commit:     f2c7695094408d0d81dc0a99201d160c59e694f2
Author:     Anthony G. Basile <blueness <AT> gentoo <DOT> org>
AuthorDate: Sun Jul 21 01:20:15 2019 +0000
Commit:     Anthony G. Basile <blueness <AT> gentoo <DOT> org>
CommitDate: Sun Jul 21 01:20:15 2019 +0000
URL:        https://gitweb.gentoo.org/proj/musl.git/commit/?id=f2c76950

net-firewall/iptables: in tree version works

Signed-off-by: Anthony G. Basile <blueness <AT> gentoo.org>

 net-firewall/iptables/Manifest                     |   1 -
 net-firewall/iptables/files/ip6tables-1.4.13.confd |  19 ---
 .../iptables/files/iptables-1.4.13-r1.init         | 130 ---------------------
 net-firewall/iptables/files/iptables-1.4.13.confd  |  19 ---
 .../iptables/files/iptables-1.4.21-musl.patch      |  76 ------------
 net-firewall/iptables/files/iptables.init          | 130 ---------------------
 .../files/systemd/ip6tables-restore.service        |  14 ---
 .../iptables/files/systemd/ip6tables-store.service |  11 --
 .../iptables/files/systemd/ip6tables.service       |   6 -
 .../files/systemd/iptables-restore.service         |  14 ---
 .../iptables/files/systemd/iptables-store.service  |  11 --
 .../iptables/files/systemd/iptables.service        |   6 -
 net-firewall/iptables/iptables-1.4.21-r1.ebuild    |  95 ---------------
 net-firewall/iptables/metadata.xml                 |  27 -----
 14 files changed, 559 deletions(-)

diff --git a/net-firewall/iptables/Manifest b/net-firewall/iptables/Manifest
deleted file mode 100644
index e3c1f23..0000000
--- a/net-firewall/iptables/Manifest
+++ /dev/null
@@ -1 +0,0 @@
-DIST iptables-1.4.21.tar.bz2 547439 SHA256 
52004c68021da9a599feed27f65defcfb22128f7da2c0531c0f75de0f479d3e0 SHA512 
dd4baccdb080284d8620e6ed59beafc2677813f3e099051764b07f8e394f6d94ca11861b181f3cce7c55c66de64c1e2add13dc1a0b64e24050cd9fb7aea0689b
 WHIRLPOOL 
475541d1b2b7fe4ee8fa3b537274ef082aab8bfd262201ee14cd53577dfac6f591445cc6d64ed93b226a4b71d54ae1b9ab4cbb378b5440861a585f770f0db200

diff --git a/net-firewall/iptables/files/ip6tables-1.4.13.confd 
b/net-firewall/iptables/files/ip6tables-1.4.13.confd
deleted file mode 100644
index 3bb3698..0000000
--- a/net-firewall/iptables/files/ip6tables-1.4.13.confd
+++ /dev/null
@@ -1,19 +0,0 @@
-# /etc/conf.d/ip6tables
-
-# Location in which iptables initscript will save set rules on 
-# service shutdown
-IP6TABLES_SAVE="/var/lib/ip6tables/rules-save"
-
-# Options to pass to iptables-save and iptables-restore 
-SAVE_RESTORE_OPTIONS="-c"
-
-# Save state on stopping iptables
-SAVE_ON_STOP="yes"
-
-# If you need to log iptables messages as soon as iptables starts,
-# AND your logger does NOT depend on the network, then you may wish
-# to uncomment the next line.
-# If your logger depends on the network, and you uncomment this line
-# you will create an unresolvable circular dependency during startup.
-# After commenting or uncommenting this line, you must run 'rc-update -u'.
-#rc_use="logger"

