Gentoo Archives: gentoo-commits

From: Thomas Deutschmann <whissi@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] repo/gentoo:master commit in: net-firewall/shorewall/files/, net-firewall/shorewall/
Date: Sun, 07 Oct 2018 16:02:33
Message-Id: 1538928140.fec9c6797e5c1d6b0234577d7973b896351fce87.whissi@gentoo
1 commit: fec9c6797e5c1d6b0234577d7973b896351fce87
2 Author: Thomas Deutschmann <whissi <AT> gentoo <DOT> org>
3 AuthorDate: Sun Oct 7 16:01:27 2018 +0000
4 Commit: Thomas Deutschmann <whissi <AT> gentoo <DOT> org>
5 CommitDate: Sun Oct 7 16:02:20 2018 +0000
6 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=fec9c679
7
8 net-firewall/shorewall: bump to v5.2.1
9
10 Package-Manager: Portage-2.3.50, Repoman-2.3.11
11 Signed-off-by: Thomas Deutschmann <whissi <AT> gentoo.org>
12
13 net-firewall/shorewall/Manifest | 7 +
14 .../shorewall-5.2.1-no-gzipped-manpages.patch | 28 ++
15 .../shorewall-core-5.2.1-no-gzipped-manpages.patch | 16 +
16 .../shorewall-lite-5.2.1-no-gzipped-manpages.patch | 26 ++
17 net-firewall/shorewall/shorewall-5.2.1.ebuild | 479 +++++++++++++++++++++
18 5 files changed, 556 insertions(+)
19
20 diff --git a/net-firewall/shorewall/Manifest b/net-firewall/shorewall/Manifest
21 index 5dc17102042..65b3e1bc59e 100644
22 --- a/net-firewall/shorewall/Manifest
23 +++ b/net-firewall/shorewall/Manifest
24 @@ -1,7 +1,14 @@
25 DIST shorewall-5.2.0.5.tar.bz2 539666 BLAKE2B df4f8680ee29a773f584a1210b40a7047be1a590490a01617b26b71840e488f569ebcf268ba2f6199fb10671925356c4e187a5219ed7784672f6d14b2e90f580 SHA512 8299e0f40ad96c09eceb9460c6088e694e50b7a1b81a16395426466c666eb21dc23236c1ee6cc6047c05ad4a4ba43aac33fc7cb05f5784bf27ac81e5fa4e9059
26 +DIST shorewall-5.2.1.tar.bz2 550552 BLAKE2B c7b77912f644b3ae1a15a366018bc57da72d23342ec9db4ba282c8bc993f4964b3ce6d783448e2e36a6370fd223e1d14f1b27e9cadfa47024a1dda8109419c7f SHA512 2c408196a142a314f72ea4adb4193fa5cf30300529c41661e157e7b69f2d8448a0c25bcd177f25d6f993494b26068edf48cc0fc8e6a526380726baa33a8e11c8
27 DIST shorewall-core-5.2.0.5.tar.bz2 76567 BLAKE2B 078520ef3166d689d559f1c08ae417a2bf5c7fdc3618a26f72b244fa14679634752dffaeebafbd84609e33ec7f1856b701abb297077797abcb14d3264a3bfd25 SHA512 640c854a7484e886cd603742d16682456e02c0054c3d6d5f2188bf30e235ac975fc1ce50af500cf4fb99253a1d13c2408cc72aff54f14aa738e1e80b8d07066a
28 +DIST shorewall-core-5.2.1.tar.bz2 76562 BLAKE2B 6129e90f9cfca9b36221320eb917f3299dd151d366e2b98d546519330cd5c95511d4a1e7b1a4ea2de046aed2d2a72367f8e3039ad288de89178e161cb16eb5a0 SHA512 4ea3fdec0c4ffb57a7e63334aed3479819079936575928b01399a3c2a8515a4ecf1eb19f1e193849480e6ac84f4c7de9e4c84699765684fb2299bf1b5276a3a8
29 DIST shorewall-docs-html-5.2.0.5.tar.bz2 4295236 BLAKE2B 8cef99b3535551e1d4ecdf0d3d1c2b3434c0b91c793f0857bc3f22f0020d80cd49b038c7c4f5d15fe23af14869f1736a69b01978403fe94bc5dac261bd2f5e4d SHA512 5fa3ab52580e8f090ab0be9b1796bef65a41d1a9dc5c9501e3daeba22bad7b28b5306aba5b383c654eed5f7d727a7744812034eeb1ad051633a80b2892096c24
30 +DIST shorewall-docs-html-5.2.1.tar.bz2 4302517 BLAKE2B a38659f9740da36efe3a2bf844b9686a18bb47476388580d02462aec0715afb1d09d20ffb2ee708550f7288fb7bb36ae8e5f23d902bd126bb2a5c496866e49dd SHA512 c67c621c1fea599c5e1987a7847bed187d8d0571e1b6d42c9fc351022de04b47e4f57030f919b85e8c9fef51829e0b04cbbc14e29a0df6f084c765219d46591c
31 DIST shorewall-init-5.2.0.5.tar.bz2 30881 BLAKE2B 92617f17553b6df514cbfc72e86597e9859baa641782848763923ff4c650915cd7fb97f0c71b41d525d6a9d5ebbf10e9918d6a8d682c9c4654de3ba40b54c0ce SHA512 0367ad7468d5a9c0c70d31fdd66c05e54cf747dd45dc1bf2e128935c65af8c2508f033ed2945185059214dd81f5a8fb3f122323fd2bb79d2d642997741167371
