1 |
commit: fec9c6797e5c1d6b0234577d7973b896351fce87 |
2 |
Author: Thomas Deutschmann <whissi <AT> gentoo <DOT> org> |
3 |
AuthorDate: Sun Oct 7 16:01:27 2018 +0000 |
4 |
Commit: Thomas Deutschmann <whissi <AT> gentoo <DOT> org> |
5 |
CommitDate: Sun Oct 7 16:02:20 2018 +0000 |
6 |
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=fec9c679 |
7 |
|
8 |
net-firewall/shorewall: bump to v5.2.1 |
9 |
|
10 |
Package-Manager: Portage-2.3.50, Repoman-2.3.11 |
11 |
Signed-off-by: Thomas Deutschmann <whissi <AT> gentoo.org> |
12 |
|
13 |
net-firewall/shorewall/Manifest | 7 + |
14 |
.../shorewall-5.2.1-no-gzipped-manpages.patch | 28 ++ |
15 |
.../shorewall-core-5.2.1-no-gzipped-manpages.patch | 16 + |
16 |
.../shorewall-lite-5.2.1-no-gzipped-manpages.patch | 26 ++ |
17 |
net-firewall/shorewall/shorewall-5.2.1.ebuild | 479 +++++++++++++++++++++ |
18 |
5 files changed, 556 insertions(+) |
19 |
|
20 |
diff --git a/net-firewall/shorewall/Manifest b/net-firewall/shorewall/Manifest |
21 |
index 5dc17102042..65b3e1bc59e 100644 |
22 |
--- a/net-firewall/shorewall/Manifest |
23 |
+++ b/net-firewall/shorewall/Manifest |
24 |
@@ -1,7 +1,14 @@ |
25 |
DIST shorewall-5.2.0.5.tar.bz2 539666 BLAKE2B df4f8680ee29a773f584a1210b40a7047be1a590490a01617b26b71840e488f569ebcf268ba2f6199fb10671925356c4e187a5219ed7784672f6d14b2e90f580 SHA512 8299e0f40ad96c09eceb9460c6088e694e50b7a1b81a16395426466c666eb21dc23236c1ee6cc6047c05ad4a4ba43aac33fc7cb05f5784bf27ac81e5fa4e9059 |
26 |
+DIST shorewall-5.2.1.tar.bz2 550552 BLAKE2B c7b77912f644b3ae1a15a366018bc57da72d23342ec9db4ba282c8bc993f4964b3ce6d783448e2e36a6370fd223e1d14f1b27e9cadfa47024a1dda8109419c7f SHA512 2c408196a142a314f72ea4adb4193fa5cf30300529c41661e157e7b69f2d8448a0c25bcd177f25d6f993494b26068edf48cc0fc8e6a526380726baa33a8e11c8 |
27 |
DIST shorewall-core-5.2.0.5.tar.bz2 76567 BLAKE2B 078520ef3166d689d559f1c08ae417a2bf5c7fdc3618a26f72b244fa14679634752dffaeebafbd84609e33ec7f1856b701abb297077797abcb14d3264a3bfd25 SHA512 640c854a7484e886cd603742d16682456e02c0054c3d6d5f2188bf30e235ac975fc1ce50af500cf4fb99253a1d13c2408cc72aff54f14aa738e1e80b8d07066a |
28 |
+DIST shorewall-core-5.2.1.tar.bz2 76562 BLAKE2B 6129e90f9cfca9b36221320eb917f3299dd151d366e2b98d546519330cd5c95511d4a1e7b1a4ea2de046aed2d2a72367f8e3039ad288de89178e161cb16eb5a0 SHA512 4ea3fdec0c4ffb57a7e63334aed3479819079936575928b01399a3c2a8515a4ecf1eb19f1e193849480e6ac84f4c7de9e4c84699765684fb2299bf1b5276a3a8 |
29 |
DIST shorewall-docs-html-5.2.0.5.tar.bz2 4295236 BLAKE2B 8cef99b3535551e1d4ecdf0d3d1c2b3434c0b91c793f0857bc3f22f0020d80cd49b038c7c4f5d15fe23af14869f1736a69b01978403fe94bc5dac261bd2f5e4d SHA512 5fa3ab52580e8f090ab0be9b1796bef65a41d1a9dc5c9501e3daeba22bad7b28b5306aba5b383c654eed5f7d727a7744812034eeb1ad051633a80b2892096c24 |
30 |
+DIST shorewall-docs-html-5.2.1.tar.bz2 4302517 BLAKE2B a38659f9740da36efe3a2bf844b9686a18bb47476388580d02462aec0715afb1d09d20ffb2ee708550f7288fb7bb36ae8e5f23d902bd126bb2a5c496866e49dd SHA512 c67c621c1fea599c5e1987a7847bed187d8d0571e1b6d42c9fc351022de04b47e4f57030f919b85e8c9fef51829e0b04cbbc14e29a0df6f084c765219d46591c |
31 |
DIST shorewall-init-5.2.0.5.tar.bz2 30881 BLAKE2B 92617f17553b6df514cbfc72e86597e9859baa641782848763923ff4c650915cd7fb97f0c71b41d525d6a9d5ebbf10e9918d6a8d682c9c4654de3ba40b54c0ce SHA512 0367ad7468d5a9c0c70d31fdd66c05e54cf747dd45dc1bf2e128935c65af8c2508f033ed2945185059214dd81f5a8fb3f122323fd2bb79d2d642997741167371 |
32 |
+DIST shorewall-init-5.2.1.tar.bz2 31705 BLAKE2B 7f6a6b5266d63e3b0fab99a49f342e8172a20f50471fdcebe07a6c62dc36fcf4d96a041870df815aa5ecf2c421b5d7cb1408c0f54f520295611d54a876150294 SHA512 caba4eebcc576bf261327cb7304aedcaaea7325a34e444b4dd9ce60cd545b479271ea9b7049743ac1499485695d7d0f2a37b127a895cb3d200e6dfb41a21fe17 |
33 |
