diff options
author | Amish | 2015-12-13 17:45:25 +0530 |
---|---|---|
committer | Amish | 2015-12-13 17:45:25 +0530 |
commit | daa8065165cdb783b4d0dc04772f1b241e54f9e4 (patch) | |
tree | 8c8d0679fcb0641133bb4d8680cb07855fbb2b3a /PKGBUILD | |
parent | 19b31bb3a6177421e33e7bb65841ac5f82990907 (diff) | |
download | aur-daa8065165cdb783b4d0dc04772f1b241e54f9e4.tar.gz |
Update to 2.9.8.0-1
Diffstat (limited to 'PKGBUILD')
-rw-r--r-- | PKGBUILD | 47 |
1 files changed, 24 insertions, 23 deletions
@@ -7,13 +7,14 @@ # Contributor: Gregor Ibic <gregor.ibic@intelicom.si> pkgname=snort-nfqueue -pkgver=2.9.6.1 -pkgrel=7 +_pkgname=snort +pkgver=2.9.8.0 +pkgrel=1 pkgdesc='A lightweight network intrusion detection system.' arch=('i686' 'x86_64') url='http://www.snort.org' license=('GPL') -provides=("snort=$pkgver") +provides=("snort=${pkgver}") conflicts=('snort') depends=('libdaq' 'libdnet' 'libnetfilter_queue' 'libpcap' 'openssl' 'pcre' 'zlib') backup=('etc/snort/snort.conf' @@ -26,17 +27,16 @@ backup=('etc/snort/snort.conf' 'etc/logrotate.d/snort') options=('!makeflags' '!libtool') install='snort.install' -source=("http://www.snort.org/dl/snort-current/snort-${pkgver}.tar.gz"{,.sig} - "http://rules.emergingthreats.net/open/snort-2.9.0/emerging.rules.tar.gz" +source=("https://www.snort.org/downloads/snort/${_pkgname}-${pkgver}.tar.gz" + "http://rules.emergingthreats.net/open/${_pkgname}-2.9.0/emerging.rules.tar.gz" 'snort.conf' 'homenet.conf' 'local.rules' 'logrotate' 'snort.service') -sha256sums=('119e4c5df83fe36a8d465e72a0347fe31e7771704da286f04115b0c5baa5f7b8' - 'SKIP' - 'SKIP' - '7eb355f118a80002bc10b6069b641b57041ea9061e4d65f4c5e50d78aa640f84' +sha256sums=('bddd5d01d10d20c182836fa0199cd3549239b7a9d0fd5bbb10226feb8b42d231' + '153e23ae701bfbfdbe32cb45c07039a0b5b876617f4abe68d8c514c52a98e955' + 'c947dcf8b243647537ca998bd6271fc06f9e6a33af29aff7ff0951430bebcff4' 'b65d8d8e37f686244dfb7293b1ea378f1dfd8141c14dbaf5e83dba9440152808' 'ec4d81936b3905ba980ee694ae77ad15d5adda45c9f87fa0c27adc38f11bca08' '4df93871c41f94d688a6c8b9762fa221a703b54d309ee1436c90eebbd3fb8c9d' @@ -52,29 +52,30 @@ prepare() { } build() { - cd "${srcdir}/snort-${pkgver}" + cd "${srcdir}/${_pkgname}-${pkgver}" ./configure --prefix=/usr --sysconfdir=/etc/snort --with-libpcap-includes=/usr/include/pcap \ - --with-daq-includes=/usr/include --with-daq-libraries=/usr/lib/ \ + --with-daq-includes=/usr/include --with-daq-libraries=/usr/lib/daq/ \ --enable-zlib --disable-static-daq make } package() { - cd "${srcdir}/snort-${pkgver}" + cd "${srcdir}/${_pkgname}-${pkgver}" + make DESTDIR="${pkgdir}" install - install -d -m750 "${pkgdir}"/var/log/snort/old - chmod 750 "${pkgdir}"/var/log/snort - chown -R 29:29 "${pkgdir}"/var/log/snort - install -d -m755 "${pkgdir}"/etc/snort/rules "${pkgdir}"/etc/snort/dynamicrules - install -D -m644 etc/{*.conf*,*.map} "${pkgdir}"/etc/snort/ - install -D -m644 ../snort.conf ../homenet.conf "${pkgdir}"/etc/snort/ - install -D -m644 ../local.rules "${pkgdir}"/etc/snort/rules/ - touch "${pkgdir}"/etc/snort/rules/snort.rules - chmod 644 "${pkgdir}"/etc/snort/rules/snort.rules - install -D -m644 ../snort.service "${pkgdir}"/usr/lib/systemd/system/snort.service + install -d -m750 "${pkgdir}/var/log/snort/old" + chmod 750 "${pkgdir}/var/log/snort" + chown -R 29:29 "${pkgdir}/var/log/snort" + install -d -m755 "${pkgdir}/etc/snort/rules" "${pkgdir}/etc/snort/dynamicrules" + install -D -m644 etc/{*.conf*,*.map} "${pkgdir}/etc/snort/" + install -D -m644 ../snort.conf ../homenet.conf "${pkgdir}/etc/snort/" + install -D -m644 ../local.rules "${pkgdir}/etc/snort/rules/" + touch "${pkgdir}/etc/snort/rules/snort.rules" + chmod 644 "${pkgdir}/etc/snort/rules/snort.rules" + install -D -m644 ../snort.service "${pkgdir}/usr/lib/systemd/system/snort.service" sed -i 's#/usr/local/lib/#/usr/lib/#' "${pkgdir}/etc/snort/snort.conf" - install -Dm644 ../logrotate "${pkgdir}"/etc/logrotate.d/snort + install -Dm644 ../logrotate "${pkgdir}/etc/logrotate.d/snort" # emergingthreats rules cp ${srcdir}/rules/* "${pkgdir}/etc/snort/rules" |