diff options
author | Wolfram Schlich <wschlich@gentoo.org> | 2013-08-22 07:45:52 +0200 |
---|---|---|
committer | Wolfram Schlich <wschlich@gentoo.org> | 2013-08-22 07:45:52 +0200 |
commit | 2c8d064b367a44723b9b557fb1edca59387edf49 (patch) | |
tree | 762432f58f66cfa663464bd506f40bd73a8a812d /app-antivirus | |
parent | initial setup (diff) | |
download | wschlich-2c8d064b367a44723b9b557fb1edca59387edf49.tar.gz wschlich-2c8d064b367a44723b9b557fb1edca59387edf49.tar.bz2 wschlich-2c8d064b367a44723b9b557fb1edca59387edf49.zip |
added all ebuilds from my old svn repository
Diffstat (limited to 'app-antivirus')
57 files changed, 3903 insertions, 0 deletions
diff --git a/app-antivirus/antivir-core/ChangeLog b/app-antivirus/antivir-core/ChangeLog new file mode 100644 index 0000000..e524b43 --- /dev/null +++ b/app-antivirus/antivir-core/ChangeLog @@ -0,0 +1,16 @@ +# ChangeLog for app-antivirus/antivir-core +# Copyright 1999-2008 Gentoo Foundation; Distributed under the GPL v2 +# $Header: $ + + 09 Dec 2008; Wolfram Schlich <wschlich@gentoo.org> + antivir-core-2.1.12_p19.ebuild: + added multilib eclass + + 07 Oct 2008; Wolfram Schlich <wschlich@gentoo.org> + antivir-core-2.1.12_p19.ebuild: + add ~amd64 + + 29 Jul 2008; Wolfram Schlich <wschlich@gentoo.org> +metadata.xml, + antivir-core-2.1.12_p19.ebuild: + fixups + diff --git a/app-antivirus/antivir-core/Manifest b/app-antivirus/antivir-core/Manifest new file mode 100644 index 0000000..d91bbde --- /dev/null +++ b/app-antivirus/antivir-core/Manifest @@ -0,0 +1,7 @@ +AUX 2.1.12_p19/avupdater.conf 615 RMD160 ea08210b70b04ca1edec7b3460cfd095d88711ce SHA1 a254866aa4f7c44ab84839ee206a112ea262879b SHA256 8158dd1225f8384b4e0abff38850b87c001f897a10f34243df2cb69c3711a37d +DIST antivir-updateplugin-prof-2.1.10.tar.gz 362704 RMD160 b0c24ef7fd3f623689a20e1795044e9fd61fd909 SHA1 605e82e96183740cdb314c7e11cef4e06ee723ab SHA256 9a555956b21b61b18b700c5408424b9258041fbd04195abde670dd0096fe9b13 +DIST antivir-workstation-prof-2.1.12-19.tar.gz 47657621 RMD160 2dd5f8c1cac069a42309e8e6f97a9e3de754b0fa SHA1 765b07d46f6f2805c1d320cd59083214fddfbfa4 SHA256 d5128e9dacab1cf5e40c4bf9244e49a3278875e62d2412175efc1ff27d5b9861 +DIST mirror.zip 25421 RMD160 b723453ff3b71c90fe3056ab6f88b9e175038110 SHA1 587f3af17b60a0804ce8944e193241cbb392033b SHA256 f6f0fbc8ef102b8cda70a5c8f53012ce975e492b07ef23402bfbe4ca7cc05a9c +EBUILD antivir-core-2.1.12_p19.ebuild 4256 RMD160 f9a9717a83d16a5e2ba1a2a3962ca780d9e7fee2 SHA1 82bade62d9a55c7c70d17817f510285386d1bb0e SHA256 a44dc70ecc0286539225e38f85ecf2b2e74b0e4d32f479344550a64d3755ec2f +MISC ChangeLog 452 RMD160 d338a82331c8ae614996b9db0a4b02c1b09a456c SHA1 1ed7d880f4f3d9f278a3508d78726aaa4c42553b SHA256 d5af4578ad22ecbaae4cfe86b86286341d7bfac21c5186a7ffa945aceb031912 +MISC metadata.xml 300 RMD160 3b9c1cd628f9d7ac94b68543ec737d5c2381a47e SHA1 33c5efd31a8aa789118535b921e211ffb5023ac3 SHA256 bc07a9aecce5770d1ace9af0a6c6af8ff6c7b16eb5e7947a1b178d1970855e43 diff --git a/app-antivirus/antivir-core/antivir-core-2.1.12_p19.ebuild b/app-antivirus/antivir-core/antivir-core-2.1.12_p19.ebuild new file mode 100644 index 0000000..9b4016d --- /dev/null +++ b/app-antivirus/antivir-core/antivir-core-2.1.12_p19.ebuild @@ -0,0 +1,206 @@ +# Copyright 1999-2008 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ +## +## Created by Wolfram Schlich <wschlich@gentoo.org> +## +## TODO +## - install: shutdown running programs? +## - install: show EULA?! +## - install/config: copy keyfile? +## + +inherit eutils multilib + +DESCRIPTION="AVIRA AntiVir virus scanner (core)" +MY_P="${PN/core/workstation}-prof-${PV/_p/-}" +SRC_URI="http://dl.antivir.de/down/unix/packages/${MY_P}.tar.gz + mirror? ( http://dl.antivir.de/down/unix/mirror.zip ) + smc? ( http://dl.antivir.de/down/unix/packages/antivir-updateplugin-prof-2.1.10.tar.gz )" +HOMEPAGE="http://www.antivir.de/" +LICENSE="AVIRA-AntiVir" +SLOT="0" +KEYWORDS="~x86 ~amd64" +IUSE="crypt gui mirror smc" +DEPEND="" +RDEPEND="" +S="${WORKDIR}/${MY_P}" +# prevent installation functions from stripping binaries +# otherwise the antivir selfcheck fails. also don't try +# to fetch the distribution tarball from a mirror. +RESTRICT="strip mirror" + +# +# Settings overridable by user supplied environment variables +# + +AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}" +AVCONFDIR="${AVCONFDIR:-/etc}" +AVGROUP="${AVGROUP:-antivir}" +AVGID="${AVGID:-220}" + +# +# Standard ebuild functions +# + +pkg_setup() { + + # + # Add GROUP + # + + enewgroup "${AVGROUP}" "${AVGID}" + +} + +src_install () { + + # + # Home directory + # + + diropts -oroot -groot -m0755 + dodir "${AVHOMEDIR}" + diropts -oroot -g"${AVGROUP}" -m0770 + dodir "${AVHOMEDIR}/.storage" "${AVHOMEDIR}/updcomp" + insinto "${AVHOMEDIR}" + insopts -oroot -g"${AVGROUP}" -m0644 + + # + # Executables, libraries and misc components + # + + exeopts -oroot -g"${AVGROUP}" -m2755 + exeinto "${AVHOMEDIR}" + doexe bin/linux_glibc22/antivir + diropts "" + dodir \ + "${DESTTREE}/bin" \ + "${DESTTREE}/sbin" + dosym "${AVHOMEDIR}/antivir" "${DESTTREE}/bin/antivir" + if use mirror; then + exeopts -oroot -g"${AVGROUP}" -m0750 + doexe "${WORKDIR}"/antivir-mirror + fi + + # + # VDF + # + + insinto "${AVHOMEDIR}" + doins vdf/*.vdf + + # + # Key file (TODO FIXME) + # + + if [ -f "${FILESDIR}/hbedv.key" ]; then + insopts -oroot -g"${AVGROUP}" -m0640 + insinto "${AVHOMEDIR}" + doins "${FILESDIR}/hbedv.key" + fi +# dodir /etc/env.d && echo "CONFIG_PROTECT=\"${AVHOMEDIR}/hbedv.key\"" >"${D}/etc/env.d/99antivir" + + # + # Config + # + + insopts -oroot -g"${AVGROUP}" -m0640 + insinto "${AVCONFDIR}" + doins \ + "${FILESDIR}"/${PV}/avupdater.conf + if use mirror; then + newins "${WORKDIR}"/antivir-mirror.conf.default antivir-mirror.conf + fi + + ## TODO:GUI + + ## TODO:SMC + + # + # Documents + # + + dodoc \ + LICENSE \ + LICENSE.DE \ + README \ + doc/CHANGELOG \ + doc/MANUAL \ + legal/LICENSE.* + if use crypt; then + dodoc pgp/antivir.gpg + newdoc pgp/README README.gpg + fi + if use mirror; then + newdoc "${WORKDIR}"/README README.mirror + newdoc "${WORKDIR}"/LIESMICH LIESMICH.mirror + newdoc "${WORKDIR}"/product-types.txt antivir-mirror.product-types.txt + fi + +} + +pkg_preinst() { + + # + # Check for legacy files + # + + # Updater config: antivir.conf -> avupdater.conf + if [ -e "${AVCONFDIR}/antivir.conf" ]; then + ewarn + ewarn "You have a deprecated antivir.conf in ${AVCONFDIR}/." + ewarn "Please use ${AVCONFDIR}/avupdater.conf for the AntiVir Updater settings." + ewarn "A sample avupdater.conf has been installed to ${AVCONFDIR}/avupdater.conf" + ewarn "Please compare the settings from antivir.conf with those in avupdater.conf," + ewarn "modify those in avupdater.conf as needed and remove antivir.conf when done." + ewarn + fi + +} + +pkg_postinst() { + + # + # Config + # + + echo + einfo "" + einfo "Configuration" + einfo "=============" + einfo "" + einfo "Please run..." + einfo "" + einfo "\tebuild /var/db/pkg/${CATEGORY}/${PF}/${PF}.ebuild config" + einfo "" + einfo "...to configure the package!" + + echo + +} + +pkg_config () { + + # + # Automatic updates + # Generate a random number between 1 and 59 for the crontab + # + + rand="$$$(date +%s)" + min="$[ ($rand % 59) + 1 ]" + echo + einfo "" + einfo "Using the internet updater" + einfo "==========================" + einfo "" + einfo "Add the following line to your /etc/crontab or a new file" + einfo "in /etc/cron.d/ to make AntiVir check for updates" + einfo "${min} minutes after every full hour:" + einfo "" + einfo "\t${min} * * * * root exec ${AVHOMEDIR}/antivir --update >/dev/null" + einfo "" + echo + + ## TODO: mirror script +} diff --git a/app-antivirus/antivir-core/files/2.1.12_p19/avupdater.conf b/app-antivirus/antivir-core/files/2.1.12_p19/avupdater.conf new file mode 100755 index 0000000..e2b3151 --- /dev/null +++ b/app-antivirus/antivir-core/files/2.1.12_p19/avupdater.conf @@ -0,0 +1,26 @@ +## reporting via mail +EmailTo root + +## logging +#LogTo /var/log/antivir.log +SyslogFacility user +SyslogPriority notice + +## proxy server +#HTTPProxyServer proxy.example.com +#HTTPProxyPort 3128 +#HTTPProxyUsername username +#HTTPProxyPassword password + +## general update settings +#HTTPUpdateServer http://antivir.example.com +#UpdaterKeepsBackups + +## avupdater (better use cron) +#AutoUpdateEvery2Hours +#AutoUpdateDaily +#AutoUpdateTime 4:23 + +## GPG (for verification of signed binaries) +GnuPGBinary /usr/bin/gpg +GnuPGOptions --keyserver x-hkp://subkeys.pgp.net --keyserver-options auto-key-retrieve,honor-http-proxy,verbose diff --git a/app-antivirus/antivir-core/metadata.xml b/app-antivirus/antivir-core/metadata.xml new file mode 100644 index 0000000..a7162e9 --- /dev/null +++ b/app-antivirus/antivir-core/metadata.xml @@ -0,0 +1,10 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> +<herd>no-herd</herd> +<maintainer> + <email>wschlich@gentoo.org</email> + <name>Wolfram Schlich</name> + <description>Primary maintainer</description> +</maintainer> +</pkgmetadata> diff --git a/app-antivirus/antivir-internet-update-manager/ChangeLog b/app-antivirus/antivir-internet-update-manager/ChangeLog new file mode 100644 index 0000000..9f5fe0f --- /dev/null +++ b/app-antivirus/antivir-internet-update-manager/ChangeLog @@ -0,0 +1,17 @@ +# ChangeLog for app-antivirus/antivir-internet-update-manager +# Copyright 1999-2009 Gentoo Foundation; Distributed under the GPL v2 +# $Header: $ + + 02 Jun 2009; Wolfram Schlich <wschlich@gentoo.org> ++, + -files/2.4.0.6/antivir-ium.init.d, -files/2.4.0.6/ium.conf, + -files/2.4.0.6/mirrorconfig.xml, + -antivir-internet-update-manager-2.4.0.6.ebuild, + +antivir-internet-update-manager-2.4.0.6.3.ebuild: + version bump + + 02 Jun 2009; Wolfram Schlich <wschlich@gentoo.org> + +files/2.4.0.6/antivir-ium.init.d, +files/2.4.0.6/ium.conf, + +files/2.4.0.6/mirrorconfig.xml, + +antivir-internet-update-manager-2.4.0.6.ebuild: + initial import + diff --git a/app-antivirus/antivir-internet-update-manager/Manifest b/app-antivirus/antivir-internet-update-manager/Manifest new file mode 100644 index 0000000..0bc33af --- /dev/null +++ b/app-antivirus/antivir-internet-update-manager/Manifest @@ -0,0 +1,6 @@ +AUX 2.4.0.6.3/antivir-ium.init.d 625 RMD160 5c3cd8d10a6aacf12c71eefa18228c75cd8e4ee6 SHA1 0cb414c1af96d8057baab66d9512819e76b89a07 SHA256 6ded8ef8e8ab9c5d8a168c69eb55e7ccaab6fc1df8cda69c9df1285a393a4878 +AUX 2.4.0.6.3/ium.conf 1964 RMD160 a9caae7cf6527fd2525275b557ef0521d704e8bf SHA1 e6a8042e8ff014a83ab4022d0a6ad5ea0f515517 SHA256 ebc270009ca99f15420dd367d6bf5bbc9db3abd771cbe583661f68310d675d1e +AUX 2.4.0.6.3/mirrorconfig.xml 1756 RMD160 28757eb166088ecf5bf21bc137df8a97413e710c SHA1 b79d9901c70fc4156845e238269abe36b4450b59 SHA256 752535d2d9ae0aaae6f9340217898670d42a07c18d9e6e415ca9dcb9d21f2425 +DIST avira_update_manager_unix_en.tar.gz 2146016 RMD160 51c375249b7d88c1c577184f3401b6bdb591d900 SHA1 f9a1f50d0913d9cb628eb655c2b36a1376003a46 SHA256 43560e68c2a1fe0938d0ad203757bb8f1b41d0bb0b0c08b287a5b0d87b0852d1 +EBUILD antivir-internet-update-manager-2.4.0.6.3.ebuild 5104 RMD160 afb08363c949d1f8fe1197304285e0cd9ee55bf8 SHA1 92085aa3fcf27b0cc3a4bb32064068dee3828ee8 SHA256 fb1a012c5a4c5cac68fab3702a33c5e4400baffd64c10462186ab5fc8f2271ff +MISC ChangeLog 639 RMD160 6df2f2c4ca6f094e1ce6441af6029787238465f2 SHA1 29f969e08e9af7a0fe95e4227a3c83daac4113d2 SHA256 3fb4fce20a39f876ffd8ae39a7c25d93ee30f04a8f9f1548a5d44ebe0ff55a92 diff --git a/app-antivirus/antivir-internet-update-manager/antivir-internet-update-manager-2.4.0.6.3.ebuild b/app-antivirus/antivir-internet-update-manager/antivir-internet-update-manager-2.4.0.6.3.ebuild new file mode 100644 index 0000000..87174cf --- /dev/null +++ b/app-antivirus/antivir-internet-update-manager/antivir-internet-update-manager-2.4.0.6.3.ebuild @@ -0,0 +1,234 @@ +# Copyright 1999-2009 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ +## +## Created by Wolfram Schlich <wschlich@gentoo.org> +## +## TODO +## - ? +## + +inherit eutils pax-utils + +DESCRIPTION="AVIRA AntiVir Update Manager" +MY_P="avira_update_manager_unix-${PV%.*}-${PV##*.}" +SRC_URI="http://dl1.pro.antivir.de/package/ium/unix/en/avira_update_manager_unix_en.tar.gz" +HOMEPAGE="http://www.avira.com/" +LICENSE="AVIRA-AntiVir" +SLOT="0" +KEYWORDS="~x86 ~amd64" +IUSE="" +DEPEND="" +RDEPEND=">=app-antivirus/antivir-savapi-3" +S="${WORKDIR}/${MY_P}" +# prevent installation functions from stripping binaries +# otherwise the antivir selfcheck fails. also don't try +# to fetch the distribution tarball from a mirror. +RESTRICT="strip mirror" + +# +# Settings overridable by user supplied environment variables +# + +AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}" +AVCONFDIR="${AVCONFDIR:-/etc/avira}" +AVIUMHTTPDIR="${AVIUMHTTPDIR:-/var/avira/ium/HttpRoot}" +AVIUMLOGDIR="${AVIUMLOGDIR:-/var/log/ium}" +AVUSER="${AVUSER:-avgate}" +AVUID="${AVUID:-220}" +AVSH="${AVSH:--1}" +AVGROUP="${AVGROUP:-antivir}" +AVGID="${AVGID:-220}" +AVHOSTNAME="${AVHOSTNAME:-$(hostname -f)}" + +pkg_setup() { + + # + # Add USER + GROUP + # + + enewgroup "${AVGROUP}" "${AVGID}" + enewuser "${AVUSER}" "${AVUID}" "${AVSH}" -1 "${AVGROUP}" -c AntiVir + +} + +src_install() { + + # + # Executables, libraries and misc components + # + + exeinto "${AVHOMEDIR}/ium" + insinto "${AVHOMEDIR}/ium" + exeopts -oroot -g"${AVGROUP}" -m2750 + insopts -oroot -g"${AVGROUP}" -m0640 + doexe bin/linux_glibc22/ium + doins bin/linux_glibc22/ium_msg.avr + doins bin/linux_glibc22/libcommon.so + doins bin/linux_glibc22/common_msg.avr + doins etc/iumproducts.xml + + local libupdate_ver=0.1.0.33 + doins bin/linux_glibc22/libupdate.so.${libupdate_ver} + dosym "libupdate.so.${libupdate_ver}" "${AVHOMEDIR}/ium/libupdate.so.0" + dosym "libupdate.so.${libupdate_ver}" "${AVHOMEDIR}/ium/libupdate.so" + + diropts "" + dodir "${DESTTREE}/sbin" + dosym "${AVHOMEDIR}/ium/ium" "${DESTTREE}/sbin/avium" + + newexe script/avira_start.sh.template avium + doexe script/avium_start.sh + doexe script/avium_restart.sh + doexe script/avium_stop.sh + + insinto "${AVHOMEDIR}/ium/ssl" + doins cert/cacert.pem + doins cert/server.pem + + # + # Init script + # + + exeopts -oroot -groot -m0755 + exeinto /etc/init.d + newexe "${FILESDIR}/${PV}/antivir-ium.init.d" antivir-ium + + # + # Config + # + + insopts -oroot -g"${AVGROUP}" -m0640 + insinto "${AVCONFDIR}" + doins "${FILESDIR}"/${PV}/ium.conf + dosed "s:%AVIUMHTTPDIR%:${AVIUMHTTPDIR}:g" "${AVCONFDIR}/ium.conf" + doins "${FILESDIR}"/${PV}/mirrorconfig.xml + + # + # IUM log directory + # + + diropts -o"${AVUSER}" -g"${AVGROUP}" -m0750 + dodir "${AVIUMLOGDIR}" + dodir "${AVIUMHTTPDIR}" + + # + # Documents + # + + dodoc \ + LICENSE \ + LICENSE.DE \ + README \ + doc/MANUAL + + # + # Templates + # + + insinto "${AVHOMEDIR}/ium" + insopts -m0644 + doins templates/*.htm + doins doc/mail_template_iumstatus.txt + +} + +pkg_postinst() { + + # + # Manual invocation + # + + elog + elog "Manually adding products to get updates for" + elog "===========================================" + elog + elog " ${AVHOMEDIR}/ium/ium --add_products" + elog + elog "Manually getting updates for products" + elog "=====================================" + elog + elog " ${AVHOMEDIR}/ium/ium --get_updates" + elog + + echo + + # + # Automatic updates for products + # + + rand="$(date +%N 2>/dev/null)" + min="$[ (${rand:-${RANDOM}} % 59) + 1 ]" + elog + elog "Automatically getting updates for products" + elog "==========================================" + elog + elog "Add the following line to your /etc/crontab or a new file" + elog "in /etc/cron.d/ to make AntiVir check for updates" + elog "${min} minutes after every full hour:" + elog + elog " ${min} * * * * root exec ${AVHOMEDIR}/ium/ium --get_updates >/dev/null" + elog + + echo + + # + # Automatic updates for IUM + # + + rand="$(date +%N 2>/dev/null)" + min="$[ (${rand:-${RANDOM}} % 59) + 1 ]" + elog + elog "Automatically getting updates for IUM itself" + elog "===========================================" + elog + elog "Add the following line to your /etc/crontab or a new file" + elog "in /etc/cron.d/ to make AntiVir check for updates" + elog "${min} minutes after every full hour:" + elog + elog " ${min} * * * * root exec ${AVHOMEDIR}/avupdate --product=IUM >/dev/null" + elog + + echo + + # + # Client configuration info + # + + elog + elog "Configuring clients" + elog "===================" + elog + elog "Windows clients" + elog "---------------" + elog + elog "Options -> General -> Update -> Webserver -> Download Server:" + elog " http://iumserver:7080/upd" + elog + elog "Linux clients" + elog "-------------" + elog + elog "For SAVAPI2 products add these two options in /etc/avupdater.conf:" + elog " HTTPUpdateServer 'iumserver':7080" + elog " IgnoreRemoteServerSpec yes" + elog + elog "For SAVAPI3 products adjust /etc/avupdate.conf as follows:" + elog " internet-srvs=http://iumserver:7080/upd" + elog + + echo + + # + # Templates + # + + elog + elog "Using the HTML templates" + elog "========================" + elog + elog "The templates were installed into" + elog + elog "\t${AVHOMEDIR}/ium" + elog + +} diff --git a/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/antivir-ium.init.d b/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/antivir-ium.init.d new file mode 100755 index 0000000..d296554 --- /dev/null +++ b/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/antivir-ium.init.d @@ -0,0 +1,36 @@ +#!