back out a lot of pointless quotes
authorMike Frysinger <vapier@gentoo.org>
Mon, 12 Mar 2007 21:49:04 +0000 (21:49 +0000)
committerMike Frysinger <vapier@gentoo.org>
Mon, 12 Mar 2007 21:49:04 +0000 (21:49 +0000)
Package-Manager: portage-2.1.2.2

net-firewall/iptables/Manifest
net-firewall/iptables/files/iptables-1.3.2.init

index 7880bf6a5779e432809ee5600172f3a83697c751..2f2fc88b3575efd01ad8adbbeea64973c7df71d1 100644 (file)
@@ -1,3 +1,6 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA1
+
 AUX 1.3.1-files/grsecurity-1.2.8-iptables.patch-1.3.1 1315 RMD160 3665aaa6788261f16372c1e34810fe99fd60453c SHA1 b3c88dc5ceebc15aca73fcc02afdf8d0fa6a389f SHA256 f86e32f84af0e68b927b712a60e5d02d1bc27972537f476c71a311711fdcfc12
 MD5 319d0b089a495ce1ab8ca02b3820dfe3 files/1.3.1-files/grsecurity-1.2.8-iptables.patch-1.3.1 1315
 RMD160 3665aaa6788261f16372c1e34810fe99fd60453c files/1.3.1-files/grsecurity-1.2.8-iptables.patch-1.3.1 1315
@@ -34,10 +37,10 @@ AUX iptables-1.3.2.confd 290 RMD160 cb180068f86a608b16d850635ae909ea7b9cc059 SHA
 MD5 956ebf5ab69e5a1e1d3983541eab643b files/iptables-1.3.2.confd 290
 RMD160 cb180068f86a608b16d850635ae909ea7b9cc059 files/iptables-1.3.2.confd 290
 SHA256 351e123ba9e0ec7db2bcff42849aa627d29a3b2e77a47b82386f5e3a7e21bd30 files/iptables-1.3.2.confd 290
-AUX iptables-1.3.2.init 2629 RMD160 9db2d7c479684cbc332ca3703c760810dc330326 SHA1 4c1e4aac41ce85d926dccd8f4c379b4d6ae58f02 SHA256 c9f41457b3331a99cd8e92139713207aff263602eaf8c0ada5474b7dd9ed4c55
-MD5 711e98fe93ceea9013d6efbaeb168859 files/iptables-1.3.2.init 2629
-RMD160 9db2d7c479684cbc332ca3703c760810dc330326 files/iptables-1.3.2.init 2629
-SHA256 c9f41457b3331a99cd8e92139713207aff263602eaf8c0ada5474b7dd9ed4c55 files/iptables-1.3.2.init 2629
+AUX iptables-1.3.2.init 2570 RMD160 84d06807fae0455009476cfa63dfcda9fe016dc3 SHA1 da7c4fca4049c4d3f45e32d29403c8bb05047f15 SHA256 1137517483c0d312e3d396d953e9ee197b84f64ed17adfd48f25dbb60e114697
+MD5 2202ac150a5dfe32a8363b0ad565ee1d files/iptables-1.3.2.init 2570
+RMD160 84d06807fae0455009476cfa63dfcda9fe016dc3 files/iptables-1.3.2.init 2570
+SHA256 1137517483c0d312e3d396d953e9ee197b84f64ed17adfd48f25dbb60e114697 files/iptables-1.3.2.init 2570
 AUX iptables-1.3.7-more-exact-check-grep.patch 602 RMD160 80c80f9d2a2567b164932adc1e9ddb1392b34791 SHA1 5bb693f7ddc641b793334d072b106ab998f4202e SHA256 aa26f352dc2b870363b7de1586105a4bf19eb9a6c6703a23f64ef9656017021d
 MD5 0b0e12c269db9fd7c8e9835f0a9fd3fa files/iptables-1.3.7-more-exact-check-grep.patch 602
 RMD160 80c80f9d2a2567b164932adc1e9ddb1392b34791 files/iptables-1.3.7-more-exact-check-grep.patch 602
@@ -89,3 +92,10 @@ SHA256 b6cdf0da6f3681548aea7cd05500b00660b64d95f4d6d6196267c2535dc190d0 files/di
 MD5 1f40726055a119edf736bd7c7b5620e7 files/digest-iptables-1.3.7 759
 RMD160 ee6a5537941ce5689ee0ef7e302b990a0222142c files/digest-iptables-1.3.7 759
 SHA256 7d47914b31c063817423c4f38b8f047f2f9094f749991b37e12b3987f644d990 files/digest-iptables-1.3.7 759
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.0.3 (GNU/Linux)
+
+iD8DBQFF9crY8bi6rjpTunYRAjI+AJwLSxiy4ic5s3X7z+cqAS+LFnwrQgCgjnHP
+Xf95b72aoCUWfZTRkacI3b4=
+=etVK
+-----END PGP SIGNATURE-----
index 3339a3abdd4c1f7264bef85afefa50b1b3dfeab4..e63d8ea9e22160909c87aa9617adadae47268022 100755 (executable)
@@ -1,7 +1,7 @@
 #!/sbin/runscript
-# Copyright 1999-2005 Gentoo Foundation
+# Copyright 1999-2007 Gentoo Foundation
 # Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/net-firewall/iptables/files/iptables-1.3.2.init,v 1.5 2007/03/10 23:04:51 uberlord Exp $
+# $Header: /var/cvsroot/gentoo-x86/net-firewall/iptables/files/iptables-1.3.2.init,v 1.6 2007/03/12 21:49:04 vapier Exp $
 
 opts="save reload panic"
 