32 +DIST shorewall-init-5.2.1.tar.bz2 31705 BLAKE2B 7f6a6b5266d63e3b0fab99a49f342e8172a20f50471fdcebe07a6c62dc36fcf4d96a041870df815aa5ecf2c421b5d7cb1408c0f54f520295611d54a876150294 SHA512 caba4eebcc576bf261327cb7304aedcaaea7325a34e444b4dd9ce60cd545b479271ea9b7049743ac1499485695d7d0f2a37b127a895cb3d200e6dfb41a21fe17
33 DIST shorewall-lite-5.2.0.5.tar.bz2 36651 BLAKE2B 192ecda8b04d0330f0a7bced6136f2723d201cd7c30af80b59bfa81f49614d10c900cf5856296ad854287f3c925e5f78f144698674ec7b8d91065072db4ca53e SHA512 b95154f7614eeedde1fc087750372cadd0c0a9618986741e035a9d83c06d2534feb78edaf6a97e2a45788015e6706f8dac3714ca3b22bd068e792458a3f5af40
34 +DIST shorewall-lite-5.2.1.tar.bz2 37527 BLAKE2B 5a50d66366b5c4c456fd4291d1413923162cfe24f989df00be5f613089d96402430ec6c6780c78ee5e398cd931c964e8d164efefb4d1531cb870ba65040809be SHA512 111f68c2d59b58e7d344e55b293d78fe2013771be9f8399bea88d9699905f3683931668fad23e7efea1fcae9d3c6381bd9f2073c3f208e81cec958ab19b2510e
35 DIST shorewall6-5.2.0.5.tar.bz2 185740 BLAKE2B 846a3fc44a9c0a838cf75671ca34e78dd9758eeee0690d994a34615467b241f0c854e3bb9b818bcfd5e96664ab03e14a7c69affc946dffd1357ad744da41f8d5 SHA512 6875074ed8ee5bce40253a6e2633c422d7c2c1bf860a072236d6197cfe949e455b511a1792d822a8f2351254e99880236267ce70fc1150ca68e87f962b6cc265
36 +DIST shorewall6-5.2.1.tar.bz2 188322 BLAKE2B 5814433b11001f1e00ce3b124b5ec4ca6b1909ec00f966cb5fc93c34207325853249964492eb03f1f3c73cfc9c1b42def9578e507395395dd067f236475215b5 SHA512 b5dd5c4bf014c24a8a8bb4dc38b45dc92749182091b572340e1aef12d0aaeeb1dc436716b449cc1de34c74c6e4d590cc8cbe6b73aa3c614e8c9c37d7fa7a00a6
37 DIST shorewall6-lite-5.2.0.5.tar.bz2 36370 BLAKE2B 212cee0313c3bbf08c8d22893c5b62125d0362eb66218dc954bc05d0e082fdb4dab209a05948300394943dcd97f698c1e02310ec54cc88fb72bd24d4383776f7 SHA512 18bcbaf3bd56aaadb8d42610d4868278f42299e5a022ac5732f730b34ed7d97f7cd013f1c9374f0a6afc809250288490d94d2b4e02e4bf5edf2542bff99150e4
38 +DIST shorewall6-lite-5.2.1.tar.bz2 37244 BLAKE2B 4fcd5a1b65b15a7c4214b079677f6ee3604d1a718fe6a4710d42085434af64bcef9db57135b0c6b0e6678dba6272a4341330e47b8a6917c759e450091c7d1b5a SHA512 ca807bf0d59db09439d80725e6eeafb7795346bd030fe8598dcccc4fc93a57819715c33c73035c1819a9eba93efe69e058be1377fcd9adf135a0a08f6ff3e481
39
40 diff --git a/net-firewall/shorewall/files/shorewall-5.2.1-no-gzipped-manpages.patch b/net-firewall/shorewall/files/shorewall-5.2.1-no-gzipped-manpages.patch
41 new file mode 100644
42 index 00000000000..386a55dfbad
43 --- /dev/null
44 +++ b/net-firewall/shorewall/files/shorewall-5.2.1-no-gzipped-manpages.patch
45 @@ -0,0 +1,28 @@
46 +diff --git a/install.sh b/install.sh
47 +index bd89420..6ad695e 100755
48 +--- a/install.sh
49 ++++ b/install.sh
50 +@@ -1179,9 +1179,8 @@ if [ ${PRODUCT} = shorewall ]; then
51 + [ -n "$INSTALLD" ] || make_parent_directory ${DESTDIR}${MANDIR}/man5 0755
52 +
53 + for f in *.5; do
54 +- gzip -9c $f > $f.gz
55 +- run_install $INSTALLD -m 0644 $f.gz ${DESTDIR}${MANDIR}/man5/$f.gz
56 +- echo "Man page $f.gz installed to ${DESTDIR}${MANDIR}/man5/$f.gz"
57 ++ run_install $INSTALLD -m 0644 $f ${DESTDIR}${MANDIR}/man5/$f
58 ++ echo "Man page $f installed to ${DESTDIR}${MANDIR}/man5/$f"
59 + done
60 + fi
61 +
62 +@@ -1212,9 +1211,8 @@ fi
63 + [ -n "$INSTALLD" ] || make_parent_directory ${DESTDIR}${MANDIR}/man8 0755
64 +
65 + for f in *.8; do
66 +- gzip -9c $f > $f.gz
67 +- run_install $INSTALLD -m 0644 $f.gz ${DESTDIR}${MANDIR}/man8/$f.gz
68 +- echo "Man page $f.gz installed to ${DESTDIR}${MANDIR}/man8/$f.gz"
69 ++ run_install $INSTALLD -m 0644 $f ${DESTDIR}${MANDIR}/man8/$f
70 ++ echo "Man page $f installed to ${DESTDIR}${MANDIR}/man8/$f"
71 + done
72 +
73 + cd ..
