Github messages for voidlinux
 help / color / mirror / Atom feed
* [PR PATCH] New package: opensnitch-1.3.6
@ 2021-08-28  5:25 cinerea0
  2021-09-12 12:23 ` apirusKde
                   ` (53 more replies)
  0 siblings, 54 replies; 55+ messages in thread
From: cinerea0 @ 2021-08-28  5:25 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1677 bytes --]

There is a new pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.3.6
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 4795 bytes --]

From 863ae42233e901d7d463e74e3c61a00b425572a0 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sat, 28 Aug 2021 01:21:23 -0400
Subject: [PATCH] New package: opensnitch-1.3.6

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 ++
 srcpkgs/opensnitch/patches/cc-check.patch | 13 +++++
 srcpkgs/opensnitch/patches/musl-int.patch | 16 ++++++
 srcpkgs/opensnitch/template               | 68 +++++++++++++++++++++++
 4 files changed, 101 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..4a9aa09b5e2a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+ 
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..360e26c98179
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+ 
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..77b5a3f2c2ba
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,68 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.3.6
+revision=1
+build_wrksrc="daemon"
+build_style=go
+go_import_path="github.com/evilsocket/opensnitch/daemon"
+go_package="${go_import_path}"
+go_mod_mode="mod"
+hostmakedepends="pkg-config python3-setuptools"
+makedepends="libnetfilter_queue-devel python3-devel"
+depends="python3-grpcio-tools python3-slugify python3-inotify
+ python3-PyQt5 python3-PyQt5-sql qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a02e49a5ed79db8f21788188f16a28684d5f54f583bb4d338e3386484ee1663a
+
+_py() {
+	cd ../ui
+	if [ -n "$CROSS_BUILD" ]; then
+		PYPREFIX="$XBPS_CROSS_BASE"
+		CFLAGS+=" -I${XBPS_CROSS_BASE}/${py3_inc} -I${XBPS_CROSS_BASE}/usr/include"
+		LDFLAGS+=" -L${XBPS_CROSS_BASE}/${py3_lib} -L${XBPS_CROSS_BASE}/usr/lib"
+		CC="${XBPS_CROSS_TRIPLET}-gcc -pthread $CFLAGS $LDFLAGS"
+		LDSHARED="${CC} -shared $LDFLAGS"
+		for f in ${XBPS_CROSS_BASE}/${py3_lib}/_sysconfigdata_*; do
+			f=${f##*/}
+			_PYTHON_SYSCONFIGDATA_NAME=${f%.py}
+		done
+		env CC="$CC" LDSHARED="$LDSHARED" \
+			PYPREFIX="$PYPREFIX" CFLAGS="$CFLAGS" \
+			PYTHONPATH=${XBPS_CROSS_BASE}/${py3_lib} \
+			_PYTHON_SYSCONFIGDATA_NAME="$_PYTHON_SYSCONFIGDATA_NAME" \
+			LDFLAGS="$LDFLAGS" python3 setup.py \
+				${@:-install --prefix=/usr --root=${DESTDIR}} ${make_install_args}
+	else
+		python3 setup.py ${@:-install --prefix=/usr --root=${DESTDIR}} ${make_install_args}
+	fi
+}
+
+post_build() {
+	# build ui
+	_py build
+}
+
+do_install() {
+	# rename bin daemon to opensnitchd
+	for f in ${GOPATH}/bin/* ${GOPATH}/bin/**/*; do
+	    if [ -f "$f" ] && [ -x "$f" ]; then
+	        vbin "$f" opensnitchd
+	        break
+	    fi
+	done
+
+	vinstall "default-config.json" 644 "/etc/opensnitchd/"
+	vinstall "system-fw.json" 644 "/etc/opensnitchd/"
+	vsv opensnitchd
+
+	#install ui
+	_py
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.3.6
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
@ 2021-09-12 12:23 ` apirusKde
  2021-09-13  3:57 ` [PR PATCH] [Updated] " cinerea0
                   ` (52 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: apirusKde @ 2021-09-12 12:23 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 233 bytes --]

New comment by apirusKde on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-917626112

Comment:
Would be great to update to opensnitch-1.4.0 as it adds blocklist host rules functionality

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.3.6
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
  2021-09-12 12:23 ` apirusKde
@ 2021-09-13  3:57 ` cinerea0
  2021-09-21 18:36 ` [PR PATCH] [Updated] New package: opensnitch-1.4.0 cinerea0
                   ` (51 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-09-13  3:57 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.3.6
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 5097 bytes --]

From 82f0bb3e8ab05d8c80f0326caa8372c5099ff32f Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 12 Sep 2021 23:56:55 -0400
Subject: [PATCH] New package: opensnitch-1.4.0

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 ++
 srcpkgs/opensnitch/patches/cc-check.patch | 13 ++++
 srcpkgs/opensnitch/patches/musl-int.patch | 16 +++++
 srcpkgs/opensnitch/template               | 80 +++++++++++++++++++++++
 4 files changed, 113 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..43b570c59091
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,80 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.0
+revision=1
+build_wrksrc="daemon"
+build_style=go
+go_import_path="github.com/evilsocket/opensnitch/daemon"
+go_package="${go_import_path}"
+go_mod_mode="mod"
+hostmakedepends="git pkg-config protobuf28 python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel python3-devel python3-grpcio-tools"
+depends="python3-googleapis-common-protos python3-grpcio python3-slugify
+ python3-inotify python3-PyQt5 python3-PyQt5-sql qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=bd8e4a15653de22121ce2a5013952c8becb2cb965448780ca53da7a453a74be1
+
+_py() {
+	cd ../ui
+	if [ -n "$CROSS_BUILD" ]; then
+		PYPREFIX="$XBPS_CROSS_BASE"
+		CFLAGS+=" -I${XBPS_CROSS_BASE}/${py3_inc} -I${XBPS_CROSS_BASE}/usr/include"
+		LDFLAGS+=" -L${XBPS_CROSS_BASE}/${py3_lib} -L${XBPS_CROSS_BASE}/usr/lib"
+		CC="${XBPS_CROSS_TRIPLET}-gcc -pthread $CFLAGS $LDFLAGS"
+		LDSHARED="${CC} -shared $LDFLAGS"
+		for f in ${XBPS_CROSS_BASE}/${py3_lib}/_sysconfigdata_*; do
+			f=${f##*/}
+			_PYTHON_SYSCONFIGDATA_NAME=${f%.py}
+		done
+		env CC="$CC" LDSHARED="$LDSHARED" \
+			PYPREFIX="$PYPREFIX" CFLAGS="$CFLAGS" \
+			PYTHONPATH=${XBPS_CROSS_BASE}/${py3_lib} \
+			_PYTHON_SYSCONFIGDATA_NAME="$_PYTHON_SYSCONFIGDATA_NAME" \
+			LDFLAGS="$LDFLAGS" python3 setup.py \
+				${@:-install --prefix=/usr --root=${DESTDIR}} ${make_install_args}
+	else
+		python3 setup.py ${@:-install --prefix=/usr --root=${DESTDIR}} ${make_install_args}
+	fi
+}
+
+pre_build() {
+	cd ..
+	go get github.com/golang/protobuf/protoc-gen-go
+	export PATH=$PATH:$GOPATH/bin
+	make protocol
+	cd ui
+	pyrcc5 -o opensnitch/resources_rc.py opensnitch/res/resources.qrc
+	cd ../daemon
+	go mod vendor
+}
+
+post_build() {
+	# build ui
+	_py build
+}
+
+do_install() {
+	# rename bin daemon to opensnitchd
+	for f in ${GOPATH}/bin/* ${GOPATH}/bin/**/*; do
+		if [ -f "$f" ] && [ -x "$f" ]; then
+			vbin "$f" opensnitchd
+			break
+		fi
+	done
+
+	vinstall "default-config.json" 644 "/etc/opensnitchd/"
+	vinstall "system-fw.json" 644 "/etc/opensnitchd/"
+	vsv opensnitchd
+
+	#install ui
+	_py
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
  2021-09-12 12:23 ` apirusKde
  2021-09-13  3:57 ` [PR PATCH] [Updated] " cinerea0
@ 2021-09-21 18:36 ` cinerea0
  2021-09-21 18:40 ` cinerea0
                   ` (50 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-09-21 18:36 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 1127 bytes --]

From 5d250d633438ecd6a71e3d412ce1bfbef5e1535a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 21 Sep 2021 14:35:55 -0400
Subject: [PATCH] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (2 preceding siblings ...)
  2021-09-21 18:36 ` [PR PATCH] [Updated] New package: opensnitch-1.4.0 cinerea0
@ 2021-09-21 18:40 ` cinerea0
  2021-10-07 18:53 ` cinerea0
                   ` (49 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-09-21 18:40 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 6577 bytes --]

From 5d250d633438ecd6a71e3d412ce1bfbef5e1535a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 21 Sep 2021 14:35:55 -0400
Subject: [PATCH 1/2] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From ea101e0b616a7c5ff70bf3fe51386add3b9271bc Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 21 Sep 2021 14:39:48 -0400
Subject: [PATCH 2/2] New package: opensnitch-1.4.0

---
 srcpkgs/opensnitch/files/opensnitchd/run      |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch     | 13 ++++++++++
 srcpkgs/opensnitch/patches/go-sum.patch       | 14 ++++++++++
 srcpkgs/opensnitch/patches/musl-int.patch     | 16 ++++++++++++
 .../opensnitch/patches/protoc-gen-go.patch    | 14 ++++++++++
 srcpkgs/opensnitch/template                   | 26 +++++++++++++++++++
 6 files changed, 87 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen-go.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen-go.patch b/srcpkgs/opensnitch/patches/protoc-gen-go.patch
new file mode 100644
index 000000000000..a368a305fe95
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen-go.patch
@@ -0,0 +1,14 @@
+# Allow building with newer protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..c7429bbd96 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=paths=source_relative:../daemon/ui/protocol/
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..fe0c0076c856
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,26 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.0
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go
+ python3-PyQt5-devel-tools python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel python3-grpcio-tools"
+depends="python3-googleapis-common-protos python3-grpcio python3-slugify
+ python3-inotify python3-PyQt5 python3-PyQt5-sql qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=bd8e4a15653de22121ce2a5013952c8becb2cb965448780ca53da7a453a74be1
+
+post_install() {
+	vinstall "default-config.json" 644 "/etc/opensnitchd/"
+	vinstall "system-fw.json" 644 "/etc/opensnitchd/"
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (3 preceding siblings ...)
  2021-09-21 18:40 ` cinerea0
@ 2021-10-07 18:53 ` cinerea0
  2021-10-07 19:01 ` [PR PATCH] [Updated] New package: opensnitch-1.4.1 cinerea0
                   ` (48 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-07 18:53 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 1126 bytes --]

