diff options
author | root <root@rshg054.dnsready.net> | 2012-02-08 23:15:20 +0000 |
---|---|---|
committer | root <root@rshg054.dnsready.net> | 2012-02-08 23:15:20 +0000 |
commit | 54b7119c36756b86ea463649ee972cd6c1ce5863 (patch) | |
tree | 973aa8caa4f7be614c973b0c56390bd5c61ba985 /community-staging | |
parent | 0dee03071a0643c3ee5820afa3c694dcef71d385 (diff) |
Wed Feb 8 23:15:20 UTC 2012
Diffstat (limited to 'community-staging')
-rw-r--r-- | community-staging/cclive/PKGBUILD | 27 | ||||
-rw-r--r-- | community-staging/ngrep/PKGBUILD | 33 | ||||
-rw-r--r-- | community-staging/ngrep/ngrep-fix-ipv6-support.patch | 107 | ||||
-rw-r--r-- | community-staging/pidgin-musictracker/PKGBUILD | 30 | ||||
-rw-r--r-- | community-staging/privoxy/PKGBUILD | 64 | ||||
-rw-r--r-- | community-staging/privoxy/privoxy | 53 | ||||
-rw-r--r-- | community-staging/privoxy/privoxy.conf.d | 10 | ||||
-rw-r--r-- | community-staging/privoxy/privoxy.install | 19 | ||||
-rw-r--r-- | community-staging/privoxy/privoxy.logrotate.d | 8 | ||||
-rw-r--r-- | community-staging/snort/PKGBUILD | 53 | ||||
-rw-r--r-- | community-staging/snort/snort | 41 | ||||
-rw-r--r-- | community-staging/snort/snort.conf.d | 21 | ||||
-rw-r--r-- | community-staging/snort/snort.install | 26 |
13 files changed, 492 insertions, 0 deletions
diff --git a/community-staging/cclive/PKGBUILD b/community-staging/cclive/PKGBUILD new file mode 100644 index 000000000..76265bd87 --- /dev/null +++ b/community-staging/cclive/PKGBUILD @@ -0,0 +1,27 @@ +# $Id: PKGBUILD 63944 2012-02-07 19:09:43Z jelle $ +# Maintainer: Lukas Fleischer <archlinux at cryptocrack dot de> +# Contributor: joyfulgirl@archlinux.us +# Contributor: nathan owe ndowens04 at gmail dot com + +pkgname=cclive +pkgver=0.7.8 +pkgrel=2 +pkgdesc='Commandline downloader for popular video websites.' +arch=('i686' 'x86_64') +url='http://cclive.sourceforge.net/' +license=('GPL3') +depends=('boost-libs' 'pcre' 'curl' 'libquvi') +makedepends=('boost') +source=("http://downloads.sourceforge.net/project/${pkgname}/0.7/${pkgname}-${pkgver}.tar.gz") +md5sums=('01ffbe54e48440721b3c283c993928f1') + +build() { + cd "$pkgname-$pkgver" + ./configure --prefix=/usr + make +} + +package() { + cd "$pkgname-$pkgver" + make DESTDIR="$pkgdir" install +} diff --git a/community-staging/ngrep/PKGBUILD b/community-staging/ngrep/PKGBUILD new file mode 100644 index 000000000..0307ae17e --- /dev/null +++ b/community-staging/ngrep/PKGBUILD @@ -0,0 +1,33 @@ +# $Id: PKGBUILD 63940 2012-02-07 18:48:50Z jelle $ +# Maintainer: Lukas Fleischer <archlinux at cryptocrack dot de> +# Contributor: Eric Belanger <eric@archlinux.org> +# Contributor: dorphell <dorphell@archlinux.org> + +pkgname=ngrep +pkgver=1.45 +pkgrel=8 +pkgdesc='A grep-like utility that allows you to search for network packets on an interface.' +arch=('i686' 'x86_64') +url='http://ngrep.sourceforge.net/' +license=('custom') +depends=('libpcap>=1.0.0') +# Fix build failure when using "-j" (FS#27091). +options=(!makeflags) +source=("http://downloads.sourceforge.net/sourceforge/${pkgname}/${pkgname}-${pkgver}.tar.bz2" "ngrep-fix-ipv6-support.patch") +md5sums=('bc8150331601f3b869549c94866b4f1c' '90e6dfb335bccf12615d3c468ceeb60f') +# Added patch for broken ipv6 support (FS#27225) + +build() { + cd "${srcdir}/${pkgname}-${pkgver}" + patch -Np1 -i $srcdir/ngrep-fix-ipv6-support.patch + + ./configure --prefix=/usr --with-pcap-includes=/usr/include/pcap --enable-ipv6 + make +} + +package() { + cd "${srcdir}/${pkgname}-${pkgver}" + + make DESTDIR="${pkgdir}" install + install -Dm0644 LICENSE.txt "${pkgdir}/usr/share/licenses/${pkgname}/LICENSE.txt" +} diff --git a/community-staging/ngrep/ngrep-fix-ipv6-support.patch b/community-staging/ngrep/ngrep-fix-ipv6-support.patch new file mode 100644 index 000000000..9a07d7d38 --- /dev/null +++ b/community-staging/ngrep/ngrep-fix-ipv6-support.patch @@ -0,0 +1,107 @@ +diff -rupN trunk/ngrep-fix-ipv6-support.patch trunk.notarch/ngrep-fix-ipv6-support.patch +--- trunk/ngrep-fix-ipv6-support.patch 1970-01-01 01:00:00.000000000 +0100 ++++ trunk.notarch/ngrep-fix-ipv6-support.patch 2011-11-30 05:12:48.068790633 +0100 +@@ -0,0 +1,40 @@ ++--- ngrep-1.45.ds2/ngrep.c 2010-04-21 12:16:52.000000000 +0200 +++++ ngrep-1.45.ds2-ipv6-patch/ngrep.c 2010-04-21 12:11:49.581088102 +0200 ++@@ -711,10 +711,12 @@ void process(u_char *d, struct pcap_pkth ++ data = (unsigned char *)(tcp_pkt) + tcphdr_offset; ++ len -= link_offset + ip_hl + tcphdr_offset; ++ +++/* ++ #if USE_IPv6 ++ if (ip_ver == 6) ++ len -= ntohs(ip6_pkt->ip6_plen); ++-#endif +++#endif +++*/ ++ ++ if ((int32_t)len < 0) ++ len = 0; ++@@ -731,11 +733,12 @@ void process(u_char *d, struct pcap_pkth ++ data = (unsigned char *)(udp_pkt) + udphdr_offset; ++ len -= link_offset + ip_hl + udphdr_offset; ++ +++/* ++ #if USE_IPv6 ++ if (ip_ver == 6) ++ len -= ntohs(ip6_pkt->ip6_plen); ++ #endif ++- +++*/ ++ if ((int32_t)len < 0) ++ len = 0; ++ ++@@ -769,7 +772,7 @@ void process(u_char *d, struct pcap_pkth ++ uint16_t icmp6hdr_offset = (frag_offset) ? 0 : 4; ++ ++ data = (unsigned char *)(icmp6_pkt) + icmp6hdr_offset; ++- len -= link_offset + ip_hl + ntohs(ip6_pkt->ip6_plen) + icmp6hdr_offset; +++ len -= link_offset + ip_hl + icmp6hdr_offset; ++ ++ if ((int32_t)len < 0) ++ len = 0; ++ +diff -rupN trunk/ngrep-system-pcre.patch trunk.notarch/ngrep-system-pcre.patch +--- trunk/ngrep-system-pcre.patch 1970-01-01 01:00:00.000000000 +0100 ++++ trunk.notarch/ngrep-system-pcre.patch 2011-11-30 05:12:48.068790633 +0100 +@@ -0,0 +1,59 @@ ++diff -urN ngrep-1.45/configure.in ngrep-1.45-patched/configure.in ++--- ngrep-1.45/configure.in 2006-11-14 21:43:56.000000000 -0600 +++++ ngrep-1.45-patched/configure.in 2006-11-29 10:34:48.000000000 -0600 ++@@ -28,8 +28,8 @@ ++ dnl ++ ++ EXTRA_DEFINES="" ++-EXTRA_INCLUDES="" ++-EXTRA_LIBS="" +++EXTRA_INCLUDES="$EXTRA_INCLUDES" +++EXTRA_LIBS="$EXTRA_LIBS" ++ ++ ++ dnl ++@@ -130,8 +130,8 @@ ++ echo 'Configuring Perl-Compatible Regular Expression (PCRE) library ...' ++ echo ++ ++- REGEX_DIR='pcre-5.0' ++- REGEX_OBJS="$REGEX_DIR/pcre.o $REGEX_DIR/study.o" +++# REGEX_DIR='pcre-5.0' +++# REGEX_OBJS="$REGEX_DIR/pcre.o $REGEX_DIR/study.o" ++ USE_PCRE="1" ++ ++ else ++@@ -146,7 +146,7 @@ ++ ++ fi ++ ++-( cd $REGEX_DIR && ./configure ) +++#( cd $REGEX_DIR && ./configure ) ++ ++ AC_SUBST(REGEX_DIR) ++ AC_SUBST(REGEX_OBJS) ++diff -urN ngrep-1.45/Makefile.in ngrep-1.45-patched/Makefile.in ++--- ngrep-1.45/Makefile.in 2006-11-28 07:35:37.000000000 -0600 +++++ ngrep-1.45-patched/Makefile.in 2006-11-29 08:20:32.000000000 -0600 ++@@ -38,7 +38,7 @@ ++ ++ all: $(TARGET) ++ ++-$(TARGET): $(REGEX_OBJS) $(OBJS) +++$(TARGET): $(OBJS) ++ $(CC) $(CFLAGS) $(LDFLAGS) $(STRIPFLAG) -o $(TARGET) $(OBJS) $(REGEX_OBJS) $(LIBS) ++ ++ debug: $(REGEX_OBJS) $(OBJS) ++diff -urN ngrep-1.45/ngrep.c ngrep-1.45-patched/ngrep.c ++--- ngrep-1.45/ngrep.c 2006-11-28 07:38:43.000000000 -0600 +++++ ngrep-1.45-patched/ngrep.c 2006-11-29 08:10:48.000000000 -0600 ++@@ -92,7 +92,7 @@ ++ #endif ++ ++ #if USE_PCRE ++-#include "pcre-5.0/pcre.h" +++#include "pcre.h" ++ #else ++ #include "regex-0.12/regex.h" ++ #endif ++ diff --git a/community-staging/pidgin-musictracker/PKGBUILD b/community-staging/pidgin-musictracker/PKGBUILD new file mode 100644 index 000000000..ba23ed37a --- /dev/null +++ b/community-staging/pidgin-musictracker/PKGBUILD @@ -0,0 +1,30 @@ +# $Id: PKGBUILD 63942 2012-02-07 18:55:19Z jelle $ +# Maintainer: Lukas Fleischer <archlinux at cryptocrack dot de> +# Contributor: Angel Velasquez <angvp@archlinux.org> +# Contributor: Ionut Biru <ionut@archlinux.ro> +# Contributor: Andrea Scarpino <andrea@archlinux.org> + +pkgname=pidgin-musictracker +pkgver=0.4.22 +pkgrel=3 +pkgdesc="A plugin for Pidgin which displays the music track currently playing." +url='http://code.google.com/p/pidgin-musictracker' +license=('GPL2') +depends=('pidgin' 'gtk2' 'dbus-glib') +makedepends=('xmms2') +arch=('i686' 'x86_64') +source=("http://pidgin-musictracker.googlecode.com/files/${pkgname}-${pkgver}.tar.bz2") +options=('!libtool') +md5sums=('8d7225c705484db86b864cab5a536423') + +build() { + cd "${srcdir}/${pkgname}-${pkgver}" + + ./configure --prefix=/usr + make +} + +package() { + cd "${srcdir}/${pkgname}-${pkgver}" + make DESTDIR="${pkgdir}" install +} diff --git a/community-staging/privoxy/PKGBUILD b/community-staging/privoxy/PKGBUILD new file mode 100644 index 000000000..f54a314b8 --- /dev/null +++ b/community-staging/privoxy/PKGBUILD @@ -0,0 +1,64 @@ +# $Id: PKGBUILD 63948 2012-02-07 20:45:04Z jelle $ +# Maintainer: Lukas Fleischer <archlinux at cryptocrack dot de> +# Contributor: Juergen Hoetzel <juergen@hoetzel.info> +# Contributor: basilburn (basilburn), Paul Bredbury (brebs) + +pkgname=privoxy +pkgver=3.0.19 +pkgrel=2 +pkgdesc='A web proxy with advanced filtering capabilities.' +arch=('i686' 'x86_64') +url='http://www.privoxy.org' +license=('GPL') +depends=('pcre' 'zlib') +makedepends=('autoconf') +backup=('etc/conf.d/privoxy' + 'etc/privoxy/'{config,trust,default.action,user.filter,default.filter} + 