Date: Thursday, March 18, 2021 @ 08:21:41
  Author: alucryd
Revision: 894302

archrelease: copy trunk to community-x86_64

Added:
  tcp-wrappers/repos/community-x86_64/PKGBUILD
    (from rev 894301, tcp-wrappers/trunk/PKGBUILD)
  tcp-wrappers/repos/community-x86_64/hosts.allow
    (from rev 894301, tcp-wrappers/trunk/hosts.allow)
  tcp-wrappers/repos/community-x86_64/hosts.deny
    (from rev 894301, tcp-wrappers/trunk/hosts.deny)
  tcp-wrappers/repos/community-x86_64/tcp-wrappers-redhat-bug11881.patch
    (from rev 894301, tcp-wrappers/trunk/tcp-wrappers-redhat-bug11881.patch)
Deleted:
  tcp-wrappers/repos/community-x86_64/PKGBUILD
  tcp-wrappers/repos/community-x86_64/hosts.allow
  tcp-wrappers/repos/community-x86_64/hosts.deny
  tcp-wrappers/repos/community-x86_64/tcp-wrappers-redhat-bug11881.patch

------------------------------------+
 PKGBUILD                           |  182 +++++++++++++++++------------------
 hosts.allow                        |   10 -
 hosts.deny                         |   14 +-
 tcp-wrappers-redhat-bug11881.patch |   72 ++++++-------
 4 files changed, 139 insertions(+), 139 deletions(-)

Deleted: PKGBUILD
===================================================================
--- PKGBUILD    2021-03-18 08:21:33 UTC (rev 894301)
+++ PKGBUILD    2021-03-18 08:21:41 UTC (rev 894302)
@@ -1,91 +0,0 @@
-# Maintainer: Maxime Gauduin <aluc...@archlinux.org>
-# Contributor: Manuel Hüsers <manuel.hues...@uni-ol.de>
-# Contributor: vigo <vigo.the.unholy.carpath...@gmail.com>
-# Contributor: Sergej Pupykin <pupykin.s+a...@gmail.com>
-# Contributor: judd <jvi...@zeroflux.org>
-
-pkgbase=tcp-wrappers
-pkgname=(
-  libwrap
-  tcp-wrappers
-)
-pkgver=7.6.28
-pkgrel=2
-pkgdesc='Monitors and Controls incoming TCP connections'
-arch=(x86_64)
-url=ftp://ftp.porcupine.org/pub/security/index.html
-license=(BSD)
-depends=(
-  glibc
-  libnsl
-)
-source=(
-  ftp://ftp.porcupine.org/pub/security/tcp_wrappers_${pkgver%.*}.tar.gz
-  
http://http.debian.net/debian/pool/main/t/tcp-wrappers/tcp-wrappers_${pkgver%.*}.q-${pkgver##*.}.debian.tar.xz
-  tcp-wrappers-redhat-bug11881.patch
-  hosts.allow
-  hosts.deny
-)
-sha256sums=('9543d7adedf78a6de0b221ccbbd1952e08b5138717f4ade814039bb489a4315d'
-            '9e878177878b7796ab9e8cb4abb094bf66b3d37e0e1af3cee3e24afde4b1e11f'
-            '2e527e54c1ea208de10a206c667f751e54651eb77c973271d213e3459d690403'
-            'c1b19035a14ba552e8795ec3d7171e688592c9317f2eb14373320315435565e3'
-            '969414f0a161e95fbe4cfe32df7c657a2793734d09416c00fa1116c5c0a9924f')
-
-prepare() {
-  cd tcp_wrappers_${pkgver%.*}
-
-  for patch in $(cat ../debian/patches/series); do
-    patch -Np1 -i ../debian/patches/${patch}
-  done
-  patch -Np1 -i ../tcp-wrappers-redhat-bug11881.patch
-}
-
-build() {
-  cd tcp_wrappers_${pkgver%.*}
-
-  make \
-    COPTS="$CFLAGS" \
-    LDOPTS="$LDFLAGS" \
-    REAL_DAEMON_DIR=/usr/bin \
-    STYLE='-DPROCESS_OPTIONS' \
-    linux
-}
-
-package_libwrap() {
-  provides=(tcp_wrappers-libs)
-  conflicts=(tcp_wrappers-libs)
-
-  cd tcp_wrappers_${pkgver%.*}
-
-  install -Dm 644 tcpd.h -t "${pkgdir}"/usr/include/
-  install -Dm 644 shared/libwrap.so.0.${pkgver%.*} -t "${pkgdir}"/usr/lib/
-  ln -s libwrap.so.0.${pkgver%.*} "${pkgdir}"/usr/lib/libwrap.so.0
-  ln -s libwrap.so.0 "${pkgdir}"/usr/lib/libwrap.so
-
-  install -Dm 644 DISCLAIMER -t "${pkgdir}"/usr/share/licenses/libwrap/
-}
-
-package_tcp-wrappers() {
-  depends=(libwrap)
-  provides=(tcp_wrappers)
-  conflicts=(tcp_wrappers)
-  backup=(
-    etc/hosts.allow
-    etc/hosts.deny
-  )
-
-  cd tcp_wrappers_${pkgver%.*}
-
-  install -Dm 755 safe_finger tcpd tcpdchk tcpdmatch try-from -t 
"${pkgdir}"/usr/bin/
-  install -Dm 644 *.3 -t "${pkgdir}"/usr/share/man/man3/
-  install -Dm 644 *.5 -t "${pkgdir}"/usr/share/man/man5/
-  install -Dm 644 *.8 -t "${pkgdir}"/usr/share/man/man8/
-  install -Dm 644 ../hosts.{allow,deny} -t "${pkgdir}"/etc/
-  install -Dm 644 README -t "${pkgdir}"/usr/share/doc/tcp-wrappers/
-
-  install -dm 755 "${pkgdir}"/usr/share/licenses
-  ln -s libwrap "${pkgdir}"/usr/share/licenses/tcp-wrappers
-}
-
-# vim: ts=2 sw=2 et:

Copied: tcp-wrappers/repos/community-x86_64/PKGBUILD (from rev 894301, 
tcp-wrappers/trunk/PKGBUILD)
===================================================================
--- PKGBUILD                            (rev 0)
+++ PKGBUILD    2021-03-18 08:21:41 UTC (rev 894302)
@@ -0,0 +1,91 @@
+# Maintainer: Maxime Gauduin <aluc...@archlinux.org>
+# Contributor: Manuel Hüsers <manuel.hues...@uni-ol.de>
+# Contributor: vigo <vigo.the.unholy.carpath...@gmail.com>
+# Contributor: Sergej Pupykin <pupykin.s+a...@gmail.com>
+# Contributor: judd <jvi...@zeroflux.org>
+
+pkgbase=tcp-wrappers
+pkgname=(
+  libwrap
+  tcp-wrappers
+)
+pkgver=7.6.31
+pkgrel=1
+pkgdesc='Monitors and Controls incoming TCP connections'
+arch=(x86_64)
+url=ftp://ftp.porcupine.org/pub/security/index.html
+license=(BSD)
+depends=(
+  glibc
+  libnsl
+)
+source=(
+  ftp://ftp.porcupine.org/pub/security/tcp_wrappers_${pkgver%.*}.tar.gz
+  
http://http.debian.net/debian/pool/main/t/tcp-wrappers/tcp-wrappers_${pkgver%.*}.q-${pkgver##*.}.debian.tar.xz
+  tcp-wrappers-redhat-bug11881.patch
+  hosts.allow
+  hosts.deny
+)
+sha256sums=('9543d7adedf78a6de0b221ccbbd1952e08b5138717f4ade814039bb489a4315d'
+            '20fec7826bde1262007e6dd43f365b5802bacc283942d93b78385ea634dc594a'
+            '2e527e54c1ea208de10a206c667f751e54651eb77c973271d213e3459d690403'
+            'c1b19035a14ba552e8795ec3d7171e688592c9317f2eb14373320315435565e3'
+            '969414f0a161e95fbe4cfe32df7c657a2793734d09416c00fa1116c5c0a9924f')
+
+prepare() {
+  cd tcp_wrappers_${pkgver%.*}
+
+  for patch in $(cat ../debian/patches/series); do
+    patch -Np1 -i ../debian/patches/${patch}
+  done
+  patch -Np1 -i ../tcp-wrappers-redhat-bug11881.patch
+}
+
+build() {
+  cd tcp_wrappers_${pkgver%.*}
+
+  make \
+    COPTS="$CFLAGS" \
+    LDOPTS="$LDFLAGS" \
+    REAL_DAEMON_DIR=/usr/bin \
+    STYLE='-DPROCESS_OPTIONS' \
+    linux
+}
+
+package_libwrap() {
+  provides=(tcp_wrappers-libs)
+  conflicts=(tcp_wrappers-libs)
+
+  cd tcp_wrappers_${pkgver%.*}
+
+  install -Dm 644 tcpd.h -t "${pkgdir}"/usr/include/
+  install -Dm 644 shared/libwrap.so.0.${pkgver%.*} -t "${pkgdir}"/usr/lib/
+  ln -s libwrap.so.0.${pkgver%.*} "${pkgdir}"/usr/lib/libwrap.so.0
+  ln -s libwrap.so.0 "${pkgdir}"/usr/lib/libwrap.so
+
+  install -Dm 644 DISCLAIMER -t "${pkgdir}"/usr/share/licenses/libwrap/
+}
+
+package_tcp-wrappers() {
+  depends=(libwrap)
+  provides=(tcp_wrappers)
+  conflicts=(tcp_wrappers)
+  backup=(
+    etc/hosts.allow
+    etc/hosts.deny
+  )
+
+  cd tcp_wrappers_${pkgver%.*}
+
+  install -Dm 755 safe_finger tcpd tcpdchk tcpdmatch try-from -t 
"${pkgdir}"/usr/bin/
+  install -Dm 644 *.3 -t "${pkgdir}"/usr/share/man/man3/
+  install -Dm 644 *.5 -t "${pkgdir}"/usr/share/man/man5/
+  install -Dm 644 *.8 -t "${pkgdir}"/usr/share/man/man8/
+  install -Dm 644 ../hosts.{allow,deny} -t "${pkgdir}"/etc/
+  install -Dm 644 README -t "${pkgdir}"/usr/share/doc/tcp-wrappers/
+
+  install -dm 755 "${pkgdir}"/usr/share/licenses
+  ln -s libwrap "${pkgdir}"/usr/share/licenses/tcp-wrappers
+}
+
+# vim: ts=2 sw=2 et:

Deleted: hosts.allow
===================================================================
--- hosts.allow 2021-03-18 08:21:33 UTC (rev 894301)
+++ hosts.allow 2021-03-18 08:21:41 UTC (rev 894302)
@@ -1,5 +0,0 @@
-#
-# /etc/hosts.allow
-#
-
-# End of file

Copied: tcp-wrappers/repos/community-x86_64/hosts.allow (from rev 894301, 
tcp-wrappers/trunk/hosts.allow)
===================================================================
--- hosts.allow                         (rev 0)
+++ hosts.allow 2021-03-18 08:21:41 UTC (rev 894302)
@@ -0,0 +1,5 @@
+#
+# /etc/hosts.allow
+#
+
+# End of file

Deleted: hosts.deny
===================================================================
--- hosts.deny  2021-03-18 08:21:33 UTC (rev 894301)
+++ hosts.deny  2021-03-18 08:21:41 UTC (rev 894302)
@@ -1,7 +0,0 @@
-#
-# /etc/hosts.deny
-#
-
-ALL: ALL
-
-# End of file

Copied: tcp-wrappers/repos/community-x86_64/hosts.deny (from rev 894301, 
tcp-wrappers/trunk/hosts.deny)
===================================================================
--- hosts.deny                          (rev 0)
+++ hosts.deny  2021-03-18 08:21:41 UTC (rev 894302)
@@ -0,0 +1,7 @@
+#
+# /etc/hosts.deny
+#
+
+ALL: ALL
+
+# End of file