From 75ac22f85890fe0e068f1d64af2d3b20b75ed9e5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 14:52:40 -0400
Subject: [PATCH] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (4 preceding siblings ...)
  2021-10-07 18:53 ` cinerea0
@ 2021-10-07 19:01 ` cinerea0
  2021-10-07 19:08 ` cinerea0
                   ` (47 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-07 19:01 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 2369 bytes --]

From 75ac22f85890fe0e068f1d64af2d3b20b75ed9e5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 14:52:40 -0400
Subject: [PATCH 1/2] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 32f2a9b8312923a12c314ab2f24a2509fb9e4be5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 15:01:18 -0400
Subject: [PATCH 2/2] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (5 preceding siblings ...)
  2021-10-07 19:01 ` [PR PATCH] [Updated] New package: opensnitch-1.4.1 cinerea0
@ 2021-10-07 19:08 ` cinerea0
  2021-10-08  5:23 ` cinerea0
                   ` (46 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-07 19:08 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 8548 bytes --]

From 75ac22f85890fe0e068f1d64af2d3b20b75ed9e5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 14:52:40 -0400
Subject: [PATCH 1/3] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 32f2a9b8312923a12c314ab2f24a2509fb9e4be5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 15:01:18 -0400
Subject: [PATCH 2/3] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From 3e226516af1e12c0247837e67e9f8bb47acc273c Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 15:08:11 -0400
Subject: [PATCH 3/3] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 +++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 ++++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 +++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 27 ++++++++++++++++++
 srcpkgs/opensnitch/template                 | 31 +++++++++++++++++++++
 6 files changed, 105 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..9ce0a446c2f1
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,27 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c043fd..d33a1088ba 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -16,6 +16,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..c79a40d77de9
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,31 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-pip python3-PyQt5-devel-tools python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel python3-grpcio-tools
+ python3-inotify python3-slugify python3-Unidecode"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-slugify qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (6 preceding siblings ...)
  2021-10-07 19:08 ` cinerea0
@ 2021-10-08  5:23 ` cinerea0
  2021-10-12  3:42 ` cinerea0
                   ` (45 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-08  5:23 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 8895 bytes --]

From 75ac22f85890fe0e068f1d64af2d3b20b75ed9e5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 14:52:40 -0400
Subject: [PATCH 1/3] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 32f2a9b8312923a12c314ab2f24a2509fb9e4be5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 7 Oct 2021 15:01:18 -0400
Subject: [PATCH 2/3] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From beb6eeb3c4edfa31c2c54c93bad5fb6eb02590a2 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 8 Oct 2021 01:22:43 -0400
Subject: [PATCH 3/3] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/template                 | 32 +++++++++++++++++++
 6 files changed, 114 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..b0df8f8f6bda
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,32 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel python3-inotify
+ python3-slugify python3-Unidecode"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-slugify qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (7 preceding siblings ...)
  2021-10-08  5:23 ` cinerea0
@ 2021-10-12  3:42 ` cinerea0
  2021-10-12  3:49 ` cinerea0
                   ` (44 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-12  3:42 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 1127 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (8 preceding siblings ...)
  2021-10-12  3:42 ` cinerea0
@ 2021-10-12  3:49 ` cinerea0
  2021-10-12  3:56 ` cinerea0
                   ` (43 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-12  3:49 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 2371 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/2] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/2] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (9 preceding siblings ...)
  2021-10-12  3:49 ` cinerea0
@ 2021-10-12  3:56 ` cinerea0
  2021-10-12  4:12 ` cinerea0
                   ` (42 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-12  3:56 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 3563 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/3] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/3] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From f396e91d4a4d4d1e5dc5764d33a9c859845e6867 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:56:33 -0400
Subject: [PATCH 3/3] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..44d9df3dbc7c
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,17 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+
+post_install() {
+	vlicense LICENSE
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (10 preceding siblings ...)
  2021-10-12  3:56 ` cinerea0
@ 2021-10-12  4:12 ` cinerea0
  2021-10-12  4:26 ` cinerea0
                   ` (41 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-12  4:12 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 3618 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/3] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/3] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From 9e55d8f8b91a1c9344d92d76fbb2140cf56cfebd Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:12:07 -0400
Subject: [PATCH 3/3] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..c5b173413478
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check="No, checks were not ported from python2"
+
+post_install() {
+	vlicense LICENSE
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (11 preceding siblings ...)
  2021-10-12  4:12 ` cinerea0
@ 2021-10-12  4:26 ` cinerea0
  2021-10-12 16:07 ` cinerea0
                   ` (40 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-12  4:26 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 3618 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/3] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/3] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From a45b829d4b25b4bdc36fddd3e62ef3de65b16945 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:25:51 -0400
Subject: [PATCH 3/3] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (12 preceding siblings ...)
  2021-10-12  4:26 ` cinerea0
@ 2021-10-12 16:07 ` cinerea0
  2021-10-12 17:52 ` cinerea0
                   ` (39 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-12 16:07 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 10240 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From a45b829d4b25b4bdc36fddd3e62ef3de65b16945 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:25:51 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 6eef91a381a3ecba1f503c3377a0b069985b5448 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 12:06:52 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/template                 | 33 +++++++++++++++++++
 6 files changed, 115 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..5fdfc7916c71
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,33 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel python3-inotify
+ python3-slugify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-slugify qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+nocross="https://github.com/void-linux/void-packages/runs/3835106512"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (13 preceding siblings ...)
  2021-10-12 16:07 ` cinerea0
@ 2021-10-12 17:52 ` cinerea0
  2021-10-13  0:09 ` cinerea0
                   ` (38 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-12 17:52 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 10235 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From a45b829d4b25b4bdc36fddd3e62ef3de65b16945 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:25:51 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 7d6a8cfd0587d432f07ab723fac13ac7e877603e Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 13:51:54 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 6 files changed, 116 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..dd39186ba639
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-unicode-slugify qt5-wayland
+ qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+nocross="https://github.com/void-linux/void-packages/runs/3835106512"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (14 preceding siblings ...)
  2021-10-12 17:52 ` cinerea0
@ 2021-10-13  0:09 ` cinerea0
  2021-10-13  0:19 ` cinerea0
                   ` (37 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-13  0:09 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 10253 bytes --]

From a4eb9210d4e3fe714b46b9f1fa7999a7168c4e8a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 07e9916bdd5ce75a5541459ba8ffb0d30809edb4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From a45b829d4b25b4bdc36fddd3e62ef3de65b16945 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:25:51 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From d0fc4250f8fb8e6835ce5eaf768c0dd6d734fe3d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 20:06:58 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 6 files changed, 116 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..3fb7c582fe30
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+nocross="https://github.com/void-linux/void-packages/runs/3835106512"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (15 preceding siblings ...)
  2021-10-13  0:09 ` cinerea0
@ 2021-10-13  0:19 ` cinerea0
  2021-10-13  0:52 ` ericonr
                   ` (36 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-13  0:19 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1058 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-941788614

Comment:
While this does build correctly, it now has a runtime error as follows:

```
Loading translations: /usr/lib/python3.10/site-packages/opensnitch/i18n locale: en_US
Traceback (most recent call last):
  File "/usr/sbin/opensnitch-ui", line 60, in <module>
    service = UIService(app, on_exit)
  File "/usr/lib/python3.10/site-packages/opensnitch/service.py", line 79, in __init__
    self._stats_dialog = StatsDialog(dbname="general", db=self._db)
  File "/usr/lib/python3.10/site-packages/opensnitch/dialogs/stats.py", line 446, in __init__
    self._load_settings()
  File "/usr/lib/python3.10/site-packages/opensnitch/dialogs/stats.py", line 548, in _load_settings
    self.rulesSplitter.setSizes([w/4, w/2])
TypeError: index 0 has type 'float' but 'int' is expected
```

I need to do some investigation to see if this is due to the recent 3.10 upgrade or if this is something upstream needs to fix.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (16 preceding siblings ...)
  2021-10-13  0:19 ` cinerea0
@ 2021-10-13  0:52 ` ericonr
  2021-10-13  3:09 ` [PR PATCH] [Updated] " cinerea0
                   ` (35 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: ericonr @ 2021-10-13  0:52 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 176 bytes --]

New comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-941806327

Comment:
`w//4, w//2` might work as a patch.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (17 preceding siblings ...)
  2021-10-13  0:52 ` ericonr
@ 2021-10-13  3:09 ` cinerea0
  2021-10-13  4:50 ` cinerea0
                   ` (34 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-13  3:09 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 11480 bytes --]

From 260e172a582e51b1b674a69abc2bc5c1327ce12d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 93b0ed5d05c5ece3aedcc162a51cc68045c7885d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From afed3f83236cd6024e0631dcf5fc1fa090144a6c Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:25:51 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 98d11ef1e990356557475acdfc49c8bb71655343 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 22:51:40 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/patches/stats-type.patch | 15 +++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 7 files changed, 131 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/patches/stats-type.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/patches/stats-type.patch b/srcpkgs/opensnitch/patches/stats-type.patch
new file mode 100644
index 000000000000..54e3b4f2b273
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/stats-type.patch
@@ -0,0 +1,15 @@
+# Fix crash due to type mismatch, should be in next release
+# https://github.com/evilsocket/opensnitch/commit/9ef64da588c4ec40c6cfe3e2f531029161e7dc73
+diff --git a/ui/opensnitch/dialogs/stats.py b/ui/opensnitch/dialogs/stats.py
+index 7f03fafd..6db559b3 100644
+--- a/ui/opensnitch/dialogs/stats.py
++++ b/ui/opensnitch/dialogs/stats.py
+@@ -547,7 +547,7 @@ def _load_settings(self):
+                 self.comboRulesFilter.setVisible(rulesSizes[0] == 0)
+         else:
+             w = self.rulesSplitter.width()
+-            self.rulesSplitter.setSizes([w/4, w/2])
++            self.rulesSplitter.setSizes([int(w/4), int(w/2)])
+ 
+         self._restore_details_view_columns(self.eventsTable.horizontalHeader(), Config.STATS_GENERAL_COL_STATE)
+         self._restore_details_view_columns(self.nodesTable.horizontalHeader(), Config.STATS_NODES_COL_STATE)
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..3fb7c582fe30
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+nocross="https://github.com/void-linux/void-packages/runs/3835106512"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (18 preceding siblings ...)
  2021-10-13  3:09 ` [PR PATCH] [Updated] " cinerea0
@ 2021-10-13  4:50 ` cinerea0
  2021-10-27 14:12 ` [PR PATCH] [Updated] " cinerea0
                   ` (33 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-13  4:50 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 268 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-941919237

