# Copyright 1999-2011 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 # $Header: /var/cvsroot/gentoo-x86/net-analyzer/wireshark/wireshark-1.4.8.ebuild,v 1.6 2011/08/07 16:48:43 armin76 Exp $ EAPI="3" PYTHON_DEPEND="python? 2" inherit libtool flag-o-matic eutils toolchain-funcs python autotools [[ -n ${PV#*_rc} && ${PV#*_rc} != ${PV} ]] && MY_P=${PN}-${PV/_} || MY_P=${P} DESCRIPTION="A network protocol analyzer formerly known as ethereal" HOMEPAGE="http://www.wireshark.org/" SRC_URI="http://www.wireshark.org/download/src/all-versions/${MY_P}.tar.bz2" LICENSE="GPL-2" SLOT="0" KEYWORDS="alpha amd64 hppa ia64 ppc ppc64 sparc x86 ~x86-fbsd" IUSE="adns ares doc doc-pdf gtk ipv6 lua gcrypt geoip kerberos profile +pcap portaudio python +caps selinux smi ssl threads zlib" RDEPEND=">=dev-libs/glib-2.14:2 zlib? ( sys-libs/zlib !=sys-libs/zlib-1.2.4 ) smi? ( net-libs/libsmi ) gtk? ( >=x11-libs/gtk+-2.4.0:2 x11-libs/pango dev-libs/atk x11-misc/xdg-utils ) ssl? ( net-libs/gnutls ) gcrypt? ( dev-libs/libgcrypt ) pcap? ( net-libs/libpcap ) caps? ( sys-libs/libcap ) kerberos? ( virtual/krb5 ) portaudio? ( media-libs/portaudio ) ares? ( >=net-dns/c-ares-1.5 ) !ares? ( adns? ( net-libs/adns ) ) geoip? ( dev-libs/geoip ) lua? ( >=dev-lang/lua-5.1 ) selinux? ( sec-policy/selinux-wireshark )" DEPEND="${RDEPEND} doc? ( dev-libs/libxslt app-text/docbook-xml-dtd:4.2 dev-libs/libxml2 app-doc/doxygen doc-pdf? ( dev-java/fop ) ) >=dev-util/pkgconfig-0.15.0 dev-lang/perl sys-devel/bison sys-apps/sed sys-devel/flex" S=${WORKDIR}/${MY_P} # borrowed from GSoC2010_Gentoo_Capabilities by constanze and flameyeys # @FUNCTION: fcaps # @USAGE: fcaps {uid:gid} {file-mode} {cap1[,cap2,...]} {file} # @RETURN: 0 if all okay; non-zero if failure and fallback # @DESCRIPTION: # fcaps sets the specified capabilities in the effective and permitted set of # the given file. In case of failure fcaps sets the given file-mode. fcaps() { local uid_gid=$1 local perms=$2 local capset=$3 local path=$4 local res chmod $perms $path && \ chown $uid_gid $path res=$? use caps || return $res #set the capability setcap "$capset=ep" "$path" &> /dev/null #check if the capabilitiy got set correctly setcap -v "$capset=ep" "$path" &> /dev/null res=$? if [ $res -ne 0 ]; then ewarn "Failed to set capabilities. Probable reason is missed kernel support." ewarn "Kernel must have SECURITY_FILE_CAPABILITIES, and _FS_SECURITY" ewarn "enabled (e.g. EXT3_FS_SECURITY) where is the filesystem to store" ewarn "${path}" ewarn ewarn "Falling back to suid now..." chmod u+s ${path} fi return $res } pkg_setup() { if ! use gtk; then ewarn "USE=-gtk disables gtk-based gui called wireshark." ewarn "Only command line utils will be built available" fi if use python; then python_set_active_version 2 python_pkg_setup fi # Add group for users allowed to sniff. enewgroup wireshark } src_configure() { local myconf if [[ $(gcc-major-version) -lt 3 || ( $(gcc-major-version) -eq 3 && $(gcc-minor-version) -le 4 ) ]] ; then die "Unsupported compiler version, please upgrade." fi if use ares && use adns; then elog "You asked for both, ares and adns, but we can use only one of them." elog "c-ares supersedes adns resolver thus using c-ares (ares USE flag)." myconf="$(use_with ares c-ares) --without-adns" else myconf="$(use_with adns) $(use_with ares c-ares)" fi # profile and pie are incompatible #215806, #292991 if use profile; then ewarn "You've enabled the 'profile' USE flag, building PIE binaries is disabled." ewarn "Also ignore \"unrecognized option '-nopie'\" gcc warning #358101." append-flags $(test-flags-CC -nopie) fi # Workaround bug #213705. If krb5-config --libs has -lcrypto then pass # --with-ssl to ./configure. (Mimics code from acinclude.m4). if use kerberos; then case `krb5-config --libs` in *-lcrypto*) ewarn "Kerberos was built with ssl support: linkage with openssl is enabled." ewarn "Note there are annoying license incompatibilities between the OpenSSL" ewarn "license and the GPL, so do your check before distributing such package." myconf+=" --with-ssl" ;; esac fi # Hack around inability to disable doxygen/fop doc generation use doc || export ac_cv_prog_HAVE_DOXYGEN=false use doc-pdf || export ac_cv_prog_HAVE_FOP=false # dumpcap requires libcap, setuid-install requires dumpcap econf $(use_enable gtk wireshark) \ $(use_enable profile profile-build) \ $(use_with ssl gnutls) \ $(use_with gcrypt) \ $(use_enable ipv6) \ $(use_enable threads) \ $(use_with lua) \ $(use_with kerberos krb5) \ $(use_with smi libsmi) \ $(use_with pcap) \ $(use_with zlib) \ $(use_with geoip) \ $(use_with portaudio) \ $(use_with python) \ $(use_with caps libcap) \ $(use pcap && use_enable caps setcap-install) \ $(use pcap && use_enable !caps setuid-install) \ --sysconfdir=/etc/wireshark \ --with-dumpcap-group=wireshark \ --disable-extra-gcc-checks \ ${myconf} } src_compile() { emake || die use doc && cd docbook && { emake || die; } } src_install() { emake DESTDIR="${D}" install || die "emake install failed" if use doc; then dohtml -r docbook/{release-notes.html,ws{d,u}g_html{,_chunked}} if use doc-pdf; then insinto /usr/share/doc/${PF}/pdf/ doins docbook/{{developer,user}-guide,release-notes}-{a4,us}.pdf || die fi fi # FAQ is not required as is installed from help/faq.txt dodoc AUTHORS ChangeLog NEWS README{,.bsd,.linux,.macos,.vmware} \ doc/{randpkt.txt,README*} insinto /usr/include/wiretap doins wiretap/wtap.h || die if use gtk; then for c in hi lo; do for d in 16 32 48; do insinto /usr/share/icons/${c}color/${d}x${d}/apps newins image/${c}${d}-app-wireshark.png wireshark.png done done domenu wireshark.desktop || die fi chmod o-x "${ED}"/usr/bin/dumpcap #357237 } pkg_postinst() { if use caps && use pcap; then fcaps 0:wireshark 550 cap_net_raw,cap_net_admin "${ROOT}"/usr/bin/dumpcap fi echo ewarn "NOTE: To run wireshark as normal user you have to add yourself to" ewarn "the wireshark group. This security measure ensures that only trusted" ewarn "users are allowed to sniff your traffic." echo }