Date: Saturday, August 26, 2017 @ 19:55:53 Author: seblu Revision: 304093
archrelease: copy trunk to extra-i686, extra-x86_64 Added: nftables/repos/extra-i686/PKGBUILD (from rev 304092, nftables/trunk/PKGBUILD) nftables/repos/extra-i686/nftables.conf (from rev 304092, nftables/trunk/nftables.conf) nftables/repos/extra-i686/nftables.service (from rev 304092, nftables/trunk/nftables.service) nftables/repos/extra-x86_64/PKGBUILD (from rev 304092, nftables/trunk/PKGBUILD) nftables/repos/extra-x86_64/nftables.conf (from rev 304092, nftables/trunk/nftables.conf) nftables/repos/extra-x86_64/nftables.service (from rev 304092, nftables/trunk/nftables.service) Deleted: nftables/repos/extra-i686/PKGBUILD nftables/repos/extra-i686/nftables.conf nftables/repos/extra-i686/nftables.service nftables/repos/extra-x86_64/PKGBUILD nftables/repos/extra-x86_64/nftables.conf nftables/repos/extra-x86_64/nftables.service -------------------------------+ /PKGBUILD | 116 ++++++++++++++++++++++++++++++++++++++++ /nftables.conf | 76 ++++++++++++++++++++++++++ /nftables.service | 30 ++++++++++ extra-i686/PKGBUILD | 58 -------------------- extra-i686/nftables.conf | 38 ------------- extra-i686/nftables.service | 15 ----- extra-x86_64/PKGBUILD | 58 -------------------- extra-x86_64/nftables.conf | 38 ------------- extra-x86_64/nftables.service | 15 ----- 9 files changed, 222 insertions(+), 222 deletions(-) Deleted: extra-i686/PKGBUILD =================================================================== --- extra-i686/PKGBUILD 2017-08-26 19:53:50 UTC (rev 304092) +++ extra-i686/PKGBUILD 2017-08-26 19:55:53 UTC (rev 304093) @@ -1,58 +0,0 @@ -# $Id$ -# Maintainer: Sébastien "Seblu" Luttringer <se...@archlinux.org> - -pkgname=nftables -epoch=1 -pkgver=0.7 -pkgrel=2 -pkgdesc='Netfilter tables userspace tools' -arch=('i686' 'x86_64') -url='https://netfilter.org/projects/nftables/' -license=('GPL2') -depends=('libmnl' 'libnftnl' 'gmp' 'readline' 'ncurses') -makedepends=('docbook2x') -backup=('etc/nftables.conf') -validpgpkeys=('C09DB2063F1D7034BA6152ADAB4655A126D292E4') # Netfilter Core Team -# 2016-11-03: https sources download is broken with curl -source=("http://netfilter.org/projects/nftables/files/nftables-$pkgver.tar.bz2"{,.sig} - 'nftables.conf' - 'nftables.service') -sha1sums=('c003fa8b63b1b44c52de345a4d84487d81865a98' - 'SKIP' - 'a7146fad414f9e827e2e83b630308890c876b80d' - '59185e947ebfd599954800ad2c774171b3f4cd58') - -prepare() { - cd $pkgname-$pkgver - # apply patch from the source array (should be a pacman feature) - local filename - for filename in "${source[@]}"; do - if [[ "$filename" =~ \.patch$ ]]; then - msg2 "Applying patch ${filename##*/}" - patch -p1 -N -i "$srcdir/${filename##*/}" - fi - done - : -} - -build() { - cd $pkgname-$pkgver - ./configure \ - --prefix=/usr \ - --sbindir=/usr/bin \ - --sysconfdir=/usr/share \ - CONFIG_MAN=y DB2MAN=docbook2man - make -} - -package() { - pushd $pkgname-$pkgver - make DESTDIR="$pkgdir" install - popd - # basic safe firewall config - install -Dm644 nftables.conf "$pkgdir/etc/nftables.conf" - # systemd - install -Dm644 nftables.service "$pkgdir/usr/lib/systemd/system/nftables.service" -} - -# vim:set ts=2 sw=2 et: Copied: nftables/repos/extra-i686/PKGBUILD (from rev 304092, nftables/trunk/PKGBUILD) =================================================================== --- extra-i686/PKGBUILD (rev 0) +++ extra-i686/PKGBUILD 2017-08-26 19:55:53 UTC (rev 304093) @@ -0,0 +1,58 @@ +# $Id$ +# Maintainer: Sébastien "Seblu" Luttringer <se...