+diff -ur shorewall-5.2.8.orig/shorewall/configure shorewall-5.2.8/shorewall/configure
+--- shorewall-5.2.8.orig/shorewall/configure 2020-09-25 00:02:15.000000000 +0200
++++ shorewall-5.2.8/shorewall/configure 2024-05-25 17:49:28.409051456 +0200
+@@ -134,7 +134,7 @@
+ *)
+ if [ -f /etc/debian_version ]; then
+ params[HOST]=debian
+- ls -l /sbin/init | fgrep -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
++ ls -l /sbin/init | grep -F -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
+ elif [ -f /etc/altlinux-release ] ; then
+ params[HOST]=alt
+ elif [ -f /etc/redhat-release ]; then
+@@ -163,7 +163,7 @@
+ if [ $vendor = linux ]; then
+ rcfile=shorewallrc.default;
+ elif [ $vendor = debian -a -f /etc/debian_version ]; then
+- ls -l /sbin/init | fgrep -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
++ ls -l /sbin/init | grep -F -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
+ else
+ rcfile=shorewallrc.$vendor
+ fi
+diff -ur shorewall-5.2.8.orig/shorewall/lib.cli-std shorewall-5.2.8/shorewall/lib.cli-std
+--- shorewall-5.2.8.orig/shorewall/lib.cli-std 2024-05-25 14:52:30.564705737 +0200
++++ shorewall-5.2.8/shorewall/lib.cli-std 2024-05-25 17:50:39.342091463 +0200
+@@ -1157,7 +1157,7 @@
+ ;;
+ t)
+ [ $# -eq 1 ] && fatal_error "The -t option requires a timeout value"
+- echo $2 | egrep -q '[[:digit:]]+[smh]' || fatal_error "The timeout value must be numeric, optionally followed by a suffix (s, m or h)"
++ echo $2 | grep -E -q '[[:digit:]]+[smh]' || fatal_error "The timeout value must be numeric, optionally followed by a suffix (s, m or h)"
+ timeout=$2
+ option=
+ shift;
+@@ -1331,7 +1331,7 @@
+ ;;
+ 2)
+ handle_directory $1
+- echo $2 | egrep -q '[[:digit:]]+[smh]' || fatal_error "The timeout value must be numeric, optionally followed by a suffix (s, m or h)"
++ echo $2 | grep -E -q '[[:digit:]]+[smh]' || fatal_error "The timeout value must be numeric, optionally followed by a suffix (s, m or h)"
+ timeout=$2
+ ;;
+ *)
+diff -ur shorewall-5.2.8.orig/shorewall/Perl/lib.runtime shorewall-5.2.8/shorewall/Perl/lib.runtime
+--- shorewall-5.2.8.orig/shorewall/Perl/lib.runtime 2024-05-25 14:52:30.564705737 +0200
++++ shorewall-5.2.8/shorewall/Perl/lib.runtime 2024-05-25 17:50:43.246148702 +0200
+@@ -116,14 +116,14 @@
+ # Generate a list of all network interfaces on the system
+ #
+ find_all_interfaces() {
+- ${IP:-ip} link list | egrep '^[[:digit:]]+:' | cut -d ' ' -f2 | sed -r 's/(@.*)?:$//'
++ ${IP:-ip} link list | grep -E '^[[:digit:]]+:' | cut -d ' ' -f2 | sed -r 's/(@.*)?:$//'
+ }
+
+ #
+ # Generate a list of all network interfaces on the system that have an ipvX address
+ #
+ find_all_interfaces1() {
+- ${IP:-ip} -$g_family addr list | egrep '^[[:digit:]]+:' | cut -d ' ' -f2 | sed -r 's/(@.*)?:$//'
++ ${IP:-ip} -$g_family addr list | grep -E '^[[:digit:]]+:' | cut -d ' ' -f2 | sed -r 's/(@.*)?:$//'
+ }
+
+ #
+@@ -679,7 +679,7 @@
+ status=0
+
+ if ! loopback_interface $1; then
+- if interface_is_up $1 && [ "$(find_first_interface_address_if_any $1)" != 0.0.0.0 ] && [ -z "$($IP -$g_family link list dev $1 2> /dev/null | fgrep 'state DOWN')" ]; then
++ if interface_is_up $1 && [ "$(find_first_interface_address_if_any $1)" != 0.0.0.0 ] && [ -z "$($IP -$g_family link list dev $1 2> /dev/null | grep -F 'state DOWN')" ]; then
+ if [ "$COMMAND" != enable ]; then
+ [ ! -f ${VARDIR}/${1}_disabled ] && run_isusable_exit $1
+ status=$?
