You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

96 lines
3.4 KiB

##
## suricata.spec -- OpenPKG RPM Package Specification
## Copyright (c) 2000-2020 OpenPKG Project <http://openpkg.org/>
##
## Permission to use, copy, modify, and distribute this software for
## any purpose with or without fee is hereby granted, provided that
## the above copyright notice and this permission notice appear in all
## copies.
##
## THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
## WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
## MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
## IN NO EVENT SHALL THE AUTHORS AND COPYRIGHT HOLDERS AND THEIR
## CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
## SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
## LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
## USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
## ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
## OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
## OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
## SUCH DAMAGE.
##
# package information
Name: suricata
Summary: Intrusion Detection Systems (IDS)
URL: https://suricata-ids.org/
Vendor: Open Information Security Foundation (OISF)
Packager: OpenPKG Project
Distribution: OpenPKG Community
Class: EVAL
Group: Networking
License: GPL
Version: 4.0.5
Release: 20180718
# list of sources
Source0: https://www.openinfosecfoundation.org/download/suricata-%{version}.tar.gz
# build information
BuildPreReq: OpenPKG, openpkg >= 20160101
PreReq: OpenPKG, openpkg >= 20160101
BuildPreReq: pcre, yaml, libpcap, libiconv, zlib, lua, jansson, libhtp
PreReq: pcre, yaml, libpcap, libiconv, zlib, lua, jansson, libhtp
%description
Suricata is a free and open source, mature, fast and robust network
threat detection engine. The Suricata engine is capable of real
time intrusion detection (IDS), inline intrusion prevention (IPS),
network security monitoring (NSM) and offline pcap processing.
Suricata inspects the network traffic using a powerful and extensive
rules and signature language, and has powerful Lua scripting support
for detection of complex threats. With standard input and output
formats like YAML and JSON integrations with tools like existing
SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database
become effortless.
%track
prog suricata = {
version = %{version}
url = https://suricata-ids.org/download/
regex = suricata-(\d+\.\d+\.\d+)\.tar\.gz
}
%prep
%setup -q
%build
CC="%{l_cc}" \
CFLAGS="%{l_cflags -O}" \
CPPFLAGS="%{l_cppflags}" \
LDFLAGS="%{l_ldflags}" \
LIBS="-lz -lm" \
./configure \
--prefix=%{l_prefix} \
--mandir=%{l_prefix}/man \
--localstatedir=%{l_prefix}/var/suricata \
--enable-non-bundled-htp \
--enable-lua \
--disable-python \
--disable-shared \
--disable-nls
%{l_make} %{l_mflags -O}
%install
%{l_make} %{l_mflags} install install-conf DESTDIR=$RPM_BUILD_ROOT
rm -rf $RPM_BUILD_ROOT%{l_prefix}/share/doc
strip $RPM_BUILD_ROOT%{l_prefix}/bin/* >/dev/null 2>&1 || true
%{l_rpmtool} files -v -ofiles -r$RPM_BUILD_ROOT \
%{l_files_std} \
'%config %{l_prefix}/etc/suricata/*'
%files -f files
%clean