File suricata-rules-etopen.spec of Package suricata-rules
# Common info
Name: suricata-rules-etopen
Version: %(date +%Y%m%d)
Release: %{?extraver:0.}1%{?dist}
License: BSD-3-Clause and GPL-2.0
Group: Productivity/Networking/Security
URL: https://www.proofpoint.com/us/threat-intelligence-open-source-community
Summary: ETOpen Ruleset for Suricata IDS
# Install-time parameters
Requires: suricata
Provides: suricata-rules suricata-rules-ETOpen
# Build-time parameters
BuildArch: noarch
BuildRoot: %{_tmppath}/%{name}-root
Source: http://rules.emergingthreats.net/open/suricata/emerging.rules.tar.gz
%description
The ETOpen Ruleset is an excellent anti-malware IDS/IPS ruleset that enables
users with cost constraints to significantly enhance their existing
network-based malware detection. The ETOpen Ruleset is not a full coverage
ruleset, and may not be sufficient for many regulated environments and should
not be used as a standalone ruleset.
%prep
%setup -q -n rules
%build
%install
%{__install} -d -m755 %{buildroot}%{_sysconfdir}/suricata/rules
for file in *.conf *.config *.map *.rules *.yaml
do
%{__install} -m644 ${file} %{buildroot}%{_sysconfdir}/suricata/rules/${file}
done
%clean
[ "%{buildroot}" != "/" ] && %{__rm} -rf %{buildroot}
%files
%defattr(-,root,root)
%doc LICENSE BSD-License.txt gpl-2.0.txt
%dir %{_sysconfdir}/suricata/rules/
%dir %{_sysconfdir}/suricata/
%config(noreplace) %{_sysconfdir}/suricata/rules/*
%changelog