This is pastelyzer
: the paste analyzer. The user manual can be found in
doc directory.
The easiest way to run pastelyzer
is by using the provided binary.
The following libraries must be installed on the target system:
libssl
libzmq
(version 3+)
libssl1.1
libzmq5
PostgreSQL database (at least version 9.5) is required. Necessary tables
will be created automatically. Database access parameters can be controlled
using environment variables DB_HOST
, DB_PORT
, DB_NAME
, DB_USER
and
DB_PASS
. See user guide, section “Environment variables.”
pastelyzer
works with SBCL and ClozureCL:
We strongly suggest using SBCL (which is also the implementation used in the
examples below). Most Linux distributions already have an sbcl
package
available.
To follow the instructions below you’ll need the following software:
- C compiler (
gcc
). curl
(to download Quicklisp).git
(to clonepastelyzer
).- Header files for
libssl
andlibzmq
.
If you’re using Ubuntu, you can install all of the above using the following command:
# apt install build-essential curl git libssl-dev libzmq3-dev sbcl
An abridged version of the official Quicklisp install instructions:
$ curl -O https://beta.quicklisp.org/quicklisp.lisp $ sha256sum quicklisp.lisp 4a7a5c2aebe0716417047854267397e24a44d0cce096127411e9ce9ccfeb2c17 quicklisp.lisp $ sbcl --load quicklisp.lisp \ --eval '(quicklisp-quickstart:install)' \ --quit
$ git clone --recurse-submodules https://github.com/cert-lv/pastelyzer.git $ cd pastelyzer
This has to be done only once (whenever the lisp library dependencies
change). In the pastelyzer
directory run the bin/build.sh
script with
load-deps
command:
$ bin/build.sh load-deps
$ bin/build.sh test
Run bin/build.sh
script with no parameters in pastelyzer
directory:
$ bin/build.sh
pastelyzer
is released under the terms of zlib/libpng license. See
LICENSE file.
This work was partially funded by CEF (Connecting Europe Facility) funding under “Improving Cyber Security Capacities in Latvia” (INEA/CEF/ICT/A2017/1528784).