summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJavier Villavicencio <the_paya@gentoo.org>2009-01-27 12:50:33 +0000
committerJavier Villavicencio <the_paya@gentoo.org>2009-01-27 12:50:33 +0000
commita545de53205af4ef63ade919fe7c12801ef916b7 (patch)
tree52d3e9bc1a8b377291f48089623fc6a2411bd18a /net-firewall/pftop
parentAdded sqlite support, bug #247271, thank Marcin Deranek for report. Sqlite su... (diff)
downloadhistorical-a545de53205af4ef63ade919fe7c12801ef916b7.tar.gz
historical-a545de53205af4ef63ade919fe7c12801ef916b7.tar.bz2
historical-a545de53205af4ef63ade919fe7c12801ef916b7.zip
New version.
Package-Manager: portage-2.2_rc23/cvs/FreeBSD i386
Diffstat (limited to 'net-firewall/pftop')
-rw-r--r--net-firewall/pftop/ChangeLog12
-rw-r--r--net-firewall/pftop/Manifest19
-rw-r--r--net-firewall/pftop/files/pftop-0.7-dead.patch42
-rw-r--r--net-firewall/pftop/files/pftop-0.7-pcap.patch61
-rw-r--r--net-firewall/pftop/files/pftop-0.7-pr123670.patch43
-rw-r--r--net-firewall/pftop/files/pftop-0.7-queue.patch.bz2bin0 -> 3734 bytes
-rw-r--r--net-firewall/pftop/files/pftop-0.7-strnvis_fix.patch13
-rw-r--r--net-firewall/pftop/pftop-0.7.ebuild52
8 files changed, 239 insertions, 3 deletions
diff --git a/net-firewall/pftop/ChangeLog b/net-firewall/pftop/ChangeLog
index 9a02b8d65e50..a7f25c717198 100644
--- a/net-firewall/pftop/ChangeLog
+++ b/net-firewall/pftop/ChangeLog
@@ -1,6 +1,14 @@
# ChangeLog for net-firewall/pftop
-# Copyright 1999-2006 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/net-firewall/pftop/ChangeLog,v 1.3 2006/10/22 21:17:41 the_paya Exp $
+# Copyright 1999-2009 Gentoo Foundation; Distributed under the GPL v2
+# $Header: /var/cvsroot/gentoo-x86/net-firewall/pftop/ChangeLog,v 1.4 2009/01/27 12:50:32 the_paya Exp $
+
+*pftop-0.7 (27 Jan 2009)
+
+ 27 Jan 2009; Javier Villavicencio <the_paya@gentoo.org>
+ +files/pftop-0.7-dead.patch, +files/pftop-0.7-pcap.patch,
+ +files/pftop-0.7-pr123670.patch, +files/pftop-0.7-queue.patch.bz2,
+ +files/pftop-0.7-strnvis_fix.patch, +pftop-0.7.ebuild:
+ New version.
22 Oct 2006; Javier Villavicencio <the_paya@gentoo.org> pftop-0.5.ebuild:
Add support for FreeBSD 6.2.
diff --git a/net-firewall/pftop/Manifest b/net-firewall/pftop/Manifest
index 12eecf63877f..49d6aec5c867 100644
--- a/net-firewall/pftop/Manifest
+++ b/net-firewall/pftop/Manifest
@@ -1,4 +1,21 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA1
+
+AUX pftop-0.7-dead.patch 1073 RMD160 ddb0a6316e301fda384859be0d7465a22a3e4e5f SHA1 2392f74bf57d4b3af57dc074f5101311266a6779 SHA256 872d32059c0ba78d16d4c06efa18e24866b03d7a2c2dc8130ea2047404a5ccf5
+AUX pftop-0.7-pcap.patch 1292 RMD160 44ffd623f49c28de70b08dddc017279570aa2892 SHA1 a3604a0cfb20684389e94df03fe0178ac00c301b SHA256 c2b3b779bb3f1ace70d2575a3528062dec657d6cbc33513f7401746deb0a5c01
+AUX pftop-0.7-pr123670.patch 1167 RMD160 d481a463779ae51192c0730b50409ef9f0383f26 SHA1 4d8a94fff7aa0edd22d4da0ebe049dbaf32366b4 SHA256 2bc87ec2fb4f9a7dd1ddec613b66875362fe5b174ecd31766550eb2cbb2b0eec
