public inbox for gentoo-commits@lists.gentoo.org
 help / color / mirror / Atom feed
From: "Patrick McLean" <chutzpah@gentoo.org>
To: gentoo-commits@lists.gentoo.org
Subject: [gentoo-commits] repo/gentoo:master commit in: net-firewall/nftables/
Date: Wed,  2 Oct 2024 23:12:25 +0000 (UTC)	[thread overview]
Message-ID: <1727910717.31678d15acc7ea08b8154bbac2662b7dc82fe279.chutzpah@gentoo> (raw)

commit:     31678d15acc7ea08b8154bbac2662b7dc82fe279
Author:     Patrick McLean <chutzpah <AT> gentoo <DOT> org>
AuthorDate: Wed Oct  2 23:11:07 2024 +0000
Commit:     Patrick McLean <chutzpah <AT> gentoo <DOT> org>
CommitDate: Wed Oct  2 23:11:57 2024 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=31678d15

net-firewall/nftables: add 1.1.1

Signed-off-by: Patrick McLean <chutzpah <AT> gentoo.org>

 net-firewall/nftables/Manifest              |   2 +
 net-firewall/nftables/nftables-1.1.1.ebuild | 228 ++++++++++++++++++++++++++++
 2 files changed, 230 insertions(+)

diff --git a/net-firewall/nftables/Manifest b/net-firewall/nftables/Manifest
index ada3885ff94a..fc0e6f7ae858 100644
--- a/net-firewall/nftables/Manifest
+++ b/net-firewall/nftables/Manifest
@@ -2,3 +2,5 @@ DIST nftables-1.0.9.tar.xz 971968 BLAKE2B 1dfd1e79d3a7b645fd0995dad10893d70dbd13
 DIST nftables-1.0.9.tar.xz.sig 566 BLAKE2B d4bb0a1f629d2950753799fba18f6c3ce50e5ff242816e392245a714bfeccb3408583added4362f1e0da47cc6e30b0b95f864cf8443a1872d59ae40b15b5f706 SHA512 9b96ce8539700713ff4802fb2deff5b2ea0dd3155c45f5a8f49a45f70226893c7449e0b79504833b2e63e5290290e693c962128a226ca8f6ca281185bdcd7b51
 DIST nftables-1.1.0.tar.xz 1057672 BLAKE2B cc876d9ba344480a2f5a12811206356d9edbd4a95d29e8127f43864a1b4e2ae9bc88a6d07f0d36469dfed190c5822fd6a7c69b6a9028fbb0bc1ec254e76083d9 SHA512 0b0c6789b7d987289b9770ea2d26e640c50bc7f300685476c4fc367b5ad3d6980fca63b8fe701f727fb3a94328eb7dc560ed5745b5ce44f171022de5714d3a86
 DIST nftables-1.1.0.tar.xz.sig 566 BLAKE2B 556287b40ad6f82d229ae18910ec2008c3168c7088e7149f8b5e80ca9983b90ec202cf01838c80e973845dd565f4f13a454d6dc99030a3f9cede6c33929da07d SHA512 1b3a42a76b378373c8a21b77aaf9c1fc57402360d49d56b22f02c50bef969b1f6867a4d40bda24b2dd1a0dfcf7148893938a7eea84ff8cc67d9edcd6b9b62bb4
+DIST nftables-1.1.1.tar.xz 989700 BLAKE2B f273c78369ba755049c6afa63eba195cf29f926fa8fc9bf344022904c00a8c6c4259cc5093e23993a55fd25790af575305df79a7c28624fa7082661b2eed70d0 SHA512 676413d4adadffb15d52c1f8f6432636cab83a7bcda1a18d9f0e6b58819a2c027a49922588c02bd9ad386de930eaa697bfe74c0938b595bf1ee485bfa7cf2e50
+DIST nftables-1.1.1.tar.xz.sig 566 BLAKE2B b7debda3373972f69af9b4b23e1b66a8fd156440187aafba605bb7342c267207e5aa628256e96432ebd4583a6a9436e1969a33636111d2bd8d57185a01e2d502 SHA512 fc23034c512f686167203e827ff2a8f7cb64530211ce92a28793bd49577ce3bf519ffbe910b0071cb21925898497cb5cbf70121c68bfcdbfa4460c63a14203ac

diff --git a/net-firewall/nftables/nftables-1.1.1.ebuild b/net-firewall/nftables/nftables-1.1.1.ebuild
new file mode 100644
index 000000000000..ecfd85b0e138
--- /dev/null