DIST shorewall-lite-5.2.0.5.tar.bz2 36651 BLAKE2B 192ecda8b04d0330f0a7bced6136f2723d201cd7c30af80b59bfa81f49614d10c900cf5856296ad854287f3c925e5f78f144698674ec7b8d91065072db4ca53e SHA512 b95154f7614eeedde1fc087750372cadd0c0a9618986741e035a9d83c06d2534feb78edaf6a97e2a45788015e6706f8dac3714ca3b22bd068e792458a3f5af40 |
34 |
+DIST shorewall-lite-5.2.1.tar.bz2 37527 BLAKE2B 5a50d66366b5c4c456fd4291d1413923162cfe24f989df00be5f613089d96402430ec6c6780c78ee5e398cd931c964e8d164efefb4d1531cb870ba65040809be SHA512 111f68c2d59b58e7d344e55b293d78fe2013771be9f8399bea88d9699905f3683931668fad23e7efea1fcae9d3c6381bd9f2073c3f208e81cec958ab19b2510e |
35 |
DIST shorewall6-5.2.0.5.tar.bz2 185740 BLAKE2B 846a3fc44a9c0a838cf75671ca34e78dd9758eeee0690d994a34615467b241f0c854e3bb9b818bcfd5e96664ab03e14a7c69affc946dffd1357ad744da41f8d5 SHA512 6875074ed8ee5bce40253a6e2633c422d7c2c1bf860a072236d6197cfe949e455b511a1792d822a8f2351254e99880236267ce70fc1150ca68e87f962b6cc265 |
36 |
+DIST shorewall6-5.2.1.tar.bz2 188322 BLAKE2B 5814433b11001f1e00ce3b124b5ec4ca6b1909ec00f966cb5fc93c34207325853249964492eb03f1f3c73cfc9c1b42def9578e507395395dd067f236475215b5 SHA512 b5dd5c4bf014c24a8a8bb4dc38b45dc92749182091b572340e1aef12d0aaeeb1dc436716b449cc1de34c74c6e4d590cc8cbe6b73aa3c614e8c9c37d7fa7a00a6 |
37 |
DIST shorewall6-lite-5.2.0.5.tar.bz2 36370 BLAKE2B 212cee0313c3bbf08c8d22893c5b62125d0362eb66218dc954bc05d0e082fdb4dab209a05948300394943dcd97f698c1e02310ec54cc88fb72bd24d4383776f7 SHA512 18bcbaf3bd56aaadb8d42610d4868278f42299e5a022ac5732f730b34ed7d97f7cd013f1c9374f0a6afc809250288490d94d2b4e02e4bf5edf2542bff99150e4 |
38 |
+DIST shorewall6-lite-5.2.1.tar.bz2 37244 BLAKE2B 4fcd5a1b65b15a7c4214b079677f6ee3604d1a718fe6a4710d42085434af64bcef9db57135b0c6b0e6678dba6272a4341330e47b8a6917c759e450091c7d1b5a SHA512 ca807bf0d59db09439d80725e6eeafb7795346bd030fe8598dcccc4fc93a57819715c33c73035c1819a9eba93efe69e058be1377fcd9adf135a0a08f6ff3e481 |
39 |
|
40 |
diff --git a/net-firewall/shorewall/files/shorewall-5.2.1-no-gzipped-manpages.patch b/net-firewall/shorewall/files/shorewall-5.2.1-no-gzipped-manpages.patch |
41 |
new file mode 100644 |
42 |
index 00000000000..386a55dfbad |
43 |
--- /dev/null |
44 |
+++ b/net-firewall/shorewall/files/shorewall-5.2.1-no-gzipped-manpages.patch |
45 |
@@ -0,0 +1,28 @@ |
46 |
+diff --git a/install.sh b/install.sh |
47 |
+index bd89420..6ad695e 100755 |
48 |
+--- a/install.sh |
49 |
++++ b/install.sh |
50 |
+@@ -1179,9 +1179,8 @@ if [ ${PRODUCT} = shorewall ]; then |
51 |
+ [ -n "$INSTALLD" ] || make_parent_directory ${DESTDIR}${MANDIR}/man5 0755 |
52 |
+ |
53 |
+ for f in *.5; do |
54 |
+- gzip -9c $f > $f.gz |
55 |
+- run_install $INSTALLD -m 0644 $f.gz ${DESTDIR}${MANDIR}/man5/$f.gz |
56 |
+- echo "Man page $f.gz installed to ${DESTDIR}${MANDIR}/man5/$f.gz" |
57 |
++ run_install $INSTALLD -m 0644 $f ${DESTDIR}${MANDIR}/man5/$f |
58 |
++ echo "Man page $f installed to ${DESTDIR}${MANDIR}/man5/$f" |
59 |
+ done |
60 |
+ fi |
61 |
+ |
62 |
+@@ -1212,9 +1211,8 @@ fi |
63 |
+ [ -n "$INSTALLD" ] || make_parent_directory ${DESTDIR}${MANDIR}/man8 0755 |
64 |
+ |
65 |
+ for f in *.8; do |
66 |
+- gzip -9c $f > $f.gz |
67 |
+- run_install $INSTALLD -m 0644 $f.gz ${DESTDIR}${MANDIR}/man8/$f.gz |
68 |
+- echo "Man page $f.gz installed to ${DESTDIR}${MANDIR}/man8/$f.gz" |
69 |
++ run_install $INSTALLD -m 0644 $f ${DESTDIR}${MANDIR}/man8/$f |
70 |
++ echo "Man page $f installed to ${DESTDIR}${MANDIR}/man8/$f" |
71 |
+ done |
72 |
+ |
73 |
+ cd .. |
74 |
|
75 |
diff --git a/net-firewall/shorewall/files/shorewall-core-5.2.1-no-gzipped-manpages.patch b/net-firewall/shorewall/files/shorewall-core-5.2.1-no-gzipped-manpages.patch |
76 |
new file mode 100644 |
77 |
index 00000000000..52ef4104075 |
78 |
--- /dev/null |
79 |
+++ b/net-firewall/shorewall/files/shorewall-core-5.2.1-no-gzipped-manpages.patch |
80 |
@@ -0,0 +1,16 @@ |
81 |
