name = oinkmaster
version = 2.0
-release = 1
+release = 2
+arch = noarch
groups = Development/Libraries
url = http://oinkmaster.sourceforge.net
end
build
- # Nothing to do here.
+ echo "url = http://rules.emergingthreats.net/open/suricata/emerging.rules.tar.gz" >> oinkmaster.conf
+ echo "tmpdir = /var/tmp/" >> oinkmaster.conf
end
install
mkdir -pv %{BUILDROOT}/usr/sbin
install -m 755 oinkmaster.pl %{BUILDROOT}/usr/sbin
+ mkdir -pv %{BUILDROOT}/etc
+ install -m 644 oinkmaster.conf %{BUILDROOT}/etc
end
end
%YAML 1.1
---
# Suricata Emergingthreats Pro Open Rulesets Recommended
-reference-config-file: /etc/suricata/reference.config
+reference-config-file: /etc/suricata/rules/reference.config
# Number of packets allowed to be processed simultaneously. Default is a
# conservative 50. a higher number will make sure CPU's/CPU cores will be
# - emerging-tor.rules
# - emerging-mobile_malware.rules
-classification-file: /etc/suricata/classification.config
+classification-file: /etc/suricata/rules/classification.config
# Holds variables that would be used by the engine.
vars:
# Copyright (C) - IPFire Development Team <info@ipfire.org> #
###############################################################################
-name = suricata
-version = 1.1beta3
-release = 5
+name = suricata
+version = 1.1
+release = 1
groups = Networking/IDS
url = http://www.openinfosecfoundation.org/