[gentoo-commits] repo/gentoo:master commit in: net-firewall/ufw/, net-firewall/ufw/files/
commit: 5b92f67047e6ae788b7e68acd72ca421d4e42d01 Author: Hasan ÇALIŞIR psauxit com> AuthorDate: Tue Jun 28 08:25:53 2022 + Commit: Florian Schmaus gentoo org> CommitDate: Fri Jul 1 08:28:35 2022 + URL:https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=5b92f670 net-firewall/ufw: bump to 0.36.1 * version bump to 0.36.1. * bump to EAPI 8. * python_combat drop 3.7, add 3.11, current range 8,11. * dropped NonexistentBlockers from RDEPEND. ! upstream bug: https://bugs.launchpad.net/ufw/+bug/815982 fixed and commited. * Change mod 0644 for all rules in /etc/ufw. * Drop comparison operator >= for iptables 1.4. Current repo already meets the requirement. * Patches synced with current version that we still need them. [ flow: add Closes bug# 834130 git trailer ] Package-Manager: Portage-3.0.30, Repoman-3.0.3 Signed-off-by: Hasan ÇALIŞIR psauxit.com> Closes: https://bugs.gentoo.org/834130 Closes: https://github.com/gentoo/gentoo/pull/26110 Signed-off-by: Florian Schmaus gentoo.org> net-firewall/ufw/Manifest | 1 + .../ufw/files/ufw-0.36.1-bash-completion.patch | 16 ++ .../ufw/files/ufw-0.36.1-dont-check-iptables.patch | 50 + net-firewall/ufw/files/ufw-0.36.1-move-path.patch | 124 net-firewall/ufw/files/ufw-0.36.1-shebang.patch| 15 ++ net-firewall/ufw/ufw-0.36.1.ebuild | 217 + 6 files changed, 423 insertions(+) diff --git a/net-firewall/ufw/Manifest b/net-firewall/ufw/Manifest index ab0de6087c34..91de7839ba25 100644 --- a/net-firewall/ufw/Manifest +++ b/net-firewall/ufw/Manifest @@ -1 +1,2 @@ +DIST ufw-0.36.1.tar.gz 583123 BLAKE2B 16e1ee67493d5db10a04667b646a019aa3aeb06345d0facc334fb07eeff4d4f6674a4699b2bd7bd6ed29de1c05c4e14812e9e8ec55c4bfb8579b8e3e2e577f6a SHA512 77d01fef661083eac041be6d6eabffb1d8aedb215f73e44e18a9a63a48da96414b3c0166e3ffd9402c22c72a6de5d774ba14b15368b02997aae8e08d1c5dd4c0 DIST ufw-0.36.tar.gz 580338 BLAKE2B a7e07ac11539061a69bb83d45c0affc54793503b31c9e9f9f8b34fa890a3fe97682f9133102e74e5f6e1eb372a929cfc8619baa2cc9efc1dc289d9f4a1766efd SHA512 b32d7f79f43c203149c48b090ee0d063df78fcf654344ee11066a7363e799a62b046758ffe02b8bd15121545ac2a6b61df21fe56f8b810319fe4dd562cbdadb3 diff --git a/net-firewall/ufw/files/ufw-0.36.1-bash-completion.patch b/net-firewall/ufw/files/ufw-0.36.1-bash-completion.patch new file mode 100644 index ..927af244eef1 --- /dev/null +++ b/net-firewall/ufw/files/ufw-0.36.1-bash-completion.patch @@ -0,0 +1,16 @@ +--- a/shell-completion/bash2018-12-14 21:25:55.0 +0300 b/shell-completion/bash2019-03-21 01:26:46.152181981 +0300 +@@ -57,7 +57,6 @@ + echo "numbered verbose" + } + +-_have ufw && + _ufw() + { + cur=${COMP_WORDS[COMP_CWORD]} +@@ -91,4 +90,4 @@ + fi + } + +-_have ufw && complete -F _ufw ufw ++complete -F _ufw ufw diff --git a/net-firewall/ufw/files/ufw-0.36.1-dont-check-iptables.patch b/net-firewall/ufw/files/ufw-0.36.1-dont-check-iptables.patch new file mode 100644 index ..ae0c95525a46 --- /dev/null +++ b/net-firewall/ufw/files/ufw-0.36.1-dont-check-iptables.patch @@ -0,0 +1,50 @@ +--- a/setup.py2022-06-27 17:33:18.043794598 +0300 b/setup.py2022-06-27 18:15:18.384463926 +0300 +@@ -256,46 +256,7 @@ + os.unlink(os.path.join('staging', 'ufw-init')) + os.unlink(os.path.join('staging', 'ufw-init-functions')) + +-iptables_exe = '' +-iptables_dir = '' +- +-for e in ['iptables']: +-# Historically iptables was in /sbin, then later also symlinked from +-# /usr/sbin/iptables to /sbin/iptables. Debian bullseye moves iptables +-# to /usr/sbin with no symlink in /sbin except on upgrades. To accomodate +-# buildds that may still have the old iptables, search /usr/sbin first +-for dir in ['/usr/sbin', '/sbin', '/usr/bin', '/bin', '/usr/local/sbin', \ +-'/usr/local/bin']: +-if e == "iptables": +-if os.path.exists(os.path.join(dir, e)): +-iptables_dir = dir +-iptables_exe = os.path.join(iptables_dir, "iptables") +-print("Found '%s'" % iptables_exe) +-else: +-continue +- +-if iptables_exe != "": +-break +- +- +-if iptables_exe == '': +-print("ERROR: could not find required binary 'iptables'", file=sys.stderr) +-sys.exit(1) +- +-for e in ['ip6tables', 'iptables-restore', 'ip6tables-restore']: +-if not os.path.exists(os.path.join(iptables_dir, e)): +-print("ERROR: could not find required binary '%s'" % (e), file=sys.stderr) +-sys.exit(1) +- +-(rc, out) = cmd([iptables_exe, '-V']) +-if rc != 0: +-raise OSError(errno.ENOENT, "Could not find version for '%s'" % \ +- (iptables_exe)) +-version = re.sub('^v', '', re.split('\s', str(out))[1]) +-print("Found '%s' version '%s'" % (iptables_exe, version)) +-if version < "1.4": +-print("WARN: version '%s' has limited IPv6
[gentoo-commits] repo/gentoo:master commit in: net-firewall/ufw/, net-firewall/ufw/files/
commit: 13cabfd23b3d793596453e85057789ef14a4faa1 Author: Hasan ÇALIŞIR psauxit com> AuthorDate: Thu Mar 21 01:08:46 2019 + Commit: Patrice Clement gentoo org> CommitDate: Sat Mar 30 18:32:11 2019 + URL:https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=13cabfd2 net-firewall/ufw: version bump to 0.36 && EAPI 7 bump. Reported-by: yuLya tutanota.com> Tested-by: Hasan ÇALIŞIR psauxit.com> Closes: https://bugs.gentoo.org/680540 Closes: https://github.com/gentoo/gentoo/pull/11430 Package-Manager: Portage-2.3.62, Repoman-2.3.11 Signed-off-by: Hasan ÇALIŞIR psauxit.com> Signed-off-by: Patrice Clement gentoo.org> net-firewall/ufw/Manifest | 1 + .../ufw/files/ufw-0.36-bash-completion.patch | 16 ++ .../ufw/files/ufw-0.36-dont-check-iptables.patch | 45 + net-firewall/ufw/files/ufw-0.36-move-path.patch| 174 ++ net-firewall/ufw/files/ufw-0.36-shebang.patch | 15 ++ net-firewall/ufw/metadata.xml | 15 +- net-firewall/ufw/ufw-0.36.ebuild | 199 + 7 files changed, 463 insertions(+), 2 deletions(-) diff --git a/net-firewall/ufw/Manifest b/net-firewall/ufw/Manifest index ed396f855b3..ad31ad0661a 100644 --- a/net-firewall/ufw/Manifest +++ b/net-firewall/ufw/Manifest @@ -1,2 +1,3 @@ DIST ufw-0.34_pre805.tar.gz 335875 BLAKE2B a2b654fe35a299ffd9978ef14a8d5667f799b654b6285bc81756c8081d9f4417b2fa9c05a234351d42709c2c57ff624b4fe7bca8ffe4d13cd12436feead6e4da SHA512 b8bba3bb8c423070d6434d1df7274423edf3a356415f54c6448fa0ff2d13a4b2ac21c4bb627cba01d6955b04f793eeaf2fc535c6221e7de48f11bef745035263 DIST ufw-0.35.tar.gz 375310 BLAKE2B 3babf22e860ead6970c1386b0ab9fc3de364ba3f5c8bc0237be4a9446358fe058d216e7928d16eed8a148fbee5b82fc1d9e3b358f357c2fac236ae6f6b942a01 SHA512 b36c82559910634505648f717d19eb5a0cb1ce739a804359087e74c966869d0375c4ed5811954b32d2b5b51866f6ae1bec62a4a464f226b2eecc56b096f303fc +DIST ufw-0.36.tar.gz 580338 BLAKE2B a7e07ac11539061a69bb83d45c0affc54793503b31c9e9f9f8b34fa890a3fe97682f9133102e74e5f6e1eb372a929cfc8619baa2cc9efc1dc289d9f4a1766efd SHA512 b32d7f79f43c203149c48b090ee0d063df78fcf654344ee11066a7363e799a62b046758ffe02b8bd15121545ac2a6b61df21fe56f8b810319fe4dd562cbdadb3 diff --git a/net-firewall/ufw/files/ufw-0.36-bash-completion.patch b/net-firewall/ufw/files/ufw-0.36-bash-completion.patch new file mode 100644 index 000..927af244eef --- /dev/null +++ b/net-firewall/ufw/files/ufw-0.36-bash-completion.patch @@ -0,0 +1,16 @@ +--- a/shell-completion/bash2018-12-14 21:25:55.0 +0300 b/shell-completion/bash2019-03-21 01:26:46.152181981 +0300 +@@ -57,7 +57,6 @@ + echo "numbered verbose" + } + +-_have ufw && + _ufw() + { + cur=${COMP_WORDS[COMP_CWORD]} +@@ -91,4 +90,4 @@ + fi + } + +-_have ufw && complete -F _ufw ufw ++complete -F _ufw ufw diff --git a/net-firewall/ufw/files/ufw-0.36-dont-check-iptables.patch b/net-firewall/ufw/files/ufw-0.36-dont-check-iptables.patch new file mode 100644 index 000..11eb1748dd1 --- /dev/null +++ b/net-firewall/ufw/files/ufw-0.36-dont-check-iptables.patch @@ -0,0 +1,45 @@ +--- a/setup.py 2019-03-21 01:32:28.500245586 +0300 b/setup.py 2019-03-21 01:39:17.166095026 +0300 +@@ -257,41 +257,7 @@ + os.unlink(os.path.join('staging', 'ufw-init')) + os.unlink(os.path.join('staging', 'ufw-init-functions')) + +-iptables_exe = '' +-iptables_dir = '' +- +-for e in ['iptables']: +-for dir in ['/sbin', '/bin', '/usr/sbin', '/usr/bin', '/usr/local/sbin', \ +-'/usr/local/bin']: +-if e == "iptables": +-if os.path.exists(os.path.join(dir, e)): +-iptables_dir = dir +-iptables_exe = os.path.join(iptables_dir, "iptables") +-print("Found '%s'" % iptables_exe) +-else: +-continue +- +-if iptables_exe != "": +-break +- +- +-if iptables_exe == '': +-print("ERROR: could not find required binary 'iptables'", file=sys.stderr) +-sys.exit(1) +- +-for e in ['ip6tables', 'iptables-restore', 'ip6tables-restore']: +-if not os.path.exists(os.path.join(iptables_dir, e)): +-print("ERROR: could not find required binary '%s'" % (e), file=sys.stderr) +-sys.exit(1) +- +-(rc, out) = cmd([iptables_exe, '-V']) +-if rc != 0: +-raise OSError(errno.ENOENT, "Could not find version for '%s'" % \ +- (iptables_exe)) +-version = re.sub('^v', '', re.split('\s', str(out))[1]) +-print("Found '%s' version '%s'" % (iptables_exe, version)) +-if version < "1.4": +-print("WARN: version '%s' has limited IPv6 support. See README for details." % (version), file=sys.stderr) ++iptables_dir = '/sbin' + + setup (name='ufw', + version=ufw_version, diff --git a/net-firewall/ufw/files/ufw-0.36-move-path.patch b/net-firewall/ufw/files/ufw-0.36-move-path.patch new file mode 100644 index 000..1ba9d117be5 --- /dev/null +++
[gentoo-commits] repo/gentoo:master commit in: net-firewall/ufw/, net-firewall/ufw/files/
commit: 6c1e5a81ed729a304bbbfe6eadc76798a68f6e55 Author: Nicholas Vinson gmail com> AuthorDate: Thu Mar 10 18:54:09 2016 + Commit: Jason Zaman gentoo org> CommitDate: Mon Mar 14 04:29:27 2016 + URL:https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6c1e5a81 net-firewall/ufw: version bump to 0.35 Updates ufw to version 0.35. The ebuild has also been updated to use EAPI 6. Patches were updated to address EAPI and upstream code changes. Gentoo-Bug: 563168 Package-Manager: portage-2.2.28 net-firewall/ufw/Manifest | 1 + .../ufw/files/ufw-0.35-bash-completion.patch | 17 ++ net-firewall/ufw/files/ufw-0.35-move-path.patch| 179 net-firewall/ufw/ufw-0.35.ebuild | 186 + 4 files changed, 383 insertions(+) diff --git a/net-firewall/ufw/Manifest b/net-firewall/ufw/Manifest index 6380dd5..d8f8b5e 100644 --- a/net-firewall/ufw/Manifest +++ b/net-firewall/ufw/Manifest @@ -1 +1,2 @@ DIST ufw-0.34_pre805.tar.gz 335875 SHA256 a78693da04720f9f7eb463447b940eed18c3e2c20d3de336ebf9bf821dfdac2f SHA512 b8bba3bb8c423070d6434d1df7274423edf3a356415f54c6448fa0ff2d13a4b2ac21c4bb627cba01d6955b04f793eeaf2fc535c6221e7de48f11bef745035263 WHIRLPOOL 