Comment:
@ericonr I incorporated a commit from upstream that fixes the issue as a patch. I'm no longer experiencing any runtime errors.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (19 preceding siblings ...)
  2021-10-13  4:50 ` cinerea0
@ 2021-10-27 14:12 ` cinerea0
  2021-10-27 14:17 ` cinerea0
                   ` (32 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-27 14:12 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 11500 bytes --]

From 260e172a582e51b1b674a69abc2bc5c1327ce12d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:41:50 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 93b0ed5d05c5ece3aedcc162a51cc68045c7885d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Mon, 11 Oct 2021 23:49:04 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From afed3f83236cd6024e0631dcf5fc1fa090144a6c Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Tue, 12 Oct 2021 00:25:51 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From e0cdfef96914a2886099f6f071e01e4e5ffedd06 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 27 Oct 2021 10:12:22 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/patches/stats-type.patch | 15 +++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 7 files changed, 131 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/patches/stats-type.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/patches/stats-type.patch b/srcpkgs/opensnitch/patches/stats-type.patch
new file mode 100644
index 000000000000..54e3b4f2b273
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/stats-type.patch
@@ -0,0 +1,15 @@
+# Fix crash due to type mismatch, should be in next release
+# https://github.com/evilsocket/opensnitch/commit/9ef64da588c4ec40c6cfe3e2f531029161e7dc73
+diff --git a/ui/opensnitch/dialogs/stats.py b/ui/opensnitch/dialogs/stats.py
+index 7f03fafd..6db559b3 100644
+--- a/ui/opensnitch/dialogs/stats.py
++++ b/ui/opensnitch/dialogs/stats.py
+@@ -547,7 +547,7 @@ def _load_settings(self):
+                 self.comboRulesFilter.setVisible(rulesSizes[0] == 0)
+         else:
+             w = self.rulesSplitter.width()
+-            self.rulesSplitter.setSizes([w/4, w/2])
++            self.rulesSplitter.setSizes([int(w/4), int(w/2)])
+ 
+         self._restore_details_view_columns(self.eventsTable.horizontalHeader(), Config.STATS_GENERAL_COL_STATE)
+         self._restore_details_view_columns(self.nodesTable.horizontalHeader(), Config.STATS_NODES_COL_STATE)
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..b4e93752a8d3
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (20 preceding siblings ...)
  2021-10-27 14:12 ` [PR PATCH] [Updated] " cinerea0
@ 2021-10-27 14:17 ` cinerea0
  2021-11-05  2:56 ` cinerea0
                   ` (31 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-10-27 14:17 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 11500 bytes --]

From d28e95ad3d50668bb28e091fdf5415fbb18c7f2e Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 27 Oct 2021 10:15:14 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 5a3f94179f528897a19793dbbb25624bdf852fa7 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 27 Oct 2021 10:15:44 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From a4c28ef78ba77a1e160f61fead5c8fdf952dd737 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 27 Oct 2021 10:16:07 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 426b08ebbbcc0e813df98e75435c7b920726efae Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 27 Oct 2021 10:16:38 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.1

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/patches/stats-type.patch | 15 +++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 7 files changed, 131 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/patches/stats-type.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/patches/stats-type.patch b/srcpkgs/opensnitch/patches/stats-type.patch
new file mode 100644
index 000000000000..54e3b4f2b273
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/stats-type.patch
@@ -0,0 +1,15 @@
+# Fix crash due to type mismatch, should be in next release
+# https://github.com/evilsocket/opensnitch/commit/9ef64da588c4ec40c6cfe3e2f531029161e7dc73
+diff --git a/ui/opensnitch/dialogs/stats.py b/ui/opensnitch/dialogs/stats.py
+index 7f03fafd..6db559b3 100644
+--- a/ui/opensnitch/dialogs/stats.py
++++ b/ui/opensnitch/dialogs/stats.py
+@@ -547,7 +547,7 @@ def _load_settings(self):
+                 self.comboRulesFilter.setVisible(rulesSizes[0] == 0)
+         else:
+             w = self.rulesSplitter.width()
+-            self.rulesSplitter.setSizes([w/4, w/2])
++            self.rulesSplitter.setSizes([int(w/4), int(w/2)])
+ 
+         self._restore_details_view_columns(self.eventsTable.horizontalHeader(), Config.STATS_GENERAL_COL_STATE)
+         self._restore_details_view_columns(self.nodesTable.horizontalHeader(), Config.STATS_NODES_COL_STATE)
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..b4e93752a8d3
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a0b89a5acc1880db114bbda52b5e7ac59bc1a4460122e071cb865adfa0c63618
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (21 preceding siblings ...)
  2021-10-27 14:17 ` cinerea0
@ 2021-11-05  2:56 ` cinerea0
  2021-11-12  4:54 ` New package: opensnitch-1.4.2 cinerea0
                   ` (30 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-11-05  2:56 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 10269 bytes --]

From 04ffe0675789157b166c881146ea73ad1ce504f2 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 4 Nov 2021 22:55:21 -0400
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 9872f46bcdb387812e46523af0101b896fb78185 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 4 Nov 2021 22:55:42 -0400
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From 0c8cb1770a48b1883ab9395a178ff19a15fa5072 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 4 Nov 2021 22:56:09 -0400
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.5

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 843c74a9f777425947ec06563e09b8599030469e Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 4 Nov 2021 22:56:31 -0400
Subject: [PATCH 4/4] New package: opensnitch-1.4.2

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 6 files changed, 116 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..666075523bbe
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.2
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=0cf518921273c55c8621ccd093aec2b4c1d0a21956f6fc65ffc929fa960c4fa4
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.4.2
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (22 preceding siblings ...)
  2021-11-05  2:56 ` cinerea0
@ 2021-11-12  4:54 ` cinerea0
  2021-11-25  0:20 ` [PR PATCH] [Updated] " cinerea0
                   ` (29 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-11-12  4:54 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 170 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-966819995

Comment:
@ericonr Pinging for review.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.2
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (23 preceding siblings ...)
  2021-11-12  4:54 ` New package: opensnitch-1.4.2 cinerea0
@ 2021-11-25  0:20 ` cinerea0
  2022-02-05  2:25 ` [PR PATCH] [Updated] New package: opensnitch-1.4.3 cinerea0
                   ` (28 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2021-11-25  0:20 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.2
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 10273 bytes --]

From beb92d172df981ba579fc9b3884d777ed1c9d92f Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 24 Nov 2021 19:18:09 -0500
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From ce583f28ea29f8d4f037e3c4b3834d4f23031004 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 24 Nov 2021 19:18:36 -0500
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.1.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..456bd3d54a66
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.1.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=9aa1f1f82b45a409c25eb7c06c6b4d2a41eb3c9466ebd808fe6d3dc2fb9165b3

From 96c48b26544ce24fb655d7ba6ed333930185ffe3 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 24 Nov 2021 19:19:10 -0500
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.5

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 462bb811543ef72935108ccf4faad350e9769185 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Wed, 24 Nov 2021 19:19:32 -0500
Subject: [PATCH 4/4] New package: opensnitch-1.4.3

---
 srcpkgs/opensnitch/files/opensnitchd/run    |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch   | 13 ++++++++
 srcpkgs/opensnitch/patches/go-sum.patch     | 14 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch   | 16 ++++++++++
 srcpkgs/opensnitch/patches/protoc-gen.patch | 35 +++++++++++++++++++++
 srcpkgs/opensnitch/template                 | 34 ++++++++++++++++++++
 6 files changed, 116 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/go-sum.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/patches/protoc-gen.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/go-sum.patch b/srcpkgs/opensnitch/patches/go-sum.patch
new file mode 100644
index 000000000000..19537e68545a
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/go-sum.patch
@@ -0,0 +1,14 @@
+# Need to generate go.sum otherwise we get errors
+# https://github.com/evilsocket/opensnitch/commit/35975bc76018dbf37a68283463ab9d74948b6892
+diff --git a/daemon/Makefile b/daemon/Makefile
+index 1acfbb0d19..618e96d543 100644
+--- a/daemon/Makefile
++++ b/daemon/Makefile
+@@ -12,6 +12,7 @@ install:
+ 	@systemctl daemon-reload
+ 
+ opensnitchd: $(SRC)
++	@go get
+ 	@go build -o opensnitchd . 
+ 
+ clean:
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/patches/protoc-gen.patch b/srcpkgs/opensnitch/patches/protoc-gen.patch
new file mode 100644
index 000000000000..5210d9bf2d10
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/protoc-gen.patch
@@ -0,0 +1,35 @@
+# Support newer version of protoc-gen-go
+diff --git a/proto/Makefile b/proto/Makefile
+index 2af601d599..2d4c3d6dcf 100644
+--- a/proto/Makefile
++++ b/proto/Makefile
+@@ -1,7 +1,7 @@
+ all: ../daemon/ui/protocol/ui.pb.go ../ui/opensnitch/ui_pb2.py
+ 
+ ../daemon/ui/protocol/ui.pb.go: ui.proto
+-	protoc -I. ui.proto --go_out=plugins=grpc:../daemon/ui/protocol/ --go_opt=paths=source_relative
++	protoc -I. ui.proto --go_out=../daemon/ui/protocol/ --go-grpc_out=../daemon/ui/protocol/ --go_opt=paths=source_relative --go-grpc_opt=paths=source_relative
+ 
+ ../ui/opensnitch/ui_pb2.py: ui.proto
+ 	python3 -m grpc_tools.protoc -I. --python_out=../ui/opensnitch/ --grpc_python_out=../ui/opensnitch/ ui.proto
+
+diff --git a/daemon/go.mod b/daemon/go.mod
+index ec21c04..77bdced 100644
+--- a/daemon/go.mod
++++ b/daemon/go.mod
+@@ -6,7 +6,6 @@ require (
+ 	github.com/evilsocket/ftrace v1.2.0
+ 	github.com/fsnotify/fsnotify v1.4.7
+ 	github.com/golang/glog v0.0.0-20160126235308-23def4e6c14b // indirect
+-	github.com/golang/protobuf v1.5.0
+ 	github.com/google/gopacket v1.1.14
+ 	github.com/google/nftables v0.0.0-20210514154851-a285acebcad3
+ 	github.com/iovisor/gobpf v0.2.0
+@@ -16,6 +15,6 @@ require (
+ 	golang.org/x/sync v0.0.0-20200625203802-6e8e738ad208 // indirect
+ 	golang.org/x/sys v0.0.0-20190606203320-7fc4e5ec1444 // indirect
+ 	golang.org/x/text v0.3.0 // indirect
+-	google.golang.org/grpc v1.27.0
++	google.golang.org/grpc v1.32.0
+ 	google.golang.org/protobuf v1.26.0
+ )
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..2c4791aa119e
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.4.3
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=a599b35f303359324b76d2f823ba00a85db93548ec2eb1c4c3b26fe6a6abe2e4
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.4.3
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (24 preceding siblings ...)
  2021-11-25  0:20 ` [PR PATCH] [Updated] " cinerea0
@ 2022-02-05  2:25 ` cinerea0
  2022-02-05  3:12 ` [PR PATCH] [Updated] New package: opensnitch-1.5.0 cinerea0
                   ` (27 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2022-02-05  2:25 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.3
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 7646 bytes --]

From 2749d0e9bb638f8911e194d7f3e22f8806da80c6 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:22:56 -0500
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1.

