Files
packages/net/snort3/files/snort.init
John Audia 69117bf2d5 snort3: run as regular user rather than as root
Running as a dedicated user is better from both a security and an
isolation perspective than running as root.

Signed-off-by: John Audia <therealgraysky@proton.me>
2025-10-17 22:31:54 +03:00

71 lines
1.6 KiB
Bash

#!/bin/sh /etc/rc.common
# shellcheck disable=SC2039 # "local" not defined in POSIX sh
START=99
STOP=10
USE_PROCD=1
PROG=/usr/bin/snort
MGR=/usr/bin/snort-mgr
validate_snort_section() {
$MGR -q check || return 1
uci_validate_section snort snort "${1}" \
'enabled:bool:0' \
'manual:bool:1' \
'config_dir:string' \
'interface:string'
}
start_service() {
# If you wish to use application-managed PID file:
# output.logdir, in the snort lua config, determines the PID file location.
# Add '--create-pidfile' to the 'command', below.
local enabled
local manual
local config_dir
local interface
validate_snort_section snort || {
echo "Validation failed, try 'snort-mgr check'."
return 1
}
[ "$enabled" = 0 ] && return
procd_open_instance
if [ "$manual" = 0 ]; then
local config_file=$($MGR setup)
procd_set_param command "$PROG" -q -c "${config_file}"
else
procd_set_param command $PROG -q -i "$interface" -c "${config_dir%/}/snort.lua" --tweaks local
procd_set_param env SNORT_LUA_PATH="$config_dir"
procd_set_param file $CONFIGFILE
fi
[ -x /sbin/ujail -a -e /etc/capabilities/snort.json ] && {
chown -R snort:snort "$config_dir"
procd_add_jail snort
procd_set_param capabilities /etc/capabilities/snort.json
procd_set_param user snort
procd_set_param group snort
procd_set_param no_new_privs 1
}
procd_set_param respawn
procd_set_param stdout 0
procd_set_param stderr 1
procd_close_instance
}
stop_service()
{
service_stop "$PROG"
$MGR teardown
}
service_triggers()
{
procd_add_reload_trigger "snort"
procd_add_validation validate_snort_section
}