/sbin/runscript + +svc_name="Avira AntiVir Internet Update Manager" + +avium_script="/usr/lib/AntiVir/ium/avium" +avium_config="/etc/avira/ium.conf" + +depend() { + need net + use logger dns +} + +checkconfig() { + if [ ! -x "${avium_script}" ]; then + eerror "AntiVir IUM script [${avium_script}] missing" + return 1 + fi + if [ ! -r "${avium_config}" ]; then + eerror "AntiVir IUM config [${avium_config}] missing" + return 1 + fi +} + +start() { + checkconfig || return 1 + ebegin "Starting ${svc_name}" + "${avium_script}" start + eend $? +} + +stop() { + checkconfig || return 2 + ebegin "Stopping ${svc_name}" + "${avium_script}" stop + eend $? +} diff --git a/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/ium.conf b/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/ium.conf new file mode 100644 index 0000000..a3d3f61 --- /dev/null +++ b/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/ium.conf @@ -0,0 +1,68 @@ +<?xml version="1.0" encoding="utf-8"?> +<config> + +<communication> + <ip value="0.0.0.0" /> + <use_proxy value="false" /> + <proxy_host value="" /> + <proxy_port value="8080" /> + <proxy_use_auth value="false" /> + <proxy_username value="" /> + <proxy_password value="" /> + <smtp_server value="" /> + <smtp_from value="" /> + <smtp_login_required value="false" /> + <smtp_login value="" /> + <smtp_password value="" /> +</communication> + +<general> + <log_level value="info" /> +</general> + +<soap> + <use_ssl value="true" /> + <ssl_key_file value="server.pem" /> + <ssl_passwd value="715F51D6D145986E5C5ACBC552D9273E28B856D084ECFDE16C05BA694C5877FC8F3FE8C5CBE464325C0018192DA76F937143" /> +</soap> + +<ium> + <general> + <language value="en" /> + <testmode value="false" /> + </general> + <communication> + <port value="7050" /> + <port_async value="7051" /> + <http_server_enable value="true" /> + <http_server_ip value="0.0.0.0" /> + <http_server_port value="7080" /> + <http_server_port_test value="7022" /> + <http_server_port_old value="7021" /> + <http_server_root value="%AVIUMHTTPDIR%" /> + <http_server_root_user value="" /> + <http_server_root_pass value="" /> + <http_server_root_old value="" /> + <http_server_max_connections value="1000" /> + <http_server_list_orig value="http://dl1.pro.antivir.de,http://dl2.pro.antivir.de,http://dl3.pro.antivir.de,http://dl4.pro.antivir.de,http://dl1.antivir.net,http://dl2.antivir.net,http://dl3.antivir.net" /> + <http_server_list_user value="" /> + <download_retry_wait value="10" /> + <download_retries value="1" /> + <download_connect_timeout value="120" /> + <download_receive_timeout value="120" /> + <override_server_list value="false" /> + </communication> + <smtp> + <smtp_enable value="false"/> + <smtp_to value=""/> + <smtp_level value="error"/> + </smtp> + <update> + <automatic_selfupdate value="false" /> + <automatic_mode value="true" /> + </update> + <scheduler> + <enable value="false"/> + </scheduler> +</ium> +</config> diff --git a/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/mirrorconfig.xml b/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/mirrorconfig.xml new file mode 100644 index 0000000..a60ff73 --- /dev/null +++ b/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/mirrorconfig.xml @@ -0,0 +1,44 @@ +<?xml version="1.0" encoding="utf-8" standalone="no"?> + +<MirrorConfig> + <product name="AV9_PROF_WIN32_DE"/> + <product name="AV9_PROF_WIN32_EN"/> + <product name="AV9_SERVER_WIN32_DE"/> + <product name="AV9_SERVER_WIN32_EN"/> + <product name="IUM_FRONTEND_WIN32_DE"/> + <product name="IUM_FRONTEND_WIN32_EN"/> + <product name="IUM_WIN32_DE"/> + <product name="IUM_WIN32_EN"/> + <product name="PRODUCT_MAILGATE"/> + <product name="PRODUCT_MAILGATE_GLIBC22_I386"/> + <product name="PRODUCT_NAME_AV7_NT_DE"/> + <product name="PRODUCT_NAME_AV7_NT_EN"/> + <product name="PRODUCT_NAME_IUM"/> + <product name="PRODUCT_NAME_IUM_FRONTEND"/> + <product name="PRODUCT_NAME_SMC_AGENT"/> + <product name="PRODUCT_NAME_SMC_AGENT_DE"/> + <product name="PRODUCT_NAME_SMC_AGENT_EN"/> + <product name="PRODUCT_NAME_SMC_GUI"/> + <product name="PRODUCT_NAME_SMC_GUI_DE"/> + <product name="PRODUCT_NAME_SMC_GUI_EN"/> + <product name="PRODUCT_NAME_SMC_SERVER"/> + <product name="PRODUCT_NAME_SMC_SERVER_DE"/> + <product name="PRODUCT_NAME_SMC_SERVER_EN"/> + <product name="PRODUCT_SRV"/> + <product name="PRODUCT_SRVWKS_GLIBC22_I386"/> + <product name="PRODUCT_WEBGATE"/> + <product name="PRODUCT_WEBGATE_GLIBC22_I386"/> + <product name="PRODUCT_WKS"/> + <product name="SAVAPI2_WIN"/> + <product name="SAVAPI3_GLIBC22_I386"/> + <product name="SAVAPI3_WIN"/> + <product name="SMC_AGENT_GLIBC22_I386"/> + <product name="SMC_AGENT_WIN32_DE"/> + <product name="SMC_AGENT_WIN32_EN"/> + <product name="UNIX_SERVER_3"/> + <product name="UNIX_SERVER_3_GLIBC22_I386"/> + <product name="UNIX_WORKSTATION_3"/> + <product name="UNIX_WORKSTATION_3_GLIBC22_I386"/> + <product name="WIN_SERVER8_DE"/> + <product name="WIN_SERVER8_EN"/> +</MirrorConfig> diff --git a/app-antivirus/antivir-mailgate/ChangeLog b/app-antivirus/antivir-mailgate/ChangeLog new file mode 100644 index 0000000..8d3dd8a --- /dev/null +++ b/app-antivirus/antivir-mailgate/ChangeLog @@ -0,0 +1,25 @@ +# ChangeLog for app-antivirus/antivir-mailgate +# Copyright 1999-2009 Gentoo Foundation; Distributed under the GPL v2 +# $Header: $ + + 11 Nov 2009; Wolfram Schlich <wschlich@gentoo.org> + antivir-mailgate-3.0.0_p14.ebuild: + change SRC_URI + + 04 Mar 2009; Wolfram Schlich <wschlich@gentoo.org> + +files/3.0.0_p14/antivir-mailgate.initd, + +files/3.0.0_p14/avmailgate.conf.diff.postfix.bz2, + +files/3.0.0_p14/avmailgate-scanner.conf.diff.bz2, + +antivir-mailgate-3.0.0_p14.ebuild: + version bump + + 09 Dec 2008; Wolfram Schlich <wschlich@gentoo.org> + antivir-mailgate-2.1.4_p7-r1.ebuild: + added ~amd64 + + 15 Apr 2008; Wolfram Schlich <wschlich@gentoo.org> + +files/2.1.4_p7/antivir-mailgate.init.d, + +files/2.1.4_p7/avmailgate.conf.diff.postfix, + +files/2.1.4_p7/avupdater.conf, +antivir-mailgate-2.1.4_p7.ebuild: + version bump + diff --git a/app-antivirus/antivir-mailgate/Manifest b/app-antivirus/antivir-mailgate/Manifest new file mode 100644 index 0000000..db491ff --- /dev/null +++ b/app-antivirus/antivir-mailgate/Manifest @@ -0,0 +1,12 @@ +AUX 2.1.4_p7/antivir-mailgate.init.d 898 RMD160 a12942a6cf8da27c5f81adbf664f3ee18b93235a SHA1 0962a1e2984dd05b422fe0b60dd1130e857979ee SHA256 035233b80a5f045cec10de2958e219f5f26c18c54de714165f60840d25ad37d5 +AUX 2.1.4_p7/avmailgate.conf.diff.postfix.bz2 5441 RMD160 6bbd8034dc30f6dac14837f995a41c4c85db6f99 SHA1 bed730d418122d56d532a891a5f450a26ec5a709 SHA256 ba282cad20e11c99b34b60bd5d04446bf6f73b110626ec1c60ba4b7c09d1d208 +AUX 2.1.4_p7/avupdater.conf 621 RMD160 865549dfa52ac4787e5c992f51751d73c11630c4 SHA1 82e87c29ca000044530cafeda4cbb9d98097671c SHA256 3dbac1f331fc34bb9f79bf0faa9f729a2601b0938c0fa09a8cc0365b04266392 +AUX 3.0.0_p14/antivir-mailgate.initd 914 RMD160 76676ec1567eed718ef42bf544aaac97e7d9199b SHA1 d0513ac129be814471e6d227c11cd353389caea1 SHA256 109cf5ad9bd344843d4449c64ccebabbdeff4986abf1390e922bb0c3c1962738 +AUX 3.0.0_p14/avmailgate-scanner.conf.diff.bz2 739 RMD160 990a5123af9d306d0a0ba4321bb28bf4bd92819a SHA1 16dae66743e50736688ec455891c3dbce0d8129f SHA256 8e1df8fe3204232c8493cf330e3abca20f72a95f7bd7682f1a48988740baa715 +AUX 3.0.0_p14/avmailgate.conf.diff.postfix.bz2 4956 RMD160 e58e8abcdcca507a0eeb9e622150944a5e53ac6f SHA1 1accef8fb518ebb81983b9284f532f37f716c17f SHA256 0e98cd1bcd99e3cea27fec91d50fa0196b689dd90f09f8bf5689c48f5d3f925a +DIST antivir-mailgate-prof-2.1.4-7.tar.gz 67012825 RMD160 1fd8ff0b0bfc95a3d06014feeaed4868136c7c9f SHA1 e007111a14c51337c63cb5590381828365a4a0e6 SHA256 2498484d745fdd7c3b6af3fc790a9b2b7d5e2dc202d0d4868501b372ca9e294e +DIST antivir-mailgate-prof-3.0.0-14.tar.gz 31856751 RMD160 20ad6af92fdef49145bbffdf2376a955110e9892 SHA1 457c617e57d38e8e3d2f95ecc1d16bf347d967d4 SHA256 0df70bb0e4c6612c2c7a678f41648d8d23951c564a0dd4ea52f96f4c656abb0a +EBUILD antivir-mailgate-2.1.4_p7-r1.ebuild 7441 RMD160 ccb05a1387578ca2c3db48c982201964c4810f1a SHA1 8f4ae83241db9a4d8d8112b08fd6edbfa7be9a07 SHA256 9e533ba0c524690e47ae6be496fa8082d18ff980986fe8543bfde90e3f61e9bc +EBUILD antivir-mailgate-3.0.0_p14.ebuild 8422 RMD160 f3f48caa8bfc04be9ca72315723f24e2fdb083ce SHA1 cc88cbb2b13bf0a47f502a6fd08ba9dbf7d8a4a5 SHA256 54d2897870a66eca5f4674ce6e192ccce7b4217f623b9dbb6d66e02a20c43fdd +MISC ChangeLog 832 RMD160 62ceafa2c022ef6cd56af082221bc3f494682c23 SHA1 db11ed019c0da029d14289a0c175d9f2dd26218c SHA256 a1abdf4a90b5504407333ca168e177dab2c6cd2377304773a6a58b0dfcebd2bd +MISC metadata.xml 300 RMD160 3b9c1cd628f9d7ac94b68543ec737d5c2381a47e SHA1 33c5efd31a8aa789118535b921e211ffb5023ac3 SHA256 bc07a9aecce5770d1ace9af0a6c6af8ff6c7b16eb5e7947a1b178d1970855e43 diff --git a/app-antivirus/antivir-mailgate/antivir-mailgate-2.1.4_p7-r1.ebuild b/app-antivirus/antivir-mailgate/antivir-mailgate-2.1.4_p7-r1.ebuild new file mode 100644 index 0000000..211b261 --- /dev/null +++ b/app-antivirus/antivir-mailgate/antivir-mailgate-2.1.4_p7-r1.ebuild @@ -0,0 +1,336 @@ +# Copyright 1999-2008 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ +## +## Created by Wolfram Schlich <wschlich@gentoo.org> +## +## TODO +## - install: shutdown running programs? +## - install: show EULA?! +## - config: setup avmailgate.acl? +## - install/config: copy keyfile? +## - config: setup mta config? -> show INSTALL.$mta file, at least +## - install/config: avguard? -> check if avspooldir is excluded in guard config +## - install/config: gui? +## + +inherit eutils pax-utils multilib + +DESCRIPTION="AVIRA AntiVir MailGate SMTP mail virus scanner" +MY_P="${PN}-prof-${PV/_p/-}" +SRC_URI="http://dl.antivir.de/down/unix/packages/${MY_P}.tar.gz" +HOMEPAGE="http://www.antivir.de/" +LICENSE="AVIRA-AntiVir" +SLOT="0" +KEYWORDS="~amd64 ~x86" +IUSE="postfix spamfilter" # TODO: gui exim qmail sendmail smc +DEPEND="" +RDEPEND=">=app-antivirus/antivir-core-2.1.12_p19 + postfix? ( mail-mta/postfix )" +S="${WORKDIR}/${MY_P}" +# prevent installation functions from stripping binaries +# otherwise the antivir selfcheck fails. also don't try +# to fetch the distribution tarball from a mirror. +RESTRICT="strip mirror" + +# +# Settings overridable by user supplied environment variables +# + +AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}" +AVCONFDIR="${AVCONFDIR:-/etc}" +AVSPOOLDIR="${AVSPOOLDIR:-/var/spool/avmailgate}" +AVTMPDIR="${AVTMPDIR:-/var/tmp}" +AVPIDDIR="${AVPIDDIR:-/var/tmp}" +AVUSER="${AVUSER:-avgate}" +AVUID="${AVUID:-220}" +AVSH="${AVSH:--1}" +AVGROUP="${AVGROUP:-antivir}" +AVGID="${AVGID:-220}" +AVHOSTNAME="${AVHOSTNAME:-$(hostname -f)}" + +# +# Standard ebuild functions +# + +pkg_setup() { + + # + # Add USER + GROUP + # + + enewgroup "${AVGROUP}" "${AVGID}" + enewuser "${AVUSER}" "${AVUID}" "${AVSH}" -1 "${AVGROUP}" -c AntiVir + +} + +src_unpack() { + + unpack ${A} + cd "${S}" + + # + # MTA specific config + # + + if use postfix; then + pushd ./etc >/dev/null \ + && epatch "${FILESDIR}/${PV}/avmailgate.conf.diff.postfix.bz2" \ + && popd >/dev/null + fi + +} + +src_install() { + + # + # Base directories + # + + if use spamfilter; then + diropts -oroot -g"${AVGROUP}" -m0750 + dodir /var/lib/AntiVir + dodir /var/tmp/AntiVir + diropts -o"${AVUSER}" -g"${AVGROUP}" -m0750 + dodir /var/tmp/AntiVir/asmailgate + dodir /var/lib/AntiVir/asmailgate + diropts "" + dosym /var/lib/AntiVir/asmailgate "${AVHOMEDIR}/mailgate-var" + fi + + # + # Executables, libraries and misc components + # + + exeopts -oroot -g"${AVGROUP}" -m2750 + exeinto "${AVHOMEDIR}" + doexe bin/linux_glibc22/avmailgate.bin + diropts "" + dodir \ + "${DESTTREE}/sbin" + dosym "${AVHOMEDIR}/avmailgate.bin" "${DESTTREE}/sbin/avmailgate" + + if use spamfilter; then + exeopts -o"${AVUSER}" -g"${AVGROUP}" -m2750 + exeinto "${AVHOMEDIR}" + doexe contrib/asmailgate/bin/linux_glibc22/avmg_ext_filter.bin + pax-mark -m "${D}${AVHOMEDIR}"/avmg_ext_filter.bin + insopts -o"${AVUSER}" -g"${AVGROUP}" -m0644 + insinto "${AVHOMEDIR}" + doins contrib/asmailgate/bin/linux_glibc22/libasmailgate.so + doins contrib/asmailgate/data/asmailgate.dat + insinto /var/lib/AntiVir/asmailgate + doins contrib/asmailgate/var/as_sdk_features.yml + doins contrib/asmailgate/var/asconfig.yml + doins contrib/asmailgate/var/asmailgate.yml + fi + + # + # Init script + # + + exeopts -oroot -groot -m0755 + exeinto /etc/init.d + newexe "${FILESDIR}/${PV}/antivir-mailgate.init.d" antivir-mailgate + + # + # Config + # + + insopts -oroot -g"${AVGROUP}" -m0640 + insinto "${AVCONFDIR}" + doins \ + etc/avmailgate.acl \ + etc/avmailgate.conf \ + etc/avmailgate.ignore \ + etc/avmailgate.scan \ + etc/avmailgate.warn +# use gui && doins etc/avmailgate.conf-gui + dosed "s:%AVHOMEDIR%:${AVHOMEDIR}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVCONFDIR%:${AVCONFDIR}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVSPOOLDIR%:${AVSPOOLDIR}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVPIDDIR%:${AVPIDDIR}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVUSER%:${AVUSER}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVGROUP%:${AVGROUP}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVHOSTNAME%:${AVHOSTNAME}:g" "${AVCONFDIR}/avmailgate.conf" + if use spamfilter; then + dosed "s:^EnableSpamCheck NO:EnableSpamCheck YES:g" "${AVCONFDIR}/avmailgate.conf" + touch "${T}/asmailgate.except" + doins "${T}/asmailgate.except" + fi + + # + # Spool directory + # + + diropts -o"${AVUSER}" -g"${AVGROUP}" -m0700 + dodir "${AVSPOOLDIR}" + keepdir "${AVSPOOLDIR}" + for dir in incoming outgoing rejected; do + dodir "${AVSPOOLDIR}/${dir}" + keepdir "${AVSPOOLDIR}/${dir}" + done + + ## TODO:GUI + + ## TODO:SMC + + # + # Documents + # + + dodoc \ + LICENSE \ + LICENSE.DE \ + README \ + doc/CHANGELOG \ + doc/INSTALL \ + doc/INSTALL.DE \ + doc/MANUAL \ + doc/RELEASE_NOTES \ + doc/avmailgate_de.pdf \ + doc/avmailgate_en.pdf \ + legal/LICENSE.