]> git.pld-linux.org Git - packages/fail2ban.git/blobdiff - fail2ban.spec
up to 0.10.3.1
[packages/fail2ban.git] / fail2ban.spec
index 575dfa683837dc99494dec92061f957c96fcf47b..6d2b367da90cd7f8b63b56163b46be3e6b42a1f5 100644 (file)
@@ -1,16 +1,31 @@
 Summary:       Ban IPs that make too many password failures
+Summary(pl.UTF-8):     Blokowanie IP powodujących zbyt dużo prób logowań z błędnym hasłem
 Name:          fail2ban
-Version:       0.6.0
+Version:       0.10.3.1
 Release:       1
 License:       GPL
 Group:         Daemons
+Source0:       https://github.com/fail2ban/fail2ban/archive/%{version}.tar.gz
+# Source0-md5: d47e854378cf0458ddcdc5786768d226
+Source1:       %{name}.init
+Source2:       %{name}.logrotate
+Source3:       paths-pld.conf
+Source4:       %{name}.sysconfig
+Patch0:                logifiles.patch
+Patch1:                version.patch
 URL:           http://fail2ban.sourceforge.net/
-Source0:       http://dl.sourceforge.net/fail2ban/%{name}-%{version}.tar.bz2
-# Source0-md5: 129c4e76539a22ab60d025fbf137f962
-BuildRoot:     %{tmpdir}/%{name}-%{version}-root-%(id -u -n)
-BuildRequires: dos2unix
+BuildRequires: python-devel
+BuildRequires: python-modules
+BuildRequires: rpm-pythonprov
+BuildRequires: rpmbuild(macros) >= 1.710
+Requires(post,preun):  /sbin/chkconfig
+Requires(post,preun,postun):   systemd-units >= 38
 Requires:      python-log4py
+Requires:      python-modules-sqlite
+Requires:      rc-scripts
+Requires:      systemd-units >= 38
 BuildArch:     noarch
+BuildRoot:     %{tmpdir}/%{name}-%{version}-root-%(id -u -n)
 
 %description
 Fail2Ban scans log files like /var/log/secure and bans IP that makes
@@ -18,26 +33,45 @@ too many password failures. It updates firewall rules to reject the IP
 address. These rules can be defined by the user. Fail2Ban can read
 multiple log files including sshd or Apache web server logs.
 
+%description -l pl.UTF-8
+Fail2Ban skanuje pliki logów takie jak /var/log/secure i blokuje IP
+powodujące zbyt dużo prób logowań z błędnym hasłem. Uaktualnia regułki
+firewalla, aby odrzucić adres IP. Regułki te mogą być definiowane
+przez użytkownika. Fail2Ban potrafi czytać wiele plików logów włącznie
+z sshd czy plikami logów serwera WWW Apache.
+
 %prep
 %setup -q
+%patch0 -p1
+%patch1 -p0
+rm setup.cfg
 
 %build
-rm setup.cfg
-%{__python} setup.py build
+%py_build
 
 %install
 rm -rf $RPM_BUILD_ROOT
-install -d $RPM_BUILD_ROOT/etc/rc.d/init.d/
-PYTHONPATH=$RPM_BUILD_ROOT%{py_sitescriptdir}; export PYTHONPATH
+install -d $RPM_BUILD_ROOT/etc/{rc.d/init.d,logrotate.d,sysconfig} \
+       $RPM_BUILD_ROOT{%{_mandir}/man1,/var/{log,run/fail2ban}} \
+       $RPM_BUILD_ROOT{%{systemdunitdir},%{systemdtmpfilesdir}}
 
-python setup.py install \
-  --optimize=2 \
+%py_install \
+       --install-lib=%{py_sitescriptdir} \
        --root=$RPM_BUILD_ROOT
 
