[gentoo-commits] repo/gentoo:master commit in: net-firewall/ufw/, net-firewall/ufw/files/

2022-07-01 Thread Florian Schmaus
commit: 5b92f67047e6ae788b7e68acd72ca421d4e42d01
Author: Hasan ÇALIŞIR  psauxit  com>
AuthorDate: Tue Jun 28 08:25:53 2022 +
Commit: Florian Schmaus  gentoo  org>
CommitDate: Fri Jul  1 08:28:35 2022 +
URL:https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=5b92f670

net-firewall/ufw: bump to 0.36.1

* version bump to 0.36.1.
* bump to EAPI 8.
* python_combat drop 3.7, add 3.11, current range 8,11.
* dropped NonexistentBlockers from RDEPEND.
   !
   upstream bug: https://bugs.launchpad.net/ufw/+bug/815982 fixed and commited.
* Change mod 0644 for all rules in /etc/ufw.
* Drop comparison operator >= for iptables 1.4.
   Current repo already meets the requirement.
* Patches synced with current version that we still need them.

[ flow: add Closes bug# 834130 git trailer ]

Package-Manager: Portage-3.0.30, Repoman-3.0.3
Signed-off-by: Hasan ÇALIŞIR  psauxit.com>
Closes: https://bugs.gentoo.org/834130
Closes: https://github.com/gentoo/gentoo/pull/26110
Signed-off-by: Florian Schmaus  gentoo.org>

 net-firewall/ufw/Manifest  |   1 +
 .../ufw/files/ufw-0.36.1-bash-completion.patch |  16 ++
 .../ufw/files/ufw-0.36.1-dont-check-iptables.patch |  50 +
 net-firewall/ufw/files/ufw-0.36.1-move-path.patch  | 124 
 net-firewall/ufw/files/ufw-0.36.1-shebang.patch|  15 ++
 net-firewall/ufw/ufw-0.36.1.ebuild | 217 +
 6 files changed, 423 insertions(+)

diff --git a/net-firewall/ufw/Manifest b/net-firewall/ufw/Manifest
index ab0de6087c34..91de7839ba25 100644
--- a/net-firewall/ufw/Manifest
+++ b/net-firewall/ufw/Manifest
@@ -1 +1,2 @@
+DIST ufw-0.36.1.tar.gz 583123 BLAKE2B 
16e1ee67493d5db10a04667b646a019aa3aeb06345d0facc334fb07eeff4d4f6674a4699b2bd7bd6ed29de1c05c4e14812e9e8ec55c4bfb8579b8e3e2e577f6a
 SHA512 
77d01fef661083eac041be6d6eabffb1d8aedb215f73e44e18a9a63a48da96414b3c0166e3ffd9402c22c72a6de5d774ba14b15368b02997aae8e08d1c5dd4c0
 DIST ufw-0.36.tar.gz 580338 BLAKE2B 
a7e07ac11539061a69bb83d45c0affc54793503b31c9e9f9f8b34fa890a3fe97682f9133102e74e5f6e1eb372a929cfc8619baa2cc9efc1dc289d9f4a1766efd
 SHA512 
b32d7f79f43c203149c48b090ee0d063df78fcf654344ee11066a7363e799a62b046758ffe02b8bd15121545ac2a6b61df21fe56f8b810319fe4dd562cbdadb3

diff --git a/net-firewall/ufw/files/ufw-0.36.1-bash-completion.patch 
b/net-firewall/ufw/files/ufw-0.36.1-bash-completion.patch
new file mode 100644
index ..927af244eef1
--- /dev/null
+++ b/net-firewall/ufw/files/ufw-0.36.1-bash-completion.patch
@@ -0,0 +1,16 @@
+--- a/shell-completion/bash2018-12-14 21:25:55.0 +0300
 b/shell-completion/bash2019-03-21 01:26:46.152181981 +0300
+@@ -57,7 +57,6 @@
+ echo "numbered verbose"
+ }
+ 
+-_have ufw &&
+ _ufw()
+ {
+ cur=${COMP_WORDS[COMP_CWORD]}
+@@ -91,4 +90,4 @@
+ fi
+ }
+ 
+-_have ufw && complete -F _ufw ufw
++complete -F _ufw ufw

