project-lakitu: remove iptables from project-lakitu

This change removes iptables from project-lakitu since iptables
can now again be pulled from portage-stable since the upstream
issue that put iptables in project-lakitu in the first place has
since been resolved. (See b/143164242 for context.)

BUG=b/173158844
TEST=presubmit
RELEASE_NOTE=none

Change-Id: I2af660dfdf74bf402d56c88dfc1839671eb2747c
Reviewed-on: https://cos-review.googlesource.com/c/cos/overlays/board-overlays/+/9020
Tested-by: Cusky Presubmit Bot <presubmit@cos-infra-prod.iam.gserviceaccount.com>
Reviewed-by: Robert Kolchmeyer <rkolchmeyer@google.com>
diff --git a/project-lakitu/net-firewall/iptables/Manifest b/project-lakitu/net-firewall/iptables/Manifest
deleted file mode 100644
index c5e244b..0000000
--- a/project-lakitu/net-firewall/iptables/Manifest
+++ /dev/null
@@ -1 +0,0 @@
-DIST iptables-1.6.2.tar.bz2 639785 BLAKE2B 3d129756fd33c8c73d56d57e3c5595896db86ded14834a45db21b964d82840b62216ce3cea4ae4960e8c5f0671df3cc6bfb222f68d29cf3a8c99e0eee14bf017 SHA512 04f22e969c794246b9aa28055b202638081cfb0bb4a5625c049a30c48ac84cdd41db12a53c5831398cfe47c8f5691aa02b30b0ae3b5afe0f20ec48cf86a799c0
diff --git a/project-lakitu/net-firewall/iptables/files/ip6tables-1.4.13.confd b/project-lakitu/net-firewall/iptables/files/ip6tables-1.4.13.confd
deleted file mode 100644
index 3bb3698..0000000
--- a/project-lakitu/net-firewall/iptables/files/ip6tables-1.4.13.confd
+++ /dev/null
@@ -1,19 +0,0 @@
-# /etc/conf.d/ip6tables
-
-# Location in which iptables initscript will save set rules on 
-# service shutdown
-IP6TABLES_SAVE="/var/lib/ip6tables/rules-save"
-
-# Options to pass to iptables-save and iptables-restore 
-SAVE_RESTORE_OPTIONS="-c"
-
-# Save state on stopping iptables
-SAVE_ON_STOP="yes"
-
-# If you need to log iptables messages as soon as iptables starts,
-# AND your logger does NOT depend on the network, then you may wish
-# to uncomment the next line.
-# If your logger depends on the network, and you uncomment this line
-# you will create an unresolvable circular dependency during startup.
-# After commenting or uncommenting this line, you must run 'rc-update -u'.
-#rc_use="logger"
diff --git a/project-lakitu/net-firewall/iptables/files/ip6tables-r1.confd b/project-lakitu/net-firewall/iptables/files/ip6tables-r1.confd
deleted file mode 100644
index e608f41..0000000
--- a/project-lakitu/net-firewall/iptables/files/ip6tables-r1.confd
+++ /dev/null
@@ -1,27 +0,0 @@
-# /etc/conf.d/ip6tables
-
-# Set wait option for xtables lock in seconds
-# DEFAULT: 60
-#IPTABLES_LOCK_WAIT_TIME="60"
-
-# Set wait interval option for xtables lock in microseconds
-# DEFAULT: 1000
-#IPTABLES_LOCK_WAIT_INTERVAL="1000"
-
-# Location in which ip6tables initscript will save set rules on
-# service shutdown
-IP6TABLES_SAVE="/var/lib/ip6tables/rules-save"
-
-# Options to pass to ip6tables-save and ip6tables-restore 
-SAVE_RESTORE_OPTIONS="-c"
-
-# Save state on stopping ip6tables
-SAVE_ON_STOP="yes"
-
-# If you need to log ip6tables messages as soon as ip6tables starts,
-# AND your logger does NOT depend on the network, then you may wish
-# to uncomment the next line.