* + use postfix && dodoc \ + doc/INSTALL.postfix +# use exim && dodoc \ +# doc/INSTALL.exim +# use sendmail && dodoc \ +# doc/INSTALL.sendmail +# use qmail && dodoc \ +# doc/INSTALL.qmail +# use qmail && use gui && dodoc \ +# doc/INSTALL.qmail.gui + doman \ + doc/man/avmailgate.8 \ + doc/man/avmailgate.conf.5 + + # + # Templates + # + + diropts "" + dodir "${AVHOMEDIR}/templates.sample" + insopts "" + insinto "${AVHOMEDIR}/templates.sample" + doins \ + templates/en/patho-administrator \ + templates/en/patho-recipient \ + templates/en/patho-sender \ + templates/en/alert-administrator \ + templates/en/alert-recipient \ + templates/en/alert-sender + if use spamfilter; then + doins \ + templates/spamfilter-subjects + fi + +} + +pkg_preinst() { + + # + # Check for legacy files + # + + # Templates: virus-* -> alert-* + for t in administrator recipient sender; do + tf="${AVHOMEDIR}/templates/virus-${t}" + new_tf="${AVHOMEDIR}/templates/alert-${t}" + if [ -e "${tf}" ]; then + ewarn + ewarn "You have an old notification mail template file in ${AVHOMEDIR}/templates/:" + ewarn " -> ${tf}" + ewarn "Please rename it as follows:" + ewarn " -> ${new_tf}" + ewarn + fi + done + +} + +pkg_postinst() { + + # + # Config + # + + echo + einfo "" + einfo "Configuration" + einfo "=============" + einfo "" + einfo "Please run..." + einfo "" + einfo "\tebuild /var/db/pkg/${CATEGORY}/${PF}/${PF}.ebuild config" + einfo "" + einfo "...to configure the package!" + einfo "" + echo + +} + +pkg_config() { + + # + # Init script + # + + echo + einfo "" + einfo "Using the init script" + einfo "=====================" + einfo "" + einfo "Simply run..." + einfo "" + einfo "\trc-update add antivir-mailgate default" + einfo "" + einfo "...and your're done." + einfo "" + + # + # Templates + # + + echo + einfo "" + einfo "Using the notification mail templates" + einfo "=====================================" + einfo "" + einfo "The sample templates were installed into" + einfo "" + einfo "\t${AVHOMEDIR}/templates.sample" + einfo "" + einfo "To use them, simply do..." + einfo "" + einfo "\tcd ${AVHOMEDIR}" + einfo "\tmv templates.sample templates" + einfo "" + einfo "...and edit the files in the 'templates'-subdirectory." + einfo "" + + # + # MTA config + # TODO: qmail exim sendmail + # + + if use postfix; then + echo + einfo "" + einfo "MTA configuration (Postfix)" + einfo "===========================" + einfo "" + einfo "See INSTALL.postfix. Quickstart:" + einfo "" + einfo "1) Add the following line to /etc/postfix/main.cf:" + einfo "" + einfo "\tcontent_filter = smtp:127.0.0.1:10024" + einfo "" + einfo "2) Add the following line to /etc/postfix/master.cf:" + einfo "" + einfo "\tlocalhost:10025 inet n - y - - smtpd -o content_filter=" + einfo "" + fi + +} diff --git a/app-antivirus/antivir-mailgate/antivir-mailgate-3.0.0_p14.ebuild b/app-antivirus/antivir-mailgate/antivir-mailgate-3.0.0_p14.ebuild new file mode 100644 index 0000000..83eccad --- /dev/null +++ b/app-antivirus/antivir-mailgate/antivir-mailgate-3.0.0_p14.ebuild @@ -0,0 +1,368 @@ +# Copyright 1999-2009 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ +## +## Created by Wolfram Schlich <wschlich@gentoo.org> +## +## TODO +## - install: shutdown running programs? +## - install: show EULA?! +## - config: setup avmailgate.acl? +## - install/config: copy keyfile? +## - config: setup mta config? -> show INSTALL.$mta file, at least +## - install/config: avguard? -> check if avspooldir is excluded in guard config +## - install/config: gui? +## + +inherit eutils pax-utils + +DESCRIPTION="AVIRA AntiVir MailGate SMTP mail virus scanner" +MY_P="${PN}-prof-${PV/_p/-}" +SRC_URI="http://wolfram.schlich.org/linux/gentoo/distfiles/${MY_P}.tar.gz" +HOMEPAGE="http://www.avira.com/" +LICENSE="AVIRA-AntiVir" +SLOT="0" +KEYWORDS="~x86 ~amd64" +IUSE="postfix spamfilter" # TODO: gui exim qmail sendmail smc +DEPEND="" +RDEPEND=">=app-antivirus/antivir-savapi-3 + postfix? ( mail-mta/postfix )" +S="${WORKDIR}/${MY_P}" +# prevent installation functions from stripping binaries +# otherwise the antivir selfcheck fails. also don't try +# to fetch the distribution tarball from a mirror. +RESTRICT="strip mirror" + +# +# Settings overridable by user supplied environment variables +# + +AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}" +AVCONFDIR="${AVCONFDIR:-/etc}" +AVSPOOLDIR="${AVSPOOLDIR:-/var/spool/avmailgate}" +AVTMPDIR="${AVTMPDIR:-/var/tmp}" +AVPIDDIR="${AVPIDDIR:-/var/tmp}" +AVSAVAPISOCKET="${AVSAVAPISOCKET:-/var/run/avmailgate/scanner}" +AVUSER="${AVUSER:-avgate}" +AVUID="${AVUID:-220}" +AVSH="${AVSH:--1}" +AVGROUP="${AVGROUP:-antivir}" +AVGID="${AVGID:-220}" +AVHOSTNAME="${AVHOSTNAME:-$(hostname -f)}" + +# +# Standard ebuild functions +# + +pkg_setup() { + + # + # Add USER + GROUP + # + + enewgroup "${AVGROUP}" "${AVGID}" + enewuser "${AVUSER}" "${AVUID}" "${AVSH}" -1 "${AVGROUP}" -c AntiVir + +} + +src_unpack() { + + unpack ${A} + cd "${S}" + + # + # MTA specific config + # + + if use postfix; then + pushd ./etc >/dev/null \ + && epatch "${FILESDIR}/${PV}/avmailgate.conf.diff.postfix.bz2" \ + && popd >/dev/null + fi + + # + # scanner config + # + + pushd ./etc >/dev/null \ + && epatch "${FILESDIR}/${PV}/avmailgate-scanner.conf.diff.bz2" \ + && popd >/dev/null + +} + +src_install() { + + # + # Base directories + # + + if use spamfilter; then + diropts -oroot -g"${AVGROUP}" -m0750 + dodir /var/tmp/AntiVir + diropts -o"${AVUSER}" -g"${AVGROUP}" -m0750 + dodir /var/tmp/AntiVir/asmailgate + diropts "" + fi + + # + # Executables, libraries and misc components + # + + exeinto "${AVHOMEDIR}" + exeopts -oroot -g"${AVGROUP}" -m2750 + doexe bin/linux_glibc22/avmailgate.bin + exeopts -oroot -g"${AVGROUP}" -m0750 + newexe script/avira_start.sh.template avmailgate + doexe script/avmailgate_start.sh + doexe script/avmailgate_stop.sh + doexe script/avmailgate_restart.sh + doexe script/avmailgate_post.sh + diropts "" + dodir "${DESTTREE}/sbin" + dosym "${AVHOMEDIR}/avmailgate.bin" "${DESTTREE}/sbin/avmailgate" + if use spamfilter; then + exeopts -o"${AVUSER}" -g"${AVGROUP}" -m2750 + exeinto "${AVHOMEDIR}" + doexe contrib/asmailgate/bin/linux_glibc22/avmg_ext_filter.bin + insopts -o"${AVUSER}" -g"${AVGROUP}" -m0644 + insinto "${AVHOMEDIR}" + doins contrib/asmailgate/bin/linux_glibc22/libasmailgate.so + doins contrib/asmailgate/data/asmailgate.dat + fi + + # + # Init script + # + + exeopts -oroot -groot -m0755 + exeinto /etc/init.d + newexe "${FILESDIR}/${PV}/antivir-mailgate.initd" antivir-mailgate + + # + # Config + # + + insopts -oroot -g"${AVGROUP}" -m0640 + insinto "${AVCONFDIR}" + doins \ + etc/avmailgate.acl \ + etc/avmailgate.conf \ + etc/avmailgate.ignore \ + etc/avmailgate.scan \ + etc/avmailgate.warn +# use gui && doins etc/avmailgate.conf-gui + dosed "s:%AVHOMEDIR%:${AVHOMEDIR}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVCONFDIR%:${AVCONFDIR}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVSPOOLDIR%:${AVSPOOLDIR}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVPIDDIR%:${AVPIDDIR}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVSAVAPISOCKET%:${AVSAVAPISOCKET}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVUSER%:${AVUSER}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVGROUP%:${AVGROUP}:g" "${AVCONFDIR}/avmailgate.conf" + dosed "s:%AVHOSTNAME%:${AVHOSTNAME}:g" "${AVCONFDIR}/avmailgate.conf" + + doins etc/avmailgate-scanner.conf + dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/avmailgate-scanner.conf" + dosed "s:%AVSAVAPISOCKET%:${AVSAVAPISOCKET}:g" "${AVCONFDIR}/avmailgate-scanner.conf" + dosed "s:%AVUSER%:${AVUSER}:g" "${AVCONFDIR}/avmailgate-scanner.conf" + dosed "s:%AVGROUP%:${AVGROUP}:g" "${AVCONFDIR}/avmailgate-scanner.conf" + + if use spamfilter; then + dosed "s:^EnableSpamCheck NO:EnableSpamCheck YES:g" "${AVCONFDIR}/avmailgate.conf" + touch "${T}/asmailgate.except" + doins "${T}/asmailgate.except" + fi + + # + # Spool directory + # + + diropts -o"${AVUSER}" -g"${AVGROUP}" -m0700 + dodir "${AVSPOOLDIR}" + keepdir "${AVSPOOLDIR}" + for dir in incoming outgoing rejected; do + dodir "${AVSPOOLDIR}/${dir}" + keepdir "${AVSPOOLDIR}/${dir}" + done + + ## TODO:GUI + + ## TODO:SMC + + # + # Documents + # + + dodoc \ + LICENSE \ + LICENSE.DE \ + README \ + doc/CHANGELOG \ + doc/INSTALL \ + doc/INSTALL.DE \ + doc/MANUAL \ + doc/RELEASE_NOTES \ + doc/avmailgate_en.pdf \ + legal/LICENSE.* + use postfix && dodoc \ + doc/INSTALL.postfix +# use exim && dodoc \ +# doc/INSTALL.exim +# use sendmail && dodoc \ +# doc/INSTALL.sendmail +# use qmail && dodoc \ +# doc/INSTALL.qmail +# use qmail && use gui && dodoc \ +# doc/INSTALL.qmail.gui + doman \ + doc/man/avmailgate.8 \ + doc/man/avmailgate.conf.5 + + # + # Templates + # + + diropts "" + dodir "${AVHOMEDIR}/templates.sample" + insopts "" + insinto "${AVHOMEDIR}/templates.sample" + doins \ + templates/en/patho-administrator \ + templates/en/patho-recipient \ + templates/en/patho-sender \ + templates/en/alert-administrator \ + templates/en/alert-recipient \ + templates/en/alert-sender + if use spamfilter; then + doins \ + templates/spamfilter-subjects + fi + +} + +pkg_preinst() { + + # + # Check for legacy files + # + + # Templates: virus-* -> alert-* + for t in administrator recipient sender; do + tf="${AVHOMEDIR}/templates/virus-${t}" + new_tf="${AVHOMEDIR}/templates/alert-${t}" + if [ -e "${tf}" ]; then + ewarn + ewarn "You have an old notification mail template file in ${AVHOMEDIR}/templates/:" + ewarn " -> ${tf}" + ewarn "Please rename it as follows:" + ewarn " -> ${new_tf}" + ewarn + fi + done + +} + +pkg_postinst() { + + # + # Config + # + + echo + einfo "" + einfo "Configuration" + einfo "=============" + einfo "" + einfo "Please run..." + einfo "" + einfo "\tebuild /var/db/pkg/${CATEGORY}/${PF}/${PF}.ebuild config" + einfo "" + einfo "...to configure the package!" + einfo "" + echo + +} + +pkg_config() { + + # + # Init script + # + + echo + einfo "" + einfo "Using the init script" + einfo "=====================" + einfo "" + einfo "Simply run..." + einfo "" + einfo "\trc-update add antivir-mailgate default" + einfo "" + einfo "...and your're done." + einfo "" + + # + # Templates + # + + echo + einfo "" + einfo "Using the notification mail templates" + einfo "=====================================" + einfo "" + einfo "The sample templates were installed into" + einfo "" + einfo "\t${AVHOMEDIR}/templates.sample" + einfo "" + einfo "To use them, simply do..." + einfo "" + einfo "\tcd ${AVHOMEDIR}" + einfo "\tmv templates.sample templates" + einfo "" + einfo "...and edit the files in the 'templates'-subdirectory." + einfo "" + + # + # MTA config + # TODO: qmail exim sendmail + # + + if use postfix; then + echo + einfo "" + einfo "MTA configuration (Postfix)" + einfo "===========================" + einfo "" + einfo "See INSTALL.postfix. Quickstart:" + einfo "" + einfo "1) Add the following line to /etc/postfix/main.cf:" + einfo "" + einfo "\tcontent_filter = smtp:127.0.0.1:10024" + einfo "" + einfo "2) Add the following line to /etc/postfix/master.cf:" + einfo "" + einfo "\tlocalhost:10025 inet n - y - - smtpd -o content_filter=" + einfo "" + fi + + # + # Automatic updates + # Generate a random number between 1 and 59 for the crontab + # + + rand="$$$(date +%s)" + min="$[ ($rand % 59) + 1 ]" + echo + einfo "" + einfo "Using the internet updater" + einfo "==========================" + einfo "" + einfo "Add the following line to your /etc/crontab or a new file" + einfo "in /etc/cron.d/ to make AntiVir check for updates" + einfo "${min} minutes after every full hour:" + einfo "" + einfo "\t${min} * * * * root exec ${AVHOMEDIR}/avupdate --product=mailgate >/dev/null" + einfo "" + echo + +} diff --git a/app-antivirus/antivir-mailgate/files/2.1.4_p7/antivir-mailgate.init.d b/app-antivirus/antivir-mailgate/files/2.1.4_p7/antivir-mailgate.init.d new file mode 100755 index 0000000..2c7d466 --- /dev/null +++ b/app-antivirus/antivir-mailgate/files/2.1.4_p7/antivir-mailgate.init.d @@ -0,0 +1,46 @@ +#!/sbin/runscript +## 2003 by H+BEDV Datentechnik GmbH, +## Wolfram Schlich <wschlich@antivir.de> + +svc_name="AntiVir MailGate" + +## required binaries +avmailgate_bin="/usr/lib/AntiVir/avmailgate.bin" + +## required config files +avmailgate_cfg="/etc/avmailgate.conf" +avmailgate_acl="/etc/avmailgate.acl" + +depend() { + need net + use logger dns +} + +checkconfig() { + if [ ! -x "${avmailgate_bin}" ]; then + eerror "avmailgate binary [${avmailgate_bin}] missing" + return 1 + fi + if [ ! -r "${avmailgate_cfg}" ]; then + eerror "avmailgate config [${avmailgate_cfg}] missing" + return 1 + fi + if [ ! -r "${avmailgate_acl}" ]; then + eerror "avmailgate acl [${avmailgate_acl}] missing" + return 1 + fi +} + +start() { + checkconfig || return 1 + ebegin "Starting ${svc_name}" + "${avmailgate_bin}" --start + eend $? +} + +stop() { + checkconfig || return 2 + ebegin "Stopping ${svc_name}" + "${avmailgate_bin}" --stop + eend $? +} diff --git a/app-antivirus/antivir-mailgate/files/2.1.4_p7/avmailgate.conf.diff.postfix.bz2 b/app-antivirus/antivir-mailgate/files/2.1.4_p7/avmailgate.conf.diff.postfix.bz2 Binary files differnew file mode 100644 index 0000000..f0ede41 --- /dev/null +++ b/app-antivirus/antivir-mailgate/files/2.1.4_p7/avmailgate.conf.diff.postfix.bz2 diff --git a/app-antivirus/antivir-mailgate/files/2.1.4_p7/avupdater.conf b/app-antivirus/antivir-mailgate/files/2.1.4_p7/avupdater.conf new file mode 100755 index 0000000..1453987 --- /dev/null +++ b/app-antivirus/antivir-mailgate/files/2.1.4_p7/avupdater.conf @@ -0,0 +1,26 @@ +## reporting via mail +EmailTo postmaster + +## logging +#LogTo /var/log/antivir.log +SyslogFacility user +SyslogPriority notice + +## proxy server +#HTTPProxyServer proxy.example.com +#HTTPProxyPort 3128 +#HTTPProxyUsername username +#HTTPProxyPassword password + +## general update settings +#HTTPUpdateServer http://antivir.example.com +#UpdaterKeepsBackups + +## avupdater (better use cron) +#AutoUpdateEvery2Hours +#AutoUpdateDaily +#AutoUpdateTime 4:23 + +## GPG (for verification of signed binaries) +GnuPGBinary /usr/bin/gpg +GnuPGOptions --keyserver x-hkp://subkeys.pgp.net --keyserver-options auto-key-retrieve,honor-http-proxy,verbose diff --git a/app-antivirus/antivir-mailgate/files/3.0.0_p14/antivir-mailgate.initd b/app-antivirus/antivir-mailgate/files/3.0.0_p14/antivir-mailgate.initd new file mode 100755 index 0000000..f1cb9b8 --- /dev/null +++ b/app-antivirus/antivir-mailgate/files/3.0.0_p14/antivir-mailgate.initd @@ -0,0 +1,44 @@ +#!/sbin/runscript + +svc_name="AntiVir MailGate" + +## required executables +antivir_mailgate_script="/usr/lib/AntiVir/avmailgate" + +## required config files +antivir_mailgate_cfg="/etc/avmailgate.conf" +antivir_mailgate_acl="/etc/avmailgate.acl" + +depend() { + need net + use logger dns +} + +checkconfig() { + if [ ! -x "${antivir_mailgate_script}" ]; then + eerror "AntiVir MailGate script [${antivir_mailgate_script}] missing" + return 1 + fi + if [ ! -r "${antivir_mailgate_cfg}" ]; then + eerror "AntiVir MailGate config [${antivir_mailgate_cfg}] missing" + return 1 + fi + if [ ! -r "${antivir_mailgate_acl}" ]; then + eerror "AntiVir MailGate ACL [${antivir_mailgate_acl}] missing" + return 1 + fi +} + +start() { + checkconfig || return 1 + ebegin "Starting ${svc_name}" + "${antivir_mailgate_script}" start + eend $? +} + +stop() { + checkconfig || return 1 + ebegin "Stopping ${svc_name}" + "${antivir_mailgate_script}" stop + eend $? +} diff --git a/app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate-scanner.conf.diff.bz2 b/app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate-scanner.conf.diff.bz2 Binary files differnew file mode 100644 index 0000000..19c85a3 --- /dev/null +++ b/app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate-scanner.conf.diff.bz2 diff --git a/app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate.conf.diff.postfix.bz2 b/app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate.conf.diff.postfix.bz2 Binary files differnew file mode 100644 index 0000000..2347478 --- /dev/null +++ b/app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate.conf.diff.postfix.bz2 diff --git a/app-antivirus/antivir-mailgate/metadata.xml b/app-antivirus/antivir-mailgate/metadata.xml new file mode 100644 index 0000000..a7162e9 --- /dev/null +++ b/app-antivirus/antivir-mailgate/metadata.xml @@ -0,0 +1,10 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> +<herd>no-herd</herd> +<maintainer> + <email>wschlich@gentoo.org</email> + <name>Wolfram Schlich</name> + <description>Primary maintainer</description> +</maintainer> +</pkgmetadata> diff --git a/app-antivirus/antivir-savapi/ChangeLog b/app-antivirus/antivir-savapi/ChangeLog new file mode 100644 index 0000000..d6677eb --- /dev/null +++ b/app-antivirus/antivir-savapi/ChangeLog @@ -0,0 +1,15 @@ +# ChangeLog for app-antivirus/antivir-savapi +# Copyright 1999-2009 Gentoo Foundation; Distributed under the GPL v2 +# $Header: $ + + 02 Jun 2009; Wolfram Schlich <wschlich@gentoo.org> + +files/3.0.5.17/antivir-savapi.conf, +files/3.0.5.17/antivir-savapi.initd, + +files/3.0.5.17/avupdate.conf, +antivir-savapi-3.0.5.17.ebuild: + version bump + + 04 Mar 2009; Wolfram Schlich <wschlich@gentoo.org> + +files/3.0.4_p32/antivir-savapi.conf, + +files/3.0.4_p32/antivir-savapi.initd, +files/3.0.4_p32/avupdate.conf, + +metadata.xml, +antivir-savapi-3.0.4_p32.ebuild: + initial import + diff --git a/app-antivirus/antivir-savapi/Manifest b/app-antivirus/antivir-savapi/Manifest new file mode 100644 index 0000000..0269fdd --- /dev/null +++ b/app-antivirus/antivir-savapi/Manifest @@ -0,0 +1,12 @@ +AUX 3.0.4_p32/antivir-savapi.conf 4060 RMD160 69bcb774bb52a9204f4aea6f46f8edd52cb0eed5 SHA1 688f3a4647f0e9199bf987d6070942e8213e247a SHA256 28ff617e5897f95a5a90c73b6469facd69deda717dd3fb680acdc8f9cf3c8370 +AUX 3.0.4_p32/antivir-savapi.initd 1196 RMD160 998f1e154faea52ee829241dfc7b68c8dc020ed7 