summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorWolfram Schlich <wschlich@gentoo.org>2013-08-22 07:45:52 +0200
committerWolfram Schlich <wschlich@gentoo.org>2013-08-22 07:45:52 +0200
commit2c8d064b367a44723b9b557fb1edca59387edf49 (patch)
tree762432f58f66cfa663464bd506f40bd73a8a812d /app-antivirus
parentinitial setup (diff)
downloadwschlich-2c8d064b367a44723b9b557fb1edca59387edf49.tar.gz
wschlich-2c8d064b367a44723b9b557fb1edca59387edf49.tar.bz2
wschlich-2c8d064b367a44723b9b557fb1edca59387edf49.zip
added all ebuilds from my old svn repository
Diffstat (limited to 'app-antivirus')
-rw-r--r--app-antivirus/antivir-core/ChangeLog16
-rw-r--r--app-antivirus/antivir-core/Manifest7
-rw-r--r--app-antivirus/antivir-core/antivir-core-2.1.12_p19.ebuild206
-rwxr-xr-xapp-antivirus/antivir-core/files/2.1.12_p19/avupdater.conf26
-rw-r--r--app-antivirus/antivir-core/metadata.xml10
-rw-r--r--app-antivirus/antivir-internet-update-manager/ChangeLog17
-rw-r--r--app-antivirus/antivir-internet-update-manager/Manifest6
-rw-r--r--app-antivirus/antivir-internet-update-manager/antivir-internet-update-manager-2.4.0.6.3.ebuild234
-rwxr-xr-xapp-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/antivir-ium.init.d36
-rw-r--r--app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/ium.conf68
-rw-r--r--app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/mirrorconfig.xml44
-rw-r--r--app-antivirus/antivir-mailgate/ChangeLog25
-rw-r--r--app-antivirus/antivir-mailgate/Manifest12
-rw-r--r--app-antivirus/antivir-mailgate/antivir-mailgate-2.1.4_p7-r1.ebuild336
-rw-r--r--app-antivirus/antivir-mailgate/antivir-mailgate-3.0.0_p14.ebuild368
-rwxr-xr-xapp-antivirus/antivir-mailgate/files/2.1.4_p7/antivir-mailgate.init.d46
-rw-r--r--app-antivirus/antivir-mailgate/files/2.1.4_p7/avmailgate.conf.diff.postfix.bz2bin0 -> 5441 bytes
-rwxr-xr-xapp-antivirus/antivir-mailgate/files/2.1.4_p7/avupdater.conf26
-rwxr-xr-xapp-antivirus/antivir-mailgate/files/3.0.0_p14/antivir-mailgate.initd44
-rw-r--r--app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate-scanner.conf.diff.bz2bin0 -> 739 bytes
-rw-r--r--app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate.conf.diff.postfix.bz2bin0 -> 4956 bytes
-rw-r--r--app-antivirus/antivir-mailgate/metadata.xml10
-rw-r--r--app-antivirus/antivir-savapi/ChangeLog15
-rw-r--r--app-antivirus/antivir-savapi/Manifest12
-rw-r--r--app-antivirus/antivir-savapi/antivir-savapi-3.0.4_p32.ebuild154
-rw-r--r--app-antivirus/antivir-savapi/antivir-savapi-3.0.5.17.ebuild144
-rw-r--r--app-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.conf149
-rwxr-xr-xapp-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.initd59
-rw-r--r--app-antivirus/antivir-savapi/files/3.0.4_p32/avupdate.conf61
-rw-r--r--app-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.conf149
-rwxr-xr-xapp-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.initd59
-rw-r--r--app-antivirus/antivir-savapi/files/3.0.5.17/avupdate.conf61
-rw-r--r--app-antivirus/antivir-savapi/metadata.xml10
-rw-r--r--app-antivirus/antivir-webgate/ChangeLog12
-rw-r--r--app-antivirus/antivir-webgate/Manifest6
-rw-r--r--app-antivirus/antivir-webgate/antivir-webgate-1.3.0_p12.ebuild195
-rwxr-xr-xapp-antivirus/antivir-webgate/files/1.3.0_p12/antivir-webgate.init.d46
-rw-r--r--app-antivirus/antivir-webgate/files/1.3.0_p12/avwebgate.conf346
-rw-r--r--app-antivirus/antivir-webgate/metadata.xml10
-rw-r--r--app-antivirus/skyldav/ChangeLog19
-rw-r--r--app-antivirus/skyldav/Manifest5
-rw-r--r--app-antivirus/skyldav/files/skyldav-0.2_rc3-conf.patch20
-rw-r--r--app-antivirus/skyldav/files/skyldav-0.2_rc3-examples.patch12
-rw-r--r--app-antivirus/skyldav/files/skyldav-0.2_rc3-openlog.patch12
-rw-r--r--app-antivirus/skyldav/files/skyldav-0.2_rc3-sbin.patch19
-rw-r--r--app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130816-syslog.patch24
-rw-r--r--app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130817-disable-skyldavnotify.patch362
-rw-r--r--app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130821-examples.patch11
-rw-r--r--app-antivirus/skyldav/files/skyldav.confd11
-rwxr-xr-xapp-antivirus/skyldav/files/skyldav.initd26
-rw-r--r--app-antivirus/skyldav/metadata.xml12
-rw-r--r--app-antivirus/skyldav/skyldav-0.2_rc3.ebuild54
-rw-r--r--app-antivirus/skyldav/skyldav-0.2_rc3_p20130816.ebuild55
-rw-r--r--app-antivirus/skyldav/skyldav-0.2_rc3_p20130817-r1.ebuild57
-rw-r--r--app-antivirus/skyldav/skyldav-0.2_rc3_p20130817.ebuild54
-rw-r--r--app-antivirus/skyldav/skyldav-0.2_rc3_p20130821-r1.ebuild64
-rw-r--r--app-antivirus/skyldav/skyldav-0.2_rc3_p20130821.ebuild61
57 files changed, 3903 insertions, 0 deletions
diff --git a/app-antivirus/antivir-core/ChangeLog b/app-antivirus/antivir-core/ChangeLog
new file mode 100644
index 0000000..e524b43
--- /dev/null
+++ b/app-antivirus/antivir-core/ChangeLog
@@ -0,0 +1,16 @@
+# ChangeLog for app-antivirus/antivir-core
+# Copyright 1999-2008 Gentoo Foundation; Distributed under the GPL v2
+# $Header: $
+
+ 09 Dec 2008; Wolfram Schlich <wschlich@gentoo.org>
+ antivir-core-2.1.12_p19.ebuild:
+ added multilib eclass
+
+ 07 Oct 2008; Wolfram Schlich <wschlich@gentoo.org>
+ antivir-core-2.1.12_p19.ebuild:
+ add ~amd64
+
+ 29 Jul 2008; Wolfram Schlich <wschlich@gentoo.org> +metadata.xml,
+ antivir-core-2.1.12_p19.ebuild:
+ fixups
+
diff --git a/app-antivirus/antivir-core/Manifest b/app-antivirus/antivir-core/Manifest
new file mode 100644
index 0000000..d91bbde
--- /dev/null
+++ b/app-antivirus/antivir-core/Manifest
@@ -0,0 +1,7 @@
+AUX 2.1.12_p19/avupdater.conf 615 RMD160 ea08210b70b04ca1edec7b3460cfd095d88711ce SHA1 a254866aa4f7c44ab84839ee206a112ea262879b SHA256 8158dd1225f8384b4e0abff38850b87c001f897a10f34243df2cb69c3711a37d
+DIST antivir-updateplugin-prof-2.1.10.tar.gz 362704 RMD160 b0c24ef7fd3f623689a20e1795044e9fd61fd909 SHA1 605e82e96183740cdb314c7e11cef4e06ee723ab SHA256 9a555956b21b61b18b700c5408424b9258041fbd04195abde670dd0096fe9b13
+DIST antivir-workstation-prof-2.1.12-19.tar.gz 47657621 RMD160 2dd5f8c1cac069a42309e8e6f97a9e3de754b0fa SHA1 765b07d46f6f2805c1d320cd59083214fddfbfa4 SHA256 d5128e9dacab1cf5e40c4bf9244e49a3278875e62d2412175efc1ff27d5b9861
+DIST mirror.zip 25421 RMD160 b723453ff3b71c90fe3056ab6f88b9e175038110 SHA1 587f3af17b60a0804ce8944e193241cbb392033b SHA256 f6f0fbc8ef102b8cda70a5c8f53012ce975e492b07ef23402bfbe4ca7cc05a9c
+EBUILD antivir-core-2.1.12_p19.ebuild 4256 RMD160 f9a9717a83d16a5e2ba1a2a3962ca780d9e7fee2 SHA1 82bade62d9a55c7c70d17817f510285386d1bb0e SHA256 a44dc70ecc0286539225e38f85ecf2b2e74b0e4d32f479344550a64d3755ec2f
+MISC ChangeLog 452 RMD160 d338a82331c8ae614996b9db0a4b02c1b09a456c SHA1 1ed7d880f4f3d9f278a3508d78726aaa4c42553b SHA256 d5af4578ad22ecbaae4cfe86b86286341d7bfac21c5186a7ffa945aceb031912
+MISC metadata.xml 300 RMD160 3b9c1cd628f9d7ac94b68543ec737d5c2381a47e SHA1 33c5efd31a8aa789118535b921e211ffb5023ac3 SHA256 bc07a9aecce5770d1ace9af0a6c6af8ff6c7b16eb5e7947a1b178d1970855e43
diff --git a/app-antivirus/antivir-core/antivir-core-2.1.12_p19.ebuild b/app-antivirus/antivir-core/antivir-core-2.1.12_p19.ebuild
new file mode 100644
index 0000000..9b4016d
--- /dev/null
+++ b/app-antivirus/antivir-core/antivir-core-2.1.12_p19.ebuild
@@ -0,0 +1,206 @@
+# Copyright 1999-2008 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+##
+## Created by Wolfram Schlich <wschlich@gentoo.org>
+##
+## TODO
+## - install: shutdown running programs?
+## - install: show EULA?!
+## - install/config: copy keyfile?
+##
+
+inherit eutils multilib
+
+DESCRIPTION="AVIRA AntiVir virus scanner (core)"
+MY_P="${PN/core/workstation}-prof-${PV/_p/-}"
+SRC_URI="http://dl.antivir.de/down/unix/packages/${MY_P}.tar.gz
+ mirror? ( http://dl.antivir.de/down/unix/mirror.zip )
+ smc? ( http://dl.antivir.de/down/unix/packages/antivir-updateplugin-prof-2.1.10.tar.gz )"
+HOMEPAGE="http://www.antivir.de/"
+LICENSE="AVIRA-AntiVir"
+SLOT="0"
+KEYWORDS="~x86 ~amd64"
+IUSE="crypt gui mirror smc"
+DEPEND=""
+RDEPEND=""
+S="${WORKDIR}/${MY_P}"
+# prevent installation functions from stripping binaries
+# otherwise the antivir selfcheck fails. also don't try
+# to fetch the distribution tarball from a mirror.
+RESTRICT="strip mirror"
+
+#
+# Settings overridable by user supplied environment variables
+#
+
+AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}"
+AVCONFDIR="${AVCONFDIR:-/etc}"
+AVGROUP="${AVGROUP:-antivir}"
+AVGID="${AVGID:-220}"
+
+#
+# Standard ebuild functions
+#
+
+pkg_setup() {
+
+ #
+ # Add GROUP
+ #
+
+ enewgroup "${AVGROUP}" "${AVGID}"
+
+}
+
+src_install () {
+
+ #
+ # Home directory
+ #
+
+ diropts -oroot -groot -m0755
+ dodir "${AVHOMEDIR}"
+ diropts -oroot -g"${AVGROUP}" -m0770
+ dodir "${AVHOMEDIR}/.storage" "${AVHOMEDIR}/updcomp"
+ insinto "${AVHOMEDIR}"
+ insopts -oroot -g"${AVGROUP}" -m0644
+
+ #
+ # Executables, libraries and misc components
+ #
+
+ exeopts -oroot -g"${AVGROUP}" -m2755
+ exeinto "${AVHOMEDIR}"
+ doexe bin/linux_glibc22/antivir
+ diropts ""
+ dodir \
+ "${DESTTREE}/bin" \
+ "${DESTTREE}/sbin"
+ dosym "${AVHOMEDIR}/antivir" "${DESTTREE}/bin/antivir"
+ if use mirror; then
+ exeopts -oroot -g"${AVGROUP}" -m0750
+ doexe "${WORKDIR}"/antivir-mirror
+ fi
+
+ #
+ # VDF
+ #
+
+ insinto "${AVHOMEDIR}"
+ doins vdf/*.vdf
+
+ #
+ # Key file (TODO FIXME)
+ #
+
+ if [ -f "${FILESDIR}/hbedv.key" ]; then
+ insopts -oroot -g"${AVGROUP}" -m0640
+ insinto "${AVHOMEDIR}"
+ doins "${FILESDIR}/hbedv.key"
+ fi
+# dodir /etc/env.d && echo "CONFIG_PROTECT=\"${AVHOMEDIR}/hbedv.key\"" >"${D}/etc/env.d/99antivir"
+
+ #
+ # Config
+ #
+
+ insopts -oroot -g"${AVGROUP}" -m0640
+ insinto "${AVCONFDIR}"
+ doins \
+ "${FILESDIR}"/${PV}/avupdater.conf
+ if use mirror; then
+ newins "${WORKDIR}"/antivir-mirror.conf.default antivir-mirror.conf
+ fi
+
+ ## TODO:GUI
+
+ ## TODO:SMC
+
+ #
+ # Documents
+ #
+
+ dodoc \
+ LICENSE \
+ LICENSE.DE \
+ README \
+ doc/CHANGELOG \
+ doc/MANUAL \
+ legal/LICENSE.*
+ if use crypt; then
+ dodoc pgp/antivir.gpg
+ newdoc pgp/README README.gpg
+ fi
+ if use mirror; then
+ newdoc "${WORKDIR}"/README README.mirror
+ newdoc "${WORKDIR}"/LIESMICH LIESMICH.mirror
+ newdoc "${WORKDIR}"/product-types.txt antivir-mirror.product-types.txt
+ fi
+
+}
+
+pkg_preinst() {
+
+ #
+ # Check for legacy files
+ #
+
+ # Updater config: antivir.conf -> avupdater.conf
+ if [ -e "${AVCONFDIR}/antivir.conf" ]; then
+ ewarn
+ ewarn "You have a deprecated antivir.conf in ${AVCONFDIR}/."
+ ewarn "Please use ${AVCONFDIR}/avupdater.conf for the AntiVir Updater settings."
+ ewarn "A sample avupdater.conf has been installed to ${AVCONFDIR}/avupdater.conf"
+ ewarn "Please compare the settings from antivir.conf with those in avupdater.conf,"
+ ewarn "modify those in avupdater.conf as needed and remove antivir.conf when done."
+ ewarn
+ fi
+
+}
+
+pkg_postinst() {
+
+ #
+ # Config
+ #
+
+ echo
+ einfo ""
+ einfo "Configuration"
+ einfo "============="
+ einfo ""
+ einfo "Please run..."
+ einfo ""
+ einfo "\tebuild /var/db/pkg/${CATEGORY}/${PF}/${PF}.ebuild config"
+ einfo ""
+ einfo "...to configure the package!"
+
+ echo
+
+}
+
+pkg_config () {
+
+ #
+ # Automatic updates
+ # Generate a random number between 1 and 59 for the crontab
+ #
+
+ rand="$$$(date +%s)"
+ min="$[ ($rand % 59) + 1 ]"
+ echo
+ einfo ""
+ einfo "Using the internet updater"
+ einfo "=========================="
+ einfo ""
+ einfo "Add the following line to your /etc/crontab or a new file"
+ einfo "in /etc/cron.d/ to make AntiVir check for updates"
+ einfo "${min} minutes after every full hour:"
+ einfo ""
+ einfo "\t${min} * * * * root exec ${AVHOMEDIR}/antivir --update >/dev/null"
+ einfo ""
+ echo
+
+ ## TODO: mirror script
+}
diff --git a/app-antivirus/antivir-core/files/2.1.12_p19/avupdater.conf b/app-antivirus/antivir-core/files/2.1.12_p19/avupdater.conf
new file mode 100755
index 0000000..e2b3151
--- /dev/null
+++ b/app-antivirus/antivir-core/files/2.1.12_p19/avupdater.conf
@@ -0,0 +1,26 @@
+## reporting via mail
+EmailTo root
+
+## logging
+#LogTo /var/log/antivir.log
+SyslogFacility user
+SyslogPriority notice
+
+## proxy server
+#HTTPProxyServer proxy.example.com
+#HTTPProxyPort 3128
+#HTTPProxyUsername username
+#HTTPProxyPassword password
+
+## general update settings
+#HTTPUpdateServer http://antivir.example.com
+#UpdaterKeepsBackups
+
+## avupdater (better use cron)
+#AutoUpdateEvery2Hours
+#AutoUpdateDaily
+#AutoUpdateTime 4:23
+
+## GPG (for verification of signed binaries)
+GnuPGBinary /usr/bin/gpg
+GnuPGOptions --keyserver x-hkp://subkeys.pgp.net --keyserver-options auto-key-retrieve,honor-http-proxy,verbose
diff --git a/app-antivirus/antivir-core/metadata.xml b/app-antivirus/antivir-core/metadata.xml
new file mode 100644
index 0000000..a7162e9
--- /dev/null
+++ b/app-antivirus/antivir-core/metadata.xml
@@ -0,0 +1,10 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+<herd>no-herd</herd>
+<maintainer>
+ <email>wschlich@gentoo.org</email>
+ <name>Wolfram Schlich</name>
+ <description>Primary maintainer</description>
+</maintainer>
+</pkgmetadata>
diff --git a/app-antivirus/antivir-internet-update-manager/ChangeLog b/app-antivirus/antivir-internet-update-manager/ChangeLog
new file mode 100644
index 0000000..9f5fe0f
--- /dev/null
+++ b/app-antivirus/antivir-internet-update-manager/ChangeLog
@@ -0,0 +1,17 @@
+# ChangeLog for app-antivirus/antivir-internet-update-manager
+# Copyright 1999-2009 Gentoo Foundation; Distributed under the GPL v2
+# $Header: $
+
+ 02 Jun 2009; Wolfram Schlich <wschlich@gentoo.org> ++,
+ -files/2.4.0.6/antivir-ium.init.d, -files/2.4.0.6/ium.conf,
+ -files/2.4.0.6/mirrorconfig.xml,
+ -antivir-internet-update-manager-2.4.0.6.ebuild,
+ +antivir-internet-update-manager-2.4.0.6.3.ebuild:
+ version bump
+
+ 02 Jun 2009; Wolfram Schlich <wschlich@gentoo.org>
+ +files/2.4.0.6/antivir-ium.init.d, +files/2.4.0.6/ium.conf,
+ +files/2.4.0.6/mirrorconfig.xml,
+ +antivir-internet-update-manager-2.4.0.6.ebuild:
+ initial import
+
diff --git a/app-antivirus/antivir-internet-update-manager/Manifest b/app-antivirus/antivir-internet-update-manager/Manifest
new file mode 100644
index 0000000..0bc33af
--- /dev/null
+++ b/app-antivirus/antivir-internet-update-manager/Manifest
@@ -0,0 +1,6 @@
+AUX 2.4.0.6.3/antivir-ium.init.d 625 RMD160 5c3cd8d10a6aacf12c71eefa18228c75cd8e4ee6 SHA1 0cb414c1af96d8057baab66d9512819e76b89a07 SHA256 6ded8ef8e8ab9c5d8a168c69eb55e7ccaab6fc1df8cda69c9df1285a393a4878
+AUX 2.4.0.6.3/ium.conf 1964 RMD160 a9caae7cf6527fd2525275b557ef0521d704e8bf SHA1 e6a8042e8ff014a83ab4022d0a6ad5ea0f515517 SHA256 ebc270009ca99f15420dd367d6bf5bbc9db3abd771cbe583661f68310d675d1e
+AUX 2.4.0.6.3/mirrorconfig.xml 1756 RMD160 28757eb166088ecf5bf21bc137df8a97413e710c SHA1 b79d9901c70fc4156845e238269abe36b4450b59 SHA256 752535d2d9ae0aaae6f9340217898670d42a07c18d9e6e415ca9dcb9d21f2425
+DIST avira_update_manager_unix_en.tar.gz 2146016 RMD160 51c375249b7d88c1c577184f3401b6bdb591d900 SHA1 f9a1f50d0913d9cb628eb655c2b36a1376003a46 SHA256 43560e68c2a1fe0938d0ad203757bb8f1b41d0bb0b0c08b287a5b0d87b0852d1
+EBUILD antivir-internet-update-manager-2.4.0.6.3.ebuild 5104 RMD160 afb08363c949d1f8fe1197304285e0cd9ee55bf8 SHA1 92085aa3fcf27b0cc3a4bb32064068dee3828ee8 SHA256 fb1a012c5a4c5cac68fab3702a33c5e4400baffd64c10462186ab5fc8f2271ff
+MISC ChangeLog 639 RMD160 6df2f2c4ca6f094e1ce6441af6029787238465f2 SHA1 29f969e08e9af7a0fe95e4227a3c83daac4113d2 SHA256 3fb4fce20a39f876ffd8ae39a7c25d93ee30f04a8f9f1548a5d44ebe0ff55a92
diff --git a/app-antivirus/antivir-internet-update-manager/antivir-internet-update-manager-2.4.0.6.3.ebuild b/app-antivirus/antivir-internet-update-manager/antivir-internet-update-manager-2.4.0.6.3.ebuild
new file mode 100644
index 0000000..87174cf
--- /dev/null
+++ b/app-antivirus/antivir-internet-update-manager/antivir-internet-update-manager-2.4.0.6.3.ebuild
@@ -0,0 +1,234 @@
+# Copyright 1999-2009 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+##
+## Created by Wolfram Schlich <wschlich@gentoo.org>
+##
+## TODO
+## - ?
