commit:     60d8462e92ee38b266d8d6c91e451032db46fe2c
Author:     Patrick McLean <chutzpah <AT> gentoo <DOT> org>
AuthorDate: Tue Jun  7 20:31:05 2022 +0000
Commit:     Patrick McLean <chutzpah <AT> gentoo <DOT> org>
CommitDate: Tue Jun  7 20:31:11 2022 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=60d8462e

net-firewall/nftables: add 1.0.4

Signed-off-by: Patrick McLean <chutzpah <AT> gentoo.org>

 net-firewall/nftables/Manifest              |   2 +
 net-firewall/nftables/nftables-1.0.4.ebuild | 201 ++++++++++++++++++++++++++++
 2 files changed, 203 insertions(+)

diff --git a/net-firewall/nftables/Manifest b/net-firewall/nftables/Manifest
index 3435a1a543d2..5b6889bfbb24 100644
--- a/net-firewall/nftables/Manifest
+++ b/net-firewall/nftables/Manifest
@@ -4,3 +4,5 @@ DIST nftables-1.0.2.tar.bz2 970781 BLAKE2B 
650ae6badb574ff3628d21c8aa99f81e73932
 DIST nftables-1.0.2.tar.bz2.sig 566 BLAKE2B 
5b7a20b28c274a950b718e2e14313772707b6bdc3f4519f747350593c1eb3bfbcf8c5dd9ae7d5aa0488c5cde9af8b58e05349c75e8a8246c5634303a331f9d98
 SHA512 
9be59d771833ac315fd52cffe7074ed9d49fbf592aec8d94500bbc7cc1f44dcb54b3815c46831a5e7e4c4770901cbdd6b8ffc5aa8d8cb7e064ec1c8453d890f1
 DIST nftables-1.0.3.tar.bz2 978270 BLAKE2B 
f0410805e47679749a7e157e76834ee977bda53042a3c9fa34052778613c25bfc944257f6e51a94c9981cacbe28fb82ec8e3b82a2e1e34865b1412890138bfb0
 SHA512 
83252c0275f20243065c4d77dfca4ab2b70b4042c9491fb3323eb60c96f9a6e0d69699a641457f3d629d078269ba62ce766ffdb2ad79c64bd54ad11943819900
 DIST nftables-1.0.3.tar.bz2.sig 566 BLAKE2B 
8cf74954708c827e16932c58481981838b129f598f760a457fc2ab503500dfdf4de42f671d07e7920a028d2489f8a96a14bf8698fa3a9ad9997ce3411d6be0fd
 SHA512 
f8a4acc6cf0a844720cf4bf2808b0c6a103f81f54d90cf155bd2c86938d997dc92d405b94eb91b725edeb8e76ef23c6ec318f067b30b2049fbef765230020ff2
+DIST nftables-1.0.4.tar.bz2 979540 BLAKE2B 
1b2c596245cb7f1bc574250d13b9ff6f424f98e98d5955befadb83ea0a71acc6524b066e39f1e9d151f3946b690b2dee45b7d416347371f88911c8d6a9de047e
 SHA512 
7d96c791365d399b3b930a1f9d6c6aa4a8c2180c258bb5163d9d62ea4d094857e2ebb20fc3ef13b89f449f216d0a291d3bcf288704f1e3bd3ceb51b6cadf8215
+DIST nftables-1.0.4.tar.bz2.sig 566 BLAKE2B 
1ac42a2eb678abcc21d01bbaf5f9a3af3f4c49fa1f0732f2522d3da14e94aacbb12075650d2786224f8fef869fcdc94a1463bd76272aa44fc50ea31a8ebae1bf
 SHA512 
2d2acd4810c1ede844e1eac81a5480866ad40ae71dfcf92d166fd9295290adff70d35d7de8cf1ec81ab63d184b221419ff144bc7010e18884afa992173723af8

