diff options
author | John Helmert III <ajak@gentoo.org> | 2021-06-11 14:58:09 -0500 |
---|---|---|
committer | John Helmert III <ajak@gentoo.org> | 2021-06-11 15:01:45 -0500 |
commit | 1e9efc2dfe106592e203e806c8f0f4063513132f (patch) | |
tree | cca510f7dd697bc1f2692ecfae7f1558672c21d7 /net-analyzer | |
parent | gnome-extra/gnome-shell-extensions: Version bump to 40.2 (diff) | |
download | gentoo-1e9efc2dfe106592e203e806c8f0f4063513132f.tar.gz gentoo-1e9efc2dfe106592e203e806c8f0f4063513132f.tar.bz2 gentoo-1e9efc2dfe106592e203e806c8f0f4063513132f.zip |
net-analyzer/snort: drop 2.9.16, 2.9.16-r100
Bug: https://bugs.gentoo.org/765466
Signed-off-by: John Helmert III <ajak@gentoo.org>
Diffstat (limited to 'net-analyzer')
-rw-r--r-- | net-analyzer/snort/Manifest | 1 | ||||
-rw-r--r-- | net-analyzer/snort/files/snort-2.9.15.1-fno-common.patch | 110 | ||||
-rw-r--r-- | net-analyzer/snort/snort-2.9.16-r100.ebuild | 250 | ||||
-rw-r--r-- | net-analyzer/snort/snort-2.9.16.ebuild | 246 |
4 files changed, 0 insertions, 607 deletions
diff --git a/net-analyzer/snort/Manifest b/net-analyzer/snort/Manifest index 470f4103c0a7..d44ca91e97c3 100644 --- a/net-analyzer/snort/Manifest +++ b/net-analyzer/snort/Manifest @@ -1,2 +1 @@ -DIST snort-2.9.16.tar.gz 6948498 BLAKE2B b089f1caef44cd5243c38eba44e7449b1111b397e42eb1722f64530206532edb413003e6af06d18bc6051ef1ce8cbcf42955d823a56abe061081e99c6492dea7 SHA512 7e4e772d351890cb6ad6db4210e1f302fbb600b3b25182800ffd7e73061a044c2cf6fa927e542a1d20cea4fa3eed522f022b394a9286ada7694309d0c8c3bb75 DIST snort-2.9.17.tar.gz 6983018 BLAKE2B 8a6d5f4311e304b141f705fdcd3f570e88540dc5ce5882887b6fa52ea16e41daac384012badcbbc087693ee631e30477b8af2a6c49efa8230c71b80937597355 SHA512 c1a69e697298b4e85b8b8898e29077f5e74d8e2a8e42c2164a5597b3739204d856a74f30bc7c30b1907ec7b3bd3c6c6d798ead890656386b0c2a2da2c201d006 diff --git a/net-analyzer/snort/files/snort-2.9.15.1-fno-common.patch b/net-analyzer/snort/files/snort-2.9.15.1-fno-common.patch deleted file mode 100644 index f5e3b3bbe34a..000000000000 --- a/net-analyzer/snort/files/snort-2.9.15.1-fno-common.patch +++ /dev/null @@ -1,110 +0,0 @@ ---- a/src/preprocessors/Stream6/stream_paf.h -+++ b/src/preprocessors/Stream6/stream_paf.h -@@ -68,12 +68,14 @@ - uint16_t s5_paf_port_registration_all (void* pv, uint16_t port, bool c2s, bool flush); - uint16_t s5_paf_service_registration (void* pv, uint16_t service, bool c2s, bool flush); - --enum FlushMode -+typedef enum - { - FLUSH_MODE_NORMAL = 0, - FLUSH_MODE_PRE_DISCARD, - FLUSH_MODE_DISCARD --}FlushMode; -+} FlushMode_t; -+ -+extern FlushMode_t FlushMode; - - typedef struct { - void* user[MAX_PAF_USER]; // arbitrary user data ---- a/src/sfutil/util_jsnorm.h -+++ b/src/sfutil/util_jsnorm.h -@@ -42,5 +42,7 @@ - uint16_t alerts; - }JSState; - -+extern int hex_lookup[256]; -+ - int JSNormalizeDecode(char *, uint16_t , char *, uint16_t destlen, char **, int *, JSState *, uint8_t *); - void InitJSNormLookupTable(void); ---- a/src/preprocessors/spp_session.h -+++ b/src/preprocessors/spp_session.h -@@ -28,6 +28,10 @@ - #include "decode.h" - #include "session_common.h" - -+#ifdef PERF_PROFILING -+extern PreprocStats sessionPerfStats; -+#endif -+ - /* list of function prototypes for this preprocessor */ - void SetupSessionManager(void); - void SessionReload(struct _SessionCache* lws_cache, uint32_t max_sessions, ---- a/src/preprocessors/spp_httpinspect.c -+++ b/src/preprocessors/spp_httpinspect.c -@@ -161,7 +161,6 @@ - MemPool *http_mempool = NULL; - MemPool *mime_decode_mempool = NULL; - MemPool *mime_log_mempool = NULL; --int hex_lookup[256]; - int valid_lookup[256]; - - char** xffFields = NULL; ---- a/src/detection-plugins/sp_session.c -+++ b/src/detection-plugins/sp_session.c -@@ -80,7 +80,7 @@ - #include "snort.h" - #include "profiler.h" - #ifdef PERF_PROFILING --PreprocStats sessionPerfStats; -+PreprocStats sp_sessionPerfStats; - extern PreprocStats ruleOTNEvalPerfStats; - #endif - -@@ -149,7 +149,7 @@ - /* map the keyword to an initialization/processing function */ - RegisterRuleOption("session", SessionInit, NULL, OPT_TYPE_LOGGING, NULL); - #ifdef PERF_PROFILING -- RegisterPreprocessorProfile("session", &sessionPerfStats, 3, &ruleOTNEvalPerfStats, NULL); -+ RegisterPreprocessorProfile("session", &sp_sessionPerfStats, 3, &ruleOTNEvalPerfStats, NULL); - #endif - DEBUG_WRAP(DebugMessage(DEBUG_PLUGIN, "Plugin: Session Setup\n");); - } -@@ -287,7 +287,7 @@ - FILE *session; /* session file ptr */ - PROFILE_VARS; - -- PREPROC_PROFILE_START(sessionPerfStats); -+ PREPROC_PROFILE_START(sp_sessionPerfStats); - - /* if there's data in this packet */ - if(p != NULL) -@@ -298,7 +298,7 @@ - - if(session == NULL) - { -- PREPROC_PROFILE_END(sessionPerfStats); -+ PREPROC_PROFILE_END(sp_sessionPerfStats); - return DETECTION_OPTION_MATCH; - } - -@@ -308,7 +308,7 @@ - } - } - -- PREPROC_PROFILE_END(sessionPerfStats); -+ PREPROC_PROFILE_END(sp_sessionPerfStats); - return DETECTION_OPTION_MATCH; - } - ---- a/src/detection-plugins/sp_session.h -+++ b/src/detection-plugins/sp_session.h -@@ -29,5 +29,8 @@ - void SetupSession(void); - uint32_t SessionHash(void *d); - int SessionCompare(void *l, void *r); -+#ifdef PERF_PROFILING -+extern PreprocStats sp_sessionPerfStats; -+#endif - - #endif /* __SP_SESSION_H__ */ diff --git a/net-analyzer/snort/snort-2.9.16-r100.ebuild b/net-analyzer/snort/snort-2.9.16-r100.ebuild deleted file mode 100644 index 91f49430d6f0..000000000000 --- a/net-analyzer/snort/snort-2.9.16-r100.ebuild +++ /dev/null @@ -1,250 +0,0 @@ -# Copyright 1999-2021 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=7 - -LUA_COMPAT=( luajit ) - -inherit autotools lua-single user systemd tmpfiles - -DESCRIPTION="The de facto standard for intrusion detection/prevention" -HOMEPAGE="https://www.snort.org" -SRC_URI="https://www.snort.org/downloads/archive/${PN}/${P}.tar.gz" -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~amd64 ~arm ~arm64 ~mips ~ppc ~ppc64 ~sparc ~x86" -IUSE="+active-response control-socket debug file-inspect +flexresp3 +gre -high-availability inline-init-failopen large-pcap-64bit +libtirpc -linux-smp-stats +non-ether-decoders open-appid +perfprofiling +ppm +react -reload-error-restart selinux shared-rep side-channel sourcefire static -+threads" - -DEPEND=">=net-libs/libpcap-1.3.0 - >=net-libs/daq-2.0.2 - >=dev-libs/libpcre-8.33 - dev-libs/libdnet - net-libs/libnsl:0= - sys-libs/zlib - !libtirpc? ( sys-libs/glibc[rpc(-)] ) - libtirpc? ( net-libs/libtirpc ) - open-appid? ( ${LUA_DEPS} ) -" - -RDEPEND="${DEPEND} - selinux? ( sec-policy/selinux-snort )" - -REQUIRED_USE="!kernel_linux? ( !shared-rep ) - open-appid? ( ${LUA_REQUIRED_USE} )" - -PATCHES=( - "${FILESDIR}"/${PN}-2.9.8.3-no-implicit.patch - "${FILESDIR}"/${PN}-2.9.8.3-rpc.patch - "${FILESDIR}"/${PN}-2.9.12-snort.pc.patch - "${FILESDIR}"/${PN}-2.9.15.1-fno-common.patch -) - -pkg_setup() { - # pre_inst() is a better place to put this - # but we need it here for the 'fowners' statements in src_install() - enewgroup snort - enewuser snort -1 -1 /dev/null snort - - use open-appid && lua-single_pkg_setup -} - -src_prepare() { - default - - mv configure.