-#
-Summary: Script to help thwart ssh server attacks.
-Summary(pl): Skrypt do blokowania ataków na serwery SSH.
+Summary: Script to help thwart SSH server attacks
+Summary(pl.UTF-8): Skrypt do blokowania ataków na serwery SSH
Name: DenyHosts
-Version: 0.5.5
-Release: 1
-License: GPL
+Version: 2.6
+Release: 5
+License: GPL v2
Group: Applications/System
-Source0: http://dl.sourceforge.net/DenyHosts/%{name}-%{version}.tar.gz
-# Source0-md5: e5b49f8e949d3afd3bbd9d4611267dae
+Source0: http://downloads.sourceforge.net/denyhosts/%{name}-%{version}.tar.gz
+# Source0-md5: fc2365305a9402886a2b0173d1beb7df
Source1: %{name}.cron
Source2: %{name}.cfg
-Patch0: %{name}-kodos.patch
-URL: http://denyhosts.sourceforge.net/
-BuildRequires: python
+Source3: %{name}.init
+Patch0: silentpurge.patch
+URL: http://www.denyhosts.net/
+BuildRequires: python-devel >= 1:2.5
+BuildRequires: python-modules
+BuildRequires: rpm-pythonprov
+BuildRequires: rpmbuild(macros) >= 1.268
+Requires(post,preun): /sbin/chkconfig
+Requires: python
+Requires: python-modules
+Requires: rc-scripts
BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n)
%description
DenyHosts is a script intended to be run by Linux system
-administrators to help thwart ssh server attacks.
+administrators to help thwart SSH server attacks.
-If you've ever looked at your ssh log (/var/log/secure on Redhat,
+If you've ever looked at your SSH log (/var/log/secure on Redhat,
/var/log/auth.log on Mandrake, etc...) you may be alarmed to see how
many hackers attempted to gain access to your server. Hopefully, none
of them were successful (but then again, how would you know?).
Wouldn't it be better to automatically prevent that attacker from
continuing to gain entry into your system?
-%description -l pl
-DenyHosts jest skryptem dla administratorów systemów Linux, którego
-zadaniem jest odparcie ataków na serwery ssh.
+%description -l pl.UTF-8
+DenyHosts jest skryptem dla administratorów systemów Linux, którego
+zadaniem jest odparcie ataków na serwery SSH.
-W logach ssh mo¿na znale¼æ wiele informacji o próbach uzyskania
-dostêpu do serwera poprzez us³ugê ssh. Dobrze jest zapobiec kolejnym
-próbom w³amiania przez odciêcie w³amywaczom dostêpu do serwera.
+W logach SSH można znaleźć wiele informacji o próbach uzyskania
+dostępu do serwera poprzez usługę SSH. Dobrze jest zapobiec kolejnym
+próbom włamania przez odcięcie włamywaczom dostępu do serwera.
%prep
%setup -q
%patch0 -p1
-%build
+grep -r '/usr/bin/env python' -l . | xargs %{__sed} -i -e 's,/usr/bin/env python,%{__python},'
+%build
echo 'VERSION="%{version}"' > version.py
-python setup.py build
+%{__python} setup.py build
%install
rm -rf $RPM_BUILD_ROOT
-
-install -d $RPM_BUILD_ROOT%{_sysconfdir}/cron.d
-
-python setup.py install \
+install -d $RPM_BUILD_ROOT{%{_sysconfdir},/etc/cron.d,/etc/rc.d/init.d,%{_sbindir},/var/lib/%{name}}
+%{__python} setup.py install \
--root=$RPM_BUILD_ROOT \
--optimize=2
-install %{SOURCE1} $RPM_BUILD_ROOT%{_sysconfdir}/cron.d/%{name}
-install %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}
+%py_postclean
+cp -a %{SOURCE1} $RPM_BUILD_ROOT/etc/cron.d/%{name}
+cp -a %{SOURCE2} $RPM_BUILD_ROOT%{_sysconfdir}
+install -p %{SOURCE3} $RPM_BUILD_ROOT/etc/rc.d/init.d/%{name}
+mv $RPM_BUILD_ROOT%{_datadir}/denyhosts/daemon-control-dist $RPM_BUILD_ROOT%{_sbindir}/%{name}ctl
+rm -r $RPM_BUILD_ROOT%{_datadir}/denyhosts
+echo "127.0.0.1" > $RPM_BUILD_ROOT/var/lib/%{name}/allowed-hosts
%clean
rm -rf $RPM_BUILD_ROOT
+%post
+/sbin/chkconfig --add %{name}
+%service DenyHosts restart
+
+%preun
+if [ "$1" = "0" ]; then
+ %service DenyHosts stop
+ /sbin/chkconfig --del %{name}
+fi
+
%files
%defattr(644,root,root,755)
-%doc README.txt
+%doc README.txt CHANGELOG.txt
%config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/%{name}.cfg
-%config(noreplace) %verify(not md5 mtime size) %{_sysconfdir}/cron.d/%{name}
+%config(noreplace,missingok) %verify(not md5 mtime size) /etc/cron.d/%{name}
%attr(755,root,root) %{_bindir}/*
+%attr(755,root,root) %{_sbindir}/*
+%attr(754,root,root) /etc/rc.d/init.d/%{name}
+%dir /var/lib/%{name}
+%config(noreplace) %verify(not md5 mtime size) /var/lib/%{name}/allowed-hosts
+%{py_sitescriptdir}/DenyHosts-*.egg-info
+%dir %{py_sitescriptdir}/%{name}
+%{py_sitescriptdir}/%{name}/*.py[co]