1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-31 05:41:08 +00:00

Remove expired port:

2020-04-20 security/suricata5: security/suricata is already at version 5
This commit is contained in:
Rene Ladan 2020-04-20 11:21:56 +00:00
parent 2aa17b1f5c
commit 634e96702d
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=532195
10 changed files with 1 additions and 506 deletions

1
MOVED
View File

@ -14548,3 +14548,4 @@ www/py-django-caching-app-plugins||2020-04-18|Doesn't work with Django 1.9+ and
net/openmpi2||2020-04-19|Removed, deprecated by upstream
www/py-ddgr|www/ddgr|2020-04-19|Duplicate port
sysutils/py-halite||2020-04-19|Hasexpired: Uses deprecated version of python
security/suricata5|security/suricata|2020-04-20|Has expired: security/suricata is already at version 5

View File

@ -1230,7 +1230,6 @@
SUBDIR += sudoscript
SUBDIR += super
SUBDIR += suricata
SUBDIR += suricata5
SUBDIR += swatchdog
SUBDIR += switzerland
SUBDIR += symbion-sslproxy

View File

@ -1,125 +0,0 @@
# Created by: Muhammad Moinur Rahman <bofh@FreeBSD.org>
# $FreeBSD$
PORTNAME= suricata
DISTVERSION= 5.0.0-rc1
PORTREVISION= 5
CATEGORIES= security
MASTER_SITES= https://www.openinfosecfoundation.org/download/
PKGNAMESUFFIX= 5
MAINTAINER= bofh@FreeBSD.org
COMMENT= High Performance Network IDS, IPS and Security Monitoring engine(v5)
LICENSE= GPLv2
LICENSE_FILE= ${WRKSRC}/LICENSE
DEPRECATED= security/suricata is already at version 5
EXPIRATION_DATE=2020-04-20
BUILD_DEPENDS= rustc:lang/${RUST_DEFAULT} \
${PYTHON_PKGNAMEPREFIX}yaml>0:devel/py-yaml@${PY_FLAVOR}
LIB_DEPENDS= libjansson.so:devel/jansson \
liblz4.so:archivers/liblz4 \
libnet.so:net/libnet \
libpcre.so:devel/pcre \
libyaml.so:textproc/libyaml
RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}yaml>0:devel/py-yaml@${PY_FLAVOR}
USES= autoreconf cpe libtool pkgconfig python
USE_LDCONFIG= yes
USE_PYTHON= py3kplist
USE_RC_SUBR= ${PORTNAME}
CONFLICTS_INSTALL=libhtp
GNU_CONFIGURE= yes
CPE_VENDOR= openinfosecfoundation
INSTALL_TARGET= install-strip
TEST_TARGET= check
OPTIONS_DEFINE= GEOIP IPFW NSS PORTS_PCAP PRELUDE REDIS TESTS
OPTIONS_DEFINE_amd64= HYPERSCAN
OPTIONS_DEFAULT= IPFW
OPTIONS_SUB= yes
OPTIONS_RADIO= SCRIPTS
OPTIONS_RADIO_SCRIPTS= LUA LUAJIT
SCRIPTS_DESC= Scripting
HYPERSCAN_DESC= Hyperscan support
IPFW_DESC= IPFW and IP Divert support for inline IDP