-# If your logger depends on the network, and you uncomment this line
-# you will create an unresolvable circular dependency during startup.
-# After commenting or uncommenting this line, you must run 'rc-update -u'.
-#rc_use="logger"
diff --git a/project-lakitu/net-firewall/iptables/files/iptables-1.4.13.confd b/project-lakitu/net-firewall/iptables/files/iptables-1.4.13.confd
deleted file mode 100644
index 7225374..0000000
--- a/project-lakitu/net-firewall/iptables/files/iptables-1.4.13.confd
+++ /dev/null
@@ -1,19 +0,0 @@
-# /etc/conf.d/iptables
-
-# Location in which iptables initscript will save set rules on 
-# service shutdown
-IPTABLES_SAVE="/var/lib/iptables/rules-save"
-
-# Options to pass to iptables-save and iptables-restore 
-SAVE_RESTORE_OPTIONS="-c"
-
-# Save state on stopping iptables
-SAVE_ON_STOP="yes"
-
-# If you need to log iptables messages as soon as iptables starts,
-# AND your logger does NOT depend on the network, then you may wish
-# to uncomment the next line.
-# If your logger depends on the network, and you uncomment this line
-# you will create an unresolvable circular dependency during startup.
-# After commenting or uncommenting this line, you must run 'rc-update -u'.
-#rc_use="logger"
diff --git a/project-lakitu/net-firewall/iptables/files/iptables-r1.confd b/project-lakitu/net-firewall/iptables/files/iptables-r1.confd
deleted file mode 100644
index d5055e0..0000000
--- a/project-lakitu/net-firewall/iptables/files/iptables-r1.confd
+++ /dev/null
@@ -1,27 +0,0 @@
-# /etc/conf.d/iptables
-
-# Set wait option for xtables lock in seconds
-# DEFAULT: 60
-#IPTABLES_LOCK_WAIT_TIME="60"
-
-# Set wait interval option for xtables lock in microseconds
-# DEFAULT: 1000
-#IPTABLES_LOCK_WAIT_INTERVAL="1000"
-
-# Location in which iptables initscript will save set rules on
-# service shutdown
-IPTABLES_SAVE="/var/lib/iptables/rules-save"
-
-# Options to pass to iptables-save and iptables-restore 
-SAVE_RESTORE_OPTIONS="-c"
-
-# Save state on stopping iptables
-SAVE_ON_STOP="yes"
-
-# If you need to log iptables messages as soon as iptables starts,
-# AND your logger does NOT depend on the network, then you may wish
-# to uncomment the next line.
-# If your logger depends on the network, and you uncomment this line
-# you will create an unresolvable circular dependency during startup.
-# After commenting or uncommenting this line, you must run 'rc-update -u'.