74
75 diff --git a/net-firewall/shorewall/files/shorewall-core-5.2.1-no-gzipped-manpages.patch b/net-firewall/shorewall/files/shorewall-core-5.2.1-no-gzipped-manpages.patch
76 new file mode 100644
77 index 00000000000..52ef4104075
78 --- /dev/null
79 +++ b/net-firewall/shorewall/files/shorewall-core-5.2.1-no-gzipped-manpages.patch
80 @@ -0,0 +1,16 @@
81 +diff --git a/install.sh b/install.sh
82 +index fd7f8f6..3872cc7 100755
83 +--- a/install.sh
84 ++++ b/install.sh
85 +@@ -353,9 +353,8 @@ if [ -n "$MANDIR" ]; then
86 + [ -n "$INSTALLD" ] || make_parent_directory ${DESTDIR}${MANDIR}/man8 0755
87 +
88 + for f in *.8; do
89 +- gzip -9c $f > $f.gz
90 +- install_file $f.gz ${DESTDIR}${MANDIR}/man8/$f.gz 0644
91 +- echo "Man page $f.gz installed to ${DESTDIR}${MANDIR}/man8/$f.gz"
92 ++ install_file $f ${DESTDIR}${MANDIR}/man8/$f 0644
93 ++ echo "Man page $f installed to ${DESTDIR}${MANDIR}/man8/$f"
94 + done
95 +
96 + cd ..
97
98 diff --git a/net-firewall/shorewall/files/shorewall-lite-5.2.1-no-gzipped-manpages.patch b/net-firewall/shorewall/files/shorewall-lite-5.2.1-no-gzipped-manpages.patch
99 new file mode 100644
100 index 00000000000..7f6a91ce4df
101 --- /dev/null
102 +++ b/net-firewall/shorewall/files/shorewall-lite-5.2.1-no-gzipped-manpages.patch
103 @@ -0,0 +1,26 @@
104 +diff --git a/install.sh b/install.sh
105 +index f66810a..051b861 100755
106 +--- a/install.sh
107 ++++ b/install.sh
108 +@@ -448,17 +448,15 @@ if [ -d manpages -a -n "$MANDIR" ]; then
109 + make_parent_directory ${DESTDIR}${MANDIR}/man5 0755
110 +
111 + for f in *.5; do
112 +- gzip -c $f > $f.gz
113 +- install_file $f.gz ${DESTDIR}${MANDIR}/man5/$f.gz 0644
114 +- echo "Man page $f.gz installed to ${DESTDIR}${MANDIR}/man5/$f.gz"
115 ++ install_file $f ${DESTDIR}${MANDIR}/man5/$f 0644
116 ++ echo "Man page $f installed to ${DESTDIR}${MANDIR}/man5/$f"
117 + done
118 +
119 + make_parent_directory ${DESTDIR}${MANDIR}/man8 0755
120 +
121 + for f in *.8; do
122 +- gzip -c $f > $f.gz
123 +- install_file $f.gz ${DESTDIR}${MANDIR}/man8/$f.gz 0644
124 +- echo "Man page $f.gz installed to ${DESTDIR}${MANDIR}/man8/$f.gz"
125 ++ install_file $f ${DESTDIR}${MANDIR}/man8/$f 0644
126 ++ echo "Man page $f installed to ${DESTDIR}${MANDIR}/man8/$f"
127 + done
128 +
129 + cd ..