+AUX pftop-0.7-queue.patch.bz2 3734 RMD160 3a3217ad6dff859eb977c6687284bb05dddb9651 SHA1 088c21fc9b7907e275ef30b6e717857226b177d3 SHA256 a8babb1877821b8a0d4dfaf4a72dde29ca7d707aad974836a49c11539cc8eff7
+AUX pftop-0.7-strnvis_fix.patch 288 RMD160 66e5da56336a46897092ee7c688888c76553aab7 SHA1 4de93541c464d087bdf5d6cf925e6c3ed2f4fa08 SHA256 0b39f8bdb00157e7f754ac81c66478829c2f858f6d9f8d6d1804869334e2e91f
DIST pftop-0.5.tar.gz 24855 RMD160 f52b482534d210770a616a5dee2eb8910751e0ed SHA1 a735c05414d78a7155e99233529f6deb7e3035c4 SHA256 e5d0fd0d84285a52fd0d1944908d4c3e4f545ec0f0e11e9f9c29ce1536a9d0b7
+DIST pftop-0.7.tar.gz 59765 RMD160 0e0c09e5feeb07deba8b540233dcb946ba0b4508 SHA1 651afa532cfc8cf59c3598704deb9bf3788ac9e9 SHA256 afde859fab77597e4aae1ef6b87f1bb26a5ad8cb2b1d7316a12e5098153492af
EBUILD pftop-0.5.ebuild 1122 RMD160 e65df345e3b366134c701eb38548a671dab59999 SHA1 2ea1b5e623e151db98c84b90397a525619f35250 SHA256 f24a702bda201eaca9e908d189d19555389e4c1fc8e2c9c17a5255cae9136d6a
-MISC ChangeLog 628 RMD160 7dcc354597b8ba941ca22173f49cf5bf9b3da77e SHA1 94bfc4cec3af4e0d1ace2d6fa9a3c3d1cb731a25 SHA256 f94883df72b81ba3debfed067c6f4efb752c14d8a177038056960a1a042485a2
+EBUILD pftop-0.7.ebuild 1487 RMD160 1197a041dec2e89f4bfd67de4d08b7e2e9b555ff SHA1 22169596872c25555fcf2b0a661e0effc6979ce0 SHA256 08b125734d8c672429b36974f36eaf0787d1da46c39942097b3ecbb852227561
+MISC ChangeLog 914 RMD160 dd0f44c436e7ef0470b40abf22e6010a450395e1 SHA1 b3b455ed6ab72c2a30e3c2f4b0bcda8a3f75e8c2 SHA256 528ffd043e660d9e52e31e7004edb45f4e209f0df8ecb7fd3fcab29791fb115f
MISC metadata.xml 156 RMD160 60b5820a08275f307e5bd936d78f5afd1f141086 SHA1 d9d9d4f2b5afc58339ea3e562fca490156935f1f SHA256 30ab515d6ac492d3d6c36ac3c675511742c2149e56a6b3228c8d22ab8edb3ff7
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.0.9 (FreeBSD)
+
+iEYEARECAAYFAkl/AwoACgkQoAP6MIsfg8JukQCeKNnp9eadiNaUaHb5nvGXcylZ
+0poAn1zBWc7/UAlue+K7znN1mKwiyp62
+=KnqL
+-----END PGP SIGNATURE-----
diff --git a/net-firewall/pftop/files/pftop-0.7-dead.patch b/net-firewall/pftop/files/pftop-0.7-dead.patch
new file mode 100644
index 000000000000..70aa19a420dd
--- /dev/null
+++ b/net-firewall/pftop/files/pftop-0.7-dead.patch
@@ -0,0 +1,42 @@
+Patch from FreeBSD ports.
+
+--- pftop-0.7.orig/sf-gencode.c
++++ pftop-0.7/sf-gencode.c
+@@ -32,7 +32,7 @@
+ #include <netinet/in.h>
+ #include <netinet/if_ether.h>
+
+-#include <net/if_pflog.h>
++/* #include <net/if_pflog.h> */
+ #include <net/pfvar.h>
+
+ #include <netdb.h>
+@@ -60,7 +60,7 @@
+ static char sf_errbuf[PFTOP_ERRBUF_SIZE];
+
+ /* VARARGS */
+-__dead void
++__dead2 void
+ sf_error(const char *fmt, ...)
+ {
+ va_list ap;
+--- pftop-0.7.orig/sf-gencode.h
++++ pftop-0.7/sf-gencode.h
+@@ -169,7 +169,7 @@
+ struct arth *gen_loadexpire(void);
+
+ void bpf_optimize(struct block **);
+-__dead void bpf_error(const char *, ...)
++__dead2 void bpf_error(const char *, ...)
+ __attribute__((volatile, __format__ (printf, 1, 2)));
+
+ void finish_parse(struct block *);
+@@ -184,7 +184,7 @@
+ #define JT(b) ((b)->et.succ)
+ #define JF(b) ((b)->ef.succ)
+
+-__dead void sf_error(const char *fmt, ...);
++__dead2 void sf_error(const char *fmt, ...);
+ const char *sf_get_error(void);
+ int sf_compile(struct bpf_program *, char *, int, bpf_u_int32);
+ void sf_freecode(struct bpf_program *);
diff --git a/net-firewall/pftop/files/pftop-0.7-pcap.patch b/net-firewall/pftop/files/pftop-0.7-pcap.patch
new file mode 100644
index 000000000000..5c012ffbc12e
--- /dev/null
+++ b/net-firewall/pftop/files/pftop-0.7-pcap.patch
@@ -0,0 +1,61 @@
+Fix compilation against libpcap-1.0.0.
+
+--- pftop-0.7.orig/bpf_dump.c
++++ pftop-0.7/bpf_dump.c
+@@ -33,10 +33,10 @@
+ #include <stdio.h>
+
+
+-extern void bpf_dump(struct bpf_program *, int);
++extern void bpf_dump(const struct bpf_program *, int);
+
+ void
+-bpf_dump(struct bpf_program *p, int option)
++bpf_dump(const struct bpf_program *p, int option)
+ {
+ struct bpf_insn *insn;
+ int i;
+--- pftop-0.7.orig/bpf_filter.c
++++ pftop-0.7/bpf_filter.c
+@@ -134,7 +134,7 @@
+ }
+ #endif
+
+-#include <net/bpf.h>
++//#include <net/bpf.h>
+
+ /*
+ * Execute the filter program starting at pc on the packet p
+@@ -143,8 +143,8 @@
+ */
+ u_int
+ bpf_filter(pc, p, wirelen, buflen)
+- struct bpf_insn *pc;
+- u_char *p;
++ const struct bpf_insn *pc;
++ const u_char *p;
+ u_int wirelen;
+ u_int buflen;
+ {
+--- pftop-0.7.orig/bpf_image.c
++++ pftop-0.7/bpf_image.c
+@@ -36,7 +36,7 @@
+
+ char *
+ bpf_image(p, n)
+- struct bpf_insn *p;
++ const struct bpf_insn *p;
+ int n;
+ {
+ int v;
+--- pftop-0.7.orig/sf-gencode.h
++++ pftop-0.7/sf-gencode.h
+@@ -188,7 +188,7 @@
+ const char *sf_get_error(void);
+ int sf_compile(struct bpf_program *, char *, int, bpf_u_int32);
+ void sf_freecode(struct bpf_program *);
+-void bpf_dump(struct bpf_program *, int);
++void bpf_dump(const struct bpf_program *, int);
+
+ extern int no_optimize;
+
diff --git a/net-firewall/pftop/files/pftop-0.7-pr123670.patch b/net-firewall/pftop/files/pftop-0.7-pr123670.patch
new file mode 100644
index 000000000000..537c1daa3d06
--- /dev/null
+++ b/net-firewall/pftop/files/pftop-0.7-pr123670.patch
@@ -0,0 +1,43 @@
+--- pftop.c.orig 2007-11-07 01:36:46.000000000 -0500
++++ pftop.c 2008-05-16 15:57:12.000000000 -0400
+@@ -1486,7 +1486,13 @@
+ print_fld_size(FLD_BYTES, pr->bytes);
+ #endif
+ print_fld_uint(FLD_RULE, pr->nr);
+- print_fld_str(FLD_DIR, pr->direction == PF_OUT ? "Out" : "In");
++ if (pr->direction == PF_IN)
++ print_fld_str(FLD_DIR, "In");
++ else if (pr->direction == PF_OUT)
++ print_fld_str(FLD_DIR, "Out");
++ else
++ print_fld_str(FLD_DIR, "Any");
++
+ if (pr->quick)
+ print_fld_str(FLD_QUICK, "Quick");
+
+@@ -1570,10 +1576,10 @@
+ #ifdef HAVE_RULE_UGID
+ if (pr->uid.op)
+ tb_print_ugid(pr->uid.op, pr->uid.uid[0], pr->uid.uid[1],
