From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id B295C138334 for ; Sun, 21 Jul 2019 01:20:42 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id B6A33E0806; Sun, 21 Jul 2019 01:20:41 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 8AF99E0806 for ; Sun, 21 Jul 2019 01:20:41 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 2602C34823D for ; Sun, 21 Jul 2019 01:20:40 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 2FDE855B for ; Sun, 21 Jul 2019 01:20:38 +0000 (UTC) From: "Anthony G. Basile" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Anthony G. Basile" Message-ID: <1563672015.f2c7695094408d0d81dc0a99201d160c59e694f2.blueness@gentoo> Subject: [gentoo-commits] proj/musl:master commit in: net-firewall/iptables/, net-firewall/iptables/files/systemd/, ... X-VCS-Repository: proj/musl X-VCS-Files: net-firewall/iptables/Manifest net-firewall/iptables/files/ip6tables-1.4.13.confd net-firewall/iptables/files/iptables-1.4.13-r1.init net-firewall/iptables/files/iptables-1.4.13.confd net-firewall/iptables/files/iptables-1.4.21-musl.patch net-firewall/iptables/files/iptables.init net-firewall/iptables/files/systemd/ip6tables-restore.service net-firewall/iptables/files/systemd/ip6tables-store.service net-firewall/iptables/files/systemd/ip6tables.service net-firewall/iptables/files/systemd/iptables-restore.service net-firewall/iptables/files/systemd/iptables-store.service net-firewall/iptables/files/systemd/iptables.service net-firewall/iptables/iptables-1.4.21-r1.ebuild net-firewall/iptables/metadata.xml X-VCS-Directories: net-firewall/iptables/files/ net-firewall/iptables/ net-firewall/iptables/files/systemd/ X-VCS-Committer: blueness X-VCS-Committer-Name: Anthony G. Basile X-VCS-Revision: f2c7695094408d0d81dc0a99201d160c59e694f2 X-VCS-Branch: master Date: Sun, 21 Jul 2019 01:20:38 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: 139412a2-d0f5-4fc7-a330-1c99afca2f2d X-Archives-Hash: 4405dfdfef346c3645707b13336bde2c commit: f2c7695094408d0d81dc0a99201d160c59e694f2 Author: Anthony G. Basile gentoo org> AuthorDate: Sun Jul 21 01:20:15 2019 +0000 Commit: Anthony G. Basile gentoo org> CommitDate: Sun Jul 21 01:20:15 2019 +0000 URL: https://gitweb.gentoo.org/proj/musl.git/commit/?id=f2c76950 net-firewall/iptables: in tree version works Signed-off-by: Anthony G. Basile gentoo.org> net-firewall/iptables/Manifest | 1 - net-firewall/iptables/files/ip6tables-1.4.13.confd | 19 --- .../iptables/files/iptables-1.4.13-r1.init | 130 --------------------- net-firewall/iptables/files/iptables-1.4.13.confd | 19 --- .../iptables/files/iptables-1.4.21-musl.patch | 76 ------------ net-firewall/iptables/files/iptables.init | 130 --------------------- .../files/systemd/ip6tables-restore.service | 14 --- .../iptables/files/systemd/ip6tables-store.service | 11 -- .../iptables/files/systemd/ip6tables.service | 6 - .../files/systemd/iptables-restore.service | 14 --- .../iptables/files/systemd/iptables-store.service | 11 -- .../iptables/files/systemd/iptables.service | 6 - net-firewall/iptables/iptables-1.4.21-r1.ebuild | 95 --------------- net-firewall/iptables/metadata.xml | 27 ----- 14 files changed, 559 deletions(-) diff --git a/net-firewall/iptables/Manifest b/net-firewall/iptables/Manifest deleted file mode 100644 index e3c1f23..0000000 --- a/net-firewall/iptables/Manifest +++ /dev/null @@ -1 +0,0 @@ -DIST iptables-1.4.21.tar.bz2 547439 SHA256 52004c68021da9a599feed27f65defcfb22128f7da2c0531c0f75de0f479d3e0 SHA512 