diff --git a/net-firewall/iptables/files/iptables-1.4.13-r1.init 
b/net-firewall/iptables/files/iptables-1.4.13-r1.init
deleted file mode 100644
index 56d2a70..0000000
--- a/net-firewall/iptables/files/iptables-1.4.13-r1.init
+++ /dev/null
@@ -1,130 +0,0 @@
-#!/sbin/openrc-run
-# Copyright 1999-2013 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Id$
-
-extra_commands="check save panic"
-extra_started_commands="reload"
-
-iptables_name=${SVCNAME}
-case ${iptables_name} in
-iptables|ip6tables) ;;
-*) iptables_name="iptables" ;;
-esac
-
-iptables_bin="/sbin/${iptables_name}"
-case ${iptables_name} in
-       iptables)  iptables_proc="/proc/net/ip_tables_names"
-                  iptables_save=${IPTABLES_SAVE};;
-       ip6tables) iptables_proc="/proc/net/ip6_tables_names"
-                  iptables_save=${IP6TABLES_SAVE};;
-esac
-
-depend() {
-       need localmount #434774
-       before net
-}
-
-set_table_policy() {
-       local chains table=$1 policy=$2
-       case ${table} in
-               nat)    chains="PREROUTING POSTROUTING OUTPUT";;
-               mangle) chains="PREROUTING INPUT FORWARD OUTPUT POSTROUTING";;
-               filter) chains="INPUT FORWARD OUTPUT";;
-               *)      chains="";;
-       esac
-       local chain
-       for chain in ${chains} ; do
-               ${iptables_bin} -t ${table} -P ${chain} ${policy}
-       done
-}
-
-checkkernel() {
-       if [ ! -e ${iptables_proc} ] ; then
-               eerror "Your kernel lacks ${iptables_name} support, please load"
-               eerror "appropriate modules and try again."
-               return 1
-       fi
-       return 0
-}
-checkconfig() {
-       if [ ! -f ${iptables_save} ] ; then
-               eerror "Not starting ${iptables_name}.  First create some rules 
then run:"
-               eerror "/etc/init.d/${iptables_name} save"
-               return 1
-       fi
-       return 0
-}
-
-start() {
-       checkconfig || return 1
-       ebegin "Loading ${iptables_name} state and starting firewall"
-       ${iptables_bin}-restore ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
-       eend $?
-}
-
-stop() {
-       if [ "${SAVE_ON_STOP}" = "yes" ] ; then
-               save || return 1
-       fi
-       checkkernel || return 1
-       ebegin "Stopping firewall"
-       local a
-       for a in $(cat ${iptables_proc}) ; do
-               set_table_policy $a ACCEPT
-
-               ${iptables_bin} -F -t $a
-               ${iptables_bin} -X -t $a
-       done
-       eend $?
-}
-
-reload() {
-       checkkernel || return 1
-       checkrules || return 1
-       ebegin "Flushing firewall"
-       local a
-       for a in $(cat ${iptables_proc}) ; do
-               ${iptables_bin} -F -t $a
-               ${iptables_bin} -X -t $a
-       done
-       eend $?
-
-       start
-}
-
-checkrules() {
-       ebegin "Checking rules"
-       ${iptables_bin}-restore --test ${SAVE_RESTORE_OPTIONS} < 
"${iptables_save}"
-       eend $?
-}
-
-check() {
-       # Short name for users of init.d script.
-       checkrules
-}
-
-save() {
-       ebegin "Saving ${iptables_name} state"
-       checkpath -q -d "$(dirname "${iptables_save}")"
-       checkpath -q -m 0600 -f "${iptables_save}"
-       ${iptables_bin}-save ${SAVE_RESTORE_OPTIONS} > "${iptables_save}"
-       eend $?
-}
-
-panic() {
-       checkkernel || return 1
-       if service_started ${iptables_name}; then
-               rc-service ${iptables_name} stop
-       fi
-
-       local a
-       ebegin "Dropping all packets"
-       for a in $(cat ${iptables_proc}) ; do
-               ${iptables_bin} -F -t $a
-               ${iptables_bin} -X -t $a
-
-               set_table_policy $a DROP
-       done
-       eend $?
-}

diff --git a/net-firewall/iptables/files/iptables-1.4.13.confd 
b/net-firewall/iptables/files/iptables-1.4.13.confd
deleted file mode 100644
index 7225374..0000000
--- a/net-firewall/iptables/files/iptables-1.4.13.confd
+++ /dev/null
@@ -1,19 +0,0 @@
-# /etc/conf.d/iptables
-
-# Location in which iptables initscript will save set rules on 
-# service shutdown
-IPTABLES_SAVE="/var/lib/iptables/rules-save"
-
-# Options to pass to iptables-save and iptables-restore 
-SAVE_RESTORE_OPTIONS="-c"
-
-# Save state on stopping iptables
-SAVE_ON_STOP="yes"
-
-# If you need to log iptables messages as soon as iptables starts,
-# AND your logger does NOT depend on the network, then you may wish
-# to uncomment the next line.
-# If your logger depends on the network, and you uncomment this line
-# you will create an unresolvable circular dependency during startup.
-# After commenting or uncommenting this line, you must run 'rc-update -u'.
-#rc_use="logger"

