summaryrefslogtreecommitdiff
path: root/community-staging
diff options
context:
space:
mode:
authorroot <root@rshg054.dnsready.net>2012-02-08 23:15:20 +0000
committerroot <root@rshg054.dnsready.net>2012-02-08 23:15:20 +0000
commit54b7119c36756b86ea463649ee972cd6c1ce5863 (patch)
tree973aa8caa4f7be614c973b0c56390bd5c61ba985 /community-staging
parent0dee03071a0643c3ee5820afa3c694dcef71d385 (diff)
Wed Feb 8 23:15:20 UTC 2012
Diffstat (limited to 'community-staging')
-rw-r--r--community-staging/cclive/PKGBUILD27
-rw-r--r--community-staging/ngrep/PKGBUILD33
-rw-r--r--community-staging/ngrep/ngrep-fix-ipv6-support.patch107
-rw-r--r--community-staging/pidgin-musictracker/PKGBUILD30
-rw-r--r--community-staging/privoxy/PKGBUILD64
-rw-r--r--community-staging/privoxy/privoxy53
-rw-r--r--community-staging/privoxy/privoxy.conf.d10
-rw-r--r--community-staging/privoxy/privoxy.install19
-rw-r--r--community-staging/privoxy/privoxy.logrotate.d8
-rw-r--r--community-staging/snort/PKGBUILD53
-rw-r--r--community-staging/snort/snort41
-rw-r--r--community-staging/snort/snort.conf.d21
-rw-r--r--community-staging/snort/snort.install26
13 files changed, 492 insertions, 0 deletions
diff --git a/community-staging/cclive/PKGBUILD b/community-staging/cclive/PKGBUILD
new file mode 100644
index 000000000..76265bd87
--- /dev/null
+++ b/community-staging/cclive/PKGBUILD
@@ -0,0 +1,27 @@
+# $Id: PKGBUILD 63944 2012-02-07 19:09:43Z jelle $
+# Maintainer: Lukas Fleischer <archlinux at cryptocrack dot de>
+# Contributor: joyfulgirl@archlinux.us
+# Contributor: nathan owe ndowens04 at gmail dot com
+
+pkgname=cclive
+pkgver=0.7.8
+pkgrel=2
+pkgdesc='Commandline downloader for popular video websites.'
+arch=('i686' 'x86_64')
+url='http://cclive.sourceforge.net/'
+license=('GPL3')
+depends=('boost-libs' 'pcre' 'curl' 'libquvi')
+makedepends=('boost')
+source=("http://downloads.sourceforge.net/project/${pkgname}/0.7/${pkgname}-${pkgver}.tar.gz")
+md5sums=('01ffbe54e48440721b3c283c993928f1')
+
+build() {
+ cd "$pkgname-$pkgver"
+ ./configure --prefix=/usr
+ make
+}
+
+package() {
+ cd "$pkgname-$pkgver"
+ make DESTDIR="$pkgdir" install
+}
diff --git a/community-staging/ngrep/PKGBUILD b/community-staging/ngrep/PKGBUILD
new file mode 100644
index 000000000..0307ae17e
--- /dev/null
+++ b/community-staging/ngrep/PKGBUILD
@@ -0,0 +1,33 @@
+# $Id: PKGBUILD 63940 2012-02-07 18:48:50Z jelle $
+# Maintainer: Lukas Fleischer <archlinux at cryptocrack dot de>
+# Contributor: Eric Belanger <eric@archlinux.org>
+# Contributor: dorphell <dorphell@archlinux.org>
+
+pkgname=ngrep
+pkgver=1.45
+pkgrel=8
+pkgdesc='A grep-like utility that allows you to search for network packets on an interface.'
+arch=('i686' 'x86_64')
+url='http://ngrep.sourceforge.net/'
+license=('custom')
+depends=('libpcap>=1.0.0')
+# Fix build failure when using "-j" (FS#27091).