+diff --git a/install.sh b/install.sh |
82 |
+index fd7f8f6..3872cc7 100755 |
83 |
+--- a/install.sh |
84 |
++++ b/install.sh |
85 |
+@@ -353,9 +353,8 @@ if [ -n "$MANDIR" ]; then |
86 |
+ [ -n "$INSTALLD" ] || make_parent_directory ${DESTDIR}${MANDIR}/man8 0755 |
87 |
+ |
88 |
+ for f in *.8; do |
89 |
+- gzip -9c $f > $f.gz |
90 |
+- install_file $f.gz ${DESTDIR}${MANDIR}/man8/$f.gz 0644 |
91 |
+- echo "Man page $f.gz installed to ${DESTDIR}${MANDIR}/man8/$f.gz" |
92 |
++ install_file $f ${DESTDIR}${MANDIR}/man8/$f 0644 |
93 |
++ echo "Man page $f installed to ${DESTDIR}${MANDIR}/man8/$f" |
94 |
+ done |
95 |
+ |
96 |
+ cd .. |
97 |
|
98 |
diff --git a/net-firewall/shorewall/files/shorewall-lite-5.2.1-no-gzipped-manpages.patch b/net-firewall/shorewall/files/shorewall-lite-5.2.1-no-gzipped-manpages.patch |
99 |
new file mode 100644 |
100 |
index 00000000000..7f6a91ce4df |
101 |
--- /dev/null |
102 |
+++ b/net-firewall/shorewall/files/shorewall-lite-5.2.1-no-gzipped-manpages.patch |
103 |
@@ -0,0 +1,26 @@ |
104 |
+diff --git a/install.sh b/install.sh |
105 |
+index f66810a..051b861 100755 |
106 |
+--- a/install.sh |
107 |
++++ b/install.sh |
108 |
+@@ -448,17 +448,15 @@ if [ -d manpages -a -n "$MANDIR" ]; then |
109 |
+ make_parent_directory ${DESTDIR}${MANDIR}/man5 0755 |
110 |
+ |
111 |
+ for f in *.5; do |
112 |
+- gzip -c $f > $f.gz |
113 |
+- install_file $f.gz ${DESTDIR}${MANDIR}/man5/$f.gz 0644 |
114 |
+- echo "Man page $f.gz installed to ${DESTDIR}${MANDIR}/man5/$f.gz" |
115 |
++ install_file $f ${DESTDIR}${MANDIR}/man5/$f 0644 |
116 |
++ echo "Man page $f installed to ${DESTDIR}${MANDIR}/man5/$f" |
117 |
+ done |
118 |
+ |
119 |
+ make_parent_directory ${DESTDIR}${MANDIR}/man8 0755 |
120 |
+ |
121 |
+ for f in *.8; do |
122 |
+- gzip -c $f > $f.gz |
123 |
+- install_file $f.gz ${DESTDIR}${MANDIR}/man8/$f.gz 0644 |
124 |
+- echo "Man page $f.gz installed to ${DESTDIR}${MANDIR}/man8/$f.gz" |
125 |
++ install_file $f ${DESTDIR}${MANDIR}/man8/$f 0644 |
126 |
++ echo "Man page $f installed to ${DESTDIR}${MANDIR}/man8/$f" |
127 |
+ done |
128 |
+ |
129 |
+ cd .. |
130 |
|
131 |
diff --git a/net-firewall/shorewall/shorewall-5.2.1.ebuild b/net-firewall/shorewall/shorewall-5.2.1.ebuild |
132 |
new file mode 100644 |
133 |
index 00000000000..1666426f5c3 |
134 |
--- /dev/null |
135 |
+++ b/net-firewall/shorewall/shorewall-5.2.1.ebuild |
136 |
@@ -0,0 +1,479 @@ |
137 |
+# Copyright 1999-2018 Gentoo Authors |
138 |
+# Distributed under the terms of the GNU General Public License v2 |
139 |
+ |
140 |
+EAPI="6" |
141 |
+ |
142 |
+inherit linux-info prefix systemd versionator |
143 |
+ |
144 |
+DESCRIPTION='A high-level tool for configuring Netfilter' |
145 |
+HOMEPAGE="http://www.shorewall.net/" |
146 |
+LICENSE="GPL-2" |
147 |
+SLOT="0" |
148 |
+IUSE="doc +init +ipv4 ipv6 lite4 lite6 selinux" |
149 |
+ |
150 |
+MY_PV=${PV/_rc/-RC} |
151 |
+MY_PV=${MY_PV/_beta/-Beta} |
152 |
+MY_P=${PN}-${MY_PV} |
153 |
+ |
154 |
+MY_MAJOR_RELEASE_NUMBER=$(get_version_component_range 1-2) |
155 |
+MY_MAJORMINOR_RELEASE_NUMBER=$(get_version_component_range 1-3) |
156 |
+ |
157 |
+# shorewall |
158 |
+MY_PN_IPV4=Shorewall |
159 |
+MY_P_IPV4=${MY_PN_IPV4/#S/s}-${MY_PV} |
160 |
+ |
161 |
+# shorewall6 |
162 |
+MY_PN_IPV6=Shorewall6 |
163 |
+MY_P_IPV6=${MY_PN_IPV6/#S/s}-${MY_PV} |
164 |
+ |
165 |
+# shorewall-lite |
166 |
+MY_PN_LITE4=Shorewall-lite |
167 |
+MY_P_LITE4=${MY_PN_LITE4/#S/s}-${MY_PV} |
168 |
+ |
169 |
+# shorewall6-lite |
170 |
+MY_PN_LITE6=Shorewall6-lite |
171 |
+MY_P_LITE6=${MY_PN_LITE6/#S/s}-${MY_PV} |
172 |
+ |
173 |
+# shorewall-init |
174 |
+MY_PN_INIT=Shorewall-init |
175 |
+MY_P_INIT=${MY_PN_INIT/#S/s}-${MY_PV} |
176 |
+ |
177 |
+# shorewall-core |
178 |
+MY_PN_CORE=Shorewall-core |
179 |
+MY_P_CORE=${MY_PN_CORE/#S/s}-${MY_PV} |
180 |
+ |
181 |
