summaryrefslogtreecommitdiff
path: root/www-apache/modsecurity-crs
diff options
context:
space:
mode:
authorV3n3RiX <venerix@redcorelinux.org>2018-11-03 08:36:22 +0000
committerV3n3RiX <venerix@redcorelinux.org>2018-11-03 08:36:22 +0000
commitf65628136faa35d0c4d3b5e7332275c7b35fcd96 (patch)
tree021998302365c5652e37824b6c26d4d969a62055 /www-apache/modsecurity-crs
parent70b82ae359a5538711e103b0e8dfb92654296644 (diff)
gentoo resync : 03.11.2018
Diffstat (limited to 'www-apache/modsecurity-crs')
-rw-r--r--www-apache/modsecurity-crs/Manifest4
-rw-r--r--www-apache/modsecurity-crs/modsecurity-crs-2.2.7.ebuild134
-rw-r--r--www-apache/modsecurity-crs/modsecurity-crs-2.2.9.ebuild138
3 files changed, 0 insertions, 276 deletions
diff --git a/www-apache/modsecurity-crs/Manifest b/www-apache/modsecurity-crs/Manifest
index 012d91ae017d..6ea2618bc27b 100644
--- a/www-apache/modsecurity-crs/Manifest
+++ b/www-apache/modsecurity-crs/Manifest
@@ -1,8 +1,4 @@
AUX 80_mod_security-crs.conf 289 BLAKE2B 441b2f4d46e62ff24886b94dc933b08de8693ad7198cc855a8b0c322ba045e6409b7d3b7b2e2fdc0bd412ee9fdd3761987d59f405de5a84d5e8c96d2dd14ab76 SHA512 e5b86164a68e15d67a294688c993799fca10928c1265cee04555becfb17fb516314471d8c4eaea1205ac1703890cedb4647d93ce75b0a2a1ab9a401a495465dc
-DIST modsecurity-crs-2.2.7.tar.gz 294137 BLAKE2B 399c72d5c52f2914e8f92c813b6ac346bbd2858d34b61ff4845dbbc7671ff7ffa906b43e2d8e3283a5f30b2fec59395b81239c121c953d51d736b009bc86f4bb SHA512 d0d3dac1b391c8ab730cc16546c9508d93c85dd674b2750d12fff99c17e5575b36bea0cf00e06fdd20c2db5dfdbdc3fd7bbaa26502988617632acfde1ee88927
-DIST modsecurity-crs-2.2.9.tar.gz 279898 BLAKE2B 75e9c5c9fb0fdf3957b17926b923d1d26b44677fc30556bf58d0b44d73918f7f65052714a7c67c53fc312f81a28422025303674f934f085929e8f4b9ea9fc063 SHA512 fc95cfff9d4ba9a4478c704e5d16e4054e514eb3ffb6343706840aad76607f997b4cc4b8b148adc5cb83743ea7996328d35b8556115de29d6a0e034b67591a09
DIST modsecurity-crs-3.0.2.tar.gz 156751 BLAKE2B 111a330b6081d476899be321e15d74379b3c3db23f429a4a4ef1900c87e4b29229638acf3bb367745446ef97ccba4679db91b0d84bae93f2c127bbb6e8031851 SHA512 ae8fe9a0f00a57708c8680cb76882214e4f5ff647e13087aaf1bfc7382cefb38d2f3a88eb1f210031b553f56d3e44c12dbdc68f8b0d09fb4a9e2f15a70d885aa
-EBUILD modsecurity-crs-2.2.7.ebuild 4130 BLAKE2B 891afb7917e10f74674c039725c393129ab6bf7be717dd517794566dc06f1ac917dc8421ccfb5af866077ff256fa78f75ddb80840e969f3088a53b002b14ce27 SHA512 21ae265889535b3dd18b0adec162f744425da149f58c4ab0ebfb245bd02d8e21abe0cbc21f14a587f9e619b3a5d10fd027deb3a71815ecf383e473fc4634dc6b
-EBUILD modsecurity-crs-2.2.9.ebuild 4221 BLAKE2B 0270d493848b9ab2a72938bda4fec4a7fb43ffed160c91100eabb98c52a48d4c6aac19443995a0edd460185837eee250936b6aa17ae41024bbfe69fe828d2d4d SHA512 aa2bceb00dc5d61b560d61e21b217ecae63661080e902a1519fb9644cc50a3ba113cb3a86293accb6de7288ef72be4f1bb5b45b78f58ce97504293de44506003
EBUILD modsecurity-crs-3.0.2.ebuild 1557 BLAKE2B 975e0ecabdfc9d9158a8f6f8284175a096cfe6c8666da074466d48a9c7d81d467fa08ed7b449bf232712e3cc4c6830b66fc15fb62f9b04189a6af5da7f6ba23f SHA512 6d50e03a2cd5a616a90e4c0a2814c4d58bfc68109ca1341a4da189463626922a6fbc7db7892f9184b147a896d585817fd778eea84fcab7ca62a95c1ec3beded2