SHA1 38edb72f6a5993649eb47140cc125e20f8411d06 SHA256 50e39ef969836c38eacf3aa39ce4bf8266e9ade9107837dd21c85670f35caefb +AUX 3.0.4_p32/avupdate.conf 1818 RMD160 d119181616626b8baa0011e9f5ad65c21cc97ba9 SHA1 73d442a204d1337e214922093c12f9b4b2190c56 SHA256 54a3828786a5168068e663f654c6d9caa7d00fcd3e510d034fbb725915b64c53 +AUX 3.0.5.17/antivir-savapi.conf 4060 RMD160 69bcb774bb52a9204f4aea6f46f8edd52cb0eed5 SHA1 688f3a4647f0e9199bf987d6070942e8213e247a SHA256 28ff617e5897f95a5a90c73b6469facd69deda717dd3fb680acdc8f9cf3c8370 +AUX 3.0.5.17/antivir-savapi.initd 1196 RMD160 998f1e154faea52ee829241dfc7b68c8dc020ed7 SHA1 38edb72f6a5993649eb47140cc125e20f8411d06 SHA256 50e39ef969836c38eacf3aa39ce4bf8266e9ade9107837dd21c85670f35caefb +AUX 3.0.5.17/avupdate.conf 1818 RMD160 5215f87c342e8f46d8a0645d9441c2cd42a760db SHA1 5a0e874d5118dd9897b25c8dfe8f07396acbc072 SHA256 ed27fb1a8b504e9b8511c1077c0faad5e9e9a4b0bb0db9183e43c6a6afe5b070 +DIST antivir-mailgate-prof.tgz 31856751 RMD160 20ad6af92fdef49145bbffdf2376a955110e9892 SHA1 457c617e57d38e8e3d2f95ecc1d16bf347d967d4 SHA256 0df70bb0e4c6612c2c7a678f41648d8d23951c564a0dd4ea52f96f4c656abb0a +DIST antivir-server-prof.tar.gz 44063389 RMD160 ea8ae5318b4a091b0188bfa76e0779d334f5c83b SHA1 73deea933d83759cf78629661a9e2b1054accbbb SHA256 dcf884b8d1fb0ae5d532e226ff82d54d10fb1e4847aa8a7d40b8c84e658893df +EBUILD antivir-savapi-3.0.4_p32.ebuild 3881 RMD160 161f5a458199c4ae0c02bca75b49a5c52b61986d SHA1 27dda7b84e0ada649b2c63fbff993ffa190822f5 SHA256 5f64360c5f33b0e4c896bbd83c4db83b693f38c67dc22f05d15a0944e741f791 +EBUILD antivir-savapi-3.0.5.17.ebuild 3615 RMD160 2eafe87762d43e39d731947e5812911420e379ea SHA1 992327773338f001cde6a69780f39bc4e9207378 SHA256 ca9ef23ed1006214e64d81a4a3556840af2b7d07a237df72c7343fcf7c7f1031 +MISC ChangeLog 576 RMD160 137fce0d351a9af9cd265faabec77c8c965a87cc SHA1 d0d89cacb6530d173bb47f365ea78197ec8df96a SHA256 6e1470342b4964a5f82dd90df1d7a27e37150baf749be713cae07e0d9c1fbd87 +MISC metadata.xml 300 RMD160 3b9c1cd628f9d7ac94b68543ec737d5c2381a47e SHA1 33c5efd31a8aa789118535b921e211ffb5023ac3 SHA256 bc07a9aecce5770d1ace9af0a6c6af8ff6c7b16eb5e7947a1b178d1970855e43 diff --git a/app-antivirus/antivir-savapi/antivir-savapi-3.0.4_p32.ebuild b/app-antivirus/antivir-savapi/antivir-savapi-3.0.4_p32.ebuild new file mode 100644 index 0000000..5aaf343 --- /dev/null +++ b/app-antivirus/antivir-savapi/antivir-savapi-3.0.4_p32.ebuild @@ -0,0 +1,154 @@ +# Copyright 1999-2009 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ +## +## Created by Wolfram Schlich <wschlich@gentoo.org> +## +## TODO +## - install: shutdown running programs? +## - install: show EULA?! +## - install/config: copy keyfile? +## + +inherit eutils + +DESCRIPTION="AVIRA AntiVir virus scanner (SAVAPI)" +#MY_P="${PN/savapi/mailgate}-prof-${PV/_p/-}" +MY_P="${PN/savapi/mailgate}-prof-3.0.0-14" +MY_P2="${PN/savapi/mailgate}-prof" +SRC_URI="http://dl1.pro.antivir.de/package/mailgate/unix/en/${MY_P2}.tgz" +#SRC_URI="http://storage.bu.avira.com/pub/savapi/2008.10.07/savapi3-${PV/_p/.}-linux_glibc22.zip" +HOMEPAGE="http://www.avira.com/" +LICENSE="AVIRA-AntiVir" +SLOT="0" +KEYWORDS="~x86 ~amd64" +IUSE="" +DEPEND="" +RDEPEND="" +S="${WORKDIR}/${MY_P}" +#S="${WORKDIR}" +# prevent installation functions from stripping binaries +# otherwise the antivir selfcheck fails. also don't try +# to fetch the distribution tarball from a mirror. +RESTRICT="strip mirror" + +# +# Settings overridable by user supplied environment variables +# + +AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}" +AVCONFDIR="${AVCONFDIR:-/etc/avira}" +AVTMPDIR="${AVTMPDIR:-/var/tmp}" +#AVSAVAPISOCKET="${AVSAVAPISOCKET:-/var/run/antivir-savapi/scanner}" +#AVUSER="${AVUSER:-avgate}" +#AVUID="${AVUID:-220}" +#AVSH="${AVSH:--1}" +AVGROUP="${AVGROUP:-antivir}" +AVGID="${AVGID:-220}" + +# +# Standard ebuild functions +# + +pkg_setup() { + + # + # Add USER + GROUP + # + + enewgroup "${AVGROUP}" "${AVGID}" +# enewuser "${AVUSER}" "${AVUID}" "${AVSH}" -1 "${AVGROUP}" -c AntiVir + +} + +src_unpack() { + unpack ${A} + cd "${S}" +# ln -s . bin; ln -s . linux_glibc22 +} + +src_install () { + + # + # Home directory + # + + diropts -oroot -groot -m0755 + dodir "${AVHOMEDIR}" + diropts -oroot -g"${AVGROUP}" -m0770 + insinto "${AVHOMEDIR}" + insopts -oroot -g"${AVGROUP}" -m0644 + + # + # Executables, libraries and misc components + # + + exeinto "${AVHOMEDIR}" + exeopts -oroot -g"${AVGROUP}" -m2755 + doexe bin/linux_glibc22/savapi + doexe bin/linux_glibc22/avupdate.bin + doexe bin/linux_glibc22/avlinfo + exeopts -oroot -g"${AVGROUP}" -m0755 + doexe script/savapi3_reload.sh + doexe script/savapi3_post.sh + doexe script/avupdate + doexe script/post_install.sh + doins bin/linux_glibc22/avupdate_msg.avr + doins bin/linux_glibc22/ae*.so + doins bin/linux_glibc22/ae*.dat + lv=$(cd bin/linux_glibc22; ls -1 libsavapi3.so.*); lv=${lv##*.so.} + doins bin/linux_glibc22/libsavapi3.so.${lv} + dosym libsavapi3.so.${lv} "${AVHOMEDIR}"/libsavapi3.so + diropts "" + dodir "${DESTTREE}/bin" + dosym "${AVHOMEDIR}/savapi" "${DESTTREE}/bin/savapi" + + # + # Init script + # + +# exeopts -oroot -groot -m0755 +# exeinto /etc/init.d +# newexe "${FILESDIR}/${PV}/antivir-savapi.initd" antivir-savapi + + # + # Config + # + + insopts -oroot -g"${AVGROUP}" -m0640 +# insinto "${AVCONFDIR}" +# doins "${FILESDIR}"/${PV}/antivir-savapi.conf +# dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/antivir-savapi.conf" +# dosed "s:%AVSAVAPISOCKET%:${AVSAVAPISOCKET}:g" "${AVCONFDIR}/antivir-savapi.conf" +# dosed "s:%AVUSER%:${AVUSER}:g" "${AVCONFDIR}/antivir-savapi.conf" +# dosed "s:%AVGROUP%:${AVGROUP}:g" "${AVCONFDIR}/antivir-savapi.conf" + insinto "${AVCONFDIR}" + doins "${FILESDIR}"/${PV}/avupdate.conf + dosed "s:%AVHOMEDIR%:${AVHOMEDIR}:g" "${AVCONFDIR}/avupdate.conf" + dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/avupdate.conf" + +} + +pkg_config () { + + # + # Automatic updates + # Generate a random number between 1 and 59 for the crontab + # + + rand="$$$(date +%s)" + min="$[ ($rand % 59) + 1 ]" + echo + einfo "" + einfo "Using the internet updater" + einfo "==========================" + einfo "" + einfo "Add the following line to your /etc/crontab or a new file" + einfo "in /etc/cron.d/ to make AntiVir check for updates" + einfo "${min} minutes after every full hour:" + einfo "" + einfo "\t${min} * * * * root exec ${AVHOMEDIR}/avupdate --product=scanner >/dev/null" + einfo "" + echo + +} diff --git a/app-antivirus/antivir-savapi/antivir-savapi-3.0.5.17.ebuild b/app-antivirus/antivir-savapi/antivir-savapi-3.0.5.17.ebuild new file mode 100644 index 0000000..08a1da3 --- /dev/null +++ b/app-antivirus/antivir-savapi/antivir-savapi-3.0.5.17.ebuild @@ -0,0 +1,144 @@ +# Copyright 1999-2009 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ +## +## Created by Wolfram Schlich <wschlich@gentoo.org> +## +## TODO +## - install: shutdown running programs? +## - install: show EULA?! +## - install/config: copy keyfile? +## + +inherit eutils + +DESCRIPTION="AVIRA AntiVir virus scanner (SAVAPI)" +MY_P="${PN/savapi/server}-prof-3.0.2-5" +SRC_URI="http://dl1.pro.antivir.de/package/srv_avira/unix/en/prof/antivir-server-prof.tar.gz" +HOMEPAGE="http://www.avira.com/" +LICENSE="AVIRA-AntiVir" +SLOT="0" +KEYWORDS="~x86 ~amd64" +IUSE="" +DEPEND="" +RDEPEND="" +S="${WORKDIR}/${MY_P}" +#S="${WORKDIR}" +# prevent installation functions from stripping binaries +# otherwise the antivir selfcheck fails. also don't try +# to fetch the distribution tarball from a mirror. +RESTRICT="strip mirror binchecks" + +# +# Settings overridable by user supplied environment variables +# + +AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}" +AVCONFDIR="${AVCONFDIR:-/etc/avira}" +AVTMPDIR="${AVTMPDIR:-/var/tmp}" +#AVSAVAPISOCKET="${AVSAVAPISOCKET:-/var/run/antivir-savapi/scanner}" +#AVUSER="${AVUSER:-avgate}" +#AVUID="${AVUID:-220}" +#AVSH="${AVSH:--1}" +AVGROUP="${AVGROUP:-antivir}" +AVGID="${AVGID:-220}" + +# +# Standard ebuild functions +# + +pkg_setup() { + + # + # Add USER + GROUP + # + + enewgroup "${AVGROUP}" "${AVGID}" +# enewuser "${AVUSER}" "${AVUID}" "${AVSH}" -1 "${AVGROUP}" -c AntiVir + +} + +src_install () { + + # + # Home directory + # + + diropts -oroot -groot -m0755 + dodir "${AVHOMEDIR}" + diropts -oroot -g"${AVGROUP}" -m0770 + insinto "${AVHOMEDIR}" + insopts -oroot -g"${AVGROUP}" -m0644 + + # + # Executables, libraries and misc components + # + + exeinto "${AVHOMEDIR}" + exeopts -oroot -g"${AVGROUP}" -m2755 + doexe bin/linux_glibc22/savapi + doexe bin/linux_glibc22/avupdate.bin + doexe bin/linux_glibc22/avlinfo + exeopts -oroot -g"${AVGROUP}" -m0755 + doexe script/savapi3_reload.sh + doexe script/savapi3_post.sh + doexe script/avupdate + doexe script/post_install.sh + doins bin/linux_glibc22/avupdate_msg.avr + doins bin/linux_glibc22/ae*.so + doins bin/linux_glibc22/ae*.dat + lv=$(cd bin/linux_glibc22; ls -1 libsavapi3.so.*); lv=${lv##*.so.} + doins bin/linux_glibc22/libsavapi3.so.${lv} + dosym libsavapi3.so.${lv} "${AVHOMEDIR}"/libsavapi3.so + diropts "" + dodir "${DESTTREE}/bin" + dosym "${AVHOMEDIR}/savapi" "${DESTTREE}/bin/savapi" + + # + # Init script + # + +# exeopts -oroot -groot -m0755 +# exeinto /etc/init.d +# newexe "${FILESDIR}/${PV}/antivir-savapi.initd" antivir-savapi + + # + # Config + # + + insopts -oroot -g"${AVGROUP}" -m0640 +# insinto "${AVCONFDIR}" +# doins "${FILESDIR}"/${PV}/antivir-savapi.conf +# dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/antivir-savapi.conf" +# dosed "s:%AVSAVAPISOCKET%:${AVSAVAPISOCKET}:g" "${AVCONFDIR}/antivir-savapi.conf" +# dosed "s:%AVUSER%:${AVUSER}:g" "${AVCONFDIR}/antivir-savapi.conf" +# dosed "s:%AVGROUP%:${AVGROUP}:g" "${AVCONFDIR}/antivir-savapi.conf" + insinto "${AVCONFDIR}" + doins "${FILESDIR}"/${PV}/avupdate.conf + dosed "s:%AVHOMEDIR%:${AVHOMEDIR}:g" "${AVCONFDIR}/avupdate.conf" + dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/avupdate.conf" + +} + +pkg_config () { + + # + # Automatic updates + # + + rand="$(date +%N 2>/dev/null)" + min="$[ (${rand:-${RANDOM}} % 59) + 1 ]" + echo + einfo "" + einfo "Using the internet updater" + einfo "==========================" + einfo "" + einfo "Add the following line to your /etc/crontab or a new file" + einfo "in /etc/cron.d/ to make AntiVir check for updates" + einfo "${min} minutes after every full hour:" + einfo "" + einfo " ${min} * * * * root exec ${AVHOMEDIR}/avupdate --product=signatures >/dev/null" + einfo "" + echo + +} diff --git a/app-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.conf b/app-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.conf new file mode 100644 index 0000000..7edf089 --- /dev/null +++ b/app-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.conf @@ -0,0 +1,149 @@ +# This is the SAVAPI scanner backend configuration file. +# It is used to set values for scanner specific +# options. + +# --------------------------------------------------------------------- +# SocketPermissions [mode] +# +# The permissions of the scanner backend's socket. + +SocketPermissions 0660 + + +# --------------------------------------------------------------------- +# ListenAddress [address] +# +# The socket on which the scanner will listen for scan requests. +# +# IMPORTANT: +# +# When changing this option, you also have to change the option +# "ScannerListenAddress" in MailGate's configuration file +# (default /etc/avmailgate.conf). + +ListenAddress unix:%AVSAVAPISOCKET% + + +# -------------------------------------------------------------------- +# User [user] +# +# The user the scanner runs as. +# +# IMPORTANT: +# +# When changing this option, you also have to change the option +# "User" in MailGate's configuration file +# (default /etc/avmailgate.conf). Changing this option has several +# side effects with MailGate. You have to make sure that all +# directories and files are still accessible to this user. +# Please see the file "MANUAL" in the package for details. + +User %AVUSER% + + +# -------------------------------------------------------------------- +# Group [group] +# +# The group the scanner runs as. +# +# IMPORTANT: +# +# When changing this option, you also have to change the option +# "Group" in MailGate's configuration file +# (default /etc/avmailgate.conf). Changing this option has several +# side effects with MailGate. You have to make sure that all +# directories and files are still accessible to this user. +# Please see the file "MANUAL" in the package for details. + +Group %AVGROUP% + + +# -------------------------------------------------------------------- +# UseSavapiProxy [0|1] +# +# The proxy feature in SAVAPI performs scans more efficiently +# by using and reusing a prepared pool of scanners. While this +# pool increases throughput this feature requires the pool size +# to be wisely chosen -- too many scanners will put load on the +# machine without gaining more performance, too few scanners may +# have the SAVAPI using applications wait unnecessarily. +# +# Default: UseSavapiProxy 0 + +UseSavapiProxy 1 + +# -------------------------------------------------------------------- +# PoolScanners [integer] +# +# The number of prepared AntiVir scanners in the pool. +# See option "UseSavapiProxy". +# +# Default: PoolScanners 24 + +PoolScanners 24 + +# -------------------------------------------------------------------- +# PoolConnections [integer] +# +# The maximum number of simultaneous allowed connections +# from Avira MailGate to the scanner pool. +# +# Default: PoolConnections 8 + +PoolConnections 8 + +# -------------------------------------------------------------------- +# SyslogFacility [facility] +# +# The facility that is used to when logging to syslog. + +SyslogFacility daemon + + +# -------------------------------------------------------------------- +# ReportLevel [integer] +# +# The report level sets the log verbosity of the scanner backend. +# Available values: +# +# 0 Log errors +# 1 Log errors and alerts +# 2 Log errors, alerts and warnings +# 3 Log errors, alerts, warnings and debug messages +# +# ("alerts" is information about potential malicious code). +# +# Default: 0 + +ReportLevel 2 + + +# -------------------------------------------------------------------- +# ScanTemp [path] +# +# The directory used by the scanner to store temporary files like +# extracted files from archives. +# It's also used for other temporary files like lock files. +# +# NOTE: +# +# The scanner backend does not recognize the environment variable +# "TMPDIR". +# +# IMPORTANT: +# +# You should also change the option "TemporaryDir" in MailGate's +# configuration file (default /etc/avmailgate.conf) when changing the +# option "ScanTemp". +# You're then sure that both components use the same temporary +# directory. + +ScanTemp %AVTMPDIR% + + +# -------------------------------------------------------------------- +# LogFileName [path] +# +# Path to a specific log file. + +# Default: LogFileName /path/to/logfile diff --git a/app-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.initd b/app-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.initd new file mode 100755 index 0000000..ca475d6 --- /dev/null +++ b/app-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.initd @@ -0,0 +1,59 @@ +#!