+options=(!makeflags)
+source=("http://downloads.sourceforge.net/sourceforge/${pkgname}/${pkgname}-${pkgver}.tar.bz2" "ngrep-fix-ipv6-support.patch")
+md5sums=('bc8150331601f3b869549c94866b4f1c' '90e6dfb335bccf12615d3c468ceeb60f')
+# Added patch for broken ipv6 support (FS#27225)
+
+build() {
+ cd "${srcdir}/${pkgname}-${pkgver}"
+ patch -Np1 -i $srcdir/ngrep-fix-ipv6-support.patch
+
+ ./configure --prefix=/usr --with-pcap-includes=/usr/include/pcap --enable-ipv6
+ make
+}
+
+package() {
+ cd "${srcdir}/${pkgname}-${pkgver}"
+
+ make DESTDIR="${pkgdir}" install
+ install -Dm0644 LICENSE.txt "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE.txt"
+}
diff --git a/community-staging/ngrep/ngrep-fix-ipv6-support.patch b/community-staging/ngrep/ngrep-fix-ipv6-support.patch
new file mode 100644
index 000000000..9a07d7d38
--- /dev/null
+++ b/community-staging/ngrep/ngrep-fix-ipv6-support.patch
@@ -0,0 +1,107 @@
+diff -rupN trunk/ngrep-fix-ipv6-support.patch trunk.notarch/ngrep-fix-ipv6-support.patch
+--- trunk/ngrep-fix-ipv6-support.patch 1970-01-01 01:00:00.000000000 +0100
++++ trunk.notarch/ngrep-fix-ipv6-support.patch 2011-11-30 05:12:48.068790633 +0100
+@@ -0,0 +1,40 @@
++--- ngrep-1.45.ds2/ngrep.c 2010-04-21 12:16:52.000000000 +0200
+++++ ngrep-1.45.ds2-ipv6-patch/ngrep.c 2010-04-21 12:11:49.581088102 +0200
++@@ -711,10 +711,12 @@ void process(u_char *d, struct pcap_pkth
++ data = (unsigned char *)(tcp_pkt) + tcphdr_offset;
++ len -= link_offset + ip_hl + tcphdr_offset;
++
+++/*
++ #if USE_IPv6
++ if (ip_ver == 6)
++ len -= ntohs(ip6_pkt->ip6_plen);
++-#endif
+++#endif
+++*/
++
++ if ((int32_t)len < 0)
++ len = 0;
++@@ -731,11 +733,12 @@ void process(u_char *d, struct pcap_pkth
++ data = (unsigned char *)(udp_pkt) + udphdr_offset;
++ len -= link_offset + ip_hl + udphdr_offset;
++
+++/*
++ #if USE_IPv6
++ if (ip_ver == 6)
++ len -= ntohs(ip6_pkt->ip6_plen);
++ #endif
++-
+++*/
++ if ((int32_t)len < 0)
++ len = 0;
++
++@@ -769,7 +772,7 @@ void process(u_char *d, struct pcap_pkth
++ uint16_t icmp6hdr_offset = (frag_offset) ? 0 : 4;
++
++ data = (unsigned char *)(icmp6_pkt) + icmp6hdr_offset;
++- len -= link_offset + ip_hl + ntohs(ip6_pkt->ip6_plen) + icmp6hdr_offset;
+++ len -= link_offset + ip_hl + icmp6hdr_offset;
++
++ if ((int32_t)len < 0)
++ len = 0;
++
+diff -rupN trunk/ngrep-system-pcre.patch trunk.notarch/ngrep-system-pcre.patch
+--- trunk/ngrep-system-pcre.patch 1970-01-01 01:00:00.000000000 +0100
++++ trunk.notarch/ngrep-system-pcre.patch 2011-11-30 05:12:48.068790633 +0100
+@@ -0,0 +1,59 @@
++diff -urN ngrep-1.45/configure.in ngrep-1.45-patched/configure.in
++--- ngrep-1.45/configure.in 2006-11-14 21:43:56.000000000 -0600
+++++ ngrep-1.45-patched/configure.in 2006-11-29 10:34:48.000000000 -0600
++@@ -28,8 +28,8 @@
++ dnl
++
++ EXTRA_DEFINES=""
++-EXTRA_INCLUDES=""
++-EXTRA_LIBS=""
+++EXTRA_INCLUDES="$EXTRA_INCLUDES"
+++EXTRA_LIBS="$EXTRA_LIBS"
++
++
++ dnl
++@@ -130,8 +130,8 @@
++ echo 'Configuring Perl-Compatible Regular Expression (PCRE) library ...'