MISC metadata.xml 240 BLAKE2B 9ac73447401500c93e9ab7fce069726f63e07989f48154f4c99346e7913696e53d2451b08ea9fe4c72af28c43e13091599d84c70979e3cb504e301ac785d37a0 SHA512 f387811090c36052ca6dfd48c20af460ebb892738ecd449a5a213ecf7313dfc1cc6eb118e4d28ec24e26078995c4d291784f26b6afc1f822cf83ca5482bd7310
diff --git a/www-apache/modsecurity-crs/modsecurity-crs-2.2.7.ebuild b/www-apache/modsecurity-crs/modsecurity-crs-2.2.7.ebuild
deleted file mode 100644
index c96ed6be8961..000000000000
--- a/www-apache/modsecurity-crs/modsecurity-crs-2.2.7.ebuild
+++ /dev/null
@@ -1,134 +0,0 @@
-# Copyright 1999-2018 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=5
-
-GITHUB_USER=SpiderLabs
-GITHUB_PROJECT=owasp-${PN}
-
-DESCRIPTION="Core Rule Set for ModSecurity"
-HOMEPAGE="
- https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project
- https://modsecurity.org/crs/
- https://coreruleset.org/"
-SRC_URI="https://github.com/${GITHUB_USER}/${GITHUB_PROJECT}/archive/${PV}.tar.gz -> ${P}.tar.gz"
-
-LICENSE="Apache-2.0"
-SLOT="0"
-KEYWORDS="amd64 ppc sparc x86"
-IUSE="lua geoip"
-
-RDEPEND=">=www-apache/mod_security-2.7[lua?,geoip?]"
-DEPEND=""
-
-S="${WORKDIR}/${GITHUB_PROJECT}-${PV}"
-
-RULESDIR=/etc/modsecurity
-LUADIR=/usr/share/${PN}/lua
-
-src_prepare() {
- if ! use lua; then
- # comment out this since it's in the same file as another one we want to keep
- sed -i -e "/id:'96000[456]'/s:^:#:" \
- experimental_rules/modsecurity_crs_61_ip_forensics.conf || die
-
- # remove these that rely on the presence of the lua files
- rm \
- experimental_rules/modsecurity_crs_16_scanner_integration.conf \
- experimental_rules/modsecurity_crs_40_appsensor_detection_point_2.1_request_exception.conf \
- experimental_rules/modsecurity_crs_41_advanced_filters.conf \
- experimental_rules/modsecurity_crs_55_response_profiling.conf \
- experimental_rules/modsecurity_crs_56_pvi_checks.conf \
- || die
- else
- # fix up the path to the scripts; there seems to be no
- # consistency at all on how the rules are loaded.
- sed -i \
- -e "s:/etc/apache2/modsecurity-crs/lua/:${LUADIR}/:" \
- -e "s:profile_page_scripts.lua:${LUADIR}/\0:" \
- -e "s:/usr/local/apache/conf/crs/lua/:${LUADIR}/:" \
- -e "s:/usr/local/apache/conf/modsec_current/base_rules/:${LUADIR}/:" \
- -e "s:/etc/apache2/modsecurity-crs/lua/:${LUADIR}/:" \
- -e "s:\.\./lua/:${LUADIR}/:" \
- *_rules/*.conf || die
-
- # fix up the shebang on the scripts
- sed -i -e "s:/opt/local/bin/lua:/usr/bin/lua:" \
- lua/*.lua || die
- fi
-
- sed -i \
- -e '/SecGeoLookupDb/s:^:#:' \
- -e '/SecGeoLookupDb/a# Gentoo already defines it in 79_modsecurity.conf' \
- experimental_rules/modsecurity_crs_61_ip_forensics.conf || die
-
- if ! use geoip; then
- if use lua; then
- # only comment this out as the file is going to be used for other things
- sed -i -e "/id:'960007'/,+1 s:^:#:" \
- experimental_rules/modsecurity_crs_61_ip_forensics.conf || die
- else
- rm experimental_rules/modsecurity_crs_61_ip_forensics.conf || die
- fi
- fi
-}
-
-src_install() {
- insinto "${RULESDIR}"
- # slr_rules as of 2.2.6 have broken IDs that don't work with
- # ModSecurity 2.7, but the rules require 2.7 to begin with.