/sbin/runscript + +svc_name="AntiVir SAVAPI" + +## required binaries +antivir_savapi_bin="/usr/lib/AntiVir/savapi" + +## required config files +antivir_savapi_cfg="/etc/antivir-savapi.conf" + +opts="${opts} reload" + +depend() { + need net + use logger dns +} + +checkconfig() { + if [ ! -x "${antivir_savapi_bin}" ]; then + eerror "SAVAPI binary [${antivir_savapi_bin}] missing" + return 1 + fi + if [ ! -r "${antivir_savapi_cfg}" ]; then + eerror "SAVAPI config [${antivir_savapi_cfg}] missing" + return 1 + fi +} + +start() { + checkconfig || return 1 + ebegin "Starting ${svc_name}" + "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \ + --allow-remote-shutdown &>/dev/null + eend $? +} + +stop() { + checkconfig || return 1 + ebegin "Stopping ${svc_name}" + "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \ + --stop &>/dev/null + eend $? +} + +reload() { + checkconfig || return 1 + ebegin "Reloading ${svc_name}" + "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \ + --reload-engine --allow-remote-shutdown &>/dev/null + eend $? +} + +status() { + checkconfig || return 1 + ebegin "Checking status of ${svc_name}" + "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \ + --status &>/dev/null + eend $? +} diff --git a/app-antivirus/antivir-savapi/files/3.0.4_p32/avupdate.conf b/app-antivirus/antivir-savapi/files/3.0.4_p32/avupdate.conf new file mode 100644 index 0000000..c0d1a0a --- /dev/null +++ b/app-antivirus/antivir-savapi/files/3.0.4_p32/avupdate.conf @@ -0,0 +1,61 @@ +# This configuration file updates the Engine and the Signatures automatically + +# The list of Internet update servers. +internet-srvs=http://dl1.pro.antivir.de,http://dl2.pro.antivir.de,http://dl3.pro.antivir.de,http://dl4.pro.antivir.de,http://dl1.antivir.net,http://dl2.antivir.net,http://dl3.antivir.net + +# Specifies the master.idx file. +master-file=/idx/master.idx + +# Specifies the installation directory for updated product files. +install-dir=%AVHOMEDIR% + +# Temporary directory for downloading update files. +temp-dir=%AVTMPDIR% + +# If auth-method is set in avupdate.conf, the Updater requires the smtp login data +#smtp-user= + +# If auth-method is set in avupdate.conf, the Updater requires the smtp login data +#smtp-password= + +# The smtp server for sending email notifications +smtp-server=127.0.0.1 + +# The smtp port for sending email notifications +smtp-port=25 + +# When set in avupdate.conf, the Updater requires the smtp login data: smtp-user +#auth-method= + +# HTTP +#username=http_user +#password=http_pass + +# HTTP proxy +#proxy-host=proxy.example.com +#proxy-port=3128 +#proxy-username=proxy_user +#proxy-password=proxy_pass + +# Requests +connect-timeout=30 +receive-timeout=30 +retries=2 +retry-timeout=60 + +# This option can have one of three values: +# - 0 - no email notifications are sent, +# - 1 - email notifications are sent in case of "successful update", "unsuccessful +# update", or "up to date". +# - 2 - email notification only in case of "unsuccessful update". +notify-when=2 + +# Receiver of the notification emails. +email-to=root@localhost + +# Specify a full path with a filename to which AntiVir Avupdate +# will write its log messages. +log=/var/log/avupdate.log +log-append +#log-rotate +log-template=${YEAR}-${MONTH}-${DAY} ${HOUR}:${MINUTE}:${SECOND}; ${FULLHOST}; ${SOURCE}.${LEVEL}; avupdate.bin[${PID}]; ${MSG} diff --git a/app-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.conf b/app-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.conf new file mode 100644 index 0000000..7edf089 --- /dev/null +++ b/app-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.conf @@ -0,0 +1,149 @@ +# This is the SAVAPI scanner backend configuration file. +# It is used to set values for scanner specific +# options. + +# --------------------------------------------------------------------- +# SocketPermissions [mode] +# +# The permissions of the scanner backend's socket. + +SocketPermissions 0660 + + +# --------------------------------------------------------------------- +# ListenAddress [address] +# +# The socket on which the scanner will listen for scan requests. +# +# IMPORTANT: +# +# When changing this option, you also have to change the option +# "ScannerListenAddress" in MailGate's configuration file +# (default /etc/avmailgate.conf). + +ListenAddress unix:%AVSAVAPISOCKET% + + +# -------------------------------------------------------------------- +# User [user] +# +# The user the scanner runs as. +# +# IMPORTANT: +# +# When changing this option, you also have to change the option +# "User" in MailGate's configuration file +# (default /etc/avmailgate.conf). Changing this option has several +# side effects with MailGate. You have to make sure that all +# directories and files are still accessible to this user. +# Please see the file "MANUAL" in the package for details. + +User %AVUSER% + + +# -------------------------------------------------------------------- +# Group [group] +# +# The group the scanner runs as. +# +# IMPORTANT: +# +# When changing this option, you also have to change the option +# "Group" in MailGate's configuration file +# (default /etc/avmailgate.conf). Changing this option has several +# side effects with MailGate. You have to make sure that all +# directories and files are still accessible to this user. +# Please see the file "MANUAL" in the package for details. + +Group %AVGROUP% + + +# -------------------------------------------------------------------- +# UseSavapiProxy [0|1] +# +# The proxy feature in SAVAPI performs scans more efficiently +# by using and reusing a prepared pool of scanners. While this +# pool increases throughput this feature requires the pool size +# to be wisely chosen -- too many scanners will put load on the +# machine without gaining more performance, too few scanners may +# have the SAVAPI using applications wait unnecessarily. +# +# Default: UseSavapiProxy 0 + +UseSavapiProxy 1 + +# -------------------------------------------------------------------- +# PoolScanners [integer] +# +# The number of prepared AntiVir scanners in the pool. +# See option "UseSavapiProxy". +# +# Default: PoolScanners 24 + +PoolScanners 24 + +# -------------------------------------------------------------------- +# PoolConnections [integer] +# +# The maximum number of simultaneous allowed connections +# from Avira MailGate to the scanner pool. +# +# Default: PoolConnections 8 + +PoolConnections 8 + +# -------------------------------------------------------------------- +# SyslogFacility [facility] +# +# The facility that is used to when logging to syslog. + +SyslogFacility daemon + + +# -------------------------------------------------------------------- +# ReportLevel [integer] +# +# The report level sets the log verbosity of the scanner backend. +# Available values: +# +# 0 Log errors +# 1 Log errors and alerts +# 2 Log errors, alerts and warnings +# 3 Log errors, alerts, warnings and debug messages +# +# ("alerts" is information about potential malicious code). +# +# Default: 0 + +ReportLevel 2 + + +# -------------------------------------------------------------------- +# ScanTemp [path] +# +# The directory used by the scanner to store temporary files like +# extracted files from archives. +# It's also used for other temporary files like lock files. +# +# NOTE: +# +# The scanner backend does not recognize the environment variable +# "TMPDIR". +# +# IMPORTANT: +# +# You should also change the option "TemporaryDir" in MailGate's +# configuration file (default /etc/avmailgate.conf) when changing the +# option "ScanTemp". +# You're then sure that both components use the same temporary +# directory. + +ScanTemp %AVTMPDIR% + + +# -------------------------------------------------------------------- +# LogFileName [path] +# +# Path to a specific log file. + +# Default: LogFileName /path/to/logfile diff --git a/app-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.initd b/app-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.initd new file mode 100755 index 0000000..ca475d6 --- /dev/null +++ b/app-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.initd @@ -0,0 +1,59 @@ +#!/sbin/runscript + +svc_name="AntiVir SAVAPI" + +## required binaries +antivir_savapi_bin="/usr/lib/AntiVir/savapi" + +## required config files +antivir_savapi_cfg="/etc/antivir-savapi.conf" + +opts="${opts} reload" + +depend() { + need net + use logger dns +} + +checkconfig() { + if [ ! -x "${antivir_savapi_bin}" ]; then + eerror "SAVAPI binary [${antivir_savapi_bin}] missing" + return 1 + fi + if [ ! -r "${antivir_savapi_cfg}" ]; then + eerror "SAVAPI config [${antivir_savapi_cfg}] missing" + return 1 + fi +} + +start() { + checkconfig || return 1 + ebegin "Starting ${svc_name}" + "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \ + --allow-remote-shutdown &>/dev/null + eend $? +} + +stop() { + checkconfig || return 1 + ebegin "Stopping ${svc_name}" + "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \ + --stop &>/dev/null + eend $? +} + +reload() { + checkconfig || return 1 + ebegin "Reloading ${svc_name}" + "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \ + --reload-engine --allow-remote-shutdown &>/dev/null + eend $? +} + +status() { + checkconfig || return 1 + ebegin "Checking status of ${svc_name}" + "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \ + --status &>/dev/null + eend $? +} diff --git a/app-antivirus/antivir-savapi/files/3.0.5.17/avupdate.conf b/app-antivirus/antivir-savapi/files/3.0.5.17/avupdate.conf new file mode 100644 index 0000000..14a1433 --- /dev/null +++ b/app-antivirus/antivir-savapi/files/3.0.5.17/avupdate.conf @@ -0,0 +1,61 @@ +# This configuration file updates the Engine and the Signatures automatically + +# The list of Internet update servers. +internet-srvs=http://dl1.pro.antivir.de,http://dl2.pro.antivir.de,http://dl3.pro.antivir.de,http://dl1.antivir.net,http://dl2.antivir.net,http://dl3.antivir.net + +# Specifies the master.idx file. +master-file=/idx/master.idx + +# Specifies the installation directory for updated product files. +install-dir=%AVHOMEDIR% + +# Temporary directory for downloading update files. +temp-dir=%AVTMPDIR% + +# If auth-method is set in avupdate.conf, the Updater requires the smtp login data +#smtp-user= + +# If auth-method is set in avupdate.conf, the Updater requires the smtp login data +#smtp-password= + +# The smtp server for sending email notifications +smtp-server=127.0.0.1 + +# The smtp port for sending email notifications +smtp-port=25 + +# When set in avupdate.conf, the Updater requires the smtp login data: smtp-user +#auth-method= + +# HTTP +#username=http_user +#password=http_pass + +# HTTP proxy +#proxy-host=proxy.example.com +#proxy-port=3128 +#proxy-username=proxy_user +#proxy-password=proxy_pass + +# Requests +connect-timeout=30 +receive-timeout=30 +retries=2 +retry-timeout=60 + +# This option can have one of three values: +# - 0 - no email notifications are sent, +# - 1 - email notifications are sent in case of "successful update", "unsuccessful +# update", or "up to date". +# - 2 - email notification only in case of "unsuccessful update". +notify-when=2 + +# Receiver of the notification emails. +email-to=root@localhost + +# Specify a full path with a filename to which AntiVir Avupdate +# will write its log messages. +log=/var/log/avupdate.log +log-append +#log-rotate +log-template=${YEAR}-${MONTH}-${DAY} ${HOUR}:${MINUTE}:${SECOND}; ${FULLHOST}; ${SOURCE}.${LEVEL}; avupdate.bin[${PID}]; ${MSG} diff --git a/app-antivirus/antivir-savapi/metadata.xml b/app-antivirus/antivir-savapi/metadata.xml new file mode 100644 index 0000000..a7162e9 --- /dev/null +++ b/app-antivirus/antivir-savapi/metadata.xml @@ -0,0 +1,10 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> +<herd>no-herd</herd> +<maintainer> + <email>wschlich@gentoo.org</email> + <name>Wolfram Schlich</name> + <description>Primary maintainer</description> +</maintainer> +</pkgmetadata> diff --git a/app-antivirus/antivir-webgate/ChangeLog b/app-antivirus/antivir-webgate/ChangeLog new file mode 100644 index 0000000..021e710 --- /dev/null +++ b/app-antivirus/antivir-webgate/ChangeLog @@ -0,0 +1,12 @@ +# ChangeLog for app-antivirus/antivir-webgate +# Copyright 1999-2008 Gentoo Foundation; Distributed under the GPL v2 +# $Header: $ + + 07 Oct 2008; Wolfram Schlich <wschlich@gentoo.org> + antivir-webgate-1.3.0_p12.ebuild: + add ~amd64 + + 29 Jul 2008; Wolfram Schlich <wschlich@gentoo.org> +metadata.xml, + antivir-webgate-1.3.0_p12.ebuild: + fixups + diff --git a/app-antivirus/antivir-webgate/Manifest b/app-antivirus/antivir-webgate/Manifest new file mode 100644 index 0000000..ba5887c --- /dev/null +++ b/app-antivirus/antivir-webgate/Manifest @@ -0,0 +1,6 @@ +AUX 1.3.0_p12/antivir-webgate.init.d 964 RMD160 bd2eff944a04b37602e7edb0717f6c14b94557c2 SHA1 08df71fa5b51f014af4f52db34db5cecbb03c561 SHA256 4b092a9732464aa37102aa40f8d14a7f3833df4fd738471c33b8a02524fd99d1 +AUX 1.3.0_p12/avwebgate.conf 14866 RMD160 73b992a8234c03fc23e07108033e2cfa0da54d13 SHA1 8a8ef466f8f6116eeec46bae5c4f11fd381d1f95 SHA256 e3dc20f8b3c3bffc5b2e608f6d735a610de4c45be50dba28aa40bb75885981d6 +DIST antivir-webgate-prof-1.3.0-12.tar.gz 49518667 RMD160 2714b8f15e7ea84c8db8e97cac970b424083745a SHA1 afadf667dc75b837dc68129fb873b2e27d476651 SHA256 524ea0eb3c43f731b4d12d916c694c466775d42f58162f14502e67b032d2a009 +EBUILD antivir-webgate-1.3.0_p12.ebuild 3859 RMD160 82882ff08fe9df4a3fd93266aab0615e63527647 SHA1 2536c592ef33e5c1ee32fffccc63eee5930e12f3 SHA256 688bf9a69e64520458f5a31467a35cf5e48f871e5bc16312c42531060fdea4cb +MISC ChangeLog 347 RMD160 2ebaca50f06ad0ff6a83014db0352aad3260c496 SHA1 e2160e3e80d3859e72e6f6c5105777ace80436d4 SHA256 cfe666630ec0ea9fa5af762ae422a5e19eb3193b89c032e35c4b28966c2c5ed2 +MISC metadata.xml 300 RMD160 3b9c1cd628f9d7ac94b68543ec737d5c2381a47e SHA1 33c5efd31a8aa789118535b921e211ffb5023ac3 SHA256 bc07a9aecce5770d1ace9af0a6c6af8ff6c7b16eb5e7947a1b178d1970855e43 diff --git a/app-antivirus/antivir-webgate/antivir-webgate-1.3.0_p12.ebuild b/app-antivirus/antivir-webgate/antivir-webgate-1.3.0_p12.ebuild new file mode 100644 index 0000000..d896391 --- /dev/null +++ b/app-antivirus/antivir-webgate/antivir-webgate-1.3.0_p12.ebuild @@ -0,0 +1,195 @@ +# Copyright 1999-2008 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ +## +## Created by Wolfram Schlich <wschlich@gentoo.org> +## +## TODO +## - ? +## + +inherit eutils pax-utils + +DESCRIPTION="AVIRA WebGate HTTP/FTP proxy virus scanner" +MY_P="${PN}-prof-${PV/_p/-}" +SRC_URI="http://dl.antivir.de/down/unix/packages/${MY_P}.tar.gz" +HOMEPAGE="http://www.avira.com/" +LICENSE="AVIRA-AntiVir" +SLOT="0" +KEYWORDS="~x86 ~amd64" +IUSE="" +DEPEND="" +RDEPEND=">=app-antivirus/antivir-core-2.1.12_p19" +S="${WORKDIR}/${MY_P}" +# prevent installation functions from stripping binaries +# otherwise the antivir selfcheck fails. also don't try +# to fetch the distribution tarball from a mirror. +RESTRICT="strip mirror" + +# +# Settings overridable by user supplied environment variables +# + +AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}" +AVCONFDIR="${AVCONFDIR:-/etc}" +AVSPOOLDIR="${AVSPOOLDIR:-/var/spool/avwebgate}" +AVTMPDIR="${AVTMPDIR:-/var/tmp}" +AVPIDDIR="${AVPIDDIR:-/var/tmp}" +AVUSER="${AVUSER:-avgate}" +AVUID="${AVUID:-220}" +AVSH="${AVSH:--1}" +AVGROUP="${AVGROUP:-antivir}" +AVGID="${AVGID:-220}" +AVHOSTNAME="${AVHOSTNAME:-$(hostname -f)}" + +pkg_setup() { + + # + # Add USER + GROUP + # + + enewgroup "${AVGROUP}" "${AVGID}" + enewuser "${AVUSER}" "${AVUID}" "${AVSH}" -1 "${AVGROUP}" -c AntiVir + +} + +src_install() { + + # + # Executables, libraries and misc components + # + + exeinto "${AVHOMEDIR}" + exeopts -oroot -g"${AVGROUP}" -m2750 + doexe bin/linux_glibc22/avwebgate.bin + diropts "" + dodir \ + "${DESTTREE}/sbin" + dosym "${AVHOMEDIR}/avwebgate.bin" "${DESTTREE}/sbin/avwebgate" + + # + # Init script + # + + exeopts -oroot -groot -m0755 + exeinto /etc/init.d + newexe "${FILESDIR}/${PV}/antivir-webgate.init.d" antivir-webgate + + # + # Config + # + + insopts -oroot -g"${AVGROUP}" -m0640 + insinto "${AVCONFDIR}" + doins \ + "${FILESDIR}"/${PV}/avwebgate.conf +# use gui && doins etc/avwebgate.conf-gui + dosed "s:%AVHOMEDIR%:${AVHOMEDIR}:g" "${AVCONFDIR}/avwebgate.conf" + dosed "s:%AVCONFDIR%:${AVCONFDIR}:g" "${AVCONFDIR}/avwebgate.conf" + dosed "s:%AVSPOOLDIR%:${AVSPOOLDIR}:g" "${AVCONFDIR}/avwebgate.conf" + dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/avwebgate.conf" + dosed "s:%AVPIDDIR%:${AVPIDDIR}:g" "${AVCONFDIR}/avwebgate.conf" + dosed "s:%AVUSER%:${AVUSER}:g" "${AVCONFDIR}/avwebgate.conf" + dosed "s:%AVGROUP%:${AVGROUP}:g" "${AVCONFDIR}/avwebgate.conf" + dosed "s:%AVHOSTNAME%:${AVHOSTNAME}:g" "${AVCONFDIR}/avwebgate.conf" + touch "${T}/avwebgate.acl" + doins "${T}/avwebgate.acl" + + # + # Spool directory + # + + diropts -o"${AVUSER}" -g"${AVGROUP}" -m0700 + dodir "${AVSPOOLDIR}" + keepdir "${AVSPOOLDIR}" + for dir in quarantine; do + dodir "${AVSPOOLDIR}/${dir}" + keepdir "${AVSPOOLDIR}/${dir}" + done + + ## TODO:GUI + + ## TODO:SMC + + # + # Documents + # + + dodoc \ + LICENSE \ + LICENSE.DE \ + README \ + doc/CHANGELOG \ + doc/MANUAL \ + doc/RELEASE_NOTES \ + doc/avwebgate_de.pdf \ + doc/avwebgate_en.pdf \ + doc/avwebgate.acl.example \ + legal/LICENSE.