++ echo
++
++- REGEX_DIR='pcre-5.0'
++- REGEX_OBJS="$REGEX_DIR/pcre.o $REGEX_DIR/study.o"
+++# REGEX_DIR='pcre-5.0'
+++# REGEX_OBJS="$REGEX_DIR/pcre.o $REGEX_DIR/study.o"
++ USE_PCRE="1"
++
++ else
++@@ -146,7 +146,7 @@
++
++ fi
++
++-( cd $REGEX_DIR && ./configure )
+++#( cd $REGEX_DIR && ./configure )
++
++ AC_SUBST(REGEX_DIR)
++ AC_SUBST(REGEX_OBJS)
++diff -urN ngrep-1.45/Makefile.in ngrep-1.45-patched/Makefile.in
++--- ngrep-1.45/Makefile.in 2006-11-28 07:35:37.000000000 -0600
+++++ ngrep-1.45-patched/Makefile.in 2006-11-29 08:20:32.000000000 -0600
++@@ -38,7 +38,7 @@
++
++ all: $(TARGET)
++
++-$(TARGET): $(REGEX_OBJS) $(OBJS)
+++$(TARGET): $(OBJS)
++ $(CC) $(CFLAGS) $(LDFLAGS) $(STRIPFLAG) -o $(TARGET) $(OBJS) $(REGEX_OBJS) $(LIBS)
++
++ debug: $(REGEX_OBJS) $(OBJS)
++diff -urN ngrep-1.45/ngrep.c ngrep-1.45-patched/ngrep.c
++--- ngrep-1.45/ngrep.c 2006-11-28 07:38:43.000000000 -0600
+++++ ngrep-1.45-patched/ngrep.c 2006-11-29 08:10:48.000000000 -0600
++@@ -92,7 +92,7 @@
++ #endif
++
++ #if USE_PCRE
++-#include "pcre-5.0/pcre.h"
+++#include "pcre.h"
++ #else
++ #include "regex-0.12/regex.h"
++ #endif
++
diff --git a/community-staging/pidgin-musictracker/PKGBUILD b/community-staging/pidgin-musictracker/PKGBUILD
new file mode 100644
index 000000000..ba23ed37a
--- /dev/null
+++ b/community-staging/pidgin-musictracker/PKGBUILD
@@ -0,0 +1,30 @@
+# $Id: PKGBUILD 63942 2012-02-07 18:55:19Z jelle $
+# Maintainer: Lukas Fleischer <archlinux at cryptocrack dot de>
+# Contributor: Angel Velasquez <angvp@archlinux.org>
+# Contributor: Ionut Biru <ionut@archlinux.ro>
+# Contributor: Andrea Scarpino <andrea@archlinux.org>
+
+pkgname=pidgin-musictracker
+pkgver=0.4.22
+pkgrel=3
+pkgdesc="A plugin for Pidgin which displays the music track currently playing."
+url='http://code.google.com/p/pidgin-musictracker'
+license=('GPL2')
+depends=('pidgin' 'gtk2' 'dbus-glib')
+makedepends=('xmms2')
+arch=('i686' 'x86_64')
+source=("http://pidgin-musictracker.googlecode.com/files/${pkgname}-${pkgver}.tar.bz2")
+options=('!libtool')
+md5sums=('8d7225c705484db86b864cab5a536423')
+
+build() {
+ cd "${srcdir}/${pkgname}-${pkgver}"
+
+ ./configure --prefix=/usr
+ make
+}
+
+package() {
+ cd "${srcdir}/${pkgname}-${pkgver}"
+ make DESTDIR="${pkgdir}" install
+}
diff --git a/community-staging/privoxy/PKGBUILD b/community-staging/privoxy/PKGBUILD
new file mode 100644
index 000000000..f54a314b8
--- /dev/null
+++ b/community-staging/privoxy/PKGBUILD
@@ -0,0 +1,64 @@
+# $Id: PKGBUILD 63948 2012-02-07 20:45:04Z jelle $
+# Maintainer: Lukas Fleischer <archlinux at cryptocrack dot de>
+# Contributor: Juergen Hoetzel <juergen@hoetzel.info>
+# Contributor: basilburn (basilburn), Paul Bredbury (brebs)
+
+pkgname=privoxy
+pkgver=3.0.19
+pkgrel=2
+pkgdesc='A web proxy with advanced filtering capabilities.'
