Mageia Bugzilla – Attachment 13603 Details for
Bug 31327
on boot: warning egrep is obsolete using grep -e
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
Log In
[x]
|
New Account
|
Forgot Password
grep -n [ef]grep $(rpm -ql shorewall) 2>/dev/null
efgrep-shorewall.msg (text/plain), 3.59 KB, created by
Elmar Stellnberger
on 2022-12-27 09:51:47 CET
(
hide
)
Description:
grep -n [ef]grep $(rpm -ql shorewall) 2>/dev/null
Filename:
MIME Type:
Creator:
Elmar Stellnberger
Created:
2022-12-27 09:51:47 CET
Size:
3.59 KB
patch
obsolete
>/usr/share/perl5/vendor_perl/Shorewall/Chains.pm:8765: qq( $tool -t nat -S OUTPUT | tail -n +2 | fgrep DOCKER > \${VARDIR}/.nat_OUTPUT), >/usr/share/perl5/vendor_perl/Shorewall/Chains.pm:8766: qq( $tool -t nat -S POSTROUTING | tail -n +2 | fgrep -v SHOREWALL | fgrep -v LIBVIRT > \${VARDIR}/.nat_POSTROUTING), >/usr/share/perl5/vendor_perl/Shorewall/Chains.pm:8783: emit( qq( $tool -t filter -S FORWARD | egrep '^-A FORWARD.*[io] ($bridge|br-[a-z0-9]{12})' > \${VARDIR}/.filter_FORWARD) ); >/usr/share/perl5/vendor_perl/Shorewall/Chains.pm:8828: $tool -S dynamic | tail -n +2 | fgrep -v -- '-j ACCEPT' > \${VARDIR}/.dynamic >/usr/share/perl5/vendor_perl/Shorewall/Config.pm:5062: $tc && have_capability( 'BASIC_FILTER' ) && system( "$tc filter add basic help 2>&1 | egrep -q match" ) == 0; >/usr/share/perl5/vendor_perl/Shorewall/Misc.pm:2562: ${IPTABLES}-save -t filter | grep '^-A dynamic' | fgrep -v -- '-j ACCEPT' > ${VARDIR}/.dynamic >/usr/share/perl5/vendor_perl/Shorewall/Misc.pm:2577: ${IP6TABLES}-save -t filter | grep '^-A dynamic' | fgrep -v -- '-j ACCEPT' > ${VARDIR}/.dynamic >/usr/share/perl5/vendor_perl/Shorewall/Proc.pm:367: " fgrep -q $setting /proc/net/netfilter/nf_log || setting=$alternative", >/usr/share/perl5/vendor_perl/Shorewall/Providers.pm:1064: qq(if ! \$IP -6 rule ls | egrep -q "32767:[[:space:]]+from all lookup (default|253)"; then) , >/usr/share/perl5/vendor_perl/Shorewall/Providers.pm:1081: emit( qq(if ! egrep -q "^20000:[[:space:]]+from $address lookup $id"; then), >/usr/share/shorewall/lib.cli-std:1160: echo $2 | egrep -q '[[:digit:]]+[smh]' || fatal_error "The timeout value must be numeric, optionally followed by a suffix (s, m or h)" >/usr/share/shorewall/lib.cli-std:1334: echo $2 | egrep -q '[[:digit:]]+[smh]' || fatal_error "The timeout value must be numeric, optionally followed by a suffix (s, m or h)" >/usr/share/shorewall/lib.runtime:119: ${IP:-ip} link list | egrep '^[[:digit:]]+:' | cut -d ' ' -f2 | sed -r 's/(@.*)?:$//' >/usr/share/shorewall/lib.runtime:126: ${IP:-ip} -$g_family addr list | egrep '^[[:digit:]]+:' | cut -d ' ' -f2 | sed -r 's/(@.*)?:$//' >/usr/share/shorewall/lib.runtime:682: if interface_is_up $1 && [ "$(find_first_interface_address_if_any $1)" != 0.0.0.0 ] && [ -z "$($IP -$g_family link list dev $1 2> /dev/null | fgrep 'state DOWN')" ]; then >/usr/share/shorewall/lib.runtime:1019: if eval echo $route \| fgrep -q \'$gateway\'; then >/usr/share/shorewall/prog.footer:486: if type $1 2> /dev/null | fgrep -q 'is a function'; then >/var/lib/shorewall/.start:123: ${IP:-ip} link list | egrep '^[[:digit:]]+:' | cut -d ' ' -f2 | sed -r 's/(@.*)?:$//' >/var/lib/shorewall/.start:130: ${IP:-ip} -$g_family addr list | egrep '^[[:digit:]]+:' | cut -d ' ' -f2 | sed -r 's/(@.*)?:$//' >/var/lib/shorewall/.start:685: if interface_is_up $1 && [ "$(find_first_interface_address_if_any $1)" != 0.0.0.0 ] && [ -z "$($IP -$g_family link list dev $1 2> /dev/null | fgrep 'state DOWN')" ]; then >/var/lib/shorewall/.start:1022: if eval echo $route \| fgrep -q \'$gateway\'; then >/var/lib/shorewall/.start:1720: [ "$1" = lo ] || $IP link show $1 | fgrep -q LOOPBACK >/var/lib/shorewall/.start:1729: [ -x "$IP" ] && interfaces=$($IP link show | fgrep LOOPBACK | sed 's/://g' | cut -d ' ' -f 2) >/var/lib/shorewall/.start:2583: ${IPTABLES} -S dynamic | tail -n +2 | fgrep -v -- '-j ACCEPT' > ${VARDIR}/.dynamic >/var/lib/shorewall/.start:2682: ${IPTABLES}-save -t filter | grep '^-A dynamic' | fgrep -v -- '-j ACCEPT' > ${VARDIR}/.dynamic >/var/lib/shorewall/.start:3378: if type $1 2> /dev/null | fgrep -q 'is a function'; then
