[arch-commits] Commit in nftables/repos (16 files)
Sébastien Luttringer
seblu at archlinux.org
Thu Aug 21 14:54:27 UTC 2014
Date: Thursday, August 21, 2014 @ 16:54:27
Author: seblu
Revision: 220506
archrelease: copy trunk to testing-i686, testing-x86_64
Added:
nftables/repos/testing-i686/PKGBUILD
(from rev 220505, nftables/trunk/PKGBUILD)
nftables/repos/testing-i686/nftables-flush
(from rev 220505, nftables/trunk/nftables-flush)
nftables/repos/testing-i686/nftables.conf
(from rev 220505, nftables/trunk/nftables.conf)
nftables/repos/testing-i686/nftables.service
(from rev 220505, nftables/trunk/nftables.service)
nftables/repos/testing-x86_64/PKGBUILD
(from rev 220505, nftables/trunk/PKGBUILD)
nftables/repos/testing-x86_64/nftables-flush
(from rev 220505, nftables/trunk/nftables-flush)
nftables/repos/testing-x86_64/nftables.conf
(from rev 220505, nftables/trunk/nftables.conf)
nftables/repos/testing-x86_64/nftables.service
(from rev 220505, nftables/trunk/nftables.service)
Deleted:
nftables/repos/testing-i686/PKGBUILD
nftables/repos/testing-i686/nftables-flush
nftables/repos/testing-i686/nftables.conf
nftables/repos/testing-i686/nftables.service
nftables/repos/testing-x86_64/PKGBUILD
nftables/repos/testing-x86_64/nftables-flush
nftables/repos/testing-x86_64/nftables.conf
nftables/repos/testing-x86_64/nftables.service
---------------------------------+
/PKGBUILD | 92 ++++++++++++++++++++++++++++++++++++++
/nftables-flush | 64 ++++++++++++++++++++++++++
/nftables.conf | 76 +++++++++++++++++++++++++++++++
/nftables.service | 28 +++++++++++
testing-i686/PKGBUILD | 46 -------------------
testing-i686/nftables-flush | 32 -------------
testing-i686/nftables.conf | 38 ---------------
testing-i686/nftables.service | 12 ----
testing-x86_64/PKGBUILD | 46 -------------------
testing-x86_64/nftables-flush | 32 -------------
testing-x86_64/nftables.conf | 38 ---------------
testing-x86_64/nftables.service | 12 ----
12 files changed, 260 insertions(+), 256 deletions(-)
Deleted: testing-i686/PKGBUILD
===================================================================
--- testing-i686/PKGBUILD 2014-08-21 14:54:02 UTC (rev 220505)
+++ testing-i686/PKGBUILD 2014-08-21 14:54:27 UTC (rev 220506)
@@ -1,46 +0,0 @@
-# $Id$
-# Maintainer: Sébastien "Seblu" Luttringer <seblu at archlinux.org>
-
-pkgname=nftables
-epoch=1
-pkgver=0.3
-pkgrel=2
-pkgdesc='Netfilter tables userspace tools'
-arch=('i686' 'x86_64')
-url='http://netfilter.org/projects/nftables/'
-license=('GPL2')
-depends=('libmnl' 'libnftnl' 'gmp' 'readline' 'ncurses')
-makedepends=('docbook2x')
-backup=('etc/nftables.conf')
-source=("http://netfilter.org/projects/nftables/files/nftables-$pkgver.tar.bz2"{,.sig}
- 'nftables.conf'
- 'nftables.service'
- 'nftables-flush')
-sha1sums=('4b097c23f38575347cec21835ee0e6ef89c57455'
- 'SKIP'
- '041027cc0c217a5efa6b513a75736e28ab6db076'
- 'a9021dd71f55f985a146f26a8ec66d4e15949978'
- 'e04e980a79159acb5e7c27b23c39323b8c415e3f')
-
-build() {
- cd $pkgname-$pkgver