LUAJIT_DESC= LuaJIT scripting support
LUA_DESC= LUA scripting support
NSS_DESC= File checksums and SSL/TLS fingerprinting
PORTS_PCAP_DESC= Use libpcap from ports
PRELUDE_DESC= Prelude support for NIDS alerts
REDIS_DESC= Redis output support
TESTS_DESC= Unit tests in suricata binary
GEOIP_LIB_DEPENDS= libmaxminddb.so:net/libmaxminddb
GEOIP_CONFIGURE_ON= --enable-geoip
HYPERSCAN_LIB_DEPENDS= libhs.so:devel/hyperscan
IPFW_CONFIGURE_ON= --enable-ipfw
LUA_USES= lua:51
LUA_CONFIGURE_ENABLE= lua
LUAJIT_LIB_DEPENDS= libluajit-5.1.so:lang/luajit
LUAJIT_CONFIGURE_ENABLE=luajit
NSS_LIB_DEPENDS= libnss3.so:security/nss \
libnspr4.so:devel/nspr
NSS_CONFIGURE_ENABLE= nss nspr
PORTS_PCAP_LIB_DEPENDS= libpcap.so.1:net/libpcap
PORTS_PCAP_CONFIGURE_ON= --with-libpcap-includes=${LOCALBASE}/include \
--with-libpcap-libraries=${LOCALBASE}/lib
PORTS_PCAP_CONFIGURE_OFF= --with-libpcap-includes=/usr/include \
--with-libpcap-libraries=/usr/lib
PRELUDE_LIB_DEPENDS= libprelude.so:security/libprelude \
libgnutls.so:security/gnutls \
libgcrypt.so:security/libgcrypt \
libgpg-error.so:security/libgpg-error \
libltdl.so:devel/libltdl
PRELUDE_CONFIGURE_ENABLE= prelude
REDIS_LIB_DEPENDS= libhiredis.so:databases/hiredis
REDIS_CONFIGURE_ENABLE= hiredis
TESTS_CONFIGURE_ENABLE= unittests
SUB_FILES= pkg-message
CONFIGURE_ARGS+=--enable-gccprotect \
--enable-bundled-htp \
--disable-gccmarch-native \
--enable-netmap \
--disable-af-packet \
--disable-nflog \
--disable-nfqueue \
--disable-pfring \
--disable-windivert \
--disable-ebpf-build \
--disable-ebpf
CONFIG_DIR?= ${ETCDIR}
CONFIG_FILES= suricata.yaml classification.config reference.config threshold.config
LOGS_DIR?= /var/log/${PORTNAME}
pre-patch:
@${CP} ${FILESDIR}/ax_check_compile_flag.m4 ${WRKSRC}/m4
post-patch:
@${REINPLACE_CMD} -e "/AC_PATH_PROGS.*HAVE_PYTHON/ s/python[^,]*,/${PYTHON_VERSION},/g" \
${WRKSRC}/configure.ac
@${REINPLACE_CMD} -e "s|GeoIP.h|maxminddb.h|g" \
${WRKSRC}/configure.ac
post-install:
@${MKDIR} ${STAGEDIR}${CONFIG_DIR}
@${MKDIR} ${STAGEDIR}${LOGS_DIR}
.for f in ${CONFIG_FILES}
${INSTALL_DATA} ${WRKSRC}/${f} ${STAGEDIR}${CONFIG_DIR}/${f}.sample
.endfor
(cd ${STAGEDIR}${PREFIX} \
&& ${PYTHON_CMD} ${PYTHON_LIBDIR}/compileall.py \
-d ${PYTHONPREFIX_SITELIBDIR} -f ${PYTHONPREFIX_SITELIBDIR:S;${PREFIX}/;;})
.include <bsd.port.mk>