+# shorewall-docs-html |
182 |
+MY_PN_DOCS=Shorewall-docs-html |
183 |
+MY_P_DOCS=${MY_PN_DOCS/#S/s}-${MY_PV} |
184 |
+ |
185 |
+# Upstream URL schema: |
186 |
+# Beta: $MIRROR/pub/shorewall/development/4.6/shorewall-4.6.4-Beta2/shorewall-4.6.4-Beta2.tar.bz2 |
187 |
+# RC: $MIRROR/pub/shorewall/development/4.6/shorewall-4.6.4-RC1/shorewall-4.6.4-RC1.tar.bz2 |
188 |
+# Release: $MIRROR/pub/shorewall/4.6/shorewall-4.6.3/shorewall-4.6.3.3.tar.bz2 |
189 |
+ |
190 |
+MY_URL_PREFIX= |
191 |
+MY_URL_SUFFIX= |
192 |
+if [[ ${MY_PV} = *-Beta* ]] || [[ ${MY_PV} = *-RC* ]]; then |
193 |
+ MY_URL_PREFIX='development/' |
194 |
+ |
195 |
+ _tmp_last_index=$(($(get_last_version_component_index ${MY_PV})+1)) |
196 |
+ _tmp_suffix=$(get_version_component_range ${_tmp_last_index} ${MY_PV}) |
197 |
+ if [[ ${_tmp_suffix} = *Beta* ]] || [[ ${_tmp_suffix} = *RC* ]]; then |
198 |
+ MY_URL_SUFFIX="-${_tmp_suffix}" |
199 |
+ fi |
200 |
+ |
201 |
+ # Cleaning up temporary variables |
202 |
+ unset _tmp_last_index |
203 |
+ unset _tmp_suffix |
204 |
+else |
205 |
+ KEYWORDS="~alpha ~amd64 ~hppa ~ppc ~ppc64 ~sparc ~x86" |
206 |
+fi |
207 |
+ |
208 |
+SRC_URI=" |
209 |
+ http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/shorewall-core-${MY_PV}.tar.bz2 |
210 |
+ ipv4? ( http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/shorewall-${MY_PV}.tar.bz2 ) |
211 |
+ ipv6? ( http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/shorewall6-${MY_PV}.tar.bz2 ) |
212 |
+ lite4? ( http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/shorewall-lite-${MY_PV}.tar.bz2 ) |
213 |
+ lite6? ( http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/shorewall6-lite-${MY_PV}.tar.bz2 ) |
214 |
+ init? ( http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/shorewall-init-${MY_PV}.tar.bz2 ) |
215 |
+ doc? ( http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/${MY_P_DOCS}.tar.bz2 ) |
216 |
+" |
217 |
+ |
218 |
+# - Shorewall6 requires Shorewall |
219 |
+# - Installing Shorewall-init or just the documentation doesn't make any sense, |
220 |
+# that's why we force the user to select at least one "real" Shorewall product |
221 |
+# |
222 |
+# See http://shorewall.net/download.htm#Which |
223 |
+REQUIRED_USE=" |
224 |
+ ipv6? ( ipv4 ) |
225 |
+ || ( ipv4 lite4 lite6 ) |
226 |
+" |
227 |
+ |
228 |
+# No build dependencies! Just plain shell scripts... |
229 |
+DEPEND="" |
230 |
+ |
231 |
+RDEPEND=" |
232 |
+ >=net-firewall/iptables-1.4.20 |
233 |
+ >=sys-apps/iproute2-3.8.0[-minimal] |
234 |
+ >=sys-devel/bc-1.06.95 |
235 |
+ ipv4? ( |
236 |
+ >=dev-lang/perl-5.16 |
237 |
+ virtual/perl-Digest-SHA |
238 |
+ ) |
239 |
+ ipv6? ( |
240 |
+ >=dev-perl/Socket6-0.230.0 |
241 |
+ >=net-firewall/iptables-1.4.20[ipv6] |
242 |
+ >=sys-apps/iproute2-3.8.0[ipv6] |
243 |
+ ) |
244 |
+ lite6? ( |
245 |
+ >=net-firewall/iptables-1.4.20[ipv6] |
246 |
+ >=sys-apps/iproute2-3.8.0[ipv6] |
247 |
+ ) |
248 |
+ init? ( >=sys-apps/coreutils-8.20 ) |
249 |
+ selinux? ( >=sec-policy/selinux-shorewall-2.20161023-r3 ) |
250 |
+ !net-firewall/shorewall-core |
251 |
+ !net-firewall/shorewall6 |
252 |
+ !net-firewall/shorewall-lite |
253 |
+ !net-firewall/shorewall6-lite |
254 |
+ !net-firewall/shorewall-init |
255 |
+ !<sys-apps/systemd-214 |
256 |
+" |
257 |
+ |
258 |
+S=${WORKDIR} |
259 |
+ |
260 |
+pkg_pretend() { |
261 |
+ local CONFIG_CHECK="~NF_CONNTRACK" |
262 |
+ |
263 |
+ local WARNING_CONNTRACK="Without NF_CONNTRACK support, you will be unable" |
264 |
+ local WARNING_CONNTRACK+=" to run any shorewall-based firewall on the local system." |
265 |
+ |
266 |
+ if use ipv4 || use lite4; then |
267 |
+ CONFIG_CHECK="${CONFIG_CHECK} ~NF_CONNTRACK_IPV4" |
268 |
+ |
269 |
+ local WARNING_CONNTRACK_IPV4="Without NF_CONNTRACK_IPV4 support, you will" |
270 |
