pentoo-overlay/net-analyzer/metasploit/metasploit-9999.ebuild

199 lines
7.1 KiB
Bash

# Copyright 1999-2013 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/net-analyzer/metasploit/metasploit-3.1_p5699-r1.ebuild,v 1.3 2008/11/09 14:52:13 nixnut Exp $
EAPI="5"
inherit eutils git-2
MY_P=${PN/metasploit/framework}-${PV}
EGIT_REPO_URI="https://github.com/rapid7/metasploit-framework.git"
SRC_URI="https://dev.metasploit.com/redmine/attachments/download/906/vbsmem-1.2.1.patch
https://dev.metasploit.com/redmine/attachments/1200/jboss_seam_remote_command_rb"
DESCRIPTION="Advanced open-source framework for developing, testing, and using vulnerability exploit code"
HOMEPAGE="http://www.metasploit.org/"
SLOT="9999"
LICENSE="BSD"
KEYWORDS="~amd64 ~arm ~x86"
IUSE="+armitage +java gui unstable lorcon +pcaprub serialport"
#Note: we no longer use bundled gems.
RDEPEND="dev-lang/ruby[ssl]
>=dev-ruby/activesupport-3.0.0
>=dev-ruby/activerecord-3.2.11
dev-ruby/json
=dev-ruby/metasploit_data_models-0.6.1
dev-ruby/msgpack
dev-ruby/nokogiri
dev-ruby/builder:3
>=dev-ruby/pg-0.11
dev-ruby/robots
dev-ruby/kissfft
app-admin/eselect-metasploit
>=app-crypt/johntheripper-1.7.9-r1[-minimal]
!arm? ( gui? ( virtual/jre )
java? ( dev-ruby/rjb ) )
dev-db/postgresql-server
pcaprub? ( net-libs/libpcap )
armitage? ( net-analyzer/nmap
virtual/jre )
lorcon? ( net-wireless/lorcon[ruby] )"
DEPEND=""
RESTRICT="strip"
QA_PREBUILT="
usr/$(get_libdir)/${PN}${SLOT}/data/templates/template_x86_linux.bin
usr/$(get_libdir)/${PN}${SLOT}/data/templates/template_armle_linux.bin
usr/$(get_libdir)/${PN}${SLOT}/data/templates/template_x86_solaris.bin
usr/$(get_libdir)/${PN}${SLOT}/data/templates/template_x64_linux.bin
usr/$(get_libdir)/${PN}${SLOT}/data/templates/template_x86_bsd.bin
usr/$(get_libdir)/${PN}${SLOT}/data/templates/template_mipsbe_linux.bin
usr/$(get_libdir)/${PN}${SLOT}/data/templates/template_mipsle_linux.bin
usr/$(get_libdir)/${PN}${SLOT}/data/meterpreter/msflinker_linux_x86.bin
usr/$(get_libdir)/${PN}${SLOT}/data/meterpreter/ext_server_sniffer.lso
usr/$(get_libdir)/${PN}${SLOT}/data/meterpreter/ext_server_networkpug.lso
usr/$(get_libdir)/${PN}${SLOT}/data/meterpreter/ext_server_stdapi.lso
usr/$(get_libdir)/${PN}${SLOT}/data/templates/template_x86_linux.bin
usr/$(get_libdir)/${PN}${SLOT}/data/templates/template_armle_linux.bin
usr/$(get_libdir)/${PN}${SLOT}/data/templates/template_x86_solaris.bin
usr/$(get_libdir)/${PN}${SLOT}/data/templates/template_x64_linux.bin
usr/$(get_libdir)/${PN}${SLOT}/data/templates/template_x86_bsd.bin
usr/$(get_libdir)/${PN}${SLOT}/data/meterpreter/msflinker_linux_x86.bin
usr/$(get_libdir)/${PN}${SLOT}/data/meterpreter/ext_server_sniffer.lso
usr/$(get_libdir)/${PN}${SLOT}/data/meterpreter/ext_server_networkpug.lso
usr/$(get_libdir)/${PN}${SLOT}/data/meterpreter/ext_server_stdapi.lso
"
S=${WORKDIR}/${MY_P}
src_prepare() {
#so much cruft is bundled with msf that we will fix it in src_prepare to make intentions more clear
#unbundle johntheripper, at least it now defaults to running the system version
rm -rf "${S}"/data/john/run.*
rm -rf "${S}"/data/john/src.tar.bz2
#remove random "cpuinfo" binaries which a only needed to detect which bundled john to run
rm -rf "${S}"/data/cpuinfo/*
#remove random included sources
rm -rf "${S}"/external/source
#remove unused "external" modules
rm -rf "${S}"/external/ruby-kissfft
rm -rf "${S}"/external/ruby-lorcon
rm -rf "${S}"/external/ruby-lorcon2
#remove unneeded developmentish stuff
rm -rf "${S}"/spec
rm -rf "${S}"/test
#unbundle the ruby gems, we now use system gems
rm -rf "${S}"/lib/gemcache/
rm -rf "${S}"/Gemfile
rm -rf "${S}"/Gemfile.lock
rm -rf "${S}"/Rakefile
#whiles we are commiting fixes for filth, let's bogart msfupdate
rm "${S}"/msfupdate
echo "#!/bin/sh" > "${S}"/msfupdate
echo "echo \"[*]\"" >> "${S}"/msfupdate
echo "echo \"[*] Attempting to update the Metasploit Framework...\"" >> "${S}"/msfupdate
echo "echo \"[*]\"" >> "${S}"/msfupdate
echo "echo \"\"" >> "${S}"/msfupdate
echo "ESVN_REVISION=HEAD emerge --oneshot \"=${CATEGORY}/${PF}\"" >> "${S}"/msfupdate
