Bernhard Fröhlich 3 months ago
parent
commit
d4bc38fb01

+ 4
- 5
lang/micropython/Makefile View File

@@ -9,19 +9,18 @@ MAINTAINER= ports@FreeBSD.org
COMMENT= Implementation of the Python language for microcontrollers

LICENSE= MIT

LIB_DEPENDS= libffi.so:devel/libffi
LICENSE_FILE= ${WRKDIR}/${DISTNAME}/LICENSE

BUILD_DEPENDS= bash:shells/bash
RUN_DEPENDS= bash:shells/bash
RUN_DEPENDS= bash:shells/bash
LIB_DEPENDS= libffi.so:devel/libffi

USES= gmake pkgconfig python,build
USES= gmake pkgconfig python:build
USE_GCC= yes

PLIST_FILES= bin/micropython

WRKSRC_SUBDIR= ports/unix

MAKE_ARGS+= V=1
ALL_TARGET= axtls micropython


+ 33
- 0
security/wazuh-agent/Makefile View File

@@ -0,0 +1,33 @@
# $FreeBSD$

PORTNAME= wazuh
PORTVERSION= 3.9.0
DISTVERSIONPREFIX= v
CATEGORIES= security
PKGNAMESUFFIX= -agent

MAINTAINER= m.muenz@gmail.com
COMMENT= Security tool to monitor and check logs and intrusions

LICENSE= GPLv2
LICENSE_FILE= ${WRKSRC}/LICENSE

USES= gmake perl5 readline

USE_GITHUB= yes

USE_OPENSSL= yes
USE_GMAKE= yes

USERS= ossec ossecm ossecr
GROUPS= ossec

.include <bsd.port.pre.mk>

do-build:
@cd ${WRKSRC}/src && ${GMAKE} deps && ${GMAKE}

do-install:
@cd ${WRKSRC} && ${SH} install.sh

.include <bsd.port.mk>

+ 3
- 0
security/wazuh-agent/distinfo View File

@@ -0,0 +1,3 @@
TIMESTAMP = 1557487679
SHA256 (wazuh-wazuh-v3.9.0_GH0.tar.gz) = 1ae46fefa2f2910b150c6b502c36a7e4a8488ddede2e44f33506a9b0d8d1741c
SIZE (wazuh-wazuh-v3.9.0_GH0.tar.gz) = 14788827

