[arch-commits] Commit in sshguard/repos (20 files)
Sergej Pupykin
spupykin at archlinux.org
Mon Mar 2 16:33:34 UTC 2015
Date: Monday, March 2, 2015 @ 17:33:33
Author: spupykin
Revision: 128554
archrelease: copy trunk to community-i686, community-x86_64
Added:
sshguard/repos/community-i686/ChangeLog
(from rev 128553, sshguard/trunk/ChangeLog)
sshguard/repos/community-i686/PKGBUILD
(from rev 128553, sshguard/trunk/PKGBUILD)
sshguard/repos/community-i686/sshguard-journalctl
(from rev 128553, sshguard/trunk/sshguard-journalctl)
sshguard/repos/community-i686/sshguard.install
(from rev 128553, sshguard/trunk/sshguard.install)
sshguard/repos/community-i686/sshguard.service
(from rev 128553, sshguard/trunk/sshguard.service)
sshguard/repos/community-x86_64/ChangeLog
(from rev 128553, sshguard/trunk/ChangeLog)
sshguard/repos/community-x86_64/PKGBUILD
(from rev 128553, sshguard/trunk/PKGBUILD)
sshguard/repos/community-x86_64/sshguard-journalctl
(from rev 128553, sshguard/trunk/sshguard-journalctl)
sshguard/repos/community-x86_64/sshguard.install
(from rev 128553, sshguard/trunk/sshguard.install)
sshguard/repos/community-x86_64/sshguard.service
(from rev 128553, sshguard/trunk/sshguard.service)
Deleted:
sshguard/repos/community-i686/ChangeLog
sshguard/repos/community-i686/PKGBUILD
sshguard/repos/community-i686/sshguard-journalctl
sshguard/repos/community-i686/sshguard.install
sshguard/repos/community-i686/sshguard.service
sshguard/repos/community-x86_64/ChangeLog
sshguard/repos/community-x86_64/PKGBUILD
sshguard/repos/community-x86_64/sshguard-journalctl
sshguard/repos/community-x86_64/sshguard.install
sshguard/repos/community-x86_64/sshguard.service
--------------------------------------+
/ChangeLog | 6 ++
/PKGBUILD | 86 +++++++++++++++++++++++++++++++++
/sshguard-journalctl | 8 +++
/sshguard.install | 28 ++++++++++
/sshguard.service | 20 +++++++
community-i686/ChangeLog | 3 -
community-i686/PKGBUILD | 44 ----------------
community-i686/sshguard-journalctl | 4 -
community-i686/sshguard.install | 14 -----
community-i686/sshguard.service | 10 ---
community-x86_64/ChangeLog | 3 -
community-x86_64/PKGBUILD | 44 ----------------
community-x86_64/sshguard-journalctl | 4 -
community-x86_64/sshguard.install | 14 -----
community-x86_64/sshguard.service | 10 ---
15 files changed, 148 insertions(+), 150 deletions(-)
Deleted: community-i686/ChangeLog
===================================================================
--- community-i686/ChangeLog 2015-03-02 16:32:48 UTC (rev 128553)
+++ community-i686/ChangeLog 2015-03-02 16:33:33 UTC (rev 128554)
@@ -1,3 +0,0 @@
-2007-06-28 tardo <tardo at nagi-fanboi.net>
-* Built for x86_64
-
Copied: sshguard/repos/community-i686/ChangeLog (from rev 128553, sshguard/trunk/ChangeLog)
===================================================================
--- community-i686/ChangeLog (rev 0)
+++ community-i686/ChangeLog 2015-03-02 16:33:33 UTC (rev 128554)
@@ -0,0 +1,3 @@
+2007-06-28 tardo <tardo at nagi-fanboi.net>
+* Built for x86_64
+
Deleted: community-i686/PKGBUILD
===================================================================
--- community-i686/PKGBUILD 2015-03-02 16:32:48 UTC (rev 128553)
+++ community-i686/PKGBUILD 2015-03-02 16:33:33 UTC (rev 128554)
@@ -1,44 +0,0 @@
-# $Id$
-# Maintainer: Sergej Pupykin <pupykin.s+arch at gmail.com>
-# Maintainer: Massimiliano Torromeo <massimiliano.torromeo at gmail.com>
-
-pkgname=sshguard
-pkgver=1.5
-pkgrel=16
-pkgdesc="Brute force detector for SSH, Exim, VSFTPD and more. Blocks by ip with iptables"
-arch=('i686' 'x86_64')
-url="http://www.sshguard.net/"
-license=('GPL')
