commit:     79559026aedfa0a4eff3a063a301d8e68fb06934
Author:     Sam James <sam <AT> gentoo <DOT> org>
AuthorDate: Mon May  1 13:33:00 2023 +0000
Commit:     Sam James <sam <AT> gentoo <DOT> org>
CommitDate: Mon May  1 13:33:00 2023 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=79559026

net-firewall/nftables: drop 1.0.5-r1, 1.0.6-r1

Signed-off-by: Sam James <sam <AT> gentoo.org>

 net-firewall/nftables/Manifest                 |   4 -
 net-firewall/nftables/nftables-1.0.5-r1.ebuild | 231 -------------------------
 net-firewall/nftables/nftables-1.0.6-r1.ebuild | 231 -------------------------
 3 files changed, 466 deletions(-)

diff --git a/net-firewall/nftables/Manifest b/net-firewall/nftables/Manifest
index 2d752595dfcf..61843826524a 100644
--- a/net-firewall/nftables/Manifest
+++ b/net-firewall/nftables/Manifest
@@ -1,6 +1,2 @@
-DIST nftables-1.0.5.tar.bz2 982538 BLAKE2B 
5d58170b8fc6feccc1581653cd0815d37b59b43b7f4f9bff9f7fb46928c6c7eee5a6f07150c404f7cf42f5a1d2e980860a4dd2589b99773179e019a093c42cfa
 SHA512 
51cbf10579db7eed58f4358044840f2ce1bffe84533c5fb03e0ebcc702970856455576ac793169c94d38a9f8148e33631ad91444e54a8be189d93af7c27feb9a
-DIST nftables-1.0.5.tar.bz2.sig 566 BLAKE2B 
7744a84c213999b35c3094fa5d9f974acec6fedac3d310422834285823825bcb14fb55b463d88b91fa41d79e33ce34498769992d912b7178fa1f70bd7a1e0977
 SHA512 
fbff6b5b28d81e964d4523729c7866d0b52d764d090cae70a43d850bc579b17308ec41a3d7fe6707877850028e99ad09c33b5e87fa16ac5199dfeba193a61511
-DIST nftables-1.0.6.tar.xz 834584 BLAKE2B 
7c14db883f0ee9394b603870c93dcc92ce472bf0349a59d0e377f1d44efc870df3449d6f2dc9a198f2e396e5d73b19532dac498e832083ca8cf65cc78db9ccd4
 SHA512 
afe08381acd27d39cc94743190b07c579f8c49c4182c9b8753d5b3a0b7d1fe89ed664fdbc19cef1547c3ca4a0c1e32ca4303dba9ec626272fa08c77e88c11119
-DIST nftables-1.0.6.tar.xz.sig 566 BLAKE2B 
3f90c48f521a1c433be9d0bee3b2beb080ac51f07c213f598af217b2d1b2e883e432f014c1a378c18eac4b8620e323fbdebb654aa53b345210a3f62ccfe93507
 SHA512 
83657d213e675c8ffa377112efc7fb0f5b756287f06aa9ccd3716eb76b87a14dab01a3ee82929511f26f7e9ce407d8b7ac0dd706c8211ad007fdfcf11d679a93
 DIST nftables-1.0.7.tar.xz 857140 BLAKE2B 
972adbb958f36b300618ce03fbbfc1fdb6fd55a3512227e4bc1fd71365be5cc8d3ee105424e8cc513588100bf00d5e69486310435efb2b0d3f5d464ed6999859
 SHA512 
063f3a42327fd4dca9214314c7e7bcc7310f2ccbbce4c36f86a291d61d443f94b0f91435ecd04eb757596df8be91a802daeef394ba422c3623a81b2917e01116
 DIST nftables-1.0.7.tar.xz.sig 566 BLAKE2B 
53abe2598e9b362912d3e2e94ea6e04352d0484b9d1d645c8f18b6133be53d63a8d71d500e57528a57aededb84dedaf61010236afda560b16e7642db45e2f45c
