Github messages for voidlinux
 help / color / mirror / Atom feed
From: cinerea0 <cinerea0@users.noreply.github.com>
To: ml@inbox.vuxu.org
Subject: Re: [PR PATCH] [Updated] New package: opensnitch-1.4.3
Date: Sat, 05 Feb 2022 03:25:10 +0100	[thread overview]
Message-ID: <20220205022510.-0HmSI5Cle5-XcOpqMYFemEXzkynASBIzBXHbyMqRtg@z> (raw)
In-Reply-To: <gh-mailinglist-notifications-41a7ca26-5023-4802-975b-f1789d68868e-void-packages-32730@inbox.vuxu.org>

[-- Attachment #1: Type: text/plain, Size: 1682 bytes --]

There is an updated pull request by cinerea0 against master on the void-packages repository

https://github.com/cinerea0/void-packages snitch
https://github.com/void-linux/void-packages/pull/32730

New package: opensnitch-1.4.3
<!-- Mark items with [x] where applicable -->

#### General
- [x] This is a new package and it conforms to the [quality requirements](https://github.com/void-linux/void-packages/blob/master/Manual.md#quality-requirements)

#### Have the results of the proposed changes been tested?
- [x] I use the packages affected by the proposed changes on a regular basis and confirm this PR works for me
- [ ] I generally don't use the affected packages but briefly tested this PR

<!--
If GitHub CI cannot be used to validate the build result (for example, if the
build is likely to take several hours), make sure to
[skip CI](https://github.com/void-linux/void-packages/blob/master/CONTRIBUTING.md#continuous-integration).
When skipping CI, uncomment and fill out the following section.
Note: for builds that are likely to complete in less than 2 hours, it is not
acceptable to skip CI.
-->
<!-- 
#### Does it build and run successfully? 
(Please choose at least one native build and, if supported, at least one cross build. More are better.)
- [ ] I built this PR locally for my native architecture, (ARCH-LIBC)
- [ ] I built this PR locally for these architectures (if supported. mark crossbuilds):
  - [ ] aarch64-musl
  - [ ] armv7l
  - [ ] armv6l-musl
-->
---
Closes #28819. Picks up where #29849 left off before being closed by the author.

A patch file from https://github.com/void-linux/void-packages/pull/32730.patch is attached

[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: github-pr-snitch-32730.patch --]
[-- Type: text/x-diff, Size: 7646 bytes --]

From 2749d0e9bb638f8911e194d7f3e22f8806da80c6 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:22:56 -0500
Subject: [PATCH 1/4] New package: protobuf-go-1.27.1.

---
 srcpkgs/protobuf-go/template | 17 +++++++++++++++++
 1 file changed, 17 insertions(+)
 create mode 100644 srcpkgs/protobuf-go/template

diff --git a/srcpkgs/protobuf-go/template b/srcpkgs/protobuf-go/template
new file mode 100644
index 000000000000..8f4bddbbae8d
--- /dev/null
+++ b/srcpkgs/protobuf-go/template
@@ -0,0 +1,17 @@
+# Template file for 'protobuf-go'
+pkgname=protobuf-go
+version=1.27.1
+revision=1
+build_style=go
+go_import_path="google.golang.org/protobuf"
+go_package="${go_import_path}/cmd/protoc-gen-go"
+short_desc="Go support for Google's protocol buffers"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://github.com/protocolbuffers/protobuf-go"
+distfiles="https://github.com/protocolbuffers/protobuf-go/archive/refs/tags/v${version}.tar.gz"
+checksum=3ec41a8324431e72f85e0dc0c2c098cc14c3cb1ee8820996c8f46afca2d65609
+
+post_install() {
+	vlicense LICENSE
+}

From 836ecbf4c4a03a818f63e2288adbc31c7ea9f674 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:23:36 -0500
Subject: [PATCH 2/4] New package: protoc-gen-go-grpc-1.2.0.

