diff options
author | 2010-12-31 13:03:26 +0000 | |
---|---|---|
committer | 2010-12-31 13:03:26 +0000 | |
commit | 300265247b5b234a2a63c364b4edd2d756d53461 (patch) | |
tree | 89548b3538235f76f41fc4bfb2329f22f7e6d76d /www-apache | |
parent | Remove gemcutter dependency from gemspec: it is optional and not important fo... (diff) | |
download | gentoo-2-300265247b5b234a2a63c364b4edd2d756d53461.tar.gz gentoo-2-300265247b5b234a2a63c364b4edd2d756d53461.tar.bz2 gentoo-2-300265247b5b234a2a63c364b4edd2d756d53461.zip |
Version bump, this version introduces experimental rules as well.
(Portage version: 2.2.0_alpha10/cvs/Linux x86_64)
Diffstat (limited to 'www-apache')
-rw-r--r-- | www-apache/modsecurity-crs/ChangeLog | 8 | ||||
-rw-r--r-- | www-apache/modsecurity-crs/modsecurity-crs-2.1.1.ebuild | 70 |
2 files changed, 77 insertions, 1 deletions
diff --git a/www-apache/modsecurity-crs/ChangeLog b/www-apache/modsecurity-crs/ChangeLog index f6bb760a65ab..5e0299bb090b 100644 --- a/www-apache/modsecurity-crs/ChangeLog +++ b/www-apache/modsecurity-crs/ChangeLog @@ -1,6 +1,12 @@ # ChangeLog for www-apache/modsecurity-crs # Copyright 1999-2010 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/ChangeLog,v 1.5 2010/12/03 01:34:34 flameeyes Exp $ +# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/ChangeLog,v 1.6 2010/12/31 13:03:26 flameeyes Exp $ + +*modsecurity-crs-2.1.1 (31 Dec 2010) + + 31 Dec 2010; Diego E. Pettenò <flameeyes@gentoo.org> + +modsecurity-crs-2.1.1.ebuild: + Version bump, this version introduces experimental rules as well. 03 Dec 2010; Diego E. Pettenò <flameeyes@gentoo.org> modsecurity-crs-2.0.10.ebuild: diff --git a/www-apache/modsecurity-crs/modsecurity-crs-2.1.1.ebuild b/www-apache/modsecurity-crs/modsecurity-crs-2.1.1.ebuild new file mode 100644 index 000000000000..4e0ea5d36571 --- /dev/null +++ b/www-apache/modsecurity-crs/modsecurity-crs-2.1.1.ebuild @@ -0,0 +1,70 @@ +# Copyright 1999-2010 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/modsecurity-crs-2.1.1.ebuild,v 1.1 2010/12/31 13:03:26 flameeyes Exp $ + +EAPI=2 + +DESCRIPTION="Core Rule Set for ModSecurity" +HOMEPAGE="http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project" +SRC_URI="mirror://sourceforge/mod-security/${PN}_${PV}.tar.gz" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="~amd64 ~sparc ~x86" +IUSE="vanilla" + +RDEPEND=">=www-apache/mod_security-2.5.12-r1" +DEPEND="" + +S="${WORKDIR}/${PN}_${PV}" + +RULESDIR=/etc/apache2/modules.d/mod_security + +src_install() { + insinto "${RULESDIR}" || die + doins base_rules/* || die + + # these are considered examples, but we install them anyway, and let + # etc-update deal with them. + for file in *.conf.example; do + newins "${file}" "${file%.example}" || die "failed to install ${file}" + done + + insinto "${RULESDIR}"/optional_rules + doins optional_rules/* || die + + insinto "${RULESDIR}"/experimental_rules + doins experimental_rules/* || die + + if ! use vanilla; then + mv "${D}${RULESDIR}"/modsecurity_*50_outbound* \ + "${D}${RULESDIR}"/optional_rules || die + fi + + dodoc CHANGELOG README || die +} + +pkg_postinst() { + if ! use vanilla; then + elog "Please note that the Core Rule Set is quite draconic; to make it more usable," + elog "the Gentoo distribution disables a few rule set files, that are relevant for" + elog "PHP-only websites or that would make it kill a website that discussed of source code." + else + elog "You decided to enable the original Core Rule Set from ModSecurity." + elog "Be warned that the original Core Rule Set is draconic and most likely will" + elog "render your web application unusable if you don't disable at leat some of" + elog "the rules." + fi + elog + elog "If you want to enable further rules, check the following directories:" + elog " ${APACHE_MODULES_CONFDIR}/mod_security/optional_rules" + elog " ${APACHE_MODULES_CONFDIR}/mod_security/experimental_rules" + elog "" + elog "Starting from version 2.0.9, the default for the Core Rule Set is again to block" + elog "when rules hit. If you wish to go back to the 2.0.8 method of anomaly scoring, you" + elog "should change modsecurity_crs_10_config.conf so that you have these settings enabled:" + elog "" + elog " #SecDefaultAction \"phase:2,deny,log\"" + elog " SecAction \"phase:1,t:none,nolog,pass,setvar:tx.anomaly_score_blocking=on\"" + elog "" +} |