summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--pcr/snort/PKGBUILD14
-rw-r--r--pcr/snort/snort41
2 files changed, 7 insertions, 48 deletions
diff --git a/pcr/snort/PKGBUILD b/pcr/snort/PKGBUILD
index 77ff193b1..a275d6730 100644
--- a/pcr/snort/PKGBUILD
+++ b/pcr/snort/PKGBUILD
@@ -1,4 +1,4 @@
-# Contributor (Arch) : M0Rf30
+# Maintainer (Arch) : M0Rf30
# Contributor (Arch) : Lukas Fleischer <archlinux at cryptocrack dot de>
# Contributor (Arch) : Hugo Doria <hugo@archlinux.org>
# Contributor (Arch) : Kessia 'even' Pinheiro <kessiapinheiro at gmail.com>
@@ -7,8 +7,8 @@
# Maintainer (Parabola) : Aurélien DESBRIÈRES <aurelien@hackers.camp>
pkgname=snort
-pkgver=2.9.7.0
-pkgrel=4
+pkgver=2.9.7.2
+pkgrel=1
pkgdesc='A lightweight network intrusion detection system.'
arch=('i686' 'x86_64' 'mips64el')
url='http://www.snort.org'
@@ -17,12 +17,16 @@ depends=('libdaq' 'libdnet' 'libpcap' 'openssl' 'pcre' 'zlib')
backup=('etc/snort/snort.conf'
'etc/snort/threshold.conf'
'etc/snort/reference.config'
+ 'etc/snort/rules/emerging.conf'
'etc/snort/classification.config')
options=('!makeflags' '!libtool')
install='snort.install'
source=("https://www.snort.org/downloads/snort/${pkgname}-${pkgver}.tar.gz"
"http://rules.emergingthreats.net/open/${pkgname}-2.9.0/emerging.rules.tar.gz"
'snort@.service')
+md5sums=('b01e9964827394c39194a0147bc15705'
+ 'SKIP'
+ '49c7e8dbde680322ff5c4e0883f2b908')
build() {
cd "${srcdir}/${pkgname}-${pkgver}"
@@ -51,7 +55,3 @@ package() {
echo 'include $RULE_PATH/emerging.conf' >> "${pkgdir}/etc/snort/snort.conf"
cp ${srcdir}/rules/* "${pkgdir}/etc/snort/rules"
}
-
-md5sums=('c2a45bc56441ee9456478f219dd8d1e2'
- 'SKIP'
- '49c7e8dbde680322ff5c4e0883f2b908')
diff --git a/pcr/snort/snort b/pcr/snort/snort
deleted file mode 100644
index 5dfa72fbf..000000000
--- a/pcr/snort/snort
+++ /dev/null
@@ -1,41 +0,0 @@
-#!/bin/bash
-
-. /etc/rc.conf
-. /etc/rc.d/functions
-
-# source application-specific settings
-[ -f /etc/conf.d/snort ] && . /etc/conf.d/snort
-
-PID=`pidof -o %PPID /usr/bin/snort`
-case "$1" in
- start)
- stat_busy "Starting Intrusion Database System: SNORT"
- [ -z "$PID" ] && /usr/bin/snort ${SNORT_OPTIONS} -u ${USER} -g ${GROUP} \
- -i ${INTERFACE} -c ${SNORT_CONF}
- if [ $? -gt 0 ]; then
- stat_fail
- else
- add_daemon snort
- stat_done
- fi
- ;;
-
- stop)
- stat_busy "Stopping Intrusion Database System: SNORT"
- [ ! -z "$PID" ] && kill $PID &> /dev/null
- if [ $? -gt 0 ]; then
- stat_fail
- else
- rm_daemon snort
- stat_done
- fi
- ;;
- restart)
- $0 stop
- sleep 1
- $0 start
- ;;
- *)
- echo "usage: $0 {start|stop|restart}"
-esac
-exit 0