recommit for updates in build 21

This commit is contained in:
Jenkins Server
2017-08-06 17:07:25 +02:00
parent 48e97cf10c
commit 19cf115fce
12 changed files with 317 additions and 61 deletions

View File

@@ -139,7 +139,7 @@ class cd_fail2ban {
</div>
<div id="footer">
Generated on Thu Aug 3 18:32:56 2017 by
Generated on Sun Aug 6 17:07:22 2017 by
<a href="http://yardoc.org" title="Yay! A Ruby Documentation Tool" target="_parent">yard</a>
0.9.9 (ruby-2.0.0).
</div>

View File

@@ -153,7 +153,7 @@ class cd_fail2ban::main::config (
</div>
<div id="footer">
Generated on Thu Aug 3 18:32:56 2017 by
Generated on Sun Aug 6 17:07:23 2017 by
<a href="http://yardoc.org" title="Yay! A Ruby Documentation Tool" target="_parent">yard</a>
0.9.9 (ruby-2.0.0).
</div>

View File

@@ -350,7 +350,7 @@ class cd_fail2ban::main::dirs (
</div>
<div id="footer">
Generated on Thu Aug 3 18:32:56 2017 by
Generated on Sun Aug 6 17:07:22 2017 by
<a href="http://yardoc.org" title="Yay! A Ruby Documentation Tool" target="_parent">yard</a>
0.9.9 (ruby-2.0.0).
</div>

View File

@@ -286,7 +286,7 @@ class cd_fail2ban::main::files (
</div>
<div id="footer">
Generated on Thu Aug 3 18:32:56 2017 by
Generated on Sun Aug 6 17:07:22 2017 by
<a href="http://yardoc.org" title="Yay! A Ruby Documentation Tool" target="_parent">yard</a>
0.9.9 (ruby-2.0.0).
</div>

View File

@@ -159,7 +159,7 @@ class cd_fail2ban::main::install (
</div>
<div id="footer">
Generated on Thu Aug 3 18:32:56 2017 by
Generated on Sun Aug 6 17:07:23 2017 by
<a href="http://yardoc.org" title="Yay! A Ruby Documentation Tool" target="_parent">yard</a>
0.9.9 (ruby-2.0.0).
</div>

View File

@@ -166,7 +166,7 @@ class cd_fail2ban::main::service (
</div>
<div id="footer">
Generated on Thu Aug 3 18:32:57 2017 by
Generated on Sun Aug 6 17:07:23 2017 by
<a href="http://yardoc.org" title="Yay! A Ruby Documentation Tool" target="_parent">yard</a>
0.9.9 (ruby-2.0.0).
</div>

