# Maintainer: robertfoster # Contributor: Amish # Contributor: Lukas Fleischer # Contributor: Hugo Doria # Contributor: Kessia 'even' Pinheiro # Contributor: dorphell # Contributor: Gregor Ibic # Contributor: Netboy3 pkgname=snort _pkgname=snort3 _openappid=33380 pkgver=3.1.83.0 pkgrel=1 pkgdesc='A lightweight network IDS /IPS with OpenAppID support.' arch=('i686' 'x86_64' 'armv6h' 'armv7h' 'aarch64' 'arm') url='https://www.snort.org' license=('GPL') depends=('gperftools' 'hwloc' 'hyperscan' 'libdaq' 'libdnet' 'libmnl' 'libpcap' 'libunwind' 'luajit' 'lz4' 'openssl' 'pcre' 'pulledpork' 'xz' 'zlib') makedepends=('cmake' 'pkgconf') backup=('etc/snort/snort.lua' 'etc/snort/snort_defaults.lua' 'etc/snort/local.lua' 'etc/snort/homenet.lua' 'etc/snort/rules/local.rules' 'etc/snort/rules/snort.rules' 'etc/snort/lists/default.blocklist' 'etc/snort/lists/default.allowlist' 'etc/logrotate.d/snort') install='snort.install' source=("${_pkgname}-${pkgver}.tar.gz::https://github.com/snort3/snort3/archive/refs/tags/${pkgver}.tar.gz" "snort-openappid-${_openappid}.tar.gz::https://snort.org/downloads/openappid/${_openappid}" 'cstdint.patch' 'tcmjem.patch' 'local.lua' 'snort.logrotate' 'snort.sysusers' 'snort.tmpfiles' 'snort.service') prepare() { cd "${_pkgname}-${pkgver}" patch -p0 <"${srcdir}"/cstdint.patch patch -p0 <"${srcdir}"/tcmjem.patch # Workaround https://github.com/intel/hyperscan/issues/388 sed -i '/HAVE_HS_COMPILE_LIT/d' config.cmake.h.in cmake/sanity_checks.cmake } build() { cd "${srcdir}/${_pkgname}-${pkgver}" ./configure_cmake.sh --prefix=/usr --enable-tcmalloc --with-daq-libraries=/usr/lib/daq/ --disable-static-daq make -C build } package() { cd "${srcdir}/${_pkgname}-${pkgver}" make -C build DESTDIR="${pkgdir}" install mv "${pkgdir}"{/usr,}/etc install -D -m644 "${srcdir}"/local.lua "${pkgdir}"/etc/snort install -D -m644 "${srcdir}"/snort.logrotate "${pkgdir}"/etc/logrotate.d/snort install -D -m644 "${srcdir}"/snort.tmpfiles "${pkgdir}"/usr/lib/tmpfiles.d/snort.conf install -D -m644 "${srcdir}"/snort.sysusers "${pkgdir}"/usr/lib/sysusers.d/snort.conf install -D -m644 "${srcdir}"/snort.service "${pkgdir}"/usr/lib/systemd/system/snort.service install -D -m644 /dev/null "${pkgdir}"/etc/snort/rules/snort.rules install -D -m644 /dev/null "${pkgdir}"/etc/snort/lists/default.blocklist install -D -m644 /dev/null "${pkgdir}"/etc/snort/lists/default.allowlist echo "HOME_NET = [[ 10.0.0.0/8 172.16.0.0/12 192.168.0.0/16 ]]" >"${pkgdir}"/etc/snort/homenet.lua echo -e '#pulledpork will put rules here in snort.rules\n#alert icmp any any -> any any ( msg:"ICMP Traffic Detected"; sid:10000001; metadata:policy security-ips alert; )' >"${pkgdir}"/etc/snort/rules/local.rules chmod 0644 "${pkgdir}"/etc/snort/{homenet.lua,rules/{local,snort}.rules} # rule files and other settings sed -i -e "/^EXTERNAL_NET\\s\\+=/ a include 'homenet.lua'" \ -e "/^HOME_NET\\s\\+=/ i -- we set HOME_NET and EXTERNAL_NET here or via an included file" \ -e 's/^\(HOME_NET\s\+=\)/--\1/g' \ -e 's/^\(EXTERNAL_NET\s\+=\)/--\1/g' \ "${pkgdir}"/etc/snort/snort.lua sed -i -e "s/^\\(RULE_PATH\\s\\+=\\).*/\\1 'rules'/g" \ -e "s/^\\(BUILTIN_RULE_PATH\\s\\+=\\).*/\\1 'builtin_rules'/g" \ -e "s/^\\(PLUGIN_RULE_PATH\\s\\+=\\).*/\\1 'so_rules'/g" \ -e "s/^\\(WHITE_LIST_PATH\\s\\+=\\).*/\\1 'lists'/g" \ -e "s/^\\(BLACK_LIST_PATH\\s\\+=\\).*/\\1 'lists'/g" \ "${pkgdir}"/etc/snort/snort_defaults.lua # OpenAppID files install -d -m755 "${pkgdir}"/usr/lib/openappid/custom/{libs,lua,port} cp -a --no-preserve=ownership -t "${pkgdir}"/usr/lib/openappid/ "${srcdir}"/odp } sha256sums=('1092d3145e10111c12bcc244f6b2d876c5acf890554dc688e210d5a25c3592c2' '3046c5af1dd81a104f13d8e895226ef64bca7fa358238fb5f29c659081eaee2a' 'b3d86ffa12207afa0f2d3a2349cf4746711e71b8a43bdc593b1527eda972f8ea' '7fbf5c1b1ca10fba73350e563cafeb8ea4db7eb5d69ef62c067df602f27678f2' 'b61d6492f86c7d79c1a76d1394d099403981aac7f371b1fe22ddd8a4bb15c87c' 'a8a7684a676da5cd55c2b5ab012dac3d14c5a6c62f6e37c4913ba1dbe506088e' 'ae3245c5de527fb487c459f2f4a9c78803ae6341e9c81b9a404277679cdee051' 'bc4a02d184601faba5cd0f6cb454097a3b04a0c8fe56f5f8b36d24513484faa2' 'cb1108ab0a6ad38981a6f308b0ae2b276b68d08bfa0e38c036eae277b38b28d8')