-depends=('iptables')
-options=(zipman)
-install=sshguard.install
-source=("http://downloads.sourceforge.net/sourceforge/sshguard/sshguard-$pkgver.tar.bz2"
- sshguard.service
- sshguard-journalctl)
-
-prepare() {
- cd "$srcdir/$pkgname-$pkgver"
- sed -i 's|^DAYNO.*|DAYNO [0-9]?[1-9]|' src/parser/attack_scanner.l
-}
-
-build() {
- cd "$srcdir/$pkgname-$pkgver"
- ./configure --prefix=/usr --sbindir=/usr/bin --with-firewall=iptables
- make
-}
-
-check() {
- cd "$srcdir/$pkgname-$pkgver"
- strings src/sshguard | grep -E "^`which iptables`[[:space:]]" >/dev/null
-}
-
-package() {
- cd "$srcdir/$pkgname-$pkgver"
- make DESTDIR="$pkgdir" install
- install -Dm0644 "$srcdir/sshguard.service" "$pkgdir/usr/lib/systemd/system/sshguard.service"
- install -Dm0755 "$srcdir/sshguard-journalctl" "$pkgdir/usr/lib/systemd/scripts/sshguard-journalctl"
-}
-
-sha256sums=('b537f8765455fdf8424f87d4bd695e5b675b88e5d164865452137947093e7e19'
- '24be7918dcba37805dea2fd1d9e4c1c139e3ea840773aea49574d4c6a7056507'
- 'a8f315d163128d4e8458c1d50c90082581092476937921cba2afb167f51cbe3f')
Copied: sshguard/repos/community-i686/PKGBUILD (from rev 128553, sshguard/trunk/PKGBUILD)
===================================================================
--- community-i686/PKGBUILD (rev 0)
+++ community-i686/PKGBUILD 2015-03-02 16:33:33 UTC (rev 128554)
@@ -0,0 +1,43 @@
+# $Id$
+# Maintainer: Sergej Pupykin <pupykin.s+arch at gmail.com>
+# Maintainer: Massimiliano Torromeo <massimiliano.torromeo at gmail.com>
+
+pkgname=sshguard
+pkgver=1.5
+pkgrel=17
+pkgdesc="Brute force detector for SSH, Exim, VSFTPD and more. Blocks by ip with iptables"
+arch=('i686' 'x86_64')
+url="http://www.sshguard.net/"
+license=('GPL')
+depends=('iptables')
+options=(zipman)
+install=sshguard.install
+source=("http://downloads.sourceforge.net/sourceforge/sshguard/sshguard-$pkgver.tar.bz2"
+ sshguard.service
+ sshguard-journalctl)
+sha256sums=('b537f8765455fdf8424f87d4bd695e5b675b88e5d164865452137947093e7e19'
+ '45b1a5ffe4aa40024129bc492b4ca3c759cefc8094ead121925eb1a887442921'
+ 'a8f315d163128d4e8458c1d50c90082581092476937921cba2afb167f51cbe3f')
+
+prepare() {
+ cd "$srcdir/$pkgname-$pkgver"
+ sed -i 's|^DAYNO.*|DAYNO [0-9]?[1-9]|' src/parser/attack_scanner.l
+}
+
+build() {
+ cd "$srcdir/$pkgname-$pkgver"
+ ./configure --prefix=/usr --sbindir=/usr/bin --with-firewall=iptables
+ make
+}
+
+check() {
+ cd "$srcdir/$pkgname-$pkgver"
+ strings src/sshguard | grep -E "^`which iptables`[[:space:]]" >/dev/null
+}
+
+package() {
+ cd "$srcdir/$pkgname-$pkgver"
+ make DESTDIR="$pkgdir" install
+ install -Dm0644 "$srcdir/sshguard.service" "$pkgdir/usr/lib/systemd/system/sshguard.service"
+ install -Dm0755 "$srcdir/sshguard-journalctl" "$pkgdir/usr/lib/systemd/scripts/sshguard-journalctl"
+}
Deleted: community-i686/sshguard-journalctl
===================================================================
--- community-i686/sshguard-journalctl 2015-03-02 16:32:48 UTC (rev 128553)
+++ community-i686/sshguard-journalctl 2015-03-02 16:33:33 UTC (rev 128554)
@@ -1,4 +0,0 @@
-#!/bin/sh
-SSHGUARD_OPTS=$1
-shift
-LANG=C /usr/bin/journalctl -afb -p info -n1 -o cat "$@" | /usr/bin/sshguard -l- $SSHGUARD_OPTS
Copied: sshguard/repos/community-i686/sshguard-journalctl (from rev 128553, sshguard/trunk/sshguard-journalctl)
===================================================================
--- community-i686/sshguard-journalctl (rev 0)
+++ community-i686/sshguard-journalctl 2015-03-02 16:33:33 UTC (rev 128554)
@@ -0,0 +1,4 @@
+#!/bin/sh
+SSHGUARD_OPTS=$1
+shift
+LANG=C /usr/bin/journalctl -afb -p info -n1 -o cat "$@" | /usr/bin/sshguard -l- $SSHGUARD_OPTS
