diff options
author | Yixun Lan <dlan@gentoo.org> | 2014-07-17 06:57:29 +0000 |
---|---|---|
committer | Yixun Lan <dlan@gentoo.org> | 2014-07-17 06:57:29 +0000 |
commit | ea41057c73d891ba6f3213456eabe6382257566c (patch) | |
tree | f1691c29a3a6ada808f86b9f4c9f6e715ed5b58d /net-firewall/ufw | |
parent | Typo (diff) | |
download | historical-ea41057c73d891ba6f3213456eabe6382257566c.tar.gz historical-ea41057c73d891ba6f3213456eabe6382257566c.tar.bz2 historical-ea41057c73d891ba6f3213456eabe6382257566c.zip |
bug 506390, clean old, update to distutils-r1. proxy for SN (Enlik)
Package-Manager: portage-2.2.10/cvs/Linux x86_64
Manifest-Sign-Key: 0xAABEFD55
Diffstat (limited to 'net-firewall/ufw')
-rw-r--r-- | net-firewall/ufw/ChangeLog | 12 | ||||
-rw-r--r-- | net-firewall/ufw/Manifest | 29 | ||||
-rw-r--r-- | net-firewall/ufw/files/ufw-0.31.1-conntrack.patch | 201 | ||||
-rw-r--r-- | net-firewall/ufw/files/ufw-0.33-conntrack.patch | 187 | ||||
-rw-r--r-- | net-firewall/ufw/files/ufw-0.34_pre805-shebang.patch | 15 | ||||
-rw-r--r-- | net-firewall/ufw/files/ufw-dont-check-iptables.patch | 45 | ||||
-rw-r--r-- | net-firewall/ufw/ufw-0.33-r2.ebuild | 184 | ||||
-rw-r--r-- | net-firewall/ufw/ufw-0.34_pre805-r1.ebuild (renamed from net-firewall/ufw/ufw-0.31.1-r2.ebuild) | 77 |
8 files changed, 83 insertions, 667 deletions
diff --git a/net-firewall/ufw/ChangeLog b/net-firewall/ufw/ChangeLog index 94cecaede4b5..901603d3f98b 100644 --- a/net-firewall/ufw/ChangeLog +++ b/net-firewall/ufw/ChangeLog @@ -1,6 +1,14 @@ # ChangeLog for net-firewall/ufw -# Copyright 1999-2013 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/net-firewall/ufw/ChangeLog,v 1.13 2013/05/20 09:05:50 lxnay Exp $ +# Copyright 1999-2014 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/net-firewall/ufw/ChangeLog,v 1.14 2014/07/17 06:57:21 dlan Exp $ + +*ufw-0.34_pre805-r1 (17 Jul 2014) + + 17 Jul 2014; Yixun Lan <dlan@gentoo.org> -ufw-0.31.1-r2.ebuild, + -ufw-0.33-r2.ebuild, +ufw-0.34_pre805-r1.ebuild, + -files/ufw-0.31.1-conntrack.patch, -files/ufw-0.33-conntrack.patch, + +files/ufw-0.34_pre805-shebang.patch, -files/ufw-dont-check-iptables.patch: + bug 506390, clean old, update to distutils-r1. proxy for SN (Enlik) 20 May 2013; Fabio Erculiani <lxnay@gentoo.org> ufw-0.31.1-r2.ebuild, ufw-0.33-r2.ebuild, ufw-0.34_pre805.ebuild, +files/ufw.service: diff --git a/net-firewall/ufw/Manifest b/net-firewall/ufw/Manifest index c6c78197f8f8..68cecff582e9 100644 --- a/net-firewall/ufw/Manifest +++ b/net-firewall/ufw/Manifest @@ -4,27 +4,32 @@ Hash: SHA256 AUX rsyslog/ufw.logrotate 178 SHA256 02d1a00ca68446fbe056a4c3aede319f77b3262e26092cc04ea46de8923d03f8 SHA512 d381a34b23d8656c316af69c07d49042d6c4def4cea3e51367210bce20681376fd0259a95b6b9403171c5d80732927a8880f3d401e13e6f76b505324eecb146b WHIRLPOOL 10b63f8966ad7ad0894a18216a0102fc8a102b14c8f9fb468a4a8d61ae13b1ec3176c7bb9ffb852f8aaa4ac7874584a8f8f5a2d6e98fa3fb56f5945e9bd99139 AUX syslog-ng/syslog-ng.example 381 SHA256 70a795c1b20e2cdef38565d74b9de042c6666f860a2fd1b3bdc6f31dd451bc68 SHA512 f48d2487679fe179ea216bb4259affbf5ab4c86725b45942581ada8dac24dd0c978f755182805ff5350ab169972fcee7bb54a6d14df760d4b5f62c485af1e49e WHIRLPOOL 44874c68257b6f9a53e7fd1affc6ccf2492d9ec09a4700a17239fb3e413e2dcf2ede87eafb1e253d965c27a1c5ead36c413c8c84ec3ed55f5cf2191b927aacbe AUX syslog-ng/ufw.logrotate 269 SHA256 cddd86613bde19b45f0f935c65bb43721f69aefc14e7d629612b23ea3b5c5c97 SHA512 22d89f04b68a8b4deeb60aca263239255dd01b9c6e6d23a5d77514daf7bb9dc3910a28cfe9c606f70d2a50f0365bb19c3cf00c5859ee2630c00f0df451ee9c5d WHIRLPOOL 5da4f8c615667d829ea4eb318ec01b712adf69002dcf8c3df7deba8fa3e49e426b1c00e468805ba571ed2f2ce05fa81b7e2ac83e7231de3f3305d6ce190264e5 -AUX ufw-0.31.1-conntrack.patch 9842 SHA256 e91af8e88c896fd2e05b4143f361a72bc8ae78c8ab0c5afb8a26ea416f7bb631 SHA512 c7fab58aec12f47a492e8ad94e2ffbb471daf6292b6c9272396754cc25a6d2a164f3c383fd7e933a0d624d55a5b4b7a385a1fd31ef74162b7e819284c25a4fd7 WHIRLPOOL 96aa69e0aad4df20b14231edda6434f95be144d302484ef71bec4b6d6d4518714a852d1844d5aa33eaa7845a70659ab42006881297eecc5237f7c93b3907af9b AUX ufw-0.31.1-move-path.patch 7071 SHA256 88a7b20696b731bac01b3c5d88b0353842b1228d3239cfebe1f2a47c1bdb6768 SHA512 66382ded35437e563c874dc01417a2735a2aa136a1e670fd3707c3311516a6d9a0e62a20679a4f5dcaa2edc0225535cf2410d7f86676b1e10eb309ecc3e24bc2 WHIRLPOOL 89e3165900def8380cade3eb62fc351be9e43c8055f4b71c356f3aa5356b0c57154e18485d94e0ca86462da7c55b1b4755de379a88f1958d313b93c0ec723715 AUX ufw-0.31.1-python-abis.patch 1872 SHA256 1e3094135d71e7e7129b2d268d79c73990f0a6f61f2bb6456d3f3654b4975463 SHA512 fbe65a6775426c66cd82382e62eea3a2179d68a0b6c617cc468e7076e2f58493baffde686b65e6bf3a89ea7fdda48a5a42d152b1be388c943408532f47d4402a WHIRLPOOL 62e68d1ef8aaa4963765599ca6701af18bcdef8f6a20607ce433b5294baa9c5ba75b3d41266d9a8bd82febe3a3ac75c6fcb2326fbc5cafa31634ec96a4407b10 -AUX ufw-0.33-conntrack.patch 10055 SHA256 e034feba3bdeca0d4e9aed0555d88838e49804542174b988f9a7fbf8b8dc759d SHA512 7de6358ec0bf6696c4c26aab2729b9160e16ce44a67b5b634ad935fb4bf218b1b79d599f9d679f8f2a147861d865a098729fe3dbc0db110135bf5a78acfd6d53 WHIRLPOOL a3d543abf0ac1d6ca11a4754ab296c9e6f28809e8b746986524aa5d0e162f78d5a5abd586ff172618e8d79354c43429de3cc0b0e9a3d1bf91d662071c3cd2cfc AUX ufw-0.33-dont-check-iptables.patch 1659 SHA256 8a3ae20d399e83aa9c779dfed1f65d99b277263681b1a3e7e9e86143d5fabd0a SHA512 8f92d4b79f1caf01cb97ec64014c7607a410fb0a36e5e87376707c026d714a060ae554591b6e5b3834b671acd4145dcca68a9373aa41051ef60c9dd409dd008d WHIRLPOOL 