summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDiego Elio Pettenò <flameeyes@gentoo.org>2012-03-20 23:01:53 +0000
committerDiego Elio Pettenò <flameeyes@gentoo.org>2012-03-20 23:01:53 +0000
commit9db30f9beaa8202b618dc7aed371352fc136ccc6 (patch)
tree96669e5981044c67f12cdac0327d6894a42dadbe /www-apache/modsecurity-crs
parentSmall update, mark proper license and introduce tools useflag in the live ebuild (diff)
downloadhistorical-9db30f9beaa8202b618dc7aed371352fc136ccc6.tar.gz
historical-9db30f9beaa8202b618dc7aed371352fc136ccc6.tar.bz2
historical-9db30f9beaa8202b618dc7aed371352fc136ccc6.zip
Version bump.
Package-Manager: portage-2.2.0_alpha92/cvs/Linux x86_64
Diffstat (limited to 'www-apache/modsecurity-crs')
-rw-r--r--www-apache/modsecurity-crs/ChangeLog8
-rw-r--r--www-apache/modsecurity-crs/Manifest14
-rw-r--r--www-apache/modsecurity-crs/modsecurity-crs-2.2.4.ebuild78
3 files changed, 88 insertions, 12 deletions
diff --git a/www-apache/modsecurity-crs/ChangeLog b/www-apache/modsecurity-crs/ChangeLog
index a5ace714b807..2e9fb9f41328 100644
--- a/www-apache/modsecurity-crs/ChangeLog
+++ b/www-apache/modsecurity-crs/ChangeLog
@@ -1,6 +1,12 @@
# ChangeLog for www-apache/modsecurity-crs
# Copyright 1999-2012 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/ChangeLog,v 1.18 2012/02/24 15:07:17 phajdan.jr Exp $
+# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/ChangeLog,v 1.19 2012/03/20 23:01:53 flameeyes Exp $
+
+*modsecurity-crs-2.2.4 (20 Mar 2012)
+
+ 20 Mar 2012; Diego E. Pettenò <flameeyes@gentoo.org>
+ +modsecurity-crs-2.2.4.ebuild:
+ Version bump.
24 Feb 2012; Pawel Hajdan jr <phajdan.jr@gentoo.org>
modsecurity-crs-2.2.3.ebuild:
diff --git a/www-apache/modsecurity-crs/Manifest b/www-apache/modsecurity-crs/Manifest
index dc508aeeb26b..deeab79290ff 100644
--- a/www-apache/modsecurity-crs/Manifest
+++ b/www-apache/modsecurity-crs/Manifest
@@ -1,16 +1,8 @@
------BEGIN PGP SIGNED MESSAGE-----
-Hash: SHA512
-
DIST modsecurity-crs_2.1.2.tar.gz 173951 RMD160 4c4b23388e0455afb12cd0eed8d8d01bf5ca9392 SHA1 206bcb2392477187696efbad788cd86e722303db SHA256 78216d659b13dc18ab25bd6e01d58e5b636edf6a20666629f462e2fabea068a7
DIST modsecurity-crs_2.2.3.tar.gz 293253 RMD160 d5148c0ff00258072b7149eb82d818503e16d057 SHA1 a8ab729f97e477ecc680427ed58865fa6b03b41d SHA256 307005d09c57476cbf0bf3881845c27d056723be01cdbdf25f839759c48a2833
+DIST modsecurity-crs_2.2.4.tar.gz 296026 RMD160 aa941b0a7fcabff790c7044cf820ada2579b2b04 SHA1 d55b90717d3d6f98b121408e897ed1589c65bfae SHA256 0a9aabb78ca3e214c5b67f2369aeaee108054174572ac7b2f78a31851d26cb41
EBUILD modsecurity-crs-2.1.2.ebuild 2113 RMD160 38e3ec68256f80326f992a8ee5c0444f2928ff00 SHA1 76d42bdb021da80385705050173ff22be1308fdd SHA256 f07fc795b1a9d85f61d4c7c017e277a32fb28242be4e5d3d581f26406816c0ef
EBUILD modsecurity-crs-2.2.3.ebuild 2122 RMD160 9f9c386d93dac79850f8b04899f2d14a4940ddd0 SHA1 bd4e32f74d33f9b0bb64a919b1ad2e6017339fc2 SHA256 38b92180b4d203d1bf9c1c33edbd5e40aeff0a1c1a3d37fc3b70ce6ed79f9bcb
-MISC ChangeLog 3012 RMD160 1f15074e3737193452a9f65c0ecf1679b363df47 SHA1 28f8598ea0f8d982089f90e55a84c927cfc33233 SHA256 4162f5b98a77ada41d2b4f77c3682409d6e587122e508271ba36a8d414b920e4