diff --git a/net-firewall/iptables/files/iptables-1.4.21-musl.patch 
b/net-firewall/iptables/files/iptables-1.4.21-musl.patch
deleted file mode 100644
index f6ad3c7..0000000
--- a/net-firewall/iptables/files/iptables-1.4.21-musl.patch
+++ /dev/null
@@ -1,76 +0,0 @@
-diff -ru a/iptables-1.4.21/extensions/libip6t_ipv6header.c 
b/iptables-1.4.21/extensions/libip6t_ipv6header.c
---- a/iptables-1.4.21/extensions/libip6t_ipv6header.c
-+++ b/iptables-1.4.21/extensions/libip6t_ipv6header.c
-@@ -10,6 +10,9 @@
- #include <netdb.h>
- #include <xtables.h>
- #include <linux/netfilter_ipv6/ip6t_ipv6header.h>
-+#ifndef IPPROTO_HOPOPTS
-+#     define IPPROTO_HOPOPTS 0
-+#endif
- 
- enum {
-       O_HEADER = 0,
-diff -ru a/iptables-1.4.21/extensions/libxt_TCPOPTSTRIP.c 
b/iptables-1.4.21/extensions/libxt_TCPOPTSTRIP.c
---- a/iptables-1.4.21/extensions/libxt_TCPOPTSTRIP.c
-+++ b/iptables-1.4.21/extensions/libxt_TCPOPTSTRIP.c
-@@ -12,6 +12,21 @@
- #ifndef TCPOPT_MD5SIG
- #     define TCPOPT_MD5SIG 19
- #endif
-+#ifndef TCPOPT_MAXSEG
-+#     define TCPOPT_MAXSEG 2
-+#endif
-+#ifndef TCPOPT_WINDOW
-+#     define TCPOPT_WINDOW 3
-+#endif
-+#ifndef TCPOPT_SACK_PERMITTED
-+#     define TCPOPT_SACK_PERMITTED 4
-+#endif
-+#ifndef TCPOPT_SACK
-+#     define TCPOPT_SACK 5
-+#endif
-+#ifndef TCPOPT_TIMESTAMP
-+#     define TCPOPT_TIMESTAMP 8
-+#endif
- 
- enum {
-       O_STRIP_OPTION = 0,
-diff -ru a/iptables-1.4.21/include/libiptc/ipt_kernel_headers.h 
b/iptables-1.4.21/include/libiptc/ipt_kernel_headers.h
---- a/iptables-1.4.21/include/libiptc/ipt_kernel_headers.h
-+++ b/iptables-1.4.21/include/libiptc/ipt_kernel_headers.h
-@@ -5,7 +5,6 @@
- 
- #include <limits.h>
- 
--#if defined(__GLIBC__) && __GLIBC__ == 2
- #include <netinet/ip.h>
- #include <netinet/in.h>
- #include <netinet/ip_icmp.h>
-@@ -13,15 +12,4 @@
- #include <netinet/udp.h>
- #include <net/if.h>
- #include <sys/types.h>
--#else /* libc5 */
--#include <sys/socket.h>
--#include <linux/ip.h>
--#include <linux/in.h>
--#include <linux/if.h>
--#include <linux/icmp.h>
--#include <linux/tcp.h>
--#include <linux/udp.h>
--#include <linux/types.h>
--#include <linux/in6.h>
--#endif
- #endif
-diff -ru a/iptables-1.4.21/include/linux/netfilter_ipv4/ip_tables.h 
b/iptables-1.4.21/include/linux/netfilter_ipv4/ip_tables.h
---- a/iptables-1.4.21/include/linux/netfilter_ipv4/ip_tables.h
-+++ b/iptables-1.4.21/include/linux/netfilter_ipv4/ip_tables.h
-@@ -16,6 +16,7 @@
- #define _IPTABLES_H
- 
- #include <linux/types.h>
-+#include <sys/types.h>
- 
- #include <linux/netfilter_ipv4.h>
- 

