public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
From: "Sam James" <sam@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Subject: [gentoo-commits] repo/gentoo:master commit in: net-firewall/nftables/
Date: Sun, 17 Apr 2022 17:12:24 +0000 (UTC)	[thread overview]
Message-ID: <1650215536.17ebcc21dca47779c398ca44b6a2e36c2963e533.sam@gentoo> (raw)

commit:     17ebcc21dca47779c398ca44b6a2e36c2963e533
Author:     Sam James <sam <AT> gentoo <DOT> org>
AuthorDate: Sun Apr 17 17:11:46 2022 +0000
Commit:     Sam James <sam <AT> gentoo <DOT> org>
CommitDate: Sun Apr 17 17:12:16 2022 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=17ebcc21

net-firewall/nftables: drop 0.9.8-r2, 0.9.9-r1, 1.0.0-r1

Signed-off-by: Sam James <sam <AT> gentoo.org>

 net-firewall/nftables/Manifest                 |   3 -
 net-firewall/nftables/nftables-0.9.8-r2.ebuild | 166 -----------------------
 net-firewall/nftables/nftables-0.9.9-r1.ebuild | 179 -------------------------
 net-firewall/nftables/nftables-1.0.0-r1.ebuild | 179 -------------------------
 4 files changed, 527 deletions(-)

diff --git a/net-firewall/nftables/Manifest b/net-firewall/nftables/Manifest
index 1ca881039072..a4a06b4bf72b 100644
--- a/net-firewall/nftables/Manifest
+++ b/net-firewall/nftables/Manifest
@@ -1,6 +1,3 @@
-DIST nftables-0.9.8.tar.bz2 879516 BLAKE2B 5063090d648668f4d5ae6d4be48ebecc65dfd4b525768e94a0d90ceebbee73874c916727be8de633550db71c612d698d88cf93575931362b48d954e6ac275143 SHA512 1c5709825c8b2c13cbed0310658959ecee164c930bc9e2447618a0894598138b9a549d20509c32a5c23ce99e40438df38f9e170cf656ce993d819f365490a180
-DIST nftables-0.9.9.tar.bz2 922624 BLAKE2B 8de2709576a26ca84a8d694f7cb06cad2bb2fb4671ba21ffc32c0d5997e8124ae7cd794dafddf4db48d8a49c280b48b07d2a31b6c18f6647fdb67cfe7f065b61 SHA512 dfdd3ffc0ffc1742ca0494a3f8fac1c7b2fe942849e60d33fc3cb8a51e27bd39e1ccfeda2195191377a32bb5363ea244f4c3e71b4a6d930f33bf87e17a534fab
-DIST nftables-1.0.0.tar.bz2 921053 BLAKE2B ee86a323170433c3ba62f80118947864aac0fe0aaeb48afeb5a116a48782185c83313ef1b5735c7749eb5eccb88f252b444d1ee908be25bdaa4d9c0b833c1dc2 SHA512 33460bef4ee76b7caa44fa5515357127ae84be468448cc838dd31919b6e045ba6195b761118d4c8a4219a9f008c4416542ce784f4daad94f3b44c0626bcdd014
 DIST nftables-1.0.1.tar.bz2 954586 BLAKE2B e406699c96b98495f1b6deeab0233873ce20b43c13c162eafea1e6b371961123a69f3d5e7bd2f1bedfdbe58fed56ba3e2dae962b88657af6f4ab5b3743fb6373 SHA512 a0db4d82725509d2a9c638ba7ba55547ad7b5138a5fe686b0e90260d6a65e060dd72a470969c1d69e945303bd2bfc33b2021d9f4141b88befefddc61b7afe10d
 DIST nftables-1.0.1.tar.bz2.sig 566 BLAKE2B d504987b16b7a8676586ecb3a1ce9588bff972ca54bbb3ce3b0db5288f1fd981e529dccea009bd01a3a96e5199a034956bd43cdeaba67847239a88d458f43f8a SHA512 0884098ceabe7b070e146e47292afd8c80188ea595eaeaadb228307f502dae4a43bf801dea2a25519eaef3c96d567daf40e45c37fabb58db1b2256eb8f256cb0