+++ b/net-firewall/nftables/nftables-1.1.1.ebuild
@@ -0,0 +1,228 @@
+# Copyright 1999-2024 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=8
+
+DISTUTILS_OPTIONAL=1
+DISTUTILS_USE_PEP517=setuptools
+PYTHON_COMPAT=( python3_{10..13} )
+VERIFY_SIG_OPENPGP_KEY_PATH=/usr/share/openpgp-keys/netfilter.org.asc
+inherit edo linux-info distutils-r1 systemd verify-sig
+
+DESCRIPTION="Linux kernel firewall, NAT and packet mangling tools"
+HOMEPAGE="https://netfilter.org/projects/nftables/"
+
+if [[ ${PV} =~ ^[9]{4,}$ ]]; then
+	inherit autotools git-r3
+	EGIT_REPO_URI="https://git.netfilter.org/${PN}"
+	BDEPEND="app-alternatives/yacc"
+else
+	SRC_URI="
+		https://netfilter.org/projects/nftables/files/${P}.tar.xz
+		verify-sig? ( https://netfilter.org/projects/nftables/files/${P}.tar.xz.sig )
+	"
+	KEYWORDS="~amd64 ~arm ~arm64 ~hppa ~loong ~mips ~ppc ~ppc64 ~riscv ~sparc ~x86"
+	BDEPEND="verify-sig? ( sec-keys/openpgp-keys-netfilter )"
+fi
+
+# See COPYING: new code is GPL-2+, existing code is GPL-2
+LICENSE="GPL-2 GPL-2+"
+SLOT="0/1"
+IUSE="debug doc +gmp json libedit python +readline static-libs test xtables"
+RESTRICT="!test? ( test )"
+
+RDEPEND="
+	>=net-libs/libmnl-1.0.4:=
+	>=net-libs/libnftnl-1.2.8:=
+	gmp? ( dev-libs/gmp:= )
+	json? ( dev-libs/jansson:= )
+	python? ( ${PYTHON_DEPS} )
+	readline? ( sys-libs/readline:= )
+	xtables? ( >=net-firewall/iptables-1.6.1:= )
+"
+DEPEND="${RDEPEND}"
+BDEPEND+="
+	app-alternatives/lex
+	virtual/pkgconfig
+	doc? (
+		app-text/asciidoc
+		>=app-text/docbook2X-0.8.8-r4
+	)
+	python? ( ${DISTUTILS_DEPS} )
+"
+
+REQUIRED_USE="
+	python? ( ${PYTHON_REQUIRED_USE} )
+	libedit? ( !readline )
+"
+
+src_prepare() {
+	default
+
+	if [[ ${PV} =~ ^[9]{4,}$ ]] ; then
+		eautoreconf
+	fi
+
+	if use python; then
+		pushd py >/dev/null || die
+		distutils-r1_src_prepare
+		popd >/dev/null || die
+	fi
+}
+
+src_configure() {
+	local myeconfargs=(
+		--sbindir="${EPREFIX}"/sbin
+		$(use_enable debug)
+		$(use_enable doc man-doc)
+		$(use_with !gmp mini_gmp)
+		$(use_with json)
+		$(use_with libedit cli editline)
+		$(use_with readline cli readline)
+		$(use_enable static-libs static)
+		$(use_with xtables)
+	)
+
+	econf "${myeconfargs[@]}"
+
+	if use python; then
+		pushd py >/dev/null || die
+		distutils-r1_src_configure
+		popd >/dev/null || die
+	fi
+}
+
+src_compile() {
+	default
+
+	if use python; then
+		pushd py >/dev/null || die
+		distutils-r1_src_compile
+		popd >/dev/null || die
+	fi
+}
+
+src_test() {
+	emake check
+
+	if [[ ${EUID} == 0 ]]; then
+		edo tests/shell/run-tests.sh -v
+	else
+		ewarn "Skipping shell tests (requires root)"
+	fi
+
+	if use python; then
+		pushd tests/py >/dev/null || die
+		distutils-r1_src_test
+		popd >/dev/null || die
+	fi
+}
+
+python_test() {
+	if [[ ${EUID} == 0 ]]; then
+		edo "${EPYTHON}" nft-test.py
+	else
+		ewarn "Skipping Python tests (requires root)"
+	fi
+}
+
+src_install() {
+	default
+
+	if ! use doc && [[ ! ${PV} =~ ^[9]{4,}$ ]]; then
+		pushd doc >/dev/null || die
+		doman *.?
