1 |
commit: cc06401da0480e0cceed79bd1eea8a88a120545f |
2 |
Author: Sam James <sam <AT> gentoo <DOT> org> |
3 |
AuthorDate: Wed Sep 28 21:55:02 2022 +0000 |
4 |
Commit: Sam James <sam <AT> gentoo <DOT> org> |
5 |
CommitDate: Wed Sep 28 22:54:58 2022 +0000 |
6 |
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=cc06401d |
7 |
|
8 |
net-firewall/firewalld: add 1.1.3 |
9 |
|
10 |
Signed-off-by: Sam James <sam <AT> gentoo.org> |
11 |
|
12 |
net-firewall/firewalld/Manifest | 1 + |
13 |
net-firewall/firewalld/firewalld-1.1.3.ebuild | 219 ++++++++++++++++++++++++++ |
14 |
2 files changed, 220 insertions(+) |
15 |
|
16 |
diff --git a/net-firewall/firewalld/Manifest b/net-firewall/firewalld/Manifest |
17 |
index 0a9506eac4f6..8d405da0806a 100644 |
18 |
--- a/net-firewall/firewalld/Manifest |
19 |
+++ b/net-firewall/firewalld/Manifest |
20 |
@@ -1,3 +1,4 @@ |
21 |
DIST firewalld-1.1.1.tar.gz 1325362 BLAKE2B 0167d9bc1c76da420dfe8aa5e6bfdd743116fbe6959d5920b972fac09c72608c90b9d6b2bb4bd7bb01250cbab2bdbb30a017becf5d050f490f4f289661e4366a SHA512 ecf75c30be63d2285d0b915b26d20e679c2f45f121c37b8cecc236da02d21039c692d1fec72e6c29d2a7b6de570daad573c230deacaef7491a2fd39c35332479 |
22 |
DIST firewalld-1.1.2.tar.gz 2099245 BLAKE2B ea1e73cf96908ca4981deb86d4c0fad75f36ef321a37bba6d789b3de90b1cbb818f1eda713f41567c2125265b2e19707d411e1b51ab35c6f1af8b6040528f150 SHA512 a82a57d77c2fb5e9758218516912057bfbfb5549b341bcaaa8d40f3c39b8af67a01ca146a3aa09495ca38b315fa09a5d3d32597c40de10ca2da370b81d5598b0 |
23 |
+DIST firewalld-1.1.3.tar.gz 2124653 BLAKE2B 178afc1c76538abbc2927819f35a81a642aabe5d9139a7dde69c50e061e59ae9f362374cc0bbfb4e8ad25c99caf8e45ddd92f1709478afb109d700b16bf84e38 SHA512 5108b363017b947907f104fb361bcc85443fc1b523718d8e0883932cb212a447391c9cea8b1e3f69bb9cc1c3a05b9042a8b9d91798d1dd09d4d4a224c9ce9d71 |
24 |
DIST firewalld-1.2.0.tar.gz 2120379 BLAKE2B 8c09e9a5e08e9f4dc2b3bfeda35d9078bd464956a30d7fdb5700329755fc307f0664f6a20ff5e941026785f28940b1eeebe747e2b2b3eed150725e014d05f870 SHA512 739ef7e4b85f2f00656434f6b37fb8116b9a93595390667d212820bc30a3e3cfaf5a60be7b18ec1f72be720d35a76224f3ce28856a9ff72557b8a8ae8e83f0a8 |
25 |
|
26 |
diff --git a/net-firewall/firewalld/firewalld-1.1.3.ebuild b/net-firewall/firewalld/firewalld-1.1.3.ebuild |
27 |
new file mode 100644 |
28 |
index 000000000000..ec48585ff072 |
29 |
--- /dev/null |
30 |
+++ b/net-firewall/firewalld/firewalld-1.1.3.ebuild |
31 |
@@ -0,0 +1,219 @@ |
32 |
+# Copyright 1999-2022 Gentoo Authors |
33 |
+# Distributed under the terms of the GNU General Public License v2 |
34 |
+ |
35 |
+EAPI=8 |
36 |
+ |
37 |
+PYTHON_COMPAT=( python3_{8..10} ) |
38 |
+inherit bash-completion-r1 gnome2-utils linux-info optfeature plocale python-single-r1 systemd xdg-utils |
39 |
+ |
40 |
+DESCRIPTION="A firewall daemon with D-Bus interface providing a dynamic firewall" |
41 |
+HOMEPAGE="https://firewalld.org/" |
42 |
+SRC_URI="https://github.com/firewalld/firewalld/releases/download/v${PV}/${P}.tar.gz" |
43 |
+ |
44 |
+LICENSE="GPL-2+" |
45 |
+SLOT="0" |
46 |
+KEYWORDS="~amd64 ~arm ~arm64 ~ppc64 ~riscv ~x86" |
47 |
+IUSE="gui +nftables +iptables test" |
48 |
+# Tests previously restricted for bug #650760 |
49 |
+RESTRICT="!test? ( test ) test? ( userpriv )" |
50 |
+REQUIRED_USE="${PYTHON_REQUIRED_USE}" |
51 |
+ |
52 |
+RDEPEND=" |
53 |
+ ${PYTHON_DEPS} |
54 |
+ || ( >=sys-apps/openrc-0.11.5 sys-apps/systemd ) |
55 |
+ $(python_gen_cond_dep ' |
56 |
+ dev-python/dbus-python[${PYTHON_USEDEP}] |
57 |
+ dev-python/pygobject:3[${PYTHON_USEDEP}] |
58 |
+ gui? ( |
59 |
+ dev-python/PyQt5[gui,widgets,${PYTHON_USEDEP}] |
60 |
+ x11-libs/gtk+:3 |
61 |
+ ) |
62 |
+ nftables? ( >=net-firewall/nftables-0.9.4[python,json] ) |
63 |
+ ') |
64 |
+ iptables? ( |
65 |
+ net-firewall/ebtables |
66 |
+ net-firewall/ipset |
67 |
+ net-firewall/iptables[ipv6(+)] |
68 |
+ nftables? ( net-firewall/nftables[xtables(+)] ) |
69 |
+ ) |
70 |
+" |
71 |
+DEPEND=" |
72 |
+ ${RDEPEND} |
73 |
+ dev-libs/glib:2 |
74 |
+" |
75 |
+BDEPEND=" |
76 |
+ app-text/docbook-xml-dtd |
77 |
+ >=dev-util/intltool-0.35 |
78 |
+ sys-devel/gettext |
79 |
+ test? ( net-firewall/nftables ) |
80 |
+" |
81 |
+ |
82 |
+# Testsuite's Makefile.am calls missing(!) |
83 |
+# ... but this seems to be consistent with the autoconf docs? |
84 |
+# Needs more investigation: https://www.gnu.org/software/autoconf/manual/autoconf-2.67/html_node/autom4te-Invocation.html |
85 |
+QA_AM_MAINTAINER_MODE=".*--run autom4te --language=autotest.*" |
86 |
+ |
87 |
+PLOCALES="ar as ast bg bn_IN ca cs da de el en_GB en_US es et eu fa fi fr gl gu hi hr hu ia id it ja ka kn ko lt ml mr nl or pa pl pt pt_BR ru si sk sq sr sr@latin sv ta te tr uk zh_CN zh_TW" |
88 |
+ |
89 |
+pkg_setup() { |
90 |
+ # See bug #830132 for the huge list |
91 |
+ # We can probably narrow it down a bit but it's rather fragile |
92 |
+ local CONFIG_CHECK="~NF_CONNTRACK ~NETFILTER_XT_MATCH_CONNTRACK |
93 |
+ ~NETFILTER |
94 |
+ ~NETFILTER_ADVANCED |
95 |
+ ~NETFILTER_INGRESS |
96 |
+ ~NF_NAT_MASQUERADE |
97 |
+ ~NF_NAT_REDIRECT |
98 |
+ ~NF_TABLES_INET |
99 |
+ ~NF_TABLES_IPV4 |
100 |
+ ~NF_TABLES_IPV6 |
101 |
+ ~NF_CONNTRACK |
102 |
+ ~NF_CONNTRACK_BROADCAST |
103 |
+ ~NF_CONNTRACK_NETBIOS_NS |
104 |
+ ~NF_CONNTRACK_TFTP |
105 |
+ ~NF_CT_NETLINK |
106 |
+ ~NF_CT_NETLINK_HELPER |
107 |
+ ~NF_DEFRAG_IPV4 |
108 |
+ ~NF_DEFRAG_IPV6 |
109 |
+ ~NF_NAT |
110 |
+ ~NF_NAT_TFTP |
111 |
+ ~NF_REJECT_IPV4 |
112 |
+ ~NF_REJECT_IPV6 |
113 |
+ ~NF_SOCKET_IPV4 |
114 |
+ ~NF_SOCKET_IPV6 |
115 |
+ ~NF_TABLES |
116 |
+ ~NF_TPROXY_IPV4 |
117 |
+ ~NF_TPROXY_IPV6 |
118 |
+ ~IP_NF_FILTER |
119 |
+ ~IP_NF_IPTABLES |
120 |
+ ~IP_NF_MANGLE |
121 |
+ ~IP_NF_NAT |
122 |
+ ~IP_NF_RAW |
123 |
+ ~IP_NF_SECURITY |
124 |
+ ~IP_NF_TARGET_MASQUERADE |
125 |
+ ~IP_NF_TARGET_REJECT |
126 |
+ ~IP6_NF_FILTER |
127 |
+ ~IP6_NF_IPTABLES |
128 |
+ ~IP6_NF_MANGLE |
129 |
+ ~IP6_NF_NAT |
130 |
+ ~IP6_NF_RAW |
131 |
+ ~IP6_NF_SECURITY |
132 |
+ ~IP6_NF_TARGET_MASQUERADE |
133 |
+ ~IP6_NF_TARGET_REJECT |
134 |
+ ~IP_SET |
135 |
+ ~NETFILTER_CONNCOUNT |
136 |
+ ~NETFILTER_NETLINK |
137 |
+ ~NETFILTER_NETLINK_OSF |
138 |
+ ~NETFILTER_NETLINK_QUEUE |
139 |
+ ~NETFILTER_SYNPROXY |
140 |
+ ~NETFILTER_XTABLES |
141 |
+ ~NETFILTER_XT_CONNMARK |
142 |
+ ~NETFILTER_XT_MATCH_CONNTRACK |
143 |
+ ~NETFILTER_XT_MATCH_MULTIPORT |
144 |
+ ~NETFILTER_XT_MATCH_STATE |
145 |
+ ~NETFILTER_XT_NAT |
146 |
+ ~NETFILTER_XT_TARGET_MASQUERADE |
147 |
+ ~NFT_COMPAT |
148 |
+ ~NFT_COUNTER |
149 |
+ ~NFT_CT |
150 |
+ ~NFT_FIB |
151 |
+ ~NFT_FIB_INET |
152 |
+ ~NFT_FIB_IPV4 |
153 |
+ ~NFT_FIB_IPV6 |
154 |
+ ~NFT_HASH |
155 |
+ ~NFT_LIMIT |
156 |
+ ~NFT_LOG |
157 |
+ ~NFT_MASQ |
158 |
+ ~NFT_NAT |
159 |
+ ~NFT_OBJREF |
160 |
+ ~NFT_QUEUE |
161 |
+ ~NFT_QUOTA |
162 |
+ ~NFT_REDIR |
163 |
+ ~NFT_REJECT |
164 |
+ ~NFT_REJECT_INET |
165 |
+ ~NFT_REJECT_IPV4 |
166 |
+ ~NFT_REJECT_IPV6 |
167 |
+ ~NFT_SOCKET |
168 |
+ ~NFT_SYNPROXY |
169 |
+ ~NFT_TPROXY |
170 |
+ ~NFT_TUNNEL |
171 |
+ ~NFT_XFRM" |
172 |
+ |
173 |
+ # kernel >= 4.19 has unified a NF_CONNTRACK module, bug #692944 |
174 |
+ if kernel_is -lt 4 19; then |
175 |
+ CONFIG_CHECK+=" ~NF_CONNTRACK_IPV4 ~NF_CONNTRACK_IPV6" |
176 |
+ fi |
177 |
+ |
178 |
+ # bug #831259 |
179 |
+ if kernel_is -le 5 4 ; then |
180 |
+ CONFIG_CHECK+=" ~NF_TABLES_SET" |
181 |
+ fi |
182 |
+ |
183 |
+ linux-info_pkg_setup |
184 |
+} |
185 |
+ |
186 |
+src_prepare() { |
187 |
+ default |
188 |
+ |
189 |
+ plocale_find_changes "po" "" ".po" || die |
190 |
+ plocale_get_locales | sed -e 's/ /\n/g' > po/LINGUAS |
191 |
+} |
192 |
+ |
193 |
+src_configure() { |
194 |
+ python_setup |
195 |
+ |
196 |
+ local myeconfargs=( |
197 |
+ --enable-systemd |
198 |
+ $(use_with iptables iptables "${EPREFIX}/sbin/iptables") |
199 |
+ $(use_with iptables iptables_restore "${EPREFIX}/sbin/iptables-restore") |
200 |
+ $(use_with iptables ip6tables "${EPREFIX}/sbin/ip6tables") |
201 |
+ $(use_with iptables ip6tables_restore "${EPREFIX}/sbin/ip6tables-restore") |
202 |
+ $(use_with iptables ebtables "${EPREFIX}/sbin/ebtables") |
203 |
+ $(use_with iptables ebtables_restore "${EPREFIX}/sbin/ebtables-restore") |
204 |
+ $(use_with iptables ipset "${EPREFIX}/usr/sbin/ipset") |
205 |
+ --with-systemd-unitdir="$(systemd_get_systemunitdir)" |
206 |
+ --with-bashcompletiondir="$(get_bashcompdir)" |
207 |
+ ) |
208 |
+ |
209 |
+ econf "${myeconfargs[@]}" |
210 |
+} |
211 |
+ |
212 |
+src_install() { |
213 |
+ default |
214 |
+ python_optimize |
215 |
+ |
216 |
+ # Get rid of junk |
217 |
+ rm -rf "${D}/etc/sysconfig/" || die |
218 |
+ |
219 |
+ # For non-gui installs we need to remove GUI bits |
220 |
+ if ! use gui; then |
221 |
+ rm -rf "${D}/etc/xdg/autostart" || die |
222 |
+ rm -f "${D}/usr/bin/firewall-applet" || die |
223 |
+ rm -f "${D}/usr/bin/firewall-config" || die |
224 |
+ rm -rf "${D}/usr/share/applications" || die |
225 |
+ rm -rf "${D}/usr/share/icons" || die |
226 |
+ fi |
227 |
+ |
228 |
+ newinitd "${FILESDIR}"/firewalld.init firewalld |
229 |
+ |
230 |
+ # Our version drops the/an obsolete 'conflicts' line with old iptables services |
231 |
+ # bug #833506 |
232 |
+ systemd_dounit "${FILESDIR}"/firewalld.service |
233 |
+} |
234 |
+ |
235 |
+pkg_preinst() { |
236 |
+ gnome2_schemas_savelist |
237 |
+} |
238 |
+ |
239 |
+pkg_postinst() { |
240 |
+ xdg_icon_cache_update |
241 |
+ gnome2_schemas_update |
242 |
+ |
243 |
+ # bug #833569 |
244 |
+ optfeature "changing zones with NetworkManager" gnome-extra/nm-applet |
245 |
+} |
246 |
+ |
247 |
+pkg_postrm() { |
248 |
+ xdg_icon_cache_update |
249 |
+ gnome2_schemas_update |
250 |
+} |