+ local WARNING_CONNTRACK_IPV4+=" be unable to run any shorewall-based IPv4 firewall on the local system." |
271 |
+ fi |
272 |
+ |
273 |
+ if use ipv6 || use lite6; then |
274 |
+ CONFIG_CHECK="${CONFIG_CHECK} ~NF_CONNTRACK_IPV6" |
275 |
+ |
276 |
+ local WARNING_CONNTRACK_IPV6="Without NF_CONNTRACK_IPV6 support, you will" |
277 |
+ local WARNING_CONNTRACK_IPV6+=" be unable to run any shorewall-based IPv6 firewall on the local system." |
278 |
+ fi |
279 |
+ |
280 |
+ check_extra_config |
281 |
+} |
282 |
+ |
283 |
+pkg_setup() { |
284 |
+ if [[ -n "${DIGEST}" ]]; then |
285 |
+ einfo "Unsetting environment variable \"DIGEST\" to prevent conflicts with package's \"install.sh\" script ..." |
286 |
+ unset DIGEST |
287 |
+ fi |
288 |
+} |
289 |
+ |
290 |
+src_prepare() { |
291 |
+ # We are moving each unpacked source from MY_P_* to MY_PN_*. |
292 |
+ # This allows us to use patches from upstream and keeps epatch_user working |
293 |
+ |
294 |
+ einfo "Preparing shorewallrc ..." |
295 |
+ cp "${FILESDIR}"/shorewallrc-r3 "${S}"/shorewallrc.gentoo || die "Copying shorewallrc failed" |
296 |
+ eprefixify "${S}"/shorewallrc.gentoo |
297 |
+ sed -i \ |
298 |
+ -e "s|SERVICEDIR=tbs|SERVICEDIR=$(systemd_get_systemunitdir)|" \ |
299 |
+ "${S}"/shorewallrc.gentoo || die "Failed to update shorewallrc" |
300 |
+ |
301 |
+ # shorewall-core |
302 |
+ mv "${S}"/${MY_P_CORE} "${S}"/${MY_PN_CORE} || die "Failed to move '${S}/${MY_P_CORE}' to '${S}/${MY_PN_CORE}'" |
303 |
+ ebegin "Applying Gentoo-specific changes to ${MY_P_CORE} ..." |
304 |
+ ln -s ../shorewallrc.gentoo ${MY_PN_CORE}/shorewallrc.gentoo || die "Failed to symlink shorewallrc.gentoo" |
305 |
+ eend 0 |
306 |
+ |
307 |
+ pushd "${S}"/${MY_PN_CORE} &>/dev/null || die |
308 |
+ eapply "${FILESDIR}"/shorewall-core-5.2.1-no-gzipped-manpages.patch |
309 |
+ popd &>/dev/null || die |
310 |
+ |
311 |
+ # shorewall |
312 |
+ if use ipv4; then |
313 |
+ mv "${S}"/${MY_P_IPV4} "${S}"/${MY_PN_IPV4} || die "Failed to move '${S}/${MY_P_IPV4}' to '${S}/${MY_PN_IPV4}'" |
314 |
+ ebegin "Applying Gentoo-specific changes to ${MY_P_IPV4}" |
315 |
+ ln -s ../shorewallrc.gentoo ${MY_PN_IPV4}/shorewallrc.gentoo || die "Failed to symlink shorewallrc.gentoo" |
316 |
+ cp "${FILESDIR}"/shorewall.confd-r1 "${S}"/${MY_PN_IPV4}/default.gentoo || die "Copying shorewall.confd-r1 failed" |
317 |
+ cp "${FILESDIR}"/shorewall.initd-r3 "${S}"/${MY_PN_IPV4}/init.gentoo.sh || die "Copying shorewall.initd-r2 failed" |
318 |
+ cp "${FILESDIR}"/shorewall.systemd "${S}"/${MY_PN_IPV4}/gentoo.service || die "Copying shorewall.systemd failed" |
319 |
+ eend 0 |
320 |
+ |
321 |
+ pushd "${S}"/${MY_PN_IPV4} &>/dev/null || die |
322 |
+ eapply "${FILESDIR}"/shorewall-5.2.1-no-gzipped-manpages.patch |
323 |
+ popd &>/dev/null || die |
324 |
+ fi |
325 |
+ |
326 |
+ # shorewall6 |
327 |
+ if use ipv6; then |
328 |
+ mv "${S}"/${MY_P_IPV6} "${S}"/${MY_PN_IPV6} || die "Failed to move '${S}/${MY_P_IPV6}' to '${S}/${MY_PN_IPV6}'" |
329 |
+ ebegin "Applying Gentoo-specific changes to ${MY_P_IPV6}" |
330 |
+ ln -s ../shorewallrc.gentoo ${MY_PN_IPV6}/shorewallrc.gentoo || die "Failed to symlink shorewallrc.gentoo" |
331 |
+ cp "${FILESDIR}"/shorewall.confd-r1 "${S}"/${MY_PN_IPV6}/default.gentoo || die "Copying shorewall.confd-r1 failed" |
332 |
+ cp "${FILESDIR}"/shorewall.initd-r3 "${S}"/${MY_PN_IPV6}/init.gentoo.sh || die "Copying shorewall.initd-r2 failed" |
333 |
+ cp "${FILESDIR}"/shorewall6.systemd "${S}"/${MY_PN_IPV6}/gentoo.service || die "Copying shorewall6.systemd failed" |
334 |
+ eend 0 |
335 |
+ |
336 |
+ pushd "${S}"/${MY_PN_IPV6} &>/dev/null || die |
337 |
+ eapply "${FILESDIR}"/shorewall-5.2.1-no-gzipped-manpages.patch |
338 |
+ popd &>/dev/null || die |
339 |
+ fi |
340 |
+ |
341 |
+ # shorewall-lite |
342 |
+ if use lite4; then |
343 |
