blob: 1e2495406e342825fd9fe71ba863ed75b2bb88ed [file] [log] [blame]
Brad Bishop1a4b7ee2018-12-16 17:11:34 -08001DESCRIPTION = "snort - a free lightweight network intrusion detection system for UNIX and Windows."
2HOMEPAGE = "http://www.snort.org/"
3SECTION = "net"
4LICENSE = "GPL-2.0"
5LIC_FILES_CHKSUM = "file://COPYING;md5=78fa8ef966b48fbf9095e13cc92377c5"
6
7DEPENDS = "xz libpcap libpcre daq libdnet util-linux daq-native libtirpc bison-native"
8
9SRC_URI = "https://www.snort.org/downloads/archive/snort/${BP}.tar.gz \
10 file://snort.init \
Brad Bishop26bdd442019-08-16 17:08:17 -040011 file://volatiles.99_snort \
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080012 file://0001-libpcap-search-sysroot-for-headers.patch \
13 file://fix-host-contamination-when-enable-static-daq.patch \
14 file://disable-run-test-program-while-cross-compiling.patch \
Brad Bishop26bdd442019-08-16 17:08:17 -040015 file://configure.in-disable-tirpc-checking-for-fedora.patch \
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080016"
Patrick Williams93c203f2021-10-06 16:15:23 -050017SRC_URI[sha256sum] = "da8af0f1b2e4f247d970c6a3c0e83fb6dcd5c84faa21aea49f306f269e8e28aa"
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080018
19UPSTREAM_CHECK_URI = "https://www.snort.org/downloads"
20UPSTREAM_CHECK_REGEX = "snort-(?P<pver>\d+(\.\d+)+)\.tar"
21
22inherit autotools gettext update-rc.d pkgconfig
23
24INITSCRIPT_NAME = "snort"
25INITSCRIPT_PARAMS = "defaults"
26
27EXTRA_OECONF = " \
28 --enable-gre \
29 --enable-linux-smp-stats \
30 --enable-reload \
31 --enable-reload-error-restart \
32 --enable-targetbased \
33 --enable-static-daq \
34 --with-dnet-includes=${STAGING_INCDIR} \
35 --with-dnet-libraries=${STAGING_LIBDIR} \
36 --with-libpcre-includes=${STAGING_INCDIR} \
37 --with-libpcre-libraries=${STAGING_LIBDIR} \
38 --with-daq-includes=${STAGING_INCDIR} \
39 --with-daq-libraries=${STAGING_LIBDIR} \
40"
41
42# if you want to disable it, you need to patch configure.in first
43# AC_CHECK_HEADERS([openssl/sha.h],, SHA_H="no")
44# is called even with --without-openssl-includes
45PACKAGECONFIG ?= "openssl lzma"
46PACKAGECONFIG[openssl] = "--with-openssl-includes=${STAGING_INCDIR} --with-openssl-libraries=${STAGING_LIBDIR}, --without-openssl-includes --without-openssl-libraries, openssl,"
47PACKAGECONFIG[lzma] = "--with-lzma-includes=${STAGING_INCDIR} --with-lzma-libraries=${STAGING_LIBDIR}, --without-lzma-includes --without-lzma-libraries, xz,"
Brad Bishopc8f47122019-06-24 09:36:18 -040048PACKAGECONFIG[appid] = "--enable-open-appid, --disable-open-appid, luajit, bash"
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080049
50CFLAGS += "-I${STAGING_INCDIR}/tirpc"
51LDFLAGS += " -ltirpc"
52
Patrick Williams213cb262021-08-07 19:21:33 -050053do_install:append() {
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080054 install -d ${D}${sysconfdir}/snort/rules
55 install -d ${D}${sysconfdir}/snort/preproc_rules
56 install -d ${D}${sysconfdir}/init.d
57 for i in map config conf dtd; do
58 cp ${S}/etc/*.$i ${D}${sysconfdir}/snort/
59 done
60
61 # fix the hardcoded path and lib name
62 # comment out the rules that are not provided
63 sed -i -e 's#/usr/local/lib#${libdir}#' \
64 -e 's#\.\./\(.*rules\)#${sysconfdir}/snort/\1#' \
65 -e 's#\(libsf_engine.so\)#\1.0#' \
66 -e 's/^\(include $RULE_PATH\)/#\1/' \
67 -e 's/^\(dynamicdetection\)/#\1/' \
68 -e '/preprocessor reputation/,/blacklist/ s/^/#/' \
69 ${D}${sysconfdir}/snort/snort.conf
70
71 cp ${S}/preproc_rules/*.rules ${D}${sysconfdir}/snort/preproc_rules/
72 install -m 755 ${WORKDIR}/snort.init ${D}${sysconfdir}/init.d/snort
Brad Bishop26bdd442019-08-16 17:08:17 -040073
74 install -d ${D}${sysconfdir}/default/volatiles
75 install -m 0644 ${WORKDIR}/volatiles.99_snort ${D}${sysconfdir}/default/volatiles/99_snort
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080076
Andrew Geisslerf103a7f2021-05-07 16:09:40 -050077 sed -i -e 's|-ffile-prefix-map[^ ]*||g; s|-fdebug-prefix-map[^ ]*||g; s|-fmacro-prefix-map[^ ]*||g; s|${STAGING_DIR_TARGET}||g' ${D}${libdir}/pkgconfig/*.pc
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080078}
79
Patrick Williams213cb262021-08-07 19:21:33 -050080pkg_postinst:${PN}() {
Brad Bishop26bdd442019-08-16 17:08:17 -040081 if [ -z "$D" ] && [ -e ${sysconfdir}/init.d/populate-volatile.sh ]; then
82 ${sysconfdir}/init.d/populate-volatile.sh update
83 fi
84}
85
Patrick Williams213cb262021-08-07 19:21:33 -050086FILES:${PN} += " \
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080087 ${libdir}/snort_dynamicengine/*.so.* \
88 ${libdir}/snort_dynamicpreprocessor/*.so.* \
89 ${libdir}/snort_dynamicrules/*.so.* \
90"
Patrick Williams213cb262021-08-07 19:21:33 -050091FILES:${PN}-dbg += " \
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080092 ${libdir}/snort_dynamicengine/.debug \
93 ${libdir}/snort_dynamicpreprocessor/.debug \
94 ${libdir}/snort_dynamicrules/.debug \
95"
Patrick Williams213cb262021-08-07 19:21:33 -050096FILES:${PN}-staticdev += " \
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080097 ${libdir}/snort_dynamicengine/*.a \
98 ${libdir}/snort_dynamicpreprocessor/*.a \
99 ${libdir}/snort_dynamicrules/*.a \
100 ${libdir}/snort/dynamic_preproc/*.a \
101 ${libdir}/snort/dynamic_output/*.a \
102"
Patrick Williams213cb262021-08-07 19:21:33 -0500103FILES:${PN}-dev += " \
Brad Bishop1a4b7ee2018-12-16 17:11:34 -0800104 ${libdir}/snort_dynamicengine/*.la \
105 ${libdir}/snort_dynamicpreprocessor/*.la \
106 ${libdir}/snort_dynamicrules/*.la \
107 ${libdir}/snort_dynamicengine/*.so \
108 ${libdir}/snort_dynamicpreprocessor/*.so \
109 ${libdir}/snort_dynamicrules/*.so \
110 ${prefix}/src/snort_dynamicsrc \
111"