diff --git a/net-firewall/ufw/files/ufw-0.36.1-dont-check-iptables.patch 
b/net-firewall/ufw/files/ufw-0.36.1-dont-check-iptables.patch
new file mode 100644
index ..ae0c95525a46
--- /dev/null
+++ b/net-firewall/ufw/files/ufw-0.36.1-dont-check-iptables.patch
@@ -0,0 +1,50 @@
+--- a/setup.py2022-06-27 17:33:18.043794598 +0300
 b/setup.py2022-06-27 18:15:18.384463926 +0300
+@@ -256,46 +256,7 @@
+ os.unlink(os.path.join('staging', 'ufw-init'))
+ os.unlink(os.path.join('staging', 'ufw-init-functions'))
+
+-iptables_exe = ''
+-iptables_dir = ''
+-
+-for e in ['iptables']:
+-# Historically iptables was in /sbin, then later also symlinked from
+-# /usr/sbin/iptables to /sbin/iptables. Debian bullseye moves iptables
+-# to /usr/sbin with no symlink in /sbin except on upgrades. To accomodate
+-# buildds that may still have the old iptables, search /usr/sbin first
+-for dir in ['/usr/sbin', '/sbin', '/usr/bin', '/bin', '/usr/local/sbin', \
+-'/usr/local/bin']:
+-if e == "iptables":
+-if os.path.exists(os.path.join(dir, e)):
+-iptables_dir = dir
+-iptables_exe = os.path.join(iptables_dir, "iptables")
+-print("Found '%s'" % iptables_exe)
+-else:
+-continue
+-
+-if iptables_exe != "":
+-break
+-
+-
+-if iptables_exe == '':
+-print("ERROR: could not find required binary 'iptables'", file=sys.stderr)
+-sys.exit(1)
+-
+-for e in ['ip6tables', 'iptables-restore', 'ip6tables-restore']:
+-if not os.path.exists(os.path.join(iptables_dir, e)):
+-print("ERROR: could not find required binary '%s'" % (e), 
file=sys.stderr)
+-sys.exit(1)
+-
+-(rc, out) = cmd([iptables_exe, '-V'])
+-if rc != 0:
+-raise OSError(errno.ENOENT, "Could not find version for '%s'" % \
+-  (iptables_exe))
+-version = re.sub('^v', '', re.split('\s', str(out))[1])
+-print("Found '%s' version '%s'" % (iptables_exe, version))
+-if version < "1.4":
+-print("WARN: version '%s' has limited IPv6 

[gentoo-commits] repo/gentoo:master commit in: net-firewall/ufw/, net-firewall/ufw/files/

2019-03-30 Thread Patrice Clement
commit: 13cabfd23b3d793596453e85057789ef14a4faa1
Author: Hasan ÇALIŞIR  psauxit  com>
AuthorDate: Thu Mar 21 01:08:46 2019 +
Commit: Patrice Clement  gentoo  org>
CommitDate: Sat Mar 30 18:32:11 2019 +
URL:https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=13cabfd2

net-firewall/ufw: version bump to 0.36 && EAPI 7 bump.

Reported-by: yuLya  tutanota.com>
Tested-by: Hasan ÇALIŞIR  psauxit.com>
Closes: https://bugs.gentoo.org/680540
Closes: https://github.com/gentoo/gentoo/pull/11430
Package-Manager: Portage-2.3.62, Repoman-2.3.11
Signed-off-by: Hasan ÇALIŞIR  psauxit.com>
Signed-off-by: Patrice Clement  gentoo.org>

 net-firewall/ufw/Manifest  |   1 +
 .../ufw/files/ufw-0.36-bash-completion.patch   |  16 ++
 .../ufw/files/ufw-0.36-dont-check-iptables.patch   |  45 +
 net-firewall/ufw/files/ufw-0.36-move-path.patch| 174 ++
 net-firewall/ufw/files/ufw-0.36-shebang.patch  |  15 ++
 net-firewall/ufw/metadata.xml  |  15 +-
 net-firewall/ufw/ufw-0.36.ebuild   | 199 +
 7 files changed, 463 insertions(+), 2 deletions(-)

