head	1.3;
access;
symbols
	RELEASE_8_3_0:1.3
	RELEASE_9_0_0:1.1
	RELEASE_7_4_0:1.1
	RELEASE_8_2_0:1.1
	RELEASE_6_EOL:1.1;
locks; strict;
comment	@# @;


1.3
date	2012.03.13.12.04.25;	author zi;	state Exp;
branches;
next	1.2;

1.2
date	2012.01.10.19.34.02;	author wxs;	state Exp;
branches;
next	1.1;

1.1
date	2010.09.01.15.31.51;	author jmelo;	state Exp;
branches;
next	;


desc
@@


1.3
log
@- Do not overwrite files from devel/libhtp [1]
- Do not overwrite customized config files [1]
- Optionally depend on libpcap from ports (off by default) [1]
- Detect and use gcc hardening options by default
- Cleanup language/whitespace
- Bump PORTREVISION

PR:		ports/164237 [1]
Submitted by:	Geoffroy Desvernay <dgeo@@centrale-marseille.fr> [1]
Feature safe:	yes
@
text
@bin/suricata
@@unexec if cmp  -s %D/etc/suricata/suricata.yaml-sample %D/etc/suricata/suricata.yaml; then rm -f %D/etc/suricata/suricata.yaml; fi
etc/suricata/suricata.yaml-sample
@@exec if [ ! -f %D/etc/suricata/suricata.yaml ] ; then cp -p %D/%F %B/suricata.yaml; fi
@@unexec if cmp  -s %D/etc/suricata/classification.config-sample %D/etc/suricata/classification.config; then rm -f %D/etc/suricata/classification.config; fi
etc/suricata/classification.config-sample
@@exec if [ ! -f %D/etc/suricata/classification.config ] ; then cp -p %D/%F %B/classification.config; fi
@@unexec if cmp  -s %D/etc/suricata/reference.config-sample %D/etc/suricata/reference.config; then rm -f %D/etc/suricata/reference.config; fi
etc/suricata/reference.config-sample
@@exec if [ ! -f %D/etc/suricata/reference.config ] ; then cp -p %D/%F %B/reference.config; fi
@@dirrmtry etc/suricata/rules
@@dirrmtry etc/suricata
@@unexec if [ -d %D/%%ETCDIR%% ]; then echo "==> If you are permanently removing this port, you should do a ``rm -rf ${PKG_PREFIX}/etc/suricata`` to remove any configuration files left."; fi
@


1.2
log
@- Update to 1.1.1.
- Use libhtp from ports instead of the bundled one.
- Remove check for 6.x.

PR:		ports/163603
Submitted by:	wxs@@
Approved by:	eksffa@@freebsdbrasil.com.br (maintiner timeout)
@
text
@d2 1
a2 1
etc/suricata/suricata.yaml
d4 2
d7 7
a13 3
etc/suricata/classification.config
@@unexec /bin/rmdir %D/etc/suricata/rules 2>/dev/null || true
@@unexec /bin/rmdir %D/etc/suricata 2>/dev/null || true
@


1.1
log
@The Suricata Engine is an Open Source Next Generation Intrusion Detection and
Prevention Engine developed by the Open Information Security Foundation (OISF).

This engine is not intended to just replace or emulate the existing tools in
the industry, but will bring new ideas and technologies to the field.

OISF is part of and funded by the Department of Homeland Security's Directorate
for Science and Technology HOST program (Homeland Open Security Technology),
by the the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as
through the very generous support of the members of the OISF Consortium.

More information about the Consortium is available, as well as a list of our
current Consortium Members.

The Suricata Engine and the HTP Library are available to use under the GPLv2.

The HTP Library is an HTTP normalizer and parser written by Ivan Ristic of
Mod Security fame for the OISF. This integrates and provides very advanced
processing of HTTP streams for Suricata. The HTP library is required by the
engine but may also be used independently in a range of applications and tools.

WWW: http://openinfosecfoundation.org

PR:		ports/150191
Submitted by:	Patrick Tracanelli <eksffa@@freebsdbrasil.com.br>
@
text
@a0 6
lib/libhtp.a
lib/libhtp-0.2.so
lib/libhtp-0.2.so.1
libdata/pkgconfig/htp.pc
lib/libhtp.la
lib/libhtp.so
a7 2
@@unexec echo "completely uninstalling %D/include/htp"
@@unexec /bin/rm -rf %D/include/htp 2>/dev/null || true
@

