X-Git-Url: http://git.pld-linux.org/?a=blobdiff_plain;f=DenyHosts.spec;h=a2064967e0a04ba915561859a0abfaa4de84b5b0;hb=e856bf5152d155ade036cdb431f7148eb4cb7228;hp=429b9a1df73122ce8a69fdac5532f90155004326;hpb=4cfdae93163345968c735b90a05f65b754d2999d;p=packages%2FDenyHosts.git diff --git a/DenyHosts.spec b/DenyHosts.spec index 429b9a1..a206496 100644 --- a/DenyHosts.spec +++ b/DenyHosts.spec @@ -1,21 +1,25 @@ Summary: Script to help thwart SSH server attacks -Summary(pl): Skrypt do blokowania ataków na serwery SSH +Summary(pl.UTF-8): Skrypt do blokowania ataków na serwery SSH Name: DenyHosts -Version: 2.2 -Release: 1 +Version: 2.6 +Release: 6 License: GPL v2 Group: Applications/System -Source0: http://dl.sourceforge.net/denyhosts/%{name}-%{version}.tar.gz -# Source0-md5: feba0e9a48dbf1fa9cbd2b5b8907f349 +Source0: http://downloads.sourceforge.net/denyhosts/%{name}-%{version}.tar.gz +# Source0-md5: fc2365305a9402886a2b0173d1beb7df Source1: %{name}.cron Source2: %{name}.cfg Source3: %{name}.init +Patch0: silentpurge.patch URL: http://www.denyhosts.net/ -BuildRequires: python-devel +BuildRequires: python-devel >= 1:2.5 BuildRequires: python-modules BuildRequires: rpm-pythonprov BuildRequires: rpmbuild(macros) >= 1.268 +Requires(post,preun): /sbin/chkconfig Requires: python +Requires: python-modules +Requires: rc-scripts BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n) %description @@ -29,34 +33,37 @@ of them were successful (but then again, how would you know?). Wouldn't it be better to automatically prevent that attacker from continuing to gain entry into your system? -%description -l pl -DenyHosts jest skryptem dla administratorów systemów Linux, którego -zadaniem jest odparcie ataków na serwery SSH. +%description -l pl.UTF-8 +DenyHosts jest skryptem dla administratorów systemów Linux, którego +zadaniem jest odparcie ataków na serwery SSH. -W logach SSH mo¿na znale¼æ wiele informacji o próbach uzyskania -dostêpu do serwera poprzez us³ugê SSH. Dobrze jest zapobiec kolejnym -próbom w³amania przez odciêcie w³amywaczom dostêpu do serwera. +W logach SSH można znaleźć wiele informacji o próbach uzyskania +dostępu do serwera poprzez usługę SSH. Dobrze jest zapobiec kolejnym +próbom włamania przez odcięcie włamywaczom dostępu do serwera. %prep %setup -q +%patch0 -p1 + +grep -r '/usr/bin/env python' -l . | xargs %{__sed} -i -e 's,/usr/bin/env python,%{__python},' %build echo 'VERSION="%{version}"' > version.py -python setup.py build +%{__python} setup.py build %install rm -rf $RPM_BUILD_ROOT install -d $RPM_BUILD_ROOT{%{_sysconfdir},/etc/cron.d,/etc/rc.d/init.d,%{_sbindir},/var/lib/%{name}} - -python setup.py install \ +%{__python} setup.py install \ --root=$RPM_BUILD_ROOT \ --optimize=2 -install %{SOURCE1} $RPM_BUILD_ROOT/etc/cron.d/%{name} -install %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir} -install %{SOURCE3} $RPM_BUILD_ROOT/etc/rc.d/init.d/%{name} +%py_postclean + +cp -a %{SOURCE1} $RPM_BUILD_ROOT/etc/cron.d/%{name} +cp -a %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir} +install -p %{SOURCE3} $RPM_BUILD_ROOT/etc/rc.d/init.d/%{name} mv $RPM_BUILD_ROOT%{_datadir}/denyhosts/daemon-control-dist $RPM_BUILD_ROOT%{_sbindir}/%{name}ctl -rm $RPM_BUILD_ROOT%{py_sitescriptdir}/%{name}/*.py rm -r $RPM_BUILD_ROOT%{_datadir}/denyhosts echo "127.0.0.1" > $RPM_BUILD_ROOT/var/lib/%{name}/allowed-hosts @@ -83,5 +90,6 @@ fi %attr(754,root,root) /etc/rc.d/init.d/%{name} %dir /var/lib/%{name} %config(noreplace) %verify(not md5 mtime size) /var/lib/%{name}/allowed-hosts +%{py_sitescriptdir}/DenyHosts-*.egg-info %dir %{py_sitescriptdir}/%{name} %{py_sitescriptdir}/%{name}/*.py[co]