diff options
author | Sergey A. Osokin <osa@FreeBSD.org> | 2015-02-13 12:49:33 +0000 |
---|---|---|
committer | Sergey A. Osokin <osa@FreeBSD.org> | 2015-02-13 12:49:33 +0000 |
commit | 1c7b13b3360b607eba19e5b2a4ee16de5632e9bb (patch) | |
tree | eaf18d1d1d918f99f3e31a4ef6db862a7227df93 /www/nginx-devel/files/extra-patch-nginx-modsecurity-configure | |
parent | - Update to 0.10.22 (diff) |
Update third-party modsecurity module from 2.8.0 to 2.9.0.
<ChangeLog>
12 Feb 2015 - 2.9.0
-------------------
* Fix apr_crypto.h include, now checking if apr_crypto.h is available by
checking the definition WITH_APU_CRYPTO.
[martinjina and ModSecurity team]
15 Dez 2014 - 2.9.0-RC2
-----------------------
* OpenSSL dependency was removed on MS Windows builds. ModSecurity is now using
the Windows certificate storage.
[Gregg Smith, Steffen and ModSecurity team]
* Informs about external resources loaded/failed while reloading Apache.
[ModSecurity team]
* Adds missing 'ModSecurity:' prefix in some warnings messages.
[Walter Hop and ModSecurity team]
* Refactoring external resources download warn messages. Holding the message
to be displayed when Apache is ready to write on the error_log.
[ModSecurity team]
* Remote resources loading process is now failing in case of HTTP error.
[Walter Hop and ModSecurity team]
* Fixed start up crash on Apache with mod_ssl configured. Crash was happening
during the download of remote resources.
[Christian Folini, Walter Hop and ModSecurity team]
* Curl is not a mandatory dependency to ModSecurity core anymore.
[Rainer Jung and ModSecurity team]
18 Nov 2014 - 2.9.0-RC1
-----------------------
* `pmFromFile' and `ipMatchFromFile' operators are now accepting HTTPS served
files as parameter.
* `SecRemoteRules' directive - allows you to specify a HTTPS served file that
may contain rules in the SecRule format to be loaded into your ModSecurity
instance.
* `SecRemoteRulesFailAction' directive - allows you to control whenever the
user wants to Abort or just Warn when there is a problem while downloading
rules specified with the directive: `SecRemoteRules'.
* `fuzzyHash' operator - allows to match contents using fuzzy hashes.
* `FILES_TMP_CONTENT' collection - make available the content of uploaded
files.
* InsecureNoCheckCert - option to validate or not a chain of SSL certificates
on mlogc connections.
* ModSecurityIIS: ModSecurity event ID was changed from 0 to 0x1.
[Issue #676 - Kris Kater and ModSecurity team]
* Fixed signature on "status call": ModSecurity is now using the original
server signature.
[Issues #702 - Linas and ModSecurity team]
* YAJL version is printed while ModSecurity initialization.
[Issue #703 - Steffen (Apache Lounge) and Mauro Faccenda]
* Fixed subnet representation using slash notation on the @ipMatch operator.
[Issue #706 - Walter Hop and ModSecurity team]
* Limited the length of a status call.
[Issue #714 - 'cpanelkurt' and ModSecurity team]
* Added the missing -P option to nginx regression tests.
[Issue #720 - Paul Yang]
* Fixed automake scripts to do not use features which will be deprecated in
the upcoming releases of automake.
[Issue #760 - ModSecurity team]
* apr-utils's LDFALGS is now considered while building ModSecurity.
[Issue #782 - Daniel J. Luke]
* IIS installer is not considering IIS 6 as compatible anymore.
[Issue #790 - ModSecurity team]
* Fixed yajl build script: now looking for the correct header file.
[Issue #804 - 'rpfilomeno' and ModSecurity team]
* mlgoc is now forced to use TLS 1.x.
[Issue #806 - Josh Amishav-Zlatin and ModSecurity team]
</ChangeLog>
Notes
Notes:
svn path=/head/; revision=378927
Diffstat (limited to 'www/nginx-devel/files/extra-patch-nginx-modsecurity-configure')
-rw-r--r-- | www/nginx-devel/files/extra-patch-nginx-modsecurity-configure | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/www/nginx-devel/files/extra-patch-nginx-modsecurity-configure b/www/nginx-devel/files/extra-patch-nginx-modsecurity-configure index 92e5aac2e6da..ffbc3eb36687 100644 --- a/www/nginx-devel/files/extra-patch-nginx-modsecurity-configure +++ b/www/nginx-devel/files/extra-patch-nginx-modsecurity-configure @@ -1,5 +1,5 @@ ---- ../modsecurity-2.8.0/configure.orig 2014-04-15 16:44:15.000000000 +0400 -+++ ../modsecurity-2.8.0/configure 2014-08-10 21:24:00.000000000 +0400 +--- ../modsecurity-2.9.0/configure.orig 2014-04-15 16:44:15.000000000 +0400 ++++ ../modsecurity-2.9.0/configure 2014-08-10 21:24:00.000000000 +0400 @@ -14664,7 +14664,7 @@ no) : test_paths= ;; #( |