{in,ac} || die - - AT_M4DIR=m4 eautoreconf -} - -src_configure() { - econf \ - $(use_enable !static shared) \ - $(use_enable static) \ - $(use_enable static so-with-static-lib) \ - $(use_enable gre) \ - $(use_enable control-socket) \ - $(use_enable file-inspect) \ - $(use_enable high-availability ha) \ - $(use_enable non-ether-decoders) \ - $(use_enable shared-rep) \ - $(use_enable side-channel) \ - $(use_enable sourcefire) \ - $(use_enable ppm) \ - $(use_enable perfprofiling) \ - $(use_enable linux-smp-stats) \ - $(use_enable inline-init-failopen) \ - $(use_enable open-appid) \ - $(use_enable threads pthread) \ - $(use_enable debug) \ - $(use_enable debug debug-msgs) \ - $(use_enable debug corefiles) \ - $(use_enable !debug dlclose) \ - $(use_enable active-response) \ - $(use_enable reload-error-restart) \ - $(use_enable react) \ - $(use_enable flexresp3) \ - $(use_enable large-pcap-64bit large-pcap) \ - $(use_with libtirpc) \ - --enable-mpls \ - --enable-normalizer \ - --enable-reload \ - --enable-targetbased \ - --disable-build-dynamic-examples \ - --disable-profile \ - --disable-ppm-test \ - --disable-intel-soft-cpm \ - --disable-static-daq -} - -src_install() { - default - - keepdir /var/log/snort \ - /etc/snort/rules \ - /etc/snort/so_rules \ - /usr/$(get_libdir)/snort_dynamicrules - - # config.log and build.log are needed by Sourcefire - # to trouble shoot build problems and bug reports so we are - # perserving them incase the user needs upstream support. - dodoc RELEASE.NOTES ChangeLog \ - doc/* \ - tools/u2boat/README.u2boat - - insinto /etc/snort - doins etc/attribute_table.dtd \ - etc/classification.config \ - etc/gen-msg.map \ - etc/reference.config \ - etc/threshold.conf \ - etc/unicode.map - - # We use snort.conf.distrib because the config file is complicated - # and the one shipped with snort can change drastically between versions. - # Users should migrate setting by hand and not with etc-update. - newins etc/snort.conf snort.conf.distrib - - # config.log and build.log are needed by Sourcefire - # to troubleshoot build problems and bug reports so we are - # preserving them incase the user needs upstream support. - if [ -f "${WORKDIR}/${PF}/config.log" ]; then - dodoc "${WORKDIR}/${PF}/config.log" - fi - if [ -f "${T}/build.log" ]; then - dodoc "${T}/build.log" - fi - - insinto /etc/snort/preproc_rules - doins preproc_rules/decoder.rules \ - preproc_rules/preprocessor.rules \ - preproc_rules/sensitive-data.rules - - fowners -R snort:snort \ - /var/log/snort \ - /etc/snort - - newinitd "${FILESDIR}/snort.rc12" snort - newconfd "${FILESDIR}/snort.confd.2" snort - systemd_newunit "${FILESDIR}/snort_at.service" "snort@.service" - - newtmpfiles "${FILESDIR}"/snort.tmpfiles snort.conf - - # Sourcefire uses Makefiles to install docs causing Bug #297190. - # This removes the unwanted doc directory and rogue Makefiles. - rm -rf "${ED}"/usr/share/doc/snort || die "Failed to remove SF doc directories" - rm "${ED}"/usr/share/doc/"${PF}"/Makefile* || die "Failed to remove doc make files" - - # Remove unneeded .la files (Bug #382863) - rm -f "${ED}"/usr/$(get_libdir)/snort_dynamicengine/libsf_engine.la || die - rm -f "${ED}"/usr/$(get_libdir)/snort_dynamicpreprocessor/libsf_*_preproc.la || die "Failed to remove libsf_?_preproc.la" - - # Set the correct lib path for dynamicengine, dynamicpreprocessor, and dynamicdetection - sed -i -e 's|/usr/local/lib|/usr/'$(get_libdir)'|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Set the correct rule location in the config - sed -i -e 's|RULE_PATH ../rules|RULE_PATH /etc/snort/rules|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Set the correct preprocessor/decoder rule location in the config - sed -i -e 's|PREPROC_RULE_PATH ../preproc_rules|PREPROC_RULE_PATH /etc/snort/preproc_rules|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Enable the preprocessor/decoder rules - sed -i -e 's|^# include $PREPROC_RULE_PATH|include $PREPROC_RULE_PATH|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - sed -i -e 's|^# dynamicdetection directory|dynamicdetection directory|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Just some clean up of trailing /'s in the config - sed -i -e 