+##
+
+inherit eutils pax-utils
+
+DESCRIPTION="AVIRA AntiVir Update Manager"
+MY_P="avira_update_manager_unix-${PV%.*}-${PV##*.}"
+SRC_URI="http://dl1.pro.antivir.de/package/ium/unix/en/avira_update_manager_unix_en.tar.gz"
+HOMEPAGE="http://www.avira.com/"
+LICENSE="AVIRA-AntiVir"
+SLOT="0"
+KEYWORDS="~x86 ~amd64"
+IUSE=""
+DEPEND=""
+RDEPEND=">=app-antivirus/antivir-savapi-3"
+S="${WORKDIR}/${MY_P}"
+# prevent installation functions from stripping binaries
+# otherwise the antivir selfcheck fails. also don't try
+# to fetch the distribution tarball from a mirror.
+RESTRICT="strip mirror"
+
+#
+# Settings overridable by user supplied environment variables
+#
+
+AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}"
+AVCONFDIR="${AVCONFDIR:-/etc/avira}"
+AVIUMHTTPDIR="${AVIUMHTTPDIR:-/var/avira/ium/HttpRoot}"
+AVIUMLOGDIR="${AVIUMLOGDIR:-/var/log/ium}"
+AVUSER="${AVUSER:-avgate}"
+AVUID="${AVUID:-220}"
+AVSH="${AVSH:--1}"
+AVGROUP="${AVGROUP:-antivir}"
+AVGID="${AVGID:-220}"
+AVHOSTNAME="${AVHOSTNAME:-$(hostname -f)}"
+
+pkg_setup() {
+
+ #
+ # Add USER + GROUP
+ #
+
+ enewgroup "${AVGROUP}" "${AVGID}"
+ enewuser "${AVUSER}" "${AVUID}" "${AVSH}" -1 "${AVGROUP}" -c AntiVir
+
+}
+
+src_install() {
+
+ #
+ # Executables, libraries and misc components
+ #
+
+ exeinto "${AVHOMEDIR}/ium"
+ insinto "${AVHOMEDIR}/ium"
+ exeopts -oroot -g"${AVGROUP}" -m2750
+ insopts -oroot -g"${AVGROUP}" -m0640
+ doexe bin/linux_glibc22/ium
+ doins bin/linux_glibc22/ium_msg.avr
+ doins bin/linux_glibc22/libcommon.so
+ doins bin/linux_glibc22/common_msg.avr
+ doins etc/iumproducts.xml
+
+ local libupdate_ver=0.1.0.33
+ doins bin/linux_glibc22/libupdate.so.${libupdate_ver}
+ dosym "libupdate.so.${libupdate_ver}" "${AVHOMEDIR}/ium/libupdate.so.0"
+ dosym "libupdate.so.${libupdate_ver}" "${AVHOMEDIR}/ium/libupdate.so"
+
+ diropts ""
+ dodir "${DESTTREE}/sbin"
+ dosym "${AVHOMEDIR}/ium/ium" "${DESTTREE}/sbin/avium"
+
+ newexe script/avira_start.sh.template avium
+ doexe script/avium_start.sh
+ doexe script/avium_restart.sh
+ doexe script/avium_stop.sh
+
+ insinto "${AVHOMEDIR}/ium/ssl"
+ doins cert/cacert.pem
+ doins cert/server.pem
+
+ #
+ # Init script
+ #
+
+ exeopts -oroot -groot -m0755
+ exeinto /etc/init.d
+ newexe "${FILESDIR}/${PV}/antivir-ium.init.d" antivir-ium
+
+ #
+ # Config
+ #
+
+ insopts -oroot -g"${AVGROUP}" -m0640
+ insinto "${AVCONFDIR}"
+ doins "${FILESDIR}"/${PV}/ium.conf
+ dosed "s:%AVIUMHTTPDIR%:${AVIUMHTTPDIR}:g" "${AVCONFDIR}/ium.conf"
+ doins "${FILESDIR}"/${PV}/mirrorconfig.xml
+
+ #
+ # IUM log directory
+ #
+
+ diropts -o"${AVUSER}" -g"${AVGROUP}" -m0750
+ dodir "${AVIUMLOGDIR}"
+ dodir "${AVIUMHTTPDIR}"
+
+ #
+ # Documents
+ #
+
+ dodoc \
+ LICENSE \
+ LICENSE.DE \
+ README \
+ doc/MANUAL
+
+ #
+ # Templates
+ #
+
+ insinto "${AVHOMEDIR}/ium"
+ insopts -m0644
+ doins templates/*.htm
+ doins doc/mail_template_iumstatus.txt
+
+}
+
+pkg_postinst() {
+
+ #
+ # Manual invocation
+ #
+
+ elog
+ elog "Manually adding products to get updates for"
+ elog "==========================================="
+ elog
+ elog " ${AVHOMEDIR}/ium/ium --add_products"
+ elog
+ elog "Manually getting updates for products"
+ elog "====================================="
+ elog
+ elog " ${AVHOMEDIR}/ium/ium --get_updates"
+ elog
+
+ echo
+
+ #
+ # Automatic updates for products
+ #
+
+ rand="$(date +%N 2>/dev/null)"
+ min="$[ (${rand:-${RANDOM}} % 59) + 1 ]"
+ elog
+ elog "Automatically getting updates for products"
+ elog "=========================================="
+ elog
+ elog "Add the following line to your /etc/crontab or a new file"
+ elog "in /etc/cron.d/ to make AntiVir check for updates"
+ elog "${min} minutes after every full hour:"
+ elog
+ elog " ${min} * * * * root exec ${AVHOMEDIR}/ium/ium --get_updates >/dev/null"
+ elog
+
+ echo
+
+ #
+ # Automatic updates for IUM
+ #
+
+ rand="$(date +%N 2>/dev/null)"
+ min="$[ (${rand:-${RANDOM}} % 59) + 1 ]"
+ elog
+ elog "Automatically getting updates for IUM itself"
+ elog "==========================================="
+ elog
+ elog "Add the following line to your /etc/crontab or a new file"
+ elog "in /etc/cron.d/ to make AntiVir check for updates"
+ elog "${min} minutes after every full hour:"
+ elog
+ elog " ${min} * * * * root exec ${AVHOMEDIR}/avupdate --product=IUM >/dev/null"
+ elog
+
+ echo
+
+ #
+ # Client configuration info
+ #
+
+ elog
+ elog "Configuring clients"
+ elog "==================="
+ elog
+ elog "Windows clients"
+ elog "---------------"
+ elog
+ elog "Options -> General -> Update -> Webserver -> Download Server:"
+ elog " http://iumserver:7080/upd"
+ elog
+ elog "Linux clients"
+ elog "-------------"
+ elog
+ elog "For SAVAPI2 products add these two options in /etc/avupdater.conf:"
+ elog " HTTPUpdateServer 'iumserver':7080"
+ elog " IgnoreRemoteServerSpec yes"
+ elog
+ elog "For SAVAPI3 products adjust /etc/avupdate.conf as follows:"
+ elog " internet-srvs=http://iumserver:7080/upd"
+ elog
+
+ echo
+
+ #
+ # Templates
+ #
+
+ elog
+ elog "Using the HTML templates"
+ elog "========================"
+ elog
+ elog "The templates were installed into"
+ elog
+ elog "\t${AVHOMEDIR}/ium"
+ elog
+
+}
diff --git a/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/antivir-ium.init.d b/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/antivir-ium.init.d
new file mode 100755
index 0000000..d296554
--- /dev/null
+++ b/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/antivir-ium.init.d
@@ -0,0 +1,36 @@
+#!/sbin/runscript
+
+svc_name="Avira AntiVir Internet Update Manager"
+
+avium_script="/usr/lib/AntiVir/ium/avium"
+avium_config="/etc/avira/ium.conf"
+
+depend() {
+ need net
+ use logger dns
+}
+
+checkconfig() {
+ if [ ! -x "${avium_script}" ]; then
+ eerror "AntiVir IUM script [${avium_script}] missing"
+ return 1
+ fi
+ if [ ! -r "${avium_config}" ]; then
+ eerror "AntiVir IUM config [${avium_config}] missing"
+ return 1
+ fi
+}
+
+start() {
+ checkconfig || return 1
+ ebegin "Starting ${svc_name}"
+ "${avium_script}" start
+ eend $?
+}
+
+stop() {
+ checkconfig || return 2
+ ebegin "Stopping ${svc_name}"
+ "${avium_script}" stop
+ eend $?
+}
diff --git a/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/ium.conf b/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/ium.conf
new file mode 100644
index 0000000..a3d3f61
--- /dev/null
+++ b/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/ium.conf
@@ -0,0 +1,68 @@
+<?xml version="1.0" encoding="utf-8"?>
+<config>
+
+<communication>
+ <ip value="0.0.0.0" />
+ <use_proxy value="false" />
+ <proxy_host value="" />
+ <proxy_port value="8080" />
+ <proxy_use_auth value="false" />
+ <proxy_username value="" />
+ <proxy_password value="" />
+ <smtp_server value="" />
+ <smtp_from value="" />
+ <smtp_login_required value="false" />
+ <smtp_login value="" />
+ <smtp_password value="" />
+</communication>
+
+<general>
+ <log_level value="info" />
+</general>
+
+<soap>
+ <use_ssl value="true" />
+ <ssl_key_file value="server.pem" />
+ <ssl_passwd value="715F51D6D145986E5C5ACBC552D9273E28B856D084ECFDE16C05BA694C5877FC8F3FE8C5CBE464325C0018192DA76F937143" />
+</soap>
+
+<ium>
+ <general>
+ <language value="en" />
+ <testmode value="false" />
+ </general>
+ <communication>
+ <port value="7050" />
+ <port_async value="7051" />
+ <http_server_enable value="true" />
+ <http_server_ip value="0.0.0.0" />
+ <http_server_port value="7080" />
+ <http_server_port_test value="7022" />
+ <http_server_port_old value="7021" />
+ <http_server_root value="%AVIUMHTTPDIR%" />
+ <http_server_root_user value="" />
+ <http_server_root_pass value="" />
+ <http_server_root_old value="" />
+ <http_server_max_connections value="1000" />
+ <http_server_list_orig value="http://dl1.pro.antivir.de,http://dl2.pro.antivir.de,http://dl3.pro.antivir.de,http://dl4.pro.antivir.de,http://dl1.antivir.net,http://dl2.antivir.net,http://dl3.antivir.net" />
+ <http_server_list_user value="" />
+ <download_retry_wait value="10" />
+ <download_retries value="1" />
+ <download_connect_timeout value="120" />
+ <download_receive_timeout value="120" />
+ <override_server_list value="false" />
+ </communication>
+ <smtp>
+ <smtp_enable value="false"/>
+ <smtp_to value=""/>
+ <smtp_level value="error"/>
+ </smtp>
+ <update>
+ <automatic_selfupdate value="false" />
+ <automatic_mode value="true" />
+ </update>
+ <scheduler>
+ <enable value="false"/>
+ </scheduler>
+</ium>
+</config>
diff --git a/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/mirrorconfig.xml b/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/mirrorconfig.xml
new file mode 100644
index 0000000..a60ff73
--- /dev/null
+++ b/app-antivirus/antivir-internet-update-manager/files/2.4.0.6.3/mirrorconfig.xml
@@ -0,0 +1,44 @@
+<?xml version="1.0" encoding="utf-8" standalone="no"?>
+
+<MirrorConfig>
+ <product name="AV9_PROF_WIN32_DE"/>
+ <product name="AV9_PROF_WIN32_EN"/>
+ <product name="AV9_SERVER_WIN32_DE"/>
+ <product name="AV9_SERVER_WIN32_EN"/>
+ <product name="IUM_FRONTEND_WIN32_DE"/>
+ <product name="IUM_FRONTEND_WIN32_EN"/>
+ <product name="IUM_WIN32_DE"/>
+ <product name="IUM_WIN32_EN"/>
+ <product name="PRODUCT_MAILGATE"/>
+ <product name="PRODUCT_MAILGATE_GLIBC22_I386"/>
+ <product name="PRODUCT_NAME_AV7_NT_DE"/>
+ <product name="PRODUCT_NAME_AV7_NT_EN"/>
+ <product name="PRODUCT_NAME_IUM"/>
+ <product name="PRODUCT_NAME_IUM_FRONTEND"/>
+ <product name="PRODUCT_NAME_SMC_AGENT"/>
+ <product name="PRODUCT_NAME_SMC_AGENT_DE"/>
+ <product name="PRODUCT_NAME_SMC_AGENT_EN"/>
+ <product name="PRODUCT_NAME_SMC_GUI"/>
+ <product name="PRODUCT_NAME_SMC_GUI_DE"/>
+ <product name="PRODUCT_NAME_SMC_GUI_EN"/>
+ <product name="PRODUCT_NAME_SMC_SERVER"/>
+ <product name="PRODUCT_NAME_SMC_SERVER_DE"/>
+ <product name="PRODUCT_NAME_SMC_SERVER_EN"/>
+ <product name="PRODUCT_SRV"/>
+ <product name="PRODUCT_SRVWKS_GLIBC22_I386"/>
+ <product name="PRODUCT_WEBGATE"/>
+ <product name="PRODUCT_WEBGATE_GLIBC22_I386"/>
+ <product name="PRODUCT_WKS"/>
+ <product name="SAVAPI2_WIN"/>
+ <product name="SAVAPI3_GLIBC22_I386"/>
+ <product name="SAVAPI3_WIN"/>
+ <product name="SMC_AGENT_GLIBC22_I386"/>
+ <product name="SMC_AGENT_WIN32_DE"/>
+ <product name="SMC_AGENT_WIN32_EN"/>
+ <product name="UNIX_SERVER_3"/>
+ <product name="UNIX_SERVER_3_GLIBC22_I386"/>
+ <product name="UNIX_WORKSTATION_3"/>
+ <product name="UNIX_WORKSTATION_3_GLIBC22_I386"/>
+ <product name="WIN_SERVER8_DE"/>
+ <product name="WIN_SERVER8_EN"/>
+</MirrorConfig>
diff --git a/app-antivirus/antivir-mailgate/ChangeLog b/app-antivirus/antivir-mailgate/ChangeLog
new file mode 100644
index 0000000..8d3dd8a
--- /dev/null
+++ b/app-antivirus/antivir-mailgate/ChangeLog
@@ -0,0 +1,25 @@
+# ChangeLog for app-antivirus/antivir-mailgate
+# Copyright 1999-2009 Gentoo Foundation; Distributed under the GPL v2
+# $Header: $
+
+ 11 Nov 2009; Wolfram Schlich <wschlich@gentoo.org>
+ antivir-mailgate-3.0.0_p14.ebuild:
+ change SRC_URI
+
+ 04 Mar 2009; Wolfram Schlich <wschlich@gentoo.org>
+ +files/3.0.0_p14/antivir-mailgate.initd,
+ +files/3.0.0_p14/avmailgate.conf.diff.postfix.bz2,
+ +files/3.0.0_p14/avmailgate-scanner.conf.diff.bz2,
+ +antivir-mailgate-3.0.0_p14.ebuild:
+ version bump
+
+ 09 Dec 2008; Wolfram Schlich <wschlich@gentoo.org>
+ antivir-mailgate-2.1.4_p7-r1.ebuild:
+ added ~amd64
+
+ 15 Apr 2008; Wolfram Schlich <wschlich@gentoo.org>
+ +files/2.1.4_p7/antivir-mailgate.init.d,
+ +files/2.1.4_p7/avmailgate.conf.diff.postfix,
+ +files/2.1.4_p7/avupdater.conf, +antivir-mailgate-2.1.4_p7.ebuild:
+ version bump
+
diff --git a/app-antivirus/antivir-mailgate/Manifest b/app-antivirus/antivir-mailgate/Manifest
new file mode 100644
index 0000000..db491ff
--- /dev/null
+++ b/app-antivirus/antivir-mailgate/Manifest
@@ -0,0 +1,12 @@
+AUX 2.1.4_p7/antivir-mailgate.init.d 898 RMD160 a12942a6cf8da27c5f81adbf664f3ee18b93235a SHA1 0962a1e2984dd05b422fe0b60dd1130e857979ee SHA256 035233b80a5f045cec10de2958e219f5f26c18c54de714165f60840d25ad37d5
+AUX 2.1.4_p7/avmailgate.conf.diff.postfix.bz2 5441 RMD160 6bbd8034dc30f6dac14837f995a41c4c85db6f99 SHA1 bed730d418122d56d532a891a5f450a26ec5a709 SHA256 ba282cad20e11c99b34b60bd5d04446bf6f73b110626ec1c60ba4b7c09d1d208
+AUX 2.1.4_p7/avupdater.conf 621 RMD160 865549dfa52ac4787e5c992f51751d73c11630c4 SHA1 82e87c29ca000044530cafeda4cbb9d98097671c SHA256 3dbac1f331fc34bb9f79bf0faa9f729a2601b0938c0fa09a8cc0365b04266392
+AUX 3.0.0_p14/antivir-mailgate.initd 914 RMD160 76676ec1567eed718ef42bf544aaac97e7d9199b SHA1 d0513ac129be814471e6d227c11cd353389caea1 SHA256 109cf5ad9bd344843d4449c64ccebabbdeff4986abf1390e922bb0c3c1962738
+AUX 3.0.0_p14/avmailgate-scanner.conf.diff.bz2 739 RMD160 990a5123af9d306d0a0ba4321bb28bf4bd92819a SHA1 16dae66743e50736688ec455891c3dbce0d8129f SHA256 8e1df8fe3204232c8493cf330e3abca20f72a95f7bd7682f1a48988740baa715
+AUX 3.0.0_p14/avmailgate.conf.diff.postfix.bz2 4956 RMD160 e58e8abcdcca507a0eeb9e622150944a5e53ac6f SHA1 1accef8fb518ebb81983b9284f532f37f716c17f SHA256 0e98cd1bcd99e3cea27fec91d50fa0196b689dd90f09f8bf5689c48f5d3f925a
+DIST antivir-mailgate-prof-2.1.4-7.tar.gz 67012825 RMD160 1fd8ff0b0bfc95a3d06014feeaed4868136c7c9f SHA1 e007111a14c51337c63cb5590381828365a4a0e6 SHA256 2498484d745fdd7c3b6af3fc790a9b2b7d5e2dc202d0d4868501b372ca9e294e
+DIST antivir-mailgate-prof-3.0.0-14.tar.gz 31856751 RMD160 20ad6af92fdef49145bbffdf2376a955110e9892 SHA1 457c617e57d38e8e3d2f95ecc1d16bf347d967d4 SHA256 0df70bb0e4c6612c2c7a678f41648d8d23951c564a0dd4ea52f96f4c656abb0a
+EBUILD antivir-mailgate-2.1.4_p7-r1.ebuild 7441 RMD160 ccb05a1387578ca2c3db48c982201964c4810f1a SHA1 8f4ae83241db9a4d8d8112b08fd6edbfa7be9a07 SHA256 9e533ba0c524690e47ae6be496fa8082d18ff980986fe8543bfde90e3f61e9bc
+EBUILD antivir-mailgate-3.0.0_p14.ebuild 8422 RMD160 f3f48caa8bfc04be9ca72315723f24e2fdb083ce SHA1 cc88cbb2b13bf0a47f502a6fd08ba9dbf7d8a4a5 SHA256 54d2897870a66eca5f4674ce6e192ccce7b4217f623b9dbb6d66e02a20c43fdd
+MISC ChangeLog 832 RMD160 62ceafa2c022ef6cd56af082221bc3f494682c23 SHA1 db11ed019c0da029d14289a0c175d9f2dd26218c SHA256 a1abdf4a90b5504407333ca168e177dab2c6cd2377304773a6a58b0dfcebd2bd
+MISC metadata.xml 300 RMD160 3b9c1cd628f9d7ac94b68543ec737d5c2381a47e SHA1 33c5efd31a8aa789118535b921e211ffb5023ac3 SHA256 bc07a9aecce5770d1ace9af0a6c6af8ff6c7b16eb5e7947a1b178d1970855e43
diff --git a/app-antivirus/antivir-mailgate/antivir-mailgate-2.1.4_p7-r1.ebuild b/app-antivirus/antivir-mailgate/antivir-mailgate-2.1.4_p7-r1.ebuild
new file mode 100644
index 0000000..211b261
--- /dev/null
+++ b/app-antivirus/antivir-mailgate/antivir-mailgate-2.1.4_p7-r1.ebuild
@@ -0,0 +1,336 @@
+# Copyright 1999-2008 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+##
+## Created by Wolfram Schlich <wschlich@gentoo.org>
+##
+## TODO
+## - install: shutdown running programs?
+## - install: show EULA?!
+## - config: setup avmailgate.acl?
+## - install/config: copy keyfile?
+## - config: setup mta config? -> show INSTALL.$mta file, at least
+## - install/config: avguard? -> check if avspooldir is excluded in guard config
+## - install/config: gui?
+##
+
+inherit eutils pax-utils multilib
+
+DESCRIPTION="AVIRA AntiVir MailGate SMTP mail virus scanner"
+MY_P="${PN}-prof-${PV/_p/-}"
+SRC_URI="http://dl.antivir.de/down/unix/packages/${MY_P}.tar.gz"
+HOMEPAGE="http://www.antivir.de/"
+LICENSE="AVIRA-AntiVir"
+SLOT="0"
+KEYWORDS="~amd64 ~x86"
+IUSE="postfix spamfilter" # TODO: gui exim qmail sendmail smc
+DEPEND=""
+RDEPEND=">=app-antivirus/antivir-core-2.1.12_p19
+ postfix? ( mail-mta/postfix )"
+S="${WORKDIR}/${MY_P}"
+# prevent installation functions from stripping binaries
+# otherwise the antivir selfcheck fails. also don't try
+# to fetch the distribution tarball from a mirror.
