summaryrefslogtreecommitdiff
path: root/www/nginx-devel/files/extra-patch-nginx-modsecurity-configure
diff options
context:
space:
mode:
authorSergey A. Osokin <osa@FreeBSD.org>2015-02-13 12:49:33 +0000
committerSergey A. Osokin <osa@FreeBSD.org>2015-02-13 12:49:33 +0000
commit1c7b13b3360b607eba19e5b2a4ee16de5632e9bb (patch)
treeeaf18d1d1d918f99f3e31a4ef6db862a7227df93 /www/nginx-devel/files/extra-patch-nginx-modsecurity-configure
parent- Update to 0.10.22 (diff)
Update third-party modsecurity module from 2.8.0 to 2.9.0.
<ChangeLog> 12 Feb 2015 - 2.9.0 ------------------- * Fix apr_crypto.h include, now checking if apr_crypto.h is available by checking the definition WITH_APU_CRYPTO. [martinjina and ModSecurity team] 15 Dez 2014 - 2.9.0-RC2 ----------------------- * OpenSSL dependency was removed on MS Windows builds. ModSecurity is now using the Windows certificate storage. [Gregg Smith, Steffen and ModSecurity team] * Informs about external resources loaded/failed while reloading Apache. [ModSecurity team] * Adds missing 'ModSecurity:' prefix in some warnings messages. [Walter Hop and ModSecurity team] * Refactoring external resources download warn messages. Holding the message to be displayed when Apache is ready to write on the error_log. [ModSecurity team] * Remote resources loading process is now failing in case of HTTP error. [Walter Hop and ModSecurity team] * Fixed start up crash on Apache with mod_ssl configured. Crash was happening during the download of remote resources. [Christian Folini, Walter Hop and ModSecurity team] * Curl is not a mandatory dependency to ModSecurity core anymore. [Rainer Jung and ModSecurity team] 18 Nov 2014 - 2.9.0-RC1 ----------------------- * `pmFromFile' and `ipMatchFromFile' operators are now accepting HTTPS served files as parameter. * `SecRemoteRules' directive - allows you to specify a HTTPS served file that may contain rules in the SecRule format to be loaded into your ModSecurity instance. * `SecRemoteRulesFailAction' directive - allows you to control whenever the user wants to Abort or just Warn when there is a problem while downloading rules specified with the directive: `SecRemoteRules'. * `fuzzyHash' operator - allows to match contents using fuzzy hashes. * `FILES_TMP_CONTENT' collection - make available the content of uploaded files. * InsecureNoCheckCert - option to validate or not a chain of SSL certificates on mlogc connections. * ModSecurityIIS: ModSecurity event ID was changed from 0 to 0x1. [Issue #676 - Kris Kater and ModSecurity team] * Fixed signature on "status call": ModSecurity is now using the original server signature. [Issues #702 - Linas and ModSecurity team] * YAJL version is printed while ModSecurity initialization. [Issue #703 - Steffen (Apache Lounge) and Mauro Faccenda] * Fixed subnet representation using slash notation on the @ipMatch operator. [Issue #706 - Walter Hop and ModSecurity team] * Limited the length of a status call. [Issue #714 - 'cpanelkurt' and ModSecurity team] * Added the missing -P option to nginx regression tests. [Issue #720 - Paul Yang] * Fixed automake scripts to do not use features which will be deprecated in the upcoming releases of automake. [Issue #760 - ModSecurity team] * apr-utils's LDFALGS is now considered while building ModSecurity. [Issue #782 - Daniel J. Luke] * IIS installer is not considering IIS 6 as compatible anymore. [Issue #790 - ModSecurity team] * Fixed yajl build script: now looking for the correct header file. [Issue #804 - 'rpfilomeno' and ModSecurity team] * mlgoc is now forced to use TLS 1.x. [Issue #806 - Josh Amishav-Zlatin and ModSecurity team] </ChangeLog>
Notes
Notes: svn path=/head/; revision=378927
Diffstat (limited to 'www/nginx-devel/files/extra-patch-nginx-modsecurity-configure')
-rw-r--r--www/nginx-devel/files/extra-patch-nginx-modsecurity-configure4
1 files changed, 2 insertions, 2 deletions
diff --git a/www/nginx-devel/files/extra-patch-nginx-modsecurity-configure b/www/nginx-devel/files/extra-patch-nginx-modsecurity-configure
index 92e5aac2e6da..ffbc3eb36687 100644
--- a/www/nginx-devel/files/extra-patch-nginx-modsecurity-configure
+++ b/www/nginx-devel/files/extra-patch-nginx-modsecurity-configure
@@ -1,5 +1,5 @@
---- ../modsecurity-2.8.0/configure.orig 2014-04-15 16:44:15.000000000 +0400
-+++ ../modsecurity-2.8.0/configure 2014-08-10 21:24:00.000000000 +0400
+--- ../modsecurity-2.9.0/configure.orig 2014-04-15 16:44:15.000000000 +0400
++++ ../modsecurity-2.9.0/configure 2014-08-10 21:24:00.000000000 +0400
@@ -14664,7 +14664,7 @@
no) :
test_paths= ;; #(