Manipulate netfilter connection tracking table and run High Availability
abca991623
The code uses inet_aton() deliberately to detect whether a given string is an IPv4 address or not. Sadly, rpminspect only supports ignoring certain output files for the entire badfuncs check, so ignore those containing the inet_aton() calls. |
||
---|---|---|
tests | ||
.gitignore | ||
0001-conntrackd-search-for-RPC-headers.patch | ||
0002-helpers-Fix-for-warning-when-compiling-against-libti.patch | ||
0003-build-remove-commented-out-macros-from-configure.ac.patch | ||
0004-Makefile.am-Use-instead-of.patch | ||
0005-nfct-remove-lazy-binding.patch | ||
0006-conntrackd-use-strncpy-to-unix-path.patch | ||
0007-conntrackd-Use-strdup-in-lexer.patch | ||
0008-conntrackd-use-correct-max-unix-path-length.patch | ||
conntrack-tools.spec | ||
conntrackd.conf | ||
conntrackd.init | ||
conntrackd.service | ||
gating.yaml | ||
rpminspect.yaml | ||
sources |