8f897654bde85d84b17dc32507c5a469fe04eb2201acb55bfd02a76346620399dbcb9c7d0ce19f48285f6eec5de0a5d96420483d6a0b7a4c31a41fa329f91180 +AUX ufw-0.34_pre805-shebang.patch 675 SHA256 4348689359f3d80c1bcfe66d12710578ba31a5382bf078242b84e86f7233e38d SHA512 8954f679a993d65cb880ffce09b448626fd64dea93257f0faa97b8bec76dcbbda4fb0d19408655d6db387066a0ac94b962dca2e5febcc5b5685e9b16b97b4cad WHIRLPOOL 44c83c5e1795fa0db7ed40d1440df7b4220b869bd42a294ba0d8262fbb2b2e114154d0ce9a22e100db8ad7c1cd402eefacfe854679e7caecda4a251d98720f03 AUX ufw-2.initd 2722 SHA256 657b5305923b2a5de9eb96931aaaa28d6e997ace6c40793d905887798094258c SHA512 54cb84ae5ce2c327a7a7b03deeed3d7507a4716ce929aa563d4fb5baa9aa73d95575ec7d5db7165345310869bd5a60b1033c6691f02a85ab94baa6b4a550daa7 WHIRLPOOL c19a21c93f0c63165715e8da4ab9b16a4596ccc3730118c1bbd7eb4de9a94b2b1475904818a2786b2490a07dee7d761da28ca6dc087926c27598d691cb333ce6 -AUX ufw-dont-check-iptables.patch 1572 SHA256 2ea0f9525baa82386690577525631f468e56a0fbde0e7e5a65fba36c922ea96f SHA512 c072e924ed5c7df37d89dd9dc8ecb9a52f16fcd962a31d97f45cecefb971adcceabff183bec386be29f44942d12f8bce595ff4203e390ce464627458843b19cb WHIRLPOOL a1ee6799042353f32a1746b14017403994d60dc1ba7e67581ebdff3d93e37e72c7224708d2c0d1bef25ce311ad5c647cd5f0fa62ea4da60321e47f922f64c54d AUX ufw.confd 219 SHA256 069aa7382b40aecebf26ef53f3f4c49890314e0357925c84b3c15f1d0b913be0 SHA512 a010532c97b9cf83f1fb5fa707228e0542a8b109c76e5942aaf2d6552c63e033d32e39e5a6ac87cb9e2ed4c3fdbc5d03c75127e6378665e592b143bc1eda52c7 WHIRLPOOL e6c4537392921c63f8a57fab7ea269fbeea846468ef8968816d988556557495e8abb77aee9d60648a1483a599683613cf5ea832cbcf498a8828baa9abcd31752 AUX ufw.service 329 SHA256 1c600d9b9425485a0536fdf77a39fbf94bfcaade686789d6c4f3f1aac08ffe69 SHA512 a365e704ca958c83c86f8a6b1623ce3f9ad72dcfb0cfc7758bfc787e0877f897ccf8b200db83df17130ca5dcc54f938178b8cabfe3ee0c0896c814ee7d2439c7 WHIRLPOOL a00069a5582b9c52b5ff9a9c88b03294140dd06596ea0fbcbd0e7f6de016b1eed97840728c932a82f18762c84c9e8849f86ee504b49931420f2d097bb9b0ebd6 -DIST ufw-0.31.1.tar.gz 322448 SHA256 ccf5e00aa76841b9467ad9506fbf96373fb24a4b26bffd858ea1eb2522491dcb SHA512 3c9e61be7ba18ccdbd8195517f0b74a418b460f91b6efcdf0d883fc1dca2bc376ee317836882b67d2fd4825c2e5374d9c6a5da3d77f98794b64c98071d3ac0dc WHIRLPOOL 35064e73f892d6a94413f3560f5f0af945c972b673da4980af0a60576cc641810a74d76ed196935abaf9c2b395c2cc7250b6d27e710e284cbf2df014a6f0820d -DIST ufw-0.33.tar.gz 332893 SHA256 5f85a8084ad3539b547bec097286948233188c971f498890316dec170bdd1da8 SHA512 a908d0a2c74bedef418b28f1701048bc9281f314ff747fb1e9497ddee341dbf86402215c470b605523b03a12b2dec812cd7342c310c04231dbed5b6f8e783309 WHIRLPOOL bdd09fbdc2514061b6971e06fa05d6fee04e29c2cecf0c12b237349071e88d188aa8a7bd5c54f5cf3cccd4ddf8d2e3d2bb6ed0db92538b7d76cea471d74848c1 DIST ufw-0.34_pre805.tar.gz 335875 SHA256 a78693da04720f9f7eb463447b940eed18c3e2c20d3de336ebf9bf821dfdac2f SHA512 b8bba3bb8c423070d6434d1df7274423edf3a356415f54c6448fa0ff2d13a4b2ac21c4bb627cba01d6955b04f793eeaf2fc535c6221e7de48f11bef745035263 WHIRLPOOL 5e5238925d928e883c9869b3b72a7a04ad18352ebbcb5fead9b14c7bb5225f1bbae613d9117ceb5e9d435e1ca1f1d0d033bbdf673896990eda5efcb7a7d04829 -EBUILD ufw-0.31.1-r2.ebuild 5587 SHA256 8ff4d7fcf67686d85b18cc094c19c7625d9e980f3c6747cca04c796c3c997e3a SHA512 ecea06b997f91cbed3500e84678c65a3ecd6eca9acfc877888ddabf6d4cbefd95a8f8c66f5f9185c5d4a06d92a31b7780bc4adfaefffb4ec4b6907d49fb2edbb WHIRLPOOL da35894ce419296a4ad415f05f84fbdea701200be55bcf8acd975a040fa6e1eb983d6e27f2ee31290e6c7b30803d19accf2470015aa4c331ee3d1615dab09903 -EBUILD ufw-0.33-r2.ebuild 5665 SHA256 77e14c04d236925a4608a55307dea92c137583a304d4cf685f87bcc114b3f26d SHA512 4614dcb6fd4f8d102fe344e7eac1f46d0c8ea8ed7153edd67111aab58e1f8c9ac37208da7fd5472dc6bad0081788d181e4062d58481f963663e9c9bc0993e043 WHIRLPOOL 6711f39ca765009e1a545787b18e11b67ec92a4dd11245c753b636c7ea865dbbbbd974fb542532f26a3dc119c0db0a3dc929549109b4b8fc5a6e76700c1ccdee +EBUILD ufw-0.34_pre805-r1.ebuild 5398 SHA256 16a2db7343801bcceda2d8400e24bab6ce00ab487d443131c3f58cce5550545d SHA512 af8fee0561f9051797e3412e289367e3b5e96ade120b13c10e408b280ba21795c669216ac4b987cd3657604a6ab52a11e355d6e1649be4c741834f50ee82a314 WHIRLPOOL 1d896cdc80da885c8ba252a03ec4eeaf443a54320eb750d7d28eff9e99f45b651ea9371705303ea191e7226646368df3bd4d6e4161110f60007820d4023e51dd EBUILD ufw-0.34_pre805.ebuild 5415 SHA256 2a5191348122b729d4cefccb4f65e9714c704e61afff25dcedc530e12284c5a2 SHA512 378e32a0e135eafc33cb2134a26a0fa9590b86d9abd8008bb7086d0739a0e106f36cc127069d5145659dce9607734b6344804dc0b3914ae7efdc867885c1b504 WHIRLPOOL 13cdf52c7824fd06d407e0e3bd8333fda9dc7f6af2164b6cfe1ed95fab4ddf313df347c86793ee9e4d26b805bcd7118e4c38cce4cee2041ea5fe15900f51a788 -MISC ChangeLog 3412 SHA256 e40b5094a14577b02edf32e128c1007ffb3ed1e3428fd92752746bddd4031cfc SHA512 891a4f1369ae1926e65f4744544142f70c7ebb7ec9d1ac4d9f421f9c848e863743b2b593447c16b67bc30f1bb55b8ffae65e0d297344e09142cc0d36ffa1b536 WHIRLPOOL c360c1bb16cec63b6b8bcae25d5959427bcac9ac82186ab1f4b585c26ae0771179a026f8112e7ed9672cc6364d612a3a866e20180aeb65c6e4d592574309ac53 +MISC ChangeLog 3782 SHA256 57d502ce1fc9cfd551340cda1a91dbace28b6cb8ca8e6ac2d4390d8d7eeb55a3 SHA512 27996559c555d51f639bf4be0175d0476a6bcecf1bb7fc15dd912a08d77f664589f2649fd5e3830aa6f387cb467aa726f071e10d36f36f6e3bf5a1e90d769c56 WHIRLPOOL 9ad88aa37ad391a0c48450871615ab82d7ad07e9c5eecd6992035f3a17a7d973a924b177f0620b688cb8941ba07e1df0b1edfa725171df1d493dbc3860f270ef MISC metadata.xml 568 SHA256 0fea99101adbd93b9a644642cf668a7cb5d6392c840b66b4c8aca504985c4033 