Deleted: community-i686/sshguard.install
===================================================================
--- community-i686/sshguard.install 2015-03-02 16:32:48 UTC (rev 128553)
+++ community-i686/sshguard.install 2015-03-02 16:33:33 UTC (rev 128554)
@@ -1,14 +0,0 @@
-post_install() {
- mkdir -p var/db/sshguard
- echo "-- You should add chains to your firewall:"
- echo "-- iptables -N sshguard"
- echo "-- iptables -A INPUT -p tcp --dport 22 -j sshguard"
- echo "-- ip6tables -N sshguard"
- echo "-- ip6tables -A INPUT -p tcp --dport 22 -j sshguard"
- echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6"
- echo "-- For more information, see https://wiki.archlinux.org/index.php/Sshguard"
-}
-
-post_upgrade() {
- echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6"
-}
Copied: sshguard/repos/community-i686/sshguard.install (from rev 128553, sshguard/trunk/sshguard.install)
===================================================================
--- community-i686/sshguard.install (rev 0)
+++ community-i686/sshguard.install 2015-03-02 16:33:33 UTC (rev 128554)
@@ -0,0 +1,14 @@
+post_install() {
+ mkdir -p var/db/sshguard
+ echo "-- You should add chains to your firewall:"
+ echo "-- iptables -N sshguard"
+ echo "-- iptables -A INPUT -p tcp --dport 22 -j sshguard"
+ echo "-- ip6tables -N sshguard"
+ echo "-- ip6tables -A INPUT -p tcp --dport 22 -j sshguard"
+ echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6"
+ echo "-- For more information, see https://wiki.archlinux.org/index.php/Sshguard"
+}
+
+post_upgrade() {
+ echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6"
+}
Deleted: community-i686/sshguard.service
===================================================================
--- community-i686/sshguard.service 2015-03-02 16:32:48 UTC (rev 128553)
+++ community-i686/sshguard.service 2015-03-02 16:33:33 UTC (rev 128554)
@@ -1,10 +0,0 @@
-[Unit]
-Description=Block hacking attempts
-After=iptables.service ip6tables.service network.target
-Wants=iptables.service ip6tables.service
-
-[Service]
-ExecStart=/usr/lib/systemd/scripts/sshguard-journalctl "-b /var/db/sshguard/blacklist.db" SYSLOG_FACILITY=4 SYSLOG_FACILITY=10
-
-[Install]
-WantedBy=multi-user.target
Copied: sshguard/repos/community-i686/sshguard.service (from rev 128553, sshguard/trunk/sshguard.service)
===================================================================
--- community-i686/sshguard.service (rev 0)
+++ community-i686/sshguard.service 2015-03-02 16:33:33 UTC (rev 128554)
@@ -0,0 +1,10 @@
+[Unit]
+Description=Block hacking attempts
+After=iptables.service ip6tables.service ufw.service network.target
+#Wants=iptables.service ip6tables.service ufw.service
+
+[Service]
+ExecStart=/usr/lib/systemd/scripts/sshguard-journalctl "-b /var/db/sshguard/blacklist.db" SYSLOG_FACILITY=4 SYSLOG_FACILITY=10
+
+[Install]
+WantedBy=multi-user.target
Deleted: community-x86_64/ChangeLog
===================================================================
--- community-x86_64/ChangeLog 2015-03-02 16:32:48 UTC (rev 128553)
+++ community-x86_64/ChangeLog 2015-03-02 16:33:33 UTC (rev 128554)
@@ -1,3 +0,0 @@
-2007-06-28 tardo <tardo at nagi-fanboi.net>
-* Built for x86_64
-
Copied: sshguard/repos/community-x86_64/ChangeLog (from rev 128553, sshguard/trunk/ChangeLog)
===================================================================
--- community-x86_64/ChangeLog (rev 0)
+++ community-x86_64/ChangeLog 2015-03-02 16:33:33 UTC (rev 128554)
@@ -0,0 +1,3 @@
+2007-06-28 tardo <tardo at nagi-fanboi.net>
+* Built for x86_64
+