+arch=('i686' 'x86_64')
+url='http://www.privoxy.org'
+license=('GPL')
+depends=('pcre' 'zlib')
+makedepends=('autoconf')
+backup=('etc/conf.d/privoxy'
+ 'etc/privoxy/'{config,trust,default.action,user.filter,default.filter}
+ 'etc/privoxy/'{match-all,user}.action
+ 'etc/logrotate.d/privoxy')
+install='privoxy.install'
+source=("http://downloads.sourceforge.net/ijbswa/${pkgname}-${pkgver}-stable-src.tar.gz"
+ 'privoxy'
+ 'privoxy.logrotate.d'
+ 'privoxy.conf.d')
+md5sums=('57acc79059565cc42eda67982842785d'
+ '1b4ed8c4e7e5b04b10ef41b597dc3f3b'
+ '79480f311313cc43974f6cbe6b672927'
+ '27830ef79418e277b90c1c1fa933f876')
+
+build() {
+ cd "${srcdir}/${pkgname}-${pkgver}-stable"
+
+ autoheader
+ autoconf
+ ./configure --prefix=/usr --sysconfdir=/etc/privoxy
+
+ make
+}
+
+package() {
+ cd "${srcdir}/${pkgname}-${pkgver}-stable"
+
+ make prefix="${pkgdir}/usr" MAN_DEST="${pkgdir}/usr/share/man/man1" GROUP=42 \
+ CONF_BASE="${pkgdir}/etc/privoxy" VAR_DEST="${pkgdir}/var" install
+
+ # Don't overwrite existing log files!
+ rm "${pkgdir}/var/log/privoxy/"*
+
+ install -Dm0755 "${srcdir}/privoxy" "${pkgdir}/etc/rc.d/privoxy"
+ install -Dm0644 "${srcdir}/privoxy.logrotate.d" "${pkgdir}/etc/logrotate.d/privoxy"
+ install -Dm0644 "${srcdir}/privoxy.conf.d" "${pkgdir}/etc/conf.d/privoxy"
+
+ # Fix config paths.
+ sed -i -e 's#^confdir.*$#confdir /etc/privoxy#' -e 's#^logdir.*$#logdir /var/log/privoxy#' \
+ -e '/^user-manual/s#.*#\#user-manual /usr/share/doc/privoxy/user-manual/#' \
+ "${pkgdir}/etc/privoxy/config"
+
+ # Fix group ownership and permissions.
+ chgrp -R 42 "${pkgdir}/etc/privoxy/"
+ chgrp -R 42 "${pkgdir}/var/log/privoxy/"
+
+ find "${pkgdir}/etc/privoxy/" -type d | xargs chmod 0770
+ find "${pkgdir}/etc/privoxy/" -type f | xargs chmod 0660
+ chmod 0700 "${pkgdir}/var/log/privoxy"
+}
diff --git a/community-staging/privoxy/privoxy b/community-staging/privoxy/privoxy
new file mode 100644
index 000000000..754453de5
--- /dev/null
+++ b/community-staging/privoxy/privoxy
@@ -0,0 +1,53 @@
+#!/bin/bash
+
+. /etc/rc.conf
+. /etc/rc.d/functions
+
+# source application-specific settings
+[ -f /etc/conf.d/privoxy ] && . /etc/conf.d/privoxy
+
+# read logdir and logfile from privoxy config
+prld=`grep ^logdir "$PRIVOXY_CONF" 2>/dev/null | cut -d' ' -f2`
+[ -n "$prld" ] || prld=/var/log/privoxy
+prlf=`grep ^logfile "$PRIVOXY_CONF" 2>/dev/null | cut -d' ' -f2`
+[ -n "$prlf" ] || prlf=logfile
+
+PID=`pidof -o %PPID /usr/sbin/privoxy`
+
+case "$1" in
+ start)
+ stat_busy "Starting Privoxy"
+ # create missing logdir and logfile
+ [ -d "$prld" ] || mkdir -p "$prld"
+ if [ ! -f "$prlf" ]; then
+ touch "$prld/$prlf" && chgrp "${PRIVOXY_GROUP}" "$prld/$prlf" && \
+ chmod 0660 "$prld/$prlf"
+ fi
+ [ -z "$PID" ] && /usr/sbin/privoxy --user ${PRIVOXY_USER}.${PRIVOXY_GROUP} \
+ ${PRIVOXY_ARGS} ${PRIVOXY_CONF}
+ if [ $? -gt 0 ]; then
+ stat_fail
+ else
+ add_daemon privoxy
+ stat_done
+ fi
+ ;;
+ stop)
+ stat_busy "Stopping Privoxy"
+ [ ! -z "$PID" ] && kill $PID &> /dev/null
+ if [ $? -gt 0 ]; then
+ stat_fail
+ else
+ rm_daemon privoxy
+ stat_done
+ fi
+ ;;
+ restart)
+ $0 stop
+ sleep 1
+ $0 start
+ ;;
+ *)
+ echo "usage: $0 {start|stop|restart}"
+esac
+exit 0
diff --git a/community-staging/privoxy/privoxy.conf.d b/community-staging/privoxy/privoxy.conf.d
new file mode 100644
index 000000000..9aa11cd67
--- /dev/null
+++ b/community-staging/privoxy/privoxy.conf.d
@@ -0,0 +1,10 @@
+# Location of the config file.