 DIST nftables-1.0.2.tar.bz2 970781 BLAKE2B 650ae6badb574ff3628d21c8aa99f81e73932dd172b3569618696100bf3853b9a108bf0296dcf9d615ae7c0fbec84b48266299b62cf755d181d19c626f8a3cd4 SHA512 560d23c6e369eafd7b354d29fe73d46154e4a74dec000178c1aea47751fe535d20c4e6bbecd3955eb2b327c7a60b1269e5c6dc5781498546b639fa2d1367a9ca

diff --git a/net-firewall/nftables/nftables-0.9.8-r2.ebuild b/net-firewall/nftables/nftables-0.9.8-r2.ebuild
deleted file mode 100644
index 58bf1cc65087..000000000000
--- a/net-firewall/nftables/nftables-0.9.8-r2.ebuild
+++ /dev/null
@@ -1,166 +0,0 @@
-# Copyright 1999-2022 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=7
-
-PYTHON_COMPAT=( python3_{7,8,9} )
-
-inherit autotools linux-info python-r1 systemd
-
-DESCRIPTION="Linux kernel (3.13+) firewall, NAT and packet mangling tools"
-HOMEPAGE="https://netfilter.org/projects/nftables/"
-SRC_URI="https://netfilter.org/projects/nftables/files/${P}.tar.bz2"
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="amd64 arm arm64 ~ia64 ppc ppc64 sparc x86"
-IUSE="debug doc +gmp json +modern-kernel python +readline static-libs xtables"
-
-RDEPEND="
-	>=net-libs/libmnl-1.0.4:0=
-	>=net-libs/libnftnl-1.1.9:0=
-	gmp? ( dev-libs/gmp:= )
-	json? ( dev-libs/jansson:= )
-	python? ( ${PYTHON_DEPS} )
-	readline? ( sys-libs/readline:= )
-	xtables? ( >=net-firewall/iptables-1.6.1:= )
-"
-
-DEPEND="${RDEPEND}"
-
-BDEPEND="
-	doc? (
-		app-text/asciidoc
-		>=app-text/docbook2X-0.8.8-r4
-	)
-	virtual/pkgconfig
-"
-
-REQUIRED_USE="
-	python? ( ${PYTHON_REQUIRED_USE} )
-"
-
-PATCHES=(
-	"${FILESDIR}/${PN}-0.9.8-slibtool.patch"
-)
-
-python_make() {
-	emake \
-		-C py \
-		abs_builddir="${S}" \
-		DESTDIR="${D}" \
-		PYTHON_BIN="${PYTHON}" \
-		"${@}"
-}
-
-pkg_setup() {
-	if kernel_is ge 3 13; then
-		if use modern-kernel && kernel_is lt 3 18; then
-			eerror "The modern-kernel USE flag requires kernel version 3.18 or newer to work properly."
-		fi
-		CONFIG_CHECK="~NF_TABLES"
-		linux-info_pkg_setup
-	else
-		eerror "This package requires kernel version 3.13 or newer to work properly."
-	fi
-}
-
-src_prepare() {
-	default
-
-	# fix installation path for doc stuff
-	sed '/^pkgsysconfdir/s@${sysconfdir}.*$@${docdir}/skels@' \
-		-i files/nftables/Makefile.am || die
-	sed '/^pkgsysconfdir/s@${sysconfdir}.*$@${docdir}/skels/osf@' \
-		-i files/osf/Makefile.am || die
-
-	eautoreconf
-}
-
-src_configure() {
-	local myeconfargs=(
-		# We handle python separately
-		--disable-python
-		--sbindir="${EPREFIX}"/sbin
-		$(use_enable debug)
-		$(use_enable doc man-doc)
-		$(use_with !gmp mini_gmp)
-		$(use_with json)
-		$(use_with readline cli readline)
-		$(use_enable static-libs static)
-		$(use_with xtables)
-	)
-	econf "${myeconfargs[@]}"
-}
-
-src_compile() {
-	default
-
-	if use python; then
-		python_foreach_impl python_make
-	fi
-}
-
-src_install() {
-	default
-
-	if ! use doc; then
-		pushd doc >/dev/null || die
-		doman *.?
