Hello everybody,

Edi Meier wrote...

> kernel-version >= 3.0 is not supported:
> cf. apf-9.7-1/files/internals/functions.apf
> 
> if [ "$KREL" == "2.4" ]; then
>         MEXT="o"
> elif [ "$KREL" == "2.6" ]; then
>         MEXT="ko"
> elif [ ! "$KREL" == "2.4" ] && [ ! "$KREL" == "2.6" ]; then
>         if [ ! "$SET_VERBOSE" == "1" ]; then
>                 echo "Kernel version not equal to 2.4.x or 2.6.x, aborting."
>         fi
>         eout "{glob} kernel version not equal to 2.4.x or 2.6.x, aborting."
>         exit 1
> else
>         if [ ! "$SET_VERBOSE" == "1" ]; then
>                 echo "Kernel version not equal to 2.4.x or 2.6.x, aborting."
>         fi
>         eout "{glob} kernel version not equal to 2.4.x or 2.6.x, aborting."
>         exit 1
> fi

Since apf-firewall will not be a part of stretch unless this gets fixed:
Can you please test on a sid or a least stretch installation whether
using a modified functions.apf makes apf-firewall working again?

(...)
if [ "$KREL" == "2.4" ]; then
    MEXT="o"
elif [ "$KREL" == "2.6" ]; then
    MEXT="ko"
elif [[ "$KREL" =~ "3." ]]; then
    MEXT="ko"
elif [[ "$KREL" =~ "4." ]]; then
    MEXT="ko"
elif [ ! "$KREL" == "2.4" ] && [ ! "$KREL" == "2.6" ] && [[ ! "$KREL" =~ "3." 
]] && [[ ! "$KREL" =~ "4." ]]; then
    if [ ! "$SET_VERBOSE" == "1" ]; then
(...)

Then I can take care of the rest. However, given the stretch release
schedule this requires very swift action from your side, please respond
by Dec 23rd the latest.

    Christoph

Attachment: signature.asc
Description: Digital signature

Reply via email to