+		popd >/dev/null || die
+	fi
+
+	# Do it here instead of in src_prepare to avoid eautoreconf
+	# rmdir lets us catch if more files end up installed in /etc/nftables
+	dodir /usr/share/doc/${PF}/skels/
+	mv "${ED}"/etc/nftables/osf "${ED}"/usr/share/doc/${PF}/skels/osf || die
+	rmdir "${ED}"/etc/nftables || die
+
+	exeinto /usr/libexec/${PN}
+	newexe "${FILESDIR}"/libexec/${PN}-mk.sh ${PN}.sh
+	newconfd "${FILESDIR}"/${PN}-mk.confd ${PN}
+	newinitd "${FILESDIR}"/${PN}-mk.init-r1 ${PN}
+	keepdir /var/lib/nftables
+
+	systemd_dounit "${FILESDIR}"/systemd/${PN}-restore.service
+
+	if use python ; then
+		pushd py >/dev/null || die
+		distutils-r1_src_install
+		popd >/dev/null || die
+	fi
+
+	find "${ED}" -type f -name "*.la" -delete || die
+}
+
+pkg_preinst() {
+	local stderr
+
+	# There's a history of regressions with nftables upgrades. Perform a
+	# safety check to help us spot them earlier. For the check to pass, the
+	# currently loaded ruleset, if any, must be successfully evaluated by
+	# the newly built instance of nft(8).
+	if [[ -n ${ROOT} ]] || [[ ! -d /sys/module/nftables ]] || [[ ! -x /sbin/nft ]]; then
+		# Either nftables isn't yet in use or nft(8) cannot be executed.
+		return
+	elif ! stderr=$(umask 177; /sbin/nft -t list ruleset 2>&1 >"${T}"/ruleset.nft); then
+		# Report errors induced by trying to list the ruleset but don't
+		# treat them as being fatal.
+		printf '%s\n' "${stderr}" >&2
+	elif [[ ${stderr} == *"is managed by iptables-nft"* ]]; then
+		# Rulesets generated by iptables-nft are special in nature and
+		# will not always be printed in a way that constitutes a valid
+		# syntax for ntf(8). Ignore them.
+		return
+	elif set -- "${ED}"/usr/lib*/libnftables.so;
+		! LD_LIBRARY_PATH=${1%/*} "${ED}"/sbin/nft -c -f -- "${T}"/ruleset.nft
+	then
+		eerror "Your currently loaded ruleset cannot be parsed by the newly built instance of"
+		eerror "nft. This probably means that there is a regression introduced by v${PV}."
+		eerror "(To make the ebuild fail instead of warning, set NFTABLES_ABORT_ON_RELOAD_FAILURE=1.)"
+		if [[ -n ${NFTABLES_ABORT_ON_RELOAD_FAILURE} ]] ; then
+			die "Aborting because of failed nft reload!"
+		fi
+	fi
+}
+
+pkg_postinst() {
+	local save_file
+	save_file="${EROOT}"/var/lib/nftables/rules-save
+
+	# In order for the nftables-restore systemd service to start
+	# the save_file must exist.