+ 128
- 0
security/wazuh-agent/files/patch-etc_preloaded-vars.conf View File

@@ -0,0 +1,128 @@
--- etc/preloaded-vars.conf.orig 2019-04-30 19:12:01 UTC
+++ etc/preloaded-vars.conf
@@ -23,57 +23,57 @@
# It can be "en", "br", "tr", "it", "de" or "pl".
# In case of an invalid language, it will default
# to English "en"
-# USER_LANGUAGE="en" # For english
+USER_LANGUAGE="en" # For english
# USER_LANGUAGE="br" # For portuguese
# If USER_NO_STOP is set to anything, the confirmation
# messages are not going to be asked.
-# USER_NO_STOP="y"
+USER_NO_STOP="y"
# USER_INSTALL_TYPE defines the installation type to
# be used during install. It can only be "local",
# "agent" or "server".
#USER_INSTALL_TYPE="local"
-#USER_INSTALL_TYPE="agent"
+USER_INSTALL_TYPE="agent"
#USER_INSTALL_TYPE="server"
# USER_DIR defines the location to install ossec
-#USER_DIR="/var/ossec"
+USER_DIR="/usr/local/wazuh-agent"
# If USER_DELETE_DIR is set to "y", the directory
# to install OSSEC will be removed if present.
-#USER_DELETE_DIR="y"
+USER_DELETE_DIR="n"
# If USER_ENABLE_ACTIVE_RESPONSE is set to "n",
# active response will be disabled.
-#USER_ENABLE_ACTIVE_RESPONSE="y"
+USER_ENABLE_ACTIVE_RESPONSE="y"
# If USER_ENABLE_SYSCHECK is set to "y",
# syscheck will be enabled. Set to "n" to
# disable it.
-#USER_ENABLE_SYSCHECK="y"
+USER_ENABLE_SYSCHECK="y"
# If USER_ENABLE_ROOTCHECK is set to "y",
# rootcheck will be enabled. Set to "n" to
# disable it.
-#USER_ENABLE_ROOTCHECK="y"
+USER_ENABLE_ROOTCHECK="y"
# If USER_ENABLE_OPENSCAP is set to "y",
# the OpenSCAP module will be enabled.
# Set to "n" to disable it.
-#USER_ENABLE_OPENSCAP="y"
+USER_ENABLE_OPENSCAP="y"
# If USER_ENABLE_SYSCOLLECTOR is set to "y",
# syscollector will be enabled. Set to "n" to
# disable it.
-#USER_ENABLE_SYSCOLLECTOR="y"
+USER_ENABLE_SYSCOLLECTOR="y"
# If USER_ENABLE_SECURITY_CONFIGURATION_ASSESSMENT is set to "y",
# the configuration assessment module will be enabled.
@@ -83,16 +83,16 @@ USER_ENABLE_SECURITY_CONFIGURATION_ASSESSMENT="y"
# If USER_ENABLE_AUTHD is set to "y",
# the Auth service will be enabled.
# Set to "n" to disable it.
-#USER_ENABLE_AUTHD="y"
+USER_ENABLE_AUTHD="y"
# If USER_GENERATE_AUTHD_CERT is set to "y",
# the Authd certificate will be auto generated.
# Set to "n" to disable it.
-#USER_GENERATE_AUTHD_CERT="y"
+USER_GENERATE_AUTHD_CERT="n"
# If USER_UPDATE is set to anything, the update
# installation will be done.
-#USER_UPDATE="y"
+USER_UPDATE="n"
# If USER_BINARYINSTALL is set, the installation
# is not going to compile the code, but use the
@@ -105,13 +105,13 @@ USER_ENABLE_SECURITY_CONFIGURATION_ASSESSMENT="y"
# Specifies the IP address or hostname of the
# ossec server. Only used on agent installations.
# Choose only one, not both.
-# USER_AGENT_SERVER_IP="1.2.3.4"
+USER_AGENT_SERVER_IP="127.0.0.1"
# USER_AGENT_SERVER_NAME
# USER_CREATE_SSL_CERT creates the manager certificate
# and key when set to yes
-#USER_CREATE_SSL_CERT="y"
+USER_CREATE_SSL_CERT="n"
# USER_AGENT_CONFIG_PROFILE specifies the agent's config profile
# name. This is used to create agent.conf configuration profiles
@@ -124,10 +124,10 @@ USER_ENABLE_SECURITY_CONFIGURATION_ASSESSMENT="y"
### Server/Local Installation variables. ###
# USER_ENABLE_EMAIL enables or disables email alerting.
-#USER_ENABLE_EMAIL="y"
+USER_ENABLE_EMAIL="n"
# USER_AUTO_START enables or disables the auto-start of Wazuh
-#USER_AUTO_START="y"
+USER_AUTO_START="n"
# USER_EMAIL_ADDRESS defines the destination e-mail of the alerts.
#USER_EMAIL_ADDRESS="dcid@test.ossec.net"
@@ -146,7 +146,7 @@ USER_ENABLE_SECURITY_CONFIGURATION_ASSESSMENT="y"
# USER_CA_STORE is a path to a X509 certificate or to a folder
# containing certificates to verify incoming WPK packages for remote upgrades.
-#USER_CA_STORE="/path/to/my_cert.pem"
+USER_CA_STORE="n"
# OPTIMIZE_CPYTHON activate all the Python optimizations when
# building the CPython interpeter. This can take a while.

+ 11
- 0
security/wazuh-agent/files/patch-src_init_init.sh View File

@@ -0,0 +1,11 @@
--- src/init/init.sh.orig 2019-05-14 21:25:40 UTC
+++ src/init/init.sh
@@ -164,7 +164,7 @@ runInit()
return 0;
fi
- if [ "X${UN}" = "XOpenBSD" -o "X${UN}" = "XNetBSD" -o "X${UN}" = "XFreeBSD" -o "X${UN}" = "XDragonFly" ]; then
+ if [ "X${UN}" = "XOpenBSD" -o "X${UN}" = "XNetBSD" -o "X${UN}" = "XDragonFly" ]; then
# Checking for the presence of ossec-control on rc.local
grep ossec-control /etc/rc.local > /dev/null 2>&1
if [ $? != 0 ]; then

+ 14
- 0
security/wazuh-agent/pkg-descr View File

@@ -0,0 +1,14 @@
The Wazuh agent runs on the hosts that you want to monitor.
It is multi-platform and provides the following capabilities:

- Log and data collection
- File integrity monitoring
- Rootkit and malware detection
- Security policy monitoring.
- Configuration assessments
- Software inventory

In addition, it communicates with the Wazuh manager, sending data in near
real-time through an encrypted and authenticated channel.

WWW: https://github.com/wazuh/wazuh

Loading…
Cancel
Save