SHA512 5ac4c205a5df4c0bf11f22d442457c5a50535ebf007fb01bb07e9480f9d854eb053bdd220519e37e0602e1d3ec0043bab7e1865bf9c2e8339b76538719285e96 WHIRLPOOL 122348f9b736392521b10685d03ce3105abec78c8a1378ed1e1b86f9bf6097b1b6be66ce172e1cc92e813c21c8722a4f44e52ee63bfd2c327c9e2c844faf1d13 -----BEGIN PGP SIGNATURE----- -Version: GnuPG v2.0.19 (GNU/Linux) +Version: GnuPG v2 -iEYEAREIAAYFAlGZ51wACgkQfaj9zK3JFuU8agCfaSghPqtPnfhwkx1lEMazNSq5 -iyEAnjHVFS+FmCLVkeQ5tpq6WzXjjixH -=Uc3e +iQIcBAEBCAAGBQJTx3NWAAoJEJIMDbyqvv1V6ksQAN2wS6+fKeGlg4v6Rjt2N8b6 +TyAlOZtj0KBAU0gP02NT81w7ZO+Q+Va2HUVTE7tiLK7tbAFbsmM4kszerGfmn7WK +dMZCgXsdlLe8mFEtR2o+UihlDGD3lMQW936JTR26YfuFEGR9USr9GT2ymzroyyx1 +Cs4liRN+pGSylRQOCZePx7GzhbZ6UQCsR13CTj2vCLlnqTNiznTQIZQ8pUhmN8Yp +GFCRM2ZeVroJ/DyK7rzJPP8jMi/osA6r9zjGpb+742IDEhq5jAhj4swvVp0R3rx1 +inwRAvF0xDP/SvFAAtQdPz/TmpgXLKcaXwV30mL5xqd0c2/irhi33nl0SUnnbc/7 +5FKobS80OvkC65XRp3OE3xYuv3plKF+VZRyfHkCYxk0+lG6Gv2q5Hu9Fb7AvxWaN +kv9RSeakgJo4DFxZX0Ao6nTaqbudsKbDtucugNLjJ6nfXOXprQeXS8Z/R+y5qhRr +poe2M7hxnZT8dDxOES6rb0AtcfDP21mu2de+Urw9DtPCg3CG/auuJ/m0k0LPnwnn +WBMbFab1JXGP9w4TRoCYMmO8lTeq2AIhvEJhJ0y0DBw5IRGS4l4toTblRaIHTQGH +m9ncK2bTw9Y5LZAlVE1vJnEIroW9+xhNhacOreEOI871wswZ0eNZIqv2KHI55YQW +Ij9VMfFVa50TWS8uiPi6 +=5To4 -----END PGP SIGNATURE----- diff --git a/net-firewall/ufw/files/ufw-0.31.1-conntrack.patch b/net-firewall/ufw/files/ufw-0.31.1-conntrack.patch deleted file mode 100644 index 6a7e6924c53f..000000000000 --- a/net-firewall/ufw/files/ufw-0.31.1-conntrack.patch +++ /dev/null @@ -1,201 +0,0 @@ -use conntrack instead of state -https://bugs.launchpad.net/ufw/+bug/1065297 - -This is a version for ufw 0.31.1. -diff --git a/conf/before.rules b/conf/before.rules -index bc11f36..9917b87 100644 ---- a/conf/before.rules -+++ b/conf/before.rules -@@ -22,12 +22,12 @@ - -A ufw-before-output -o lo -j ACCEPT - - # quickly process packets for which we already have a connection ---A ufw-before-input -m state --state RELATED,ESTABLISHED -j ACCEPT ---A ufw-before-output -m state --state RELATED,ESTABLISHED -j ACCEPT -+-A ufw-before-input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -+-A ufw-before-output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT - - # drop INVALID packets (logs these in loglevel medium and higher) ---A ufw-before-input -m state --state INVALID -j ufw-logging-deny ---A ufw-before-input -m state --state INVALID -j DROP -+-A ufw-before-input -m conntrack --ctstate INVALID -j ufw-logging-deny -+-A ufw-before-input -m conntrack --ctstate INVALID -j DROP - - # ok icmp codes - -A ufw-before-input -p icmp --icmp-type destination-unreachable -j ACCEPT -diff --git a/conf/before6.rules b/conf/before6.rules -index fb1a8f1..8b7e4ff 100644 ---- a/conf/before6.rules -+++ b/conf/before6.rules -@@ -34,16 +34,16 @@ - -A ufw6-before-input -p icmpv6 --icmpv6-type router-advertisement -m hl --hl-eq 255 -j ACCEPT - - # quickly process packets for which we already have a connection ---A ufw6-before-input -m state --state RELATED,ESTABLISHED -j ACCEPT ---A ufw6-before-output -m state --state RELATED,ESTABLISHED -j ACCEPT -+-A ufw6-before-input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -+-A ufw6-before-output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT - - # for multicast ping replies from link-local addresses (these don't have an - # associated connection and would otherwise be marked INVALID) - -A ufw6-before-input -p icmpv6 --icmpv6-type echo-reply -s fe80::/10 -j ACCEPT - - # drop INVALID packets (logs these in loglevel medium and higher) ---A ufw6-before-input -m state --state INVALID -j ufw6-logging-deny ---A ufw6-before-input -m state --state INVALID -j DROP -+-A ufw6-before-input -m conntrack --ctstate INVALID -j ufw6-logging-deny -+-A ufw6-before-input -m conntrack --ctstate INVALID -j DROP - - # ok icmp codes - -A ufw6-before-input -p icmpv6 --icmpv6-type destination-unreachable -j ACCEPT -diff --git a/doc/ufw-framework.8 b/doc/ufw-framework.8 -index d9e3d5a..bfc83e2 100644 ---- a/doc/ufw-framework.8 -+++ b/doc/ufw-framework.8 -@@ -167,9 +167,9 @@ Edit #CONFIG_PREFIX#/ufw/sysctl.conf to have: - net.ipv4.ip_forward=1 - .TP - Add to the *filter section of #CONFIG_PREFIX#/ufw/before.rules: -- \-A ufw\-before\-forward \-m state \-\-state RELATED,ESTABLISHED \\ -+ \-A ufw\-before\-forward \-m conntrack \-\-ctstate RELATED,ESTABLISHED \\ - \-j ACCEPT -- \-A ufw\-before\-forward \-m state \-\-state NEW \-i eth0 \\ -+ \-A ufw\-before\-forward \-m conntrack \-\-ctstate NEW \-i eth0 \\ - \-d 10.0.0.2 \-p tcp \-\-dport 80 \-j ACCEPT - .TP - Add to the end of #CONFIG_PREFIX#/ufw/before.rules, after the *filter section: -@@ -209,13 +209,13 @@ Edit #CONFIG_PREFIX#/ufw/sysctl.conf to have: - net.ipv4.ip_forward=1 - .TP - Add to the *filter section of #CONFIG_PREFIX#/ufw/before.rules: -- \-A ufw\-before\-forward \-m state \-\-state RELATED,ESTABLISHED \\ -+ \-A ufw\-before\-forward \-m conntrack \-\-ctstate RELATED,ESTABLISHED \\ - \-j ACCEPT - -- \-A ufw\-before\-forward \-i eth1 \-s 10.0.0.0/8 \-o eth0 \-m state \\ -- \-\-state NEW \-j ACCEPT -+ \-A ufw\-before\-forward \-i eth1 \-s 10.0.0.0/8 \-o eth0 \-m conntrack \\ -+ \-\-ctstate NEW \-j ACCEPT - -- \-A ufw\-before\-forward \-m state \-\-state NEW \-i eth0 \\ -+ \-A ufw\-before\-forward \-m conntrack \-\-ctstate NEW \-i eth0 \\ - \-d 10.0.0.2 \-p tcp \-\-dport 80 \-j ACCEPT - - \-A ufw\-before\-forward \-o eth0 \-d 10.0.0.0/8 \-j REJECT -diff --git a/src/backend_iptables.py b/src/backend_iptables.py -index 340beba..4459a3b 