's|snort_dynamicpreprocessor/$|snort_dynamicpreprocessor|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Make it clear in the config where these are... - sed -i -e 's|^include classification.config|include /etc/snort/classification.config|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - sed -i -e 's|^include reference.config|include /etc/snort/reference.config|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Disable all rule files by default. - sed -i -e 's|^include $RULE_PATH|# include $RULE_PATH|g' \ - "${ED%}/etc/snort/snort.conf.distrib" || die - - # Set the configured DAQ to afpacket - sed -i -e 's|^# config daq: <type>|config daq: afpacket|g' \ - "${ED%}/etc/snort/snort.conf.distrib" || die - - # Set the location of the DAQ modules - sed -i -e 's|^# config daq_dir: <dir>|config daq_dir: /usr/'$(get_libdir)'/daq|g' \ - "${ED%}/etc/snort/snort.conf.distrib" || die - - # Set the DAQ mode to passive - sed -i -e 's|^# config daq_mode: <mode>|config daq_mode: passive|g' \ - "${ED%}/etc/snort/snort.conf.distrib" || die - - # Set snort to run as snort:snort - sed -i -e 's|^# config set_gid:|config set_gid: snort|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - sed -i -e 's|^# config set_uid:|config set_uid: snort|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Set the default log dir - sed -i -e 's|^# config logdir:|config logdir: /var/log/snort/|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Set the correct so_rule location in the config - sed -i -e 's|SO_RULE_PATH ../so_rules|SO_RULE_PATH /etc/snort/so_rules|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die -} - -pkg_postinst() { - tmpfiles_process snort.conf - - einfo "There have been a number of improvements and new features" - einfo "added to ${P}. Please review the RELEASE.NOTES and" - einfo "ChangLog located in /usr/share/doc/${PF}." - einfo - elog "The Sourcefire Vulnerability Research Team (VRT) recommends that" - elog "users migrate their snort.conf customizations to the latest config" - elog "file released by the VRT. You can find the latest version of the" - elog "Snort config file in /etc/snort/snort.conf.distrib." - elog - elog "!! It is important that you migrate to this new snort.conf file !!" - elog - elog "This version of the ebuild includes an updated init.d file and" - elog "conf.d file that rely on options found in the latest Snort" - elog "config file provided by the VRT." - - if use debug; then - elog "You have the 'debug' USE flag enabled. If this has been done to" - elog "troubleshoot an issue by producing a core dump or a back trace," - elog "then you need to also ensure the FEATURES variable in make.conf" - elog "contains the 'nostrip' option." - fi -} diff --git a/net-analyzer/snort/snort-2.9.16.ebuild b/net-analyzer/snort/snort-2.9.16.ebuild deleted file mode 100644 index 328947af8555..000000000000 --- a/net-analyzer/snort/snort-2.9.16.ebuild +++ /dev/null @@ -1,246 +0,0 @@ -# Copyright 1999-2021 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=7 - -inherit autotools user systemd tmpfiles - -DESCRIPTION="The de facto standard for intrusion detection/prevention" -HOMEPAGE="https://www.snort.org" -SRC_URI="https://www.snort.org/downloads/archive/${PN}/${P}.tar.gz" -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~amd64 ~arm ~mips ~ppc ~ppc64 ~sparc ~x86" -IUSE="+active-response control-socket debug file-inspect +flexresp3 +gre -high-availability inline-init-failopen large-pcap-64bit +libtirpc -linux-smp-stats +non-ether-decoders open-appid +perfprofiling +ppm +react -reload-error-restart selinux shared-rep side-channel sourcefire static -+threads" - -DEPEND=">=net-libs/libpcap-1.3.0 - >=net-libs/daq-2.0.2 - >=dev-libs/libpcre-8.33 - dev-libs/libdnet - net-libs/libnsl:0= - sys-libs/zlib - !libtirpc? ( sys-libs/glibc[rpc(-)] ) - libtirpc? ( net-libs/libtirpc ) - open-appid? ( dev-lang/luajit:= ) -" - -RDEPEND="${DEPEND} - selinux? ( sec-policy/selinux-snort )" - -REQUIRED_USE="!kernel_linux? ( !shared-rep )" - -PATCHES=( - "${FILESDIR}"/${PN}-2.9.8.3-no-implicit.patch - "${FILESDIR}"/${PN}-2.9.8.3-rpc.patch - "${FILESDIR}"/${PN}-2.9.12-snort.pc.patch - "${FILESDIR}"/${PN}-2.9.15.1-fno-common.patch -) - -pkg_setup() { - # pre_inst() is a better place to put this - # but we need it here for the 'fowners' statements in src_install() - enewgroup snort - enewuser snort -1 -1 /dev/null snort - -} - -src_prepare() { - default - - mv configure.{in,ac} || die - - AT_M4DIR=m4 eautoreconf -} - -src_configure() { - econf \ - $(use_enable !static shared) \ - $(use_enable static) \ - $(use_enable static so-with-static-lib) \ - $(use_enable gre) \ - $(use_enable control-socket) \ - $(use_enable file-inspect) \ - $(use_enable high-availability ha) \ - $(use_enable non-ether-decoders) \ - $(use_enable shared-rep) \ - $(use_enable side-channel) \ - $(use_enable sourcefire) \ - $(use_enable ppm) \ - $(use_enable perfprofiling) \ - $(use_enable linux-smp-stats) \ - $(use_enable inline-init-failopen) \ - $(use_enable open-appid) \ - $(use_enable threads pthread) \ - $(use_enable debug) \ - $(use_enable debug debug-msgs) \ - $(use_enable debug corefiles) \ - $(use_enable !debug dlclose) \ - $(use_enable active-response) \ - $(use_enable reload-error-restart) \ - $(use_enable react) \ - $(use_enable flexresp3) \ - $(use_enable large-pcap-64bit large-pcap) \ - $(use_with libtirpc) \ - --enable-mpls \ - --enable-normalizer \ - --enable-reload \ - --enable-targetbased \ - --disable-build-dynamic-examples \ - --disable-profile \ - --disable-ppm-test \ - --disable-intel-soft-cpm \ - --disable-static-daq -} - -src_install() { - default - - keepdir /var/log/snort \ - /etc/snort/rules \ - /etc/snort/so_rules \ - /usr/$(get_libdir)/snort_dynamicrules - - # config.log and build.log are needed by Sourcefire - # to trouble shoot build problems and bug reports so we are - # perserving them incase the user needs upstream support. - dodoc RELEASE.NOTES ChangeLog \ - doc/* \ - tools/u2boat/README.u2boat - - insinto /etc/snort - doins etc/attribute_table.dtd \ - etc/classification.config \ - etc/gen-msg.map \ - etc/reference.config \ - etc/threshold.conf \ - etc/unicode.map - - # We use snort.conf.distrib because the config file is complicated - # and the one shipped with snort can change drastically between versions. - # Users should migrate setting by hand and not with etc-update. - newins etc/snort.conf snort.conf.distrib - - # config.log and build.log are needed by Sourcefire - # to troubleshoot build problems and bug reports so we are - # preserving them incase the user needs upstream support. - if [ -f "${WORKDIR}/${PF}/config.log" ]; then - dodoc "${WORKDIR}/${PF}/config.log" - fi - if [ -f "${T}/build.log" ]; then - dodoc "${T}/build.log" - fi - - insinto /etc/snort/preproc_rules - doins preproc_rules/decoder.rules \ - preproc_rules/preprocessor.rules \ - preproc_rules/sensitive-data.rules - - fowners -R snort:snort \ - /var/log/snort \ - /etc/snort - - newinitd "${FILESDIR}/snort.rc12" snort - newconfd "${FILESDIR}/snort.confd.2" snort - systemd_newunit "${FILESDIR}/snort_at.service" "snort@.service" - - newtmpfiles "${FILESDIR}"/snort.tmpfiles snort.conf - - # Sourcefire uses Makefiles to install docs causing Bug #297190. - # This removes the unwanted doc directory and rogue Makefiles. - rm -rf "${ED}"/usr/share/doc/snort || die "Failed to remove SF doc directories" - rm "${ED}"/usr/share/doc/"${PF}"/Makefile* || die "Failed to remove doc make files" - - # Remove unneeded .la files (Bug #382863) - rm -f "${ED}"/usr/$(get_libdir)/snort_dynamicengine/libsf_engine.la || die - rm -f "${ED}"/usr/$(get_libdir)/snort_dynamicpreprocessor/libsf_*_preproc.la || die "Failed to remove libsf_?