nixpkgs/pkgs/applications/networking/ids/suricata/default.nix

159 lines
3.4 KiB
Nix
Raw Normal View History

2019-07-07 19:15:33 +01:00
{ stdenv
, lib
, fetchurl
, clang
, llvm
2019-07-07 19:15:33 +01:00
, pkgconfig
, makeWrapper
, file
, hyperscan
, jansson
, libbpf
2019-07-07 19:15:33 +01:00
, libcap_ng
, libelf
2019-07-07 19:15:33 +01:00
, libevent
, libmaxminddb
2019-07-07 19:15:33 +01:00
, libnet
, libnetfilter_log
, libnetfilter_queue
, libnfnetlink
, libpcap
, libyaml
, luajit
, lz4
2019-07-07 19:15:33 +01:00
, nspr
, nss
, pcre
, python
, zlib
, redisSupport ? true, redis, hiredis
, rustSupport ? true, rustc, cargo
}: let
libmagic = file;
hyperscanSupport = stdenv.system == "x86_64-linux" || stdenv.system == "i686-linux";
in
stdenv.mkDerivation rec {
pname = "suricata";
2020-05-10 17:12:25 +01:00
version = "5.0.3";
2019-07-07 19:15:33 +01:00
src = fetchurl {
url = "https://www.openinfosecfoundation.org/download/${pname}-${version}.tar.gz";
2020-05-10 17:12:25 +01:00
sha256 = "1nv5aq5lpkpskkzw05hr2lshkzcs4zqj5kfv4qjlbwigmp6kwh9l";
2019-07-07 19:15:33 +01:00
};
nativeBuildInputs = [
clang
llvm
2019-07-07 19:15:33 +01:00
makeWrapper
pkgconfig
]
++ lib.optionals rustSupport [ rustc cargo ]
;
2019-07-07 19:15:33 +01:00
buildInputs = [
jansson
libbpf
2019-07-07 19:15:33 +01:00
libcap_ng
libelf
2019-07-07 19:15:33 +01:00
libevent
libmagic
libmaxminddb
2019-07-07 19:15:33 +01:00
libnet
libnetfilter_log
libnetfilter_queue
libnfnetlink
libpcap
libyaml
luajit
lz4
2019-07-07 19:15:33 +01:00
nspr
nss
pcre
python
zlib
]
++ lib.optional hyperscanSupport hyperscan
++ lib.optionals redisSupport [ redis hiredis ]
2019-07-07 19:15:33 +01:00
;
enableParallelBuilding = true;
patches = lib.optional stdenv.is64bit ./bpf_stubs_workaround.patch;
postPatch = ''
substituteInPlace ./configure \
--replace "/usr/bin/file" "${file}/bin/file"
substituteInPlace ./libhtp/configure \
--replace "/usr/bin/file" "${file}/bin/file"
mkdir -p bpf_stubs_workaround/gnu
touch bpf_stubs_workaround/gnu/stubs-32.h
'';
2019-07-07 19:15:33 +01:00
configureFlags = [
"--disable-gccmarch-native"
"--enable-af-packet"
"--enable-ebpf"
"--enable-ebpf-build"
2019-07-07 19:15:33 +01:00
"--enable-gccprotect"
"--enable-geoip"
"--enable-luajit"
"--enable-nflog"
"--enable-nfqueue"
"--enable-pie"
"--disable-prelude"
"--enable-python"
"--enable-unix-socket"
"--localstatedir=/var"
"--sysconfdir=/etc"
"--with-libnet-includes=${libnet}/include"
"--with-libnet-libraries=${libnet}/lib"
]
++ lib.optionals hyperscanSupport [
"--with-libhs-includes=${hyperscan.dev}/include/hs"
2019-07-07 19:15:33 +01:00
"--with-libhs-libraries=${hyperscan}/lib"
]
++ lib.optional redisSupport "--enable-hiredis"
++ lib.optionals rustSupport [
2019-07-07 19:15:33 +01:00
"--enable-rust"
"--enable-rust-experimental"
];
postConfigure = ''
# Avoid unintended clousure growth.
sed -i 's|/nix/store/\(.\{8\}\)[^-]*-|/nix/store/\1...-|g' ./src/build-info.h
'';
hardeningDisable = [ "stackprotector" ];
2019-07-07 19:15:33 +01:00
installFlags = [
"e_localstatedir=\${TMPDIR}"
"e_logdir=\${TMPDIR}"
"e_logcertsdir=\${TMPDIR}"
"e_logfilesdir=\${TMPDIR}"
"e_rundir=\${TMPDIR}"
"e_sysconfdir=\${out}/etc/suricata"
"e_sysconfrulesdir=\${out}/etc/suricata/rules"
"localstatedir=\${TMPDIR}"
"runstatedir=\${TMPDIR}"
"sysconfdir=\${out}/etc"
];
2019-11-04 12:33:53 +00:00
installTargets = [ "install" "install-conf" ];
2019-07-07 19:15:33 +01:00
postInstall = ''
wrapProgram "$out/bin/suricatasc" \
--prefix PYTHONPATH : $PYTHONPATH:$(toPythonPath "$out")
substituteInPlace "$out/etc/suricata/suricata.yaml" \
--replace "/etc/suricata" "$out/etc/suricata"
2019-07-07 19:15:33 +01:00
'';
meta = with stdenv.lib; {
description = "A free and open source, mature, fast and robust network threat detection engine";
homepage = "https://suricata-ids.org";
license = licenses.gpl2;
platforms = platforms.linux;
maintainers = with maintainers; [ magenbluten ];
};
}