+@@ -1016,7 +1016,7 @@
+ gateway="nexthop $gateway dead"
+ fi
+
+- if eval echo $route \| fgrep -q \'$gateway\'; then
++ if eval echo $route \| grep -F -q \'$gateway\'; then
+ eval route=\`echo $route \| sed \'s/$gateway/ /\'\`
+ run_ip route replace table $2 $route
+ fi
+diff -ur shorewall-5.2.8.orig/shorewall/Perl/prog.footer shorewall-5.2.8/shorewall/Perl/prog.footer
+--- shorewall-5.2.8.orig/shorewall/Perl/prog.footer 2020-09-24 23:46:24.000000000 +0200
++++ shorewall-5.2.8/shorewall/Perl/prog.footer 2024-05-25 17:49:42.813262647 +0200
+@@ -483,7 +483,7 @@
+ #
+ # See what it is
+ #
+- if type $1 2> /dev/null | fgrep -q 'is a function'; then
++ if type $1 2> /dev/null | grep -F -q 'is a function'; then
+ #
+ # It's a shell function -- call it
+ #
+diff -ur shorewall-5.2.8.orig/shorewall/Perl/Shorewall/Chains.pm shorewall-5.2.8/shorewall/Perl/Shorewall/Chains.pm
+--- shorewall-5.2.8.orig/shorewall/Perl/Shorewall/Chains.pm 2020-09-25 00:02:15.000000000 +0200
++++ shorewall-5.2.8/shorewall/Perl/Shorewall/Chains.pm 2024-05-25 17:50:54.430312682 +0200
+@@ -8762,8 +8762,8 @@
+
+ emit( qq(if [ -n "\$g_docker" ]; then),
+ qq( $tool -t nat -S DOCKER | tail -n +2 > \${VARDIR}/.nat_DOCKER),
+- qq( $tool -t nat -S OUTPUT | tail -n +2 | fgrep DOCKER > \${VARDIR}/.nat_OUTPUT),
+- qq( $tool -t nat -S POSTROUTING | tail -n +2 | fgrep -v SHOREWALL | fgrep -v LIBVIRT > \${VARDIR}/.nat_POSTROUTING),
++ qq( $tool -t nat -S OUTPUT | tail -n +2 | grep -F DOCKER > \${VARDIR}/.nat_OUTPUT),
++ qq( $tool -t nat -S POSTROUTING | tail -n +2 | grep -F -v SHOREWALL | grep -F -v LIBVIRT > \${VARDIR}/.nat_POSTROUTING),
+ qq( $tool -t filter -S DOCKER | tail -n +2 > \${VARDIR}/.filter_DOCKER),
+ qq( rm -f \${VARDIR}/.filter_DOCKER-*),
+ qq( [ -n "\$g_dockeringress" ] && $tool -t filter -S DOCKER-INGRESS | tail -n +2 > \${VARDIR}/.filter_DOCKER-INGRESS),
+@@ -8780,7 +8780,7 @@
+ if ( known_interface( $bridge ) ) {
+ emit( qq( $tool -t filter -S FORWARD | grep '^-A FORWARD.*[io] br-[a-z0-9]\\{12\\}' > \${VARDIR}/.filter_FORWARD) );
+ } else {
+- emit( qq( $tool -t filter -S FORWARD | egrep '^-A FORWARD.*[io] ($bridge|br-[a-z0-9]{12})' > \${VARDIR}/.filter_FORWARD) );
++ emit( qq( $tool -t filter -S FORWARD | grep -E '^-A FORWARD.*[io] ($bridge|br-[a-z0-9]{12})' > \${VARDIR}/.filter_FORWARD) );
+ }
+
+ emit( q( [ -s ${VARDIR}/.filter_FORWARD ] || rm -f ${VARDIR}/.filter_FORWARD),
+@@ -8825,7 +8825,7 @@
+ fi
+
+ if chain_exists dynamic; then
+- $tool -S dynamic | tail -n +2 | fgrep -v -- '-j ACCEPT' > \${VARDIR}/.dynamic
++ $tool -S dynamic | tail -n +2 | grep -F -v -- '-j ACCEPT' > \${VARDIR}/.dynamic
+ else
+ rm -f \${VARDIR}/.dynamic
+ fi
+diff -ur shorewall-5.2.8.orig/shorewall/Perl/Shorewall/Config.pm shorewall-5.2.8/shorewall/Perl/Shorewall/Config.pm
+--- shorewall-5.2.8.orig/shorewall/Perl/Shorewall/Config.pm 2024-05-25 14:52:30.560705678 +0200
++++ shorewall-5.2.8/shorewall/Perl/Shorewall/Config.pm 2024-05-25 17:50:46.862201722 +0200
+@@ -5059,7 +5059,7 @@
+ }
+
+ sub Basic_Ematch() {
+- $tc && have_capability( 'BASIC_FILTER' ) && system( "$tc filter add basic help 2>&1 | egrep -q match" ) == 0;