- ./configure \
- --prefix=/usr \
- --sbindir=/usr/bin \
- --sysconfdir=/usr/share \
- CONFIG_MAN=y DB2MAN=docbook2man
- make
-}
-
-package() {
- pushd $pkgname-$pkgver
- make DESTDIR="$pkgdir" install
- popd
- # basic safe firewall config
- install -Dm644 nftables.conf "$pkgdir/etc/nftables.conf"
- # systemd
- install -Dm644 nftables.service "$pkgdir/usr/lib/systemd/system/nftables.service"
- install -Dm755 nftables-flush "$pkgdir/usr/lib/systemd/scripts/nftables-flush"
-}
-
-# vim:set ts=2 sw=2 et:
Copied: nftables/repos/testing-i686/PKGBUILD (from rev 220505, nftables/trunk/PKGBUILD)
===================================================================
--- testing-i686/PKGBUILD (rev 0)
+++ testing-i686/PKGBUILD 2014-08-21 14:54:27 UTC (rev 220506)
@@ -0,0 +1,46 @@
+# $Id$
+# Maintainer: Sébastien "Seblu" Luttringer <seblu at archlinux.org>
+
+pkgname=nftables
+epoch=1
+pkgver=0.3
+pkgrel=3
+pkgdesc='Netfilter tables userspace tools'
+arch=('i686' 'x86_64')
+url='http://netfilter.org/projects/nftables/'
+license=('GPL2')
+depends=('libmnl' 'libnftnl' 'gmp' 'readline' 'ncurses')
+makedepends=('docbook2x')
+backup=('etc/nftables.conf')
+source=("http://netfilter.org/projects/nftables/files/nftables-$pkgver.tar.bz2"{,.sig}
+ 'nftables.conf'
+ 'nftables.service'
+ 'nftables-flush')
+sha1sums=('4b097c23f38575347cec21835ee0e6ef89c57455'
+ 'SKIP'
+ '041027cc0c217a5efa6b513a75736e28ab6db076'
+ 'a5c1cd98534c3758db1e773ad2a134649a6ac8ac'
+ 'e04e980a79159acb5e7c27b23c39323b8c415e3f')
+
+build() {
+ cd $pkgname-$pkgver
+ ./configure \
+ --prefix=/usr \
+ --sbindir=/usr/bin \
+ --sysconfdir=/usr/share \
+ CONFIG_MAN=y DB2MAN=docbook2man
+ make
+}
+
+package() {
+ pushd $pkgname-$pkgver
+ make DESTDIR="$pkgdir" install
+ popd
+ # basic safe firewall config
+ install -Dm644 nftables.conf "$pkgdir/etc/nftables.conf"
+ # systemd
+ install -Dm644 nftables.service "$pkgdir/usr/lib/systemd/system/nftables.service"
+ install -Dm755 nftables-flush "$pkgdir/usr/lib/systemd/scripts/nftables-flush"
+}
+
+# vim:set ts=2 sw=2 et:
Deleted: testing-i686/nftables-flush
===================================================================
--- testing-i686/nftables-flush 2014-08-21 14:54:02 UTC (rev 220505)
+++ testing-i686/nftables-flush 2014-08-21 14:54:27 UTC (rev 220506)
@@ -1,32 +0,0 @@
-#!/bin/bash
-
-# Copyright © Sébastien Luttringer
-#
-# This program is free software; you can redistribute it and/or
-# modify it under the terms of the GNU General Public License
-# as published by the Free Software Foundation; either version 2
-# of the License, or (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program; if not, write to the Free Software
-# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
-
-PROTOS=(ip ip6 inet arp bridge)
-
-for proto in "${PROTOS[@]}"; do
- nft list tables "$proto"|cut -f 2 -d ' '| while read table; do
- nft flush table "$proto" "$table"
- # flush remove rules and not chain (despite man page). do it manually.
