Hello community,

here is the log from the commit of package modsecurity for openSUSE:Factory 
checked in at 2020-07-30 15:47:54
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/modsecurity (Old)
 and      /work/SRC/openSUSE:Factory/.modsecurity.new.3592 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "modsecurity"

Thu Jul 30 15:47:54 2020 rev:3 rq:823577 version:3.0.4

Changes:
--------
--- /work/SRC/openSUSE:Factory/modsecurity/modsecurity.changes  2018-07-17 
09:43:54.980956049 +0200
+++ /work/SRC/openSUSE:Factory/.modsecurity.new.3592/modsecurity.changes        
2020-07-30 15:49:23.494041473 +0200
@@ -1,0 +2,161 @@
+Wed Jul 22 10:39:48 UTC 2020 - Dirk Mueller <[email protected]>
+
+- add baselibs, fix packaging (install into %_libdir)
+- update to 3.0.4:
+ - Fix: audit log data omitted when nolog,auditlog
+ - Fix: ModSecurity 3.x inspectFile operator does not pass
+ - XML: Remove error messages from stderr
+ - Filter comment or blank line for pmFromFile operator
+ - Additional adjustment to Cookie header parsing
+ - Restore chained rule part H logging to be more like 2.9 behaviour
+ - Small fixes in log messages to help debugging the file upload
+ - Fix Cookie header parsing issues
+ - Fix rules with nolog are logging to part H
+ - Fix argument key-value pair parsing cases
+ - Fix: audit log part for response body for JSON format to be E
+ - Make sure m_rulesMessages is filled after successfull match
+ - Fix @pm lookup for possible matches on offset zero.
+ - Regex lookup on the key name instead of COLLECTION:key
+ - Missing throw in Operator::instantiate
+ - Making block action execution dependent of the SecEngine status
+ - Making block action execution dependent of the SecEngine status
+ - Having body limits to respect the rule engine state
+ - Fix SecRuleUpdateTargetById does not match regular expressions
+ - Adds missing check for runtime ctl:ruleRemoveByTag
+ - Adds a new operator verifySVNR that checks for Austrian social
+   security numbers.
+ - Fix variables output in debug logs
+ - Correct typo validade in log output
+ - fix/minor: Error encoding hexa decimal.
+ - Limit more log variables to 200 characters.
+ - parser: fix parsed file names
+ - Allow empty anchored variable
+ - Fixed FILES_NAMES collection after the end of multipart parsing
+ - Fixed validateByteRange parsing method
+ - Removes a memory leak on the JSON parser
+ - Enables LMDB on the regression tests.
+ - Fix: Extra whitespace in some configuration directives causing error
+ - Refactoring on Regex and SMatch classes.
+ - Fixed buffer overflow in Utils::Md5::hexdigest()
+ - Implemented merge() method for ConfigInt, ConfigDouble, ConfigString
+ - Adds initially support to the drop action.
+ - Complete merging of particular rule properties
+ - Replaces AC_CHECK_FILE with 'test -f'
+ - Fix inet addr handling on 64 bit big endian systems
+ - Fix tests on FreeBSD
+ - Changes ENV test case to read the default MODSECURTIY env var
+ - Regression: Sets MODSECURITY env var during the tests execution
+ - Fix setenv action to strdup key=variable
+ - Allow 0 length JSON requests.
+ - Fix "make dist" target to include default configuration
+ - Replaced log locking using mutex with fcntl lock
+ - Correct the usage of modsecurity::Phases::NUMBER_OF_PHASES
+ - Adds support to multiple ranges in ctl:ruleRemoveById
+ - Rule variable interpolation broken
+ - Make the boundary check less strict as per RFC2046
+ - Fix buffer size for utf8toUnicode transformation
+ - Fix double macros bug
+ - Override the default status code if not suitable to redirect action
+ - parser: Fix the support for CRLF configuration files
+ - Organizes the server logs
+ - m_lineNumber in Rule not mapping with the correct line number in file
+ - Using shared_ptr instead of unique_ptr on rules exceptions
+ - Changes debuglogs schema to avoid unecessary str allocation
+ - Fix the SecUnicodeMapFile and SecUnicodeCodePage
+ - Changes the timing to save the rule message
+ - Fix crash in msc_rules_add_file() when using disruptive action in chain
+ - Fix memory leak in AuditLog::init()
+ - Fix RulesProperties::appendRules()
+ - Fix RULE lookup in chained rules
+ - @ipMatch "Could not add entry" on slash/32 notation in 2.9.0
+ - Using values after transformation at MATCHED_VARS
+ - Adds support to UpdateActionById.
+ - Add correct C function prototypes for msc_init and msc_create_rule_set