View File

@@ -128,7 +128,9 @@ for more details.</p>
with this program. If not, see <a
href="http://www.gnu.org/licenses">www.gnu.org/licenses</a>/.
<code>CRITICAL</code>,<code>ERROR</code>,<code>WARNING</code>,<code>NOTICE</code>,<code>INFO</code>
and <code>DEBUG</code>.</p>
and <code>DEBUG</code>.
@param [string] Report ban via badips.com, and use
as blacklist</p>
</div>
</div>
@@ -537,10 +539,10 @@ auto: will use the system locale setting</p>
<span class='name'>fn_enabled</span>
<span class='type'>(<tt>string</tt>)</span>
<span class='type'>(<tt>boolean</tt>)</span>
<em class="default">(defaults to: <tt>&#39;false&#39;</tt>)</em>
<em class="default">(defaults to: <tt>false</tt>)</em>
&mdash;
@@ -714,6 +716,212 @@ href="https://tools.ietf.org/html/rfc7231#section-5.5.3">tools.ietf.org/html/rfc
</li>
<li>
<span class='name'>fn_banaction</span>
<span class='type'>(<tt>string</tt>)</span>
<em class="default">(defaults to: <tt>&#39;iptables-multiport&#39;</tt>)</em>
&mdash;
<div class='inline'>
<p>Default banning action</p>
</div>
</li>
<li>
<span class='name'>fn_banaction_allports</span>
<span class='type'>(<tt>string</tt>)</span>
<em class="default">(defaults to: <tt>&#39;iptables-allports&#39;</tt>)</em>
&mdash;
<div class='inline'>
<p>Default banning action</p>
</div>
</li>
<li>
<span class='name'>fn_action_</span>
<span class='type'>(<tt>string</tt>)</span>
<em class="default">(defaults to: <tt>&#39;%(banaction)s[name=%(__name__)s, bantime=&quot;%(bantime)s&quot;, port=&quot;%(port)s&quot;, protocol=&quot;%(protocol)s&quot;, chain=&quot;%(chain)s&quot;]&#39;</tt>)</em>
&mdash;
<div class='inline'>
<p>ban only</p>
</div>
</li>
<li>
<span class='name'>fn_action_mw</span>
<span class='type'>(<tt>string</tt>)</span>
<em class="default">(defaults to: <tt>&#39;%(banaction)s[name=%(__name__)s, bantime=&quot;%(bantime)s&quot;, port=&quot;%(port)s&quot;, protocol=&quot;%(protocol)s&quot;, chain=&quot;%(chain)s&quot;]
%(mta)s-whois[name=%(__name__)s, sender=&quot;%(sender)s&quot;, dest=&quot;%(destemail)s&quot;, protocol=&quot;%(protocol)s&quot;, chain=&quot;%(chain)s&quot;]&#39;</tt>)</em>
&mdash;
<div class='inline'>
<p>ban &amp; send an e-mail with whois report to the
destemail.</p>
</div>
</li>
<li>
<span class='name'>fn_action_mwl</span>
<span class='type'>(<tt>string</tt>)</span>
<em class="default">(defaults to: <tt>&#39;%(banaction)s[name=%(__name__)s, bantime=&quot;%(bantime)s&quot;, port=&quot;%(port)s&quot;, protocol=&quot;%(protocol)s&quot;, chain=&quot;%(chain)s&quot;]
%(mta)s-whois-lines[name=%(__name__)s, sender=&quot;%(sender)s&quot;, dest=&quot;%(destemail)s&quot;, logpath=%(logpath)s, chain=&quot;%(chain)s&quot;]&#39;</tt>)</em>
&mdash;
<div class='inline'>
<p>ban &amp; send an e-mail with whois report and
relevant log lines</p>
</div>
</li>
<li>
<span class='name'>fn_action_xarf</span>
<span class='type'>(<tt>string</tt>)</span>
<em class="default">(defaults to: <tt>&#39;%(banaction)s[name=%(__name__)s, bantime=&quot;%(bantime)s&quot;, port=&quot;%(port)s&quot;, protocol=&quot;%(protocol)s&quot;, chain=&quot;%(chain)s&quot;]
xarf-login-attack[service=%(__name__)s, sender=&quot;%(sender)s&quot;, logpath=%(logpath)s, port=&quot;%(port)s&quot;]&#39;</tt>)</em>
&mdash;
<div class='inline'>
<p>ban &amp; send a xarf e-mail to abuse contact of
IP address and include
relevant log lines.</p>
</div>
</li>