-#rc_use="logger"
diff --git a/project-lakitu/net-firewall/iptables/files/iptables-r2.init b/project-lakitu/net-firewall/iptables/files/iptables-r2.init
deleted file mode 100644
index 3dcabb0..0000000
--- a/project-lakitu/net-firewall/iptables/files/iptables-r2.init
+++ /dev/null
@@ -1,165 +0,0 @@
-#!/sbin/openrc-run
-# Copyright 1999-2018 Gentoo Authors
-# Distributed under the terms of the GNU General Public License v2
-
-extra_commands="check save panic"
-extra_started_commands="reload"
-
-iptables_lock_wait_time=${IPTABLES_LOCK_WAIT_TIME:-"60"}
-iptables_lock_wait_interval=${IPTABLES_LOCK_WAIT_INTERVAL:-"1000"}
-
-iptables_name=${SVCNAME}
-case ${iptables_name} in
-	iptables|ip6tables) ;;
-	*) iptables_name="iptables" ;;
-esac
-
-iptables_bin="/sbin/${iptables_name}"
-case ${iptables_name} in
-	iptables)  iptables_proc="/proc/net/ip_tables_names"
-	           iptables_save=${IPTABLES_SAVE};;
-	ip6tables) iptables_proc="/proc/net/ip6_tables_names"
-	           iptables_save=${IP6TABLES_SAVE};;
-esac
-
-depend() {
-	need localmount #434774
-	before net
-}
-
-set_table_policy() {
-	local has_errors=0 chains table=$1 policy=$2
-	case ${table} in
-		nat)    chains="PREROUTING POSTROUTING OUTPUT";;
-		mangle) chains="PREROUTING INPUT FORWARD OUTPUT POSTROUTING";;
-		filter) chains="INPUT FORWARD OUTPUT";;
-		*)      chains="";;
-	esac
-
-	local chain
-	for chain in ${chains} ; do
-		${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -t ${table} -P ${chain} ${policy}
-		[ $? -ne 0 ] && has_errors=1
-	done
-
-	return ${has_errors}
-}
-
-checkkernel() {
-	if [ ! -e ${iptables_proc} ] ; then
-		eerror "Your kernel lacks ${iptables_name} support, please load"
-		eerror "appropriate modules and try again."
-		return 1
-	fi
-	return 0
-}
-
-checkconfig() {
-	if [ -z "${iptables_save}" -o ! -f "${iptables_save}" ] ; then
-		eerror "Not starting ${iptables_name}.  First create some rules then run:"
-		eerror "/etc/init.d/${iptables_name} save"
-		return 1
-	fi
-	return 0
-}
-
-start_pre() {
-	checkconfig || return 1
-}
-
-start() {
-	ebegin "Loading ${iptables_name} state and starting firewall"
-	${iptables_bin}-restore --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
-	eend $?
-}
-
-stop_pre() {
-	checkkernel || return 1
-}
-
-stop() {
-	if [ "${SAVE_ON_STOP}" = "yes" ] ; then
-		save || return 1
-	fi
-
-	ebegin "Stopping firewall"
-	local has_errors=0 a
-	for a in $(cat ${iptables_proc}) ; do
-		set_table_policy $a ACCEPT
-		[ $? -ne 0 ] && has_errors=1
-
-		${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -F -t $a
-		[ $? -ne 0 ] && has_errors=1
-
-		${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -X -t $a
-		[ $? -ne 0 ] && has_errors=1
-	done
-	eend ${has_errors}
-}
-
-reload() {
-	checkkernel || return 1
-	checkrules || return 1
-	ebegin "Flushing firewall"
-	local has_errors=0 a
-	for a in $(cat ${iptables_proc}) ; do
-		${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -F -t $a
-		[ $? -ne 0 ] && has_errors=1
-
-		${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -X -t $a
-		[ $? -ne 0 ] && has_errors=1
-	done
-	eend ${has_errors}
-
-	start
-}
-
-checkrules() {
-	ebegin "Checking rules"
-	${iptables_bin}-restore --test ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
-	eend $?
-}
-
-check() {
-	# Short name for users of init.d script.
-	checkrules
-}
-
-save() {
-	ebegin "Saving ${iptables_name} state"
-	checkpath -q -d "$(dirname "${iptables_save}")"
-	checkpath -q -m 0600 -f "${iptables_save}"
-	${iptables_bin}-save ${SAVE_RESTORE_OPTIONS} > "${iptables_save}"
-	eend $?
-}
-
-panic() {
-	# use iptables autoload capability to load at least all required
-	# modules and filter table
-	${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -S >/dev/null
-	if [ $? -ne 0 ] ; then
-		eerror "${iptables_bin} failed to load"
-		return 1
-	fi
-
-	if service_started ${iptables_name}; then
-		rc-service ${iptables_name} stop
-	fi
-
-	local has_errors=0 a
-	ebegin "Dropping all packets"
-	for a in $(cat ${iptables_proc}) ; do
-		${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -F -t $a
-		[ $? -ne 0 ] && has_errors=1
-
-		${iptables_bin} --wait ${iptables_lock_wait_time} --wait-interval ${iptables_lock_wait_interval} -X -t $a
-		[ $? -ne 0 ] && has_errors=1
-
-		if [ "${a}" != "nat" ]; then
-			# The "nat" table is not intended for filtering, the use of DROP is therefore inhibited.