 SHA512 
b5821aa6939dc5b4d16065d9d7083e4ff40b9f99417354efbcbc95a8ccde43108b99a5b8a75a24086cd3df2291a049cad3adb7b06e2c098f0eb7861f85c5c768

diff --git a/net-firewall/nftables/nftables-1.0.5-r1.ebuild 
b/net-firewall/nftables/nftables-1.0.5-r1.ebuild
deleted file mode 100644
index 232290e36198..000000000000
--- a/net-firewall/nftables/nftables-1.0.5-r1.ebuild
+++ /dev/null
@@ -1,231 +0,0 @@
-# Copyright 1999-2023 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=8
-
-DISTUTILS_OPTIONAL=1
-PYTHON_COMPAT=( python3_{9..11} )
-VERIFY_SIG_OPENPGP_KEY_PATH="${BROOT}"/usr/share/openpgp-keys/netfilter.org.asc
-inherit edo linux-info distutils-r1 systemd verify-sig
-
-DESCRIPTION="Linux kernel (3.13+) firewall, NAT and packet mangling tools"
-HOMEPAGE="https://netfilter.org/projects/nftables/";
-
-if [[ ${PV} =~ ^[9]{4,}$ ]]; then
-       inherit autotools git-r3
-       EGIT_REPO_URI="https://git.netfilter.org/${PN}";
-       BDEPEND="sys-devel/bison"
-else
-       SRC_URI="https://netfilter.org/projects/nftables/files/${P}.tar.bz2
-               verify-sig? ( 
https://netfilter.org/projects/nftables/files/${P}.tar.bz2.sig )"
-       KEYWORDS="amd64 arm arm64 hppa ~ia64 ~loong ~mips ppc ppc64 ~riscv 
sparc x86"
-       BDEPEND="verify-sig? ( sec-keys/openpgp-keys-netfilter )"
-fi
-
-LICENSE="GPL-2"
-SLOT="0/1"
-IUSE="debug doc +gmp json libedit +modern-kernel python +readline static-libs 
test xtables"
-RESTRICT="!test? ( test )"
-
-RDEPEND="
-       >=net-libs/libmnl-1.0.4:0=
-       >=net-libs/libnftnl-1.2.3:0=
-       gmp? ( dev-libs/gmp:= )
-       json? ( dev-libs/jansson:= )
-       python? ( ${PYTHON_DEPS} )
-       readline? ( sys-libs/readline:= )
-       xtables? ( >=net-firewall/iptables-1.6.1:= )
-"
-
-DEPEND="${RDEPEND}"
-
-BDEPEND+="
-       sys-devel/flex
-       virtual/pkgconfig
-       doc? (
-               app-text/asciidoc
-               >=app-text/docbook2X-0.8.8-r4
-       )
-       python? ( ${PYTHON_DEPS} )
-"
-
-REQUIRED_USE="
-       python? ( ${PYTHON_REQUIRED_USE} )
-       libedit? ( !readline )
-"
-
-pkg_setup() {
-       if kernel_is ge 3 13; then
-               if use modern-kernel && kernel_is lt 3 18; then
-                       eerror "The modern-kernel USE flag requires kernel 
version 3.18 or newer to work properly."
-               fi
-               CONFIG_CHECK="~NF_TABLES"
-               linux-info_pkg_setup
-       else
-               eerror "This package requires kernel version 3.13 or newer to 
work properly."