+RESTRICT="strip mirror"
+
+#
+# Settings overridable by user supplied environment variables
+#
+
+AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}"
+AVCONFDIR="${AVCONFDIR:-/etc}"
+AVSPOOLDIR="${AVSPOOLDIR:-/var/spool/avmailgate}"
+AVTMPDIR="${AVTMPDIR:-/var/tmp}"
+AVPIDDIR="${AVPIDDIR:-/var/tmp}"
+AVUSER="${AVUSER:-avgate}"
+AVUID="${AVUID:-220}"
+AVSH="${AVSH:--1}"
+AVGROUP="${AVGROUP:-antivir}"
+AVGID="${AVGID:-220}"
+AVHOSTNAME="${AVHOSTNAME:-$(hostname -f)}"
+
+#
+# Standard ebuild functions
+#
+
+pkg_setup() {
+
+ #
+ # Add USER + GROUP
+ #
+
+ enewgroup "${AVGROUP}" "${AVGID}"
+ enewuser "${AVUSER}" "${AVUID}" "${AVSH}" -1 "${AVGROUP}" -c AntiVir
+
+}
+
+src_unpack() {
+
+ unpack ${A}
+ cd "${S}"
+
+ #
+ # MTA specific config
+ #
+
+ if use postfix; then
+ pushd ./etc >/dev/null \
+ && epatch "${FILESDIR}/${PV}/avmailgate.conf.diff.postfix.bz2" \
+ && popd >/dev/null
+ fi
+
+}
+
+src_install() {
+
+ #
+ # Base directories
+ #
+
+ if use spamfilter; then
+ diropts -oroot -g"${AVGROUP}" -m0750
+ dodir /var/lib/AntiVir
+ dodir /var/tmp/AntiVir
+ diropts -o"${AVUSER}" -g"${AVGROUP}" -m0750
+ dodir /var/tmp/AntiVir/asmailgate
+ dodir /var/lib/AntiVir/asmailgate
+ diropts ""
+ dosym /var/lib/AntiVir/asmailgate "${AVHOMEDIR}/mailgate-var"
+ fi
+
+ #
+ # Executables, libraries and misc components
+ #
+
+ exeopts -oroot -g"${AVGROUP}" -m2750
+ exeinto "${AVHOMEDIR}"
+ doexe bin/linux_glibc22/avmailgate.bin
+ diropts ""
+ dodir \
+ "${DESTTREE}/sbin"
+ dosym "${AVHOMEDIR}/avmailgate.bin" "${DESTTREE}/sbin/avmailgate"
+
+ if use spamfilter; then
+ exeopts -o"${AVUSER}" -g"${AVGROUP}" -m2750
+ exeinto "${AVHOMEDIR}"
+ doexe contrib/asmailgate/bin/linux_glibc22/avmg_ext_filter.bin
+ pax-mark -m "${D}${AVHOMEDIR}"/avmg_ext_filter.bin
+ insopts -o"${AVUSER}" -g"${AVGROUP}" -m0644
+ insinto "${AVHOMEDIR}"
+ doins contrib/asmailgate/bin/linux_glibc22/libasmailgate.so
+ doins contrib/asmailgate/data/asmailgate.dat
+ insinto /var/lib/AntiVir/asmailgate
+ doins contrib/asmailgate/var/as_sdk_features.yml
+ doins contrib/asmailgate/var/asconfig.yml
+ doins contrib/asmailgate/var/asmailgate.yml
+ fi
+
+ #
+ # Init script
+ #
+
+ exeopts -oroot -groot -m0755
+ exeinto /etc/init.d
+ newexe "${FILESDIR}/${PV}/antivir-mailgate.init.d" antivir-mailgate
+
+ #
+ # Config
+ #
+
+ insopts -oroot -g"${AVGROUP}" -m0640
+ insinto "${AVCONFDIR}"
+ doins \
+ etc/avmailgate.acl \
+ etc/avmailgate.conf \
+ etc/avmailgate.ignore \
+ etc/avmailgate.scan \
+ etc/avmailgate.warn
+# use gui && doins etc/avmailgate.conf-gui
+ dosed "s:%AVHOMEDIR%:${AVHOMEDIR}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVCONFDIR%:${AVCONFDIR}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVSPOOLDIR%:${AVSPOOLDIR}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVPIDDIR%:${AVPIDDIR}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVUSER%:${AVUSER}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVGROUP%:${AVGROUP}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVHOSTNAME%:${AVHOSTNAME}:g" "${AVCONFDIR}/avmailgate.conf"
+ if use spamfilter; then
+ dosed "s:^EnableSpamCheck NO:EnableSpamCheck YES:g" "${AVCONFDIR}/avmailgate.conf"
+ touch "${T}/asmailgate.except"
+ doins "${T}/asmailgate.except"
+ fi
+
+ #
+ # Spool directory
+ #
+
+ diropts -o"${AVUSER}" -g"${AVGROUP}" -m0700
+ dodir "${AVSPOOLDIR}"
+ keepdir "${AVSPOOLDIR}"
+ for dir in incoming outgoing rejected; do
+ dodir "${AVSPOOLDIR}/${dir}"
+ keepdir "${AVSPOOLDIR}/${dir}"
+ done
+
+ ## TODO:GUI
+
+ ## TODO:SMC
+
+ #
+ # Documents
+ #
+
+ dodoc \
+ LICENSE \
+ LICENSE.DE \
+ README \
+ doc/CHANGELOG \
+ doc/INSTALL \
+ doc/INSTALL.DE \
+ doc/MANUAL \
+ doc/RELEASE_NOTES \
+ doc/avmailgate_de.pdf \
+ doc/avmailgate_en.pdf \
+ legal/LICENSE.*
+ use postfix && dodoc \
+ doc/INSTALL.postfix
+# use exim && dodoc \
+# doc/INSTALL.exim
+# use sendmail && dodoc \
+# doc/INSTALL.sendmail
+# use qmail && dodoc \
+# doc/INSTALL.qmail
+# use qmail && use gui && dodoc \
+# doc/INSTALL.qmail.gui
+ doman \
+ doc/man/avmailgate.8 \
+ doc/man/avmailgate.conf.5
+
+ #
+ # Templates
+ #
+
+ diropts ""
+ dodir "${AVHOMEDIR}/templates.sample"
+ insopts ""
+ insinto "${AVHOMEDIR}/templates.sample"
+ doins \
+ templates/en/patho-administrator \
+ templates/en/patho-recipient \
+ templates/en/patho-sender \
+ templates/en/alert-administrator \
+ templates/en/alert-recipient \
+ templates/en/alert-sender
+ if use spamfilter; then
+ doins \
+ templates/spamfilter-subjects
+ fi
+
+}
+
+pkg_preinst() {
+
+ #
+ # Check for legacy files
+ #
+
+ # Templates: virus-* -> alert-*
+ for t in administrator recipient sender; do
+ tf="${AVHOMEDIR}/templates/virus-${t}"
+ new_tf="${AVHOMEDIR}/templates/alert-${t}"
+ if [ -e "${tf}" ]; then
+ ewarn
+ ewarn "You have an old notification mail template file in ${AVHOMEDIR}/templates/:"
+ ewarn " -> ${tf}"
+ ewarn "Please rename it as follows:"
+ ewarn " -> ${new_tf}"
+ ewarn
+ fi
+ done
+
+}
+
+pkg_postinst() {
+
+ #
+ # Config
+ #
+
+ echo
+ einfo ""
+ einfo "Configuration"
+ einfo "============="
+ einfo ""
+ einfo "Please run..."
+ einfo ""
+ einfo "\tebuild /var/db/pkg/${CATEGORY}/${PF}/${PF}.ebuild config"
+ einfo ""
+ einfo "...to configure the package!"
+ einfo ""
+ echo
+
+}
+
+pkg_config() {
+
+ #
+ # Init script
+ #
+
+ echo
+ einfo ""
+ einfo "Using the init script"
+ einfo "====================="
+ einfo ""
+ einfo "Simply run..."
+ einfo ""
+ einfo "\trc-update add antivir-mailgate default"
+ einfo ""
+ einfo "...and your're done."
+ einfo ""
+
+ #
+ # Templates
+ #
+
+ echo
+ einfo ""
+ einfo "Using the notification mail templates"
+ einfo "====================================="
+ einfo ""
+ einfo "The sample templates were installed into"
+ einfo ""
+ einfo "\t${AVHOMEDIR}/templates.sample"
+ einfo ""
+ einfo "To use them, simply do..."
+ einfo ""
+ einfo "\tcd ${AVHOMEDIR}"
+ einfo "\tmv templates.sample templates"
+ einfo ""
+ einfo "...and edit the files in the 'templates'-subdirectory."
+ einfo ""
+
+ #
+ # MTA config
+ # TODO: qmail exim sendmail
+ #
+
+ if use postfix; then
+ echo
+ einfo ""
+ einfo "MTA configuration (Postfix)"
+ einfo "==========================="
+ einfo ""
+ einfo "See INSTALL.postfix. Quickstart:"
+ einfo ""
+ einfo "1) Add the following line to /etc/postfix/main.cf:"
+ einfo ""
+ einfo "\tcontent_filter = smtp:127.0.0.1:10024"
+ einfo ""
+ einfo "2) Add the following line to /etc/postfix/master.cf:"
+ einfo ""
+ einfo "\tlocalhost:10025 inet n - y - - smtpd -o content_filter="
+ einfo ""
+ fi
+
+}
diff --git a/app-antivirus/antivir-mailgate/antivir-mailgate-3.0.0_p14.ebuild b/app-antivirus/antivir-mailgate/antivir-mailgate-3.0.0_p14.ebuild
new file mode 100644
index 0000000..83eccad
--- /dev/null
+++ b/app-antivirus/antivir-mailgate/antivir-mailgate-3.0.0_p14.ebuild
@@ -0,0 +1,368 @@
+# Copyright 1999-2009 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+##
+## Created by Wolfram Schlich <wschlich@gentoo.org>
+##
+## TODO
+## - install: shutdown running programs?
+## - install: show EULA?!
+## - config: setup avmailgate.acl?
+## - install/config: copy keyfile?
+## - config: setup mta config? -> show INSTALL.$mta file, at least
+## - install/config: avguard? -> check if avspooldir is excluded in guard config
+## - install/config: gui?
+##
+
+inherit eutils pax-utils
+
+DESCRIPTION="AVIRA AntiVir MailGate SMTP mail virus scanner"
+MY_P="${PN}-prof-${PV/_p/-}"
+SRC_URI="http://wolfram.schlich.org/linux/gentoo/distfiles/${MY_P}.tar.gz"
+HOMEPAGE="http://www.avira.com/"
+LICENSE="AVIRA-AntiVir"
+SLOT="0"
+KEYWORDS="~x86 ~amd64"
+IUSE="postfix spamfilter" # TODO: gui exim qmail sendmail smc
+DEPEND=""
+RDEPEND=">=app-antivirus/antivir-savapi-3
+ postfix? ( mail-mta/postfix )"
+S="${WORKDIR}/${MY_P}"
+# prevent installation functions from stripping binaries
+# otherwise the antivir selfcheck fails. also don't try
+# to fetch the distribution tarball from a mirror.
+RESTRICT="strip mirror"
+
+#
+# Settings overridable by user supplied environment variables
+#
+
+AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}"
+AVCONFDIR="${AVCONFDIR:-/etc}"
+AVSPOOLDIR="${AVSPOOLDIR:-/var/spool/avmailgate}"
+AVTMPDIR="${AVTMPDIR:-/var/tmp}"
+AVPIDDIR="${AVPIDDIR:-/var/tmp}"
+AVSAVAPISOCKET="${AVSAVAPISOCKET:-/var/run/avmailgate/scanner}"
+AVUSER="${AVUSER:-avgate}"
+AVUID="${AVUID:-220}"
+AVSH="${AVSH:--1}"
+AVGROUP="${AVGROUP:-antivir}"
+AVGID="${AVGID:-220}"
+AVHOSTNAME="${AVHOSTNAME:-$(hostname -f)}"
+
+#
+# Standard ebuild functions
+#
+
+pkg_setup() {
+
+ #
+ # Add USER + GROUP
+ #
+
+ enewgroup "${AVGROUP}" "${AVGID}"
+ enewuser "${AVUSER}" "${AVUID}" "${AVSH}" -1 "${AVGROUP}" -c AntiVir
+
+}
+
+src_unpack() {
+
+ unpack ${A}
+ cd "${S}"
+
+ #
+ # MTA specific config
+ #
+
+ if use postfix; then
+ pushd ./etc >/dev/null \
+ && epatch "${FILESDIR}/${PV}/avmailgate.conf.diff.postfix.bz2" \
+ && popd >/dev/null
+ fi
+
+ #
+ # scanner config
+ #
+
+ pushd ./etc >/dev/null \
+ && epatch "${FILESDIR}/${PV}/avmailgate-scanner.conf.diff.bz2" \
+ && popd >/dev/null
+
+}
+
+src_install() {
+
+ #
+ # Base directories
+ #
+
+ if use spamfilter; then
+ diropts -oroot -g"${AVGROUP}" -m0750
+ dodir /var/tmp/AntiVir
+ diropts -o"${AVUSER}" -g"${AVGROUP}" -m0750
+ dodir /var/tmp/AntiVir/asmailgate
+ diropts ""
+ fi
+
+ #
+ # Executables, libraries and misc components
+ #
+
+ exeinto "${AVHOMEDIR}"
+ exeopts -oroot -g"${AVGROUP}" -m2750
+ doexe bin/linux_glibc22/avmailgate.bin
+ exeopts -oroot -g"${AVGROUP}" -m0750
+ newexe script/avira_start.sh.template avmailgate
+ doexe script/avmailgate_start.sh
+ doexe script/avmailgate_stop.sh
+ doexe script/avmailgate_restart.sh
+ doexe script/avmailgate_post.sh
+ diropts ""
+ dodir "${DESTTREE}/sbin"
+ dosym "${AVHOMEDIR}/avmailgate.bin" "${DESTTREE}/sbin/avmailgate"
+ if use spamfilter; then
+ exeopts -o"${AVUSER}" -g"${AVGROUP}" -m2750
+ exeinto "${AVHOMEDIR}"
+ doexe contrib/asmailgate/bin/linux_glibc22/avmg_ext_filter.bin
+ insopts -o"${AVUSER}" -g"${AVGROUP}" -m0644
+ insinto "${AVHOMEDIR}"
+ doins contrib/asmailgate/bin/linux_glibc22/libasmailgate.so
+ doins contrib/asmailgate/data/asmailgate.dat
+ fi
+
+ #
+ # Init script
+ #
+
+ exeopts -oroot -groot -m0755
+ exeinto /etc/init.d
+ newexe "${FILESDIR}/${PV}/antivir-mailgate.initd" antivir-mailgate
+
+ #
+ # Config
+ #
+
+ insopts -oroot -g"${AVGROUP}" -m0640
+ insinto "${AVCONFDIR}"
+ doins \
+ etc/avmailgate.acl \
+ etc/avmailgate.conf \
+ etc/avmailgate.ignore \
+ etc/avmailgate.scan \
+ etc/avmailgate.warn
+# use gui && doins etc/avmailgate.conf-gui
+ dosed "s:%AVHOMEDIR%:${AVHOMEDIR}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVCONFDIR%:${AVCONFDIR}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVSPOOLDIR%:${AVSPOOLDIR}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVPIDDIR%:${AVPIDDIR}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVSAVAPISOCKET%:${AVSAVAPISOCKET}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVUSER%:${AVUSER}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVGROUP%:${AVGROUP}:g" "${AVCONFDIR}/avmailgate.conf"
+ dosed "s:%AVHOSTNAME%:${AVHOSTNAME}:g" "${AVCONFDIR}/avmailgate.conf"
+
+ doins etc/avmailgate-scanner.conf
+ dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/avmailgate-scanner.conf"
+ dosed "s:%AVSAVAPISOCKET%:${AVSAVAPISOCKET}:g" "${AVCONFDIR}/avmailgate-scanner.conf"
+ dosed "s:%AVUSER%:${AVUSER}:g" "${AVCONFDIR}/avmailgate-scanner.conf"
+ dosed "s:%AVGROUP%:${AVGROUP}:g" "${AVCONFDIR}/avmailgate-scanner.conf"
+
+ if use spamfilter; then
+ dosed "s:^EnableSpamCheck NO:EnableSpamCheck YES:g" "${AVCONFDIR}/avmailgate.conf"
+ touch "${T}/asmailgate.except"
+ doins "${T}/asmailgate.except"
+ fi
+
+ #
+ # Spool directory
+ #
+
+ diropts -o"${AVUSER}" -g"${AVGROUP}" -m0700
+ dodir "${AVSPOOLDIR}"
+ keepdir "${AVSPOOLDIR}"
+ for dir in incoming outgoing rejected; do
+ dodir "${AVSPOOLDIR}/${dir}"
+ keepdir "${AVSPOOLDIR}/${dir}"
+ done
+
+ ## TODO:GUI
+
+ ## TODO:SMC
+
+ #
+ # Documents
+ #
+
+ dodoc \
+ LICENSE \
+ LICENSE.DE \
+ README \
+ doc/CHANGELOG \
+ doc/INSTALL \
+ doc/INSTALL.DE \
+ doc/MANUAL \
+ doc/RELEASE_NOTES \
+ doc/avmailgate_en.pdf \
+ legal/LICENSE.*
+ use postfix && dodoc \
+ doc/INSTALL.postfix
+# use exim && dodoc \
+# doc/INSTALL.exim
+# use sendmail && dodoc \
+# doc/INSTALL.sendmail
+# use qmail && dodoc \
+# doc/INSTALL.qmail
+# use qmail && use gui && dodoc \
+# doc/INSTALL.qmail.gui
+ doman \
+ doc/man/avmailgate.8 \
+ doc/man/avmailgate.conf.5
+
+ #
+ # Templates
+ #
+
+ diropts ""
+ dodir "${AVHOMEDIR}/templates.sample"
+ insopts ""
+ insinto "${AVHOMEDIR}/templates.sample"
+ doins \
+ templates/en/patho-administrator \
+ templates/en/patho-recipient \
+ templates/en/patho-sender \
+ templates/en/alert-administrator \
+ templates/en/alert-recipient \
+ templates/en/alert-sender
+ if use spamfilter; then
+ doins \
+ templates/spamfilter-subjects
+ fi
+
+}
+
+pkg_preinst() {
+
+ #
+ # Check for legacy files
+ #
+
+ # Templates: virus-* -> alert-*
+ for t in administrator recipient sender; do
+ tf="${AVHOMEDIR}/templates/virus-${t}"
+ new_tf="${AVHOMEDIR}/templates/alert-${t}"
+ if [ -e "${tf}" ]; then
+ ewarn
+ ewarn "You have an old notification mail template file in ${AVHOMEDIR}/templates/:"
+ ewarn " -> ${tf}"
+ ewarn "Please rename it as follows:"
+ ewarn " -> ${new_tf}"
+ ewarn
+ fi
+ done
+
+}
+
+pkg_postinst() {
+
+ #
+ # Config
+ #
+
+ echo
+ einfo ""
+ einfo "Configuration"
+ einfo "============="
+ einfo ""
+ einfo "Please run..."
+ einfo ""
+ einfo "\tebuild /var/db/pkg/${CATEGORY}/${PF}/${PF}.ebuild config"
+ einfo ""
+ einfo "...to configure the package!"
+ einfo ""
+ echo
+
+}
+
+pkg_config() {
+
+ #
+ # Init script
+ #
+
+ echo
+ einfo ""
+ einfo "Using the init script"
+ einfo "====================="
+ einfo ""
+ einfo "Simply run..."
+ einfo ""
+ einfo "\trc-update add antivir-mailgate default"
+ einfo ""
+ einfo "...and your're done."
+ einfo ""
+
+ #
+ # Templates
+ #
+
+ echo
+ einfo ""
+ einfo "Using the notification mail templates"
+ einfo "====================================="
+ einfo ""
+ einfo "The sample templates were installed into"
+ einfo ""
+ einfo "\t${AVHOMEDIR}/templates.sample"
+ einfo ""
+ einfo "To use them, simply do..."
+ einfo ""
+ einfo "\tcd ${AVHOMEDIR}"
+ einfo "\tmv templates.sample templates"
+ einfo ""
+ einfo "...and edit the files in the 'templates'-subdirectory."
+ einfo ""
+
+ #
+ # MTA config
+ # TODO: qmail exim sendmail
+ #
+
+ if use postfix; then
+ echo
+ einfo ""
+ einfo "MTA configuration (Postfix)"
+ einfo "==========================="
+ einfo ""
+ einfo "See INSTALL.postfix. Quickstart:"
+ einfo ""
+ einfo "1) Add the following line to /etc/postfix/main.cf:"
+ einfo ""
+ einfo "\tcontent_filter = smtp:127.0.0.1:10024"
+ einfo ""
+ einfo "2) Add the following line to /etc/postfix/master.cf:"
+ einfo ""
+ einfo "\tlocalhost:10025 inet n - y - - smtpd -o content_filter="
+ einfo ""
+ fi
+
+ #
+ # Automatic updates
+ # Generate a random number between 1 and 59 for the crontab
+ #
+
+ rand="$$$(date +%s)"
+ min="$[ ($rand % 59) + 1 ]"
+ echo
+ einfo ""
+ einfo "Using the internet updater"
+ einfo "=========================="
+ einfo ""
+ einfo "Add the following line to your /etc/crontab or a new file"
+ einfo "in /etc/cron.d/ to make AntiVir check for updates"
+ einfo "${min} minutes after every full hour:"
+ einfo ""
+ einfo "\t${min} * * * * root exec ${AVHOMEDIR}/avupdate --product=mailgate >/dev/null"
+ einfo ""
+ echo
+
+}
diff --git a/app-antivirus/antivir-mailgate/files/2.1.4_p7/antivir-mailgate.init.d b/app-antivirus/antivir-mailgate/files/2.1.4_p7/antivir-mailgate.init.d
new file mode 100755
index 0000000..2c7d466
--- /dev/null
+++ b/app-antivirus/antivir-mailgate/files/2.1.4_p7/antivir-mailgate.init.d
@@ -0,0 +1,46 @@
+#!/sbin/runscript
+## 2003 by H+BEDV Datentechnik GmbH,
+## Wolfram Schlich <wschlich@antivir.de>
+
+svc_name="AntiVir MailGate"
+
+## required binaries
+avmailgate_bin="/usr/lib/AntiVir/avmailgate.bin"
+
+## required config files
+avmailgate_cfg="/etc/avmailgate.conf"
+avmailgate_acl="/etc/avmailgate.acl"
+
+depend() {
+ need net
+ use logger dns
+}
+
+checkconfig() {
+ if [ ! -x "${avmailgate_bin}" ]; then
+ eerror "avmailgate binary [${avmailgate_bin}] missing"
+ return 1
+ fi
+ if [ ! -r "${avmailgate_cfg}" ]; then
+ eerror "avmailgate config [${avmailgate_cfg}] missing"
+ return 1
+ fi
+ if [ ! -r "${avmailgate_acl}" ]; then
+ eerror "avmailgate acl [${avmailgate_acl}] missing"
+ return 1
+ fi
+}
+
+start() {
+ checkconfig || return 1
+ ebegin "Starting ${svc_name}"
+ "${avmailgate_bin}" --start
+ eend $?