5e5238925d928e883c9869b3b72a7a04ad18352ebbcb5fead9b14c7bb5225f1bbae613d9117ceb5e9d435e1ca1f1d0d033bbdf673896990eda5efcb7a7d04829 +DIST ufw-0.35.tar.gz 375310 SHA256 662f865bc83bf8aa1a40a6fe578bc2ce796ff60a1be2c1103def7db1b91f8509 SHA512 b36c82559910634505648f717d19eb5a0cb1ce739a804359087e74c966869d0375c4ed5811954b32d2b5b51866f6ae1bec62a4a464f226b2eecc56b096f303fc WHIRLPOOL 789b163bf9cc3b27f231024f33a68d3637ca26cf71f202b438abbf16a2725485ba787b811a040d03d4f99fb8c510f8f9a25154e03d2387d3fb0f03a7c4624de7 diff --git a/net-firewall/ufw/files/ufw-0.35-bash-completion.patch b/net-firewall/ufw/files/ufw-0.35-bash-completion.patch new file mode 100644 index 000..fde635d --- /dev/null +++ b/net-firewall/ufw/files/ufw-0.35-bash-completion.patch @@ -0,0 +1,17 @@ +--- a/shell-completion/bash b/shell-completion/bash +@@ -52,7 +52,6 @@ + echo "numbered verbose" + } + +-have ufw && + _ufw() + { + cur=${COMP_WORDS[COMP_CWORD]} +@@ -83,5 +82,5 @@ + fi + } + +-[ "$have" ] && complete -F _ufw ufw ++complete -F _ufw ufw + diff --git a/net-firewall/ufw/files/ufw-0.35-move-path.patch b/net-firewall/ufw/files/ufw-0.35-move-path.patch new file mode 100644 index 000..58af7721 --- /dev/null +++ b/net-firewall/ufw/files/ufw-0.35-move-path.patch @@ -0,0 +1,179 @@ +diff -Naur ufw-0.31.orig/doc/ufw-framework.8 ufw-0.31/doc/ufw-framework.8 +--- ufw-0.31.orig/doc/ufw-framework.8 2012-03-10 00:07:11.0 +0100 ufw-0.31/doc/ufw-framework.8 2012-03-12 16:55:50.680992962 +0100 +@@ -18,7 +18,7 @@ + parameters and configuration of IPv6. The framework consists of the following + files: + .TP +-#STATE_PREFIX#/ufw\-init ++#SHARE_DIR#/ufw\-init + initialization script + .TP + #CONFIG_PREFIX#/ufw/before[6].rules +@@ -41,7 +41,7 @@ + + .SH "BOOT INITIALIZATION" + .PP +-\fBufw\fR is started on boot with #STATE_PREFIX#/ufw\-init. This script is a ++\fBufw\fR is started on boot with #SHARE_DIR#/ufw\-init. This script is a + standard SysV style initscript used by the \fBufw\fR command and should not be + modified. It supports the following arguments: + .TP +diff -Naur ufw-0.31.orig/README ufw-0.31/README +--- ufw-0.31.orig/README 2012-03-10 00:07:11.0 +0100 ufw-0.31/README2012-03-12 16:55:50.681993089 +0100 +@@ -58,7 +58,7 @@ + on your needs, this can be as simple as adding the following to a startup + script (eg rc.local for systems that use it): + +-# /lib/ufw/ufw-init start ++# /usr/share/ufw/ufw-init start + + For systems that use SysV initscripts, an example script is provided in + doc/initscript.example. See doc/upstart.example for an Upstart example. Consult +@@ -72,9 +72,9 @@ + /etc/defaults/ufw high level configuration + /etc/ufw/before[6].rules rules evaluated before UI added rules + /etc/ufw/after[6].rules rules evaluated after UI added rules +-/lib/ufw/user[6].rulesUI added rules (not to be modified) ++/etc/ufw/user/user[6].rules UI added rules (not to be modified) + /etc/ufw/sysctl.conf kernel network tunables +-/lib/ufw/ufw-init start script ++/usr/share/ufw/ufw-init start script + + + Usage +@@ -149,7 +149,7 @@ + that the primary chains don't move around other non-ufw rules and chains. To + completely flush the built-in chains with this configuration, you can use: + +-# /lib/ufw/ufw-init flush-all ++# /usr/share/ufw/ufw-init flush-all + + Alternately, ufw may also take full control of the firewall by setting + MANAGE_BUILTINS=yes in /etc/defaults/ufw. This will flush all the built-in +@@ -247,7 +247,7 @@ + + Remote Management + - +-On /lib/ufw/ufw-init start and 'ufw enable' the chains are flushed, so