++ $tc && have_capability( 'BASIC_FILTER' ) && system( "$tc filter add basic help 2>&1 | grep -E -q match" ) == 0;
+ }
+
+ sub Fwmark_Rt_Mask() {
+diff -ur shorewall-5.2.8.orig/shorewall/Perl/Shorewall/Misc.pm shorewall-5.2.8/shorewall/Perl/Shorewall/Misc.pm
+--- shorewall-5.2.8.orig/shorewall/Perl/Shorewall/Misc.pm 2020-09-25 00:02:15.000000000 +0200
++++ shorewall-5.2.8/shorewall/Perl/Shorewall/Misc.pm 2024-05-25 17:50:08.705642277 +0200
+@@ -2559,7 +2559,7 @@
+ case $COMMAND in
+ stop|clear|restore)
+ if chain_exists dynamic; then
+- ${IPTABLES}-save -t filter | grep '^-A dynamic' | fgrep -v -- '-j ACCEPT' > ${VARDIR}/.dynamic
++ ${IPTABLES}-save -t filter | grep '^-A dynamic' | grep -F -v -- '-j ACCEPT' > ${VARDIR}/.dynamic
+ fi
+ ;;
+ *)
+@@ -2574,7 +2574,7 @@
+ case $COMMAND in
+ stop|clear|restore)
+ if chain_exists dynamic; then
+- ${IP6TABLES}-save -t filter | grep '^-A dynamic' | fgrep -v -- '-j ACCEPT' > ${VARDIR}/.dynamic
++ ${IP6TABLES}-save -t filter | grep '^-A dynamic' | grep -F -v -- '-j ACCEPT' > ${VARDIR}/.dynamic
+ fi
+ ;;
+ *)
+diff -ur shorewall-5.2.8.orig/shorewall/Perl/Shorewall/Proc.pm shorewall-5.2.8/shorewall/Perl/Shorewall/Proc.pm
+--- shorewall-5.2.8.orig/shorewall/Perl/Shorewall/Proc.pm 2020-09-25 00:02:15.000000000 +0200
++++ shorewall-5.2.8/shorewall/Perl/Shorewall/Proc.pm 2024-05-25 17:49:51.965396834 +0200
+@@ -364,7 +364,7 @@
+
+ emit( " setting=$setting",
+ '',
+- " fgrep -q $setting /proc/net/netfilter/nf_log || setting=$alternative",
++ " grep -F -q $setting /proc/net/netfilter/nf_log || setting=$alternative",
+ '',
+ " if echo \$setting > $file; then",
+ ' progress_message "Log Backend set to $setting"',
+diff -ur shorewall-5.2.8.orig/shorewall/Perl/Shorewall/Providers.pm shorewall-5.2.8/shorewall/Perl/Shorewall/Providers.pm
+--- shorewall-5.2.8.orig/shorewall/Perl/Shorewall/Providers.pm 2020-09-25 00:02:15.000000000 +0200
++++ shorewall-5.2.8/shorewall/Perl/Shorewall/Providers.pm 2024-05-25 17:50:51.250266058 +0200
+@@ -1061,7 +1061,7 @@
+ }
+
+ emit( qq(\n) ,
+- qq(if ! \$IP -6 rule ls | egrep -q "32767:[[:space:]]+from all lookup (default|253)"; then) ,
++ qq(if ! \$IP -6 rule ls | grep -E -q "32767:[[:space:]]+from all lookup (default|253)"; then) ,
+ qq( qt \$IP -6 rule add from all table $providers{default}->{id} prio 32767\n) ,
+ qq(fi) ) if $family == F_IPV6;
+
+@@ -1078,7 +1078,7 @@
+ } elsif ( ! $noautosrc ) {
+ if ( $shared ) {
+ if ( $persistent ) {
+- emit( qq(if ! egrep -q "^20000:[[:space:]]+from $address lookup $id"; then),
++ emit( qq(if ! grep -E -q "^20000:[[:space:]]+from $address lookup $id"; then),
+ qq( qt \$IP -$family rule del from $address pref 20000),
+ qq( run_ip rule add from $address pref 20000 table $id),
+ qq( echo "\$IP -$family rule del from $address pref 20000> /dev/null 2>&1" >> \${VARDIR}/undo_${table}_routing ),
+diff -ur shorewall-5.2.8.orig/shorewall6/configure shorewall-5.2.8/shorewall6/configure
+--- shorewall-5.2.8.orig/shorewall6/configure 2020-09-25 00:02:16.000000000 +0200