- doins -r base_rules optional_rules experimental_rules #slr_rules
-
- insinto "${LUADIR}"
- doins lua/*.lua
-
- dodoc CHANGELOG README.md
-
- (
- cat - <<EOF
-<IfDefine SECURITY>
-EOF
-
- cat modsecurity_crs_10_setup.conf.example
-
- cat - <<EOF
-
-Include /etc/modsecurity/base_rules/*.conf
-
-# Include Trustwave SpiderLabs Research Team rules
-# Include /etc/modsecurity/slr_rules/*.conf
-# Not installed yet as of 2.2.6
-
-# Optionally use the other rules as well
-# Include /etc/modsecurity/optional_rules/*.conf
-# Include /etc/modsecurity/experimental_rules/*.conf
-</IfDefine>
-
-# -*- apache -*-
-# vim: ts=4 filetype=apache
-
-EOF
- ) > "${T}"/"80_${PN}.conf"
-
- insinto /etc/apache2/modules.d/
- doins "${T}"/"80_${PN}.conf"
-}
-
-pkg_postinst() {
- elog
- elog "If you want to enable further rules, check the following directories:"
- elog " ${RULESDIR}/optional_rules"
- elog " ${RULESDIR}/experimental_rules"
- elog ""
- elog "Starting from version 2.0.9, the default for the Core Rule Set is again to block"
- elog "when rules hit. If you wish to go back to the 2.0.8 method of anomaly scoring, you"
- elog "should change 80_${PN}.conf so that you have these settings enabled:"
- elog ""
- elog " #SecDefaultAction \"phase:2,deny,log\""
- elog " SecAction \"phase:1,t:none,nolog,pass,setvar:tx.anomaly_score_blocking=on\""
- elog ""
- elog "Starting from version 2.1.2 rules are installed, for consistency, under"
- elog "/etc/modsecurity, and can be configured with the following file:"
- elog " /etc/apache2/modules.d/80_${PN}.conf"
- elog ""
-}
diff --git a/www-apache/modsecurity-crs/modsecurity-crs-2.2.9.ebuild b/www-apache/modsecurity-crs/modsecurity-crs-2.2.9.ebuild
deleted file mode 100644
index 57f9f9b03911..000000000000
--- a/www-apache/modsecurity-crs/modsecurity-crs-2.2.9.ebuild
+++ /dev/null
@@ -1,138 +0,0 @@
-# Copyright 1999-2018 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=6
-
-GITHUB_USER=SpiderLabs
-GITHUB_PROJECT=owasp-${PN}
-
-DESCRIPTION="Core Rule Set for ModSecurity"
-HOMEPAGE="
- https://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project
- https://modsecurity.org/crs/
- https://coreruleset.org/"
-SRC_URI="https://github.com/${GITHUB_USER}/${GITHUB_PROJECT}/archive/${PV}.tar.gz -> ${P}.tar.gz"
-
-LICENSE="Apache-2.0"
-SLOT="0"
-KEYWORDS="~amd64 ~ppc ~sparc ~x86"
-IUSE="lua geoip"
-
-RDEPEND=">=www-apache/mod_security-2.7[lua?,geoip?]"
