diff options
author | Diego Elio Pettenò <flameeyes@gentoo.org> | 2011-04-19 05:19:45 +0000 |
---|---|---|
committer | Diego Elio Pettenò <flameeyes@gentoo.org> | 2011-04-19 05:19:45 +0000 |
commit | 5d2843d6f98f665cb6eed5ec26dde9cb830e2a59 (patch) | |
tree | 64e8520d775ef5440e06c4c843dc359cd26010f0 /www-apache/modsecurity-crs | |
parent | Add maintainer to metadata.xml (diff) | |
download | gentoo-2-5d2843d6f98f665cb6eed5ec26dde9cb830e2a59.tar.gz gentoo-2-5d2843d6f98f665cb6eed5ec26dde9cb830e2a59.tar.bz2 gentoo-2-5d2843d6f98f665cb6eed5ec26dde9cb830e2a59.zip |
Remove old versions.
(Portage version: 2.2.0_alpha30/cvs/Linux x86_64)
Diffstat (limited to 'www-apache/modsecurity-crs')
4 files changed, 6 insertions, 207 deletions
diff --git a/www-apache/modsecurity-crs/ChangeLog b/www-apache/modsecurity-crs/ChangeLog index d0724d70dbc1..36c95ed8be20 100644 --- a/www-apache/modsecurity-crs/ChangeLog +++ b/www-apache/modsecurity-crs/ChangeLog @@ -1,6 +1,11 @@ # ChangeLog for www-apache/modsecurity-crs # Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/ChangeLog,v 1.8 2011/03/23 23:26:32 flameeyes Exp $ +# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/ChangeLog,v 1.9 2011/04/19 05:19:45 flameeyes Exp $ + + 19 Apr 2011; Diego E. Pettenò <flameeyes@gentoo.org> + -modsecurity-crs-2.0.8.ebuild, -modsecurity-crs-2.0.10.ebuild, + -modsecurity-crs-2.1.1.ebuild: + Remove old versions. *modsecurity-crs-2.1.2 (23 Mar 2011) diff --git a/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild b/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild deleted file mode 100644 index 14d971d38804..000000000000 --- a/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild +++ /dev/null @@ -1,75 +0,0 @@ -# Copyright 1999-2010 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild,v 1.2 2010/12/03 01:34:34 flameeyes Exp $ - -EAPI=2 - -DESCRIPTION="Core Rule Set for ModSecurity" -HOMEPAGE="http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project" -SRC_URI="mirror://sourceforge/mod-security/${PN}_${PV}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~amd64 ~sparc ~x86" -IUSE="vanilla" - -RDEPEND=">=www-apache/mod_security-2.5.12-r1" -DEPEND="" - -S="${WORKDIR}/${PN}_${PV}" - -RULESDIR=/etc/apache2/modules.d/mod_security - -src_install() { - insinto "${RULESDIR}" || die - doins base_rules/* || die - - # these are considered examples, but we install them anyway, and let - # etc-update deal with them. - for file in *.conf.example; do - newins "${file}" "${file%.example}" || die "failed to install ${file}" - done - - insinto "${RULESDIR}"/optional_rules - doins optional_rules/* || die - - # These are not conditionals because they actually need to be - # moved for the rules to work — bug #329131 - mv "${D}${RULESDIR}"/modsecurity_42_comment_spam.data \ - "${D}${RULESDIR}"/optional_rules || die - - if ! use vanilla; then - mv "${D}${RULESDIR}"/modsecurity_*50_outbound* \ - "${D}${RULESDIR}"/optional_rules || die - fi - - dodoc CHANGELOG README || die -} - -pkg_postinst() { - if ! use vanilla; then - elog "Please note that the Core Rule Set is quite draconic; to make it more usable," - elog "the Gentoo distribution disables a few rule set files, that are relevant for" - elog "PHP-only websites or that would make it kill a website that discussed of source code." - elog - elog "Furthermore we disable the 'HTTP Parameter Pollution' tests that disallow" - elog "multiple parameters with the same name, because that's common practice both" - elog "for Rails-based web-applications and Bugzilla." - else - elog "You decided to enable the original Core Rule Set from ModSecurity." - elog "Be warned that the original Core Rule Set is draconic and most likely will" - elog "render your web application unusable if you don't disable at leat some of" - elog "the rules." - fi - elog - elog "If you want to enable further rules, check the following directory:" - elog " ${APACHE_MODULES_CONFDIR}/mod_security/optional_rules" - elog "" - elog "Starting from version 2.0.9, the default for the Core Rule Set is again to block" - elog "when rules hit. If you wish to go back to the 2.0.8 method of anomaly scoring, you" - elog "should change modsecurity_crs_10_config.conf so that you have these settings enabled:" - elog "" - elog " SecDefaultAction \"phase:1,pass\"" - elog " SecAction \"phase:1,t:none,nolog,pass,setvar:tx.anomaly_score_blocking=on\"" - elog "" -} diff --git a/www-apache/modsecurity-crs/modsecurity-crs-2.0.8.ebuild b/www-apache/modsecurity-crs/modsecurity-crs-2.0.8.ebuild deleted file mode 100644 index 03deda539e3e..000000000000 --- a/www-apache/modsecurity-crs/modsecurity-crs-2.0.8.ebuild +++ /dev/null @@ -1,61 +0,0 @@ -# Copyright 1999-2010 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/modsecurity-crs-2.0.8.ebuild,v 