+PRIVOXY_CONF='/etc/privoxy/config'
+
+# User and group that privoxy will be run as.
+PRIVOXY_USER='privoxy'
+PRIVOXY_GROUP='privoxy'
+
+# Additional arguments.
+PRIVOXY_ARGS="--pidfile /var/run/privoxy.pid"
+
diff --git a/community-staging/privoxy/privoxy.install b/community-staging/privoxy/privoxy.install
new file mode 100644
index 000000000..c3ed75111
--- /dev/null
+++ b/community-staging/privoxy/privoxy.install
@@ -0,0 +1,19 @@
+post_install() {
+ groupadd -g 42 privoxy &>/dev/null
+ useradd -u 42 -g privoxy -d /var/spool/privoxy -s /bin/false privoxy &>/dev/null
+ chown -R privoxy:privoxy /etc/privoxy /var/log/privoxy
+
+ if [ ! -d /var/spool/privoxy ]; then
+ install -dm0770 -o privoxy -g privoxy /var/spool/privoxy
+ fi
+}
+
+post_upgrade() {
+ post_install $1
+}
+
+pre_remove() {
+ userdel privoxy &>/dev/null
+ groupdel privoxy &>/dev/null
+ rm -rf var/spool/privoxy
+}
diff --git a/community-staging/privoxy/privoxy.logrotate.d b/community-staging/privoxy/privoxy.logrotate.d
new file mode 100644
index 000000000..386766c3e
--- /dev/null
+++ b/community-staging/privoxy/privoxy.logrotate.d
@@ -0,0 +1,8 @@
+/var/log/privoxy/* {
+ create 660 root privoxy
+ notifempty
+ compress
+ postrotate
+ /bin/kill -HUP `cat /var/run/privoxy.pid 2>/dev/null` 2> /dev/null || true
+ endscript
+}
diff --git a/community-staging/snort/PKGBUILD b/community-staging/snort/PKGBUILD
new file mode 100644
index 000000000..d43d9497c
--- /dev/null
+++ b/community-staging/snort/PKGBUILD
@@ -0,0 +1,53 @@
+# $Id: PKGBUILD 63946 2012-02-07 20:21:01Z jelle $
+# Maintainer: Lukas Fleischer <archlinux at cryptocrack dot de>
+# Contributor: Hugo Doria <hugo@archlinux.org>
+# Contributor: Kessia 'even' Pinheiro <kessiapinheiro at gmail.com>
+# Contributor: dorphell <dorphell@archlinux.org>
+# Contributor: Gregor Ibic <gregor.ibic@intelicom.si>
+
+pkgname=snort
+pkgver=2.9.2.1
+pkgrel=2
+pkgdesc='A lightweight network intrusion detection system.'