130
131 diff --git a/net-firewall/shorewall/shorewall-5.2.1.ebuild b/net-firewall/shorewall/shorewall-5.2.1.ebuild
132 new file mode 100644
133 index 00000000000..1666426f5c3
134 --- /dev/null
135 +++ b/net-firewall/shorewall/shorewall-5.2.1.ebuild
136 @@ -0,0 +1,479 @@
137 +# Copyright 1999-2018 Gentoo Authors
138 +# Distributed under the terms of the GNU General Public License v2
139 +
140 +EAPI="6"
141 +
142 +inherit linux-info prefix systemd versionator
143 +
144 +DESCRIPTION='A high-level tool for configuring Netfilter'
145 +HOMEPAGE="http://www.shorewall.net/"
146 +LICENSE="GPL-2"
147 +SLOT="0"
148 +IUSE="doc +init +ipv4 ipv6 lite4 lite6 selinux"
149 +
150 +MY_PV=${PV/_rc/-RC}
151 +MY_PV=${MY_PV/_beta/-Beta}
152 +MY_P=${PN}-${MY_PV}
153 +
154 +MY_MAJOR_RELEASE_NUMBER=$(get_version_component_range 1-2)
155 +MY_MAJORMINOR_RELEASE_NUMBER=$(get_version_component_range 1-3)
156 +
157 +# shorewall
158 +MY_PN_IPV4=Shorewall
159 +MY_P_IPV4=${MY_PN_IPV4/#S/s}-${MY_PV}
160 +
161 +# shorewall6
162 +MY_PN_IPV6=Shorewall6
163 +MY_P_IPV6=${MY_PN_IPV6/#S/s}-${MY_PV}
164 +
165 +# shorewall-lite
166 +MY_PN_LITE4=Shorewall-lite
167 +MY_P_LITE4=${MY_PN_LITE4/#S/s}-${MY_PV}
168 +
169 +# shorewall6-lite
170 +MY_PN_LITE6=Shorewall6-lite
171 +MY_P_LITE6=${MY_PN_LITE6/#S/s}-${MY_PV}
172 +
173 +# shorewall-init
174 +MY_PN_INIT=Shorewall-init
175 +MY_P_INIT=${MY_PN_INIT/#S/s}-${MY_PV}
176 +
177 +# shorewall-core
178 +MY_PN_CORE=Shorewall-core
179 +MY_P_CORE=${MY_PN_CORE/#S/s}-${MY_PV}
180 +
181 +# shorewall-docs-html
182 +MY_PN_DOCS=Shorewall-docs-html
183 +MY_P_DOCS=${MY_PN_DOCS/#S/s}-${MY_PV}
184 +
185 +# Upstream URL schema:
186 +# Beta: $MIRROR/pub/shorewall/development/4.6/shorewall-4.6.4-Beta2/shorewall-4.6.4-Beta2.tar.bz2
187 +# RC: $MIRROR/pub/shorewall/development/4.6/shorewall-4.6.4-RC1/shorewall-4.6.4-RC1.tar.bz2
188 +# Release: $MIRROR/pub/shorewall/4.6/shorewall-4.6.3/shorewall-4.6.3.3.tar.bz2
189 +
190 +MY_URL_PREFIX=
191 +MY_URL_SUFFIX=
192 +if [[ ${MY_PV} = *-Beta* ]] || [[ ${MY_PV} = *-RC* ]]; then
193 + MY_URL_PREFIX='development/'
194 +
195 + _tmp_last_index=$(($(get_last_version_component_index ${MY_PV})+1))
196 + _tmp_suffix=$(get_version_component_range ${_tmp_last_index} ${MY_PV})
197 + if [[ ${_tmp_suffix} = *Beta* ]] || [[ ${_tmp_suffix} = *RC* ]]; then
198 + MY_URL_SUFFIX="-${_tmp_suffix}"
199 + fi
200 +
201 + # Cleaning up temporary variables
202 + unset _tmp_last_index
203 + unset _tmp_suffix
204 +else
205 + KEYWORDS="~alpha ~amd64 ~hppa ~ppc ~ppc64 ~sparc ~x86"
206 +fi
207 +
208 +SRC_URI="
209 + http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/shorewall-core-${MY_PV}.tar.bz2
210 + ipv4? ( http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/shorewall-${MY_PV}.tar.bz2 )
211 + ipv6? ( http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/shorewall6-${MY_PV}.tar.bz2 )
212 + lite4? ( http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/shorewall-lite-${MY_PV}.tar.bz2 )
213 + lite6? ( http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/shorewall6-lite-${MY_PV}.tar.bz2 )
214 + init? ( http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/shorewall-init-${MY_PV}.tar.bz2 )
215 + doc? ( http://www.shorewall.net/pub/shorewall/${MY_URL_PREFIX}${MY_MAJOR_RELEASE_NUMBER}/shorewall-${MY_MAJORMINOR_RELEASE_NUMBER}${MY_URL_SUFFIX}/${MY_P_DOCS}.tar.bz2 )
216 +"
217 +
218 +# - Shorewall6 requires Shorewall
219 +# - Installing Shorewall-init or just the documentation doesn't make any sense,
220 +# that's why we force the user to select at least one "real" Shorewall product
221 +#
222 +# See http://shorewall.net/download.htm#Which
223 +REQUIRED_USE="
224 + ipv6? ( ipv4 )
225 + || ( ipv4 lite4 lite6 )
226 +"
227 +
228 +# No build dependencies! Just plain shell scripts...
