From 96b1c33acd87611c93dfd1adf6622e650e7f6732 Mon Sep 17 00:00:00 2001 From: Christian Heim Date: Sun, 29 Jul 2007 13:47:06 +0000 Subject: Moving net-www/mod_security to www-apache/mod_security (#81244). (Portage version: 2.1.3_rc9) --- www-apache/mod_security/files/99_mod_security-2.1.1.conf | 8 ++++++++ www-apache/mod_security/files/digest-mod_security-2.1.1 | 3 +++ .../mod_security/files/digest-mod_security-2.1.1-r1 | 3 +++ .../files/mod_security-2.1.1-request_interception.patch | 15 +++++++++++++++ 4 files changed, 29 insertions(+) create mode 100644 www-apache/mod_security/files/99_mod_security-2.1.1.conf create mode 100644 www-apache/mod_security/files/digest-mod_security-2.1.1 create mode 100644 www-apache/mod_security/files/digest-mod_security-2.1.1-r1 create mode 100644 www-apache/mod_security/files/mod_security-2.1.1-request_interception.patch (limited to 'www-apache/mod_security/files') diff --git a/www-apache/mod_security/files/99_mod_security-2.1.1.conf b/www-apache/mod_security/files/99_mod_security-2.1.1.conf new file mode 100644 index 000000000000..78344cde8c87 --- /dev/null +++ b/www-apache/mod_security/files/99_mod_security-2.1.1.conf @@ -0,0 +1,8 @@ + + + LoadModule security2_module modules/mod_security2.so + + + # use Core Rule Set by default: + Include /etc/apache2/modules.d/mod_security/*.conf + diff --git a/www-apache/mod_security/files/digest-mod_security-2.1.1 b/www-apache/mod_security/files/digest-mod_security-2.1.1 new file mode 100644 index 000000000000..af3a5b2f6338 --- /dev/null +++ b/www-apache/mod_security/files/digest-mod_security-2.1.1 @@ -0,0 +1,3 @@ +MD5 ab74ed5f320ffc4ed9f56487bf17c670 modsecurity-apache_2.1.1.tar.gz 650607 +RMD160 17e94c19d51f7e9e09ef435f81d696ec638aad44 modsecurity-apache_2.1.1.tar.gz 650607 +SHA256 fadeb3b4ce5672c99c094611792b827d45fcd6b38c4c4fa81c4cfdc63c63b71a modsecurity-apache_2.1.1.tar.gz 650607 diff --git a/www-apache/mod_security/files/digest-mod_security-2.1.1-r1 b/www-apache/mod_security/files/digest-mod_security-2.1.1-r1 new file mode 100644 index 000000000000..af3a5b2f6338 --- /dev/null +++ b/www-apache/mod_security/files/digest-mod_security-2.1.1-r1 @@ -0,0 +1,3 @@ +MD5 ab74ed5f320ffc4ed9f56487bf17c670 modsecurity-apache_2.1.1.tar.gz 650607 +RMD160 17e94c19d51f7e9e09ef435f81d696ec638aad44 modsecurity-apache_2.1.1.tar.gz 650607 +SHA256 fadeb3b4ce5672c99c094611792b827d45fcd6b38c4c4fa81c4cfdc63c63b71a modsecurity-apache_2.1.1.tar.gz 650607 diff --git a/www-apache/mod_security/files/mod_security-2.1.1-request_interception.patch b/www-apache/mod_security/files/mod_security-2.1.1-request_interception.patch new file mode 100644 index 000000000000..5f38268e203d --- /dev/null +++ b/www-apache/mod_security/files/mod_security-2.1.1-request_interception.patch @@ -0,0 +1,15 @@ +Index: apache2/mod_security2.c +=================================================================== +--- apache2/mod_security2.c (revision 266) ++++ apache2/mod_security2.c (working copy) +@@ -558,6 +558,10 @@ + + /* Has this phase been completed already? */ + if (msr->phase_request_body_complete) { ++ if (msr->was_intercepted) { ++ msr_log(msr, 4, "Phase REQUEST_BODY subrequest already intercepted with code %u.", msr->intercept_actionset->intercept_status); ++ return msr->intercept_actionset->intercept_status; ++ } + if (msr->txcfg->debuglog_level >= 4) { + msr_log(msr, 4, "Phase REQUEST_BODY already complete, skipping."); + } -- cgit v1.2.3-65-gdbad