-			set_table_policy $a DROP
-			[ $? -ne 0 ] && has_errors=1
-		fi
-	done
-	eend ${has_errors}
-}
diff --git a/project-lakitu/net-firewall/iptables/files/iptables.init b/project-lakitu/net-firewall/iptables/files/iptables.init
deleted file mode 100644
index 10394c6..0000000
--- a/project-lakitu/net-firewall/iptables/files/iptables.init
+++ /dev/null
@@ -1,129 +0,0 @@
-#!/sbin/openrc-run
-# Copyright 1999-2013 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-
-extra_commands="check save panic"
-extra_started_commands="reload"
-
-iptables_name=${SVCNAME}
-case ${iptables_name} in
-iptables|ip6tables) ;;
-*) iptables_name="iptables" ;;
-esac
-
-iptables_bin="/sbin/${iptables_name}"
-case ${iptables_name} in
-	iptables)  iptables_proc="/proc/net/ip_tables_names"
-	           iptables_save=${IPTABLES_SAVE};;
-	ip6tables) iptables_proc="/proc/net/ip6_tables_names"
-	           iptables_save=${IP6TABLES_SAVE};;
-esac
-
-depend() {
-	need localmount #434774
-	before net
-}
-
-set_table_policy() {
-	local chains table=$1 policy=$2
-	case ${table} in
-		nat)    chains="PREROUTING POSTROUTING OUTPUT";;
-		mangle) chains="PREROUTING INPUT FORWARD OUTPUT POSTROUTING";;
-		filter) chains="INPUT FORWARD OUTPUT";;
-		*)      chains="";;
-	esac
-	local chain
-	for chain in ${chains} ; do
-		${iptables_bin} -w -t ${table} -P ${chain} ${policy}
-	done
-}
-
-checkkernel() {
-	if [ ! -e ${iptables_proc} ] ; then
-		eerror "Your kernel lacks ${iptables_name} support, please load"
-		eerror "appropriate modules and try again."
-		return 1
-	fi
-	return 0
-}
-checkconfig() {
-	if [ ! -f ${iptables_save} ] ; then
-		eerror "Not starting ${iptables_name}.  First create some rules then run:"
-		eerror "/etc/init.d/${iptables_name} save"
-		return 1
-	fi
-	return 0
-}
-
-start() {
-	checkconfig || return 1
-	ebegin "Loading ${iptables_name} state and starting firewall"
-	${iptables_bin}-restore ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
-	eend $?
-}
-
-stop() {
-	if [ "${SAVE_ON_STOP}" = "yes" ] ; then
-		save || return 1
-	fi
-	checkkernel || return 1
-	ebegin "Stopping firewall"
-	local a
-	for a in $(cat ${iptables_proc}) ; do
-		set_table_policy $a ACCEPT
-
-		${iptables_bin} -w -F -t $a
-		${iptables_bin} -w -X -t $a
-	done
-	eend $?
-}
-
-reload() {
-	checkkernel || return 1
-	checkrules || return 1
-	ebegin "Flushing firewall"
-	local a
-	for a in $(cat ${iptables_proc}) ; do
-		${iptables_bin} -w -F -t $a
-		${iptables_bin} -w -X -t $a
-	done
-	eend $?
-
-	start
-}
-
-checkrules() {
-	ebegin "Checking rules"
-	${iptables_bin}-restore --test ${SAVE_RESTORE_OPTIONS} < "${iptables_save}"
-	eend $?
-}
-
-check() {
-	# Short name for users of init.d script.
