[arch-commits] Commit in iptables/repos (16 files)

Ronald van Haren ronald at archlinux.org
Tue Sep 11 20:14:14 UTC 2018


    Date: Tuesday, September 11, 2018 @ 20:14:13
  Author: ronald
Revision: 334396

archrelease: copy trunk to testing-x86_64

Added:
  iptables/repos/testing-x86_64/
  iptables/repos/testing-x86_64/PKGBUILD
    (from rev 334395, iptables/trunk/PKGBUILD)
  iptables/repos/testing-x86_64/arptables
    (from rev 334395, iptables/trunk/arptables)
  iptables/repos/testing-x86_64/arptables.service
    (from rev 334395, iptables/trunk/arptables.service)
  iptables/repos/testing-x86_64/ebtables
    (from rev 334395, iptables/trunk/ebtables)
  iptables/repos/testing-x86_64/ebtables.service
    (from rev 334395, iptables/trunk/ebtables.service)
  iptables/repos/testing-x86_64/empty-filter.rules
    (from rev 334395, iptables/trunk/empty-filter.rules)
  iptables/repos/testing-x86_64/empty-mangle.rules
    (from rev 334395, iptables/trunk/empty-mangle.rules)
  iptables/repos/testing-x86_64/empty-nat.rules
    (from rev 334395, iptables/trunk/empty-nat.rules)
  iptables/repos/testing-x86_64/empty-raw.rules
    (from rev 334395, iptables/trunk/empty-raw.rules)
  iptables/repos/testing-x86_64/empty-security.rules
    (from rev 334395, iptables/trunk/empty-security.rules)
  iptables/repos/testing-x86_64/empty.rules
    (from rev 334395, iptables/trunk/empty.rules)
  iptables/repos/testing-x86_64/ip6tables.service
    (from rev 334395, iptables/trunk/ip6tables.service)
  iptables/repos/testing-x86_64/iptables-flush
    (from rev 334395, iptables/trunk/iptables-flush)
  iptables/repos/testing-x86_64/iptables.service
    (from rev 334395, iptables/trunk/iptables.service)
  iptables/repos/testing-x86_64/simple_firewall.rules
    (from rev 334395, iptables/trunk/simple_firewall.rules)

-----------------------+
 PKGBUILD              |   89 ++++++++++++++++++++++++++++++++++++++++++++++++
 arptables             |   21 +++++++++++
 arptables.service     |   13 +++++++
 ebtables              |   21 +++++++++++
 ebtables.service      |   13 +++++++
 empty-filter.rules    |    6 +++
 empty-mangle.rules    |    8 ++++
 empty-nat.rules       |    7 +++
 empty-raw.rules       |    5 ++
 empty-security.rules  |    6 +++
 empty.rules           |    6 +++
 ip6tables.service     |   15 ++++++++
 iptables-flush        |   18 +++++++++
 iptables.service      |   14 +++++++
 simple_firewall.rules |   11 +++++
 15 files changed, 253 insertions(+)

