debian/0000775000000000000000000000000012260725621007173 5ustar debian/rules0000775000000000000000000000142212260724754010260 0ustar #!/usr/bin/make -f # Uncomment this to turn on verbose mode. #export DH_VERBOSE=1 config.status: dh_testdir dh_autoreconf ./configure build: build-stamp build-stamp: config.status dh_testdir $(MAKE) touch build-stamp clean: dh_testdir dh_testroot rm -f build-stamp config.log [ ! -f Makefile ] || $(MAKE) distclean dh_autoreconf_clean dh_clean install: build dh_testdir dh_testroot dh_clean -k dh_installdirs dh_apache2 binary-indep: build install binary-arch: build install dh_testdir dh_testroot dh_installchangelogs dh_installdocs dh_link dh_strip dh_compress dh_fixperms dh_installdeb dh_shlibdeps dh_gencontrol dh_md5sums dh_builddeb binary: binary-indep binary-arch .PHONY: build clean binary-indep binary-arch binary install configure debian/defensible.load0000664000000000000000000000011112166553464012136 0ustar LoadModule defensible_module /usr/lib/apache2/modules/mod_defensible.so debian/changelog0000664000000000000000000000347012260725102011043 0ustar libapache2-mod-defensible (1.4-3.1ubuntu2) trusty; urgency=medium * Use dh-autoreconf instead of autotools-dev to also fix FTBFS on ppc64el by getting new libtool macros (still updates config.{sub,guess}). * Use automake's "foreign" option to fix FTBFS while autoreconfing. -- Logan Rosen Wed, 01 Jan 2014 00:39:44 -0500 libapache2-mod-defensible (1.4-3.1ubuntu1) saucy; urgency=low * Use dh_autotools-dev to update config.{sub,guess} for new ports. -- Adam Conrad Tue, 15 Oct 2013 21:25:12 +0100 libapache2-mod-defensible (1.4-3.1) unstable; urgency=low * Non-maintainer upload. * Port to Apache 2.4 (closes: #666850). -- Colin Watson Wed, 10 Jul 2013 10:03:55 +0100 libapache2-mod-defensible (1.4-3) unstable; urgency=low * Rebuild without udns support (Closes: #497164) * Bump standard version * Trust path set by dpkg in prerm * Fix copyright -- Julien Danjou Sat, 30 Aug 2008 16:22:46 +0200 libapache2-mod-defensible (1.4-2) unstable; urgency=low * Fix makefile, ohoho (Closes: #444404) -- Julien Danjou Sat, 29 Sep 2007 17:45:44 +0200 libapache2-mod-defensible (1.4-1) unstable; urgency=low * New upstream release - Stop freeing default context (Closes: #442870) * Don't ignore error on clean and use distclean instead of clean -- Julien Danjou Mon, 24 Sep 2007 21:01:29 +0200 libapache2-mod-defensible (1.3-1) unstable; urgency=low * New upstream release - Support udns 0.0.9 (Closes: #419686) * Better clean target -- Julien Danjou Tue, 17 Apr 2007 15:04:17 +0200 libapache2-mod-defensible (1.2-1) unstable; urgency=low * Initial release (Closes: #407568) -- Julien Danjou Thu, 1 Feb 2007 16:01:39 +0100 debian/compat0000664000000000000000000000000212166553464010402 0ustar 5 debian/copyright0000664000000000000000000000221312166553464011135 0ustar This package was debianized by Julien Danjou on Thu, 1 Feb 2007 16:04:15 +0100. It was downloaded from http://julien.danjou.info/mod_defensible.html Upstream author: Julien Danjou Copyright: Copyright © 2007 Julien Danjou This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA On Debian systems, the complete text of the GNU Lesser General Public License can be found in `/usr/share/common-licenses/LGPL'. debian/source/0000775000000000000000000000000012166554060010475 5ustar debian/source/format0000664000000000000000000000001412166554060011703 0ustar 3.0 (quilt) debian/control0000664000000000000000000000116312260724766010610 0ustar Source: libapache2-mod-defensible Maintainer: Ubuntu Developers XSBC-Original-Maintainer: Julien Danjou Section: web Priority: extra Standards-Version: 3.8.0 Build-Depends: debhelper (>= 5.0.0), dh-apache2, apache2-dev (>= 2.2.3-2), dh-autoreconf Package: libapache2-mod-defensible Architecture: any Depends: ${shlibs:Depends}, ${misc:Depends} Description: module for Apache2 which provides DNSBL usage mod_defensible implements usage of DNSBL servers to block access to a Web site or to specific locations. . This package provides the module for Apache 2 server. debian/docs0000664000000000000000000000000712166553464010054 0ustar README debian/apache20000664000000000000000000000006712166554502010427 0ustar mod .libs/mod_defensible.so mod debian/defensible.load debian/dirs0000664000000000000000000000006512166553464010071 0ustar /etc/apache2/mods-available /usr/lib/apache2/modules debian/patches/0000775000000000000000000000000012260725617010627 5ustar debian/patches/apxs-cppflags.patch0000664000000000000000000000236312166556157014432 