_preproc.la" - - # Set the correct lib path for dynamicengine, dynamicpreprocessor, and dynamicdetection - sed -i -e 's|/usr/local/lib|/usr/'$(get_libdir)'|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Set the correct rule location in the config - sed -i -e 's|RULE_PATH ../rules|RULE_PATH /etc/snort/rules|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Set the correct preprocessor/decoder rule location in the config - sed -i -e 's|PREPROC_RULE_PATH ../preproc_rules|PREPROC_RULE_PATH /etc/snort/preproc_rules|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Enable the preprocessor/decoder rules - sed -i -e 's|^# include $PREPROC_RULE_PATH|include $PREPROC_RULE_PATH|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - sed -i -e 's|^# dynamicdetection directory|dynamicdetection directory|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Just some clean up of trailing /'s in the config - sed -i -e 's|snort_dynamicpreprocessor/$|snort_dynamicpreprocessor|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Make it clear in the config where these are... - sed -i -e 's|^include classification.config|include /etc/snort/classification.config|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - sed -i -e 's|^include reference.config|include /etc/snort/reference.config|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Disable all rule files by default. - sed -i -e 's|^include $RULE_PATH|# include $RULE_PATH|g' \ - "${ED%}/etc/snort/snort.conf.distrib" || die - - # Set the configured DAQ to afpacket - sed -i -e 's|^# config daq: <type>|config daq: afpacket|g' \ - "${ED%}/etc/snort/snort.conf.distrib" || die - - # Set the location of the DAQ modules - sed -i -e 's|^# config daq_dir: <dir>|config daq_dir: /usr/'$(get_libdir)'/daq|g' \ - "${ED%}/etc/snort/snort.conf.distrib" || die - - # Set the DAQ mode to passive - sed -i -e 's|^# config daq_mode: <mode>|config daq_mode: passive|g' \ - "${ED%}/etc/snort/snort.conf.distrib" || die - - # Set snort to run as snort:snort - sed -i -e 's|^# config set_gid:|config set_gid: snort|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - sed -i -e 's|^# config set_uid:|config set_uid: snort|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Set the default log dir - sed -i -e 's|^# config logdir:|config logdir: /var/log/snort/|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die - - # Set the correct so_rule location in the config - sed -i -e 's|SO_RULE_PATH ../so_rules|SO_RULE_PATH /etc/snort/so_rules|g' \ - "${ED}/etc/snort/snort.conf.distrib" || die -} - -pkg_postinst() { - tmpfiles_process snort.conf - - einfo "There have been a number of improvements and new features" - einfo "added to ${P}. Please review the RELEASE.NOTES and" - einfo "ChangLog located in /usr/share/doc/${PF}." - einfo - elog "The Sourcefire Vulnerability Research Team (VRT) recommends that" - elog "users migrate their snort.conf customizations to the latest config" - elog "file released by the VRT. You can find the latest version of the" - elog "Snort config file in /etc/snort/snort.conf.distrib." - elog - elog "!! It is important that you migrate to this new snort.conf file !!" - elog - elog "This version of the ebuild includes an updated init.d file and" - elog "conf.d file that rely on options found in the latest Snort" - elog "config file provided by the VRT." - - if use debug; then - elog "You have the 'debug' USE flag enabled. If this has been done to" - elog "troubleshoot an issue by producing a core dump or a back trace," - elog "then you need to also ensure the FEATURES variable in make.conf" - elog "contains the 'nostrip' option." - fi -} |