+	if [[ ! -f "${save_file}" ]]; then
+		( umask 177; touch "${save_file}" )
+	elif [[ $(( "$( stat --printf '%05a' "${save_file}" )" & 07177 )) -ne 0 ]]; then
+		ewarn "Your system has dangerous permissions for ${save_file}"
+		ewarn "It is probably affected by bug #691326."
+		ewarn "You may need to fix the permissions of the file. To do so,"
+		ewarn "you can run the command in the line below as root."
+		ewarn "    'chmod 600 \"${save_file}\"'"
+	fi
+
+	if has_version 'sys-apps/systemd'; then
+		elog "If you wish to enable the firewall rules on boot (on systemd) you"
+		elog "will need to enable the nftables-restore service."
+		elog "    'systemctl enable ${PN}-restore.service'"
+		elog
+		elog "If you are creating firewall rules before the next system restart"
+		elog "the nftables-restore service must be manually started in order to"
+		elog "save those rules on shutdown."
+	fi
+
+	if has_version 'sys-apps/openrc'; then
+		elog "If you wish to enable the firewall rules on boot (on openrc) you"
+		elog "will need to enable the nftables service."
+		elog "    'rc-update add ${PN} default'"
+		elog
+		elog "If you are creating or updating the firewall rules and wish to save"
+		elog "them to be loaded on the next restart, use the \"save\" functionality"
+		elog "in the init script."
+		elog "    'rc-service ${PN} save'"
+	fi
+}


             reply	other threads:[~2024-10-02 23:12 UTC|newest]

Thread overview: 215+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-10-02 23:12 Patrick McLean [this message]
  -- strict thread matches above, loose matches on Subject: below --
2024-10-09  0:06 [gentoo-commits] repo/gentoo:master commit in: net-firewall/nftables/ Jakov Smolić
2024-10-05 21:47 Jakov Smolić
2024-10-05 11:12 Sam James
2024-10-02 23:12 Patrick McLean
2024-08-26 11:55 Sam James
2024-07-19 16:41 Patrick McLean
2024-07-19 16:41 Patrick McLean
2024-04-13 15:38 Matthew Thode
2023-12-17 19:11 Arthur Zamarin
2023-12-15 13:02 Arthur Zamarin
2023-12-15 10:44 Arthur Zamarin
2023-12-15  7:34 Sam James
2023-12-15  7:27 Sam James
2023-12-15  7:16 Sam James
2023-12-15  7:14 Sam James
2023-10-20  0:51 Sam James
2023-08-20 18:10 Arthur Zamarin
2023-08-20 17:37 Arthur Zamarin
2023-08-20 13:16 Sam James
2023-08-20 13:11 Sam James
2023-08-20 13:11 Sam James
2023-08-20 11:27 Sam James
2023-08-20  8:29 Sam James
2023-08-20  8:29 Sam James
2023-07-16  5:25 Sam James
2023-07-15 13:23 Sam James
2023-07-15 13:18 Sam James
2023-05-01 13:36 Sam James
2023-04-29  8:48 Sam James
2023-04-29  8:48 Sam James
2023-04-24 12:38 Jakov Smolić
2023-04-24  8:25 Arthur Zamarin
2023-04-24  8:25 Arthur Zamarin
2023-04-23 22:59 Sam James
2023-04-23 22:59 Sam James
2023-04-23 22:59 Sam James
2023-03-22  4:06 Sam James
2023-03-19 22:22 Sam James
2023-03-19 22:22 Sam James
2023-03-15  2:42 Sam James
