head	1.11;
access;
symbols
	PRE_XORG_7:1.10
	RELEASE_4_EOL:1.7
	RELEASE_6_2_0:1.1;
locks; strict;
comment	@# @;


1.11
date	2007.07.23.02.11.21;	author rafan;	state dead;
branches;
next	1.10;

1.10
date	2007.04.04.01.32.04;	author clsung;	state Exp;
branches;
next	1.9;

1.9
date	2007.03.20.09.12.37;	author pav;	state Exp;
branches;
next	1.8;

1.8
date	2007.01.29.22.34.50;	author miwi;	state Exp;
branches;
next	1.7;

1.7
date	2007.01.25.13.26.35;	author miwi;	state Exp;
branches;
next	1.6;

1.6
date	2007.01.12.15.32.38;	author linimon;	state Exp;
branches;
next	1.5;

1.5
date	2006.12.26.21.56.51;	author linimon;	state Exp;
branches;
next	1.4;

1.4
date	2006.11.13.09.54.14;	author miwi;	state Exp;
branches;
next	1.3;

1.3
date	2006.11.12.20.39.45;	author miwi;	state Exp;
branches;
next	1.2;

1.2
date	2006.11.05.06.04.20;	author alepulver;	state Exp;
branches;
next	1.1;

1.1
date	2006.10.05.00.05.52;	author alepulver;	state Exp;
branches;
next	;


desc
@@


1.11
log
@- Retire security/metasploit-devel since security/metasploit is now
  up-to-date

PR:		ports/114196
Submitted by:	Yonatan <onatan at gmail.com> (maintainer)
@
text
@# Ports collection makefile for:	metasploit-devel
# Date created:				18 Nov 2004
# Whom:					Yonatan <onatan@@gmail.com>
#
# $FreeBSD: ports/security/metasploit-devel/Makefile,v 1.10 2007/04/04 01:32:04 clsung Exp $
#

PORTNAME=	metasploit
DISTVERSION=	3.0-beta-3
CATEGORIES=	security
MASTER_SITES=	#
PKGNAMESUFFIX=	-devel
DISTNAME=	framework-${DISTVERSION}-svn

MAINTAINER=	onatan@@gmail.com
COMMENT=	Exploit-Framework for Penetration-Testing

RUN_DEPENDS=	${LOCALBASE}/bin/svn:${PORTSDIR}/devel/subversion \
		${LOCALBASE}/bin/gem:${PORTSDIR}/devel/ruby-gems \
		${LOCALBASE}/lib/ruby/gems/1.8/specifications/activerecord-1.15.3.gemspec:${PORTSDIR}/databases/rubygem-activerecord

SCRIPTS=	msfcli msfconsole msfd msfencode msflicense msfopcode \
		msfpayload msfpescan msfweb

WRKSRC=	${WRKDIR}/framework-${DISTVERSION}
RESTRICTED=	May not be re-sold for more than the cost of duplication, nor redistributed after patching

CONFLICTS=	metasploit-2*
NO_BUILD=	yes
USE_RUBY=	yes

.include <bsd.port.pre.mk>

.if defined(WITH_MSFWX)
RUN_DEPENDS+=	${RUBY_SITEARCHLIBDIR}/wxruby.so:${PORTSDIR}/x11-toolkits/ruby-wx
SCRIPTS+=	msfwx
PLIST_SUB+=	MSF=""
.else
PLIST_SUB+=	MSF="@@comment "
.endif

.if !exists(${DISTDIR}/${DISTNAME}${EXTRACT_SUFX}) && !defined(PACKAGE_BUILDING)
ECHO_MSG=/usr/bin/printf
IGNORE=\n \
Due to licensing restrictions you have to accept the Metasploit Framework\n \
License before downloading ${DISTNAME}${EXTRACT_SUFX}. Please direct your\n \
web browser to http://metasploit.com/projects/Framework/msf3/ to read and\n \
accept the license. Once downloaded, save ${DISTNAME}${EXTRACT_SUFX} \n \
in ${DISTDIR} and try again.\n
.endif

post-extract:
	@@${FIND} ${WRKSRC}/ -type d -name '.svn' | ${XARGS} ${RM} -rf

do-install:
	${MKDIR} ${DATADIR}
	${CP} -Rp ${WRKSRC}/ ${DATADIR}
.for f in ${SCRIPTS}
	${LN} -s ${DATADIR}/${f} ${PREFIX}/bin
.endfor

