diff options
author | Scott Ullrich <sullrich@pfsense.org> | 2006-10-06 02:17:45 +0000 |
---|---|---|
committer | Scott Ullrich <sullrich@pfsense.org> | 2006-10-06 02:17:45 +0000 |
commit | e201c859ecb7cb6f25fbc24ce8ee093f21720a4a (patch) | |
tree | 40f05a3a9d2acadae400eb16290d2ce6e6eb23f3 /packages/test_package | |
parent | df55489b0d944da0cf012273651a7a42d49c941d (diff) | |
download | pfsense-packages-e201c859ecb7cb6f25fbc24ce8ee093f21720a4a.tar.gz pfsense-packages-e201c859ecb7cb6f25fbc24ce8ee093f21720a4a.tar.bz2 pfsense-packages-e201c859ecb7cb6f25fbc24ce8ee093f21720a4a.zip |
Add test package xml
Diffstat (limited to 'packages/test_package')
-rw-r--r-- | packages/test_package/test_package.xml | 168 |
1 files changed, 168 insertions, 0 deletions
diff --git a/packages/test_package/test_package.xml b/packages/test_package/test_package.xml new file mode 100644 index 00000000..8562e2fc --- /dev/null +++ b/packages/test_package/test_package.xml @@ -0,0 +1,168 @@ +<?xml version="1.0" encoding="utf-8" ?> +<packagegui> + <title>Services: Snort</title> + <name>Snort</name> + <version>2.6.0.2</version> + <menu> + <name>Snort</name> + <tooltiptext>Setup snort specific settings</tooltiptext> + <section>Services</section> + <url>/pkg_edit.php?xml=snort.xml&id=0</url> + </menu> + <additional_files_needed> + <prefix>/usr/local/pkg/</prefix> + <chmod>077</chmod> + <item>http://www.pfsense.com/packages/config/snort/snort.inc</item> + </additional_files_needed> + <additional_files_needed> + <prefix>/usr/local/bin/</prefix> + <chmod>077</chmod> + <item>http://www.pfsense.com/packages/config/snort/bin/snort2c</item> + </additional_files_needed> + <additional_files_needed> + <prefix>/usr/local/www/</prefix> + <chmod>077</chmod> + <item>http://www.pfsense.com/packages/config/snort/snort_download_rules.php</item> + </additional_files_needed> + <additional_files_needed> + <prefix>/usr/local/www/</prefix> + <chmod>077</chmod> + <item>http://www.pfsense.com/packages/config/snort/snort_rulesets.php</item> + </additional_files_needed> + <additional_files_needed> + <prefix>/usr/local/pkg/</prefix> + <chmod>077</chmod> + <item>http://www.pfsense.com/packages/config/snort/snort_whitelist.xml</item> + </additional_files_needed> + <additional_files_needed> + <prefix>/usr/local/www/</prefix> + <chmod>077</chmod> + <item>http://www.pfsense.com/packages/config/snort/snort_blocked.php</item> + </additional_files_needed> + <additional_files_needed> + <prefix>/usr/local/pkg/</prefix> + <chmod>077</chmod> + <item>http://www.pfsense.com/packages/config/snort/snort_check_for_rule_updates.php</item> + </additional_files_needed> + <additional_files_needed> + <prefix>/usr/local/www/</prefix> + <chmod>077</chmod> + <item>http://www.pfsense.com/packages/config/snort/snort_alerts.php</item> + </additional_files_needed> + <additional_files_needed> + <prefix>/usr/local/pkg/pf/</prefix> + <chmod>077</chmod> + <item>http://www.pfsense.com/packages/config/snort/snort_dynamic_ip_reload.php</item> + </additional_files_needed> + <service> + <name>snort</name> + <rcfile>snort.sh</rcfile> + <executable>snort</executable> + </service> + <include_file>/usr/local/pkg/snort.inc</include_file> + <tabs> + <tab> + <text>Snort Settings</text> + <url>/pkg_edit.php?xml=snort.xml&id=0</url> + <active/> + </tab> + <tab> + <text>Update Snort Rules</text> + <url>/snort_download_rules.php</url> + </tab> + <tab> + <text>Snort Rulesets</text> + <url>/snort_rulesets.php</url> + </tab> + <tab> + <text>Snort Blocked</text> + <url>/snort_blocked.php</url> + </tab> + <tab> + <text>Snort Whitelist</text> + <url>/pkg.php?xml=snort_whitelist.xml</url> + </tab> + <tab> + <text>Snort Alerts</text> + <url>/snort_alerts.php</url> + </tab> + </tabs> + <fields> + <field> + <fielddescr>Interface</fielddescr> + <fieldname>iface_array</fieldname> + <description>Select all WAN type interfaces</description> + <value>lan</value> + <multiple>true</multiple> + <size>3</size> + <type>interfaces_selection</type> + </field> + <field> + <fielddescr>Performance</fielddescr> + <fieldname>performance</fieldname> + <description>ac method is the fastest startup but consumes more a lot more memory. acs/ac-banded and ac-sparsebands/mwm/lowmem methods use quite a bit less.</description> + <type>select</type> + <options> + <option> + <value>lowmem</value> + <name>lowmem</name> + </option> + <option> + <value>ac-std</value> + <name>ac-std</name> + </option> + <option> + <value>ac</value> + <name>ac</name> + </option> + <option> + <value>ac-banded</value> + <name>ac-banded</name> + </option> + <option> + <value>ac-sparsebands</value> + <name>ac-sparsebands</name> + </option> + + <option> + <value>mwm</value> + <name>mwm</name> + </option> + <option> + <value>acs</value> + <name>acs</name> + </option> + </options> + </field> + <field> + <fielddescr>Oinkmaster code</fielddescr> + <fieldname>oinkmastercode</fieldname> + <description>Obtain a snort.org Oinkmaster code and paste here.</description> + <value></value> + <type>input</type> + <size>60</size> + </field> + <field> + <fielddescr>Block offenders</fielddescr> + <fieldname>blockoffenders</fieldname> + <description>Automatically block hosts that generate a snort alert.</description> + <type>checkbox</type> + <size>60</size> + </field> + <field> + <fielddescr>Update rules automatically</fielddescr> + <fieldname>automaticrulesupdate</fieldname> + <description>Automatically check for and update rules once a week from snort.org.</description> + <type>checkbox</type> + </field> + </fields> + <custom_php_install_command> + sync_package_snort_reinstall(); + </custom_php_install_command> + <custom_add_php_command> + sync_package_snort(); + </custom_add_php_command> + <custom_php_resync_command> + sync_package_snort(); + </custom_php_resync_command> +</packagegui>
\ No newline at end of file |