View File

@ -1,3 +0,0 @@
TIMESTAMP = 1570307388
SHA256 (suricata-5.0.0-rc1.tar.gz) = 2805bc027932ada6f0adcbcd5d9cce23594f7e37ba345e9bf04e7e7400be8bc7
SIZE (suricata-5.0.0-rc1.tar.gz) = 21876920

View File

@ -1,74 +0,0 @@
# ===========================================================================
# http://www.gnu.org/software/autoconf-archive/ax_check_compile_flag.html
# ===========================================================================
#
# SYNOPSIS
#
# AX_CHECK_COMPILE_FLAG(FLAG, [ACTION-SUCCESS], [ACTION-FAILURE], [EXTRA-FLAGS], [INPUT])
#
# DESCRIPTION
#
# Check whether the given FLAG works with the current language's compiler
# or gives an error. (Warnings, however, are ignored)
#
# ACTION-SUCCESS/ACTION-FAILURE are shell commands to execute on
# success/failure.
#
# If EXTRA-FLAGS is defined, it is added to the current language's default
# flags (e.g. CFLAGS) when the check is done. The check is thus made with
# the flags: "CFLAGS EXTRA-FLAGS FLAG". This can for example be used to
# force the compiler to issue an error when a bad flag is given.
#
# INPUT gives an alternative input source to AC_COMPILE_IFELSE.
#
# NOTE: Implementation based on AX_CFLAGS_GCC_OPTION. Please keep this
# macro in sync with AX_CHECK_{PREPROC,LINK}_FLAG.
#
# LICENSE
#
# Copyright (c) 2008 Guido U. Draheim <guidod@gmx.de>
# Copyright (c) 2011 Maarten Bosmans <mkbosmans@gmail.com>
#
# This program is free software: you can redistribute it and/or modify it
# under the terms of the GNU General Public License as published by the
# Free Software Foundation, either version 3 of the License, or (at your
# option) any later version.
#
# This program is distributed in the hope that it will be useful, but
# WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General
# Public License for more details.
#
# You should have received a copy of the GNU General Public License along
# with this program. If not, see <http://www.gnu.org/licenses/>.
#
# As a special exception, the respective Autoconf Macro's copyright owner
# gives unlimited permission to copy, distribute and modify the configure
# scripts that are the output of Autoconf when processing the Macro. You
# need not follow the terms of the GNU General Public License when using
# or distributing such scripts, even though portions of the text of the
# Macro appear in them. The GNU General Public License (GPL) does govern
# all other use of the material that constitutes the Autoconf Macro.
#
# This special exception to the GPL applies to versions of the Autoconf
# Macro released by the Autoconf Archive. When you make and distribute a
# modified version of the Autoconf Macro, you may extend this special
# exception to the GPL to apply to your modified version as well.
#serial 3
AC_DEFUN([AX_CHECK_COMPILE_FLAG],
[AC_PREREQ(2.59)dnl for _AC_LANG_PREFIX
AS_VAR_PUSHDEF([CACHEVAR],[ax_cv_check_[]_AC_LANG_ABBREV[]flags_$4_$1])dnl
AC_CACHE_CHECK([whether _AC_LANG compiler accepts $1], CACHEVAR, [
ax_check_save_flags=$[]_AC_LANG_PREFIX[]FLAGS
_AC_LANG_PREFIX[]FLAGS="$[]_AC_LANG_PREFIX[]FLAGS $4 $1"
AC_COMPILE_IFELSE([m4_default([$5],[AC_LANG_PROGRAM()])],
[AS_VAR_SET(CACHEVAR,[yes])],
[AS_VAR_SET(CACHEVAR,[no])])
_AC_LANG_PREFIX[]FLAGS=$ax_check_save_flags])
AS_IF([test x"AS_VAR_GET(CACHEVAR)" = xyes],
[m4_default([$2], :)],
[m4_default([$3], :)])
AS_VAR_POPDEF([CACHEVAR])dnl
])dnl AX_CHECK_COMPILE_FLAGS

View File

@ -1,15 +0,0 @@
--- configure.ac.orig 2017-02-15 07:54:17 UTC
+++ configure.ac
@@ -935,8 +935,10 @@
AS_HELP_STRING([--enable-prelude], [Enable Prelude support for alerts]),,[enable_prelude=no])
# Prelude doesn't work with -Werror
STORECFLAGS="${CFLAGS}"
- CFLAGS="${CFLAGS} -Wno-error=unused-result"
-
+ AX_CHECK_COMPILE_FLAG([-Wno-error=unused-result],
+ [CFLAGS="${CFLAGS} -Wno-error=unused-result"],
+ [])
+
AS_IF([test "x$enable_prelude" = "xyes"], [
AM_PATH_LIBPRELUDE(0.9.9, , AC_MSG_ERROR(Cannot find libprelude: Is libprelude-config in the path?), no)
if test "x${LIBPRELUDE_CFLAGS}" != "x"; then

View File

@ -1,46 +0,0 @@
[
{ type: install
message: <<EOM
If you want to run Suricata in IDS mode, add to /etc/rc.conf:
suricata_enable="YES"
suricata_interface="<if>"
NOTE: Declaring suricata_interface is MANDATORY for Suricata in IDS Mode.
However, if you want to run Suricata in Inline IPS Mode in divert(4) mode,
add to /etc/rc.conf:
suricata_enable="YES"
suricata_divertport="8000"
NOTE:
Suricata won't start in IDS mode without an interface configured.
Therefore if you omit suricata_interface from rc.conf, FreeBSD's
rc.d/suricata will automatically try to start Suricata in IPS Mode
(on divert port 8000, by default).
Alternatively, if you want to run Suricata in Inline IPS Mode in high-speed
netmap(4) mode, add to /etc/rc.conf:
suricata_enable="YES"
suricata_netmap="YES"
NOTE:
Suricata requires additional interface settings in the configuration
file to run in netmap(4) mode.
RULES: Suricata IDS/IPS Engine comes without rules by default. You should
add rules by yourself and set an updating strategy. To do so, please visit:
http://www.openinfosecfoundation.org/documentation/rules.html
http://www.openinfosecfoundation.org/documentation/emerging-threats.html
You may want to try BPF in zerocopy mode to test performance improvements:
sysctl -w net.bpf.zerocopy_enable=1
Don't forget to add net.bpf.zerocopy_enable=1 to /etc/sysctl.conf
EOM
}
]