+EBUILD modsecurity-crs-2.2.4.ebuild 2123 RMD160 0c958319c376571583795bcf68b372f1fbe6019f SHA1 6cf585f83eb9ae47fb6cb81e6fff47975ad015d4 SHA256 b706455777caf25b3c35054c25970acd12ee77f6cc5c391438b896bde8f2b7be
+MISC ChangeLog 3155 RMD160 4cec5d346eeb0e4afdcb19fc9096e2936e0f11ed SHA1 4ff88891cfb1e7708039ae16c8a898cbec341029 SHA256 23e27225b3d34307014a2089b54583de596633e1cb938d320b0213a52b74af06
MISC metadata.xml 267 RMD160 511ac4eac08cf7c7598b7f0dd2c2a7b54b2a6d17 SHA1 7cfd482a8ab9b30e3e424c19cfef49ccc93013c8 SHA256 0c11886362b779764fbeda77806037b3625b1c11375b7ecc1b7ad3e20ec6a1ac
------BEGIN PGP SIGNATURE-----
-Version: GnuPG v2.0.17 (GNU/Linux)
-
-iEYEAREKAAYFAk9Hp6sACgkQuUQtlDBCeQJCGwCdHb4T1jFpSvUUzidH4E+Rl9S+
-hLMAniFnWzUPjM9xja/f0gty8O+sJbPP
-=V9Ui
------END PGP SIGNATURE-----
diff --git a/www-apache/modsecurity-crs/modsecurity-crs-2.2.4.ebuild b/www-apache/modsecurity-crs/modsecurity-crs-2.2.4.ebuild
new file mode 100644
index 000000000000..5676bfe4a1cd
--- /dev/null
+++ b/www-apache/modsecurity-crs/modsecurity-crs-2.2.4.ebuild
@@ -0,0 +1,78 @@
+# Copyright 1999-2012 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/modsecurity-crs-2.2.4.ebuild,v 1.1 2012/03/20 23:01:53 flameeyes Exp $
+
+EAPI=4
+
+DESCRIPTION="Core Rule Set for ModSecurity"
+HOMEPAGE="http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project"
+SRC_URI="mirror://sourceforge/mod-security/${PN}_${PV}.tar.gz"
+
+LICENSE="Apache-2.0"
+SLOT="0"
+KEYWORDS="~amd64 ~ppc ~sparc ~x86"
+IUSE=""
+
+RDEPEND=">=www-apache/mod_security-2.5.13-r1"
+DEPEND=""
+
+S="${WORKDIR}/${PN}_${PV}"
+
+RULESDIR=/etc/modsecurity
+
+src_install() {
+ insinto "${RULESDIR}"/base_rules
+ doins base_rules/*
+
+ insinto "${RULESDIR}"/optional_rules
+ doins optional_rules/*
+
+ insinto "${RULESDIR}"/experimental_rules
+ doins experimental_rules/*
+
+ dodoc CHANGELOG README
+
+ (
+ cat - <<EOF
+<IfDefine SECURITY>
+EOF
+
+ cat modsecurity_crs_10_config.conf.example
+
+ cat - <<EOF
+
+Include /etc/modsecurity/base_rules/*.conf
+
+# Optionally use the other rules as well
+# Include /etc/modsecurity/optional_rules/*.conf
+# Include /etc/modsecurity/experimental_rules/*.conf
+</IfDefine>
+
+# -*- apache -*-
+# vim: ts=4 filetype=apache
+
+EOF
+ ) > "${T}"/"80_${PN}.conf"
+
+ insinto /etc/apache2/modules.d/
+ doins "${T}"/"80_${PN}.conf"
+}
+
+pkg_postinst() {
+ elog
+ elog "If you want to enable further rules, check the following directories:"
+ elog " ${RULESDIR}/optional_rules"
+ elog " ${RULESDIR}/experimental_rules"
+ elog ""
+ elog "Starting from version 2.0.9, the default for the Core Rule Set is again to block"
+ elog "when rules hit. If you wish to go back to the 2.0.8 method of anomaly scoring, you"
+ elog "should change 80_${PN}.conf so that you have these settings enabled:"
+ elog ""
+ elog " #SecDefaultAction \"phase:2,deny,log\""
+ elog " SecAction \"phase:1,t:none,nolog,pass,setvar:tx.anomaly_score_blocking=on\""
+ elog ""
+ elog "Starting from version 2.1.2 rules are installed, for consistency, under"
+ elog "/etc/modsecurity, and can be configured with the following file:"
+ elog " /etc/apache2/modules.d/80_${PN}.conf"
+ elog ""
+}