[arch-commits] Commit in nftables/repos (7 files)
Sébastien Luttringer
seblu at archlinux.org
Wed Nov 11 12:06:36 UTC 2020
Date: Wednesday, November 11, 2020 @ 12:06:36
Author: seblu
Revision: 400364
db-move: moved nftables from [testing] to [extra] (x86_64)
Added:
nftables/repos/extra-x86_64/PKGBUILD
(from rev 400363, nftables/repos/testing-x86_64/PKGBUILD)
nftables/repos/extra-x86_64/nftables.conf
(from rev 400363, nftables/repos/testing-x86_64/nftables.conf)
nftables/repos/extra-x86_64/nftables.service
(from rev 400363, nftables/repos/testing-x86_64/nftables.service)
Deleted:
nftables/repos/extra-x86_64/PKGBUILD
nftables/repos/extra-x86_64/nftables.conf
nftables/repos/extra-x86_64/nftables.service
nftables/repos/testing-x86_64/
-------------------------------+
/PKGBUILD | 58 ++++++++++++++++++++++++++++++++++++++++
/nftables.conf | 38 ++++++++++++++++++++++++++
/nftables.service | 15 ++++++++++
extra-x86_64/PKGBUILD | 58 ----------------------------------------
extra-x86_64/nftables.conf | 38 --------------------------
extra-x86_64/nftables.service | 15 ----------
6 files changed, 111 insertions(+), 111 deletions(-)
Deleted: extra-x86_64/PKGBUILD
===================================================================
--- extra-x86_64/PKGBUILD 2020-11-11 12:06:34 UTC (rev 400363)
+++ extra-x86_64/PKGBUILD 2020-11-11 12:06:36 UTC (rev 400364)
@@ -1,58 +0,0 @@
-# Maintainer: Sébastien "Seblu" Luttringer <seblu at archlinux.org>
-
-pkgname=nftables
-epoch=1
-pkgver=0.9.6
-pkgrel=1
-pkgdesc='Netfilter tables userspace tools'
-arch=('x86_64')
-url='https://netfilter.org/projects/nftables/'
-license=('GPL2')
-depends=('libmnl' 'libnftnl' 'gmp' 'readline' 'ncurses' 'jansson')
-optdepends=('python: Python bindings')
-makedepends=('asciidoc' 'python')
-backup=('etc/nftables.conf')
-validpgpkeys=('C09DB2063F1D7034BA6152ADAB4655A126D292E4') # Netfilter Core Team
-source=("https://netfilter.org/projects/nftables/files/nftables-$pkgver.tar.bz2"{,.sig}
- 'nftables.conf'
- 'nftables.service')
-sha256sums=('68d6fdfe8ab02303e6b1f13968a4022da5b0120110eaee3233d806857937b66e'
- 'SKIP'
- '7b00611bb0533ca2f4abce14e22e9de39c344e241d4eae884c5e594d1b1ce8df'
- '3c6a34a400022450df0b6e97b3f16eea5cab7741a0e5f16858b46a3e6591b5af')
-
-prepare() {
- cd $pkgname-$pkgver
- # apply patch from the source array (should be a pacman feature)
- local filename
- for filename in "${source[@]}"; do
- if [[ "$filename" =~ \.patch$ ]]; then
- msg2 "Applying patch ${filename##*/}"
- patch -p1 -N -i "$srcdir/${filename##*/}"
- fi
- done
- :
-}
-
-build() {
- cd $pkgname-$pkgver
- ./configure \
- --prefix=/usr \
- --sbindir=/usr/bin \
- --sysconfdir=/usr/share \
- --with-json \
- --disable-debug
- make
-}
-
-package() {
- pushd $pkgname-$pkgver
- make DESTDIR="$pkgdir" install
- popd
- # basic safe firewall config
- install -Dm644 nftables.conf "$pkgdir/etc/nftables.conf"
- # systemd
- install -Dm644 nftables.service "$pkgdir/usr/lib/systemd/system/nftables.service"
-}
-
-# vim:set ts=2 sw=2 et:
Copied: nftables/repos/extra-x86_64/PKGBUILD (from rev 400363, nftables/repos/testing-x86_64/PKGBUILD)
===================================================================
--- extra-x86_64/PKGBUILD (rev 0)
+++ extra-x86_64/PKGBUILD 2020-11-11 12:06:36 UTC (rev 400364)
@@ -0,0 +1,58 @@
+# Maintainer: Sébastien "Seblu" Luttringer <seblu at archlinux.org>
+
+pkgname=nftables
+epoch=1
+pkgver=0.9.7
+pkgrel=1
+pkgdesc='Netfilter tables userspace tools'
+arch=('x86_64')
+url='https://netfilter.org/projects/nftables/'
+license=('GPL2')
+depends=('libmnl' 'libnftnl' 'gmp' 'readline' 'ncurses' 'jansson')
+optdepends=('python: Python bindings')
+makedepends=('asciidoc' 'python')
+backup=('etc/nftables.conf')
+validpgpkeys=('37D964ACC04981C75500FB9BD55D978A8A1420E4') # Netfilter Core Team
+source=("https://netfilter.org/projects/nftables/files/nftables-$pkgver.tar.bz2"{,.sig}
+ 'nftables.conf'
+ 'nftables.service')
+sha256sums=('fe6b8a8c326a2c09c02ca162b840d7d4aadb043ce7a367c166d6455b0e112cb0'
+ 'SKIP'
+ '7b00611bb0533ca2f4abce14e22e9de39c344e241d4eae884c5e594d1b1ce8df'
+ '3c6a34a400022450df0b6e97b3f16eea5cab7741a0e5f16858b46a3e6591b5af')