-       fi
-}
-
-src_prepare() {
-       default
-
-       if [[ ${PV} =~ ^[9]{4,}$ ]] ; then
-               eautoreconf
-       fi
-
-       if use python; then
-               pushd py >/dev/null || die
-               distutils-r1_src_prepare
-               popd >/dev/null || die
-       fi
-}
-
-src_configure() {
-       local myeconfargs=(
-               # We handle python separately
-               --disable-python
-               --disable-static
-               --sbindir="${EPREFIX}"/sbin
-               $(use_enable debug)
-               $(use_enable doc man-doc)
-               $(use_with !gmp mini_gmp)
-               $(use_with json)
-               $(use_with libedit cli editline)
-               $(use_with readline cli readline)
-               $(use_enable static-libs static)
-               $(use_with xtables)
-       )
-       econf "${myeconfargs[@]}"
-
-       if use python; then
-               pushd py >/dev/null || die
-               distutils-r1_src_configure
-               popd >/dev/null || die
-       fi
-}
-
-src_compile() {
-       default
-
-       if use python; then
-               pushd py >/dev/null || die
-               distutils-r1_src_compile
-               popd >/dev/null || die
-       fi
-}
-
-src_test() {
-       emake check
-
-       if [[ ${EUID} == 0 ]]; then
-               edo tests/shell/run-tests.sh -v
-       else
-               ewarn "Skipping shell tests (requires root)"
-       fi
-
-       # Need to rig up Python eclass if using this, but it doesn't seem to 
work
-       # for me anyway.
-       #cd tests/py || die
-       #"${EPYTHON}" nft-test.py || die
-}
-
-src_install() {
-       default
-
-       if ! use doc && [[ ! ${PV} =~ ^[9]{4,}$ ]]; then
-               pushd doc >/dev/null || die
-               doman *.?
-               popd >/dev/null || die
-       fi
-
-       # Do it here instead of in src_prepare to avoid eautoreconf
-       # rmdir lets us catch if more files end up installed in /etc/nftables
-       dodir /usr/share/doc/${PF}/skels/
-       mv "${ED}"/etc/nftables/osf "${ED}"/usr/share/doc/${PF}/skels/osf || die
-       rmdir "${ED}"/etc/nftables || die
-
-       local mksuffix="$(usex modern-kernel '-mk' '')"
-
-       exeinto /usr/libexec/${PN}
-       newexe "${FILESDIR}"/libexec/${PN}${mksuffix}.sh ${PN}.sh
-       newconfd "${FILESDIR}"/${PN}${mksuffix}.confd ${PN}
-       newinitd "${FILESDIR}"/${PN}${mksuffix}.init-r1 ${PN}
-       keepdir /var/lib/nftables
-
-       systemd_dounit "${FILESDIR}"/systemd/${PN}-restore.service
-
-       if use python ; then
-               pushd py >/dev/null || die
-               distutils-r1_src_install
-               popd >/dev/null || die
-       fi
-
-       find "${ED}" -type f -name "*.la" -delete || die
-}
-
-pkg_preinst() {
-       local stderr
-
-       # There's a history of regressions with nftables upgrades. Perform a
-       # safety check to help us spot them earlier. For the check to pass, the
-       # currently loaded ruleset, if any, must be successfully evaluated by
-       # the newly built instance of nft(8).
-       if [[ -n ${ROOT} ]] || [[ ! -d /sys/module/nftables ]] || [[ ! -x 
/sbin/nft ]]; then
-               # Either nftables isn't yet in use or nft(8) cannot be executed.
-               return
-       elif ! stderr=$(umask 177; /sbin/nft -t list ruleset 2>&1 
>"${T}"/ruleset.nft); then
-               # Report errors induced by trying to list the ruleset but don't
-               # treat them as being fatal.
-               printf '%s\n' "${stderr}" >&2
-       elif [[ ${stderr} == *"is managed by iptables-nft"* ]]; then
-               # Rulesets generated by iptables-nft are special in nature and
-               # will not always be printed in a way that constitutes a valid
-               # syntax for ntf(8). Ignore them.
-               return
-       elif set -- "${ED}"/usr/lib*/libnftables.so; ! LD_LIBRARY_PATH=${1%/*} 
"${ED}"/sbin/nft -c -f -- "${T}"/ruleset.nft; then
-               eerror "Your currently loaded ruleset cannot be parsed by the 
newly built instance of"
-               eerror "nft. This probably means that there is a regression 
introduced by v${PV}."