@archlinux.org> + +pkgname=nftables +epoch=1 +pkgver=0.7 +pkgrel=3 +pkgdesc='Netfilter tables userspace tools' +arch=('i686' 'x86_64') +url='https://netfilter.org/projects/nftables/' +license=('GPL2') +depends=('libmnl' 'libnftnl' 'gmp' 'readline' 'ncurses') +makedepends=('docbook2x') +backup=('etc/nftables.conf') +validpgpkeys=('C09DB2063F1D7034BA6152ADAB4655A126D292E4') # Netfilter Core Team +# 2016-11-03: https sources download is broken with curl +source=("http://netfilter.org/projects/nftables/files/nftables-$pkgver.tar.bz2"{,.sig} + 'nftables.conf' + 'nftables.service') +sha1sums=('c003fa8b63b1b44c52de345a4d84487d81865a98' + 'SKIP' + '7869aa31ac802922073310ffd4cbbc16450171e5' + '59185e947ebfd599954800ad2c774171b3f4cd58') + +prepare() { + cd $pkgname-$pkgver + # apply patch from the source array (should be a pacman feature) + local filename + for filename in "${source[@]}"; do + if [[ "$filename" =~ \.patch$ ]]; then + msg2 "Applying patch ${filename##*/}" + patch -p1 -N -i "$srcdir/${filename##*/}" + fi + done + : +} + +build() { + cd $pkgname-$pkgver + ./configure \ + --prefix=/usr \ + --sbindir=/usr/bin \ + --sysconfdir=/usr/share \ + CONFIG_MAN=y DB2MAN=docbook2man + make +} + +package() { + pushd $pkgname-$pkgver + make DESTDIR="$pkgdir" install + popd + # basic safe firewall config + install -Dm644 nftables.conf "$pkgdir/etc/nftables.conf" + # systemd + install -Dm644 nftables.service "$pkgdir/usr/lib/systemd/system/nftables.service" +} + +# vim:set ts=2 sw=2 et: Deleted: extra-i686/nftables.conf =================================================================== --- extra-i686/nftables.conf 2017-08-26 19:53:50 UTC (rev 304092) +++ extra-i686/nftables.conf 2017-08-26 19:55:53 UTC (rev 304093) @@ -1,38 +0,0 @@ -#!/usr/bin/nft -f -# ipv4/ipv6 Simple & Safe Firewall -# you can find examples in /usr/share/nftables/ - -table inet filter { - chain input { - type filter hook input priority 0; - - # allow established/related connections - ct state {established, related} accept - - # early drop of invalid connections - ct state invalid drop - - # allow from loopback - iifname lo accept - - # allow icmp - ip protocol icmp accept - ip6 nexthdr icmpv6 accept - - # allow ssh - tcp dport ssh accept - - # everything else - reject with icmp type port-unreachable - } - chain forward { - type filter hook forward priority 0; - drop - } - chain output { - type filter hook output priority 0; - } - -} - -# vim:set ts=2 sw=2 et: Copied: nftables/repos/extra-i686/nftables.conf (from rev 304092, nftables/trunk/nftables.conf) =================================================================== --- extra-i686/nftables.conf (rev 0) +++ extra-i686/nftables.conf 2017-08-26 19:55:53 UTC (rev 304093) @@ -0,0 +1,38 @@ +#!/usr/bin/nft -f +# ipv4/ipv6 Simple & Safe Firewall +# you can find examples in /usr/share/nftables/ + +table inet filter { + chain input { + type filter hook input priority 0; + + # allow established/related connections + ct state {established, related} accept + + # early drop of invalid connections + ct state invalid drop + + # allow from loopback + iifname lo accept + + # allow icmp + ip protocol icmp accept + ip6 nexthdr icmpv6 accept + + # allow ssh + tcp dport ssh accept + + # everything else + reject with icmpx type port-unreachable + } + chain forward { + type filter hook forward priority 0; + drop + } + chain output { + type filter hook output priority 0; + } + +} + +# vim:set ts=2 sw=2 et: Deleted: extra-i686/nftables.service =================================================================== --- extra-i686/nftables.service 2017-08-26 19:53:50 UTC (rev 304092) +++ extra-i686/nftables.service 2017-08-26 19:55:53 UTC (rev 304093) @@ -1,15 +0,0 @@ -[Unit] -Description=Netfilter Tables -Documentation=man:nft(8) -Wants=network-pre.target -Before=network-pre.target - -[Service] -Type=oneshot -ExecStart=/usr/bin/nft -f /etc/nftables.conf -ExecReload=/usr/bin/nft flush ruleset ';' include '"/etc/nftables.conf"' -ExecStop=/usr/bin/nft flush ruleset -RemainAfterExit=yes - -[Install] -WantedBy=multi-user.target Copied: nftables/repos/extra-i686/nftables.service (from rev 304092, nftables/trunk/nftables.service) =================================================================== --- extra-i686/nftables.service (rev 0) +++ extra-i686/nftables.service 2017-08-26 19:55:53 UTC (rev 304093) @@ -0,0 +1,15 @@ +[Unit] +Description=Netfilter Tables +Documentation=man:nft(8) +Wants=network-pre.target +Before=network-pre.target + +[Service] +Type=oneshot +ExecStart=/usr/bin/nft -f /etc/nftables.conf +ExecReload=/usr/bin/nft flush ruleset ';' include '"/etc/nftables.conf"' +ExecStop=/usr/bin/nft flush ruleset +RemainAfterExit=yes + +[Install] +WantedBy=multi-user.target Deleted: extra-x86_64/PKGBUILD =================================================================== --- extra-x86_64/PKGBUILD 2017-08-26 19:53:50 UTC (rev 304092) +++ extra-x86_64/PKGBUILD 2017-08-26 19:55:53 UTC (rev 304093) @@ -1,58 +0,0 @@ -# $Id$ -# Maintainer: Sébastien "Seblu" Luttringer <se...@archlinux.org> - -pkgname=nftables -epoch=1 -pkgver=0.7 -pkgrel=2 -pkgdesc='Netfilter tables userspace tools' -arch=('i686' 'x86_64') -url='https://netfilter.org/projects/nftables/' -license=('GPL2') -depends=('libmnl' 'libnftnl' 'gmp' 'readline' 'ncurses') -makedepends=('docbook2x') -backup=('etc/nftables.conf') -validpgpkeys=('C09DB2063F1D7034BA6152ADAB4655A126D292E4') # Netfilter Core Team -# 2016-11-03: https sources download is broken with curl -source=("http://netfilter.org/projects/nftables/files/nftables-$pkgver.tar.bz2"{,.sig} - 'nftables.conf' - 'nftables.service') -sha1sums=('c003fa8b63b1b44c52de345a4d84487d81865a98' - 'SKIP' - 'a7146fad414f9e827e2e83b630308890c876b80d' - '59185e947ebfd599954800ad2c774171b3f4cd58') - -prepare() { - cd $pkgname-$pkgver - # apply patch from the source array (should be a pacman feature) - local filename - for filename in "${source[@]}"; do - if [[ "$filename" =~ \.patch$ ]]; then - msg2 "Applying patch ${filename##*/}" - patch -p1 -N -i "$srcdir/${filename##*/}" - fi - done - : -} - -build() { - cd $pkgname-$pkgver - ./configure \ - --prefix=/usr \ - --sbindir=/usr/bin \ - --sysconfdir=/usr/share \ - CONFIG_MAN=y DB2MAN=docbook2man - make -} - -package() { - pushd $pkgname-$pkgver - make DESTDIR="$pkgdir" install - popd - # basic safe firewall config - install -Dm644 nftables.conf "$pkgdir/etc/nftables.conf" - # systemd - install -Dm644 nftables.service "$pkgdir/usr/lib/systemd/system/nftables.service" -} - -# vim:set ts=2 sw=2 et: Copied: nftables/repos/extra-x86_64/PKGBUILD (from rev 304092, nftables/trunk/PKGBUILD) =================================================================== --- extra-x86_64/PKGBUILD (rev 0) +++ extra-x86_64/PKGBUILD 2017-08-26 19:55:53 UTC (rev 304093) @@ -0,0 +1,58 @@ +# $Id$ +# Maintainer: Sébastien "Seblu" Luttringer <se...@archlinux.org> + +pkgname=nftables +epoch=1 +pkgver=0.7 +pkgrel=3 +pkgdesc='Netfilter tables userspace tools' +arch=('i686' 'x86_64') +url='https://netfilter.org/projects/nftables/' +license=('GPL2') +depends=('libmnl' 'libnftnl' 'gmp' 'readline' 'ncurses') +makedepends=('docbook2x') +backup=('etc/nftables.conf') +validpgpkeys=('C09DB2063F1D7034BA6152ADAB4655A126D292E4') # Netfilter Core Team +# 2016-11-03: https sources download is broken with curl +source=("http://netfilter.org/projects/nftables/files/nftables-$pkgver.tar.bz2"{,.sig} + 'nftables.conf' + 'nftables.service') +sha1sums=('c003fa8b63b1b44c52de345a4d84487d81865a98' + 'SKIP' + '7869aa31ac802922073310ffd4cbbc16450171e5' + '59185e947ebfd599954800ad2c774171b3f4cd58') + +prepare() { + cd $pkgname-$pkgver + # apply patch from the source array (should be a pacman feature) + local filename + for filename in "${source[@]}"; do + if [[ "$filename" =~ \.patch$ ]]; then + msg2 "Applying patch ${filename##*/}" + patch -p1 -N -i "$srcdir/${filename##*/}" + fi + done + : +} + +build() { + cd $pkgname-$pkgver + ./configure \ + --prefix=/usr \ + --sbindir=/usr/bin \ + --sysconfdir=/usr/share \ + CONFIG_MAN=y DB2MAN=docbook2man + make +} + +package() { + pushd $pkgname-$pkgver + make DESTDIR="$pkgdir" install + popd + # basic safe firewall config + install -Dm644 nftables.conf "$pkgdir/etc/nftables.conf" + # systemd + install -Dm644 nftables.service "$pkgdir/usr/lib/systemd/system/nftables.service" +} + +# vim:set ts=2 sw=2 et: Deleted: extra-x86_64/nftables.conf =================================================================== --- extra-x86_64/nftables.conf 2017-08-26 19:53:50 UTC (rev 304092) +++ extra-x86_64/nftables.conf 2017-08-26 19:55:53 UTC (rev 304093) @@ -1,38 +0,0 @@ -#!/usr/bin/nft -f -# ipv4/ipv6 Simple & Safe Firewall -# you can find examples in /usr/share/nftables/ - -table inet filter { - chain input { - type filter hook input priority 0; - - # allow established/related connections - ct state {established, related} accept - - # early drop of invalid connections - ct state invalid drop - - # allow from loopback - iifname lo accept - - # allow icmp - ip protocol icmp accept - ip6 nexthdr icmpv6 accept - - # allow ssh - tcp dport ssh accept - - # everything else - reject with icmp type port-unreachable - } - chain forward { - type filter hook forward priority 0; - drop - } - chain output { - type filter hook output priority 0; - } - -} - -# vim:set ts=2 sw=2 et: Copied: nftables/repos/extra-x86_64/nftables.conf (from rev 304092, nftables/trunk/nftables.conf) =================================================================== --- extra-x86_64/nftables.conf (rev 0) +++ extra-x86_64/nftables.conf 2017-08-26 19:55:53 UTC (rev 304093) @@ -0,0 +1,38 @@ +#!/usr/bin/nft -f +# ipv4/ipv6 Simple & Safe Firewall +# you can find examples in /usr/share/nftables/ + +table inet filter { + chain input { + type filter hook input priority 0; + + # allow established/related connections + ct state {established, related} accept + + # early drop of invalid connections + ct state invalid drop + + # allow from loopback + iifname lo accept + + # allow icmp + ip protocol icmp accept + ip6 nexthdr icmpv6 accept + + # allow ssh + tcp dport ssh accept + + # everything else + reject with icmpx type port-unreachable + } + chain forward { + type filter hook forward priority 0; + drop + } + chain output { + type filter hook output priority 0; + } + +} + +# vim:set ts=2 sw=2 et: Deleted: extra-x86_64/nftables.service =================================================================== --- extra-x86_64/nftables.service 2017-08-26 19:53:50 UTC (rev 304092) +++ extra-x86_64/nftables.service 2017-08-26 19:55:53 UTC (rev 304093) @@ -1,15 +0,0 @@ -[Unit] -Description=Netfilter Tables -Documentation=man:nft(8) -Wants=network-pre.target -Before=network-pre.target - -[Service] -Type=oneshot -ExecStart=/usr/bin/nft -f /etc/nftables.conf -ExecReload=/usr/bin/nft flush ruleset ';' include '"/etc/nftables.conf"' -ExecStop=/usr/bin/nft flush ruleset -RemainAfterExit=yes - -[Install] -WantedBy=multi-user.target Copied: nftables/repos/extra-x86_64/nftables.service (from rev 304092, nftables/trunk/nftables.service) =================================================================== --- extra-x86_64/nftables.service (rev 0) +++ extra-x86_64/nftables.service 2017-08-26 19:55:53 UTC (rev 304093) @@ -0,0 +1,15 @@ +[Unit] +Description=Netfilter Tables +Documentation=man:nft(8) +Wants=network-pre.target +Before=network-pre.target + +[Service] +Type=oneshot +ExecStart=/usr/bin/nft -f /etc/nftables.conf +ExecReload=/usr/bin/nft flush ruleset ';' include '"/etc/nftables.conf"' +ExecStop=/usr/bin/nft flush ruleset +RemainAfterExit=yes + +[Install] +WantedBy=multi-user.target