229 +DEPEND=""
230 +
231 +RDEPEND="
232 + >=net-firewall/iptables-1.4.20
233 + >=sys-apps/iproute2-3.8.0[-minimal]
234 + >=sys-devel/bc-1.06.95
235 + ipv4? (
236 + >=dev-lang/perl-5.16
237 + virtual/perl-Digest-SHA
238 + )
239 + ipv6? (
240 + >=dev-perl/Socket6-0.230.0
241 + >=net-firewall/iptables-1.4.20[ipv6]
242 + >=sys-apps/iproute2-3.8.0[ipv6]
243 + )
244 + lite6? (
245 + >=net-firewall/iptables-1.4.20[ipv6]
246 + >=sys-apps/iproute2-3.8.0[ipv6]
247 + )
248 + init? ( >=sys-apps/coreutils-8.20 )
249 + selinux? ( >=sec-policy/selinux-shorewall-2.20161023-r3 )
250 + !net-firewall/shorewall-core
251 + !net-firewall/shorewall6
252 + !net-firewall/shorewall-lite
253 + !net-firewall/shorewall6-lite
254 + !net-firewall/shorewall-init
255 + !<sys-apps/systemd-214
256 +"
257 +
258 +S=${WORKDIR}
259 +
260 +pkg_pretend() {
261 + local CONFIG_CHECK="~NF_CONNTRACK"
262 +
263 + local WARNING_CONNTRACK="Without NF_CONNTRACK support, you will be unable"
264 + local WARNING_CONNTRACK+=" to run any shorewall-based firewall on the local system."
265 +
266 + if use ipv4 || use lite4; then
267 + CONFIG_CHECK="${CONFIG_CHECK} ~NF_CONNTRACK_IPV4"
268 +
269 + local WARNING_CONNTRACK_IPV4="Without NF_CONNTRACK_IPV4 support, you will"
270 + local WARNING_CONNTRACK_IPV4+=" be unable to run any shorewall-based IPv4 firewall on the local system."
271 + fi
272 +
273 + if use ipv6 || use lite6; then
274 + CONFIG_CHECK="${CONFIG_CHECK} ~NF_CONNTRACK_IPV6"
275 +
276 + local WARNING_CONNTRACK_IPV6="Without NF_CONNTRACK_IPV6 support, you will"
277 + local WARNING_CONNTRACK_IPV6+=" be unable to run any shorewall-based IPv6 firewall on the local system."
278 + fi
279 +
280 + check_extra_config
281 +}
282 +
283 +pkg_setup() {
284 + if [[ -n "${DIGEST}" ]]; then
285 + einfo "Unsetting environment variable \"DIGEST\" to prevent conflicts with package's \"install.sh\" script ..."
286 + unset DIGEST
287 + fi
288 +}
289 +
290 +src_prepare() {
291 + # We are moving each unpacked source from MY_P_* to MY_PN_*.
292 + # This allows us to use patches from upstream and keeps epatch_user working
293 +
294 + einfo "Preparing shorewallrc ..."
295 + cp "${FILESDIR}"/shorewallrc-r3 "${S}"/shorewallrc.gentoo || die "Copying shorewallrc failed"
296 + eprefixify "${S}"/shorewallrc.gentoo
297 + sed -i \
298 + -e "s|SERVICEDIR=tbs|SERVICEDIR=$(systemd_get_systemunitdir)|" \
299 + "${S}"/shorewallrc.gentoo || die "Failed to update shorewallrc"
300 +
301 + # shorewall-core
302 + mv "${S}"/${MY_P_CORE} "${S}"/${MY_PN_CORE} || die "Failed to move '${S}/${MY_P_CORE}' to '${S}/${MY_PN_CORE}'"
303 + ebegin "Applying Gentoo-specific changes to ${MY_P_CORE} ..."
304 + ln -s ../shorewallrc.gentoo ${MY_PN_CORE}/shorewallrc.gentoo || die "Failed to symlink shorewallrc.gentoo"
305 + eend 0
306 +
307 + pushd "${S}"/${MY_PN_CORE} &>/dev/null || die
308 + eapply "${FILESDIR}"/shorewall-core-5.2.1-no-gzipped-manpages.patch
309 + popd &>/dev/null || die
310 +
311 + # shorewall
312 + if use ipv4; then
313 + mv "${S}"/${MY_P_IPV4} "${S}"/${MY_PN_IPV4} || die "Failed to move '${S}/${MY_P_IPV4}' to '${S}/${MY_PN_IPV4}'"
314 + ebegin "Applying Gentoo-specific changes to ${MY_P_IPV4}"
315 + ln -s ../shorewallrc.gentoo ${MY_PN_IPV4}/shorewallrc.gentoo || die "Failed to symlink shorewallrc.gentoo"
316 + cp "${FILESDIR}"/shorewall.confd-r1 "${S}"/${MY_PN_IPV4}/default.gentoo || die "Copying shorewall.confd-r1 failed"
317 + cp "${FILESDIR}"/shorewall.initd-r3 "${S}"/${MY_PN_IPV4}/init.gentoo.sh || die "Copying shorewall.initd-r2 failed"
318 + cp "${FILESDIR}"/shorewall.systemd "${S}"/${MY_PN_IPV4}/gentoo.service || die "Copying shorewall.systemd failed"
319 + eend 0
320 +
321 + pushd "${S}"/${MY_PN_IPV4} &>/dev/null || die
322 + eapply "${FILESDIR}"/shorewall-5.2.1-no-gzipped-manpages.patch
323 + popd &>/dev/null || die
324 + fi
325 +
326 + # shorewall6
327 + if use ipv6; then
328 + mv "${S}"/${MY_P_IPV6} "${S}"/${MY_PN_IPV6} || die "Failed to move '${S}/${MY_P_IPV6}' to '${S}/${MY_PN_IPV6}'"
329 + ebegin "Applying Gentoo-specific changes to ${MY_P_IPV6}"