diff --git a/net-firewall/ufw/Manifest b/net-firewall/ufw/Manifest
index ed396f855b3..ad31ad0661a 100644
--- a/net-firewall/ufw/Manifest
+++ b/net-firewall/ufw/Manifest
@@ -1,2 +1,3 @@
 DIST ufw-0.34_pre805.tar.gz 335875 BLAKE2B 
a2b654fe35a299ffd9978ef14a8d5667f799b654b6285bc81756c8081d9f4417b2fa9c05a234351d42709c2c57ff624b4fe7bca8ffe4d13cd12436feead6e4da
 SHA512 
b8bba3bb8c423070d6434d1df7274423edf3a356415f54c6448fa0ff2d13a4b2ac21c4bb627cba01d6955b04f793eeaf2fc535c6221e7de48f11bef745035263
 DIST ufw-0.35.tar.gz 375310 BLAKE2B 
3babf22e860ead6970c1386b0ab9fc3de364ba3f5c8bc0237be4a9446358fe058d216e7928d16eed8a148fbee5b82fc1d9e3b358f357c2fac236ae6f6b942a01
 SHA512 
b36c82559910634505648f717d19eb5a0cb1ce739a804359087e74c966869d0375c4ed5811954b32d2b5b51866f6ae1bec62a4a464f226b2eecc56b096f303fc
+DIST ufw-0.36.tar.gz 580338 BLAKE2B 
a7e07ac11539061a69bb83d45c0affc54793503b31c9e9f9f8b34fa890a3fe97682f9133102e74e5f6e1eb372a929cfc8619baa2cc9efc1dc289d9f4a1766efd
 SHA512 
b32d7f79f43c203149c48b090ee0d063df78fcf654344ee11066a7363e799a62b046758ffe02b8bd15121545ac2a6b61df21fe56f8b810319fe4dd562cbdadb3

diff --git a/net-firewall/ufw/files/ufw-0.36-bash-completion.patch 
b/net-firewall/ufw/files/ufw-0.36-bash-completion.patch
new file mode 100644
index 000..927af244eef
--- /dev/null
+++ b/net-firewall/ufw/files/ufw-0.36-bash-completion.patch
@@ -0,0 +1,16 @@
+--- a/shell-completion/bash2018-12-14 21:25:55.0 +0300
 b/shell-completion/bash2019-03-21 01:26:46.152181981 +0300
+@@ -57,7 +57,6 @@
+ echo "numbered verbose"
+ }
+ 
+-_have ufw &&
+ _ufw()
+ {
+ cur=${COMP_WORDS[COMP_CWORD]}
+@@ -91,4 +90,4 @@
+ fi
+ }
+ 
+-_have ufw && complete -F _ufw ufw
++complete -F _ufw ufw

diff --git a/net-firewall/ufw/files/ufw-0.36-dont-check-iptables.patch 
b/net-firewall/ufw/files/ufw-0.36-dont-check-iptables.patch
new file mode 100644
index 000..11eb1748dd1
--- /dev/null
+++ b/net-firewall/ufw/files/ufw-0.36-dont-check-iptables.patch
@@ -0,0 +1,45 @@
+--- a/setup.py 2019-03-21 01:32:28.500245586 +0300
 b/setup.py 2019-03-21 01:39:17.166095026 +0300
+@@ -257,41 +257,7 @@
+ os.unlink(os.path.join('staging', 'ufw-init'))
+ os.unlink(os.path.join('staging', 'ufw-init-functions'))
+ 
+-iptables_exe = ''
+-iptables_dir = ''
+-
+-for e in ['iptables']:
+-for dir in ['/sbin', '/bin', '/usr/sbin', '/usr/bin', '/usr/local/sbin', \
+-'/usr/local/bin']:
+-if e == "iptables":
+-if os.path.exists(os.path.join(dir, e)):
+-iptables_dir = dir
+-iptables_exe = os.path.join(iptables_dir, "iptables")
+-print("Found '%s'" % iptables_exe)
+-else:
+-continue
+-
+-if iptables_exe != "":
+-break
+-
+-
+-if iptables_exe == '':
+-print("ERROR: could not find required binary 'iptables'", file=sys.stderr)
+-sys.exit(1)
+-
+-for e in ['ip6tables', 'iptables-restore', 'ip6tables-restore']:
+-if not os.path.exists(os.path.join(iptables_dir, e)):
+-print("ERROR: could not find required binary '%s'" % (e), 
file=sys.stderr)
+-sys.exit(1)
+-
+-(rc, out) = cmd([iptables_exe, '-V'])
+-if rc != 0:
+-raise OSError(errno.ENOENT, "Could not find version for '%s'" % \
+-  (iptables_exe))
+-version = re.sub('^v', '', re.split('\s', str(out))[1])
+-print("Found '%s' version '%s'" % (iptables_exe, version))
+-if version < "1.4":
+-print("WARN: version '%s' has limited IPv6 support. See README for 
details." % (version), file=sys.stderr)
++iptables_dir = '/sbin'
+ 
+ setup (name='ufw',
+   version=ufw_version,