++++ shorewall-5.2.8/shorewall6/configure 2024-05-25 17:48:41.736367147 +0200
+@@ -134,7 +134,7 @@
+ *)
+ if [ -f /etc/debian_version ]; then
+ params[HOST]=debian
+- ls -l /sbin/init | fgrep -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
++ ls -l /sbin/init | grep -F -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
+ elif [ -f /etc/altlinux-release ] ; then
+ params[HOST]=alt
+ elif [ -f /etc/redhat-release ]; then
+@@ -163,7 +163,7 @@
+ if [ $vendor = linux ]; then
+ rcfile=shorewallrc.default;
+ elif [ $vendor = debian -a -f /etc/debian_version ]; then
+- ls -l /sbin/init | fgrep -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
++ ls -l /sbin/init | grep -F -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
+ else
+ rcfile=shorewallrc.$vendor
+ fi
+diff -ur shorewall-5.2.8.orig/shorewall6-lite/configure shorewall-5.2.8/shorewall6-lite/configure
+--- shorewall-5.2.8.orig/shorewall6-lite/configure 2020-09-25 00:02:16.000000000 +0200
++++ shorewall-5.2.8/shorewall6-lite/configure 2024-05-25 17:49:23.932985828 +0200
+@@ -134,7 +134,7 @@
+ *)
+ if [ -f /etc/debian_version ]; then
+ params[HOST]=debian
+- ls -l /sbin/init | fgrep -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
++ ls -l /sbin/init | grep -F -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
+ elif [ -f /etc/altlinux-release ] ; then
+ params[HOST]=alt
+ elif [ -f /etc/redhat-release ]; then
+@@ -163,7 +163,7 @@
+ if [ $vendor = linux ]; then
+ rcfile=shorewallrc.default;
+ elif [ $vendor = debian -a -f /etc/debian_version ]; then
+- ls -l /sbin/init | fgrep -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
++ ls -l /sbin/init | grep -F -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
+ else
+ rcfile=shorewallrc.$vendor
+ fi
+diff -ur shorewall-5.2.8.orig/shorewall-core/configure shorewall-5.2.8/shorewall-core/configure
+--- shorewall-5.2.8.orig/shorewall-core/configure 2020-09-25 00:02:15.000000000 +0200
++++ shorewall-5.2.8/shorewall-core/configure 2024-05-25 17:49:13.276829586 +0200
+@@ -134,7 +134,7 @@
+ *)
+ if [ -f /etc/debian_version ]; then
+ params[HOST]=debian
+- ls -l /sbin/init | fgrep -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
++ ls -l /sbin/init | grep -F -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
+ elif [ -f /etc/altlinux-release ] ; then
+ params[HOST]=alt
+ elif [ -f /etc/redhat-release ]; then
+@@ -163,7 +163,7 @@
+ if [ $vendor = linux ]; then
+ rcfile=shorewallrc.default;
+ elif [ $vendor = debian -a -f /etc/debian_version ]; then
+- ls -l /sbin/init | fgrep -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
++ ls -l /sbin/init | grep -F -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
+ else
+ rcfile=shorewallrc.$vendor
+ fi
+diff -ur shorewall-5.2.8.orig/shorewall-core/lib.cli shorewall-5.2.8/shorewall-core/lib.cli
+--- shorewall-5.2.8.orig/shorewall-core/lib.cli 2024-05-25 14:52:30.564705737 +0200
++++ shorewall-5.2.8/shorewall-core/lib.cli 2024-05-25 17:50:34.890026189 +0200
+@@ -252,7 +252,7 @@
+
+ qt tc -s filter ls root dev $1 && tc -s filter ls root dev $device | grep -v '^$'
+ tc filter show dev $1
