diff options
| author | Armin Kuster <akuster808@gmail.com> | 2022-05-03 14:31:21 -0700 |
|---|---|---|
| committer | Armin Kuster <akuster808@gmail.com> | 2022-05-14 10:51:32 -0700 |
| commit | a764533c20c9cedf0834138076d38d329982e1af (patch) | |
| tree | 4cedb5cc647faeef6636ad0319b495cf89d8a2ea /dynamic-layers/meta-python/recipes-security/fail2ban/files | |
| parent | 20c13f6335165d693f7f3270c829b3069dbbad66 (diff) | |
| download | meta-security-a764533c20c9cedf0834138076d38d329982e1af.tar.gz | |
meta-security: move perl and python recipes to dynamic layers structure
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'dynamic-layers/meta-python/recipes-security/fail2ban/files')
3 files changed, 129 insertions, 0 deletions
diff --git a/dynamic-layers/meta-python/recipes-security/fail2ban/files/0001-To-fix-build-error-of-xrang.patch b/dynamic-layers/meta-python/recipes-security/fail2ban/files/0001-To-fix-build-error-of-xrang.patch new file mode 100644 index 0000000..7f0812c --- /dev/null +++ b/dynamic-layers/meta-python/recipes-security/fail2ban/files/0001-To-fix-build-error-of-xrang.patch | |||
| @@ -0,0 +1,28 @@ | |||
| 1 | From fe3436d65518099d35c643848cba50253abc249c Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Lei Maohui <leimaohui@cn.fujitsu.com> | ||
| 3 | Date: Thu, 9 May 2019 14:44:51 +0900 | ||
| 4 | Subject: [PATCH] To fix build error of xrange. | ||
| 5 | |||
| 6 | NameError: name 'xrange' is not defined | ||
| 7 | |||
| 8 | Signed-off-by: Lei Maohui <leimaohui@cn.fujitsu.com> | ||
| 9 | --- | ||
| 10 | fail2ban/__init__.py | 2 +- | ||
| 11 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
| 12 | |||
| 13 | diff --git a/fail2ban/__init__.py b/fail2ban/__init__.py | ||
| 14 | index fa6dcf7..61789a4 100644 | ||
| 15 | --- a/fail2ban/__init__.py | ||
| 16 | +++ b/fail2ban/__init__.py | ||
| 17 | @@ -82,7 +82,7 @@ strptime("2012", "%Y") | ||
| 18 | |||
| 19 | # short names for pure numeric log-level ("Level 25" could be truncated by short formats): | ||
| 20 | def _init(): | ||
| 21 | - for i in xrange(50): | ||
| 22 | + for i in range(50): | ||
| 23 | if logging.getLevelName(i).startswith('Level'): | ||
| 24 | logging.addLevelName(i, '#%02d-Lev.' % i) | ||
| 25 | _init() | ||
| 26 | -- | ||
| 27 | 2.7.4 | ||
| 28 | |||
diff --git a/dynamic-layers/meta-python/recipes-security/fail2ban/files/initd b/dynamic-layers/meta-python/recipes-security/fail2ban/files/initd new file mode 100644 index 0000000..586b3da --- /dev/null +++ b/dynamic-layers/meta-python/recipes-security/fail2ban/files/initd | |||
| @@ -0,0 +1,98 @@ | |||
| 1 | #!/bin/sh | ||
| 2 | ### BEGIN INIT INFO | ||
| 3 | # Provides: fail2ban | ||
| 4 | # Required-Start: $local_fs $remote_fs | ||
| 5 | # Required-Stop: $local_fs $remote_fs | ||
| 6 | # Should-Start: $time $network $syslog iptables firehol shorewall ferm | ||
| 7 | # Should-Stop: $network $syslog iptables firehol shorewall ferm | ||
| 8 | # Default-Start: 2 3 4 5 | ||
