void-packages/srcpkgs/suricata/template
Andrea Brancaleoni 2ccb8e7913 suricata: nocross
2018-11-14 23:33:42 +01:00

43 lines
1.5 KiB
Bash

# Template file for 'suricata'
pkgname=suricata
version=4.1.0
revision=2
build_style=gnu-configure
configure_args="--disable-gccmarch-native"
hostmakedepends="pkg-config"
makedepends="libnet-devel libpcap-devel pcre-devel libyaml-devel libcap-ng-devel file-devel"
short_desc="Next Generation Intrusion Detection and Prevention Engine"
maintainer="Andrea Brancaleoni <abc@pompel.me>"
license="GPL-2"
homepage="https://suricata-ids.org/"
distfiles="https://www.openinfosecfoundation.org/download/$pkgname-$version.tar.gz"
checksum=bd9b00fb4fc255566d4d8a8b52eb4977b4e8b49b37710d166cba75e6a93a504a
system_accounts="$pkgname"
conf_files="/etc/$pkgname/*.* /etc/$pkgname/rules/*"
nocross=y
post_extract() {
$XBPS_FETCH_CMD https://rules.emergingthreats.net/open/suricata/emerging.rules.tar.gz
mkdir -p erules
tar xf emerging.rules.tar.gz -C erules
}
post_build() {
sed -i 's|#run-as:|run-as:|g' $pkgname.yaml
sed -i "s|# user: suri| user: $pkgname|g" $pkgname.yaml
sed -i "s|# group: suri| group: $pkgname|g" $pkgname.yaml
sed -i "s|#daemon-directory: \"/\"|daemon-directory: \"/var/lib/suricata\"|g" $pkgname.yaml
}
post_install() {
vsv $pkgname
vinstall $pkgname.yaml 644 etc/$pkgname
vinstall classification.config 644 etc/$pkgname
vinstall reference.config 644 etc/$pkgname
vinstall threshold.config 644 etc/$pkgname
vmkdir etc/$pkgname/rules
vcopy rules/*.rules etc/$pkgname/rules
vcopy erules/rules/*.rules etc/$pkgname/rules
vlicense erules/rules/LICENSE emerging-rules.LICENSE
}