+arch=('i686' 'x86_64')
+url='http://www.snort.org'
+license=('GPL')
+depends=('libdaq' 'libdnet' 'libpcap' 'pcre' 'zlib')
+makedepends=('ca-certificates')
+backup=('etc/conf.d/snort'
+ 'etc/snort/snort.conf'
+ 'etc/snort/threshold.conf'
+ 'etc/snort/confreference.config'
+ 'etc/snort/classification.config')
+options=('!makeflags' '!libtool')
+install='snort.install'
+source=('http://www.snort.org/downloads/1416'
+ 'snort'
+ 'snort.conf.d')
+md5sums=('2f3e2b6ee72adbdfac73cb1c6c14bd61'
+ '361b8b9e40b9af0164f6b3e3da2e8277'
+ 'b4fb8a68490589cd34df93de7609bfac')
+
+build() {
+ cd "${srcdir}/${pkgname}-${pkgver}"
+
+ ./configure --prefix=/usr --sysconfdir=/etc/snort --with-libpcap-includes=/usr/include/pcap \
+ --without-mysql --without-postgresql --without-oracle --without-odbc --enable-zlib \
+ --enable-ipv6
+ make
+}
+
+package() {
+ cd "${srcdir}/${pkgname}-${pkgver}"
+
+ make DESTDIR="${pkgdir}" install
+
+ mkdir -p "${pkgdir}/"{etc/rc.d,etc/snort/rules}
+
+ install -d -m755 "${pkgdir}/var/log/snort"
+ install -D -m644 etc/{*.conf*,*.map} "${pkgdir}/etc/snort/"
+ install -D -m644 "${srcdir}/snort.conf.d" "${pkgdir}/etc/conf.d/snort"
+ install -D -m755 "${srcdir}/snort" "${pkgdir}/etc/rc.d/snort"
+
+ sed -i 's#/usr/local/lib/#/usr/lib/#' "${pkgdir}/etc/snort/snort.conf"
+}
diff --git a/community-staging/snort/snort b/community-staging/snort/snort
new file mode 100644
index 000000000..5dfa72fbf
--- /dev/null
+++ b/community-staging/snort/snort
@@ -0,0 +1,41 @@
+#!/bin/bash
+
+. /etc/rc.conf
+. /etc/rc.d/functions
+
+# source application-specific settings
+[ -f /etc/conf.d/snort ] && . /etc/conf.d/snort
+
+PID=`pidof -o %PPID /usr/bin/snort`
+case "$1" in
+ start)
+ stat_busy "Starting Intrusion Database System: SNORT"
+ [ -z "$PID" ] && /usr/bin/snort ${SNORT_OPTIONS} -u ${USER} -g ${GROUP} \
+ -i ${INTERFACE} -c ${SNORT_CONF}
+ if [ $? -gt 0 ]; then
+ stat_fail
+ else
+ add_daemon snort
+ stat_done
+ fi
+ ;;
+
+ stop)
+ stat_busy "Stopping Intrusion Database System: SNORT"
+ [ ! -z "$PID" ] && kill $PID &> /dev/null
+ if [ $? -gt 0 ]; then
+ stat_fail
+ else
+ rm_daemon snort
+ stat_done
+ fi
+ ;;
+ restart)
+ $0 stop
+ sleep 1
+ $0 start
+ ;;
+ *)
+ echo "usage: $0 {start|stop|restart}"
+esac
+exit 0
diff --git a/community-staging/snort/snort.conf.d b/community-staging/snort/snort.conf.d
new file mode 100644
index 000000000..86b566abc
--- /dev/null
+++ b/community-staging/snort/snort.conf.d
@@ -0,0 +1,21 @@
+#
+# Parameters to be passed to snort
+#
+
+# options taken from Fedora
+# http://cvs.fedoraproject.org/viewcvs/devel/snort/sysconfig.snort?rev=1.2&view=markup
+
+# Where is the snort.conf file.
+SNORT_CONF="/etc/snort/snort.conf"
+
+# What user account should we run under.
+USER="snort"
+
+# What group account should we run under.
+GROUP="snort"
+
+# define the interface we listen on
+INTERFACE="eth0"
+
+# If you are using prelude, delete the '-A fast' option
+SNORT_OPTIONS="-A fast -b -l /var/log/snort -D -p"
diff --git a/community-staging/snort/snort.install b/community-staging/snort/snort.install
new file mode 100644
index 000000000..673f22c6c
--- /dev/null
+++ b/community-staging/snort/snort.install
@@ -0,0 +1,26 @@
+post_install() {
+ getent group snort >/dev/null || usr/sbin/groupadd -g 29 snort
+ getent passwd snort >/dev/null || usr/sbin/useradd -c 'Snort user' -u 29 -g snort -d /var/log/snort -s /bin/false snort
+ usr/bin/passwd -l snort &>/dev/null
+
+ [ -f var/log/snort/alert ] || : >var/log/snort/alert
+ chown snort.snort var/log/snort/ -R
+
+cat << _EOF
+
+>>> You have to edit the HOME_NET variable in the /etc/snort/snort.conf file to reflect your local network.
+>>> If you do not change it, snort may not work.
+
+_EOF
+}
+
+post_upgrade() {
+ post_install $1
+}
+
+pre_remove() {
+ usr/sbin/userdel snort &>/dev/null
+ usr/sbin/groupdel snort &>/dev/null
+}
+
+# vim:set ts=2 sw=2 et: