suricata-7.0.0.ebuild
Download (6.8 KB)
# Copyright 1999-2023 Gentoo Authors # Distributed under the terms of the GNU General Public License v2 EAPI=8 LUA_COMPAT=( lua5-1 luajit ) PYTHON_COMPAT=( python3_{10..12} ) inherit autotools flag-o-matic linux-info lua-single python-single-r1 systemd tmpfiles verify-sig DESCRIPTION="High performance Network IDS, IPS and Network Security Monitoring engine" HOMEPAGE="https://suricata.io/" SRC_URI="https://www.openinfosecfoundation.org/download/${P}.tar.gz verify-sig? ( https://www.openinfosecfoundation.org/download/${P}.tar.gz.sig )" LICENSE="GPL-2" SLOT="0/7" KEYWORDS="~amd64 ~riscv ~x86" IUSE="+af-packet af-xdp bpf control-socket cuda debug +detection geoip hardened hyperscan lua lz4 nflog +nfqueue redis systemd test" VERIFY_SIG_OPENPGP_KEY_PATH="${BROOT}/usr/share/openpgp-keys/openinfosecfoundation.org.asc" RESTRICT="!test? ( test )" REQUIRED_USE="${PYTHON_REQUIRED_USE} af-xdp? ( bpf ) bpf? ( af-packet ) lua? ( ${LUA_REQUIRED_USE} )" RDEPEND="${PYTHON_DEPS} acct-group/suricata acct-user/suricata dev-libs/jansson:= dev-libs/libpcre2 dev-libs/libyaml net-libs/libnet:* net-libs/libnfnetlink dev-libs/nspr dev-libs/nss $(python_gen_cond_dep ' dev-python/pyyaml[${PYTHON_USEDEP}] ') >=net-libs/libhtp-0.5.45 net-libs/libpcap sys-apps/file sys-libs/libcap-ng af-xdp? ( net-libs/xdp-tools ) bpf? ( dev-libs/libbpf ) cuda? ( dev-util/nvidia-cuda-toolkit ) geoip? ( dev-libs/libmaxminddb:= ) hyperscan? ( dev-libs/hyperscan ) lua? ( ${LUA_DEPS} ) lz4? ( app-arch/lz4 ) nflog? ( net-libs/libnetfilter_log ) nfqueue? ( net-libs/libnetfilter_queue ) redis? ( dev-libs/hiredis:= )" DEPEND="${RDEPEND} >=sys-devel/autoconf-2.69-r5 virtual/rust" BDEPEND="verify-sig? ( >=sec-keys/openpgp-keys-oisf-20200807 )" PATCHES=( "${FILESDIR}/${PN}-5.0.1_configure-no-lz4-automagic.patch" "${FILESDIR}/${PN}-5.0.6_configure-no-sphinx-pdflatex-automagic.patch" "${FILESDIR}/${PN}-5.0.7_configure-no-hyperscan-automagic.patch" "${FILESDIR}/${PN}-6.0.0_default-config.patch" ) pkg_pretend() { if use af-xdp && use kernel_linux; then if kernel_is -lt 4 18; then ewarn "Kernel 4.18 or newer is required for AF_XDP" fi fi if use bpf && use kernel_linux; then if kernel_is -lt 4 15; then ewarn "Kernel 4.15 or newer is necessary to use all XDP features like the CPU redirect map" fi CONFIG_CHECK="~XDP_SOCKETS" ERROR_XDP_SOCKETS="CONFIG_XDP_SOCKETS is not set, making it impossible for Suricata to load XDP programs. " ERROR_XDP_SOCKETS+="Other eBPF features should work normally." check_extra_config fi } src_prepare() { default sed -ie 's/docdir =.*/docdir = ${datarootdir}\/doc\/'${PF}'\//' "${S}/doc/Makefile.am" || die eautoreconf } src_configure() { # Bug #861242 filter-lto local myeconfargs=( "--localstatedir=/var" \ "--runstatedir=/run" \ "--enable-non-bundled-htp" \ "--enable-gccmarch-native=no" \ "--enable-python" \ $(use_enable af-packet) \ $(use_enable af-xdp) \ $(use_enable bpf ebpf) \ $(use_enable control-socket unix-socket) \ $(use_enable cuda) \ $(use_enable detection) \ $(use_enable geoip) \ $(use_enable hardened gccprotect) \ $(use_enable hardened pie) \ $(use_enable hyperscan) \ $(use_enable lz4) \ $(use_enable nflog) \ $(use_enable nfqueue) \ $(use_enable redis hiredis) \ $(use_enable test unittests) \ "--disable-coccinelle" ) if use lua; then if use lua_single_target_luajit; then myeconfargs+=( --enable-luajit ) else myeconfargs+=( --enable-lua ) fi fi if use debug; then myeconfargs+=( $(use_enable debug) ) # so we can get a backtrace according to "reporting bugs" on upstream web site QA_FLAGS_IGNORED="usr/bin/${PN}" CFLAGS="-ggdb -O0" econf ${myeconfargs[@]} else econf ${myeconfargs[@]} fi } src_install() { emake DESTDIR="${D}" install python_optimize # Bug #878855 python_fix_shebang "${ED}"/usr/bin/ if use bpf; then rm -f ebpf/Makefile.{am,in} || die dodoc -r ebpf/ keepdir /usr/libexec/suricata/ebpf fi insinto "/etc/${PN}" doins etc/{classification,reference}.config threshold.config suricata.yaml keepdir "/var/lib/${PN}/rules" "/var/lib/${PN}/update" keepdir "/var/log/${PN}" fowners -R ${PN}: "/var/lib/${PN}" "/var/log/${PN}" "/etc/${PN}" fperms 750 "/var/lib/${PN}" "/var/log/${PN}" "/etc/${PN}" fperms 6750 "/var/lib/${PN}/rules" "/var/lib/${PN}/update" newinitd "${FILESDIR}/${PN}.initd" ${PN} newconfd "${FILESDIR}/${PN}.confd" ${PN} systemd_dounit "${FILESDIR}"/${PN}.service newtmpfiles "${FILESDIR}"/${PN}.tmpfiles ${PN}.conf insopts -m0644 insinto /etc/logrotate.d newins etc/${PN}.logrotate ${PN} } pkg_postinst() { tmpfiles_process ${PN}.conf elog if use systemd; then elog "Suricata requires either the mode of operation (e.g. --af-packet) or the interface to listen on (e.g. -i eth0)" elog "to be specified on the command line. The provided systemd unit launches Suricata in af-packet mode and relies" elog "on file configuration to specify interfaces, should you prefer to run it differently you will have to customise" elog "said unit. The simplest way of doing it is to override the Environment=OPTIONS='...' line using a .conf file" elog "placed in the directory ${EPREFIX}/etc/systemd/system/suricata.service.d/ ." elog "For details, see the section on drop-in directories in systemd.unit(5)." else elog "The ${PN} init script expects to find the path to the configuration" elog "file as well as extra options in /etc/conf.d." elog elog "To create more than one ${PN} service, simply create a new .yaml file for it" elog "then create a symlink to the init script from a link called" elog "${PN}.foo - like so" elog " cd /etc/${PN}" elog " ${EDITOR##*/} suricata-foo.yaml" elog " cd /etc/init.d" elog " ln -s ${PN} ${PN}.foo" elog "Then edit /etc/conf.d/${PN} and make sure you specify sensible options for foo." elog elog "You can create as many ${PN}.foo* services as you wish." fi if use bpf; then elog elog "eBPF/XDP files must be compiled (using sys-devel/clang[llvm_targets_BPF]) before use" elog "because their configuration is hard-coded. You can find the default ones in" elog " ${EPREFIX}/usr/share/doc/${PF}/ebpf" elog "and the common location for eBPF bytecode is" elog " ${EPREFIX}/usr/libexec/${PN}" elog "For more information, see https://${PN}.readthedocs.io/en/${P}/capture-hardware/ebpf-xdp.html" fi if use debug; then elog elog "You have enabled the debug USE flag. Please read this link to report bugs upstream:" elog "https://redmine.openinfosecfoundation.org/projects/suricata/wiki/Reporting_Bugs" elog "You need to also ensure the FEATURES variable in make.conf contains the" elog "'nostrip' option to produce useful core dumps or back traces." fi elog if [[ -z "${REPLACING_VERSIONS}" ]]; then elog "To download and install an initial set of rules, run:" elog " suricata-update" fi elog } | ||