diff --git a/net-firewall/nftables/nftables-1.0.4.ebuild 
b/net-firewall/nftables/nftables-1.0.4.ebuild
new file mode 100644
index 000000000000..d3b5ea2ddc40
--- /dev/null
+++ b/net-firewall/nftables/nftables-1.0.4.ebuild
@@ -0,0 +1,201 @@
+# Copyright 1999-2022 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+DISTUTILS_OPTIONAL=1
+PYTHON_COMPAT=( python3_{8..11} )
+VERIFY_SIG_OPENPGP_KEY_PATH="${BROOT}"/usr/share/openpgp-keys/netfilter.org.asc
+inherit edo linux-info distutils-r1 systemd verify-sig
+
+DESCRIPTION="Linux kernel (3.13+) firewall, NAT and packet mangling tools"
+HOMEPAGE="https://netfilter.org/projects/nftables/";
+
+if [[ ${PV} =~ ^[9]{4,}$ ]]; then
+       inherit autotools git-r3
+       EGIT_REPO_URI="https://git.netfilter.org/${PN}";
+
+       BDEPEND="
+               sys-devel/bison
+               sys-devel/flex
+       "
+else
+       SRC_URI="https://netfilter.org/projects/nftables/files/${P}.tar.bz2
+               verify-sig? ( 
https://netfilter.org/projects/nftables/files/${P}.tar.bz2.sig )"
+       KEYWORDS="~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~riscv 
~sparc ~x86"
+       BDEPEND+="verify-sig? ( sec-keys/openpgp-keys-netfilter )"
+fi
+
+LICENSE="GPL-2"
+SLOT="0/1"
+IUSE="debug doc +gmp json libedit +modern-kernel python +readline static-libs 
test xtables"
+RESTRICT="test? ( userpriv ) !test? ( test )"
+
+RDEPEND="
+       >=net-libs/libmnl-1.0.4:0=
+       >=net-libs/libnftnl-1.2.2:0=
+       gmp? ( dev-libs/gmp:= )
+       json? ( dev-libs/jansson:= )
+       python? ( ${PYTHON_DEPS} )
+       readline? ( sys-libs/readline:= )
+       xtables? ( >=net-firewall/iptables-1.6.1:= )
+"
+
+DEPEND="${RDEPEND}"
+
+BDEPEND+="
+       virtual/pkgconfig
+       doc? (
+               app-text/asciidoc
+               >=app-text/docbook2X-0.8.8-r4
+       )
+       python? ( ${PYTHON_DEPS} )
+"
+
+REQUIRED_USE="
+       python? ( ${PYTHON_REQUIRED_USE} )
+       libedit? ( !readline )
+"
+
+pkg_setup() {
+       if kernel_is ge 3 13; then
+               if use modern-kernel && kernel_is lt 3 18; then
+                       eerror "The modern-kernel USE flag requires kernel 
version 3.18 or newer to work properly."
+               fi
+               CONFIG_CHECK="~NF_TABLES"
+               linux-info_pkg_setup
+       else
+               eerror "This package requires kernel version 3.13 or newer to 
work properly."
+       fi
+}
+
+src_prepare() {
+       default
+
+       if [[ ${PV} =~ ^[9]{4,}$ ]] ; then
+               eautoreconf
+       fi
+
+       if use python; then
+               pushd py >/dev/null || die
+               distutils-r1_src_prepare
+               popd >/dev/null || die
+       fi
+}
+
+src_configure() {
+       local myeconfargs=(
+               # We handle python separately
+               --disable-python
+               --disable-static
+               --sbindir="${EPREFIX}"/sbin
+               $(use_enable debug)
+               $(use_enable doc man-doc)
+               $(use_with !gmp mini_gmp)
+               $(use_with json)
+               $(use_with libedit cli editline)
+               $(use_with readline cli readline)
+               $(use_enable static-libs static)
+               $(use_with xtables)
+       )
+       econf "${myeconfargs[@]}"
+
+       if use python; then
+               pushd py >/dev/null || die
+               distutils-r1_src_configure
+               popd >/dev/null || die
+       fi
+}
+
+src_compile() {
+       default
+
+       if use python; then
+               pushd py >/dev/null || die
+               distutils-r1_src_compile
+               popd >/dev/null || die
+       fi
+}
+
+src_test() {
+       emake check
+
+       edo tests/shell/run-tests.sh -v
+
+       # Need to rig up Python eclass if using this, but it doesn't seem to 
work
+       # for me anyway.
+       #cd tests/py || die
+       #"${EPYTHON}" nft-test.py || die
+}
+
+src_install() {
+       default
+
+       if ! use doc && [[ ! ${PV} =~ ^[9]{4,}$ ]]; then
+               pushd doc >/dev/null || die
+               doman *.?
+               popd >/dev/null || die
+       fi
+
+       # Do it here instead of in src_prepare to avoid eautoreconf
+       # rmdir lets us catch if more files end up installed in /etc/nftables
+       dodir /usr/share/doc/${PF}/skels/
+       mv "${ED}"/etc/nftables/osf "${ED}"/usr/share/doc/${PF}/skels/osf || die
+       rmdir "${ED}"/etc/nftables || die
+
+       local mksuffix="$(usex modern-kernel '-mk' '')"
+
+       exeinto /usr/libexec/${PN}
+       newexe "${FILESDIR}"/libexec/${PN}${mksuffix}.sh ${PN}.sh
+       newconfd "${FILESDIR}"/${PN}${mksuffix}.confd ${PN}
+       newinitd "${FILESDIR}"/${PN}${mksuffix}.init-r1 ${PN}
+       keepdir /var/lib/nftables
+
+       systemd_dounit "${FILESDIR}"/systemd/${PN}-restore.service
+
+       if use python ; then
+               pushd py >/dev/null || die
+               distutils-r1_src_install
+               popd >/dev/null || die
+       fi
+
+       find "${ED}" -type f -name "*.la" -delete || die
+}
+
+pkg_postinst() {
+       local save_file
+       save_file="${EROOT}"/var/lib/nftables/rules-save
+
+       # In order for the nftables-restore systemd service to start
+       # the save_file must exist.
+       if [[ ! -f "${save_file}" ]]; then
+               ( umask 177; touch "${save_file}" )
+       elif [[ $(( "$( stat --printf '%05a' "${save_file}" )" & 07177 )) -ne 0 
]]; then
+               ewarn "Your system has dangerous permissions for ${save_file}"
+               ewarn "It is probably affected by bug #691326."
+               ewarn "You may need to fix the permissions of the file. To do 
so,"
+               ewarn "you can run the command in the line below as root."
+               ewarn "    'chmod 600 \"${save_file}\"'"
+       fi
+
+       if has_version 'sys-apps/systemd'; then
+               elog "If you wish to enable the firewall rules on boot (on 
systemd) you"
+               elog "will need to enable the nftables-restore service."
+               elog "    'systemctl enable ${PN}-restore.service'"
+               elog
+               elog "If you are creating firewall rules before the next system 
restart"
+               elog "the nftables-restore service must be manually started in 
order to"
+               elog "save those rules on shutdown."
+       fi
+
+       if has_version 'sys-apps/openrc'; then
+               elog "If you wish to enable the firewall rules on boot (on 
openrc) you"
+               elog "will need to enable the nftables service."
+               elog "    'rc-update add ${PN} default'"
+               elog
+               elog "If you are creating or updating the firewall rules and 
wish to save"
+               elog "them to be loaded on the next restart, use the \"save\" 
functionality"
+               elog "in the init script."
+               elog "    'rc-service ${PN} save'"
+       fi
+}

Reply via email to