SPECS: psad.spec - pl

qboosh qboosh at pld-linux.org
Wed Dec 20 01:39:36 CET 2006


Author: qboosh                       Date: Wed Dec 20 00:39:36 2006 GMT
Module: SPECS                         Tag: HEAD
---- Log message:
- pl

---- Files affected:
SPECS:
   psad.spec (1.14 -> 1.15) 

---- Diffs:

================================================================
Index: SPECS/psad.spec
diff -u SPECS/psad.spec:1.14 SPECS/psad.spec:1.15
--- SPECS/psad.spec:1.14	Mon Dec 18 16:00:26 2006
+++ SPECS/psad.spec	Wed Dec 20 01:39:31 2006
@@ -2,24 +2,23 @@
 # TODO
 # - use system snort rules?
 %include	/usr/lib/rpm/macros.perl
-Summary:	Psad analyzes iptables log messages for suspect traffic
+Summary:	Analyze iptables log messages for suspect traffic
+Summary(pl):	Narzędzie do analizy logów iptables pod kątem podejrzanego ruchu
 Name:		psad
 Version:	2.0.1
 Release:	0.11
 License:	GPL
 Group:		Networking/Daemons
-URL:		http://www.cipherdyne.org/psad/
 Source0:	http://www.cipherdyne.org/psad/download/%{name}-%{version}.tar.gz
+# Source0-md5:	a1604b68e31178e7e0cbbfd7c1cd4edf
 Source1:	%{name}.init
 Patch0:		%{name}-make.patch
 Patch1:		%{name}-whois.patch
 Patch2:		%{name}-no-wheel.patch
-# Source0-md5:	a1604b68e31178e7e0cbbfd7c1cd4edf
+URL:		http://www.cipherdyne.org/psad/
 BuildRequires:	perl-base
 BuildRequires:	rpm-perlprov >= 4.1-13
 BuildRequires:	rpmbuild(macros) >= 1.268
-Requires(post,preun):	/sbin/chkconfig
-Requires:	rc-scripts
 %if %{with autodeps}
 BuildRequires:	perl-Bit-Vector
 BuildRequires:	perl-Date-Calc
@@ -28,6 +27,8 @@
 BuildRequires:	perl-Net-IPv4Addr
 BuildRequires:	perl-Unix-Syslog
 %endif
+Requires(post,preun):	/sbin/chkconfig
+Requires:	rc-scripts
 Requires:	iptables
 Requires:	perl-Date-Calc
 Requires:	perl-IPTables-ChainMgr
@@ -41,6 +42,12 @@
 Linux machines and analyze Netfilter log messages to detect port scans
 and other suspicious traffic.
 
+%description -l pl
+Port Scan Attack Detector (psad) to zbiór trzech lekkich demonów
+systemowych (dwóch głównych i jednego pomocniczego) działających na
+maszynach linuksowych i analizujących logi Netfiltra, aby wykryć
+skanowanie portów i inny podejrzany ruch.
+
 %prep
 %setup -q
 %patch0 -p1
@@ -73,7 +80,6 @@
 rm -rf $RPM_BUILD_ROOT
 install -d $RPM_BUILD_ROOT{/var/{log,lib,run}/psad,%{_sbindir},%{_bindir},/etc/rc.d/init.d,%{_sysconfdir}/%{name},%{_mandir}/man{1,8}}
 
-
 %{__make} -C Psad \
 	pure_install \
 	DESTDIR=$RPM_BUILD_ROOT
@@ -97,7 +103,7 @@
 rm -rf $RPM_BUILD_ROOT
 
 %post
-if [ "$1" = 1 ]; then
+if [ "$1" = "1" ]; then
 	hostname=`hostname 2>&1`
 	if [ "$hostname" ]; then
 		%{__sed} -i -e "s/^HOSTNAME.*;/HOSTNAME	$hostname;/" %{_sysconfdir}/%{name}/{psadwatchd.conf,psad.conf}
@@ -125,7 +131,6 @@
 [+] Be sure to edit the HOME_NET variable in %{_sysconfdir}/psad/psad.conf
     to define the internal network(s) attached to your machine.
 
-
 EOF
 fi
 
@@ -179,6 +184,9 @@
 All persons listed below can be reached at <cvs_login>@pld-linux.org
 
 $Log$
+Revision 1.15  2006/12/20 00:39:31  qboosh
+- pl
+
 Revision 1.14  2006/12/18 15:00:26  paszczus
 - added R: perl-Date-Calc
 
================================================================

---- CVS-web:
    http://cvs.pld-linux.org/SPECS/psad.spec?r1=1.14&r2=1.15&f=u



More information about the pld-cvs-commit mailing list