-		popd >/dev/null || die
-	fi
-
-	local mksuffix="$(usex modern-kernel '-mk' '')"
-
-	exeinto /usr/libexec/${PN}
-	newexe "${FILESDIR}"/libexec/${PN}${mksuffix}.sh ${PN}.sh
-	newconfd "${FILESDIR}"/${PN}${mksuffix}.confd ${PN}
-	newinitd "${FILESDIR}"/${PN}${mksuffix}.init-r1 ${PN}
-	keepdir /var/lib/nftables
-
-	systemd_dounit "${FILESDIR}"/systemd/${PN}-restore.service
-
-	if use python ; then
-		python_foreach_impl python_make install
-		python_foreach_impl python_optimize
-	fi
-
-	find "${ED}" -type f -name "*.la" -delete || die
-}
-
-pkg_postinst() {
-	local save_file
-	save_file="${EROOT}/var/lib/nftables/rules-save"
-
-	# In order for the nftables-restore systemd service to start
-	# the save_file must exist.
-	if [[ ! -f "${save_file}" ]]; then
-		( umask 177; touch "${save_file}" )
-	elif [[ $(( "$( stat --printf '%05a' "${save_file}" )" & 07177 )) -ne 0 ]]; then
-		ewarn "Your system has dangerous permissions for ${save_file}"
-		ewarn "It is probably affected by bug #691326."
-		ewarn "You may need to fix the permissions of the file. To do so,"
-		ewarn "you can run the command in the line below as root."
-		ewarn "    'chmod 600 \"${save_file}\"'"
-	fi
-
-	if has_version 'sys-apps/systemd'; then
-		elog "If you wish to enable the firewall rules on boot (on systemd) you"
-		elog "will need to enable the nftables-restore service."
-		elog "    'systemctl enable ${PN}-restore.service'"
-		elog
-		elog "If you are creating firewall rules before the next system restart"
-		elog "the nftables-restore service must be manually started in order to"
-		elog "save those rules on shutdown."
-	fi
-	if has_version 'sys-apps/openrc'; then
-		elog "If you wish to enable the firewall rules on boot (on openrc) you"
-		elog "will need to enable the nftables service."
-		elog "    'rc-update add ${PN} default'"
-		elog
-		elog "If you are creating or updating the firewall rules and wish to save"
-		elog "them to be loaded on the next restart, use the \"save\" functionality"
-		elog "in the init script."
-		elog "    'rc-service ${PN} save'"
-	fi
-}

diff --git a/net-firewall/nftables/nftables-0.9.9-r1.ebuild b/net-firewall/nftables/nftables-0.9.9-r1.ebuild
deleted file mode 100644
index 40d4fbc36744..000000000000
--- a/net-firewall/nftables/nftables-0.9.9-r1.ebuild
+++ /dev/null
@@ -1,179 +0,0 @@
-# Copyright 1999-2022 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=7
-
-PYTHON_COMPAT=( python3_{7..10} )
-
-inherit autotools linux-info python-r1 systemd
-
-DESCRIPTION="Linux kernel (3.13+) firewall, NAT and packet mangling tools"
-HOMEPAGE="https://netfilter.org/projects/nftables/"
-
-if [[ ${PV} =~ ^[9]{4,}$ ]]; then
-	inherit git-r3
-	EGIT_REPO_URI="https://git.netfilter.org/${PN}"
-
-	BDEPEND="
-		sys-devel/bison
-		sys-devel/flex
-	"
-else
-	SRC_URI="https://netfilter.org/projects/nftables/files/${P}.tar.bz2"
-	KEYWORDS="amd64 arm arm64 ~ia64 ppc ~ppc64 ~riscv sparc x86"
-fi
-
-LICENSE="GPL-2"
-SLOT="0/1"
-IUSE="debug doc +gmp json libedit +modern-kernel python +readline static-libs xtables"
-
-RDEPEND="
-	>=net-libs/libmnl-1.0.4:0=
-	>=net-libs/libnftnl-1.2.0:0=
-	gmp? ( dev-libs/gmp:= )
-	json? ( dev-libs/jansson:= )
-	python? ( ${PYTHON_DEPS} )
-	readline? ( sys-libs/readline:= )
-	xtables? ( >=net-firewall/iptables-1.6.1:= )
-"
-
-DEPEND="${RDEPEND}"
-
-BDEPEND+="
-	doc? (
-		app-text/asciidoc
-		>=app-text/docbook2X-0.8.8-r4
-	)
-	virtual/pkgconfig
-"
-
-REQUIRED_USE="
-	python? ( ${PYTHON_REQUIRED_USE} )
-	libedit? ( !readline )
-"
-
-PATCHES=(
-	"${FILESDIR}/${PN}-0.9.8-slibtool.patch"
-)
-
-python_make() {
-	emake \
-		-C py \
-		abs_builddir="${S}" \
-		DESTDIR="${D}" \
-		PYTHON_BIN="${PYTHON}" \
-		"${@}"
-}
-
-pkg_setup() {
-	if kernel_is ge 3 13; then
-		if use modern-kernel && kernel_is lt 3 18; then
-			eerror "The modern-kernel USE flag requires kernel version 3.18 or newer to work properly."
-		fi
-		CONFIG_CHECK="~NF_TABLES"
-		linux-info_pkg_setup
-	else
-		eerror "This package requires kernel version 3.13 or newer to work properly."
-	fi
-}
-
-src_prepare() {
-	default
-
-	# fix installation path for doc stuff
-	sed '/^pkgsysconfdir/s@${sysconfdir}.*$@${docdir}/skels@' \
-		-i files/nftables/Makefile.am || die
-	sed '/^pkgsysconfdir/s@${sysconfdir}.*$@${docdir}/skels/osf@' \
-		-i files/osf/Makefile.am || die
-
-	eautoreconf
-}
-
-src_configure() {
-	local myeconfargs=(
-		# We handle python separately
-		--disable-python
-		--sbindir="${EPREFIX}"/sbin
-		$(use_enable debug)
-		$(use_enable doc man-doc)
-		$(use_with !gmp mini_gmp)
-		$(use_with json)
-		$(use_with libedit cli editline)
-		$(use_with readline cli readline)
-		$(use_enable static-libs static)
-		$(use_with xtables)
-	)
-	econf "${myeconfargs[@]}"
-}
-
-src_compile() {
-	default
-
-	if use python; then
-		python_foreach_impl python_make
-	fi
-}
-
-src_install() {
-	default
-
-	if ! use doc && [[ ! ${PV} =~ ^[9]{4,}$ ]]; then
-		pushd doc >/dev/null || die
-		doman *.?
-		popd >/dev/null || die
-	fi
-
-	local mksuffix="$(usex modern-kernel '-mk' '')"
-
-	exeinto /usr/libexec/${PN}
-	newexe "${FILESDIR}"/libexec/${PN}${mksuffix}.sh ${PN}.sh
-	newconfd "${FILESDIR}"/${PN}${mksuffix}.confd ${PN}
-	newinitd "${FILESDIR}"/${PN}${mksuffix}.init-r1 ${PN}
-	keepdir /var/lib/nftables
-
-	systemd_dounit "${FILESDIR}"/systemd/${PN}-restore.service
-
-	if use python ; then
-		python_foreach_impl python_make install
-		python_foreach_impl python_optimize
-	fi
-
-	find "${ED}" -type f -name "*.la" -delete || die
-}
-
-pkg_postinst() {
-	local save_file
-	save_file="${EROOT}/var/lib/nftables/rules-save"
-
-	# In order for the nftables-restore systemd service to start
-	# the save_file must exist.
-	if [[ ! -f "${save_file}" ]]; then
-		( umask 177; touch "${save_file}" )
-	elif [[ $(( "$( stat --printf '%05a' "${save_file}" )" & 07177 )) -ne 0 ]]; then
-		ewarn "Your system has dangerous permissions for ${save_file}"
-		ewarn "It is probably affected by bug #691326."
-		ewarn "You may need to fix the permissions of the file. To do so,"
-		ewarn "you can run the command in the line below as root."
-		ewarn "    'chmod 600 \"${save_file}\"'"
-	fi
-
-	if has_version 'sys-apps/systemd'; then
-		elog "If you wish to enable the firewall rules on boot (on systemd) you"
-		elog "will need to enable the nftables-restore service."
-		elog "    'systemctl enable ${PN}-restore.service'"
-		elog
-		elog "If you are creating firewall rules before the next system restart"
-		elog "the nftables-restore service must be manually started in order to"
-		elog "save those rules on shutdown."
-	fi
-	if has_version 'sys-apps/openrc'; then
-		elog "If you wish to enable the firewall rules on boot (on openrc) you"
-		elog "will need to enable the nftables service."
