Github messages for voidlinux
 help / color / mirror / Atom feed
* [PR PATCH] New package: opensnitch-1.3.6
@ 2021-08-28  5:25 cinerea0
  2021-09-12 12:23 ` apirusKde
                   ` (53 more replies)
  0 siblings, 54 replies; 72+ messages in thread
From: cinerea0 @ 2021-08-28  5:25 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1677 bytes --]

There is a new pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.3.6
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 4795 bytes --]

From 863ae42233e901d7d463e74e3c61a00b425572a0 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sat, 28 Aug 2021 01:21:23 -0400
Subject: [PATCH] New package: opensnitch-1.3.6

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 ++
 srcpkgs/opensnitch/patches/cc-check.patch | 13 +++++
 srcpkgs/opensnitch/patches/musl-int.patch | 16 ++++++
 srcpkgs/opensnitch/template               | 68 +++++++++++++++++++++++
 4 files changed, 101 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..4a9aa09b5e2a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+ 
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..360e26c98179
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+ 
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..77b5a3f2c2ba
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,68 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.3.6
+revision=1
+build_wrksrc="daemon"
+build_style=go
+go_import_path="github.com/evilsocket/opensnitch/daemon"
+go_package="${go_import_path}"
+go_mod_mode="mod"
+hostmakedepends="pkg-config python3-setuptools"
+makedepends="libnetfilter_queue-devel python3-devel"
+depends="python3-grpcio-tools python3-slugify python3-inotify
+ python3-PyQt5 python3-PyQt5-sql qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a02e49a5ed79db8f21788188f16a28684d5f54f583bb4d338e3386484ee1663a
+
+_py() {
+	cd ../ui
+	if [ -n "$CROSS_BUILD" ]; then
+		PYPREFIX="$XBPS_CROSS_BASE"
+		CFLAGS+=" -I${XBPS_CROSS_BASE}/${py3_inc} -I${XBPS_CROSS_BASE}/usr/include"
+		LDFLAGS+=" -L${XBPS_CROSS_BASE}/${py3_lib} -L${XBPS_CROSS_BASE}/usr/lib"
+		CC="${XBPS_CROSS_TRIPLET}-gcc -pthread $CFLAGS $LDFLAGS"
+		LDSHARED="${CC} -shared $LDFLAGS"
+		for f in ${XBPS_CROSS_BASE}/${py3_lib}/_sysconfigdata_*; do
+			f=${f##*/}
+			_PYTHON_SYSCONFIGDATA_NAME=${f%.py}
+		done
+		env CC="$CC" LDSHARED="$LDSHARED" \
+			PYPREFIX="$PYPREFIX" CFLAGS="$CFLAGS" \
+			PYTHONPATH=${XBPS_CROSS_BASE}/${py3_lib} \
+			_PYTHON_SYSCONFIGDATA_NAME="$_PYTHON_SYSCONFIGDATA_NAME" \
+			LDFLAGS="$LDFLAGS" python3 setup.py \
+				${@:-install --prefix=/usr --root=${DESTDIR}} ${make_install_args}
+	else
+		python3 setup.py ${@:-install --prefix=/usr --root=${DESTDIR}} ${make_install_args}
+	fi
+}
+
+post_build() {
+	# build ui
+	_py build
+}
+
+do_install() {
+	# rename bin daemon to opensnitchd
+	for f in ${GOPATH}/bin/* ${GOPATH}/bin/**/*; do
+	    if [ -f "$f" ] && [ -x "$f" ]; then
+	        vbin "$f" opensnitchd
+	        break
+	    fi
+	done
+
+	vinstall "default-config.json" 644 "/etc/opensnitchd/"
+	vinstall "system-fw.json" 644 "/etc/opensnitchd/"
+	vsv opensnitchd
+
+	#install ui
+	_py
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
@ 2021-09-12 12:23 ` apirusKde
  2021-09-13  3:57 ` [PR PATCH] [Updated] " cinerea0
                   ` (52 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: apirusKde @ 2021-09-12 12:23 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 233 bytes --]

New comment by apirusKde on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-917626112

Comment:
Would be great to update to opensnitch-1.4.0 as it adds blocklist host rules functionality

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.3.6
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
  2021-09-12 12:23 ` apirusKde
@ 2021-09-13  3:57 ` cinerea0
  2021-09-21 18:36 ` [PR PATCH] [Updated] New package: opensnitch-1.4.0 cinerea0
                   ` (51 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-09-13  3:57 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.3.6
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 5097 bytes --]

From 82f0bb3e8ab05d8c80f0326caa8372c5099ff32f Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 12 Sep 2021 23:56:55 -0400
Subject: [PATCH] New package: opensnitch-1.4.0

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 ++
 srcpkgs/opensnitch/patches/cc-check.patch | 13 ++++
 srcpkgs/opensnitch/patches/musl-int.patch | 16 +++++
 srcpkgs/opensnitch/template               | 80 +++++++++++++++++++++++
 4 files changed, 113 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..43b570c59091
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,80 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.0
+revision=1
+build_wrksrc="daemon"
+build_style=go
+go_import_path="github.com/evilsocket/opensnitch/daemon"
+go_package="${go_import_path}"
+go_mod_mode="mod"
+hostmakedepends="git pkg-config protobuf28 python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel python3-devel python3-grpcio-tools"
+depends="python3-googleapis-common-protos python3-grpcio python3-slugify
+ python3-inotify python3-PyQt5 python3-PyQt5-sql qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=bd8e4a15653de22121ce2a5013952c8becb2cb965448780ca53da7a453a74be1
+
+_py() {
+	cd ../ui
+	if [ -n "$CROSS_BUILD" ]; then
+		PYPREFIX="$XBPS_CROSS_BASE"
+		CFLAGS+=" -I${XBPS_CROSS_BASE}/${py3_inc} -I${XBPS_CROSS_BASE}/usr/include"
+		LDFLAGS+=" -L${XBPS_CROSS_BASE}/${py3_lib} -L${XBPS_CROSS_BASE}/usr/lib"
+		CC="${XBPS_CROSS_TRIPLET}-gcc -pthread $CFLAGS $LDFLAGS"
+		LDSHARED="${CC} -shared $LDFLAGS"
+		for f in ${XBPS_CROSS_BASE}/${py3_lib}/_sysconfigdata_*; do
+			f=${f##*/}
+			_PYTHON_SYSCONFIGDATA_NAME=${f%.py}
+		done
+		env CC="$CC" LDSHARED="$LDSHARED" \
+			PYPREFIX="$PYPREFIX" CFLAGS="$CFLAGS" \
+			PYTHONPATH=${XBPS_CROSS_BASE}/${py3_lib} \
+			_PYTHON_SYSCONFIGDATA_NAME="$_PYTHON_SYSCONFIGDATA_NAME" \
+			LDFLAGS="$LDFLAGS" python3 setup.py \
+				${@:-install --prefix=/usr --root=${DESTDIR}} ${make_install_args}
+	else
+		python3 setup.py ${@:-install --prefix=/usr --root=${DESTDIR}} ${make_install_args}
+	fi
+}
+
+pre_build() {
+	cd ..
+	go get github.com/golang/protobuf/protoc-gen-go
+	export PATH=$PATH:$GOPATH/bin
+	make protocol
+	cd ui
+	pyrcc5 -o opensnitch/resources_rc.py opensnitch/res/resources.qrc
+	cd ../daemon
+	go mod vendor
+}
+
+post_build() {
+	# build ui
+	_py build
+}
+
+do_install() {
+	# rename bin daemon to opensnitchd
+	for f in ${GOPATH}/bin/* ${GOPATH}/bin/**/*; do
+		if [ -f "$f" ] && [ -x "$f" ]; then
+			vbin "$f" opensnitchd
+			break
+		fi
+	done
+
+	vinstall "default-config.json" 644 "/etc/opensnitchd/"
+	vinstall "system-fw.json" 644 "/etc/opensnitchd/"
+	vsv opensnitchd
+
+	#install ui
+	_py
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
  2021-09-12 12:23 ` apirusKde
  2021-09-13  3:57 ` [PR PATCH] [Updated] " cinerea0
@ 2021-09-21 18:36 ` cinerea0
  2021-09-21 18:40 ` cinerea0
                   ` (50 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-09-21 18:36 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 1127 bytes --]

From 5d250d633438ecd6a71e3d412ce1bfbef5e1535a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 21 Sep 2021 14:35:55 -0400
Subject: [PATCH] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (2 preceding siblings ...)
  2021-09-21 18:36 ` [PR PATCH] [Updated] New package: opensnitch-1.4.0 cinerea0
@ 2021-09-21 18:40 ` cinerea0
  2021-10-07 18:53 ` cinerea0
                   ` (49 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-09-21 18:40 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 6577 bytes --]

From 5d250d633438ecd6a71e3d412ce1bfbef5e1535a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 21 Sep 2021 14:35:55 -0400
Subject: [PATCH 1/2] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From ea101e0b616a7c5ff70bf3fe51386add3b9271bc Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 21 Sep 2021 14:39:48 -0400
Subject: [PATCH 2/2] New package: opensnitch-1.4.0

---
 srcpkgs/opensnitch/files/opensnitchd/run      |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch     | 13 ++++++++++
 srcpkgs/opensnitch/patches/go-sum.patch       | 14 ++++++++++
 srcpkgs/opensnitch/patches/musl-int.patch     | 16 ++++++++++++
 .../opensnitch/patches/protoc-gen-go.patch    | 14 ++++++++++
 srcpkgs/opensnitch/template                   | 26 +++++++++++++++++++
 6 files changed, 87 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen-go.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen-go.patch b/srcpkgs/opensnitch/patches/protoc-gen-go.patch
new file mode 100644
index 000000000000..a368a305fe95
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen-go.patch
@@ -0,0 +1,14 @@
+# Allow building with newer protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..c7429bbd96 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=paths=source_relative:../daemon/ui/protocol/
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..fe0c0076c856
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,26 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.0
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go
+ python3-PyQt5-devel-tools python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel python3-grpcio-tools"
+depends="python3-googleapis-common-protos python3-grpcio python3-slugify
+ python3-inotify python3-PyQt5 python3-PyQt5-sql qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=bd8e4a15653de22121ce2a5013952c8becb2cb965448780ca53da7a453a74be1
+
+post_install() {
+	vinstall "default-config.json" 644 "/etc/opensnitchd/"
+	vinstall "system-fw.json" 644 "/etc/opensnitchd/"
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (3 preceding siblings ...)
  2021-09-21 18:40 ` cinerea0
@ 2021-10-07 18:53 ` cinerea0
  2021-10-07 19:01 ` [PR PATCH] [Updated] New package: opensnitch-1.4.1 cinerea0
                   ` (48 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-07 18:53 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 1126 bytes --]