-	checkrules
-}
-
-save() {
-	ebegin "Saving ${iptables_name} state"
-	checkpath -q -d "$(dirname "${iptables_save}")"
-	checkpath -q -m 0600 -f "${iptables_save}"
-	${iptables_bin}-save ${SAVE_RESTORE_OPTIONS} > "${iptables_save}"
-	eend $?
-}
-
-panic() {
-	checkkernel || return 1
-	if service_started ${iptables_name}; then
-		rc-service ${iptables_name} stop
-	fi
-
-	local a
-	ebegin "Dropping all packets"
-	for a in $(cat ${iptables_proc}) ; do
-		${iptables_bin} -w -F -t $a
-		${iptables_bin} -w -X -t $a
-
-		set_table_policy $a DROP
-	done
-	eend $?
-}
diff --git a/project-lakitu/net-firewall/iptables/files/systemd/ip6tables-restore.service b/project-lakitu/net-firewall/iptables/files/systemd/ip6tables-restore.service
deleted file mode 100644
index 921b691..0000000
--- a/project-lakitu/net-firewall/iptables/files/systemd/ip6tables-restore.service
+++ /dev/null
@@ -1,14 +0,0 @@
-[Unit]
-Description=Restore ip6tables firewall rules
-# if both are queued for some reason, don't store before restoring :)
-Before=ip6tables-store.service
-# sounds reasonable to have firewall up before any of the services go up
-Before=network-pre.target
-Wants=network-pre.target
-
-[Service]
-Type=oneshot
-ExecStart=/sbin/ip6tables-restore -w -- /var/lib/ip6tables/rules-save
-
-[Install]
-WantedBy=basic.target
diff --git a/project-lakitu/net-firewall/iptables/files/systemd/ip6tables-store.service b/project-lakitu/net-firewall/iptables/files/systemd/ip6tables-store.service
deleted file mode 100644
index 9975378..0000000
--- a/project-lakitu/net-firewall/iptables/files/systemd/ip6tables-store.service
+++ /dev/null
@@ -1,11 +0,0 @@
-[Unit]
-Description=Store ip6tables firewall rules
-Before=shutdown.target
-DefaultDependencies=No
-
-[Service]
-Type=oneshot
-ExecStart=/bin/sh -c "/sbin/ip6tables-save --counters > /var/lib/ip6tables/rules-save"
-
-[Install]
-WantedBy=shutdown.target
diff --git a/project-lakitu/net-firewall/iptables/files/systemd/ip6tables.service b/project-lakitu/net-firewall/iptables/files/systemd/ip6tables.service
deleted file mode 100644
index 0a6d7fa..0000000
--- a/project-lakitu/net-firewall/iptables/files/systemd/ip6tables.service
+++ /dev/null
@@ -1,6 +0,0 @@
-[Unit]
-Description=Store and restore ip6tables firewall rules
-
-[Install]
-Also=ip6tables-store.service
-Also=ip6tables-restore.service
diff --git a/project-lakitu/net-firewall/iptables/files/systemd/iptables-restore.service b/project-lakitu/net-firewall/iptables/files/systemd/iptables-restore.service
deleted file mode 100644
index a9e5679..0000000
--- a/project-lakitu/net-firewall/iptables/files/systemd/iptables-restore.service
+++ /dev/null
@@ -1,14 +0,0 @@
-[Unit]
-Description=Restore iptables firewall rules
-# if both are queued for some reason, don't store before restoring :)
-Before=iptables-store.service
-# sounds reasonable to have firewall up before any of the services go up
-Before=network-pre.target
-Wants=network-pre.target
-
-[Service]
-Type=oneshot
-ExecStart=/sbin/iptables-restore -w -- /var/lib/iptables/rules-save
-
-[Install]
-WantedBy=basic.target
diff --git a/project-lakitu/net-firewall/iptables/files/systemd/iptables-store.service b/project-lakitu/net-firewall/iptables/files/systemd/iptables-store.service
deleted file mode 100644
index aa16e75..0000000
