Update of /cvsroot/fink/dists/10.3/unstable/crypto/finkinfo
In directory sc8-pr-cvs1.sourceforge.net:/tmp/cvs-serv13440/crypto/finkinfo

Added Files:
        snort.info snort.patch 
Log Message:
samba is crypto, so snort must be also


--- NEW FILE: snort.patch ---
--- snort/src/snort.c.orig      2003-04-22 20:27:16.000000000 +0200
+++ snort/src/snort.c   2003-04-22 20:27:40.000000000 +0200
@@ -1729,7 +1729,7 @@
 {
     struct stat st;
     int i;
-    char *conf_files[]={"/etc/snort.conf", "./snort.conf", NULL};
+    char *conf_files[]={"@PREFIX@/etc/snort.conf", "./snort.conf", NULL};
     char *fname = NULL;
     char *home_dir = NULL;
     char *rval = NULL;
--- snort/etc/snort.conf.orig   2003-04-22 20:59:34.000000000 +0200
+++ snort/etc/snort.conf        2003-04-22 21:01:23.000000000 +0200
@@ -99,7 +99,7 @@
 var AIM_SERVERS 
[64.12.24.0/24,64.12.25.0/24,64.12.26.14/24,64.12.28.0/24,64.12.29.0/24,64.12.161.0/24,64.12.163.0/24,205.188.5.0/24,205.188.9.0/24]
 
 # Path to your rules files (this can be a relative path)
-var RULE_PATH ../rules
+var RULE_PATH .
 
 # Configure the snort decoder:
 # ============================
--- snort/src/parser.c.orig     2003-04-22 21:03:50.000000000 +0200
+++ snort/src/parser.c  2003-04-22 21:04:11.000000000 +0200
@@ -3210,7 +3210,7 @@
         }
         else
         {
-            strlcpy(buffer, "/var/log/snort", STD_BUF);
+            strlcpy(buffer, "@PREFIX@/var/log/snort", STD_BUF);
         }
 
         strlcat(buffer, "/", STD_BUF - strlen(buffer));
--- snort/src/snort.h.orig      2003-04-22 21:05:21.000000000 +0200
+++ snort/src/snort.h   2003-04-22 21:05:40.000000000 +0200
@@ -68,7 +68,7 @@
 #endif
 
 #ifndef WIN32
-    #define DEFAULT_LOG_DIR            "/var/log/snort"
+    #define DEFAULT_LOG_DIR            "@PREFIX@/var/log/snort"
     #define DEFAULT_DAEMON_ALERT_FILE  "alert"
 #else
     #define DEFAULT_LOG_DIR            "log"
--- snort/src/util.c.orig       2003-04-22 21:14:10.000000000 +0200
+++ snort/src/util.c    2003-04-22 21:14:51.000000000 +0200
@@ -713,7 +713,7 @@
         }
 #ifndef _PATH_VARRUN
 #ifndef WIN32
-        strlcpy(_PATH_VARRUN, "/var/run/", 10);
+        strlcpy(_PATH_VARRUN, "@PREFIX@/var/run/", 10);
 #else
         if (GetCurrentDirectory(sizeof (dir)-1, dir))
             strncpy (_PATH_VARRUN, dir, sizeof(dir)-1);
@@ -731,8 +731,8 @@
         if(!S_ISDIR(pt.st_mode) || access(_PATH_VARRUN, W_OK) == -1)
         {
             LogMessage("WARNING: _PATH_VARRUN is invalid, trying "
-                    "/var/log...\n");
-            strncpy(pv.pid_path, "/var/log/", strlen("/var/log/"));
+                    "@PREFIX@/var/log...\n");
+            strncpy(pv.pid_path, "@PREFIX@/var/log/", 
strlen("@PREFIX@/var/log/"));
             stat(pv.pid_path, &pt);
 
             if(!S_ISDIR(pt.st_mode) || access(pv.pid_path, W_OK) == -1)
--- snort-2.0.2/src/util.h.orig 2003-09-30 17:25:13.000000000 +0200
+++ snort-2.0.2/src/util.h      2003-09-30 17:25:31.000000000 +0200
@@ -39,6 +39,8 @@
 #include "strlcpyu.h"
 #endif
 
+#include <sys/types.h>
+
 extern u_long netmasks[33];
 
 /* Self preservation memory control struct */


--- NEW FILE: snort.info ---
Package: snort
Version: 2.1.3
Revision: 2

Depends: libpcap, samba, mysql12-shlibs, postgresql73-shlibs | 
postgresql73-ssl-shlibs, daemonic, passwd, pcre-shlibs
Builddepends: mysql12-dev, postgresql73-unified-dev, libnet1.0, pcre, pcre-bin
Source: http://www.snort.org/dl/%n-%vRC1.tar.gz
Source-MD5: c66d1bfb15457a9413aa00a6bfe4e065
PatchScript: sed -e 's|@PREFIX@|%p|g' < %a/%n.patch | patch -p1

ConfigureParams: --mandir=%p/share/man --infodir=%p/share/info 
--libexecdir=%p/lib --enable-sourcefire --enable-perfmonitor --enable-smbalerts 
--enable-flexresp --with-mysql=%p --with-postgresql=%p 
--with-libnet-includes=%p/include --with-libnet-libraries=%p/lib

InstallScript: <<
install -m 755 -d %i/etc/snort
install -m 755 rules/*.rules %i/etc/snort
install -m 755 etc/*.config etc/snort.conf etc/*.map etc/sid %i/etc/snort

install -m 755 -d %i/bin
install -m 755 contrib/snort_stat.pl %i/bin/

make install prefix=%i

install -m 755 -d %i/var/log/snort
install -m 755 -d %i/var/run
<<

DocFiles: doc/AUTHORS doc/BUGS COPYING doc/CREDITS ChangeLog doc/FAQ 
doc/INSTALL LICENSE doc/NEWS doc/README* doc/RULES.todo doc/snort_manual.pdf 
doc/USAGE contrib/create_* contrib/snortdb-extra.gz

DaemonicName: snort
DaemonicFile: <<
<service>
<description>Snort Network Intrusion Detection</description>
<message>Snort NIDS</message>

<daemon name="snort">
<executable background="yes">%p/bin/snort</executable>
<parameters> -d -D -l %p/var/log/snort -c %p/etc/snort/snort.conf</parameters>
<configfile>%p/etc/snort/snort.conf</configfile>
</daemon>

</service>
<<
PreRmScript: <<
if [ $1 != "upgrade" ]; then
  daemonic remove snort
fi
<<

Description: Open Source Network Intrusion Detection
DescDetail: <<
Snort is a lightweight network intrusion detection system, capable of 
performing real-time 
traffic analysis and packet logging on IP networks.  It  can perform protocol 
analysis, 
content searching/matching and can be used to detect a variety of attacks and 
probes, such 
as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS 
fingerprinting attempts, 
and much more. Snort uses a flexible rules language to describe traffic that it 
should collect 
or pass, as well as a detection engine that utilizes a modular plugin 
architecture.  Snort has 
a real-time alerting capability as well, incorporating alerting mechanisms for 
syslog, a user 
specified file, a UNIX socket, or WinPopup messages to Windows clients using 
Samba's smbclient.
<<

License: GPL
Maintainer: Thomas Kotzian <[EMAIL PROTECTED]>
Homepage: http://www.snort.org



-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems?  Stop!  Download the new AJAX search engine that makes
searching your log files as easy as surfing the  web.  DOWNLOAD SPLUNK!
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=103432&bid=230486&dat=121642
_______________________________________________
Fink-commits mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/fink-commits

Reply via email to