mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-22 21:50:55 +00:00
45bbcb9638
Note: This will almost certainly not work as-is, but at least it compiles. NixOS module to come.
177 lines
5.8 KiB
Diff
177 lines
5.8 KiB
Diff
diff -Naur ossec-hids-2.6-orig/install.sh ossec-hids-2.6/install.sh
|
|
--- ossec-hids-2.6-orig/install.sh 2011-07-11 15:36:58.000000000 -0400
|
|
+++ ossec-hids-2.6/install.sh 2012-07-09 09:58:57.970692818 -0400
|
|
@@ -119,14 +119,14 @@
|
|
# Generate the /etc/ossec-init.conf
|
|
VERSION_FILE="./src/VERSION"
|
|
VERSION=`cat ${VERSION_FILE}`
|
|
- chmod 700 ${OSSEC_INIT} > /dev/null 2>&1
|
|
- echo "DIRECTORY=\"${INSTALLDIR}\"" > ${OSSEC_INIT}
|
|
- echo "VERSION=\"${VERSION}\"" >> ${OSSEC_INIT}
|
|
- echo "DATE=\"`date`\"" >> ${OSSEC_INIT}
|
|
- echo "TYPE=\"${INSTYPE}\"" >> ${OSSEC_INIT}
|
|
- chmod 600 ${OSSEC_INIT}
|
|
- cp -pr ${OSSEC_INIT} ${INSTALLDIR}${OSSEC_INIT}
|
|
- chmod 644 ${INSTALLDIR}${OSSEC_INIT}
|
|
+ echo chmod 700 ${OSSEC_INIT} > /dev/null 2>&1
|
|
+ echo "DIRECTORY=\"${INSTALLDIR}\"" > ${INSTALLDIR}${OSSEC_INIT}
|
|
+ echo "VERSION=\"${VERSION}\"" >> ${INSTALLDIR}${OSSEC_INIT}
|
|
+ echo "DATE=\"`date`\"" >> ${INSTALLDIR}${OSSEC_INIT}
|
|
+ echo "TYPE=\"${INSTYPE}\"" >> ${INSTALLDIR}${OSSEC_INIT}
|
|
+ echo chmod 600 ${OSSEC_INIT}
|
|
+ echo cp -pr ${OSSEC_INIT} ${INSTALLDIR}${OSSEC_INIT}
|
|
+ echo chmod 644 ${INSTALLDIR}${OSSEC_INIT}
|
|
|
|
|
|
# If update_rules is set, we need to tweak
|
|
@@ -926,11 +926,6 @@
|
|
catError "0x1-location";
|
|
fi
|
|
|
|
- # Must be root
|
|
- if [ ! "X$ME" = "Xroot" ]; then
|
|
- catError "0x2-beroot";
|
|
- fi
|
|
-
|
|
# Checking dependencies
|
|
checkDependencies
|
|
|
|
diff -Naur ossec-hids-2.6-orig/src/InstallAgent.sh ossec-hids-2.6/src/InstallAgent.sh
|
|
--- ossec-hids-2.6-orig/src/InstallAgent.sh 2011-07-11 15:36:58.000000000 -0400
|
|
+++ ossec-hids-2.6/src/InstallAgent.sh 2012-07-09 09:56:12.061870552 -0400
|
|
@@ -80,7 +80,7 @@
|
|
else
|
|
grep "^${USER}" /etc/passwd > /dev/null 2>&1
|
|
if [ ! $? = 0 ]; then
|
|
- /usr/sbin/groupadd ${GROUP}
|
|
+ echo /usr/sbin/groupadd ${GROUP}
|
|
|
|
# We first check if /sbin/nologin is present. If it is not,
|
|
# we look for bin/false. If none of them is present, we
|
|
@@ -93,7 +93,7 @@
|
|
OSMYSHELL="/bin/false"
|
|
fi
|
|
fi
|
|
- /usr/sbin/useradd -d ${DIR} -s ${OSMYSHELL} -g ${GROUP} ${USER}
|
|
+ echo /usr/sbin/useradd -d ${DIR} -s ${OSMYSHELL} -g ${GROUP} ${USER}
|
|
fi
|
|
fi
|
|
|
|
@@ -105,31 +105,31 @@
|
|
done
|
|
|
|
# Default for all directories
|
|
-chmod -R 550 ${DIR}
|
|
-chown -R root:${GROUP} ${DIR}
|
|
+echo chmod -R 550 ${DIR}
|
|
+echo chown -R root:${GROUP} ${DIR}
|
|
|
|
# To the ossec queue (default for agentd to read)
|
|
-chown -R ${USER}:${GROUP} ${DIR}/queue/ossec
|
|
-chmod -R 770 ${DIR}/queue/ossec
|
|
+echo chown -R ${USER}:${GROUP} ${DIR}/queue/ossec
|
|
+echo chmod -R 770 ${DIR}/queue/ossec
|
|
|
|
# For the logging user
|
|
-chown -R ${USER}:${GROUP} ${DIR}/logs
|
|
-chmod -R 750 ${DIR}/logs
|
|
-chmod -R 775 ${DIR}/queue/rids
|
|
-touch ${DIR}/logs/ossec.log
|
|
-chown ${USER}:${GROUP} ${DIR}/logs/ossec.log
|
|
-chmod 664 ${DIR}/logs/ossec.log
|
|
-
|
|
-chown -R ${USER}:${GROUP} ${DIR}/queue/diff
|
|
-chmod -R 750 ${DIR}/queue/diff
|
|
-chmod 740 ${DIR}/queue/diff/* > /dev/null 2>&1
|
