packages: emergingthreats/emergingthreats.spec - adapter (kill dozen traili...

glen glen at pld-linux.org
Wed Oct 26 13:45:06 CEST 2011


Author: glen                         Date: Wed Oct 26 11:45:06 2011 GMT
Module: packages                      Tag: HEAD
---- Log message:
- adapter (kill dozen trailing spaces, people should stop copying stuff with mouse)
- fix scriptlets to work as expected (add config on initial install, remove on removal, not on each upgrade)
- use sed for in place replace, not perl

---- Files affected:
packages/emergingthreats:
   emergingthreats.spec (1.1 -> 1.2) 

---- Diffs:

================================================================
Index: packages/emergingthreats/emergingthreats.spec
diff -u packages/emergingthreats/emergingthreats.spec:1.1 packages/emergingthreats/emergingthreats.spec:1.2
--- packages/emergingthreats/emergingthreats.spec:1.1	Wed Oct 26 01:22:06 2011
+++ packages/emergingthreats/emergingthreats.spec	Wed Oct 26 13:45:01 2011
@@ -1,5 +1,4 @@
-# $Revision$, $Date$ 
-
+# $Revision$, $Date$
 Summary:	Emerging Threats open rules for Snort IDS/IPS
 Name:		emergingthreats
 Version:	6947
@@ -9,56 +8,60 @@
 Source0:	http://rules.emergingthreats.net/open/snort-2.9.0/emerging.rules.tar.gz
 # Source0-md5:	38db422a5b87375c25b8714f42dc8670
 URL:		http://emergingthreats.net/
+Requires:	sed >= 4.0
 Requires:	snort >= 2.9.0
-Requires:	perl-base
 Provides:	snort-rules
 BuildRoot:	%{tmpdir}/%{name}-%{version}-root-%(id -u -n)
 
+%define		_sysconfdir	/etc/snort
+
 %description
 Emerging Threats open rules for Snort IDS/IPS.
 
 %prep
 %setup -qn rules
 
-%build
-
 %install
 rm -rf $RPM_BUILD_ROOT
-install -d $RPM_BUILD_ROOT%{_sysconfdir}/snort/rules
-install emerging.conf		$RPM_BUILD_ROOT%{_sysconfdir}/snort
-install emerging-*.rules	$RPM_BUILD_ROOT%{_sysconfdir}/snort/rules
-install classification.config	$RPM_BUILD_ROOT%{_sysconfdir}/snort/rules
-install reference.config	$RPM_BUILD_ROOT%{_sysconfdir}/snort/rules
+install -d $RPM_BUILD_ROOT%{_sysconfdir}/rules
+cp -p emerging.conf		$RPM_BUILD_ROOT%{_sysconfdir}
+cp -p emerging-*.rules	$RPM_BUILD_ROOT%{_sysconfdir}/rules
+cp -p classification.config	$RPM_BUILD_ROOT%{_sysconfdir}/rules
+cp -p reference.config	$RPM_BUILD_ROOT%{_sysconfdir}/rules
 
 %clean
 rm -rf $RPM_BUILD_ROOT
 
-%pre
-
 %post
-[ -f /etc/snort/snort.conf ] \
-	&& /bin/echo "include emerging.conf" >> /etc/snort/snort.conf
-%service snortd start
-
-%preun
-/usr/bin/perl -i.et_orig -pe 's/^\s*include\s+emerging.conf.*$//' /etc/snort/snort.conf
+if [ "$1" = "1" ]; then
+	if [ -f %{_sysconfdir}/snort.conf ]; then
+		echo "include emerging.conf" >> %{_sysconfdir}/snort.conf
+	fi
+fi
+%service -q snortd restart
 
 %postun
-%service snortd start
+if [ "$1" = "0" ]; then
+	%{__sed} -i -re 's/^\s*include\s+emerging.conf.*$//' %{_sysconfdir}/snort.conf
+	%service -q snortd restart
+fi
 
 %files
 %defattr(644,root,root,755)
 %doc LICENSE BSD-License.txt snort-2.9.0-open.txt gpl-2.0.txt compromised-ips.txt rbn-ips.txt rbn-malvertisers-ips.txt
-%attr(640,root,snort) %config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/snort/emerging.conf
-%attr(640,root,snort) %{_sysconfdir}/snort/rules/*
+%attr(640,root,snort) %config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/emerging.conf
+%attr(640,root,snort) %{_sysconfdir}/rules/*
+
+%define date	%(echo `LC_ALL="C" date +"%a %b %d %Y"`)
+%changelog
+* %{date} PLD Team <feedback at pld-linux.org>
+All persons listed below can be reached at <cvs_login>@pld-linux.org
 
-%define date    %(echo `LC_ALL="C" date +"%a %b %d %Y"`)                                             
-%changelog                                                                                           
-* %{date} PLD Team <feedback at pld-linux.org>                                                          
-All persons listed below can be reached at <cvs_login>@pld-linux.org                                 
-                                                                                                     
 $Log$
+Revision 1.2  2011/10/26 11:45:01  glen
+- adapter (kill dozen trailing spaces, people should stop copying stuff with mouse)
+- fix scriptlets to work as expected (add config on initial install, remove on removal, not on each upgrade)
+- use sed for in place replace, not perl
+
 Revision 1.1  2011/10/25 23:22:06  mguevara
 - 6947-1 initial release, Emerging Threats open rules for Snort IDS/IPS
-
-
================================================================

---- CVS-web:
    http://cvs.pld-linux.org/cgi-bin/cvsweb.cgi/packages/emergingthreats/emergingthreats.spec?r1=1.1&r2=1.2&f=u



More information about the pld-cvs-commit mailing list