diff options
-rw-r--r-- | pcr/snort/PKGBUILD | 14 | ||||
-rw-r--r-- | pcr/snort/snort | 41 |
2 files changed, 7 insertions, 48 deletions
diff --git a/pcr/snort/PKGBUILD b/pcr/snort/PKGBUILD index 77ff193b1..a275d6730 100644 --- a/pcr/snort/PKGBUILD +++ b/pcr/snort/PKGBUILD @@ -1,4 +1,4 @@ -# Contributor (Arch) : M0Rf30 +# Maintainer (Arch) : M0Rf30 # Contributor (Arch) : Lukas Fleischer <archlinux at cryptocrack dot de> # Contributor (Arch) : Hugo Doria <hugo@archlinux.org> # Contributor (Arch) : Kessia 'even' Pinheiro <kessiapinheiro at gmail.com> @@ -7,8 +7,8 @@ # Maintainer (Parabola) : Aurélien DESBRIÈRES <aurelien@hackers.camp> pkgname=snort -pkgver=2.9.7.0 -pkgrel=4 +pkgver=2.9.7.2 +pkgrel=1 pkgdesc='A lightweight network intrusion detection system.' arch=('i686' 'x86_64' 'mips64el') url='http://www.snort.org' @@ -17,12 +17,16 @@ depends=('libdaq' 'libdnet' 'libpcap' 'openssl' 'pcre' 'zlib') backup=('etc/snort/snort.conf' 'etc/snort/threshold.conf' 'etc/snort/reference.config' + 'etc/snort/rules/emerging.conf' 'etc/snort/classification.config') options=('!makeflags' '!libtool') install='snort.install' source=("https://www.snort.org/downloads/snort/${pkgname}-${pkgver}.tar.gz" "http://rules.emergingthreats.net/open/${pkgname}-2.9.0/emerging.rules.tar.gz" 'snort@.service') +md5sums=('b01e9964827394c39194a0147bc15705' + 'SKIP' + '49c7e8dbde680322ff5c4e0883f2b908') build() { cd "${srcdir}/${pkgname}-${pkgver}" @@ -51,7 +55,3 @@ package() { echo 'include $RULE_PATH/emerging.conf' >> "${pkgdir}/etc/snort/snort.conf" cp ${srcdir}/rules/* "${pkgdir}/etc/snort/rules" } - -md5sums=('c2a45bc56441ee9456478f219dd8d1e2' - 'SKIP' - '49c7e8dbde680322ff5c4e0883f2b908') diff --git a/pcr/snort/snort b/pcr/snort/snort deleted file mode 100644 index 5dfa72fbf..000000000 --- a/pcr/snort/snort +++ /dev/null @@ -1,41 +0,0 @@ -#!/bin/bash - -. /etc/rc.conf -. /etc/rc.d/functions - -# source application-specific settings -[ -f /etc/conf.d/snort ] && . /etc/conf.d/snort - -PID=`pidof -o %PPID /usr/bin/snort` -case "$1" in - start) - stat_busy "Starting Intrusion Database System: SNORT" - [ -z "$PID" ] && /usr/bin/snort ${SNORT_OPTIONS} -u ${USER} -g ${GROUP} \ - -i ${INTERFACE} -c ${SNORT_CONF} - if [ $? -gt 0 ]; then - stat_fail - else - add_daemon snort - stat_done - fi - ;; - - stop) - stat_busy "Stopping Intrusion Database System: SNORT" - [ ! -z "$PID" ] && kill $PID &> /dev/null - if [ $? -gt 0 ]; then - stat_fail - else - rm_daemon snort - stat_done - fi - ;; - restart) - $0 stop - sleep 1 - $0 start - ;; - *) - echo "usage: $0 {start|stop|restart}" -esac -exit 0 |