- nft list table "$proto" filter|awk '/^[ \t]+chain/{ print $2 }'|while read chain; do
- nft delete chain "$proto" "$table" "$chain"
- done
- nft delete table "$proto" "$table"
- done
-done
-
-# vim:set ts=2 sw=2 et:
Copied: nftables/repos/testing-i686/nftables-flush (from rev 220505, nftables/trunk/nftables-flush)
===================================================================
--- testing-i686/nftables-flush (rev 0)
+++ testing-i686/nftables-flush 2014-08-21 14:54:27 UTC (rev 220506)
@@ -0,0 +1,32 @@
+#!/bin/bash
+
+# Copyright © Sébastien Luttringer
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License
+# as published by the Free Software Foundation; either version 2
+# of the License, or (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+
+PROTOS=(ip ip6 inet arp bridge)
+
+for proto in "${PROTOS[@]}"; do
+ nft list tables "$proto"|cut -f 2 -d ' '| while read table; do
+ nft flush table "$proto" "$table"
+ # flush remove rules and not chain (despite man page). do it manually.
+ nft list table "$proto" filter|awk '/^[ \t]+chain/{ print $2 }'|while read chain; do
+ nft delete chain "$proto" "$table" "$chain"
+ done
+ nft delete table "$proto" "$table"
+ done
+done
+
+# vim:set ts=2 sw=2 et:
Deleted: testing-i686/nftables.conf
===================================================================
--- testing-i686/nftables.conf 2014-08-21 14:54:02 UTC (rev 220505)
+++ testing-i686/nftables.conf 2014-08-21 14:54:27 UTC (rev 220506)
@@ -1,38 +0,0 @@
-#!/usr/bin/nft -f
-# ipv4/ipv6 Simple & Safe Firewall
-# you can find examples in /usr/share/nftables/
-
-table inet filter {
- chain input {
- type filter hook input priority 0;
-
- # allow established/related connections
- ct state {established, related} accept
-
- # early drop of invalid connections
- ct state invalid drop
-
- # allow from loopback
- iifname lo accept
-
- # allow icmp
- ip protocol icmp accept
- ip6 nexthdr icmpv6 accept
-
- # allow ssh
- tcp dport ssh accept
-
- # everything else
- reject
- }
- chain forward {
- type filter hook forward priority 0;
- drop
- }
- chain output {
- type filter hook output priority 0;
- }
-
-}
-
-# vim:set ts=2 sw=2 et:
Copied: nftables/repos/testing-i686/nftables.conf (from rev 220505, nftables/trunk/nftables.conf)
===================================================================
--- testing-i686/nftables.conf (rev 0)
+++ testing-i686/nftables.conf 2014-08-21 14:54:27 UTC (rev 220506)
@@ -0,0 +1,38 @@
+#!/usr/bin/nft -f
+# ipv4/ipv6 Simple & Safe Firewall
+# you can find examples in /usr/share/nftables/
+
+table inet filter {
+ chain input {
+ type filter hook input priority 0;
+
+ # allow established/related connections
+ ct state {established, related} accept
+
+ # early drop of invalid connections
+ ct state invalid drop
+
+ # allow from loopback
+ iifname lo accept
+
+ # allow icmp
+ ip protocol icmp accept
+ ip6 nexthdr icmpv6 accept
+
+ # allow ssh
+ tcp dport ssh accept
+
+ # everything else
+ reject
+ }
+ chain forward {
+ type filter hook forward priority 0;
+ drop
+ }
+ chain output {
+ type filter hook output priority 0;
+ }
+
+}
+
+# vim:set ts=2 sw=2 et:
Deleted: testing-i686/nftables.service
===================================================================
--- testing-i686/nftables.service 2014-08-21 14:54:02 UTC (rev 220505)
+++ testing-i686/nftables.service 2014-08-21 14:54:27 UTC (rev 220506)
@@ -1,12 +0,0 @@
-[Unit]
-Description=Netfilter Tables
-Documentation=man:nft(8)
-
-[Service]
-Type=oneshot
-ExecStart=/usr/bin/nft -f /etc/nftables.conf
-ExecStop=/usr/lib/systemd/scripts/nftables-flush
-RemainAfterExit=yes
-
-[Install]
-WantedBy=multi-user.target
Copied: nftables/repos/testing-i686/nftables.service (from rev 220505, nftables/trunk/nftables.service)
===================================================================
--- testing-i686/nftables.service (rev 0)
+++ testing-i686/nftables.service 2014-08-21 14:54:27 UTC (rev 220506)
@@ -0,0 +1,14 @@
+[Unit]
+Description=Netfilter Tables
+Documentation=man:nft(8)
+Wants=network-pre.target
+Before=network-pre.target
+
+[Service]
+Type=oneshot
+ExecStart=/usr/bin/nft -f /etc/nftables.conf
+ExecStop=/usr/lib/systemd/scripts/nftables-flush
+RemainAfterExit=yes
+
+[Install]
+WantedBy=multi-user.target
Deleted: testing-x86_64/PKGBUILD
===================================================================
--- testing-x86_64/PKGBUILD 2014-08-21 14:54:02 UTC (rev 220505)
+++ testing-x86_64/PKGBUILD 2014-08-21 14:54:27 UTC (rev 220506)
@@ -1,46 +0,0 @@
-# $Id$
-# Maintainer: Sébastien "Seblu" Luttringer <seblu at archlinux.org>
-
-pkgname=nftables
-epoch=1
-pkgver=0.3
-pkgrel=2
-pkgdesc='Netfilter tables userspace tools'
-arch=('i686' 'x86_64')
-url='http://netfilter.org/projects/nftables/'
-license=('GPL2')
-depends=('libmnl' 'libnftnl' 'gmp' 'readline' 'ncurses')
-makedepends=('docbook2x')
-backup=('etc/nftables.conf')
-source=("http://netfilter.org/projects/nftables/files/nftables-$pkgver.tar.bz2"{,.sig}
- 'nftables.conf'
- 'nftables.service'
- 'nftables-flush')
-sha1sums=('4b097c23f38575347cec21835ee0e6ef89c57455'
- 'SKIP'
- '041027cc0c217a5efa6b513a75736e28ab6db076'
- 'a9021dd71f55f985a146f26a8ec66d4e15949978'
- 'e04e980a79159acb5e7c27b23c39323b8c415e3f')
-
-build() {
- cd $pkgname-$pkgver
- ./configure \
- --prefix=/usr \
- --sbindir=/usr/bin \
- --sysconfdir=/usr/share \
- CONFIG_MAN=y DB2MAN=docbook2man
- make
-}
-
-package() {
- pushd $pkgname-$pkgver
- make DESTDIR="$pkgdir" install
- popd
- # basic safe firewall config
- install -Dm644 nftables.conf "$pkgdir/etc/nftables.conf"
- # systemd
- install -Dm644 nftables.service "$pkgdir/usr/lib/systemd/system/nftables.service"
- install -Dm755 nftables-flush "$pkgdir/usr/lib/systemd/scripts/nftables-flush"
-}
-
-# vim:set ts=2 sw=2 et:
Copied: nftables/repos/testing-x86_64/PKGBUILD (from rev 220505, nftables/trunk/PKGBUILD)
===================================================================
--- testing-x86_64/PKGBUILD (rev 0)
+++ testing-x86_64/PKGBUILD 2014-08-21 14:54:27 UTC (rev 220506)
@@ -0,0 +1,46 @@
+# $Id$
+# Maintainer: Sébastien "Seblu" Luttringer <seblu at archlinux.org>
+
+pkgname=nftables
+epoch=1
+pkgver=0.3
+pkgrel=3
+pkgdesc='Netfilter tables userspace tools'
+arch=('i686' 'x86_64')
+url='http://netfilter.org/projects/nftables/'
+license=('GPL2')
