return True
return False
-def resolve_etopen_url(suricata_version):
- # Template URL for Emerging Threats Open rules.
- template_url = ("https://rules.emergingthreats.net/open/"
- "suricata%(version)s/"
- "emerging.rules.tar.gz")
-
- mappings = {
- "version": "",
- }
-
- mappings["version"] = "-%d.%d.%d" % (suricata_version.major,
- suricata_version.minor,
- suricata_version.patch)
-
- return template_url % mappings
-
def ignore_file(ignore_files, filename):
if not ignore_files:
return False
if config.get("etopen") or not urls:
if not urls:
logger.info("No sources configured, will use Emerging Threats Open")
- urls.append(resolve_etopen_url(suricata_version))
+ urls.append(sources.get_etopen_url(internal_params))
# Converting the URLs to a set removed dupes.
urls = set(urls)
DEFAULT_SOURCE_INDEX_URL = "https://www.openinfosecfoundation.org/rules/index.yaml"
SOURCE_INDEX_FILENAME = "index.yaml"
+DEFAULT_ETOPEN_URL = "https://rules.emergingthreats.net/open/suricata-%(__version__)s/emerging.rules.tar.gz"
+
def get_source_directory():
"""Return the directory where source configuration files are kept."""
return os.path.join(config.get_state_dir(), config.SOURCE_DIRECTORY)
name = name.replace("/", "-")
return name
+def get_etopen_url(params):
+ if os.getenv("ETOPEN_URL"):
+ return os.getenv("ETOPEN_URL") % params
+ return DEFAULT_ETOPEN_URL % params