Hello everybody, Edi Meier wrote...
> kernel-version >= 3.0 is not supported:
> cf. apf-9.7-1/files/internals/functions.apf
>
> if [ "$KREL" == "2.4" ]; then
> MEXT="o"
> elif [ "$KREL" == "2.6" ]; then
> MEXT="ko"
> elif [ ! "$KREL" == "2.4" ] && [ ! "$KREL" == "2.6" ]; then
> if [ ! "$SET_VERBOSE" == "1" ]; then
> echo "Kernel version not equal to 2.4.x or 2.6.x, aborting."
> fi
> eout "{glob} kernel version not equal to 2.4.x or 2.6.x, aborting."
> exit 1
> else
> if [ ! "$SET_VERBOSE" == "1" ]; then
> echo "Kernel version not equal to 2.4.x or 2.6.x, aborting."
> fi
> eout "{glob} kernel version not equal to 2.4.x or 2.6.x, aborting."
> exit 1
> fi
Since apf-firewall will not be a part of stretch unless this gets fixed:
Can you please test on a sid or a least stretch installation whether
using a modified functions.apf makes apf-firewall working again?
(...)
if [ "$KREL" == "2.4" ]; then
MEXT="o"
elif [ "$KREL" == "2.6" ]; then
MEXT="ko"
elif [[ "$KREL" =~ "3." ]]; then
MEXT="ko"
elif [[ "$KREL" =~ "4." ]]; then
MEXT="ko"
elif [ ! "$KREL" == "2.4" ] && [ ! "$KREL" == "2.6" ] && [[ ! "$KREL" =~ "3."
]] && [[ ! "$KREL" =~ "4." ]]; then
if [ ! "$SET_VERBOSE" == "1" ]; then
(...)
Then I can take care of the rest. However, given the stretch release
schedule this requires very swift action from your side, please respond
by Dec 23rd the latest.
Christoph
signature.asc
Description: Digital signature

