void-packages/srcpkgs/suricata/template

41 lines
1.5 KiB
Bash
Raw Normal View History

2017-03-04 18:43:44 +01:00
# Template file for 'suricata'
pkgname=suricata
version=3.2.1
revision=3
2017-03-04 18:43:44 +01:00
build_style=gnu-configure
2017-03-26 13:47:22 +02:00
configure_args="--disable-gccmarch-native"
2017-03-04 18:43:44 +01:00
hostmakedepends="pkg-config"
makedepends="libnet-devel libpcap-devel pcre-devel libyaml-devel libcap-ng-devel file-devel"
short_desc="Next Generation Intrusion Detection and Prevention Engine"
maintainer="demiaster <marta.celeste.feriani@gmail.com>"
license="GPL-2"
homepage="https://suricata-ids.org/"
distfiles="https://www.openinfosecfoundation.org/download/$pkgname-$version.tar.gz
https://rules.emergingthreats.net/open/suricata/emerging.rules.tar.gz"
checksum="0e0b0cf49016804bb2fb1fc4327341617e76a67902f4e03e0ef6d16c1d7d3994
82f7bbfd45f101a2247f62021bd304db1a6c246ed29b1771ed5cd53ac4b4af31"
system_accounts="$pkgname"
make_dirs="/var/log/$pkgname 0755 $pkgname $pkgname
/var/lib/$pkgname 0755 $pkgname $pkgname"
confs_files="/etc/$pkgname/* /etc/$pkgname/rules/*"
post_build() {
sed -i 's|#run-as:|run-as:|g' $pkgname.yaml
sed -i "s|# user: suri| user: $pkgname|g" $pkgname.yaml
sed -i "s|# group: suri| group: $pkgname|g" $pkgname.yaml
sed -i "s|#daemon-directory: \"/\"|daemon-directory: \"/var/lib/suricata\"|g" $pkgname.yaml
}
2017-03-04 18:43:44 +01:00
post_install() {
vsv $pkgname
2017-03-26 13:47:22 +02:00
vinstall $pkgname.yaml 644 etc/$pkgname
vinstall classification.config 644 etc/$pkgname
vinstall reference.config 644 etc/$pkgname
vinstall threshold.config 644 etc/$pkgname
2017-03-04 18:43:44 +01:00
vmkdir etc/$pkgname/rules
vcopy rules/*.rules etc/$pkgname/rules
vcopy ../rules/*.rules etc/$pkgname/rules
vlicense ../rules/LICENSE emerging-rules.LICENSE
2017-03-04 18:43:44 +01:00
}