100644 ---- a/src/backend_iptables.py -+++ b/src/backend_iptables.py -@@ -551,7 +551,7 @@ class UFWBackendIptables(ufw.backend.UFWBackend): - lstr = '%s -j LOG --log-prefix "[UFW %s] "' % (limit_args, \ - policy) - if not pat_logall.search(s): -- lstr = '-m state --state NEW ' + lstr -+ lstr = '-m conntrack --ctstate NEW ' + lstr - snippets[i] = pat_log.sub(r'\1-j \2\4', s) - snippets.insert(i, pat_log.sub(r'\1-j ' + prefix + \ - '-user-logging-' + suffix, s)) -@@ -567,9 +567,9 @@ class UFWBackendIptables(ufw.backend.UFWBackend): - pat_limit = re.compile(r' -j LIMIT') - for i, s in enumerate(snippets): - if pat_limit.search(s): -- tmp1 = pat_limit.sub(' -m state --state NEW -m recent --set', \ -+ tmp1 = pat_limit.sub(' -m conntrack --ctstate NEW -m recent --set', \ - s) -- tmp2 = pat_limit.sub(' -m state --state NEW -m recent' + \ -+ tmp2 = pat_limit.sub(' -m conntrack --ctstate NEW -m recent' + \ - ' --update --seconds 30 --hitcount 6' + \ - ' -j ' + prefix + '-user-limit', s) - tmp3 = pat_limit.sub(' -j ' + prefix + '-user-limit-accept', s) -@@ -1178,12 +1178,12 @@ class UFWBackendIptables(ufw.backend.UFWBackend): - prefix = "[UFW BLOCK] " - if self.loglevels[level] < self.loglevels["medium"]: - # only log INVALID in medium and higher -- rules_t.append([c, ['-I', c, '-m', 'state', \ -- '--state', 'INVALID', \ -+ rules_t.append([c, ['-I', c, '-m', 'conntrack', \ -+ '--ctstate', 'INVALID', \ - '-j', 'RETURN'] + largs, '']) - else: -- rules_t.append([c, ['-A', c, '-m', 'state', \ -- '--state', 'INVALID', \ -+ rules_t.append([c, ['-A', c, '-m', 'conntrack', \ -+ '--ctstate', 'INVALID', \ - '-j', 'LOG', \ - '--log-prefix', \ - "[UFW AUDIT INVALID] "] + \ -@@ -1202,7 +1202,7 @@ class UFWBackendIptables(ufw.backend.UFWBackend): - - # loglevel medium logs all new packets with limit - if self.loglevels[level] < self.loglevels["high"]: -- largs = ['-m', 'state', '--state', 'NEW'] + limit_args -+ largs = ['-m', 'conntrack', '--ctstate', 'NEW'] + limit_args - - prefix = "[UFW AUDIT] " - for c in self.chains['before']: -diff --git a/src/ufw-init-functions b/src/ufw-init-functions -index f4783e7..c5e0319 100755 ---- a/src/ufw-init-functions -+++ b/src/ufw-init-functions -@@ -251,15 +251,15 @@ ufw_start() { - # add tracking policy - if [ "$DEFAULT_INPUT_POLICY" = "ACCEPT" ]; then - printf "*filter\n"\ --"-A ufw${type}-track-input -p tcp -m state --state NEW -j ACCEPT\n"\ --"-A ufw${type}-track-input -p udp -m state --state NEW -j ACCEPT\n"\ -+"-A ufw${type}-track-input -p tcp -m conntrack --ctstate NEW -j ACCEPT\n"\ -+"-A ufw${type}-track-input -p udp -m conntrack --ctstate NEW -j ACCEPT\n"\ - "COMMIT\n" | $exe-restore -n || error="yes" - fi - - if [ "$DEFAULT_OUTPUT_POLICY" = "ACCEPT" ]; then - printf "*filter\n"\ --"-A ufw${type}-track-output -p tcp -m state --state NEW -j ACCEPT\n"\ --"-A ufw${type}-track-output -p udp -m state --state NEW -j ACCEPT\n"\ -+"-A ufw${type}-track-output -p tcp -m conntrack --ctstate NEW -j ACCEPT\n"\ -+"-A ufw${type}-track-output -p udp -m conntrack --ctstate NEW -j ACCEPT\n"\ - "COMMIT\n" | $exe-restore -n || error="yes" - fi - -diff --git a/tests/check-requirements b/tests/check-requirements -index dbb26ec..d3ad1f8 100755 ---- a/tests/check-requirements -+++ b/tests/check-requirements -@@ -152,32 +152,32 @@ for i in "" 6; do - done - - echo -n "hashlimit: " -- runcmd $exe -A $c -m hashlimit -m tcp -p tcp --dport 22 --hashlimit 1/min --hashlimit-mode srcip --hashlimit-name ssh -m state --state NEW -j ACCEPT -+ runcmd $exe -A $c -m hashlimit -m tcp -p tcp --dport 22 --hashlimit 1/min --hashlimit-mode srcip --hashlimit-name ssh -m conntrack --ctstate NEW -j ACCEPT - - echo -n "limit: " - runcmd $exe -A $c -m limit --limit 3/min --limit-burst 10 -j ACCEPT - - for j in NEW RELATED ESTABLISHED INVALID; do - echo -n "state ($j): " -- runcmd $exe -A $c -m state --state $j -+ runcmd $exe -A $c -m conntrack --ctstate $j - done - - echo -n "state (new, recent set): " - if [ "$i" = "6" ]; then - echo "skipped -- IPv6 'limit' not supported by ufw yet" - else -- runcmd $exe -A $c -m state --state NEW -m recent --set -+ runcmd $exe -A $c -m conntrack --ctstate NEW -m recent --set - fi - - echo -n "state (new, recent update): " - if [ "$i" = "6" ]; then - echo "skipped -- IPv6 'limit' not supported by ufw yet" - else -- runcmd $exe -A $c -m state --state NEW -m recent --update --seconds 30 --hitcount 6 -j ACCEPT -+ runcmd $exe -A $c -m conntrack --ctstate NEW -m recent --update --seconds 30 --hitcount 6 -j ACCEPT - fi - - echo -n "state (new, limit): " -- runcmd $exe -A $c -m state --state NEW -m limit --limit 3/min --limit-burst 10 -j ACCEPT -+ runcmd $exe -A $c -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j ACCEPT - - echo -n "interface (input): " - runcmd $exe -A $c -i eth0 -j ACCEPT diff --git a/net-firewall/ufw/files/ufw-0.33-conntrack.patch b/net-firewall/ufw/files/ufw-0.33-conntrack.patch deleted file mode 100644 index 36eee8e76505..000000000000 --- a/net-firewall/ufw/files/ufw-0.33-conntrack.patch +++ /dev/null @@ -1,187 +0,0 @@ -use conntrack instead of state -https://bugs.launchpad.net/ufw/+bug/1065297 -diff -urp ufw-0.33.orig/conf/before6.rules ufw-0.33/conf/before6.rules ---- ufw-0.33.orig/conf/before6.rules 2012-10-10 22:26:26.021931270 +0200 -+++ ufw-0.33/conf/before6.rules 2012-10-10 22:38:58.803605951 +0200 -@@ -34,16 +34,16 @@ - -A ufw6-before-input -p icmpv6 --icmpv6-type router-advertisement -m hl --hl-eq 255 -j ACCEPT - - # quickly process packets