0ustar Description: Add APR_INCLUDEDIR and EXTRA_CPPFLAGS to CPPFLAGS Author: Colin Watson Forwarded: no Last-Update: 2013-07-08 Index: b/Makefile.am =================================================================== --- a/Makefile.am +++ b/Makefile.am @@ -9,7 +9,7 @@ mod_defensible_la_SOURCES = $(MODULESOURCES) mod_defensible_la_LDFLAGS = -module `${APXS2} -q LDFLAGS_SHLIB` -mod_defensible_la_CPPFLAGS = -I`${APXS2} -q INCLUDEDIR` +mod_defensible_la_CPPFLAGS = -I`${APXS2} -q INCLUDEDIR` -I`${APXS2} -q APR_INCLUDEDIR` `${APXS2} -q EXTRA_CPPFLAGS` mod_defensible_la_CFLAGS = -W -Wall `${APXS2} -q CFLAGS CFLAGS_SHLIB` CC = `${APXS2} -q CC` Index: b/Makefile.in =================================================================== --- a/Makefile.in +++ b/Makefile.in @@ -201,7 +201,7 @@ lib_LTLIBRARIES = mod_defensible.la mod_defensible_la_SOURCES = $(MODULESOURCES) mod_defensible_la_LDFLAGS = -module `${APXS2} -q LDFLAGS_SHLIB` -mod_defensible_la_CPPFLAGS = -I`${APXS2} -q INCLUDEDIR` +mod_defensible_la_CPPFLAGS = -I`${APXS2} -q INCLUDEDIR` -I`${APXS2} -q APR_INCLUDEDIR` `${APXS2} -q EXTRA_CPPFLAGS` mod_defensible_la_CFLAGS = -W -Wall `${APXS2} -q CFLAGS CFLAGS_SHLIB` all: config.h $(MAKE) $(AM_MAKEFLAGS) all-am debian/patches/series0000664000000000000000000000015712260725011012033 0ustar apxs-cppflags.patch aplog-use-module.patch server-banner.patch conn-rec-remote-ip.patch automake-foreign.patch debian/patches/conn-rec-remote-ip.patch0000664000000000000000000000163212166557011015251 0ustar Description: Handle conn_rec->remote_ip split in Apache 2.4 Author: Colin Watson Forwarded: no Last-Update: 2013-07-08 Index: b/mod_defensible.c =================================================================== --- a/mod_defensible.c +++ b/mod_defensible.c @@ -73,8 +73,10 @@ #if AP_SERVER_MAJORVERSION_NUMBER > 2 || \ (AP_SERVER_MAJORVERSION_NUMBER == 2 && AP_SERVER_MINORVERSION_NUMBER >= 4) #define GET_SERVER_BANNER ap_get_server_banner +#define CLIENT_IP(conn) ((conn)->client_ip) #else #define GET_SERVER_BANNER ap_get_server_version +#define CLIENT_IP(conn) ((conn)->remote_ip) #endif /* Callback function called when we get DnsblUse option */ @@ -209,7 +211,7 @@ static int check_dnsbl_access(request_rec *r) { char **srv_elts; - char *ip = r->connection->remote_ip; + char *ip = CLIENT_IP(r->connection); int i; dnsbl_config *conf = (dnsbl_config *) debian/patches/aplog-use-module.patch0000664000000000000000000000100412166554432015022 0ustar Description: Add APLOG_USE_MODULE for Apache 2.4 per-module loglevels Author: Colin Watson Forwarded: no Last-Update: 2013-07-08 Index: b/mod_defensible.c =================================================================== --- a/mod_defensible.c +++ b/mod_defensible.c @@ -64,6 +64,10 @@ #endif } dnsbl_config; +#ifdef APLOG_USE_MODULE +APLOG_USE_MODULE(defensible); +#endif + module AP_MODULE_DECLARE_DATA defensible_module; /* Callback function called when we get DnsblUse option */ debian/patches/automake-foreign.patch0000664000000000000000000000046112260725617015106 0ustar --- a/configure.in +++ b/configure.in @@ -1,8 +1,8 @@ # configure.in for mod_defensible # © 2007 Julien Danjou -AC_INIT(mod_defensible) -AM_INIT_AUTOMAKE(mod_defensible, 1.2) +AC_INIT([mod_defensible], [1.2]) +AM_INIT_AUTOMAKE([foreign]) AC_CONFIG_SRCDIR(mod_defensible.c) debian/patches/server-banner.patch0000664000000000000000000000231112166556651014423 0ustar Description: Handle ap_get_server_version split in Apache 2.4 Author: Colin Watson Forwarded: no Last-Update: 2013-07-08 Index: b/mod_defensible.c =================================================================== --- a/mod_defensible.c +++ b/mod_defensible.c @@ -70,6 +70,13 @@ module AP_MODULE_DECLARE_DATA defensible_module; +#if AP_SERVER_MAJORVERSION_NUMBER > 2 || \ + (AP_SERVER_MAJORVERSION_NUMBER == 2 && AP_SERVER_MINORVERSION_NUMBER >= 4) +#define GET_SERVER_BANNER ap_get_server_banner +#else +#define GET_SERVER_BANNER ap_get_server_version +#endif + /* Callback function called when we get DnsblUse option */ static const char *use_dnsbl(cmd_parms *parms __attribute__ ((unused)), void *mconfig, @@ -191,7 +198,7 @@ ap_rprintf(r, "

You don't have permission to access %s\n", ap_escape_html(r->pool, r->uri)); ap_rprintf(r, "on this server because you are currently blacklisted by a DNSBL server at: %s

\n", dnsbl); ap_rputs("
\n", r); - ap_rprintf(r, "
%s
\n", ap_get_server_version()); + ap_rprintf(r, "
%s
\n", GET_SERVER_BANNER()); ap_rputs("\n", r); }