# ChangeLog for net-analyzer/metasploit
# Copyright 1999-2006 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/net-analyzer/metasploit/ChangeLog,v 1.13 2006/06/14 11:13:54 pva Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-analyzer/metasploit/ChangeLog,v 1.14 2006/11/02 14:04:35 pva Exp $
+
+*metasploit-2.7 (02 Nov 2006)
+
+ 02 Nov 2006; Peter Volkov <pva@gentoo.org> metadata.xml,
+ -metasploit-2.3-r2.ebuild, -metasploit-2.4-r1.ebuild,
+ -metasploit-2.5.ebuild, +metasploit-2.7.ebuild:
+ Version bump. Thank Matt Drew (aetius) matt.drew at gmail.com for report.
+ Removed old versions. Cleaned metadata.xml a bit.
*metasploit-2.6 (14 Jun 2006)
--- /dev/null
+MD5 ea592cfb006e1b2510b533cece4ecb18 framework-2.7.tar.gz 5800216
+RMD160 cfdf2705522c845bb4405413207a7df0f3873b94 framework-2.7.tar.gz 5800216
+SHA256 516952772aaa8982628460b927c9119850925f870903c5a131a9c9f0390cf77f framework-2.7.tar.gz 5800216
<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
<pkgmetadata>
<herd>netmon</herd>
- <maintainer>
- <email>netmon@gentoo.org</email>
- <name>Netmon Herd</name>
- </maintainer>
- <longdescription>
-This project is a powerful tool for penetration testing, exploit development, and vulnerability research.
-The Framework is written in the Perl scripting language and includes various components written in C, assembler, and Python.
-This project can be roughly compared to commercial offerings such as Immunity's CANVAS and Core Security Technology's Impact.
-The major difference between the Framework and these commercial products is the focus; while the commercial products need to
-always provide the latest exploits and an intuitive GUI, the Framework was designed to facilitate research and experimentation with new technologies.
- </longdescription>
+ <longdescription lang="en">
+ This project is a powerful tool for penetration testing, exploit
+ development, and vulnerability research. The Framework is written in
+ the Perl scripting language and includes various components written in
+ C, assembler, and Python. This project can be roughly compared to
+ commercial offerings such as Immunity's CANVAS and Core Security
+ Technology's Impact. The major difference between the Framework and
+ these commercial products is the focus; while the commercial products
+ need to always provide the latest exploits and an intuitive GUI, the
+ Framework was designed to facilitate research and experimentation with
+ new technologies.
+</longdescription>
</pkgmetadata>
--- /dev/null
+# Copyright 1999-2006 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/net-analyzer/metasploit/metasploit-2.7.ebuild,v 1.1 2006/11/02 14:04:35 pva Exp $
+
+MY_P="${P/metasploit/framework}"
+S="${WORKDIR}/${MY_P}"
+DESCRIPTION="The Metasploit Framework is an advanced open-source platform for developing, testing, and using vulnerability exploit code."
+HOMEPAGE="http://www.metasploit.org/"
+SRC_URI="http://metasploit.com/tools/${MY_P}.tar.gz"
+
+LICENSE="GPL-2 Artistic"
+SLOT="0"
+KEYWORDS="~amd64 ~ppc ~x86"
+IUSE=""
+
+RDEPEND="dev-lang/perl
+ dev-perl/Net-SSLeay
+ dev-perl/Term-ReadLine-Perl
+ dev-perl/TermReadKey"
+
+src_install() {
+ dodir /usr/lib/
+ dodir /usr/bin/
+
+ # should be as simple as copying everything into the target...
+ cp -pPR ${S} ${D}usr/lib/metasploit || die
+
+ # and creating symlinks in the /usr/bin dir
+ cd ${D}/usr/bin
+ ln -s ../lib/metasploit/msf* ./ || die
+ chown -R root:0 ${D}
+
+ newinitd ${FILESDIR}/msfweb.initd msfweb || die "newinitd failed"
+ newconfd ${FILESDIR}/msfweb.confd msfweb || die "newconfd failed"
+}
+
+pkg_postinst() {
+ elog "To update metasploit modules run:"
+ elog " # cd /usr/lib/metasploit && svn update"
+}
+
+pkg_postrm() {
+ if [[ -d /usr/lib/metasploit ]] ; then
+ ewarn "If you ever updated modules emerge will keep /var/lib/metasploit"
+ ewarn "directory. Thus to remove metasploit completely do not forgive to:"
+ ewarn " # rm -r /var/lib/metasploit"
+ fi
+}