+depends=('libmnl' 'libnftnl' 'gmp' 'readline' 'ncurses')
+makedepends=('docbook2x')
+backup=('etc/nftables.conf')
+source=("http://netfilter.org/projects/nftables/files/nftables-$pkgver.tar.bz2"{,.sig}
+ 'nftables.conf'
+ 'nftables.service'
+ 'nftables-flush')
+sha1sums=('4b097c23f38575347cec21835ee0e6ef89c57455'
+ 'SKIP'
+ '041027cc0c217a5efa6b513a75736e28ab6db076'
+ 'a5c1cd98534c3758db1e773ad2a134649a6ac8ac'
+ 'e04e980a79159acb5e7c27b23c39323b8c415e3f')
+
+build() {
+ cd $pkgname-$pkgver
+ ./configure \
+ --prefix=/usr \
+ --sbindir=/usr/bin \
+ --sysconfdir=/usr/share \
+ CONFIG_MAN=y DB2MAN=docbook2man
+ make
+}
+
+package() {
+ pushd $pkgname-$pkgver
+ make DESTDIR="$pkgdir" install
+ popd
+ # basic safe firewall config
+ install -Dm644 nftables.conf "$pkgdir/etc/nftables.conf"
+ # systemd
+ install -Dm644 nftables.service "$pkgdir/usr/lib/systemd/system/nftables.service"
+ install -Dm755 nftables-flush "$pkgdir/usr/lib/systemd/scripts/nftables-flush"
+}
+
+# vim:set ts=2 sw=2 et:
Deleted: testing-x86_64/nftables-flush
===================================================================
--- testing-x86_64/nftables-flush 2014-08-21 14:54:02 UTC (rev 220505)
+++ testing-x86_64/nftables-flush 2014-08-21 14:54:27 UTC (rev 220506)
@@ -1,32 +0,0 @@
-#!/bin/bash
-
-# Copyright © Sébastien Luttringer
-#
-# This program is free software; you can redistribute it and/or
-# modify it under the terms of the GNU General Public License
-# as published by the Free Software Foundation; either version 2
-# of the License, or (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program; if not, write to the Free Software
-# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
-
-PROTOS=(ip ip6 inet arp bridge)
-
-for proto in "${PROTOS[@]}"; do
- nft list tables "$proto"|cut -f 2 -d ' '| while read table; do
- nft flush table "$proto" "$table"
- # flush remove rules and not chain (despite man page). do it manually.
- nft list table "$proto" filter|awk '/^[ \t]+chain/{ print $2 }'|while read chain; do
- nft delete chain "$proto" "$table" "$chain"
- done
- nft delete table "$proto" "$table"
- done
-done
-
-# vim:set ts=2 sw=2 et:
Copied: nftables/repos/testing-x86_64/nftables-flush (from rev 220505, nftables/trunk/nftables-flush)
===================================================================
--- testing-x86_64/nftables-flush (rev 0)
+++ testing-x86_64/nftables-flush 2014-08-21 14:54:27 UTC (rev 220506)
@@ -0,0 +1,32 @@
+#!/bin/bash
+
+# Copyright © Sébastien Luttringer
+#
+# This program is free software; you can redistribute it and/or
+# modify it under the terms of the GNU General Public License
+# as published by the Free Software Foundation; either version 2
+# of the License, or (at your option) any later version.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, write to the Free Software
+# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
+
+PROTOS=(ip ip6 inet arp bridge)
+
+for proto in "${PROTOS[@]}"; do
+ nft list tables "$proto"|cut -f 2 -d ' '| while read table; do
+ nft flush table "$proto" "$table"
+ # flush remove rules and not chain (despite man page). do it manually.