1.3 2010/10/24 17:41:16 armin76 Exp $ - -EAPI=2 - -DESCRIPTION="Core Rule Set for ModSecurity" -HOMEPAGE="http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project" -SRC_URI="mirror://sourceforge/mod-security/${PN}_${PV}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~amd64 ~sparc ~x86" -IUSE="vanilla" - -RDEPEND=">=www-apache/mod_security-2.5.12-r1" -DEPEND="" - -S="${WORKDIR}/${PN}_${PV}" - -RULESDIR=/etc/apache2/modules.d/mod_security - -src_install() { - insinto "${RULESDIR}" || die - doins *.conf base_rules/* || die - - insinto "${RULESDIR}"/optional_rules - doins optional_rules/* || die - - # These are not conditionals because they actually need to be - # moved for the rules to work — bug #329131 - mv "${D}${RULESDIR}"/modsecurity_{46_et_sql_injection,46_et_web_rules,42_comment_spam}.data \ - "${D}${RULESDIR}"/optional_rules || die - - if ! use vanilla; then - mv "${D}${RULESDIR}"/modsecurity_*{41_phpids,50_outbound}* \ - "${D}${RULESDIR}"/optional_rules || die - fi - - dodoc CHANGELOG README || die -} - -pkg_postinst() { - if ! use vanilla; then - elog "Please note that the Core Rule Set is quite draconic; to make it more usable," - elog "the Gentoo distribution disables a few rule set files, that are relevant for" - elog "PHP-only websites or that would make it kill a website that discussed of source code." - elog - elog "Furthermore we disable the 'HTTP Parameter Pollution' tests that disallow" - elog "multiple parameters with the same name, because that's common practice both" - elog "for Rails-based web-applications and Bugzilla." - else - elog "You decided to enable the original Core Rule Set from ModSecurity." - elog "Be warned that the original Core Rule Set is draconic and most likely will" - elog "render your web application unusable if you don't disable at leat some of" - elog "the rules." - fi - elog - elog "If you want to enable further rules, check the following directory:" - elog " ${APACHE_MODULES_CONFDIR}/mod_security/optional_rules" -} diff --git a/www-apache/modsecurity-crs/modsecurity-crs-2.1.1.ebuild b/www-apache/modsecurity-crs/modsecurity-crs-2.1.1.ebuild deleted file mode 100644 index 338f48046150..000000000000 --- a/www-apache/modsecurity-crs/modsecurity-crs-2.1.1.ebuild +++ /dev/null @@ -1,70 +0,0 @@ -# Copyright 1999-2011 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/modsecurity-crs-2.1.1.ebuild,v 1.2 2011/02/26 14:44:55 xarthisius Exp $ - -EAPI=2 - -DESCRIPTION="Core Rule Set for ModSecurity" -HOMEPAGE="http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project" -SRC_URI="mirror://sourceforge/mod-security/${PN}_${PV}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~amd64 ~ppc ~sparc ~x86" -IUSE="vanilla" - -RDEPEND=">=www-apache/mod_security-2.5.12-r1" -DEPEND="" - -S="${WORKDIR}/${PN}_${PV}" - -RULESDIR=/etc/apache2/modules.d/mod_security - -src_install() { - insinto "${RULESDIR}" || die - doins base_rules/* || die - - # these are considered examples, but we install them anyway, and let - # etc-update deal with them. - for file in *.conf.example; do - newins "${file}" "${file%.example}" || die "failed to install ${file}" - done - - insinto "${RULESDIR}"/optional_rules - doins optional_rules/* || die - - insinto "${RULESDIR}"/experimental_rules - doins experimental_rules/* || die - - if ! use vanilla; then - mv "${D}${RULESDIR}"/modsecurity_*50_outbound* \ - "${D}${RULESDIR}"/optional_rules || die - fi - - dodoc CHANGELOG README || die -} - -pkg_postinst() { - if ! use vanilla; then - elog "Please note that the Core Rule Set is quite draconic; to make it more usable," - elog "the Gentoo distribution disables a few rule set files, that are relevant for" - elog "PHP-only websites or that would make it kill a website that discussed of source code." - else - elog "You decided to enable the original Core Rule Set from ModSecurity." - elog "Be warned that the original Core Rule Set is draconic and most likely will" - elog "render your web application unusable if you don't disable at leat some of" - elog "the rules." - fi - elog - elog "If you want to enable further rules, check the following directories:" - elog " ${APACHE_MODULES_CONFDIR}/mod_security/optional_rules" - elog " ${APACHE_MODULES_CONFDIR}/mod_security/experimental_rules" - elog "" - elog "Starting from version 2.0.9, the default for the Core Rule Set is again to block" - elog "when rules hit. If you wish to go back to the 2.0.8 method of anomaly scoring, you" - elog "should change modsecurity_crs_10_config.conf so that you have these settings enabled:" - elog "" - elog " #SecDefaultAction \"phase:2,deny,log\"" - elog " SecAction \"phase:1,t:none,nolog,pass,setvar:tx.anomaly_score_blocking=on\"" - elog "" -} |