* Solène Rapenne <sol...@perso.pw> le [18-09-2022 09:55:48 +0200]: > Le Sat, 17 Sep 2022 20:54:38 +0200, > prx <p...@si3t.ch> a écrit : > > > iblock now kill established connections after banning an IP. > > > > Find attached a diff to update the port to 1.1.0. > > > > Regards. > > > > prx > > hold on, it seems this version is buggy >
After last changes, find a new diff to update iblock port. * Remove do-build since CFLAGS are now respected * fix a missing "$" in README Tested on amd64. Regards.
Index: net/iblock//Makefile =================================================================== RCS file: /cvs/ports/net/iblock/Makefile,v retrieving revision 1.1.1.1 diff -u -r1.1.1.1 Makefile --- net/iblock//Makefile 8 Sep 2022 10:36:24 -0000 1.1.1.1 +++ net/iblock//Makefile 18 Sep 2022 13:28:28 -0000 @@ -1,5 +1,5 @@ COMMENT = inetd program to blackhole IPs connecting to it -V = 1.0.1 +V = 1.1.2 DISTNAME = iblock-${V} CATEGORIES = net @@ -19,9 +19,5 @@ WRKSRC = ${WRKDIR}/iblock MAKE_FLAGS = CC="${CC}" - -# XXX: until it is updated to respect CFLAGS -do-build: - cd ${WRKSRC} && ${CC} ${CFLAGS} -o iblock main.c .include <bsd.port.mk> Index: net/iblock//distinfo =================================================================== RCS file: /cvs/ports/net/iblock/distinfo,v retrieving revision 1.1.1.1 diff -u -r1.1.1.1 distinfo --- net/iblock//distinfo 8 Sep 2022 10:36:24 -0000 1.1.1.1 +++ net/iblock//distinfo 18 Sep 2022 13:28:28 -0000 @@ -1,2 +1,2 @@ -SHA256 (iblock-1.0.1.tar.gz) = hOWDUMmcEWh78DUTRSbGpYFT33Bk/sTfWC8gZWChbDo= -SIZE (iblock-1.0.1.tar.gz) = 2679 +SHA256 (iblock-1.1.2.tar.gz) = HudVCVC/KjTv8jA91ZZ7CzFkuAd8VfniszYRDlSoY/I= +SIZE (iblock-1.1.2.tar.gz) = 2889 Index: net/iblock//pkg/README =================================================================== RCS file: /cvs/ports/net/iblock/pkg/README,v retrieving revision 1.1.1.1 diff -u -r1.1.1.1 README --- net/iblock//pkg/README 8 Sep 2022 10:36:24 -0000 1.1.1.1 +++ net/iblock//pkg/README 18 Sep 2022 13:28:28 -0000 @@ -43,7 +43,7 @@ pass in quick on egress inet proto tcp to port $iblock_services \ rdr-to 127.0.0.1 port 666 label "block_$dstport" pass in quick on egress inet6 proto tcp to port $iblock_services \ - rdr-to ::1 port 666 label "block6_dstport" + rdr-to ::1 port 666 label "block6_$dstport" ``` The label keyword allows displaying blocking statistics with pfctl -s labels