Manipulate netfilter connection tracking table and run High Availability
The code uses inet_aton() deliberately to detect whether a given string is an IPv4 address or not. Sadly, rpminspect only supports ignoring certain output files for the entire badfuncs check, so ignore those containing the inet_aton() calls. |
||
|---|---|---|
| tests | ||
| .gitignore | ||
| 0001-conntrackd-search-for-RPC-headers.patch | ||
| 0002-helpers-Fix-for-warning-when-compiling-against-libti.patch | ||
| 0003-build-remove-commented-out-macros-from-configure.ac.patch | ||
| 0004-Makefile.am-Use-instead-of.patch | ||
| 0005-nfct-remove-lazy-binding.patch | ||
| 0006-conntrackd-use-strncpy-to-unix-path.patch | ||
| 0007-conntrackd-Use-strdup-in-lexer.patch | ||
| 0008-conntrackd-use-correct-max-unix-path-length.patch | ||
| conntrack-tools.spec | ||
| conntrackd.conf | ||
| conntrackd.init | ||
| conntrackd.service | ||
| gating.yaml | ||
| rpminspect.yaml | ||
| sources | ||