-DEPEND=""
-
-S="${WORKDIR}/${GITHUB_PROJECT}-${PV}"
-
-RULESDIR=/etc/modsecurity
-LUADIR=/usr/share/${PN}/lua
-
-src_prepare() {
- if ! use lua; then
- # comment out this since it's in the same file as another one we want to keep
- sed -i -e "/id:'900036'/s:^:#:" \
- experimental_rules/modsecurity_crs_61_ip_forensics.conf || die
-
- # remove these that rely on the presence of the lua files
- rm \
- experimental_rules/modsecurity_crs_16_scanner_integration.conf \
- experimental_rules/modsecurity_crs_40_appsensor_detection_point_2.0_setup.conf \
- experimental_rules/modsecurity_crs_40_appsensor_detection_point_2.1_request_exception.conf \
- experimental_rules/modsecurity_crs_48_bayes_analysis.conf \
- experimental_rules/modsecurity_crs_55_response_profiling.conf \
- experimental_rules/modsecurity_crs_56_pvi_checks.conf \
- || die
- else
- # fix up the path to the scripts; there seems to be no
- # consistency at all on how the rules are loaded.
- sed -i \
- -e "s:/etc/apache2/modsecurity-crs/lua/:${LUADIR}/:" \
- -e "s:profile_page_scripts.lua:${LUADIR}/\0:" \
- -e "s:/usr/local/apache/conf/crs/lua/:${LUADIR}/:" \
- -e "s:/usr/local/apache/conf/modsec_current/base_rules/:${LUADIR}/:" \
- -e "s:/etc/apache2/modsecurity-crs/lua/:${LUADIR}/:" \
- -e "s:\.\./lua/:${LUADIR}/:" \
- *_rules/*.conf || die
-
- # fix up the shebang on the scripts
- sed -i -e "s:/opt/local/bin/lua:/usr/bin/lua:" \
- lua/*.lua || die
- fi
-
- sed -i \
- -e '/SecGeoLookupDb/s:^:#:' \
- -e '/SecGeoLookupDb/a# Gentoo already defines it in 79_modsecurity.conf' \
- experimental_rules/modsecurity_crs_61_ip_forensics.conf \
- experimental_rules/modsecurity_crs_11_proxy_abuse.conf || die
-
- if ! use geoip; then
- rm experimental_rules/modsecurity_crs_11_proxy_abuse.conf
-
- if use lua; then
- # only comment this out as the file is going to be used for other things
- sed -i -e "/id:'900039'/,+1 s:^:#:" \
- experimental_rules/modsecurity_crs_61_ip_forensics.conf || die
- else
- rm experimental_rules/modsecurity_crs_61_ip_forensics.conf || die
- fi
- fi
-
- eapply_user
-}
-
-src_install() {
- insinto "${RULESDIR}"
- doins -r base_rules optional_rules experimental_rules slr_rules
-
- insinto "${LUADIR}"
- doins lua/*.lua
-
- dodoc CHANGES README.md
-
- (
- cat - <<EOF
-<IfDefine SECURITY>
-EOF
-
- cat modsecurity_crs_10_setup.conf.example
-
- cat - <<EOF
-
-Include /etc/modsecurity/base_rules/*.conf
-
-# Include Trustwave SpiderLabs Research Team rules
-# Include /etc/modsecurity/slr_rules/*.conf
-# Not installed yet as of 2.2.6
-
-# Optionally use the other rules as well
-# Include /etc/modsecurity/optional_rules/*.conf
-# Include /etc/modsecurity/experimental_rules/*.conf
-</IfDefine>
-
-# -*- apache -*-
-# vim: ts=4 filetype=apache
-
-EOF
- ) > "${T}"/"80_${PN}.conf"
-
- insinto /etc/apache2/modules.d/
- doins "${T}"/"80_${PN}.conf"
-}
-
-pkg_postinst() {
- elog
- elog "If you want to enable further rules, check the following directories:"
- elog " ${RULESDIR}/optional_rules"
- elog " ${RULESDIR}/experimental_rules"
- elog ""
- elog "Starting from version 2.0.9, the default for the Core Rule Set is again to block"
- elog "when rules hit. If you wish to go back to the 2.0.8 method of anomaly scoring, you"
- elog "should change 80_${PN}.conf so that you have these settings enabled:"
- elog ""
- elog " #SecDefaultAction \"phase:2,deny,log\""
- elog " SecAction \"phase:1,t:none,nolog,pass,setvar:tx.anomaly_score_blocking=on\""
- elog ""
- elog "Starting from version 2.1.2 rules are installed, for consistency, under"
- elog "/etc/modsecurity, and can be configured with the following file:"
- elog " /etc/apache2/modules.d/80_${PN}.conf"
- elog ""
-}