diff options
author | Michał Górny <mgorny@gentoo.org> | 2019-04-20 09:53:38 +0200 |
---|---|---|
committer | Michał Górny <mgorny@gentoo.org> | 2019-04-20 09:53:38 +0200 |
commit | 7f1c0d8260a3836e42290398c81294e3d12749de (patch) | |
tree | c6512f714741175d62f761cc84648505e3b3f3c7 | |
parent | net-misc/tn5250: Remove last-rited pkg (diff) | |
download | gentoo-7f1c0d8260a3836e42290398c81294e3d12749de.tar.gz gentoo-7f1c0d8260a3836e42290398c81294e3d12749de.tar.bz2 gentoo-7f1c0d8260a3836e42290398c81294e3d12749de.zip |
net-misc/stone: Remove last-rited pkg
Closes: https://bugs.gentoo.org/675612
Signed-off-by: Michał Górny <mgorny@gentoo.org>
-rw-r--r-- | net-misc/stone/Manifest | 1 | ||||
-rw-r--r-- | net-misc/stone/files/stone-2.3e-makefile.patch | 20 | ||||
-rw-r--r-- | net-misc/stone/files/stone.man | 464 | ||||
-rw-r--r-- | net-misc/stone/metadata.xml | 6 | ||||
-rw-r--r-- | net-misc/stone/stone-2.3e-r1.ebuild | 46 | ||||
-rw-r--r-- | profiles/package.mask | 2 |
6 files changed, 0 insertions, 539 deletions
diff --git a/net-misc/stone/Manifest b/net-misc/stone/Manifest deleted file mode 100644 index 52c68a4564ec..000000000000 --- a/net-misc/stone/Manifest +++ /dev/null @@ -1 +0,0 @@ -DIST stone-2.3e.tar.gz 92587 BLAKE2B 3e87bb38ac111803bc8a3157be27b6645d8876033ae4c8b62a0167c2fc57f051b1deb2589387a8da1c5d68b0377fc2c120237d9d552ab8d693c41e842539bb0d SHA512 a0cccc123222c4fb4c1b2f031fc4d039f39e77691adc9f1df367d99bef8524738265350d1056c926c5f216236d2db25f31d14e9bec297b1bb4ea17e217c4983b diff --git a/net-misc/stone/files/stone-2.3e-makefile.patch b/net-misc/stone/files/stone-2.3e-makefile.patch deleted file mode 100644 index 5df2b6868a24..000000000000 --- a/net-misc/stone/files/stone-2.3e-makefile.patch +++ /dev/null @@ -1,20 +0,0 @@ ---- Makefile.orig 2013-02-20 17:45:36.000000000 +0400 -+++ Makefile 2013-02-20 17:47:19.323650328 +0400 -@@ -19,8 +19,6 @@ - # -DWINDOWS Windows95/98/NT - # -DNT_SERVICE WindowsNT/2000 native service - --CFLAGS= # -g -- - SSL= /usr/local/ssl - SSL_FLAGS= -DUSE_SSL - SSL_LIBS= -lssl -lcrypto -@@ -60,7 +58,7 @@ - @echo "*** md5c.c is contained in RFC1321" - - stone: stone.c -- $(CC) $(CFLAGS) $(FLAGS) -o $@ $? $(LIBS) -+ $(CC) $(CFLAGS) $(FLAGS) ${LDFLAGS} -o $@ $? $(LIBS) - - pop_stone: $(POP_LIBS) - $(MAKE) FLAGS="$(POP_FLAGS)" LIBS="$(POP_LIBS)" $(TARGET) diff --git a/net-misc/stone/files/stone.man b/net-misc/stone/files/stone.man deleted file mode 100644 index fa10c6eef18f..000000000000 --- a/net-misc/stone/files/stone.man +++ /dev/null @@ -1,464 +0,0 @@ -.\" Roff format skeleton provided by Taketo Kabe <kabe@sra-tohoku.co.jp> -.TH stone 1 "version 2.3" -. -.SH NAME -stone \- Simple Repeater -. -.SH SYNOPSIS -.B "stone [-C \fIfile\fP] [-P \fIcommand\fP] [-Q \fIoptions\fP] [-N] [-d] [-p] [-n]" -.br -.B " [-u \fImax\fP] [-f \fIn\fP] [-l] [-L \fIfile\fP] [-a \fIfile\fP] [-i \fIfile\fP]" -.br -.B " [-X \fIn\fP] [-T \fIn\fP] [-r]" -.br -.B " [-x \fIport\fP[,\fIport\fP][-\fIport\fP]... \fIxhost\fP... --]" -.br -.B " [-s \fIsend\fP \fIexpect\fP... --]" -.br -.B " [-b [\fIvar\fP=\fIval\fP]... \fIn\fP \fImaster\fP:\fIport\fP \fIbackup\fP:\fIport\fP]" -.br -.B " [-B \fIhost\fP:\fIport\fP \fIhost1\fP:\fIport1\fP... --]" -.br -.B " [-I \fIhost\fP]" -.br -.B " [-o \fIn\fP] [-g \fIn\fP] [-t \fIdir\fP] [-D] [-c \fIdir\fP]" -.br -.B " [-q \fISSL\fP] [-z \fISSL\fP]" -.br -.B " [-M install \fIname\fP] [-M remove \fIname\fP]" -.br -.B " \fIst\fP [-- \fIst\fP]..." -. -.SH DESCRIPTION -\fBStone\fP is a TCP & UDP repeater in the application layer. It repeats TCP -and UDP from inside to outside of a firewall, or from outside to inside. -.P -\fBStone\fP has following features: -. -.TP -.B 1. Stone supports Win32. -Formerly, UNIX machines are used as firewalls, but recently -WindowsNT machines are used, too. You can easily run \fBstone\fP on -WindowsNT and Windows95. Of course, available on Linux, -FreeBSD, BSD/OS, SunOS, Solaris, HP-UX and so on. -. -.TP -.B 2. Simple. -\fBStone\fP's source code is only 8000 lines long (written in C -language), so you can minimize the risk of security -holes. -. -.TP -.B 3. Stone supports SSL. -Using OpenSSL (\fIhttp://www.openssl.org/\fP), \fBstone\fP can -encrypt/decrypt. Client verifications, and server verifications -are also supported. \fBStone\fP can send a substring of the subject -of the certificate to the destination. -. -.TP -.B 4. Stone is a http proxy. -\fBStone\fP can also be a tiny http proxy. -. -.TP -.B 5. POP -> APOP conversion. -With \fBstone\fP and a mailer that does not support APOP, you can -access to an APOP server. -. -.TP -.B 6. Stone supports IPv6. -\fBStone\fP can convert IP and IPv6 each other. With \fBstone\fP, you can -use IP-only software on IPv6 network. -. -.SH OPTIONS -If the \fB-C\fP \fIfile\fP flag is used, the program read these -options and \fIst\fPs from the configuration file \fIfile\fP. -If the \fB-P\fP \fIcommand\fP flag is used, the program executes -specified pre-processor to read the configuration file. \fB-Q\fP \fIoptions\fP -can be used to pass options to the pre-processor. If the \fB-N\fP -flag is used, \fBstone\fP will terminate after parsing options -and configuration file without opening the ports. -.P -If the \fB-d\fP flag is used, then increase the debug level. If -the \fB-p\fP flag is used, data repeated by \fBstone\fP are dumped. If -the \fB-n\fP is used, IP addresses and service port numbers are -shown instead of host names and service names. -.P -If the \fB-u\fP \fImax\fP flag (\fImax\fP is integer) is used, the -program memorize \fImax\fP UDP sources simultaneously. The default value -is 100. If the -\fB-f\fP \fIn\fP flag (\fIn\fP is integer) is used, the program spawn -\fIn\fP child processes. The default behavior is not to spawn any child processes. -.P -If the \fB-l\fP flag is used, the program sends error messages to -the syslog instead of stderr. If the \fB-L\fP \fIfile\fP (\fIfile\fP -is a file name) flag is used, the program writes error messages -to the file. If the \fB-a\fP \fIfile\fP flag is used, the program -writes accounting to the file. If the \fB-i\fP \fIfile\fP flag is -used, the program writes its process ID to the file. -.P -The \fB-X\fP \fIn\fP flag alters the buffer size of the repeater. -The default value is 1000 bytes. If -the \fB-T\fP \fIn\fP is used, the timeout of TCP sessions can be -specified to \fIn\fP sec. Default: 600 (10 min). The \fB-r\fP flag is -used, SO_REUSEADDR is set on the socket of \fIst\fP . -.P -Using the \fB-x\fP \fIport\fP[,\fIport\fP][-\fIport\fP]... \fIxhost\fP... \fB--\FP flag, -the http proxy (described later) can only connect to -\fIxhost\fP:\fIport\fP. If more than one \fB-x\fP ... \fB--\fI flags are -designated, the posterior one whose \fIport\fP list matches the -connecting port. If the \fB-x\fP \fB--\fP is used, prior \fB-x\fP flags -are ignored. -.P -The \fB-b\fP \fIn\fP \fImaster\fP:\fIport\fP \fIbackup\fP:\fIport\fP flag designates -the backup destination for \fImaster\fP:\fIport\fP. The program checks -every \fIn\fP seconds whether \fImaster\fP:\fIport\fP is connectable, using -the health check script defined by \fB-s\fP flag described below. -If not, the backup is used instead. Alternative \fIhost\fP can be -checked, using host=\fIhost\fP and alternative \fIport\fP, using -port=\fIport\fP. -.P -The \fB-s\fP \fIsend\fP \fIexpect\fP... \fB--\fP flag defines the health check -script. Sending \fIsend\fP, then checks whether the response match -the regular expression \fIexpect\fP. -.P -The \fB-B\fP \fIhost\fP:\fIport\fP \fIhost1\fP:\fIport1\fP... \fB--\fP is for the -destination group. If the destination of \fIst\fP is \fIhost\fP:\fIport\fP, -the program chooses a destination randomly from the group. The -destination \fIhost\fP:\fIport\fP that is designated by \fB-b\fP flag and -turned out unhealthy, is excluded from the group. -.P -The \fB-I\fP \fIhost\fP designates the interface used as the source -address of the connection to the desctination. -.P -If the \fB-o\fP \fIn\fP or \fB-g\fP \fIn\fP flag is used, the program set -its uid or gid to \fIn\fP respectively. If the \fB-t\fP \fIdir\fP -flag (\fIdir\fP is a directory) is used, the program change its -root to the directory. If the \fB-D\fP flas is used, \fBstone\fP runs -as a daemon. The \fB-c\fP \fIdir\fP flag designates the -directory for core dump. -.P -The \fB-M\fP install \fIname\fP and the \fB-M\fP remove \fIname\fP flags are -for NT service. \fIname\fP is the service name. Start the -service using the command: net start \fIname\fP. To install \fBstone\fP -service as the name \fIrepeater\fP, for example: -.P -.RS -C:\\>\fBstone -M install \fIrepeater\fB -C \fIC:\\stone.cfg\fR -.br -C:\\>\fBnet start \fIrepeater\fR -.RE -.P -The \fB-q\fP \FISSL\FP and the \fB-z\fP \FISSL\FP flags are for SSL -encryption. The \fB-q\fP \FISSL\FP is for the client mode, that is, -when \fBstone\fP connects to the other SSL server as a SSL client. -The \fB-z\fP \FISSL\FP if for the server mode, that is, when other SSL -clients connect to the \fBstone\fP. -.P -\FISSL\FP is one of the following. -.P -.PD 0 -.IP default 15 -reset SSL options to the default. -Using multiple \fIst\fP, different SSL options can -be designated for each \fIst\fP. -.IP verbose -verbose mode. -.IP verify -require SSL certificate to the peer. -.IP verify,once -request a client certificate on the initial TLS/SSL -handshake. (\fB-z\fP only) -.IP verify,ifany -The certificate returned (if any) is checked. (\fB-z\fP only) -.IP verify,none -never request SSL certificate to the peer. -.IP crl_check -lookup CRLs. -.IP crl_check_all -lookup CRLs for whole chain. -.IP uniq -if the serial number of peer's SSL certificate -is different from the previous session, deny it. -.IP re\fIn\fP=\fIregex\fP -The certificate of the peer must satisfy the -\fIregex\fP. \fIn\fP is the depth. re0 means the subject -of the certificate, and re1 means the issure. -The maximum of \fIn\fP is 9. -.IP depth=\fIn\fP -The maximum of the certificate chain. -If the peer's certificate exceeds \fIn\fP, the -verification fails. The maximum of \fIn\fP is 9. -.IP tls1 -Just use TLSv1 protocol. -.IP ssl3 -Just use SSLv3 protocol. -.IP ssl2 -Just