--- a/project-lakitu/net-firewall/iptables/files/systemd/iptables-store.service
+++ /dev/null
@@ -1,11 +0,0 @@
-[Unit]
-Description=Store iptables firewall rules
-Before=shutdown.target
-DefaultDependencies=No
-
-[Service]
-Type=oneshot
-ExecStart=/bin/sh -c "/sbin/iptables-save --counters > /var/lib/iptables/rules-save"
-
-[Install]
-WantedBy=shutdown.target
diff --git a/project-lakitu/net-firewall/iptables/files/systemd/iptables.service b/project-lakitu/net-firewall/iptables/files/systemd/iptables.service
deleted file mode 100644
index 3643a3e..0000000
--- a/project-lakitu/net-firewall/iptables/files/systemd/iptables.service
+++ /dev/null
@@ -1,6 +0,0 @@
-[Unit]
-Description=Store and restore iptables firewall rules
-
-[Install]
-Also=iptables-store.service
-Also=iptables-restore.service
diff --git a/project-lakitu/net-firewall/iptables/iptables-1.6.2-r2.ebuild b/project-lakitu/net-firewall/iptables/iptables-1.6.2-r2.ebuild
deleted file mode 100644
index d540f4c..0000000
--- a/project-lakitu/net-firewall/iptables/iptables-1.6.2-r2.ebuild
+++ /dev/null
@@ -1,126 +0,0 @@
-# Copyright 1999-2018 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-
-# With the exception of this comment, this package was generated using
-# cros_portage_upgrade.
-
-EAPI=6
-
-# Force users doing their own patches to install their own tools
-AUTOTOOLS_AUTO_DEPEND=no
-
-inherit ltprune multilib systemd toolchain-funcs autotools flag-o-matic usr-ldscript
-
-DESCRIPTION="Linux kernel (2.4+) firewall, NAT and packet mangling tools"
-HOMEPAGE="https://www.netfilter.org/projects/iptables/"
-SRC_URI="https://www.netfilter.org/projects/iptables/files/${P}.tar.bz2"
-
-LICENSE="GPL-2"
-# Subslot tracks libxtables as that's the one other packages generally link
-# against and iptables changes.  Will have to revisit if other sonames change.
-SLOT="0/12"
-KEYWORDS="*"
-IUSE="conntrack ipv6 netlink nftables pcap static-libs"
-
-COMMON_DEPEND="
-	conntrack? ( >=net-libs/libnetfilter_conntrack-1.0.6 )
-	netlink? ( net-libs/libnfnetlink )
-	nftables? (
-		>=net-libs/libmnl-1.0:0=
-		>=net-libs/libnftnl-1.0.5:0=
-	)
-	pcap? ( net-libs/libpcap )
-"
-DEPEND="${COMMON_DEPEND}
-	virtual/os-headers
-	>=sys-kernel/linux-headers-4.4:0
-	virtual/pkgconfig
-	nftables? (
-		sys-devel/flex
-		virtual/yacc
-	)
-"
-RDEPEND="${COMMON_DEPEND}
-	nftables? ( net-misc/ethertypes )
-"
-
-src_prepare() {
-	# use the saner headers from the kernel
-	rm -f include/linux/{kernel,types}.h
-
-	# Only run autotools if user patched something
-	eapply_user && eautoreconf || elibtoolize
-}
-
-src_configure() {
-	# Some libs use $(AR) rather than libtool to build #444282
-	tc-export AR
-
-	# Hack around struct mismatches between userland & kernel for some ABIs. #472388
-	use amd64 && [[ ${ABI} == "x32" ]] && append-flags -fpack-struct
-
-	sed -i \
-		-e "/nfnetlink=[01]/s:=[01]:=$(usex netlink 1 0):" \
-		-e "/nfconntrack=[01]/s:=[01]:=$(usex conntrack 1 0):" \
-		configure || die
-
-	local myeconfargs=(
-		--sbindir="${EPREFIX}/sbin"
-		--libexecdir="${EPREFIX}/$(get_libdir)"
-		--enable-devel
-		--enable-shared
-		$(use_enable nftables)
-		$(use_enable pcap bpf-compiler)
-		$(use_enable pcap nfsynproxy)
-		$(use_enable static-libs static)
-		$(use_enable ipv6)
-	)
-	econf "${myeconfargs[@]}"
-}
-
-src_compile() {
-	# Deal with parallel build errors.