-		elog "    'rc-update add ${PN} default'"
-		elog
-		elog "If you are creating or updating the firewall rules and wish to save"
-		elog "them to be loaded on the next restart, use the \"save\" functionality"
-		elog "in the init script."
-		elog "    'rc-service ${PN} save'"
-	fi
-}

diff --git a/net-firewall/nftables/nftables-1.0.0-r1.ebuild b/net-firewall/nftables/nftables-1.0.0-r1.ebuild
deleted file mode 100644
index 31bd6d1de988..000000000000
--- a/net-firewall/nftables/nftables-1.0.0-r1.ebuild
+++ /dev/null
@@ -1,179 +0,0 @@
-# Copyright 1999-2022 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=7
-
-PYTHON_COMPAT=( python3_{7..10} )
-
-inherit autotools linux-info python-r1 systemd
-
-DESCRIPTION="Linux kernel (3.13+) firewall, NAT and packet mangling tools"
-HOMEPAGE="https://netfilter.org/projects/nftables/"
-
-if [[ ${PV} =~ ^[9]{4,}$ ]]; then
-	inherit git-r3
-	EGIT_REPO_URI="https://git.netfilter.org/${PN}"
-
-	BDEPEND="
-		sys-devel/bison
-		sys-devel/flex
-	"
-else
-	SRC_URI="https://netfilter.org/projects/nftables/files/${P}.tar.bz2"
-	KEYWORDS="amd64 arm arm64 ~ia64 ~mips ppc ppc64 ~riscv sparc x86"
-fi
-
-LICENSE="GPL-2"
-SLOT="0/1"
-IUSE="debug doc +gmp json libedit +modern-kernel python +readline static-libs xtables"
-
-RDEPEND="
-	>=net-libs/libmnl-1.0.4:0=
-	>=net-libs/libnftnl-1.2.0:0=
-	gmp? ( dev-libs/gmp:= )
-	json? ( dev-libs/jansson:= )
-	python? ( ${PYTHON_DEPS} )
-	readline? ( sys-libs/readline:= )
-	xtables? ( >=net-firewall/iptables-1.6.1:= )
-"
-
-DEPEND="${RDEPEND}"
-
-BDEPEND+="
-	doc? (
-		app-text/asciidoc
-		>=app-text/docbook2X-0.8.8-r4
-	)
-	virtual/pkgconfig
-"
-
-REQUIRED_USE="
-	python? ( ${PYTHON_REQUIRED_USE} )
-	libedit? ( !readline )
-"
-
-PATCHES=(
-	"${FILESDIR}/${PN}-0.9.8-slibtool.patch"
-)
-
-python_make() {
-	emake \
-		-C py \
-		abs_builddir="${S}" \
-		DESTDIR="${D}" \
-		PYTHON_BIN="${PYTHON}" \
-		"${@}"
-}
-
-pkg_setup() {
-	if kernel_is ge 3 13; then
-		if use modern-kernel && kernel_is lt 3 18; then
-			eerror "The modern-kernel USE flag requires kernel version 3.18 or newer to work properly."
-		fi
-		CONFIG_CHECK="~NF_TABLES"
-		linux-info_pkg_setup
-	else
-		eerror "This package requires kernel version 3.13 or newer to work properly."
-	fi
-}
-
-src_prepare() {
-	default
-
-	# fix installation path for doc stuff
-	sed '/^pkgsysconfdir/s@${sysconfdir}.*$@${docdir}/skels@' \
-		-i files/nftables/Makefile.am || die
-	sed '/^pkgsysconfdir/s@${sysconfdir}.*$@${docdir}/skels/osf@' \
-		-i files/osf/Makefile.am || die
-
-	eautoreconf
-}
-
-src_configure() {
-	local myeconfargs=(
-		# We handle python separately
-		--disable-python
-		--sbindir="${EPREFIX}"/sbin
-		$(use_enable debug)
-		$(use_enable doc man-doc)
-		$(use_with !gmp mini_gmp)
-		$(use_with json)
-		$(use_with libedit cli editline)
-		$(use_with readline cli readline)
-		$(use_enable static-libs static)
-		$(use_with xtables)
-	)
-	econf "${myeconfargs[@]}"
-}
-
-src_compile() {
-	default
-
-	if use python; then
-		python_foreach_impl python_make
-	fi
-}
-
-src_install() {
-	default
-
-	if ! use doc && [[ ! ${PV} =~ ^[9]{4,}$ ]]; then
-		pushd doc >/dev/null || die
-		doman *.?
