+Thu Jan 10 13:54:10 GMT 2008 Mark McLoughlin <markmc@redhat.com>
+
+ --with-iptables-prefix was added to integrate with
+ a proposed system for letting iptables know how to
+ reload our rules. The proposed system wasn't accepted
+ so, although there might be some other theoretical
+ use for this, let's just remove it.
+
+ * configure.in, src/iptables.c: remove --with-iptables-prefix
+
Thu Jan 10 13:52:05 GMT 2008 Mark McLoughlin <markmc@redhat.com>
Add support for integrating our iptables support with
AM_CONDITIONAL(LIBVIRT_INIT_SCRIPTS_RED_HAT, test x$with_init_scripts = xredhat)
AC_MSG_RESULT($with_init_scripts)
-dnl
-dnl allow the creation of iptables rules in chains with a
-dnl specific prefix rather than in the standard toplevel chains
-dnl
-AC_ARG_WITH(iptables-prefix,
- AC_HELP_STRING([--with-iptables-prefix=prefix],
- [prefix used for iptables chains, default is to use standard toplevel chains]),
- [IPTABLES_PREFIX=$withval])
-AC_DEFINE_UNQUOTED(IPTABLES_PREFIX, "$IPTABLES_PREFIX", [prefix used for iptables chains])
-
dnl
dnl also support saving the various chains to files
dnl in e.g. /etc/sysconfig/iptables.d
if (!(ctx = calloc(1, sizeof (*ctx))))
return NULL;
- if (!(ctx->input_filter = iptRulesNew("filter", IPTABLES_PREFIX "INPUT")))
+ if (!(ctx->input_filter = iptRulesNew("filter", "INPUT")))
goto error;
- if (!(ctx->forward_filter = iptRulesNew("filter", IPTABLES_PREFIX "FORWARD")))
+ if (!(ctx->forward_filter = iptRulesNew("filter", "FORWARD")))
goto error;
- if (!(ctx->nat_postrouting = iptRulesNew("nat", IPTABLES_PREFIX "POSTROUTING")))
+ if (!(ctx->nat_postrouting = iptRulesNew("nat", "POSTROUTING")))
goto error;
return ctx;