diff options
Diffstat (limited to 'www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild')
-rw-r--r-- | www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild | 75 |
1 files changed, 0 insertions, 75 deletions
diff --git a/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild b/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild deleted file mode 100644 index 14d971d38804..000000000000 --- a/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild +++ /dev/null @@ -1,75 +0,0 @@ -# Copyright 1999-2010 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/www-apache/modsecurity-crs/modsecurity-crs-2.0.10.ebuild,v 1.2 2010/12/03 01:34:34 flameeyes Exp $ - -EAPI=2 - -DESCRIPTION="Core Rule Set for ModSecurity" -HOMEPAGE="http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project" -SRC_URI="mirror://sourceforge/mod-security/${PN}_${PV}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~amd64 ~sparc ~x86" -IUSE="vanilla" - -RDEPEND=">=www-apache/mod_security-2.5.12-r1" -DEPEND="" - -S="${WORKDIR}/${PN}_${PV}" - -RULESDIR=/etc/apache2/modules.d/mod_security - -src_install() { - insinto "${RULESDIR}" || die - doins base_rules/* || die - - # these are considered examples, but we install them anyway, and let - # etc-update deal with them. - for file in *.conf.example; do - newins "${file}" "${file%.example}" || die "failed to install ${file}" - done - - insinto "${RULESDIR}"/optional_rules - doins optional_rules/* || die - - # These are not conditionals because they actually need to be - # moved for the rules to work — bug #329131 - mv "${D}${RULESDIR}"/modsecurity_42_comment_spam.data \ - "${D}${RULESDIR}"/optional_rules || die - - if ! use vanilla; then - mv "${D}${RULESDIR}"/modsecurity_*50_outbound* \ - "${D}${RULESDIR}"/optional_rules || die - fi - - dodoc CHANGELOG README || die -} - -pkg_postinst() { - if ! use vanilla; then - elog "Please note that the Core Rule Set is quite draconic; to make it more usable," - elog "the Gentoo distribution disables a few rule set files, that are relevant for" - elog "PHP-only websites or that would make it kill a website that discussed of source code." - elog - elog "Furthermore we disable the 'HTTP Parameter Pollution' tests that disallow" - elog "multiple parameters with the same name, because that's common practice both" - elog "for Rails-based web-applications and Bugzilla." - else - elog "You decided to enable the original Core Rule Set from ModSecurity." - elog "Be warned that the original Core Rule Set is draconic and most likely will" - elog "render your web application unusable if you don't disable at leat some of" - elog "the rules." - fi - elog - elog "If you want to enable further rules, check the following directory:" - elog " ${APACHE_MODULES_CONFDIR}/mod_security/optional_rules" - elog "" - elog "Starting from version 2.0.9, the default for the Core Rule Set is again to block" - elog "when rules hit. If you wish to go back to the 2.0.8 method of anomaly scoring, you" - elog "should change modsecurity_crs_10_config.conf so that you have these settings enabled:" - elog "" - elog " SecDefaultAction \"phase:1,pass\"" - elog " SecAction \"phase:1,t:none,nolog,pass,setvar:tx.anomaly_score_blocking=on\"" - elog "" -} |