Add patch from upstream to fix module imports (Bug #892365)

Add patch from upstream to UTF-8 characters in syslog (Bug #905097)
i9ce
Orion Poplawski 12 years ago
parent fc604fe404
commit 83ab8cd69d

@ -0,0 +1,75 @@
commit d561a4c2bbc336db70d5923cf630813bc51dc3ee
Author: Yaroslav Halchenko <debian@onerussian.com>
Date: Mon Jan 28 09:54:08 2013 -0500
BF: do not rely on scripts being under /usr -- might differ eg on Fedora -- rely on import of common.version (Closes gh-112)
This is also not ideal, since if there happens to be some systemwide common.version -- we are doomed
but otherwise, we cannot keep extending comparison check to /bin, /sbin whatelse
diff --git a/fail2ban-client b/fail2ban-client
index 1d8eb15..13d018e 100755
--- a/fail2ban-client
+++ b/fail2ban-client
@@ -27,12 +27,13 @@ import getopt, time, shlex, socket
# Inserts our own modules path first in the list
# fix for bug #343821
-if os.path.abspath(__file__).startswith('/usr/'):
- # makes sense to use system-wide library iff -client is also under /usr/
+try:
+ from common.version import version
+except ImportError, e:
sys.path.insert(1, "/usr/share/fail2ban")
+ from common.version import version
-# Now we can import our modules
-from common.version import version
+# Now we can import the rest of modules
from common.protocol import printFormatted
from client.csocket import CSocket
from client.configurator import Configurator
diff --git a/fail2ban-regex b/fail2ban-regex
index a42ed96..f9bc72c 100755
--- a/fail2ban-regex
+++ b/fail2ban-regex
@@ -26,13 +26,14 @@ import getopt, sys, time, logging, os
# Inserts our own modules path first in the list
# fix for bug #343821
-if os.path.abspath(__file__).startswith('/usr/'):
- # makes sense to use system-wide library iff -regex is also under /usr/
- sys.path.insert(1, "/usr/share/fail2ban")
+try:
+ from common.version import version
+except ImportError, e:
+ sys.path.insert(1, "/usr/share/fail2ban")
+ from common.version import version
from client.configparserinc import SafeConfigParserWithIncludes
from ConfigParser import NoOptionError, NoSectionError, MissingSectionHeaderError
-from common.version import version
from server.filter import Filter
from server.failregex import RegexException
diff --git a/fail2ban-server b/fail2ban-server
index bd86e6c..0f3410c 100755
--- a/fail2ban-server
+++ b/fail2ban-server
@@ -26,11 +26,12 @@ import getopt, sys, logging, os
# Inserts our own modules path first in the list
# fix for bug #343821
-if os.path.abspath(__file__).startswith('/usr/'):
- # makes sense to use system-wide library iff -server is also under /usr/
+try:
+ from common.version import version
+except ImportError, e:
sys.path.insert(1, "/usr/share/fail2ban")
+ from common.version import version
-from common.version import version
from server.server import Server
# Gets the instance of the logger.

@ -0,0 +1,18 @@
commit f8983872ad4297ddb3017f4818edd08892dd2129
Author: Yaroslav Halchenko <debian@onerussian.com>
Date: Fri Feb 1 16:07:00 2013 -0500
BF: return str(host) to avoid spurious characters in the logs (Close gh-113)
thanks to opoplawski@github
diff --git a/server/failregex.py b/server/failregex.py
index 8ce9597..b194d47 100644
--- a/server/failregex.py
+++ b/server/failregex.py
@@ -130,4 +130,4 @@ class FailRegex(Regex):
s = self._matchCache.string
r = self._matchCache.re
raise RegexException("No 'host' found in '%s' using '%s'" % (s, r))
- return host
+ return str(host)