diff --git a/net-firewall/ufw/files/ufw-0.36-move-path.patch 
b/net-firewall/ufw/files/ufw-0.36-move-path.patch
new file mode 100644
index 000..1ba9d117be5
--- /dev/null
+++ 

[gentoo-commits] repo/gentoo:master commit in: net-firewall/ufw/, net-firewall/ufw/files/

2016-03-13 Thread Jason Zaman
commit: 6c1e5a81ed729a304bbbfe6eadc76798a68f6e55
Author: Nicholas Vinson  gmail  com>
AuthorDate: Thu Mar 10 18:54:09 2016 +
Commit: Jason Zaman  gentoo  org>
CommitDate: Mon Mar 14 04:29:27 2016 +
URL:https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6c1e5a81

net-firewall/ufw: version bump to 0.35

Updates ufw to version 0.35.  The ebuild has also been updated to use EAPI
6.  Patches were updated to address EAPI and upstream code changes.

Gentoo-Bug: 563168
Package-Manager: portage-2.2.28

 net-firewall/ufw/Manifest  |   1 +
 .../ufw/files/ufw-0.35-bash-completion.patch   |  17 ++
 net-firewall/ufw/files/ufw-0.35-move-path.patch| 179 
 net-firewall/ufw/ufw-0.35.ebuild   | 186 +
 4 files changed, 383 insertions(+)

diff --git a/net-firewall/ufw/Manifest b/net-firewall/ufw/Manifest
index 6380dd5..d8f8b5e 100644
--- a/net-firewall/ufw/Manifest
+++ b/net-firewall/ufw/Manifest
@@ -1 +1,2 @@
 DIST ufw-0.34_pre805.tar.gz 335875 SHA256 
a78693da04720f9f7eb463447b940eed18c3e2c20d3de336ebf9bf821dfdac2f SHA512 
b8bba3bb8c423070d6434d1df7274423edf3a356415f54c6448fa0ff2d13a4b2ac21c4bb627cba01d6955b04f793eeaf2fc535c6221e7de48f11bef745035263
 WHIRLPOOL 
5e5238925d928e883c9869b3b72a7a04ad18352ebbcb5fead9b14c7bb5225f1bbae613d9117ceb5e9d435e1ca1f1d0d033bbdf673896990eda5efcb7a7d04829
+DIST ufw-0.35.tar.gz 375310 SHA256 
662f865bc83bf8aa1a40a6fe578bc2ce796ff60a1be2c1103def7db1b91f8509 SHA512 
b36c82559910634505648f717d19eb5a0cb1ce739a804359087e74c966869d0375c4ed5811954b32d2b5b51866f6ae1bec62a4a464f226b2eecc56b096f303fc
 WHIRLPOOL 
789b163bf9cc3b27f231024f33a68d3637ca26cf71f202b438abbf16a2725485ba787b811a040d03d4f99fb8c510f8f9a25154e03d2387d3fb0f03a7c4624de7

