This is pastelyzer: the paste analyzer. The user manual can be found in
doc directory.
The easiest way to run pastelyzer is by using the provided binary.
The following libraries must be installed on the target system:
libssllibzmq(version 3+)
libssl1.1libzmq5
PostgreSQL database (at least version 9.5) is required. Necessary tables
will be created automatically. Database access parameters can be controlled
using environment variables DB_HOST, DB_PORT, DB_NAME, DB_USER and
DB_PASS. See user guide, section “Environment variables.”
pastelyzer works with SBCL and ClozureCL:
We strongly suggest using SBCL (which is also the implementation used in the
examples below). Most Linux distributions already have an sbcl package
available.
To follow the instructions below you’ll need the following software:
- C compiler (
gcc). curl(to download Quicklisp).git(to clonepastelyzer).- Header files for
libsslandlibzmq.
If you’re using Ubuntu, you can install all of the above using the following command:
# apt install build-essential curl git libssl-dev libzmq3-dev sbcl
An abridged version of the official Quicklisp install instructions:
$ curl -O https://beta.quicklisp.org/quicklisp.lisp
$ sha256sum quicklisp.lisp
4a7a5c2aebe0716417047854267397e24a44d0cce096127411e9ce9ccfeb2c17 quicklisp.lisp
$ sbcl --load quicklisp.lisp \
--eval '(quicklisp-quickstart:install)' \
--quit
$ git clone --recurse-submodules https://github.com/cert-lv/pastelyzer.git $ cd pastelyzer
This has to be done only once (whenever the lisp library dependencies
change). In the pastelyzer directory run the bin/build.sh script with
load-deps command:
$ bin/build.sh load-deps
$ bin/build.sh test
Run bin/build.sh script with no parameters in pastelyzer directory:
$ bin/build.sh
pastelyzer is released under the terms of zlib/libpng license. See
LICENSE file.
This work was partially funded by CEF (Connecting Europe Facility) funding under “Improving Cyber Security Capacities in Latvia” (INEA/CEF/ICT/A2017/1528784).