+ - Allow LuaJIT 2.1 to be used
+ - Match m_id JSON log with RuleMessage and v2 format
+ - Adds support to setenv action.
+ - Adds new transaction constructor that accepts the transaction id
+   as parameter.
+ - Adds request IDs and URIs to the debug log
+ - Treating variables exception on load-time instead of run time.
+ - Fix: function m.setvar in Lua scripts and add testcases
+ - Fix SecResponseBodyAccess and ctl:requestBodyAccess directives
+ - Fix OpenBSD build
+ - Fix parser to support GeoLookup with MaxMind
+ - parser: Fix simple quote setvar in the end of the line
+ - Fix pc file
+ - modsec_rules_check: uses the gnu `.la' instead of `.a' file
+ - good practices: Initialize variables before use it
+ - Fix utf-8 character encoding conversion
+ - Adds support for ctl:requestBodyProcessor=URLENCODED
+ - Add LUA compatibility for CentOS and try to use LuaJIT first if available
+ - Allow LuaJIT to be used
+ - Implement support for Lua 5.1
+ - Variable names must match fully, not partially. Match should be case
+   insensitive.
+  - Improves the performance while loading the rules
+ - Allow empty strings to be evaluated by regex::searchAll
+ - Adds basic pkg-config info
+ - Fixed LMDB collection errors
+ - Fixed false positive MULTIPART_UNMATCHED_BOUNDARY errors
+ - Fix ip tree lookup on netmask content
+ - Changes the behavior of the default sec actions
+ - Refactoring on {global,ip,resources,session,tx,user} collections
+ - Fix race condition in UniqueId::uniqueId()
+ - Fix memory leak in error message for msc_rules_merge C APIs
+ - Return false in SharedFiles::open() when an error happens
+ - Use rvalue reference in ModSecurity::serverLog
+ - Build System: Fix when multiple lines for curl version.
+ - Checks if response body inspection is enabled before process it
+ - Code Cleanup.
+ - Fix setvar parsing of quoted data
+ - Fix LDFLAGS for unit tests.
+ - Adds time stamp back to the audit logs
+ - Disables skip counter if debug log is disabled
+ - Cosmetics: Represents amount of skipped rules without decimal
+ - Add missing escapeSeqDecode, urlEncode and trimLeft/Right tfns to parser
+ - Fix STATUS var parsing and accept STATUS_LINE var for v2 backward comp.
+ - Fix memory leak in modsecurity::utils::expandEnv()
+ - Initialize m_dtd member in ValidateDTD class as NULL
+ - Fix broken @detectxss operator regression test case
+ - Fix utils::string::ssplit() to handle delimiter in the end of string
+ - Fix variable FILES_TMPNAMES 
+ - Fix memory leak in Collections
+ - Fix lib version information while generating the .so file
+ - Adds support for ctl:ruleRemoveByTag
+ - Fix SecUploadDir configuration merge
+ - Include all prerequisites for "make check" into dist archive
+ - Fix: Reverse logic of checking output in @inspectFile
+ - Adds support to libMaxMind
+ - Adds capture action to detectXSS
+ - Temporarily accept invalid MULTIPART_SEMICOLON_MISSING operator
+ - Adds capture action to detectSQLi
+ - Adds capture action to rbl
+ - Adds capture action to verifyCC
+ - Adds capture action to verifySSN
+ - Adds capture action to verifyCPF
+ - Prettier error messages for unsupported configurations (UX)
+ - Add missing verify*** transformation statements to parser
+ - Fix a set of compilation warnings
+ - Check for disruptive action on SecDefaultAction.
+ - Fix block-block infinite loop.
+ - Correction remove_by_tag and remove_by_msg logic.
+ - Fix LMDB compile error
+ - Fix msc_who_am_i() to return pointer to a valid C string
+ - Added some cosmetics to autoconf related code
+ - Fix "make dist" target to include necessary headers for Lua
+ - Fix "include /foo/*.conf" for single matched object in directory
+ - Add missing Base64 transformation statements to parser
+ - Fixed resource load on ip match from file
+ - Fixed examples compilation while using disable-shared
+ - Fixed compilation issue while xml is disabled
+ - Having LDADD and LDFLAGS organized on Makefile.am
+ - Checking std::deque size before use it
+ - perf improvement: Added the concept of RunTimeString and removed
+   all run time parser.
+ - perf improvement: Checks debuglog level before format debug msg
+ - perf. improvement/rx: Only compute dynamic regex in case of macro
+ - Fix uri on the benchmark utility
+ - disable Lua on systems with liblua5.1
+
+-------------------------------------------------------------------

