FreeBSD Bugzilla – Attachment 151729 Details for
Bug 196801
security/suricata: Update to 2.0.6
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
suricata 2.0.6 patch
suricata-2.0.6.patch (text/plain), 6.84 KB, created by
cheffo
on 2015-01-16 09:36:17 UTC
(
hide
)
Description:
suricata 2.0.6 patch
Filename:
MIME Type:
Creator:
cheffo
Created:
2015-01-16 09:36:17 UTC
Size:
6.84 KB
patch
obsolete
>diff -urN security/suricata.orig/Makefile security/suricata/Makefile >--- security/suricata.orig/Makefile 2015-01-12 14:15:09.359194408 +0200 >+++ security/suricata/Makefile 2015-01-15 17:32:34.814845734 +0200 >@@ -2,7 +2,7 @@ > # $FreeBSD$ > > PORTNAME= suricata >-PORTVERSION= 2.0.5 >+PORTVERSION= 2.0.6 > CATEGORIES= security > MASTER_SITES= http://www.openinfosecfoundation.org/download/ \ > http://mirrors.rit.edu/zi/ >@@ -24,18 +24,21 @@ > INSTALL_TARGET= install-strip > PATHFIX_MAKEFILEIN= Makefile.am > >-OPTIONS_DEFINE= GEOIP HTP_PORT IPFW JSON NSS PORTS_PCAP PRELUDE TESTS >-OPTIONS_DEFAULT= HTP_PORT IPFW PRELUDE >+OPTIONS_DEFINE= GEOIP HTP_PORT IPFW JSON LUAJIT NSS NSPR PORTS_PCAP PRELUDE SC TESTS >+OPTIONS_DEFAULT= GEOIP HTP_PORT IPFW JSON LUAJIT NSS NSPR PRELUDE SC > OPTIONS_SUB= yes > > GEOIP_DESC= Enable GeoIP support > HTP_PORT_DESC= Use libhtp from ports > IPFW_DESC= Enable IPFW and IP Divert support for inline IDP > JSON_DESC= Enable JSON output >-NSS_DESC= Enable file checksums and SSL/TLS fingerprinting >+LUAJIT_DESC= LuaJIT support >+NSS_DESC= NSS crypto driver support >+NSPR_DESC= NSPR support > PORTS_PCAP_DESC= Use libpcap from ports > PRELUDE_DESC= Enable Prelude support for NIDS alerts >-TESTS_DESC= Build Unit Tests >+SC_DESC= Build and install suricatasc >+TESTS_DESC= Enable unit tests in suricata binary > > GEOIP_LIB_DEPENDS= libGeoIP.so:${PORTSDIR}/net/GeoIP > GEOIP_CONFIGURE_ON= --enable-geoip >@@ -59,12 +62,19 @@ > PRELUDE_CONFIGURE_ON= --with-libprelude-prefix=${LOCALBASE} > > JSON_LIB_DEPENDS= libjansson.so:${PORTSDIR}/devel/jansson >-JSON_CONFIGURE_OFF= --with-libjansson-includes=${LOCALBASE}/include \ >+JSON_CONFIGURE_ON= --with-libjansson-includes=${LOCALBASE}/include \ > --with-libjansson-libraries=${LOCALBASE}/lib > >+LUAJIT_LIB_DEPENDS= libluajit-5.1.so:${PORTSDIR}/lang/luajit >+LUAJIT_CONFIGURE_ON= --enable-luajit >+ > NSS_LIB_DEPENDS= libnss3.so:${PORTSDIR}/security/nss > NSS_CONFIGURE_ON= --with-libnss-includes=${LOCALBASE}/include/nss/nss \ >- --with-libnss-libraries=${LOCALBASE}/lib/nss \ >+ --with-libnss-libraries=${LOCALBASE}/lib >+ >+NSPR_LIB_DEPENDS= libnspr4.so:${PORTSDIR}/devel/nspr >+NSPRS_CONFIGURE_ON= --with-libnspr-libraries=${LOCALBASE}/lib \ >+ --with-libnspr-includes=${LOCALBASE}/include/nspr > > TESTS_CONFIGURE_ENABLE= unittests > >@@ -80,7 +90,6 @@ > --with-libhtp-includes=${LOCALBASE}/include/ \ > --with-libhtp-libraries=${LOCALBASE}/lib \ > --localstatedir=/var/ >-CONFIGURE_ENV+= ac_cv_path_HAVE_PYTHON_CONFIG=no > > LIBNET_CONFIG?= ${LOCALBASE}/bin/libnet11-config > CONFIG_DIR?= ${ETCDIR} >@@ -89,6 +98,17 @@ > RULES_FILES= decoder-events.rules dns-events.rules files.rules http-events.rules smtp-events.rules stream-events.rules tls-events.rules > LOGS_DIR?= /var/log/${PORTNAME} > >+.include <bsd.port.options.mk> >+ >+.if ${PORT_OPTIONS:MSC} >+USES+= python >+CONFIGURE_ENV+= ac_cv_path_HAVE_PYTHON_CONFIG=yes >+PLIST_SUB+= MSC="" >+.else >+CONFIGURE_ENV+= ac_cv_path_HAVE_PYTHON_CONFIG=no >+PLIST_SUB+= MSC="@comment " >+.endif >+ > .include <bsd.port.pre.mk> > > .if ${ARCH} == "ia64" || ${ARCH} == "powerpc" || ${ARCH} == "sparc64" >@@ -98,12 +118,10 @@ > pre-patch: > ${CP} ${FILESDIR}/ax_check_compile_flag.m4 ${WRKSRC}/m4 > >-pre-install: >- @${REINPLACE_CMD} -e 's|/etc/suricata|${CONFIG_DIR}|g' ${WRKSRC}/suricata.yaml >- > post-install: > ${MKDIR} ${STAGEDIR}${CONFIG_DIR} > ${MKDIR} ${STAGEDIR}${RULES_DIR} >+ ${MKDIR} ${STAGEDIR}${LOGS_DIR} > .for f in ${CONFIG_FILES} > ${INSTALL_DATA} ${WRKSRC}/${f} ${STAGEDIR}${CONFIG_DIR}/${f}.sample > .endfor >@@ -111,6 +129,12 @@ > ${INSTALL_DATA} ${WRKSRC}/rules/${f} ${STAGEDIR}${RULES_DIR}/${f} > .endfor > >+.if ${PORT_OPTIONS:MSC} >+ (cd ${STAGEDIR}${PREFIX} \ >+ && ${PYTHON_CMD} ${PYTHON_LIBDIR}/compileall.py \ >+ -d ${PYTHONPREFIX_SITELIBDIR} -f ${PYTHONPREFIX_SITELIBDIR:S;${PREFIX}/;;}) >+.endif >+ > TMPDIR?= /tmp > TESTDIR= ${TMPDIR}/${PORTNAME} > >diff -urN security/suricata.orig/distinfo security/suricata/distinfo >--- security/suricata.orig/distinfo 2015-01-12 14:15:09.359194408 +0200 >+++ security/suricata/distinfo 2015-01-15 12:02:30.904121000 +0200 >@@ -1,2 +1,2 @@ >-SHA256 (suricata-2.0.5.tar.gz) = 57b1120e91bd4e348e1a4cee9eb7b197d05fc25169e062f1a11f5dd4b9322c60 >-SIZE (suricata-2.0.5.tar.gz) = 3090118 >+SHA256 (suricata-2.0.6.tar.gz) = e833e35ea3b6029bbdef81660af22e8f563494eac85d97618d761ce1b69c78ec >+SIZE (suricata-2.0.6.tar.gz) = 3090886 >diff -urN security/suricata.orig/files/patch-scripts_suricatasc_suricatasc.in security/suricata/files/patch-scripts_suricatasc_suricatasc.in >--- security/suricata.orig/files/patch-scripts_suricatasc_suricatasc.in 1970-01-01 02:00:00.000000000 +0200 >+++ security/suricata/files/patch-scripts_suricatasc_suricatasc.in 2014-12-19 17:50:57.662156000 +0200 >@@ -0,0 +1,11 @@ >+--- scripts/suricatasc/suricatasc.in.orig 2014-12-19 17:49:20.651663649 +0200 >++++ scripts/suricatasc/suricatasc.in 2014-12-19 17:49:59.921665563 +0200 >+@@ -24,7 +24,7 @@ >+ args = parser.parse_args() >+ >+ if args.socket != None: >+- SOCKET_PATH = "@e_localstatedir@/" + args.socket[0] >++ SOCKET_PATH = args.socket >+ else: >+ SOCKET_PATH = "@e_localstatedir@/suricata-command.socket" >+ >diff -urN security/suricata.orig/pkg-plist security/suricata/pkg-plist >--- security/suricata.orig/pkg-plist 2015-01-12 14:15:09.359194408 +0200 >+++ security/suricata/pkg-plist 2015-01-16 11:19:57.064950424 +0200 >@@ -1,4 +1,5 @@ > bin/suricata >+%%MSC%%bin/suricatasc > %%DOCSDIR%%/AUTHORS > %%DOCSDIR%%/Basic_Setup.txt > %%DOCSDIR%%/CentOS5.txt >@@ -49,14 +50,24 @@ > %%NO_HTP_PORT%%lib/libhtp.a > %%NO_HTP_PORT%%lib/libhtp.so > %%NO_HTP_PORT%%libdata/pkgconfig/htp.pc >-@sample etc/suricata/suricata.yaml.sample >-@sample etc/suricata/classification.config.sample >-@sample etc/suricata/reference.config.sample >-etc/suricata/rules/decoder-events.rules >-etc/suricata/rules/dns-events.rules >-etc/suricata/rules/files.rules >-etc/suricata/rules/http-events.rules >-etc/suricata/rules/smtp-events.rules >-etc/suricata/rules/stream-events.rules >-etc/suricata/rules/tls-events.rules >+%%NO_HTP_PORT%%@dir include/htp >+%%MSC%%%%PYTHON_SITELIBDIR%%/suricatasc-0.9-py%%PYTHON_VER%%.egg-info >+%%MSC%%%%PYTHON_SITELIBDIR%%/suricatasc/__init__.py >+%%MSC%%%%PYTHON_SITELIBDIR%%/suricatasc/__init__.pyc >+%%MSC%%%%PYTHON_SITELIBDIR%%/suricatasc/suricatasc.py >+%%MSC%%%%PYTHON_SITELIBDIR%%/suricatasc/suricatasc.pyc >+@sample %%ETCDIR%%/suricata.yaml.sample >+@sample %%ETCDIR%%/classification.config.sample >+@sample %%ETCDIR%%/reference.config.sample >+%%ETCDIR%%/rules/decoder-events.rules >+%%ETCDIR%%/rules/dns-events.rules >+%%ETCDIR%%/rules/files.rules >+%%ETCDIR%%/rules/http-events.rules >+%%ETCDIR%%/rules/smtp-events.rules >+%%ETCDIR%%/rules/stream-events.rules >+%%ETCDIR%%/rules/tls-events.rules > @dir etc/suricata/rules >+@dir etc/suricata >+@dir(root,wheel,0700) /var/log/suricata >+@unexec if [ -d %D/%%ETCDIR%% ]; then echo "==> If you are permanently removing this port, you should do a ``rm -rf ${PKG_PREFIX}/etc/suricata`` to remove any configuration files left."; fi >+@dir %%DOCSDIR%%
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 196801
:
151729
|
151730
|
151734
|
151735