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 836ecbf4c4a03a818f63e2288adbc31c7ea9f674 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:23:36 -0500
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.2.0.

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From cfa3fad80c0f8bf689f2fc37e93ce92a03d592b5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:24:06 -0500
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.5.

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 6d0580f356bc8fc7a360b6f9a5b09493750369e4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:24:42 -0500
Subject: [PATCH 4/4] New package: opensnitch-1.5.0.

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch | 13 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch | 16 +++++++++++
 srcpkgs/opensnitch/template               | 34 +++++++++++++++++++++++
 4 files changed, 67 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..64c2a0f1008e
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.0
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=9af9a72d18d1af70fe82f5e6f2c37cd6e91652521fdfa7cef964ac7d992f0356
+nopie_files="/usr/bin/opensnitchd"
+#nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (25 preceding siblings ...)
  2022-02-05  2:25 ` [PR PATCH] [Updated] New package: opensnitch-1.4.3 cinerea0
@ 2022-02-05  3:12 ` cinerea0
  2022-02-06 22:59 ` [PR REVIEW] " ericonr
                   ` (26 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2022-02-05  3:12 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 7645 bytes --]

From 2749d0e9bb638f8911e194d7f3e22f8806da80c6 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:22:56 -0500
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1.

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 836ecbf4c4a03a818f63e2288adbc31c7ea9f674 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:23:36 -0500
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.2.0.

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From cfa3fad80c0f8bf689f2fc37e93ce92a03d592b5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:24:06 -0500
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.5.

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 6f4545f506e272f9934eb19e6d8c65f4e1e9fa8c Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 22:12:00 -0500
Subject: [PATCH 4/4] New package: opensnitch-1.5.0.

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch | 13 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch | 16 +++++++++++
 srcpkgs/opensnitch/template               | 34 +++++++++++++++++++++++
 4 files changed, 67 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..70166ca6f65b
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.0
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=9af9a72d18d1af70fe82f5e6f2c37cd6e91652521fdfa7cef964ac7d992f0356
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (28 preceding siblings ...)
  2022-02-06 22:59 ` ericonr
@ 2022-02-06 22:59 ` ericonr
  2022-02-07  1:30 ` cinerea0
                   ` (23 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: ericonr @ 2022-02-06 22:59 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 253 bytes --]

New review comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800244759

Comment:
Please try upstreaming usage of proper types

Just `uintX_t` is enough and `unsigned` instead of `uint`.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (26 preceding siblings ...)
  2022-02-05  3:12 ` [PR PATCH] [Updated] New package: opensnitch-1.5.0 cinerea0
@ 2022-02-06 22:59 ` ericonr
  2022-02-06 22:59 ` ericonr
                   ` (25 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: ericonr @ 2022-02-06 22:59 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 215 bytes --]

New review comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800245092

Comment:
```suggestion
[ -r ./conf ] && . ./conf
```

Nit for consistency

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (27 preceding siblings ...)
  2022-02-06 22:59 ` [PR REVIEW] " ericonr
@ 2022-02-06 22:59 ` ericonr
  2022-02-06 22:59 ` ericonr
                   ` (24 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: ericonr @ 2022-02-06 22:59 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 237 bytes --]

New review comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800244678

Comment:
Is this so our cross-cc wrapper catches it?

If yes, please document on top of the patch

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (29 preceding siblings ...)
  2022-02-06 22:59 ` ericonr
@ 2022-02-07  1:30 ` cinerea0
  2022-02-07  2:27 ` ericonr
                   ` (22 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2022-02-07  1:30 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 377 bytes --]

New review comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800266431

Comment:
> Please try upstreaming usage of proper types

To clarify, do you mean that I should try upstreaming the patch after I fix it, or should I try altering the rest of the header to use the full type definitions and upstream that?

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (30 preceding siblings ...)
  2022-02-07  1:30 ` cinerea0
@ 2022-02-07  2:27 ` ericonr
  2022-02-07  2:27 ` ericonr
                   ` (21 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: ericonr @ 2022-02-07  2:27 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 319 bytes --]

New review comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800279094

Comment:
Try upstreaming a change in upstream code to use `uintX_t` directly instead of `u_intX_t`, since the latter is silly and nonstandard. Same for `unsigned` instead of `uint`.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (31 preceding siblings ...)
  2022-02-07  2:27 ` ericonr
@ 2022-02-07  2:27 ` ericonr
  2022-02-07  4:23 ` [PR PATCH] [Updated] " cinerea0
                   ` (20 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: ericonr @ 2022-02-07  2:27 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 219 bytes --]

New review comment by ericonr on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800279185

Comment:
The typedefs shouldn't be necessary, because the types shouldn't be used

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (32 preceding siblings ...)
  2022-02-07  2:27 ` ericonr
@ 2022-02-07  4:23 ` cinerea0
  2022-02-07  4:42 ` cinerea0
                   ` (19 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2022-02-07  4:23 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 8647 bytes --]

From 0c5820662793e27bccb82edf144afb6682a1020b Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:22:11 -0500
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1.

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 5926ce6b6843b916058bcb72bdc137a08f70e47d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:22:32 -0500
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.2.0.

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From 8fb07bae9172013174640545f12504adb6e333d4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:22:55 -0500
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.5.

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 1deba5b1cf38ec0aec2714e2bbbac8b4bf599b0b Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:23:33 -0500
Subject: [PATCH 4/4] New package: opensnitch-1.5.0.

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch | 14 +++++++++
 srcpkgs/opensnitch/patches/musl.patch     | 35 +++++++++++++++++++++++
 srcpkgs/opensnitch/template               | 34 ++++++++++++++++++++++
 4 files changed, 87 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..17d202f1da0f
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r ./conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..0c3f52b47ef2
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,14 @@
+# Adjustment for our cross-cc wrapper
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl.patch b/srcpkgs/opensnitch/patches/musl.patch
new file mode 100644
index 000000000000..ba5d7284e08c
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl.patch
@@ -0,0 +1,35 @@
+diff --git a/daemon/netfilter/queue.h.old b/daemon/netfilter/queue.h
+index 64c3ea7..998278a 100644
+--- a/daemon/netfilter/queue.h.old
++++ b/daemon/netfilter/queue.h
+@@ -15,16 +15,16 @@
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+ 
+ typedef struct {
+-    uint verdict;
+-    uint mark;
+-    uint mark_set;
+-    uint length;
++    unsigned int verdict;
++    unsigned int mark;
++    unsigned int mark_set;
++    unsigned int length;
+     unsigned char *data;
+ } verdictContainer;
+ 
+ static void *get_uid = NULL;
+ 
+-extern void go_callback(int id, unsigned char* data, int len, uint mark, u_int32_t idx, verdictContainer *vc, uint32_t uid);
++extern void go_callback(int id, unsigned char* data, int len, unsigned int mark, uint32_t idx, verdictContainer *vc, uint32_t uid);
+ 
+ static uint8_t stop = 0;
+ 
+@@ -80,7 +80,7 @@ static int nf_callback(struct nfq_q_handle *qh, struct nfgenmsg *nfmsg, struct n
+     return nfq_set_verdict2(qh, id, vc.verdict, vc.mark, vc.length, vc.data);
+ }
+ 
+-static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, u_int16_t queue, u_int32_t idx) {
++static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, uint16_t queue, uint32_t idx) {
+     struct nfq_q_handle* qh = nfq_create_queue(h, queue, &nf_callback, (void*)((uintptr_t)idx));
+     if (qh == NULL){
+         printf("ERROR: nfq_create_queue() queue not created\n");
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..70166ca6f65b
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.0
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=9af9a72d18d1af70fe82f5e6f2c37cd6e91652521fdfa7cef964ac7d992f0356
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (33 preceding siblings ...)
  2022-02-07  4:23 ` [PR PATCH] [Updated] " cinerea0
@ 2022-02-07  4:42 ` cinerea0
  2022-02-07  4:52 ` [PR REVIEW] " cinerea0
                   ` (18 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2022-02-07  4:42 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 10206 bytes --]

From 0c5820662793e27bccb82edf144afb6682a1020b Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:22:11 -0500
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1.

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 5926ce6b6843b916058bcb72bdc137a08f70e47d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:22:32 -0500
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.2.0.

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From 8fb07bae9172013174640545f12504adb6e333d4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:22:55 -0500
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.5.

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 4cae46f0404d45dba3f0722f46ff75e50f9ab758 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Sun, 6 Feb 2022 23:41:46 -0500
Subject: [PATCH 4/4] New package: opensnitch-1.5.0.

