[arch-commits] Commit in tcp-wrappers/repos (5 files)

Maxime Gauduin alucryd at gemini.archlinux.org
Mon Aug 23 07:50:24 UTC 2021


    Date: Monday, August 23, 2021 @ 07:50:24
  Author: alucryd
Revision: 1004311

archrelease: copy trunk to community-staging-x86_64

Added:
  tcp-wrappers/repos/community-staging-x86_64/
  tcp-wrappers/repos/community-staging-x86_64/PKGBUILD
    (from rev 1004310, tcp-wrappers/trunk/PKGBUILD)
  tcp-wrappers/repos/community-staging-x86_64/hosts.allow
    (from rev 1004310, tcp-wrappers/trunk/hosts.allow)
  tcp-wrappers/repos/community-staging-x86_64/hosts.deny
    (from rev 1004310, tcp-wrappers/trunk/hosts.deny)
  tcp-wrappers/repos/community-staging-x86_64/tcp-wrappers-redhat-bug11881.patch
    (from rev 1004310, tcp-wrappers/trunk/tcp-wrappers-redhat-bug11881.patch)

------------------------------------+
 PKGBUILD                           |   91 +++++++++++++++++++++++++++++++++++
 hosts.allow                        |    5 +
 hosts.deny                         |    7 ++
 tcp-wrappers-redhat-bug11881.patch |   36 +++++++++++++
 4 files changed, 139 insertions(+)

Copied: tcp-wrappers/repos/community-staging-x86_64/PKGBUILD (from rev 1004310, tcp-wrappers/trunk/PKGBUILD)
===================================================================
--- community-staging-x86_64/PKGBUILD	                        (rev 0)
+++ community-staging-x86_64/PKGBUILD	2021-08-23 07:50:24 UTC (rev 1004311)
@@ -0,0 +1,91 @@
+# Maintainer: Maxime Gauduin <alucryd at archlinux.org>
+# Contributor: Manuel Hüsers <manuel.huesers at uni-ol.de>
+# Contributor: vigo <vigo.the.unholy.carpathian at gmail.com>
+# Contributor: Sergej Pupykin <pupykin.s+arch at gmail.com>
+# Contributor: judd <jvinet at zeroflux.org>
+
+pkgbase=tcp-wrappers
+pkgname=(
+  libwrap
+  tcp-wrappers
+)
+pkgver=7.6.31
+pkgrel=2
+pkgdesc='Monitors and Controls incoming TCP connections'
+arch=(x86_64)
+url=ftp://ftp.porcupine.org/pub/security/index.html
+license=(BSD)
+depends=(
+  glibc
+  libnsl
+)
+source=(
+  ftp://ftp.porcupine.org/pub/security/tcp_wrappers_${pkgver%.*}.tar.gz
+  http://http.debian.net/debian/pool/main/t/tcp-wrappers/tcp-wrappers_${pkgver%.*}.q-${pkgver##*.}.debian.tar.xz
+  tcp-wrappers-redhat-bug11881.patch
+  hosts.allow
+  hosts.deny
+)
+sha256sums=('9543d7adedf78a6de0b221ccbbd1952e08b5138717f4ade814039bb489a4315d'
+            '20fec7826bde1262007e6dd43f365b5802bacc283942d93b78385ea634dc594a'
+            '2e527e54c1ea208de10a206c667f751e54651eb77c973271d213e3459d690403'
+            'c1b19035a14ba552e8795ec3d7171e688592c9317f2eb14373320315435565e3'
+            '969414f0a161e95fbe4cfe32df7c657a2793734d09416c00fa1116c5c0a9924f')
+
+prepare() {
+  cd tcp_wrappers_${pkgver%.*}
+
+  for patch in $(cat ../debian/patches/series); do
+    patch -Np1 -i ../debian/patches/${patch}
+  done
+  patch -Np1 -i ../tcp-wrappers-redhat-bug11881.patch
+}
+
+build() {
+  cd tcp_wrappers_${pkgver%.*}
+
+  make \
+    COPTS="$CFLAGS" \
+    LDOPTS="$LDFLAGS" \
+    REAL_DAEMON_DIR=/usr/bin \
+    STYLE='-DPROCESS_OPTIONS' \
+    linux
+}
+
+package_libwrap() {
+  provides=(tcp_wrappers-libs)
+  conflicts=(tcp_wrappers-libs)
+
+  cd tcp_wrappers_${pkgver%.*}
+
+  install -Dm 644 tcpd.h -t "${pkgdir}"/usr/include/
+  install -Dm 644 shared/libwrap.so.0.${pkgver%.*} -t "${pkgdir}"/usr/lib/
+  ln -s libwrap.so.0.${pkgver%.*} "${pkgdir}"/usr/lib/libwrap.so.0
+  ln -s libwrap.so.0 "${pkgdir}"/usr/lib/libwrap.so
+
+  install -Dm 644 DISCLAIMER -t "${pkgdir}"/usr/share/licenses/libwrap/
+}
+
+package_tcp-wrappers() {
+  depends=(libwrap)
+  provides=(tcp_wrappers)
+  conflicts=(tcp_wrappers)
+  backup=(
+    etc/hosts.allow
+    etc/hosts.deny
+  )
+
+  cd tcp_wrappers_${pkgver%.*}
+
+  install -Dm 755 safe_finger tcpd tcpdchk tcpdmatch try-from -t "${pkgdir}"/usr/bin/
+  install -Dm 644 *.3 -t "${pkgdir}"/usr/share/man/man3/
+  install -Dm 644 *.5 -t "${pkgdir}"/usr/share/man/man5/
+  install -Dm 644 *.8 -t "${pkgdir}"/usr/share/man/man8/
+  install -Dm 644 ../hosts.{allow,deny} -t "${pkgdir}"/etc/
+  install -Dm 644 README -t "${pkgdir}"/usr/share/doc/tcp-wrappers/
+
+  install -dm 755 "${pkgdir}"/usr/share/licenses
+  ln -s libwrap "${pkgdir}"/usr/share/licenses/tcp-wrappers
+}
+
+# vim: ts=2 sw=2 et:

Copied: tcp-wrappers/repos/community-staging-x86_64/hosts.allow (from rev 1004310, tcp-wrappers/trunk/hosts.allow)
===================================================================
--- community-staging-x86_64/hosts.allow	                        (rev 0)
+++ community-staging-x86_64/hosts.allow	2021-08-23 07:50:24 UTC (rev 1004311)
@@ -0,0 +1,5 @@
+#
+# /etc/hosts.allow
+#
+
+# End of file

Copied: tcp-wrappers/repos/community-staging-x86_64/hosts.deny (from rev 1004310, tcp-wrappers/trunk/hosts.deny)
===================================================================
--- community-staging-x86_64/hosts.deny	                        (rev 0)
+++ community-staging-x86_64/hosts.deny	2021-08-23 07:50:24 UTC (rev 1004311)
@@ -0,0 +1,7 @@
+#
+# /etc/hosts.deny
+#
+
+ALL: ALL
+
+# End of file

Copied: tcp-wrappers/repos/community-staging-x86_64/tcp-wrappers-redhat-bug11881.patch (from rev 1004310, tcp-wrappers/trunk/tcp-wrappers-redhat-bug11881.patch)
===================================================================
--- community-staging-x86_64/tcp-wrappers-redhat-bug11881.patch	                        (rev 0)
+++ community-staging-x86_64/tcp-wrappers-redhat-bug11881.patch	2021-08-23 07:50:24 UTC (rev 1004311)
@@ -0,0 +1,36 @@
+--- tcp_wrappers_7.6/tcpd.c.bug11881
++++ tcp_wrappers_7.6/tcpd.c
+@@ -60,10 +60,10 @@
+      */
+ 
+     if (argv[0][0] == '/') {
+-	strcpy(path, argv[0]);
++	strncpy(path, argv[0], sizeof(path));
+ 	argv[0] = strrchr(argv[0], '/') + 1;
+     } else {
+-	sprintf(path, "%s/%s", REAL_DAEMON_DIR, argv[0]);
++	snprintf(path, sizeof(path), "%s/%s", REAL_DAEMON_DIR, argv[0]);
+     }
+ 
+     /*
+--- tcp_wrappers_7.6/eval.c.bug11881
++++ tcp_wrappers_7.6/eval.c
+@@ -111,7 +111,7 @@
+ 	return (hostinfo);
+ #endif
+     if (STR_NE(eval_user(request), unknown)) {
+-	sprintf(both, "%s@%s", request->user, hostinfo);
++	snprintf(both, sizeof(both), "%s@%s", request->user, hostinfo);
+ 	return (both);
+     } else {
+ 	return (hostinfo);
+@@ -128,7 +128,7 @@
+     char   *daemon = eval_daemon(request);
+ 
+     if (STR_NE(host, unknown)) {
+-	sprintf(both, "%s@%s", daemon, host);
++	snprintf(both, sizeof(both), "%s@%s", daemon, host);
+ 	return (both);
+     } else {
+ 	return (daemon);
+



More information about the arch-commits mailing list