-		popd >/dev/null || die
-	fi
-
-	local mksuffix="$(usex modern-kernel '-mk' '')"
-
-	exeinto /usr/libexec/${PN}
-	newexe "${FILESDIR}"/libexec/${PN}${mksuffix}.sh ${PN}.sh
-	newconfd "${FILESDIR}"/${PN}${mksuffix}.confd ${PN}
-	newinitd "${FILESDIR}"/${PN}${mksuffix}.init-r1 ${PN}
-	keepdir /var/lib/nftables
-
-	systemd_dounit "${FILESDIR}"/systemd/${PN}-restore.service
-
-	if use python ; then
-		python_foreach_impl python_make install
-		python_foreach_impl python_optimize
-	fi
-
-	find "${ED}" -type f -name "*.la" -delete || die
-}
-
-pkg_postinst() {
-	local save_file
-	save_file="${EROOT}/var/lib/nftables/rules-save"
-
-	# In order for the nftables-restore systemd service to start
-	# the save_file must exist.
-	if [[ ! -f "${save_file}" ]]; then
-		( umask 177; touch "${save_file}" )
-	elif [[ $(( "$( stat --printf '%05a' "${save_file}" )" & 07177 )) -ne 0 ]]; then
-		ewarn "Your system has dangerous permissions for ${save_file}"
-		ewarn "It is probably affected by bug #691326."
-		ewarn "You may need to fix the permissions of the file. To do so,"
-		ewarn "you can run the command in the line below as root."
-		ewarn "    'chmod 600 \"${save_file}\"'"
-	fi
-
-	if has_version 'sys-apps/systemd'; then
-		elog "If you wish to enable the firewall rules on boot (on systemd) you"
-		elog "will need to enable the nftables-restore service."
-		elog "    'systemctl enable ${PN}-restore.service'"
-		elog
-		elog "If you are creating firewall rules before the next system restart"
-		elog "the nftables-restore service must be manually started in order to"
-		elog "save those rules on shutdown."
-	fi
-	if has_version 'sys-apps/openrc'; then
-		elog "If you wish to enable the firewall rules on boot (on openrc) you"
-		elog "will need to enable the nftables service."
-		elog "    'rc-update add ${PN} default'"
-		elog
-		elog "If you are creating or updating the firewall rules and wish to save"
-		elog "them to be loaded on the next restart, use the \"save\" functionality"
-		elog "in the init script."
-		elog "    'rc-service ${PN} save'"
-	fi
-}


             reply	other threads:[~2022-04-17 17:12 UTC|newest]

Thread overview: 210+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-04-17 17:12 Sam James [this message]
  -- strict thread matches above, loose matches on Subject: below --
2024-08-26 11:55 [gentoo-commits] repo/gentoo:master commit in: net-firewall/nftables/ Sam James
2024-07-19 16:41 Patrick McLean
2024-07-19 16:41 Patrick McLean
2024-04-13 15:38 Matthew Thode
2023-12-17 19:11 Arthur Zamarin
2023-12-15 13:02 Arthur Zamarin
2023-12-15 10:44 Arthur Zamarin
2023-12-15  7:34 Sam James
2023-12-15  7:27 Sam James
2023-12-15  7:16 Sam James
2023-12-15  7:14 Sam James
2023-10-20  0:51 Sam James
2023-08-20 18:10 Arthur Zamarin
2023-08-20 17:37 Arthur Zamarin
2023-08-20 13:16 Sam James
2023-08-20 13:11 Sam James
2023-08-20 13:11 Sam James
2023-08-20 11:27 Sam James
2023-08-20  8:29 Sam James
2023-08-20  8:29 Sam James
2023-07-16  5:25 Sam James