+- "user", UID_MAX);
++ "user", UINT_MAX);
+ if (pr->gid.op)
+ tb_print_ugid(pr->gid.op, pr->gid.gid[0], pr->gid.gid[1],
+- "group", GID_MAX);
++ "group", UINT_MAX);
+ #endif
+
+ if (pr->flags || pr->flagset) {
+@@ -1765,7 +1771,12 @@
+ strerror(errno));
+ return (-1);
+ }
++#ifdef PFALTQ_FLAG_IF_REMOVED
++ if (pa.altq.qid > 0 &&
++ !(pa.altq.local_flags & PFALTQ_FLAG_IF_REMOVED)) {
++#else
+ if (pa.altq.qid > 0) {
++#endif
+ pq.nr = nr;
+ pq.ticket = pa.ticket;
+ pq.buf = &qstats;
diff --git a/net-firewall/pftop/files/pftop-0.7-queue.patch.bz2 b/net-firewall/pftop/files/pftop-0.7-queue.patch.bz2
new file mode 100644
index 000000000000..84e0c0d06265
--- /dev/null
+++ b/net-firewall/pftop/files/pftop-0.7-queue.patch.bz2
Binary files differ
diff --git a/net-firewall/pftop/files/pftop-0.7-strnvis_fix.patch b/net-firewall/pftop/files/pftop-0.7-strnvis_fix.patch
new file mode 100644
index 000000000000..73b4be6146cf
--- /dev/null
+++ b/net-firewall/pftop/files/pftop-0.7-strnvis_fix.patch
@@ -0,0 +1,13 @@
+Fix from FreeBSD ports.
+
+--- sf-scanner.l.orig
++++ sf-scanner.l
+@@ -233,7 +233,7 @@
+ size_t len = strlen(yytext) * 4 + 1;
+ char *v = malloc(len);
+ if (v != NULL)
+- strnvis(v, yytext, len, 0);
++ strvis(v, yytext, 0);
+ sf_error("illegal token: %s", v);
+ free(v);
+ }
diff --git a/net-firewall/pftop/pftop-0.7.ebuild b/net-firewall/pftop/pftop-0.7.ebuild
new file mode 100644
index 000000000000..782a44ed0eda
--- /dev/null
+++ b/net-firewall/pftop/pftop-0.7.ebuild
@@ -0,0 +1,52 @@
+# Copyright 2006-2009 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/net-firewall/pftop/pftop-0.7.ebuild,v 1.1 2009/01/27 12:50:32 the_paya Exp $
+
+inherit bsdmk flag-o-matic
+DESCRIPTION="Pftop: curses-based utility for real-time display of active states and rule statistics for pf"
+
+HOMEPAGE="http://www.eee.metu.edu.tr/~canacar/pftop/"
+
+SRC_URI="http://www.eee.metu.edu.tr/~canacar/${P}.tar.gz"
+
+LICENSE="BSD"
+SLOT="0"
+KEYWORDS="~x86-fbsd"
+IUSE=""
+
+RDEPEND="sys-libs/ncurses"
+
+src_unpack() {
+ unpack ${A}
+ cd "${S}"
+ epatch "${FILESDIR}/${PN}-0.7-pcap.patch"
+ epatch "${FILESDIR}/${PN}-0.7-dead.patch"
+ epatch "${FILESDIR}/${PN}-0.7-pr123670.patch"
+ epatch "${FILESDIR}/${PN}-0.7-queue.patch.bz2"
+ epatch "${FILESDIR}/${PN}-0.7-strnvis_fix.patch"
+}
+
+src_compile() {
+ # OS_LEVEL variable refers to the version of pf shipped with OpenBSD.
+ # On FreeBSD we have to know it.
+ local OSLEVEL
+
+ case ${CHOST} in
+ *-openbsd*)
+ local obsdver=${CHOST/*-openbsd/}
+ OSLEVEL=${obsdver//.}
+ ;;
+ *-freebsd5.[34]) OSLEVEL=35 ;;
+ *-freebsd6.[012]) OSLEVEL=37 ;;
+ *-freebsd*) OSLEVEL=41 ;;
+ *)
+ die "Your OS/Version is not supported (${CHOST}), please report."
+ ;;
+ esac
+ append-flags "-DHAVE_SNPRINTF -DHAVE_VSNPRINTF -DOS_LEVEL=${OSLEVEL}"
+ mkmake LOCALBASE="/usr" CFLAGS="${CFLAGS}" || die "pmake failed"
+}
+
+src_install() {
+ mkinstall DESTDIR="${D}" LOCALBASE="/usr" MANDIR="/usr/share/man/man" install || die
+}