fa470fde4de256f30ad75 SHA1 edaf97499a63eea9abdd8d217be7b8935c0ca58a SHA256 46500b68bfc39b072280e94a3194add4be4210dee2a1fe83d724c9c6fcf974ac +MISC ChangeLog 3428 RMD160 83ab7fbe2cf4a5818b5a238ba2dccffcc57bad2c SHA1 5ec8f246b04d0d29dda66a9a8f1ad1f74ed25960 SHA256 16d152cb95bc58ed774f61b6f9134e18ae7e6d5591a1b14a5eb9aaa32e2ba915 MISC metadata.xml 267 RMD160 511ac4eac08cf7c7598b7f0dd2c2a7b54b2a6d17 SHA1 7cfd482a8ab9b30e3e424c19cfef49ccc93013c8 SHA256 0c11886362b779764fbeda77806037b3625b1c11375b7ecc1b7ad3e20ec6a1ac -----BEGIN PGP SIGNATURE----- -Version: GnuPG v2.0.18 (GNU/Linux) +Version: GnuPG v2.0.19 (GNU/Linux) -iEYEARECAAYFAk9wmbAACgkQAiZjviIA2XiuggCgrIt0SHLdlqGJGjwswXxkt7sS -5vgAn2oAF8p06fkFwjhvf4sb4JMysZfq -=gl6e +iQEcBAEBAgAGBQJP3MndAAoJEBzRPIrUMBNCwmYIAIPwefxCUr1R51XtfxjHlMrq +BUf7P19UY8UaKsRqkineWzykUh7EmDAWxa27n+pkgJJ0+wEJETgqY1S8v+5SeQo2 +xcC79xoXVgHnQ1izbZGtibJzk+FdvCTktrbo+69vvwURNLhMsUjV0RphF5LliRny +d+ivN8n/Y03aolEKyOmu703fYAYKUkTv9vKWkDwaxAUgKNefZaDX4mFjLTctSIHZ +DFm+bdV6ipreWUqa+fhpqrBJ4DQHhB4avlgW/CiLaZ5QQ8Z2OC5UMhNcS1tGqYSg +MUfoDGCdYXAe6EwbTEbRjMSYNW15moNMn+eo/rhogqqo+T4iJPJQ4rtdsDGwjDU= +=KgYI -----END PGP SIGNATURE----- diff --git a/www-apache/modsecurity-crs/modsecurity-crs-2.2.5.ebuild b/www-apache/modsecurity-crs/modsecurity-crs-2.2.5.ebuild new file mode 100644 index 000000000000..7c8d5d803165 --- /dev/null +++ b/www-apache/modsecurity-crs/modsecurity-crs-2.2.5.ebuild @@ -0,0 +1,78 @@ +# Copyright 1999-2012 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/modsecurity-crs-2.2.5.ebuild,v 1.1 2012/06/16 18:00:11 flameeyes Exp $ + +EAPI=4 + +DESCRIPTION="Core Rule Set for ModSecurity" +HOMEPAGE="http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project" +SRC_URI="mirror://sourceforge/mod-security/${PN}_${PV}.tar.gz" + +LICENSE="Apache-2.0" +SLOT="0" +KEYWORDS="~amd64 ~ppc ~sparc ~x86" +IUSE="" + +RDEPEND=">=www-apache/mod_security-2.5.13-r1" +DEPEND="" + +S="${WORKDIR}/${PN}_${PV}" + +RULESDIR=/etc/modsecurity + +src_install() { + insinto "${RULESDIR}"/base_rules + doins base_rules/* + + insinto "${RULESDIR}"/optional_rules + doins optional_rules/* + + insinto "${RULESDIR}"/experimental_rules + doins experimental_rules/* + + dodoc CHANGELOG README + + ( + cat - <<EOF +<IfDefine SECURITY> +EOF + + cat modsecurity_crs_10_config.conf.example + + cat - <<EOF + +Include /etc/modsecurity/base_rules/*.conf + +# Optionally use the other rules as well +# Include /etc/modsecurity/optional_rules/*.conf +# Include /etc/modsecurity/experimental_rules/*.conf +</IfDefine> + +# -*- apache -*- +# vim: ts=4 filetype=apache + +EOF + ) > "${T}"/"80_${PN}.conf" + + insinto /etc/apache2/modules.d/ + doins "${T}"/"80_${PN}.conf" +} + +pkg_postinst() { + elog + elog "If you want to enable further rules, check the following directories:" + elog " ${RULESDIR}/optional_rules" + elog " ${RULESDIR}/experimental_rules" + elog "" + elog "Starting from version 2.0.9, the default for the Core Rule Set is again to block" + elog "when rules hit. If you wish to go back to the 2.0.8 method of anomaly scoring, you" + elog "should change 80_${PN}.conf so that you have these settings enabled:" + elog "" + elog " #SecDefaultAction \"phase:2,deny,log\"" + elog " SecAction \"phase:1,t:none,nolog,pass,setvar:tx.anomaly_score_blocking=on\"" + elog "" + elog "Starting from version 2.1.2 rules are installed, for consistency, under" + elog "/etc/modsecurity, and can be configured with the following file:" + elog " /etc/apache2/modules.d/80_${PN}.conf" + elog "" +} |