2023-07-15 13:23 Sam James
2023-07-15 13:18 Sam James
2023-05-01 13:36 Sam James
2023-04-29  8:48 Sam James
2023-04-29  8:48 Sam James
2023-04-24 12:38 Jakov Smolić
2023-04-24  8:25 Arthur Zamarin
2023-04-24  8:25 Arthur Zamarin
2023-04-23 22:59 Sam James
2023-04-23 22:59 Sam James
2023-04-23 22:59 Sam James
2023-03-22  4:06 Sam James
2023-03-19 22:22 Sam James
2023-03-19 22:22 Sam James
2023-03-15  2:42 Sam James
2023-03-10  3:53 Sam James
2023-03-10  3:53 Sam James
2023-03-04 11:56 Arthur Zamarin
2023-03-04  9:55 Arthur Zamarin
2023-03-04  7:42 Arthur Zamarin
2023-03-04  7:04 Arthur Zamarin
2023-03-04  6:14 Arthur Zamarin
2023-03-04  5:49 Arthur Zamarin
2023-03-04  5:47 Arthur Zamarin
2023-03-04  5:38 Arthur Zamarin
2022-12-21 23:52 Sam James
2022-11-19  4:50 WANG Xuerui
2022-10-11 18:26 Sam James
2022-10-11 17:15 Arthur Zamarin
2022-10-11  9:19 Agostino Sarubbo
2022-10-11  9:19 Agostino Sarubbo
2022-10-11  6:46 Agostino Sarubbo
2022-10-10 23:36 Sam James
2022-10-10 23:36 Sam James
2022-10-10 22:35 Sam James
2022-09-16 18:01 Arthur Zamarin
2022-09-16 17:45 Arthur Zamarin
2022-09-15 19:58 Arthur Zamarin
2022-09-13 17:34 Mike Gilbert
2022-09-08 11:35 Agostino Sarubbo
2022-09-08 11:24 Agostino Sarubbo
2022-09-08  7:26 Agostino Sarubbo
2022-09-07 13:16 Agostino Sarubbo
2022-09-07 13:15 Agostino Sarubbo
2022-08-10  1:16 Patrick McLean
2022-08-10  1:16 Patrick McLean
2022-06-17 18:44 Sam James
2022-06-17 16:18 Mike Gilbert
2022-06-07 20:31 Patrick McLean
2022-06-05  9:20 Sam James
2022-05-31 22:25 Patrick McLean
2022-05-22 11:27 Jakov Smolić
2022-05-22  6:22 Agostino Sarubbo
2022-05-22  6:19 Agostino Sarubbo
2022-05-22  6:17 Agostino Sarubbo
2022-05-22  3:53 Sam James
2022-05-22  3:25 Sam James
2022-05-22  3:21 Sam James
2022-05-22  3:20 Sam James
2022-03-27  2:58 Sam James
2022-03-27  2:58 Sam James
2022-03-27  2:58 Sam James
2022-02-13 14:58 Sam James
2022-02-10 11:50 Sam James
2022-02-10 11:43 Sam James
2022-02-10 11:43 Sam James
2022-02-10 10:17 Sam James
2022-02-10 10:17 Sam James
2022-02-10 10:12 Sam James
2022-02-10  9:59 Sam James
2022-02-10  9:50 Sam James
2022-02-01  6:56 Sam James
2022-01-31 19:00 Patrick McLean
2022-01-31 19:00 Patrick McLean
2021-11-19 18:18 Patrick McLean
2021-10-28 14:03 Agostino Sarubbo
2021-10-28 14:00 Agostino Sarubbo
2021-10-28  7:27 Sam James
2021-10-28  7:27 Sam James
2021-10-28  7:27 Sam James
2021-10-28  6:43 Agostino Sarubbo
2021-10-28  6:22 Sam James
2021-09-08 23:47 Joshua Kinard
2021-08-23 18:43 Patrick McLean
2021-08-23 18:43 Patrick McLean
2021-08-20 23:51 Sam James
2021-08-11 23:10 Sam James
2021-08-11  0:24 Sam James
2021-08-11  0:02 Sam James
2021-06-21 20:42 Marek Szuba
2021-05-27 16:57 Patrick McLean
2021-05-27  1:25 Patrick McLean
2021-05-09  6:01 Sam James
2021-05-09  1:29 Sam James
2021-05-08 18:58 Sam James
2021-05-08 18:49 Sam James
2021-05-08 18:44 Sam James
2021-05-08 18:41 Sam James
2021-04-27 18:02 Sam James
2021-04-27 18:01 Sam James
2021-03-06 23:10 Sam James