+ mv "${S}"/${MY_P_LITE4} "${S}"/${MY_PN_LITE4} || die "Failed to move '${S}/${MY_P_LITE4}' to '${S}/${MY_PN_LITE4}'" |
344 |
+ ebegin "Applying Gentoo-specific changes to ${MY_P_LITE4}" |
345 |
+ ln -s ../shorewallrc.gentoo ${MY_PN_LITE4}/shorewallrc.gentoo || die "Failed to symlink shorewallrc.gentoo" |
346 |
+ cp "${FILESDIR}"/shorewall-lite.confd-r1 "${S}"/${MY_PN_LITE4}/default.gentoo || die "Copying shorewall-lite.confd-r1 failed" |
347 |
+ cp "${FILESDIR}"/shorewall-lite.initd-r3 "${S}"/${MY_PN_LITE4}/init.gentoo.sh || die "Copying shorewall-lite.initd-r2 failed" |
348 |
+ cp "${FILESDIR}"/shorewall-lite.systemd "${S}"/${MY_PN_LITE4}/gentoo.service || die "Copying shorewall-lite.systemd failed" |
349 |
+ eend 0 |
350 |
+ |
351 |
+ pushd "${S}"/${MY_PN_LITE4} &>/dev/null || die |
352 |
+ eapply "${FILESDIR}"/shorewall-lite-5.2.1-no-gzipped-manpages.patch |
353 |
+ popd &>/dev/null || die |
354 |
+ fi |
355 |
+ |
356 |
+ # shorewall6-lite |
357 |
+ if use lite6; then |
358 |
+ mv "${S}"/${MY_P_LITE6} "${S}"/${MY_PN_LITE6} || die "Failed to move '${S}/${MY_P_LITE6}' to '${S}/${MY_PN_LITE6}'" |
359 |
+ ebegin "Applying Gentoo-specific changes to ${MY_P_LITE6}" |
360 |
+ ln -s ../shorewallrc.gentoo ${MY_PN_LITE6}/shorewallrc.gentoo || die "Failed to symlink shorewallrc.gentoo" |
361 |
+ cp "${FILESDIR}"/shorewall-lite.confd-r1 "${S}"/${MY_PN_LITE6}/default.gentoo || die "Copying shorewall-lite.confd-r1 failed" |
362 |
+ cp "${FILESDIR}"/shorewall-lite.initd-r3 "${S}"/${MY_PN_LITE6}/init.gentoo.sh || die "Copying shorewall-lite.initd-r2 failed" |
363 |
+ cp "${FILESDIR}"/shorewall6-lite.systemd "${S}"/${MY_PN_LITE6}/gentoo.service || die "Copying shorewall6-lite.systemd failed" |
364 |
+ eend 0 |
365 |
+ |
366 |
+ pushd "${S}"/${MY_PN_LITE6} &>/dev/null || die |
367 |
+ eapply "${FILESDIR}"/shorewall-lite-5.2.1-no-gzipped-manpages.patch |
368 |
+ popd &>/dev/null || die |
369 |
+ fi |
370 |
+ |
371 |
+ # shorewall-init |
372 |
+ if use init; then |
373 |
+ mv "${S}"/${MY_P_INIT} "${S}"/${MY_PN_INIT} || die "Failed to move '${S}/${MY_P_INIT}' to '${S}/${MY_PN_INIT}'" |
374 |
+ ebegin "Applying Gentoo-specific changes to ${MY_P_INIT}" |
375 |
+ ln -s ../shorewallrc.gentoo ${MY_PN_INIT}/shorewallrc.gentoo || die "Failed to symlink shorewallrc.gentoo" |
376 |
+ cp "${FILESDIR}"/shorewall-init.confd "${S}"/${MY_PN_INIT}/default.gentoo || die "Copying shorewall-init.confd failed" |
377 |
+ cp "${FILESDIR}"/shorewall-init.initd "${S}"/${MY_PN_INIT}/init.gentoo.sh || die "Copying shorewall-init.initd failed" |
378 |
+ cp "${FILESDIR}"/shorewall-init.systemd "${S}"/${MY_PN_INIT}/gentoo.service || die "Copying shorewall-init.systemd failed" |
379 |
+ cp "${FILESDIR}"/shorewall-init.readme "${S}"/${MY_PN_INIT}/shorewall-init.README.Gentoo.txt || die "Copying shorewall-init.systemd failed" |
380 |
+ eend 0 |
381 |
+ |
382 |
+ eprefixify "${S}"/${MY_PN_INIT}/init.gentoo.sh |
383 |
+ |
384 |
+ pushd "${S}"/${MY_PN_INIT} &>/dev/null || die |
385 |
+ eapply -p2 "${FILESDIR}"/shorewall-init-01_remove-ipset-functionality-r1.patch |
386 |
+ popd &>/dev/null || die |
387 |
+ fi |
388 |
+ |
389 |
+ # shorewall-docs-html |
390 |
+ if use doc; then |
391 |
+ mv "${S}"/${MY_P_DOCS} "${S}"/${MY_PN_DOCS} || die "Failed to move '${S}/${MY_P_DOCS}' to '${S}/${MY_PN_DOCS}'" |
392 |
+ fi |
393 |
+ |
394 |
+ eapply_user |
395 |
+} |
396 |
+ |
397 |
+src_configure() { |
398 |
+ :; |
399 |
+} |
400 |
+ |
401 |
+src_compile() { |
402 |
+ :; |
403 |
+} |
404 |
+ |
405 |
+src_install() { |
406 |
+ # shorewall-core |
407 |
+ einfo "Installing ${MY_P_CORE} ..." |
408 |
+ DESTDIR="${D%/}" ${MY_PN_CORE}/install.sh shorewallrc.gentoo || die "${MY_PN_CORE}/install.sh failed" |
409 |
+ dodoc "${S}"/${MY_PN_CORE}/changelog.txt "${S}"/${MY_PN_CORE}/releasenotes.txt |
410 |
+ |
411 |