|
+echo chown -R ${USER}:${GROUP} ${DIR}/logs
|
|
+echo chmod -R 750 ${DIR}/logs
|
|
+echo chmod -R 775 ${DIR}/queue/rids
|
|
+echo touch ${DIR}/logs/ossec.log
|
|
+echo chown ${USER}:${GROUP} ${DIR}/logs/ossec.log
|
|
+echo chmod 664 ${DIR}/logs/ossec.log
|
|
+
|
|
+echo chown -R ${USER}:${GROUP} ${DIR}/queue/diff
|
|
+echo chmod -R 750 ${DIR}/queue/diff
|
|
+echo chmod 740 ${DIR}/queue/diff/* "> /dev/null 2>&1"
|
|
|
|
|
|
|
|
|
|
# For the etc dir
|
|
-chmod 550 ${DIR}/etc
|
|
-chown -R root:${GROUP} ${DIR}/etc
|
|
+echo chmod 550 ${DIR}/etc
|
|
+echo chown -R root:${GROUP} ${DIR}/etc
|
|
|
|
ls /etc/localtime > /dev/null 2>&1
|
|
if [ $? = 0 ]; then
|
|
@@ -167,25 +167,25 @@
|
|
cp -pr ../etc/client.keys ${DIR}/etc/ > /dev/null 2>&1
|
|
cp -pr agentlessd/scripts/* ${DIR}/agentless/
|
|
|
|
-chown root:${GROUP} ${DIR}/etc/internal_options.conf
|
|
-chown root:${GROUP} ${DIR}/etc/local_internal_options.conf > /dev/null 2>&1
|
|
-chown root:${GROUP} ${DIR}/etc/client.keys > /dev/null 2>&1
|
|
-chown root:${GROUP} ${DIR}/agentless/*
|
|
-chown ${USER}:${GROUP} ${DIR}/.ssh
|
|
-chown -R root:${GROUP} ${DIR}/etc/shared
|
|
-
|
|
-chmod 550 ${DIR}/etc
|
|
-chmod 440 ${DIR}/etc/internal_options.conf
|
|
-chmod 440 ${DIR}/etc/local_internal_options.conf > /dev/null 2>&1
|
|
-chmod 440 ${DIR}/etc/client.keys > /dev/null 2>&1
|
|
-chmod -R 770 ${DIR}/etc/shared # ossec must be able to write to it
|
|
-chmod 550 ${DIR}/agentless/*
|
|
-chmod 700 ${DIR}/.ssh
|
|
+echo chown root:${GROUP} ${DIR}/etc/internal_options.conf
|
|
+echo chown root:${GROUP} ${DIR}/etc/local_internal_options.conf "> /dev/null 2>&1"
|
|
+echo chown root:${GROUP} ${DIR}/etc/client.keys "> /dev/null 2>&1"
|
|
+echo chown root:${GROUP} ${DIR}/agentless/*
|
|
+echo chown ${USER}:${GROUP} ${DIR}/.ssh
|
|
+echo chown -R root:${GROUP} ${DIR}/etc/shared
|
|
+
|
|
+echo chmod 550 ${DIR}/etc
|
|
+echo chmod 440 ${DIR}/etc/internal_options.conf
|
|
+echo chmod 440 ${DIR}/etc/local_internal_options.conf > /dev/null 2>&1
|
|
+echo chmod 440 ${DIR}/etc/client.keys > /dev/null 2>&1
|
|
+echo chmod -R 770 ${DIR}/etc/shared # ossec must be able to write to it
|
|
+echo chmod 550 ${DIR}/agentless/*
|
|
+echo chmod 700 ${DIR}/.ssh
|
|
|
|
|
|
# For the /var/run
|
|
-chmod 770 ${DIR}/var/run
|
|
-chown root:${GROUP} ${DIR}/var/run
|
|
+echo chmod 770 ${DIR}/var/run
|
|
+echo chown root:${GROUP} ${DIR}/var/run
|
|
|
|
|
|
# Moving the binary files
|
|
@@ -201,11 +201,11 @@
|
|
sh ./init/fw-check.sh execute > /dev/null
|
|
cp -pr ../active-response/*.sh ${DIR}/active-response/bin/
|
|
cp -pr ../active-response/firewalls/*.sh ${DIR}/active-response/bin/
|
|
-chmod 755 ${DIR}/active-response/bin/*
|
|
-chown root:${GROUP} ${DIR}/active-response/bin/*
|
|
+echo chmod 755 ${DIR}/active-response/bin/*
|
|
+echo chown root:${GROUP} ${DIR}/active-response/bin/*
|
|
|
|
-chown root:${GROUP} ${DIR}/bin/*
|
|
-chmod 550 ${DIR}/bin/*
|
|
+echo chown root:${GROUP} ${DIR}/bin/*
|
|
+echo chmod 550 ${DIR}/bin/*
|
|
|
|
|
|
# Moving the config file
|
|
@@ -221,8 +221,8 @@
|
|
else
|
|
cp -pr ../etc/ossec-agent.conf ${DIR}/etc/ossec.conf
|
|
fi
|
|
-chown root:${GROUP} ${DIR}/etc/ossec.conf
|
|
-chmod 440 ${DIR}/etc/ossec.conf
|
|
+echo chown root:${GROUP} ${DIR}/etc/ossec.conf
|
|
+echo chmod 440 ${DIR}/etc/ossec.conf
|
|
|
|
|
|
|