Copied: iptables/repos/testing-x86_64/PKGBUILD (from rev 334395, iptables/trunk/PKGBUILD)
===================================================================
--- testing-x86_64/PKGBUILD	                        (rev 0)
+++ testing-x86_64/PKGBUILD	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,89 @@
+# Maintainer: Ronald van Haren <ronald.archlinux.org>
+# Contributor: Thomas Baechler <thomas at archlinux.org>
+
+pkgname=iptables
+pkgver=1.8.0
+pkgrel=2
+pkgdesc='Linux kernel packet control tool'
+arch=(x86_64)
+license=(GPL2)
+url='http://www.netfilter.org/projects/iptables/index.html'
+depends=(glibc bash libnftnl libpcap)
+makedepends=(linux-api-headers)
+provides=(ebtables arptables)
+conflicts=(ebtables arptables)
+replaces=(ebtables arptables)
+source=(http://www.netfilter.org/projects/iptables/files/${pkgname}-${pkgver}.tar.bz2{,.sig}
+        empty.rules
+        simple_firewall.rules
+        empty-{filter,mangle,nat,raw,security}.rules
+        {iptables,ip6tables,ebtables,arptables}.service
+        iptables-flush arptables ebtables)
+sha1sums=('04924fd00dbaf8189f0777af90f7bdb73ac7e47c'
+          'SKIP'
+          '83b3363878e3660ce23b2ad325b53cbd6c796ecf'
+          'f085a71f467e4d7cb2cf094d9369b0bcc4bab6ec'
+          'd9f9f06b46b4187648e860afa0552335aafe3ce4'
+          'c45b738b5ec4cfb11611b984c21a83b91a2d58f3'
+          '1694d79b3e6e9d9d543f6a6e75fed06066c9a6c6'
+          '7db53bb882f62f6c677cc8559cff83d8bae2ef73'
+          'ebbd1424a1564fd45f455a81c61ce348f0a14c2e'
+          '49be9443fc302dd0fda78b63d64e884cadb61603'
+          '9cec592787e32451f58fa608ea057870e07aa704'
+          '052fe6a802d5c7be015881787ed716819db1ca0a'
+          'f15bd7937a10fbfcc6443f55a25cd566a460ebe7'
+          'e7abda09c61142121b6695928d3b71ccd8fdf73a'
+          '1502ebe011f44e5553d9cbd5023755cd9f3e8c75'
+          '436f8adb727e93e92a07834ba0e93f4364587901')
+validpgpkeys=('C09DB2063F1D7034BA6152ADAB4655A126D292E4') # Netfilter Core Team
+
+prepare() {
+  cd $pkgname-$pkgver
+
+  # use system one
+  rm include/linux/types.h
+}
+
+build() {
+  cd $pkgname-$pkgver
+
+  ./configure --prefix=/usr \
+    --sysconfdir=/etc \
+    --sbindir=/usr/bin \
+    --libexecdir=/usr/lib/iptables \
+    --with-xtlibdir=/usr/lib/iptables \
+    --enable-bpf-compiler \
+    --enable-devel \
+    --enable-shared
+
+  make
+}
+
+package() {
+  cd $pkgname-$pkgver
+  make DESTDIR="$pkgdir" install
+
+  cd "$srcdir"
+  install -Dm644 empty.rules "$pkgdir/etc/iptables/empty.rules"
+  install -Dm644 simple_firewall.rules "$pkgdir/etc/iptables/simple_firewall.rules"
+
+  install -d "$pkgdir"/var/lib/{iptables,ip6tables}
+  install -m644 empty-{filter,mangle,nat,raw,security}.rules "$pkgdir/var/lib/iptables"
+  install -m644 empty-{filter,mangle,nat,raw,security}.rules "$pkgdir/var/lib/ip6tables"
+
+  for unit in iptables ip6tables arptables ebtables; do
+    install -Dm644 ${unit}.service "$pkgdir/usr/lib/systemd/system/${unit}.service"
+  done
+
+  for helper in iptables-flush arptables ebtables; do
+    install -Dm755 $helper \
+      "$pkgdir/usr/lib/systemd/scripts/$helper"
+  done
+
+  # install iptables-apply
+  cd $srcdir/$pkgname-$pkgver
+  install -Dm755 $pkgname/iptables-apply \
+      "$pkgdir/usr/bin/iptables-apply"
+  gzip --to-stdout --best $pkgname/iptables-apply.8 > \
+      "$pkgdir/usr/share/man/man8/iptables-apply.8.gz"
+}

Copied: iptables/repos/testing-x86_64/arptables (from rev 334395, iptables/trunk/arptables)
===================================================================
--- testing-x86_64/arptables	                        (rev 0)
+++ testing-x86_64/arptables	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,21 @@
+#!/bin/bash
+
+CONFIG_FILE='/etc/arptables.conf'
+
+case $1 in
+  start)
+    arptables-restore < "$CONFIG_FILE"
+  ;;
+  stop)
+    arptables-restore < /dev/null
+  ;;
+  save)
+    arptables-save > "$CONFIG_FILE"
+  ;;
+  *)
+    echo "usage: ${0##*/} {start|stop|save}" >&2
+    exit 1
+  ;;
+esac
+
+# vim:set ts=2 sw=2 ft=sh et:

Copied: iptables/repos/testing-x86_64/arptables.service (from rev 334395, iptables/trunk/arptables.service)
===================================================================
--- testing-x86_64/arptables.service	                        (rev 0)
+++ testing-x86_64/arptables.service	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,13 @@
+[Unit]
+Description=ARP Tables
+Before=network-pre.target
+Wants=network-pre.target
+
+[Service]
+Type=oneshot
+RemainAfterExit=yes
+ExecStart=/usr/lib/systemd/scripts/arptables start
+ExecStop=/usr/lib/systemd/scripts/arptables stop
+
+[Install]
+WantedBy=multi-user.target

Copied: iptables/repos/testing-x86_64/ebtables (from rev 334395, iptables/trunk/ebtables)
===================================================================
--- testing-x86_64/ebtables	                        (rev 0)
+++ testing-x86_64/ebtables	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,21 @@
+#!/bin/bash
+
+CONFIG_FILE='/etc/ebtables.conf'
+
+case $1 in
+  start)
+    ebtables-restore < "$CONFIG_FILE"
+  ;;
+  stop)
+    ebtables -F
+  ;;
+  save)
+    ebtables-save > "$CONFIG_FILE"
+  ;;
+  *)
+    echo "usage: ${0##*/} {start|stop|save}" >&2
+    exit 1
+  ;;
+esac
+
+# vim:set ts=2 sw=2 ft=sh et:

Copied: iptables/repos/testing-x86_64/ebtables.service (from rev 334395, iptables/trunk/ebtables.service)
===================================================================
--- testing-x86_64/ebtables.service	                        (rev 0)
+++ testing-x86_64/ebtables.service	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,13 @@
+[Unit]
+Description=Ethernet bridge table
+Before=network-pre.target
+Wants=network-pre.target
+
+[Service]
+Type=oneshot
+RemainAfterExit=yes
+ExecStart=/usr/lib/systemd/scripts/ebtables start
+ExecStop=/usr/lib/systemd/scripts/ebtables stop
+
+[Install]
+WantedBy=multi-user.target

Copied: iptables/repos/testing-x86_64/empty-filter.rules (from rev 334395, iptables/trunk/empty-filter.rules)
===================================================================
--- testing-x86_64/empty-filter.rules	                        (rev 0)
+++ testing-x86_64/empty-filter.rules	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,6 @@
+# Empty iptables filter table rule file
+*filter
+:INPUT ACCEPT [0:0]
+:FORWARD ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
+COMMIT

Copied: iptables/repos/testing-x86_64/empty-mangle.rules (from rev 334395, iptables/trunk/empty-mangle.rules)
===================================================================
--- testing-x86_64/empty-mangle.rules	                        (rev 0)
+++ testing-x86_64/empty-mangle.rules	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,8 @@
+# Empty iptables mangle table rules file
+*mangle
+:PREROUTING ACCEPT [0:0]
+:INPUT ACCEPT [0:0]
+:FORWARD ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
+:POSTROUTING ACCEPT [0:0]
+COMMIT

Copied: iptables/repos/testing-x86_64/empty-nat.rules (from rev 334395, iptables/trunk/empty-nat.rules)
===================================================================
--- testing-x86_64/empty-nat.rules	                        (rev 0)
+++ testing-x86_64/empty-nat.rules	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,7 @@
+# Empty iptables nat table rules file
+*nat
+:PREROUTING ACCEPT [0:0]
+:INPUT ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
+:POSTROUTING ACCEPT [0:0]
+COMMIT

Copied: iptables/repos/testing-x86_64/empty-raw.rules (from rev 334395, iptables/trunk/empty-raw.rules)
===================================================================
--- testing-x86_64/empty-raw.rules	                        (rev 0)
+++ testing-x86_64/empty-raw.rules	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,5 @@
+# Empty iptables raw table rules file
+*raw
+:PREROUTING ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
+COMMIT