From 75ac22f85890fe0e068f1d64af2d3b20b75ed9e5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 14:52:40 -0400
Subject: [PATCH] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (4 preceding siblings ...)
  2021-10-07 18:53 ` cinerea0
@ 2021-10-07 19:01 ` cinerea0
  2021-10-07 19:08 ` cinerea0
                   ` (47 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-07 19:01 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 2369 bytes --]

From 75ac22f85890fe0e068f1d64af2d3b20b75ed9e5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 14:52:40 -0400
Subject: [PATCH 1/2] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 32f2a9b8312923a12c314ab2f24a2509fb9e4be5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 15:01:18 -0400
Subject: [PATCH 2/2] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (5 preceding siblings ...)
  2021-10-07 19:01 ` [PR PATCH] [Updated] New package: opensnitch-1.4.1 cinerea0
@ 2021-10-07 19:08 ` cinerea0
  2021-10-08  5:23 ` cinerea0
                   ` (46 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-07 19:08 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 8548 bytes --]

From 75ac22f85890fe0e068f1d64af2d3b20b75ed9e5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 14:52:40 -0400
Subject: [PATCH 1/3] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 32f2a9b8312923a12c314ab2f24a2509fb9e4be5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 15:01:18 -0400
Subject: [PATCH 2/3] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From 3e226516af1e12c0247837e67e9f8bb47acc273c Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 15:08:11 -0400
Subject: [PATCH 3/3] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 +++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 ++++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 +++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 27 ++++++++++++++++++
 srcpkgs/opensnitch/template                 | 31 +++++++++++++++++++++
 6 files changed, 105 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..9ce0a446c2f1
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,27 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c043fd..d33a1088ba 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -16,6 +16,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..c79a40d77de9
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,31 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-pip python3-PyQt5-devel-tools python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel python3-grpcio-tools
+ python3-inotify python3-slugify python3-Unidecode"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-slugify qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (6 preceding siblings ...)
  2021-10-07 19:08 ` cinerea0
@ 2021-10-08  5:23 ` cinerea0
  2021-10-12  3:42 ` cinerea0
                   ` (45 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-08  5:23 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 8895 bytes --]

From 75ac22f85890fe0e068f1d64af2d3b20b75ed9e5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 14:52:40 -0400
Subject: [PATCH 1/3] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 32f2a9b8312923a12c314ab2f24a2509fb9e4be5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 15:01:18 -0400
Subject: [PATCH 2/3] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From beb6eeb3c4edfa31c2c54c93bad5fb6eb02590a2 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 8 Oct 2021 01:22:43 -0400
Subject: [PATCH 3/3] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/template                 | 32 +++++++++++++++++++
 6 files changed, 114 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..b0df8f8f6bda
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,32 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel python3-inotify
+ python3-slugify python3-Unidecode"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-slugify qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (7 preceding siblings ...)
  2021-10-08  5:23 ` cinerea0
@ 2021-10-12  3:42 ` cinerea0
  2021-10-12  3:49 ` cinerea0
                   ` (44 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-12  3:42 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 1127 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (8 preceding siblings ...)
  2021-10-12  3:42 ` cinerea0
@ 2021-10-12  3:49 ` cinerea0
  2021-10-12  3:56 ` cinerea0
                   ` (43 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-12  3:49 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 2371 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/2] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/2] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (9 preceding siblings ...)
  2021-10-12  3:49 ` cinerea0
@ 2021-10-12  3:56 ` cinerea0
  2021-10-12  4:12 ` cinerea0
                   ` (42 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-12  3:56 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 3563 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/3] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/3] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From f396e91d4a4d4d1e5dc5764d33a9c859845e6867 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:56:33 -0400
Subject: [PATCH 3/3] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..44d9df3dbc7c
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,17 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+
+post_install() {
+	vlicense LICENSE
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (10 preceding siblings ...)
  2021-10-12  3:56 ` cinerea0
@ 2021-10-12  4:12 ` cinerea0
  2021-10-12  4:26 ` cinerea0
                   ` (41 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-12  4:12 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 3618 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/3] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/3] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From 9e55d8f8b91a1c9344d92d76fbb2140cf56cfebd Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:12:07 -0400
Subject: [PATCH 3/3] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..c5b173413478
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check="No, checks were not ported from python2"
+
+post_install() {
+	vlicense LICENSE
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (11 preceding siblings ...)
  2021-10-12  4:12 ` cinerea0
@ 2021-10-12  4:26 ` cinerea0
  2021-10-12 16:07 ` cinerea0
                   ` (40 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-12  4:26 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 3618 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/3] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/3] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From a45b829d4b25b4bdc36fddd3e62ef3de65b16945 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:25:51 -0400
Subject: [PATCH 3/3] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (12 preceding siblings ...)
  2021-10-12  4:26 ` cinerea0
@ 2021-10-12 16:07 ` cinerea0
  2021-10-12 17:52 ` cinerea0
                   ` (39 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-12 16:07 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 10240 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From a45b829d4b25b4bdc36fddd3e62ef3de65b16945 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:25:51 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 6eef91a381a3ecba1f503c3377a0b069985b5448 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 12:06:52 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/template                 | 33 +++++++++++++++++++
 6 files changed, 115 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..5fdfc7916c71
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,33 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel python3-inotify
+ python3-slugify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-slugify qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+nocross="https://github.com/void-linux/void-packages/runs/3835106512"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (13 preceding siblings ...)
  2021-10-12 16:07 ` cinerea0
@ 2021-10-12 17:52 ` cinerea0
  2021-10-13  0:09 ` cinerea0
                   ` (38 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-12 17:52 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 10235 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From a45b829d4b25b4bdc36fddd3e62ef3de65b16945 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:25:51 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 7d6a8cfd0587d432f07ab723fac13ac7e877603e Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 13:51:54 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 6 files changed, 116 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..dd39186ba639
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-unicode-slugify qt5-wayland
+ qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+nocross="https://github.com/void-linux/void-packages/runs/3835106512"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (14 preceding siblings ...)
  2021-10-12 17:52 ` cinerea0
@ 2021-10-13  0:09 ` cinerea0
  2021-10-13  0:19 ` cinerea0
                   ` (37 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-13  0:09 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 10253 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From a45b829d4b25b4bdc36fddd3e62ef3de65b16945 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:25:51 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From d0fc4250f8fb8e6835ce5eaf768c0dd6d734fe3d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 20:06:58 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 6 files changed, 116 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..3fb7c582fe30
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+nocross="https://github.com/void-linux/void-packages/runs/3835106512"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (15 preceding siblings ...)
  2021-10-13  0:09 ` cinerea0
@ 2021-10-13  0:19 ` cinerea0
  2021-10-13  0:52 ` ericonr
                   ` (36 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-13  0:19 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1058 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-941788614

Comment:
While this does build correctly, it now has a runtime error as follows:

```
Loading translations: /usr/lib/python3.10/site-packages/opensnitch/i18n locale: en_US
Traceback (most recent call last):
  File "/usr/sbin/opensnitch-ui", line 60, in <module>
    service = UIService(app, on_exit)
  File "/usr/lib/python3.10/site-packages/opensnitch/service.py", line 79, in __init__
    self._stats_dialog = StatsDialog(dbname="general", db=self._db)
  File "/usr/lib/python3.10/site-packages/opensnitch/dialogs/stats.py", line 446, in __init__
    self._load_settings()
  File "/usr/lib/python3.10/site-packages/opensnitch/dialogs/stats.py", line 548, in _load_settings
    self.rulesSplitter.setSizes([w/4, w/2])
TypeError: index 0 has type 'float' but 'int' is expected
```

I need to do some investigation to see if this is due to the recent 3.10 upgrade or if this is something upstream needs to fix.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (16 preceding siblings ...)
  2021-10-13  0:19 ` cinerea0
@ 2021-10-13  0:52 ` ericonr
  2021-10-13  3:09 ` [PR PATCH] [Updated] " cinerea0
                   ` (35 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: ericonr @ 2021-10-13  0:52 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 176 bytes --]

New comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-941806327

Comment:
`w//4, w//2` might work as a patch.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (17 preceding siblings ...)
  2021-10-13  0:52 ` ericonr
@ 2021-10-13  3:09 ` cinerea0
  2021-10-13  4:50 ` cinerea0
                   ` (34 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-13  3:09 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 11480 bytes --]

From 260e172a582e51b1b674a69abc2bc5c1327ce12d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 93b0ed5d05c5ece3aedcc162a51cc68045c7885d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From afed3f83236cd6024e0631dcf5fc1fa090144a6c Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:25:51 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 98d11ef1e990356557475acdfc49c8bb71655343 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 22:51:40 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/patches/stats-type.patch | 15 +++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 7 files changed, 131 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/patches/stats-type.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/patches/stats-type.patch b/srcpkgs/opensnitch/patches/stats-type.patch
new file mode 100644
index 000000000000..54e3b4f2b273
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/stats-type.patch
@@ -0,0 +1,15 @@
+# Fix crash due to type mismatch, should be in next release
+# https://github.com/evilsocket/opensnitch/commit/9ef64da588c4ec40c6cfe3e2f531029161e7dc73
+diff --git a/ui/opensnitch/dialogs/stats.py b/ui/opensnitch/dialogs/stats.py
+index 7f03fafd..6db559b3 100644
+--- a/ui/opensnitch/dialogs/stats.py
++++ b/ui/opensnitch/dialogs/stats.py
+@@ -547,7 +547,7 @@ def _load_settings(self):
+                 self.comboRulesFilter.setVisible(rulesSizes[0] == 0)
+         else:
+             w = self.rulesSplitter.width()
+-            self.rulesSplitter.setSizes([w/4, w/2])
++            self.rulesSplitter.setSizes([int(w/4), int(w/2)])
+ 
+         self._restore_details_view_columns(self.eventsTable.horizontalHeader(), Config.STATS_GENERAL_COL_STATE)
+         self._restore_details_view_columns(self.nodesTable.horizontalHeader(), Config.STATS_NODES_COL_STATE)
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..3fb7c582fe30
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+nocross="https://github.com/void-linux/void-packages/runs/3835106512"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (18 preceding siblings ...)
  2021-10-13  3:09 ` [PR PATCH] [Updated] " cinerea0
@ 2021-10-13  4:50 ` cinerea0
  2021-10-27 14:12 ` [PR PATCH] [Updated] " cinerea0
                   ` (33 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-13  4:50 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 268 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-941919237

Comment:
@ericonr I incorporated a commit from upstream that fixes the issue as a patch. I'm no longer experiencing any runtime errors.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (19 preceding siblings ...)
  2021-10-13  4:50 ` cinerea0
@ 2021-10-27 14:12 ` cinerea0
  2021-10-27 14:17 ` cinerea0
                   ` (32 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-27 14:12 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 11500 bytes --]