/usr/share/perl5/vendor_perl/Shorewall/Chains.pm:8765: qq( $tool -t nat -S OUTPUT | tail -n +2 | fgrep DOCKER > \${VARDIR}/.nat_OUTPUT), /usr/share/perl5/vendor_perl/Shorewall/Chains.pm:8766: qq( $tool -t nat -S POSTROUTING | tail -n +2 | fgrep -v SHOREWALL | fgrep -v LIBVIRT > \${VARDIR}/.nat_POSTROUTING), /usr/share/perl5/vendor_perl/Shorewall/Chains.pm:8783: emit( qq( $tool -t filter -S FORWARD | egrep '^-A FORWARD.*[io] ($bridge|br-[a-z0-9]{12})' > \${VARDIR}/.filter_FORWARD) ); /usr/share/perl5/vendor_perl/Shorewall/Chains.pm:8828: $tool -S dynamic | tail -n +2 | fgrep -v -- '-j ACCEPT' > \${VARDIR}/.dynamic /usr/share/perl5/vendor_perl/Shorewall/Config.pm:5062: $tc && have_capability( 'BASIC_FILTER' ) && system( "$tc filter add basic help 2>&1 | egrep -q match" ) == 0; /usr/share/perl5/vendor_perl/Shorewall/Misc.pm:2562: ${IPTABLES}-save -t filter | grep '^-A dynamic' | fgrep -v -- '-j ACCEPT' > ${VARDIR}/.dynamic /usr/share/perl5/vendor_perl/Shorewall/Misc.pm:2577: ${IP6TABLES}-save -t filter | grep '^-A dynamic' | fgrep -v -- '-j ACCEPT' > ${VARDIR}/.dynamic /usr/share/perl5/vendor_perl/Shorewall/Proc.pm:367: " fgrep -q $setting /proc/net/netfilter/nf_log || setting=$alternative", /usr/share/perl5/vendor_perl/Shorewall/Providers.pm:1064: qq(if ! \$IP -6 rule ls | egrep -q "32767:[[:space:]]+from all lookup (default|253)"; then) , /usr/share/perl5/vendor_perl/Shorewall/Providers.pm:1081: emit( qq(if ! egrep -q "^20000:[[:space:]]+from $address lookup $id"; then), /usr/share/shorewall/lib.cli-std:1160: echo $2 | egrep -q '[[:digit:]]+[smh]' || fatal_error "The timeout value must be numeric, optionally followed by a suffix (s, m or h)" /usr/share/shorewall/lib.cli-std:1334: echo $2 | egrep -q '[[:digit:]]+[smh]' || fatal_error "The timeout value must be numeric, optionally followed by a suffix (s, m or h)" /usr/share/shorewall/lib.runtime:119: ${IP:-ip} link list | egrep '^[[:digit:]]+:' | cut -d ' ' -f2 | sed -r 's/(@.*)?:$//' /usr/share/shorewall/lib.runtime:126: ${IP:-ip} -$g_family addr list | egrep '^[[:digit:]]+:' | cut -d ' ' -f2 | sed -r 's/(@.*)?:$//' /usr/share/shorewall/lib.runtime:682: if interface_is_up $1 && [ "$(find_first_interface_address_if_any $1)" != 0.0.0.0 ] && [ -z "$($IP -$g_family link list dev $1 2> /dev/null | fgrep 'state DOWN')" ]; then /usr/share/shorewall/lib.runtime:1019: if eval echo $route \| fgrep -q \'$gateway\'; then /usr/share/shorewall/prog.footer:486: if type $1 2> /dev/null | fgrep -q 'is a function'; then /var/lib/shorewall/.start:123: ${IP:-ip} link list | egrep '^[[:digit:]]+:' | cut -d ' ' -f2 | sed -r 's/(@.*)?:$//' /var/lib/shorewall/.start:130: ${IP:-ip} -$g_family addr list | egrep '^[[:digit:]]+:' | cut -d ' ' -f2 | sed -r 's/(@.*)?:$//' /var/lib/shorewall/.start:685: if interface_is_up $1 && [ "$(find_first_interface_address_if_any $1)" != 0.0.0.0 ] && [ -z "$($IP -$g_family link list dev $1 2> /dev/null | fgrep 'state DOWN')" ]; then /var/lib/shorewall/.start:1022: if eval echo $route \| fgrep -q \'$gateway\'; then /var/lib/shorewall/.start:1720: [ "$1" = lo ] || $IP link show $1 | fgrep -q LOOPBACK /var/lib/shorewall/.start:1729: [ -x "$IP" ] && interfaces=$($IP link show | fgrep LOOPBACK | sed 's/://g' | cut -d ' ' -f 2) /var/lib/shorewall/.start:2583: ${IPTABLES} -S dynamic | tail -n +2 | fgrep -v -- '-j ACCEPT' > ${VARDIR}/.dynamic /var/lib/shorewall/.start:2682: ${IPTABLES}-save -t filter | grep '^-A dynamic' | fgrep -v -- '-j ACCEPT' > ${VARDIR}/.dynamic /var/lib/shorewall/.start:3378: if type $1 2> /dev/null | fgrep -q 'is a function'; then
View Attachment As Raw
Actions:
View
Attachments on
bug 31327
:
13602
|
13603