+- tc class show dev $1 | fgrep 'leaf ' | fgrep -v ' hfsc' | sed 's/^.*leaf //;s/ .*//' | while read class; do
++ tc class show dev $1 | grep -F 'leaf ' | grep -F -v ' hfsc' | sed 's/^.*leaf //;s/ .*//' | while read class; do
+ if [ -n "$class" ]; then
+ echo
+ echo Node $class
+@@ -426,7 +426,7 @@
+ savesets() {
+ local supported
+
+- supported=$(run_it $g_firewall help | fgrep savesets )
++ supported=$(run_it $g_firewall help | grep -F savesets )
+
+ [ -n "$supported" ] && run_it $g_firewall savesets ${g_restorepath}-ipsets
+ }
+@@ -437,7 +437,7 @@
+ savesets1() {
+ local supported
+
+- supported=$(run_it $g_firewall help | fgrep savesets )
++ supported=$(run_it $g_firewall help | grep -F savesets )
+
+ [ -n "$supported" ] && run_it $g_firewall savesets ${VARDIR}/ipsets.save && progress_message3 "The ipsets have been saved to ${VARDIR}/ipsets.save"
+ }
+@@ -696,7 +696,7 @@
+ local junk
+ local setname
+
+- $IPSETN -L | egrep "^Name: ${1}(_.+)?$" | while read junk setname; do echo $setname; done
++ $IPSETN -L | grep -E "^Name: ${1}(_.+)?$" | while read junk setname; do echo $setname; done
+ }
+
+ list_zone() {
+@@ -707,9 +707,9 @@
+ determine_ipset_version
+
+ if [ $g_family -eq 4 ]; then
+- sets=$($IPSETN -L | egrep "^$1(_.+)?");
++ sets=$($IPSETN -L | grep -E "^$1(_.+)?");
+ else
+- sets=$($IPSETN -L | egrep "^6_$1(_.+)?")
++ sets=$($IPSETN -L | grep -E "^6_$1(_.+)?")
+ fi
+
+ [ -n "$sets" ] || sets=$(find_sets $1)
+@@ -1207,7 +1207,7 @@
+ $IP -s -$g_family xfrm policy | spd_filter
+
+ heading "PFKEY SAD"
+- $IP -s -$g_family xfrm state | egrep -v '[[:space:]]+(auth-trunc|enc )' # Don't divulge the keys
++ $IP -s -$g_family xfrm state | grep -E -v '[[:space:]]+(auth-trunc|enc )' # Don't divulge the keys
+ }
+
+ show_ipsec_command() {
+@@ -1533,7 +1533,7 @@
+ if chain_exists dynamic; then
+ g_ipt_options="$g_ipt_options --line-numbers"
+ $g_tool -t filter -L dynamic $g_ipt_options | head -n2
+- $g_tool -t filter -L dynamic $g_ipt_options | fgrep ACCEPT | $output_filter
++ $g_tool -t filter -L dynamic $g_ipt_options | grep -F ACCEPT | $output_filter
+ fi
+ ;;
+ ipsec)
+@@ -1625,7 +1625,7 @@
+
+ if [ -n "$hnames" ]; then
+ for hname in $hnames; do
+- iptaccount -l $hname | egrep '^IP:|^Show'
++ iptaccount -l $hname | grep -E '^IP:|^Show'
+ echo
+ done
+ else
+@@ -3253,7 +3253,7 @@
+
+ if $TC filter add basic help 2>&1 | grep -q ^Usage; then
+ BASIC_FILTER=Yes
+- $TC filter add basic help 2>&1 | egrep -q match && BASIC_EMATCH=Yes
++ $TC filter add basic help 2>&1 | grep -E -q match && BASIC_EMATCH=Yes
+ fi
+
+ if $TC action add connmark help 2>&1 | grep -q ^Usage; then
+@@ -3674,7 +3674,7 @@
+ if [ $COMMAND = 'blacklist!' ]; then
+ timeout='timeout 0'
+ else
+- echo "$@" | fgrep -q ' timeout ' || timeout="timeout $g_dbltimeout"
++ echo "$@" | grep -F -q ' timeout ' || timeout="timeout $g_dbltimeout"
+ fi
+
+ if $IPSET -A $g_blacklistipset $@ $timeout -exist; then
+@@ -4932,12 +4932,12 @@
+ #
+ # First look for it here
+ #
+- if type $1 2> /dev/null | fgrep -q 'is a function'; then
++ if type $1 2> /dev/null | grep -F -q 'is a function'; then