#this is set executable in src_install
}
src_compile() {
if use pcaprub; then
cd "${S}"/external/pcaprub
ruby extconf.rb
emake
fi
if use serialport; then
cd "${S}"/external/serialport
ruby extconf.rb
emake
fi
}
src_install() {
# should be as simple as copying everything into the target...
dodir /usr/$(get_libdir)/${PN}${SLOT}
cp -R "${S}"/* "${ED}"/usr/$(get_libdir)/${PN}${SLOT} || die "Copy files failed"
rm -Rf "${ED}"/usr/$(get_libdir)/${PN}${SLOT}/documentation "${ED}"/usr/$(get_libdir)/${PN}${SLOT}/README.md
fowners -R root:0 /
# do not remove LICENSE, bug #238137
dodir /usr/share/doc/${PF}
cp -R "${S}"/{documentation,README.md} "${ED}"/usr/share/doc/${PF} || die
dosym /usr/share/doc/${PF}/documentation /usr/$(get_libdir)/${PN}${SLOT}/documentation
newinitd "${FILESDIR}"/msfrpcd.initd msfrpcd${SLOT}
newconfd "${FILESDIR}"/msfrpcd.confd msfrpcd${SLOT}
if use armitage; then
insinto /usr/$(get_libdir)/${PN}${SLOT}/
doins "${FILESDIR}"/armitage.yml
fi
#Add new modules from metasploit bug report system not in the main tree yet
if use unstable; then
#smart hasdump from http://www.darkoperator.com/blog/2011/5/19/metasploit-post-module-smart_hashdump.html
#https://github.com/darkoperator/Meterpreter-Scripts
cp "${FILESDIR}"/smart_hasdump_script_6ac6c1d.rb "${ED}"/usr/$(get_libdir)/${PN}${SLOT}/scripts/meterpreter/smart_hasdump.rb || die "Copy files failed"
cp "${FILESDIR}"/hashdump2_script_6ac6c1d.rb "${ED}"/usr/$(get_libdir)/${PN}${SLOT}/scripts/meterpreter/hashdump2.rb || die "Copy files failed"
#JBoss remote command execution exploit
#https://dev.metasploit.com/redmine/issues/4585
cp "${DISTDIR}"/jboss_seam_remote_command_rb "${ED}"/usr/$(get_libdir)/${PN}${SLOT}/modules/exploits/multi/http/jboss_seam_remote_command.rb || die "Copy files failed"
fi
#fi unstable
if use pcaprub; then
cd "${S}"/external/pcaprub
emake DESTDIR="${ED}" install
fi
if use serialport; then
cd "${S}"/external/serialport
emake DESTDIR="${ED}" install
fi
#force to use the outdated bundled version of metasm
doenvd "${FILESDIR}"/91metasploit-${SLOT}
fperms +x /usr/$(get_libdir)/${PN}${SLOT}/msfupdate
if use gui; then
make_desktop_entry msfgui${SLOT} "Metasploit Framework" metasploit 'GNOME;System;Network;'
doicon "${FILESDIR}"/metasploit.icon
else
rm "${ED}"/usr/$(get_libdir)/${PN}${SLOT}/msfgui
fi
}
pkg_postinst() {
elog "You need to prepare the database by running:"
elog "emerge --config postgresql-server"
elog "/etc/init.d/postgresql-<version> start"
elog "emerge --config =metasploit-${PV}"
"${EROOT}"/usr/bin/eselect metasploit set --use-old ${PN}${SLOT}
elog
elog "To switch between installed slots, execute as root:"
elog " # eselect metasploit set [slot number]"
elog
elog "Adjust /usr/lib/${PN}/armitage.yml and /etc/conf.d/msfrpcd${PV} files if necessary"
elog "You might need to run env-update and relogin"
}
pkg_config() {
einfo "If the following fails, it is likely because you forgot to start/config postgresql first"
su postgres -c "createuser msf_user -D -S -R"
su postgres -c "createdb --owner=msf_user msf_database"
}