---
 srcpkgs/protoc-gen-go-grpc/template | 14 ++++++++++++++
 1 file changed, 14 insertions(+)
 create mode 100644 srcpkgs/protoc-gen-go-grpc/template

diff --git a/srcpkgs/protoc-gen-go-grpc/template b/srcpkgs/protoc-gen-go-grpc/template
new file mode 100644
index 000000000000..4caeae146e1f
--- /dev/null
+++ b/srcpkgs/protoc-gen-go-grpc/template
@@ -0,0 +1,14 @@
+# Template file for 'protoc-gen-go-grpc'
+pkgname=protoc-gen-go-grpc
+version=1.2.0
+revision=1
+wrksrc="grpc-go-cmd-${pkgname}-v${version}"
+build_wrksrc="cmd/protoc-gen-go-grpc"
+build_style=go
+go_import_path="google.golang.org/grpc/cmd/protoc-gen-go-grpc"
+short_desc="Generates Go language bindings of protobuf services for gRPC"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="Apache-2.0"
+homepage="https://github.com/grpc/grpc-go/tree/master/cmd/protoc-gen-go-grpc"
+distfiles="https://github.com/grpc/grpc-go/archive/refs/tags/cmd/protoc-gen-go-grpc/v${version}.tar.gz"
+checksum=cbca93d6dce724248dfdea6303bf27ed24cc3ed9cf8f7485eb825682eab21284

From cfa3fad80c0f8bf689f2fc37e93ce92a03d592b5 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:24:06 -0500
Subject: [PATCH 3/4] New package: python3-unicode-slugify-0.1.5.

---
 srcpkgs/python3-unicode-slugify/template | 18 ++++++++++++++++++
 1 file changed, 18 insertions(+)
 create mode 100644 srcpkgs/python3-unicode-slugify/template

diff --git a/srcpkgs/python3-unicode-slugify/template b/srcpkgs/python3-unicode-slugify/template
new file mode 100644
index 000000000000..e1c296b04b8d
--- /dev/null
+++ b/srcpkgs/python3-unicode-slugify/template
@@ -0,0 +1,18 @@
+# Template file for 'python3-unicode-slugify'
+pkgname=python3-unicode-slugify
+version=0.1.5
+revision=1
+wrksrc="unicode-slugify-${version}"
+build_style=python3-module
+hostmakedepends="python3-setuptools"
+short_desc="Slugifier that generates unicode slugs"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="BSD-3-Clause"
+homepage="https://pypi.org/project/unicode-slugify/"
+distfiles="${PYPI_SITE}/u/unicode-slugify/unicode-slugify-${version}.tar.gz"
+checksum=25f424258317e4cb41093e2953374b3af1f23097297664731cdb3ae46f6bd6c3
+make_check=no  # checks were not ported from python2
+
+post_install() {
+	vlicense LICENSE
+}

From 6d0580f356bc8fc7a360b6f9a5b09493750369e4 Mon Sep 17 00:00:00 2001
From: cinerea0 <cinerea0@disroot.org>
Date: Fri, 4 Feb 2022 21:24:42 -0500
Subject: [PATCH 4/4] New package: opensnitch-1.5.0.

---
 srcpkgs/opensnitch/files/opensnitchd/run  |  4 +++
 srcpkgs/opensnitch/patches/cc-check.patch | 13 +++++++++
 srcpkgs/opensnitch/patches/musl-int.patch | 16 +++++++++++
 srcpkgs/opensnitch/template               | 34 +++++++++++++++++++++++
 4 files changed, 67 insertions(+)
 create mode 100644 srcpkgs/opensnitch/files/opensnitchd/run
 create mode 100644 srcpkgs/opensnitch/patches/cc-check.patch
 create mode 100644 srcpkgs/opensnitch/patches/musl-int.patch
 create mode 100644 srcpkgs/opensnitch/template