dd4baccdb080284d8620e6ed59beafc2677813f3e099051764b07f8e394f6d94ca11861b181f3cce7c55c66de64c1e2add13dc1a0b64e24050cd9fb7aea0689b WHIRLPOOL 475541d1b2b7fe4ee8fa3b537274ef082aab8bfd262201ee14cd53577dfac6f591445cc6d64ed93b226a4b71d54ae1b9ab4cbb378b5440861a585f770f0db200 diff --git a/net-firewall/iptables/files/ip6tables-1.4.13.confd b/net-firewall/iptables/files/ip6tables-1.4.13.confd deleted file mode 100644 index 3bb3698..0000000 --- a/net-firewall/iptables/files/ip6tables-1.4.13.confd +++ /dev/null @@ -1,19 +0,0 @@ -# /etc/conf.d/ip6tables - -# Location in which iptables initscript will save set rules on -# service shutdown -IP6TABLES_SAVE="/var/lib/ip6tables/rules-save" - -# Options to pass to iptables-save and iptables-restore -SAVE_RESTORE_OPTIONS="-c" - -# Save state on stopping iptables -SAVE_ON_STOP="yes" - -# If you need to log iptables messages as soon as iptables starts, -# AND your logger does NOT depend on the network, then you may wish -# to uncomment the next line. -# If your logger depends on the network, and you uncomment this line -# you will create an unresolvable circular dependency during startup. -# After commenting or uncommenting this line, you must run 'rc-update -u'. -#rc_use="logger" diff --git a/net-firewall/iptables/files/iptables-1.4.13-r1.init b/net-firewall/iptables/files/iptables-1.4.13-r1.init deleted file mode 100644 index 56d2a70..0000000 --- a/net-firewall/iptables/files/iptables-1.4.13-r1.init +++ /dev/null @@ -1,130 +0,0 @@ -#!/sbin/openrc-run -# Copyright 1999-2013 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -extra_commands="check save panic" -extra_started_commands="reload" - -iptables_name=${SVCNAME} -case ${iptables_name} in -iptables|ip6tables) ;; -*) iptables_name="iptables" ;; -esac - -iptables_bin="/sbin/${iptables_name}" -case ${iptables_name} in - iptables) iptables_proc="/proc/net/ip_tables_names" - iptables_save=${IPTABLES_SAVE};; - ip6tables) iptables_proc="/proc/net/ip6_tables_names" - iptables_save=${IP6TABLES_SAVE};; -esac - -depend() { - need localmount #434774 - before net -} - -set_table_policy() { - local chains table=$1 policy=$2 - case ${table} in - nat) chains="PREROUTING POSTROUTING OUTPUT";; - mangle) chains="PREROUTING INPUT FORWARD OUTPUT POSTROUTING";; - filter) chains="INPUT FORWARD OUTPUT";; - *) chains="";; - esac - local chain - for chain in ${chains} ; do - ${iptables_bin} -t ${table} -P ${chain} ${policy} - done -} - -checkkernel() { - if [ ! -e ${iptables_proc} ] ; then - eerror "Your kernel lacks ${iptables_name} support, please load" - eerror "appropriate modules and try again." - return 1 - fi - return 0 -} -checkconfig() { - if [ ! -f ${iptables_save} ] ; then - eerror "Not starting ${iptables_name}. First create some rules then run:" - eerror "/etc/init.d/${iptables_name} save" - return 1 - fi - return 0 -} - -start() { - checkconfig || return 1 - ebegin "Loading ${iptables_name} state and starting firewall" - ${iptables_bin}-restore ${SAVE_RESTORE_OPTIONS} < "${iptables_save}" - eend $? -} - -stop() { - if [ "${SAVE_ON_STOP}" = "yes" ] ; then - save || return 1 - fi - checkkernel || return 1 - ebegin "Stopping firewall" - local a - for a in $(cat ${iptables_proc}) ; do - set_table_policy $a ACCEPT - - ${iptables_bin} -F -t $a - ${iptables_bin} -X -t $a - done - eend $? -} - -reload() { - checkkernel || return 1 - checkrules || return 1 - ebegin "Flushing firewall" - local a - for a in $(cat ${iptables_proc}) ; do - ${iptables_bin} -F -t $a - ${iptables_bin} -X -t $a - done - eend $? - - start -} - -checkrules() { - ebegin "Checking rules" - ${iptables_bin}-restore --test ${SAVE_RESTORE_OPTIONS} < "${iptables_save}" - eend $? -} - -check() { - # Short name for users of init.d script. - checkrules -} - -save() { - ebegin "Saving ${iptables_name} state" - checkpath -q -d "$(dirname "${iptables_save}")" - checkpath -q -m 0600 -f "${iptables_save}" - ${iptables_bin}-save ${SAVE_RESTORE_OPTIONS} > "${iptables_save}" - eend $? -} - -panic() { - checkkernel || return 1 - if service_started ${iptables_name}; then - rc-service ${iptables_name} stop - fi - - local a - ebegin "Dropping all packets" - for a in $(cat ${iptables_proc}) ; do - ${iptables_bin} -F -t $a - ${iptables_bin} -X -t $a - - set_table_policy $a DROP - done - eend $? -} diff --git a/net-firewall/iptables/files/iptables-1.4.13.confd b/net-firewall/iptables/files/iptables-1.4.13.confd deleted file mode 100644 index 7225374..0000000 --- a/net-firewall/iptables/files/iptables-1.4.13.confd +++ /dev/null @@ -1,19 +0,0 @@ -# /etc/conf.d/iptables - -# Location in which iptables initscript will save set rules on -# service shutdown -IPTABLES_SAVE="/var/lib/iptables/rules-save" - -# Options to pass to iptables-save and iptables-restore -SAVE_RESTORE_OPTIONS="-c" - -# Save state on stopping iptables -SAVE_ON_STOP="yes" - -# If you need to log iptables messages as soon as iptables starts, -# AND your logger does NOT depend on the network, then you may wish -# to uncomment the next line. -# If your logger depends on the network, and you uncomment this line -# you will create an unresolvable circular dependency during startup. -# After commenting or uncommenting this line, you must run 'rc-update -u'. -#rc_use="logger" diff --git a/net-firewall/iptables/files/iptables-1.4.21-musl.patch b/net-firewall/iptables/files/iptables-1.4.21-musl.patch deleted file mode 100644 index f6ad3c7..0000000 --- a/net-firewall/iptables/files/iptables-1.4.21-musl.patch +++ /dev/null @@ -1,76 +0,0 @@ -diff -ru a/iptables-1.4.21/extensions/libip6t_ipv6header.c b/iptables-1.4.21/extensions/libip6t_ipv6header.c ---- a/iptables-1.4.21/extensions/libip6t_ipv6header.c -+++ b/iptables-1.4.21/extensions/libip6t_ipv6header.c -@@ -10,6 +10,9 @@ - #include - #include - #include -+#ifndef IPPROTO_HOPOPTS -+# define IPPROTO_HOPOPTS 0 -+#endif - - enum { - O_HEADER = 0, -diff -ru a/iptables-1.4.21/extensions/libxt_TCPOPTSTRIP.c b/iptables-1.4.21/extensions/libxt_TCPOPTSTRIP.c ---- a/iptables-1.4.21/extensions/libxt_TCPOPTSTRIP.c -+++ b/iptables-1.4.21/extensions/libxt_TCPOPTSTRIP.c -@@ -12,6 +12,21 @@ - #ifndef TCPOPT_MD5SIG - # define TCPOPT_MD5SIG 19 - #endif -+#ifndef TCPOPT_MAXSEG -+# define TCPOPT_MAXSEG 2 -+#endif -+#ifndef TCPOPT_WINDOW -+# define TCPOPT_WINDOW 3 -+#endif -+#ifndef TCPOPT_SACK_PERMITTED -+# define TCPOPT_SACK_PERMITTED 4 -+#endif -+#ifndef TCPOPT_SACK -+# define TCPOPT_SACK 5 -+#endif -+#ifndef TCPOPT_TIMESTAMP -+# define TCPOPT_TIMESTAMP 8 -+#endif - - enum { - O_STRIP_OPTION = 0, -diff -ru a/iptables-1.4.21/include/libiptc/ipt_kernel_headers.h b/iptables-1.4.21/include/libiptc/ipt_kernel_headers.h ---- a/iptables-1.4.21/include/libiptc/ipt_kernel_headers.h -+++ b/iptables-1.4.21/include/libiptc/ipt_kernel_headers.h -@@ -5,7 +5,6 @@ - - #include - --#if defined(__GLIBC__) && __GLIBC__ == 2 - #include - #include - #include -@@ -13,15 +12,4 @@ - #include - #include - #include --#else /* libc5 */ --#include --#include --#include --#include --#include --#include --#include --#include --#include --#endif - #endif -diff -ru a/iptables-1.4.21/include/linux/netfilter_ipv4/ip_tables.h b/iptables-1.4.21/include/linux/netfilter_ipv4/ip_tables.h ---- a/iptables-1.4.21/include/linux/netfilter_ipv4/ip_tables.h -+++ b/iptables-1.4.21/include/linux/netfilter_ipv4/ip_tables.h -@@ -16,6 +16,7 @@ - #define _IPTABLES_H - - #include -+#include - - #include - diff --git a/net-firewall/iptables/files/iptables.init b/net-firewall/iptables/files/iptables.init deleted file mode 100755 index de9f39f..0000000 --- a/net-firewall/iptables/files/iptables.init +++ /dev/null @@ -1,130 +0,0 @@ -#!/sbin/openrc-run -# Copyright 1999-2013 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -extra_commands="check save panic" -extra_started_commands="reload" - -iptables_name=${SVCNAME} -case ${iptables_name} in -iptables|ip6tables) ;; -*) iptables_name="iptables" ;; -esac - -iptables_bin="/sbin/${iptables_name}" -case ${iptables_name} in - iptables) iptables_proc="/proc/net/ip_tables_names" - iptables_save=${IPTABLES_SAVE};; - ip6tables) iptables_proc="/proc/net/ip6_tables_names" - iptables_save=${IP6TABLES_SAVE};; -esac - -depend() { - need localmount #434774 - before net -} - -set_table_policy() { - local chains table=$1 policy=$2 - case ${table} in - nat) chains="PREROUTING POSTROUTING OUTPUT";; - mangle) chains="PREROUTING INPUT FORWARD OUTPUT POSTROUTING";; - filter) chains="INPUT FORWARD OUTPUT";; - *) chains="";; - esac - local chain - for chain in ${chains} ; do - ${iptables_bin} -w -t ${table} -P ${chain} ${policy} - done -} - -checkkernel() { - if [ ! -e ${iptables_proc} ] ; then - eerror "Your kernel lacks ${iptables_name} support, please load" - eerror "appropriate modules and try again." - return 1 - fi - return 0 -} -checkconfig() { - if [ ! -f ${iptables_save} ] ; then - eerror "Not starting ${iptables_name}. First create some rules then run:" - eerror "/etc/init.d/${iptables_name} save" - return 1 - fi - return 0 -} - -start() { - checkconfig || return 1 - ebegin "Loading ${iptables_name} state and starting firewall" - ${iptables_bin}-restore ${SAVE_RESTORE_OPTIONS} < "${iptables_save}" - eend $? -} - -stop() { - if [ "${SAVE_ON_STOP}" = "yes" ] ; then - save || return 1 - fi - checkkernel || return 1 - ebegin "Stopping firewall" - local a - for a in $(cat ${iptables_proc}) ; do - set_table_policy $a ACCEPT - - ${iptables_bin} -w -F -t $a - ${iptables_bin} -w -X -t $a - done - eend $? -} - -reload() { - checkkernel || return 1 - checkrules || return 1 - ebegin "Flushing firewall" - local a - for a in $(cat ${iptables_proc}) ; do - ${iptables_bin} -w -F -t $a - ${iptables_bin} -w -X -t $a - done - eend $? - - start -} - -checkrules() { - ebegin "Checking rules" - ${iptables_bin}-restore --test ${SAVE_RESTORE_OPTIONS} < "${iptables_save}" - eend $? -} - -check() { - # Short name for users of init.d script. - checkrules -} - -save() { - ebegin "Saving ${iptables_name} state" - checkpath -q -d "$(dirname "${iptables_save}")" - checkpath -q -m 0600 -f "${iptables_save}" - ${iptables_bin}-save ${SAVE_RESTORE_OPTIONS} > "${iptables_save}" - eend $? -} - -panic() { - checkkernel || return 1 - if service_started ${iptables_name}; then - rc-service ${iptables_name} stop - fi - - local a - ebegin "Dropping all packets" - for a in $(cat ${iptables_proc}) ; do - ${iptables_bin} -w -F -t $a - ${iptables_bin} -w -X -t $a - - set_table_policy $a DROP - done - eend $? -} diff --git a/net-firewall/iptables/files/systemd/ip6tables-restore.service b/net-firewall/iptables/files/systemd/ip6tables-restore.service