330 + ln -s ../shorewallrc.gentoo ${MY_PN_IPV6}/shorewallrc.gentoo || die "Failed to symlink shorewallrc.gentoo"
331 + cp "${FILESDIR}"/shorewall.confd-r1 "${S}"/${MY_PN_IPV6}/default.gentoo || die "Copying shorewall.confd-r1 failed"
332 + cp "${FILESDIR}"/shorewall.initd-r3 "${S}"/${MY_PN_IPV6}/init.gentoo.sh || die "Copying shorewall.initd-r2 failed"
333 + cp "${FILESDIR}"/shorewall6.systemd "${S}"/${MY_PN_IPV6}/gentoo.service || die "Copying shorewall6.systemd failed"
334 + eend 0
335 +
336 + pushd "${S}"/${MY_PN_IPV6} &>/dev/null || die
337 + eapply "${FILESDIR}"/shorewall-5.2.1-no-gzipped-manpages.patch
338 + popd &>/dev/null || die
339 + fi
340 +
341 + # shorewall-lite
342 + if use lite4; then
343 + mv "${S}"/${MY_P_LITE4} "${S}"/${MY_PN_LITE4} || die "Failed to move '${S}/${MY_P_LITE4}' to '${S}/${MY_PN_LITE4}'"
344 + ebegin "Applying Gentoo-specific changes to ${MY_P_LITE4}"
345 + ln -s ../shorewallrc.gentoo ${MY_PN_LITE4}/shorewallrc.gentoo || die "Failed to symlink shorewallrc.gentoo"
346 + cp "${FILESDIR}"/shorewall-lite.confd-r1 "${S}"/${MY_PN_LITE4}/default.gentoo || die "Copying shorewall-lite.confd-r1 failed"
347 + cp "${FILESDIR}"/shorewall-lite.initd-r3 "${S}"/${MY_PN_LITE4}/init.gentoo.sh || die "Copying shorewall-lite.initd-r2 failed"
348 + cp "${FILESDIR}"/shorewall-lite.systemd "${S}"/${MY_PN_LITE4}/gentoo.service || die "Copying shorewall-lite.systemd failed"
349 + eend 0
350 +
351 + pushd "${S}"/${MY_PN_LITE4} &>/dev/null || die
352 + eapply "${FILESDIR}"/shorewall-lite-5.2.1-no-gzipped-manpages.patch
353 + popd &>/dev/null || die
354 + fi
355 +
356 + # shorewall6-lite
357 + if use lite6; then
358 + mv "${S}"/${MY_P_LITE6} "${S}"/${MY_PN_LITE6} || die "Failed to move '${S}/${MY_P_LITE6}' to '${S}/${MY_PN_LITE6}'"
359 + ebegin "Applying Gentoo-specific changes to ${MY_P_LITE6}"
360 + ln -s ../shorewallrc.gentoo ${MY_PN_LITE6}/shorewallrc.gentoo || die "Failed to symlink shorewallrc.gentoo"
361 + cp "${FILESDIR}"/shorewall-lite.confd-r1 "${S}"/${MY_PN_LITE6}/default.gentoo || die "Copying shorewall-lite.confd-r1 failed"
362 + cp "${FILESDIR}"/shorewall-lite.initd-r3 "${S}"/${MY_PN_LITE6}/init.gentoo.sh || die "Copying shorewall-lite.initd-r2 failed"
363 + cp "${FILESDIR}"/shorewall6-lite.systemd "${S}"/${MY_PN_LITE6}/gentoo.service || die "Copying shorewall6-lite.systemd failed"
364 + eend 0
365 +
366 + pushd "${S}"/${MY_PN_LITE6} &>/dev/null || die
367 + eapply "${FILESDIR}"/shorewall-lite-5.2.1-no-gzipped-manpages.patch
368 + popd &>/dev/null || die
369 + fi
370 +
371 + # shorewall-init
372 + if use init; then
373 + mv "${S}"/${MY_P_INIT} "${S}"/${MY_PN_INIT} || die "Failed to move '${S}/${MY_P_INIT}' to '${S}/${MY_PN_INIT}'"
374 + ebegin "Applying Gentoo-specific changes to ${MY_P_INIT}"
375 + ln -s ../shorewallrc.gentoo ${MY_PN_INIT}/shorewallrc.gentoo || die "Failed to symlink shorewallrc.gentoo"
376 + cp "${FILESDIR}"/shorewall-init.confd "${S}"/${MY_PN_INIT}/default.gentoo || die "Copying shorewall-init.confd failed"
377 + cp "${FILESDIR}"/shorewall-init.initd "${S}"/${MY_PN_INIT}/init.gentoo.sh || die "Copying shorewall-init.initd failed"
378 + cp "${FILESDIR}"/shorewall-init.systemd "${S}"/${MY_PN_INIT}/gentoo.service || die "Copying shorewall-init.systemd failed"
379 + cp "${FILESDIR}"/shorewall-init.readme "${S}"/${MY_PN_INIT}/shorewall-init.README.Gentoo.txt || die "Copying shorewall-init.systemd failed"
380 + eend 0
381 +
382 + eprefixify "${S}"/${MY_PN_INIT}/init.gentoo.sh
383 +
384 + pushd "${S}"/${MY_PN_INIT} &>/dev/null || die
385 + eapply -p2 "${FILESDIR}"/shorewall-init-01_remove-ipset-functionality-r1.patch
386 + popd &>/dev/null || die
387 + fi
388 +
389 + # shorewall-docs-html
390 + if use doc; then
391 + mv "${S}"/${MY_P_DOCS} "${S}"/${MY_PN_DOCS} || die "Failed to move '${S}/${MY_P_DOCS}' to '${S}/${MY_PN_DOCS}'"
392 + fi
393 +
394 + eapply_user
395 +}
396 +
397 +src_configure() {
398 + :;
399 +}
400 +
401 +src_compile() {
402 + :;
403 +}
404 +
405 +src_install() {
406 + # shorewall-core
407 + einfo "Installing ${MY_P_CORE} ..."
