提交 f8e0674a 编写于 作者: M Mark McLoughlin

--with-iptables-prefix was added to integrate with

a proposed system for letting iptables know how to
reload our rules. The proposed system wasn't accepted
so, although there might be some other theoretical
use for this, let's just remove it.
上级 b9daf6d9
Thu Jan 10 13:54:10 GMT 2008 Mark McLoughlin <markmc@redhat.com>
--with-iptables-prefix was added to integrate with
a proposed system for letting iptables know how to
reload our rules. The proposed system wasn't accepted
so, although there might be some other theoretical
use for this, let's just remove it.
* configure.in, src/iptables.c: remove --with-iptables-prefix
Thu Jan 10 13:52:05 GMT 2008 Mark McLoughlin <markmc@redhat.com> Thu Jan 10 13:52:05 GMT 2008 Mark McLoughlin <markmc@redhat.com>
Add support for integrating our iptables support with Add support for integrating our iptables support with
......
...@@ -182,16 +182,6 @@ fi ...@@ -182,16 +182,6 @@ fi
AM_CONDITIONAL(LIBVIRT_INIT_SCRIPTS_RED_HAT, test x$with_init_scripts = xredhat) AM_CONDITIONAL(LIBVIRT_INIT_SCRIPTS_RED_HAT, test x$with_init_scripts = xredhat)
AC_MSG_RESULT($with_init_scripts) AC_MSG_RESULT($with_init_scripts)
dnl
dnl allow the creation of iptables rules in chains with a
dnl specific prefix rather than in the standard toplevel chains
dnl
AC_ARG_WITH(iptables-prefix,
AC_HELP_STRING([--with-iptables-prefix=prefix],
[prefix used for iptables chains, default is to use standard toplevel chains]),
[IPTABLES_PREFIX=$withval])
AC_DEFINE_UNQUOTED(IPTABLES_PREFIX, "$IPTABLES_PREFIX", [prefix used for iptables chains])
dnl dnl
dnl also support saving the various chains to files dnl also support saving the various chains to files
dnl in e.g. /etc/sysconfig/iptables.d dnl in e.g. /etc/sysconfig/iptables.d
......
...@@ -592,13 +592,13 @@ iptablesContextNew(void) ...@@ -592,13 +592,13 @@ iptablesContextNew(void)
if (!(ctx = calloc(1, sizeof (*ctx)))) if (!(ctx = calloc(1, sizeof (*ctx))))
return NULL; return NULL;
if (!(ctx->input_filter = iptRulesNew("filter", IPTABLES_PREFIX "INPUT"))) if (!(ctx->input_filter = iptRulesNew("filter", "INPUT")))
goto error; goto error;
if (!(ctx->forward_filter = iptRulesNew("filter", IPTABLES_PREFIX "FORWARD"))) if (!(ctx->forward_filter = iptRulesNew("filter", "FORWARD")))
goto error; goto error;
if (!(ctx->nat_postrouting = iptRulesNew("nat", IPTABLES_PREFIX "POSTROUTING"))) if (!(ctx->nat_postrouting = iptRulesNew("nat", "POSTROUTING")))
goto error; goto error;
return ctx; return ctx;
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册