-               eerror "(To make the ebuild fail instead of warning, set 
NFTABLES_ABORT_ON_RELOAD_FAILURE=1.)"
-               if [[ -n ${NFTABLES_ABORT_ON_RELOAD_FAILURE} ]] ; then
-                       die "Aborting because of failed nft reload!"
-               fi
-       fi
-}
-
-pkg_postinst() {
-       local save_file
-       save_file="${EROOT}"/var/lib/nftables/rules-save
-
-       # In order for the nftables-restore systemd service to start
-       # the save_file must exist.
-       if [[ ! -f "${save_file}" ]]; then
-               ( umask 177; touch "${save_file}" )
-       elif [[ $(( "$( stat --printf '%05a' "${save_file}" )" & 07177 )) -ne 0 
]]; then
-               ewarn "Your system has dangerous permissions for ${save_file}"
-               ewarn "It is probably affected by bug #691326."
-               ewarn "You may need to fix the permissions of the file. To do 
so,"
-               ewarn "you can run the command in the line below as root."
-               ewarn "    'chmod 600 \"${save_file}\"'"
-       fi
-
-       if has_version 'sys-apps/systemd'; then
-               elog "If you wish to enable the firewall rules on boot (on 
systemd) you"
-               elog "will need to enable the nftables-restore service."
-               elog "    'systemctl enable ${PN}-restore.service'"
-               elog
-               elog "If you are creating firewall rules before the next system 
restart"
-               elog "the nftables-restore service must be manually started in 
order to"
-               elog "save those rules on shutdown."
-       fi
-
-       if has_version 'sys-apps/openrc'; then
-               elog "If you wish to enable the firewall rules on boot (on 
openrc) you"
-               elog "will need to enable the nftables service."
-               elog "    'rc-update add ${PN} default'"
-               elog
-               elog "If you are creating or updating the firewall rules and 
wish to save"
-               elog "them to be loaded on the next restart, use the \"save\" 
functionality"
-               elog "in the init script."
-               elog "    'rc-service ${PN} save'"
-       fi
-}

diff --git a/net-firewall/nftables/nftables-1.0.6-r1.ebuild 
b/net-firewall/nftables/nftables-1.0.6-r1.ebuild
deleted file mode 100644
index 80c434c2fc43..000000000000
--- a/net-firewall/nftables/nftables-1.0.6-r1.ebuild
+++ /dev/null
@@ -1,231 +0,0 @@
-# Copyright 1999-2023 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI=8
-
-DISTUTILS_OPTIONAL=1
-PYTHON_COMPAT=( python3_{9..11} )
-VERIFY_SIG_OPENPGP_KEY_PATH="${BROOT}"/usr/share/openpgp-keys/netfilter.org.asc
-inherit edo linux-info distutils-r1 systemd verify-sig
-
-DESCRIPTION="Linux kernel (3.13+) firewall, NAT and packet mangling tools"
-HOMEPAGE="https://netfilter.org/projects/nftables/";
-
-if [[ ${PV} =~ ^[9]{4,}$ ]]; then
-       inherit autotools git-r3
-       EGIT_REPO_URI="https://git.netfilter.org/${PN}";
-       BDEPEND="sys-devel/bison"
-else
-       SRC_URI="https://netfilter.org/projects/nftables/files/${P}.tar.xz
-               verify-sig? ( 
https://netfilter.org/projects/nftables/files/${P}.tar.xz.sig )"
-       KEYWORDS="amd64 arm arm64 hppa ~ia64 ~loong ~mips ppc ppc64 ~riscv 
sparc x86"
-       BDEPEND="verify-sig? ( sec-keys/openpgp-keys-netfilter )"
-fi
-
-LICENSE="GPL-2"
-SLOT="0/1"
-IUSE="debug doc +gmp json libedit +modern-kernel python +readline static-libs 
test xtables"
-RESTRICT="!test? ( test )"
-
-RDEPEND="
-       >=net-libs/libmnl-1.0.4:=
-       >=net-libs/libnftnl-1.2.4:=
-       gmp? ( dev-libs/gmp:= )
-       json? ( dev-libs/jansson:= )
-       python? ( ${PYTHON_DEPS} )
-       readline? ( sys-libs/readline:= )
-       xtables? ( >=net-firewall/iptables-1.6.1:= )
-"
-
-DEPEND="${RDEPEND}"
-
-BDEPEND+="
-       sys-devel/flex
-       virtual/pkgconfig
-       doc? (
-               app-text/asciidoc
-               >=app-text/docbook2X-0.8.8-r4
-       )
-       python? ( ${PYTHON_DEPS} )
-"
-
-REQUIRED_USE="
-       python? ( ${PYTHON_REQUIRED_USE} )
-       libedit? ( !readline )
-"
-
-pkg_setup() {
-       if kernel_is ge 3 13; then
-               if use modern-kernel && kernel_is lt 3 18; then
-                       eerror "The modern-kernel USE flag requires kernel 
version 3.18 or newer to work properly."