deleted file mode 100644 index c149e92..0000000 --- a/net-firewall/iptables/files/systemd/ip6tables-restore.service +++ /dev/null @@ -1,14 +0,0 @@ -[Unit] -Description=Restore ip6tables firewall rules -# if both are queued for some reason, don't store before restoring :) -Before=ip6tables-store.service -# sounds reasonable to have firewall up before any of the services go up -Before=network-pre.target -Wants=network-pre.target - -[Service] -Type=oneshot -ExecStart=/sbin/ip6tables-restore /var/lib/ip6tables/rules-save - -[Install] -WantedBy=basic.target diff --git a/net-firewall/iptables/files/systemd/ip6tables-store.service b/net-firewall/iptables/files/systemd/ip6tables-store.service deleted file mode 100644 index 9975378..0000000 --- a/net-firewall/iptables/files/systemd/ip6tables-store.service +++ /dev/null @@ -1,11 +0,0 @@ -[Unit] -Description=Store ip6tables firewall rules -Before=shutdown.target -DefaultDependencies=No - -[Service] -Type=oneshot -ExecStart=/bin/sh -c "/sbin/ip6tables-save --counters > /var/lib/ip6tables/rules-save" - -[Install] -WantedBy=shutdown.target diff --git a/net-firewall/iptables/files/systemd/ip6tables.service b/net-firewall/iptables/files/systemd/ip6tables.service deleted file mode 100644 index 0a6d7fa..0000000 --- a/net-firewall/iptables/files/systemd/ip6tables.service +++ /dev/null @@ -1,6 +0,0 @@ -[Unit] -Description=Store and restore ip6tables firewall rules - -[Install] -Also=ip6tables-store.service -Also=ip6tables-restore.service diff --git a/net-firewall/iptables/files/systemd/iptables-restore.service b/net-firewall/iptables/files/systemd/iptables-restore.service deleted file mode 100644 index 2474ee3..0000000 --- a/net-firewall/iptables/files/systemd/iptables-restore.service +++ /dev/null @@ -1,14 +0,0 @@ -[Unit] -Description=Restore iptables firewall rules -# if both are queued for some reason, don't store before restoring :) -Before=iptables-store.service -# sounds reasonable to have firewall up before any of the services go up -Before=network-pre.target -Wants=network-pre.target - -[Service] -Type=oneshot -ExecStart=/sbin/iptables-restore /var/lib/iptables/rules-save - -[Install] -WantedBy=basic.target diff --git a/net-firewall/iptables/files/systemd/iptables-store.service b/net-firewall/iptables/files/systemd/iptables-store.service deleted file mode 100644 index aa16e75..0000000 --- a/net-firewall/iptables/files/systemd/iptables-store.service +++ /dev/null @@ -1,11 +0,0 @@ -[Unit] -Description=Store iptables firewall rules -Before=shutdown.target -DefaultDependencies=No - -[Service] -Type=oneshot -ExecStart=/bin/sh -c "/sbin/iptables-save --counters > /var/lib/iptables/rules-save" - -[Install] -WantedBy=shutdown.target diff --git a/net-firewall/iptables/files/systemd/iptables.service b/net-firewall/iptables/files/systemd/iptables.service deleted file mode 100644 index 3643a3e..0000000 --- a/net-firewall/iptables/files/systemd/iptables.service +++ /dev/null @@ -1,6 +0,0 @@ -[Unit] -Description=Store and restore iptables firewall rules - -[Install] -Also=iptables-store.service -Also=iptables-restore.service diff --git a/net-firewall/iptables/iptables-1.4.21-r1.ebuild b/net-firewall/iptables/iptables-1.4.21-r1.ebuild deleted file mode 100644 index 87f0912..0000000 --- a/net-firewall/iptables/iptables-1.4.21-r1.ebuild +++ /dev/null @@ -1,95 +0,0 @@ -# Copyright 1999-2014 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 - -EAPI="5" - -# Force users doing their own patches to