+
+prepare() {
+ cd $pkgname-$pkgver
+ # apply patch from the source array (should be a pacman feature)
+ local filename
+ for filename in "${source[@]}"; do
+ if [[ "$filename" =~ \.patch$ ]]; then
+ msg2 "Applying patch ${filename##*/}"
+ patch -p1 -N -i "$srcdir/${filename##*/}"
+ fi
+ done
+ :
+}
+
+build() {
+ cd $pkgname-$pkgver
+ ./configure \
+ --prefix=/usr \
+ --sbindir=/usr/bin \
+ --sysconfdir=/usr/share \
+ --with-json \
+ --disable-debug
+ make
+}
+
+package() {
+ pushd $pkgname-$pkgver
+ make DESTDIR="$pkgdir" install
+ popd
+ # basic safe firewall config
+ install -Dm644 nftables.conf "$pkgdir/etc/nftables.conf"
+ # systemd
+ install -Dm644 nftables.service "$pkgdir/usr/lib/systemd/system/nftables.service"
+}
+
+# vim:set ts=2 sw=2 et:
Deleted: extra-x86_64/nftables.conf
===================================================================
--- extra-x86_64/nftables.conf 2020-11-11 12:06:34 UTC (rev 400363)
+++ extra-x86_64/nftables.conf 2020-11-11 12:06:36 UTC (rev 400364)
@@ -1,38 +0,0 @@
-#!/usr/bin/nft -f
-# ipv4/ipv6 Simple & Safe Firewall
-# you can find examples in /usr/share/nftables/
-
-table inet filter {
- chain input {
- type filter hook input priority 0;
-
- # allow established/related connections
- ct state {established, related} accept
-
- # early drop of invalid connections
- ct state invalid drop
-
- # allow from loopback
- iifname lo accept
-
- # allow icmp
- ip protocol icmp accept
- meta l4proto ipv6-icmp accept
-
- # allow ssh
- tcp dport ssh accept
-
- # everything else
- reject with icmpx type port-unreachable
- }
- chain forward {
- type filter hook forward priority 0;
- drop
- }
- chain output {
- type filter hook output priority 0;
- }
-
-}
-
-# vim:set ts=2 sw=2 et:
Copied: nftables/repos/extra-x86_64/nftables.conf (from rev 400363, nftables/repos/testing-x86_64/nftables.conf)
===================================================================
--- extra-x86_64/nftables.conf (rev 0)
+++ extra-x86_64/nftables.conf 2020-11-11 12:06:36 UTC (rev 400364)
@@ -0,0 +1,38 @@
+#!/usr/bin/nft -f
+# ipv4/ipv6 Simple & Safe Firewall
+# you can find examples in /usr/share/nftables/
+
+table inet filter {
+ chain input {
+ type filter hook input priority 0;
+
+ # allow established/related connections
+ ct state {established, related} accept
+
+ # early drop of invalid connections
+ ct state invalid drop
+
+ # allow from loopback
+ iifname lo accept
+
+ # allow icmp
+ ip protocol icmp accept
+ meta l4proto ipv6-icmp accept
+
+ # allow ssh
+ tcp dport ssh accept
+
+ # everything else
+ reject with icmpx type port-unreachable
+ }
+ chain forward {
+ type filter hook forward priority 0;
+ drop
+ }
+ chain output {
+ type filter hook output priority 0;
+ }
+
+}
+
+# vim:set ts=2 sw=2 et:
Deleted: extra-x86_64/nftables.service
===================================================================
--- extra-x86_64/nftables.service 2020-11-11 12:06:34 UTC (rev 400363)
+++ extra-x86_64/nftables.service 2020-11-11 12:06:36 UTC (rev 400364)
@@ -1,15 +0,0 @@
-[Unit]
-Description=Netfilter Tables
-Documentation=man:nft(8)
-Wants=network-pre.target
-Before=network-pre.target
-
-[Service]
-Type=oneshot
-ExecStart=/usr/bin/nft -f /etc/nftables.conf
-ExecReload=/usr/bin/nft flush ruleset ';' include '"/etc/nftables.conf"'
-ExecStop=/usr/bin/nft flush ruleset
-RemainAfterExit=yes
-
-[Install]
-WantedBy=multi-user.target
Copied: nftables/repos/extra-x86_64/nftables.service (from rev 400363, nftables/repos/testing-x86_64/nftables.service)
===================================================================
--- extra-x86_64/nftables.service (rev 0)
+++ extra-x86_64/nftables.service 2020-11-11 12:06:36 UTC (rev 400364)
@@ -0,0 +1,15 @@
+[Unit]
+Description=Netfilter Tables
+Documentation=man:nft(8)
+Wants=network-pre.target
+Before=network-pre.target
+
+[Service]
+Type=oneshot
+ExecStart=/usr/bin/nft -f /etc/nftables.conf
+ExecReload=/usr/bin/nft flush ruleset ';' include '"/etc/nftables.conf"'
+ExecStop=/usr/bin/nft flush ruleset
+RemainAfterExit=yes
+
+[Install]
+WantedBy=multi-user.target
More information about the arch-commits
mailing list