+ #
+ # It's a shell function -- call it
+ #
+ $@
+- elif type $1 2> /dev/null | fgrep -q 'is a shell function'; then
++ elif type $1 2> /dev/null | grep -F -q 'is a shell function'; then
+ #
+ # It's a shell function -- call it
+ #
+diff -ur shorewall-5.2.8.orig/shorewall-core/lib.common shorewall-5.2.8/shorewall-core/lib.common
+--- shorewall-5.2.8.orig/shorewall-core/lib.common 2024-05-25 14:52:30.564705737 +0200
++++ shorewall-5.2.8/shorewall-core/lib.common 2024-05-25 17:49:09.004766950 +0200
+@@ -639,7 +639,7 @@
+ #Determines if the passed interface is a loopback interface
+ #
+ loopback_interface() { #$1 = Interface name
+- [ "$1" = lo ] || $IP link show $1 | fgrep -q LOOPBACK
++ [ "$1" = lo ] || $IP link show $1 | grep -F -q LOOPBACK
+ }
+
+ #
+@@ -648,7 +648,7 @@
+ find_loopback_interfaces() {
+ local interfaces
+
+- [ -x "$IP" ] && interfaces=$($IP link show | fgrep LOOPBACK | sed 's/://g' | cut -d ' ' -f 2)
++ [ -x "$IP" ] && interfaces=$($IP link show | grep -F LOOPBACK | sed 's/://g' | cut -d ' ' -f 2)
+
+ [ -n "$interfaces" ] && echo $interfaces || echo lo
+ }
+diff -ur shorewall-5.2.8.orig/shorewall-init/configure shorewall-5.2.8/shorewall-init/configure
+--- shorewall-5.2.8.orig/shorewall-init/configure 2020-09-25 00:02:16.000000000 +0200
++++ shorewall-5.2.8/shorewall-init/configure 2024-05-25 17:48:10.515909400 +0200
+@@ -134,7 +134,7 @@
+ *)
+ if [ -f /etc/debian_version ]; then
+ params[HOST]=debian
+- ls -l /sbin/init | fgrep -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
++ ls -l /sbin/init | grep -F -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
+ elif [ -f /etc/altlinux-release ] ; then
+ params[HOST]=alt
+ elif [ -f /etc/redhat-release ]; then
+@@ -163,7 +163,7 @@
+ if [ $vendor = linux ]; then
+ rcfile=shorewallrc.default;
+ elif [ $vendor = debian -a -f /etc/debian_version ]; then
+- ls -l /sbin/init | fgrep -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
++ ls -l /sbin/init | grep -F -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
+ else
+ rcfile=shorewallrc.$vendor
+ fi
+diff -ur shorewall-5.2.8.orig/shorewall-lite/configure shorewall-5.2.8/shorewall-lite/configure
+--- shorewall-5.2.8.orig/shorewall-lite/configure 2020-09-25 00:02:16.000000000 +0200
++++ shorewall-5.2.8/shorewall-lite/configure 2024-05-25 17:49:17.420890348 +0200
+@@ -134,7 +134,7 @@
+ *)
+ if [ -f /etc/debian_version ]; then
+ params[HOST]=debian
+- ls -l /sbin/init | fgrep -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
++ ls -l /sbin/init | grep -F -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
+ elif [ -f /etc/altlinux-release ] ; then
+ params[HOST]=alt
+ elif [ -f /etc/redhat-release ]; then
+@@ -163,7 +163,7 @@
+ if [ $vendor = linux ]; then
+ rcfile=shorewallrc.default;
+ elif [ $vendor = debian -a -f /etc/debian_version ]; then
+- ls -l /sbin/init | fgrep -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
++ ls -l /sbin/init | grep -F -q systemd && rcfile=shorewallrc.debian.systemd || rcfile=shorewallrc.debian.sysvinit
+ else
+ rcfile=shorewallrc.$vendor
+ fi