diff options
author | Christian Heim <phreak@gentoo.org> | 2007-07-29 13:47:06 +0000 |
---|---|---|
committer | Christian Heim <phreak@gentoo.org> | 2007-07-29 13:47:06 +0000 |
commit | 96b1c33acd87611c93dfd1adf6622e650e7f6732 (patch) | |
tree | 71f2933c47d1022621ae8fd559558cc83ecebd17 /www-apache/mod_security/files | |
parent | Version bump. (diff) | |
download | gentoo-2-96b1c33acd87611c93dfd1adf6622e650e7f6732.tar.gz gentoo-2-96b1c33acd87611c93dfd1adf6622e650e7f6732.tar.bz2 gentoo-2-96b1c33acd87611c93dfd1adf6622e650e7f6732.zip |
Moving net-www/mod_security to www-apache/mod_security (#81244).
(Portage version: 2.1.3_rc9)
Diffstat (limited to 'www-apache/mod_security/files')
4 files changed, 29 insertions, 0 deletions
diff --git a/www-apache/mod_security/files/99_mod_security-2.1.1.conf b/www-apache/mod_security/files/99_mod_security-2.1.1.conf new file mode 100644 index 000000000000..78344cde8c87 --- /dev/null +++ b/www-apache/mod_security/files/99_mod_security-2.1.1.conf @@ -0,0 +1,8 @@ +<IfDefine SECURITY> + <IfModule !mod_security2.c> + LoadModule security2_module modules/mod_security2.so + </IfModule> + + # use Core Rule Set by default: + Include /etc/apache2/modules.d/mod_security/*.conf +</IfDefine> diff --git a/www-apache/mod_security/files/digest-mod_security-2.1.1 b/www-apache/mod_security/files/digest-mod_security-2.1.1 new file mode 100644 index 000000000000..af3a5b2f6338 --- /dev/null +++ b/www-apache/mod_security/files/digest-mod_security-2.1.1 @@ -0,0 +1,3 @@ +MD5 ab74ed5f320ffc4ed9f56487bf17c670 modsecurity-apache_2.1.1.tar.gz 650607 +RMD160 17e94c19d51f7e9e09ef435f81d696ec638aad44 modsecurity-apache_2.1.1.tar.gz 650607 +SHA256 fadeb3b4ce5672c99c094611792b827d45fcd6b38c4c4fa81c4cfdc63c63b71a modsecurity-apache_2.1.1.tar.gz 650607 diff --git a/www-apache/mod_security/files/digest-mod_security-2.1.1-r1 b/www-apache/mod_security/files/digest-mod_security-2.1.1-r1 new file mode 100644 index 000000000000..af3a5b2f6338 --- /dev/null +++ b/www-apache/mod_security/files/digest-mod_security-2.1.1-r1 @@ -0,0 +1,3 @@ +MD5 ab74ed5f320ffc4ed9f56487bf17c670 modsecurity-apache_2.1.1.tar.gz 650607 +RMD160 17e94c19d51f7e9e09ef435f81d696ec638aad44 modsecurity-apache_2.1.1.tar.gz 650607 +SHA256 fadeb3b4ce5672c99c094611792b827d45fcd6b38c4c4fa81c4cfdc63c63b71a modsecurity-apache_2.1.1.tar.gz 650607 diff --git a/www-apache/mod_security/files/mod_security-2.1.1-request_interception.patch b/www-apache/mod_security/files/mod_security-2.1.1-request_interception.patch new file mode 100644 index 000000000000..5f38268e203d --- /dev/null +++ b/www-apache/mod_security/files/mod_security-2.1.1-request_interception.patch @@ -0,0 +1,15 @@ +Index: apache2/mod_security2.c +=================================================================== +--- apache2/mod_security2.c (revision 266) ++++ apache2/mod_security2.c (working copy) +@@ -558,6 +558,10 @@ + + /* Has this phase been completed already? */ + if (msr->phase_request_body_complete) { ++ if (msr->was_intercepted) { ++ msr_log(msr, 4, "Phase REQUEST_BODY subrequest already intercepted with code %u.", msr->intercept_actionset->intercept_status); ++ return msr->intercept_actionset->intercept_status; ++ } + if (msr->txcfg->debuglog_level >= 4) { + msr_log(msr, 4, "Phase REQUEST_BODY already complete, skipping."); + } |