[arch-commits] Commit in nftables/repos/staging-x86_64 (6 files)

Felix Yan felixonmars at archlinux.org
Thu Nov 12 10:04:58 UTC 2020


    Date: Thursday, November 12, 2020 @ 10:04:58
  Author: felixonmars
Revision: 400459

archrelease: copy trunk to staging-x86_64

Added:
  nftables/repos/staging-x86_64/PKGBUILD
    (from rev 400457, nftables/trunk/PKGBUILD)
  nftables/repos/staging-x86_64/nftables.conf
    (from rev 400458, nftables/trunk/nftables.conf)
  nftables/repos/staging-x86_64/nftables.service
    (from rev 400458, nftables/trunk/nftables.service)
Deleted:
  nftables/repos/staging-x86_64/PKGBUILD
  nftables/repos/staging-x86_64/nftables.conf
  nftables/repos/staging-x86_64/nftables.service

------------------+
 PKGBUILD         |  116 ++++++++++++++++++++++++++---------------------------
 nftables.conf    |   76 +++++++++++++++++-----------------
 nftables.service |   30 ++++++-------
 3 files changed, 111 insertions(+), 111 deletions(-)

Deleted: PKGBUILD
===================================================================
--- PKGBUILD	2020-11-12 10:04:37 UTC (rev 400458)
+++ PKGBUILD	2020-11-12 10:04:58 UTC (rev 400459)
@@ -1,58 +0,0 @@
-# Maintainer: Sébastien "Seblu" Luttringer <seblu at archlinux.org>
-
-pkgname=nftables
-epoch=1
-pkgver=0.9.7
-pkgrel=2
-pkgdesc='Netfilter tables userspace tools'
-arch=('x86_64')
-url='https://netfilter.org/projects/nftables/'
-license=('GPL2')
-depends=('libmnl' 'libnftnl' 'gmp' 'readline' 'ncurses' 'jansson')
-optdepends=('python: Python bindings')
-makedepends=('asciidoc' 'python')
-backup=('etc/nftables.conf')
-validpgpkeys=('37D964ACC04981C75500FB9BD55D978A8A1420E4') # Netfilter Core Team
-source=("https://netfilter.org/projects/nftables/files/nftables-$pkgver.tar.bz2"{,.sig}
-        'nftables.conf'
-        'nftables.service')
-sha256sums=('fe6b8a8c326a2c09c02ca162b840d7d4aadb043ce7a367c166d6455b0e112cb0'
-            'SKIP'
-            '7b00611bb0533ca2f4abce14e22e9de39c344e241d4eae884c5e594d1b1ce8df'
-            '3c6a34a400022450df0b6e97b3f16eea5cab7741a0e5f16858b46a3e6591b5af')
-
-prepare() {
-  cd $pkgname-$pkgver
-  # apply patch from the source array (should be a pacman feature)
-  local filename
-  for filename in "${source[@]}"; do
-    if [[ "$filename" =~ \.patch$ ]]; then
-      msg2 "Applying patch ${filename##*/}"
-      patch -p1 -N -i "$srcdir/${filename##*/}"
-    fi
-  done
-  :
-}
-
-build() {
-  cd $pkgname-$pkgver
-  ./configure \
-    --prefix=/usr \
-    --sbindir=/usr/bin \
-    --sysconfdir=/usr/share \
-    --with-json \
-    --disable-debug
-  make
-}
-
-package() {
-  pushd $pkgname-$pkgver
-  make DESTDIR="$pkgdir" install
-  popd
-  # basic safe firewall config
-  install -Dm644 nftables.conf "$pkgdir/etc/nftables.conf"
-  # systemd
-  install -Dm644 nftables.service "$pkgdir/usr/lib/systemd/system/nftables.service"
-}
-
-# vim:set ts=2 sw=2 et:

Copied: nftables/repos/staging-x86_64/PKGBUILD (from rev 400457, nftables/trunk/PKGBUILD)
===================================================================
--- PKGBUILD	                        (rev 0)
+++ PKGBUILD	2020-11-12 10:04:58 UTC (rev 400459)
@@ -0,0 +1,58 @@
+# Maintainer: Sébastien "Seblu" Luttringer <seblu at archlinux.org>
+
+pkgname=nftables
+epoch=1
+pkgver=0.9.7
+pkgrel=3
+pkgdesc='Netfilter tables userspace tools'
+arch=('x86_64')
+url='https://netfilter.org/projects/nftables/'
+license=('GPL2')
+depends=('libmnl' 'libnftnl' 'gmp' 'readline' 'ncurses' 'jansson')
+optdepends=('python: Python bindings')
+makedepends=('asciidoc' 'python')
+backup=('etc/nftables.conf')
+validpgpkeys=('37D964ACC04981C75500FB9BD55D978A8A1420E4') # Netfilter Core Team
+source=("https://netfilter.org/projects/nftables/files/nftables-$pkgver.tar.bz2"{,.sig}
+        'nftables.conf'
+        'nftables.service')
+sha256sums=('fe6b8a8c326a2c09c02ca162b840d7d4aadb043ce7a367c166d6455b0e112cb0'
+            'SKIP'
+            '7b00611bb0533ca2f4abce14e22e9de39c344e241d4eae884c5e594d1b1ce8df'
+            '3c6a34a400022450df0b6e97b3f16eea5cab7741a0e5f16858b46a3e6591b5af')
+
+prepare() {
+  cd $pkgname-$pkgver
+  # apply patch from the source array (should be a pacman feature)
+  local filename
+  for filename in "${source[@]}"; do
+    if [[ "$filename" =~ \.patch$ ]]; then
+      msg2 "Applying patch ${filename##*/}"
+      patch -p1 -N -i "$srcdir/${filename##*/}"
+    fi
+  done
+  :
+}
+
+build() {
+  cd $pkgname-$pkgver
+  ./configure \
+    --prefix=/usr \
+    --sbindir=/usr/bin \
+    --sysconfdir=/usr/share \
+    --with-json \
+    --disable-debug
+  make
+}
+
+package() {
+  pushd $pkgname-$pkgver
+  make DESTDIR="$pkgdir" install
+  popd
+  # basic safe firewall config
+  install -Dm644 nftables.conf "$pkgdir/etc/nftables.conf"
+  # systemd
+  install -Dm644 nftables.service "$pkgdir/usr/lib/systemd/system/nftables.service"
+}
+
+# vim:set ts=2 sw=2 et:

Deleted: nftables.conf
===================================================================
--- nftables.conf	2020-11-12 10:04:37 UTC (rev 400458)
+++ nftables.conf	2020-11-12 10:04:58 UTC (rev 400459)
@@ -1,38 +0,0 @@
-#!/usr/bin/nft -f
-# ipv4/ipv6 Simple & Safe Firewall
-# you can find examples in /usr/share/nftables/
-
-table inet filter {
-  chain input {
-    type filter hook input priority 0;
-
-    # allow established/related connections
-    ct state {established, related} accept
-
-    # early drop of invalid connections
-    ct state invalid drop
-
-    # allow from loopback
-    iifname lo accept
-
-    # allow icmp
-    ip protocol icmp accept
-    meta l4proto ipv6-icmp accept
-
-    # allow ssh
-    tcp dport ssh accept
-
-    # everything else
-    reject with icmpx type port-unreachable
-  }
-  chain forward {
-    type filter hook forward priority 0;
-    drop
-  }
-  chain output {
-    type filter hook output priority 0;
-  }
-
-}
-
-# vim:set ts=2 sw=2 et:

Copied: nftables/repos/staging-x86_64/nftables.conf (from rev 400458, nftables/trunk/nftables.conf)
===================================================================
--- nftables.conf	                        (rev 0)
+++ nftables.conf	2020-11-12 10:04:58 UTC (rev 400459)
@@ -0,0 +1,38 @@
+#!/usr/bin/nft -f
+# ipv4/ipv6 Simple & Safe Firewall
+# you can find examples in /usr/share/nftables/
+
+table inet filter {
+  chain input {
+    type filter hook input priority 0;
+
+    # allow established/related connections
+    ct state {established, related} accept
+
+    # early drop of invalid connections
+    ct state invalid drop
+
+    # allow from loopback
+    iifname lo accept
+
+    # allow icmp
+    ip protocol icmp accept
+    meta l4proto ipv6-icmp accept
+
+    # allow ssh
+    tcp dport ssh accept
+
+    # everything else
+    reject with icmpx type port-unreachable
+  }
+  chain forward {
+    type filter hook forward priority 0;
+    drop
+  }
+  chain output {
+    type filter hook output priority 0;
+  }
+
+}
+
+# vim:set ts=2 sw=2 et:

Deleted: nftables.service
===================================================================
--- nftables.service	2020-11-12 10:04:37 UTC (rev 400458)
+++ nftables.service	2020-11-12 10:04:58 UTC (rev 400459)
@@ -1,15 +0,0 @@
-[Unit]
-Description=Netfilter Tables
-Documentation=man:nft(8)
-Wants=network-pre.target
-Before=network-pre.target
-
-[Service]
-Type=oneshot
-ExecStart=/usr/bin/nft -f /etc/nftables.conf
-ExecReload=/usr/bin/nft flush ruleset ';' include '"/etc/nftables.conf"'
-ExecStop=/usr/bin/nft flush ruleset
-RemainAfterExit=yes
-
-[Install]
-WantedBy=multi-user.target

Copied: nftables/repos/staging-x86_64/nftables.service (from rev 400458, nftables/trunk/nftables.service)
===================================================================
--- nftables.service	                        (rev 0)
+++ nftables.service	2020-11-12 10:04:58 UTC (rev 400459)
@@ -0,0 +1,15 @@
+[Unit]
+Description=Netfilter Tables
+Documentation=man:nft(8)
+Wants=network-pre.target
+Before=network-pre.target
+
+[Service]
+Type=oneshot
+ExecStart=/usr/bin/nft -f /etc/nftables.conf
+ExecReload=/usr/bin/nft flush ruleset ';' include '"/etc/nftables.conf"'
+ExecStop=/usr/bin/nft flush ruleset
+RemainAfterExit=yes
+
+[Install]
+WantedBy=multi-user.target



More information about the arch-commits mailing list