View File

@ -1,68 +0,0 @@
#!/bin/sh
# $FreeBSD: head/security/suricata/files/suricata.in 454649 2017-11-21 18:55:28Z zeising $
# PROVIDE: suricata
# REQUIRE: DAEMON
# BEFORE: LOGIN
# KEYWORD: shutdown
# Add the following lines to /etc/rc.conf to enable suricata:
# suricata_enable (bool): Set to YES to enable suricata
# Default: NO
# suricata_flags (str): Extra flags passed to suricata
# Default: -D
# suricata_interface (str): Network interface(s) to sniff
# Default: ""
# suricata_conf (str): Suricata configuration file
# Default: ${PREFIX}/etc/suricata/suricata.yaml
# suricata_divertport (int): Port to create divert socket (Inline Mode)
# Default: 8000
# suricata_netmap (str): Set to YES to enable netmap (Inline Mode)
# Default: NO
# suricata_user (str): Set the user to run suricata as
# Default: root
# suricata_pidfile (str): Pidfile to store pid of suricata process
# Default: /var/run/suricata.pid
. /etc/rc.subr
name="suricata"
rcvar=suricata_enable
start_precmd="suricata_prestart"
command="%%PREFIX%%/bin/suricata"
load_rc_config $name
[ -z "$suricata_enable" ] && suricata_enable="NO"
[ -z "$suricata_conf" ] && suricata_conf="%%PREFIX%%/etc/suricata/suricata.yaml"
[ -z "$suricata_flags" ] && suricata_flags="-D"
[ -z "$suricata_divertport" ] && suricata_divertport="8000"
[ -z "$suricata_netmap" ] && suricata_netmap="NO"
[ -z "$suricata_user" ] && suricata_user="root"
[ -z "$suricata_pidfile" ] && suricata_pidfile="/var/run/suricata.pid"
if [ -n "$suricata_interface" ]; then
for interface in $suricata_interface; do
suricata_flags="$suricata_flags --pcap=$interface"
done
elif [ "$suricata_netmap" != "NO" ]; then
suricata_flags="$suricata_flags --netmap"
else
suricata_flags="$suricata_flags -d $suricata_divertport"
info "Inline Mode on divert port $suricata_divertport (suricata_interface not defined)"
fi
pidfile=$suricata_pidfile
suricata_flags="$suricata_flags --pidfile $pidfile"
[ -n "$suricata_conf" ] && suricata_flags="$suricata_flags -c $suricata_conf"
suricata_prestart()
{
if ! run_rc_command status > /dev/null; then
rm -f "$pidfile"
fi
}
run_rc_command "$1"

View File

@ -1,17 +0,0 @@
The Suricata Engine is an Open Source Next Generation Intrusion Detection and
Prevention Engine developed by the Open Information Security Foundation (OISF).
This engine is not intended to just replace or emulate the existing tools in
the industry, but will bring new ideas and technologies to the field.
OISF is part of and funded by the Department of Homeland Security's Directorate
for Science and Technology HOST program (Homeland Open Security Technology),
by the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as
through the very generous support of the members of the OISF Consortium.
More information about the Consortium is available, as well as a list of our
current Consortium Members.
This is upcoming version 5.
WWW: https://suricata-ids.org