2021-02-28 12:22 Sergei Trofimovich
2021-02-28 12:22 Sergei Trofimovich
2021-01-16 23:36 Lars Wendler
2021-01-05 18:18 Patrick McLean
2020-11-08  3:02 Patrick McLean
2020-10-31 15:35 Matt Turner
2020-10-27 17:58 Patrick McLean
2020-08-29 17:57 Thomas Deutschmann
2020-08-25 13:13 Sam James
2020-08-25 12:53 Agostino Sarubbo
2020-08-23 20:47 Sam James
2020-08-20 13:20 Sam James
2020-07-23  2:06 Patrick McLean
2020-06-27 20:37 Patrick McLean
2020-06-27 20:37 Patrick McLean
2020-06-16  2:20 Patrick McLean
2020-06-07 18:17 Patrick McLean
2020-06-07 12:10 Lars Wendler
2020-06-07  0:18 Patrick McLean
2020-04-13 18:48 Patrick McLean
2020-04-07  6:56 Patrick McLean
2020-04-02  7:47 Lars Wendler
2020-02-26 19:23 Patrick McLean
2020-01-27 12:06 Mikle Kolyada
2020-01-15 23:52 Sergei Trofimovich
2020-01-10 12:16 Agostino Sarubbo
2020-01-10  1:26 Thomas Deutschmann
2019-12-28 21:32 Georgy Yakovlev
2019-12-05  2:19 Matthew Thode
2019-12-05  2:19 Matthew Thode
2019-12-03 16:52 Matthew Thode
2019-12-03 16:10 Matthew Thode
2019-12-03 16:10 Matthew Thode
2019-12-03  7:19 Lars Wendler
2019-12-02 18:52 Matthew Thode
2019-12-02 18:52 Matthew Thode
2019-09-13 18:47 Mikle Kolyada
2019-09-13 17:27 Agostino Sarubbo
2019-09-09  6:54 Agostino Sarubbo
2019-09-08 19:15 Thomas Deutschmann
2019-08-27  7:35 Matt Turner
2019-08-23 17:02 Lars Wendler
2019-07-29  1:52 Matt Turner
2019-07-28 19:58 Mikle Kolyada
2019-07-02 12:35 Agostino Sarubbo
2019-07-02 11:55 Agostino Sarubbo
2019-07-02 10:33 Agostino Sarubbo
2019-06-30  1:57 Matthew Thode
2019-06-28 16:30 Lars Wendler
2019-06-28 15:47 Lars Wendler
2019-06-28 11:49 Lars Wendler
2019-05-21 16:39 Stephen Klimaszewski
2019-04-08 20:21 Aaron Bauman
2019-01-28 15:24 Matthew Thode
2018-11-19 21:44 Matthew Thode
2018-11-19 18:35 Matthew Thode
2018-06-11 11:42 Lars Wendler
2018-06-11 11:42 Lars Wendler
2018-05-10 18:58 Lars Wendler
2018-05-02 13:57 Lars Wendler
2018-05-02 13:57 Lars Wendler
2018-03-07  9:13 Lars Wendler
2018-03-07  9:13 Lars Wendler
2018-02-03 22:58 Thomas Deutschmann
2018-01-20 18:58 Lars Wendler
2018-01-18 14:21 Lars Wendler
2018-01-10  6:19 Markus Meier
2018-01-04 20:40 Mikle Kolyada
2017-12-25  9:28 Sergei Trofimovich
2017-12-19 15:46 Thomas Deutschmann
2017-10-25 13:33 Matt Thode
2017-10-18  6:11 Sergei Trofimovich
2017-10-18  5:33 Sergei Trofimovich
2017-10-17 14:12 Lars Wendler
2017-08-02 21:01 Matt Thode
2017-07-23 12:16 Manuel Rüger
2017-04-08  7:27 Michał Górny
2017-01-07 21:46 Robin H. Johnson
2017-01-07 21:46 Robin H. Johnson
2016-06-16  1:03 Göktürk Yüksek
2016-06-15 15:48 Göktürk Yüksek
2015-12-26 13:34 Manuel Rüger
2015-11-03  8:42 Ian Delaney
2015-10-16  3:41 Ian Delaney
2015-10-10 21:21 Mike Frysinger
2015-10-06 13:27 Manuel Rüger
2015-09-19 21:46 Manuel Rüger

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1650215536.17ebcc21dca47779c398ca44b6a2e36c2963e533.sam@gentoo \
    --to=sam@gentoo.org \
    --cc=gentoo-commits@lists.gentoo.org \
    --cc=gentoo-dev@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox