diff options
-rw-r--r-- | net-firewall/xtables-addons/ChangeLog | 74 | ||||
-rw-r--r-- | net-firewall/xtables-addons/Manifest | 4 | ||||
-rw-r--r-- | net-firewall/xtables-addons/metadata.xml | 18 | ||||
-rw-r--r-- | net-firewall/xtables-addons/xtables-addons-1.35.ebuild | 150 |
4 files changed, 246 insertions, 0 deletions
diff --git a/net-firewall/xtables-addons/ChangeLog b/net-firewall/xtables-addons/ChangeLog new file mode 100644 index 0000000..ccb15ac --- /dev/null +++ b/net-firewall/xtables-addons/ChangeLog @@ -0,0 +1,74 @@ +# ChangeLog for net-firewall/xtables-addons +# Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2 +# $Header: /var/cvsroot/gentoo-x86/net-firewall/xtables-addons/ChangeLog,v 1.14 2011/04/28 18:54:21 ulm Exp $ + + 28 Apr 2011; Ulrich Mueller <ulm@gentoo.org> xtables-addons-1.28-r1.ebuild, + xtables-addons-1.30.ebuild, xtables-addons-1.31.ebuild: + Fix dependency on virtual/linux-sources, bug 118442. + + 24 Apr 2011; Ulrich Mueller <ulm@gentoo.org> xtables-addons-1.28-r1.ebuild, + xtables-addons-1.30.ebuild, xtables-addons-1.31.ebuild: + Remove dependency on virtual/modutils, it is redundant with linux-mod.eclass, + bug 358891. + +*xtables-addons-1.31 (11 Nov 2010) + + 11 Nov 2010; Peter Volkov <pva@gentoo.org> +xtables-addons-1.31.ebuild: + Version bump. New grsecurity match for bug #339596, thank Anthony Basile + for pushing this upstream! + + 25 Oct 2010; Sven Wegener <swegener@gentoo.org> + xtables-addons-1.28-r1.ebuild, xtables-addons-1.30.ebuild: + linux-sources is only required at build-time and the ipset extension can + be build with ipset installed, just not being installed at the same time. + + 14 Oct 2010; Peter Volkov <pva@gentoo.org> -xtables-addons-1.27.ebuild, + -xtables-addons-1.28.ebuild: + Drop old. + +*xtables-addons-1.30 (14 Oct 2010) + + 14 Oct 2010; Peter Volkov <pva@gentoo.org> +xtables-addons-1.30.ebuild: + Version bump. + + 06 Oct 2010; Markus Meier <maekke@gentoo.org> + xtables-addons-1.28-r1.ebuild: + x86 stable, bug #337954 + + 21 Sep 2010; Markos Chandras <hwoarang@gentoo.org> + xtables-addons-1.28-r1.ebuild: + Stable on amd64 wrt bug #337954 + +*xtables-addons-1.28-r1 (13 Aug 2010) + + 13 Aug 2010; Peter Volkov <pva@gentoo.org> +xtables-addons-1.28-r1.ebuild: + Don't install geoip scripts in case it is disabled and add correct depends + for them, bug 332495, thank Marcin Mirosław for report. + +*xtables-addons-1.28 (12 Aug 2010) + + 12 Aug 2010; Peter Volkov <pva@gentoo.org> +xtables-addons-1.28.ebuild: + Version bump, bug #331399, thank Marcin Mirosław for report. + + 02 Jul 2010; Peter Volkov <pva@gentoo.org> -xtables-addons-1.26.ebuild, + xtables-addons-1.27.ebuild: + Avoid maintainer mode, make build verbose, fix ED->D typo. Drop old. + +*xtables-addons-1.27 (01 Jun 2010) + + 01 Jun 2010; Peter Volkov <pva@gentoo.org> -xtables-addons-1.25.ebuild, + +xtables-addons-1.27.ebuild: + Version bump, drop old. + +*xtables-addons-1.26 (08 May 2010) + + 08 May 2010; Peter Volkov <pva@gentoo.org> +xtables-addons-1.26.ebuild: + Version bump. + +*xtables-addons-1.25 (29 Apr 2010) + + 29 Apr 2010; Peter Volkov <pva@gentoo.org> +xtables-addons-1.25.ebuild, + +metadata.xml: + Initial import, ebuild by me. Fixes bug #250407, thank Nathan McSween for + report and others who tested this package. + diff --git a/net-firewall/xtables-addons/Manifest b/net-firewall/xtables-addons/Manifest new file mode 100644 index 0000000..265eeab --- /dev/null +++ b/net-firewall/xtables-addons/Manifest @@ -0,0 +1,4 @@ +DIST xtables-addons-1.35.tar.xz 420500 RMD160 9b0a2712ba6b3ca7e43b8e365470a9fd74bbefbe SHA1 53459b0ef10698327cd67b49691da3c1091b5ad8 SHA256 d57b40178e994e4c0e5d9eea16f3d387c253673011a7535f5b1c4abe9e2564be +EBUILD xtables-addons-1.35.ebuild 4674 RMD160 d28efbe38240a1c2e76dabc919849335a8dd9a31 SHA1 0f0439148df109fe829f1e5dc9f050925ce1c528 SHA256 d33ace47c9fb7d2e8c4938270a365b3781b30da17f27d76971f4c54fad818212 +MISC ChangeLog 2748 RMD160 100441045c3bb094f1a18a82973cef4ac403e8a6 SHA1 79384fd746cfc51c38d7f227b7968263fcb75d6c SHA256 b3c785341ee505931d61a269a09c02d5c5a901935bdb2cd95d44a967cbffb020 +MISC metadata.xml 683 RMD160 27b60860ee7f57c4345693fcd3be8d338d23bacd SHA1 1f3aac7a15cedd8261c4f62ffa90876cc76c6507 SHA256 64cb53d9fda3166dcaa6fe5c1656bb0cf1a89701ae3c451f68f4d365e1e872ad diff --git a/net-firewall/xtables-addons/metadata.xml b/net-firewall/xtables-addons/metadata.xml new file mode 100644 index 0000000..1fe6ec7 --- /dev/null +++ b/net-firewall/xtables-addons/metadata.xml @@ -0,0 +1,18 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> +<pkgmetadata> +<herd>no-herd</herd> +<maintainer> + <email>pva@gentoo.org</email> + <name>Peter Volkov</name> +</maintainer> +<longdescription> +Xtables-addons is the successor to patch-o-matic(-ng). Likewise, it contains +extensions that were not, or are not yet, accepted in the main kernel/iptables +packages. + +Xtables-addons is different from patch-o-matic in that you do not have to patch +or recompile the kernel, sometimes recompiling iptables is also not needed. But +please see the INSTALL file for the minimum requirements of this package. +</longdescription> +</pkgmetadata> diff --git a/net-firewall/xtables-addons/xtables-addons-1.35.ebuild b/net-firewall/xtables-addons/xtables-addons-1.35.ebuild new file mode 100644 index 0000000..6650c55 --- /dev/null +++ b/net-firewall/xtables-addons/xtables-addons-1.35.ebuild @@ -0,0 +1,150 @@ +# Copyright 1999-2011 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/net-firewall/xtables-addons/xtables-addons-1.31.ebuild,v 1.3 2011/04/28 18:54:21 ulm Exp $ + +EAPI="4" +inherit eutils linux-info linux-mod multilib + +DESCRIPTION="extensions not yet accepted in the main kernel/iptables (patch-o-matic(-ng) successor)" +HOMEPAGE="http://xtables-addons.sourceforge.net/" +SRC_URI="mirror://sourceforge/xtables-addons/${P}.tar.xz" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="~amd64 ~x86" +IUSE="modules" + +MODULES="quota2 psd pknock lscan length2 ipv4options ipset6 ipset4 ipp2p iface gradm geoip fuzzy condition tee tarpit sysrq steal rawnat logmark ipmark echo dnetmap dhcpmac delude checksum chaos account" + +for mod in ${MODULES}; do + IUSE="${IUSE} xtables_addons_${mod}" +done + +DEPEND=">=net-firewall/iptables-1.4.3" + +RDEPEND="${DEPEND} + xtables_addons_ipset4? ( !net-firewall/ipset ) + xtables_addons_ipset6? ( !net-firewall/ipset ) + xtables_addons_geoip? ( virtual/perl-Getopt-Long + dev-perl/Text-CSV_XS )" + +DEPEND="${DEPEND} + virtual/linux-sources" + +pkg_setup() { + if use modules; then + get_version + check_modules_supported + CONFIG_CHECK="NF_CONNTRACK NF_CONNTRACK_MARK ~CONNECTOR" + ERROR_CONNECTOR="Please, enable CONFIG_CONNECTOR if you wish to receive userspace notifications from pknock through netlink/connector" + linux-mod_pkg_setup + + if ! linux_chkconfig_present IPV6; then + SKIP_IPV6_MODULES="ip6table_rawpost ipset6" + ewarn "No IPV6 support in kernel. Disabling: ${SKIP_IPV6_MODULES}" + fi + if ! (use xtables_addons_ipset4 || use xtables_addons_ipset6) && + kernel_is -lt 2 6 35; then + die "${PN} with ipset requires kernel version >= 2.6.29" + fi + kernel_is -lt 2 6 29 && die "${PN} requires kernel version >= 2.6.29" + fi +} + +# Helper for maintainer: cheks if all possible MODULES are listed. +XA_qa_check() { + local all_modules + all_modules=$(sed -n '/^build_/{s/build_\(.*\)=.*/\L\1/;G;s/\n/ /;s/ $//;h}; ${x;p}' "${S}/mconfig") + if [[ ${all_modules} != ${MODULES} ]]; then + ewarn "QA: Modules in mconfig differ from \$MODULES in ebuild." + ewarn "Please, update MODULES in ebuild." + ewarn "'${all_modules}'" + fi +} + +# Is there any use flag set? +XA_has_something_to_build() { + local mod + for mod in ${MODULES}; do + use xtables_addons_${mod} && return + done + + eerror "All modules are disabled. What do you want me to build?" + eerror "Please, set XTABLES_ADDONS to any combination of" + eerror "${MODULES}" + die "All modules are disabled." +} + +# Parse Kbuid files and generates list of sources +XA_get_module_name() { + [[ $# != 1 ]] && die "XA_get_sources_for_mod: needs exactly one argument." + local mod objdir build_mod sources_list + mod=${1} + objdir=${S}/extensions + # Take modules name from mconfig + build_mod=$(sed -n "s/\(build_${mod}\)=.*/\1/Ip" "${S}/mconfig") + # strip .o, = and everything before = and print + sources_list=$(sed -n "/^obj-[$][{]${build_mod}[}]/\ + {s:obj-[^+]\+ [+]=[[:space:]]*::;s:[.]o::g;p}" \ + "${objdir}/Kbuild") + + if [[ -d ${S}/extensions/${sources_list} ]]; then + objdir=${S}/extensions/${sources_list} + sources_list=$(sed -n "/^obj-m/\ + {s:obj-[^+]\+ [+]=[[:space:]]*::;s:[.]o::g;p}" \ + "${objdir}/Kbuild") + fi + for mod_src in ${sources_list}; do + has ${mod_src} ${SKIP_IPV6_MODULES} || \ + echo " ${mod_src}(xtables_addons:${S}/extensions:${objdir})" + done +} + +src_prepare() { + XA_qa_check + XA_has_something_to_build + + local mod module_name + if use modules; then + MODULE_NAMES="compat_xtables(xtables_addons:${S}/extensions:)" + fi + for mod in ${MODULES}; do + if use xtables_addons_${mod}; then + sed "s/\(build_${mod}=\).*/\1m/I" -i mconfig || die + if use modules; then + for module_name in $(XA_get_module_name ${mod}); do + MODULE_NAMES+=" ${module_name}" + done + fi + else + sed "s/\(build_${mod}=\).*/\1n/I" -i mconfig || die + fi + done + einfo "${MODULE_NAMES}" # for debugging + + sed -e 's/depmod -a/true/' -i Makefile.in || die + sed -e '/^all-local:/{s: modules::}' \ + -e '/^install-exec-local:/{s: modules_install::}' \ + -i extensions/Makefile.in || die + + use xtables_addons_geoip || sed -e '/^SUBDIRS/{s/geoip//}' -i Makefile.in +} + +src_configure() { + set_arch_to_kernel # .. or it'll look for /arch/amd64/Makefile + econf --prefix="${EPREFIX}/" \ + --libexecdir="${EPREFIX}/$(get_libdir)/" \ + --with-kbuild="${KV_DIR}" +} + +src_compile() { + emake CFLAGS="${CFLAGS}" CC="$(tc-getCC)" V=1 + use modules && BUILD_TARGETS="modules" linux-mod_src_compile +} + +src_install() { + emake DESTDIR="${D}" install + use modules && linux-mod_src_install + dodoc -r README doc/* + find "${ED}" -type f -name '*.la' -exec rm -rf '{}' '+' +} |