<metapackage xmlns:os="http://opensuse.org/Standards/One_Click_Install" xmlns="http://opensuse.org/Standards/One_Click_Install">
  <group distversion="openSUSE Tumbleweed">
    <repositories>
      <repository recommended="true">
        <name>devel:languages:perl:CPAN-I</name>
        <summary>CPAN modules not in devel:languages:perl</summary>
        <description>This project builds all cpan modules generated by cpanspec without developer interaction. If you want to fix a package,
               copypac it from here and then submit it to devel:languages:perl</description>
        <url>https://download.opensuse.org/repositories/devel:/languages:/perl:/CPAN-I/openSUSE_Tumbleweed/</url>
      </repository>
      <repository recommended="true">
        <name>devel:languages:perl</name>
        <summary>Perl and perl modules</summary>
        <description>++++++++++ Note: We are going to change the version format of the modules. See https://github.com/openSUSE/cpanspec/issues/47 for context ++++++++++

++++++++++ Note 2: Packages are maintained under git as of 2025-08-13:
https://src.opensuse.org/perl
https://en.opensuse.org/openSUSE:OBS_to_Git ++++++++++

Perl and a large number of important perl modules and tools.

Module updates from CPAN are regularly checked (with scripts from https://github.com/openSUSE/autoupdate-perl and https://github.com/openSUSE/cpanspec ) and put into https://build.opensuse.org/project/show/devel:languages:perl:autoupdate .

Please check https://build.opensuse.org/project/show/devel:languages:perl:autoupdate first before doing your own update! An updated version of the module might already be there, just that there is no submit request yet.

How to submit a new module here: https://github.com/openSUSE/cpanspec/wiki/Submit-a-new-Perl-module-to-openSUSE
</description>
        <url>https://download.opensuse.org/repositories/devel:/languages:/perl/openSUSE_Tumbleweed/</url>
      </repository>
      <repository recommended="true">
        <name>openSUSE:Tumbleweed</name>
        <summary>Tumbleweed</summary>
        <description>Tumbleweed is the openSUSE Rolling Release

This OBS Project represents the content of the currently published
snapshot. The newer repository for next publish can be found in openSUSE:Factory standard repository.
</description>
        <url>https://download.opensuse.org/repositories/openSUSE:/Tumbleweed/standard/</url>
      </repository>
      <repository recommended="true">
        <name>openSUSE:Tumbleweed</name>
        <summary>Tumbleweed</summary>
        <description>Tumbleweed is the openSUSE Rolling Release

This OBS Project represents the content of the currently published
snapshot. The newer repository for next publish can be found in openSUSE:Factory standard repository.
</description>
        <url>https://download.opensuse.org/tumbleweed/repo/oss/</url>
      </repository>
      <repository recommended="false">
        <name>openSUSE:Factory</name>
        <summary>The next openSUSE distribution</summary>
        <description>openSUSE Tumbleweed: The Bleeding Edge, Perfected.
Tumbleweed is the ultimate rolling release distribution, providing the latest software as it’s released, built upon a foundation of world-class stability and testing.

* Always Current: Get the newest kernel, IDEs, desktops, and applications automatically.

* Powerfully Stable: Experience the velocity of a rolling release without sacrificing the reliability you depend on.

* Engineered for Professionals: The top choice for Developers, Power Users, and openSUSE Contributors who need the best tools for the job.

If you demand the latest stable software, your choice is Tumbleweed.

Staging dashboard is located at: https://build.opensuse.org/staging_workflows/openSUSE:Factory 

List of known devel projects: https://build.opensuse.org/package/view_file/openSUSE:Factory:Staging/dashboard/devel_projects

Have a look at http://en.opensuse.org/Portal:Factory for more details.</description>
        <url>https://download.opensuse.org/repositories/openSUSE:/Factory/ports/</url>
      </repository>
    </repositories>
    <software>
      <item>
        <name>perl-IPTables-Parse</name>
        <summary>Perl extension for parsing iptables and ip6tables policies</summary>
        <description>The 'IPTables::Parse' package provides an interface to parse iptables or
ip6tables rules on Linux systems through the direct execution of
iptables/ip6tables commands, or from parsing a file that contains an
iptables/ip6tables policy listing. Note that the 'firewalld' infrastructure
on Fedora21 is also supported through execution of the 'firewall-cmd'
binary. By default, the path to iptables is assumed to be '/sbin/iptables',
but if the firewall is 'firewalld', then the '/usr/bin/firewall-cmd' is
used.

With this module, you can get the current policy applied to a table/chain,
look for a specific user-defined chain, check for a default DROP policy, or
determine whether or not a default LOG rule exists. Also, you can get a
listing of all rules in a chain with each rule parsed into its own hash.

Note that if you initialize the IPTables::Parse object with the
'ipt_rules_file' key, then all parsing routines will open the specified
file for iptables rules data. So, you can create this file with a command
like 'iptables -t filter -nL -v &gt; ipt.rules', and then initialize the
object with IPTables::Parse-&gt;new('ipt_rules_file' =&gt; 'ipt.rules'). Further,
if you are running on a system without iptables installed, but you have an
iptables policy written to the ipt.rules file, then you can pass in
'skip_ipt_exec_check=&gt;1' in order to analyze the file without having
IPTables::Parse check for the iptables binary.

In summary, in addition to the hash keys mentioned above, optional keys
that can be passed to new() include 'iptables' (set path to iptables
binary), 'firewall_cmd' (set path to 'firewall-cmd' binary for systems with
'firewalld'), 'fwd_args' (set 'firewall-cmd' usage args; defaults to
'--direct --passthrough ipv4'), 'ipv6' (set IPv6 mode for ip6tables),
'debug', 'verbose', and 'lockless_ipt_exec' (disable usage of the iptables
'-w' argument that acquires an exclusive lock on command execution).</description>
      </item>
    </software>
  </group>
</metapackage>