diff --git a/net-firewall/iptables/files/iptables.init 
b/net-firewall/iptables/files/iptables.init
deleted file mode 100755
index de9f39f..0000000
--- a/net-firewall/iptables/files/iptables.init
+++ /dev/null
@@ -1,130 +0,0 @@
-#!/sbin/openrc-run
-# Copyright 1999-2013 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Id$
-
-extra_commands="check save panic"
-extra_started_commands="reload"
-
-iptables_name=${SVCNAME}
-case ${iptables_name} in
-iptables|ip6tables) ;;
-*) iptables_name="iptables" ;;
-esac
-
-iptables_bin="/sbin/${iptables_name}"
-case ${iptables_name} in
-       iptables)  iptables_proc="/proc/net/ip_tables_names"
-                  iptables_save=${IPTABLES_SAVE};;
-       ip6tables) iptables_proc="/proc/net/ip6_tables_names"
-                  iptables_save=${IP6TABLES_SAVE};;
-esac
-
-depend() {
-       need localmount #434774
-       before net
-}
-
-set_table_policy() {
-       local chains table=$1 policy=$2
-       case ${table} in
-               nat)    chains="PREROUTING POSTROUTING OUTPUT";;
-               mangle) chains="PREROUTING INPUT FORWARD OUTPUT POSTROUTING";;
-               filter) chains="INPUT FORWARD OUTPUT";;
-               *)      chains="";;
-       esac
-       local chain
-       for chain in ${chains} ; do
-               ${iptables_bin} -w -t ${table} -P ${chain} ${policy}
-       done
-}
-
-checkkernel() {
-       if [ ! -e ${iptables_proc} ] ; then
-               eerror "Your kernel lacks ${iptables_name} support, please load"
-               eerror "appropriate modules and try again."
-               return 1
-       fi
-       return 0
-}
-checkconfig() {
-       if [ ! -f ${iptables_save} ] ; then
-               eerror "Not starting ${iptables_name}.  First create some rules 
then run:"
-               eerror "/etc/init.d/${iptables_name} save"
-               return 1
-       fi
-       return 0
-}
-
-start() {
-       checkconfig || return 1
-       ebegin "Loading ${iptables_name} state and starting firewall"
-       ${iptables_bin}-restore ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
-       eend $?
-}
-
-stop() {
-       if [ "${SAVE_ON_STOP}" = "yes" ] ; then
-               save || return 1
-       fi
-       checkkernel || return 1
-       ebegin "Stopping firewall"
-       local a
-       for a in $(cat ${iptables_proc}) ; do
-               set_table_policy $a ACCEPT
-
-               ${iptables_bin} -w -F -t $a
-               ${iptables_bin} -w -X -t $a
-       done
-       eend $?
-}
-
-reload() {
-       checkkernel || return 1
-       checkrules || return 1
-       ebegin "Flushing firewall"
-       local a
-       for a in $(cat ${iptables_proc}) ; do
-               ${iptables_bin} -w -F -t $a
-               ${iptables_bin} -w -X -t $a
-       done
-       eend $?
-
-       start
-}
-
-checkrules() {
-       ebegin "Checking rules"
-       ${iptables_bin}-restore --test ${SAVE_RESTORE_OPTIONS} < 
"${iptables_save}"
-       eend $?
-}
-
-check() {
-       # Short name for users of init.d script.
-       checkrules
-}
-
-save() {
-       ebegin "Saving ${iptables_name} state"
-       checkpath -q -d "$(dirname "${iptables_save}")"
-       checkpath -q -m 0600 -f "${iptables_save}"
-       ${iptables_bin}-save ${SAVE_RESTORE_OPTIONS} > "${iptables_save}"
-       eend $?
-}
-
-panic() {
-       checkkernel || return 1
-       if service_started ${iptables_name}; then
-               rc-service ${iptables_name} stop
-       fi
-
-       local a
-       ebegin "Dropping all packets"
-       for a in $(cat ${iptables_proc}) ; do
-               ${iptables_bin} -w -F -t $a
-               ${iptables_bin} -w -X -t $a
-
-               set_table_policy $a DROP
-       done
-       eend $?
-}

diff --git a/net-firewall/iptables/files/systemd/ip6tables-restore.service 
b/net-firewall/iptables/files/systemd/ip6tables-restore.service
deleted file mode 100644
index c149e92..0000000
--- a/net-firewall/iptables/files/systemd/ip6tables-restore.service
+++ /dev/null
@@ -1,14 +0,0 @@
-[Unit]
-Description=Restore ip6tables firewall rules
-# if both are queued for some reason, don't store before restoring :)
-Before=ip6tables-store.service
-# sounds reasonable to have firewall up before any of the services go up
-Before=network-pre.target
-Wants=network-pre.target
-
-[Service]
-Type=oneshot
-ExecStart=/sbin/ip6tables-restore /var/lib/ip6tables/rules-save
-
-[Install]
-WantedBy=basic.target