<li>
<span class='name'>fn_action_cf_mwl</span>
<span class='type'>(<tt>string</tt>)</span>
<em class="default">(defaults to: <tt>&#39;cloudflare[cfuser=&quot;%(cfemail)s&quot;, cftoken=&quot;%(cfapikey)s&quot;]
%(mta)s-whois-lines[name=%(__name__)s, sender=&quot;%(sender)s&quot;, dest=&quot;%(destemail)s&quot;, logpath=%(logpath)s, chain=&quot;%(chain)s&quot;]&#39;</tt>)</em>
&mdash;
<div class='inline'>
<p>ban IP on CloudFlare &amp; send an e-mail with
whois report and relevant
log lines.</p>
</div>
</li>
<li>
<span class='name'>fn_action_blocklist_de</span>
<span class='type'>(<tt>string</tt>)</span>
<em class="default">(defaults to: <tt>&#39;blocklist_de[email=&quot;%(sender)s&quot;, service=%(filter)s, apikey=&quot;%(blocklist_de_apikey)s&quot;, agent=&quot;%(fail2ban_agent)s&quot;]&#39;</tt>)</em>
&mdash;
<div class='inline'>
<p>Report block via blocklist.de fail2ban
reporting service API</p>
</div>
</li>
<li>
<span class='name'>fn_action_badips_report</span>
<span class='type'>(<tt>string</tt>)</span>
<em class="default">(defaults to: <tt>&#39;badips[category=&quot;%(__name__)s&quot;, agent=&quot;%(fail2ban_agent)s&quot;]&#39;</tt>)</em>
&mdash;
<div class='inline'>
<h1 id="label-Report+ban+via+badips.com">Report ban via badips.com</h1>
<p>(uses action.d/badips.conf for reporting only).</p>
</div>
</li>
<li>
<span class='name'>fn_default_action</span>
<span class='type'>(<tt>string</tt>)</span>
<em class="default">(defaults to: <tt>&#39;action_&#39;</tt>)</em>
&mdash;
<div class='inline'>
<p>Choose default action.</p>
</div>
</li>
<li>
<span class='name'>fn_action_badips</span>
<span class='type'>(<tt>Any</tt>)</span>
<em class="default">(defaults to: <tt>&#39;badips.py[category=&quot;%(__name__)s&quot;, banaction=&quot;%(banaction)s&quot;, agent=&quot;%(fail2ban_agent)s&quot;]&#39;</tt>)</em>
</li>
</ul>
@@ -724,23 +932,6 @@ href="https://tools.ietf.org/html/rfc7231#section-5.5.3">tools.ietf.org/html/rfc
<pre class="lines">
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
@@ -804,47 +995,92 @@ href="https://tools.ietf.org/html/rfc7231#section-5.5.3">tools.ietf.org/html/rfc
181
182
183
184</pre>
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215</pre>
</td>
<td>
<pre class="code"><span class="info file"># File 'manifests/params.pp', line 104</span>
<pre class="code"><span class="info file"># File 'manifests/params.pp', line 121</span>
class cd_fail2ban::params (
$pkg_ensure = &#39;latest&#39;,
$pkg_ensure = &#39;latest&#39;,
$fn_manage_config = true,
$fn_enable_service = &#39;running&#39;,
$fn_manage_config = true,
$fn_enable_service = &#39;running&#39;,
# fail2ban.conf/local
$fn_loglevel = &#39;INFO&#39;,
$fn_logtarget = &#39;SYSLOG&#39;,
$fn_syslogsocket = &#39;auto&#39;,
$fn_socket = &#39;/var/run/fail2ban/fail2ban.sock&#39;,
$fn_pidfile = &#39;/var/run/fail2ban/fail2ban.pid&#39;,
$fn_dbfile = &#39;/var/lib/fail2ban/fail2ban.sqlite3&#39;,
$fn_dbpurgeage = &#39;86400&#39;,
$fn_loglevel = &#39;INFO&#39;,
$fn_logtarget = &#39;SYSLOG&#39;,
$fn_syslogsocket = &#39;auto&#39;,
$fn_socket = &#39;/var/run/fail2ban/fail2ban.sock&#39;,
$fn_pidfile = &#39;/var/run/fail2ban/fail2ban.pid&#39;,
$fn_dbfile = &#39;/var/lib/fail2ban/fail2ban.sqlite3&#39;,
$fn_dbpurgeage = &#39;86400&#39;,
# jail.conf/local
$fn_ignoreip = &#39;127.0.0.1/8&#39;,
$fn_ignorecommand = &#39;&#39;,
$fn_bantime = &#39;600&#39;,