+ nft list table "$proto" filter|awk '/^[ \t]+chain/{ print $2 }'|while read chain; do
+ nft delete chain "$proto" "$table" "$chain"
+ done
+ nft delete table "$proto" "$table"
+ done
+done
+
+# vim:set ts=2 sw=2 et:
Deleted: testing-x86_64/nftables.conf
===================================================================
--- testing-x86_64/nftables.conf 2014-08-21 14:54:02 UTC (rev 220505)
+++ testing-x86_64/nftables.conf 2014-08-21 14:54:27 UTC (rev 220506)
@@ -1,38 +0,0 @@
-#!/usr/bin/nft -f
-# ipv4/ipv6 Simple & Safe Firewall
-# you can find examples in /usr/share/nftables/
-
-table inet filter {
- chain input {
- type filter hook input priority 0;
-
- # allow established/related connections
- ct state {established, related} accept
-
- # early drop of invalid connections
- ct state invalid drop
-
- # allow from loopback
- iifname lo accept
-
- # allow icmp
- ip protocol icmp accept
- ip6 nexthdr icmpv6 accept
-
- # allow ssh
- tcp dport ssh accept
-
- # everything else
- reject
- }
- chain forward {
- type filter hook forward priority 0;
- drop
- }
- chain output {
- type filter hook output priority 0;
- }
-
-}
-
-# vim:set ts=2 sw=2 et:
Copied: nftables/repos/testing-x86_64/nftables.conf (from rev 220505, nftables/trunk/nftables.conf)
===================================================================
--- testing-x86_64/nftables.conf (rev 0)
+++ testing-x86_64/nftables.conf 2014-08-21 14:54:27 UTC (rev 220506)
@@ -0,0 +1,38 @@
+#!/usr/bin/nft -f
+# ipv4/ipv6 Simple & Safe Firewall
+# you can find examples in /usr/share/nftables/
+
+table inet filter {
+ chain input {
+ type filter hook input priority 0;
+
+ # allow established/related connections
+ ct state {established, related} accept
+
+ # early drop of invalid connections
+ ct state invalid drop
+
+ # allow from loopback
+ iifname lo accept
+
+ # allow icmp
+ ip protocol icmp accept
+ ip6 nexthdr icmpv6 accept
+
+ # allow ssh
+ tcp dport ssh accept
+
+ # everything else
+ reject
+ }
+ chain forward {
+ type filter hook forward priority 0;
+ drop
+ }
+ chain output {
+ type filter hook output priority 0;
+ }
+
+}
+
+# vim:set ts=2 sw=2 et:
Deleted: testing-x86_64/nftables.service
===================================================================
--- testing-x86_64/nftables.service 2014-08-21 14:54:02 UTC (rev 220505)
+++ testing-x86_64/nftables.service 2014-08-21 14:54:27 UTC (rev 220506)
@@ -1,12 +0,0 @@
-[Unit]
-Description=Netfilter Tables
-Documentation=man:nft(8)
-
-[Service]
-Type=oneshot
-ExecStart=/usr/bin/nft -f /etc/nftables.conf
-ExecStop=/usr/lib/systemd/scripts/nftables-flush
-RemainAfterExit=yes
-
-[Install]
-WantedBy=multi-user.target
Copied: nftables/repos/testing-x86_64/nftables.service (from rev 220505, nftables/trunk/nftables.service)
===================================================================
--- testing-x86_64/nftables.service (rev 0)
+++ testing-x86_64/nftables.service 2014-08-21 14:54:27 UTC (rev 220506)
@@ -0,0 +1,14 @@
+[Unit]
+Description=Netfilter Tables
+Documentation=man:nft(8)
+Wants=network-pre.target
+Before=network-pre.target
+
+[Service]
+Type=oneshot
+ExecStart=/usr/bin/nft -f /etc/nftables.conf
+ExecStop=/usr/lib/systemd/scripts/nftables-flush
+RemainAfterExit=yes
+
+[Install]
+WantedBy=multi-user.target
More information about the arch-commits
mailing list