View File

@ -1,157 +0,0 @@
bin/suricata
bin/suricata-update
bin/suricatactl
bin/suricatasc
include/htp/bstr.h
include/htp/bstr_builder.h
include/htp/htp.h
include/htp/htp_base64.h
include/htp/htp_config.h
include/htp/htp_connection_parser.h
include/htp/htp_core.h
include/htp/htp_decompressors.h
include/htp/htp_hooks.h
include/htp/htp_list.h
include/htp/htp_multipart.h
include/htp/htp_table.h
include/htp/htp_transaction.h
include/htp/htp_urlencoded.h
include/htp/htp_utf8_decoder.h
include/htp/htp_version.h
include/htp/lzma/7zTypes.h
include/htp/lzma/LzmaDec.h
lib/libhtp.a
lib/libhtp.so
lib/libhtp.so.2
lib/libhtp.so.2.0.0
libdata/pkgconfig/htp.pc
man/man1/suricata.1.gz
%%DOCSDIR%%/AUTHORS
%%DOCSDIR%%/Basic_Setup.txt
%%DOCSDIR%%/GITGUIDE
%%DOCSDIR%%/INSTALL
%%DOCSDIR%%/INSTALL.PF_RING
%%DOCSDIR%%/INSTALL.WINDOWS
%%DOCSDIR%%/NEWS
%%DOCSDIR%%/README
%%DOCSDIR%%/Setting_up_IPSinline_for_Linux.txt
%%DOCSDIR%%/TODO
%%DOCSDIR%%/Third_Party_Installation_Guides.txt
%%PYTHON_SITELIBDIR%%/suricata-5.0.0_rc1-py%%PYTHON_VER%%.egg-info
%%PYTHON_SITELIBDIR%%/suricata/__init__.py
%%PYTHON_SITELIBDIR%%/suricata/__init__.pyc
%%PYTHON_SITELIBDIR%%/suricata/config/__init__.py
%%PYTHON_SITELIBDIR%%/suricata/config/__init__.pyc
%%PYTHON_SITELIBDIR%%/suricata/config/defaults.py
%%PYTHON_SITELIBDIR%%/suricata/config/defaults.pyc
%%PYTHON_SITELIBDIR%%/suricata/ctl/__init__.py
%%PYTHON_SITELIBDIR%%/suricata/ctl/__init__.pyc
%%PYTHON_SITELIBDIR%%/suricata/ctl/filestore.py
%%PYTHON_SITELIBDIR%%/suricata/ctl/filestore.pyc
%%PYTHON_SITELIBDIR%%/suricata/ctl/loghandler.py
%%PYTHON_SITELIBDIR%%/suricata/ctl/loghandler.pyc
%%PYTHON_SITELIBDIR%%/suricata/ctl/main.py
%%PYTHON_SITELIBDIR%%/suricata/ctl/main.pyc
%%PYTHON_SITELIBDIR%%/suricata/ctl/test_filestore.py
%%PYTHON_SITELIBDIR%%/suricata/ctl/test_filestore.pyc
%%PYTHON_SITELIBDIR%%/suricata/sc/__init__.py
%%PYTHON_SITELIBDIR%%/suricata/sc/__init__.pyc
%%PYTHON_SITELIBDIR%%/suricata/sc/__pycache__/specs.cpython-%%PYTHON_SUFFIX%%.pyc
%%PYTHON_SITELIBDIR%%/suricata/sc/specs.py
%%PYTHON_SITELIBDIR%%/suricata/sc/suricatasc.py
%%PYTHON_SITELIBDIR%%/suricata/sc/suricatasc.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/__init__.py
%%PYTHON_SITELIBDIR%%/suricata/update/__init__.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/commands/__init__.py
%%PYTHON_SITELIBDIR%%/suricata/update/commands/__init__.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/commands/addsource.py
%%PYTHON_SITELIBDIR%%/suricata/update/commands/addsource.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/commands/disablesource.py
%%PYTHON_SITELIBDIR%%/suricata/update/commands/disablesource.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/commands/enablesource.py
%%PYTHON_SITELIBDIR%%/suricata/update/commands/enablesource.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/commands/listenabledsources.py
%%PYTHON_SITELIBDIR%%/suricata/update/commands/listenabledsources.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/commands/listsources.py
%%PYTHON_SITELIBDIR%%/suricata/update/commands/listsources.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/commands/removesource.py
%%PYTHON_SITELIBDIR%%/suricata/update/commands/removesource.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/commands/updatesources.py
%%PYTHON_SITELIBDIR%%/suricata/update/commands/updatesources.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/compat/__init__.py
%%PYTHON_SITELIBDIR%%/suricata/update/compat/__init__.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/compat/argparse/__init__.py
%%PYTHON_SITELIBDIR%%/suricata/update/compat/argparse/__init__.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/compat/argparse/argparse.py
