class Snort < Formula desc "Flexible Network Intrusion Detection System" homepage "https://www.snort.org" url "https://www.snort.org/downloads/snort/snort-2.9.8.0.tar.gz" sha256 "bddd5d01d10d20c182836fa0199cd3549239b7a9d0fd5bbb10226feb8b42d231" bottle do cellar :any sha256 "488b341548299f7506e074bda07cd250110f68693a51552a801cb513d3c06912" => :el_capitan sha256 "c5de68e295f5ecfdbc6019a2fc307023c7b1a163850be7e4347fa30329cc6599" => :yosemite sha256 "17a3390ad63726fa4505f60bb6d6b8acb112d70e4dd1db7889ecbfe05c96d629" => :mavericks end option "with-debug", "Compile Snort with debug options enabled" deprecated_option "enable-debug" => "with-debug" depends_on "pkg-config" => :build depends_on "luajit" depends_on "daq" depends_on "libdnet" depends_on "pcre" depends_on "openssl" def install openssl = Formula["openssl"] args = %W[ --prefix=#{prefix} --sysconfdir=#{etc}/snort --disable-dependency-tracking --disable-silent-rules --enable-gre --enable-mpls --enable-targetbased --enable-sourcefire --with-openssl-includes=#{openssl.opt_include} --with-openssl-libraries=#{openssl.opt_lib} --enable-active-response --enable-normalizer --enable-reload --enable-react --enable-flexresp3 ] if build.with? "debug" args << "--enable-debug" args << "--enable-debug-msgs" else args << "--disable-debug" end system "./configure", *args system "make", "install" rm Dir[buildpath/"etc/Makefile*"] (etc/"snort").install Dir[buildpath/"etc/*"] end def caveats; <<-EOS.undent For snort to be functional, you need to update the permissions for /dev/bpf* so that they can be read by non-root users. This can be done manually using: sudo chmod 644 /dev/bpf* or you could create a startup item to do this for you. EOS end test do system bin/"snort", "-V" end end