Deleted: tcp-wrappers-redhat-bug11881.patch
===================================================================
--- tcp-wrappers-redhat-bug11881.patch  2021-03-18 08:21:33 UTC (rev 894301)
+++ tcp-wrappers-redhat-bug11881.patch  2021-03-18 08:21:41 UTC (rev 894302)
@@ -1,36 +0,0 @@
---- tcp_wrappers_7.6/tcpd.c.bug11881
-+++ tcp_wrappers_7.6/tcpd.c
-@@ -60,10 +60,10 @@
-      */
- 
-     if (argv[0][0] == '/') {
--      strcpy(path, argv[0]);
-+      strncpy(path, argv[0], sizeof(path));
-       argv[0] = strrchr(argv[0], '/') + 1;
-     } else {
--      sprintf(path, "%s/%s", REAL_DAEMON_DIR, argv[0]);
-+      snprintf(path, sizeof(path), "%s/%s", REAL_DAEMON_DIR, argv[0]);
-     }
- 
-     /*
---- tcp_wrappers_7.6/eval.c.bug11881
-+++ tcp_wrappers_7.6/eval.c
-@@ -111,7 +111,7 @@
-       return (hostinfo);
- #endif
-     if (STR_NE(eval_user(request), unknown)) {
--      sprintf(both, "%s@%s", request->user, hostinfo);
-+      snprintf(both, sizeof(both), "%s@%s", request->user, hostinfo);
-       return (both);
-     } else {
-       return (hostinfo);
-@@ -128,7 +128,7 @@
-     char   *daemon = eval_daemon(request);
- 
-     if (STR_NE(host, unknown)) {
--      sprintf(both, "%s@%s", daemon, host);
-+      snprintf(both, sizeof(both), "%s@%s", daemon, host);
-       return (both);
-     } else {
-       return (daemon);
-

Copied: tcp-wrappers/repos/community-x86_64/tcp-wrappers-redhat-bug11881.patch 
(from rev 894301, tcp-wrappers/trunk/tcp-wrappers-redhat-bug11881.patch)
===================================================================
--- tcp-wrappers-redhat-bug11881.patch                          (rev 0)
+++ tcp-wrappers-redhat-bug11881.patch  2021-03-18 08:21:41 UTC (rev 894302)
@@ -0,0 +1,36 @@
+--- tcp_wrappers_7.6/tcpd.c.bug11881
++++ tcp_wrappers_7.6/tcpd.c
+@@ -60,10 +60,10 @@
+      */
+ 
+     if (argv[0][0] == '/') {
+-      strcpy(path, argv[0]);
++      strncpy(path, argv[0], sizeof(path));
+       argv[0] = strrchr(argv[0], '/') + 1;
+     } else {
+-      sprintf(path, "%s/%s", REAL_DAEMON_DIR, argv[0]);
++      snprintf(path, sizeof(path), "%s/%s", REAL_DAEMON_DIR, argv[0]);
+     }
+ 
+     /*
+--- tcp_wrappers_7.6/eval.c.bug11881
++++ tcp_wrappers_7.6/eval.c
+@@ -111,7 +111,7 @@
+       return (hostinfo);
+ #endif
+     if (STR_NE(eval_user(request), unknown)) {
+-      sprintf(both, "%s@%s", request->user, hostinfo);
++      snprintf(both, sizeof(both), "%s@%s", request->user, hostinfo);
+       return (both);
+     } else {
+       return (hostinfo);
+@@ -128,7 +128,7 @@
+     char   *daemon = eval_daemon(request);
+ 
+     if (STR_NE(host, unknown)) {
+-      sprintf(both, "%s@%s", daemon, host);
++      snprintf(both, sizeof(both), "%s@%s", daemon, host);
+       return (both);
+     } else {
+       return (daemon);
+

Reply via email to