Thanks. > Am 01.07.2023 um 11:32 schrieb Thomas Klausner <wiz%NetBSD.org@localhost>: > > Hi! > > I've just imported a new package, pkgtools/python-versions-check. > […] > Please use this when you change supported Python versions for a > package, to avoid issues in bulk builds. Success ;-) dweezil# python-versions-check Supported Python versions for wip/fail2ban1: [27, 38, 39, 310, 311] Checking packages used by wip/fail2ban1: Checking packages using wip/fail2ban1: even though this is also somewhat outdated, the following modifications to fail2ban makes it work with python311 while we are waiting for some mysterious developer to finish working on fail2ban 1.x. Cheers Oskar Index: Makefile ==================================================================RCS file: /cvsroot/pkgsrc/security/fail2ban/Makefile,v retrieving revision 1.22 diff -u -r1.22 Makefile --- Makefile 1 Dec 2022 17:36:57 -0000 1.22 +++ Makefile 15 Jan 2023 18:40:11 -0000 @@ -1,7 +1,7 @@ # $NetBSD: Makefile,v 1.22 2022/12/01 17:36:57 jperkin Exp $ -DISTNAME= fail2ban-0.11.2 -PKGREVISION= 2 +DISTNAME= fail2ban-1.0.2 +PKGREVISION= 0 CATEGORIES= security MASTER_SITES= ${MASTER_SITE_GITHUB:�an/} @@ -15,7 +15,7 @@ BUILD_DEPENDS+= ${PYPKGPREFIX}-numpydoc-[0-9]*:../../textproc/py-numpydoc BUILD_DEPENDS+= ${PYPKGPREFIX}-sphinx-[0-9]*:../../textproc/py-sphinx -PYTHON_VERSIONS_ACCEPTED= 39 38 +PYTHON_VERSIONS_ACCEPTED= 39 38 310 311 27 USE_TOOLS+= make:build @@ -33,7 +33,7 @@ CONF_FILES+= ${EGDIR}/${config} ${PKG_SYSCONFDIR}/${config} .endfor -.for action in abuseipdb.conf apf.conf badips.conf badips.py blocklist_de.conf bsd-ipfw.conf cloudflare.conf complain.conf dshield.conf dummy.conf firewallcmd-allports.conf firewallcmd-common.conf firewallcmd-ipset.conf firewallcmd-multiport.conf firewallcmd-new.conf firewallcmd-rich-logging.conf firewallcmd-rich-rules.conf helpers-common.conf hostsdeny.conf ipfilter.conf ipfw.conf iptables-allports.conf iptables-common.conf iptables-ipset-proto4.conf iptables-ipset-proto6-allports.conf iptables-ipset-proto6.conf iptables-multiport-log.conf iptables-multiport.conf iptables-new.conf iptables-xt_recent-echo.conf iptables.conf mail-buffered.conf mail-whois-common.conf mail-whois-lines.conf mail-whois.conf mail.conf mynetwatchman.conf netscaler.conf nftables-allports.conf nftables-multiport.conf nftables.conf nginx-block-map.conf npf.conf nsupdate.conf osx-afctl.conf osx-ipfw.conf pf.conf route.conf sendmail-buffered.conf sendmail-common.conf sendmail-geoip-lines.conf sendmail-whois-ipjailmatches.conf sendmail-whois-ipmatches.conf sendmail-whois-lines.conf sendmail-whois-matches.conf sendmail-whois.conf sendmail.conf shorewall-ipset-proto6.conf shorewall.conf smtp.py symbiosis-blacklist-allports.conf ufw.conf xarf-login-attack.conf +.for action in abuseipdb.conf apf.conf blocklist_de.conf bsd-ipfw.conf cloudflare.conf complain.conf dshield.conf dummy.conf firewallcmd-allports.conf firewallcmd-common.conf firewallcmd-ipset.conf firewallcmd-multiport.conf firewallcmd-new.conf firewallcmd-rich-logging.conf firewallcmd-rich-rules.conf helpers-common.conf hostsdeny.conf ipfilter.conf ipfw.conf iptables-allports.conf iptables-ipset-proto4.conf iptables-ipset-proto6-allports.conf iptables-ipset-proto6.conf iptables-ipset.conf iptables-multiport-log.conf iptables-multiport.conf iptables-new.conf iptables-xt_recent-echo.conf