summaryrefslogtreecommitdiffstats
path: root/sca-cpp/trunk/patches
diff options
context:
space:
mode:
authorjsdelfino <jsdelfino@13f79535-47bb-0310-9956-ffa450edef68>2011-11-14 07:10:15 +0000
committerjsdelfino <jsdelfino@13f79535-47bb-0310-9956-ffa450edef68>2011-11-14 07:10:15 +0000
commit4bf0a7052b448315eda710857acafe24bb112a5b (patch)
tree89b47bf8471da886a2c523721d76c6ebd5860c28 /sca-cpp/trunk/patches
parent1b4cab13b70f2d596ecb98e81073dbb45e0e85df (diff)
Change authentication scheme from Form based auth to OpenID + OAuth.
git-svn-id: http://svn.us.apache.org/repos/asf/tuscany@1201614 13f79535-47bb-0310-9956-ffa450edef68
Diffstat (limited to 'sca-cpp/trunk/patches')
-rw-r--r--sca-cpp/trunk/patches/memcached-1.4.7.patch12
-rw-r--r--sca-cpp/trunk/patches/modsecurity-crs_2.2.2.patch8
2 files changed, 20 insertions, 0 deletions
diff --git a/sca-cpp/trunk/patches/memcached-1.4.7.patch b/sca-cpp/trunk/patches/memcached-1.4.7.patch
new file mode 100644
index 0000000000..f34d75753e
--- /dev/null
+++ b/sca-cpp/trunk/patches/memcached-1.4.7.patch
@@ -0,0 +1,12 @@
+--- configure.ac
++++ configure.ac
+@@ -247,7 +247,7 @@ AC_CACHE_CHECK([for libevent directory], ac_cv_libevent_dir, [
+ AS_IF(test "$SUNCC" = "yes" -o "x$_myos" = "xsolaris2",
+ [saved_LDFLAGS="$saved_LDFLAGS -Wl,-R$ledir/lib"],
+ [AS_IF(test "$GCC" = "yes",
+- [saved_LDFLAGS="$saved_LDFLAGS -Wl,-rpath=$ledir/lib"])])
++ [saved_LDFLAGS="$saved_LDFLAGS -Wl,-rpath,$ledir/lib"])])
+ else
+ ac_cv_libevent_dir="(system)"
+ fi
+
diff --git a/sca-cpp/trunk/patches/modsecurity-crs_2.2.2.patch b/sca-cpp/trunk/patches/modsecurity-crs_2.2.2.patch
new file mode 100644
index 0000000000..2ff56de749
--- /dev/null
+++ b/sca-cpp/trunk/patches/modsecurity-crs_2.2.2.patch
@@ -0,0 +1,8 @@
+--- base_rules/modsecurity_crs_40_generic_attacks.conf
++++ base_rules/modsecurity_crs_40_generic_attacks.conf
+164,165c164,165
+< SecRule ARGS "(?:ft|htt)ps?.*\?+$" \
+< "phase:2,rev:'2.2.2',t:none,t:htmlEntityDecode,t:lowercase,capture,ctl:auditLogParts=+E,block,status:501,msg:'Remote File Inclusion Attack',id:'950119',severity:'2',setvar:'tx.msg=%{rule.msg}',setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},setvar:tx.rfi_score=+%{tx.critical_anomaly_score},setvar:tx.%{rule.id}-WEB_ATTACK/RFI-%{matched_var_name}=%{tx.0}"
+---
+> #SecRule ARGS "(?:ft|htt)ps?.*\?+$" \
+> # "phase:2,rev:'2.2.2',t:none,t:htmlEntityDecode,t:lowercase,capture,ctl:auditLogParts=+E,block,status:501,msg:'Remote File Inclusion Attack',id:'950119',severity:'2',setvar:'tx.msg=%{rule.msg}',setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},setvar:tx.rfi_score=+%{tx.critical_anomaly_score},setvar:tx.%{rule.id}-WEB_ATTACK/RFI-%{matched_var_name}=%{tx.0}"