-find $RPM_BUILD_ROOT%{py_sitescriptdir} -name \*.py -exec rm {} \;
-dos2unix config/redhat-initd
-install config/redhat-initd $RPM_BUILD_ROOT/etc/rc.d/init.d/fail2ban
-install config/fail2ban.conf.default $RPM_BUILD_ROOT%{_sysconfdir}/fail2ban.conf
+install -p man/*.1 $RPM_BUILD_ROOT%{_mandir}/man1
+
+install -p %{SOURCE1} $RPM_BUILD_ROOT/etc/rc.d/init.d/fail2ban
+install -p %{SOURCE2} $RPM_BUILD_ROOT/etc/logrotate.d/fail2ban
+install -p %{SOURCE3} $RPM_BUILD_ROOT%{_sysconfdir}/fail2ban/paths-pld.conf
+install -p %{SOURCE4} $RPM_BUILD_ROOT/etc/sysconfig/%{name}
+
+install -p files/fail2ban-tmpfiles.conf $RPM_BUILD_ROOT%{systemdtmpfilesdir}/fail2ban.conf
+install -p build-2/fail2ban.service $RPM_BUILD_ROOT%{systemdunitdir}/fail2ban.service
+
+:> $RPM_BUILD_ROOT/var/log/fail2ban.log
+
+%py_postclean
 
 %clean
 rm -rf $RPM_BUILD_ROOT
@@ -45,17 +79,52 @@ rm -rf $RPM_BUILD_ROOT
 %post
 /sbin/chkconfig --add %{name}
 %service %{name} restart
+%systemd_post fail2ban.service
 
 %preun
 if [ "$1" = "0" ]; then
        %service -q %{name} stop
        /sbin/chkconfig --del %{name}
 fi
+%systemd_preun fail2ban.service
+
+%postun
+%systemd_reload
+
+%triggerpostun -- fail2ban < 0.8.11-3
+%systemd_trigger fail2ban.service
 
 %files
-%doc CHANGELOG README TODO
 %defattr(644,root,root,755)
-%attr(755,root,root) /etc/rc.d/init.d/%{name}
-%attr(755,root,root) %{_bindir}/%{name}
-%config(noreplace) %{_sysconfdir}/%{name}.conf
-%{py_sitescriptdir}/*
+%doc CONTRIBUTING.md ChangeLog DEVELOP FILTERS README.md RELEASE THANKS TODO COPYING FILTERS
+%attr(754,root,root) /etc/rc.d/init.d/fail2ban
+%attr(755,root,root) %{_bindir}/fail2ban-client
+%attr(755,root,root) %{_bindir}/fail2ban-python
+%attr(755,root,root) %{_bindir}/fail2ban-regex
+%attr(755,root,root) %{_bindir}/fail2ban-server
+%attr(755,root,root) %{_bindir}/fail2ban-testcases
+%{systemdunitdir}/fail2ban.service
+%{systemdtmpfilesdir}/fail2ban.conf
+%dir /var/run/fail2ban
+%dir %{_sysconfdir}/fail2ban
+%dir %{_sysconfdir}/fail2ban/action.d
+%attr(755,root,root) %{_sysconfdir}/fail2ban/action.d/badips.py
+%attr(755,root,root) %{_sysconfdir}/fail2ban/action.d/smtp.py
+%dir %{_sysconfdir}/fail2ban/fail2ban.d
+%dir %{_sysconfdir}/fail2ban/filter.d
+%dir %{_sysconfdir}/fail2ban/filter.d/ignorecommands
+%attr(755,root,root) %config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/fail2ban/filter.d/ignorecommands/apache-fakegooglebot
+%dir %{_sysconfdir}/fail2ban/jail.d
+%config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/fail2ban/*.conf
+%config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/fail2ban/*/*.conf
+%attr(640,root,root) %config(noreplace) %verify(not md5 mtime size) /etc/logrotate.d/fail2ban
+%config(noreplace) %verify(not md5 mtime size) /etc/sysconfig/%{name}
+%{py_sitescriptdir}/%{name}
+%{py_sitescriptdir}/%{name}-%{version}-py*.egg-info
+%{_mandir}/man1/fail2ban-client.1*
+%{_mandir}/man1/fail2ban-regex.1*
+%{_mandir}/man1/fail2ban-server.1*
+%{_mandir}/man1/fail2ban-testcases.1*
+%{_mandir}/man1/fail2ban.1*
+%attr(750,root,root) %dir /var/lib/%{name}
+%attr(640,root,logs) %ghost /var/log/fail2ban.log
This page took 0.121613 seconds and 4 git commands to generate.