'etc/privoxy/'{match-all,user}.action + 'etc/logrotate.d/privoxy') +install='privoxy.install' +source=("http://downloads.sourceforge.net/ijbswa/${pkgname}-${pkgver}-stable-src.tar.gz" + 'privoxy' + 'privoxy.logrotate.d' + 'privoxy.conf.d') +md5sums=('57acc79059565cc42eda67982842785d' + '1b4ed8c4e7e5b04b10ef41b597dc3f3b' + '79480f311313cc43974f6cbe6b672927' + '27830ef79418e277b90c1c1fa933f876') + +build() { + cd "${srcdir}/${pkgname}-${pkgver}-stable" + + autoheader + autoconf + ./configure --prefix=/usr --sysconfdir=/etc/privoxy + + make +} + +package() { + cd "${srcdir}/${pkgname}-${pkgver}-stable" + + make prefix="${pkgdir}/usr" MAN_DEST="${pkgdir}/usr/share/man/man1" GROUP=42 \ + CONF_BASE="${pkgdir}/etc/privoxy" VAR_DEST="${pkgdir}/var" install + + # Don't overwrite existing log files! + rm "${pkgdir}/var/log/privoxy/"* + + install -Dm0755 "${srcdir}/privoxy" "${pkgdir}/etc/rc.d/privoxy" + install -Dm0644 "${srcdir}/privoxy.logrotate.d" "${pkgdir}/etc/logrotate.d/privoxy" + install -Dm0644 "${srcdir}/privoxy.conf.d" "${pkgdir}/etc/conf.d/privoxy" + + # Fix config paths. + sed -i -e 's#^confdir.*$#confdir /etc/privoxy#' -e 's#^logdir.*$#logdir /var/log/privoxy#' \ + -e '/^user-manual/s#.*#\#user-manual /usr/share/doc/privoxy/user-manual/#' \ + "${pkgdir}/etc/privoxy/config" + + # Fix group ownership and permissions. + chgrp -R 42 "${pkgdir}/etc/privoxy/" + chgrp -R 42 "${pkgdir}/var/log/privoxy/" + + find "${pkgdir}/etc/privoxy/" -type d | xargs chmod 0770 + find "${pkgdir}/etc/privoxy/" -type f | xargs chmod 0660 + chmod 0700 "${pkgdir}/var/log/privoxy" +} diff --git a/community-staging/privoxy/privoxy b/community-staging/privoxy/privoxy new file mode 100644 index 000000000..754453de5 --- /dev/null +++ b/community-staging/privoxy/privoxy @@ -0,0 +1,53 @@ +#!/bin/bash + +. /etc/rc.conf +. /etc/rc.d/functions + +# source application-specific settings +[ -f /etc/conf.d/privoxy ] && . /etc/conf.d/privoxy + +# read logdir and logfile from privoxy config +prld=`grep ^logdir "$PRIVOXY_CONF" 2>/dev/null | cut -d' ' -f2` +[ -n "$prld" ] || prld=/var/log/privoxy +prlf=`grep ^logfile "$PRIVOXY_CONF" 2>/dev/null | cut -d' ' -f2` +[ -n "$prlf" ] || prlf=logfile + +PID=`pidof -o %PPID /usr/sbin/privoxy` + +case "$1" in + start) + stat_busy "Starting Privoxy" + # create missing logdir and logfile + [ -d "$prld" ] || mkdir -p "$prld" + if [ ! -f "$prlf" ]; then + touch "$prld/$prlf" && chgrp "${PRIVOXY_GROUP}" "$prld/$prlf" && \ + chmod 0660 "$prld/$prlf" + fi + [ -z "$PID" ] && /usr/sbin/privoxy --user ${PRIVOXY_USER}.${PRIVOXY_GROUP} \ + ${PRIVOXY_ARGS} ${PRIVOXY_CONF} + if [ $? -gt 0 ]; then + stat_fail + else + add_daemon privoxy + stat_done + fi + ;; + stop) + stat_busy "Stopping Privoxy" + [ ! -z "$PID" ] && kill $PID &> /dev/null + if [ $? -gt 0 ]; then + stat_fail + else + rm_daemon privoxy + stat_done + fi + ;; + restart) + $0 stop + sleep 1 + $0 start + ;; + *) + echo "usage: $0 {start|stop|restart}" +esac +exit 0 diff --git a/community-staging/privoxy/privoxy.conf.d