diff options
| author | Kerin Millar <kfm@plushkava.net> | 2023-03-09 20:11:14 +0200 |
|---|---|---|
| committer | Sam James <sam@gentoo.org> | 2023-03-10 03:51:39 +0000 |
| commit | 40de849d06e7fce4c95bc436399aa04310af7812 (patch) | |
| tree | 01648fb58453ae2106ab7cbb719e8edc043782f1 /dev-python/python-openstackclient/Manifest | |
| parent | a59a01a3b4c82f739f7278c457235018271ed127 (diff) | |
| download | gentoo-40de849d06e7fce4c95bc436399aa04310af7812.tar.gz gentoo-40de849d06e7fce4c95bc436399aa04310af7812.tar.bz2 gentoo-40de849d06e7fce4c95bc436399aa04310af7812.zip | |
net-firewall/nftables: Don't test iptables-nft rulesets in pkg_preinst()
Rulesets generated by iptables-nft are special in nature and will not
always be printed in a way that constitutes a valid syntax for nft(8).
Consider the following example in which iptables-nft would ideally have
generated a native rule that specifies "reject with tcp reset". Instead,
it generated a rule that integrates with an xtables target.
# iptables-nft -S
-A INPUT -j REJECT --reject-with tcp-reset
# nft list ruleset
# Warning: table ip filter is managed by iptables-nft, do not touch!
table ip filter {
chain INPUT {
type filter hook input priority filter; policy accept;
counter packets 0 bytes 0 xt target REJECT
}
}
Simply ignore the ruleset in the case that it appears to have been
generated by iptables-nft.
Signed-off-by: Kerin Millar <kfm@plushkava.net>
Signed-off-by: Sam James <sam@gentoo.org>
Diffstat (limited to 'dev-python/python-openstackclient/Manifest')
0 files changed, 0 insertions, 0 deletions