2023-03-10  3:53 Sam James
2023-03-10  3:53 Sam James
2023-03-04 11:56 Arthur Zamarin
2023-03-04  9:55 Arthur Zamarin
2023-03-04  7:42 Arthur Zamarin
2023-03-04  7:04 Arthur Zamarin
2023-03-04  6:14 Arthur Zamarin
2023-03-04  5:49 Arthur Zamarin
2023-03-04  5:47 Arthur Zamarin
2023-03-04  5:38 Arthur Zamarin
2022-12-21 23:52 Sam James
2022-11-19  4:50 WANG Xuerui
2022-10-11 18:26 Sam James
2022-10-11 17:15 Arthur Zamarin
2022-10-11  9:19 Agostino Sarubbo
2022-10-11  9:19 Agostino Sarubbo
2022-10-11  6:46 Agostino Sarubbo
2022-10-10 23:36 Sam James
2022-10-10 23:36 Sam James
2022-10-10 22:35 Sam James
2022-09-16 18:01 Arthur Zamarin
2022-09-16 17:45 Arthur Zamarin
2022-09-15 19:58 Arthur Zamarin
2022-09-13 17:34 Mike Gilbert
2022-09-08 11:35 Agostino Sarubbo
2022-09-08 11:24 Agostino Sarubbo
2022-09-08  7:26 Agostino Sarubbo
2022-09-07 13:16 Agostino Sarubbo
2022-09-07 13:15 Agostino Sarubbo
2022-08-10  1:16 Patrick McLean
2022-08-10  1:16 Patrick McLean
2022-06-17 18:44 Sam James
2022-06-17 16:18 Mike Gilbert
2022-06-07 20:31 Patrick McLean
2022-06-05  9:20 Sam James
2022-05-31 22:25 Patrick McLean
2022-05-22 11:27 Jakov Smolić
2022-05-22  6:22 Agostino Sarubbo
2022-05-22  6:19 Agostino Sarubbo
2022-05-22  6:17 Agostino Sarubbo
2022-05-22  3:53 Sam James
2022-05-22  3:25 Sam James
2022-05-22  3:21 Sam James
2022-05-22  3:20 Sam James
2022-04-17 17:12 Sam James
2022-03-27  2:58 Sam James
2022-03-27  2:58 Sam James
2022-03-27  2:58 Sam James
2022-02-13 14:58 Sam James
2022-02-10 11:50 Sam James
2022-02-10 11:43 Sam James
2022-02-10 11:43 Sam James
2022-02-10 10:17 Sam James
2022-02-10 10:17 Sam James
2022-02-10 10:12 Sam James
2022-02-10  9:59 Sam James
2022-02-10  9:50 Sam James
2022-02-01  6:56 Sam James
2022-01-31 19:00 Patrick McLean
2022-01-31 19:00 Patrick McLean
2021-11-19 18:18 Patrick McLean
2021-10-28 14:03 Agostino Sarubbo
2021-10-28 14:00 Agostino Sarubbo
2021-10-28  7:27 Sam James
2021-10-28  7:27 Sam James
2021-10-28  7:27 Sam James
2021-10-28  6:43 Agostino Sarubbo
2021-10-28  6:22 Sam James
2021-09-08 23:47 Joshua Kinard
2021-08-23 18:43 Patrick McLean
2021-08-23 18:43 Patrick McLean
2021-08-20 23:51 Sam James
2021-08-11 23:10 Sam James
2021-08-11  0:24 Sam James
2021-08-11  0:02 Sam James
2021-06-21 20:42 Marek Szuba
2021-05-27 16:57 Patrick McLean
2021-05-27  1:25 Patrick McLean
2021-05-09  6:01 Sam James
2021-05-09  1:29 Sam James
2021-05-08 18:58 Sam James
2021-05-08 18:49 Sam James
2021-05-08 18:44 Sam James
2021-05-08 18:41 Sam James
2021-04-27 18:02 Sam James
2021-04-27 18:01 Sam James
2021-03-06 23:10 Sam James
2021-02-28 12:22 Sergei Trofimovich
2021-02-28 12:22 Sergei Trofimovich
2021-01-16 23:36 Lars Wendler
2021-01-05 18:18 Patrick McLean
2020-11-08  3:02 Patrick McLean
2020-10-31 15:35 Matt Turner
2020-10-27 17:58 Patrick McLean