Old:
----
  modsecurity-v3.0.0.tar.gz

New:
----
  baselibs.conf
  modsecurity-v3.0.4.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ modsecurity.spec ++++++
--- /var/tmp/diff_new_pack.3L1gjV/_old  2020-07-30 15:49:25.270043220 +0200
+++ /var/tmp/diff_new_pack.3L1gjV/_new  2020-07-30 15:49:25.274043224 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package modsecurity
 #
-# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2020 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -12,18 +12,19 @@
 # license that conforms to the Open Source Definition (Version 1.9)
 # published by the Open Source Initiative.
 
-# Please submit bugfixes or comments via http://bugs.opensuse.org/
+# Please submit bugfixes or comments via https://bugs.opensuse.org/
 #
 
 
 Name:           modsecurity
-Version:        3.0.0
+Version:        3.0.4
 Release:        0
 Summary:        Web application firewall engine
 License:        BSD-2-Clause
 Group:          Productivity/Networking/Security
-Url:            https://www.modsecurity.org/
-Source:         
https://github.com/SpiderLabs/ModSecurity/releases/download/v%{version}/modsecurity-v%{version}.tar.gz
+URL:            https://www.modsecurity.org/
+Source0:        
https://github.com/SpiderLabs/ModSecurity/releases/download/v%{version}/modsecurity-v%{version}.tar.gz
+Source1:        baselibs.conf
 BuildRequires:  automake
 BuildRequires:  cmake
 BuildRequires:  gcc-c++
@@ -64,11 +65,12 @@
 %build
 export MAKEFLAGS=-j$(($(grep -c ^processor /proc/cpuinfo) - 0))
 sh build.sh
-./configure --prefix=%{_prefix} --disable-doxygen-doc --disable-examples 
--disable-dependency-tracking
-make
-%make_install
+%configure --disable-doxygen-doc --disable-examples 
--disable-dependency-tracking
+%make_build
 
 %install
+export MAKEFLAGS=-j$(($(grep -c ^processor /proc/cpuinfo) - 0))
+%make_install
 find %{buildroot} -type f -name "*.la" -delete -print
 find %{buildroot} -type f -name "*.a" -delete -print
 
@@ -81,11 +83,12 @@
 
 %files -n libmodsecurity3
 %license LICENSE
-%{_libexecdir}/libmodsecurity.so.3
-%{_libexecdir}/libmodsecurity.so.3.*
+%{_libdir}/libmodsecurity.so.3
+%{_libdir}/libmodsecurity.so.3.*
 
 %files devel
-%{_libexecdir}/libmodsecurity.so
+%{_libdir}/libmodsecurity.so
 %{_includedir}/modsecurity
+%{_libdir}/pkgconfig/*.pc
 
 %changelog

++++++ baselibs.conf ++++++
libmodsecurity3
++++++ modsecurity-v3.0.0.tar.gz -> modsecurity-v3.0.4.tar.gz ++++++
++++ 99051 lines of diff (skipped)


Reply via email to