diff --git a/srcpkgs/opensnitch/files/opensnitchd/run b/srcpkgs/opensnitch/files/opensnitchd/run
new file mode 100644
index 000000000000..2c1855eef621
--- /dev/null
+++ b/srcpkgs/opensnitch/files/opensnitchd/run
@@ -0,0 +1,4 @@
+#!/bin/sh
+
+[ -r conf ] && . ./conf
+exec opensnitchd ${OPTS:--rules-path /etc/opensnitchd/rules}
diff --git a/srcpkgs/opensnitch/patches/cc-check.patch b/srcpkgs/opensnitch/patches/cc-check.patch
new file mode 100644
index 000000000000..004f0861a7d9
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/cc-check.patch
@@ -0,0 +1,13 @@
+diff --git a/daemon/netfilter/queue.go b/daemon/netfilter/queue.go
+index 3797486baf..4ee09d68b5 100644
+--- a/daemon/netfilter/queue.go
++++ b/daemon/netfilter/queue.go
+@@ -3,7 +3,7 @@ package netfilter
+ /*
+ #cgo pkg-config: libnetfilter_queue
+ #cgo CFLAGS: -Wall -I/usr/include
+-#cgo LDFLAGS: -L/usr/lib64/ -ldl
++#cgo LDFLAGS: -L/usr/lib64 -ldl
+
+ #include "queue.h"
+ */
diff --git a/srcpkgs/opensnitch/patches/musl-int.patch b/srcpkgs/opensnitch/patches/musl-int.patch
new file mode 100644
index 000000000000..99a23ff22674
--- /dev/null
+++ b/srcpkgs/opensnitch/patches/musl-int.patch
@@ -0,0 +1,16 @@
+diff --git a/daemon/netfilter/queue.h b/daemon/netfilter/queue.h
+index 64c3ea7c0c..2ced3bb39e 100644
+--- a/daemon/netfilter/queue.h
++++ b/daemon/netfilter/queue.h
+@@ -14,6 +14,11 @@
+ #include <linux/netfilter.h>
+ #include <libnetfilter_queue/libnetfilter_queue.h>
+
++typedef unsigned int uint;
++typedef uint8_t u_int8_t;
++typedef uint16_t u_int16_t;
++typedef uint32_t u_int32_t;
++
+ typedef struct {
+     uint verdict;
+     uint mark;
diff --git a/srcpkgs/opensnitch/template b/srcpkgs/opensnitch/template
new file mode 100644
index 000000000000..64c2a0f1008e
--- /dev/null
+++ b/srcpkgs/opensnitch/template
@@ -0,0 +1,34 @@
+# Template file for 'opensnitch'
+pkgname=opensnitch
+version=1.5.0
+revision=1
+build_style=gnu-makefile
+hostmakedepends="git go pkg-config protobuf protobuf-go protoc-gen-go-grpc
+ qt5-host-tools python3-grpcio-tools python3-pip python3-PyQt5-devel-tools
+ python3-setuptools"
+makedepends="libnetfilter_queue-devel libpcap-devel python3-devel
+ python3-inotify python3-Unidecode python3-unicode-slugify"
+depends="python3-googleapis-common-protos python3-grpcio python3-inotify
+ python3-PyQt5 python3-PyQt5-sql python3-Unidecode python3-unicode-slugify
+ qt5-wayland qt5-plugin-sqlite"
+conf_files="/etc/opensnitchd/default-config.json
+ /etc/opensnitchd/system-fw.json"
+make_dirs="/etc/opensnitchd/rules/ 0755 root root
+ /etc/opensnitchd/ 0755 root root"
+short_desc="GNU/Linux port of the Little Snitch application firewall"
+maintainer="cinerea0 <cinerea0@protonmail.com>"
+license="GPL-3.0-only"
+homepage="https://github.com/evilsocket/opensnitch"
+distfiles="https://github.com/evilsocket/opensnitch/archive/refs/tags/v${version}.tar.gz"
+checksum=9af9a72d18d1af70fe82f5e6f2c37cd6e91652521fdfa7cef964ac7d992f0356
+nopie_files="/usr/bin/opensnitchd"
+#nocross="Go's 'sys' package uses a -m64 compilation flag which breaks certain ARM builds"
+
+do_install() {
+	vbin daemon/opensnitchd
+	vinstall daemon/default-config.json 0644 etc/opensnitchd
+	vinstall daemon/system-fw.json 0644 etc/opensnitchd
+	cd ui
+	python3 setup.py install --prefix=/usr --root=${DESTDIR}
+	vsv opensnitchd
+}

  parent reply	other threads:[~2022-02-05  2:25 UTC|newest]