+}
+
+stop() {
+ checkconfig || return 2
+ ebegin "Stopping ${svc_name}"
+ "${avmailgate_bin}" --stop
+ eend $?
+}
diff --git a/app-antivirus/antivir-mailgate/files/2.1.4_p7/avmailgate.conf.diff.postfix.bz2 b/app-antivirus/antivir-mailgate/files/2.1.4_p7/avmailgate.conf.diff.postfix.bz2
new file mode 100644
index 0000000..f0ede41
--- /dev/null
+++ b/app-antivirus/antivir-mailgate/files/2.1.4_p7/avmailgate.conf.diff.postfix.bz2
Binary files differ
diff --git a/app-antivirus/antivir-mailgate/files/2.1.4_p7/avupdater.conf b/app-antivirus/antivir-mailgate/files/2.1.4_p7/avupdater.conf
new file mode 100755
index 0000000..1453987
--- /dev/null
+++ b/app-antivirus/antivir-mailgate/files/2.1.4_p7/avupdater.conf
@@ -0,0 +1,26 @@
+## reporting via mail
+EmailTo postmaster
+
+## logging
+#LogTo /var/log/antivir.log
+SyslogFacility user
+SyslogPriority notice
+
+## proxy server
+#HTTPProxyServer proxy.example.com
+#HTTPProxyPort 3128
+#HTTPProxyUsername username
+#HTTPProxyPassword password
+
+## general update settings
+#HTTPUpdateServer http://antivir.example.com
+#UpdaterKeepsBackups
+
+## avupdater (better use cron)
+#AutoUpdateEvery2Hours
+#AutoUpdateDaily
+#AutoUpdateTime 4:23
+
+## GPG (for verification of signed binaries)
+GnuPGBinary /usr/bin/gpg
+GnuPGOptions --keyserver x-hkp://subkeys.pgp.net --keyserver-options auto-key-retrieve,honor-http-proxy,verbose
diff --git a/app-antivirus/antivir-mailgate/files/3.0.0_p14/antivir-mailgate.initd b/app-antivirus/antivir-mailgate/files/3.0.0_p14/antivir-mailgate.initd
new file mode 100755
index 0000000..f1cb9b8
--- /dev/null
+++ b/app-antivirus/antivir-mailgate/files/3.0.0_p14/antivir-mailgate.initd
@@ -0,0 +1,44 @@
+#!/sbin/runscript
+
+svc_name="AntiVir MailGate"
+
+## required executables
+antivir_mailgate_script="/usr/lib/AntiVir/avmailgate"
+
+## required config files
+antivir_mailgate_cfg="/etc/avmailgate.conf"
+antivir_mailgate_acl="/etc/avmailgate.acl"
+
+depend() {
+ need net
+ use logger dns
+}
+
+checkconfig() {
+ if [ ! -x "${antivir_mailgate_script}" ]; then
+ eerror "AntiVir MailGate script [${antivir_mailgate_script}] missing"
+ return 1
+ fi
+ if [ ! -r "${antivir_mailgate_cfg}" ]; then
+ eerror "AntiVir MailGate config [${antivir_mailgate_cfg}] missing"
+ return 1
+ fi
+ if [ ! -r "${antivir_mailgate_acl}" ]; then
+ eerror "AntiVir MailGate ACL [${antivir_mailgate_acl}] missing"
+ return 1
+ fi
+}
+
+start() {
+ checkconfig || return 1
+ ebegin "Starting ${svc_name}"
+ "${antivir_mailgate_script}" start
+ eend $?
+}
+
+stop() {
+ checkconfig || return 1
+ ebegin "Stopping ${svc_name}"
+ "${antivir_mailgate_script}" stop
+ eend $?
+}
diff --git a/app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate-scanner.conf.diff.bz2 b/app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate-scanner.conf.diff.bz2
new file mode 100644
index 0000000..19c85a3
--- /dev/null
+++ b/app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate-scanner.conf.diff.bz2
Binary files differ
diff --git a/app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate.conf.diff.postfix.bz2 b/app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate.conf.diff.postfix.bz2
new file mode 100644
index 0000000..2347478
--- /dev/null
+++ b/app-antivirus/antivir-mailgate/files/3.0.0_p14/avmailgate.conf.diff.postfix.bz2
Binary files differ
diff --git a/app-antivirus/antivir-mailgate/metadata.xml b/app-antivirus/antivir-mailgate/metadata.xml
new file mode 100644
index 0000000..a7162e9
--- /dev/null
+++ b/app-antivirus/antivir-mailgate/metadata.xml
@@ -0,0 +1,10 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+<herd>no-herd</herd>
+<maintainer>
+ <email>wschlich@gentoo.org</email>
+ <name>Wolfram Schlich</name>
+ <description>Primary maintainer</description>
+</maintainer>
+</pkgmetadata>
diff --git a/app-antivirus/antivir-savapi/ChangeLog b/app-antivirus/antivir-savapi/ChangeLog
new file mode 100644
index 0000000..d6677eb
--- /dev/null
+++ b/app-antivirus/antivir-savapi/ChangeLog
@@ -0,0 +1,15 @@
+# ChangeLog for app-antivirus/antivir-savapi
+# Copyright 1999-2009 Gentoo Foundation; Distributed under the GPL v2
+# $Header: $
+
+ 02 Jun 2009; Wolfram Schlich <wschlich@gentoo.org>
+ +files/3.0.5.17/antivir-savapi.conf, +files/3.0.5.17/antivir-savapi.initd,
+ +files/3.0.5.17/avupdate.conf, +antivir-savapi-3.0.5.17.ebuild:
+ version bump
+
+ 04 Mar 2009; Wolfram Schlich <wschlich@gentoo.org>
+ +files/3.0.4_p32/antivir-savapi.conf,
+ +files/3.0.4_p32/antivir-savapi.initd, +files/3.0.4_p32/avupdate.conf,
+ +metadata.xml, +antivir-savapi-3.0.4_p32.ebuild:
+ initial import
+
diff --git a/app-antivirus/antivir-savapi/Manifest b/app-antivirus/antivir-savapi/Manifest
new file mode 100644
index 0000000..0269fdd
--- /dev/null
+++ b/app-antivirus/antivir-savapi/Manifest
@@ -0,0 +1,12 @@
+AUX 3.0.4_p32/antivir-savapi.conf 4060 RMD160 69bcb774bb52a9204f4aea6f46f8edd52cb0eed5 SHA1 688f3a4647f0e9199bf987d6070942e8213e247a SHA256 28ff617e5897f95a5a90c73b6469facd69deda717dd3fb680acdc8f9cf3c8370
+AUX 3.0.4_p32/antivir-savapi.initd 1196 RMD160 998f1e154faea52ee829241dfc7b68c8dc020ed7 SHA1 38edb72f6a5993649eb47140cc125e20f8411d06 SHA256 50e39ef969836c38eacf3aa39ce4bf8266e9ade9107837dd21c85670f35caefb
+AUX 3.0.4_p32/avupdate.conf 1818 RMD160 d119181616626b8baa0011e9f5ad65c21cc97ba9 SHA1 73d442a204d1337e214922093c12f9b4b2190c56 SHA256 54a3828786a5168068e663f654c6d9caa7d00fcd3e510d034fbb725915b64c53
+AUX 3.0.5.17/antivir-savapi.conf 4060 RMD160 69bcb774bb52a9204f4aea6f46f8edd52cb0eed5 SHA1 688f3a4647f0e9199bf987d6070942e8213e247a SHA256 28ff617e5897f95a5a90c73b6469facd69deda717dd3fb680acdc8f9cf3c8370
+AUX 3.0.5.17/antivir-savapi.initd 1196 RMD160 998f1e154faea52ee829241dfc7b68c8dc020ed7 SHA1 38edb72f6a5993649eb47140cc125e20f8411d06 SHA256 50e39ef969836c38eacf3aa39ce4bf8266e9ade9107837dd21c85670f35caefb
+AUX 3.0.5.17/avupdate.conf 1818 RMD160 5215f87c342e8f46d8a0645d9441c2cd42a760db SHA1 5a0e874d5118dd9897b25c8dfe8f07396acbc072 SHA256 ed27fb1a8b504e9b8511c1077c0faad5e9e9a4b0bb0db9183e43c6a6afe5b070
+DIST antivir-mailgate-prof.tgz 31856751 RMD160 20ad6af92fdef49145bbffdf2376a955110e9892 SHA1 457c617e57d38e8e3d2f95ecc1d16bf347d967d4 SHA256 0df70bb0e4c6612c2c7a678f41648d8d23951c564a0dd4ea52f96f4c656abb0a
+DIST antivir-server-prof.tar.gz 44063389 RMD160 ea8ae5318b4a091b0188bfa76e0779d334f5c83b SHA1 73deea933d83759cf78629661a9e2b1054accbbb SHA256 dcf884b8d1fb0ae5d532e226ff82d54d10fb1e4847aa8a7d40b8c84e658893df
+EBUILD antivir-savapi-3.0.4_p32.ebuild 3881 RMD160 161f5a458199c4ae0c02bca75b49a5c52b61986d SHA1 27dda7b84e0ada649b2c63fbff993ffa190822f5 SHA256 5f64360c5f33b0e4c896bbd83c4db83b693f38c67dc22f05d15a0944e741f791
+EBUILD antivir-savapi-3.0.5.17.ebuild 3615 RMD160 2eafe87762d43e39d731947e5812911420e379ea SHA1 992327773338f001cde6a69780f39bc4e9207378 SHA256 ca9ef23ed1006214e64d81a4a3556840af2b7d07a237df72c7343fcf7c7f1031
+MISC ChangeLog 576 RMD160 137fce0d351a9af9cd265faabec77c8c965a87cc SHA1 d0d89cacb6530d173bb47f365ea78197ec8df96a SHA256 6e1470342b4964a5f82dd90df1d7a27e37150baf749be713cae07e0d9c1fbd87
+MISC metadata.xml 300 RMD160 3b9c1cd628f9d7ac94b68543ec737d5c2381a47e SHA1 33c5efd31a8aa789118535b921e211ffb5023ac3 SHA256 bc07a9aecce5770d1ace9af0a6c6af8ff6c7b16eb5e7947a1b178d1970855e43
diff --git a/app-antivirus/antivir-savapi/antivir-savapi-3.0.4_p32.ebuild b/app-antivirus/antivir-savapi/antivir-savapi-3.0.4_p32.ebuild
new file mode 100644
index 0000000..5aaf343
--- /dev/null
+++ b/app-antivirus/antivir-savapi/antivir-savapi-3.0.4_p32.ebuild
@@ -0,0 +1,154 @@
+# Copyright 1999-2009 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+##
+## Created by Wolfram Schlich <wschlich@gentoo.org>
+##
+## TODO
+## - install: shutdown running programs?
+## - install: show EULA?!
+## - install/config: copy keyfile?
+##
+
+inherit eutils
+
+DESCRIPTION="AVIRA AntiVir virus scanner (SAVAPI)"
+#MY_P="${PN/savapi/mailgate}-prof-${PV/_p/-}"
+MY_P="${PN/savapi/mailgate}-prof-3.0.0-14"
+MY_P2="${PN/savapi/mailgate}-prof"
+SRC_URI="http://dl1.pro.antivir.de/package/mailgate/unix/en/${MY_P2}.tgz"
+#SRC_URI="http://storage.bu.avira.com/pub/savapi/2008.10.07/savapi3-${PV/_p/.}-linux_glibc22.zip"
+HOMEPAGE="http://www.avira.com/"
+LICENSE="AVIRA-AntiVir"
+SLOT="0"
+KEYWORDS="~x86 ~amd64"
+IUSE=""
+DEPEND=""
+RDEPEND=""
+S="${WORKDIR}/${MY_P}"
+#S="${WORKDIR}"
+# prevent installation functions from stripping binaries
+# otherwise the antivir selfcheck fails. also don't try
+# to fetch the distribution tarball from a mirror.
+RESTRICT="strip mirror"
+
+#
+# Settings overridable by user supplied environment variables
+#
+
+AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}"
+AVCONFDIR="${AVCONFDIR:-/etc/avira}"
+AVTMPDIR="${AVTMPDIR:-/var/tmp}"
+#AVSAVAPISOCKET="${AVSAVAPISOCKET:-/var/run/antivir-savapi/scanner}"
+#AVUSER="${AVUSER:-avgate}"
+#AVUID="${AVUID:-220}"
+#AVSH="${AVSH:--1}"
+AVGROUP="${AVGROUP:-antivir}"
+AVGID="${AVGID:-220}"
+
+#
+# Standard ebuild functions
+#
+
+pkg_setup() {
+
+ #
+ # Add USER + GROUP
+ #
+
+ enewgroup "${AVGROUP}" "${AVGID}"
+# enewuser "${AVUSER}" "${AVUID}" "${AVSH}" -1 "${AVGROUP}" -c AntiVir
+
+}
+
+src_unpack() {
+ unpack ${A}
+ cd "${S}"
+# ln -s . bin; ln -s . linux_glibc22
+}
+
+src_install () {
+
+ #
+ # Home directory
+ #
+
+ diropts -oroot -groot -m0755
+ dodir "${AVHOMEDIR}"
+ diropts -oroot -g"${AVGROUP}" -m0770
+ insinto "${AVHOMEDIR}"
+ insopts -oroot -g"${AVGROUP}" -m0644
+
+ #
+ # Executables, libraries and misc components
+ #
+
+ exeinto "${AVHOMEDIR}"
+ exeopts -oroot -g"${AVGROUP}" -m2755
+ doexe bin/linux_glibc22/savapi
+ doexe bin/linux_glibc22/avupdate.bin
+ doexe bin/linux_glibc22/avlinfo
+ exeopts -oroot -g"${AVGROUP}" -m0755
+ doexe script/savapi3_reload.sh
+ doexe script/savapi3_post.sh
+ doexe script/avupdate
+ doexe script/post_install.sh
+ doins bin/linux_glibc22/avupdate_msg.avr
+ doins bin/linux_glibc22/ae*.so
+ doins bin/linux_glibc22/ae*.dat
+ lv=$(cd bin/linux_glibc22; ls -1 libsavapi3.so.*); lv=${lv##*.so.}
+ doins bin/linux_glibc22/libsavapi3.so.${lv}
+ dosym libsavapi3.so.${lv} "${AVHOMEDIR}"/libsavapi3.so
+ diropts ""
+ dodir "${DESTTREE}/bin"
+ dosym "${AVHOMEDIR}/savapi" "${DESTTREE}/bin/savapi"
+
+ #
+ # Init script
+ #
+
+# exeopts -oroot -groot -m0755
+# exeinto /etc/init.d
+# newexe "${FILESDIR}/${PV}/antivir-savapi.initd" antivir-savapi
+
+ #
+ # Config
+ #
+
+ insopts -oroot -g"${AVGROUP}" -m0640
+# insinto "${AVCONFDIR}"
+# doins "${FILESDIR}"/${PV}/antivir-savapi.conf
+# dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/antivir-savapi.conf"
+# dosed "s:%AVSAVAPISOCKET%:${AVSAVAPISOCKET}:g" "${AVCONFDIR}/antivir-savapi.conf"
+# dosed "s:%AVUSER%:${AVUSER}:g" "${AVCONFDIR}/antivir-savapi.conf"
+# dosed "s:%AVGROUP%:${AVGROUP}:g" "${AVCONFDIR}/antivir-savapi.conf"
+ insinto "${AVCONFDIR}"
+ doins "${FILESDIR}"/${PV}/avupdate.conf
+ dosed "s:%AVHOMEDIR%:${AVHOMEDIR}:g" "${AVCONFDIR}/avupdate.conf"
+ dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/avupdate.conf"
+
+}
+
+pkg_config () {
+
+ #
+ # Automatic updates
+ # Generate a random number between 1 and 59 for the crontab
+ #
+
+ rand="$$$(date +%s)"
+ min="$[ ($rand % 59) + 1 ]"
+ echo
+ einfo ""
+ einfo "Using the internet updater"
+ einfo "=========================="
+ einfo ""
+ einfo "Add the following line to your /etc/crontab or a new file"
+ einfo "in /etc/cron.d/ to make AntiVir check for updates"
+ einfo "${min} minutes after every full hour:"
+ einfo ""
+ einfo "\t${min} * * * * root exec ${AVHOMEDIR}/avupdate --product=scanner >/dev/null"
+ einfo ""
+ echo
+
+}
diff --git a/app-antivirus/antivir-savapi/antivir-savapi-3.0.5.17.ebuild b/app-antivirus/antivir-savapi/antivir-savapi-3.0.5.17.ebuild
new file mode 100644
index 0000000..08a1da3
--- /dev/null
+++ b/app-antivirus/antivir-savapi/antivir-savapi-3.0.5.17.ebuild
@@ -0,0 +1,144 @@
+# Copyright 1999-2009 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+##
+## Created by Wolfram Schlich <wschlich@gentoo.org>
+##
+## TODO
+## - install: shutdown running programs?
+## - install: show EULA?!
+## - install/config: copy keyfile?
+##
+
+inherit eutils
+
+DESCRIPTION="AVIRA AntiVir virus scanner (SAVAPI)"
+MY_P="${PN/savapi/server}-prof-3.0.2-5"
+SRC_URI="http://dl1.pro.antivir.de/package/srv_avira/unix/en/prof/antivir-server-prof.tar.gz"
+HOMEPAGE="http://www.avira.com/"
+LICENSE="AVIRA-AntiVir"
+SLOT="0"
+KEYWORDS="~x86 ~amd64"
+IUSE=""
+DEPEND=""
+RDEPEND=""
+S="${WORKDIR}/${MY_P}"
+#S="${WORKDIR}"
+# prevent installation functions from stripping binaries
+# otherwise the antivir selfcheck fails. also don't try
+# to fetch the distribution tarball from a mirror.
+RESTRICT="strip mirror binchecks"
+
+#
+# Settings overridable by user supplied environment variables
+#
+
+AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}"
+AVCONFDIR="${AVCONFDIR:-/etc/avira}"
+AVTMPDIR="${AVTMPDIR:-/var/tmp}"
+#AVSAVAPISOCKET="${AVSAVAPISOCKET:-/var/run/antivir-savapi/scanner}"
+#AVUSER="${AVUSER:-avgate}"
+#AVUID="${AVUID:-220}"
+#AVSH="${AVSH:--1}"
+AVGROUP="${AVGROUP:-antivir}"
+AVGID="${AVGID:-220}"
+
+#
+# Standard ebuild functions
+#
+
+pkg_setup() {
+
+ #
+ # Add USER + GROUP
+ #
+
+ enewgroup "${AVGROUP}" "${AVGID}"
+# enewuser "${AVUSER}" "${AVUID}" "${AVSH}" -1 "${AVGROUP}" -c AntiVir
+
+}
+
+src_install () {
+
+ #
+ # Home directory
+ #
+
+ diropts -oroot -groot -m0755
+ dodir "${AVHOMEDIR}"
+ diropts -oroot -g"${AVGROUP}" -m0770
+ insinto "${AVHOMEDIR}"
+ insopts -oroot -g"${AVGROUP}" -m0644
+
+ #
+ # Executables, libraries and misc components
+ #
+
+ exeinto "${AVHOMEDIR}"
+ exeopts -oroot -g"${AVGROUP}" -m2755
+ doexe bin/linux_glibc22/savapi
+ doexe bin/linux_glibc22/avupdate.bin
+ doexe bin/linux_glibc22/avlinfo
+ exeopts -oroot -g"${AVGROUP}" -m0755
+ doexe script/savapi3_reload.sh
+ doexe script/savapi3_post.sh
+ doexe script/avupdate
+ doexe script/post_install.sh
+ doins bin/linux_glibc22/avupdate_msg.avr
+ doins bin/linux_glibc22/ae*.so
+ doins bin/linux_glibc22/ae*.dat
+ lv=$(cd bin/linux_glibc22; ls -1 libsavapi3.so.*); lv=${lv##*.so.}
+ doins bin/linux_glibc22/libsavapi3.so.${lv}
+ dosym libsavapi3.so.${lv} "${AVHOMEDIR}"/libsavapi3.so
+ diropts ""
+ dodir "${DESTTREE}/bin"
+ dosym "${AVHOMEDIR}/savapi" "${DESTTREE}/bin/savapi"
+
+ #
+ # Init script
+ #
+
+# exeopts -oroot -groot -m0755
+# exeinto /etc/init.d
+# newexe "${FILESDIR}/${PV}/antivir-savapi.initd" antivir-savapi
+
+ #
+ # Config
+ #
+
+ insopts -oroot -g"${AVGROUP}" -m0640
+# insinto "${AVCONFDIR}"
+# doins "${FILESDIR}"/${PV}/antivir-savapi.conf
+# dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/antivir-savapi.conf"
+# dosed "s:%AVSAVAPISOCKET%:${AVSAVAPISOCKET}:g" "${AVCONFDIR}/antivir-savapi.conf"
+# dosed "s:%AVUSER%:${AVUSER}:g" "${AVCONFDIR}/antivir-savapi.conf"
+# dosed "s:%AVGROUP%:${AVGROUP}:g" "${AVCONFDIR}/antivir-savapi.conf"
+ insinto "${AVCONFDIR}"
+ doins "${FILESDIR}"/${PV}/avupdate.conf
+ dosed "s:%AVHOMEDIR%:${AVHOMEDIR}:g" "${AVCONFDIR}/avupdate.conf"
+ dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/avupdate.conf"
+
+}
+
+pkg_config () {
+
+ #
+ # Automatic updates
+ #
+
+ rand="$(date +%N 2>/dev/null)"
+ min="$[ (${rand:-${RANDOM}} % 59) + 1 ]"
+ echo
+ einfo ""
+ einfo "Using the internet updater"
+ einfo "=========================="
+ einfo ""
+ einfo "Add the following line to your /etc/crontab or a new file"
+ einfo "in /etc/cron.d/ to make AntiVir check for updates"
+ einfo "${min} minutes after every full hour:"
+ einfo ""
+ einfo " ${min} * * * * root exec ${AVHOMEDIR}/avupdate --product=signatures >/dev/null"
+ einfo ""
+ echo
+
+}
diff --git a/app-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.conf b/app-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.conf
new file mode 100644
index 0000000..7edf089
--- /dev/null
+++ b/app-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.conf
@@ -0,0 +1,149 @@
+# This is the SAVAPI scanner backend configuration file.