b/community-staging/privoxy/privoxy.conf.d new file mode 100644 index 000000000..9aa11cd67 --- /dev/null +++ b/community-staging/privoxy/privoxy.conf.d @@ -0,0 +1,10 @@ +# Location of the config file. +PRIVOXY_CONF='/etc/privoxy/config' + +# User and group that privoxy will be run as. +PRIVOXY_USER='privoxy' +PRIVOXY_GROUP='privoxy' + +# Additional arguments. +PRIVOXY_ARGS="--pidfile /var/run/privoxy.pid" + diff --git a/community-staging/privoxy/privoxy.install b/community-staging/privoxy/privoxy.install new file mode 100644 index 000000000..c3ed75111 --- /dev/null +++ b/community-staging/privoxy/privoxy.install @@ -0,0 +1,19 @@ +post_install() { + groupadd -g 42 privoxy &>/dev/null + useradd -u 42 -g privoxy -d /var/spool/privoxy -s /bin/false privoxy &>/dev/null + chown -R privoxy:privoxy /etc/privoxy /var/log/privoxy + + if [ ! -d /var/spool/privoxy ]; then + install -dm0770 -o privoxy -g privoxy /var/spool/privoxy + fi +} + +post_upgrade() { + post_install $1 +} + +pre_remove() { + userdel privoxy &>/dev/null + groupdel privoxy &>/dev/null + rm -rf var/spool/privoxy +} diff --git a/community-staging/privoxy/privoxy.logrotate.d b/community-staging/privoxy/privoxy.logrotate.d new file mode 100644 index 000000000..386766c3e --- /dev/null +++ b/community-staging/privoxy/privoxy.logrotate.d @@ -0,0 +1,8 @@ +/var/log/privoxy/* { + create 660 root privoxy + notifempty + compress + postrotate + /bin/kill -HUP `cat /var/run/privoxy.pid 2>/dev/null` 2> /dev/null || true + endscript +} diff --git a/community-staging/snort/PKGBUILD b/community-staging/snort/PKGBUILD new file mode 100644 index 000000000..d43d9497c --- /dev/null +++ b/community-staging/snort/PKGBUILD @@ -0,0 +1,53 @@ +# $Id: PKGBUILD 63946 2012-02-07 20:21:01Z jelle $ +# Maintainer: Lukas Fleischer <archlinux at cryptocrack dot de> +# Contributor: Hugo Doria <hugo@archlinux.org> +# Contributor: Kessia 'even' Pinheiro <kessiapinheiro at gmail.com> +# Contributor: dorphell <dorphell@archlinux.org> +# Contributor: Gregor Ibic <gregor.ibic@intelicom.si> + +pkgname=snort +pkgver=2.9.2.1 +pkgrel=2 +pkgdesc='A lightweight network intrusion detection system.' +arch=('i686' 'x86_64') +url='http://www.snort.org' +license=('GPL') +depends=('libdaq' 'libdnet' 'libpcap' 'pcre' 'zlib') +makedepends=('ca-certificates') +backup=('etc/conf.d/snort' + 'etc/snort/snort.conf' + 'etc/snort/threshold.conf' + 'etc/snort/confreference.config' + 'etc/snort/classification.config') +options=('!makeflags' '!libtool') +install='snort.install' +source=('http://www.snort.org/downloads/1416' + 'snort' + 'snort.conf.d') +md5sums=('2f3e2b6ee72adbdfac73cb1c6c14bd61' + '361b8b9e40b9af0164f6b3e3da2e8277' + 'b4fb8a68490589cd34df93de7609bfac') + +build() { + cd "${srcdir}/${pkgname}-${pkgver}" + + ./configure --prefix=/usr --sysconfdir=/etc/snort --with-libpcap-includes=/usr/include/pcap \ + --without-mysql --without-postgresql --without-oracle --without-odbc --enable-zlib \ + --enable-ipv6 + make +} + +package() { + cd "${srcdir}/${pkgname}-${pkgver}" + + make DESTDIR="${pkgdir}" install + + mkdir -p "${pkgdir}/"{etc/rc.d,etc/snort/rules} + + install -d -m755 "${pkgdir}/var/log/snort" + install -D -m644 etc/{*.conf*,*.map} "${pkgdir}/etc/snort/" + install -D -m644 "${srcdir}/snort.conf.d" "${pkgdir}/etc/conf.d/snort" + install -D -m755 "${srcdir}/snort" "${pkgdir}/etc/rc.d/snort" + + sed -i 's#/usr/local/lib/#/usr/lib/#' "${pkgdir}/etc/snort/snort.conf" +} diff --git a/community-staging/snort/snort b/community-staging/snort/snort new file mode 100644 index 000000000..5dfa72fbf --- /dev/null +++ b/community-staging/snort/snort @@ -0,0 +1,41 @@ +#!/bin/bash + +. /etc/rc.conf +. /etc/rc.d/functions + +# source application-specific settings +[ -f /etc/conf.d/snort ] && . /etc/conf.d/snort + +PID=`pidof -o %PPID /usr/bin/snort` +case "$1" in + start) + stat_busy "Starting Intrusion Database System: SNORT" + [ -z "$PID" ] && /usr/bin/snort ${SNORT_OPTIONS} -u ${USER} -g ${GROUP} \ + -i ${INTERFACE} -c ${SNORT_CONF} + if [ $? -gt 0 ]; then + stat_fail + else + add_daemon snort + stat_done + fi + ;; + + stop) + stat_busy "Stopping Intrusion Database System: SNORT" + [ ! -z "$PID" ] && kill $PID &> /dev/null + if [ $? -gt 0 ]; then + stat_fail + else + rm_daemon snort + stat_done + fi + ;; + restart) + $0 stop + sleep 1 + $0 start + ;; + *) + echo "usage: $0 {start|stop|restart}" +esac +exit 0 diff --git a/community-staging/snort/snort.conf.d b/community-staging/snort/snort.conf.d new file mode 100644 index 000000000..86b566abc --- /dev/null +++ b/community-staging/snort/snort.conf.d @@ -0,0 +1,21 @@ +# +# Parameters to be passed to snort +# + +# options taken from Fedora +# http://cvs.fedoraproject.org/viewcvs/devel/snort/sysconfig.snort?rev=1.2&view=markup + +# Where is the snort.conf file. +SNORT_CONF="/etc/snort/snort.conf" + +# What user account should we run under. +USER="snort" + +# What group account should we run under. +GROUP="snort" + +# define the interface we listen on +INTERFACE="eth0" + +# If you are using prelude, delete the '-A fast' option +SNORT_OPTIONS="-A fast -b -l /var/log/snort -D -p" diff --git a/community-staging/snort/snort.install b/community-staging/snort/snort.install new file mode 100644 index 000000000..673f22c6c --- /dev/null +++ b/community-staging/snort/snort.install @@ -0,0 +1,26 @@ +post_install() { + getent group snort >/dev/null || usr/sbin/groupadd -g 29 snort + getent passwd snort >/dev/null || usr/sbin/useradd -c 'Snort user' -u 29 -g snort -d /var/log/snort -s /bin/false snort + usr/bin/passwd -l snort &>/dev/null + + [ -f var/log/snort/alert ] || : >var/log/snort/alert + chown snort.snort var/log/snort/ -R + +cat << _EOF + +>>> You have to edit the HOME_NET variable in the /etc/snort/snort.conf file to reflect your local network. +>>> If you do not change it, snort may not work. + +_EOF +} + +post_upgrade() { + post_install $1 +} + +pre_remove() { + usr/sbin/userdel snort &>/dev/null + usr/sbin/groupdel snort &>/dev/null +} + +# vim:set ts=2 sw=2 et: |