Thread overview: 55+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-08-28  5:25 [PR PATCH] New package: opensnitch-1.3.6 cinerea0
2021-09-12 12:23 ` apirusKde
2021-09-13  3:57 ` [PR PATCH] [Updated] " cinerea0
2021-09-21 18:36 ` [PR PATCH] [Updated] New package: opensnitch-1.4.0 cinerea0
2021-09-21 18:40 ` cinerea0
2021-10-07 18:53 ` cinerea0
2021-10-07 19:01 ` [PR PATCH] [Updated] New package: opensnitch-1.4.1 cinerea0
2021-10-07 19:08 ` cinerea0
2021-10-08  5:23 ` cinerea0
2021-10-12  3:42 ` cinerea0
2021-10-12  3:49 ` cinerea0
2021-10-12  3:56 ` cinerea0
2021-10-12  4:12 ` cinerea0
2021-10-12  4:26 ` cinerea0
2021-10-12 16:07 ` cinerea0
2021-10-12 17:52 ` cinerea0
2021-10-13  0:09 ` cinerea0
2021-10-13  0:19 ` cinerea0
2021-10-13  0:52 ` ericonr
2021-10-13  3:09 ` [PR PATCH] [Updated] " cinerea0
2021-10-13  4:50 ` cinerea0
2021-10-27 14:12 ` [PR PATCH] [Updated] " cinerea0
2021-10-27 14:17 ` cinerea0
2021-11-05  2:56 ` cinerea0
2021-11-12  4:54 ` New package: opensnitch-1.4.2 cinerea0
2021-11-25  0:20 ` [PR PATCH] [Updated] " cinerea0
2022-02-05  2:25 ` cinerea0 [this message]
2022-02-05  3:12 ` [PR PATCH] [Updated] New package: opensnitch-1.5.0 cinerea0
2022-02-06 22:59 ` [PR REVIEW] " ericonr
2022-02-06 22:59 ` ericonr
2022-02-06 22:59 ` ericonr
2022-02-07  1:30 ` cinerea0
2022-02-07  2:27 ` ericonr
2022-02-07  2:27 ` ericonr
2022-02-07  4:23 ` [PR PATCH] [Updated] " cinerea0
2022-02-07  4:42 ` cinerea0
2022-02-07  4:52 ` [PR REVIEW] " cinerea0
2022-02-20  2:30 ` cinerea0
2022-06-03  2:11 ` github-actions
2022-06-04  2:40 ` [PR PATCH] [Updated] " cinerea0
2022-06-04  2:56 ` [PR PATCH] [Updated] New package: opensnitch-1.5.1 cinerea0
2022-06-04  3:11 ` cinerea0
2022-06-05 22:14 ` cinerea0
2022-09-04  2:16 ` github-actions
2022-09-05  3:02 ` cinerea0
2022-12-06  2:29 ` github-actions
2022-12-16  0:35 ` cinerea0
2023-03-16  1:57 ` github-actions
2023-06-16  1:59 ` github-actions
2023-06-29 14:24 ` [PR PATCH] [Updated] " cinerea0
2023-06-29 14:25 ` cinerea0
2023-09-29  1:45 ` New package: opensnitch-1.6.0 github-actions
2023-10-13  1:46 ` [PR PATCH] [Closed]: " github-actions
2024-01-26  2:41 ` jchook
2024-01-26  2:43 ` cinerea0

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20220205022510.-0HmSI5Cle5-XcOpqMYFemEXzkynASBIzBXHbyMqRtg@z \
    --to=cinerea0@users.noreply.github.com \
    --cc=ml@inbox.vuxu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).