Deleted: community-x86_64/PKGBUILD
===================================================================
--- community-x86_64/PKGBUILD 2015-03-02 16:32:48 UTC (rev 128553)
+++ community-x86_64/PKGBUILD 2015-03-02 16:33:33 UTC (rev 128554)
@@ -1,44 +0,0 @@
-# $Id$
-# Maintainer: Sergej Pupykin <pupykin.s+arch at gmail.com>
-# Maintainer: Massimiliano Torromeo <massimiliano.torromeo at gmail.com>
-
-pkgname=sshguard
-pkgver=1.5
-pkgrel=16
-pkgdesc="Brute force detector for SSH, Exim, VSFTPD and more. Blocks by ip with iptables"
-arch=('i686' 'x86_64')
-url="http://www.sshguard.net/"
-license=('GPL')
-depends=('iptables')
-options=(zipman)
-install=sshguard.install
-source=("http://downloads.sourceforge.net/sourceforge/sshguard/sshguard-$pkgver.tar.bz2"
- sshguard.service
- sshguard-journalctl)
-
-prepare() {
- cd "$srcdir/$pkgname-$pkgver"
- sed -i 's|^DAYNO.*|DAYNO [0-9]?[1-9]|' src/parser/attack_scanner.l
-}
-
-build() {
- cd "$srcdir/$pkgname-$pkgver"
- ./configure --prefix=/usr --sbindir=/usr/bin --with-firewall=iptables
- make
-}
-
-check() {
- cd "$srcdir/$pkgname-$pkgver"
- strings src/sshguard | grep -E "^`which iptables`[[:space:]]" >/dev/null
-}
-
-package() {
- cd "$srcdir/$pkgname-$pkgver"
- make DESTDIR="$pkgdir" install
- install -Dm0644 "$srcdir/sshguard.service" "$pkgdir/usr/lib/systemd/system/sshguard.service"
- install -Dm0755 "$srcdir/sshguard-journalctl" "$pkgdir/usr/lib/systemd/scripts/sshguard-journalctl"
-}
-
-sha256sums=('b537f8765455fdf8424f87d4bd695e5b675b88e5d164865452137947093e7e19'
- '24be7918dcba37805dea2fd1d9e4c1c139e3ea840773aea49574d4c6a7056507'
- 'a8f315d163128d4e8458c1d50c90082581092476937921cba2afb167f51cbe3f')
Copied: sshguard/repos/community-x86_64/PKGBUILD (from rev 128553, sshguard/trunk/PKGBUILD)
===================================================================
--- community-x86_64/PKGBUILD (rev 0)
+++ community-x86_64/PKGBUILD 2015-03-02 16:33:33 UTC (rev 128554)
@@ -0,0 +1,43 @@
+# $Id$
+# Maintainer: Sergej Pupykin <pupykin.s+arch at gmail.com>
+# Maintainer: Massimiliano Torromeo <massimiliano.torromeo at gmail.com>
+
+pkgname=sshguard
+pkgver=1.5
+pkgrel=17
+pkgdesc="Brute force detector for SSH, Exim, VSFTPD and more. Blocks by ip with iptables"
+arch=('i686' 'x86_64')
+url="http://www.sshguard.net/"
+license=('GPL')
+depends=('iptables')
+options=(zipman)
+install=sshguard.install
+source=("http://downloads.sourceforge.net/sourceforge/sshguard/sshguard-$pkgver.tar.bz2"
+ sshguard.service
+ sshguard-journalctl)
+sha256sums=('b537f8765455fdf8424f87d4bd695e5b675b88e5d164865452137947093e7e19'
+ '45b1a5ffe4aa40024129bc492b4ca3c759cefc8094ead121925eb1a887442921'
+ 'a8f315d163128d4e8458c1d50c90082581092476937921cba2afb167f51cbe3f')
+
+prepare() {
+ cd "$srcdir/$pkgname-$pkgver"
+ sed -i 's|^DAYNO.*|DAYNO [0-9]?[1-9]|' src/parser/attack_scanner.l
+}
+
+build() {
+ cd "$srcdir/$pkgname-$pkgver"
+ ./configure --prefix=/usr --sbindir=/usr/bin --with-firewall=iptables
+ make
+}
+
+check() {
+ cd "$srcdir/$pkgname-$pkgver"
+ strings src/sshguard | grep -E "^`which iptables`[[:space:]]" >/dev/null
+}
+
+package() {
+ cd "$srcdir/$pkgname-$pkgver"
+ make DESTDIR="$pkgdir" install
+ install -Dm0644 "$srcdir/sshguard.service" "$pkgdir/usr/lib/systemd/system/sshguard.service"
+ install -Dm0755 "$srcdir/sshguard-journalctl" "$pkgdir/usr/lib/systemd/scripts/sshguard-journalctl"
+}
Deleted: community-x86_64/sshguard-journalctl
===================================================================
--- community-x86_64/sshguard-journalctl 2015-03-02 16:32:48 UTC (rev 128553)
