Gentoo Archives: gentoo-commits

From: Lars Wendler <polynomial-c@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] repo/gentoo:master commit in: net-firewall/iptables/
Date: Thu, 04 Jun 2020 17:45:37
Message-Id: 1591292272.9588364803a943869b6a10a0d688abe1d115c915.polynomial-c@gentoo
1 commit: 9588364803a943869b6a10a0d688abe1d115c915
2 Author: Lars Wendler <polynomial-c <AT> gentoo <DOT> org>
3 AuthorDate: Thu Jun 4 17:37:52 2020 +0000
4 Commit: Lars Wendler <polynomial-c <AT> gentoo <DOT> org>
5 CommitDate: Thu Jun 4 17:37:52 2020 +0000
6 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=95883648
7
8 net-firewall/iptables: Bump to version 1.8.5
9
10 Package-Manager: Portage-2.3.100, Repoman-2.3.22
11 Signed-off-by: Lars Wendler <polynomial-c <AT> gentoo.org>
12
13 net-firewall/iptables/Manifest | 1 +
14 net-firewall/iptables/iptables-1.8.5.ebuild | 182 ++++++++++++++++++++++++++++
15 2 files changed, 183 insertions(+)
16
17 diff --git a/net-firewall/iptables/Manifest b/net-firewall/iptables/Manifest
18 index 3aeec907945..ff8515f12e3 100644
19 --- a/net-firewall/iptables/Manifest
20 +++ b/net-firewall/iptables/Manifest
21 @@ -2,3 +2,4 @@ DIST iptables-1.6.1.tar.bz2 620890 BLAKE2B b45ac26e1fb7e8b17a6df0afab3b6c0e2f0a5
22 DIST iptables-1.6.2.tar.bz2 639785 BLAKE2B 3d129756fd33c8c73d56d57e3c5595896db86ded14834a45db21b964d82840b62216ce3cea4ae4960e8c5f0671df3cc6bfb222f68d29cf3a8c99e0eee14bf017 SHA512 04f22e969c794246b9aa28055b202638081cfb0bb4a5625c049a30c48ac84cdd41db12a53c5831398cfe47c8f5691aa02b30b0ae3b5afe0f20ec48cf86a799c0
23 DIST iptables-1.8.3.tar.bz2 716257 BLAKE2B 58c606a5753ae2cb8ada9039e4653d2abe03c7c9b6aeef1e458baa3e10e818893f35e8f2aed5221e692415115e618aa673c8fcd33d172f85e9d1b609ed79c7b8 SHA512 84b10080646077cbea78b7f3fcc58c6c6e1898213341c69862e1b48179f37a6820c3d84437c896071f966b61aa6d16b132d91948a85fd8c05740f29be3a0986d
24 DIST iptables-1.8.4.tar.bz2 704312 BLAKE2B f677bb9ed2c86e6a39953c0565766991e9647224effdc7db2b563f3f491f6ace2f9073ecc8e865d489101a9f80cf964d9775ab81536412dbd4ca85937432de94 SHA512 a7faaab58608ffaa51e26e8056551c0e91a49187439d30fcf5cce2800274cc3c0515db6cfba0f4c85613fb80779cf96089b8915db0e89161e9980a6384faebdb
25 +DIST iptables-1.8.5.tar.bz2 713769 BLAKE2B 49659fc2f1f284f31637048fa1e6edb4853e9bf6ac0b6ada5599a7af34a4449205b5eb6b85b630ce4757b49cf3f8ac9ad6220e07c2c22abb688a3aeb5cf99cd2 SHA512 6a6baa541bb7aa331b176e0a91894e0766859814b59e77c71351ac34d6ebd337487981db48c70e476a48c67bcf891cfc663221a7582feb1496ad1df56eb28da8
26
27 diff --git a/net-firewall/iptables/iptables-1.8.5.ebuild b/net-firewall/iptables/iptables-1.8.5.ebuild
28 new file mode 100644
29 index 00000000000..5f23120ecb9
30 --- /dev/null
31 +++ b/net-firewall/iptables/iptables-1.8.5.ebuild
32 @@ -0,0 +1,182 @@
33 +# Copyright 1999-2020 Gentoo Authors
34 +# Distributed under the terms of the GNU General Public License v2
35 +
36 +EAPI=7
37 +
38 +# Force users doing their own patches to install their own tools
39 +AUTOTOOLS_AUTO_DEPEND=no
40 +
41 +inherit multilib systemd toolchain-funcs autotools flag-o-matic usr-ldscript
42 +
43 +DESCRIPTION="Linux kernel (2.4+) firewall, NAT and packet mangling tools"
44 +HOMEPAGE="https://www.netfilter.org/projects/iptables/"
45 +SRC_URI="https://www.netfilter.org/projects/iptables/files/${P}.tar.bz2"
46 +
47 +LICENSE="GPL-2"
48 +# Subslot reflects PV when libxtables and/or libip*tc was changed
49 +# the last time.
50 +SLOT="0/1.8.3"
51 +KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86"
52 +IUSE="conntrack ipv6 netlink nftables pcap static-libs"
53 +
54 +BUILD_DEPEND="
55 + >=app-eselect/eselect-iptables-20200508
56 +"
57 +COMMON_DEPEND="
58 + conntrack? ( >=net-libs/libnetfilter_conntrack-1.0.6 )
59 + netlink? ( net-libs/libnfnetlink )
60 + nftables? (
61 + >=net-libs/libmnl-1.0:0=
62 + >=net-libs/libnftnl-1.1.6:0=
63 + )
64 + pcap? ( net-libs/libpcap )
65 +"
66 +DEPEND="${COMMON_DEPEND}
67 + virtual/os-headers
68 + >=sys-kernel/linux-headers-4.4:0
69 +"
70 +BDEPEND="${BUILD_DEPEND}
71 + app-eselect/eselect-iptables
72 + virtual/pkgconfig
73 + nftables? (
74 + sys-devel/flex
75 + virtual/yacc
76 + )
77 +"
78 +RDEPEND="${COMMON_DEPEND}
79 + ${BUILD_DEPEND}
80 + nftables? ( net-misc/ethertypes )
81 + !<net-firewall/ebtables-2.0.11-r1
82 + !<net-firewall/arptables-0.0.5-r1
83 +"
84 +
85 +PATCHES=(
86 + "${FILESDIR}/iptables-1.8.4-no-symlinks.patch"
87 + "${FILESDIR}/iptables-1.8.2-link.patch"
88 +)
89 +
90 +src_prepare() {
91 + # use the saner headers from the kernel
92 + rm include/linux/{kernel,types}.h || die
93 +
94 + default
95 + eautoreconf
96 +}
97 +
98 +src_configure() {
99 + # Some libs use $(AR) rather than libtool to build #444282
100 + tc-export AR
101 +
102 + # Hack around struct mismatches between userland & kernel for some ABIs. #472388
103 + use amd64 && [[ ${ABI} == "x32" ]] && append-flags -fpack-struct
104 +
105 + sed -i \
106 + -e "/nfnetlink=[01]/s:=[01]:=$(usex netlink 1 0):" \
107 + -e "/nfconntrack=[01]/s:=[01]:=$(usex conntrack 1 0):" \
108 + configure || die
109 +
110 + local myeconfargs=(
111 + --sbindir="${EPREFIX}/sbin"
112 + --libexecdir="${EPREFIX}/$(get_libdir)"
113 + --enable-devel
114 + --enable-shared
115 + $(use_enable nftables)
116 + $(use_enable pcap bpf-compiler)
117 + $(use_enable pcap nfsynproxy)
118 + $(use_enable static-libs static)
119 + $(use_enable ipv6)
120 + )
121 + econf "${myeconfargs[@]}"
122 +}
123 +
124 +src_compile() {
125 + emake V=1
126 +}
127 +
128 +src_install() {
129 + default
130 + dodoc INCOMPATIBILITIES iptables/iptables.xslt
131 +
132 + # all the iptables binaries are in /sbin, so might as well
133 + # put these small files in with them
134 + into /
135 + dosbin iptables/iptables-apply
136 + dosym iptables-apply /sbin/ip6tables-apply
137 + doman iptables/iptables-apply.8
138 +
139 + insinto /usr/include
140 + doins include/iptables.h $(use ipv6 && echo include/ip6tables.h)
141 + insinto /usr/include/iptables
142 + doins include/iptables/internal.h
143 +
144 + keepdir /var/lib/iptables
145 + newinitd "${FILESDIR}"/${PN}-r2.init iptables
146 + newconfd "${FILESDIR}"/${PN}-r1.confd iptables
147 + if use ipv6 ; then
148 + keepdir /var/lib/ip6tables
149 + dosym iptables /etc/init.d/ip6tables
150 + newconfd "${FILESDIR}"/ip6tables-r1.confd ip6tables
151 + fi
152 +
153 + if use nftables; then
154 + # Bug 647458
155 + rm "${ED}"/etc/ethertypes || die
156 +
157 + # Bugs 660886 and 669894
158 + rm "${ED}"/sbin/{arptables,ebtables}{,-{save,restore}} || die
159 + fi
160 +
161 + systemd_dounit "${FILESDIR}"/systemd/iptables-{re,}store.service
162 + if use ipv6 ; then
163 + systemd_dounit "${FILESDIR}"/systemd/ip6tables-{re,}store.service
164 + fi
165 +
166 + # Move important libs to /lib #332175
167 + gen_usr_ldscript -a ip{4,6}tc xtables
168 +
169 + find "${ED}" -type f -name "*.la" -delete || die
170 +}
171 +
172 +pkg_postinst() {
173 + local default_iptables="xtables-legacy-multi"
174 + if ! eselect iptables show &>/dev/null; then
175 + elog "Current iptables implementation is unset, setting to ${default_iptables}"
176 + eselect iptables set "${default_iptables}"
177 + fi
178 +
179 + if use nftables; then
180 + local tables
181 + for tables in {arp,eb}tables; do
182 + if ! eselect ${tables} show &>/dev/null; then
183 + elog "Current ${tables} implementation is unset, setting to ${default_iptables}"
184 + eselect ${tables} set xtables-nft-multi
185 + fi
186 + done
187 + fi
188 +
189 + eselect iptables show
190 +}
191 +
192 +pkg_prerm() {
193 + elog "Unsetting iptables symlinks before removal"
194 + eselect iptables unset
195 +
196 + if ! has_version 'net-firewall/ebtables'; then
197 + elog "Unsetting ebtables symlinks before removal"
198 + eselect ebtables unset
199 + elif [[ -z ${REPLACED_BY_VERSION} ]]; then
200 + elog "Resetting ebtables symlinks to ebtables-legacy"
201 + eselect ebtables set ebtables-legacy
202 + fi
203 +
204 + if ! has_version 'net-firewall/arptables'; then
205 + elog "Unsetting arptables symlinks before removal"
206 + eselect arptables unset
207 + elif [[ -z ${REPLACED_BY_VERSION} ]]; then
208 + elog "Resetting arptables symlinks to arptables-legacy"
209 + eselect arptables set arptables-legacy
210 + fi
211 +
212 + # the eselect module failing should not be fatal
213 + return 0
214 +}