$fn_findtime = &#39;600&#39;,
$fn_maxretry = &#39;5&#39;,
$fn_backend = &#39;auto&#39;,
$fn_usedns = &#39;warn&#39;,
$fn_logencoding = &#39;auto&#39;,
$fn_enabled = &#39;false&#39;,
$fn_filter = &#39;%(__name__)s&#39;,
$fn_destemail = &#39;root@localhost&#39;,
$fn_sender = &#39;root@localhost&#39;,
$fn_mta = &#39;sendmail&#39;,
$fn_protocol = &#39;tcp&#39;,
$fn_chain = &#39;INPUT&#39;,
$fn_port = &#39;0:65535&#39;,
$fn_fail2ban_agent = &#39;Fail2Ban/%(fail2ban_version)s&#39;,
$fn_ignoreip = &#39;127.0.0.1/8&#39;,
$fn_ignorecommand = &#39;&#39;,
$fn_bantime = &#39;600&#39;,
$fn_findtime = &#39;600&#39;,
$fn_maxretry = &#39;5&#39;,
$fn_backend = &#39;auto&#39;,
$fn_usedns = &#39;warn&#39;,
$fn_logencoding = &#39;auto&#39;,
$fn_enabled = false,
$fn_filter = &#39;%(__name__)s&#39;,
$fn_destemail = &#39;root@localhost&#39;,
$fn_sender = &#39;root@localhost&#39;,
$fn_mta = &#39;sendmail&#39;,
$fn_protocol = &#39;tcp&#39;,
$fn_chain = &#39;INPUT&#39;,
$fn_port = &#39;0:65535&#39;,
$fn_fail2ban_agent = &#39;Fail2Ban/%(fail2ban_version)s&#39;,
$fn_banaction = &#39;iptables-multiport&#39;,
$fn_banaction_allports = &#39;iptables-allports&#39;,
$fn_action_ = &#39;%(banaction)s[name=%(__name__)s, bantime=&quot;%(bantime)s&quot;, port=&quot;%(port)s&quot;, protocol=&quot;%(protocol)s&quot;, chain=&quot;%(chain)s&quot;]&#39;,
$fn_action_mw = &#39;%(banaction)s[name=%(__name__)s, bantime=&quot;%(bantime)s&quot;, port=&quot;%(port)s&quot;, protocol=&quot;%(protocol)s&quot;, chain=&quot;%(chain)s&quot;]
%(mta)s-whois[name=%(__name__)s, sender=&quot;%(sender)s&quot;, dest=&quot;%(destemail)s&quot;, protocol=&quot;%(protocol)s&quot;, chain=&quot;%(chain)s&quot;]&#39;,
$fn_action_mwl = &#39;%(banaction)s[name=%(__name__)s, bantime=&quot;%(bantime)s&quot;, port=&quot;%(port)s&quot;, protocol=&quot;%(protocol)s&quot;, chain=&quot;%(chain)s&quot;]
%(mta)s-whois-lines[name=%(__name__)s, sender=&quot;%(sender)s&quot;, dest=&quot;%(destemail)s&quot;, logpath=%(logpath)s, chain=&quot;%(chain)s&quot;]&#39;,
$fn_action_xarf = &#39;%(banaction)s[name=%(__name__)s, bantime=&quot;%(bantime)s&quot;, port=&quot;%(port)s&quot;, protocol=&quot;%(protocol)s&quot;, chain=&quot;%(chain)s&quot;]
xarf-login-attack[service=%(__name__)s, sender=&quot;%(sender)s&quot;, logpath=%(logpath)s, port=&quot;%(port)s&quot;]&#39;,
$fn_action_cf_mwl = &#39;cloudflare[cfuser=&quot;%(cfemail)s&quot;, cftoken=&quot;%(cfapikey)s&quot;]
%(mta)s-whois-lines[name=%(__name__)s, sender=&quot;%(sender)s&quot;, dest=&quot;%(destemail)s&quot;, logpath=%(logpath)s, chain=&quot;%(chain)s&quot;]&#39;,
$fn_action_blocklist_de = &#39;blocklist_de[email=&quot;%(sender)s&quot;, service=%(filter)s, apikey=&quot;%(blocklist_de_apikey)s&quot;, agent=&quot;%(fail2ban_agent)s&quot;]&#39;,
$fn_action_badips = &#39;badips.py[category=&quot;%(__name__)s&quot;, banaction=&quot;%(banaction)s&quot;, agent=&quot;%(fail2ban_agent)s&quot;]&#39;,
$fn_action_badips_report = &#39;badips[category=&quot;%(__name__)s&quot;, agent=&quot;%(fail2ban_agent)s&quot;]&#39;,
$fn_default_action = &#39;action_&#39;,
) {
@@ -897,7 +1133,7 @@ $fn_jail_local_erb = &#39;cd_fail2ban/jail_local.erb&#39;
</div>
<div id="footer">
Generated on Thu Aug 3 18:32:56 2017 by
Generated on Sun Aug 6 17:07:22 2017 by
<a href="http://yardoc.org" title="Yay! A Ruby Documentation Tool" target="_parent">yard</a>
0.9.9 (ruby-2.0.0).
</div>