@ -1,7 +1,7 @@
Summary: Ban IPs that make too many password failures Summary: Ban IPs that make too many password failures
Name: fail2ban Name: fail2ban
Version: 0.8.8 Version: 0.8.8
Release: 2%{?dist} Release: 3%{?dist}
License: GPLv2+ License: GPLv2+
Group: System Environment/Daemons Group: System Environment/Daemons
URL: http://fail2ban.sourceforge.net/ URL: http://fail2ban.sourceforge.net/
@ -13,6 +13,14 @@ Patch1: fail2ban-0.8.7.1-sshd.patch
# Do not use pam_unix failure messages to ban sshd # Do not use pam_unix failure messages to ban sshd
# https://github.com/fail2ban/fail2ban/issues/106 # https://github.com/fail2ban/fail2ban/issues/106
Patch2: fail2ban-0.8.8-sshd-pam.patch Patch2: fail2ban-0.8.8-sshd-pam.patch
# Upstream patch to fix module loading
# https://github.com/fail2ban/fail2ban/issues/112
# https://bugzilla.redhat.com/show_bug.cgi?id=892365
Patch3: fail2ban-import.patch
# Upstream patch to fix UTF-8 characters in hostnames
# https://github.com/fail2ban/fail2ban/issues/113
# https://bugzilla.redhat.com/show_bug.cgi?id=905097
Patch4: fail2ban-utf8.patch
Patch6: fail2ban-0.8.3-log2syslog.patch Patch6: fail2ban-0.8.3-log2syslog.patch
Patch7: asyncserver.start_selinux.patch Patch7: asyncserver.start_selinux.patch
Patch8: fail2ban-0.8.7.1-notmp.patch Patch8: fail2ban-0.8.7.1-notmp.patch
@ -21,7 +29,8 @@ BuildRequires: python-devel >= 2.3
# For testcases # For testcases
BuildRequires: python-inotify BuildRequires: python-inotify
BuildArch: noarch BuildArch: noarch
Requires: iptables, tcp_wrappers, shorewall, gamin-python Requires: iptables
Requires: gamin-python
Requires: python-inotify Requires: python-inotify
Requires: initscripts Requires: initscripts
Requires(post): /sbin/chkconfig Requires(post): /sbin/chkconfig
@ -33,11 +42,17 @@ Fail2ban scans log files like /var/log/pwdfail or
/var/log/apache/error_log and bans IP that makes too many password /var/log/apache/error_log and bans IP that makes too many password
failures. It updates firewall rules to reject the IP address. failures. It updates firewall rules to reject the IP address.
To use the hostsdeny and shorewall actions you must install tcp_wrappers
and shorewall respectively.
%prep %prep
%setup -q %setup -q
%patch0 -p1 -b .init %patch0 -p1 -b .init
%patch1 -p1 -b .sshd %patch1 -p1 -b .sshd
%patch2 -p1 -b .sshd-pam %patch2 -p1 -b .sshd-pam
%patch3 -p1 -b .import
%patch4 -p1 -b .utf8
%patch6 -p1 -b .log2syslog %patch6 -p1 -b .log2syslog
%patch7 -p1 -b .fd_cloexec2 %patch7 -p1 -b .fd_cloexec2
%patch8 -p1 -b .notmp %patch8 -p1 -b .notmp
@ -98,6 +113,10 @@ fi
%dir %{_localstatedir}/lib/fail2ban/ %dir %{_localstatedir}/lib/fail2ban/
%changelog %changelog
* Thu Feb 14 2013 Orion Poplawski <orion@cora.nwra.com> - 0.8.8-3
- Add patch from upstream to fix module imports (Bug #892365)
- Add patch from upstream to UTF-8 characters in syslog (Bug #905097)
* Fri Jan 18 2013 Orion Poplawski <orion@cora.nwra.com> - 0.8.8-2 * Fri Jan 18 2013 Orion Poplawski <orion@cora.nwra.com> - 0.8.8-2
- Add patch to prevent sshd blocks of successful logins for systems that use - Add patch to prevent sshd blocks of successful logins for systems that use
sssd or ldap sssd or ldap

Loading…
Cancel
Save