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 ++
 srcpkgs/opensnitch/patches/cc-check.patch | 14 +++++
 srcpkgs/opensnitch/patches/musl.patch     | 65 +++++++++++++++++++++++
 srcpkgs/opensnitch/template               | 34 ++++++++++++
 4 files changed, 117 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..17d202f1da0f
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r ./conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..0c3f52b47ef2
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,14 @@
+# Adjustment for our cross-cc wrapper
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl.patch b/srcpkgs/opensnitch/patches/musl.patch
new file mode 100644
index 000000000000..039d00db7529
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl.patch
@@ -0,0 +1,65 @@
+diff --git a/daemon/netfilter/queue.h.old b/daemon/netfilter/queue.h
+index 64c3ea7..998278a 100644
+--- a/daemon/netfilter/queue.h.old
++++ b/daemon/netfilter/queue.h
+@@ -15,16 +15,16 @@
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+ 
+ typedef struct {
+-    uint verdict;
+-    uint mark;
+-    uint mark_set;
+-    uint length;
++    unsigned int verdict;
++    unsigned int mark;
++    unsigned int mark_set;
++    unsigned int length;
+     unsigned char *data;
+ } verdictContainer;
+ 
+ static void *get_uid = NULL;
+ 
+-extern void go_callback(int id, unsigned char* data, int len, uint mark, u_int32_t idx, verdictContainer *vc, uint32_t uid);
++extern void go_callback(int id, unsigned char* data, int len, unsigned int mark, uint32_t idx, verdictContainer *vc, uint32_t uid);
+ 
+ static uint8_t stop = 0;
+ 
+@@ -80,7 +80,7 @@ static int nf_callback(struct nfq_q_handle *qh, struct nfgenmsg *nfmsg, struct n
+     return nfq_set_verdict2(qh, id, vc.verdict, vc.mark, vc.length, vc.data);
+ }
+ 
+-static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, u_int16_t queue, u_int32_t idx) {
++static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, uint16_t queue, uint32_t idx) {
+     struct nfq_q_handle* qh = nfq_create_queue(h, queue, &nf_callback, (void*)((uintptr_t)idx));
+     if (qh == NULL){
+         printf("ERROR: nfq_create_queue() queue not created\n");
+diff --git a/daemon/netfilter/queue.go.old b/daemon/netfilter/queue.go
+index 902d1dd..016ee92 100644
+--- a/daemon/netfilter/queue.go.old
++++ b/daemon/netfilter/queue.go
+@@ -92,7 +92,7 @@ func (q *Queue) create(queueID uint16) (err error) {
+ 		return fmt.Errorf("Error binding to AF_INET protocol family: %v", err)
+ 	} else if ret, err := C.nfq_bind_pf(q.h, AF_INET6); err != nil || ret < 0 {
+ 		return fmt.Errorf("Error binding to AF_INET6 protocol family: %v", err)
+-	} else if q.qh, err = C.CreateQueue(q.h, C.u_int16_t(queueID), C.u_int32_t(q.idx)); err != nil || q.qh == nil {
++	} else if q.qh, err = C.CreateQueue(q.h, C.uint16_t(queueID), C.uint32_t(q.idx)); err != nil || q.qh == nil {
+ 		q.destroy()
+ 		return fmt.Errorf("Error binding to queue: %v", err)
+ 	}
+@@ -107,14 +107,14 @@ func (q *Queue) create(queueID uint16) (err error) {
+ func (q *Queue) setup() (err error) {
+ 	var ret C.int
+ 
+-	queueSize := C.u_int32_t(NF_DEFAULT_QUEUE_SIZE)
++	queueSize := C.uint32_t(NF_DEFAULT_QUEUE_SIZE)
+ 	bufferSize := C.uint(NF_DEFAULT_PACKET_SIZE)
+ 	totSize := C.uint(NF_DEFAULT_QUEUE_SIZE * NF_DEFAULT_PACKET_SIZE)
+ 
+ 	if ret, err = C.nfq_set_queue_maxlen(q.qh, queueSize); err != nil || ret < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set max packets in queue: %v", err)
+-	} else if C.nfq_set_mode(q.qh, C.u_int8_t(2), bufferSize) < 0 {
++	} else if C.nfq_set_mode(q.qh, C.uint8_t(2), bufferSize) < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set packets copy mode: %v", err)
+ 	} else if q.fd, err = C.nfq_fd(q.h); err != nil {
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..70166ca6f65b
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.0
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=9af9a72d18d1af70fe82f5e6f2c37cd6e91652521fdfa7cef964ac7d992f0356
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (34 preceding siblings ...)
  2022-02-07  4:42 ` cinerea0
@ 2022-02-07  4:52 ` cinerea0
  2022-02-20  2:30 ` cinerea0
                   ` (17 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2022-02-07  4:52 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 266 bytes --]

New review comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r800313889

Comment:
Before I submit my changes upstream, can you take a look at the changes I made in the patch and see if they look good?

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR REVIEW] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (35 preceding siblings ...)
  2022-02-07  4:52 ` [PR REVIEW] " cinerea0
@ 2022-02-20  2:30 ` cinerea0
  2022-06-03  2:11 ` github-actions
                   ` (16 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2022-02-20  2:30 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 235 bytes --]

New review comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#discussion_r810560296

Comment:
My changes have been accepted upstream and will likely be included in the next release.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (36 preceding siblings ...)
  2022-02-20  2:30 ` cinerea0
@ 2022-06-03  2:11 ` github-actions
  2022-06-04  2:40 ` [PR PATCH] [Updated] " cinerea0
                   ` (15 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: github-actions @ 2022-06-03  2:11 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 305 bytes --]

New comment by github-actions[bot] on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1145518901

Comment:
Pull Requests become stale 90 days after last activity and are closed 14 days after that.  If this pull request is still relevant bump it or assign it.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (37 preceding siblings ...)
  2022-06-03  2:11 ` github-actions
@ 2022-06-04  2:40 ` cinerea0
  2022-06-04  2:56 ` [PR PATCH] [Updated] New package: opensnitch-1.5.1 cinerea0
                   ` (14 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2022-06-04  2:40 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.0
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 12195 bytes --]

From 898b5b83ef807411420b29f53f9a850a0e0d512b Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:37:04 -0400
Subject: [PATCH 1/5] New package: protobuf-go-1.28.0

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..2260246de16a
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.28.0
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=e59ae9ace31c3a84bddf1bc3f04a04c498adb9ea7f9fcde60db91bba33d55171
+
+post_install() {
+	vlicense LICENSE
+}

From ce0ed3b77304452e326564248a5763c55d398aba Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:37:24 -0400
Subject: [PATCH 2/5] New package: protoc-gen-go-grpc-1.2.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From 4f392371d70d9bc290750fa5e982e61873918b1a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:38:00 -0400
Subject: [PATCH 3/5] New package: python3-unicode-slugify-0.1.5

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From c7d96db27b3e28115c968e62f27ccdb5943cb524 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:39:43 -0400
Subject: [PATCH 4/5] New package: python3-qt-material-2.12

---
 srcpkgs/python3-qt-material/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-qt-material/template

diff --git a/srcpkgs/python3-qt-material/template b/srcpkgs/python3-qt-material/template
new file mode 100644
index 000000000000..115ffa065469
--- /dev/null
+++ b/srcpkgs/python3-qt-material/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-qt-material'
+pkgname=python3-qt-material
+version=2.12
+revision=1
+wrksrc="qt-material-${version}"
+build_style=python3-module
+hostmakedepends="python3-Jinja2 python3-setuptools"
+depends="python3-Jinja2 python3-MarkupSafe"
+short_desc="Material inspired stylesheet for PySide2, PySide6, PyQt5 and PyQt6"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-2-Clause"
+homepage="https://pypi.org/project/qt-material/"
+distfiles="${PYPI_SITE}/q/qt-material/qt-material-${version}.tar.gz"
+checksum=4ead6710b4fa64f94963bf359422e077a032a84ec8c350804ff743d1be7f4657
+
+post_install() {
+	vlicense LICENSE
+}

From 7cf3a7a8ed67969486782584cbae53c7e1269a35 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:40:10 -0400
Subject: [PATCH 5/5] New package: opensnitch-1.5.1