for which we already have a connection ---A ufw6-before-input -m state --state RELATED,ESTABLISHED -j ACCEPT ---A ufw6-before-output -m state --state RELATED,ESTABLISHED -j ACCEPT -+-A ufw6-before-input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -+-A ufw6-before-output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT - - # for multicast ping replies from link-local addresses (these don't have an - # associated connection and would otherwise be marked INVALID) - -A ufw6-before-input -p icmpv6 --icmpv6-type echo-reply -s fe80::/10 -j ACCEPT - - # drop INVALID packets (logs these in loglevel medium and higher) ---A ufw6-before-input -m state --state INVALID -j ufw6-logging-deny ---A ufw6-before-input -m state --state INVALID -j DROP -+-A ufw6-before-input -m conntrack --ctstate INVALID -j ufw6-logging-deny -+-A ufw6-before-input -m conntrack --ctstate INVALID -j DROP - - # ok icmp codes - -A ufw6-before-input -p icmpv6 --icmpv6-type destination-unreachable -j ACCEPT -diff -urp ufw-0.33.orig/conf/before.rules ufw-0.33/conf/before.rules ---- ufw-0.33.orig/conf/before.rules 2012-10-10 22:26:26.021931270 +0200 -+++ ufw-0.33/conf/before.rules 2012-10-10 22:38:17.442349148 +0200 -@@ -22,12 +22,12 @@ - -A ufw-before-output -o lo -j ACCEPT - - # quickly process packets for which we already have a connection ---A ufw-before-input -m state --state RELATED,ESTABLISHED -j ACCEPT ---A ufw-before-output -m state --state RELATED,ESTABLISHED -j ACCEPT -+-A ufw-before-input -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -+-A ufw-before-output -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT - - # drop INVALID packets (logs these in loglevel medium and higher) ---A ufw-before-input -m state --state INVALID -j ufw-logging-deny ---A ufw-before-input -m state --state INVALID -j DROP -+-A ufw-before-input -m conntrack --ctstate INVALID -j ufw-logging-deny -+-A ufw-before-input -m conntrack --ctstate INVALID -j DROP - - # ok icmp codes - -A ufw-before-input -p icmp --icmp-type destination-unreachable -j ACCEPT -diff -urp ufw-0.33.orig/doc/ufw-framework.8 ufw-0.33/doc/ufw-framework.8 ---- ufw-0.33.orig/doc/ufw-framework.8 2012-10-10 22:26:26.020931143 +0200 -+++ ufw-0.33/doc/ufw-framework.8 2012-10-10 23:06:21.407372442 +0200 -@@ -167,9 +167,9 @@ Edit #CONFIG_PREFIX#/ufw/sysctl.conf to - net.ipv4.ip_forward=1 - .TP - Add to the *filter section of #CONFIG_PREFIX#/ufw/before.rules: -- \-A ufw\-before\-forward \-m state \-\-state RELATED,ESTABLISHED \\ -- \-j ACCEPT -- \-A ufw\-before\-forward \-m state \-\-state NEW \-i eth0 \\ -+ \-A ufw\-before\-forward \-m conntrack \\ -+ \-\-ctstate RELATED,ESTABLISHED \-j ACCEPT -+ \-A ufw\-before\-forward \-m conntrack \-\-ctstate NEW \-i eth0 \\ - \-d 10.0.0.2 \-p tcp \-\-dport 80 \-j ACCEPT - .TP - Add to the end of #CONFIG_PREFIX#/ufw/before.rules, after the *filter section: -@@ -209,13 +209,13 @@ Edit #CONFIG_PREFIX#/ufw/sysctl.conf to - net.ipv4.ip_forward=1 - .TP - Add to the *filter section of #CONFIG_PREFIX#/ufw/before.rules: -- \-A ufw\-before\-forward \-m state \-\-state RELATED,ESTABLISHED \\ -- \-j ACCEPT -+ \-A ufw\-before\-forward \-m conntrack \\ -+ \-\-ctstate RELATED,ESTABLISHED \-j ACCEPT - -- \-A ufw\-before\-forward \-i eth1 \-s 10.0.0.0/8 \-o eth0 \-m state \\ -- \-\-state NEW \-j ACCEPT -+ \-A ufw\-before\-forward \-i eth1 \-s 10.0.0.0/8 \-o eth0 \\ -+ \-m conntrack \-\-ctstate NEW \-j ACCEPT - -- \-A ufw\-before\-forward \-m state \-\-state NEW \-i eth0 \\ -+ \-A ufw\-before\-forward \-m conntrack \-\-ctstate NEW \-i eth0 \\ - \-d 10.0.0.2 \-p tcp \-\-dport 80 \-j ACCEPT - - \-A ufw\-before\-forward \-o eth0 \-d 10.0.0.0/8 \-j REJECT -diff -urp ufw-0.33.orig/src/backend_iptables.py ufw-0.33/src/backend_iptables.py ---- ufw-0.33.orig/src/backend_iptables.py 2012-10-10 22:26:26.022931397 +0200 -+++ ufw-0.33/src/backend_iptables.py 2012-10-10 22:29:53.981361845 +0200 -@@ -558,7 +558,7 @@ class UFWBackendIptables(ufw.backend.UFW - lstr = '%s -j LOG --log-prefix "[UFW %s] "' % (limit_args, \ - policy) - if not pat_logall.search(s): -- lstr = '-m state --state NEW ' + lstr -+ lstr = '-m conntrack --ctstate NEW ' + lstr - snippets[i] = pat_log.sub(r'\1-j \2\4', s) - snippets.insert(i, pat_log.sub(r'\1-j ' + prefix + \ - '-user-logging-' + suffix, s)) -@@ -574,9 +574,9 @@ class UFWBackendIptables(ufw.backend.UFW - pat_limit = re.compile(r' -j LIMIT') - for i, s in enumerate(snippets): - if pat_limit.search(s): -- tmp1 = pat_limit.sub(' -m state --state NEW -m recent --set', \ -+ tmp1 = pat_limit.sub(' -m conntrack --ctstate NEW -m recent --set', \ - s) -- tmp2 = pat_limit.sub(' -m state --state NEW -m recent' + \ -+ tmp2 = pat_limit.sub(' -m conntrack --ctstate NEW -m recent' + \ - ' --update --seconds 30 --hitcount 6' + \ - ' -j ' + prefix + '-user-limit', s) - tmp3 = pat_limit.sub(' -j ' + prefix + '-user-limit-accept', s) -@@ -1196,12 +1196,12 @@ class UFWBackendIptables(ufw.backend.UFW - prefix = "[UFW BLOCK] " - if self.loglevels[level] < self.loglevels["medium"]: - # only log INVALID in medium and higher -- rules_t.append([c, ['-I', c, '-m', 'state', \ -- '--state', 'INVALID', \ -+ rules_t.append([c, ['-I', c, '-m', 'conntrack', \ -+ '--ctstate', 'INVALID', \ - '-j', 'RETURN'] + largs, '']) - else: -- rules_t.append([c, ['-A', c, '-m', 'state', \ -- '--state', 'INVALID', \ -+ rules_t.append([c, ['-A', c, '-m', 'conntrack', \ -+ '--ctstate', 'INVALID', \ - '-j', 'LOG', \ - '--log-prefix', \ - "[UFW AUDIT INVALID] "] + \ -@@ -1220,7 +1220,7 @@ class UFWBackendIptables(ufw.backend.UFW - - # loglevel medium logs all new packets with limit - if self.loglevels[level] < self.loglevels["high"]: -- largs = ['-m', 'state', '--state', 'NEW'] + limit_args -+ largs = ['-m', 'conntrack', '--ctstate', 'NEW'] + limit_args - - prefix = "[UFW AUDIT] " - for c in self.chains['before']: -diff -urp ufw-0.33.orig/src/ufw-init-functions ufw-0.33/src/ufw-init-functions ---- ufw-0.33.orig/src/ufw-init-functions 2012-10-10 22:26:26.023931524 +0200 -+++ ufw-0.33/src/ufw-init-functions 2012-10-10 22:48:38.305257627 +0200 -@@ -251,15 +251,15 @@ ufw_start() { - # add tracking policy - if [ "$DEFAULT_INPUT_POLICY" = "ACCEPT" ]; then - printf "*filter\n"\ --"-A ufw${type}-track-input -p tcp -m state --state NEW -j ACCEPT\n"\ --"-A ufw${type}-track-input -p udp -m state --state NEW -j ACCEPT\n"\ -+"-A ufw${type}-track-input -p tcp -m conntrack --ctstate NEW -j ACCEPT\n"\ -+"-A ufw${type}-track-input -p udp -m conntrack --ctstate NEW -j ACCEPT\n"\ - "COMMIT\n" | $exe-restore -n || error="yes" - fi - - if [ "$DEFAULT_OUTPUT_POLICY" = "ACCEPT" ]; then - printf "*filter\n"\ --"-A ufw${type}-track-output -p tcp -m state --state NEW -j ACCEPT\n"\ --"-A ufw${type}-track-output -p udp -m state --state NEW -j ACCEPT\n"\ -+"-A ufw${type}-track-output -p tcp -m conntrack --ctstate NEW -j ACCEPT\n"\ -+"-A ufw${type}-track-output -p udp -m conntrack --ctstate NEW -j ACCEPT\n"\ - "COMMIT\n" | $exe-restore -n || error="yes" - fi - -diff -urp ufw-0.33.orig/tests/check-requirements ufw-0.33/tests/check-requirements ---- ufw-0.33.orig/tests/check-requirements 2012-10-10 22:26:25.944921482 +0200 -+++ ufw-0.33/tests/check-requirements 2012-10-10 22:41:54.378920671 +0200 -@@ -167,24 +167,24 @@ for i in "" 6; do - done - - echo -n "hashlimit: " -- runcmd $exe -A $c -m hashlimit -m tcp -p tcp --dport 22 --hashlimit 1/min --hashlimit-mode srcip --hashlimit-name ssh -m state --state NEW -j ACCEPT -+ runcmd $exe -A $c -m hashlimit -m tcp -p tcp --dport 22 --hashlimit 1/min --hashlimit-mode srcip --hashlimit-name ssh -m conntrack --ctstate NEW -j ACCEPT - - echo -n "limit: " - runcmd $exe -A $c -m limit --limit 3/min --limit-burst 10 -j ACCEPT - - for j in NEW RELATED ESTABLISHED INVALID; do - echo -n "state ($j): " -- runcmd $exe -A $c -m state --state $j -+ runcmd $exe -A $c -m conntrack --ctstate $j - done - - echo -n "state (new, recent set): " -- runcmd runtime $exe -A $c -m state --state NEW -m recent --set -+ runcmd runtime $exe -A $c -m conntrack --ctstate NEW -m recent --set - - echo -n "state (new, recent update): " -- runcmd runtime $exe -A $c -m state --state NEW -m recent --update --seconds 30 --hitcount 6 -j ACCEPT -+ runcmd runtime $exe -A $c -m conntrack --ctstate NEW -m recent --update --seconds 30 --hitcount 6 -j ACCEPT - - echo -n "state (new, limit): " -- runcmd $exe -A $c -m state --state NEW -m limit --limit 3/min --limit-burst 10 -j ACCEPT -+ runcmd $exe -A $c -m conntrack --ctstate NEW -m limit --limit 3/min --limit-burst 10 -j ACCEPT - - echo -n "interface (input): " - runcmd $exe -A $c -i eth0 -j ACCEPT diff --git a/net-firewall/ufw/files/ufw-0.34_pre805-shebang.patch b/net-firewall/ufw/files/ufw-0.34_pre805-shebang.patch new file mode 100644 index 000000000000..991f4c826ece --- /dev/null +++ b/net-firewall/ufw/files/ufw-0.34_pre805-shebang.patch @@ -0,0 +1,15 @@ +--- a/setup.py ++++ b/setup.py +@@ -107,12 +107,6 @@ class Install(_install, object): + for f in [ script, manpage, manpage_f ]: + self.mkpath(os.path.dirname(f)) + +- # update the interpreter to that of the one the user specified for setup +- print("Updating staging/ufw to use %s" % (sys.executable)) +- subprocess.call(["sed", +- "-i", +- "1s%^#.*python.*%#! /usr/bin/env " + sys.executable + "%g", +- 'staging/ufw']) + self.copy_file('staging/ufw', script) + self.copy_file('doc/ufw.8', manpage) + self.copy_file('doc/ufw-framework.8', manpage_f) diff --git a/net-firewall/ufw/files/ufw-dont-check-iptables.patch b/net-firewall/ufw/files/ufw-dont-check-iptables.patch deleted file mode 100644 index 1ce2086d666d..000000000000 --- a/net-firewall/ufw/files/ufw-dont-check-iptables.patch +++ /dev/null @@ -1,45 +0,0 @@ ---- setup.py 2011-03-22 19:00:03.000000000 +0100 -+++ setup.py 2011-06-10 19:28:41.798000241 +0200 -@@ -224,41 +224,7 @@ - os.unlink(os.path.join('staging', 'ufw-init')) - os.unlink(os.path.join('staging', 'ufw-init-functions')) - --iptables_exe = '' --iptables_dir = '' -- --for e in ['iptables']: -- for dir in ['/sbin', '/bin', '/usr/sbin', '/usr/bin', '/usr/local/sbin', \ -- '/usr/local/bin']: -- if e == "iptables": -- if os.path.exists(os.path.join(dir, e)): -- iptables_dir = dir -- iptables_exe = os.path.join(iptables_dir, "iptables") -- print "Found '%s'" % iptables_exe -- else: -- continue -- -- if iptables_exe != "": -- break -- -- --if iptables_exe == '': -- print >> sys.stderr, "ERROR: could not find required binary 'iptables'" -- sys.exit(1) -- --for e in ['ip6tables', 'iptables-restore', 'ip6tables-restore']: -- if not os.path.exists(os.path.join(iptables_dir, e)): -- print >> sys.stderr, "ERROR: could not find required binary '%s'" % (e) -- sys.exit(1) -- --(rc, out) = cmd([iptables_exe, '-V']) --if rc != 0: -- raise OSError(errno.ENOENT, "Could not find version for '%s'" % \ -- (iptables_exe)) --version = re.sub('^v', '', re.split('\s', out)[1]) --print "Found '%s' version '%s'" % (iptables_exe, version) --if version < "1.4": -- print >> sys.stderr, "WARN: version '%s' has limited IPv6 support. See README for details." % (version) -+iptables_dir = '/sbin' - - setup (name='ufw', - version=ufw_version, diff --git a/net-firewall/ufw/ufw-0.33-r2.ebuild b/net-firewall/ufw/ufw-0.33-r2.ebuild deleted file mode 100644 index 6a768533ce0e..000000000000 --- a/net-firewall/ufw/ufw-0.33-r2.ebuild +++ /dev/null @@ -1,184 +0,0 @@ -# Copyright 1999-2013 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/net-firewall/ufw/ufw-0.33-r2.ebuild,v 1.2 2013/05/20 09:05:50 lxnay Exp $ - -EAPI=4 -PYTHON_DEPEND="2:2.6 3:3.1" -SUPPORT_PYTHON_ABIS="1" -RESTRICT_PYTHON_ABIS="2.5 *-jython" - -inherit versionator bash-completion-r1 eutils linux-info distutils systemd - -MY_PV_12=$(get_version_component_range 1-2) -DESCRIPTION="A program used to manage a netfilter firewall" -HOMEPAGE="http://launchpad.net/ufw" -SRC_URI="http://launchpad.net/ufw/${MY_PV_12}/${PV}/+download/${P}.tar.gz" - -LICENSE="GPL-3" -SLOT="0" -KEYWORDS="~amd64 ~x86" -IUSE="examples" - -DEPEND="sys-devel/gettext" -# ipv6 forced: bug 437266 -RDEPEND=">=net-firewall/iptables-1.4[ipv6] - !<kde-misc/kcm-ufw-0.4.2 - !<net-firewall/ufw-frontends-0.3.2 -" - -# tests fail; upstream bug: https://bugs.launchpad.net/ufw/+bug/815982 -RESTRICT="test" - -pkg_pretend() { - local CONFIG_CHECK="~PROC_FS - ~NETFILTER_XT_MATCH_COMMENT ~NETFILTER_XT_MATCH_HL - ~NETFILTER_XT_MATCH_LIMIT ~NETFILTER_XT_MATCH_MULTIPORT - ~NETFILTER_XT_MATCH_RECENT ~NETFILTER_XT_MATCH_STATE" - - if kernel_is -ge 2 6 39; then - CONFIG_CHECK+=" ~NETFILTER_XT_MATCH_ADDRTYPE" - else - CONFIG_CHECK+=" ~IP_NF_MATCH_ADDRTYPE" - fi - - check_extra_config - - # Check for default, useful optional features. - if ! linux_config_exists; then - ewarn "Cannot determine configuration of your kernel." - return - fi - - if ! linux_chkconfig_present IPV6; then - echo - ewarn "This version of ufw requires that IPv6 is enabled." - ewarn "If you don't want it, install ${CATEGORY}/${PN}-0.31.1." - ewarn "More information can be found in bug 437266." - fi - - local nf_nat_ftp_ok="yes" - local nf_conntrack_ftp_ok="yes" - local nf_conntrack_netbios_ns_ok="yes" - - linux_chkconfig_present \ - NF_NAT_FTP || nf_nat_ftp_ok="no" - linux_chkconfig_present \ - NF_CONNTRACK_FTP || nf_conntrack_ftp_ok="no" - linux_chkconfig_present \ - NF_CONNTRACK_NETBIOS_NS || nf_conntrack_netbios_ns_ok="no" - - # This is better than an essay for each unset option... - if [[ ${nf_nat_ftp_ok} = no ]] || [[ ${nf_conntrack_ftp_ok} = no ]] \ - || [[ ${nf_conntrack_netbios_ns_ok} = no ]] - then - echo - local mod_msg="Kernel options listed below are not set. They are not" - mod_msg+=" mandatory, but they are often useful." - mod_msg+=" If you don't need some of them, please remove relevant" - mod_msg+=" module name(s) from IPT_MODULES in" - mod_msg+=" '${EROOT}etc/default/ufw' before (re)starting ufw." - mod_msg+=" Otherwise ufw may fail to start!" - ewarn "${mod_msg}" - if [[ ${nf_nat_ftp_ok} = no ]]; then - ewarn "NF_NAT_FTP: for better support for active mode FTP." - fi - if [[ ${nf_conntrack_ftp_ok} = no ]]; then - ewarn "NF_CONNTRACK_FTP: for better support for active mode FTP." - fi - if [[ ${nf_conntrack_netbios_ns_ok} = no ]]; then - ewarn "NF_CONNTRACK_NETBIOS_NS: for better Samba support." - fi - fi -} - -src_prepare() { - # Remove warning about 'state' being obsolete in iptables 1.4.16.2. - epatch "${FILESDIR}"/${P}-conntrack.patch - # Allow to remove unnecessary build time dependency - # on net-firewall/iptables. - epatch "${FILESDIR}"/${P}-dont-check-iptables.patch - # Move files away from /lib/ufw. - epatch "${FILESDIR}"/${PN}-0.31.1-move-path.patch - # Contains fixes related to SUPPORT_PYTHON_ABIS="1" (see comment in the - # file). - epatch "${FILESDIR}"/${PN}-0.31.1-python-abis.patch - - # Set as enabled by default. User can enable or disable - # the service by adding or removing it to/from a runlevel. - sed -i 's/^ENABLED=no/ENABLED=yes/' conf/ufw.conf \ - || die "sed failed (ufw.conf)" - - #sed -i "s/^IPV6=yes/IPV6=$(usex ipv6)/" conf/ufw.defaults || die - - # If LINGUAS is set install selected translations only. - if [[ -n ${LINGUAS+set} ]]; then - _EMPTY_LOCALE_LIST="yes" - pushd locales/po > /dev/null || die - - local lang - for lang in *.po; do - if ! has "${lang%.po}" ${LINGUAS}; then - rm "${lang}" || die - else - _EMPTY_LOCALE_LIST="no" - fi - done - - popd > /dev/null || die - else - _EMPTY_LOCALE_LIST="no" - fi -} - -src_install() { - newconfd "${FILESDIR}"/ufw.confd ufw - newinitd "${FILESDIR}"/ufw-2.initd ufw - systemd_dounit "${FILESDIR}/ufw.service" - - exeinto /usr/share/${PN} - doexe tests/check-requirements - - # users normally would want it - insinto /usr/share/doc/${PF}/logging/syslog-ng - doins "${FILESDIR}"/syslog-ng/* - - insinto /usr/share/doc/${PF}/logging/rsyslog - doins "${FILESDIR}"/rsyslog/* - doins doc/rsyslog.example - - if use examples; then - insinto /usr/share/doc/${PF}/examples - doins examples/* - fi - distutils_src_install - [[ $_EMPTY_LOCALE_LIST != yes ]] && domo locales/mo/*.mo - newbashcomp shell-completion/bash ${PN} -} - -pkg_postinst() { - distutils_pkg_postinst - if [[ -z ${REPLACING_VERSIONS} ]]; then - echo - elog "To enable ufw, add it to boot sequence and activate it:" - elog "-- # rc-update add ufw boot" - elog "-- # /etc/init.d/ufw start" - echo - elog "If you want to keep ufw logs in a separate file, take a look at" - elog "/usr/share/doc/${PF}/logging." - fi - if [[ -z ${REPLACING_VERSIONS} ]] \ - || [[ ${REPLACING_VERSIONS} < 