Copied: iptables/repos/testing-x86_64/empty-security.rules (from rev 334395, iptables/trunk/empty-security.rules)
===================================================================
--- testing-x86_64/empty-security.rules	                        (rev 0)
+++ testing-x86_64/empty-security.rules	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,6 @@
+# Empty iptables security table rules file
+*security
+:INPUT ACCEPT [0:0]
+:FORWARD ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
+COMMIT

Copied: iptables/repos/testing-x86_64/empty.rules (from rev 334395, iptables/trunk/empty.rules)
===================================================================
--- testing-x86_64/empty.rules	                        (rev 0)
+++ testing-x86_64/empty.rules	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,6 @@
+# Empty iptables rule file
+*filter
+:INPUT ACCEPT [0:0]
+:FORWARD ACCEPT [0:0]
+:OUTPUT ACCEPT [0:0]
+COMMIT

Copied: iptables/repos/testing-x86_64/ip6tables.service (from rev 334395, iptables/trunk/ip6tables.service)
===================================================================
--- testing-x86_64/ip6tables.service	                        (rev 0)
+++ testing-x86_64/ip6tables.service	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,15 @@
+[Unit]
+Description=IPv6 Packet Filtering Framework
+Before=network-pre.target
+Wants=network-pre.target
+After=iptables.service
+
+[Service]
+Type=oneshot
+ExecStart=/usr/bin/ip6tables-restore /etc/iptables/ip6tables.rules
+ExecReload=/usr/bin/ip6tables-restore /etc/iptables/ip6tables.rules
+ExecStop=/usr/lib/systemd/scripts/iptables-flush 6
+RemainAfterExit=yes
+
+[Install]
+WantedBy=multi-user.target

Copied: iptables/repos/testing-x86_64/iptables-flush (from rev 334395, iptables/trunk/iptables-flush)
===================================================================
--- testing-x86_64/iptables-flush	                        (rev 0)
+++ testing-x86_64/iptables-flush	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,18 @@
+#!/bin/bash
+#
+# Usage: iptables-flush [6]
+#
+
+iptables=ip$1tables
+if ! type -p "$iptables"; then
+  echo "error: invalid argument"
+  exit 1
+fi
+
+while read -r table; do
+  tables+=("/var/lib/$iptables/empty-$table.rules")
+done <"/proc/net/ip$1_tables_names"
+
+if (( ${#tables[*]} )); then
+  cat "${tables[@]}" | "$iptables-restore"
+fi

Copied: iptables/repos/testing-x86_64/iptables.service (from rev 334395, iptables/trunk/iptables.service)
===================================================================
--- testing-x86_64/iptables.service	                        (rev 0)
+++ testing-x86_64/iptables.service	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,14 @@
+[Unit]
+Description=Packet Filtering Framework
+Before=network-pre.target
+Wants=network-pre.target
+
+[Service]
+Type=oneshot
+ExecStart=/usr/bin/iptables-restore /etc/iptables/iptables.rules
+ExecReload=/usr/bin/iptables-restore /etc/iptables/iptables.rules
+ExecStop=/usr/lib/systemd/scripts/iptables-flush
+RemainAfterExit=yes
+
+[Install]
+WantedBy=multi-user.target

Copied: iptables/repos/testing-x86_64/simple_firewall.rules (from rev 334395, iptables/trunk/simple_firewall.rules)
===================================================================
--- testing-x86_64/simple_firewall.rules	                        (rev 0)
+++ testing-x86_64/simple_firewall.rules	2018-09-11 20:14:13 UTC (rev 334396)
@@ -0,0 +1,11 @@
+*filter
+:INPUT DROP [0:0]
+:FORWARD DROP [0:0]
+:OUTPUT ACCEPT [0:0]
+-A INPUT -p icmp -j ACCEPT 
+-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 
+-A INPUT -i lo -j ACCEPT 
+-A INPUT -p tcp -j REJECT --reject-with tcp-reset 
+-A INPUT -p udp -j REJECT --reject-with icmp-port-unreachable 
+-A INPUT -j REJECT --reject-with icmp-proto-unreachable 
+COMMIT



More information about the arch-commits mailing list