---
 srcpkgs/opensnitch/files/opensnitchd/run      |  4 ++
 srcpkgs/opensnitch/patches/cc-check.patch     | 14 ++++
 srcpkgs/opensnitch/patches/musl.patch         | 65 +++++++++++++++++++
 .../patches/update-requirements.patch         | 12 ++++
 srcpkgs/opensnitch/template                   | 35 ++++++++++
 5 files changed, 130 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl.patch
 create mode 100644 srcpkgs/opensnitch/patches/update-requirements.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..17d202f1da0f
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r ./conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..0c3f52b47ef2
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,14 @@
+# Adjustment for our cross-cc wrapper
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl.patch b/srcpkgs/opensnitch/patches/musl.patch
new file mode 100644
index 000000000000..039d00db7529
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl.patch
@@ -0,0 +1,65 @@
+diff --git a/daemon/netfilter/queue.h.old b/daemon/netfilter/queue.h
+index 64c3ea7..998278a 100644
+--- a/daemon/netfilter/queue.h.old
++++ b/daemon/netfilter/queue.h
+@@ -15,16 +15,16 @@
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+ 
+ typedef struct {
+-    uint verdict;
+-    uint mark;
+-    uint mark_set;
+-    uint length;
++    unsigned int verdict;
++    unsigned int mark;
++    unsigned int mark_set;
++    unsigned int length;
+     unsigned char *data;
+ } verdictContainer;
+ 
+ static void *get_uid = NULL;
+ 
+-extern void go_callback(int id, unsigned char* data, int len, uint mark, u_int32_t idx, verdictContainer *vc, uint32_t uid);
++extern void go_callback(int id, unsigned char* data, int len, unsigned int mark, uint32_t idx, verdictContainer *vc, uint32_t uid);
+ 
+ static uint8_t stop = 0;
+ 
+@@ -80,7 +80,7 @@ static int nf_callback(struct nfq_q_handle *qh, struct nfgenmsg *nfmsg, struct n
+     return nfq_set_verdict2(qh, id, vc.verdict, vc.mark, vc.length, vc.data);
+ }
+ 
+-static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, u_int16_t queue, u_int32_t idx) {
++static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, uint16_t queue, uint32_t idx) {
+     struct nfq_q_handle* qh = nfq_create_queue(h, queue, &nf_callback, (void*)((uintptr_t)idx));
+     if (qh == NULL){
+         printf("ERROR: nfq_create_queue() queue not created\n");
+diff --git a/daemon/netfilter/queue.go.old b/daemon/netfilter/queue.go
+index 902d1dd..016ee92 100644
+--- a/daemon/netfilter/queue.go.old
++++ b/daemon/netfilter/queue.go
+@@ -92,7 +92,7 @@ func (q *Queue) create(queueID uint16) (err error) {
+ 		return fmt.Errorf("Error binding to AF_INET protocol family: %v", err)
+ 	} else if ret, err := C.nfq_bind_pf(q.h, AF_INET6); err != nil || ret < 0 {
+ 		return fmt.Errorf("Error binding to AF_INET6 protocol family: %v", err)
+-	} else if q.qh, err = C.CreateQueue(q.h, C.u_int16_t(queueID), C.u_int32_t(q.idx)); err != nil || q.qh == nil {
++	} else if q.qh, err = C.CreateQueue(q.h, C.uint16_t(queueID), C.uint32_t(q.idx)); err != nil || q.qh == nil {
+ 		q.destroy()
+ 		return fmt.Errorf("Error binding to queue: %v", err)
+ 	}
+@@ -107,14 +107,14 @@ func (q *Queue) create(queueID uint16) (err error) {
+ func (q *Queue) setup() (err error) {
+ 	var ret C.int
+ 
+-	queueSize := C.u_int32_t(NF_DEFAULT_QUEUE_SIZE)
++	queueSize := C.uint32_t(NF_DEFAULT_QUEUE_SIZE)
+ 	bufferSize := C.uint(NF_DEFAULT_PACKET_SIZE)
+ 	totSize := C.uint(NF_DEFAULT_QUEUE_SIZE * NF_DEFAULT_PACKET_SIZE)
+ 
+ 	if ret, err = C.nfq_set_queue_maxlen(q.qh, queueSize); err != nil || ret < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set max packets in queue: %v", err)
+-	} else if C.nfq_set_mode(q.qh, C.u_int8_t(2), bufferSize) < 0 {
++	} else if C.nfq_set_mode(q.qh, C.uint8_t(2), bufferSize) < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set packets copy mode: %v", err)
+ 	} else if q.fd, err = C.nfq_fd(q.h); err != nil {
diff --git a/srcpkgs/opensnitch/patches/update-requirements.patch b/srcpkgs/opensnitch/patches/update-requirements.patch
new file mode 100644
index 000000000000..b276df389203
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/update-requirements.patch
@@ -0,0 +1,12 @@
+# update version to match our package
+diff --git a/ui/requirements.txt b/ui/requirements.txt
+index f29cc1b4ef..66e0de13b2 100644
+--- a/ui/requirements.txt
++++ b/ui/requirements.txt
+@@ -1,5 +1,5 @@
+ grpcio-tools>=1.10.1
+ pyinotify==0.9.6
+-unicode_slugify==0.1.3
++unicode_slugify==0.1.5
+ pyqt5>=5.6
+ protobuf
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..f8e54f6394d8
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,35 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-inotify
+ python3-unicode-slugify python3-Unidecode"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-notify2 python3-pyasn1 python3-PyQt5 python3-PyQt5-sql
+ python3-qt-material python3-unicode-slugify python3-Unidecode qt5-wayland
+ qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=f0e1aa0d6c52ac11d32c8f778479c2d1cecbb733d784e88bf4ecd19580930d4f
+nopie_files="/usr/bin/opensnitchd"
+#nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (38 preceding siblings ...)
  2022-06-04  2:40 ` [PR PATCH] [Updated] " cinerea0
@ 2022-06-04  2:56 ` cinerea0
  2022-06-04  3:11 ` cinerea0
                   ` (13 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2022-06-04  2:56 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 11472 bytes --]

From 898b5b83ef807411420b29f53f9a850a0e0d512b Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:37:04 -0400
Subject: [PATCH 1/5] New package: protobuf-go-1.28.0

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..2260246de16a
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.28.0
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=e59ae9ace31c3a84bddf1bc3f04a04c498adb9ea7f9fcde60db91bba33d55171
+
+post_install() {
+	vlicense LICENSE
+}

From ce0ed3b77304452e326564248a5763c55d398aba Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:37:24 -0400
Subject: [PATCH 2/5] New package: protoc-gen-go-grpc-1.2.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From 7c3751710c2a6ed00a229a3720dbe219a37950c9 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:56:04 -0400
Subject: [PATCH 3/5] New package: python3-unicode-slugify-0.1.3

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..650a953fdeca
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.3
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=34cf3afefa6480efe705a4fc0eaeeaf7f49754aec322ba3e8b2f27dc1cbcf650
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 332115c55b35ff6b07aa1da4cc0b05c7cade2d3f Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:56:20 -0400
Subject: [PATCH 4/5] New package: python3-qt-material-2.12

---
 srcpkgs/python3-qt-material/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-qt-material/template

diff --git a/srcpkgs/python3-qt-material/template b/srcpkgs/python3-qt-material/template
new file mode 100644
index 000000000000..115ffa065469
--- /dev/null
+++ b/srcpkgs/python3-qt-material/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-qt-material'
+pkgname=python3-qt-material
+version=2.12
+revision=1
+wrksrc="qt-material-${version}"
+build_style=python3-module
+hostmakedepends="python3-Jinja2 python3-setuptools"
+depends="python3-Jinja2 python3-MarkupSafe"
+short_desc="Material inspired stylesheet for PySide2, PySide6, PyQt5 and PyQt6"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-2-Clause"
+homepage="https://pypi.org/project/qt-material/"
+distfiles="${PYPI_SITE}/q/qt-material/qt-material-${version}.tar.gz"
+checksum=4ead6710b4fa64f94963bf359422e077a032a84ec8c350804ff743d1be7f4657
+
+post_install() {
+	vlicense LICENSE
+}

From 23f6f98ed1ecc907b756c7cbb36ab6cfe6e24c1d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:56:33 -0400
Subject: [PATCH 5/5] New package: opensnitch-1.5.1

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 ++
 srcpkgs/opensnitch/patches/cc-check.patch | 14 +++++
 srcpkgs/opensnitch/patches/musl.patch     | 65 +++++++++++++++++++++++
 srcpkgs/opensnitch/template               | 35 ++++++++++++
 4 files changed, 118 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..17d202f1da0f
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r ./conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..0c3f52b47ef2
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,14 @@
+# Adjustment for our cross-cc wrapper
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl.patch b/srcpkgs/opensnitch/patches/musl.patch
new file mode 100644
index 000000000000..039d00db7529
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl.patch
@@ -0,0 +1,65 @@
+diff --git a/daemon/netfilter/queue.h.old b/daemon/netfilter/queue.h
+index 64c3ea7..998278a 100644
+--- a/daemon/netfilter/queue.h.old
++++ b/daemon/netfilter/queue.h
+@@ -15,16 +15,16 @@
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+ 
+ typedef struct {
+-    uint verdict;
+-    uint mark;
+-    uint mark_set;
+-    uint length;
++    unsigned int verdict;
++    unsigned int mark;
++    unsigned int mark_set;
++    unsigned int length;
+     unsigned char *data;
+ } verdictContainer;
+ 
+ static void *get_uid = NULL;
+ 
+-extern void go_callback(int id, unsigned char* data, int len, uint mark, u_int32_t idx, verdictContainer *vc, uint32_t uid);
++extern void go_callback(int id, unsigned char* data, int len, unsigned int mark, uint32_t idx, verdictContainer *vc, uint32_t uid);
+ 
+ static uint8_t stop = 0;
+ 
+@@ -80,7 +80,7 @@ static int nf_callback(struct nfq_q_handle *qh, struct nfgenmsg *nfmsg, struct n
+     return nfq_set_verdict2(qh, id, vc.verdict, vc.mark, vc.length, vc.data);
+ }
+ 
+-static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, u_int16_t queue, u_int32_t idx) {
++static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, uint16_t queue, uint32_t idx) {
+     struct nfq_q_handle* qh = nfq_create_queue(h, queue, &nf_callback, (void*)((uintptr_t)idx));
+     if (qh == NULL){
+         printf("ERROR: nfq_create_queue() queue not created\n");
+diff --git a/daemon/netfilter/queue.go.old b/daemon/netfilter/queue.go
+index 902d1dd..016ee92 100644
+--- a/daemon/netfilter/queue.go.old
++++ b/daemon/netfilter/queue.go
+@@ -92,7 +92,7 @@ func (q *Queue) create(queueID uint16) (err error) {
+ 		return fmt.Errorf("Error binding to AF_INET protocol family: %v", err)
+ 	} else if ret, err := C.nfq_bind_pf(q.h, AF_INET6); err != nil || ret < 0 {
+ 		return fmt.Errorf("Error binding to AF_INET6 protocol family: %v", err)
+-	} else if q.qh, err = C.CreateQueue(q.h, C.u_int16_t(queueID), C.u_int32_t(q.idx)); err != nil || q.qh == nil {
++	} else if q.qh, err = C.CreateQueue(q.h, C.uint16_t(queueID), C.uint32_t(q.idx)); err != nil || q.qh == nil {
+ 		q.destroy()
+ 		return fmt.Errorf("Error binding to queue: %v", err)
+ 	}
+@@ -107,14 +107,14 @@ func (q *Queue) create(queueID uint16) (err error) {
+ func (q *Queue) setup() (err error) {
+ 	var ret C.int
+ 
+-	queueSize := C.u_int32_t(NF_DEFAULT_QUEUE_SIZE)
++	queueSize := C.uint32_t(NF_DEFAULT_QUEUE_SIZE)
+ 	bufferSize := C.uint(NF_DEFAULT_PACKET_SIZE)
+ 	totSize := C.uint(NF_DEFAULT_QUEUE_SIZE * NF_DEFAULT_PACKET_SIZE)
+ 
+ 	if ret, err = C.nfq_set_queue_maxlen(q.qh, queueSize); err != nil || ret < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set max packets in queue: %v", err)
+-	} else if C.nfq_set_mode(q.qh, C.u_int8_t(2), bufferSize) < 0 {
++	} else if C.nfq_set_mode(q.qh, C.uint8_t(2), bufferSize) < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set packets copy mode: %v", err)
+ 	} else if q.fd, err = C.nfq_fd(q.h); err != nil {
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..f8e54f6394d8
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,35 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-inotify
+ python3-unicode-slugify python3-Unidecode"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-notify2 python3-pyasn1 python3-PyQt5 python3-PyQt5-sql
+ python3-qt-material python3-unicode-slugify python3-Unidecode qt5-wayland
+ qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=f0e1aa0d6c52ac11d32c8f778479c2d1cecbb733d784e88bf4ecd19580930d4f
+nopie_files="/usr/bin/opensnitchd"
+#nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (39 preceding siblings ...)
  2022-06-04  2:56 ` [PR PATCH] [Updated] New package: opensnitch-1.5.1 cinerea0
@ 2022-06-04  3:11 ` cinerea0
  2022-06-05 22:14 ` cinerea0
                   ` (12 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2022-06-04  3:11 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 12194 bytes --]