From 260e172a582e51b1b674a69abc2bc5c1327ce12d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 93b0ed5d05c5ece3aedcc162a51cc68045c7885d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From afed3f83236cd6024e0631dcf5fc1fa090144a6c Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:25:51 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From e0cdfef96914a2886099f6f071e01e4e5ffedd06 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 27 Oct 2021 10:12:22 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/patches/stats-type.patch | 15 +++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 7 files changed, 131 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/patches/stats-type.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/patches/stats-type.patch b/srcpkgs/opensnitch/patches/stats-type.patch
new file mode 100644
index 000000000000..54e3b4f2b273
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/stats-type.patch
@@ -0,0 +1,15 @@
+# Fix crash due to type mismatch, should be in next release
+# https://github.com/evilsocket/opensnitch/commit/9ef64da588c4ec40c6cfe3e2f531029161e7dc73
+diff --git a/ui/opensnitch/dialogs/stats.py b/ui/opensnitch/dialogs/stats.py
+index 7f03fafd..6db559b3 100644
+--- a/ui/opensnitch/dialogs/stats.py
++++ b/ui/opensnitch/dialogs/stats.py
+@@ -547,7 +547,7 @@ def _load_settings(self):
+                 self.comboRulesFilter.setVisible(rulesSizes[0] == 0)
+         else:
+             w = self.rulesSplitter.width()
+-            self.rulesSplitter.setSizes([w/4, w/2])
++            self.rulesSplitter.setSizes([int(w/4), int(w/2)])
+ 
+         self._restore_details_view_columns(self.eventsTable.horizontalHeader(), Config.STATS_GENERAL_COL_STATE)
+         self._restore_details_view_columns(self.nodesTable.horizontalHeader(), Config.STATS_NODES_COL_STATE)
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..b4e93752a8d3
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (20 preceding siblings ...)
  2021-10-27 14:12 ` [PR PATCH] [Updated] " cinerea0
@ 2021-10-27 14:17 ` cinerea0
  2021-11-05  2:56 ` cinerea0
                   ` (31 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-10-27 14:17 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 11500 bytes --]

From d28e95ad3d50668bb28e091fdf5415fbb18c7f2e Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 27 Oct 2021 10:15:14 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 5a3f94179f528897a19793dbbb25624bdf852fa7 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 27 Oct 2021 10:15:44 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From a4c28ef78ba77a1e160f61fead5c8fdf952dd737 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 27 Oct 2021 10:16:07 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 426b08ebbbcc0e813df98e75435c7b920726efae Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 27 Oct 2021 10:16:38 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/patches/stats-type.patch | 15 +++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 7 files changed, 131 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/patches/stats-type.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/patches/stats-type.patch b/srcpkgs/opensnitch/patches/stats-type.patch
new file mode 100644
index 000000000000..54e3b4f2b273
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/stats-type.patch
@@ -0,0 +1,15 @@
+# Fix crash due to type mismatch, should be in next release
+# https://github.com/evilsocket/opensnitch/commit/9ef64da588c4ec40c6cfe3e2f531029161e7dc73
+diff --git a/ui/opensnitch/dialogs/stats.py b/ui/opensnitch/dialogs/stats.py
+index 7f03fafd..6db559b3 100644
+--- a/ui/opensnitch/dialogs/stats.py
++++ b/ui/opensnitch/dialogs/stats.py
+@@ -547,7 +547,7 @@ def _load_settings(self):
+                 self.comboRulesFilter.setVisible(rulesSizes[0] == 0)
+         else:
+             w = self.rulesSplitter.width()
+-            self.rulesSplitter.setSizes([w/4, w/2])
++            self.rulesSplitter.setSizes([int(w/4), int(w/2)])
+ 
+         self._restore_details_view_columns(self.eventsTable.horizontalHeader(), Config.STATS_GENERAL_COL_STATE)
+         self._restore_details_view_columns(self.nodesTable.horizontalHeader(), Config.STATS_NODES_COL_STATE)
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..b4e93752a8d3
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (21 preceding siblings ...)
  2021-10-27 14:17 ` cinerea0
@ 2021-11-05  2:56 ` cinerea0
  2021-11-12  4:54 ` New package: opensnitch-1.4.2 cinerea0
                   ` (30 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-11-05  2:56 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 10269 bytes --]

From 04ffe0675789157b166c881146ea73ad1ce504f2 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 4 Nov 2021 22:55:21 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 9872f46bcdb387812e46523af0101b896fb78185 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 4 Nov 2021 22:55:42 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From 0c8cb1770a48b1883ab9395a178ff19a15fa5072 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 4 Nov 2021 22:56:09 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.5

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 843c74a9f777425947ec06563e09b8599030469e Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 4 Nov 2021 22:56:31 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.2

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 6 files changed, 116 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..666075523bbe
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.2
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=0cf518921273c55c8621ccd093aec2b4c1d0a21956f6fc65ffc929fa960c4fa4
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.4.2
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (22 preceding siblings ...)
  2021-11-05  2:56 ` cinerea0
@ 2021-11-12  4:54 ` cinerea0
  2021-11-25  0:20 ` [PR PATCH] [Updated] " cinerea0
                   ` (29 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-11-12  4:54 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 170 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-966819995

Comment:
@ericonr Pinging for review.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.2
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (23 preceding siblings ...)
  2021-11-12  4:54 ` New package: opensnitch-1.4.2 cinerea0
@ 2021-11-25  0:20 ` cinerea0
  2022-02-05  2:25 ` [PR PATCH] [Updated] New package: opensnitch-1.4.3 cinerea0
                   ` (28 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2021-11-25  0:20 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.2
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 10273 bytes --]

From beb92d172df981ba579fc9b3884d777ed1c9d92f Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 24 Nov 2021 19:18:09 -0500
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From ce583f28ea29f8d4f037e3c4b3834d4f23031004 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 24 Nov 2021 19:18:36 -0500
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From 96c48b26544ce24fb655d7ba6ed333930185ffe3 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 24 Nov 2021 19:19:10 -0500
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.5

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 462bb811543ef72935108ccf4faad350e9769185 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 24 Nov 2021 19:19:32 -0500
Subject: [PATCH 4/4] New package: opensnitch-1.4.3

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 6 files changed, 116 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..2c4791aa119e
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.3
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a599b35f303359324b76d2f823ba00a85db93548ec2eb1c4c3b26fe6a6abe2e4
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.3
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (24 preceding siblings ...)
  2021-11-25  0:20 ` [PR PATCH] [Updated] " cinerea0
@ 2022-02-05  2:25 ` cinerea0
  2022-02-05  3:12 ` [PR PATCH] [Updated] New package: opensnitch-1.5.0 cinerea0
                   ` (27 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2022-02-05  2:25 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.3
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 7646 bytes --]

From 2749d0e9bb638f8911e194d7f3e22f8806da80c6 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:22:56 -0500
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1.

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 836ecbf4c4a03a818f63e2288adbc31c7ea9f674 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:23:36 -0500
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.2.0.

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From cfa3fad80c0f8bf689f2fc37e93ce92a03d592b5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:24:06 -0500
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.5.

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 6d0580f356bc8fc7a360b6f9a5b09493750369e4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:24:42 -0500
Subject: [PATCH 4/4] New package: opensnitch-1.5.0.

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch | 13 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch | 16 +++++++++++
 srcpkgs/opensnitch/template               | 34 +++++++++++++++++++++++
 4 files changed, 67 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..64c2a0f1008e
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.0
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=9af9a72d18d1af70fe82f5e6f2c37cd6e91652521fdfa7cef964ac7d992f0356
+nopie_files="/usr/bin/opensnitchd"
+#nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (25 preceding siblings ...)
  2022-02-05  2:25 ` [PR PATCH] [Updated] New package: opensnitch-1.4.3 cinerea0
@ 2022-02-05  3:12 ` cinerea0
  2022-02-06 22:59 ` [PR REVIEW] " ericonr
                   ` (26 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2022-02-05  3:12 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 7645 bytes --]

From 2749d0e9bb638f8911e194d7f3e22f8806da80c6 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:22:56 -0500
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1.

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 836ecbf4c4a03a818f63e2288adbc31c7ea9f674 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:23:36 -0500
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.2.0.

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From cfa3fad80c0f8bf689f2fc37e93ce92a03d592b5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:24:06 -0500
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.5.

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 6f4545f506e272f9934eb19e6d8c65f4e1e9fa8c Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 22:12:00 -0500
Subject: [PATCH 4/4] New package: opensnitch-1.5.0.

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch | 13 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch | 16 +++++++++++
 srcpkgs/opensnitch/template               | 34 +++++++++++++++++++++++
 4 files changed, 67 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..70166ca6f65b
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.0
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=9af9a72d18d1af70fe82f5e6f2c37cd6e91652521fdfa7cef964ac7d992f0356
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (28 preceding siblings ...)
  2022-02-06 22:59 ` ericonr
@ 2022-02-06 22:59 ` ericonr
  2022-02-07  1:30 ` cinerea0
                   ` (23 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: ericonr @ 2022-02-06 22:59 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 253 bytes --]

New review comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800244759

Comment:
Please try upstreaming usage of proper types

Just `uintX_t` is enough and `unsigned` instead of `uint`.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (26 preceding siblings ...)
  2022-02-05  3:12 ` [PR PATCH] [Updated] New package: opensnitch-1.5.0 cinerea0
@ 2022-02-06 22:59 ` ericonr
  2022-02-06 22:59 ` ericonr
                   ` (25 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: ericonr @ 2022-02-06 22:59 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 215 bytes --]

New review comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800245092

Comment:
```suggestion
[ -r ./conf ] && . ./conf
```

Nit for consistency

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (27 preceding siblings ...)
  2022-02-06 22:59 ` [PR REVIEW] " ericonr
@ 2022-02-06 22:59 ` ericonr
  2022-02-06 22:59 ` ericonr
                   ` (24 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: ericonr @ 2022-02-06 22:59 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 237 bytes --]

New review comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800244678

Comment:
Is this so our cross-cc wrapper catches it?

If yes, please document on top of the patch

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (29 preceding siblings ...)
  2022-02-06 22:59 ` ericonr
@ 2022-02-07  1:30 ` cinerea0
  2022-02-07  2:27 ` ericonr
                   ` (22 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2022-02-07  1:30 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 377 bytes --]

New review comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800266431

Comment:
> Please try upstreaming usage of proper types

To clarify, do you mean that I should try upstreaming the patch after I fix it, or should I try altering the rest of the header to use the full type definitions and upstream that?