%%PYTHON_SITELIBDIR%%/suricata/update/compat/argparse/argparse.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/compat/ordereddict.py
%%PYTHON_SITELIBDIR%%/suricata/update/compat/ordereddict.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/config.py
%%PYTHON_SITELIBDIR%%/suricata/update/config.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/configs/__init__.py
%%PYTHON_SITELIBDIR%%/suricata/update/configs/__init__.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/configs/disable.conf
%%PYTHON_SITELIBDIR%%/suricata/update/configs/drop.conf
%%PYTHON_SITELIBDIR%%/suricata/update/configs/enable.conf
%%PYTHON_SITELIBDIR%%/suricata/update/configs/modify.conf
%%PYTHON_SITELIBDIR%%/suricata/update/configs/threshold.in
%%PYTHON_SITELIBDIR%%/suricata/update/configs/update.yaml
%%PYTHON_SITELIBDIR%%/suricata/update/data/__init__.py
%%PYTHON_SITELIBDIR%%/suricata/update/data/__init__.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/data/index.py
%%PYTHON_SITELIBDIR%%/suricata/update/data/index.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/data/update.py
%%PYTHON_SITELIBDIR%%/suricata/update/data/update.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/engine.py
%%PYTHON_SITELIBDIR%%/suricata/update/engine.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/exceptions.py
%%PYTHON_SITELIBDIR%%/suricata/update/exceptions.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/extract.py
%%PYTHON_SITELIBDIR%%/suricata/update/extract.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/loghandler.py
%%PYTHON_SITELIBDIR%%/suricata/update/loghandler.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/main.py
%%PYTHON_SITELIBDIR%%/suricata/update/main.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/maps.py
%%PYTHON_SITELIBDIR%%/suricata/update/maps.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/net.py
%%PYTHON_SITELIBDIR%%/suricata/update/net.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/notes.py
%%PYTHON_SITELIBDIR%%/suricata/update/notes.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/rule.py
%%PYTHON_SITELIBDIR%%/suricata/update/rule.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/sources.py
%%PYTHON_SITELIBDIR%%/suricata/update/sources.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/util.py
%%PYTHON_SITELIBDIR%%/suricata/update/util.pyc
%%PYTHON_SITELIBDIR%%/suricata/update/version.py
%%PYTHON_SITELIBDIR%%/suricata/update/version.pyc
%%PYTHON_SITELIBDIR%%/suricata_update-1.1.0rc1-py%%PYTHON_VER%%.egg-info
%%PYTHON_SITELIBDIR%%/suricatasc/__init__.py
%%PYTHON_SITELIBDIR%%/suricatasc/__init__.pyc
@sample %%ETCDIR%%/classification.config.sample
@sample %%ETCDIR%%/reference.config.sample
@sample %%ETCDIR%%/suricata.yaml.sample
@sample %%ETCDIR%%/threshold.config.sample
%%DATADIR%%/rules/app-layer-events.rules
%%DATADIR%%/rules/decoder-events.rules
%%DATADIR%%/rules/dhcp-events.rules
%%DATADIR%%/rules/dnp3-events.rules
%%DATADIR%%/rules/dns-events.rules
%%DATADIR%%/rules/files.rules
%%DATADIR%%/rules/http-events.rules
%%DATADIR%%/rules/ipsec-events.rules
%%DATADIR%%/rules/kerberos-events.rules
%%DATADIR%%/rules/modbus-events.rules
%%DATADIR%%/rules/nfs-events.rules
%%DATADIR%%/rules/ntp-events.rules
%%DATADIR%%/rules/smb-events.rules
%%DATADIR%%/rules/smtp-events.rules
%%DATADIR%%/rules/stream-events.rules
%%DATADIR%%/rules/tls-events.rules
@dir %%DATADIR%%
@dir %%ETCDIR%%
@dir include/htp
@dir(root,wheel,0700) /var/log/suricata
@postunexec if [ -d %D/%%ETCDIR%% ]; then echo "==> If you are permanently removing this port, run ``rm -rf ${PKG_PREFIX}/%%ETCDIR%%`` to remove configuration files."; fi
@dir %%DOCSDIR%%