408 + DESTDIR="${D%/}" ${MY_PN_CORE}/install.sh shorewallrc.gentoo || die "${MY_PN_CORE}/install.sh failed"
409 + dodoc "${S}"/${MY_PN_CORE}/changelog.txt "${S}"/${MY_PN_CORE}/releasenotes.txt
410 +
411 + # shorewall
412 + if use ipv4; then
413 + einfo "Installing ${MY_P_IPV4} ..."
414 + DESTDIR="${D%/}" ${MY_PN_IPV4}/install.sh shorewallrc.gentoo || die "${MY_PN_IPV4}/install.sh failed"
415 + keepdir /var/lib/shorewall
416 +
417 + if use doc; then
418 + dodoc -r "${S}"/${MY_PN_IPV4}/Samples
419 + fi
420 + fi
421 +
422 + # shorewall6
423 + if use ipv6; then
424 + einfo "Installing ${MY_P_IPV6} ..."
425 + DESTDIR="${D%/}" ${MY_PN_IPV6}/install.sh shorewallrc.gentoo || die "${MY_PN_IPV6}/install.sh failed"
426 + keepdir /var/lib/shorewall6
427 +
428 + if use doc; then
429 + dodoc -r "${S}"/${MY_PN_IPV6}/Samples6
430 + fi
431 + fi
432 +
433 + # shorewall-lite
434 + if use lite4; then
435 + einfo "Installing ${MY_P_LITE4} ..."
436 + DESTDIR="${D%/}" ${MY_PN_LITE4}/install.sh shorewallrc.gentoo || die "${MY_PN_LITE4}/install.sh failed"
437 + keepdir /var/lib/shorewall-lite
438 + fi
439 +
440 + # shorewall6-lite
441 + if use lite6; then
442 + einfo "Installing ${MY_P_LITE6} ..."
443 + DESTDIR="${D%/}" ${MY_PN_LITE6}/install.sh shorewallrc.gentoo || die "${MY_PN_LITE6}/install.sh failed"
444 + keepdir /var/lib/shorewall6-lite
445 + fi
446 +
447 + # shorewall-init
448 + if use init; then
449 + einfo "Installing ${MY_P_INIT} ..."
450 + DESTDIR="${D%/}" ${MY_PN_INIT}/install.sh shorewallrc.gentoo || die "${MY_PN_INIT}/install.sh failed"
451 + dodoc "${S}"/${MY_PN_INIT}/shorewall-init.README.Gentoo.txt
452 +
453 + if [[ -f "${D}etc/logrotate.d/shorewall-init" ]]; then
454 + # On Gentoo, shorewall-init will not create shorewall-ifupdown.log,
455 + # so we don't need a logrotate configuration file for shorewall-init
456 + einfo "Removing unused \"${D}etc/logrotate.d/shorewall-init\" ..."
457 + rm -rf "${D}"etc/logrotate.d/shorewall-init || die "Removing \"${D}etc/logrotate.d/shorewall-init\" failed"
458 + fi
459 +
460 + if [[ -d "${D}etc/NetworkManager" ]]; then
461 + # On Gentoo, we don't support NetworkManager
462 + # so we don't need this folder at all
463 + einfo "Removing unused \"${D}etc/NetworkManager\" ..."
464 + rm -rf "${D}"etc/NetworkManager || die "Removing \"${D}etc/NetworkManager\" failed"
465 + fi
466 +
467 + if [[ -f "${D}usr/share/shorewall-init/ifupdown" ]]; then
468 + # This script isn't supported on Gentoo
469 + rm -rf "${D}"usr/share/shorewall-init/ifupdown || die "Removing \"${D}usr/share/shorewall-init/ifupdown\" failed"
470 + fi
471 + fi
472 +
473 + if use doc; then
474 + einfo "Installing ${MY_P_DOCS} ..."