-               fi
-               CONFIG_CHECK="~NF_TABLES"
-               linux-info_pkg_setup
-       else
-               eerror "This package requires kernel version 3.13 or newer to 
work properly."
-       fi
-}
-
-src_prepare() {
-       default
-
-       if [[ ${PV} =~ ^[9]{4,}$ ]] ; then
-               eautoreconf
-       fi
-
-       if use python; then
-               pushd py >/dev/null || die
-               distutils-r1_src_prepare
-               popd >/dev/null || die
-       fi
-}
-
-src_configure() {
-       local myeconfargs=(
-               # We handle python separately
-               --disable-python
-               --disable-static
-               --sbindir="${EPREFIX}"/sbin
-               $(use_enable debug)
-               $(use_enable doc man-doc)
-               $(use_with !gmp mini_gmp)
-               $(use_with json)
-               $(use_with libedit cli editline)
-               $(use_with readline cli readline)
-               $(use_enable static-libs static)
-               $(use_with xtables)
-       )
-       econf "${myeconfargs[@]}"
-
-       if use python; then
-               pushd py >/dev/null || die
-               distutils-r1_src_configure
-               popd >/dev/null || die
-       fi
-}
-
-src_compile() {
-       default
-
-       if use python; then
-               pushd py >/dev/null || die
-               distutils-r1_src_compile
-               popd >/dev/null || die
-       fi
-}
-
-src_test() {
-       emake check
-
-       if [[ ${EUID} == 0 ]]; then
-               edo tests/shell/run-tests.sh -v
-       else
-               ewarn "Skipping shell tests (requires root)"
-       fi
-
-       # Need to rig up Python eclass if using this, but it doesn't seem to 
work
-       # for me anyway.
-       #cd tests/py || die
-       #"${EPYTHON}" nft-test.py || die
-}
-
-src_install() {
-       default
-
-       if ! use doc && [[ ! ${PV} =~ ^[9]{4,}$ ]]; then
-               pushd doc >/dev/null || die
-               doman *.?
-               popd >/dev/null || die
-       fi
-
-       # Do it here instead of in src_prepare to avoid eautoreconf
-       # rmdir lets us catch if more files end up installed in /etc/nftables
-       dodir /usr/share/doc/${PF}/skels/
-       mv "${ED}"/etc/nftables/osf "${ED}"/usr/share/doc/${PF}/skels/osf || die
-       rmdir "${ED}"/etc/nftables || die
-
-       local mksuffix="$(usex modern-kernel '-mk' '')"
-
-       exeinto /usr/libexec/${PN}
-       newexe "${FILESDIR}"/libexec/${PN}${mksuffix}.sh ${PN}.sh
-       newconfd "${FILESDIR}"/${PN}${mksuffix}.confd ${PN}
-       newinitd "${FILESDIR}"/${PN}${mksuffix}.init-r1 ${PN}
-       keepdir /var/lib/nftables
-
-       systemd_dounit "${FILESDIR}"/systemd/${PN}-restore.service
-
-       if use python ; then
-               pushd py >/dev/null || die
-               distutils-r1_src_install
-               popd >/dev/null || die
-       fi
-
-       find "${ED}" -type f -name "*.la" -delete || die
-}
-
-pkg_preinst() {
-       local stderr
-
-       # There's a history of regressions with nftables upgrades. Perform a
-       # safety check to help us spot them earlier. For the check to pass, the
-       # currently loaded ruleset, if any, must be successfully evaluated by
-       # the newly built instance of nft(8).