0.33-r2 ]]; - then - # etc-update etc. should show when the file needs updating - # but let's inform about the change - echo - elog "Because of bug 437266 this version doesn't have ipv6 USE" - elog "flag, so in case it's needed, please adjust 'IPV6' setting" - elog "in /etc/default/ufw manually. (IPv6 is enabled there by default.)" - # TODO: add message about check-requirements script when this - # bug is fixed - fi - echo - ewarn "Note: once enabled, ufw blocks also incoming SSH connections by" - ewarn "default. See README, Remote Management section for more information." -} diff --git a/net-firewall/ufw/ufw-0.31.1-r2.ebuild b/net-firewall/ufw/ufw-0.34_pre805-r1.ebuild index 8b2ab05e32a9..420a9f3bb005 100644 --- a/net-firewall/ufw/ufw-0.31.1-r2.ebuild +++ b/net-firewall/ufw/ufw-0.34_pre805-r1.ebuild @@ -1,18 +1,16 @@ -# Copyright 1999-2013 Gentoo Foundation +# Copyright 1999-2014 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Header: /var/cvsroot/gentoo-x86/net-firewall/ufw/ufw-0.31.1-r2.ebuild,v 1.2 2013/05/20 09:05:50 lxnay Exp $ +# $Header: /var/cvsroot/gentoo-x86/net-firewall/ufw/ufw-0.34_pre805-r1.ebuild,v 1.1 2014/07/17 06:57:21 dlan Exp $ -EAPI=4 -PYTHON_DEPEND="2:2.5" -SUPPORT_PYTHON_ABIS="1" -RESTRICT_PYTHON_ABIS="3.* *-jython" +EAPI=5 +PYTHON_COMPAT=( python{2_7,3_2,3_3,3_4} ) +DISTUTILS_IN_SOURCE_BUILD=1 -inherit versionator bash-completion-r1 eutils linux-info distutils systemd +inherit bash-completion-r1 eutils linux-info distutils-r1 systemd -MY_PV_12=$(get_version_component_range 1-2) DESCRIPTION="A program used to manage a netfilter firewall" HOMEPAGE="http://launchpad.net/ufw" -SRC_URI="http://launchpad.net/ufw/${MY_PV_12}/${PV}/+download/${P}.tar.gz" +SRC_URI="mirror://sabayon/${CATEGORY}/${P}.tar.gz" LICENSE="GPL-3" SLOT="0" @@ -28,6 +26,15 @@ RDEPEND=">=net-firewall/iptables-1.4[ipv6?] # tests fail; upstream bug: https://bugs.launchpad.net/ufw/+bug/815982 RESTRICT="test" +PATCHES=( + # Remove unnecessary build time dependency on net-firewall/iptables. + "${FILESDIR}"/${PN}-0.33-dont-check-iptables.patch + # Move files away from /lib/ufw. + "${FILESDIR}"/${PN}-0.31.1-move-path.patch + # Remove shebang modification. + "${FILESDIR}"/${P}-shebang.patch +) + pkg_pretend() { local CONFIG_CHECK="~PROC_FS ~NETFILTER_XT_MATCH_COMMENT ~NETFILTER_XT_MATCH_HL @@ -40,6 +47,17 @@ pkg_pretend() { CONFIG_CHECK+=" ~IP_NF_MATCH_ADDRTYPE" fi + # https://bugs.launchpad.net/ufw/+bug/1076050 + if kernel_is -ge 3 4; then + CONFIG_CHECK+=" ~NETFILTER_XT_TARGET_LOG" + else + CONFIG_CHECK+=" ~IP_NF_TARGET_LOG" + use ipv6 && CONFIG_CHECK+=" ~IP6_NF_TARGET_LOG" + fi + + CONFIG_CHECK+=" ~IP_NF_TARGET_REJECT" + use ipv6 && CONFIG_CHECK+=" ~IP6_NF_TARGET_REJECT" + check_extra_config # Check for default, useful optional features. @@ -83,18 +101,7 @@ pkg_pretend() { fi } -src_prepare() { - # Remove warning about 'state' being obsolete in iptables 1.4.16.2. - epatch "${FILESDIR}"/${P}-conntrack.patch - # Allow to remove unnecessary build time dependency - # on net-firewall/iptables. - epatch "${FILESDIR}"/${PN}-dont-check-iptables.patch - # Move files away from /lib/ufw. - epatch "${FILESDIR}"/${P}-move-path.patch - # Contains fixes related to SUPPORT_PYTHON_ABIS="1" (see comment in the - # file). - epatch "${FILESDIR}"/${P}-python-abis.patch - +python_prepare_all() { # Set as enabled by default. User can enable or disable # the service by adding or removing it to/from a runlevel. sed -i 's/^ENABLED=no/ENABLED=yes/' conf/ufw.conf \ @@ -120,9 +127,11 @@ src_prepare() { else _EMPTY_LOCALE_LIST="no" fi + + distutils-r1_python_prepare_all } -src_install() { +python_install_all() { newconfd "${FILESDIR}"/ufw.confd ufw newinitd "${FILESDIR}"/ufw-2.initd ufw systemd_dounit "${FILESDIR}/ufw.service" @@ -142,13 +151,15 @@ src_install() { insinto /usr/share/doc/${PF}/examples doins examples/* fi - distutils_src_install - [[ $_EMPTY_LOCALE_LIST != yes ]] && domo locales/mo/*.mo newbashcomp shell-completion/bash ${PN} + + [[ $_EMPTY_LOCALE_LIST != yes ]] && domo locales/mo/*.mo + + distutils-r1_python_install_all + python_replicate_script "${D}usr/sbin/ufw" } pkg_postinst() { - distutils_pkg_postinst if [[ -z ${REPLACING_VERSIONS} ]]; then echo elog "To enable ufw, add it to boot sequence and activate it:" @@ -158,20 +169,14 @@ pkg_postinst() { elog "If you want to keep ufw logs in a separate file, take a look at" elog "/usr/share/doc/${PF}/logging." fi - # Make sure it gets displayed also when one downgrades from >= 0.33*, - # because this message isn't displayed for 0.33* (and possibly newer - # ones in the future) as it's not relevant there. if [[ -z ${REPLACING_VERSIONS} ]] \ - || [[ ${REPLACING_VERSIONS} = 0.33 ]] \ - || [[ ${REPLACING_VERSIONS} > 0.33 ]] \ - || [[ ${REPLACING_VERSIONS} < 0.31.1-r2 ]] + || [[ ${REPLACING_VERSIONS} < 0.34 ]]; then echo - elog "Starting from ufw-0.31.1-r2, /usr/share/ufw/check-requirements" - elog "script is installed. It is useful for debugging problems with" - elog "ufw. However one should keep in mind that the script assumes" - elog "IPv6 is enabled on kernel and net-firewall/iptables," - elog "and fails when it's not." + elog "/usr/share/ufw/check-requirements script is installed." + elog "It is useful for debugging problems with ufw. However one" + elog "should keep in mind that the script assumes IPv6 is enabled" + elog "on kernel and net-firewall/iptables, and fails when it's not." fi echo ewarn "Note: once enabled, ufw blocks also incoming SSH connections by" |