wok-next view metasploit/receipt @ rev 19377
linux: CVE-2016-5696 (again)
author | Pascal Bellard <pascal.bellard@slitaz.org> |
---|---|
date | Sat Aug 13 10:23:10 2016 +0200 (2016-08-13) |
parents | f233e89802cd |
children | a3c581bf52b8 |
line source
1 # SliTaz package receipt.
3 PACKAGE="metasploit"
4 VERSION="3.6.0"
5 CATEGORY="network"
6 SHORT_DESC="The Metasploit Framework is an advanced open-source platform for developing, testing, and using exploit code"
7 MAINTAINER="slaxemulator@gmail.com"
8 LICENSE="BSD"
9 SOURCE="framework"
10 TARBALL="$SOURCE-$VERSION.tar.bz2"
11 WEB_SITE="http://www.metasploit.com/"
12 WGET_URL="http://updates.metasploit.com/data/releases/$TARBALL"
14 DEPENDS="ruby libpcap"
16 # Rules to gen a SliTaz package suitable for Tazpkg.
17 genpkg_rules()
18 {
19 mkdir -p $fs/usr/share/$PACKAGE $fs/etc/profile.d
20 cp -a $src/* $fs/usr/share/$PACKAGE
21 echo "export PATH=$PATH:/usr/share/$PACKAGE" > $fs/etc/profile.d/$PACKAGE.sh
22 chmod 755 $fs/etc/profile.d/$PACKAGE.sh
23 }