475 + docinto html && dodoc -r "${S}"/${MY_PN_DOCS}/*
476 + fi
477 +}
478 +
479 +pkg_postinst() {
480 + if [[ -z "${REPLACING_VERSIONS}" ]]; then
481 + # This is a new installation
482 +
483 + # Show first steps for shorewall/shorewall6
484 + local _PRODUCTS=""
485 + if use ipv4; then
486 + _PRODUCTS="shorewall"
487 +
488 + if use ipv6; then
489 + _PRODUCTS="${_PRODUCTS}/shorewall6"
490 + fi
491 + fi
492 +
493 + if [[ -n "${_PRODUCTS}" ]]; then
494 + elog "Before you can use ${_PRODUCTS}, you need to edit its configuration in:"
495 + elog ""
496 + elog " /etc/shorewall/shorewall.conf"
497 +
498 + if use ipv6; then
499 + elog " /etc/shorewall6/shorewall6.conf"
500 + fi
501 +
502 + elog ""
503 + elog "To activate your shorewall-based firewall on system start, please add ${_PRODUCTS} to your default runlevel:"
504 + elog ""
505 + elog " # rc-update add shorewall default"
506 +
507 + if use ipv6; then
508 + elog " # rc-update add shorewall6 default"
509 + fi
510 + fi
511 +
512 + # Show first steps for shorewall-lite/shorewall6-lite
513 + _PRODUCTS=""
514 + if use lite4; then
515 + _PRODUCTS="shorewall-lite"
516 + fi
517 +
518 + if use lite6; then
519 + if [[ -z "${_PRODUCTS}" ]]; then
520 + _PRODUCTS="shorewall6-lite"
521 + else
522 + _PRODUCTS="${_PRODUCTS}/shorewall6-lite"
523 + fi
524 + fi
525 +
526 + if [[ -n "${_PRODUCTS}" ]]; then
527 + if use ipv4; then
528 + elog ""
529 + fi
530 +
531 + elog "Before you can use ${_PRODUCTS}, you need to provide a configuration, which you can"
532 + elog "create using ${CATEGORY}/shorewall (with \"ipv4\" and or \"ipv6\" USE flag)."
533 + elog ""
534 + elog "To read more about ${_PRODUCTS}, please visit"
535 + elog " http://shorewall.net/CompiledPrograms.html"
536 + elog ""
537 + elog "To activate your shorewall-lite-based firewall on system start, please add ${PRODUCTS} to your default runlevel:"
538 + elog ""
539 +
540 + if use lite4; then
541 + elog " # rc-update add shorewall-lite default"
542 + fi
543 +
544 + if use lite6; then
545 + elog " # rc-update add shorewall6-lite default"
546 + fi
547 + fi
548 +
549 + if use init; then
550 + elog ""
551 + elog "To secure your system on boot, please add shorewall-init to your boot runlevel:"
552 + elog ""
553 + elog " # rc-update add shorewall-init boot"
554 + elog ""
555 + elog "and review \$PRODUCTS in"
556 + elog ""
557 + elog " /etc/conf.d/shorewall-init"
558 + fi
559 +
560 + fi
561 +
562 + local v
563 + for v in ${REPLACING_VERSIONS}; do
564 + if ! version_is_at_least ${MY_MAJOR_RELEASE_NUMBER} ${v}; then
565 + # This is an upgrade
566 +
567 + elog "You are upgrading from a previous major version. It is highly recommended that you read"
568 + elog ""
569 + elog " - /usr/share/doc/shorewall*/releasenotes.tx*"
570 + elog " - http://shorewall.net/Shorewall-5.html#idm214"
571 +
572 + if use ipv4; then
573 + elog ""
574 + elog "You can auto-migrate your configuration using"
575 + elog ""
576 + elog " # shorewall update -A"
577 +
578 + if use ipv6; then
579 + elog " # shorewall6 update -A"
580 + fi
581 +
582 + elog ""
583 + elog "*after* you have merged the changed files using one of the configuration"
584 + elog "files update tools of your choice (dispatch-conf, etc-update...)."
585 +
586 + elog ""
587 + elog "But if you are not familiar with the \"shorewall[6] update\" command,"
588 + elog "please read the shorewall[6] man page first."
589 + fi
590 +
591 + # Show this elog only once
592 + break
593 + fi
594 + done
595 +
596 + if ! use init; then
597 + elog ""
598 + elog "Consider emerging ${CATEGORY}/${PN} with USE flag \"init\" to secure your system on boot"
599 + elog "before your shorewall-based firewall is ready to start."
600 + elog ""
601 + elog "To read more about shorewall-init, please visit"
602 + elog " http://www.shorewall.net/Shorewall-init.html"
603 + fi
604 +
605 + if ! has_version "net-firewall/conntrack-tools"; then
606 + elog ""
607 + elog "Your Shorewall firewall can utilize \"conntrack\" from the \"net-firewall/conntrack-tools\""
608 + elog "package. if you want to use this feature, you need to install \"net-firewall/conntrack-tools\"!"
609 + fi
610 +
611 + if ! has_version "dev-perl/Devel-NYTProf"; then
612 + elog ""
613 + elog "If you want to profile your Shorewall firewall you need to install \"dev-perl/Devel-NYTProf\"!"
614 + fi
615 +}