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (30 preceding siblings ...)
  2022-02-07  1:30 ` cinerea0
@ 2022-02-07  2:27 ` ericonr
  2022-02-07  2:27 ` ericonr
                   ` (21 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: ericonr @ 2022-02-07  2:27 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 319 bytes --]

New review comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800279094

Comment:
Try upstreaming a change in upstream code to use `uintX_t` directly instead of `u_intX_t`, since the latter is silly and nonstandard. Same for `unsigned` instead of `uint`.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (31 preceding siblings ...)
  2022-02-07  2:27 ` ericonr
@ 2022-02-07  2:27 ` ericonr
  2022-02-07  4:23 ` [PR PATCH] [Updated] " cinerea0
                   ` (20 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: ericonr @ 2022-02-07  2:27 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 219 bytes --]

New review comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800279185

Comment:
The typedefs shouldn't be necessary, because the types shouldn't be used

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (32 preceding siblings ...)
  2022-02-07  2:27 ` ericonr
@ 2022-02-07  4:23 ` cinerea0
  2022-02-07  4:42 ` cinerea0
                   ` (19 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2022-02-07  4:23 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 8647 bytes --]

From 0c5820662793e27bccb82edf144afb6682a1020b Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:22:11 -0500
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1.

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 5926ce6b6843b916058bcb72bdc137a08f70e47d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:22:32 -0500
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.2.0.

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From 8fb07bae9172013174640545f12504adb6e333d4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:22:55 -0500
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.5.

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 1deba5b1cf38ec0aec2714e2bbbac8b4bf599b0b Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:23:33 -0500
Subject: [PATCH 4/4] New package: opensnitch-1.5.0.

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch | 14 +++++++++
 srcpkgs/opensnitch/patches/musl.patch     | 35 +++++++++++++++++++++++
 srcpkgs/opensnitch/template               | 34 ++++++++++++++++++++++
 4 files changed, 87 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..17d202f1da0f
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r ./conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..0c3f52b47ef2
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,14 @@
+# Adjustment for our cross-cc wrapper
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl.patch b/srcpkgs/opensnitch/patches/musl.patch
new file mode 100644
index 000000000000..ba5d7284e08c
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl.patch
@@ -0,0 +1,35 @@
+diff --git a/daemon/netfilter/queue.h.old b/daemon/netfilter/queue.h
+index 64c3ea7..998278a 100644
+--- a/daemon/netfilter/queue.h.old
++++ b/daemon/netfilter/queue.h
+@@ -15,16 +15,16 @@
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+ 
+ typedef struct {
+-    uint verdict;
+-    uint mark;
+-    uint mark_set;
+-    uint length;
++    unsigned int verdict;
++    unsigned int mark;
++    unsigned int mark_set;
++    unsigned int length;
+     unsigned char *data;
+ } verdictContainer;
+ 
+ static void *get_uid = NULL;
+ 
+-extern void go_callback(int id, unsigned char* data, int len, uint mark, u_int32_t idx, verdictContainer *vc, uint32_t uid);
++extern void go_callback(int id, unsigned char* data, int len, unsigned int mark, uint32_t idx, verdictContainer *vc, uint32_t uid);
+ 
+ static uint8_t stop = 0;
+ 
+@@ -80,7 +80,7 @@ static int nf_callback(struct nfq_q_handle *qh, struct nfgenmsg *nfmsg, struct n
+     return nfq_set_verdict2(qh, id, vc.verdict, vc.mark, vc.length, vc.data);
+ }
+ 
+-static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, u_int16_t queue, u_int32_t idx) {
++static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, uint16_t queue, uint32_t idx) {
+     struct nfq_q_handle* qh = nfq_create_queue(h, queue, &nf_callback, (void*)((uintptr_t)idx));
+     if (qh == NULL){
+         printf("ERROR: nfq_create_queue() queue not created\n");
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..70166ca6f65b
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.0
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=9af9a72d18d1af70fe82f5e6f2c37cd6e91652521fdfa7cef964ac7d992f0356
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (33 preceding siblings ...)
  2022-02-07  4:23 ` [PR PATCH] [Updated] " cinerea0
@ 2022-02-07  4:42 ` cinerea0
  2022-02-07  4:52 ` [PR REVIEW] " cinerea0
                   ` (18 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2022-02-07  4:42 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 10206 bytes --]

From 0c5820662793e27bccb82edf144afb6682a1020b Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:22:11 -0500
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1.

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 5926ce6b6843b916058bcb72bdc137a08f70e47d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:22:32 -0500
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.2.0.

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From 8fb07bae9172013174640545f12504adb6e333d4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:22:55 -0500
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.5.

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 4cae46f0404d45dba3f0722f46ff75e50f9ab758 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:41:46 -0500
Subject: [PATCH 4/4] New package: opensnitch-1.5.0.

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 ++
 srcpkgs/opensnitch/patches/cc-check.patch | 14 +++++
 srcpkgs/opensnitch/patches/musl.patch     | 65 +++++++++++++++++++++++
 srcpkgs/opensnitch/template               | 34 ++++++++++++
 4 files changed, 117 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..17d202f1da0f
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r ./conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..0c3f52b47ef2
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,14 @@
+# Adjustment for our cross-cc wrapper
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl.patch b/srcpkgs/opensnitch/patches/musl.patch
new file mode 100644
index 000000000000..039d00db7529
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl.patch
@@ -0,0 +1,65 @@
+diff --git a/daemon/netfilter/queue.h.old b/daemon/netfilter/queue.h
+index 64c3ea7..998278a 100644
+--- a/daemon/netfilter/queue.h.old
++++ b/daemon/netfilter/queue.h
+@@ -15,16 +15,16 @@
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+ 
+ typedef struct {
+-    uint verdict;
+-    uint mark;
+-    uint mark_set;
+-    uint length;
++    unsigned int verdict;
++    unsigned int mark;
++    unsigned int mark_set;
++    unsigned int length;
+     unsigned char *data;
+ } verdictContainer;
+ 
+ static void *get_uid = NULL;
+ 
+-extern void go_callback(int id, unsigned char* data, int len, uint mark, u_int32_t idx, verdictContainer *vc, uint32_t uid);
++extern void go_callback(int id, unsigned char* data, int len, unsigned int mark, uint32_t idx, verdictContainer *vc, uint32_t uid);
+ 
+ static uint8_t stop = 0;
+ 
+@@ -80,7 +80,7 @@ static int nf_callback(struct nfq_q_handle *qh, struct nfgenmsg *nfmsg, struct n
+     return nfq_set_verdict2(qh, id, vc.verdict, vc.mark, vc.length, vc.data);
+ }
+ 
+-static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, u_int16_t queue, u_int32_t idx) {
++static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, uint16_t queue, uint32_t idx) {
+     struct nfq_q_handle* qh = nfq_create_queue(h, queue, &nf_callback, (void*)((uintptr_t)idx));
+     if (qh == NULL){
+         printf("ERROR: nfq_create_queue() queue not created\n");
+diff --git a/daemon/netfilter/queue.go.old b/daemon/netfilter/queue.go
+index 902d1dd..016ee92 100644
+--- a/daemon/netfilter/queue.go.old
++++ b/daemon/netfilter/queue.go
+@@ -92,7 +92,7 @@ func (q *Queue) create(queueID uint16) (err error) {
+ 		return fmt.Errorf("Error binding to AF_INET protocol family: %v", err)
+ 	} else if ret, err := C.nfq_bind_pf(q.h, AF_INET6); err != nil || ret < 0 {
+ 		return fmt.Errorf("Error binding to AF_INET6 protocol family: %v", err)
+-	} else if q.qh, err = C.CreateQueue(q.h, C.u_int16_t(queueID), C.u_int32_t(q.idx)); err != nil || q.qh == nil {
++	} else if q.qh, err = C.CreateQueue(q.h, C.uint16_t(queueID), C.uint32_t(q.idx)); err != nil || q.qh == nil {
+ 		q.destroy()
+ 		return fmt.Errorf("Error binding to queue: %v", err)
+ 	}
+@@ -107,14 +107,14 @@ func (q *Queue) create(queueID uint16) (err error) {
+ func (q *Queue) setup() (err error) {
+ 	var ret C.int
+ 
+-	queueSize := C.u_int32_t(NF_DEFAULT_QUEUE_SIZE)
++	queueSize := C.uint32_t(NF_DEFAULT_QUEUE_SIZE)
+ 	bufferSize := C.uint(NF_DEFAULT_PACKET_SIZE)
+ 	totSize := C.uint(NF_DEFAULT_QUEUE_SIZE * NF_DEFAULT_PACKET_SIZE)
+ 
+ 	if ret, err = C.nfq_set_queue_maxlen(q.qh, queueSize); err != nil || ret < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set max packets in queue: %v", err)
+-	} else if C.nfq_set_mode(q.qh, C.u_int8_t(2), bufferSize) < 0 {
++	} else if C.nfq_set_mode(q.qh, C.uint8_t(2), bufferSize) < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set packets copy mode: %v", err)
+ 	} else if q.fd, err = C.nfq_fd(q.h); err != nil {
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..70166ca6f65b
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.0
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=9af9a72d18d1af70fe82f5e6f2c37cd6e91652521fdfa7cef964ac7d992f0356
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (34 preceding siblings ...)
  2022-02-07  4:42 ` cinerea0
@ 2022-02-07  4:52 ` cinerea0
  2022-02-20  2:30 ` cinerea0
                   ` (17 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2022-02-07  4:52 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 266 bytes --]

New review comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800313889

Comment:
Before I submit my changes upstream, can you take a look at the changes I made in the patch and see if they look good?

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (35 preceding siblings ...)
  2022-02-07  4:52 ` [PR REVIEW] " cinerea0
@ 2022-02-20  2:30 ` cinerea0
  2022-06-03  2:11 ` github-actions
                   ` (16 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2022-02-20  2:30 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 235 bytes --]

New review comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r810560296

Comment:
My changes have been accepted upstream and will likely be included in the next release.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (36 preceding siblings ...)
  2022-02-20  2:30 ` cinerea0
@ 2022-06-03  2:11 ` github-actions
  2022-06-04  2:40 ` [PR PATCH] [Updated] " cinerea0
                   ` (15 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: github-actions @ 2022-06-03  2:11 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 305 bytes --]

New comment by github-actions[bot] on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1145518901

Comment:
Pull Requests become stale 90 days after last activity and are closed 14 days after that.  If this pull request is still relevant bump it or assign it.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (37 preceding siblings ...)
  2022-06-03  2:11 ` github-actions
@ 2022-06-04  2:40 ` cinerea0
  2022-06-04  2:56 ` [PR PATCH] [Updated] New package: opensnitch-1.5.1 cinerea0
                   ` (14 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2022-06-04  2:40 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 12195 bytes --]

From 898b5b83ef807411420b29f53f9a850a0e0d512b Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:37:04 -0400
Subject: [PATCH 1/5] New package: protobuf-go-1.28.0

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..2260246de16a
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.28.0
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=e59ae9ace31c3a84bddf1bc3f04a04c498adb9ea7f9fcde60db91bba33d55171
+
+post_install() {
+	vlicense LICENSE
+}

From ce0ed3b77304452e326564248a5763c55d398aba Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:37:24 -0400
Subject: [PATCH 2/5] New package: protoc-gen-go-grpc-1.2.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From 4f392371d70d9bc290750fa5e982e61873918b1a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:38:00 -0400
Subject: [PATCH 3/5] New package: python3-unicode-slugify-0.1.5

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From c7d96db27b3e28115c968e62f27ccdb5943cb524 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:39:43 -0400
Subject: [PATCH 4/5] New package: python3-qt-material-2.12

---
 srcpkgs/python3-qt-material/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-qt-material/template

diff --git a/srcpkgs/python3-qt-material/template b/srcpkgs/python3-qt-material/template
new file mode 100644
index 000000000000..115ffa065469
--- /dev/null
+++ b/srcpkgs/python3-qt-material/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-qt-material'
+pkgname=python3-qt-material
+version=2.12
+revision=1
+wrksrc="qt-material-${version}"
+build_style=python3-module
+hostmakedepends="python3-Jinja2 python3-setuptools"
+depends="python3-Jinja2 python3-MarkupSafe"
+short_desc="Material inspired stylesheet for PySide2, PySide6, PyQt5 and PyQt6"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-2-Clause"
+homepage="https://pypi.org/project/qt-material/"
+distfiles="${PYPI_SITE}/q/qt-material/qt-material-${version}.tar.gz"
+checksum=4ead6710b4fa64f94963bf359422e077a032a84ec8c350804ff743d1be7f4657
+
+post_install() {
+	vlicense LICENSE
+}

From 7cf3a7a8ed67969486782584cbae53c7e1269a35 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:40:10 -0400
Subject: [PATCH 5/5] New package: opensnitch-1.5.1

---
 srcpkgs/opensnitch/files/opensnitchd/run      |  4 ++
 srcpkgs/opensnitch/patches/cc-check.patch     | 14 ++++
 srcpkgs/opensnitch/patches/musl.patch         | 65 +++++++++++++++++++
 .../patches/update-requirements.patch         | 12 ++++
 srcpkgs/opensnitch/template                   | 35 ++++++++++
 5 files changed, 130 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl.patch
 create mode 100644 srcpkgs/opensnitch/patches/update-requirements.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..17d202f1da0f
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r ./conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..0c3f52b47ef2
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,14 @@
+# Adjustment for our cross-cc wrapper
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl.patch b/srcpkgs/opensnitch/patches/musl.patch
new file mode 100644
index 000000000000..039d00db7529
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl.patch
@@ -0,0 +1,65 @@
+diff --git a/daemon/netfilter/queue.h.old b/daemon/netfilter/queue.h
+index 64c3ea7..998278a 100644
+--- a/daemon/netfilter/queue.h.old
++++ b/daemon/netfilter/queue.h
+@@ -15,16 +15,16 @@
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+ 
+ typedef struct {
+-    uint verdict;
+-    uint mark;
+-    uint mark_set;
+-    uint length;
++    unsigned int verdict;
++    unsigned int mark;
++    unsigned int mark_set;
++    unsigned int length;
+     unsigned char *data;
+ } verdictContainer;
+ 
+ static void *get_uid = NULL;
+ 
+-extern void go_callback(int id, unsigned char* data, int len, uint mark, u_int32_t idx, verdictContainer *vc, uint32_t uid);
++extern void go_callback(int id, unsigned char* data, int len, unsigned int mark, uint32_t idx, verdictContainer *vc, uint32_t uid);
+ 
+ static uint8_t stop = 0;
+ 
+@@ -80,7 +80,7 @@ static int nf_callback(struct nfq_q_handle *qh, struct nfgenmsg *nfmsg, struct n
+     return nfq_set_verdict2(qh, id, vc.verdict, vc.mark, vc.length, vc.data);
+ }
+ 
+-static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, u_int16_t queue, u_int32_t idx) {
++static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, uint16_t queue, uint32_t idx) {
+     struct nfq_q_handle* qh = nfq_create_queue(h, queue, &nf_callback, (void*)((uintptr_t)idx));
+     if (qh == NULL){
+         printf("ERROR: nfq_create_queue() queue not created\n");
+diff --git a/daemon/netfilter/queue.go.old b/daemon/netfilter/queue.go
+index 902d1dd..016ee92 100644
+--- a/daemon/netfilter/queue.go.old
++++ b/daemon/netfilter/queue.go
+@@ -92,7 +92,7 @@ func (q *Queue) create(queueID uint16) (err error) {
+ 		return fmt.Errorf("Error binding to AF_INET protocol family: %v", err)
+ 	} else if ret, err := C.nfq_bind_pf(q.h, AF_INET6); err != nil || ret < 0 {
+ 		return fmt.Errorf("Error binding to AF_INET6 protocol family: %v", err)
+-	} else if q.qh, err = C.CreateQueue(q.h, C.u_int16_t(queueID), C.u_int32_t(q.idx)); err != nil || q.qh == nil {
++	} else if q.qh, err = C.CreateQueue(q.h, C.uint16_t(queueID), C.uint32_t(q.idx)); err != nil || q.qh == nil {
+ 		q.destroy()
+ 		return fmt.Errorf("Error binding to queue: %v", err)
+ 	}
+@@ -107,14 +107,14 @@ func (q *Queue) create(queueID uint16) (err error) {
+ func (q *Queue) setup() (err error) {
+ 	var ret C.int
+ 
+-	queueSize := C.u_int32_t(NF_DEFAULT_QUEUE_SIZE)
++	queueSize := C.uint32_t(NF_DEFAULT_QUEUE_SIZE)
+ 	bufferSize := C.uint(NF_DEFAULT_PACKET_SIZE)
+ 	totSize := C.uint(NF_DEFAULT_QUEUE_SIZE * NF_DEFAULT_PACKET_SIZE)
+ 
+ 	if ret, err = C.nfq_set_queue_maxlen(q.qh, queueSize); err != nil || ret < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set max packets in queue: %v", err)
+-	} else if C.nfq_set_mode(q.qh, C.u_int8_t(2), bufferSize) < 0 {
++	} else if C.nfq_set_mode(q.qh, C.uint8_t(2), bufferSize) < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set packets copy mode: %v", err)
+ 	} else if q.fd, err = C.nfq_fd(q.h); err != nil {
diff --git a/srcpkgs/opensnitch/patches/update-requirements.patch b/srcpkgs/opensnitch/patches/update-requirements.patch
new file mode 100644
index 000000000000..b276df389203
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/update-requirements.patch
@@ -0,0 +1,12 @@
+# update version to match our package
+diff --git a/ui/requirements.txt b/ui/requirements.txt
+index f29cc1b4ef..66e0de13b2 100644
+--- a/ui/requirements.txt
++++ b/ui/requirements.txt
+@@ -1,5 +1,5 @@
+ grpcio-tools>=1.10.1
+ pyinotify==0.9.6
+-unicode_slugify==0.1.3
++unicode_slugify==0.1.5
+ pyqt5>=5.6
+ protobuf
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..f8e54f6394d8
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,35 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-inotify
+ python3-unicode-slugify python3-Unidecode"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-notify2 python3-pyasn1 python3-PyQt5 python3-PyQt5-sql
+ python3-qt-material python3-unicode-slugify python3-Unidecode qt5-wayland
+ qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=f0e1aa0d6c52ac11d32c8f778479c2d1cecbb733d784e88bf4ecd19580930d4f
+nopie_files="/usr/bin/opensnitchd"
+#nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (38 preceding siblings ...)
  2022-06-04  2:40 ` [PR PATCH] [Updated] " cinerea0
@ 2022-06-04  2:56 ` cinerea0
  2022-06-04  3:11 ` cinerea0
                   ` (13 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2022-06-04  2:56 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 11472 bytes --]

From 898b5b83ef807411420b29f53f9a850a0e0d512b Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:37:04 -0400
Subject: [PATCH 1/5] New package: protobuf-go-1.28.0

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..2260246de16a
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.28.0
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=e59ae9ace31c3a84bddf1bc3f04a04c498adb9ea7f9fcde60db91bba33d55171
+
+post_install() {
+	vlicense LICENSE
+}

From ce0ed3b77304452e326564248a5763c55d398aba Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:37:24 -0400
Subject: [PATCH 2/5] New package: protoc-gen-go-grpc-1.2.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From 7c3751710c2a6ed00a229a3720dbe219a37950c9 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:56:04 -0400
Subject: [PATCH 3/5] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 332115c55b35ff6b07aa1da4cc0b05c7cade2d3f Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:56:20 -0400
Subject: [PATCH 4/5] New package: python3-qt-material-2.12

---
 srcpkgs/python3-qt-material/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-qt-material/template

diff --git a/srcpkgs/python3-qt-material/template b/srcpkgs/python3-qt-material/template
new file mode 100644
index 000000000000..115ffa065469
--- /dev/null
+++ b/srcpkgs/python3-qt-material/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-qt-material'
+pkgname=python3-qt-material
+version=2.12
+revision=1
+wrksrc="qt-material-${version}"
+build_style=python3-module
+hostmakedepends="python3-Jinja2 python3-setuptools"
+depends="python3-Jinja2 python3-MarkupSafe"
+short_desc="Material inspired stylesheet for PySide2, PySide6, PyQt5 and PyQt6"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-2-Clause"
+homepage="https://pypi.org/project/qt-material/"
+distfiles="${PYPI_SITE}/q/qt-material/qt-material-${version}.tar.gz"
+checksum=4ead6710b4fa64f94963bf359422e077a032a84ec8c350804ff743d1be7f4657
+
+post_install() {
+	vlicense LICENSE
+}

From 23f6f98ed1ecc907b756c7cbb36ab6cfe6e24c1d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:56:33 -0400
Subject: [PATCH 5/5] New package: opensnitch-1.5.1

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 ++
 srcpkgs/opensnitch/patches/cc-check.patch | 14 +++++
 srcpkgs/opensnitch/patches/musl.patch     | 65 +++++++++++++++++++++++
 srcpkgs/opensnitch/template               | 35 ++++++++++++
 4 files changed, 118 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..17d202f1da0f
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r ./conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..0c3f52b47ef2
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,14 @@
+# Adjustment for our cross-cc wrapper
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl.patch b/srcpkgs/opensnitch/patches/musl.patch
new file mode 100644
index 000000000000..039d00db7529
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl.patch
@@ -0,0 +1,65 @@
+diff --git a/daemon/netfilter/queue.h.old b/daemon/netfilter/queue.h
+index 64c3ea7..998278a 100644
+--- a/daemon/netfilter/queue.h.old
++++ b/daemon/netfilter/queue.h
+@@ -15,16 +15,16 @@
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+ 
+ typedef struct {
+-    uint verdict;
+-    uint mark;
+-    uint mark_set;
+-    uint length;
++    unsigned int verdict;
++    unsigned int mark;
++    unsigned int mark_set;
++    unsigned int length;
+     unsigned char *data;
+ } verdictContainer;
+ 
+ static void *get_uid = NULL;
+ 
+-extern void go_callback(int id, unsigned char* data, int len, uint mark, u_int32_t idx, verdictContainer *vc, uint32_t uid);
++extern void go_callback(int id, unsigned char* data, int len, unsigned int mark, uint32_t idx, verdictContainer *vc, uint32_t uid);
+ 
+ static uint8_t stop = 0;
+ 
+@@ -80,7 +80,7 @@ static int nf_callback(struct nfq_q_handle *qh, struct nfgenmsg *nfmsg, struct n
+     return nfq_set_verdict2(qh, id, vc.verdict, vc.mark, vc.length, vc.data);
+ }
+ 
+-static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, u_int16_t queue, u_int32_t idx) {
++static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, uint16_t queue, uint32_t idx) {
+     struct nfq_q_handle* qh = nfq_create_queue(h, queue, &nf_callback, (void*)((uintptr_t)idx));
+     if (qh == NULL){
+         printf("ERROR: nfq_create_queue() queue not created\n");
+diff --git a/daemon/netfilter/queue.go.old b/daemon/netfilter/queue.go
+index 902d1dd..016ee92 100644
+--- a/daemon/netfilter/queue.go.old
++++ b/daemon/netfilter/queue.go
+@@ -92,7 +92,7 @@ func (q *Queue) create(queueID uint16) (err error) {
+ 		return fmt.Errorf("Error binding to AF_INET protocol family: %v", err)
+ 	} else if ret, err := C.nfq_bind_pf(q.h, AF_INET6); err != nil || ret < 0 {
+ 		return fmt.Errorf("Error binding to AF_INET6 protocol family: %v", err)
+-	} else if q.qh, err = C.CreateQueue(q.h, C.u_int16_t(queueID), C.u_int32_t(q.idx)); err != nil || q.qh == nil {
++	} else if q.qh, err = C.CreateQueue(q.h, C.uint16_t(queueID), C.uint32_t(q.idx)); err != nil || q.qh == nil {
+ 		q.destroy()
+ 		return fmt.Errorf("Error binding to queue: %v", err)
+ 	}
+@@ -107,14 +107,14 @@ func (q *Queue) create(queueID uint16) (err error) {
+ func (q *Queue) setup() (err error) {
+ 	var ret C.int
+ 
+-	queueSize := C.u_int32_t(NF_DEFAULT_QUEUE_SIZE)
++	queueSize := C.uint32_t(NF_DEFAULT_QUEUE_SIZE)
+ 	bufferSize := C.uint(NF_DEFAULT_PACKET_SIZE)
+ 	totSize := C.uint(NF_DEFAULT_QUEUE_SIZE * NF_DEFAULT_PACKET_SIZE)
+ 
+ 	if ret, err = C.nfq_set_queue_maxlen(q.qh, queueSize); err != nil || ret < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set max packets in queue: %v", err)
+-	} else if C.nfq_set_mode(q.qh, C.u_int8_t(2), bufferSize) < 0 {
++	} else if C.nfq_set_mode(q.qh, C.uint8_t(2), bufferSize) < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set packets copy mode: %v", err)
+ 	} else if q.fd, err = C.nfq_fd(q.h); err != nil {
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..f8e54f6394d8
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,35 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-inotify
+ python3-unicode-slugify python3-Unidecode"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-notify2 python3-pyasn1 python3-PyQt5 python3-PyQt5-sql
+ python3-qt-material python3-unicode-slugify python3-Unidecode qt5-wayland
+ qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=f0e1aa0d6c52ac11d32c8f778479c2d1cecbb733d784e88bf4ecd19580930d4f
+nopie_files="/usr/bin/opensnitchd"
+#nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (39 preceding siblings ...)
  2022-06-04  2:56 ` [PR PATCH] [Updated] New package: opensnitch-1.5.1 cinerea0
@ 2022-06-04  3:11 ` cinerea0
  2022-06-05 22:14 ` cinerea0
                   ` (12 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2022-06-04  3:11 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 12194 bytes --]

From 898b5b83ef807411420b29f53f9a850a0e0d512b Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:37:04 -0400
Subject: [PATCH 1/5] New package: protobuf-go-1.28.0

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..2260246de16a
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.28.0
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=e59ae9ace31c3a84bddf1bc3f04a04c498adb9ea7f9fcde60db91bba33d55171
+
+post_install() {
+	vlicense LICENSE
+}

From 7671b2920a25348ec83dc95756ed0e9a9e62118d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 23:10:11 -0400
Subject: [PATCH 2/5] New package: protoc-gen-go-grpc-1.2.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From 71dd874bd39093b880ee3b20618f372ebb69997a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 23:10:42 -0400
Subject: [PATCH 3/5] New package: python3-unicode-slugify-0.1.5

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From a4b233a3f0cb6431f0f1bced7629ef40bfc11615 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 23:11:08 -0400
Subject: [PATCH 4/5] New package: python3-qt-material-2.12

---
 srcpkgs/python3-qt-material/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-qt-material/template

diff --git a/srcpkgs/python3-qt-material/template b/srcpkgs/python3-qt-material/template
new file mode 100644
index 000000000000..115ffa065469
--- /dev/null
+++ b/srcpkgs/python3-qt-material/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-qt-material'
+pkgname=python3-qt-material
+version=2.12
+revision=1
+wrksrc="qt-material-${version}"
+build_style=python3-module
+hostmakedepends="python3-Jinja2 python3-setuptools"
+depends="python3-Jinja2 python3-MarkupSafe"
+short_desc="Material inspired stylesheet for PySide2, PySide6, PyQt5 and PyQt6"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-2-Clause"
+homepage="https://pypi.org/project/qt-material/"
+distfiles="${PYPI_SITE}/q/qt-material/qt-material-${version}.tar.gz"
+checksum=4ead6710b4fa64f94963bf359422e077a032a84ec8c350804ff743d1be7f4657
+
+post_install() {
+	vlicense LICENSE
+}

From 08740ea9241e102a67799f54226744784a61b866 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 23:11:38 -0400
Subject: [PATCH 5/5] New package: opensnitch-1.5.1

---
 srcpkgs/opensnitch/files/opensnitchd/run      |  4 ++
 srcpkgs/opensnitch/patches/cc-check.patch     | 14 ++++
 srcpkgs/opensnitch/patches/musl.patch         | 65 +++++++++++++++++++
 .../patches/update-requirements.patch         | 12 ++++
 srcpkgs/opensnitch/template                   | 35 ++++++++++
 5 files changed, 130 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl.patch
 create mode 100644 srcpkgs/opensnitch/patches/update-requirements.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..17d202f1da0f
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r ./conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..0c3f52b47ef2
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,14 @@
+# Adjustment for our cross-cc wrapper
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl.patch b/srcpkgs/opensnitch/patches/musl.patch
new file mode 100644
index 000000000000..039d00db7529
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl.patch
@@ -0,0 +1,65 @@
+diff --git a/daemon/netfilter/queue.h.old b/daemon/netfilter/queue.h
+index 64c3ea7..998278a 100644
+--- a/daemon/netfilter/queue.h.old
++++ b/daemon/netfilter/queue.h
+@@ -15,16 +15,16 @@
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+ 
+ typedef struct {
+-    uint verdict;
+-    uint mark;
+-    uint mark_set;
+-    uint length;
++    unsigned int verdict;
++    unsigned int mark;
++    unsigned int mark_set;
++    unsigned int length;
+     unsigned char *data;
+ } verdictContainer;
+ 
+ static void *get_uid = NULL;
+ 
+-extern void go_callback(int id, unsigned char* data, int len, uint mark, u_int32_t idx, verdictContainer *vc, uint32_t uid);
++extern void go_callback(int id, unsigned char* data, int len, unsigned int mark, uint32_t idx, verdictContainer *vc, uint32_t uid);
+ 
+ static uint8_t stop = 0;
+ 
+@@ -80,7 +80,7 @@ static int nf_callback(struct nfq_q_handle *qh, struct nfgenmsg *nfmsg, struct n
+     return nfq_set_verdict2(qh, id, vc.verdict, vc.mark, vc.length, vc.data);
+ }
+ 
+-static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, u_int16_t queue, u_int32_t idx) {
++static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, uint16_t queue, uint32_t idx) {
+     struct nfq_q_handle* qh = nfq_create_queue(h, queue, &nf_callback, (void*)((uintptr_t)idx));
+     if (qh == NULL){
+         printf("ERROR: nfq_create_queue() queue not created\n");
+diff --git a/daemon/netfilter/queue.go.old b/daemon/netfilter/queue.go
+index 902d1dd..016ee92 100644
+--- a/daemon/netfilter/queue.go.old
++++ b/daemon/netfilter/queue.go
+@@ -92,7 +92,7 @@ func (q *Queue) create(queueID uint16) (err error) {
+ 		return fmt.Errorf("Error binding to AF_INET protocol family: %v", err)
+ 	} else if ret, err := C.nfq_bind_pf(q.h, AF_INET6); err != nil || ret < 0 {
+ 		return fmt.Errorf("Error binding to AF_INET6 protocol family: %v", err)
+-	} else if q.qh, err = C.CreateQueue(q.h, C.u_int16_t(queueID), C.u_int32_t(q.idx)); err != nil || q.qh == nil {
++	} else if q.qh, err = C.CreateQueue(q.h, C.uint16_t(queueID), C.uint32_t(q.idx)); err != nil || q.qh == nil {
+ 		q.destroy()
+ 		return fmt.Errorf("Error binding to queue: %v", err)
+ 	}
+@@ -107,14 +107,14 @@ func (q *Queue) create(queueID uint16) (err error) {
+ func (q *Queue) setup() (err error) {
+ 	var ret C.int
+ 
+-	queueSize := C.u_int32_t(NF_DEFAULT_QUEUE_SIZE)
++	queueSize := C.uint32_t(NF_DEFAULT_QUEUE_SIZE)
+ 	bufferSize := C.uint(NF_DEFAULT_PACKET_SIZE)
+ 	totSize := C.uint(NF_DEFAULT_QUEUE_SIZE * NF_DEFAULT_PACKET_SIZE)
+ 
+ 	if ret, err = C.nfq_set_queue_maxlen(q.qh, queueSize); err != nil || ret < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set max packets in queue: %v", err)
+-	} else if C.nfq_set_mode(q.qh, C.u_int8_t(2), bufferSize) < 0 {
++	} else if C.nfq_set_mode(q.qh, C.uint8_t(2), bufferSize) < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set packets copy mode: %v", err)
+ 	} else if q.fd, err = C.nfq_fd(q.h); err != nil {
diff --git a/srcpkgs/opensnitch/patches/update-requirements.patch b/srcpkgs/opensnitch/patches/update-requirements.patch
new file mode 100644
index 000000000000..b276df389203
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/update-requirements.patch
@@ -0,0 +1,12 @@
+# update version to match our package
+diff --git a/ui/requirements.txt b/ui/requirements.txt
+index f29cc1b4ef..66e0de13b2 100644
+--- a/ui/requirements.txt
++++ b/ui/requirements.txt
+@@ -1,5 +1,5 @@
+ grpcio-tools>=1.10.1
+ pyinotify==0.9.6
+-unicode_slugify==0.1.3
++unicode_slugify==0.1.5
+ pyqt5>=5.6
+ protobuf
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..85adc42bf11a
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,35 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-inotify
+ python3-unicode-slugify python3-Unidecode"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-notify2 python3-pyasn1 python3-PyQt5 python3-PyQt5-sql
+ python3-qt-material python3-unicode-slugify python3-Unidecode qt5-wayland
+ qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=f0e1aa0d6c52ac11d32c8f778479c2d1cecbb733d784e88bf4ecd19580930d4f
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (40 preceding siblings ...)
  2022-06-04  3:11 ` cinerea0
@ 2022-06-05 22:14 ` cinerea0
  2022-09-04  2:16 ` github-actions
                   ` (11 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2022-06-05 22:14 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 185 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1146892593