* + + # + # Templates + # + + diropts "" + dodir "${AVHOMEDIR}/avwebgate.tpl" + insopts -m0644 + insinto "${AVHOMEDIR}/avwebgate.tpl" + doins templates/en/* + +} + +pkg_postinst() { + + # + # Config + # + + echo + einfo "" + einfo "Configuration" + einfo "=============" + einfo "" + einfo "Please run..." + einfo "" + einfo "\tebuild /var/db/pkg/${CATEGORY}/${PF}/${PF}.ebuild config" + einfo "" + einfo "...to configure the package!" + einfo "" + echo + +} + +pkg_config() { + + # + # Init script + # + + echo + einfo "" + einfo "Using the init script" + einfo "=====================" + einfo "" + einfo "Simply run..." + einfo "" + einfo "\trc-update add antivir-webgate default" + einfo "" + einfo "...and your're done." + einfo "" + + # + # Templates + # + + echo + einfo "" + einfo "Using the HTML templates" + einfo "========================" + einfo "" + einfo "The templates were installed into" + einfo "" + einfo "\t${AVHOMEDIR}/avwebgate.tpl" + einfo "" + +} diff --git a/app-antivirus/antivir-webgate/files/1.3.0_p12/antivir-webgate.init.d b/app-antivirus/antivir-webgate/files/1.3.0_p12/antivir-webgate.init.d new file mode 100755 index 0000000..666f599 --- /dev/null +++ b/app-antivirus/antivir-webgate/files/1.3.0_p12/antivir-webgate.init.d @@ -0,0 +1,46 @@ +#!/sbin/runscript +## 2003 by H+BEDV Datentechnik GmbH, +## Wolfram Schlich <wschlich@antivir.de> + +svc_name="AntiVir WebGate" + +## required binaries +avwebgate_bin="/usr/lib/AntiVir/avwebgate.bin" + +## required config files +avwebgate_cfg="/etc/avwebgate.conf" +avwebgate_acl="/etc/avwebgate.acl" + +depend() { + need net + use logger dns squid +} + +checkconfig() { + if [ ! -x "${avwebgate_bin}" ]; then + eerror "avwebgate binary [${avwebgate_bin}] missing" + return 1 + fi + if [ ! -r "${avwebgate_cfg}" ]; then + eerror "avwebgate config [${avwebgate_cfg}] missing" + return 1 + fi + if [ ! -r "${avwebgate_acl}" ]; then + eerror "avwebgate acl [${avwebgate_acl}] missing" + return 1 + fi +} + +start() { + checkconfig || return 1 + ebegin "Starting ${svc_name}" + /sbin/start-stop-daemon --start --quiet --exec "${avwebgate_bin}" + eend $? +} + +stop() { + checkconfig || return 2 + ebegin "Stopping ${svc_name}" + /sbin/start-stop-daemon --stop --quiet --exec "${avwebgate_bin}" + eend $? +} diff --git a/app-antivirus/antivir-webgate/files/1.3.0_p12/avwebgate.conf b/app-antivirus/antivir-webgate/files/1.3.0_p12/avwebgate.conf new file mode 100644 index 0000000..08afed0 --- /dev/null +++ b/app-antivirus/antivir-webgate/files/1.3.0_p12/avwebgate.conf @@ -0,0 +1,346 @@ +# +# sample AvWebGate configuration file +# + +# This file shows the available options to configure AvWebGate. +# Lines beginning with '#' are comments and are ignored. If you +# want to change the value of an option, please uncomment the +# line. Otherwise default values (shown here) are used, unless +# otherwise indicated. + +# Used to specify the location of the antivir binary, the VDF, +# the keyfile, and some other files. +AntiVirDir %AVHOMEDIR% + +# Template directory +TemplateDir %AVHOMEDIR%/avwebgate.tpl + +# Maximum number of open files +OpenMax 1024 + +# Processes +NumDaemons 16 +DNSHelpers 8 + +# Timeouts +ClientTimeout 60 +ServerTimeout 300 + +# Specify the port on which AvWebGate listens for HTTP requests. +# Web-based FTP requests are also handled on this port. In addition +# to the port number, you may optionally specify a hostname or IP +# address to which AvWebGate binds the socket. If you do not specify +# any port(s), AvWebGate listens on port 8080 for HTTP requests by +# default. If you specify at least one of FTPPort or ICAPPort, +# AvWebGate does not open a port for HTTP requests as long as +# HTTPPort is commented out (default). +# Usage: HTTPPort [hostname_or_ip:]port +# Note: If you have installed AvWebGate as a parent proxy on the +# same machine as your existing proxy, it is recommended to +# use "HTTPPort 127.0.0.1:8080" for example. If a hostname +# or IP is not given, then the port will be bound to all +# interfaces. +HTTPPort 127.0.0.1:80 + +# AvWebGate can be used as a "real" FTP proxy (talking FTP to the +# clients). In order to enable this feature, you need to specify +# a port on which AvWebGate listens for FTP connections. In addition +# to the port number, you may optionally specify a hostname or IP +# address to which AvWebGate binds the socket. If you specify an +# FTPPort, AvWebGate does not open a port for HTTP requests unless +# HTTPPort is specified explicitly (uncommented). +# Usage: FTPPort [hostname_or_ip:]port +#FTPPort 127.0.0.1:2121 + +# AvWebGate can be used as an ICAP server. To enable ICAP support, +# you need to specify a port, optionally along with a hostname or +# IP address, to which AvWebGate binds the socket. If you specify an +# ICAPPort, AvWebGate does not open a port for HTTP requests unless +# HTTPPort is specified explicitly (uncommented). +# Usage: ICAPPort [hostname_or_ip:]port +# AvWebGate supports ICAP version "1.0" +#ICAPPort 127.0.0.1:1344 + +# AvWebGate will switch the user and group as soon as possible after +# the startup. You may specify a user and/or group to which AvWebGate +# will switch to. Note that you must run AvWebGate as root initially. +# If you don't want AvWebGate to start as root initially, you must +# specify the current user/group here, otherwise the start will +# fail. +User %AVUSER% +Group %AVGROUP% + +# AvWebGate is able to tunnel requests performed over SSL (HTTPS). +# Because the data can not be decrypted, the data will NOT be +# scanned. However, the handshake is checked to determine if it +# is a valid SSL handshake. Although this adds an extra security +# check, this does not solve the underlaying problem, SSL data will +# NOT be checked, AvWebGate does not interfere with the transaction, +# but merely forwards the data. +# Attention: HTTPS data will _NOT_ be scanned. +AllowHTTPSTunnel 1 + +# Allows AvWebGate to establish a tunnel connection to any port +# allowed for HTTP if a CONNECT method request is received. +# WARNING: USE THIS OPTION WITH CAUTION. AvWebGate does not +# check the data transferred over the tunnel connection! Use +# "AllowHTTPSTunnel" instead if you want to limit the allowed +# connections to the ports 443 (HTTPS) and 563 (SNEWS). +AllowHTTPConnect 1 + +# For security reasons, AvWebGate restricts HTTPS connections to +# IANA-assigned ports 443 (HTTPS) and 563 (SNEWS). If you want to +# allow HTTPS connections to non-standard ports, you can do so by +# adding the desired ports to this list. Each port will be separated +# by a comma or a whitespace. +AllowedHTTPConnectPorts 443 873 + +# It is possible to limit the maximum number of allowed simultaneous +# connections AvWebGate accepts. +MaxConnections 256 + +# In order to prevent client timeouts with large downloads, AvWebGate +# must send the client keepalive messages. There are three different +# methods for timeout prevention. If the client was identified as +# a browser, the progress status is sent as refreshing HTML pages. +# The RefreshInterval specifies the number of seconds between +# status updates. This method of timeout prevention can be disabled +# by setting RefreshInterval to 0. If RefreshInterval is not +# specified, this method of timeout prevention is disabled. +#RefreshInterval 10 +#RefreshDelay 3 +#RefreshTimeout 60 +#RefreshSkipFileExtensions htm,html,shtml,css,gif,jpg,jpeg,png,swf,flv + +# If the refresh method is not used (because it is disabled or +# the client is a non-browser) redirect messages can be sent to the +# client. The RedirectInterval specifies the delay time in seconds +# for sending redirect messages. This method of timeout prevention +# can be disabled by settings RedirectInterval to 0. If +# RedirectInterval is not specified, this method of timeout +# prevention is disabled. +# Note: This method does not work with every client. Use the +# KeepaliveInterval option instead if problems occur. +#RedirectInterval 10 + +# If the refresh and redirect methods are not used (because they +# are disabled or they are not appropriate) extended header data can +# be sent to the client to prevent timeouts. The KeepaliveInterval +# specifies the delay time in seconds for sending extended header +# data. This method of timeout prevention can be disabled by +# setting KeepaliveInterval to 0. +KeepaliveInterval 10 +KeepaliveMode header +#KeepaliveMode trickle +#KeepaliveDelay 30 + +# Used for Refresh and Redirect client timeout prevention methods +#ProgressAutoSend 1 +#ProgressFilesizeThreshold 20MB +#ProgressHoldTime 3600 +#ProgressHoldTimeAfterGetFile 1800 +#ProgressHost proxy.example.com + +# If you want to use an optional parent HTTP proxy, AvWebGate needs +# information to connect to the proxy where the requests are forwarded. +# You can also specify a username and password if they are needed for +# the proxy. +#HTTPProxyServer 127.0.0.1 +#HTTPProxyPort 3128 +#HTTPProxyUsername username +#HTTPProxyPassword password + +# If you want to use an optional parent FTP proxy, you need to specify +# the hostname or IP address of that proxy along with the port number +# on which the proxy is accepting "real" FTP connections. +#FTPProxyServer your.proxy +#FTPProxyPort 8080 + +# You can change the directory where temporary files are stored +# (for example, while they are being scanned). +TemporaryDir %AVTMPDIR% + +# By default, all files in archives are going to be extracted +# and scanned. Limits can be specified with ArchiveMaxSize, +# ArchiveMaxRecursion and ArchiveMaxRatio. It is NOT recommended +# that this option is disabled (value of 0). +ArchiveScan 1 + +# If ArchiveMaxSize is 0, all files in archives will be extracted, +# otherwise files only up to the given size will be extracted. +ArchiveMaxSize 100MB + +# If ArchiveMaxRecursion is 0, recursive archives are going to be +# unpacked with an unlimited recursion depth, otherwise recursive +# archives are going to be unpacked up to the given recursion +# depth. +ArchiveMaxRecursion 20 + +# If ArchiveMaxRatio is 0, archives will always be unpacked completely, +# otherwise they will only be unpacked completely if the compression +# ratio is below the specified value. +ArchiveMaxRatio 150 + +# If BlockSuspiciousArchive is enabled, archives that reach one +# of the limits above will be blocked. +BlockSuspiciousArchive 0 + +# If BlockEncryptedArchive is enabled, encrypted archives will +# be blocked. +BlockEncryptedArchive 0 + +# If BlockPartialArchive is enabled, multi-volume archives will +# be blocked. +BlockPartialArchive 0 + +# AvWebGate will block files that have one of the specified file +# extensions. Note that filenames in archives will also be matched. +# The extensions can be separated by either space, comma or semicolon. +# There is no default value for this directive. +#BlockExtensions exe scr pif + +# By default, blocked files are discarded. In order to move the +# concerning files to a quarantine directory, you may specify a +# directory where the files will be moved to. +MoveConcerningFilesTo %AVSPOOLDIR%/quarantine + +# Concerning activity may also be logged to a specified file +# (in addition to syslog). You must specify the file. If this +# directive is not specified, logging will only occur through +# syslog. +#LogFile /var/log/avwebgate.log + +# It is possible to specify the amount of events that are logged by +# AvWebGate (0-7). 0 logs only critical information, whereas 7 will +# log everything (including debugging output). A value of 4 or 5 is +# recommended. +LogLevel 4 +DebugLevel 4 + +# Regardless of the above configuration settings, AvWebGate will +# always log important information using syslog. It is possible +# to specify which syslog facility you would like AvWebGate to +# use. +SyslogFacility daemon + +# You can receive email notifications of alerts using this +# directive. You must specify the email address to which the +# notification will be sent. There is no default value for +# this directive. +#EmailTo hostmaster@example.com + +# AvWebGate can add an X-Forwarded-For header to the HTTP request +# including the IP address of the originating client. This +# is useful if a subsequent proxy (parent) wants to use the +# original client address in access controls, logs etc. +AddXForwardedForHeader 0 + +# You can restrict access to selected clients or (sub)networks +# based on their IP addresses. A network address can be specified +# with a '/' and a number of bits to match (e.g. 192.168.1.0/24). +# If the number of bits is not specified, the netmask will be +# determined from the given address (for example, 192.168.0.0 is +# treated the same as 192.168.0.0/16). +# Note: If you do not specify any IP addresses, access is granted +# to everybody. If you specify one or more IP addresses, +# access is allowed only to the specified addresses and +# is denied for all others. +#AllowClientAddresses 127.0.0.0/8 192.168.0.0/16 +AllowClientAddresses 127.0.0.0/8 + +# WebGate can deny access to specific user agents. You can specify +# one or more user agent string that will be denied access. The +# main purpose is to avoid unnecessary traffic generated by clients +# issuing range requests (such as Microsoft's BITS +# "Background Intelligent Transfer Service") or streaming services +# (such as Apple's iTunes). Range requests and data streaming are +# only permitted if specified in an AclConfigFile. +ForbiddenUserAgents BITS iTunes + +# You can limit connections to selected destination ports. You +# may specify one or more single ports (e.g 21 and 80) or port +# ranges. You can specify ranges with a '-' between two port +# numbers (e.g. 1025-65535). Note that there are no whitespaces +# allowed between the two port numbers when specifying a range. +# Note: If you do not specify at least one port, connections +# will be allowed to all destination ports. +AllowDestinationPorts 21 80 443 873 1025-65535 + +# WebGate can also support more complex rules by implementing a Squid-like +# access control scheme. To use the access control scheme you must create +# a new configuration file containing the rules describing the desired +# behavior and have AclConfigFile contain the path to it. The syntax +# supported by the access control scheme is described in the Manual. +AclConfigFile %AVCONFDIR%/avwebgate.acl + +# List of categories that are blocked by WebGate when Avira Web Access +# and Content Control library is enabled. Categories can be specified +# as single categories (e.g 1 and 3 ) or category ranges. You can +# specify ranges with a '-' between to category numbers. +# To use the URL filtering capabilities of WebGate a valid WebGate Suite +# license must be installed +# Note: For a list of all categories please consult the Manual +#WSBlockCategories 0-2 12 14 61 + +# These settings allow for the detection of certain categories of software +# which are not viruses but might not be wanted. Here is a description of +# the categories. +# ADSPY: Software that displays advertising pop-ups or software that very +# often without the user's consent sends user specific data to +# third parties and might therefore be unwanted. +# APPL: The term APPL/ denotes an application of dubious origin or which +# might be hazardous to use. +# BDC: Is the Control software for backdoors. Control software for +# backdoors are generally harmless. +# DIAL: A Dial-Up program for connections that charge a fee. Its use might +# lead to huge costs for the user. +# GAME: It concerns a game that causes no damage on your computer. +# HEUR-DBLEXT: File has an executable file extension but hides it behind a +# harmless one. +# JOKE: A harmless joke program is present as file. +# PCK: File has been compressed with an unusual runtime compression tool. +# Please make sure that this file comes from a trustworthy source. +# PHISH: Faked Emails that are supposed to prompt the victim to reveal +# confidential information such as user accounts, passwords or +# online-banking data on certain websites. +# SPR: Software that maybe able to compromise the security of your system, +# initiate unwanted program activities, damage your privacy or spy +# out your user behaviour and might therefore be unwanted. +# Detection can be enabled/disabled with yes/no parameters respectively. +DetectADSPY yes +DetectAPPL yes +DetectBDC yes +DetectDIAL yes +DetectGAME yes +DetectHEUR-DBLEXT yes +DetectJOKE yes +DetectPCK yes +DetectPHISH yes +DetectSPR yes + +# AntiVir is capable of using heuristics to determine if a file +# may be malicious. This allows new or unknown malicious code to +# be detected before you have had a chance to perform an update. +# There are two types of heuristics that AntiVir uses. The +# first, HeuristicsMacro, only deals with macros in office +# documents. This can be enabled/disabled with yes/no respectively. +# The second, HeuristicsLevel, deals with all types of files and +# can be set to a certain level of intensity (0-3). 