+++ community-x86_64/sshguard-journalctl 2015-03-02 16:33:33 UTC (rev 128554)
@@ -1,4 +0,0 @@
-#!/bin/sh
-SSHGUARD_OPTS=$1
-shift
-LANG=C /usr/bin/journalctl -afb -p info -n1 -o cat "$@" | /usr/bin/sshguard -l- $SSHGUARD_OPTS
Copied: sshguard/repos/community-x86_64/sshguard-journalctl (from rev 128553, sshguard/trunk/sshguard-journalctl)
===================================================================
--- community-x86_64/sshguard-journalctl (rev 0)
+++ community-x86_64/sshguard-journalctl 2015-03-02 16:33:33 UTC (rev 128554)
@@ -0,0 +1,4 @@
+#!/bin/sh
+SSHGUARD_OPTS=$1
+shift
+LANG=C /usr/bin/journalctl -afb -p info -n1 -o cat "$@" | /usr/bin/sshguard -l- $SSHGUARD_OPTS
Deleted: community-x86_64/sshguard.install
===================================================================
--- community-x86_64/sshguard.install 2015-03-02 16:32:48 UTC (rev 128553)
+++ community-x86_64/sshguard.install 2015-03-02 16:33:33 UTC (rev 128554)
@@ -1,14 +0,0 @@
-post_install() {
- mkdir -p var/db/sshguard
- echo "-- You should add chains to your firewall:"
- echo "-- iptables -N sshguard"
- echo "-- iptables -A INPUT -p tcp --dport 22 -j sshguard"
- echo "-- ip6tables -N sshguard"
- echo "-- ip6tables -A INPUT -p tcp --dport 22 -j sshguard"
- echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6"
- echo "-- For more information, see https://wiki.archlinux.org/index.php/Sshguard"
-}
-
-post_upgrade() {
- echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6"
-}
Copied: sshguard/repos/community-x86_64/sshguard.install (from rev 128553, sshguard/trunk/sshguard.install)
===================================================================
--- community-x86_64/sshguard.install (rev 0)
+++ community-x86_64/sshguard.install 2015-03-02 16:33:33 UTC (rev 128554)
@@ -0,0 +1,14 @@
+post_install() {
+ mkdir -p var/db/sshguard
+ echo "-- You should add chains to your firewall:"
+ echo "-- iptables -N sshguard"
+ echo "-- iptables -A INPUT -p tcp --dport 22 -j sshguard"
+ echo "-- ip6tables -N sshguard"
+ echo "-- ip6tables -A INPUT -p tcp --dport 22 -j sshguard"
+ echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6"
+ echo "-- For more information, see https://wiki.archlinux.org/index.php/Sshguard"
+}
+
+post_upgrade() {
+ echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6"
+}
Deleted: community-x86_64/sshguard.service
===================================================================
--- community-x86_64/sshguard.service 2015-03-02 16:32:48 UTC (rev 128553)
+++ community-x86_64/sshguard.service 2015-03-02 16:33:33 UTC (rev 128554)
@@ -1,10 +0,0 @@
-[Unit]
-Description=Block hacking attempts
-After=iptables.service ip6tables.service network.target
-Wants=iptables.service ip6tables.service
-
-[Service]
-ExecStart=/usr/lib/systemd/scripts/sshguard-journalctl "-b /var/db/sshguard/blacklist.db" SYSLOG_FACILITY=4 SYSLOG_FACILITY=10
-
-[Install]
-WantedBy=multi-user.target
Copied: sshguard/repos/community-x86_64/sshguard.service (from rev 128553, sshguard/trunk/sshguard.service)
===================================================================
--- community-x86_64/sshguard.service (rev 0)
+++ community-x86_64/sshguard.service 2015-03-02 16:33:33 UTC (rev 128554)
@@ -0,0 +1,10 @@
+[Unit]
+Description=Block hacking attempts
+After=iptables.service ip6tables.service ufw.service network.target
+#Wants=iptables.service ip6tables.service ufw.service
+
+[Service]
+ExecStart=/usr/lib/systemd/scripts/sshguard-journalctl "-b /var/db/sshguard/blacklist.db" SYSLOG_FACILITY=4 SYSLOG_FACILITY=10
+
+[Install]
+WantedBy=multi-user.target
More information about the arch-commits
mailing list