use SSLv2 protocol. -.IP no_tls1 -Turn off TLSv1 protocol. -.IP no_ssl3 -Turn off SSLv3 protocol. -.IP no_ssl2 -Turn off SSLv2 protocol. -.IP bugs -Switch on all SSL implementation bug workarounds. -.IP serverpref -Use server's cipher preferences (only SSLv2). -.IP sid_ctx=\fIstr\fP -Set session ID context. -.IP passfile=\fIfile\fP -The filename of the file containing password of the key -.IP key=\fIfile\fP -The filename of the secret key of the certificate. -.IP cert=\fIfile\fP -The filename of the certificate. -.IP CAfile=\fIfile\fP -The filename of the certificate of the CA. -.IP CApath=\fIdir\fP -The directory of the certificate files. -.IP pfx=\fIfile\fP -The filename of the PKCS#12 bag. -.IP cipher=\fIlist\fP -The list of ciphers. -.IP lb\fIn\fP=\fIm\fP -change the destination according to the -certificate of the peer. The number calculated -from the matched string to the \fIn\fPth ( ... ) in -the ``regex'' of SSL options (mod \fIm\fP) is used -to select the destination from the destination -group defined by \fB-B\fP flag. -.PD -.P -\fIst\fP is one of the following. Multiple \fIst\fP can be -designated, separated by \fB--\fP. -.P -.PD 0 -.IP (1) -\fIhost\fP:\fIport\fP \fIsport\fP [\fIxhost\fP...] -.IP (2) -\fIhost\fP:\fIport\fP \fIshost\fP:\fIsport\fP [\fIxhost\fP...] -.IP (3) -proxy \fIsport\fP [\fIxhost\fP...] -.IP (4) -\fIhost\fP:\fIport\fP/http \fIrequest\fP [\fIxhost\fP...] -.IP (5) -\fIhost\fP:\fIport\fP/proxy \fIheader\fP [\fIxhost\fP...] -.IP (6) -health \fIsport\fP [\fIxhost\fP...] -.PD -.P -The program repeats the connection on port \fIsport\fP to the -other machine \fIhost\fP port \fIport\fP. If the machine, on -which the program runs, has two or more interfaces, type (2) can -be used to repeat the connection on the specified interface -\fIshost\fP. You can also specify path name that begins with -``/'' or ``./'', instead of \fIhost\fP:\fIport\fP so that the -program handles a unix domain socket. -.P -Type (3) is a http proxy. Specify the machine, on which the -program runs, and port \fIsport\fP in the http proxy settings of -your WWW browser. -Extentions can be added to the ``proxy'' like \fIxhost\fP/\fIext\fP. -\fIext\fP is: -.P -.IP v4only -limit the destination within IP addresses. -.IP v6only -limit the destination within IPv6 addresses. -.P -Type (4) relays stream over http request. \fIrequest\fP is the -request specified in HTTP 1.0. In the \fIrequest\fP, \ is -the escape character, and the following substitution occurs. -.PP -.RS 8 -.PD 0 -.IP \\\\n 8 -newline (0x0A) -.IP \\\\r -return (0x0D) -.IP \\\\t -tab (0x09) -.IP \\\\\\\\ -\ itself (0x5C) -.IP \\\\a -the IP address of the client connecting to the \fBstone\fP. -.IP \\\\A -\fIIP address of the client\fP:\fIport number\fP -.IP \\\\0 -the serial number of peer's SSL certificate. -.IP "\\\\1 - \\\\9" -the matched string in the ``regex'' of SSL options. -.IP \\\\?1\fIthen\fP\\\\:\fIelse\fP\\\\/ -if \1 (\2 - \9 in a similar way) is not null, -\fIthen\fP, otherwise \fIelse\fP. -.PD -.RE -.P -Type (5) repeats http request with \fIheader\fP in the top of -request headers. The above escapes can be also used. -.P -Type (6) designates the port that other programs can check -whether the \fBstone\fP runs `healthy' or not. Following commands are -available to check the \fBstone\fP. -.P -.RS 8 -.PD 0 -.IP "HELO \fIany string\fP" 24 -returns the status of the \fBstone\fP -.IP "LIMIT \fIvar\fP \fIn\fP" -check the value of \fIvar\fP is -less than \fIn\fP -.PD -.RE -.P -\fIvar\fP is one of the following: -.P -.RS 8 -.PD 0 -.IP PAIR 16 -the number of ``pair'' -.IP CONN -the number of ``conn'' -.IP ESTABLISHED -seconds passed since the last conn established -.IP READWRITE -seconds passed since the last read/write -.IP ASYNC -the number of threads -.PD -.RE -.P -The response of the \fBstone\fP is 2xx when normal, or 5xx when -abnormal on the top of line. -.P -If the \fIxhost\fP are used, only machines or its IP addresses -listed in \fIxhost\fP separated by space character can -connect to the program and to be repeated. -.P -Extentions can be added to the \fIxhost\fP like -\fIxhost\fP/\fIex\fP,\fIex\fP.... \fIex\fP is: -.IP \fIm\fP -You can designate the length of prefix bits of the -netmask, so that only machines on specified. In the -case of class C network 192.168.1.0, for example, use -``192.168.1.0/24''. -.IP v4 -\fIxhost\fP is resolved as the IP address. -.IP v6 -\fIxhost\fP is resolved as the IPv6 address. -.IP p\fIm\fP -the data repeated by the program are dumped, only if it -was connected by the machines specified by \fIxhost\fP. \fIm\fP -is the dump mode, equivalent to the number of \fB-p\fP -options. -.P -Use ``!'' instead of ``\fIxhost\fP'', to deny machines by following -\fIxhost\fP. -.P -Extentions can be added to the \fIport\fP like -\fIport\fP/\fIext\fP,\fIext\fP.... \fIext\fP is: -.IP udp -repeats UDP instead of TCP. -.IP ssl -forwards with encryption. -.IP v6 -connects to the destination using IPv6. -.IP base -forwards with MIME base64 encoding. -.P -Extentions can be added to the \fIsport\fP like -\fIsport\fP/\fIext\fP,\fIext\fP.... \fIext\fP is: -.IP udp -repeats UDP instead of TCP. -.IP apop -converts POP to APOP. The conversion is derived from -the RSA Data Security, Inc. MD5 Message-Digest Algorithm. -.IP ssl -forwards with decryption. -.IP v6 -accepts connection using IPv6. If \fIshost\fP is omitted -like (1), IP is also acceptable. -.IP v6only -accepts connection using IPv6 only. Even if \fIshost\fP is -omitted like (1), IP is not acceptable. -.IP base -forwards with MIME base64 decoding. -.IP http -relays stream over http. -.IP ident -identifies the owner of the incoming connection -on the peer using ident protocol (RFC1413). -.SH EXAMPLES -.PD 0 -.IP \fIouter\fP\^: -a machine in the outside of the firewall -.IP \fIinner\fP\^: -a machine in the inside of the firewall -.IP \fIfwall\fP\^: -the firewall on which the \fBstone\fP is executed -.PD -.TP -\fBstone \fIouter\fB:telnet 10023\fR -Repeats the telnet protocol to \fIouter\fP. -Run telnet fwall 10023 on \fIinner\fR. -.TP -\fBstone \fIouter\fB:domain/udp domain/udp\fR -Repeats the DNS query to \fIouter\fP. -Run \fBnslookup -\fP \fIfwall\fP on \fIinner\fP. -.TP -\fBstone \fIouter\fB:ntp/udp ntp/udp\fR -Repeats the NTP to \fIouter\fP. -Run \fBntpdate \fIfwall\fR on \fIinner\fP. -.TP -\fBstone localhost:http 443/ssl\fR -Make WWW server that supports https. -Access \fBhttps://\fIfwall\fB/\fR using a WWW browser. -.TP -\fBstone localhost:telnet 10023/ssl\fR -Make telnet server that supports SSL. -Run \fBSSLtelnet -z ssl \fIfwall\fB 10023\fR on \fIinner\fP. -.TP -\fBstone proxy 8080\fR -http proxy -.TP -\fBstone\fP \fIouter\fB:110/apop 110\fR -connect to \fIinner\fP:pop using a mailer that does not -support