diff --git a/net-firewall/ufw/files/ufw-0.35-bash-completion.patch 
b/net-firewall/ufw/files/ufw-0.35-bash-completion.patch
new file mode 100644
index 000..fde635d
--- /dev/null
+++ b/net-firewall/ufw/files/ufw-0.35-bash-completion.patch
@@ -0,0 +1,17 @@
+--- a/shell-completion/bash
 b/shell-completion/bash
+@@ -52,7 +52,6 @@
+ echo "numbered verbose"
+ }
+ 
+-have ufw &&
+ _ufw()
+ {
+ cur=${COMP_WORDS[COMP_CWORD]}
+@@ -83,5 +82,5 @@
+ fi
+ }
+ 
+-[ "$have" ] && complete -F _ufw ufw
++complete -F _ufw ufw
+ 

diff --git a/net-firewall/ufw/files/ufw-0.35-move-path.patch 
b/net-firewall/ufw/files/ufw-0.35-move-path.patch
new file mode 100644
index 000..58af7721
--- /dev/null
+++ b/net-firewall/ufw/files/ufw-0.35-move-path.patch
@@ -0,0 +1,179 @@
+diff -Naur ufw-0.31.orig/doc/ufw-framework.8 ufw-0.31/doc/ufw-framework.8
+--- ufw-0.31.orig/doc/ufw-framework.8  2012-03-10 00:07:11.0 +0100
 ufw-0.31/doc/ufw-framework.8   2012-03-12 16:55:50.680992962 +0100
+@@ -18,7 +18,7 @@
+ parameters and configuration of IPv6. The framework consists of the following
+ files:
+ .TP
+-#STATE_PREFIX#/ufw\-init
++#SHARE_DIR#/ufw\-init
+ initialization script
+ .TP
+ #CONFIG_PREFIX#/ufw/before[6].rules
+@@ -41,7 +41,7 @@
+ 
+ .SH "BOOT INITIALIZATION"
+ .PP
+-\fBufw\fR is started on boot with #STATE_PREFIX#/ufw\-init. This script is a
++\fBufw\fR is started on boot with #SHARE_DIR#/ufw\-init. This script is a
+ standard SysV style initscript used by the \fBufw\fR command and should not be
+ modified. It supports the following arguments:
+ .TP
+diff -Naur ufw-0.31.orig/README ufw-0.31/README
+--- ufw-0.31.orig/README   2012-03-10 00:07:11.0 +0100
 ufw-0.31/README2012-03-12 16:55:50.681993089 +0100
+@@ -58,7 +58,7 @@
+ on your needs, this can be as simple as adding the following to a startup
+ script (eg rc.local for systems that use it):
+ 
+-# /lib/ufw/ufw-init start
++# /usr/share/ufw/ufw-init start
+ 
+ For systems that use SysV initscripts, an example script is provided in
+ doc/initscript.example. See doc/upstart.example for an Upstart example. 
Consult
+@@ -72,9 +72,9 @@
+ /etc/defaults/ufw high level configuration
+ /etc/ufw/before[6].rules  rules evaluated before UI added rules
+ /etc/ufw/after[6].rules   rules evaluated after UI added rules
+-/lib/ufw/user[6].rulesUI added rules (not to be modified)
++/etc/ufw/user/user[6].rules   UI added rules (not to be modified)
+ /etc/ufw/sysctl.conf  kernel network tunables
+-/lib/ufw/ufw-init start script
++/usr/share/ufw/ufw-init   start script
+ 
+ 
+ Usage
+@@ -149,7 +149,7 @@
+ that the primary chains don't move around other non-ufw rules and chains. To
+ completely flush the built-in chains with this configuration, you can use:
+ 
+-# /lib/ufw/ufw-init flush-all
++# /usr/share/ufw/ufw-init flush-all
+ 
+ Alternately, ufw may also take full control of the firewall by setting
+ MANAGE_BUILTINS=yes in /etc/defaults/ufw. This will flush all the built-in
+@@ -247,7 +247,7 @@
+ 
+ Remote Management
+ -
+-On /lib/ufw/ufw-init start and 'ufw enable' the chains are flushed, so