+# It is used to set values for scanner specific
+# options.
+
+# ---------------------------------------------------------------------
+# SocketPermissions [mode]
+#
+# The permissions of the scanner backend's socket.
+
+SocketPermissions 0660
+
+
+# ---------------------------------------------------------------------
+# ListenAddress [address]
+#
+# The socket on which the scanner will listen for scan requests.
+#
+# IMPORTANT:
+#
+# When changing this option, you also have to change the option
+# "ScannerListenAddress" in MailGate's configuration file
+# (default /etc/avmailgate.conf).
+
+ListenAddress unix:%AVSAVAPISOCKET%
+
+
+# --------------------------------------------------------------------
+# User [user]
+#
+# The user the scanner runs as.
+#
+# IMPORTANT:
+#
+# When changing this option, you also have to change the option
+# "User" in MailGate's configuration file
+# (default /etc/avmailgate.conf). Changing this option has several
+# side effects with MailGate. You have to make sure that all
+# directories and files are still accessible to this user.
+# Please see the file "MANUAL" in the package for details.
+
+User %AVUSER%
+
+
+# --------------------------------------------------------------------
+# Group [group]
+#
+# The group the scanner runs as.
+#
+# IMPORTANT:
+#
+# When changing this option, you also have to change the option
+# "Group" in MailGate's configuration file
+# (default /etc/avmailgate.conf). Changing this option has several
+# side effects with MailGate. You have to make sure that all
+# directories and files are still accessible to this user.
+# Please see the file "MANUAL" in the package for details.
+
+Group %AVGROUP%
+
+
+# --------------------------------------------------------------------
+# UseSavapiProxy [0|1]
+#
+# The proxy feature in SAVAPI performs scans more efficiently
+# by using and reusing a prepared pool of scanners. While this
+# pool increases throughput this feature requires the pool size
+# to be wisely chosen -- too many scanners will put load on the
+# machine without gaining more performance, too few scanners may
+# have the SAVAPI using applications wait unnecessarily.
+#
+# Default: UseSavapiProxy 0
+
+UseSavapiProxy 1
+
+# --------------------------------------------------------------------
+# PoolScanners [integer]
+#
+# The number of prepared AntiVir scanners in the pool.
+# See option "UseSavapiProxy".
+#
+# Default: PoolScanners 24
+
+PoolScanners 24
+
+# --------------------------------------------------------------------
+# PoolConnections [integer]
+#
+# The maximum number of simultaneous allowed connections
+# from Avira MailGate to the scanner pool.
+#
+# Default: PoolConnections 8
+
+PoolConnections 8
+
+# --------------------------------------------------------------------
+# SyslogFacility [facility]
+#
+# The facility that is used to when logging to syslog.
+
+SyslogFacility daemon
+
+
+# --------------------------------------------------------------------
+# ReportLevel [integer]
+#
+# The report level sets the log verbosity of the scanner backend.
+# Available values:
+#
+# 0 Log errors
+# 1 Log errors and alerts
+# 2 Log errors, alerts and warnings
+# 3 Log errors, alerts, warnings and debug messages
+#
+# ("alerts" is information about potential malicious code).
+#
+# Default: 0
+
+ReportLevel 2
+
+
+# --------------------------------------------------------------------
+# ScanTemp [path]
+#
+# The directory used by the scanner to store temporary files like
+# extracted files from archives.
+# It's also used for other temporary files like lock files.
+#
+# NOTE:
+#
+# The scanner backend does not recognize the environment variable
+# "TMPDIR".
+#
+# IMPORTANT:
+#
+# You should also change the option "TemporaryDir" in MailGate's
+# configuration file (default /etc/avmailgate.conf) when changing the
+# option "ScanTemp".
+# You're then sure that both components use the same temporary
+# directory.
+
+ScanTemp %AVTMPDIR%
+
+
+# --------------------------------------------------------------------
+# LogFileName [path]
+#
+# Path to a specific log file.
+
+# Default: LogFileName /path/to/logfile
diff --git a/app-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.initd b/app-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.initd
new file mode 100755
index 0000000..ca475d6
--- /dev/null
+++ b/app-antivirus/antivir-savapi/files/3.0.4_p32/antivir-savapi.initd
@@ -0,0 +1,59 @@
+#!/sbin/runscript
+
+svc_name="AntiVir SAVAPI"
+
+## required binaries
+antivir_savapi_bin="/usr/lib/AntiVir/savapi"
+
+## required config files
+antivir_savapi_cfg="/etc/antivir-savapi.conf"
+
+opts="${opts} reload"
+
+depend() {
+ need net
+ use logger dns
+}
+
+checkconfig() {
+ if [ ! -x "${antivir_savapi_bin}" ]; then
+ eerror "SAVAPI binary [${antivir_savapi_bin}] missing"
+ return 1
+ fi
+ if [ ! -r "${antivir_savapi_cfg}" ]; then
+ eerror "SAVAPI config [${antivir_savapi_cfg}] missing"
+ return 1
+ fi
+}
+
+start() {
+ checkconfig || return 1
+ ebegin "Starting ${svc_name}"
+ "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \
+ --allow-remote-shutdown &>/dev/null
+ eend $?
+}
+
+stop() {
+ checkconfig || return 1
+ ebegin "Stopping ${svc_name}"
+ "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \
+ --stop &>/dev/null
+ eend $?
+}
+
+reload() {
+ checkconfig || return 1
+ ebegin "Reloading ${svc_name}"
+ "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \
+ --reload-engine --allow-remote-shutdown &>/dev/null
+ eend $?
+}
+
+status() {
+ checkconfig || return 1
+ ebegin "Checking status of ${svc_name}"
+ "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \
+ --status &>/dev/null
+ eend $?
+}
diff --git a/app-antivirus/antivir-savapi/files/3.0.4_p32/avupdate.conf b/app-antivirus/antivir-savapi/files/3.0.4_p32/avupdate.conf
new file mode 100644
index 0000000..c0d1a0a
--- /dev/null
+++ b/app-antivirus/antivir-savapi/files/3.0.4_p32/avupdate.conf
@@ -0,0 +1,61 @@
+# This configuration file updates the Engine and the Signatures automatically
+
+# The list of Internet update servers.
+internet-srvs=http://dl1.pro.antivir.de,http://dl2.pro.antivir.de,http://dl3.pro.antivir.de,http://dl4.pro.antivir.de,http://dl1.antivir.net,http://dl2.antivir.net,http://dl3.antivir.net
+
+# Specifies the master.idx file.
+master-file=/idx/master.idx
+
+# Specifies the installation directory for updated product files.
+install-dir=%AVHOMEDIR%
+
+# Temporary directory for downloading update files.
+temp-dir=%AVTMPDIR%
+
+# If auth-method is set in avupdate.conf, the Updater requires the smtp login data
+#smtp-user=
+
+# If auth-method is set in avupdate.conf, the Updater requires the smtp login data
+#smtp-password=
+
+# The smtp server for sending email notifications
+smtp-server=127.0.0.1
+
+# The smtp port for sending email notifications
+smtp-port=25
+
+# When set in avupdate.conf, the Updater requires the smtp login data: smtp-user
+#auth-method=
+
+# HTTP
+#username=http_user
+#password=http_pass
+
+# HTTP proxy
+#proxy-host=proxy.example.com
+#proxy-port=3128
+#proxy-username=proxy_user
+#proxy-password=proxy_pass
+
+# Requests
+connect-timeout=30
+receive-timeout=30
+retries=2
+retry-timeout=60
+
+# This option can have one of three values:
+# - 0 - no email notifications are sent,
+# - 1 - email notifications are sent in case of "successful update", "unsuccessful
+# update", or "up to date".
+# - 2 - email notification only in case of "unsuccessful update".
+notify-when=2
+
+# Receiver of the notification emails.
+email-to=root@localhost
+
+# Specify a full path with a filename to which AntiVir Avupdate
+# will write its log messages.
+log=/var/log/avupdate.log
+log-append
+#log-rotate
+log-template=${YEAR}-${MONTH}-${DAY} ${HOUR}:${MINUTE}:${SECOND}; ${FULLHOST}; ${SOURCE}.${LEVEL}; avupdate.bin[${PID}]; ${MSG}
diff --git a/app-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.conf b/app-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.conf
new file mode 100644
index 0000000..7edf089
--- /dev/null
+++ b/app-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.conf
@@ -0,0 +1,149 @@
+# This is the SAVAPI scanner backend configuration file.
+# It is used to set values for scanner specific
+# options.
+
+# ---------------------------------------------------------------------
+# SocketPermissions [mode]
+#
+# The permissions of the scanner backend's socket.
+
+SocketPermissions 0660
+
+
+# ---------------------------------------------------------------------
+# ListenAddress [address]
+#
+# The socket on which the scanner will listen for scan requests.
+#
+# IMPORTANT:
+#
+# When changing this option, you also have to change the option
+# "ScannerListenAddress" in MailGate's configuration file
+# (default /etc/avmailgate.conf).
+
+ListenAddress unix:%AVSAVAPISOCKET%
+
+
+# --------------------------------------------------------------------
+# User [user]
+#
+# The user the scanner runs as.
+#
+# IMPORTANT:
+#
+# When changing this option, you also have to change the option
+# "User" in MailGate's configuration file
+# (default /etc/avmailgate.conf). Changing this option has several
+# side effects with MailGate. You have to make sure that all
+# directories and files are still accessible to this user.
+# Please see the file "MANUAL" in the package for details.
+
+User %AVUSER%
+
+
+# --------------------------------------------------------------------
+# Group [group]
+#
+# The group the scanner runs as.
+#
+# IMPORTANT:
+#
+# When changing this option, you also have to change the option
+# "Group" in MailGate's configuration file
+# (default /etc/avmailgate.conf). Changing this option has several
+# side effects with MailGate. You have to make sure that all
+# directories and files are still accessible to this user.
+# Please see the file "MANUAL" in the package for details.
+
+Group %AVGROUP%
+
+
+# --------------------------------------------------------------------
+# UseSavapiProxy [0|1]
+#
+# The proxy feature in SAVAPI performs scans more efficiently
+# by using and reusing a prepared pool of scanners. While this
+# pool increases throughput this feature requires the pool size
+# to be wisely chosen -- too many scanners will put load on the
+# machine without gaining more performance, too few scanners may
+# have the SAVAPI using applications wait unnecessarily.
+#
+# Default: UseSavapiProxy 0
+
+UseSavapiProxy 1
+
+# --------------------------------------------------------------------
+# PoolScanners [integer]
+#
+# The number of prepared AntiVir scanners in the pool.
+# See option "UseSavapiProxy".
+#
+# Default: PoolScanners 24
+
+PoolScanners 24
+
+# --------------------------------------------------------------------
+# PoolConnections [integer]
+#
+# The maximum number of simultaneous allowed connections
+# from Avira MailGate to the scanner pool.
+#
+# Default: PoolConnections 8
+
+PoolConnections 8
+
+# --------------------------------------------------------------------
+# SyslogFacility [facility]
+#
+# The facility that is used to when logging to syslog.
+
+SyslogFacility daemon
+
+
+# --------------------------------------------------------------------
+# ReportLevel [integer]
+#
+# The report level sets the log verbosity of the scanner backend.
+# Available values:
+#
+# 0 Log errors
+# 1 Log errors and alerts
+# 2 Log errors, alerts and warnings
+# 3 Log errors, alerts, warnings and debug messages
+#
+# ("alerts" is information about potential malicious code).
+#
+# Default: 0
+
+ReportLevel 2
+
+
+# --------------------------------------------------------------------
+# ScanTemp [path]
+#
+# The directory used by the scanner to store temporary files like
+# extracted files from archives.
+# It's also used for other temporary files like lock files.
+#
+# NOTE:
+#
+# The scanner backend does not recognize the environment variable
+# "TMPDIR".
+#
+# IMPORTANT:
+#
+# You should also change the option "TemporaryDir" in MailGate's
+# configuration file (default /etc/avmailgate.conf) when changing the
+# option "ScanTemp".
+# You're then sure that both components use the same temporary
+# directory.
+
+ScanTemp %AVTMPDIR%
+
+
+# --------------------------------------------------------------------
+# LogFileName [path]
+#
+# Path to a specific log file.
+
+# Default: LogFileName /path/to/logfile
diff --git a/app-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.initd b/app-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.initd
new file mode 100755
index 0000000..ca475d6
--- /dev/null
+++ b/app-antivirus/antivir-savapi/files/3.0.5.17/antivir-savapi.initd
@@ -0,0 +1,59 @@
+#!/sbin/runscript
+
+svc_name="AntiVir SAVAPI"
+
+## required binaries
+antivir_savapi_bin="/usr/lib/AntiVir/savapi"
+
+## required config files
+antivir_savapi_cfg="/etc/antivir-savapi.conf"
+
+opts="${opts} reload"
+
+depend() {
+ need net
+ use logger dns
+}
+
+checkconfig() {
+ if [ ! -x "${antivir_savapi_bin}" ]; then
+ eerror "SAVAPI binary [${antivir_savapi_bin}] missing"
+ return 1
+ fi
+ if [ ! -r "${antivir_savapi_cfg}" ]; then
+ eerror "SAVAPI config [${antivir_savapi_cfg}] missing"
+ return 1
+ fi
+}
+
+start() {
+ checkconfig || return 1
+ ebegin "Starting ${svc_name}"
+ "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \
+ --allow-remote-shutdown &>/dev/null
+ eend $?
+}
+
+stop() {
+ checkconfig || return 1
+ ebegin "Stopping ${svc_name}"
+ "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \
+ --stop &>/dev/null
+ eend $?
+}
+
+reload() {
+ checkconfig || return 1
+ ebegin "Reloading ${svc_name}"
+ "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \
+ --reload-engine --allow-remote-shutdown &>/dev/null
+ eend $?
+}
+
+status() {
+ checkconfig || return 1
+ ebegin "Checking status of ${svc_name}"
+ "${antivir_savapi_bin}" --config="${antivir_savapi_cfg}" \
+ --status &>/dev/null
+ eend $?
+}
diff --git a/app-antivirus/antivir-savapi/files/3.0.5.17/avupdate.conf b/app-antivirus/antivir-savapi/files/3.0.5.17/avupdate.conf
new file mode 100644
index 0000000..14a1433
--- /dev/null
+++ b/app-antivirus/antivir-savapi/files/3.0.5.17/avupdate.conf
@@ -0,0 +1,61 @@
+# This configuration file updates the Engine and the Signatures automatically
+
+# The list of Internet update servers.
+internet-srvs=http://dl1.pro.antivir.de,http://dl2.pro.antivir.de,http://dl3.pro.antivir.de,http://dl1.antivir.net,http://dl2.antivir.net,http://dl3.antivir.net
+
+# Specifies the master.idx file.
+master-file=/idx/master.idx
+
+# Specifies the installation directory for updated product files.
+install-dir=%AVHOMEDIR%
+
+# Temporary directory for downloading update files.
+temp-dir=%AVTMPDIR%
+
+# If auth-method is set in avupdate.conf, the Updater requires the smtp login data
+#smtp-user=
+
+# If auth-method is set in avupdate.conf, the Updater requires the smtp login data
+#smtp-password=
+
+# The smtp server for sending email notifications
+smtp-server=127.0.0.1
+
+# The smtp port for sending email notifications
+smtp-port=25
+
+# When set in avupdate.conf, the Updater requires the smtp login data: smtp-user
+#auth-method=
+
+# HTTP
+#username=http_user
+#password=http_pass
+
+# HTTP proxy
+#proxy-host=proxy.example.com
+#proxy-port=3128
+#proxy-username=proxy_user
+#proxy-password=proxy_pass
+
+# Requests
+connect-timeout=30
+receive-timeout=30
+retries=2
+retry-timeout=60
+
+# This option can have one of three values:
+# - 0 - no email notifications are sent,
+# - 1 - email notifications are sent in case of "successful update", "unsuccessful
+# update", or "up to date".
+# - 2 - email notification only in case of "unsuccessful update".
+notify-when=2
+
+# Receiver of the notification emails.
+email-to=root@localhost
+
+# Specify a full path with a filename to which AntiVir Avupdate
+# will write its log messages.
+log=/var/log/avupdate.log
+log-append
+#log-rotate
+log-template=${YEAR}-${MONTH}-${DAY} ${HOUR}:${MINUTE}:${SECOND}; ${FULLHOST}; ${SOURCE}.${LEVEL}; avupdate.bin[${PID}]; ${MSG}
diff --git a/app-antivirus/antivir-savapi/metadata.xml b/app-antivirus/antivir-savapi/metadata.xml
new file mode 100644
index 0000000..a7162e9
--- /dev/null
+++ b/app-antivirus/antivir-savapi/metadata.xml
@@ -0,0 +1,10 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+<herd>no-herd</herd>
+<maintainer>
+ <email>wschlich@gentoo.org</email>
+ <name>Wolfram Schlich</name>
+ <description>Primary maintainer</description>
+</maintainer>
+</pkgmetadata>
diff --git a/app-antivirus/antivir-webgate/ChangeLog b/app-antivirus/antivir-webgate/ChangeLog
new file mode 100644
index 0000000..021e710
--- /dev/null
+++ b/app-antivirus/antivir-webgate/ChangeLog
@@ -0,0 +1,12 @@
+# ChangeLog for app-antivirus/antivir-webgate
+# Copyright 1999-2008 Gentoo Foundation; Distributed under the GPL v2
+# $Header: $
+
+ 07 Oct 2008; Wolfram Schlich <wschlich@gentoo.org>
+ antivir-webgate-1.3.0_p12.ebuild:
+ add ~amd64
+
+ 29 Jul 2008; Wolfram Schlich <wschlich@gentoo.org> +metadata.xml,
+ antivir-webgate-1.3.0_p12.ebuild:
+ fixups
+
diff --git a/app-antivirus/antivir-webgate/Manifest b/app-antivirus/antivir-webgate/Manifest
new file mode 100644
index 0000000..ba5887c
--- /dev/null
+++ b/app-antivirus/antivir-webgate/Manifest
@@ -0,0 +1,6 @@
+AUX 1.3.0_p12/antivir-webgate.init.d 964 RMD160 bd2eff944a04b37602e7edb0717f6c14b94557c2 SHA1 08df71fa5b51f014af4f52db34db5cecbb03c561 SHA256 4b092a9732464aa37102aa40f8d14a7f3833df4fd738471c33b8a02524fd99d1
+AUX 1.3.0_p12/avwebgate.conf 14866 RMD160 73b992a8234c03fc23e07108033e2cfa0da54d13 SHA1 8a8ef466f8f6116eeec46bae5c4f11fd381d1f95 SHA256 e3dc20f8b3c3bffc5b2e608f6d735a610de4c45be50dba28aa40bb75885981d6
+DIST antivir-webgate-prof-1.3.0-12.tar.gz 49518667 RMD160 2714b8f15e7ea84c8db8e97cac970b424083745a SHA1 afadf667dc75b837dc68129fb873b2e27d476651 SHA256 524ea0eb3c43f731b4d12d916c694c466775d42f58162f14502e67b032d2a009
+EBUILD antivir-webgate-1.3.0_p12.ebuild 3859 RMD160 82882ff08fe9df4a3fd93266aab0615e63527647 SHA1 2536c592ef33e5c1ee32fffccc63eee5930e12f3 SHA256 688bf9a69e64520458f5a31467a35cf5e48f871e5bc16312c42531060fdea4cb
+MISC ChangeLog 347 RMD160 2ebaca50f06ad0ff6a83014db0352aad3260c496 SHA1 e2160e3e80d3859e72e6f6c5105777ace80436d4 SHA256 cfe666630ec0ea9fa5af762ae422a5e19eb3193b89c032e35c4b28966c2c5ed2
+MISC metadata.xml 300 RMD160 3b9c1cd628f9d7ac94b68543ec737d5c2381a47e SHA1 33c5efd31a8aa789118535b921e211ffb5023ac3 SHA256 bc07a9aecce5770d1ace9af0a6c6af8ff6c7b16eb5e7947a1b178d1970855e43
diff --git a/app-antivirus/antivir-webgate/antivir-webgate-1.3.0_p12.ebuild b/app-antivirus/antivir-webgate/antivir-webgate-1.3.0_p12.ebuild
new file mode 100644
index 0000000..d896391
--- /dev/null
+++ b/app-antivirus/antivir-webgate/antivir-webgate-1.3.0_p12.ebuild
@@ -0,0 +1,195 @@
+# Copyright 1999-2008 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+##
+## Created by Wolfram Schlich <wschlich@gentoo.org>
+##
+## TODO
+## - ?
+##
+
+inherit eutils pax-utils
+
+DESCRIPTION="AVIRA WebGate HTTP/FTP proxy virus scanner"
+MY_P="${PN}-prof-${PV/_p/-}"
+SRC_URI="http://dl.antivir.de/down/unix/packages/${MY_P}.tar.gz"
+HOMEPAGE="http://www.avira.com/"
+LICENSE="AVIRA-AntiVir"
+SLOT="0"
+KEYWORDS="~x86 ~amd64"
+IUSE=""
+DEPEND=""
+RDEPEND=">=app-antivirus/antivir-core-2.1.12_p19"
+S="${WORKDIR}/${MY_P}"
+# prevent installation functions from stripping binaries
+# otherwise the antivir selfcheck fails. also don't try
+# to fetch the distribution tarball from a mirror.