install their own tools -AUTOTOOLS_AUTO_DEPEND=no - -inherit eutils multilib systemd toolchain-funcs autotools - -DESCRIPTION="Linux kernel (2.4+) firewall, NAT and packet mangling tools" -HOMEPAGE="http://www.netfilter.org/projects/iptables/" -SRC_URI="http://www.netfilter.org/projects/iptables/files/${P}.tar.bz2" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="amd64 arm arm64 ia64 ~mips ppc sh sparc x86" -IUSE="conntrack ipv6 netlink static-libs" - -RDEPEND=" - conntrack? ( net-libs/libnetfilter_conntrack ) - netlink? ( net-libs/libnfnetlink ) -" -DEPEND="${RDEPEND} - virtual/os-headers - virtual/pkgconfig -" - -src_prepare() { - # use the saner headers from the kernel - rm -f include/linux/{kernel,types}.h - - epatch ${FILESDIR}/${P}-musl.patch - - # Only run autotools if user patched something - epatch_user && eautoreconf || elibtoolize -} - -src_configure() { - # Some libs use $(AR) rather than libtool to build #444282 - tc-export AR - - sed -i \ - -e "/nfnetlink=[01]/s:=[01]:=$(usex netlink 1 0):" \ - -e "/nfconntrack=[01]/s:=[01]:=$(usex conntrack 1 0):" \ - configure || die - - econf \ - --sbindir="${EPREFIX}/sbin" \ - --libexecdir="${EPREFIX}/$(get_libdir)" \ - --enable-devel \ - --enable-shared \ - $(use_enable static-libs static) \ - $(use_enable ipv6) -} - -src_compile() { - emake V=1 -} - -src_install() { - default - dodoc INCOMPATIBILITIES iptables/iptables.xslt - - # all the iptables binaries are in /sbin, so might as well - # put these small files in with them - into / - dosbin iptables/iptables-apply - dosym iptables-apply /sbin/ip6tables-apply - doman iptables/iptables-apply.8 - - insinto /usr/include - doins include/iptables.h $(use ipv6 && echo include/ip6tables.h) - insinto /usr/include/iptables - doins include/iptables/internal.h - - keepdir /var/lib/iptables - newinitd "${FILESDIR}"/${PN}-1.4.13-r1.init iptables - newconfd "${FILESDIR}"/${PN}-1.4.13.confd iptables - if use ipv6 ; then - keepdir /var/lib/ip6tables - newinitd "${FILESDIR}"/iptables-1.4.13-r1.init ip6tables - newconfd "${FILESDIR}"/ip6tables-1.4.13.confd ip6tables - fi - - systemd_dounit "${FILESDIR}"/systemd/iptables{,-{re,}store}.service - if use ipv6 ; then - systemd_dounit "${FILESDIR}"/systemd/ip6tables{,-{re,}store}.service - fi - - # Move important libs to /lib #332175 - gen_usr_ldscript -a ip{4,6}tc iptc xtables - - prune_libtool_files -} diff --git a/net-firewall/iptables/metadata.xml b/net-firewall/iptables/metadata.xml deleted file mode 100644 index 299ae63..0000000 --- a/net-firewall/iptables/metadata.xml +++ /dev/null @@ -1,27 +0,0 @@ - - - - - base-system@gentoo.org - Gentoo Base System - - - Build against net-libs/libnetfilter_conntrack when enables the connlabel matcher - Build against libnfnetlink which enables the nfnl_osf util - - - iptables is the userspace command line program used to set up, maintain, and - inspect the tables of IPv4 packet filter rules in the Linux kernel. It's a - part of packet filtering framework which allows the stateless and stateful - packet filtering, all kinds of network address and port translation, and is a - flexible and extensible infrastructure with multiple layers of API's for 3rd - party extensions. The iptables package also includes ip6tables. ip6tables is - used for configuring the IPv6 packet filter. - - Note that some extensions (e.g. imq and l7filter) are not included into - official kernel sources so you have to patch the sources before installation. - - - cpe:/a:netfilter_core_team:iptables - -