APOP. -.PP -Where \fIfwall\fP is a http proxy (port 8080): -.TP -\fBstone \fIfwall\fB:8080/http 10023 'POST http://\fIouter\fB:8023 HTTP/1.0'\fR -.br -.ns -.TP -\fBstone localhost:telnet 8023/http -.nf -Run \fBstone\fPs on \fIinner\fP and \fIouter\fP respectively. -Relays stream over http. -.TP -\fBstone \fIfwall\fB:8080/proxy 9080 \'Proxy-Authorization: Basic \fIc2VuZ29rdTpoaXJvYWtp\fB\'\fR -for browser that does not support proxy authorization. -.fi -. -.SH HOMEPAGE -The official homepage of \fBstone\fP is: -.br -\fIhttp://www.gcd.org/sengoku/stone/\fP -. -.SH COPYRIGHT -All rights about this program \fBstone\fP are reserved by the -original author, Hiroaki Sengoku. The program is free software; -you can redistribute it and/or modify it under the terms of the -\fIGNU IGeneral Public License (GPL)\fP. Furthermore you can link it -with openssl. -. -.SH NO WARRANTY -This program is distributed in the hope that it will be useful, -but WITHOUT ANY WARRANTY. -. -.SH AUTHOR -.nf -Hiroaki Sengoku -sengoku@gcd.org -http://www.gcd.org/sengoku/ -.fi diff --git a/net-misc/stone/metadata.xml b/net-misc/stone/metadata.xml deleted file mode 100644 index fde75b04e631..000000000000 --- a/net-misc/stone/metadata.xml +++ /dev/null @@ -1,6 +0,0 @@ -<?xml version="1.0" encoding="UTF-8"?> -<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd"> -<pkgmetadata> -<!-- maintainer-needed --> -<longdescription>Stone is a TCP/IP packet repeater in the application layer. It repeats TCP and UDP packets from inside to outside of a firewall, or from outside to inside.</longdescription> -</pkgmetadata> diff --git a/net-misc/stone/stone-2.3e-r1.ebuild b/net-misc/stone/stone-2.3e-r1.ebuild deleted file mode 100644 index 6e1111841a3d..000000000000 --- a/net-misc/stone/stone-2.3e-r1.ebuild +++ /dev/null @@ -1,46 +0,0 @@ -# Copyright 1999-2013 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 - -EAPI=5 - -inherit eutils flag-o-matic toolchain-funcs - -DESCRIPTION="A simple TCP/IP packet repeater" -HOMEPAGE="http://www.gcd.org/sengoku/stone/" -SRC_URI="http://www.gcd.org/sengoku/stone/${P}.tar.gz" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="amd64 ppc ~sparc x86" -IUSE="ssl" - -DEPEND="ssl? ( dev-libs/openssl )" -RDEPEND="${DEPEND}" - -S="${WORKDIR}/${PN}-2.3d-2.3.2.7" - -PATCHES=( "${FILESDIR}/${P}-makefile.patch" ) # bug #337879 - -src_prepare() { - tc-export CC - append-cflags "-D_GNU_SOURCE" - - epatch "${PATCHES[@]}" - epatch_user -} - -src_compile() { - local myargs - if use ssl ; then - myargs="SSL=/usr linux-ssl" - else - myargs="linux" - fi - emake ${myargs} -} - -src_install() { - dobin stone - newman "${FILESDIR}/${PN}.man" "${PN}.1" - dodoc README* -} diff --git a/profiles/package.mask b/profiles/package.mask index 398ec66549d2..740da127d944 100644 --- a/profiles/package.mask +++ b/profiles/package.mask @@ -627,7 +627,6 @@ x11-libs/hippo-canvas # net-mail/uw-imap: #678606, last upstream release in 2011 # net-mail/uw-mailutils: #674174, same as uw-imap # net-misc/sslwrap: #674524, last updated upstream in 2000 -# net-misc/stone: #675612, needs new snapshot, current ver is from 2008 # # Removal in 30 days. app-crypt/keynote @@ -652,7 +651,6 @@ net-mail/up-imapproxy net-mail/uw-imap net-mail/uw-mailutils net-misc/sslwrap -net-misc/stone # Miroslav Šulc <fordfrog@gentoo.org> (19 Mar 2019) # Depends on >=virtual/{jdk,jre}-11 which is masked |