blob: d8073d865b1da66a0395ed2d2b6c720715f84fca [file] [log] [blame]
Brad Bishop1a4b7ee2018-12-16 17:11:34 -08001DESCRIPTION = "snort - a free lightweight network intrusion detection system for UNIX and Windows."
2HOMEPAGE = "http://www.snort.org/"
3SECTION = "net"
4LICENSE = "GPL-2.0"
5LIC_FILES_CHKSUM = "file://COPYING;md5=78fa8ef966b48fbf9095e13cc92377c5"
6
7DEPENDS = "xz libpcap libpcre daq libdnet util-linux daq-native libtirpc bison-native"
8
9SRC_URI = "https://www.snort.org/downloads/archive/snort/${BP}.tar.gz \
10 file://snort.init \
Brad Bishop26bdd442019-08-16 17:08:17 -040011 file://volatiles.99_snort \
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080012 file://0001-libpcap-search-sysroot-for-headers.patch \
13 file://fix-host-contamination-when-enable-static-daq.patch \
14 file://disable-run-test-program-while-cross-compiling.patch \
Brad Bishop26bdd442019-08-16 17:08:17 -040015 file://configure.in-disable-tirpc-checking-for-fedora.patch \
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080016"
17
Andrew Geisslereafcbb82020-06-05 17:59:17 -050018SRC_URI[md5sum] = "1cec58babaea3420014d61a93e6e1545"
19SRC_URI[sha256sum] = "9688d8edf1da09dec6574000fb3c0e62f99c56428587616e17c60103c0bcbad7"
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080020
21UPSTREAM_CHECK_URI = "https://www.snort.org/downloads"
22UPSTREAM_CHECK_REGEX = "snort-(?P<pver>\d+(\.\d+)+)\.tar"
23
24inherit autotools gettext update-rc.d pkgconfig
25
26INITSCRIPT_NAME = "snort"
27INITSCRIPT_PARAMS = "defaults"
28
29EXTRA_OECONF = " \
30 --enable-gre \
31 --enable-linux-smp-stats \
32 --enable-reload \
33 --enable-reload-error-restart \
34 --enable-targetbased \
35 --enable-static-daq \
36 --with-dnet-includes=${STAGING_INCDIR} \
37 --with-dnet-libraries=${STAGING_LIBDIR} \
38 --with-libpcre-includes=${STAGING_INCDIR} \
39 --with-libpcre-libraries=${STAGING_LIBDIR} \
40 --with-daq-includes=${STAGING_INCDIR} \
41 --with-daq-libraries=${STAGING_LIBDIR} \
42"
43
44# if you want to disable it, you need to patch configure.in first
45# AC_CHECK_HEADERS([openssl/sha.h],, SHA_H="no")
46# is called even with --without-openssl-includes
47PACKAGECONFIG ?= "openssl lzma"
48PACKAGECONFIG[openssl] = "--with-openssl-includes=${STAGING_INCDIR} --with-openssl-libraries=${STAGING_LIBDIR}, --without-openssl-includes --without-openssl-libraries, openssl,"
49PACKAGECONFIG[lzma] = "--with-lzma-includes=${STAGING_INCDIR} --with-lzma-libraries=${STAGING_LIBDIR}, --without-lzma-includes --without-lzma-libraries, xz,"
Brad Bishopc8f47122019-06-24 09:36:18 -040050PACKAGECONFIG[appid] = "--enable-open-appid, --disable-open-appid, luajit, bash"
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080051
52CFLAGS += "-I${STAGING_INCDIR}/tirpc"
53LDFLAGS += " -ltirpc"
54
55do_install_append() {
56 install -d ${D}${sysconfdir}/snort/rules
57 install -d ${D}${sysconfdir}/snort/preproc_rules
58 install -d ${D}${sysconfdir}/init.d
59 for i in map config conf dtd; do
60 cp ${S}/etc/*.$i ${D}${sysconfdir}/snort/
61 done
62
63 # fix the hardcoded path and lib name
64 # comment out the rules that are not provided
65 sed -i -e 's#/usr/local/lib#${libdir}#' \
66 -e 's#\.\./\(.*rules\)#${sysconfdir}/snort/\1#' \
67 -e 's#\(libsf_engine.so\)#\1.0#' \
68 -e 's/^\(include $RULE_PATH\)/#\1/' \
69 -e 's/^\(dynamicdetection\)/#\1/' \
70 -e '/preprocessor reputation/,/blacklist/ s/^/#/' \
71 ${D}${sysconfdir}/snort/snort.conf
72
73 cp ${S}/preproc_rules/*.rules ${D}${sysconfdir}/snort/preproc_rules/
74 install -m 755 ${WORKDIR}/snort.init ${D}${sysconfdir}/init.d/snort
Brad Bishop26bdd442019-08-16 17:08:17 -040075
76 install -d ${D}${sysconfdir}/default/volatiles
77 install -m 0644 ${WORKDIR}/volatiles.99_snort ${D}${sysconfdir}/default/volatiles/99_snort
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080078
Brad Bishop19323692019-04-05 15:28:33 -040079 sed -i -e 's|-fdebug-prefix-map[^ ]*||g; s|-fmacro-prefix-map[^ ]*||g; s|${STAGING_DIR_TARGET}||g' ${D}${libdir}/pkgconfig/*.pc
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080080}
81
Brad Bishop26bdd442019-08-16 17:08:17 -040082pkg_postinst_${PN}() {
83 if [ -z "$D" ] && [ -e ${sysconfdir}/init.d/populate-volatile.sh ]; then
84 ${sysconfdir}/init.d/populate-volatile.sh update
85 fi
86}
87
Brad Bishop1a4b7ee2018-12-16 17:11:34 -080088FILES_${PN} += " \
89 ${libdir}/snort_dynamicengine/*.so.* \
90 ${libdir}/snort_dynamicpreprocessor/*.so.* \
91 ${libdir}/snort_dynamicrules/*.so.* \
92"
93FILES_${PN}-dbg += " \
94 ${libdir}/snort_dynamicengine/.debug \
95 ${libdir}/snort_dynamicpreprocessor/.debug \
96 ${libdir}/snort_dynamicrules/.debug \
97"
98FILES_${PN}-staticdev += " \
99 ${libdir}/snort_dynamicengine/*.a \
100 ${libdir}/snort_dynamicpreprocessor/*.a \
101 ${libdir}/snort_dynamicrules/*.a \
102 ${libdir}/snort/dynamic_preproc/*.a \
103 ${libdir}/snort/dynamic_output/*.a \
104"
105FILES_${PN}-dev += " \
106 ${libdir}/snort_dynamicengine/*.la \
107 ${libdir}/snort_dynamicpreprocessor/*.la \
108 ${libdir}/snort_dynamicrules/*.la \
109 ${libdir}/snort_dynamicengine/*.so \
110 ${libdir}/snort_dynamicpreprocessor/*.so \
111 ${libdir}/snort_dynamicrules/*.so \
112 ${prefix}/src/snort_dynamicsrc \
113"