msgstr ""
"Project-Id-Version: PACKAGE VERSION\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2025-08-31 12:36+0000\n"
+"POT-Creation-Date: 2025-08-31 15:08+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
msgid "Alerts from %s"
msgstr ""
+#, c-format
+msgid "[REPORT] Intrusion Prevention System Alerts from %s"
+msgstr ""
+
msgid "To whom it may concern,"
msgstr ""
"The IPFire Intrusion Preventsion System is sending you the attached report."
msgstr ""
+#, c-format
+msgid "IPFire-Intrusion-Prevention-System-Report-%s.pdf"
+msgstr ""
+
+msgid "Reporter Generator for Suricata"
+msgstr ""
+
+msgid "Be more verbose"
+msgstr ""
+
+msgid "Database Path"
+msgstr ""
+
+msgid "Locale"
+msgstr ""
+
msgid "Output Path"
msgstr ""
msgid "ISO calendar week number (1-53)"
msgstr ""
+#, c-format
+msgid "IPFire Intrusion Prevention System <%s>"
+msgstr ""
+
+msgid "[ALERT]"
+msgstr ""
+
msgid "The IPFire Intrusion Preventsion System has raised the following alert:"
msgstr ""
msgid "Informational"
msgstr ""
+
+msgid "Reporter Service for Suricata"
+msgstr ""
+
+msgid "Configuration File"
+msgstr ""
# Set the Subject
msg.add_header(
- "Subject", "[REPORT] Intrusion Prevention System Alerts from %s" % hostname,
+ "Subject", _("[REPORT] Intrusion Prevention System Alerts from %s") % hostname,
),
# Compose the content
# Attach
msg.add_attachment(
- f.read(), maintype="application", subtype="pdf", filename="report.pdf",
+ f.read(), maintype="application", subtype="pdf",
+ filename=_("IPFire-Intrusion-Prevention-System-Report-%s.pdf") % hostname,
)
# Show the email
return log
def main():
- parser = argparse.ArgumentParser(description="Reporter Generator for Suricata")
+ parser = argparse.ArgumentParser(description=_("Reporter Generator for Suricata"))
# Command Line Arguments
- parser.add_argument("--verbose", "-v", action="count", help="Be more verbose")
- parser.add_argument("--database", help="Database",
+ parser.add_argument("--verbose", "-v", action="count", help=_("Be more verbose"))
+ parser.add_argument("--database", help=_("Database Path"),
default="@suricatalogdir@/reporter.db")
# Locale
# Fetch the hostname
HOSTNAME = socket.gethostname()
-# Email Settings
-EMAIL_FROM = "IPFire Intrusion Prevention System <%s>"
-
log = logging.getLogger("suricata-reporter")
log.setLevel(logging.DEBUG)
email_from = "no-reply@%s" % HOSTNAME
# Set the sender
- msg.add_header("From", EMAIL_FROM % email_from)
+ msg.add_header("From", _("IPFire Intrusion Prevention System <%s>") % email_from)
# Fetch the recipients
email_recipients = self.config.get("email", "recipients", fallback=None)
)
# Set the Subject
- msg.add_header("Subject", "[ALERT][%s] %s %s - %s" % (HOSTNAME,
+ msg.add_header("Subject", "%s[%s] %s %s - %s" % (_("[ALERT]"), HOSTNAME,
"*" * (4 - event.alert_severity), event.alert_signature, event.alert_category))
# Add the timestamp as Date: header
return log
async def main():
- parser = argparse.ArgumentParser(description="Reporter Service for Suricata")
+ parser = argparse.ArgumentParser(description=_("Reporter Service for Suricata"))
# Command Line Arguments
- parser.add_argument("--verbose", "-v", action="count", help="Be more verbose")
- parser.add_argument("--config", "-c",
- help="Configuration File", default="@suricataconfdir@/reporter.conf")
+ parser.add_argument("--verbose", "-v", action="count", help=_("Be more verbose"))
+ parser.add_argument("--config", "-c", help=_("Configuration File"),
+ default="@suricataconfdir@/reporter.conf")
# Parse command line arguments
args = parser.parse_args()
setup_logging(loglevel=loglevel)
- # Create the repoert
+ # Create the reporter
reporter = Reporter(args.config)
# Run!