| 9 | # Default-Stop: 0 1 6 | ||
| 10 | # Short-Description: Start/Stop fail2ban | ||
| 11 | # Description: Start/Stop fail2ban, a daemon to ban hosts that cause multiple authentication errors | ||
| 12 | ### END INIT INFO | ||
| 13 | |||
| 14 | # Source function library. | ||
| 15 | . /etc/init.d/functions | ||
| 16 | |||
| 17 | # Check that the config file exists | ||
| 18 | [ -f /etc/fail2ban/fail2ban.conf ] || exit 0 | ||
| 19 | |||
| 20 | check_privsep_dir() { | ||
| 21 | # Create the PrivSep empty dir if necessary | ||
| 22 | if [ ! -d /var/run/fail2ban ]; then | ||
| 23 | mkdir /var/run/fail2ban | ||
| 24 | chmod 0755 /var/run/fail2ban | ||
| 25 | fi | ||
| 26 | } | ||
| 27 | |||
| 28 | FAIL2BAN="/usr/bin/fail2ban-client" | ||
| 29 | prog=fail2ban-server | ||
| 30 | lockfile=${LOCKFILE-/var/lock/subsys/fail2ban} | ||
| 31 | socket=${SOCKET-/var/run/fail2ban/fail2ban.sock} | ||
| 32 | pidfile=${PIDFILE-/var/run/fail2ban/fail2ban.pid} | ||
| 33 | RETVAL=0 | ||
| 34 | |||
| 35 | start() { | ||
| 36 | echo -n $"Starting fail2ban: " | ||
| 37 | check_privsep_dir | ||
| 38 | ${FAIL2BAN} -x start > /dev/null | ||
| 39 | RETVAL=$? | ||
| 40 | if [ $RETVAL = 0 ]; then | ||
| 41 | touch ${lockfile} | ||
| 42 | success | ||
| 43 | else | ||
| 44 | failure | ||
| 45 | fi | ||
| 46 | echo | ||
| 47 | return $RETVAL | ||
| 48 | } | ||
| 49 | |||
| 50 | stop() { | ||
| 51 | echo -n $"Stopping fail2ban: " | ||
| 52 | ${FAIL2BAN} stop > /dev/null | ||
| 53 | RETVAL=$? | ||
| 54 | if [ $RETVAL = 0 ]; then | ||
| 55 | rm -f ${lockfile} ${pidfile} | ||
| 56 | success | ||
| 57 | else | ||
| 58 | failure | ||
| 59 | fi | ||
| 60 | echo | ||
| 61 | return $RETVAL | ||
| 62 | } | ||
| 63 | |||
| 64 | reload() { | ||
| 65 | echo "Reloading fail2ban: " | ||
| 66 | ${FAIL2BAN} reload | ||
| 67 | RETVAL=$? | ||
| 68 | echo | ||
| 69 | return $RETVAL | ||
| 70 | } | ||
| 71 | |||
| 72 | # See how we were called. | ||
| 73 | case "$1" in | ||
| 74 | start) | ||
| 75 | status -p ${pidfile} ${prog} >/dev/null 2>&1 && exit 0 | ||
| 76 | start | ||
| 77 | ;; | ||
| 78 | stop) | ||
| 79 | stop | ||
| 80 | ;; | ||
| 81 | reload) | ||
| 82 | reload | ||
| 83 | ;; | ||
| 84 | restart) | ||
| 85 | stop | ||
| 86 | start | ||
| 87 | ;; | ||
| 88 | status) | ||
| 89 | status -p ${pidfile} ${prog} | ||
| 90 | RETVAL=$? | ||
| 91 | [ $RETVAL = 0 ] && ${FAIL2BAN} status | ||
| 92 | ;; | ||
| 93 | *) | ||
| 94 | echo $"Usage: fail2ban {start|stop|restart|reload|status}" | ||
| 95 | RETVAL=2 | ||
| 96 | esac | ||
| 97 | |||
| 98 | exit $RETVAL | ||
diff --git a/dynamic-layers/meta-python/recipes-security/fail2ban/files/run-ptest b/dynamic-layers/meta-python/recipes-security/fail2ban/files/run-ptest new file mode 100644 index 0000000..64d07d5 --- /dev/null +++ b/dynamic-layers/meta-python/recipes-security/fail2ban/files/run-ptest | |||
| @@ -0,0 +1,3 @@ | |||
| 1 | #!/bin/sh | ||
| 2 | |||
| 3 | ##PYTHON## bin/fail2ban-testcases | ||
