ports/143641: [patch] security/metasploit port upgrade to 3.3.3

Niels Heinen niels at heinen.ws
Sun Feb 7 12:10:01 UTC 2010


>Number:         143641
>Category:       ports
>Synopsis:       [patch] security/metasploit port upgrade to 3.3.3
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          update
>Submitter-Id:   current-users
>Arrival-Date:   Sun Feb 07 12:10:00 UTC 2010
>Closed-Date:
>Last-Modified:
>Originator:     Niels Heinen
>Release:        8.0-RELEASE
>Organization:
>Environment:
FreeBSD devbsd.lan 8.0-RELEASE FreeBSD 8.0-RELEASE #0: Sat Nov 21 15:48:17 UTC 2009     root at almeida.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC  i386

>Description:

Hi all,

Attached is an update of the Metasploit port (version 3.2 -> 3.3.3)

Portlint seems to be OK with the changes and the updated port works fine on my machine.  Can you please double check the port dependency changes ?

Thanks!
Niels


>How-To-Repeat:
Apply the patch
>Fix:
Apply the patch

Patch attached with submission follows:

diff -ur metasploit.orig/Makefile metasploit/Makefile
--- metasploit.orig/Makefile	2010-02-07 11:11:02.000000000 +0100
+++ metasploit/Makefile	2010-02-07 12:42:31.000000000 +0100
@@ -6,9 +6,9 @@
 #
 
 PORTNAME=	metasploit
-DISTVERSION=	3.2
+DISTVERSION=	3.3.3
 CATEGORIES=	security
-MASTER_SITES=	http://spool.metasploit.com/releases/
+MASTER_SITES=	http://www.metasploit.com/releases/
 DISTNAME=	framework-${DISTVERSION}
 
 MAINTAINER=	onatan at gmail.com
@@ -17,20 +17,16 @@
 SCRIPTS=	msfcli msfconsole msfd msfselfscan msfencode msfmachscan \
 		msfopcode msfpayload msfpescan msfweb
 
+WRKSRC=		${WRKDIR}/msf3
 NO_BUILD=	yes
 USE_RUBY=	yes
+USE_BZIP2=	yes
 
 .include <bsd.port.pre.mk>
 
-.if ${RUBY_VER} == 1.9
+RUN_DEPENDS+=	${LOCALBASE}/bin/infocmp:${PORTSDIR}/devel/ncurses
 RUN_DEPENDS+=	${LOCALBASE}/bin/gem:${PORTSDIR}/devel/ruby-gems
-.endif
-
-.if defined(WITH_MSFGUI)
-RUN_DEPENDS+=	${RUBY_SITEARCHLIBDIR}/gtk2.so:${PORTSDIR}/x11-toolkits/ruby-gtk2
-RUN_DEPENDS+=	${RUBY_SITEARCHLIBDIR}/libglade2.so:${PORTSDIR}/devel/ruby-libglade2
-SCRIPTS+=	msfgui
-.endif
+RUN_DEPENDS+=	${RUBY_SITEARCHLIBDIR}/iconv.so:${PORTSDIR}/converters/ruby-iconv
 
 do-install:
 	${MKDIR} ${DATADIR}
diff -ur metasploit.orig/distinfo metasploit/distinfo
--- metasploit.orig/distinfo	2010-02-07 11:11:02.000000000 +0100
+++ metasploit/distinfo	2010-02-07 11:28:29.000000000 +0100
@@ -1,3 +1,3 @@
-MD5 (framework-3.2.tar.gz) = d543bda031b36a247912aa9c6a0f74d9
-SHA256 (framework-3.2.tar.gz) = fc9366a2ab01924e91575352889970e57a551e087c78b5d1dd4287aaf2136a04
-SIZE (framework-3.2.tar.gz) = 13099756
+MD5 (framework-3.3.3.tar.bz2) = aee22d8cfa2c081051434ad893cd3533
+SHA256 (framework-3.3.3.tar.bz2) = a650778f7946a7f113acd716023978fd94f01325e9a4cf6342fb00ba3f6a2c0b
+SIZE (framework-3.3.3.tar.bz2) = 23438382
diff -ur metasploit.orig/pkg-descr metasploit/pkg-descr
--- metasploit.orig/pkg-descr	2010-02-07 11:11:02.000000000 +0100
+++ metasploit/pkg-descr	2010-02-07 12:31:20.000000000 +0100
@@ -1,14 +1,10 @@
 The Metasploit Project
 
-This is the Metasploit Project. The goal is to provide useful
-information to people who perform penetration testing, IDS signature
-development, and exploit research. This site was created to fill the
-gaps in the information publicly available on various exploitation
-techniques and to create a useful resource for exploit developers. The
-tools and information on this site are provided for legal penetration
-testing and research purposes only.
-
-This port is an in-development version of the upcoming Metasploit Framework.
-It is based on Ruby instead of perl, and has a different license.
+Metasploit provides useful information and tools for penetration
+testers, security researchers, and IDS signature developers. This
+project was created to provide information on exploit techniques
+and to create a functional knowledgebase for exploit developers and
+security professionals. The Metasploit Framework is provided for
+legal security research and testing purposes only.
 
 WWW: http://www.metasploit.org


>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list