+RESTRICT="strip mirror"
+
+#
+# Settings overridable by user supplied environment variables
+#
+
+AVHOMEDIR="${AVHOMEDIR:-/usr/lib/AntiVir}"
+AVCONFDIR="${AVCONFDIR:-/etc}"
+AVSPOOLDIR="${AVSPOOLDIR:-/var/spool/avwebgate}"
+AVTMPDIR="${AVTMPDIR:-/var/tmp}"
+AVPIDDIR="${AVPIDDIR:-/var/tmp}"
+AVUSER="${AVUSER:-avgate}"
+AVUID="${AVUID:-220}"
+AVSH="${AVSH:--1}"
+AVGROUP="${AVGROUP:-antivir}"
+AVGID="${AVGID:-220}"
+AVHOSTNAME="${AVHOSTNAME:-$(hostname -f)}"
+
+pkg_setup() {
+
+ #
+ # Add USER + GROUP
+ #
+
+ enewgroup "${AVGROUP}" "${AVGID}"
+ enewuser "${AVUSER}" "${AVUID}" "${AVSH}" -1 "${AVGROUP}" -c AntiVir
+
+}
+
+src_install() {
+
+ #
+ # Executables, libraries and misc components
+ #
+
+ exeinto "${AVHOMEDIR}"
+ exeopts -oroot -g"${AVGROUP}" -m2750
+ doexe bin/linux_glibc22/avwebgate.bin
+ diropts ""
+ dodir \
+ "${DESTTREE}/sbin"
+ dosym "${AVHOMEDIR}/avwebgate.bin" "${DESTTREE}/sbin/avwebgate"
+
+ #
+ # Init script
+ #
+
+ exeopts -oroot -groot -m0755
+ exeinto /etc/init.d
+ newexe "${FILESDIR}/${PV}/antivir-webgate.init.d" antivir-webgate
+
+ #
+ # Config
+ #
+
+ insopts -oroot -g"${AVGROUP}" -m0640
+ insinto "${AVCONFDIR}"
+ doins \
+ "${FILESDIR}"/${PV}/avwebgate.conf
+# use gui && doins etc/avwebgate.conf-gui
+ dosed "s:%AVHOMEDIR%:${AVHOMEDIR}:g" "${AVCONFDIR}/avwebgate.conf"
+ dosed "s:%AVCONFDIR%:${AVCONFDIR}:g" "${AVCONFDIR}/avwebgate.conf"
+ dosed "s:%AVSPOOLDIR%:${AVSPOOLDIR}:g" "${AVCONFDIR}/avwebgate.conf"
+ dosed "s:%AVTMPDIR%:${AVTMPDIR}:g" "${AVCONFDIR}/avwebgate.conf"
+ dosed "s:%AVPIDDIR%:${AVPIDDIR}:g" "${AVCONFDIR}/avwebgate.conf"
+ dosed "s:%AVUSER%:${AVUSER}:g" "${AVCONFDIR}/avwebgate.conf"
+ dosed "s:%AVGROUP%:${AVGROUP}:g" "${AVCONFDIR}/avwebgate.conf"
+ dosed "s:%AVHOSTNAME%:${AVHOSTNAME}:g" "${AVCONFDIR}/avwebgate.conf"
+ touch "${T}/avwebgate.acl"
+ doins "${T}/avwebgate.acl"
+
+ #
+ # Spool directory
+ #
+
+ diropts -o"${AVUSER}" -g"${AVGROUP}" -m0700
+ dodir "${AVSPOOLDIR}"
+ keepdir "${AVSPOOLDIR}"
+ for dir in quarantine; do
+ dodir "${AVSPOOLDIR}/${dir}"
+ keepdir "${AVSPOOLDIR}/${dir}"
+ done
+
+ ## TODO:GUI
+
+ ## TODO:SMC
+
+ #
+ # Documents
+ #
+
+ dodoc \
+ LICENSE \
+ LICENSE.DE \
+ README \
+ doc/CHANGELOG \
+ doc/MANUAL \
+ doc/RELEASE_NOTES \
+ doc/avwebgate_de.pdf \
+ doc/avwebgate_en.pdf \
+ doc/avwebgate.acl.example \
+ legal/LICENSE.*
+
+ #
+ # Templates
+ #
+
+ diropts ""
+ dodir "${AVHOMEDIR}/avwebgate.tpl"
+ insopts -m0644
+ insinto "${AVHOMEDIR}/avwebgate.tpl"
+ doins templates/en/*
+
+}
+
+pkg_postinst() {
+
+ #
+ # Config
+ #
+
+ echo
+ einfo ""
+ einfo "Configuration"
+ einfo "============="
+ einfo ""
+ einfo "Please run..."
+ einfo ""
+ einfo "\tebuild /var/db/pkg/${CATEGORY}/${PF}/${PF}.ebuild config"
+ einfo ""
+ einfo "...to configure the package!"
+ einfo ""
+ echo
+
+}
+
+pkg_config() {
+
+ #
+ # Init script
+ #
+
+ echo
+ einfo ""
+ einfo "Using the init script"
+ einfo "====================="
+ einfo ""
+ einfo "Simply run..."
+ einfo ""
+ einfo "\trc-update add antivir-webgate default"
+ einfo ""
+ einfo "...and your're done."
+ einfo ""
+
+ #
+ # Templates
+ #
+
+ echo
+ einfo ""
+ einfo "Using the HTML templates"
+ einfo "========================"
+ einfo ""
+ einfo "The templates were installed into"
+ einfo ""
+ einfo "\t${AVHOMEDIR}/avwebgate.tpl"
+ einfo ""
+
+}
diff --git a/app-antivirus/antivir-webgate/files/1.3.0_p12/antivir-webgate.init.d b/app-antivirus/antivir-webgate/files/1.3.0_p12/antivir-webgate.init.d
new file mode 100755
index 0000000..666f599
--- /dev/null
+++ b/app-antivirus/antivir-webgate/files/1.3.0_p12/antivir-webgate.init.d
@@ -0,0 +1,46 @@
+#!/sbin/runscript
+## 2003 by H+BEDV Datentechnik GmbH,
+## Wolfram Schlich <wschlich@antivir.de>
+
+svc_name="AntiVir WebGate"
+
+## required binaries
+avwebgate_bin="/usr/lib/AntiVir/avwebgate.bin"
+
+## required config files
+avwebgate_cfg="/etc/avwebgate.conf"
+avwebgate_acl="/etc/avwebgate.acl"
+
+depend() {
+ need net
+ use logger dns squid
+}
+
+checkconfig() {
+ if [ ! -x "${avwebgate_bin}" ]; then
+ eerror "avwebgate binary [${avwebgate_bin}] missing"
+ return 1
+ fi
+ if [ ! -r "${avwebgate_cfg}" ]; then
+ eerror "avwebgate config [${avwebgate_cfg}] missing"
+ return 1
+ fi
+ if [ ! -r "${avwebgate_acl}" ]; then
+ eerror "avwebgate acl [${avwebgate_acl}] missing"
+ return 1
+ fi
+}
+
+start() {
+ checkconfig || return 1
+ ebegin "Starting ${svc_name}"
+ /sbin/start-stop-daemon --start --quiet --exec "${avwebgate_bin}"
+ eend $?
+}
+
+stop() {
+ checkconfig || return 2
+ ebegin "Stopping ${svc_name}"
+ /sbin/start-stop-daemon --stop --quiet --exec "${avwebgate_bin}"
+ eend $?
+}
diff --git a/app-antivirus/antivir-webgate/files/1.3.0_p12/avwebgate.conf b/app-antivirus/antivir-webgate/files/1.3.0_p12/avwebgate.conf
new file mode 100644
index 0000000..08afed0
--- /dev/null
+++ b/app-antivirus/antivir-webgate/files/1.3.0_p12/avwebgate.conf
@@ -0,0 +1,346 @@
+#
+# sample AvWebGate configuration file
+#
+
+# This file shows the available options to configure AvWebGate.
+# Lines beginning with '#' are comments and are ignored. If you
+# want to change the value of an option, please uncomment the
+# line. Otherwise default values (shown here) are used, unless
+# otherwise indicated.
+
+# Used to specify the location of the antivir binary, the VDF,
+# the keyfile, and some other files.
+AntiVirDir %AVHOMEDIR%
+
+# Template directory
+TemplateDir %AVHOMEDIR%/avwebgate.tpl
+
+# Maximum number of open files
+OpenMax 1024
+
+# Processes
+NumDaemons 16
+DNSHelpers 8
+
+# Timeouts
+ClientTimeout 60
+ServerTimeout 300
+
+# Specify the port on which AvWebGate listens for HTTP requests.
+# Web-based FTP requests are also handled on this port. In addition
+# to the port number, you may optionally specify a hostname or IP
+# address to which AvWebGate binds the socket. If you do not specify
+# any port(s), AvWebGate listens on port 8080 for HTTP requests by
+# default. If you specify at least one of FTPPort or ICAPPort,
+# AvWebGate does not open a port for HTTP requests as long as
+# HTTPPort is commented out (default).
+# Usage: HTTPPort [hostname_or_ip:]port
+# Note: If you have installed AvWebGate as a parent proxy on the
+# same machine as your existing proxy, it is recommended to
+# use "HTTPPort 127.0.0.1:8080" for example. If a hostname
+# or IP is not given, then the port will be bound to all
+# interfaces.
+HTTPPort 127.0.0.1:80
+
+# AvWebGate can be used as a "real" FTP proxy (talking FTP to the
+# clients). In order to enable this feature, you need to specify
+# a port on which AvWebGate listens for FTP connections. In addition
+# to the port number, you may optionally specify a hostname or IP
+# address to which AvWebGate binds the socket. If you specify an
+# FTPPort, AvWebGate does not open a port for HTTP requests unless
+# HTTPPort is specified explicitly (uncommented).
+# Usage: FTPPort [hostname_or_ip:]port
+#FTPPort 127.0.0.1:2121
+
+# AvWebGate can be used as an ICAP server. To enable ICAP support,
+# you need to specify a port, optionally along with a hostname or
+# IP address, to which AvWebGate binds the socket. If you specify an
+# ICAPPort, AvWebGate does not open a port for HTTP requests unless
+# HTTPPort is specified explicitly (uncommented).
+# Usage: ICAPPort [hostname_or_ip:]port
+# AvWebGate supports ICAP version "1.0"
+#ICAPPort 127.0.0.1:1344
+
+# AvWebGate will switch the user and group as soon as possible after
+# the startup. You may specify a user and/or group to which AvWebGate
+# will switch to. Note that you must run AvWebGate as root initially.
+# If you don't want AvWebGate to start as root initially, you must
+# specify the current user/group here, otherwise the start will
+# fail.
+User %AVUSER%
+Group %AVGROUP%
+
+# AvWebGate is able to tunnel requests performed over SSL (HTTPS).
+# Because the data can not be decrypted, the data will NOT be
+# scanned. However, the handshake is checked to determine if it
+# is a valid SSL handshake. Although this adds an extra security
+# check, this does not solve the underlaying problem, SSL data will
+# NOT be checked, AvWebGate does not interfere with the transaction,
+# but merely forwards the data.
+# Attention: HTTPS data will _NOT_ be scanned.
+AllowHTTPSTunnel 1
+
+# Allows AvWebGate to establish a tunnel connection to any port
+# allowed for HTTP if a CONNECT method request is received.
+# WARNING: USE THIS OPTION WITH CAUTION. AvWebGate does not
+# check the data transferred over the tunnel connection! Use
+# "AllowHTTPSTunnel" instead if you want to limit the allowed
+# connections to the ports 443 (HTTPS) and 563 (SNEWS).
+AllowHTTPConnect 1
+
+# For security reasons, AvWebGate restricts HTTPS connections to
+# IANA-assigned ports 443 (HTTPS) and 563 (SNEWS). If you want to
+# allow HTTPS connections to non-standard ports, you can do so by
+# adding the desired ports to this list. Each port will be separated
+# by a comma or a whitespace.
+AllowedHTTPConnectPorts 443 873
+
+# It is possible to limit the maximum number of allowed simultaneous
+# connections AvWebGate accepts.
+MaxConnections 256
+
+# In order to prevent client timeouts with large downloads, AvWebGate
+# must send the client keepalive messages. There are three different
+# methods for timeout prevention. If the client was identified as
+# a browser, the progress status is sent as refreshing HTML pages.
+# The RefreshInterval specifies the number of seconds between
+# status updates. This method of timeout prevention can be disabled
+# by setting RefreshInterval to 0. If RefreshInterval is not
+# specified, this method of timeout prevention is disabled.
+#RefreshInterval 10
+#RefreshDelay 3
+#RefreshTimeout 60
+#RefreshSkipFileExtensions htm,html,shtml,css,gif,jpg,jpeg,png,swf,flv
+
+# If the refresh method is not used (because it is disabled or
+# the client is a non-browser) redirect messages can be sent to the
+# client. The RedirectInterval specifies the delay time in seconds
+# for sending redirect messages. This method of timeout prevention
+# can be disabled by settings RedirectInterval to 0. If
+# RedirectInterval is not specified, this method of timeout
+# prevention is disabled.
+# Note: This method does not work with every client. Use the
+# KeepaliveInterval option instead if problems occur.
+#RedirectInterval 10
+
+# If the refresh and redirect methods are not used (because they
+# are disabled or they are not appropriate) extended header data can
+# be sent to the client to prevent timeouts. The KeepaliveInterval
+# specifies the delay time in seconds for sending extended header
+# data. This method of timeout prevention can be disabled by
+# setting KeepaliveInterval to 0.
+KeepaliveInterval 10
+KeepaliveMode header
+#KeepaliveMode trickle
+#KeepaliveDelay 30
+
+# Used for Refresh and Redirect client timeout prevention methods
+#ProgressAutoSend 1
+#ProgressFilesizeThreshold 20MB
+#ProgressHoldTime 3600
+#ProgressHoldTimeAfterGetFile 1800
+#ProgressHost proxy.example.com
+
+# If you want to use an optional parent HTTP proxy, AvWebGate needs
+# information to connect to the proxy where the requests are forwarded.
+# You can also specify a username and password if they are needed for
+# the proxy.
+#HTTPProxyServer 127.0.0.1
+#HTTPProxyPort 3128
+#HTTPProxyUsername username
+#HTTPProxyPassword password
+
+# If you want to use an optional parent FTP proxy, you need to specify
+# the hostname or IP address of that proxy along with the port number
+# on which the proxy is accepting "real" FTP connections.
+#FTPProxyServer your.proxy
+#FTPProxyPort 8080
+
+# You can change the directory where temporary files are stored
+# (for example, while they are being scanned).
+TemporaryDir %AVTMPDIR%
+
+# By default, all files in archives are going to be extracted
+# and scanned. Limits can be specified with ArchiveMaxSize,
+# ArchiveMaxRecursion and ArchiveMaxRatio. It is NOT recommended
+# that this option is disabled (value of 0).
+ArchiveScan 1
+
+# If ArchiveMaxSize is 0, all files in archives will be extracted,
+# otherwise files only up to the given size will be extracted.
+ArchiveMaxSize 100MB
+
+# If ArchiveMaxRecursion is 0, recursive archives are going to be
+# unpacked with an unlimited recursion depth, otherwise recursive
+# archives are going to be unpacked up to the given recursion
+# depth.
+ArchiveMaxRecursion 20
+
+# If ArchiveMaxRatio is 0, archives will always be unpacked completely,
+# otherwise they will only be unpacked completely if the compression
+# ratio is below the specified value.
+ArchiveMaxRatio 150
+
+# If BlockSuspiciousArchive is enabled, archives that reach one
+# of the limits above will be blocked.
+BlockSuspiciousArchive 0
+
+# If BlockEncryptedArchive is enabled, encrypted archives will
+# be blocked.
+BlockEncryptedArchive 0
+
+# If BlockPartialArchive is enabled, multi-volume archives will
+# be blocked.
+BlockPartialArchive 0
+
+# AvWebGate will block files that have one of the specified file
+# extensions. Note that filenames in archives will also be matched.
+# The extensions can be separated by either space, comma or semicolon.
+# There is no default value for this directive.
+#BlockExtensions exe scr pif
+
+# By default, blocked files are discarded. In order to move the
+# concerning files to a quarantine directory, you may specify a
+# directory where the files will be moved to.
+MoveConcerningFilesTo %AVSPOOLDIR%/quarantine
+
+# Concerning activity may also be logged to a specified file
+# (in addition to syslog). You must specify the file. If this
+# directive is not specified, logging will only occur through
+# syslog.
+#LogFile /var/log/avwebgate.log
+
+# It is possible to specify the amount of events that are logged by
+# AvWebGate (0-7). 0 logs only critical information, whereas 7 will
+# log everything (including debugging output). A value of 4 or 5 is
+# recommended.
+LogLevel 4
+DebugLevel 4
+
+# Regardless of the above configuration settings, AvWebGate will
+# always log important information using syslog. It is possible
+# to specify which syslog facility you would like AvWebGate to
+# use.
+SyslogFacility daemon
+
+# You can receive email notifications of alerts using this
+# directive. You must specify the email address to which the
+# notification will be sent. There is no default value for
+# this directive.
+#EmailTo hostmaster@example.com
+
+# AvWebGate can add an X-Forwarded-For header to the HTTP request
+# including the IP address of the originating client. This
+# is useful if a subsequent proxy (parent) wants to use the
+# original client address in access controls, logs etc.
+AddXForwardedForHeader 0
+
+# You can restrict access to selected clients or (sub)networks
+# based on their IP addresses. A network address can be specified
+# with a '/' and a number of bits to match (e.g. 192.168.1.0/24).
+# If the number of bits is not specified, the netmask will be
+# determined from the given address (for example, 192.168.0.0 is
+# treated the same as 192.168.0.0/16).
+# Note: If you do not specify any IP addresses, access is granted
+# to everybody. If you specify one or more IP addresses,
+# access is allowed only to the specified addresses and
+# is denied for all others.
+#AllowClientAddresses 127.0.0.0/8 192.168.0.0/16
+AllowClientAddresses 127.0.0.0/8
+
+# WebGate can deny access to specific user agents. You can specify
+# one or more user agent string that will be denied access. The
+# main purpose is to avoid unnecessary traffic generated by clients
+# issuing range requests (such as Microsoft's BITS
+# "Background Intelligent Transfer Service") or streaming services
+# (such as Apple's iTunes). Range requests and data streaming are
+# only permitted if specified in an AclConfigFile.
+ForbiddenUserAgents BITS iTunes
+
+# You can limit connections to selected destination ports. You
+# may specify one or more single ports (e.g 21 and 80) or port
+# ranges. You can specify ranges with a '-' between two port
+# numbers (e.g. 1025-65535). Note that there are no whitespaces
+# allowed between the two port numbers when specifying a range.
+# Note: If you do not specify at least one port, connections
+# will be allowed to all destination ports.
+AllowDestinationPorts 21 80 443 873 1025-65535
+
+# WebGate can also support more complex rules by implementing a Squid-like
+# access control scheme. To use the access control scheme you must create
+# a new configuration file containing the rules describing the desired
+# behavior and have AclConfigFile contain the path to it. The syntax
+# supported by the access control scheme is described in the Manual.
+AclConfigFile %AVCONFDIR%/avwebgate.acl
+
+# List of categories that are blocked by WebGate when Avira Web Access
+# and Content Control library is enabled. Categories can be specified
+# as single categories (e.g 1 and 3 ) or category ranges. You can
+# specify ranges with a '-' between to category numbers.
+# To use the URL filtering capabilities of WebGate a valid WebGate Suite
+# license must be installed
+# Note: For a list of all categories please consult the Manual
+#WSBlockCategories 0-2 12 14 61
+
+# These settings allow for the detection of certain categories of software
+# which are not viruses but might not be wanted. Here is a description of
+# the categories.
+# ADSPY: Software that displays advertising pop-ups or software that very
+# often without the user's consent sends user specific data to
+# third parties and might therefore be unwanted.
+# APPL: The term APPL/ denotes an application of dubious origin or which
+# might be hazardous to use.
+# BDC: Is the Control software for backdoors. Control software for
+# backdoors are generally harmless.
+# DIAL: A Dial-Up program for connections that charge a fee. Its use might
+# lead to huge costs for the user.
+# GAME: It concerns a game that causes no damage on your computer.
+# HEUR-DBLEXT: File has an executable file extension but hides it behind a
+# harmless one.
+# JOKE: A harmless joke program is present as file.
+# PCK: File has been compressed with an unusual runtime compression tool.
+# Please make sure that this file comes from a trustworthy source.
+# PHISH: Faked Emails that are supposed to prompt the victim to reveal
+# confidential information such as user accounts, passwords or
+# online-banking data on certain websites.
+# SPR: Software that maybe able to compromise the security of your system,
+# initiate unwanted program activities, damage your privacy or spy
+# out your user behaviour and might therefore be unwanted.
+# Detection can be enabled/disabled with yes/no parameters respectively.
+DetectADSPY yes
+DetectAPPL yes
+DetectBDC yes
+DetectDIAL yes
+DetectGAME yes
+DetectHEUR-DBLEXT yes
+DetectJOKE yes
+DetectPCK yes
+DetectPHISH yes
+DetectSPR yes
+
+# AntiVir is capable of using heuristics to determine if a file
+# may be malicious. This allows new or unknown malicious code to
+# be detected before you have had a chance to perform an update.
+# There are two types of heuristics that AntiVir uses. The
+# first, HeuristicsMacro, only deals with macros in office
+# documents. This can be enabled/disabled with yes/no respectively.
+# The second, HeuristicsLevel, deals with all types of files and
+# can be set to a certain level of intensity (0-3). 0 means
+# disabled and 3 means full intensity.
+# Note: Be aware that setting the HeuristicsLevel too high could
+# result in false alerts.
+HeuristicsMacro yes
+HeuristicsLevel 2
+
+# Uncomment this directive to allow the GUI to communicate with
+# AvWebGate. If this is enabled, AvWebGate will open an extra
+# TCP Port on the loopback interface. This should only be used
+# if you intend to use the GUI.
+#GuiSupport yes
+
+# These are SSL Parameters used for secure communication with
+# the GUI.