.include <bsd.port.post.mk>
@


1.10
log
@- flush DEPENDS to reflect databases/rubygem-activerecord update

PR:		ports/110659
@
text
@d5 1
a5 1
# $FreeBSD$
@


1.9
log
@- Chase rubygem-activerecord update

Reported by:	pointyhat
Pointy hat to:	clsung
@
text
@d20 1
a20 1
		${LOCALBASE}/lib/ruby/gems/1.8/specifications/activerecord-1.15.2.gemspec:${PORTSDIR}/databases/rubygem-activerecord
@


1.8
log
@Chase increase of databases/rubygem-activerecord shlib version.

Submitted by:	pointyhat
@
text
@d20 1
a20 1
		${LOCALBASE}/lib/ruby/gems/1.8/specifications/activerecord-1.15.1.gemspec:${PORTSDIR}/databases/rubygem-activerecord
@


1.7
log
@- Fix pkg-plist with knob options

Submitted by:	pav
@
text
@d20 1
a20 1
		${LOCALBASE}/lib/ruby/gems/1.8/specifications/activerecord-1.14.4.gemspec:${PORTSDIR}/databases/rubygem-activerecord
@


1.6
log
@Revert last change.  The term is intended to imply 'distfile should be
fetched onto pointyhat manually, then the build can be tried'.

There should be some better mechanism for this.

Requested by:	kris
@
text
@a24 5
.if defined(WITH_MSFWX)
RUN_DEPENDS+=	${RUBY_SITEARCHLIBDIR}/wxruby.so:${PORTSDIR}/x11-toolkits/ruby-wx
SCRIPTS+=	msfwx
.endif

d34 8
@


1.5
log
@Remove PACKAGE_BUILDING term to prevent this from being tried on pointyhat
over and over again.

Hat:		portmgr
@
text
@d39 1
a39 1
.if !exists(${DISTDIR}/${DISTNAME}${EXTRACT_SUFX})
@


1.4
log
@- Remove .svn from the pkg-plist

Submitted by:	miwi via privat mail
Approved by:	maintainer
@
text
@d39 1
a39 1
.if !exists(${DISTDIR}/${DISTNAME}${EXTRACT_SUFX}) && !defined(PACKAGE_BUILDING)
@


1.3
log
@- Update to 3.0-beta3

PR:		ports/105397
Submitted by:	Jonathan <afarsec@@012.net.il> (maintainer)
@
text
@d49 3
@


1.2
log
@- Add PKGNAMESUFFIX to avoid duplicate LATEST_LINK.
@
text
@d9 1
a9 1
DISTVERSION=	3.0-beta-1
d13 1
a13 1
DISTNAME=	framework-${DISTVERSION}
d18 15
a32 2
NO_CDROM=	May not be re-sold for more than the cost of duplication
NO_PACKAGE=	May not be redistributed after patching
a36 3
SCRIPTS=	msfcli msfconsole msfd msfencode msflicense msfopcode \
		msfpayload msfpescan msfweb msfwx

@


1.1
log
@The Metasploit Project

This is the Metasploit Project. The goal is to provide useful
information to people who perform penetration testing, IDS signature
development, and exploit research. This site was created to fill the
gaps in the information publicly available on various exploitation
techniques and to create a useful resource for exploit developers. The
tools and information on this site are provided for legal penetration
testing and research purposes only.

This port is an in-development version of the upcoming Metasploit Framework.
It is based on Ruby instead of perl, and has a different license.

WWW: http://www.metasploit.org

PR:		ports/101280
Submitted by:	Yonatan <onatan at gmail.com>
@
text
@d12 1
@