From 898b5b83ef807411420b29f53f9a850a0e0d512b Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 22:37:04 -0400
Subject: [PATCH 1/5] New package: protobuf-go-1.28.0

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..2260246de16a
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.28.0
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=e59ae9ace31c3a84bddf1bc3f04a04c498adb9ea7f9fcde60db91bba33d55171
+
+post_install() {
+	vlicense LICENSE
+}

From 7671b2920a25348ec83dc95756ed0e9a9e62118d Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 23:10:11 -0400
Subject: [PATCH 2/5] New package: protoc-gen-go-grpc-1.2.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From 71dd874bd39093b880ee3b20618f372ebb69997a Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 23:10:42 -0400
Subject: [PATCH 3/5] New package: python3-unicode-slugify-0.1.5

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From a4b233a3f0cb6431f0f1bced7629ef40bfc11615 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 23:11:08 -0400
Subject: [PATCH 4/5] New package: python3-qt-material-2.12

---
 srcpkgs/python3-qt-material/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-qt-material/template

diff --git a/srcpkgs/python3-qt-material/template b/srcpkgs/python3-qt-material/template
new file mode 100644
index 000000000000..115ffa065469
--- /dev/null
+++ b/srcpkgs/python3-qt-material/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-qt-material'
+pkgname=python3-qt-material
+version=2.12
+revision=1
+wrksrc="qt-material-${version}"
+build_style=python3-module
+hostmakedepends="python3-Jinja2 python3-setuptools"
+depends="python3-Jinja2 python3-MarkupSafe"
+short_desc="Material inspired stylesheet for PySide2, PySide6, PyQt5 and PyQt6"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-2-Clause"
+homepage="https://pypi.org/project/qt-material/"
+distfiles="${PYPI_SITE}/q/qt-material/qt-material-${version}.tar.gz"
+checksum=4ead6710b4fa64f94963bf359422e077a032a84ec8c350804ff743d1be7f4657
+
+post_install() {
+	vlicense LICENSE
+}

From 08740ea9241e102a67799f54226744784a61b866 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 3 Jun 2022 23:11:38 -0400
Subject: [PATCH 5/5] New package: opensnitch-1.5.1

---
 srcpkgs/opensnitch/files/opensnitchd/run      |  4 ++
 srcpkgs/opensnitch/patches/cc-check.patch     | 14 ++++
 srcpkgs/opensnitch/patches/musl.patch         | 65 +++++++++++++++++++
 .../patches/update-requirements.patch         | 12 ++++
 srcpkgs/opensnitch/template                   | 35 ++++++++++
 5 files changed, 130 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl.patch
 create mode 100644 srcpkgs/opensnitch/patches/update-requirements.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..17d202f1da0f
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r ./conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..0c3f52b47ef2
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,14 @@
+# Adjustment for our cross-cc wrapper
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl.patch b/srcpkgs/opensnitch/patches/musl.patch
new file mode 100644
index 000000000000..039d00db7529
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl.patch
@@ -0,0 +1,65 @@
+diff --git a/daemon/netfilter/queue.h.old b/daemon/netfilter/queue.h
+index 64c3ea7..998278a 100644
+--- a/daemon/netfilter/queue.h.old
++++ b/daemon/netfilter/queue.h
+@@ -15,16 +15,16 @@
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+ 
+ typedef struct {
+-    uint verdict;
+-    uint mark;
+-    uint mark_set;
+-    uint length;
++    unsigned int verdict;
++    unsigned int mark;
++    unsigned int mark_set;
++    unsigned int length;
+     unsigned char *data;
+ } verdictContainer;
+ 
+ static void *get_uid = NULL;
+ 
+-extern void go_callback(int id, unsigned char* data, int len, uint mark, u_int32_t idx, verdictContainer *vc, uint32_t uid);
++extern void go_callback(int id, unsigned char* data, int len, unsigned int mark, uint32_t idx, verdictContainer *vc, uint32_t uid);
+ 
+ static uint8_t stop = 0;
+ 
+@@ -80,7 +80,7 @@ static int nf_callback(struct nfq_q_handle *qh, struct nfgenmsg *nfmsg, struct n
+     return nfq_set_verdict2(qh, id, vc.verdict, vc.mark, vc.length, vc.data);
+ }
+ 
+-static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, u_int16_t queue, u_int32_t idx) {
++static inline struct nfq_q_handle* CreateQueue(struct nfq_handle *h, uint16_t queue, uint32_t idx) {
+     struct nfq_q_handle* qh = nfq_create_queue(h, queue, &nf_callback, (void*)((uintptr_t)idx));
+     if (qh == NULL){
+         printf("ERROR: nfq_create_queue() queue not created\n");
+diff --git a/daemon/netfilter/queue.go.old b/daemon/netfilter/queue.go
+index 902d1dd..016ee92 100644
+--- a/daemon/netfilter/queue.go.old
++++ b/daemon/netfilter/queue.go
+@@ -92,7 +92,7 @@ func (q *Queue) create(queueID uint16) (err error) {
+ 		return fmt.Errorf("Error binding to AF_INET protocol family: %v", err)
+ 	} else if ret, err := C.nfq_bind_pf(q.h, AF_INET6); err != nil || ret < 0 {
+ 		return fmt.Errorf("Error binding to AF_INET6 protocol family: %v", err)
+-	} else if q.qh, err = C.CreateQueue(q.h, C.u_int16_t(queueID), C.u_int32_t(q.idx)); err != nil || q.qh == nil {
++	} else if q.qh, err = C.CreateQueue(q.h, C.uint16_t(queueID), C.uint32_t(q.idx)); err != nil || q.qh == nil {
+ 		q.destroy()
+ 		return fmt.Errorf("Error binding to queue: %v", err)
+ 	}
+@@ -107,14 +107,14 @@ func (q *Queue) create(queueID uint16) (err error) {
+ func (q *Queue) setup() (err error) {
+ 	var ret C.int
+ 
+-	queueSize := C.u_int32_t(NF_DEFAULT_QUEUE_SIZE)
++	queueSize := C.uint32_t(NF_DEFAULT_QUEUE_SIZE)
+ 	bufferSize := C.uint(NF_DEFAULT_PACKET_SIZE)
+ 	totSize := C.uint(NF_DEFAULT_QUEUE_SIZE * NF_DEFAULT_PACKET_SIZE)
+ 
+ 	if ret, err = C.nfq_set_queue_maxlen(q.qh, queueSize); err != nil || ret < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set max packets in queue: %v", err)
+-	} else if C.nfq_set_mode(q.qh, C.u_int8_t(2), bufferSize) < 0 {
++	} else if C.nfq_set_mode(q.qh, C.uint8_t(2), bufferSize) < 0 {
+ 		q.destroy()
+ 		return fmt.Errorf("Unable to set packets copy mode: %v", err)
+ 	} else if q.fd, err = C.nfq_fd(q.h); err != nil {
diff --git a/srcpkgs/opensnitch/patches/update-requirements.patch b/srcpkgs/opensnitch/patches/update-requirements.patch
new file mode 100644
index 000000000000..b276df389203
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/update-requirements.patch
@@ -0,0 +1,12 @@
+# update version to match our package
+diff --git a/ui/requirements.txt b/ui/requirements.txt
+index f29cc1b4ef..66e0de13b2 100644
+--- a/ui/requirements.txt
++++ b/ui/requirements.txt
+@@ -1,5 +1,5 @@
+ grpcio-tools>=1.10.1
+ pyinotify==0.9.6
+-unicode_slugify==0.1.3
++unicode_slugify==0.1.5
+ pyqt5>=5.6
+ protobuf
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..85adc42bf11a
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,35 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.1
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-inotify
+ python3-unicode-slugify python3-Unidecode"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-notify2 python3-pyasn1 python3-PyQt5 python3-PyQt5-sql
+ python3-qt-material python3-unicode-slugify python3-Unidecode qt5-wayland
+ qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=f0e1aa0d6c52ac11d32c8f778479c2d1cecbb733d784e88bf4ecd19580930d4f
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (40 preceding siblings ...)
  2022-06-04  3:11 ` cinerea0
@ 2022-06-05 22:14 ` cinerea0
  2022-09-04  2:16 ` github-actions
                   ` (11 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2022-06-05 22:14 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 185 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1146892593

Comment:
I'm still working on this, it's not stale.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (41 preceding siblings ...)
  2022-06-05 22:14 ` cinerea0
@ 2022-09-04  2:16 ` github-actions
  2022-09-05  3:02 ` cinerea0
                   ` (10 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: github-actions @ 2022-09-04  2:16 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 305 bytes --]

New comment by github-actions[bot] on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1236234064

Comment:
Pull Requests become stale 90 days after last activity and are closed 14 days after that.  If this pull request is still relevant bump it or assign it.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (42 preceding siblings ...)
  2022-09-04  2:16 ` github-actions
@ 2022-09-05  3:02 ` cinerea0
  2022-12-06  2:29 ` github-actions
                   ` (9 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2022-09-05  3:02 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 195 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1236498887

Comment:
Not stale, just need to work out the file conflicts.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (43 preceding siblings ...)
  2022-09-05  3:02 ` cinerea0
@ 2022-12-06  2:29 ` github-actions
  2022-12-16  0:35 ` cinerea0
                   ` (8 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: github-actions @ 2022-12-06  2:29 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 305 bytes --]

New comment by github-actions[bot] on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1338641859

Comment:
Pull Requests become stale 90 days after last activity and are closed 14 days after that.  If this pull request is still relevant bump it or assign it.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (44 preceding siblings ...)
  2022-12-06  2:29 ` github-actions
@ 2022-12-16  0:35 ` cinerea0
  2023-03-16  1:57 ` github-actions
                   ` (7 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2022-12-16  0:35 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 242 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1353966891

Comment:
Currently waiting on 1.6.0 to be released so I can fix whatever new issues will be in that version.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (45 preceding siblings ...)
  2022-12-16  0:35 ` cinerea0
@ 2023-03-16  1:57 ` github-actions
  2023-06-16  1:59 ` github-actions
                   ` (6 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: github-actions @ 2023-03-16  1:57 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 305 bytes --]

New comment by github-actions[bot] on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1471161029