+#GuiCertFile /usr/lib/AntiVir/gui/cert/server.pem
+#GuiCertPass antivir_default
+#GuiCAFile /usr/lib/AntiVir/gui/cert/cacert.pem
+#GuiRandFile /dev/urandom
diff --git a/app-antivirus/antivir-webgate/metadata.xml b/app-antivirus/antivir-webgate/metadata.xml
new file mode 100644
index 0000000..a7162e9
--- /dev/null
+++ b/app-antivirus/antivir-webgate/metadata.xml
@@ -0,0 +1,10 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+<herd>no-herd</herd>
+<maintainer>
+ <email>wschlich@gentoo.org</email>
+ <name>Wolfram Schlich</name>
+ <description>Primary maintainer</description>
+</maintainer>
+</pkgmetadata>
diff --git a/app-antivirus/skyldav/ChangeLog b/app-antivirus/skyldav/ChangeLog
new file mode 100644
index 0000000..a9496c9
--- /dev/null
+++ b/app-antivirus/skyldav/ChangeLog
@@ -0,0 +1,19 @@
+*skyldav-0.2_rc3_p20130821-r1 (21 Aug 2013)
+
+ 21 Aug 2013; Wolfram Schlich <wschlich@gentoo.org>
+ +skyldav-0.2_rc3_p20130821-r1.ebuild:
+ update from upstream
+
+*skyldav-0.2_rc3_p20130821 (21 Aug 2013)
+
+ 21 Aug 2013; Wolfram Schlich <wschlich@gentoo.org>
+ +files/skyldav-0.2_rc3_p20130821-examples.patch,
+ +skyldav-0.2_rc3_p20130821.ebuild:
+ update from upstream
+
+*skyldav-0.2_rc3_p20130817-r1 (17 Aug 2013)
+
+ 17 Aug 2013; Wolfram Schlich <wschlich@gentoo.org>
+ +files/skyldav-0.2_rc3_p20130817-disable-skyldavnotify.patch,
+ +skyldav-0.2_rc3_p20130817-r1.ebuild:
+ added libnotify USE flag.
diff --git a/app-antivirus/skyldav/Manifest b/app-antivirus/skyldav/Manifest
new file mode 100644
index 0000000..5bc49c0
--- /dev/null
+++ b/app-antivirus/skyldav/Manifest
@@ -0,0 +1,5 @@
+DIST skyldav-0.2rc3.tar.gz 100913 SHA256 219548b8529a0a7737fb774f1e4ba89acf91088982f9fb646bc9b0fb6015f801 SHA512 d535a8b884ea656069bcb50d7683de4d006e160f44691adbd6564d7729310cada7ff1652dc63c3b9b9cd755574fbd1e7516ccc8f10c6f42eb4d13d3c453b58e7 WHIRLPOOL 05217e707abfc47502e93be164ee383a9fff0ba2b40f5129bee77f4dfdddd87fec3f67bcfd974760b5204e27dedc026331249887cb7268066df578e6a23e78ea
+DIST skyldav-0.2rc3_p20130816.tar.gz 100972 SHA256 7a3037f2965320c16ee1f29deccf3bee034581b3f436f1c50042e50e514fb97f SHA512 6d9caf2d3f808c3fdf44daa6b5606d5b47aa3bb19750d25e414a60c21fbd764279dabe09b36f2fdc7cbf08686b3af8610ef926925223f7927f4d87fe039fad49 WHIRLPOOL ba1a4e389d57d994f1575d55878406068b6162243d732697d94fea8797524fd25525736291f2825b0b518af641eafa518eaf1057311185f07645c5173e614957
+DIST skyldav-0.2rc3_p20130817.tar.gz 100247 SHA256 1c96363e1b928ef684ea3e0418995576fa6222a5a7cb1e09ea893930c6635d32 SHA512 1e57ba44d0894ef08788fe17798e7c5d6caea0eb04c2097c83333ebf8ca612fc29ec24625a43cc2d9e15e64b434c02661d5d8bee1e816b0b1e318e02d15929de WHIRLPOOL 6a1f8754e9c4a2816faaa97b9a7543ce738129b016fd88e5e9a90702fd63647b739c50a200b1806fde141628ad2746ee57fe18f285645547c3c9a2316043682a
+DIST skyldav-0.2rc3_p20130821-r1.tar.gz 100437 SHA256 1707feb07a6bdc86e0bfa363248de805b924f4ac11674a5de098cfbe85bc43e0 SHA512 05bedb4e69288acee0de0545e1ec2d9f3d625dccd27c0ee6a541b10197dc1b2920f53ebd9afc8402e0cabf649a99c56abcbd466019547f1ada1a7a88d83b590a WHIRLPOOL 2496b984a0a23ea09e6125157ff8f0733cdf19ef03ce04a9463d3c29f5acd6a1afa01a4c117e53c2dafbd00fe85f7061f0bc256004120868d9e243b4e998a919
+DIST skyldav-0.2rc3_p20130821.tar.gz 100403 SHA256 8398f5cce013efdc51ee2e9533e7dbe82b0d41c384ba5f19eea4e8e32569f96b SHA512 4a132473be42cf5fdc858be6195fdb474a800955ffdc4a54f7caabe90c8cf17d5df59180de45d9056ffd0dbc0a699774d4fb4372f8a9087d2ef95e18cc95903a WHIRLPOOL 8aa49550e3a7fe13b4a1ccb6b3cd8b0e27ee3bdf546fe6f41f11c1ed55fcaa1291c9edc30b854985defe282952bdd18cbe6737cd82fd03df9c671ad18d724fb6
diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3-conf.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3-conf.patch
new file mode 100644
index 0000000..3485bb4
--- /dev/null
+++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3-conf.patch
@@ -0,0 +1,20 @@
+diff -urN skyldav-0.2rc3.orig/examples/etc/skyldav.conf skyldav-0.2rc3/examples/etc/skyldav.conf
+--- skyldav-0.2rc3.orig/examples/etc/skyldav.conf 2013-07-20 14:36:43.000000000 +0200
++++ skyldav-0.2rc3/examples/etc/skyldav.conf 2013-08-17 11:41:17.016278000 +0200
+@@ -19,14 +19,14 @@
+
+ # File systems that shall not be marked for virus scan.
+ # NOMARK_FS = proc, sysfs
+-NOMARK_FS = proc, sysfs
++NOMARK_FS = proc, sysfs, devtmpfs, devpts, configfs, securityfs, cgroup, rpc_pipefs
+
+ # Mounts that shall not be marked for virus scan.
+ # NOMARK_MNT = /mnt/noscan
+
+ # File systems that are local, virus scan results may be cached.
+ # LOCAL_FS = ext3, ext4, iso9660, tmpfs, vfat
+-LOCAL_FS = ext3, ext4, iso9660, tmpfs, vfat
++LOCAL_FS = ext2, ext3, ext4, xfs, zfs, btrfs, reiserfs, vfat, ntfs, iso9660, tmpfs
+
+ # Number of threads for file scanning,
+ # defaults to the number of available CPUs.
diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3-examples.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3-examples.patch
new file mode 100644
index 0000000..d331dd3
--- /dev/null
+++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3-examples.patch
@@ -0,0 +1,12 @@
+diff -urN skyldav-0.2rc3.orig/Makefile.am skyldav-0.2rc3/Makefile.am
+--- skyldav-0.2rc3.orig/Makefile.am 2013-07-20 14:36:43.000000000 +0200
++++ skyldav-0.2rc3/Makefile.am 2013-08-16 22:16:35.255347000 +0200
+@@ -9,8 +9,6 @@
+ rm -rf doc/doxygen
+
+ install-data-local:
+- mkdir -p $(DESTDIR)$(docdir)/examples/
+- cp -rf $(srcdir)/examples/* $(DESTDIR)$(docdir)/examples/
+ mkdir -p $(DESTDIR)$(sysconfdir)
+ test -e $(DESTDIR)$(sysconfdir)/skyldav.conf || \
+ cp examples/etc/skyldav.conf $(DESTDIR)$(sysconfdir)
diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3-openlog.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3-openlog.patch
new file mode 100644
index 0000000..bd790ec
--- /dev/null
+++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3-openlog.patch
@@ -0,0 +1,12 @@
+diff -urN skyldav-0.2rc3.orig/src/skyldav/Messaging.cc skyldav-0.2rc3/src/skyldav/Messaging.cc
+--- skyldav-0.2rc3.orig/src/skyldav/Messaging.cc 2013-07-20 14:36:43.000000000 +0200
++++ skyldav-0.2rc3/src/skyldav/Messaging.cc 2013-08-16 16:42:56.319762000 +0200
+@@ -47,7 +47,7 @@
+
+ // Open syslog.
+ setlogmask(LOG_UPTO(LOG_NOTICE));
+- openlog("Skyld AV", 0, LOG_USER);
++ openlog("skyldav", LOG_PID, LOG_DAEMON);
+
+ // Set umask = 022;
+ mask = umask(S_IWGRP | S_IWOTH);
diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3-sbin.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3-sbin.patch
new file mode 100644
index 0000000..e984252
--- /dev/null
+++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3-sbin.patch
@@ -0,0 +1,19 @@
+diff -urN skyldav-0.2rc3.orig/src/skyldav/Makefile.am skyldav-0.2rc3/src/skyldav/Makefile.am
+--- skyldav-0.2rc3.orig/src/skyldav/Makefile.am 2013-07-20 14:36:43.000000000 +0200
++++ skyldav-0.2rc3/src/skyldav/Makefile.am 2013-08-16 11:17:41.489230000 +0200
+@@ -32,7 +32,7 @@
+ ThreadPool.cc \
+ VirusScan.cc
+
+-bin_PROGRAMS = \
++sbin_PROGRAMS = \
+ skyldav
+
+ skyldav_LDFLAGS = \
+@@ -41,4 +41,4 @@
+ skyldav_SOURCES = skyldav.h main.cc
+
+ check:
+- ./skyldav --version
+\ No newline at end of file
++ ./skyldav --version
diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130816-syslog.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130816-syslog.patch
new file mode 100644
index 0000000..d746747
--- /dev/null
+++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130816-syslog.patch
@@ -0,0 +1,24 @@
+diff -urN skyldav-0.2rc3_p20130816.orig/src/skyldav/Messaging.cc skyldav-0.2rc3_p20130816/src/skyldav/Messaging.cc
+--- skyldav-0.2rc3_p20130816.orig/src/skyldav/Messaging.cc 2013-08-16 19:58:10.000000000 +0200
++++ skyldav-0.2rc3_p20130816/src/skyldav/Messaging.cc 2013-08-16 22:07:37.743908000 +0200
+@@ -48,7 +48,7 @@
+
+ // Open syslog.
+ setlogmask(LOG_UPTO(LOG_NOTICE));
+- openlog(SYSLOG_ID , 0, LOG_USER);
++ openlog(SYSLOG_ID , LOG_PID, LOG_USER);
+
+ // Set umask = 022;
+ mask = umask(S_IWGRP | S_IWOTH);
+diff -urN skyldav-0.2rc3_p20130816.orig/src/skyldav/skyldav.h skyldav-0.2rc3_p20130816/src/skyldav/skyldav.h
+--- skyldav-0.2rc3_p20130816.orig/src/skyldav/skyldav.h 2013-08-16 19:58:10.000000000 +0200
++++ skyldav-0.2rc3_p20130816/src/skyldav/skyldav.h 2013-08-16 22:07:10.715968000 +0200
+@@ -63,7 +63,7 @@
+
+ const char *PID_FILE = "/var/run/skyldav/skyldav.pid";
+
+- const char *SYSLOG_ID = "SkyldAV";
++ const char *SYSLOG_ID = "skyldav";
+
+ #ifdef __cplusplus
+ }
diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130817-disable-skyldavnotify.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130817-disable-skyldavnotify.patch
new file mode 100644
index 0000000..9f4a547
--- /dev/null
+++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130817-disable-skyldavnotify.patch
@@ -0,0 +1,362 @@
+diff -urN skyldav-0.2rc3_p20130817.orig/configure.ac skyldav-0.2rc3_p20130817/configure.ac
+--- skyldav-0.2rc3_p20130817.orig/configure.ac 2013-08-17 00:08:41.000000000 +0200
++++ skyldav-0.2rc3_p20130817/configure.ac 2013-08-17 13:20:37.887072000 +0200
+@@ -51,10 +51,6 @@
+ dnl set linker flags
+ LDFLAGS="-g $LDFLAGS"
+
+-PKG_CHECK_MODULES([NOTIFY], [gtk+-2.0 >= 2.20.1 libnotify >= 0.5.0])
+-AC_CHECK_HEADER([canberra.h], [],
+- [AC_MSG_ERROR([canberra.h header not found])])
+-NOTIFY_LIBS="-lcanberra $NOTIFY_LIBS"
+ AC_CHECK_HEADER([libmount/libmount.h], [],
+ [AC_MSG_ERROR([libmount/libmount.h header not found])])
+ AC_CHECK_HEADER([sys/capability.h], [],
+@@ -73,7 +69,6 @@
+
+ AC_MSG_NOTICE([CPPFLAGS = $CPPFLAGS])
+ AC_MSG_NOTICE([LDFLAGS = $LDFLAGS])
+-AC_MSG_NOTICE([NOTIFY_LIBS = $NOTIFY_LIBS])
+ AC_MSG_NOTICE([SKYLDAV_LIBS = $SKYLDAV_LIBS])
+
+ dnl Check includes
+@@ -90,7 +85,6 @@
+ Makefile
+ man/Makefile
+ src/Makefile
+- src/notify/Makefile
+ src/skyldav/Makefile
+ test/Makefile
+ ])
+diff -urN skyldav-0.2rc3_p20130817.orig/Makefile.am skyldav-0.2rc3_p20130817/Makefile.am
+--- skyldav-0.2rc3_p20130817.orig/Makefile.am 2013-08-17 00:08:41.000000000 +0200
++++ skyldav-0.2rc3_p20130817/Makefile.am 2013-08-17 13:21:30.566228000 +0200
+@@ -14,10 +14,6 @@
+ mkdir -p $(DESTDIR)$(sysconfdir)
+ test -e $(DESTDIR)$(sysconfdir)/skyldav.conf || \
+ cp examples/etc/skyldav.conf $(DESTDIR)$(sysconfdir)
+- mkdir -p $(DESTDIR)$(datadir)/autostart/
+- test -e $(DESTDIR)$(datadir)/autostart/skyldavnotify.desktop || \
+- cp examples/usr/share/autostart/skyldavnotify.desktop \
+- $(DESTDIR)$(datadir)/autostart/
+
+ dist-hook:
+ rm -rf $(distdir)/doc/doxygen
+diff -urN skyldav-0.2rc3_p20130817.orig/man/Makefile.am skyldav-0.2rc3_p20130817/man/Makefile.am
+--- skyldav-0.2rc3_p20130817.orig/man/Makefile.am 2013-08-17 00:08:41.000000000 +0200
++++ skyldav-0.2rc3_p20130817/man/Makefile.am 2013-08-17 13:22:04.636393000 +0200
+@@ -1,6 +1,6 @@
+ SECONDARY:
+-dist_man_MANS = skyldav.1 skyldavnotify.1
++dist_man_MANS = skyldav.1
+
+ EXTRA_DIST = \
+-skyldav.1 skyldavnotify.1
++skyldav.1
+
+diff -urN skyldav-0.2rc3_p20130817.orig/man/skyldavnotify.1 skyldav-0.2rc3_p20130817/man/skyldavnotify.1
+--- skyldav-0.2rc3_p20130817.orig/man/skyldavnotify.1 2013-08-17 00:08:41.000000000 +0200
++++ skyldav-0.2rc3_p20130817/man/skyldavnotify.1 1970-01-01 01:00:00.000000000 +0100
+@@ -1,28 +0,0 @@
+-.TH SKYLDAVNOTIFY 1 "June 23th, 2013" "version 0.1" "Skyld AV notification"
+-.SH NAME
+-skyldavnotify \- Desktop notification for Skyld AV
+-.SH SYNOPSIS
+-.B skyldavnotify
+-.RB [ \-h ]
+-.RB [ \-v ]
+-.SH DESCRIPTION
+-.PP
+-This program notifies the user of a windows manager like KDE or GNOME if
+-Skyld AV detected malware. Typical usage is to start this file using a
+-desktop link
+-.IR /usr/share/autostart/skyldavnotify.desktop .
+-.PP
+-.TP
+-.B \-h
+-Print usage information.
+-.TP
+-.B \-v
+-Print the program version and licensing information.
+-.SH AUTHOR
+-Heinrich Schuchardt <xypron.glpk@gmx.de>
+-.SH SEE ALSO
+-.BR sykldav (1)
+-.PP
+-Further documentation and examples can be found in the documentation
+-path, which defaults to
+-.IR /usr/local/share/doc/skyldav .
+diff -urN skyldav-0.2rc3_p20130817.orig/src/Makefile.am skyldav-0.2rc3_p20130817/src/Makefile.am
+--- skyldav-0.2rc3_p20130817.orig/src/Makefile.am 2013-08-17 00:08:41.000000000 +0200
++++ skyldav-0.2rc3_p20130817/src/Makefile.am 2013-08-17 13:21:52.285856000 +0200
+@@ -1 +1 @@
+-SUBDIRS = notify skyldav
++SUBDIRS = skyldav
+diff -urN skyldav-0.2rc3_p20130817.orig/src/notify/Makefile.am skyldav-0.2rc3_p20130817/src/notify/Makefile.am
+--- skyldav-0.2rc3_p20130817.orig/src/notify/Makefile.am 2013-08-17 00:08:41.000000000 +0200
++++ skyldav-0.2rc3_p20130817/src/notify/Makefile.am 1970-01-01 01:00:00.000000000 +0100
+@@ -1,10 +0,0 @@
+-AM_CPPFLAGS = $(NOTIFY_CFLAGS)
+-skyldavnotify_LDADD = $(NOTIFY_LIBS)
+-
+-bin_PROGRAMS = \
+- skyldavnotify
+-
+-skyldavnotify_SOURCES = notify.h notify.cc
+-
+-check:
+- ./skyldavnotify --version
+\ No newline at end of file
+diff -urN skyldav-0.2rc3_p20130817.orig/src/notify/notify.cc skyldav-0.2rc3_p20130817/src/notify/notify.cc
+--- skyldav-0.2rc3_p20130817.orig/src/notify/notify.cc 2013-08-17 00:08:41.000000000 +0200
++++ skyldav-0.2rc3_p20130817/src/notify/notify.cc 1970-01-01 01:00:00.000000000 +0100
+@@ -1,185 +0,0 @@
+-/*
+- * File: notify.c
+- *
+- * Copyright 2013 Heinrich Schuchardt <xypron.glpk@gmx.de>
+- *
+- * Licensed under the Apache License, Version 2.0 (the "License");
+- * you may not use this file except in compliance with the License.
+- * You may obtain a copy of the License at
+- *
+- * http://www.apache.org/licenses/LICENSE-2.0
+- *
+- * Unless required by applicable law or agreed to in writing, software
+- * distributed under the License is distributed on an "AS IS" BASIS,
+- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+- * See the License for the specific language governing permissions and
+- * limitations under the License.
+- *
+- */
+-
+-/**
+- * @file notify.cc
+- * @brief Notify Skyld AV events.
+- *
+- * Sound depends on freedesktop-sound-theme
+- */
+-
+-#include <gtk/gtk.h>
+-#include <libnotify/notify.h>
+-#include <glib.h>
+-#include <canberra.h>
+-#include <stdio.h>
+-#include <stdlib.h>
+-#include <signal.h>
+-#include "config.h"
+-#include "notify.h"
+-
+-#define RUNNING 1
+-#define STOPPING 2
+-
+-volatile sig_atomic_t status;
+-
+-static void sigint_handler(int sig) {
+- write(0, "\nSTOPPING\n", 10);
+- status = STOPPING;
+- }
+-
+-/**
+- * @brief Prints help message and exits.
+- */
+-static void help() {
+- printf("%s", HELP_TEXT);
+- exit(EXIT_FAILURE);
+-}
+-
+-/**
+- * @brief Shows version information and exits.
+- */
+-static void version() {
+- printf("Skyld AV, version %s\n", VERSION);
+- printf("%s", VERSION_TEXT);
+- exit(EXIT_SUCCESS);
+-}
+-
+-int main(int argc, char **argv)
+-{
+- int i;
+- char *opt;
+- NotifyNotification *n;
+- char filename[] = "/run/skyldav/log";
+- char application[] = "Skyld AV";
+- char title[] = "Skyld AV";
+- char body[2048];
+- char *msg;
+- FILE *file;
+- struct sigaction sa;
+-
+- // Analyze command line options.