-       if [[ -n ${ROOT} ]] || [[ ! -d /sys/module/nftables ]] || [[ ! -x 
/sbin/nft ]]; then
-               # Either nftables isn't yet in use or nft(8) cannot be executed.
-               return
-       elif ! stderr=$(umask 177; /sbin/nft -t list ruleset 2>&1 
>"${T}"/ruleset.nft); then
-               # Report errors induced by trying to list the ruleset but don't
-               # treat them as being fatal.
-               printf '%s\n' "${stderr}" >&2
-       elif [[ ${stderr} == *"is managed by iptables-nft"* ]]; then
-               # Rulesets generated by iptables-nft are special in nature and
-               # will not always be printed in a way that constitutes a valid
-               # syntax for ntf(8). Ignore them.
-               return
-       elif set -- "${ED}"/usr/lib*/libnftables.so; ! LD_LIBRARY_PATH=${1%/*} 
"${ED}"/sbin/nft -c -f -- "${T}"/ruleset.nft; then
-               eerror "Your currently loaded ruleset cannot be parsed by the 
newly built instance of"
-               eerror "nft. This probably means that there is a regression 
introduced by v${PV}."
-               eerror "(To make the ebuild fail instead of warning, set 
NFTABLES_ABORT_ON_RELOAD_FAILURE=1.)"
-               if [[ -n ${NFTABLES_ABORT_ON_RELOAD_FAILURE} ]] ; then
-                       die "Aborting because of failed nft reload!"
-               fi
-       fi
-}
-
-pkg_postinst() {
-       local save_file
-       save_file="${EROOT}"/var/lib/nftables/rules-save
-
-       # In order for the nftables-restore systemd service to start
-       # the save_file must exist.
-       if [[ ! -f "${save_file}" ]]; then
-               ( umask 177; touch "${save_file}" )
-       elif [[ $(( "$( stat --printf '%05a' "${save_file}" )" & 07177 )) -ne 0 
]]; then
-               ewarn "Your system has dangerous permissions for ${save_file}"
-               ewarn "It is probably affected by bug #691326."
-               ewarn "You may need to fix the permissions of the file. To do 
so,"
-               ewarn "you can run the command in the line below as root."
-               ewarn "    'chmod 600 \"${save_file}\"'"
-       fi
-
-       if has_version 'sys-apps/systemd'; then
-               elog "If you wish to enable the firewall rules on boot (on 
systemd) you"
-               elog "will need to enable the nftables-restore service."
-               elog "    'systemctl enable ${PN}-restore.service'"
-               elog
-               elog "If you are creating firewall rules before the next system 
restart"
-               elog "the nftables-restore service must be manually started in 
order to"
-               elog "save those rules on shutdown."
-       fi
-
-       if has_version 'sys-apps/openrc'; then
-               elog "If you wish to enable the firewall rules on boot (on 
openrc) you"
-               elog "will need to enable the nftables service."
-               elog "    'rc-update add ${PN} default'"
-               elog
-               elog "If you are creating or updating the firewall rules and 
wish to save"
-               elog "them to be loaded on the next restart, use the \"save\" 
functionality"
-               elog "in the init script."
-               elog "    'rc-service ${PN} save'"
-       fi
-}

Reply via email to