iptables.conf mail-buffered.conf mail-whois-common.conf mail-whois-lines.conf mail-whois.conf mail.conf mynetwatchman.conf netscaler.conf nftables-allports.conf nftables-multiport.conf nftables.conf nginx-block-map.conf npf.conf nsupdate.conf osx-afctl.conf osx-ipfw.conf pf.conf route.conf sendmail-buffered.conf sendmail-common.conf sendmail-geoip-lines.conf sendmail-whois-ipjailmatches.conf sendmail-whois-ipmatches.conf sendmail-whois-lines.conf sendmail-whois-matches.conf sendmail-whois.conf sendmail.conf shorewall-ipset-proto6.conf shorewall.conf smtp.py symbiosis-blacklist-allports.conf ufw.conf xarf-login-attack.conf CONF_FILES+= ${EGDIR}/action.d/${action} ${PKG_SYSCONFDIR}/action.d/${action} .endfor Index: PLIST ==================================================================RCS file: /cvsroot/pkgsrc/security/fail2ban/PLIST,v retrieving revision 1.8 diff -u -r1.8 PLIST --- PLIST 8 Jul 2022 22:10:29 -0000 1.8 +++ PLIST 15 Jan 2023 18:40:12 -0000 @@ -1,4 +1,4 @@ -@comment $NetBSD: PLIST,v 1.8 2022/07/08 22:10:29 wiz Exp $ +@comment $NetBSD$ bin/fail2ban-client bin/fail2ban-python bin/fail2ban-regex @@ -152,9 +152,6 @@ ${PYSITELIB}/fail2ban/tests/action_d/__init__.py ${PYSITELIB}/fail2ban/tests/action_d/__init__.pyc ${PYSITELIB}/fail2ban/tests/action_d/__init__.pyo -${PYSITELIB}/fail2ban/tests/action_d/test_badips.py -${PYSITELIB}/fail2ban/tests/action_d/test_badips.pyc -${PYSITELIB}/fail2ban/tests/action_d/test_badips.pyo ${PYSITELIB}/fail2ban/tests/action_d/test_smtp.py ${PYSITELIB}/fail2ban/tests/action_d/test_smtp.pyc ${PYSITELIB}/fail2ban/tests/action_d/test_smtp.pyo @@ -291,10 +288,13 @@ ${PYSITELIB}/fail2ban/tests/files/logs/lighttpd-auth ${PYSITELIB}/fail2ban/tests/files/logs/mongodb-auth ${PYSITELIB}/fail2ban/tests/files/logs/monit +${PYSITELIB}/fail2ban/tests/files/logs/monitorix +${PYSITELIB}/fail2ban/tests/files/logs/mssql-auth ${PYSITELIB}/fail2ban/tests/files/logs/murmur ${PYSITELIB}/fail2ban/tests/files/logs/mysqld-auth ${PYSITELIB}/fail2ban/tests/files/logs/nagios ${PYSITELIB}/fail2ban/tests/files/logs/named-refused +${PYSITELIB}/fail2ban/tests/files/logs/nginx-bad-request ${PYSITELIB}/fail2ban/tests/files/logs/nginx-botsearch ${PYSITELIB}/fail2ban/tests/files/logs/nginx-http-auth ${PYSITELIB}/fail2ban/tests/files/logs/nginx-limit-req @@ -313,6 +313,7 @@ ${PYSITELIB}/fail2ban/tests/files/logs/qmail ${PYSITELIB}/fail2ban/tests/files/logs/recidive ${PYSITELIB}/fail2ban/tests/files/logs/roundcube-auth +${PYSITELIB}/fail2ban/tests/files/logs/scanlogd ${PYSITELIB}/fail2ban/tests/files/logs/screensharingd ${PYSITELIB}/fail2ban/tests/files/logs/selinux-ssh ${PYSITELIB}/fail2ban/tests/files/logs/sendmail-auth @@ -433,10 +434,10 @@ share/doc/fail2ban/run-rootless.txt share/examples/fail2ban/action.d/abuseipdb.conf share/examples/fail2ban/action.d/apf.conf -share/examples/fail2ban/action.d/badips.conf -share/examples/fail2ban/action.d/badips.py +share/examples/fail2ban/action.d/apprise.conf share/examples/fail2ban/action.d/blocklist_de.conf share/examples/fail2ban/action.d/bsd-ipfw.conf +share/examples/fail2ban/action.d/cloudflare-token.conf share/examples/fail2ban/action.d/cloudflare.conf share/examples/fail2ban/action.d/complain.conf share/examples/fail2ban/action.d/dshield.conf @@ -453,15 +454,16 @@ share/examples/fail2ban/action.d/ipfilter.conf share/examples/fail2ban/action.d/ipfw.conf