summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--net-firewall/xtables-addons/ChangeLog74
-rw-r--r--net-firewall/xtables-addons/Manifest4
-rw-r--r--net-firewall/xtables-addons/metadata.xml18
-rw-r--r--net-firewall/xtables-addons/xtables-addons-1.35.ebuild150
4 files changed, 246 insertions, 0 deletions
diff --git a/net-firewall/xtables-addons/ChangeLog b/net-firewall/xtables-addons/ChangeLog
new file mode 100644
index 0000000..ccb15ac
--- /dev/null
+++ b/net-firewall/xtables-addons/ChangeLog
@@ -0,0 +1,74 @@
+# ChangeLog for net-firewall/xtables-addons
+# Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2
+# $Header: /var/cvsroot/gentoo-x86/net-firewall/xtables-addons/ChangeLog,v 1.14 2011/04/28 18:54:21 ulm Exp $
+
+ 28 Apr 2011; Ulrich Mueller <ulm@gentoo.org> xtables-addons-1.28-r1.ebuild,
+ xtables-addons-1.30.ebuild, xtables-addons-1.31.ebuild:
+ Fix dependency on virtual/linux-sources, bug 118442.
+
+ 24 Apr 2011; Ulrich Mueller <ulm@gentoo.org> xtables-addons-1.28-r1.ebuild,
+ xtables-addons-1.30.ebuild, xtables-addons-1.31.ebuild:
+ Remove dependency on virtual/modutils, it is redundant with linux-mod.eclass,
+ bug 358891.
+
+*xtables-addons-1.31 (11 Nov 2010)
+
+ 11 Nov 2010; Peter Volkov <pva@gentoo.org> +xtables-addons-1.31.ebuild:
+ Version bump. New grsecurity match for bug #339596, thank Anthony Basile
+ for pushing this upstream!
+
+ 25 Oct 2010; Sven Wegener <swegener@gentoo.org>
+ xtables-addons-1.28-r1.ebuild, xtables-addons-1.30.ebuild:
+ linux-sources is only required at build-time and the ipset extension can
+ be build with ipset installed, just not being installed at the same time.
+
+ 14 Oct 2010; Peter Volkov <pva@gentoo.org> -xtables-addons-1.27.ebuild,
+ -xtables-addons-1.28.ebuild:
+ Drop old.
+
+*xtables-addons-1.30 (14 Oct 2010)
+
+ 14 Oct 2010; Peter Volkov <pva@gentoo.org> +xtables-addons-1.30.ebuild:
+ Version bump.
+
+ 06 Oct 2010; Markus Meier <maekke@gentoo.org>
+ xtables-addons-1.28-r1.ebuild:
+ x86 stable, bug #337954
+
+ 21 Sep 2010; Markos Chandras <hwoarang@gentoo.org>
+ xtables-addons-1.28-r1.ebuild:
+ Stable on amd64 wrt bug #337954
+
+*xtables-addons-1.28-r1 (13 Aug 2010)
+
+ 13 Aug 2010; Peter Volkov <pva@gentoo.org> +xtables-addons-1.28-r1.ebuild:
+ Don't install geoip scripts in case it is disabled and add correct depends
+ for them, bug 332495, thank Marcin Mirosław for report.
+
+*xtables-addons-1.28 (12 Aug 2010)
+
+ 12 Aug 2010; Peter Volkov <pva@gentoo.org> +xtables-addons-1.28.ebuild:
+ Version bump, bug #331399, thank Marcin Mirosław for report.
+
+ 02 Jul 2010; Peter Volkov <pva@gentoo.org> -xtables-addons-1.26.ebuild,
+ xtables-addons-1.27.ebuild:
+ Avoid maintainer mode, make build verbose, fix ED->D typo. Drop old.
+
+*xtables-addons-1.27 (01 Jun 2010)
+
+ 01 Jun 2010; Peter Volkov <pva@gentoo.org> -xtables-addons-1.25.ebuild,
+ +xtables-addons-1.27.ebuild:
+ Version bump, drop old.
+
+*xtables-addons-1.26 (08 May 2010)
+
+ 08 May 2010; Peter Volkov <pva@gentoo.org> +xtables-addons-1.26.ebuild:
+ Version bump.
+
+*xtables-addons-1.25 (29 Apr 2010)
+
+ 29 Apr 2010; Peter Volkov <pva@gentoo.org> +xtables-addons-1.25.ebuild,
+ +metadata.xml:
+ Initial import, ebuild by me. Fixes bug #250407, thank Nathan McSween for
+ report and others who tested this package.
+
diff --git a/net-firewall/xtables-addons/Manifest b/net-firewall/xtables-addons/Manifest
new file mode 100644
index 0000000..265eeab
--- /dev/null
+++ b/net-firewall/xtables-addons/Manifest
@@ -0,0 +1,4 @@
+DIST xtables-addons-1.35.tar.xz 420500 RMD160 9b0a2712ba6b3ca7e43b8e365470a9fd74bbefbe SHA1 53459b0ef10698327cd67b49691da3c1091b5ad8 SHA256 d57b40178e994e4c0e5d9eea16f3d387c253673011a7535f5b1c4abe9e2564be
+EBUILD xtables-addons-1.35.ebuild 4674 RMD160 d28efbe38240a1c2e76dabc919849335a8dd9a31 SHA1 0f0439148df109fe829f1e5dc9f050925ce1c528 SHA256 d33ace47c9fb7d2e8c4938270a365b3781b30da17f27d76971f4c54fad818212
+MISC ChangeLog 2748 RMD160 100441045c3bb094f1a18a82973cef4ac403e8a6 SHA1 79384fd746cfc51c38d7f227b7968263fcb75d6c SHA256 b3c785341ee505931d61a269a09c02d5c5a901935bdb2cd95d44a967cbffb020
+MISC metadata.xml 683 RMD160 27b60860ee7f57c4345693fcd3be8d338d23bacd SHA1 1f3aac7a15cedd8261c4f62ffa90876cc76c6507 SHA256 64cb53d9fda3166dcaa6fe5c1656bb0cf1a89701ae3c451f68f4d365e1e872ad
diff --git a/net-firewall/xtables-addons/metadata.xml b/net-firewall/xtables-addons/metadata.xml
new file mode 100644
index 0000000..1fe6ec7
--- /dev/null
+++ b/net-firewall/xtables-addons/metadata.xml
@@ -0,0 +1,18 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+<herd>no-herd</herd>
+<maintainer>
+ <email>pva@gentoo.org</email>
+ <name>Peter Volkov</name>
+</maintainer>
+<longdescription>
+Xtables-addons is the successor to patch-o-matic(-ng). Likewise, it contains
+extensions that were not, or are not yet, accepted in the main kernel/iptables
+packages.
+
+Xtables-addons is different from patch-o-matic in that you do not have to patch
+or recompile the kernel, sometimes recompiling iptables is also not needed. But
+please see the INSTALL file for the minimum requirements of this package.
+</longdescription>
+</pkgmetadata>
diff --git a/net-firewall/xtables-addons/xtables-addons-1.35.ebuild b/net-firewall/xtables-addons/xtables-addons-1.35.ebuild
new file mode 100644
index 0000000..6650c55
--- /dev/null
+++ b/net-firewall/xtables-addons/xtables-addons-1.35.ebuild
@@ -0,0 +1,150 @@
+# Copyright 1999-2011 Gentoo Foundation
+# Distributed under the terms of the GNU General Public License v2
+# $Header: /var/cvsroot/gentoo-x86/net-firewall/xtables-addons/xtables-addons-1.31.ebuild,v 1.3 2011/04/28 18:54:21 ulm Exp $
+
+EAPI="4"
+inherit eutils linux-info linux-mod multilib
+
+DESCRIPTION="extensions not yet accepted in the main kernel/iptables (patch-o-matic(-ng) successor)"
+HOMEPAGE="http://xtables-addons.sourceforge.net/"
+SRC_URI="mirror://sourceforge/xtables-addons/${P}.tar.xz"
+
+LICENSE="GPL-2"
+SLOT="0"
+KEYWORDS="~amd64 ~x86"
+IUSE="modules"
+
+MODULES="quota2 psd pknock lscan length2 ipv4options ipset6 ipset4 ipp2p iface gradm geoip fuzzy condition tee tarpit sysrq steal rawnat logmark ipmark echo dnetmap dhcpmac delude checksum chaos account"
+
+for mod in ${MODULES}; do
+ IUSE="${IUSE} xtables_addons_${mod}"
+done
+
+DEPEND=">=net-firewall/iptables-1.4.3"
+
+RDEPEND="${DEPEND}
+ xtables_addons_ipset4? ( !net-firewall/ipset )
+ xtables_addons_ipset6? ( !net-firewall/ipset )
+ xtables_addons_geoip? ( virtual/perl-Getopt-Long
+ dev-perl/Text-CSV_XS )"
+
+DEPEND="${DEPEND}
+ virtual/linux-sources"
+
+pkg_setup() {
+ if use modules; then
+ get_version
+ check_modules_supported
+ CONFIG_CHECK="NF_CONNTRACK NF_CONNTRACK_MARK ~CONNECTOR"
+ ERROR_CONNECTOR="Please, enable CONFIG_CONNECTOR if you wish to receive userspace notifications from pknock through netlink/connector"
+ linux-mod_pkg_setup
+
+ if ! linux_chkconfig_present IPV6; then
+ SKIP_IPV6_MODULES="ip6table_rawpost ipset6"
+ ewarn "No IPV6 support in kernel. Disabling: ${SKIP_IPV6_MODULES}"
+ fi
+ if ! (use xtables_addons_ipset4 || use xtables_addons_ipset6) &&
+ kernel_is -lt 2 6 35; then
+ die "${PN} with ipset requires kernel version >= 2.6.29"
+ fi
+ kernel_is -lt 2 6 29 && die "${PN} requires kernel version >= 2.6.29"
+ fi
+}
+
+# Helper for maintainer: cheks if all possible MODULES are listed.
+XA_qa_check() {
+ local all_modules
+ all_modules=$(sed -n '/^build_/{s/build_\(.*\)=.*/\L\1/;G;s/\n/ /;s/ $//;h}; ${x;p}' "${S}/mconfig")
+ if [[ ${all_modules} != ${MODULES} ]]; then
+ ewarn "QA: Modules in mconfig differ from \$MODULES in ebuild."
+ ewarn "Please, update MODULES in ebuild."
+ ewarn "'${all_modules}'"
+ fi
+}
+
+# Is there any use flag set?
+XA_has_something_to_build() {
+ local mod
+ for mod in ${MODULES}; do
+ use xtables_addons_${mod} && return
+ done
+
+ eerror "All modules are disabled. What do you want me to build?"
+ eerror "Please, set XTABLES_ADDONS to any combination of"
+ eerror "${MODULES}"
+ die "All modules are disabled."
+}
+
+# Parse Kbuid files and generates list of sources
+XA_get_module_name() {
+ [[ $# != 1 ]] && die "XA_get_sources_for_mod: needs exactly one argument."
+ local mod objdir build_mod sources_list
+ mod=${1}
+ objdir=${S}/extensions
+ # Take modules name from mconfig
+ build_mod=$(sed -n "s/\(build_${mod}\)=.*/\1/Ip" "${S}/mconfig")
+ # strip .o, = and everything before = and print
+ sources_list=$(sed -n "/^obj-[$][{]${build_mod}[}]/\
+ {s:obj-[^+]\+ [+]=[[:space:]]*::;s:[.]o::g;p}" \
+ "${objdir}/Kbuild")
+
+ if [[ -d ${S}/extensions/${sources_list} ]]; then
+ objdir=${S}/extensions/${sources_list}
+ sources_list=$(sed -n "/^obj-m/\
+ {s:obj-[^+]\+ [+]=[[:space:]]*::;s:[.]o::g;p}" \
+ "${objdir}/Kbuild")
+ fi
+ for mod_src in ${sources_list}; do
+ has ${mod_src} ${SKIP_IPV6_MODULES} || \
+ echo " ${mod_src}(xtables_addons:${S}/extensions:${objdir})"
+ done
+}
+
+src_prepare() {
+ XA_qa_check
+ XA_has_something_to_build
+
+ local mod module_name
+ if use modules; then
+ MODULE_NAMES="compat_xtables(xtables_addons:${S}/extensions:)"
+ fi
+ for mod in ${MODULES}; do
+ if use xtables_addons_${mod}; then
+ sed "s/\(build_${mod}=\).*/\1m/I" -i mconfig || die
+ if use modules; then
+ for module_name in $(XA_get_module_name ${mod}); do
+ MODULE_NAMES+=" ${module_name}"
+ done
+ fi
+ else
+ sed "s/\(build_${mod}=\).*/\1n/I" -i mconfig || die
+ fi
+ done
+ einfo "${MODULE_NAMES}" # for debugging
+
+ sed -e 's/depmod -a/true/' -i Makefile.in || die
+ sed -e '/^all-local:/{s: modules::}' \
+ -e '/^install-exec-local:/{s: modules_install::}' \
+ -i extensions/Makefile.in || die
+
+ use xtables_addons_geoip || sed -e '/^SUBDIRS/{s/geoip//}' -i Makefile.in
+}
+
+src_configure() {
+ set_arch_to_kernel # .. or it'll look for /arch/amd64/Makefile
+ econf --prefix="${EPREFIX}/" \
+ --libexecdir="${EPREFIX}/$(get_libdir)/" \
+ --with-kbuild="${KV_DIR}"
+}
+
+src_compile() {
+ emake CFLAGS="${CFLAGS}" CC="$(tc-getCC)" V=1
+ use modules && BUILD_TARGETS="modules" linux-mod_src_compile
+}
+
+src_install() {
+ emake DESTDIR="${D}" install
+ use modules && linux-mod_src_install
+ dodoc -r README doc/*
+ find "${ED}" -type f -name '*.la' -exec rm -rf '{}' '+'
+}