blob: 02d8a4b48f1547458c43e4a5ee3953b4b94dbda3 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
|
# Copyright 1999-2007 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/net-firewall/iptables/iptables-1.4.0-r1.ebuild,v 1.1 2007/12/30 15:00:48 vapier Exp $
inherit eutils toolchain-funcs linux-info
L7_PV=2.17
L7_P=netfilter-layer7-v${L7_PV}
DESCRIPTION="Linux kernel (2.4+) firewall, NAT and packet mangling tools"
HOMEPAGE="http://www.iptables.org/ http://l7-filter.sf.net/"
SRC_URI="http://iptables.org/projects/iptables/files/${P}.tar.bz2
l7filter? ( mirror://sourceforge/l7-filter/${L7_P}.tar.gz )"
LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86"
IUSE="extensions ipv6 l7filter static"
DEPEND="virtual/os-headers
l7filter? ( virtual/linux-sources )"
RDEPEND=""
pkg_setup() {
if use l7filter || use extensions ; then
ewarn "WARNING: 3rd party extensions has been enabled."
ewarn "This means that iptables will use your currently installed"
ewarn "kernel in ${KERNEL_DIR} as headers for iptables."
ewarn
if use extensions ; then
ewarn "You may have to patch your kernel to allow iptables to build."
ewarn "Please check http://ftp.netfilter.org/pub/patch-o-matic-ng/snapshot/ for patches"
ewarn "for your kernel."
ewarn
fi
linux-info_pkg_setup
fi
if kernel_is ge 2 6 20
then
L7FILE=${KERNEL_DIR}/net/netfilter/xt_layer7.c
else
L7FILE=${KERNEL_DIR}/net/ipv4/netfilter/ipt_layer7.c
fi
if use l7filter && \
[ ! -f "${L7FILE}" ]; then
die "For layer 7 support emerge net-misc/l7-filter-${L7_PV} before this"
fi
}
src_unpack() {
unpack ${P}.tar.bz2
if use l7filter
then
unpack ${L7_P}.tar.gz
fi
cd "${S}"
epatch "${FILESDIR}"/${P}-dev-files.patch
# this provide's grsec's stealth match
EPATCH_OPTS="-p0" \
epatch "${FILESDIR}"/1.3.1-files/grsecurity-1.2.8-iptables.patch-1.3.1
sed -i \
-e "s/PF_EXT_SLIB:=/PF_EXT_SLIB:=stealth /g" \
extensions/Makefile || die "failed to enable stealth extension"
local check base=${PORTAGE_CONFIGROOT}/etc/portage/patches
for check in {${CATEGORY}/${PF},${CATEGORY}/${P},${CATEGORY}/${PN}}; do
EPATCH_SOURCE=${base}/${CTARGET}/${check}
[[ -r ${EPATCH_SOURCE} ]] || EPATCH_SOURCE=${base}/${CHOST}/${check}
[[ -r ${EPATCH_SOURCE} ]] || EPATCH_SOURCE=${base}/${check}
if [[ -d ${EPATCH_SOURCE} ]] ; then
EPATCH_SUFFIX="patch"
EPATCH_FORCE="yes" \
EPATCH_MULTI_MSG="Applying user patches from ${EPATCH_SOURCE} ..." \
epatch
break
fi
done
if use l7filter ; then
#yes choosing 2.6.20 was deliberate - upstream mistake possibly
if kernel_is ge 2 6 20
then
L7_PATCH=iptables-1.4-for-kernel-2.6.20forward-layer7-${L7_PV}.patch
else
eerror "Currently there is no l7-filter patch available for this"
eerror "kernel iptables-1.4 and kernel version pre 2.6.20."
eerror "If you need to compile iptables 1.4.x against Linux 2.6.19.x"
eerror "or earlier, with l7-filter patch, please, report upstream."
die "No patch available."
fi
EPATCH_OPTS="-p1" epatch "${WORKDIR}"/${L7_P}/${L7_PATCH}
chmod +x extensions/.layer7-test*
fi
if ! use extensions ; then
cat <<-EOF > "${S}"/include/linux/compiler.h
#define __user
EOF
fi
}
src_defs() {
# these are used in both of src_compile and src_install
myconf=""
myconf="${myconf} PREFIX="
myconf="${myconf} LIBDIR=/$(get_libdir)"
myconf="${myconf} BINDIR=/sbin"
myconf="${myconf} MANDIR=/usr/share/man"
myconf="${myconf} INCDIR=/usr/include"
# iptables and libraries are now installed to /sbin and /lib, so that
# systems with remote network-mounted /usr filesystems can get their
# network interfaces up and running correctly without /usr.
use ipv6 || myconf="${myconf} DO_IPV6=0"
use static && myconf="${myconf} NO_SHARED_LIBS=0"
export myconf
if ! use l7filter && ! use extensions ; then
export KERNEL_DIR=$(
# ugh -- iptables has scripts which check for the existence of
# files so we need to give it the right path to our toolchains
# include dir where the linux headers are.
# FYI IPTABLES: YOU FAIL
echo '#include <linux/limits.h>' | $(tc-getCPP) - | grep -o '/[^"]*linux/limits.h' | sed s:/include/linux/limits.h::
)
export KBUILD_OUTPUT=${KERNEL_DIR}
diemsg="failure"
else
diemsg="failure - with l7filter and/or other miscellanious patches added"
fi
export diemsg
}
src_compile() {
src_defs
emake \
COPT_FLAGS="${CFLAGS}" ${myconf} \
CC="$(tc-getCC)" \
|| die "${diemsg}"
}
src_install() {
src_defs
emake ${myconf} \
DESTDIR="${D}" \
KERNEL_DIR="${KERNEL_DIR}" \
install install-devel || die "${diemsg}"
dodir /usr/$(get_libdir)
mv -f "${D}"/$(get_libdir)/*.a "${D}"/usr/$(get_libdir)
keepdir /var/lib/iptables
newinitd "${FILESDIR}"/${PN}-1.3.2.init iptables
newconfd "${FILESDIR}"/${PN}-1.3.2.confd iptables
if use ipv6 ; then
keepdir /var/lib/ip6tables
newinitd "${FILESDIR}"/iptables-1.3.2.init ip6tables
newconfd "${FILESDIR}"/ip6tables-1.3.2.confd ip6tables
fi
}
pkg_postinst() {
elog "This package now includes an initscript which loads and saves"
elog "rules stored in /var/lib/iptables/rules-save"
use ipv6 && elog "and /var/lib/ip6tables/rules-save"
elog "This location can be changed in /etc/conf.d/iptables"
elog
elog "If you are using the iptables initsscript you should save your"
elog "rules using the new iptables version before rebooting."
elog
elog "If you are upgrading to a >=2.4.21 kernel you may need to rebuild"
elog "iptables."
elog
ewarn "!!! ipforwarding is not a part of the iptables initscripts."
ewarn
ewarn "To enable ipforwarding at bootup:"
ewarn "/etc/sysctl.conf and set net.ipv4.ip_forward = 1"
if use ipv6 ; then
ewarn "and/or"
ewarn " net.ipv6.ip_forward = 1"
ewarn "for ipv6."
fi
if has_version '=net-firewall/iptables-1.2*' ; then
ewarn
ewarn "When upgrading from iptables-1.2.x, you may be unable to remove"
ewarn "rules added with iptables-1.2.x. This is a known issue, please see:"
ewarn "http://bugs.gentoo.org/92535"
fi
}
|