* circumvent SEGFAULT in a python's socket module by getaddrinfo with disabled IPv6 (gh-3438) * avoid sporadic error in pyinotify backend if pending file deleted in other thread, e. g. by flushing logs (gh-3635) * `action.d/cloudflare-token.conf` - fixes gh-3479, url-encode args by unban * `action.d/*ipset*`: make `maxelem` ipset option configurable through banaction arguments (gh-3564) * `filter.d/apache-common.conf` - accepts remote besides client (gh-3622) * `filter.d/mysqld-auth.conf` - matches also if no suffix in message (mariadb 10.3 log format, gh-3603) * `filter.d/nginx-*.conf` - nginx error-log filters extended with support of journal format (gh-3646) * `filter.d/postfix.conf`: - "rejected" rule extended to match "Access denied" too - avoid double counting ('lost connection after AUTH' together with message 'disconnect ...', gh-3505) - add Sender address rejected: Malformed DNS server reply - add to postfix syslog daemon format (gh-3690) - change journalmatch postfix, allow sub-units with postfix@-.service (gh-3692) * `filter.d/recidive.conf`: support for systemd-journal, conditional RE depending on logtype (for file or journal, gh-3693) * `filter.d/slapd.conf` - filter rewritten for single-line processing, matches errored result without `text=...` (gh-3604) * supports python 3.12 and 3.13 (gh-3487) OBS-URL: https://build.opensuse.org/package/show/security/fail2ban?expand=0&rev=122
28 lines
1.3 KiB
Diff
28 lines
1.3 KiB
Diff
diff -ur fail2ban-0.11.2-orig/files/fail2ban.service.in fail2ban-0.11.2/files/fail2ban.service.in
|
|
--- fail2ban-0.11.2-orig/files/fail2ban.service.in 2020-11-23 21:43:03.000000000 +0100
|
|
+++ fail2ban-0.11.2/files/fail2ban.service.in 2020-12-05 18:22:01.503018894 +0100
|
|
@@ -2,17 +2,18 @@
|
|
Description=Fail2Ban Service
|
|
Documentation=man:fail2ban(1)
|
|
After=network.target iptables.service firewalld.service ip6tables.service ipset.service nftables.service
|
|
-PartOf=iptables.service firewalld.service ip6tables.service ipset.service nftables.service
|
|
+PartOf=firewalld.service
|
|
|
|
[Service]
|
|
Type=simple
|
|
+EnvironmentFile=-/etc/sysconfig/fail2ban
|
|
Environment="PYTHONNOUSERSITE=1"
|
|
ExecStartPre=/bin/mkdir -p /run/fail2ban
|
|
-ExecStart=@BINDIR@/fail2ban-server -xf start
|
|
+ExecStart=/usr/bin/fail2ban-server -xf $FAIL2BAN_OPTIONS start
|
|
# if should be logged in systemd journal, use following line or set logtarget to sysout in fail2ban.local
|
|
-# ExecStart=@BINDIR@/fail2ban-server -xf --logtarget=sysout start
|
|
-ExecStop=@BINDIR@/fail2ban-client stop
|
|
-ExecReload=@BINDIR@/fail2ban-client reload
|
|
+# ExecStart=/usr/bin/fail2ban-server -xf --logtarget=sysout start
|
|
+ExecStop=/usr/bin/fail2ban-client stop
|
|
+ExecReload=/usr/bin/fail2ban-client reload
|
|
PIDFile=/run/fail2ban/fail2ban.pid
|
|
Restart=on-failure
|
|
RestartPreventExitStatus=0 255
|