diff --git a/net-firewall/iptables/files/systemd/ip6tables-store.service 
b/net-firewall/iptables/files/systemd/ip6tables-store.service
deleted file mode 100644
index 9975378..0000000
--- a/net-firewall/iptables/files/systemd/ip6tables-store.service
+++ /dev/null
@@ -1,11 +0,0 @@
-[Unit]
-Description=Store ip6tables firewall rules
-Before=shutdown.target
-DefaultDependencies=No
-
-[Service]
-Type=oneshot
-ExecStart=/bin/sh -c "/sbin/ip6tables-save --counters > 
/var/lib/ip6tables/rules-save"
-
-[Install]
-WantedBy=shutdown.target

diff --git a/net-firewall/iptables/files/systemd/ip6tables.service 
b/net-firewall/iptables/files/systemd/ip6tables.service
deleted file mode 100644
index 0a6d7fa..0000000
--- a/net-firewall/iptables/files/systemd/ip6tables.service
+++ /dev/null
@@ -1,6 +0,0 @@
-[Unit]
-Description=Store and restore ip6tables firewall rules
-
-[Install]
-Also=ip6tables-store.service
-Also=ip6tables-restore.service

diff --git a/net-firewall/iptables/files/systemd/iptables-restore.service 
b/net-firewall/iptables/files/systemd/iptables-restore.service
deleted file mode 100644
index 2474ee3..0000000
--- a/net-firewall/iptables/files/systemd/iptables-restore.service
+++ /dev/null
@@ -1,14 +0,0 @@
-[Unit]
-Description=Restore iptables firewall rules
-# if both are queued for some reason, don't store before restoring :)
-Before=iptables-store.service
-# sounds reasonable to have firewall up before any of the services go up
-Before=network-pre.target
-Wants=network-pre.target
-
-[Service]
-Type=oneshot
-ExecStart=/sbin/iptables-restore /var/lib/iptables/rules-save
-
-[Install]
-WantedBy=basic.target

diff --git a/net-firewall/iptables/files/systemd/iptables-store.service 
b/net-firewall/iptables/files/systemd/iptables-store.service
deleted file mode 100644
index aa16e75..0000000
--- a/net-firewall/iptables/files/systemd/iptables-store.service
+++ /dev/null
@@ -1,11 +0,0 @@
-[Unit]
-Description=Store iptables firewall rules
-Before=shutdown.target
-DefaultDependencies=No
-
-[Service]
-Type=oneshot
-ExecStart=/bin/sh -c "/sbin/iptables-save --counters > 
/var/lib/iptables/rules-save"
-
-[Install]
-WantedBy=shutdown.target

diff --git a/net-firewall/iptables/files/systemd/iptables.service 
b/net-firewall/iptables/files/systemd/iptables.service
deleted file mode 100644
index 3643a3e..0000000
--- a/net-firewall/iptables/files/systemd/iptables.service
+++ /dev/null
@@ -1,6 +0,0 @@
-[Unit]
-Description=Store and restore iptables firewall rules
-
-[Install]
-Also=iptables-store.service
-Also=iptables-restore.service