share/examples/fail2ban/action.d/iptables-allports.conf -share/examples/fail2ban/action.d/iptables-common.conf share/examples/fail2ban/action.d/iptables-ipset-proto4.conf share/examples/fail2ban/action.d/iptables-ipset-proto6-allports.conf share/examples/fail2ban/action.d/iptables-ipset-proto6.conf +share/examples/fail2ban/action.d/iptables-ipset.conf share/examples/fail2ban/action.d/iptables-multiport-log.conf share/examples/fail2ban/action.d/iptables-multiport.conf share/examples/fail2ban/action.d/iptables-new.conf share/examples/fail2ban/action.d/iptables-xt_recent-echo.conf share/examples/fail2ban/action.d/iptables.conf +share/examples/fail2ban/action.d/ipthreat.conf share/examples/fail2ban/action.d/mail-buffered.conf share/examples/fail2ban/action.d/mail-whois-common.conf share/examples/fail2ban/action.d/mail-whois-lines.conf @@ -540,10 +542,13 @@ share/examples/fail2ban/filter.d/lighttpd-auth.conf share/examples/fail2ban/filter.d/mongodb-auth.conf share/examples/fail2ban/filter.d/monit.conf +share/examples/fail2ban/filter.d/monitorix.conf +share/examples/fail2ban/filter.d/mssql-auth.conf share/examples/fail2ban/filter.d/murmur.conf share/examples/fail2ban/filter.d/mysqld-auth.conf share/examples/fail2ban/filter.d/nagios.conf share/examples/fail2ban/filter.d/named-refused.conf +share/examples/fail2ban/filter.d/nginx-bad-request.conf share/examples/fail2ban/filter.d/nginx-botsearch.conf share/examples/fail2ban/filter.d/nginx-http-auth.conf share/examples/fail2ban/filter.d/nginx-limit-req.conf @@ -562,6 +567,7 @@ share/examples/fail2ban/filter.d/qmail.conf share/examples/fail2ban/filter.d/recidive.conf share/examples/fail2ban/filter.d/roundcube-auth.conf +share/examples/fail2ban/filter.d/scanlogd.conf share/examples/fail2ban/filter.d/screensharingd.conf share/examples/fail2ban/filter.d/selinux-common.conf share/examples/fail2ban/filter.d/selinux-ssh.conf @@ -596,3 +602,7 @@ share/examples/fail2ban/paths-opensuse.conf share/examples/fail2ban/paths-osx.conf share/examples/fail2ban/paths-pkgsrc.conf +@pkgdir share/examples/fail2ban/jail.d +@pkgdir share/examples/fail2ban/fail2ban.d +@pkgdir etc/fail2ban/filter.d/ignorecommands +@pkgdir etc/fail2ban/action.d Index: distinfo ==================================================================RCS file: /cvsroot/pkgsrc/security/fail2ban/distinfo,v retrieving revision 1.9 diff -u -r1.9 distinfo --- distinfo 23 Dec 2021 22:27:35 -0000 1.9 +++ distinfo 15 Jan 2023 18:40:12 -0000 @@ -1,7 +1,7 @@ $NetBSD: distinfo,v 1.9 2021/12/23 22:27:35 wiz Exp $ -BLAKE2s (fail2ban-0.11.2.tar.gz) = ae6f306141cbf8b9f92b0561771e4bb1a559049b4f583774232c2dbae4e5aedc -SHA512 (fail2ban-0.11.2.tar.gz) = 46b27abd947b00ea64106dbac563ef8afef38eec86684024d47d9a0e8c1969ff864ad6df7f4f8de2aa3eb1af6d769fb6796592d9f0e35521d5f95f17b8cade97 -Size (fail2ban-0.11.2.tar.gz) = 559552 bytes +BLAKE2s (fail2ban-1.0.2.tar.gz) = 976d8b8b54f316d54f1ca975f1f0aebf3b151260c1af07a29ee2f9a8fea836ca +SHA512 (fail2ban-1.0.2.tar.gz) = 688a84361b5794e1658f53d2d200ce752fe1e3320ddb1742c32c4b4b82a79ace16ae464e7ea3eeb94a0e862bcac73c2d3a0e61dd7b28e179a4c857f950d74dbb +Size (fail2ban-1.0.2.tar.gz) = 583295 bytes SHA1 (patch-doc_Makefile) = b17d28b1ef79b0cf86e4cd5d6eaa3e3d1bc2da39 SHA1 (patch-setup.py) = 7e3e3ae3101b71413e563656334897814bf7fbad
Attachment:
smime.p7s
Description: S/MIME cryptographic signature