+ # shorewall |
412 |
+ if use ipv4; then |
413 |
+ einfo "Installing ${MY_P_IPV4} ..." |
414 |
+ DESTDIR="${D%/}" ${MY_PN_IPV4}/install.sh shorewallrc.gentoo || die "${MY_PN_IPV4}/install.sh failed" |
415 |
+ keepdir /var/lib/shorewall |
416 |
+ |
417 |
+ if use doc; then |
418 |
+ dodoc -r "${S}"/${MY_PN_IPV4}/Samples |
419 |
+ fi |
420 |
+ fi |
421 |
+ |
422 |
+ # shorewall6 |
423 |
+ if use ipv6; then |
424 |
+ einfo "Installing ${MY_P_IPV6} ..." |
425 |
+ DESTDIR="${D%/}" ${MY_PN_IPV6}/install.sh shorewallrc.gentoo || die "${MY_PN_IPV6}/install.sh failed" |
426 |
+ keepdir /var/lib/shorewall6 |
427 |
+ |
428 |
+ if use doc; then |
429 |
+ dodoc -r "${S}"/${MY_PN_IPV6}/Samples6 |
430 |
+ fi |
431 |
+ fi |
432 |
+ |
433 |
+ # shorewall-lite |
434 |
+ if use lite4; then |
435 |
+ einfo "Installing ${MY_P_LITE4} ..." |
436 |
+ DESTDIR="${D%/}" ${MY_PN_LITE4}/install.sh shorewallrc.gentoo || die "${MY_PN_LITE4}/install.sh failed" |
437 |
+ keepdir /var/lib/shorewall-lite |
438 |
+ fi |
439 |
+ |
440 |
+ # shorewall6-lite |
441 |
+ if use lite6; then |
442 |
+ einfo "Installing ${MY_P_LITE6} ..." |
443 |
+ DESTDIR="${D%/}" ${MY_PN_LITE6}/install.sh shorewallrc.gentoo || die "${MY_PN_LITE6}/install.sh failed" |
444 |
+ keepdir /var/lib/shorewall6-lite |
445 |
+ fi |
446 |
+ |
447 |
+ # shorewall-init |
448 |
+ if use init; then |
449 |
+ einfo "Installing ${MY_P_INIT} ..." |
450 |
+ DESTDIR="${D%/}" ${MY_PN_INIT}/install.sh shorewallrc.gentoo || die "${MY_PN_INIT}/install.sh failed" |
451 |
+ dodoc "${S}"/${MY_PN_INIT}/shorewall-init.README.Gentoo.txt |
452 |
+ |
453 |
+ if [[ -f "${D}etc/logrotate.d/shorewall-init" ]]; then |
454 |
+ # On Gentoo, shorewall-init will not create shorewall-ifupdown.log, |
455 |
+ # so we don't need a logrotate configuration file for shorewall-init |
456 |
+ einfo "Removing unused \"${D}etc/logrotate.d/shorewall-init\" ..." |
457 |
+ rm -rf "${D}"etc/logrotate.d/shorewall-init || die "Removing \"${D}etc/logrotate.d/shorewall-init\" failed" |
458 |
+ fi |
459 |
+ |
460 |
+ if [[ -d "${D}etc/NetworkManager" ]]; then |
461 |
+ # On Gentoo, we don't support NetworkManager |
462 |
+ # so we don't need this folder at all |
463 |
+ einfo "Removing unused \"${D}etc/NetworkManager\" ..." |
464 |
+ rm -rf "${D}"etc/NetworkManager || die "Removing \"${D}etc/NetworkManager\" failed" |
465 |
+ fi |
466 |
+ |
467 |
+ if [[ -f "${D}usr/share/shorewall-init/ifupdown" ]]; then |
468 |
+ # This script isn't supported on Gentoo |
469 |
+ rm -rf "${D}"usr/share/shorewall-init/ifupdown || die "Removing \"${D}usr/share/shorewall-init/ifupdown\" failed" |
470 |
+ fi |
471 |
+ fi |
472 |
+ |
473 |
+ if use doc; then |
474 |
+ einfo "Installing ${MY_P_DOCS} ..." |
475 |
+ docinto html && dodoc -r "${S}"/${MY_PN_DOCS}/* |
476 |
+ fi |
477 |
+} |
478 |
+ |
479 |
+pkg_postinst() { |
480 |
+ if [[ -z "${REPLACING_VERSIONS}" ]]; then |
481 |
+ # This is a new installation |
482 |
+ |
483 |
+ # Show first steps for shorewall/shorewall6 |
484 |
+ local _PRODUCTS="" |
485 |
+ if use ipv4; then |
486 |
+ _PRODUCTS="shorewall" |
487 |
+ |
488 |
+ if use ipv6; then |
489 |
+ _PRODUCTS="${_PRODUCTS}/shorewall6" |
490 |
+ fi |
491 |
+ fi |
492 |
+ |
493 |
+ if [[ -n "${_PRODUCTS}" ]]; then |
494 |
+ elog "Before you can use ${_PRODUCTS}, you need to edit its configuration in:" |
495 |
+ elog "" |
496 |
+ elog " /etc/shorewall/shorewall.conf" |
497 |
+ |
498 |
+ if use ipv6; then |
499 |
+ elog " /etc/shorewall6/shorewall6.conf" |
500 |
+ fi |
501 |
+ |
502 |
+ elog "" |
503 |
+ elog "To activate your shorewall-based firewall on system start, please add ${_PRODUCTS} to your default runlevel:" |
504 |
+ elog "" |
505 |
+ elog " # rc-update add shorewall default" |
506 |
+ |
507 |
+ if use ipv6; then |
508 |
+ elog " # rc-update add shorewall6 default" |
509 |
+ fi |
510 |
+ fi |
511 |
+ |
512 |
+ # Show first steps for shorewall-lite/shorewall6-lite |
513 |
+ _PRODUCTS="" |
514 |
+ if use lite4; then |
515 |
+ _PRODUCTS="shorewall-lite" |
516 |
+ fi |
517 |
+ |
518 |
+ if use lite6; then |
519 |
+ if [[ -z "${_PRODUCTS}" ]]; then |
520 |
+ _PRODUCTS="shorewall6-lite" |
521 |
+ else |
522 |
+ _PRODUCTS="${_PRODUCTS}/shorewall6-lite" |
523 |
+ fi |
524 |
+ fi |
525 |
+ |
526 |
+ if [[ -n "${_PRODUCTS}" ]]; then |
527 |
+ if use ipv4; then |
528 |
+ elog "" |
529 |
+ fi |
530 |
+ |
531 |
+ elog "Before you can use ${_PRODUCTS}, you need to provide a configuration, which you can" |
532 |
+ elog "create using ${CATEGORY}/shorewall (with \"ipv4\" and or \"ipv6\" USE flag)." |
533 |
+ elog "" |
534 |
+ elog "To read more about ${_PRODUCTS}, please visit" |
535 |
+ elog " http://shorewall.net/CompiledPrograms.html" |
536 |
+ elog "" |
537 |
+ elog "To activate your shorewall-lite-based firewall on system start, please add ${PRODUCTS} to your default runlevel:" |
538 |
+ elog "" |
539 |
+ |
540 |
+ if use lite4; then |
541 |
+ elog " # rc-update add shorewall-lite default" |
542 |
+ fi |
543 |
+ |
544 |
+ if use lite6; then |
545 |
+ elog " # rc-update add shorewall6-lite default" |
546 |
+ fi |
547 |
+ fi |
548 |
+ |
549 |
+ if use init; then |
550 |
+ elog "" |
551 |
+ elog "To secure your system on boot, please add shorewall-init to your boot runlevel:" |
552 |
+ elog "" |
553 |
+ elog " # rc-update add shorewall-init boot" |
554 |
+ elog "" |
555 |
+ elog "and review \$PRODUCTS in" |
556 |
+ elog "" |
557 |
+ elog " /etc/conf.d/shorewall-init" |
558 |
+ fi |
559 |
+ |
560 |
+ fi |
561 |
+ |
562 |
+ local v |
563 |
+ for v in ${REPLACING_VERSIONS}; do |
564 |
+ if ! version_is_at_least ${MY_MAJOR_RELEASE_NUMBER} ${v}; then |
565 |
+ # This is an upgrade |
566 |
+ |
567 |
+ elog "You are upgrading from a previous major version. It is highly recommended that you read" |
568 |
+ elog "" |
569 |
+ elog " - /usr/share/doc/shorewall*/releasenotes.tx*" |
570 |
+ elog " - http://shorewall.net/Shorewall-5.html#idm214" |
571 |
+ |
572 |
+ if use ipv4; then |
573 |
+ elog "" |
574 |
+ elog "You can auto-migrate your configuration using" |
575 |
+ elog "" |
576 |
+ elog " # shorewall update -A" |
577 |
+ |
578 |
+ if use ipv6; then |
579 |
+ elog " # shorewall6 update -A" |
580 |
+ fi |
581 |
+ |
582 |
+ elog "" |
583 |
+ elog "*after* you have merged the changed files using one of the configuration" |
584 |
+ elog "files update tools of your choice (dispatch-conf, etc-update...)." |
585 |
+ |
586 |
+ elog "" |
587 |
+ elog "But if you are not familiar with the \"shorewall[6] update\" command," |
588 |
+ elog "please read the shorewall[6] man page first." |
589 |
+ fi |
590 |
+ |
591 |
+ # Show this elog only once |
592 |
+ break |
593 |
+ fi |
594 |
+ done |
595 |
+ |
596 |
+ if ! use init; then |
597 |
+ elog "" |
598 |
+ elog "Consider emerging ${CATEGORY}/${PN} with USE flag \"init\" to secure your system on boot" |
599 |
+ elog "before your shorewall-based firewall is ready to start." |
600 |
+ elog "" |
601 |
+ elog "To read more about shorewall-init, please visit" |
602 |
+ elog " http://www.shorewall.net/Shorewall-init.html" |
603 |
+ fi |
604 |
+ |
605 |
+ if ! has_version "net-firewall/conntrack-tools"; then |
606 |
+ elog "" |
607 |
+ elog "Your Shorewall firewall can utilize \"conntrack\" from the \"net-firewall/conntrack-tools\"" |
608 |
+ elog "package. if you want to use this feature, you need to install \"net-firewall/conntrack-tools\"!" |
609 |
+ fi |
610 |
+ |
611 |
+ if ! has_version "dev-perl/Devel-NYTProf"; then |
612 |
+ elog "" |
613 |
+ elog "If you want to profile your Shorewall firewall you need to install \"dev-perl/Devel-NYTProf\"!" |
614 |
+ fi |
615 |
+} |