-	use nftables && emake -C iptables xtables-config-parser.h
-	emake V=1
-}
-
-src_install() {
-	default
-	dodoc INCOMPATIBILITIES iptables/iptables.xslt
-
-	# all the iptables binaries are in /sbin, so might as well
-	# put these small files in with them
-	into /
-	dosbin iptables/iptables-apply
-	dosym iptables-apply /sbin/ip6tables-apply
-	doman iptables/iptables-apply.8
-
-	insinto /usr/include
-	doins include/iptables.h $(use ipv6 && echo include/ip6tables.h)
-	insinto /usr/include/iptables
-	doins include/iptables/internal.h
-
-	keepdir /var/lib/iptables
-	newinitd "${FILESDIR}"/${PN}.init iptables
-	newconfd "${FILESDIR}"/${PN}-1.4.13.confd iptables
-	if use ipv6 ; then
-		keepdir /var/lib/ip6tables
-		newinitd "${FILESDIR}"/iptables.init ip6tables
-		newconfd "${FILESDIR}"/ip6tables-1.4.13.confd ip6tables
-	fi
-
-	if use nftables; then
-		# Bug 647458
-		rm "${ED%/}"/etc/ethertypes || die
-	fi
-
-	systemd_dounit "${FILESDIR}"/systemd/iptables-{re,}store.service
-	if use ipv6 ; then
-		systemd_dounit "${FILESDIR}"/systemd/ip6tables-{re,}store.service
-	fi
-
-	# Move important libs to /lib #332175
-	gen_usr_ldscript -a ip{4,6}tc iptc xtables
-
-	prune_libtool_files
-}
diff --git a/project-lakitu/net-firewall/iptables/metadata.xml b/project-lakitu/net-firewall/iptables/metadata.xml
deleted file mode 100644
index 0b5f57f..0000000
--- a/project-lakitu/net-firewall/iptables/metadata.xml
+++ /dev/null
@@ -1,29 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
-<pkgmetadata>
-	<maintainer type="project">
-		<email>base-system@gentoo.org</email>
-		<name>Gentoo Base System</name>
-	</maintainer>
-	<use>
-		<flag name="conntrack">Build against <pkg>net-libs/libnetfilter_conntrack</pkg> when enables the connlabel matcher</flag>
-		<flag name="netlink">Build against libnfnetlink which enables the nfnl_osf util</flag>
-		<flag name="nftables">Support nftables kernel interface</flag>
-		<flag name="pcap">Build against <pkg>net-libs/libpcap</pkg> which enables the nfbpf_compile util</flag>
-	</use>
-	<longdescription>
-		iptables is the userspace command line program used to set up, maintain, and
-		inspect the tables of IPv4 packet filter rules in the Linux kernel. It's a
-		part of packet filtering framework which allows the stateless and stateful
-		packet filtering, all kinds of network address and port translation, and is a
-		flexible and extensible infrastructure with multiple layers of API's for 3rd
-		party extensions. The iptables package also includes ip6tables. ip6tables is
-		used for configuring the IPv6 packet filter.
-
-		Note that some extensions (e.g. imq and l7filter) are not included into
-		official kernel sources so you have to patch the sources before installation.
-	</longdescription>
-	<upstream>
-		<remote-id type="cpe">cpe:/a:netfilter_core_team:iptables</remote-id>
-	</upstream>
-</pkgmetadata>