-
Notifications
You must be signed in to change notification settings - Fork 156
Closed
Description
Note to mwscan users: update your install, or you will not get new rules anymore!
- The
grepURL has changed fromgit.io/mwscan.txttomwscan.s3.amazonaws.com/mwscan.txt - If using the
mwscanpackage, trysudo pip3 install --upgrade mwscan(orsudo pip install --upgrade mwscan).
See the updated docs for sample crons.
What is this change about?
Let the CI pipeline build the signatures, instead of including them in the repo (redundantly).
Pro: This will unclutter many PRs
Con: Installation instructions need to change, people need to update their mwscan code as the URL is hardcoded and currently points to github.
Plan:
- Instruct Travis to build rules and upload them to S3 upon commit to master. Done: https://mwscan.s3.amazonaws.com/mwscan.yar
- Change built rules name to
mwscan.txtandmwscan.yar(fromall-confirmed). - Update all references to all-confirmed, eg in travis test scripts
- Change URL in ruleset.py
- Update basic instructions/URL for
grepusage - Do not bundle rules anymore in pip/deb package and remove
DEFAULT_RULES_FILE - Make
mwscanruleset the default one - Ensure that scanning continues, even if S3 is unreachable (except of course when there is no cached version of the rules)
- Add
build/*to .gitignore so PRs will not clutter any further. - Verify that
mwscanwithout arguments still does a sane thing (ie download the latest default ruleset and use that) - Update screenshot in docs
- Release new pip package
- Add wildcard rule that will fail on everything, to warn sysadmins to upgrade.
Mwscan users (e.g. Byte) should:
- Once steps above are completed, install new pip package and/or build new deb with new S3 rule URL
Metadata
Metadata
Assignees
Labels
No labels