diff --git a/net-firewall/iptables/iptables-1.4.21-r1.ebuild 
b/net-firewall/iptables/iptables-1.4.21-r1.ebuild
deleted file mode 100644
index 87f0912..0000000
--- a/net-firewall/iptables/iptables-1.4.21-r1.ebuild
+++ /dev/null
@@ -1,95 +0,0 @@
-# Copyright 1999-2014 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-
-EAPI="5"
-
-# Force users doing their own patches to install their own tools
-AUTOTOOLS_AUTO_DEPEND=no
-
-inherit eutils multilib systemd toolchain-funcs autotools
-
-DESCRIPTION="Linux kernel (2.4+) firewall, NAT and packet mangling tools"
-HOMEPAGE="http://www.netfilter.org/projects/iptables/";
-SRC_URI="http://www.netfilter.org/projects/iptables/files/${P}.tar.bz2";
-
-LICENSE="GPL-2"
-SLOT="0"
-KEYWORDS="amd64 arm arm64 ia64 ~mips ppc sh sparc x86"
-IUSE="conntrack ipv6 netlink static-libs"
-
-RDEPEND="
-       conntrack? ( net-libs/libnetfilter_conntrack )
-       netlink? ( net-libs/libnfnetlink )
-"
-DEPEND="${RDEPEND}
-       virtual/os-headers
-       virtual/pkgconfig
-"
-
-src_prepare() {
-       # use the saner headers from the kernel
-       rm -f include/linux/{kernel,types}.h
-
-       epatch ${FILESDIR}/${P}-musl.patch
-
-       # Only run autotools if user patched something
-       epatch_user && eautoreconf || elibtoolize
-}
-
-src_configure() {
-       # Some libs use $(AR) rather than libtool to build #444282
-       tc-export AR
-
-       sed -i \
-               -e "/nfnetlink=[01]/s:=[01]:=$(usex netlink 1 0):" \
-               -e "/nfconntrack=[01]/s:=[01]:=$(usex conntrack 1 0):" \
-               configure || die
-
-       econf \
-               --sbindir="${EPREFIX}/sbin" \
-               --libexecdir="${EPREFIX}/$(get_libdir)" \
-               --enable-devel \
-               --enable-shared \
-               $(use_enable static-libs static) \
-               $(use_enable ipv6)
-}
-
-src_compile() {
-       emake V=1
-}
-
-src_install() {
-       default
-       dodoc INCOMPATIBILITIES iptables/iptables.xslt
-
-       # all the iptables binaries are in /sbin, so might as well
-       # put these small files in with them
-       into /
-       dosbin iptables/iptables-apply
-       dosym iptables-apply /sbin/ip6tables-apply
-       doman iptables/iptables-apply.8
-
-       insinto /usr/include
-       doins include/iptables.h $(use ipv6 && echo include/ip6tables.h)
-       insinto /usr/include/iptables
-       doins include/iptables/internal.h
-
-       keepdir /var/lib/iptables
-       newinitd "${FILESDIR}"/${PN}-1.4.13-r1.init iptables
-       newconfd "${FILESDIR}"/${PN}-1.4.13.confd iptables
-       if use ipv6 ; then
-               keepdir /var/lib/ip6tables
-               newinitd "${FILESDIR}"/iptables-1.4.13-r1.init ip6tables
-               newconfd "${FILESDIR}"/ip6tables-1.4.13.confd ip6tables
-       fi
-
-       systemd_dounit "${FILESDIR}"/systemd/iptables{,-{re,}store}.service
-       if use ipv6 ; then
-               systemd_dounit 
"${FILESDIR}"/systemd/ip6tables{,-{re,}store}.service
-       fi
-
-       # Move important libs to /lib #332175
-       gen_usr_ldscript -a ip{4,6}tc iptc xtables
-
-       prune_libtool_files
-}

diff --git a/net-firewall/iptables/metadata.xml 
b/net-firewall/iptables/metadata.xml
deleted file mode 100644
index 299ae63..0000000
--- a/net-firewall/iptables/metadata.xml
+++ /dev/null
@@ -1,27 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd";>
-<pkgmetadata>
-<maintainer type="project">
-       <email>base-sys...@gentoo.org</email>
-       <name>Gentoo Base System</name>
-</maintainer>
-<use>
-       <flag name="conntrack">Build against 
<pkg>net-libs/libnetfilter_conntrack</pkg> when enables the connlabel 
matcher</flag>
-       <flag name="netlink">Build against libnfnetlink which enables the 
nfnl_osf util</flag>
-</use>
-<longdescription>
-  iptables is the userspace command line program used to set up, maintain, and
-  inspect the tables of IPv4 packet filter rules in the Linux kernel. It's a
-  part of packet filtering framework which allows the stateless and stateful
-  packet filtering, all kinds of network address and port translation, and is a
-  flexible and extensible infrastructure with multiple layers of API's for 3rd
-  party extensions. The iptables package also includes ip6tables. ip6tables is
-  used for configuring the IPv6 packet filter.
-
-  Note that some extensions (e.g. imq and l7filter) are not included into
-  official kernel sources so you have to patch the sources before installation.
-</longdescription>
-<upstream>
- <remote-id type="cpe">cpe:/a:netfilter_core_team:iptables</remote-id>
-</upstream>
-</pkgmetadata>

Reply via email to