0 means +# disabled and 3 means full intensity. +# Note: Be aware that setting the HeuristicsLevel too high could +# result in false alerts. +HeuristicsMacro yes +HeuristicsLevel 2 + +# Uncomment this directive to allow the GUI to communicate with +# AvWebGate. If this is enabled, AvWebGate will open an extra +# TCP Port on the loopback interface. This should only be used +# if you intend to use the GUI. +#GuiSupport yes + +# These are SSL Parameters used for secure communication with +# the GUI. +#GuiCertFile /usr/lib/AntiVir/gui/cert/server.pem +#GuiCertPass antivir_default +#GuiCAFile /usr/lib/AntiVir/gui/cert/cacert.pem +#GuiRandFile /dev/urandom diff --git a/app-antivirus/antivir-webgate/metadata.xml b/app-antivirus/antivir-webgate/metadata.xml new file mode 100644 index 0000000..a7162e9 --- /dev/null +++ b/app-antivirus/antivir-webgate/metadata.xml @@ -0,0 +1,10 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> +<herd>no-herd</herd> +<maintainer> + <email>wschlich@gentoo.org</email> + <name>Wolfram Schlich</name> + <description>Primary maintainer</description> +</maintainer> +</pkgmetadata> diff --git a/app-antivirus/skyldav/ChangeLog b/app-antivirus/skyldav/ChangeLog new file mode 100644 index 0000000..a9496c9 --- /dev/null +++ b/app-antivirus/skyldav/ChangeLog @@ -0,0 +1,19 @@ +*skyldav-0.2_rc3_p20130821-r1 (21 Aug 2013) + + 21 Aug 2013; Wolfram Schlich <wschlich@gentoo.org> + +skyldav-0.2_rc3_p20130821-r1.ebuild: + update from upstream + +*skyldav-0.2_rc3_p20130821 (21 Aug 2013) + + 21 Aug 2013; Wolfram Schlich <wschlich@gentoo.org> + +files/skyldav-0.2_rc3_p20130821-examples.patch, + +skyldav-0.2_rc3_p20130821.ebuild: + update from upstream + +*skyldav-0.2_rc3_p20130817-r1 (17 Aug 2013) + + 17 Aug 2013; Wolfram Schlich <wschlich@gentoo.org> + +files/skyldav-0.2_rc3_p20130817-disable-skyldavnotify.patch, + +skyldav-0.2_rc3_p20130817-r1.ebuild: + added libnotify USE flag. diff --git a/app-antivirus/skyldav/Manifest b/app-antivirus/skyldav/Manifest new file mode 100644 index 0000000..5bc49c0 --- /dev/null +++ b/app-antivirus/skyldav/Manifest @@ -0,0 +1,5 @@ +DIST skyldav-0.2rc3.tar.gz 100913 SHA256 219548b8529a0a7737fb774f1e4ba89acf91088982f9fb646bc9b0fb6015f801 SHA512 d535a8b884ea656069bcb50d7683de4d006e160f44691adbd6564d7729310cada7ff1652dc63c3b9b9cd755574fbd1e7516ccc8f10c6f42eb4d13d3c453b58e7 WHIRLPOOL 05217e707abfc47502e93be164ee383a9fff0ba2b40f5129bee77f4dfdddd87fec3f67bcfd974760b5204e27dedc026331249887cb7268066df578e6a23e78ea +DIST skyldav-0.2rc3_p20130816.tar.gz 100972 SHA256 7a3037f2965320c16ee1f29deccf3bee034581b3f436f1c50042e50e514fb97f SHA512 6d9caf2d3f808c3fdf44daa6b5606d5b47aa3bb19750d25e414a60c21fbd764279dabe09b36f2fdc7cbf08686b3af8610ef926925223f7927f4d87fe039fad49 WHIRLPOOL ba1a4e389d57d994f1575d55878406068b6162243d732697d94fea8797524fd25525736291f2825b0b518af641eafa518eaf1057311185f07645c5173e614957 +DIST skyldav-0.2rc3_p20130817.tar.gz 100247 SHA256 1c96363e1b928ef684ea3e0418995576fa6222a5a7cb1e09ea893930c6635d32 SHA512 1e57ba44d0894ef08788fe17798e7c5d6caea0eb04c2097c83333ebf8ca612fc29ec24625a43cc2d9e15e64b434c02661d5d8bee1e816b0b1e318e02d15929de WHIRLPOOL 6a1f8754e9c4a2816faaa97b9a7543ce738129b016fd88e5e9a90702fd63647b739c50a200b1806fde141628ad2746ee57fe18f285645547c3c9a2316043682a +DIST skyldav-0.2rc3_p20130821-r1.tar.gz 100437 SHA256 1707feb07a6bdc86e0bfa363248de805b924f4ac11674a5de098cfbe85bc43e0 SHA512 05bedb4e69288acee0de0545e1ec2d9f3d625dccd27c0ee6a541b10197dc1b2920f53ebd9afc8402e0cabf649a99c56abcbd466019547f1ada1a7a88d83b590a WHIRLPOOL 2496b984a0a23ea09e6125157ff8f0733cdf19ef03ce04a9463d3c29f5acd6a1afa01a4c117e53c2dafbd00fe85f7061f0bc256004120868d9e243b4e998a919 +DIST skyldav-0.2rc3_p20130821.tar.gz 100403 SHA256 8398f5cce013efdc51ee2e9533e7dbe82b0d41c384ba5f19eea4e8e32569f96b SHA512 4a132473be42cf5fdc858be6195fdb474a800955ffdc4a54f7caabe90c8cf17d5df59180de45d9056ffd0dbc0a699774d4fb4372f8a9087d2ef95e18cc95903a WHIRLPOOL 8aa49550e3a7fe13b4a1ccb6b3cd8b0e27ee3bdf546fe6f41f11c1ed55fcaa1291c9edc30b854985defe282952bdd18cbe6737cd82fd03df9c671ad18d724fb6 diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3-conf.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3-conf.patch new file mode 100644 index 0000000..3485bb4 --- /dev/null +++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3-conf.patch @@ -0,0 +1,20 @@ +diff -urN skyldav-0.2rc3.orig/examples/etc/skyldav.conf skyldav-0.2rc3/examples/etc/skyldav.conf +--- skyldav-0.2rc3.orig/examples/etc/skyldav.conf 2013-07-20 14:36:43.000000000 +0200 ++++ skyldav-0.2rc3/examples/etc/skyldav.conf 2013-08-17 11:41:17.016278000 +0200 +@@ -19,14 +19,14 @@ + + # File systems that shall not be marked for virus scan. + # NOMARK_FS = proc, sysfs +-NOMARK_FS = proc, sysfs ++NOMARK_FS = proc, sysfs, devtmpfs, devpts, configfs, securityfs, cgroup, rpc_pipefs + + # Mounts that shall not be marked for virus scan. + # NOMARK_MNT = /mnt/noscan + + # File systems that are local, virus scan results may be cached. + # LOCAL_FS = ext3, ext4, iso9660, tmpfs, vfat +-LOCAL_FS = ext3, ext4, iso9660, tmpfs, vfat ++LOCAL_FS = ext2, ext3, ext4, xfs, zfs, btrfs, reiserfs, vfat, ntfs, iso9660, tmpfs + + # Number of threads for file scanning, + # defaults to the number of available CPUs. diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3-examples.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3-examples.patch new file mode 100644 index 0000000..d331dd3 --- /dev/null +++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3-examples.patch @@ -0,0 +1,12 @@ +diff -urN skyldav-0.2rc3.orig/Makefile.am skyldav-0.2rc3/Makefile.am +--- skyldav-0.2rc3.orig/Makefile.am 2013-07-20 14:36:43.000000000 +0200 ++++ skyldav-0.2rc3/Makefile.am 2013-08-16 22:16:35.255347000 +0200 +@@ -9,8 +9,6 @@ + rm -rf doc/doxygen + + install-data-local: +- mkdir -p $(DESTDIR)$(docdir)/examples/ +- cp -rf $(srcdir)/examples/* $(DESTDIR)$(docdir)/examples/ + mkdir -p $(DESTDIR)$(sysconfdir) + test -e $(DESTDIR)$(sysconfdir)/skyldav.conf || \ + cp examples/etc/skyldav.conf $(DESTDIR)$(sysconfdir) diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3-openlog.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3-openlog.patch new file mode 100644 index 0000000..bd790ec --- /dev/null +++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3-openlog.patch @@ -0,0 +1,12 @@ +diff -urN skyldav-0.2rc3.orig/src/skyldav/Messaging.cc skyldav-0.2rc3/src/skyldav/Messaging.cc +--- skyldav-0.2rc3.orig/src/skyldav/Messaging.cc 2013-07-20 14:36:43.000000000 +0200 ++++ skyldav-0.2rc3/src/skyldav/Messaging.cc 2013-08-16 16:42:56.319762000 +0200 +@@ -47,7 +47,7 @@ + + // Open syslog. + setlogmask(LOG_UPTO(LOG_NOTICE)); +- openlog("Skyld AV", 0, LOG_USER); ++ openlog("skyldav", LOG_PID, LOG_DAEMON); + + // Set umask = 022; + mask = umask(S_IWGRP | S_IWOTH); diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3-sbin.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3-sbin.patch new file mode 100644 index 0000000..e984252 --- /dev/null +++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3-sbin.patch @@ -0,0 +1,19 @@ +diff -urN skyldav-0.2rc3.orig/src/skyldav/Makefile.am skyldav-0.2rc3/src/skyldav/Makefile.am +--- skyldav-0.2rc3.orig/src/skyldav/Makefile.am 2013-07-20 14:36:43.000000000 +0200 ++++ skyldav-0.2rc3/src/skyldav/Makefile.am 2013-08-16 11:17:41.489230000 +0200 +@@ -32,7 +32,7 @@ + ThreadPool.cc \ + VirusScan.cc + +-bin_PROGRAMS = \ ++sbin_PROGRAMS = \ + skyldav + + skyldav_LDFLAGS = \ +@@ -41,4 +41,4 @@ + skyldav_SOURCES = skyldav.h main.cc + + check: +- ./skyldav --version +\ No newline at end of file ++ ./skyldav --version diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130816-syslog.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130816-syslog.patch new file mode 100644 index 0000000..d746747 --- /dev/null +++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130816-syslog.patch @@ -0,0 +1,24 @@ +diff -urN skyldav-0.2rc3_p20130816.orig/src/skyldav/Messaging.cc skyldav-0.2rc3_p20130816/src/skyldav/Messaging.cc +--- skyldav-0.2rc3_p20130816.orig/src/skyldav/Messaging.cc 2013-08-16 19:58:10.000000000 +0200 ++++ skyldav-0.2rc3_p20130816/src/skyldav/Messaging.cc 2013-08-16 22:07:37.743908000 +0200 +@@ -48,7 +48,7 @@ + + // Open syslog. + setlogmask(LOG_UPTO(LOG_NOTICE)); +- openlog(SYSLOG_ID , 0, LOG_USER); ++ openlog(SYSLOG_ID , LOG_PID, LOG_USER); + + // Set umask = 022; + mask = umask(S_IWGRP | S_IWOTH); +diff -urN skyldav-0.2rc3_p20130816.orig/src/skyldav/skyldav.h skyldav-0.2rc3_p20130816/src/skyldav/skyldav.h +--- skyldav-0.2rc3_p20130816.orig/src/skyldav/skyldav.h 2013-08-16 19:58:10.000000000 +0200 ++++ skyldav-0.2rc3_p20130816/src/skyldav/skyldav.h 2013-08-16 22:07:10.715968000 +0200 +@@ -63,7 +63,7 @@ + + const char *PID_FILE = "/var/run/skyldav/skyldav.pid"; + +- const char *SYSLOG_ID = "SkyldAV"; ++ const char *SYSLOG_ID = "skyldav"; + + #ifdef __cplusplus + } diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130817-disable-skyldavnotify.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130817-disable-skyldavnotify.patch new file mode 100644 index 0000000..9f4a547 --- /dev/null +++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130817-disable-skyldavnotify.patch @@ -0,0 +1,362 @@ +diff -urN skyldav-0.2rc3_p20130817.orig/configure.ac skyldav-0.2rc3_p20130817/configure.ac +--- skyldav-0.2rc3_p20130817.orig/configure.ac 2013-08-17 00:08:41.000000000 +0200 ++++ skyldav-0.2rc3_p20130817/configure.ac 2013-08-17 13:20:37.887072000 +0200 +@@ -51,10 +51,6 @@ + dnl set linker flags + LDFLAGS="-g $LDFLAGS" + +-PKG_CHECK_MODULES([NOTIFY], [gtk+-2.0 >= 2.20.1 libnotify >= 0.5.0]) +-AC_CHECK_HEADER([canberra.h], [], +- [AC_MSG_ERROR([canberra.h header not found])]) +-NOTIFY_LIBS="-lcanberra $NOTIFY_LIBS" + AC_CHECK_HEADER([libmount/libmount.h], [], + [AC_MSG_ERROR([libmount/libmount.h header not found])]) + AC_CHECK_HEADER([sys/capability.h], [], +@@ -73,7 +69,6 @@ + + AC_MSG_NOTICE([CPPFLAGS = $CPPFLAGS]) + AC_MSG_NOTICE([LDFLAGS = $LDFLAGS]) +-AC_MSG_NOTICE([NOTIFY_LIBS = $NOTIFY_LIBS]) + AC_MSG_NOTICE([SKYLDAV_LIBS = $SKYLDAV_LIBS]) + + dnl Check includes +@@ -90,7 +85,6 @@ + Makefile + man/Makefile + src/Makefile +- src/notify/Makefile + src/skyldav/Makefile + test/Makefile + ]) +diff -urN skyldav-0.2rc3_p20130817.orig/Makefile.am skyldav-0.2rc3_p20130817/Makefile.am +--- skyldav-0.2rc3_p20130817.orig/Makefile.am 2013-08-17 00:08:41.000000000 +0200 ++++ skyldav-0.2rc3_p20130817/Makefile.am 2013-08-17 13:21:30.566228000 +0200 +@@ -14,10 +14,6 @@ + mkdir -p $(DESTDIR)$(sysconfdir) + test -e $(DESTDIR)$(sysconfdir)/skyldav.conf || \ + cp examples/etc/skyldav.conf $(DESTDIR)$(sysconfdir) +- mkdir -p $(DESTDIR)$(datadir)/autostart/ +- test -e $(DESTDIR)$(datadir)/autostart/skyldavnotify.desktop || \ +- cp examples/usr/share/autostart/skyldavnotify.desktop \ +- $(DESTDIR)$(datadir)/autostart/ + + dist-hook: + rm -rf $(distdir)/doc/doxygen +diff -urN skyldav-0.2rc3_p20130817.orig/man/Makefile.am skyldav-0.2rc3_p20130817/man/Makefile.am +--- skyldav-0.2rc3_p20130817.orig/man/Makefile.am 2013-08-17 00:08:41.000000000 +0200 ++++ skyldav-0.2rc3_p20130817/man/Makefile.am 2013-08-17 13:22:04.636393000 +0200 +@@ -1,6 +1,6 @@ + SECONDARY: +-dist_man_MANS = skyldav.1 skyldavnotify.1 ++dist_man_MANS = skyldav.1 + + EXTRA_DIST = \ +-skyldav.1 skyldavnotify.1 ++skyldav.1 + +diff -urN skyldav-0.2rc3_p20130817.orig/man/skyldavnotify.1 skyldav-0.2rc3_p20130817/man/skyldavnotify.1 +--- skyldav-0.2rc3_p20130817.orig/man/skyldavnotify.1 2013-08-17 00:08:41.000000000 +0200 ++++ skyldav-0.2rc3_p20130817/man/skyldavnotify.1 1970-01-01 01:00:00.000000000 +0100 +@@ -1,28 +0,0 @@ +-.TH SKYLDAVNOTIFY 1 "June 23th, 2013" "version 0.1" "Skyld AV notification" +-.SH NAME +-skyldavnotify \- Desktop notification for Skyld AV +-.SH SYNOPSIS +-.B skyldavnotify +-.RB [ \-h ] +-.RB [ \-v ] +-.SH DESCRIPTION +-.PP +-This program notifies the user of a windows manager like KDE or GNOME if +-Skyld AV detected malware. Typical usage is to start this file using a +-desktop link +-.IR /usr/share/autostart/skyldavnotify.desktop . +-.PP +-.TP +-.B \-h +-Print usage information. +-.TP +-.B \-v +-Print the program version and licensing information. +-.SH AUTHOR +-Heinrich Schuchardt <xypron.glpk@gmx.de> +-.SH SEE ALSO +-.BR sykldav (1) +-.PP +-Further documentation and examples can be found in the documentation +-path, which defaults to +-.IR /usr/local/share/doc/skyldav . +diff -urN skyldav-0.2rc3_p20130817.orig/src/Makefile.am skyldav-0.2rc3_p20130817/src/Makefile.am +--- skyldav-0.2rc3_p20130817.orig/src/Makefile.am 2013-08-17 00:08:41.000000000 +0200 ++++ skyldav-0.2rc3_p20130817/src/Makefile.am 2013-08-17 13:21:52.285856000 +0200 +@@ -1 +1 @@ +-SUBDIRS = notify skyldav ++SUBDIRS = skyldav +diff -urN skyldav-0.2rc3_p20130817.orig/src/notify/Makefile.am skyldav-0.2rc3_p20130817/src/notify/Makefile.am +--- skyldav-0.2rc3_p20130817.orig/src/notify/Makefile.am 2013-08-17 00:08:41.000000000 +0200 ++++ skyldav-0.2rc3_p20130817/src/notify/Makefile.am 1970-01-01 01:00:00.000000000 +0100 +@@ -1,10 +0,0 @@ +-AM_CPPFLAGS = $(NOTIFY_CFLAGS) +-skyldavnotify_LDADD = $(NOTIFY_LIBS) +- +-bin_PROGRAMS = \ +- skyldavnotify +- +-skyldavnotify_SOURCES = notify.h notify.cc +- +-check: +- ./skyldavnotify --version +\ No newline at end of file +diff -urN skyldav-0.2rc3_p20130817.orig/src/notify/notify.cc skyldav-0.2rc3_p20130817/src/notify/notify.cc +--- skyldav-0.2rc3_p20130817.orig/src/notify/notify.cc 2013-08-17 00:08:41.000000000 +0200 ++++ skyldav-0.2rc3_p20130817/src/notify/notify.cc 1970-01-01 01:00:00.000000000 +0100 +@@ -1,185 +0,0 @@ +-/* +- * File: notify.c +- * +- * Copyright 2013 Heinrich Schuchardt <xypron.glpk@gmx.de> +- * +- * Licensed under the Apache License, Version 2.0 (the "License"); +- * you may not use this file except in compliance with the License. +- * You may obtain a copy of the License at +- * +- * http://www.apache.org/licenses/LICENSE-2.0 +- * +- * Unless required by applicable law or agreed to in writing, software +- * distributed under the License is distributed on an "AS IS" BASIS, +- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +- * See the License for the specific language governing permissions and +- * limitations under the License. +- * +- */ +- +-/** +- * @file notify.cc +- * @brief Notify Skyld AV events. +- * +- * Sound depends on freedesktop-sound-theme +- */ +- +-#include <gtk/gtk.h> +-#include <libnotify/notify.h> +-#include <glib.h> +-#include <canberra.h> +-#include <stdio.h> +-#include <stdlib.h> +-#include <signal.h> +-#include "config.h" +-#include "notify.h" +- +-#define RUNNING 1 +-#define STOPPING 2 +- +-volatile sig_atomic_t status; +- +-static void sigint_handler(int sig) { +- write(0, "\nSTOPPING\n", 10); +- status = STOPPING; +- } +- +-/** +- * @brief Prints help message and exits. +- */ +-static void help() { +- printf("%s", HELP_TEXT); +- exit(EXIT_FAILURE); +-} +- +-/** +- * @brief Shows version information and exits. +- */ +-static void version() { +- printf("Skyld AV, version %s\n", VERSION); +- printf("%s", VERSION_TEXT); +- exit(EXIT_SUCCESS); +-} +- +-int main(int argc, char **argv) +-{ +- int i; +- char *opt; +- NotifyNotification *n; +- char filename[] = "/run/skyldav/log"; +- char application[] = "Skyld AV"; +- char title[] = "Skyld AV"; +- char body[2048]; +- char *msg; +- FILE *file; +- struct sigaction sa; +- +- // Analyze command line options. +- for (i = 1; i < argc; i++) { +- opt = argv[i]; +- if (*opt == '-') { +- opt++; +- } else { +- help(); +- } +- if (*opt == '-') { +- opt++; +- } +- switch (*opt) { +- case 'v': +- version(); +- break; +- default: +- help(); +- } +- } +- +- printf("Skyld AV notifier %s\n", VERSION); +- printf("Exit with CTRL+C\n"); +- +- file = fopen(filename, "r"); +- if (file == NULL) { +- fprintf(stderr, "File '%s' not found\n", filename); +- return EXIT_FAILURE; +- } +- // position to end of file +- fseek(file, 0, SEEK_END); +- +- sa.sa_handler = sigint_handler; +- sa.sa_flags = 0; // or SA_RESTART +- sigemptyset(&sa.sa_mask); +- if (sigaction(SIGINT, &sa, NULL) == -1) { +- perror("sigaction"); +- return EXIT_FAILURE; +- } +- +- ca_context *c; +- +- // initialize gtk +- gtk_init(&argc,&argv); +- +- // initialize notify +- notify_init(application); +- +- status = RUNNING; +- +- for (;;) { +- +- msg = fgets(body, 2047, file); +- +- if (msg == NULL) { +- if (status != RUNNING) { +- break; +- } +- if (feof(file)) { +- usleep(500000); +- } +- if (ferror(file)) { +- perror("fgets"); +- } +- continue; +- } +- +- // create a new notification +- switch(body[0]) { +- case '\0': +- case '\n': +- n = notify_notification_new(title, "<Empty message>", +- "dialog-information"); +- break; +- case 'E': +- n = notify_notification_new(title, body + 1, "dialog-error"); +- break; +- case 'W': +- n = notify_notification_new(title, body + 1, "dialog-warning"); +- break; +- case 'I': +- n = notify_notification_new(title, body + 1, "dialog-information"); +- break; +- default: +- n = notify_notification_new(title, body + 1, "dialog-information"); +- } +- +- // set the timeout to 9000 ms +- notify_notification_set_timeout(n, 9000); +- +- // set the urgency level to critical +- notify_notification_set_urgency (n, NOTIFY_URGENCY_CRITICAL); +- +- // show the notification +- GError *error = NULL; +- notify_notification_show(n, &error); +- +- ca_context_create(&c); +- ca_context_play(c, 0, +- CA_PROP_EVENT_ID, "dialog-warning", +- CA_PROP_EVENT_DESCRIPTION, title, +- NULL); +- usleep(500000); +- } +- +- fclose(file); +- +- return EXIT_SUCCESS; +-} +- +diff -urN skyldav-0.2rc3_p20130817.orig/src/notify/notify.h skyldav-0.2rc3_p20130817/src/notify/notify.h +--- skyldav-0.2rc3_p20130817.orig/src/notify/notify.h 2013-08-17 00:08:41.000000000 +0200 ++++ skyldav-0.2rc3_p20130817/src/notify/notify.h 1970-01-01 01:00:00.000000000 +0100 +@@ -1,60 +0,0 @@ +-/* +- * File: notify.h +- * +- * Copyright 2013 Heinrich Schuchardt <xypron.glpk@gmx.de> +- * +- * Licensed under the Apache License, Version 2.0 (the "License"); +- * you may not use this file except in compliance with the License. +- * You may obtain a copy of the License at +- * +- * http://www.apache.org/licenses/LICENSE-2.0 +- * +- * Unless required by applicable law or agreed to in writing, software +- * distributed under the License is distributed on an "AS IS" BASIS, +- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +- * See the License for the specific language governing permissions and +- * limitations under the License. +- * +- */ +- +-/** +- * @file notify.h +- * @brief Notify Skyld AV events. +- */ +- +-#ifndef NOTIFY_H +-#define NOTIFY_H +- +-#ifdef __cplusplus +-extern "C" { +-#endif +- +- const char *HELP_TEXT = +- "Usage: skyldavnotify [OPTION]\n" +- "Notification for Skyld AV on access virus scanner.\n\n" +- " -h help\n" +- " -v version\n\n" +- "Licensed under the Apache License, Version 2.0.\n" +- "Report errors to\n" +- "Heinrich Schuchardt <xypron.glpk@gmx.de>\n"; +- +- const char *VERSION_TEXT = +- "Notification for Skyld AV on access virus scanner.\n\n" +- "Copyright 2013 Heinrich Schuchardt <xypron.glpk@gmx.de>\n\n" +- "Licensed under the Apache License, Version 2.0 (the\n" +- "\"License\"); you may not use this file except in compliance\n" +- "with the License. You may obtain a copy of the License at\n\n" +- " http://www.apache.org/licenses/LICENSE-2.0\n\n" +- "Unless required by applicable law or agreed to in writing,\n" +- "software distributed under the License is distributed on an\n" +- "\"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,\n" +- "either express or implied. See the License for the specific\n" +- "language governing permissions and limitations under the\n" +- "License.\n"; +- +-#ifdef __cplusplus +-} +-#endif +- +-#endif /* NOTIFY_H */ +- diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130821-examples.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130821-examples.patch new file mode 100644 index 0000000..03bcb33 --- /dev/null +++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130821-examples.patch @@ -0,0 +1,11 @@ +diff -urN skyldav-0.2rc3_p20130821.orig/Makefile.am skyldav-0.2rc3_p20130821/Makefile.am +--- skyldav-0.2rc3_p20130821.orig/Makefile.am 2013-08-21 06:56:18.000000000 +0200 ++++ skyldav-0.2rc3_p20130821/Makefile.am 2013-08-21 07:26:49.435950000 +0200 +@@ -9,7 +9,6 @@ + rm -rf doc/doxygen + + install-data-local: \ +- install-skyldav-examples \ + install-skyldav-conf \ + install-skyldavnotify-desktop + diff --git a/app-antivirus/skyldav/files/skyldav.confd b/app-antivirus/skyldav/files/skyldav.confd new file mode 100644 index 0000000..aad4d23 --- /dev/null +++ b/app-antivirus/skyldav/files/skyldav.confd @@ -0,0 +1,11 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ + +# Config file for /etc/init.d/skyldav + +# Options to pass to the skyldav daemon. +# Option -d for daemonizing is always passed! +# See the skyldav(1) man page for more info. + +#SKYLDAV_OPTS="-m 1" diff --git a/app-antivirus/skyldav/files/skyldav.initd b/app-antivirus/skyldav/files/skyldav.initd new file mode 100755 index 0000000..fd4bf09 --- /dev/null +++ b/app-antivirus/skyldav/files/skyldav.initd @@ -0,0 +1,26 @@ +#!/sbin/runscript +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ + +SKYLDAV_BIN="/usr/sbin/skyldav" +SKYLDAV_OPTS="${SKYLDAV_OPTS:--m 2}" +SKYLDAV_CONFIGFILE="/etc/skyldav.conf" +SKYLDAV_PIDFILE_DIR="${SKYLDAV_PIDFILE_DIR:-/var/run/${RC_SVCNAME}}" +SKYLDAV_PIDFILE="${SKYLDAV_PIDFILE:-${SKYLDAV_PIDFILE_DIR}/${RC_SVCNAME}.pid}" + +name="${SKYLDAV_BIN##*/}" +command="${SKYLDAV_BIN}" +command_args="-d ${SKYLDAV_OPTS}" +pidfile="${SKYLDAV_PIDFILE}" +description="Skyld AV is an anti-virus on-access scanner based upon Clam AV and fanotify" +required_files="${SKYLDAV_CONFIG}" + +depend() { + use logger + need localmount +} + +start_pre() { + checkpath -d -m 0755 -o root:root "${SKYLDAV_PIDFILE_DIR}" +} diff --git a/app-antivirus/skyldav/metadata.xml b/app-antivirus/skyldav/metadata.xml new file mode 100644 index 0000000..f6da4d5 --- /dev/null +++ b/app-antivirus/skyldav/metadata.xml @@ -0,0 +1,12 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> + <maintainer> + <email>wschlich@gentoo.org</email> + <name>Wolfram Schlich</name> + <description>Primary mainainer</description> + </maintainer> + <upstream> + <remote-id type="github">xypron/skyldav</remote-id> + </upstream> +</pkgmetadata> diff --git a/app-antivirus/skyldav/skyldav-0.2_rc3.ebuild b/app-antivirus/skyldav/skyldav-0.2_rc3.ebuild new file mode 100644 index 0000000..548ea6e --- /dev/null +++ b/app-antivirus/skyldav/skyldav-0.2_rc3.ebuild @@ -0,0 +1,54 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ + +EAPI=5 +AUTOTOOLS_AUTORECONF="1" + +inherit flag-o-matic linux-info linux-mod autotools-utils + +MY_PV=${PV/_rc/rc} +MY_P="${PN}-${MY_PV}" +S="${WORKDIR}/${MY_P}" + +DESCRIPTION="Skyld AV: on-access scanning daemon for ClamAV using fanotify" +SRC_URI="https://github.com/xypron/skyldav/archive/${MY_PV}.tar.gz -> ${MY_P}.tar.gz" +HOMEPAGE="http://xypron.github.io/skyldav/" + +KEYWORDS="~amd64 ~x86" +SLOT="0" +LICENSE="Apache-2.0" +IUSE="" + +RDEPEND="sys-apps/util-linux + sys-libs/libcap + media-libs/libcanberra[gtk] + x11-libs/libnotify + x11-libs/gtk+:2" +DEPEND="${RDEPEND} + sys-devel/autoconf-archive" + +DOCS=( AUTHORS NEWS README ) + +AUTOTOOLS_IN_SOURCE_BUILD="1" + +pkg_setup() { + linux-info_pkg_setup + kernel_is ge 3 8 0 || die "Linux 3.8.0 or newer recommended" + CONFIG_CHECK="FANOTIFY FANOTIFY_ACCESS_PERMISSIONS" + check_extra_config +} + +src_prepare() { + epatch "${FILESDIR}/${P}-examples.patch" + epatch "${FILESDIR}/${P}-sbin.patch" + epatch "${FILESDIR}/${P}-conf.patch" + epatch "${FILESDIR}/${P}-openlog.patch" + autotools-utils_src_prepare +} + +src_install() { + autotools-utils_src_install + newinitd "${FILESDIR}/${PN}.initd" ${PN} + newconfd "${FILESDIR}/${PN}.confd" ${PN} +} diff --git a/app-antivirus/skyldav/skyldav-0.2_rc3_p20130816.ebuild b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130816.ebuild new file mode 100644 index 0000000..c2545a2 --- /dev/null +++ b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130816.ebuild @@ -0,0 +1,55 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ + +EAPI=5 +AUTOTOOLS_AUTORECONF="1" + +inherit flag-o-matic linux-info linux-mod autotools-utils + +MY_PV=${PV/_rc/rc} +MY_P="${PN}-${MY_PV}" +S="${WORKDIR}/${MY_P}" + +DESCRIPTION="Skyld AV: on-access scanning daemon for ClamAV using fanotify" +#SRC_URI="https://github.com/xypron/skyldav/archive/${MY_PV}.tar.gz -> ${MY_P}.tar.gz" +SRC_URI="http://dev.gentoo.org/~wschlich/src/${CATEGORY}/${PN}/${MY_P}.tar.gz" +HOMEPAGE="http://xypron.github.io/skyldav/" + +KEYWORDS="~amd64 ~x86" +SLOT="0" +LICENSE="Apache-2.0" +IUSE="" + +RDEPEND="sys-apps/util-linux + sys-libs/libcap + media-libs/libcanberra[gtk] + x11-libs/libnotify + x11-libs/gtk+:2" +DEPEND="${RDEPEND} + sys-devel/autoconf-archive" + +DOCS=( AUTHORS NEWS README ) + +AUTOTOOLS_IN_SOURCE_BUILD="1" + +pkg_setup() { + linux-info_pkg_setup + kernel_is ge 3 8 0 || die "Linux 3.8.0 or newer recommended" + CONFIG_CHECK="FANOTIFY FANOTIFY_ACCESS_PERMISSIONS" + check_extra_config +} + +src_prepare() { + epatch "${FILESDIR}/${PN}-0.2_rc3-examples.patch" + epatch "${FILESDIR}/${PN}-0.2_rc3-sbin.patch" + epatch "${FILESDIR}/${PN}-0.2_rc3-conf.patch" + epatch "${FILESDIR}/${P}-syslog.patch" + autotools-utils_src_prepare +} + +src_install() { + autotools-utils_src_install + newinitd "${FILESDIR}/${PN}.initd" ${PN} + newconfd "${FILESDIR}/${PN}.confd" ${PN} +} diff --git a/app-antivirus/skyldav/skyldav-0.2_rc3_p20130817-r1.ebuild b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130817-r1.ebuild new file mode 100644 index 0000000..529eb1b --- /dev/null +++ b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130817-r1.ebuild @@ -0,0 +1,57 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ + +EAPI=5 +AUTOTOOLS_AUTORECONF="1" + +inherit flag-o-matic linux-info linux-mod autotools-utils + +MY_PV=${PV/_rc/rc} +MY_P="${PN}-${MY_PV}" +S="${WORKDIR}/${MY_P}" + +DESCRIPTION="Skyld AV: on-access scanning daemon for ClamAV using fanotify" +#SRC_URI="https://github.com/xypron/skyldav/archive/${MY_PV}.tar.gz -> ${MY_P}.tar.gz" +SRC_URI="http://dev.gentoo.org/~wschlich/src/${CATEGORY}/${PN}/${MY_P}.tar.gz" +HOMEPAGE="http://xypron.github.io/skyldav/" + +KEYWORDS="~amd64 ~x86" +SLOT="0" +LICENSE="Apache-2.0" +IUSE="libnotify" + +RDEPEND="sys-apps/util-linux + sys-libs/libcap + libnotify? ( + media-libs/libcanberra[gtk] + x11-libs/libnotify + x11-libs/gtk+:2 + )" +DEPEND="${RDEPEND} + sys-devel/autoconf-archive" + +DOCS=( AUTHORS NEWS README ) + +AUTOTOOLS_IN_SOURCE_BUILD="1" + +pkg_setup() { + linux-info_pkg_setup + kernel_is ge 3 8 0 || die "Linux 3.8.0 or newer recommended" + CONFIG_CHECK="FANOTIFY FANOTIFY_ACCESS_PERMISSIONS" + check_extra_config +} + +src_prepare() { + epatch "${FILESDIR}/${PN}-0.2_rc3-examples.patch" + epatch "${FILESDIR}/${PN}-0.2_rc3-sbin.patch" + epatch "${FILESDIR}/${PN}-0.2_rc3-conf.patch" + use libnotify || epatch "${FILESDIR}/${P}-disable-skyldavnotify.patch" + autotools-utils_src_prepare +} + +src_install() { + autotools-utils_src_install + newinitd "${FILESDIR}/${PN}.initd" ${PN} + newconfd "${FILESDIR}/${PN}.confd" ${PN} +} diff --git a/app-antivirus/skyldav/skyldav-0.2_rc3_p20130817.ebuild b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130817.ebuild new file mode 100644 index 0000000..e5c1f65 --- /dev/null +++ b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130817.ebuild @@ -0,0 +1,54 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ + +EAPI=5 +AUTOTOOLS_AUTORECONF="1" + +inherit flag-o-matic linux-info linux-mod autotools-utils + +MY_PV=${PV/_rc/rc} +MY_P="${PN}-${MY_PV}" +S="${WORKDIR}/${MY_P}" + +DESCRIPTION="Skyld AV: on-access scanning daemon for ClamAV using fanotify" +#SRC_URI="https://github.com/xypron/skyldav/archive/${MY_PV}.tar.gz -> ${MY_P}.tar.gz" +SRC_URI="http://dev.gentoo.org/~wschlich/src/${CATEGORY}/${PN}/${MY_P}.tar.gz" +HOMEPAGE="http://xypron.github.io/skyldav/" + +KEYWORDS="~amd64 ~x86" +SLOT="0" +LICENSE="Apache-2.0" +IUSE="" + +RDEPEND="sys-apps/util-linux + sys-libs/libcap + media-libs/libcanberra[gtk] + x11-libs/libnotify + x11-libs/gtk+:2" +DEPEND="${RDEPEND} + sys-devel/autoconf-archive" + +DOCS=( AUTHORS NEWS README ) + +AUTOTOOLS_IN_SOURCE_BUILD="1" + +pkg_setup() { + linux-info_pkg_setup + kernel_is ge 3 8 0 || die "Linux 3.8.0 or newer recommended" + CONFIG_CHECK="FANOTIFY FANOTIFY_ACCESS_PERMISSIONS" + check_extra_config +} + +src_prepare() { + epatch "${FILESDIR}/${PN}-0.2_rc3-examples.patch" + epatch "${FILESDIR}/${PN}-0.2_rc3-sbin.patch" + epatch "${FILESDIR}/${PN}-0.2_rc3-conf.patch" + autotools-utils_src_prepare +} + +src_install() { + autotools-utils_src_install + newinitd "${FILESDIR}/${PN}.initd" ${PN} + newconfd "${FILESDIR}/${PN}.confd" ${PN} +} diff --git a/app-antivirus/skyldav/skyldav-0.2_rc3_p20130821-r1.ebuild b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130821-r1.ebuild new file mode 100644 index 0000000..043755a --- /dev/null +++ b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130821-r1.ebuild @@ -0,0 +1,64 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ + +EAPI=5 + +inherit flag-o-matic linux-info linux-mod autotools-utils + +#MY_PV=${PV/_rc/rc} +MY_PVR=${PVR/_rc/rc} +#MY_P="${PN}-${MY_PV}" +MY_P="${PN}-${MY_PVR}" +S="${WORKDIR}/${MY_P}" + +DESCRIPTION="Skyld AV: on-access scanning daemon for ClamAV using fanotify" +#SRC_URI="https://github.com/xypron/skyldav/archive/${MY_PV}.tar.gz -> ${MY_P}.tar.gz" +SRC_URI="http://dev.gentoo.org/~wschlich/src/${CATEGORY}/${PN}/${MY_P}.tar.gz" +HOMEPAGE="http://xypron.github.io/skyldav/" + +KEYWORDS="~amd64 ~x86" +SLOT="0" +LICENSE="Apache-2.0" +IUSE="libnotify" + +RDEPEND="app-antivirus/clamav + sys-apps/util-linux + sys-libs/libcap + libnotify? ( + media-libs/libcanberra[gtk] + x11-libs/libnotify + x11-libs/gtk+:2 + )" +DEPEND="${RDEPEND} + sys-devel/autoconf-archive" + +## autotools-utils.eclass settings +AUTOTOOLS_AUTORECONF="1" +AUTOTOOLS_IN_SOURCE_BUILD="1" +DOCS=( AUTHORS NEWS README ) +PATCHES=( + "${FILESDIR}/${P}-examples.patch" + "${FILESDIR}/${PN}-0.2_rc3-sbin.patch" + "${FILESDIR}/${PN}-0.2_rc3-conf.patch" +) + +pkg_setup() { + linux-info_pkg_setup + kernel_is ge 3 8 0 || die "Linux 3.8.0 or newer recommended" + CONFIG_CHECK="FANOTIFY FANOTIFY_ACCESS_PERMISSIONS" + check_extra_config +} + +src_configure() { + local myeconfargs=( + $(use_with libnotify notification) + ) + autotools-utils_src_configure +} + +src_install() { + autotools-utils_src_install + newinitd "${FILESDIR}/${PN}.initd" ${PN} + newconfd "${FILESDIR}/${PN}.confd" ${PN} +} diff --git a/app-antivirus/skyldav/skyldav-0.2_rc3_p20130821.ebuild b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130821.ebuild new file mode 100644 index 0000000..ba4ee18 --- /dev/null +++ b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130821.ebuild @@ -0,0 +1,61 @@ +# Copyright 1999-2013 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: $ + +EAPI=5 + +inherit flag-o-matic linux-info linux-mod autotools-utils + +MY_PV=${PV/_rc/rc} +MY_P="${PN}-${MY_PV}" +S="${WORKDIR}/${MY_P}" + +DESCRIPTION="Skyld AV: on-access scanning daemon for ClamAV using fanotify" +#SRC_URI="https://github.com/xypron/skyldav/archive/${MY_PV}.tar.gz -> ${MY_P}.tar.gz" +SRC_URI="http://dev.gentoo.org/~wschlich/src/${CATEGORY}/${PN}/${MY_P}.tar.gz" +HOMEPAGE="http://xypron.github.io/skyldav/" + +KEYWORDS="~amd64 ~x86" +SLOT="0" +LICENSE="Apache-2.0" +IUSE="libnotify" + +RDEPEND="sys-apps/util-linux + sys-libs/libcap + libnotify? ( + media-libs/libcanberra[gtk] + x11-libs/libnotify + x11-libs/gtk+:2 + )" +DEPEND="${RDEPEND} + sys-devel/autoconf-archive" + +## autotools-utils.eclass settings +AUTOTOOLS_AUTORECONF="1" +AUTOTOOLS_IN_SOURCE_BUILD="1" +DOCS=( AUTHORS NEWS README ) +PATCHES=( + "${FILESDIR}/${P}-examples.patch" + "${FILESDIR}/${PN}-0.2_rc3-sbin.patch" + "${FILESDIR}/${PN}-0.2_rc3-conf.patch" +) + +pkg_setup() { + linux-info_pkg_setup + kernel_is ge 3 8 0 || die "Linux 3.8.0 or newer recommended" + CONFIG_CHECK="FANOTIFY FANOTIFY_ACCESS_PERMISSIONS" + check_extra_config +} + +src_configure() { + local myeconfargs=( + $(use_with libnotify notification) + ) + autotools-utils_src_configure +} + +src_install() { + autotools-utils_src_install + newinitd "${FILESDIR}/${PN}.initd" ${PN} + newconfd "${FILESDIR}/${PN}.confd" ${PN} +} |