<<< metadata_duplicate_useflag_description >>> net-firewall/nftables|doc|base-system@gentoo.org:prometheanfire@gentoo.org <<< packages_pkgcheck_scan >>> ExcessiveLineLength: version 1.0.9: excessive line length (over 120 characters) on line: 180 <<< open bugs >>> https://bugs.gentoo.org/704186 net-firewall/nftables-0.9.0-r5_reads_from_stdin_on_system_boot https://bugs.gentoo.org/705122 app-text/asciidoc-8.6.10_p20181016_when_compiling_net-firewall/nftables-0.9.3-r1::gentoo_--_UnicodeDecodeError:_'ascii'_codec_can't_decode_byte_0xc2_in_position_5796:_ordinal_not_in_range(128) https://bugs.gentoo.org/927744 net-firewall/nftables:_support_loading_config_file_from_/etc https://bugs.gentoo.org/789306 net-firewall/nftables:_hardcoded_"flush_ruleset"_prevents_custom_flush_rules https://bugs.gentoo.org/940866 net-firewall/nftables-1.1.0-r1:_stablereq