+- for (i = 1; i < argc; i++) {
+- opt = argv[i];
+- if (*opt == '-') {
+- opt++;
+- } else {
+- help();
+- }
+- if (*opt == '-') {
+- opt++;
+- }
+- switch (*opt) {
+- case 'v':
+- version();
+- break;
+- default:
+- help();
+- }
+- }
+-
+- printf("Skyld AV notifier %s\n", VERSION);
+- printf("Exit with CTRL+C\n");
+-
+- file = fopen(filename, "r");
+- if (file == NULL) {
+- fprintf(stderr, "File '%s' not found\n", filename);
+- return EXIT_FAILURE;
+- }
+- // position to end of file
+- fseek(file, 0, SEEK_END);
+-
+- sa.sa_handler = sigint_handler;
+- sa.sa_flags = 0; // or SA_RESTART
+- sigemptyset(&sa.sa_mask);
+- if (sigaction(SIGINT, &sa, NULL) == -1) {
+- perror("sigaction");
+- return EXIT_FAILURE;
+- }
+-
+- ca_context *c;
+-
+- // initialize gtk
+- gtk_init(&argc,&argv);
+-
+- // initialize notify
+- notify_init(application);
+-
+- status = RUNNING;
+-
+- for (;;) {
+-
+- msg = fgets(body, 2047, file);
+-
+- if (msg == NULL) {
+- if (status != RUNNING) {
+- break;
+- }
+- if (feof(file)) {
+- usleep(500000);
+- }
+- if (ferror(file)) {
+- perror("fgets");
+- }
+- continue;
+- }
+-
+- // create a new notification
+- switch(body[0]) {
+- case '\0':
+- case '\n':
+- n = notify_notification_new(title, "<Empty message>",
+- "dialog-information");
+- break;
+- case 'E':
+- n = notify_notification_new(title, body + 1, "dialog-error");
+- break;
+- case 'W':
+- n = notify_notification_new(title, body + 1, "dialog-warning");
+- break;
+- case 'I':
+- n = notify_notification_new(title, body + 1, "dialog-information");
+- break;
+- default:
+- n = notify_notification_new(title, body + 1, "dialog-information");
+- }
+-
+- // set the timeout to 9000 ms
+- notify_notification_set_timeout(n, 9000);
+-
+- // set the urgency level to critical
+- notify_notification_set_urgency (n, NOTIFY_URGENCY_CRITICAL);
+-
+- // show the notification
+- GError *error = NULL;
+- notify_notification_show(n, &error);
+-
+- ca_context_create(&c);
+- ca_context_play(c, 0,
+- CA_PROP_EVENT_ID, "dialog-warning",
+- CA_PROP_EVENT_DESCRIPTION, title,
+- NULL);
+- usleep(500000);
+- }
+-
+- fclose(file);
+-
+- return EXIT_SUCCESS;
+-}
+-
+diff -urN skyldav-0.2rc3_p20130817.orig/src/notify/notify.h skyldav-0.2rc3_p20130817/src/notify/notify.h
+--- skyldav-0.2rc3_p20130817.orig/src/notify/notify.h 2013-08-17 00:08:41.000000000 +0200
++++ skyldav-0.2rc3_p20130817/src/notify/notify.h 1970-01-01 01:00:00.000000000 +0100
+@@ -1,60 +0,0 @@
+-/*
+- * File: notify.h
+- *
+- * Copyright 2013 Heinrich Schuchardt <xypron.glpk@gmx.de>
+- *
+- * Licensed under the Apache License, Version 2.0 (the "License");
+- * you may not use this file except in compliance with the License.
+- * You may obtain a copy of the License at
+- *
+- * http://www.apache.org/licenses/LICENSE-2.0
+- *
+- * Unless required by applicable law or agreed to in writing, software
+- * distributed under the License is distributed on an "AS IS" BASIS,
+- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+- * See the License for the specific language governing permissions and
+- * limitations under the License.
+- *
+- */
+-
+-/**
+- * @file notify.h
+- * @brief Notify Skyld AV events.
+- */
+-
+-#ifndef NOTIFY_H
+-#define NOTIFY_H
+-
+-#ifdef __cplusplus
+-extern "C" {
+-#endif
+-
+- const char *HELP_TEXT =
+- "Usage: skyldavnotify [OPTION]\n"
+- "Notification for Skyld AV on access virus scanner.\n\n"
+- " -h help\n"
+- " -v version\n\n"
+- "Licensed under the Apache License, Version 2.0.\n"
+- "Report errors to\n"
+- "Heinrich Schuchardt <xypron.glpk@gmx.de>\n";
+-
+- const char *VERSION_TEXT =
+- "Notification for Skyld AV on access virus scanner.\n\n"
+- "Copyright 2013 Heinrich Schuchardt <xypron.glpk@gmx.de>\n\n"
+- "Licensed under the Apache License, Version 2.0 (the\n"
+- "\"License\"); you may not use this file except in compliance\n"
+- "with the License. You may obtain a copy of the License at\n\n"
+- " http://www.apache.org/licenses/LICENSE-2.0\n\n"
+- "Unless required by applicable law or agreed to in writing,\n"
+- "software distributed under the License is distributed on an\n"
+- "\"AS IS\" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND,\n"
+- "either express or implied. See the License for the specific\n"
+- "language governing permissions and limitations under the\n"
+- "License.\n";
+-
+-#ifdef __cplusplus
+-}
+-#endif
+-
+-#endif /* NOTIFY_H */
+-
diff --git a/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130821-examples.patch b/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130821-examples.patch
new file mode 100644
index 0000000..03bcb33
--- /dev/null
+++ b/app-antivirus/skyldav/files/skyldav-0.2_rc3_p20130821-examples.patch
@@ -0,0 +1,11 @@
+diff -urN skyldav-0.2rc3_p20130821.orig/Makefile.am skyldav-0.2rc3_p20130821/Makefile.am
+--- skyldav-0.2rc3_p20130821.orig/Makefile.am 2013-08-21 06:56:18.000000000 +0200
++++ skyldav-0.2rc3_p20130821/Makefile.am 2013-08-21 07:26:49.435950000 +0200
+@@ -9,7 +9,6 @@
+ rm -rf doc/doxygen
+
+ install-data-local: \
+- install-skyldav-examples \
+ install-skyldav-conf \
+ install-skyldavnotify-desktop
+
diff --git a/app-antivirus/skyldav/files/skyldav.confd b/app-antivirus/skyldav/files/skyldav.confd
new file mode 100644
index 0000000..aad4d23
--- /dev/null
+++ b/app-antivirus/skyldav/files/skyldav.confd
@@ -0,0 +1,11 @@
+# Copyright 1999-2013 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+
+# Config file for /etc/init.d/skyldav
+
+# Options to pass to the skyldav daemon.
+# Option -d for daemonizing is always passed!
+# See the skyldav(1) man page for more info.
+
+#SKYLDAV_OPTS="-m 1"
diff --git a/app-antivirus/skyldav/files/skyldav.initd b/app-antivirus/skyldav/files/skyldav.initd
new file mode 100755
index 0000000..fd4bf09
--- /dev/null
+++ b/app-antivirus/skyldav/files/skyldav.initd
@@ -0,0 +1,26 @@
+#!/sbin/runscript
+# Copyright 1999-2013 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+
+SKYLDAV_BIN="/usr/sbin/skyldav"
+SKYLDAV_OPTS="${SKYLDAV_OPTS:--m 2}"
+SKYLDAV_CONFIGFILE="/etc/skyldav.conf"
+SKYLDAV_PIDFILE_DIR="${SKYLDAV_PIDFILE_DIR:-/var/run/${RC_SVCNAME}}"
+SKYLDAV_PIDFILE="${SKYLDAV_PIDFILE:-${SKYLDAV_PIDFILE_DIR}/${RC_SVCNAME}.pid}"
+
+name="${SKYLDAV_BIN##*/}"
+command="${SKYLDAV_BIN}"
+command_args="-d ${SKYLDAV_OPTS}"
+pidfile="${SKYLDAV_PIDFILE}"
+description="Skyld AV is an anti-virus on-access scanner based upon Clam AV and fanotify"
+required_files="${SKYLDAV_CONFIG}"
+
+depend() {
+ use logger
+ need localmount
+}
+
+start_pre() {
+ checkpath -d -m 0755 -o root:root "${SKYLDAV_PIDFILE_DIR}"
+}
diff --git a/app-antivirus/skyldav/metadata.xml b/app-antivirus/skyldav/metadata.xml
new file mode 100644
index 0000000..f6da4d5
--- /dev/null
+++ b/app-antivirus/skyldav/metadata.xml
@@ -0,0 +1,12 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+ <maintainer>
+ <email>wschlich@gentoo.org</email>
+ <name>Wolfram Schlich</name>
+ <description>Primary mainainer</description>
+ </maintainer>
+ <upstream>
+ <remote-id type="github">xypron/skyldav</remote-id>
+ </upstream>
+</pkgmetadata>
diff --git a/app-antivirus/skyldav/skyldav-0.2_rc3.ebuild b/app-antivirus/skyldav/skyldav-0.2_rc3.ebuild
new file mode 100644
index 0000000..548ea6e
--- /dev/null
+++ b/app-antivirus/skyldav/skyldav-0.2_rc3.ebuild
@@ -0,0 +1,54 @@
+# Copyright 1999-2013 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+
+EAPI=5
+AUTOTOOLS_AUTORECONF="1"
+
+inherit flag-o-matic linux-info linux-mod autotools-utils
+
+MY_PV=${PV/_rc/rc}
+MY_P="${PN}-${MY_PV}"
+S="${WORKDIR}/${MY_P}"
+
+DESCRIPTION="Skyld AV: on-access scanning daemon for ClamAV using fanotify"
+SRC_URI="https://github.com/xypron/skyldav/archive/${MY_PV}.tar.gz -> ${MY_P}.tar.gz"
+HOMEPAGE="http://xypron.github.io/skyldav/"
+
+KEYWORDS="~amd64 ~x86"
+SLOT="0"
+LICENSE="Apache-2.0"
+IUSE=""
+
+RDEPEND="sys-apps/util-linux
+ sys-libs/libcap
+ media-libs/libcanberra[gtk]
+ x11-libs/libnotify
+ x11-libs/gtk+:2"
+DEPEND="${RDEPEND}
+ sys-devel/autoconf-archive"
+
+DOCS=( AUTHORS NEWS README )
+
+AUTOTOOLS_IN_SOURCE_BUILD="1"
+
+pkg_setup() {
+ linux-info_pkg_setup
+ kernel_is ge 3 8 0 || die "Linux 3.8.0 or newer recommended"
+ CONFIG_CHECK="FANOTIFY FANOTIFY_ACCESS_PERMISSIONS"
+ check_extra_config
+}
+
+src_prepare() {
+ epatch "${FILESDIR}/${P}-examples.patch"
+ epatch "${FILESDIR}/${P}-sbin.patch"
+ epatch "${FILESDIR}/${P}-conf.patch"
+ epatch "${FILESDIR}/${P}-openlog.patch"
+ autotools-utils_src_prepare
+}
+
+src_install() {
+ autotools-utils_src_install
+ newinitd "${FILESDIR}/${PN}.initd" ${PN}
+ newconfd "${FILESDIR}/${PN}.confd" ${PN}
+}
diff --git a/app-antivirus/skyldav/skyldav-0.2_rc3_p20130816.ebuild b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130816.ebuild
new file mode 100644
index 0000000..c2545a2
--- /dev/null
+++ b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130816.ebuild
@@ -0,0 +1,55 @@
+# Copyright 1999-2013 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+
+EAPI=5
+AUTOTOOLS_AUTORECONF="1"
+
+inherit flag-o-matic linux-info linux-mod autotools-utils
+
+MY_PV=${PV/_rc/rc}
+MY_P="${PN}-${MY_PV}"
+S="${WORKDIR}/${MY_P}"
+
+DESCRIPTION="Skyld AV: on-access scanning daemon for ClamAV using fanotify"
+#SRC_URI="https://github.com/xypron/skyldav/archive/${MY_PV}.tar.gz -> ${MY_P}.tar.gz"
+SRC_URI="http://dev.gentoo.org/~wschlich/src/${CATEGORY}/${PN}/${MY_P}.tar.gz"
+HOMEPAGE="http://xypron.github.io/skyldav/"
+
+KEYWORDS="~amd64 ~x86"
+SLOT="0"
+LICENSE="Apache-2.0"
+IUSE=""
+
+RDEPEND="sys-apps/util-linux
+ sys-libs/libcap
+ media-libs/libcanberra[gtk]
+ x11-libs/libnotify
+ x11-libs/gtk+:2"
+DEPEND="${RDEPEND}
+ sys-devel/autoconf-archive"
+
+DOCS=( AUTHORS NEWS README )
+
+AUTOTOOLS_IN_SOURCE_BUILD="1"
+
+pkg_setup() {
+ linux-info_pkg_setup
+ kernel_is ge 3 8 0 || die "Linux 3.8.0 or newer recommended"
+ CONFIG_CHECK="FANOTIFY FANOTIFY_ACCESS_PERMISSIONS"
+ check_extra_config
+}
+
+src_prepare() {
+ epatch "${FILESDIR}/${PN}-0.2_rc3-examples.patch"
+ epatch "${FILESDIR}/${PN}-0.2_rc3-sbin.patch"
+ epatch "${FILESDIR}/${PN}-0.2_rc3-conf.patch"
+ epatch "${FILESDIR}/${P}-syslog.patch"
+ autotools-utils_src_prepare
+}
+
+src_install() {
+ autotools-utils_src_install
+ newinitd "${FILESDIR}/${PN}.initd" ${PN}
+ newconfd "${FILESDIR}/${PN}.confd" ${PN}
+}
diff --git a/app-antivirus/skyldav/skyldav-0.2_rc3_p20130817-r1.ebuild b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130817-r1.ebuild
new file mode 100644
index 0000000..529eb1b
--- /dev/null
+++ b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130817-r1.ebuild
@@ -0,0 +1,57 @@
+# Copyright 1999-2013 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+
+EAPI=5
+AUTOTOOLS_AUTORECONF="1"
+
+inherit flag-o-matic linux-info linux-mod autotools-utils
+
+MY_PV=${PV/_rc/rc}
+MY_P="${PN}-${MY_PV}"
+S="${WORKDIR}/${MY_P}"
+
+DESCRIPTION="Skyld AV: on-access scanning daemon for ClamAV using fanotify"
+#SRC_URI="https://github.com/xypron/skyldav/archive/${MY_PV}.tar.gz -> ${MY_P}.tar.gz"
+SRC_URI="http://dev.gentoo.org/~wschlich/src/${CATEGORY}/${PN}/${MY_P}.tar.gz"
+HOMEPAGE="http://xypron.github.io/skyldav/"
+
+KEYWORDS="~amd64 ~x86"
+SLOT="0"
+LICENSE="Apache-2.0"
+IUSE="libnotify"
+
+RDEPEND="sys-apps/util-linux
+ sys-libs/libcap
+ libnotify? (
+ media-libs/libcanberra[gtk]
+ x11-libs/libnotify
+ x11-libs/gtk+:2
+ )"
+DEPEND="${RDEPEND}
+ sys-devel/autoconf-archive"
+
+DOCS=( AUTHORS NEWS README )
+
+AUTOTOOLS_IN_SOURCE_BUILD="1"
+
+pkg_setup() {
+ linux-info_pkg_setup
+ kernel_is ge 3 8 0 || die "Linux 3.8.0 or newer recommended"
+ CONFIG_CHECK="FANOTIFY FANOTIFY_ACCESS_PERMISSIONS"
+ check_extra_config
+}
+
+src_prepare() {
+ epatch "${FILESDIR}/${PN}-0.2_rc3-examples.patch"
+ epatch "${FILESDIR}/${PN}-0.2_rc3-sbin.patch"
+ epatch "${FILESDIR}/${PN}-0.2_rc3-conf.patch"
+ use libnotify || epatch "${FILESDIR}/${P}-disable-skyldavnotify.patch"
+ autotools-utils_src_prepare
+}
+
+src_install() {
+ autotools-utils_src_install
+ newinitd "${FILESDIR}/${PN}.initd" ${PN}
+ newconfd "${FILESDIR}/${PN}.confd" ${PN}
+}
diff --git a/app-antivirus/skyldav/skyldav-0.2_rc3_p20130817.ebuild b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130817.ebuild
new file mode 100644
index 0000000..e5c1f65
--- /dev/null
+++ b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130817.ebuild
@@ -0,0 +1,54 @@
+# Copyright 1999-2013 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+
+EAPI=5
+AUTOTOOLS_AUTORECONF="1"
+
+inherit flag-o-matic linux-info linux-mod autotools-utils
+
+MY_PV=${PV/_rc/rc}
+MY_P="${PN}-${MY_PV}"
+S="${WORKDIR}/${MY_P}"
+
+DESCRIPTION="Skyld AV: on-access scanning daemon for ClamAV using fanotify"
+#SRC_URI="https://github.com/xypron/skyldav/archive/${MY_PV}.tar.gz -> ${MY_P}.tar.gz"
+SRC_URI="http://dev.gentoo.org/~wschlich/src/${CATEGORY}/${PN}/${MY_P}.tar.gz"
+HOMEPAGE="http://xypron.github.io/skyldav/"
+
+KEYWORDS="~amd64 ~x86"
+SLOT="0"
+LICENSE="Apache-2.0"
+IUSE=""
+
+RDEPEND="sys-apps/util-linux
+ sys-libs/libcap
+ media-libs/libcanberra[gtk]
+ x11-libs/libnotify
+ x11-libs/gtk+:2"
+DEPEND="${RDEPEND}
+ sys-devel/autoconf-archive"
+
+DOCS=( AUTHORS NEWS README )
+
+AUTOTOOLS_IN_SOURCE_BUILD="1"
+
+pkg_setup() {
+ linux-info_pkg_setup
+ kernel_is ge 3 8 0 || die "Linux 3.8.0 or newer recommended"
+ CONFIG_CHECK="FANOTIFY FANOTIFY_ACCESS_PERMISSIONS"
+ check_extra_config
+}
+
+src_prepare() {
+ epatch "${FILESDIR}/${PN}-0.2_rc3-examples.patch"
+ epatch "${FILESDIR}/${PN}-0.2_rc3-sbin.patch"
+ epatch "${FILESDIR}/${PN}-0.2_rc3-conf.patch"
+ autotools-utils_src_prepare
+}
+
+src_install() {
+ autotools-utils_src_install
+ newinitd "${FILESDIR}/${PN}.initd" ${PN}
+ newconfd "${FILESDIR}/${PN}.confd" ${PN}
+}
diff --git a/app-antivirus/skyldav/skyldav-0.2_rc3_p20130821-r1.ebuild b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130821-r1.ebuild
new file mode 100644
index 0000000..043755a
--- /dev/null
+++ b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130821-r1.ebuild
@@ -0,0 +1,64 @@
+# Copyright 1999-2013 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+
+EAPI=5
+
+inherit flag-o-matic linux-info linux-mod autotools-utils
+
+#MY_PV=${PV/_rc/rc}
+MY_PVR=${PVR/_rc/rc}
+#MY_P="${PN}-${MY_PV}"
+MY_P="${PN}-${MY_PVR}"
+S="${WORKDIR}/${MY_P}"
+
+DESCRIPTION="Skyld AV: on-access scanning daemon for ClamAV using fanotify"
+#SRC_URI="https://github.com/xypron/skyldav/archive/${MY_PV}.tar.gz -> ${MY_P}.tar.gz"
+SRC_URI="http://dev.gentoo.org/~wschlich/src/${CATEGORY}/${PN}/${MY_P}.tar.gz"
+HOMEPAGE="http://xypron.github.io/skyldav/"
+
+KEYWORDS="~amd64 ~x86"
+SLOT="0"
+LICENSE="Apache-2.0"
+IUSE="libnotify"
+
+RDEPEND="app-antivirus/clamav
+ sys-apps/util-linux
+ sys-libs/libcap
+ libnotify? (
+ media-libs/libcanberra[gtk]
+ x11-libs/libnotify
+ x11-libs/gtk+:2
+ )"
+DEPEND="${RDEPEND}
+ sys-devel/autoconf-archive"
+
+## autotools-utils.eclass settings
+AUTOTOOLS_AUTORECONF="1"
+AUTOTOOLS_IN_SOURCE_BUILD="1"
+DOCS=( AUTHORS NEWS README )
+PATCHES=(
+ "${FILESDIR}/${P}-examples.patch"
+ "${FILESDIR}/${PN}-0.2_rc3-sbin.patch"
+ "${FILESDIR}/${PN}-0.2_rc3-conf.patch"
+)
+
+pkg_setup() {
+ linux-info_pkg_setup
+ kernel_is ge 3 8 0 || die "Linux 3.8.0 or newer recommended"
+ CONFIG_CHECK="FANOTIFY FANOTIFY_ACCESS_PERMISSIONS"
+ check_extra_config
+}
+
+src_configure() {
+ local myeconfargs=(
+ $(use_with libnotify notification)
+ )
+ autotools-utils_src_configure
+}
+
+src_install() {
+ autotools-utils_src_install
+ newinitd "${FILESDIR}/${PN}.initd" ${PN}
+ newconfd "${FILESDIR}/${PN}.confd" ${PN}
+}
diff --git a/app-antivirus/skyldav/skyldav-0.2_rc3_p20130821.ebuild b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130821.ebuild
new file mode 100644
index 0000000..ba4ee18
--- /dev/null
+++ b/app-antivirus/skyldav/skyldav-0.2_rc3_p20130821.ebuild
@@ -0,0 +1,61 @@
+# Copyright 1999-2013 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: $
+
+EAPI=5
+
+inherit flag-o-matic linux-info linux-mod autotools-utils
+
+MY_PV=${PV/_rc/rc}
+MY_P="${PN}-${MY_PV}"
+S="${WORKDIR}/${MY_P}"
+
+DESCRIPTION="Skyld AV: on-access scanning daemon for ClamAV using fanotify"
+#SRC_URI="https://github.com/xypron/skyldav/archive/${MY_PV}.tar.gz -> ${MY_P}.tar.gz"
+SRC_URI="http://dev.gentoo.org/~wschlich/src/${CATEGORY}/${PN}/${MY_P}.tar.gz"
+HOMEPAGE="http://xypron.github.io/skyldav/"
+
+KEYWORDS="~amd64 ~x86"
+SLOT="0"
+LICENSE="Apache-2.0"
+IUSE="libnotify"
+
+RDEPEND="sys-apps/util-linux
+ sys-libs/libcap
+ libnotify? (
+ media-libs/libcanberra[gtk]
+ x11-libs/libnotify
+ x11-libs/gtk+:2
+ )"
+DEPEND="${RDEPEND}
+ sys-devel/autoconf-archive"
+
+## autotools-utils.eclass settings
+AUTOTOOLS_AUTORECONF="1"
+AUTOTOOLS_IN_SOURCE_BUILD="1"
+DOCS=( AUTHORS NEWS README )
+PATCHES=(
+ "${FILESDIR}/${P}-examples.patch"
+ "${FILESDIR}/${PN}-0.2_rc3-sbin.patch"
+ "${FILESDIR}/${PN}-0.2_rc3-conf.patch"
+)
+
+pkg_setup() {
+ linux-info_pkg_setup
+ kernel_is ge 3 8 0 || die "Linux 3.8.0 or newer recommended"
+ CONFIG_CHECK="FANOTIFY FANOTIFY_ACCESS_PERMISSIONS"
+ check_extra_config
+}
+
+src_configure() {
+ local myeconfargs=(
+ $(use_with libnotify notification)
+ )
+ autotools-utils_src_configure
+}
+
+src_install() {
+ autotools-utils_src_install
+ newinitd "${FILESDIR}/${PN}.initd" ${PN}
+ newconfd "${FILESDIR}/${PN}.confd" ${PN}
+}