@@ -11,7 +11,7 @@ if [ "${iptables_name}" != "iptables" -a "${iptables_name}" != "ip6tables" ] ; t
 fi
 
 iptables_bin="/sbin/${iptables_name}"
-case "${iptables_name}" in
+case ${iptables_name} in
        iptables)  iptables_proc="/proc/net/ip_tables_names"
                   iptables_save=${IPTABLES_SAVE};;
        ip6tables) iptables_proc="/proc/net/ip6_tables_names"
@@ -25,7 +25,7 @@ depend() {
 
 set_table_policy() {
        local chains table=$1 policy=$2
-       case "${table}" in
+       case ${table} in
                nat)    chains="PREROUTING POSTROUTING OUTPUT";;
                mangle) chains="PREROUTING INPUT FORWARD OUTPUT POSTROUTING";;
                filter) chains="INPUT FORWARD OUTPUT";;
@@ -33,12 +33,12 @@ set_table_policy() {
        esac
        local chain
        for chain in ${chains} ; do
-               "${iptables_bin}" -t "${table}" -P "${chain}" "${policy}"
+               ${iptables_bin} -t ${table} -P ${chain} ${policy}
        done
 }
 
 checkkernel() {
-       if [ ! -e "${iptables_proc}" ] ; then
+       if [ ! -e ${iptables_proc} ] ; then
                eerror "Your kernel lacks ${iptables_name} support, please load"
                eerror "appropriate modules and try again."
                return 1
@@ -46,7 +46,7 @@ checkkernel() {
        return 0
 }
 checkconfig() {
-       if [ ! -f "${iptables_save}" ] ; then
+       if [ ! -f ${iptables_save} ] ; then
                eerror "Not starting ${iptables_name}.  First create some rules then run:"
                eerror "/etc/init.d/${iptables_name} save"
                return 1
@@ -57,7 +57,7 @@ checkconfig() {
 start() {
        checkconfig || return 1
        ebegin "Loading ${iptables_name} state and starting firewall"
-       "${iptables_bin}"-restore ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
+       ${iptables_bin}-restore ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
        eend $?
 }
 
@@ -67,12 +67,12 @@ stop() {
        fi
        checkkernel || return 1
        ebegin "Stopping firewall"
-       local a=
-       for a in $(cat "${iptables_proc}") ; do
+       local a
+       for a in $(cat ${iptables_proc}) ; do
                set_table_policy $a ACCEPT
 
-               "${iptables_bin}" -F -t "$a"
-               "${iptables_bin}" -X -t "$a"
+               ${iptables_bin} -F -t $a
+               ${iptables_bin} -X -t $a
        done
        eend $?
 }
@@ -80,10 +80,10 @@ stop() {
 reload() {
        checkkernel || return 1
        ebegin "Flushing firewall"
-       local a=
-       for a in $(cat "${iptables_proc}") ; do
-               "${iptables_bin}" -F -t "$a"
-               "${iptables_bin}" -X -t "$a"
+       local a
+       for a in $(cat ${iptables_proc}) ; do
+               ${iptables_bin} -F -t $a
+               ${iptables_bin} -X -t $a
        done
        eend $?
 
@@ -94,21 +94,21 @@ save() {
        ebegin "Saving ${iptables_name} state"
        touch "${iptables_save}"
        chmod 0600 "${iptables_save}"
-       "${iptables_bin}"-save ${SAVE_RESTORE_OPTIONS} > "${iptables_save}"
+       ${iptables_bin}-save ${SAVE_RESTORE_OPTIONS} > "${iptables_save}"
        eend $?
 }
 
 panic() {
        checkkernel || return 1
-       service_started "${iptables_name}" && svc_stop
+       service_started ${iptables_name} && svc_stop
 
-       local a=
+       local a
        ebegin "Dropping all packets"
-       for a in $(cat "${iptables_proc}") ; do
-               "${iptables_bin}" -F -t "$a"
-               "${iptables_bin}" -X -t "$a"
+       for a in $(cat ${iptables_proc}) ; do
+               ${iptables_bin} -F -t $a
+               ${iptables_bin} -X -t $a
 
-               set_table_policy "$a" DROP
+               set_table_policy $a DROP
        done
        eend $?
 }