Comment:
I'm still working on this, it's not stale.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (41 preceding siblings ...)
  2022-06-05 22:14 ` cinerea0
@ 2022-09-04  2:16 ` github-actions
  2022-09-05  3:02 ` cinerea0
                   ` (10 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: github-actions @ 2022-09-04  2:16 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 305 bytes --]

New comment by github-actions[bot] on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1236234064

Comment:
Pull Requests become stale 90 days after last activity and are closed 14 days after that.  If this pull request is still relevant bump it or assign it.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (42 preceding siblings ...)
  2022-09-04  2:16 ` github-actions
@ 2022-09-05  3:02 ` cinerea0
  2022-12-06  2:29 ` github-actions
                   ` (9 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2022-09-05  3:02 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 195 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1236498887

Comment:
Not stale, just need to work out the file conflicts.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (43 preceding siblings ...)
  2022-09-05  3:02 ` cinerea0
@ 2022-12-06  2:29 ` github-actions
  2022-12-16  0:35 ` cinerea0
                   ` (8 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: github-actions @ 2022-12-06  2:29 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 305 bytes --]

New comment by github-actions[bot] on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1338641859

Comment:
Pull Requests become stale 90 days after last activity and are closed 14 days after that.  If this pull request is still relevant bump it or assign it.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (44 preceding siblings ...)
  2022-12-06  2:29 ` github-actions
@ 2022-12-16  0:35 ` cinerea0
  2023-03-16  1:57 ` github-actions
                   ` (7 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2022-12-16  0:35 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 242 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1353966891

Comment:
Currently waiting on 1.6.0 to be released so I can fix whatever new issues will be in that version.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (45 preceding siblings ...)
  2022-12-16  0:35 ` cinerea0
@ 2023-03-16  1:57 ` github-actions
  2023-06-16  1:59 ` github-actions
                   ` (6 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: github-actions @ 2023-03-16  1:57 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 305 bytes --]

New comment by github-actions[bot] on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1471161029

Comment:
Pull Requests become stale 90 days after last activity and are closed 14 days after that.  If this pull request is still relevant bump it or assign it.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (46 preceding siblings ...)
  2023-03-16  1:57 ` github-actions
@ 2023-06-16  1:59 ` github-actions
  2023-06-29 14:24 ` [PR PATCH] [Updated] " cinerea0
                   ` (5 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: github-actions @ 2023-06-16  1:59 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 305 bytes --]

New comment by github-actions[bot] on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1593974670

Comment:
Pull Requests become stale 90 days after last activity and are closed 14 days after that.  If this pull request is still relevant bump it or assign it.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (47 preceding siblings ...)
  2023-06-16  1:59 ` github-actions
@ 2023-06-29 14:24 ` cinerea0
  2023-06-29 14:25 ` cinerea0
                   ` (4 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2023-06-29 14:24 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 8121 bytes --]

From 267e876d9eeed8439c635f62b00b72e56b6f0ee9 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 29 Jun 2023 10:16:39 -0400
Subject: [PATCH 1/5] New package: protobuf-go-1.30.0

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..be2cec24d61f
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.30.0
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3279a16ec3bdd7c53fe1599134de298ed90d9f3b6ec1c1eb5f3b76ba5aaa9f0c
+
+post_install() {
+	vlicense LICENSE
+}

From 063145738339f35e7a4c28b5c6a63536bf1f53e8 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 29 Jun 2023 10:17:02 -0400
Subject: [PATCH 2/5] New package: protoc-gen-go-grpc-1.3.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..a1968c726e9b
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.3.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=26ea2bdea1aeba2180046544d468012ce9cb07667ac1f19476febb13ecc781f9

From 6bdd550f45db20561e3d669bf51e056b0f33e980 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 29 Jun 2023 10:17:23 -0400
Subject: [PATCH 3/5] New package: python3-unicode-slugify-0.1.5

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From ceeaa003730feb01b0b65d9bff77ed8ffc263fc8 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 29 Jun 2023 10:17:40 -0400
Subject: [PATCH 4/5] New package: python3-qt-material-2.14

---
 srcpkgs/python3-qt-material/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-qt-material/template

diff --git a/srcpkgs/python3-qt-material/template b/srcpkgs/python3-qt-material/template
new file mode 100644
index 000000000000..a078bf62587f
--- /dev/null
+++ b/srcpkgs/python3-qt-material/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-qt-material'
+pkgname=python3-qt-material
+version=2.14
+revision=1
+wrksrc="qt-material-${version}"
+build_style=python3-module
+hostmakedepends="python3-Jinja2 python3-setuptools"
+depends="python3-Jinja2 python3-MarkupSafe"
+short_desc="Material inspired stylesheet for PySide2, PySide6, PyQt5 and PyQt6"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-2-Clause"
+homepage="https://pypi.org/project/qt-material/"
+distfiles="${PYPI_SITE}/q/qt-material/qt-material-${version}.tar.gz"
+checksum=b5dbb5ade97217cf7ae336bb7c047c90beb39dc7f2048a498c916ad5f2f7ae23
+
+post_install() {
+	vlicense LICENSE
+}

From 9cca31a16767dc1711bf01b304b1c1784cb1b727 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 29 Jun 2023 10:20:53 -0400
Subject: [PATCH 5/5] New package: opensnitch-1.6.0

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  5 ++++
 srcpkgs/opensnitch/patches/cc-check.patch | 13 +++++++++
 srcpkgs/opensnitch/template               | 35 +++++++++++++++++++++++
 3 files changed, 53 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..0c4888fbca07
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,5 @@
+#!/bin/sh
+
+exec 2>&1
+[ -r ./conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..9c6cebdd93f4
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 32fe4a78b5..2a95d444c2 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+ 
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..24409f1262ec
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,35 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.6.0
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools qt5-host-tools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-inotify
+ python3-unicode-slugify python3-Unidecode"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-notify2 python3-pyasn1 python3-PyQt5 python3-PyQt5-sql
+ python3-qt-material python3-unicode-slugify python3-Unidecode qt5-plugin-sqlite
+ qt5-wayland"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=d468599f84f6dfde1afc0cad79ef0d511b7f5d5aafc14acbbf730ab0ae317342
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (48 preceding siblings ...)
  2023-06-29 14:24 ` [PR PATCH] [Updated] " cinerea0
@ 2023-06-29 14:25 ` cinerea0
  2023-09-29  1:45 ` New package: opensnitch-1.6.0 github-actions
                   ` (3 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2023-06-29 14:25 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 215 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1613277541

Comment:
New release, many new xlints since the last release, many things to fix.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.6.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (49 preceding siblings ...)
  2023-06-29 14:25 ` cinerea0
@ 2023-09-29  1:45 ` github-actions
  2023-10-13  1:46 ` [PR PATCH] [Closed]: " github-actions
                   ` (2 subsequent siblings)
  53 siblings, 0 replies; 72+ messages in thread
From: github-actions @ 2023-09-29  1:45 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 305 bytes --]

New comment by github-actions[bot] on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1740203714

Comment:
Pull Requests become stale 90 days after last activity and are closed 14 days after that.  If this pull request is still relevant bump it or assign it.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: [PR PATCH] [Closed]: New package: opensnitch-1.6.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (50 preceding siblings ...)
  2023-09-29  1:45 ` New package: opensnitch-1.6.0 github-actions
@ 2023-10-13  1:46 ` github-actions
  2024-01-26  2:41 ` jchook
  2024-01-26  2:43 ` cinerea0
  53 siblings, 0 replies; 72+ messages in thread
From: github-actions @ 2023-10-13  1:46 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1525 bytes --]

There's a closed pull request on the void-packages repository

New package: opensnitch-1.6.0
https://github.com/void-linux/void-packages/pull/32730

Description:
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.6.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (51 preceding siblings ...)
  2023-10-13  1:46 ` [PR PATCH] [Closed]: " github-actions
@ 2024-01-26  2:41 ` jchook
  2024-01-26  2:43 ` cinerea0
  53 siblings, 0 replies; 72+ messages in thread
From: jchook @ 2024-01-26  2:41 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 178 bytes --]

New comment by jchook on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1911320478

Comment:
@cinerea0 any interest in this still?

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.6.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (52 preceding siblings ...)
  2024-01-26  2:41 ` jchook
@ 2024-01-26  2:43 ` cinerea0
  53 siblings, 0 replies; 72+ messages in thread
From: cinerea0 @ 2024-01-26  2:43 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 188 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1911322200

Comment:
No, you're welcome to pick it up if you want.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (15 preceding siblings ...)
  2021-05-13  4:15 ` anubhavkini
@ 2021-05-13  6:07 ` ericonr
  16 siblings, 0 replies; 72+ messages in thread
From: ericonr @ 2021-05-13  6:07 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 184 bytes --]

New comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-840330051

Comment:
Sorry, I won't be able to review this soon.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (14 preceding siblings ...)
  2021-05-12  8:59 ` anubhavkini
@ 2021-05-13  4:15 ` anubhavkini
  2021-05-13  6:07 ` ericonr
  16 siblings, 0 replies; 72+ messages in thread
From: anubhavkini @ 2021-05-13  4:15 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 174 bytes --]

New comment by anubhavkini on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-840282517

Comment:
@ericonr does this look okay?

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (13 preceding siblings ...)
  2021-03-29 14:35 ` Duncaen
@ 2021-05-12  8:59 ` anubhavkini
  2021-05-13  4:15 ` anubhavkini
  2021-05-13  6:07 ` ericonr
  16 siblings, 0 replies; 72+ messages in thread
From: anubhavkini @ 2021-05-12  8:59 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 167 bytes --]

New comment by anubhavkini on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-839598563

Comment:
Finally got it to work

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (12 preceding siblings ...)
  2021-03-29 14:34 ` Duncaen
@ 2021-03-29 14:35 ` Duncaen
  2021-05-12  8:59 ` anubhavkini
                   ` (2 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: Duncaen @ 2021-03-29 14:35 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 361 bytes --]

New comment by Duncaen on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809430607

Comment:
The separation between ui and daemon doesn't make a lot of sense and becomes cyclic if we add the dependencies on each other, which would be the only correct way to ensure that both are installed and at the same version.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (11 preceding siblings ...)
  2021-03-29 14:24 ` ericonr
@ 2021-03-29 14:34 ` Duncaen
  2021-03-29 14:35 ` Duncaen
                   ` (3 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: Duncaen @ 2021-03-29 14:34 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 357 bytes --]

New comment by Duncaen on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809430607

Comment:
The separation between ui and daemon doesn't make a lot of sense and becomes cyclic if we add the dependencies on each other, which would be the only correct way to ensure that both are installed and at the same way.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (10 preceding siblings ...)
  2021-03-29 14:07 ` itsanubhavkini
@ 2021-03-29 14:24 ` ericonr
  2021-03-29 14:34 ` Duncaen
                   ` (4 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: ericonr @ 2021-03-29 14:24 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 532 bytes --]

New comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809421922

Comment:
@Duncaen maybe make one package for daemon and one for UI, to avoid having to duplicate most of the build logic? And make the daemon depend on the UI, if that makes sense.

I agree on the meta not being necessary. It's unfortunate that they use the same distfiles for both... If we go the route of separate packages, I'd add a comment to each template about keeping in sync with the other.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (9 preceding siblings ...)
  2021-03-29 14:05 ` Duncaen
@ 2021-03-29 14:07 ` itsanubhavkini
  2021-03-29 14:24 ` ericonr
                   ` (5 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: itsanubhavkini @ 2021-03-29 14:07 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 171 bytes --]

New comment by itsanubhavkini on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809406394

Comment:
Alright, I'll try that.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (8 preceding siblings ...)
  2021-03-29 14:02 ` itsanubhavkini
@ 2021-03-29 14:05 ` Duncaen
  2021-03-29 14:07 ` itsanubhavkini
                   ` (6 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: Duncaen @ 2021-03-29 14:05 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 360 bytes --]

New comment by Duncaen on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809404452

Comment:
No subpackages just move files from the main package, you would have to build it in the main package so you would have to do your own do_configure/do_build/do_install to build both and then move files into sub packages.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (7 preceding siblings ...)
  2021-03-29 13:58 ` itsanubhavkini
@ 2021-03-29 14:02 ` itsanubhavkini
  2021-03-29 14:05 ` Duncaen
                   ` (7 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: itsanubhavkini @ 2021-03-29 14:02 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 335 bytes --]

New comment by itsanubhavkini on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809396068

Comment:
>Is there a reason to split this into a meta package and a d package?

It was easier since `opensnitchd` uses the `go` build-style and `opensnitch-ui` uses `python3-module` build-style.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (6 preceding siblings ...)
  2021-03-29 13:55 ` itsanubhavkini
@ 2021-03-29 13:58 ` itsanubhavkini
  2021-03-29 14:02 ` itsanubhavkini
                   ` (8 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: itsanubhavkini @ 2021-03-29 13:58 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 321 bytes --]

New comment by itsanubhavkini on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809399136

Comment:
> IMHO should should just be `opensnitch` containing the daemon and maybe a subpackage for the ui.

Can subpackages have a different build-style from the source package?


^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (5 preceding siblings ...)
  2021-03-29 13:54 ` itsanubhavkini
@ 2021-03-29 13:55 ` itsanubhavkini
  2021-03-29 13:58 ` itsanubhavkini
                   ` (9 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: itsanubhavkini @ 2021-03-29 13:55 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 262 bytes --]

New comment by itsanubhavkini on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809396068

Comment:
It was easier since `opensnitchd` uses the `go` build-style and `opensnitch-ui` uses `python3-module` build-style.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (4 preceding siblings ...)
  2021-03-29 13:50 ` Duncaen
@ 2021-03-29 13:54 ` itsanubhavkini
  2021-03-29 13:55 ` itsanubhavkini
                   ` (10 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: itsanubhavkini @ 2021-03-29 13:54 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 254 bytes --]

New comment by itsanubhavkini on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809396068

Comment:
It was easier since opensnitchd uses the go build-style and opensnitch-ui uses python3-module build-style.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (3 preceding siblings ...)
  2021-03-29 12:24 ` ericonr
@ 2021-03-29 13:50 ` Duncaen
  2021-03-29 13:54 ` itsanubhavkini
                   ` (11 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: Duncaen @ 2021-03-29 13:50 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 309 bytes --]

New comment by Duncaen on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809393124

Comment:
Is there a reason to split this into a meta package and a `d` package?
IMHO should should just be `opensnitch` containing the daemon and maybe a subpackage for the ui.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
                   ` (2 preceding siblings ...)
  2021-03-29 12:24 ` ericonr
@ 2021-03-29 12:24 ` ericonr
  2021-03-29 13:50 ` Duncaen
                   ` (12 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: ericonr @ 2021-03-29 12:24 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 205 bytes --]

New comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809334749

Comment:
Should be one `New package: pkgname-version` commit per package.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
  2021-03-29 12:19 ` FollieHiyuki
  2021-03-29 12:24 ` ericonr
@ 2021-03-29 12:24 ` ericonr
  2021-03-29 12:24 ` ericonr
                   ` (13 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: ericonr @ 2021-03-29 12:24 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 205 bytes --]

New comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809334749

Comment:
Should be one `New package: pkgname-version` commit per package.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
  2021-03-29 12:19 ` FollieHiyuki
@ 2021-03-29 12:24 ` ericonr
  2021-03-29 12:24 ` ericonr
                   ` (14 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: ericonr @ 2021-03-29 12:24 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 205 bytes --]

New comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809334719

Comment:
Should be one `New package: pkgname-version` commit per package.

^ permalink raw reply	[flat|nested] 72+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
@ 2021-03-29 12:19 ` FollieHiyuki
  2021-03-29 12:24 ` ericonr
                   ` (15 subsequent siblings)
  16 siblings, 0 replies; 72+ messages in thread
From: FollieHiyuki @ 2021-03-29 12:19 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 166 bytes --]

New comment by FollieHiyuki on void-packages repository

https://github.com/void-linux/void-packages/pull/29849#issuecomment-809331508

Comment:
Should closes #28819

^ permalink raw reply	[flat|nested] 72+ messages in thread

end of thread, other threads:[~2024-01-26  2:43 UTC | newest]

Thread overview: 72+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
2021-09-12 12:23 ` apirusKde
2021-09-13  3:57 ` [PR PATCH] [Updated] " cinerea0
2021-09-21 18:36 ` [PR PATCH] [Updated] New package: opensnitch-1.4.0 cinerea0
2021-09-21 18:40 ` cinerea0
2021-10-07 18:53 ` cinerea0
2021-10-07 19:01 ` [PR PATCH] [Updated] New package: opensnitch-1.4.1 cinerea0
2021-10-07 19:08 ` cinerea0
2021-10-08  5:23 ` cinerea0
2021-10-12  3:42 ` cinerea0
2021-10-12  3:49 ` cinerea0
2021-10-12  3:56 ` cinerea0
2021-10-12  4:12 ` cinerea0
2021-10-12  4:26 ` cinerea0
2021-10-12 16:07 ` cinerea0
2021-10-12 17:52 ` cinerea0
2021-10-13  0:09 ` cinerea0
2021-10-13  0:19 ` cinerea0
2021-10-13  0:52 ` ericonr
2021-10-13  3:09 ` [PR PATCH] [Updated] " cinerea0
2021-10-13  4:50 ` cinerea0
2021-10-27 14:12 ` [PR PATCH] [Updated] " cinerea0
2021-10-27 14:17 ` cinerea0
2021-11-05  2:56 ` cinerea0
2021-11-12  4:54 ` New package: opensnitch-1.4.2 cinerea0
2021-11-25  0:20 ` [PR PATCH] [Updated] " cinerea0
2022-02-05  2:25 ` [PR PATCH] [Updated] New package: opensnitch-1.4.3 cinerea0
2022-02-05  3:12 ` [PR PATCH] [Updated] New package: opensnitch-1.5.0 cinerea0
2022-02-06 22:59 ` [PR REVIEW] " ericonr
2022-02-06 22:59 ` ericonr
2022-02-06 22:59 ` ericonr
2022-02-07  1:30 ` cinerea0
2022-02-07  2:27 ` ericonr
2022-02-07  2:27 ` ericonr
2022-02-07  4:23 ` [PR PATCH] [Updated] " cinerea0
2022-02-07  4:42 ` cinerea0
2022-02-07  4:52 ` [PR REVIEW] " cinerea0
2022-02-20  2:30 ` cinerea0
2022-06-03  2:11 ` github-actions
2022-06-04  2:40 ` [PR PATCH] [Updated] " cinerea0
2022-06-04  2:56 ` [PR PATCH] [Updated] New package: opensnitch-1.5.1 cinerea0
2022-06-04  3:11 ` cinerea0
2022-06-05 22:14 ` cinerea0
2022-09-04  2:16 ` github-actions
2022-09-05  3:02 ` cinerea0
2022-12-06  2:29 ` github-actions
2022-12-16  0:35 ` cinerea0
2023-03-16  1:57 ` github-actions
2023-06-16  1:59 ` github-actions
2023-06-29 14:24 ` [PR PATCH] [Updated] " cinerea0
2023-06-29 14:25 ` cinerea0
2023-09-29  1:45 ` New package: opensnitch-1.6.0 github-actions
2023-10-13  1:46 ` [PR PATCH] [Closed]: " github-actions
2024-01-26  2:41 ` jchook
2024-01-26  2:43 ` cinerea0
  -- strict thread matches above, loose matches on Subject: below --
2021-03-29 11:16 [PR PATCH] New package: opensnitch-1.3.6 itsanubhavkini
2021-03-29 12:19 ` FollieHiyuki
2021-03-29 12:24 ` ericonr
2021-03-29 12:24 ` ericonr
2021-03-29 12:24 ` ericonr
2021-03-29 13:50 ` Duncaen
2021-03-29 13:54 ` itsanubhavkini
2021-03-29 13:55 ` itsanubhavkini
2021-03-29 13:58 ` itsanubhavkini
2021-03-29 14:02 ` itsanubhavkini
2021-03-29 14:05 ` Duncaen
2021-03-29 14:07 ` itsanubhavkini
2021-03-29 14:24 ` ericonr
2021-03-29 14:34 ` Duncaen
2021-03-29 14:35 ` Duncaen
2021-05-12  8:59 ` anubhavkini
2021-05-13  4:15 ` anubhavkini
2021-05-13  6:07 ` ericonr

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).