Comment:
Pull Requests become stale 90 days after last activity and are closed 14 days after that.  If this pull request is still relevant bump it or assign it.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (46 preceding siblings ...)
  2023-03-16  1:57 ` github-actions
@ 2023-06-16  1:59 ` github-actions
  2023-06-29 14:24 ` [PR PATCH] [Updated] " cinerea0
                   ` (5 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: github-actions @ 2023-06-16  1:59 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 305 bytes --]

New comment by github-actions[bot] on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1593974670

Comment:
Pull Requests become stale 90 days after last activity and are closed 14 days after that.  If this pull request is still relevant bump it or assign it.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Updated] New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (47 preceding siblings ...)
  2023-06-16  1:59 ` github-actions
@ 2023-06-29 14:24 ` cinerea0
  2023-06-29 14:25 ` cinerea0
                   ` (4 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2023-06-29 14:24 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.5.1
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 8121 bytes --]

From 267e876d9eeed8439c635f62b00b72e56b6f0ee9 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 29 Jun 2023 10:16:39 -0400
Subject: [PATCH 1/5] New package: protobuf-go-1.30.0

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..be2cec24d61f
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.30.0
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3279a16ec3bdd7c53fe1599134de298ed90d9f3b6ec1c1eb5f3b76ba5aaa9f0c
+
+post_install() {
+	vlicense LICENSE
+}

From 063145738339f35e7a4c28b5c6a63536bf1f53e8 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 29 Jun 2023 10:17:02 -0400
Subject: [PATCH 2/5] New package: protoc-gen-go-grpc-1.3.0

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..a1968c726e9b
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.3.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=26ea2bdea1aeba2180046544d468012ce9cb07667ac1f19476febb13ecc781f9

From 6bdd550f45db20561e3d669bf51e056b0f33e980 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 29 Jun 2023 10:17:23 -0400
Subject: [PATCH 3/5] New package: python3-unicode-slugify-0.1.5

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From ceeaa003730feb01b0b65d9bff77ed8ffc263fc8 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 29 Jun 2023 10:17:40 -0400
Subject: [PATCH 4/5] New package: python3-qt-material-2.14

---
 srcpkgs/python3-qt-material/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-qt-material/template

diff --git a/srcpkgs/python3-qt-material/template b/srcpkgs/python3-qt-material/template
new file mode 100644
index 000000000000..a078bf62587f
--- /dev/null
+++ b/srcpkgs/python3-qt-material/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-qt-material'
+pkgname=python3-qt-material
+version=2.14
+revision=1
+wrksrc="qt-material-${version}"
+build_style=python3-module
+hostmakedepends="python3-Jinja2 python3-setuptools"
+depends="python3-Jinja2 python3-MarkupSafe"
+short_desc="Material inspired stylesheet for PySide2, PySide6, PyQt5 and PyQt6"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-2-Clause"
+homepage="https://pypi.org/project/qt-material/"
+distfiles="${PYPI_SITE}/q/qt-material/qt-material-${version}.tar.gz"
+checksum=b5dbb5ade97217cf7ae336bb7c047c90beb39dc7f2048a498c916ad5f2f7ae23
+
+post_install() {
+	vlicense LICENSE
+}

From 9cca31a16767dc1711bf01b304b1c1784cb1b727 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Thu, 29 Jun 2023 10:20:53 -0400
Subject: [PATCH 5/5] New package: opensnitch-1.6.0

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  5 ++++
 srcpkgs/opensnitch/patches/cc-check.patch | 13 +++++++++
 srcpkgs/opensnitch/template               | 35 +++++++++++++++++++++++
 3 files changed, 53 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..0c4888fbca07
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,5 @@
+#!/bin/sh
+
+exec 2>&1
+[ -r ./conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..9c6cebdd93f4
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 32fe4a78b5..2a95d444c2 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+ 
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..24409f1262ec
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,35 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.6.0
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools qt5-host-tools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-inotify
+ python3-unicode-slugify python3-Unidecode"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-notify2 python3-pyasn1 python3-PyQt5 python3-PyQt5-sql
+ python3-qt-material python3-unicode-slugify python3-Unidecode qt5-plugin-sqlite
+ qt5-wayland"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=d468599f84f6dfde1afc0cad79ef0d511b7f5d5aafc14acbbf730ab0ae317342
+nopie_files="/usr/bin/opensnitchd"
+nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.5.1
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (48 preceding siblings ...)
  2023-06-29 14:24 ` [PR PATCH] [Updated] " cinerea0
@ 2023-06-29 14:25 ` cinerea0
  2023-09-29  1:45 ` New package: opensnitch-1.6.0 github-actions
                   ` (3 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2023-06-29 14:25 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 215 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1613277541

Comment:
New release, many new xlints since the last release, many things to fix.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.6.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (49 preceding siblings ...)
  2023-06-29 14:25 ` cinerea0
@ 2023-09-29  1:45 ` github-actions
  2023-10-13  1:46 ` [PR PATCH] [Closed]: " github-actions
                   ` (2 subsequent siblings)
  53 siblings, 0 replies; 55+ messages in thread
From: github-actions @ 2023-09-29  1:45 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 305 bytes --]

New comment by github-actions[bot] on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1740203714

Comment:
Pull Requests become stale 90 days after last activity and are closed 14 days after that.  If this pull request is still relevant bump it or assign it.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: [PR PATCH] [Closed]: New package: opensnitch-1.6.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (50 preceding siblings ...)
  2023-09-29  1:45 ` New package: opensnitch-1.6.0 github-actions
@ 2023-10-13  1:46 ` github-actions
  2024-01-26  2:41 ` jchook
  2024-01-26  2:43 ` cinerea0
  53 siblings, 0 replies; 55+ messages in thread
From: github-actions @ 2023-10-13  1:46 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 1525 bytes --]

There's a closed pull request on the void-packages repository

New package: opensnitch-1.6.0
https://github.com/void-linux/void-packages/pull/32730

Description:
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.6.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (51 preceding siblings ...)
  2023-10-13  1:46 ` [PR PATCH] [Closed]: " github-actions
@ 2024-01-26  2:41 ` jchook
  2024-01-26  2:43 ` cinerea0
  53 siblings, 0 replies; 55+ messages in thread
From: jchook @ 2024-01-26  2:41 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 178 bytes --]

New comment by jchook on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1911320478

Comment:
@cinerea0 any interest in this still?

^ permalink raw reply	[flat|nested] 55+ messages in thread

* Re: New package: opensnitch-1.6.0
  2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
                   ` (52 preceding siblings ...)
  2024-01-26  2:41 ` jchook
@ 2024-01-26  2:43 ` cinerea0
  53 siblings, 0 replies; 55+ messages in thread
From: cinerea0 @ 2024-01-26  2:43 UTC (permalink / raw)
  To: ml

[-- Attachment #1: Type: text/plain, Size: 188 bytes --]

New comment by cinerea0 on void-packages repository

https://github.com/void-linux/void-packages/pull/32730#issuecomment-1911322200

Comment:
No, you're welcome to pick it up if you want.

^ permalink raw reply	[flat|nested] 55+ messages in thread

end of thread, other threads:[~2024-01-26  2:43 UTC | newest]

Thread overview: 55+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
2021-09-12 12:23 ` apirusKde
2021-09-13  3:57 ` [PR PATCH] [Updated] " cinerea0
2021-09-21 18:36 ` [PR PATCH] [Updated] New package: opensnitch-1.4.0 cinerea0
2021-09-21 18:40 ` cinerea0
2021-10-07 18:53 ` cinerea0
2021-10-07 19:01 ` [PR PATCH] [Updated] New package: opensnitch-1.4.1 cinerea0
2021-10-07 19:08 ` cinerea0
2021-10-08  5:23 ` cinerea0
2021-10-12  3:42 ` cinerea0
2021-10-12  3:49 ` cinerea0
2021-10-12  3:56 ` cinerea0
2021-10-12  4:12 ` cinerea0
2021-10-12  4:26 ` cinerea0
2021-10-12 16:07 ` cinerea0
2021-10-12 17:52 ` cinerea0
2021-10-13  0:09 ` cinerea0
2021-10-13  0:19 ` cinerea0
2021-10-13  0:52 ` ericonr
2021-10-13  3:09 ` [PR PATCH] [Updated] " cinerea0
2021-10-13  4:50 ` cinerea0
2021-10-27 14:12 ` [PR PATCH] [Updated] " cinerea0
2021-10-27 14:17 ` cinerea0
2021-11-05  2:56 ` cinerea0
2021-11-12  4:54 ` New package: opensnitch-1.4.2 cinerea0
2021-11-25  0:20 ` [PR PATCH] [Updated] " cinerea0
2022-02-05  2:25 ` [PR PATCH] [Updated] New package: opensnitch-1.4.3 cinerea0
2022-02-05  3:12 ` [PR PATCH] [Updated] New package: opensnitch-1.5.0 cinerea0
2022-02-06 22:59 ` [PR REVIEW] " ericonr
2022-02-06 22:59 ` ericonr
2022-02-06 22:59 ` ericonr
2022-02-07  1:30 ` cinerea0
2022-02-07  2:27 ` ericonr
2022-02-07  2:27 ` ericonr
2022-02-07  4:23 ` [PR PATCH] [Updated] " cinerea0
2022-02-07  4:42 ` cinerea0
2022-02-07  4:52 ` [PR REVIEW] " cinerea0
2022-02-20  2:30 ` cinerea0
2022-06-03  2:11 ` github-actions
2022-06-04  2:40 ` [PR PATCH] [Updated] " cinerea0
2022-06-04  2:56 ` [PR PATCH] [Updated] New package: opensnitch-1.5.1 cinerea0
2022-06-04  3:11 ` cinerea0
2022-06-05 22:14 ` cinerea0
2022-09-04  2:16 ` github-actions
2022-09-05  3:02 ` cinerea0
2022-12-06  2:29 ` github-actions
2022-12-16  0:35 ` cinerea0
2023-03-16  1:57 ` github-actions
2023-06-16  1:59 ` github-actions
2023-06-29 14:24 ` [PR PATCH] [Updated] " cinerea0
2023-06-29 14:25 ` cinerea0
2023-09-29  1:45 ` New package: opensnitch-1.6.0 github-actions
2023-10-13  1:46 ` [PR PATCH] [Closed]: " github-actions
2024-01-26  2:41 ` jchook
2024-01-26  2:43 ` cinerea0

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).