aboutsummaryrefslogtreecommitdiffstats
path: root/packages
diff options
context:
space:
mode:
authorScott Ullrich <sullrich@pfsense.org>2006-10-06 02:17:45 +0000
committerScott Ullrich <sullrich@pfsense.org>2006-10-06 02:17:45 +0000
commite201c859ecb7cb6f25fbc24ce8ee093f21720a4a (patch)
tree40f05a3a9d2acadae400eb16290d2ce6e6eb23f3 /packages
parentdf55489b0d944da0cf012273651a7a42d49c941d (diff)
downloadpfsense-packages-e201c859ecb7cb6f25fbc24ce8ee093f21720a4a.tar.gz
pfsense-packages-e201c859ecb7cb6f25fbc24ce8ee093f21720a4a.tar.bz2
pfsense-packages-e201c859ecb7cb6f25fbc24ce8ee093f21720a4a.zip
Add test package xml
Diffstat (limited to 'packages')
-rw-r--r--packages/test_package/test_package.xml168
1 files changed, 168 insertions, 0 deletions
diff --git a/packages/test_package/test_package.xml b/packages/test_package/test_package.xml
new file mode 100644
index 00000000..8562e2fc
--- /dev/null
+++ b/packages/test_package/test_package.xml
@@ -0,0 +1,168 @@
+<?xml version="1.0" encoding="utf-8" ?>
+<packagegui>
+ <title>Services: Snort</title>
+ <name>Snort</name>
+ <version>2.6.0.2</version>
+ <menu>
+ <name>Snort</name>
+ <tooltiptext>Setup snort specific settings</tooltiptext>
+ <section>Services</section>
+ <url>/pkg_edit.php?xml=snort.xml&amp;id=0</url>
+ </menu>
+ <additional_files_needed>
+ <prefix>/usr/local/pkg/</prefix>
+ <chmod>077</chmod>
+ <item>http://www.pfsense.com/packages/config/snort/snort.inc</item>
+ </additional_files_needed>
+ <additional_files_needed>
+ <prefix>/usr/local/bin/</prefix>
+ <chmod>077</chmod>
+ <item>http://www.pfsense.com/packages/config/snort/bin/snort2c</item>
+ </additional_files_needed>
+ <additional_files_needed>
+ <prefix>/usr/local/www/</prefix>
+ <chmod>077</chmod>
+ <item>http://www.pfsense.com/packages/config/snort/snort_download_rules.php</item>
+ </additional_files_needed>
+ <additional_files_needed>
+ <prefix>/usr/local/www/</prefix>
+ <chmod>077</chmod>
+ <item>http://www.pfsense.com/packages/config/snort/snort_rulesets.php</item>
+ </additional_files_needed>
+ <additional_files_needed>
+ <prefix>/usr/local/pkg/</prefix>
+ <chmod>077</chmod>
+ <item>http://www.pfsense.com/packages/config/snort/snort_whitelist.xml</item>
+ </additional_files_needed>
+ <additional_files_needed>
+ <prefix>/usr/local/www/</prefix>
+ <chmod>077</chmod>
+ <item>http://www.pfsense.com/packages/config/snort/snort_blocked.php</item>
+ </additional_files_needed>
+ <additional_files_needed>
+ <prefix>/usr/local/pkg/</prefix>
+ <chmod>077</chmod>
+ <item>http://www.pfsense.com/packages/config/snort/snort_check_for_rule_updates.php</item>
+ </additional_files_needed>
+ <additional_files_needed>
+ <prefix>/usr/local/www/</prefix>
+ <chmod>077</chmod>
+ <item>http://www.pfsense.com/packages/config/snort/snort_alerts.php</item>
+ </additional_files_needed>
+ <additional_files_needed>
+ <prefix>/usr/local/pkg/pf/</prefix>
+ <chmod>077</chmod>
+ <item>http://www.pfsense.com/packages/config/snort/snort_dynamic_ip_reload.php</item>
+ </additional_files_needed>
+ <service>
+ <name>snort</name>
+ <rcfile>snort.sh</rcfile>
+ <executable>snort</executable>
+ </service>
+ <include_file>/usr/local/pkg/snort.inc</include_file>
+ <tabs>
+ <tab>
+ <text>Snort Settings</text>
+ <url>/pkg_edit.php?xml=snort.xml&amp;id=0</url>
+ <active/>
+ </tab>
+ <tab>
+ <text>Update Snort Rules</text>
+ <url>/snort_download_rules.php</url>
+ </tab>
+ <tab>
+ <text>Snort Rulesets</text>
+ <url>/snort_rulesets.php</url>
+ </tab>
+ <tab>
+ <text>Snort Blocked</text>
+ <url>/snort_blocked.php</url>
+ </tab>
+ <tab>
+ <text>Snort Whitelist</text>
+ <url>/pkg.php?xml=snort_whitelist.xml</url>
+ </tab>
+ <tab>
+ <text>Snort Alerts</text>
+ <url>/snort_alerts.php</url>
+ </tab>
+ </tabs>
+ <fields>
+ <field>
+ <fielddescr>Interface</fielddescr>
+ <fieldname>iface_array</fieldname>
+ <description>Select all WAN type interfaces</description>
+ <value>lan</value>
+ <multiple>true</multiple>
+ <size>3</size>
+ <type>interfaces_selection</type>
+ </field>
+ <field>
+ <fielddescr>Performance</fielddescr>
+ <fieldname>performance</fieldname>
+ <description>ac method is the fastest startup but consumes more a lot more memory. acs/ac-banded and ac-sparsebands/mwm/lowmem methods use quite a bit less.</description>
+ <type>select</type>
+ <options>
+ <option>
+ <value>lowmem</value>
+ <name>lowmem</name>
+ </option>
+ <option>
+ <value>ac-std</value>
+ <name>ac-std</name>
+ </option>
+ <option>
+ <value>ac</value>
+ <name>ac</name>
+ </option>
+ <option>
+ <value>ac-banded</value>
+ <name>ac-banded</name>
+ </option>
+ <option>
+ <value>ac-sparsebands</value>
+ <name>ac-sparsebands</name>
+ </option>
+
+ <option>
+ <value>mwm</value>
+ <name>mwm</name>
+ </option>
+ <option>
+ <value>acs</value>
+ <name>acs</name>
+ </option>
+ </options>
+ </field>
+ <field>
+ <fielddescr>Oinkmaster code</fielddescr>
+ <fieldname>oinkmastercode</fieldname>
+ <description>Obtain a snort.org Oinkmaster code and paste here.</description>
+ <value></value>
+ <type>input</type>
+ <size>60</size>
+ </field>
+ <field>
+ <fielddescr>Block offenders</fielddescr>
+ <fieldname>blockoffenders</fieldname>
+ <description>Automatically block hosts that generate a snort alert.</description>
+ <type>checkbox</type>
+ <size>60</size>
+ </field>
+ <field>
+ <fielddescr>Update rules automatically</fielddescr>
+ <fieldname>automaticrulesupdate</fieldname>
+ <description>Automatically check for and update rules once a week from snort.org.</description>
+ <type>checkbox</type>
+ </field>
+ </fields>
+ <custom_php_install_command>
+ sync_package_snort_reinstall();
+ </custom_php_install_command>
+ <custom_add_php_command>
+ sync_package_snort();
+ </custom_add_php_command>
+ <custom_php_resync_command>
+ sync_package_snort();
+ </custom_php_resync_command>
+</packagegui> \ No newline at end of file