2020-08-29 17:57 Thomas Deutschmann
2020-08-25 13:13 Sam James
2020-08-25 12:53 Agostino Sarubbo
2020-08-23 20:47 Sam James
2020-08-20 13:20 Sam James
2020-07-23  2:06 Patrick McLean
2020-06-27 20:37 Patrick McLean
2020-06-27 20:37 Patrick McLean
2020-06-16  2:20 Patrick McLean
2020-06-07 18:17 Patrick McLean
2020-06-07 12:10 Lars Wendler
2020-06-07  0:18 Patrick McLean
2020-04-13 18:48 Patrick McLean
2020-04-07  6:56 Patrick McLean
2020-04-02  7:47 Lars Wendler
2020-02-26 19:23 Patrick McLean
2020-01-27 12:06 Mikle Kolyada
2020-01-15 23:52 Sergei Trofimovich
2020-01-10 12:16 Agostino Sarubbo
2020-01-10  1:26 Thomas Deutschmann
2019-12-28 21:32 Georgy Yakovlev
2019-12-05  2:19 Matthew Thode
2019-12-05  2:19 Matthew Thode
2019-12-03 16:52 Matthew Thode
2019-12-03 16:10 Matthew Thode
2019-12-03 16:10 Matthew Thode
2019-12-03  7:19 Lars Wendler
2019-12-02 18:52 Matthew Thode
2019-12-02 18:52 Matthew Thode
2019-09-13 18:47 Mikle Kolyada
2019-09-13 17:27 Agostino Sarubbo
2019-09-09  6:54 Agostino Sarubbo
2019-09-08 19:15 Thomas Deutschmann
2019-08-27  7:35 Matt Turner
2019-08-23 17:02 Lars Wendler
2019-07-29  1:52 Matt Turner
2019-07-28 19:58 Mikle Kolyada
2019-07-02 12:35 Agostino Sarubbo
2019-07-02 11:55 Agostino Sarubbo
2019-07-02 10:33 Agostino Sarubbo
2019-06-30  1:57 Matthew Thode
2019-06-28 16:30 Lars Wendler
2019-06-28 15:47 Lars Wendler
2019-06-28 11:49 Lars Wendler
2019-05-21 16:39 Stephen Klimaszewski
2019-04-08 20:21 Aaron Bauman
2019-01-28 15:24 Matthew Thode
2018-11-19 21:44 Matthew Thode
2018-11-19 18:35 Matthew Thode
2018-06-11 11:42 Lars Wendler
2018-06-11 11:42 Lars Wendler
2018-05-10 18:58 Lars Wendler
2018-05-02 13:57 Lars Wendler
2018-05-02 13:57 Lars Wendler
2018-03-07  9:13 Lars Wendler
2018-03-07  9:13 Lars Wendler
2018-02-03 22:58 Thomas Deutschmann
2018-01-20 18:58 Lars Wendler
2018-01-18 14:21 Lars Wendler
2018-01-10  6:19 Markus Meier
2018-01-04 20:40 Mikle Kolyada
2017-12-25  9:28 Sergei Trofimovich
2017-12-19 15:46 Thomas Deutschmann
2017-10-25 13:33 Matt Thode
2017-10-18  6:11 Sergei Trofimovich
2017-10-18  5:33 Sergei Trofimovich
2017-10-17 14:12 Lars Wendler
2017-08-02 21:01 Matt Thode
2017-07-23 12:16 Manuel Rüger
2017-04-08  7:27 Michał Górny
2017-01-07 21:46 Robin H. Johnson
2017-01-07 21:46 Robin H. Johnson
2016-06-16  1:03 Göktürk Yüksek
2016-06-15 15:48 Göktürk Yüksek
2015-12-26 13:34 Manuel Rüger
2015-11-03  8:42 Ian Delaney
2015-10-16  3:41 Ian Delaney
2015-10-10 21:21 Mike Frysinger
2015-10-06 13:27 Manuel Rüger
2015-09-19 21:46 Manuel Rüger

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1727910717.31678d15acc7ea08b8154bbac2662b7dc82fe279.chutzpah@gentoo \
    --to=chutzpah@gentoo.org \
    --cc=gentoo-commits@lists.gentoo.org \
    --cc=gentoo-dev@lists.gentoo.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox