From e8ba6e64bc392c35009fc29d2eee614cd9e07636 Mon Sep 17 00:00:00 2001 From: Arne Teuke Date: Sun, 2 Mar 2025 23:30:48 +0100 Subject: [PATCH] lint --- .mdl_style.rb | 3 + .mdlrc | 2 + .spelling | 43 + README.md | 4 +- doc/_index.html | 143 --- doc/css/common.css | 8 - doc/css/full_list.css | 58 - doc/css/style.css | 497 -------- doc/file.README.html | 216 ---- doc/frames.html | 17 - doc/index.html | 216 ---- doc/js/app.js | 314 ----- doc/js/full_list.js | 216 ---- doc/js/jquery.js | 4 - doc/puppet_class_list.html | 92 -- doc/puppet_classes/cd_fail2ban.html | 137 -- .../cd_fail2ban_3A_3Amain_3A_3Aconfig.html | 151 --- .../cd_fail2ban_3A_3Amain_3A_3Adirs.html | 348 ------ .../cd_fail2ban_3A_3Amain_3A_3Afiles.html | 314 ----- .../cd_fail2ban_3A_3Amain_3A_3Ainstall.html | 157 --- .../cd_fail2ban_3A_3Amain_3A_3Aservice.html | 164 --- .../cd_fail2ban_3A_3Aparams.html | 1105 ----------------- doc/top-level-namespace.html | 98 -- manifests/init.pp | 27 +- manifests/main/config.pp | 32 +- manifests/main/dirs.pp | 158 +-- manifests/main/files.pp | 141 +-- manifests/main/install.pp | 32 +- manifests/main/service.pp | 39 +- manifests/params.pp | 211 ++-- 30 files changed, 310 insertions(+), 4637 deletions(-) create mode 100644 .mdl_style.rb create mode 100644 .mdlrc create mode 100644 .spelling delete mode 100644 doc/_index.html delete mode 100644 doc/css/common.css delete mode 100644 doc/css/full_list.css delete mode 100644 doc/css/style.css delete mode 100644 doc/file.README.html delete mode 100644 doc/frames.html delete mode 100644 doc/index.html delete mode 100644 doc/js/app.js delete mode 100644 doc/js/full_list.js delete mode 100644 doc/js/jquery.js delete mode 100644 doc/puppet_class_list.html delete mode 100644 doc/puppet_classes/cd_fail2ban.html delete mode 100644 doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aconfig.html delete mode 100644 doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Adirs.html delete mode 100644 doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Afiles.html delete mode 100644 doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Ainstall.html delete mode 100644 doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aservice.html delete mode 100644 doc/puppet_classes/cd_fail2ban_3A_3Aparams.html delete mode 100644 doc/top-level-namespace.html diff --git a/.mdl_style.rb b/.mdl_style.rb new file mode 100644 index 0000000..5d4d3b9 --- /dev/null +++ b/.mdl_style.rb @@ -0,0 +1,3 @@ +all +rule 'MD013', :line_length => 1000 +exclude_rule 'MD036' diff --git a/.mdlrc b/.mdlrc new file mode 100644 index 0000000..e5c563a --- /dev/null +++ b/.mdlrc @@ -0,0 +1,2 @@ +style '.mdl_style.rb' + diff --git a/.spelling b/.spelling new file mode 100644 index 0000000..3935583 --- /dev/null +++ b/.spelling @@ -0,0 +1,43 @@ +# markdown-spellcheck spelling configuration file +# Format - lines begining # are comments +# global dictionary is at the start, file overrides afterwards +# one word per line, to define a file override use ' - filename' +# where filename is relative to this configuration file +Readme.md +httpd +sudo +selinux +site.pp +nodes.pp +cd_apache +:: +params +Foreman +cd_resources +CentOS +Puppet +ConfDroid +nagios +vHosts +vHost +phpMyAdmin +phpPgAdmin +parameterized +erb +Confdroid.com +UTF_Files +Elasticsearch +cd_firewall +puppetlabs +cd_elasticsearch +fail2ban_cd +Fail2Ban +intrusion +fail2ban +firewalld +prevention +management +CentOS7 +auto-installed +ipv4 +ipv6 diff --git a/README.md b/README.md index cffdfca..8c90b9f 100644 --- a/README.md +++ b/README.md @@ -8,7 +8,7 @@ Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks. -`cd_fail2ban` is a Puppet module to automate installation, configuration and management of fail2ban settings and rules. +`fail2ban_cd` is a Puppet module to automate installation, configuration and management of fail2ban settings and rules. ## WARNING @@ -50,7 +50,7 @@ node 'example.example.net' { * through Foreman: -In order to apply parameters through Foreman, **__cd_fail2ban::params__** must be added to the host or host group in question. +In order to apply parameters through Foreman, **__fail2ban_cd::params__** must be added to the host or host group in question. See [more details about class deployment on Confdroid.com](https://confdroid.com/2017/05/deploying-our-puppet-modules/). diff --git a/doc/_index.html b/doc/_index.html deleted file mode 100644 index 2e5d231..0000000 --- a/doc/_index.html +++ /dev/null @@ -1,143 +0,0 @@ - - - - - - - Documentation by YARD 0.9.26 - - - - - - - - - - - - - - - - - - - -
- - -

Documentation by YARD 0.9.26

-
-

Alphabetic Index

- -

Puppet Class Listing A-Z

- - - - - - -
- - - - -
- - - - - - - - - -

File Listing

- - -
- - -
- -
- - - -
- - \ No newline at end of file diff --git a/doc/css/common.css b/doc/css/common.css deleted file mode 100644 index d28b093..0000000 --- a/doc/css/common.css +++ /dev/null @@ -1,8 +0,0 @@ -/* Ensure the search bar doesn't overlap with links */ -.fixed_header { - padding-bottom: 25px; -} - -#full_list { - padding-top: 15px; -} diff --git a/doc/css/full_list.css b/doc/css/full_list.css deleted file mode 100644 index fa35982..0000000 --- a/doc/css/full_list.css +++ /dev/null @@ -1,58 +0,0 @@ -body { - margin: 0; - font-family: "Lucida Sans", "Lucida Grande", Verdana, Arial, sans-serif; - font-size: 13px; - height: 101%; - overflow-x: hidden; - background: #fafafa; -} - -h1 { padding: 12px 10px; padding-bottom: 0; margin: 0; font-size: 1.4em; } -.clear { clear: both; } -.fixed_header { position: fixed; background: #fff; width: 100%; padding-bottom: 10px; margin-top: 0; top: 0; z-index: 9999; height: 70px; } -#search { position: absolute; right: 5px; top: 9px; padding-left: 24px; } -#content.insearch #search, #content.insearch #noresults { background: url(data:image/gif;base64,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) no-repeat center left; } -#full_list { padding: 0; list-style: none; margin-left: 0; margin-top: 80px; font-size: 1.1em; } -#full_list ul { padding: 0; } -#full_list li { padding: 0; margin: 0; list-style: none; } -#full_list li .item { padding: 5px 5px 5px 12px; } -#noresults { padding: 7px 12px; background: #fff; } -#content.insearch #noresults { margin-left: 7px; } -li.collapsed ul { display: none; } -li a.toggle { cursor: default; position: relative; left: -5px; top: 4px; text-indent: -999px; width: 10px; height: 9px; margin-left: -10px; display: block; float: left; background: url(data:image/png;base64,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) no-repeat bottom left; } -li.collapsed a.toggle { opacity: 0.5; cursor: default; background-position: top left; } -li { color: #888; cursor: pointer; } -li.deprecated { text-decoration: line-through; font-style: italic; } -li.odd { background: #f0f0f0; } -li.even { background: #fafafa; } -.item:hover { background: #ddd; } -li small:before { content: "("; } -li small:after { content: ")"; } -li small.search_info { display: none; } -a, a:visited { text-decoration: none; color: #05a; } -li.clicked > .item { background: #05a; color: #ccc; } -li.clicked > .item a, li.clicked > .item a:visited { color: #eee; } -li.clicked > .item a.toggle { opacity: 0.5; background-position: bottom right; } -li.collapsed.clicked a.toggle { background-position: top right; } -#search input { border: 1px solid #bbb; border-radius: 3px; } -#full_list_nav { margin-left: 10px; font-size: 0.9em; display: block; color: #aaa; } -#full_list_nav a, #nav a:visited { color: #358; } -#full_list_nav a:hover { background: transparent; color: #5af; } -#full_list_nav span:after { content: ' | '; } -#full_list_nav span:last-child:after { content: ''; } - -#content h1 { margin-top: 0; } -li { white-space: nowrap; cursor: normal; } -li small { display: block; font-size: 0.8em; } -li small:before { content: ""; } -li small:after { content: ""; } -li small.search_info { display: none; } -#search { width: 170px; position: static; margin: 3px; margin-left: 10px; font-size: 0.9em; color: #888; padding-left: 0; padding-right: 24px; } -#content.insearch #search { background-position: center right; } -#search input { width: 110px; } - -#full_list.insearch ul { display: block; } -#full_list.insearch .item { display: none; } -#full_list.insearch .found { display: block; padding-left: 11px !important; } -#full_list.insearch li a.toggle { display: none; } -#full_list.insearch li small.search_info { display: block; } diff --git a/doc/css/style.css b/doc/css/style.css deleted file mode 100644 index eb0dbc8..0000000 --- a/doc/css/style.css +++ /dev/null @@ -1,497 +0,0 @@ -html { - width: 100%; - height: 100%; -} -body { - font-family: "Lucida Sans", "Lucida Grande", Verdana, Arial, sans-serif; - font-size: 13px; - width: 100%; - margin: 0; - padding: 0; - display: flex; - display: -webkit-flex; - display: -ms-flexbox; -} - -#nav { - position: relative; - width: 100%; - height: 100%; - border: 0; - border-right: 1px dotted #eee; - overflow: auto; -} -.nav_wrap { - margin: 0; - padding: 0; - width: 20%; - height: 100%; - position: relative; - display: flex; - display: -webkit-flex; - display: -ms-flexbox; - flex-shrink: 0; - -webkit-flex-shrink: 0; - -ms-flex: 1 0; -} -#resizer { - position: absolute; - right: -5px; - top: 0; - width: 10px; - height: 100%; - cursor: col-resize; - z-index: 9999; -} -#main { - flex: 5 1; - -webkit-flex: 5 1; - -ms-flex: 5 1; - outline: none; - position: relative; - background: #fff; - padding: 1.2em; - padding-top: 0.2em; - box-sizing: border-box; -} - -@media (max-width: 920px) { - .nav_wrap { width: 100%; top: 0; right: 0; overflow: visible; position: absolute; } - #resizer { display: none; } - #nav { - z-index: 9999; - background: #fff; - display: none; - position: absolute; - top: 40px; - right: 12px; - width: 500px; - max-width: 80%; - height: 80%; - overflow-y: scroll; - border: 1px solid #999; - border-collapse: collapse; - box-shadow: -7px 5px 25px #aaa; - border-radius: 2px; - } -} - -@media (min-width: 920px) { - body { height: 100%; overflow: hidden; } - #main { height: 100%; overflow: auto; } - #search { display: none; } -} - -#main img { max-width: 100%; } -h1 { font-size: 25px; margin: 1em 0 0.5em; padding-top: 4px; border-top: 1px dotted #d5d5d5; } -h1.noborder { border-top: 0px; margin-top: 0; padding-top: 4px; } -h1.title { margin-bottom: 10px; } -h1.alphaindex { margin-top: 0; font-size: 22px; } -h2 { - padding: 0; - padding-bottom: 3px; - border-bottom: 1px #aaa solid; - font-size: 1.4em; - margin: 1.8em 0 0.5em; - position: relative; -} -h2 small { font-weight: normal; font-size: 0.7em; display: inline; position: absolute; right: 0; } -h2 small a { - display: block; - height: 20px; - border: 1px solid #aaa; - border-bottom: 0; - border-top-left-radius: 5px; - background: #f8f8f8; - position: relative; - padding: 2px 7px; -} -.clear { clear: both; } -.inline { display: inline; } -.inline p:first-child { display: inline; } -.docstring, .tags, #filecontents { font-size: 15px; line-height: 1.5145em; } -.docstring p > code, .docstring p > tt, .tags p > code, .tags p > tt { - color: #c7254e; background: #f9f2f4; padding: 2px 4px; font-size: 1em; - border-radius: 4px; -} -.docstring h1, .docstring h2, .docstring h3, .docstring h4 { padding: 0; border: 0; border-bottom: 1px dotted #bbb; } -.docstring h1 { font-size: 1.2em; } -.docstring h2 { font-size: 1.1em; } -.docstring h3, .docstring h4 { font-size: 1em; border-bottom: 0; padding-top: 10px; } -.summary_desc .object_link a, .docstring .object_link a { - font-family: monospace; font-size: 1.05em; - color: #05a; background: #EDF4FA; padding: 2px 4px; font-size: 1em; - border-radius: 4px; -} -.rdoc-term { padding-right: 25px; font-weight: bold; } -.rdoc-list p { margin: 0; padding: 0; margin-bottom: 4px; } -.summary_desc pre.code .object_link a, .docstring pre.code .object_link a { - padding: 0px; background: inherit; color: inherit; border-radius: inherit; -} - -/* style for */ -#filecontents table, .docstring table { border-collapse: collapse; } -#filecontents table th, #filecontents table td, -.docstring table th, .docstring table td { border: 1px solid #ccc; padding: 8px; padding-right: 17px; } -#filecontents table tr:nth-child(odd), -.docstring table tr:nth-child(odd) { background: #eee; } -#filecontents table tr:nth-child(even), -.docstring table tr:nth-child(even) { background: #fff; } -#filecontents table th, .docstring table th { background: #fff; } - -/* style for
a",d=q.getElementsByTagName("*"),e=q.getElementsByTagName("a")[0];if(!d||!d.length||!e)return{};g=c.createElement("select"),h=g.appendChild(c.createElement("option")),i=q.getElementsByTagName("input")[0],b={leadingWhitespace:q.firstChild.nodeType===3,tbody:!q.getElementsByTagName("tbody").length,htmlSerialize:!!q.getElementsByTagName("link").length,style:/top/.test(e.getAttribute("style")),hrefNormalized:e.getAttribute("href")==="/a",opacity:/^0.55/.test(e.style.opacity),cssFloat:!!e.style.cssFloat,checkOn:i.value==="on",optSelected:h.selected,getSetAttribute:q.className!=="t",enctype:!!c.createElement("form").enctype,html5Clone:c.createElement("nav").cloneNode(!0).outerHTML!=="<:nav>",submitBubbles:!0,changeBubbles:!0,focusinBubbles:!1,deleteExpando:!0,noCloneEvent:!0,inlineBlockNeedsLayout:!1,shrinkWrapBlocks:!1,reliableMarginRight:!0},i.checked=!0,b.noCloneChecked=i.cloneNode(!0).checked,g.disabled=!0,b.optDisabled=!h.disabled;try{delete q.test}catch(s){b.deleteExpando=!1}!q.addEventListener&&q.attachEvent&&q.fireEvent&&(q.attachEvent("onclick",function(){b.noCloneEvent=!1}),q.cloneNode(!0).fireEvent("onclick")),i=c.createElement("input"),i.value="t",i.setAttribute("type","radio"),b.radioValue=i.value==="t",i.setAttribute("checked","checked"),q.appendChild(i),k=c.createDocumentFragment(),k.appendChild(q.lastChild),b.checkClone=k.cloneNode(!0).cloneNode(!0).lastChild.checked,b.appendChecked=i.checked,k.removeChild(i),k.appendChild(q),q.innerHTML="",a.getComputedStyle&&(j=c.createElement("div"),j.style.width="0",j.style.marginRight="0",q.style.width="2px",q.appendChild(j),b.reliableMarginRight=(parseInt((a.getComputedStyle(j,null)||{marginRight:0}).marginRight,10)||0)===0);if(q.attachEvent)for(o in{submit:1,change:1,focusin:1})n="on"+o,p=n in q,p||(q.setAttribute(n,"return;"),p=typeof q[n]=="function"),b[o+"Bubbles"]=p;k.removeChild(q),k=g=h=j=q=i=null,f(function(){var a,d,e,g,h,i,j,k,m,n,o,r=c.getElementsByTagName("body")[0];!r||(j=1,k="position:absolute;top:0;left:0;width:1px;height:1px;margin:0;",m="visibility:hidden;border:0;",n="style='"+k+"border:5px solid #000;padding:0;'",o="
"+""+"
",a=c.createElement("div"),a.style.cssText=m+"width:0;height:0;position:static;top:0;margin-top:"+j+"px",r.insertBefore(a,r.firstChild),q=c.createElement("div"),a.appendChild(q),q.innerHTML="
t
",l=q.getElementsByTagName("td"),p=l[0].offsetHeight===0,l[0].style.display="",l[1].style.display="none",b.reliableHiddenOffsets=p&&l[0].offsetHeight===0,q.innerHTML="",q.style.width=q.style.paddingLeft="1px",f.boxModel=b.boxModel=q.offsetWidth===2,typeof q.style.zoom!="undefined"&&(q.style.display="inline",q.style.zoom=1,b.inlineBlockNeedsLayout=q.offsetWidth===2,q.style.display="",q.innerHTML="
",b.shrinkWrapBlocks=q.offsetWidth!==2),q.style.cssText=k+m,q.innerHTML=o,d=q.firstChild,e=d.firstChild,h=d.nextSibling.firstChild.firstChild,i={doesNotAddBorder:e.offsetTop!==5,doesAddBorderForTableAndCells:h.offsetTop===5},e.style.position="fixed",e.style.top="20px",i.fixedPosition=e.offsetTop===20||e.offsetTop===15,e.style.position=e.style.top="",d.style.overflow="hidden",d.style.position="relative",i.subtractsBorderForOverflowNotVisible=e.offsetTop===-5,i.doesNotIncludeMarginInBodyOffset=r.offsetTop!==j,r.removeChild(a),q=a=null,f.extend(b,i))});return b}();var j=/^(?:\{.*\}|\[.*\])$/,k=/([A-Z])/g;f.extend({cache:{},uuid:0,expando:"jQuery"+(f.fn.jquery+Math.random()).replace(/\D/g,""),noData:{embed:!0,object:"clsid:D27CDB6E-AE6D-11cf-96B8-444553540000",applet:!0},hasData:function(a){a=a.nodeType?f.cache[a[f.expando]]:a[f.expando];return!!a&&!m(a)},data:function(a,c,d,e){if(!!f.acceptData(a)){var g,h,i,j=f.expando,k=typeof c=="string",l=a.nodeType,m=l?f.cache:a,n=l?a[j]:a[j]&&j,o=c==="events";if((!n||!m[n]||!o&&!e&&!m[n].data)&&k&&d===b)return;n||(l?a[j]=n=++f.uuid:n=j),m[n]||(m[n]={},l||(m[n].toJSON=f.noop));if(typeof c=="object"||typeof c=="function")e?m[n]=f.extend(m[n],c):m[n].data=f.extend(m[n].data,c);g=h=m[n],e||(h.data||(h.data={}),h=h.data),d!==b&&(h[f.camelCase(c)]=d);if(o&&!h[c])return g.events;k?(i=h[c],i==null&&(i=h[f.camelCase(c)])):i=h;return i}},removeData:function(a,b,c){if(!!f.acceptData(a)){var d,e,g,h=f.expando,i=a.nodeType,j=i?f.cache:a,k=i?a[h]:h;if(!j[k])return;if(b){d=c?j[k]:j[k].data;if(d){f.isArray(b)||(b in d?b=[b]:(b=f.camelCase(b),b in d?b=[b]:b=b.split(" ")));for(e=0,g=b.length;e-1)return!0;return!1},val:function(a){var c,d,e,g=this[0];{if(!!arguments.length){e=f.isFunction(a);return this.each(function(d){var g=f(this),h;if(this.nodeType===1){e?h=a.call(this,d,g.val()):h=a,h==null?h="":typeof h=="number"?h+="":f.isArray(h)&&(h=f.map(h,function(a){return a==null?"":a+""})),c=f.valHooks[this.nodeName.toLowerCase()]||f.valHooks[this.type];if(!c||!("set"in c)||c.set(this,h,"value")===b)this.value=h}})}if(g){c=f.valHooks[g.nodeName.toLowerCase()]||f.valHooks[g.type];if(c&&"get"in c&&(d=c.get(g,"value"))!==b)return d;d=g.value;return typeof d=="string"?d.replace(q,""):d==null?"":d}}}}),f.extend({valHooks:{option:{get:function(a){var b=a.attributes.value;return!b||b.specified?a.value:a.text}},select:{get:function(a){var b,c,d,e,g=a.selectedIndex,h=[],i=a.options,j=a.type==="select-one";if(g<0)return null;c=j?g:0,d=j?g+1:i.length;for(;c=0}),c.length||(a.selectedIndex=-1);return c}}},attrFn:{val:!0,css:!0,html:!0,text:!0,data:!0,width:!0,height:!0,offset:!0},attr:function(a,c,d,e){var g,h,i,j=a.nodeType;if(!!a&&j!==3&&j!==8&&j!==2){if(e&&c in f.attrFn)return f(a)[c](d);if(typeof a.getAttribute=="undefined")return f.prop(a,c,d);i=j!==1||!f.isXMLDoc(a),i&&(c=c.toLowerCase(),h=f.attrHooks[c]||(u.test(c)?x:w));if(d!==b){if(d===null){f.removeAttr(a,c);return}if(h&&"set"in h&&i&&(g=h.set(a,d,c))!==b)return g;a.setAttribute(c,""+d);return d}if(h&&"get"in h&&i&&(g=h.get(a,c))!==null)return g;g=a.getAttribute(c);return g===null?b:g}},removeAttr:function(a,b){var c,d,e,g,h=0;if(b&&a.nodeType===1){d=b.toLowerCase().split(p),g=d.length;for(;h=0}})});var z=/^(?:textarea|input|select)$/i,A=/^([^\.]*)?(?:\.(.+))?$/,B=/\bhover(\.\S+)?\b/,C=/^key/,D=/^(?:mouse|contextmenu)|click/,E=/^(?:focusinfocus|focusoutblur)$/,F=/^(\w*)(?:#([\w\-]+))?(?:\.([\w\-]+))?$/,G=function(a){var b=F.exec(a);b&&(b[1]=(b[1]||"").toLowerCase(),b[3]=b[3]&&new RegExp("(?:^|\\s)"+b[3]+"(?:\\s|$)"));return b},H=function(a,b){var c=a.attributes||{};return(!b[1]||a.nodeName.toLowerCase()===b[1])&&(!b[2]||(c.id||{}).value===b[2])&&(!b[3]||b[3].test((c["class"]||{}).value))},I=function(a){return f.event.special.hover?a:a.replace(B,"mouseenter$1 mouseleave$1")}; -f.event={add:function(a,c,d,e,g){var h,i,j,k,l,m,n,o,p,q,r,s;if(!(a.nodeType===3||a.nodeType===8||!c||!d||!(h=f._data(a)))){d.handler&&(p=d,d=p.handler),d.guid||(d.guid=f.guid++),j=h.events,j||(h.events=j={}),i=h.handle,i||(h.handle=i=function(a){return typeof f!="undefined"&&(!a||f.event.triggered!==a.type)?f.event.dispatch.apply(i.elem,arguments):b},i.elem=a),c=f.trim(I(c)).split(" ");for(k=0;k=0&&(h=h.slice(0,-1),k=!0),h.indexOf(".")>=0&&(i=h.split("."),h=i.shift(),i.sort());if((!e||f.event.customEvent[h])&&!f.event.global[h])return;c=typeof c=="object"?c[f.expando]?c:new f.Event(h,c):new f.Event(h),c.type=h,c.isTrigger=!0,c.exclusive=k,c.namespace=i.join("."),c.namespace_re=c.namespace?new RegExp("(^|\\.)"+i.join("\\.(?:.*\\.)?")+"(\\.|$)"):null,o=h.indexOf(":")<0?"on"+h:"";if(!e){j=f.cache;for(l in j)j[l].events&&j[l].events[h]&&f.event.trigger(c,d,j[l].handle.elem,!0);return}c.result=b,c.target||(c.target=e),d=d!=null?f.makeArray(d):[],d.unshift(c),p=f.event.special[h]||{};if(p.trigger&&p.trigger.apply(e,d)===!1)return;r=[[e,p.bindType||h]];if(!g&&!p.noBubble&&!f.isWindow(e)){s=p.delegateType||h,m=E.test(s+h)?e:e.parentNode,n=null;for(;m;m=m.parentNode)r.push([m,s]),n=m;n&&n===e.ownerDocument&&r.push([n.defaultView||n.parentWindow||a,s])}for(l=0;le&&i.push({elem:this,matches:d.slice(e)});for(j=0;j0?this.on(b,null,a,c):this.trigger(b)},f.attrFn&&(f.attrFn[b]=!0),C.test(b)&&(f.event.fixHooks[b]=f.event.keyHooks),D.test(b)&&(f.event.fixHooks[b]=f.event.mouseHooks)}),function(){function x(a,b,c,e,f,g){for(var h=0,i=e.length;h0){k=j;break}}j=j[a]}e[h]=k}}}function w(a,b,c,e,f,g){for(var h=0,i=e.length;h+~,(\[\\]+)+|[>+~])(\s*,\s*)?((?:.|\r|\n)*)/g,d="sizcache"+(Math.random()+"").replace(".",""),e=0,g=Object.prototype.toString,h=!1,i=!0,j=/\\/g,k=/\r\n/g,l=/\W/;[0,0].sort(function(){i=!1;return 0});var m=function(b,d,e,f){e=e||[],d=d||c;var h=d;if(d.nodeType!==1&&d.nodeType!==9)return[];if(!b||typeof b!="string")return e;var i,j,k,l,n,q,r,t,u=!0,v=m.isXML(d),w=[],x=b;do{a.exec(""),i=a.exec(x);if(i){x=i[3],w.push(i[1]);if(i[2]){l=i[3];break}}}while(i);if(w.length>1&&p.exec(b))if(w.length===2&&o.relative[w[0]])j=y(w[0]+w[1],d,f);else{j=o.relative[w[0]]?[d]:m(w.shift(),d);while(w.length)b=w.shift(),o.relative[b]&&(b+=w.shift()),j=y(b,j,f)}else{!f&&w.length>1&&d.nodeType===9&&!v&&o.match.ID.test(w[0])&&!o.match.ID.test(w[w.length-1])&&(n=m.find(w.shift(),d,v),d=n.expr?m.filter(n.expr,n.set)[0]:n.set[0]);if(d){n=f?{expr:w.pop(),set:s(f)}:m.find(w.pop(),w.length===1&&(w[0]==="~"||w[0]==="+")&&d.parentNode?d.parentNode:d,v),j=n.expr?m.filter(n.expr,n.set):n.set,w.length>0?k=s(j):u=!1;while(w.length)q=w.pop(),r=q,o.relative[q]?r=w.pop():q="",r==null&&(r=d),o.relative[q](k,r,v)}else k=w=[]}k||(k=j),k||m.error(q||b);if(g.call(k)==="[object Array]")if(!u)e.push.apply(e,k);else if(d&&d.nodeType===1)for(t=0;k[t]!=null;t++)k[t]&&(k[t]===!0||k[t].nodeType===1&&m.contains(d,k[t]))&&e.push(j[t]);else for(t=0;k[t]!=null;t++)k[t]&&k[t].nodeType===1&&e.push(j[t]);else s(k,e);l&&(m(l,h,e,f),m.uniqueSort(e));return e};m.uniqueSort=function(a){if(u){h=i,a.sort(u);if(h)for(var b=1;b0},m.find=function(a,b,c){var d,e,f,g,h,i;if(!a)return[];for(e=0,f=o.order.length;e":function(a,b){var c,d=typeof b=="string",e=0,f=a.length;if(d&&!l.test(b)){b=b.toLowerCase();for(;e=0)?c||d.push(h):c&&(b[g]=!1));return!1},ID:function(a){return a[1].replace(j,"")},TAG:function(a,b){return a[1].replace(j,"").toLowerCase()},CHILD:function(a){if(a[1]==="nth"){a[2]||m.error(a[0]),a[2]=a[2].replace(/^\+|\s*/g,"");var b=/(-?)(\d*)(?:n([+\-]?\d*))?/.exec(a[2]==="even"&&"2n"||a[2]==="odd"&&"2n+1"||!/\D/.test(a[2])&&"0n+"+a[2]||a[2]);a[2]=b[1]+(b[2]||1)-0,a[3]=b[3]-0}else a[2]&&m.error(a[0]);a[0]=e++;return a},ATTR:function(a,b,c,d,e,f){var g=a[1]=a[1].replace(j,"");!f&&o.attrMap[g]&&(a[1]=o.attrMap[g]),a[4]=(a[4]||a[5]||"").replace(j,""),a[2]==="~="&&(a[4]=" "+a[4]+" ");return a},PSEUDO:function(b,c,d,e,f){if(b[1]==="not")if((a.exec(b[3])||"").length>1||/^\w/.test(b[3]))b[3]=m(b[3],null,null,c);else{var g=m.filter(b[3],c,d,!0^f);d||e.push.apply(e,g);return!1}else if(o.match.POS.test(b[0])||o.match.CHILD.test(b[0]))return!0;return b},POS:function(a){a.unshift(!0);return a}},filters:{enabled:function(a){return a.disabled===!1&&a.type!=="hidden"},disabled:function(a){return a.disabled===!0},checked:function(a){return a.checked===!0},selected:function(a){a.parentNode&&a.parentNode.selectedIndex;return a.selected===!0},parent:function(a){return!!a.firstChild},empty:function(a){return!a.firstChild},has:function(a,b,c){return!!m(c[3],a).length},header:function(a){return/h\d/i.test(a.nodeName)},text:function(a){var b=a.getAttribute("type"),c=a.type;return a.nodeName.toLowerCase()==="input"&&"text"===c&&(b===c||b===null)},radio:function(a){return a.nodeName.toLowerCase()==="input"&&"radio"===a.type},checkbox:function(a){return a.nodeName.toLowerCase()==="input"&&"checkbox"===a.type},file:function(a){return a.nodeName.toLowerCase()==="input"&&"file"===a.type},password:function(a){return a.nodeName.toLowerCase()==="input"&&"password"===a.type},submit:function(a){var b=a.nodeName.toLowerCase();return(b==="input"||b==="button")&&"submit"===a.type},image:function(a){return a.nodeName.toLowerCase()==="input"&&"image"===a.type},reset:function(a){var b=a.nodeName.toLowerCase();return(b==="input"||b==="button")&&"reset"===a.type},button:function(a){var b=a.nodeName.toLowerCase();return b==="input"&&"button"===a.type||b==="button"},input:function(a){return/input|select|textarea|button/i.test(a.nodeName)},focus:function(a){return a===a.ownerDocument.activeElement}},setFilters:{first:function(a,b){return b===0},last:function(a,b,c,d){return b===d.length-1},even:function(a,b){return b%2===0},odd:function(a,b){return b%2===1},lt:function(a,b,c){return bc[3]-0},nth:function(a,b,c){return c[3]-0===b},eq:function(a,b,c){return c[3]-0===b}},filter:{PSEUDO:function(a,b,c,d){var e=b[1],f=o.filters[e];if(f)return f(a,c,b,d);if(e==="contains")return(a.textContent||a.innerText||n([a])||"").indexOf(b[3])>=0;if(e==="not"){var g=b[3];for(var h=0,i=g.length;h=0}},ID:function(a,b){return a.nodeType===1&&a.getAttribute("id")===b},TAG:function(a,b){return b==="*"&&a.nodeType===1||!!a.nodeName&&a.nodeName.toLowerCase()===b},CLASS:function(a,b){return(" "+(a.className||a.getAttribute("class"))+" ").indexOf(b)>-1},ATTR:function(a,b){var c=b[1],d=m.attr?m.attr(a,c):o.attrHandle[c]?o.attrHandle[c](a):a[c]!=null?a[c]:a.getAttribute(c),e=d+"",f=b[2],g=b[4];return d==null?f==="!=":!f&&m.attr?d!=null:f==="="?e===g:f==="*="?e.indexOf(g)>=0:f==="~="?(" "+e+" ").indexOf(g)>=0:g?f==="!="?e!==g:f==="^="?e.indexOf(g)===0:f==="$="?e.substr(e.length-g.length)===g:f==="|="?e===g||e.substr(0,g.length+1)===g+"-":!1:e&&d!==!1},POS:function(a,b,c,d){var e=b[2],f=o.setFilters[e];if(f)return f(a,c,b,d)}}},p=o.match.POS,q=function(a,b){return"\\"+(b-0+1)};for(var r in o.match)o.match[r]=new RegExp(o.match[r].source+/(?![^\[]*\])(?![^\(]*\))/.source),o.leftMatch[r]=new RegExp(/(^(?:.|\r|\n)*?)/.source+o.match[r].source.replace(/\\(\d+)/g,q));var s=function(a,b){a=Array.prototype.slice.call(a,0);if(b){b.push.apply(b,a);return b}return a};try{Array.prototype.slice.call(c.documentElement.childNodes,0)[0].nodeType}catch(t){s=function(a,b){var c=0,d=b||[];if(g.call(a)==="[object Array]")Array.prototype.push.apply(d,a);else if(typeof a.length=="number")for(var e=a.length;c",e.insertBefore(a,e.firstChild),c.getElementById(d)&&(o.find.ID=function(a,c,d){if(typeof c.getElementById!="undefined"&&!d){var e=c.getElementById(a[1]);return e?e.id===a[1]||typeof e.getAttributeNode!="undefined"&&e.getAttributeNode("id").nodeValue===a[1]?[e]:b:[]}},o.filter.ID=function(a,b){var c=typeof a.getAttributeNode!="undefined"&&a.getAttributeNode("id");return a.nodeType===1&&c&&c.nodeValue===b}),e.removeChild(a),e=a=null}(),function(){var a=c.createElement("div");a.appendChild(c.createComment("")),a.getElementsByTagName("*").length>0&&(o.find.TAG=function(a,b){var c=b.getElementsByTagName(a[1]);if(a[1]==="*"){var d=[];for(var e=0;c[e];e++)c[e].nodeType===1&&d.push(c[e]);c=d}return c}),a.innerHTML="",a.firstChild&&typeof a.firstChild.getAttribute!="undefined"&&a.firstChild.getAttribute("href")!=="#"&&(o.attrHandle.href=function(a){return a.getAttribute("href",2)}),a=null}(),c.querySelectorAll&&function(){var a=m,b=c.createElement("div"),d="__sizzle__";b.innerHTML="

";if(!b.querySelectorAll||b.querySelectorAll(".TEST").length!==0){m=function(b,e,f,g){e=e||c;if(!g&&!m.isXML(e)){var h=/^(\w+$)|^\.([\w\-]+$)|^#([\w\-]+$)/.exec(b);if(h&&(e.nodeType===1||e.nodeType===9)){if(h[1])return s(e.getElementsByTagName(b),f);if(h[2]&&o.find.CLASS&&e.getElementsByClassName)return s(e.getElementsByClassName(h[2]),f)}if(e.nodeType===9){if(b==="body"&&e.body)return s([e.body],f);if(h&&h[3]){var i=e.getElementById(h[3]);if(!i||!i.parentNode)return s([],f);if(i.id===h[3])return s([i],f)}try{return s(e.querySelectorAll(b),f)}catch(j){}}else if(e.nodeType===1&&e.nodeName.toLowerCase()!=="object"){var k=e,l=e.getAttribute("id"),n=l||d,p=e.parentNode,q=/^\s*[+~]/.test(b);l?n=n.replace(/'/g,"\\$&"):e.setAttribute("id",n),q&&p&&(e=e.parentNode);try{if(!q||p)return s(e.querySelectorAll("[id='"+n+"'] "+b),f)}catch(r){}finally{l||k.removeAttribute("id")}}}return a(b,e,f,g)};for(var e in a)m[e]=a[e];b=null}}(),function(){var a=c.documentElement,b=a.matchesSelector||a.mozMatchesSelector||a.webkitMatchesSelector||a.msMatchesSelector;if(b){var d=!b.call(c.createElement("div"),"div"),e=!1;try{b.call(c.documentElement,"[test!='']:sizzle")}catch(f){e=!0}m.matchesSelector=function(a,c){c=c.replace(/\=\s*([^'"\]]*)\s*\]/g,"='$1']");if(!m.isXML(a))try{if(e||!o.match.PSEUDO.test(c)&&!/!=/.test(c)){var f=b.call(a,c);if(f||!d||a.document&&a.document.nodeType!==11)return f}}catch(g){}return m(c,null,null,[a]).length>0}}}(),function(){var a=c.createElement("div");a.innerHTML="
";if(!!a.getElementsByClassName&&a.getElementsByClassName("e").length!==0){a.lastChild.className="e";if(a.getElementsByClassName("e").length===1)return;o.order.splice(1,0,"CLASS"),o.find.CLASS=function(a,b,c){if(typeof b.getElementsByClassName!="undefined"&&!c)return b.getElementsByClassName(a[1])},a=null}}(),c.documentElement.contains?m.contains=function(a,b){return a!==b&&(a.contains?a.contains(b):!0)}:c.documentElement.compareDocumentPosition?m.contains=function(a,b){return!!(a.compareDocumentPosition(b)&16)}:m.contains=function(){return!1},m.isXML=function(a){var b=(a?a.ownerDocument||a:0).documentElement;return b?b.nodeName!=="HTML":!1};var y=function(a,b,c){var d,e=[],f="",g=b.nodeType?[b]:b;while(d=o.match.PSEUDO.exec(a))f+=d[0],a=a.replace(o.match.PSEUDO,"");a=o.relative[a]?a+"*":a;for(var h=0,i=g.length;h0)for(h=g;h=0:f.filter(a,this).length>0:this.filter(a).length>0)},closest:function(a,b){var c=[],d,e,g=this[0];if(f.isArray(a)){var h=1;while(g&&g.ownerDocument&&g!==b){for(d=0;d-1:f.find.matchesSelector(g,a)){c.push(g);break}g=g.parentNode;if(!g||!g.ownerDocument||g===b||g.nodeType===11)break}}c=c.length>1?f.unique(c):c;return this.pushStack(c,"closest",a)},index:function(a){if(!a)return this[0]&&this[0].parentNode?this.prevAll().length:-1;if(typeof a=="string")return f.inArray(this[0],f(a));return f.inArray(a.jquery?a[0]:a,this)},add:function(a,b){var c=typeof a=="string"?f(a,b):f.makeArray(a&&a.nodeType?[a]:a),d=f.merge(this.get(),c);return this.pushStack(S(c[0])||S(d[0])?d:f.unique(d))},andSelf:function(){return this.add(this.prevObject)}}),f.each({parent:function(a){var b=a.parentNode;return b&&b.nodeType!==11?b:null},parents:function(a){return f.dir(a,"parentNode")},parentsUntil:function(a,b,c){return f.dir(a,"parentNode",c)},next:function(a){return f.nth(a,2,"nextSibling")},prev:function(a){return f.nth(a,2,"previousSibling")},nextAll:function(a){return f.dir(a,"nextSibling")},prevAll:function(a){return f.dir(a,"previousSibling")},nextUntil:function(a,b,c){return f.dir(a,"nextSibling",c)},prevUntil:function(a,b,c){return f.dir(a,"previousSibling",c)},siblings:function(a){return f.sibling(a.parentNode.firstChild,a)},children:function(a){return f.sibling(a.firstChild)},contents:function(a){return f.nodeName(a,"iframe")?a.contentDocument||a.contentWindow.document:f.makeArray(a.childNodes)}},function(a,b){f.fn[a]=function(c,d){var e=f.map(this,b,c);L.test(a)||(d=c),d&&typeof d=="string"&&(e=f.filter(d,e)),e=this.length>1&&!R[a]?f.unique(e):e,(this.length>1||N.test(d))&&M.test(a)&&(e=e.reverse());return this.pushStack(e,a,P.call(arguments).join(","))}}),f.extend({filter:function(a,b,c){c&&(a=":not("+a+")");return b.length===1?f.find.matchesSelector(b[0],a)?[b[0]]:[]:f.find.matches(a,b)},dir:function(a,c,d){var e=[],g=a[c];while(g&&g.nodeType!==9&&(d===b||g.nodeType!==1||!f(g).is(d)))g.nodeType===1&&e.push(g),g=g[c];return e},nth:function(a,b,c,d){b=b||1;var e=0;for(;a;a=a[c])if(a.nodeType===1&&++e===b)break;return a},sibling:function(a,b){var c=[];for(;a;a=a.nextSibling)a.nodeType===1&&a!==b&&c.push(a);return c}});var V="abbr|article|aside|audio|canvas|datalist|details|figcaption|figure|footer|header|hgroup|mark|meter|nav|output|progress|section|summary|time|video",W=/ jQuery\d+="(?:\d+|null)"/g,X=/^\s+/,Y=/<(?!area|br|col|embed|hr|img|input|link|meta|param)(([\w:]+)[^>]*)\/>/ig,Z=/<([\w:]+)/,$=/",""],legend:[1,"
","
"],thead:[1,"","
"],tr:[2,"","
"],td:[3,"","
"],col:[2,"","
"],area:[1,"",""],_default:[0,"",""]},bh=U(c);bg.optgroup=bg.option,bg.tbody=bg.tfoot=bg.colgroup=bg.caption=bg.thead,bg.th=bg.td,f.support.htmlSerialize||(bg._default=[1,"div
","
"]),f.fn.extend({text:function(a){if(f.isFunction(a))return this.each(function(b){var c=f(this);c.text(a.call(this,b,c.text()))});if(typeof a!="object"&&a!==b)return this.empty().append((this[0]&&this[0].ownerDocument||c).createTextNode(a));return f.text(this)},wrapAll:function(a){if(f.isFunction(a))return this.each(function(b){f(this).wrapAll(a.call(this,b))});if(this[0]){var b=f(a,this[0].ownerDocument).eq(0).clone(!0);this[0].parentNode&&b.insertBefore(this[0]),b.map(function(){var a=this;while(a.firstChild&&a.firstChild.nodeType===1)a=a.firstChild;return a}).append(this)}return this},wrapInner:function(a){if(f.isFunction(a))return this.each(function(b){f(this).wrapInner(a.call(this,b))});return this.each(function(){var b=f(this),c=b.contents();c.length?c.wrapAll(a):b.append(a)})},wrap:function(a){var b=f.isFunction(a);return this.each(function(c){f(this).wrapAll(b?a.call(this,c):a)})},unwrap:function(){return this.parent().each(function(){f.nodeName(this,"body")||f(this).replaceWith(this.childNodes)}).end()},append:function(){return this.domManip(arguments,!0,function(a){this.nodeType===1&&this.appendChild(a)})},prepend:function(){return this.domManip(arguments,!0,function(a){this.nodeType===1&&this.insertBefore(a,this.firstChild)})},before:function(){if(this[0]&&this[0].parentNode)return this.domManip(arguments,!1,function(a){this.parentNode.insertBefore(a,this)});if(arguments.length){var a=f.clean(arguments);a.push.apply(a,this.toArray());return this.pushStack(a,"before",arguments)}},after:function(){if(this[0]&&this[0].parentNode)return this.domManip(arguments,!1,function(a){this.parentNode.insertBefore(a,this.nextSibling)});if(arguments.length){var a=this.pushStack(this,"after",arguments);a.push.apply(a,f.clean(arguments));return a}},remove:function(a,b){for(var c=0,d;(d=this[c])!=null;c++)if(!a||f.filter(a,[d]).length)!b&&d.nodeType===1&&(f.cleanData(d.getElementsByTagName("*")),f.cleanData([d])),d.parentNode&&d.parentNode.removeChild(d);return this},empty:function() -{for(var a=0,b;(b=this[a])!=null;a++){b.nodeType===1&&f.cleanData(b.getElementsByTagName("*"));while(b.firstChild)b.removeChild(b.firstChild)}return this},clone:function(a,b){a=a==null?!1:a,b=b==null?a:b;return this.map(function(){return f.clone(this,a,b)})},html:function(a){if(a===b)return this[0]&&this[0].nodeType===1?this[0].innerHTML.replace(W,""):null;if(typeof a=="string"&&!ba.test(a)&&(f.support.leadingWhitespace||!X.test(a))&&!bg[(Z.exec(a)||["",""])[1].toLowerCase()]){a=a.replace(Y,"<$1>");try{for(var c=0,d=this.length;c1&&l0?this.clone(!0):this).get();f(e[h])[b](j),d=d.concat(j)}return this.pushStack(d,a,e.selector)}}),f.extend({clone:function(a,b,c){var d,e,g,h=f.support.html5Clone||!bc.test("<"+a.nodeName)?a.cloneNode(!0):bo(a);if((!f.support.noCloneEvent||!f.support.noCloneChecked)&&(a.nodeType===1||a.nodeType===11)&&!f.isXMLDoc(a)){bk(a,h),d=bl(a),e=bl(h);for(g=0;d[g];++g)e[g]&&bk(d[g],e[g])}if(b){bj(a,h);if(c){d=bl(a),e=bl(h);for(g=0;d[g];++g)bj(d[g],e[g])}}d=e=null;return h},clean:function(a,b,d,e){var g;b=b||c,typeof b.createElement=="undefined"&&(b=b.ownerDocument||b[0]&&b[0].ownerDocument||c);var h=[],i;for(var j=0,k;(k=a[j])!=null;j++){typeof k=="number"&&(k+="");if(!k)continue;if(typeof k=="string")if(!_.test(k))k=b.createTextNode(k);else{k=k.replace(Y,"<$1>");var l=(Z.exec(k)||["",""])[1].toLowerCase(),m=bg[l]||bg._default,n=m[0],o=b.createElement("div");b===c?bh.appendChild(o):U(b).appendChild(o),o.innerHTML=m[1]+k+m[2];while(n--)o=o.lastChild;if(!f.support.tbody){var p=$.test(k),q=l==="table"&&!p?o.firstChild&&o.firstChild.childNodes:m[1]===""&&!p?o.childNodes:[];for(i=q.length-1;i>=0;--i)f.nodeName(q[i],"tbody")&&!q[i].childNodes.length&&q[i].parentNode.removeChild(q[i])}!f.support.leadingWhitespace&&X.test(k)&&o.insertBefore(b.createTextNode(X.exec(k)[0]),o.firstChild),k=o.childNodes}var r;if(!f.support.appendChecked)if(k[0]&&typeof (r=k.length)=="number")for(i=0;i=0)return b+"px"}}}),f.support.opacity||(f.cssHooks.opacity={get:function(a,b){return br.test((b&&a.currentStyle?a.currentStyle.filter:a.style.filter)||"")?parseFloat(RegExp.$1)/100+"":b?"1":""},set:function(a,b){var c=a.style,d=a.currentStyle,e=f.isNumeric(b)?"alpha(opacity="+b*100+")":"",g=d&&d.filter||c.filter||"";c.zoom=1;if(b>=1&&f.trim(g.replace(bq,""))===""){c.removeAttribute("filter");if(d&&!d.filter)return}c.filter=bq.test(g)?g.replace(bq,e):g+" "+e}}),f(function(){f.support.reliableMarginRight||(f.cssHooks.marginRight={get:function(a,b){var c;f.swap(a,{display:"inline-block"},function(){b?c=bz(a,"margin-right","marginRight"):c=a.style.marginRight});return c}})}),c.defaultView&&c.defaultView.getComputedStyle&&(bA=function(a,b){var c,d,e;b=b.replace(bs,"-$1").toLowerCase(),(d=a.ownerDocument.defaultView)&&(e=d.getComputedStyle(a,null))&&(c=e.getPropertyValue(b),c===""&&!f.contains(a.ownerDocument.documentElement,a)&&(c=f.style(a,b)));return c}),c.documentElement.currentStyle&&(bB=function(a,b){var c,d,e,f=a.currentStyle&&a.currentStyle[b],g=a.style;f===null&&g&&(e=g[b])&&(f=e),!bt.test(f)&&bu.test(f)&&(c=g.left,d=a.runtimeStyle&&a.runtimeStyle.left,d&&(a.runtimeStyle.left=a.currentStyle.left),g.left=b==="fontSize"?"1em":f||0,f=g.pixelLeft+"px",g.left=c,d&&(a.runtimeStyle.left=d));return f===""?"auto":f}),bz=bA||bB,f.expr&&f.expr.filters&&(f.expr.filters.hidden=function(a){var b=a.offsetWidth,c=a.offsetHeight;return b===0&&c===0||!f.support.reliableHiddenOffsets&&(a.style&&a.style.display||f.css(a,"display"))==="none"},f.expr.filters.visible=function(a){return!f.expr.filters.hidden(a)});var bD=/%20/g,bE=/\[\]$/,bF=/\r?\n/g,bG=/#.*$/,bH=/^(.*?):[ \t]*([^\r\n]*)\r?$/mg,bI=/^(?:color|date|datetime|datetime-local|email|hidden|month|number|password|range|search|tel|text|time|url|week)$/i,bJ=/^(?:about|app|app\-storage|.+\-extension|file|res|widget):$/,bK=/^(?:GET|HEAD)$/,bL=/^\/\//,bM=/\?/,bN=/)<[^<]*)*<\/script>/gi,bO=/^(?:select|textarea)/i,bP=/\s+/,bQ=/([?&])_=[^&]*/,bR=/^([\w\+\.\-]+:)(?:\/\/([^\/?#:]*)(?::(\d+))?)?/,bS=f.fn.load,bT={},bU={},bV,bW,bX=["*/"]+["*"];try{bV=e.href}catch(bY){bV=c.createElement("a"),bV.href="",bV=bV.href}bW=bR.exec(bV.toLowerCase())||[],f.fn.extend({load:function(a,c,d){if(typeof a!="string"&&bS)return bS.apply(this,arguments);if(!this.length)return this;var e=a.indexOf(" ");if(e>=0){var g=a.slice(e,a.length);a=a.slice(0,e)}var h="GET";c&&(f.isFunction(c)?(d=c,c=b):typeof c=="object"&&(c=f.param(c,f.ajaxSettings.traditional),h="POST"));var i=this;f.ajax({url:a,type:h,dataType:"html",data:c,complete:function(a,b,c){c=a.responseText,a.isResolved()&&(a.done(function(a){c=a}),i.html(g?f("
").append(c.replace(bN,"")).find(g):c)),d&&i.each(d,[c,b,a])}});return this},serialize:function(){return f.param(this.serializeArray())},serializeArray:function(){return this.map(function(){return this.elements?f.makeArray(this.elements):this}).filter(function(){return this.name&&!this.disabled&&(this.checked||bO.test(this.nodeName)||bI.test(this.type))}).map(function(a,b){var c=f(this).val();return c==null?null:f.isArray(c)?f.map(c,function(a,c){return{name:b.name,value:a.replace(bF,"\r\n")}}):{name:b.name,value:c.replace(bF,"\r\n")}}).get()}}),f.each("ajaxStart ajaxStop ajaxComplete ajaxError ajaxSuccess ajaxSend".split(" "),function(a,b){f.fn[b]=function(a){return this.on(b,a)}}),f.each(["get","post"],function(a,c){f[c]=function(a,d,e,g){f.isFunction(d)&&(g=g||e,e=d,d=b);return f.ajax({type:c,url:a,data:d,success:e,dataType:g})}}),f.extend({getScript:function(a,c){return f.get(a,b,c,"script")},getJSON:function(a,b,c){return f.get(a,b,c,"json")},ajaxSetup:function(a,b){b?b_(a,f.ajaxSettings):(b=a,a=f.ajaxSettings),b_(a,b);return a},ajaxSettings:{url:bV,isLocal:bJ.test(bW[1]),global:!0,type:"GET",contentType:"application/x-www-form-urlencoded",processData:!0,async:!0,accepts:{xml:"application/xml, text/xml",html:"text/html",text:"text/plain",json:"application/json, text/javascript","*":bX},contents:{xml:/xml/,html:/html/,json:/json/},responseFields:{xml:"responseXML",text:"responseText"},converters:{"* text":a.String,"text html":!0,"text json":f.parseJSON,"text xml":f.parseXML},flatOptions:{context:!0,url:!0}},ajaxPrefilter:bZ(bT),ajaxTransport:bZ(bU),ajax:function(a,c){function w(a,c,l,m){if(s!==2){s=2,q&&clearTimeout(q),p=b,n=m||"",v.readyState=a>0?4:0;var o,r,u,w=c,x=l?cb(d,v,l):b,y,z;if(a>=200&&a<300||a===304){if(d.ifModified){if(y=v.getResponseHeader("Last-Modified"))f.lastModified[k]=y;if(z=v.getResponseHeader("Etag"))f.etag[k]=z}if(a===304)w="notmodified",o=!0;else try{r=cc(d,x),w="success",o=!0}catch(A){w="parsererror",u=A}}else{u=w;if(!w||a)w="error",a<0&&(a=0)}v.status=a,v.statusText=""+(c||w),o?h.resolveWith(e,[r,w,v]):h.rejectWith(e,[v,w,u]),v.statusCode(j),j=b,t&&g.trigger("ajax"+(o?"Success":"Error"),[v,d,o?r:u]),i.fireWith(e,[v,w]),t&&(g.trigger("ajaxComplete",[v,d]),--f.active||f.event.trigger("ajaxStop"))}}typeof a=="object"&&(c=a,a=b),c=c||{};var d=f.ajaxSetup({},c),e=d.context||d,g=e!==d&&(e.nodeType||e instanceof f)?f(e):f.event,h=f.Deferred(),i=f.Callbacks("once memory"),j=d.statusCode||{},k,l={},m={},n,o,p,q,r,s=0,t,u,v={readyState:0,setRequestHeader:function(a,b){if(!s){var c=a.toLowerCase();a=m[c]=m[c]||a,l[a]=b}return this},getAllResponseHeaders:function(){return s===2?n:null},getResponseHeader:function(a){var c;if(s===2){if(!o){o={};while(c=bH.exec(n))o[c[1].toLowerCase()]=c[2]}c=o[a.toLowerCase()]}return c===b?null:c},overrideMimeType:function(a){s||(d.mimeType=a);return this},abort:function(a){a=a||"abort",p&&p.abort(a),w(0,a);return this}};h.promise(v),v.success=v.done,v.error=v.fail,v.complete=i.add,v.statusCode=function(a){if(a){var b;if(s<2)for(b in a)j[b]=[j[b],a[b]];else b=a[v.status],v.then(b,b)}return this},d.url=((a||d.url)+"").replace(bG,"").replace(bL,bW[1]+"//"),d.dataTypes=f.trim(d.dataType||"*").toLowerCase().split(bP),d.crossDomain==null&&(r=bR.exec(d.url.toLowerCase()),d.crossDomain=!(!r||r[1]==bW[1]&&r[2]==bW[2]&&(r[3]||(r[1]==="http:"?80:443))==(bW[3]||(bW[1]==="http:"?80:443)))),d.data&&d.processData&&typeof d.data!="string"&&(d.data=f.param(d.data,d.traditional)),b$(bT,d,c,v);if(s===2)return!1;t=d.global,d.type=d.type.toUpperCase(),d.hasContent=!bK.test(d.type),t&&f.active++===0&&f.event.trigger("ajaxStart");if(!d.hasContent){d.data&&(d.url+=(bM.test(d.url)?"&":"?")+d.data,delete d.data),k=d.url;if(d.cache===!1){var x=f.now(),y=d.url.replace(bQ,"$1_="+x);d.url=y+(y===d.url?(bM.test(d.url)?"&":"?")+"_="+x:"")}}(d.data&&d.hasContent&&d.contentType!==!1||c.contentType)&&v.setRequestHeader("Content-Type",d.contentType),d.ifModified&&(k=k||d.url,f.lastModified[k]&&v.setRequestHeader("If-Modified-Since",f.lastModified[k]),f.etag[k]&&v.setRequestHeader("If-None-Match",f.etag[k])),v.setRequestHeader("Accept",d.dataTypes[0]&&d.accepts[d.dataTypes[0]]?d.accepts[d.dataTypes[0]]+(d.dataTypes[0]!=="*"?", "+bX+"; q=0.01":""):d.accepts["*"]);for(u in d.headers)v.setRequestHeader(u,d.headers[u]);if(d.beforeSend&&(d.beforeSend.call(e,v,d)===!1||s===2)){v.abort();return!1}for(u in{success:1,error:1,complete:1})v[u](d[u]);p=b$(bU,d,c,v);if(!p)w(-1,"No Transport");else{v.readyState=1,t&&g.trigger("ajaxSend",[v,d]),d.async&&d.timeout>0&&(q=setTimeout(function(){v.abort("timeout")},d.timeout));try{s=1,p.send(l,w)}catch(z){if(s<2)w(-1,z);else throw z}}return v},param:function(a,c){var d=[],e=function(a,b){b=f.isFunction(b)?b():b,d[d.length]=encodeURIComponent(a)+"="+encodeURIComponent(b)};c===b&&(c=f.ajaxSettings.traditional);if(f.isArray(a)||a.jquery&&!f.isPlainObject(a))f.each(a,function(){e(this.name,this.value)});else for(var g in a)ca(g,a[g],c,e);return d.join("&").replace(bD,"+")}}),f.extend({active:0,lastModified:{},etag:{}});var cd=f.now(),ce=/(\=)\?(&|$)|\?\?/i;f.ajaxSetup({jsonp:"callback",jsonpCallback:function(){return f.expando+"_"+cd++}}),f.ajaxPrefilter("json jsonp",function(b,c,d){var e=b.contentType==="application/x-www-form-urlencoded"&&typeof b.data=="string";if(b.dataTypes[0]==="jsonp"||b.jsonp!==!1&&(ce.test(b.url)||e&&ce.test(b.data))){var g,h=b.jsonpCallback=f.isFunction(b.jsonpCallback)?b.jsonpCallback():b.jsonpCallback,i=a[h],j=b.url,k=b.data,l="$1"+h+"$2";b.jsonp!==!1&&(j=j.replace(ce,l),b.url===j&&(e&&(k=k.replace(ce,l)),b.data===k&&(j+=(/\?/.test(j)?"&":"?")+b.jsonp+"="+h))),b.url=j,b.data=k,a[h]=function(a){g=[a]},d.always(function(){a[h]=i,g&&f.isFunction(i)&&a[h](g[0])}),b.converters["script json"]=function(){g||f.error(h+" was not called");return g[0]},b.dataTypes[0]="json";return"script"}}),f.ajaxSetup({accepts:{script:"text/javascript, application/javascript, application/ecmascript, application/x-ecmascript"},contents:{script:/javascript|ecmascript/},converters:{"text script":function(a){f.globalEval(a);return a}}}),f.ajaxPrefilter("script",function(a){a.cache===b&&(a.cache=!1),a.crossDomain&&(a.type="GET",a.global=!1)}),f.ajaxTransport("script",function(a){if(a.crossDomain){var d,e=c.head||c.getElementsByTagName("head")[0]||c.documentElement;return{send:function(f,g){d=c.createElement("script"),d.async="async",a.scriptCharset&&(d.charset=a.scriptCharset),d.src=a.url,d.onload=d.onreadystatechange=function(a,c){if(c||!d.readyState||/loaded|complete/.test(d.readyState))d.onload=d.onreadystatechange=null,e&&d.parentNode&&e.removeChild(d),d=b,c||g(200,"success")},e.insertBefore(d,e.firstChild)},abort:function(){d&&d.onload(0,1)}}}});var cf=a.ActiveXObject?function(){for(var a in ch)ch[a](0,1)}:!1,cg=0,ch;f.ajaxSettings.xhr=a.ActiveXObject?function(){return!this.isLocal&&ci()||cj()}:ci,function(a){f.extend(f.support,{ajax:!!a,cors:!!a&&"withCredentials"in a})}(f.ajaxSettings.xhr()),f.support.ajax&&f.ajaxTransport(function(c){if(!c.crossDomain||f.support.cors){var d;return{send:function(e,g){var h=c.xhr(),i,j;c.username?h.open(c.type,c.url,c.async,c.username,c.password):h.open(c.type,c.url,c.async);if(c.xhrFields)for(j in c.xhrFields)h[j]=c.xhrFields[j];c.mimeType&&h.overrideMimeType&&h.overrideMimeType(c.mimeType),!c.crossDomain&&!e["X-Requested-With"]&&(e["X-Requested-With"]="XMLHttpRequest");try{for(j in e)h.setRequestHeader(j,e[j])}catch(k){}h.send(c.hasContent&&c.data||null),d=function(a,e){var j,k,l,m,n;try{if(d&&(e||h.readyState===4)){d=b,i&&(h.onreadystatechange=f.noop,cf&&delete ch[i]);if(e)h.readyState!==4&&h.abort();else{j=h.status,l=h.getAllResponseHeaders(),m={},n=h.responseXML,n&&n.documentElement&&(m.xml=n),m.text=h.responseText;try{k=h.statusText}catch(o){k=""}!j&&c.isLocal&&!c.crossDomain?j=m.text?200:404:j===1223&&(j=204)}}}catch(p){e||g(-1,p)}m&&g(j,k,m,l)},!c.async||h.readyState===4?d():(i=++cg,cf&&(ch||(ch={},f(a).unload(cf)),ch[i]=d),h.onreadystatechange=d)},abort:function(){d&&d(0,1)}}}});var ck={},cl,cm,cn=/^(?:toggle|show|hide)$/,co=/^([+\-]=)?([\d+.\-]+)([a-z%]*)$/i,cp,cq=[["height","marginTop","marginBottom","paddingTop","paddingBottom"],["width","marginLeft","marginRight","paddingLeft","paddingRight"],["opacity"]],cr;f.fn.extend({show:function(a,b,c){var d,e;if(a||a===0)return this.animate(cu("show",3),a,b,c);for(var g=0,h=this.length;g=i.duration+this.startTime){this.now=this.end,this.pos=this.state=1,this.update(),i.animatedProperties[this.prop]=!0;for(b in i.animatedProperties)i.animatedProperties[b]!==!0&&(g=!1);if(g){i.overflow!=null&&!f.support.shrinkWrapBlocks&&f.each(["","X","Y"],function(a,b){h.style["overflow"+b]=i.overflow[a]}),i.hide&&f(h).hide();if(i.hide||i.show)for(b in i.animatedProperties)f.style(h,b,i.orig[b]),f.removeData(h,"fxshow"+b,!0),f.removeData(h,"toggle"+b,!0);d=i.complete,d&&(i.complete=!1,d.call(h))}return!1}i.duration==Infinity?this.now=e:(c=e-this.startTime,this.state=c/i.duration,this.pos=f.easing[i.animatedProperties[this.prop]](this.state,c,0,1,i.duration),this.now=this.start+(this.end-this.start)*this.pos),this.update();return!0}},f.extend(f.fx,{tick:function(){var a,b=f.timers,c=0;for(;c-1,k={},l={},m,n;j?(l=e.position(),m=l.top,n=l.left):(m=parseFloat(h)||0,n=parseFloat(i)||0),f.isFunction(b)&&(b=b.call(a,c,g)),b.top!=null&&(k.top=b.top-g.top+m),b.left!=null&&(k.left=b.left-g.left+n),"using"in b?b.using.call(a,k):e.css(k)}},f.fn.extend({position:function(){if(!this[0])return null;var a=this[0],b=this.offsetParent(),c=this.offset(),d=cx.test(b[0].nodeName)?{top:0,left:0}:b.offset();c.top-=parseFloat(f.css(a,"marginTop"))||0,c.left-=parseFloat(f.css(a,"marginLeft"))||0,d.top+=parseFloat(f.css(b[0],"borderTopWidth"))||0,d.left+=parseFloat(f.css(b[0],"borderLeftWidth"))||0;return{top:c.top-d.top,left:c.left-d.left}},offsetParent:function(){return this.map(function(){var a=this.offsetParent||c.body;while(a&&!cx.test(a.nodeName)&&f.css(a,"position")==="static")a=a.offsetParent;return a})}}),f.each(["Left","Top"],function(a,c){var d="scroll"+c;f.fn[d]=function(c){var e,g;if(c===b){e=this[0];if(!e)return null;g=cy(e);return g?"pageXOffset"in g?g[a?"pageYOffset":"pageXOffset"]:f.support.boxModel&&g.document.documentElement[d]||g.document.body[d]:e[d]}return this.each(function(){g=cy(this),g?g.scrollTo(a?f(g).scrollLeft():c,a?c:f(g).scrollTop()):this[d]=c})}}),f.each(["Height","Width"],function(a,c){var d=c.toLowerCase();f.fn["inner"+c]=function(){var a=this[0];return a?a.style?parseFloat(f.css(a,d,"padding")):this[d]():null},f.fn["outer"+c]=function(a){var b=this[0];return b?b.style?parseFloat(f.css(b,d,a?"margin":"border")):this[d]():null},f.fn[d]=function(a){var e=this[0];if(!e)return a==null?null:this;if(f.isFunction(a))return this.each(function(b){var c=f(this);c[d](a.call(this,b,c[d]()))});if(f.isWindow(e)){var g=e.document.documentElement["client"+c],h=e.document.body;return e.document.compatMode==="CSS1Compat"&&g||h&&h["client"+c]||g}if(e.nodeType===9)return Math.max(e.documentElement["client"+c],e.body["scroll"+c],e.documentElement["scroll"+c],e.body["offset"+c],e.documentElement["offset"+c]);if(a===b){var i=f.css(e,d),j=parseFloat(i);return f.isNumeric(j)?j:i}return this.css(d,typeof a=="string"?a:a+"px")}}),a.jQuery=a.$=f,typeof define=="function"&&define.amd&&define.amd.jQuery&&define("jquery",[],function(){return f})})(window); \ No newline at end of file diff --git a/doc/puppet_class_list.html b/doc/puppet_class_list.html deleted file mode 100644 index 99d4fa1..0000000 --- a/doc/puppet_class_list.html +++ /dev/null @@ -1,92 +0,0 @@ - - - - - - - - - - - - - - - - - - Puppet Class List - - - -
-
-

Puppet Class List

- - - -
- - -
- - diff --git a/doc/puppet_classes/cd_fail2ban.html b/doc/puppet_classes/cd_fail2ban.html deleted file mode 100644 index d0db523..0000000 --- a/doc/puppet_classes/cd_fail2ban.html +++ /dev/null @@ -1,137 +0,0 @@ - - - - - - - Puppet Class: cd_fail2ban - - — Documentation by YARD 0.9.26 - - - - - - - - - - - - - - - - - - - -
- - -

Puppet Class: cd_fail2ban

-
- - -
-
Defined in:
-
- manifests/init.pp -
-
-
- -

Summary

- Class initialises the cd_fail2ban module. - -

Overview

-
-
- -

cd_fail2ban::init.pp Module name: cd_fail2ban Author: Arne Teuke -(arne_teuke@confdroid.com) License: This file is part of cd_fail2ban.

- -

cd_fail2ban is used for providing automatic configuration of Fail2Ban -Copyright (C) 2017 confdroid (copyright@confdroid.com) This program is -free software: you can redistribute it and/or modify it under the terms of -the GNU General Public License as published by the Free Software -Foundation, either version 3 of the License, or (at your option) any later -version.

- -

This program is distributed in the hope that it will be useful, but -WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY -or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License -for more details.

- -

You should have received a copy of the GNU General Public License along -with this program. If not, see www.gnu.org/licenses/.

- -
-
- - -
- - - -
-
- - - - -
-
-
-
-23
-24
-25
-
-
# File 'manifests/init.pp', line 23
-
-class cd_fail2ban {
-  include cd_fail2ban::params
-}
-
- - - - - - - - \ No newline at end of file diff --git a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aconfig.html b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aconfig.html deleted file mode 100644 index 055f46d..0000000 --- a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aconfig.html +++ /dev/null @@ -1,151 +0,0 @@ - - - - - - - Puppet Class: cd_fail2ban::main::config - - — Documentation by YARD 0.9.26 - - - - - - - - - - - - - - - - - - - -
- - -

Puppet Class: cd_fail2ban::main::config

-
- -
-
Inherits:
-
cd_fail2ban::params
-
- - -
-
Defined in:
-
- manifests/main/config.pp -
-
-
- -

Summary

- Class manages all aspects of configuring the module logic for -cd_fail2ban. - -

Overview

-
-
- -

cd_fail2ban::main::config.pp Module name: cd_fail2ban Author: Arne Teuke -(arne_teuke@confdroid.com) License: This file is part of cd_fail2ban.

- -

cd_fail2ban is used for providing automatic configuration of Fail2Ban -Copyright (C) 2017 confdroid (copyright@confdroid.com) This program is -free software: you can redistribute it and/or modify it under the terms of -the GNU General Public License as published by the Free Software -Foundation, either version 3 of the License, or (at your option) any later -version.

- -

This program is distributed in the hope that it will be useful, but -WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY -or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License -for more details.

- -

You should have received a copy of the GNU General Public License along -with this program. If not, see www.gnu.org/licenses/.

- -
-
- - -
- - - -
- - - - - -
-
-
-
-24
-25
-26
-27
-28
-29
-30
-
-
# File 'manifests/main/config.pp', line 24
-
-class cd_fail2ban::main::config (
-
-) inherits cd_fail2ban::params {
-
-    include cd_fail2ban::main::service
-
-}
-
-
-
- - - -
- - \ No newline at end of file diff --git a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Adirs.html b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Adirs.html deleted file mode 100644 index 55f0309..0000000 --- a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Adirs.html +++ /dev/null @@ -1,348 +0,0 @@ - - - - - - - Puppet Class: cd_fail2ban::main::dirs - - — Documentation by YARD 0.9.26 - - - - - - - - - - - - - - - - - - - -
- - -

Puppet Class: cd_fail2ban::main::dirs

-
- -
-
Inherits:
-
cd_fail2ban::params
-
- - -
-
Defined in:
-
- manifests/main/dirs.pp -
-
-
- -

Summary

- Class manages all directories required for cd_fail2ban. - -

Overview

-
-
- -

cd_fail2ban::main::dirs.pp Module name: cd_fail2ban Author: Arne Teuke -(arne_teuke@confdroid.com) License: This file is part of cd_fail2ban.

- -

cd_fail2ban is used for providing automatic configuration of Fail2Ban -Copyright (C) 2017 confdroid (copyright@confdroid.com) This program is -free software: you can redistribute it and/or modify it under the terms of -the GNU General Public License as published by the Free Software -Foundation, either version 3 of the License, or (at your option) any later -version.

- -

This program is distributed in the hope that it will be useful, but -WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY -or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License -for more details.

- -

You should have received a copy of the GNU General Public License along -with this program. If not, see www.gnu.org/licenses/.

- -
-
- - -
- - - -
- - - - - -
-
-
-
-23
-24
-25
-26
-27
-28
-29
-30
-31
-32
-33
-34
-35
-36
-37
-38
-39
-40
-41
-42
-43
-44
-45
-46
-47
-48
-49
-50
-51
-52
-53
-54
-55
-56
-57
-58
-59
-60
-61
-62
-63
-64
-65
-66
-67
-68
-69
-70
-71
-72
-73
-74
-75
-76
-77
-78
-79
-80
-81
-82
-83
-84
-85
-86
-87
-88
-89
-90
-91
-92
-93
-94
-95
-96
-97
-98
-99
-100
-101
-102
-103
-104
-105
-106
-107
-108
-109
-110
-111
-112
-113
-114
-115
-116
-117
-118
-119
-120
-121
-122
-123
-124
-125
-126
-127
-128
-
-
# File 'manifests/main/dirs.pp', line 23
-
-class cd_fail2ban::main::dirs (
-
-) inherits cd_fail2ban::params {
-
-  require cd_fail2ban::main::install
-
-  # manage main dir
-
-  file { $fn_main_dir:
-    ensure    =>  directory,
-    path      =>  $fn_main_dir,
-    owner     =>  'root',
-    group     =>  'root',
-    mode      =>  '0755',
-    selrange  =>  s0,
-    selrole   =>  object_r,
-    seltype   =>  etc_t,
-    seluser   =>  system_u,
-  }
-
-  # manage action.d dir
-
-  file { $fn_action_d_dir:
-    ensure    =>  directory,
-    path      =>  $fn_action_d_dir,
-    owner     =>  'root',
-    group     =>  'root',
-    mode      =>  '0755',
-    selrange  =>  s0,
-    selrole   =>  object_r,
-    seltype   =>  etc_t,
-    seluser   =>  system_u,
-  }
-
-  # manage fail2ban.d dir
-
-  file { $fn_fail2ban_d_dir:
-    ensure    =>  directory,
-    path      =>  $fn_fail2ban_d_dir,
-    owner     =>  'root',
-    group     =>  'root',
-    mode      =>  '0755',
-    selrange  =>  s0,
-    selrole   =>  object_r,
-    seltype   =>  etc_t,
-    seluser   =>  system_u,
-  }
-
-  # manage filter.d dir
-
-  file { $fn_filter_d_dir:
-    ensure    =>  directory,
-    path      =>  $fn_filter_d_dir,
-    owner     =>  'root',
-    group     =>  'root',
-    mode      =>  '0755',
-    selrange  =>  s0,
-    selrole   =>  object_r,
-    seltype   =>  etc_t,
-    seluser   =>  system_u,
-  }
-
-  # manage jail.d dir
-
-  file { $fn_jail_d_dir:
-    ensure    =>  directory,
-    path      =>  $fn_jail_d_dir,
-    owner     =>  'root',
-    group     =>  'root',
-    mode      =>  '0755',
-    selrange  =>  s0,
-    selrole   =>  object_r,
-    seltype   =>  etc_t,
-    seluser   =>  system_u,
-  }
-
-  #  manage /var/lib/fail2ban
-
-  file { $fn_var_lib_dir:
-    ensure    =>  directory,
-    path      =>  $fn_var_lib_dir,
-    owner     =>  'root',
-    group     =>  'root',
-    mode      =>  '0755',
-    selrange  =>  s0,
-    selrole   =>  object_r,
-    seltype   =>  fail2ban_var_lib_t,
-    seluser   =>  system_u,
-  }
-
-  # manage /var/run/fail2bam
-
-  file { $fn_var_run_dir:
-    ensure    =>  directory,
-    path      =>  $fn_var_run_dir,
-    owner     =>  'root',
-    group     =>  'root',
-    mode      =>  '0755',
-    selrange  =>  s0,
-    selrole   =>  object_r,
-    seltype   =>  fail2ban_var_run_t,
-    seluser   =>  system_u,
-  }
-
-
-}
-
-
-
- - - -
- - \ No newline at end of file diff --git a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Afiles.html b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Afiles.html deleted file mode 100644 index bcd67dd..0000000 --- a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Afiles.html +++ /dev/null @@ -1,314 +0,0 @@ - - - - - - - Puppet Class: cd_fail2ban::main::files - - — Documentation by YARD 0.9.26 - - - - - - - - - - - - - - - - - - - -
- - -

Puppet Class: cd_fail2ban::main::files

-
- -
-
Inherits:
-
cd_fail2ban::params
-
- - -
-
Defined in:
-
- manifests/main/files.pp -
-
-
- -

Summary

- Class manages all configuration files required for cd_fail2ban. - -

Overview

-
-
- -

cd_fail2ban::main::files.pp Module name: cd_fail2ban Author: Arne Teuke -(arne_teuke@confdroid.com) License: This file is part of cd_fail2ban.

- -

cd_fail2ban is used for providing automatic configuration of Fail2Ban -Copyright (C) 2017 confdroid (copyright@confdroid.com) This program is -free software: you can redistribute it and/or modify it under the terms of -the GNU General Public License as published by the Free Software -Foundation, either version 3 of the License, or (at your option) any later -version.

- -

This program is distributed in the hope that it will be useful, but -WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY -or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License -for more details.

- -

You should have received a copy of the GNU General Public License along -with this program. If not, see www.gnu.org/licenses/.

- -
-
- - -
- - - -
- - - - - -
-
-
-
-23
-24
-25
-26
-27
-28
-29
-30
-31
-32
-33
-34
-35
-36
-37
-38
-39
-40
-41
-42
-43
-44
-45
-46
-47
-48
-49
-50
-51
-52
-53
-54
-55
-56
-57
-58
-59
-60
-61
-62
-63
-64
-65
-66
-67
-68
-69
-70
-71
-72
-73
-74
-75
-76
-77
-78
-79
-80
-81
-82
-83
-84
-85
-86
-87
-88
-89
-90
-91
-92
-93
-94
-95
-96
-97
-98
-99
-100
-101
-102
-103
-104
-105
-106
-107
-108
-109
-110
-111
-
-
# File 'manifests/main/files.pp', line 23
-
-class cd_fail2ban::main::files (
-
-) inherits cd_fail2ban::params {
-
-  require cd_fail2ban::main::dirs
-
-  if $fn_manage_config == true {
-
-    # manage fail2ban.conf
-
-    file { $fn_fail2ban_conf_file:
-      ensure    =>  file,
-      path      =>  $fn_fail2ban_conf_file,
-      owner     =>  'root',
-      group     =>  'root',
-      mode      =>  '0640',
-      selrange  =>  s0,
-      selrole   =>  object_r,
-      seltype   =>  etc_t,
-      seluser   =>  system_u,
-      content   =>  template($fn_fail2ban_conf_erb),
-      notify    =>  Service[$fn_service],
-    }
-
-    # manage fail2ban.local
-
-    file { $fn_fail2ban_local_file:
-      ensure    =>  file,
-      path      =>  $fn_fail2ban_local_file,
-      owner     =>  'root',
-      group     =>  'root',
-      mode      =>  '0640',
-      selrange  =>  s0,
-      selrole   =>  object_r,
-      seltype   =>  etc_t,
-      seluser   =>  system_u,
-      content   =>  template($fn_fail2ban_local_erb),
-      notify    =>  Service[$fn_service],
-    }
-
-    # manage jail.conf
-
-    file { $fn_jail_conf_file:
-      ensure    =>  file,
-      path      =>  $fn_jail_conf_file,
-      owner     =>  'root',
-      group     =>  'root',
-      mode      =>  '0640',
-      selrange  =>  s0,
-      selrole   =>  object_r,
-      seltype   =>  etc_t,
-      seluser   =>  system_u,
-      content   =>  template($fn_jail_conf_erb),
-      notify    =>  Service[$fn_service],
-    }
-
-    # manage jail.local
-
-    file { $fn_jail_local_file:
-      ensure    =>  file,
-      path      =>  $fn_jail_local_file,
-      owner     =>  'root',
-      group     =>  'root',
-      mode      =>  '0640',
-      selrange  =>  s0,
-      selrole   =>  object_r,
-      seltype   =>  etc_t,
-      seluser   =>  system_u,
-      content   =>  template($fn_jail_local_erb),
-      notify    =>  Service[$fn_service],
-    }
-
-    # manage paths-common.conf
-
-    file { $fn_paths_common_file:
-      ensure    =>  file,
-      path      =>  $fn_paths_common_file,
-      owner     =>  'root',
-      group     =>  'root',
-      mode      =>  '0640',
-      selrange  =>  s0,
-      selrole   =>  object_r,
-      seltype   =>  etc_t,
-      seluser   =>  system_u,
-      content   =>  template($fn_paths_common_erb),
-      notify    =>  Service[$fn_service],
-    }
-  }
-}
-
-
-
- - - -
- - \ No newline at end of file diff --git a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Ainstall.html b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Ainstall.html deleted file mode 100644 index ecbb2dc..0000000 --- a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Ainstall.html +++ /dev/null @@ -1,157 +0,0 @@ - - - - - - - Puppet Class: cd_fail2ban::main::install - - — Documentation by YARD 0.9.26 - - - - - - - - - - - - - - - - - - - -
- - -

Puppet Class: cd_fail2ban::main::install

-
- -
-
Inherits:
-
cd_fail2ban::params
-
- - -
-
Defined in:
-
- manifests/main/install.pp -
-
-
- -

Summary

- Class manage all aspects of installing binaries required for -cd_fail2ban - -

Overview

-
-
- -

cd_fail2ban::main::install.pp Module name: cd_fail2ban Author: Arne Teuke -(arne_teuke@confdroid.com) License: This file is part of cd_fail2ban.

- -

cd_fail2ban is used for providing automatic configuration of Fail2Ban -Copyright (C) 2017 confdroid (copyright@confdroid.com) This program is -free software: you can redistribute it and/or modify it under the terms of -the GNU General Public License as published by the Free Software -Foundation, either version 3 of the License, or (at your option) any later -version.

- -

This program is distributed in the hope that it will be useful, but -WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY -or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License -for more details.

- -

You should have received a copy of the GNU General Public License along -with this program. If not, see www.gnu.org/licenses/.

- -
-
- - -
- - - -
- - - - - -
-
-
-
-24
-25
-26
-27
-28
-29
-30
-31
-32
-33
-
-
# File 'manifests/main/install.pp', line 24
-
-class cd_fail2ban::main::install (
-
-) inherits cd_fail2ban::params {
-
-  require cd_resources
-
-  package {$reqpackages:
-    ensure => $pkg_ensure,
-  }
-}
-
-
-
- - - -
- - \ No newline at end of file diff --git a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aservice.html b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aservice.html deleted file mode 100644 index dba16fe..0000000 --- a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aservice.html +++ /dev/null @@ -1,164 +0,0 @@ - - - - - - - Puppet Class: cd_fail2ban::main::service - - — Documentation by YARD 0.9.26 - - - - - - - - - - - - - - - - - - - -
- - -

Puppet Class: cd_fail2ban::main::service

-
- -
-
Inherits:
-
cd_fail2ban::params
-
- - -
-
Defined in:
-
- manifests/main/service.pp -
-
-
- -

Summary

- Class manages the service(s) for cd_fail2ban. - -

Overview

-
-
- -

cd_fail2ban::main::service.pp Module name: cd_fail2ban Author: Arne Teuke -(arne_teuke@confdroid.com) License: This file is part of cd_fail2ban.

- -

cd_fail2ban is used for providing automatic configuration of Fail2Ban -Copyright (C) 2017 confdroid (copyright@confdroid.com) This program is -free software: you can redistribute it and/or modify it under the terms of -the GNU General Public License as published by the Free Software -Foundation, either version 3 of the License, or (at your option) any later -version.

- -

This program is distributed in the hope that it will be useful, but -WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY -or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License -for more details.

- -

You should have received a copy of the GNU General Public License along -with this program. If not, see www.gnu.org/licenses/.

- -
-
- - -
- - - -
- - - - - -
-
-
-
-23
-24
-25
-26
-27
-28
-29
-30
-31
-32
-33
-34
-35
-36
-
-
# File 'manifests/main/service.pp', line 23
-
-class cd_fail2ban::main::service (
-
-) inherits cd_fail2ban::params {
-
-  require cd_fail2ban::main::files
-
-  service { $fn_service:
-    ensure      => $fn_enable_service,
-    hasstatus   => true,
-    hasrestart  => true,
-    enable      => true,
-  }
-
-}
-
-
-
- - - -
- - \ No newline at end of file diff --git a/doc/puppet_classes/cd_fail2ban_3A_3Aparams.html b/doc/puppet_classes/cd_fail2ban_3A_3Aparams.html deleted file mode 100644 index e01bbdf..0000000 --- a/doc/puppet_classes/cd_fail2ban_3A_3Aparams.html +++ /dev/null @@ -1,1105 +0,0 @@ - - - - - - - Puppet Class: cd_fail2ban::params - - — Documentation by YARD 0.9.26 - - - - - - - - - - - - - - - - - - - -
- - -

Puppet Class: cd_fail2ban::params

-
- - -
-
Inherited by:
-
- - cd_fail2ban::main::dirs
- - cd_fail2ban::main::files
- - cd_fail2ban::main::config
- - cd_fail2ban::main::install
- - cd_fail2ban::main::service
- -
-
- -
-
Defined in:
-
- manifests/params.pp -
-
-
- -

Summary

- Class holds all parameters for the cd_fail2ban module and is -inherited by all classes except defines. - -

Overview

-
-
- -

cd_fail2ban::params.pp Module name: cd_fail2ban Author: Arne Teuke -(arne_teuke@confdroid.com) -CRITICAL,ERROR,WARNING,NOTICE,INFO -and DEBUG.

- -
-
- - -
-

Parameters:

-
    - -
  • - - pkg_ensure - - - (string) - - - (defaults to: 'latest') - - - — -
    -

    which package -type to choose, i.e. latest or present.

    -
    - -
  • - -
  • - - reqpackages - - - (array) - - - (defaults to: ['fail2ban','fail2ban-firewalld', - 'fail2ban-sendmail','fail2ban-server.noarch', - 'whois']) - - - — -
    -

    the packages to install.

    -
    - -
  • - -
  • - - fn_manage_config - - - (boolean) - - - (defaults to: true) - - - — -
    -

    Whether to manage the fail2ban configuration files. If set to false, -fail2ban will be installed, but the configuration will not be managed.

    -
    - -
  • - -
  • - - fn_enable_service - - - (string) - - - (defaults to: 'running') - - - — -
    -

    Whether to enable/start or disable/stop the fail2ban service. Valid options -are running or stopped.

    -
    - -
  • - -
  • - - fn_loglevel - - - (string) - - - (defaults to: 'INFO') - - - — -
    -

    Set the log level output. Valid options are

    -
    - -
  • - -
  • - - fn_logtarget - - - (string) - - - (defaults to: 'SYSLOG') - - - — -
    -

    Set the log target. This could be a file, SYSLOG, STDERR or STDOUT. Only -one log target can be specified.

    -
    - -
  • - -
  • - - fn_syslogsocket - - - (string) - - - (defaults to: 'auto') - - - — -
    -

    Set the syslog socket file. Only used when logtarget is SYSLOG. auto uses -platform.system() to determine predefined paths Valid options: [ auto | -FILE ].

    -
    - -
  • - -
  • - - fn_socket - - - (string) - - - (defaults to: '/var/run/fail2ban/fail2ban.sock') - - - — -
    -

    Set the socket file to communicate with the daemon.

    -
    - -
  • - -
  • - - fn_pidfile - - - (string) - - - (defaults to: '/var/run/fail2ban/fail2ban.pid') - - - — -
    -

    Set the PID file to store the process ID of the fail2ban server.

    -
    - -
  • - -
  • - - fn_dbfile - - - (string) - - - (defaults to: '/var/lib/fail2ban/fail2ban.sqlite3') - - - — -
    -

    file for the fail2ban persistent data to be stored. A value of “:memory:” -means database is only stored in memory and data is lost when fail2ban is -stopped. A value of “None” disables the database.

    -
    - -
  • - -
  • - - fn_dbpurgeage - - - (string) - - - (defaults to: '86400') - - - — -
    -

    age in seconds at which bans should be purged from the database.

    -
    - -
  • - -
  • - - fn_ignoreip - - - (string) - - - (defaults to: '127.0.0.1/8') - - - — -
    -

    can be an IP address, a CIDR mask or a DNS host. Fail2ban will not ban a -host which matches an address in this list. Several addresses can be -defined using space (and/or comma) separator.

    -
    - -
  • - -
  • - - fn_ignorecommand - - - (string) - - - (defaults to: '') - - - — -
    -

    External command that will take an tagged arguments to ignore, e.g. -<ip>,and return true if the IP is to be ignored. False otherwise.

    -
    - -
  • - -
  • - - fn_bantime - - - (string) - - - (defaults to: '600') - - - — -
    -

    number of seconds that a host is banned.

    -
    - -
  • - -
  • - - fn_findtime - - - (string) - - - (defaults to: '600') - - - — -
    -

    A host is banned if it has generated “maxretry” during the last “findtime” -seconds.

    -
    - -
  • - -
  • - - fn_maxretry - - - (string) - - - (defaults to: '5') - - - — -
    -

    number of failures before a host get banned.

    -
    - -
  • - -
  • - - fn_backend - - - (string) - - - (defaults to: 'auto') - - - — -
    -

    specifies the backend used to get files modification. options are -“pyinotify”, “gamin”, “polling”, “systemd” and “auto”. pyinotify: requires -pyinotify (a file alteration monitor) to be installed. If pyinotify is not -installed, Fail2ban will use auto. gamin: requires Gamin (a file alteration -monitor) to be installed. If Gamin is not installed, Fail2ban will use -auto. polling: uses a polling algorithm which does not require external -libraries. systemd: uses systemd python library to access the systemd -journal. Specifying “logpath” is not valid for this backend. See -“journalmatch” in the jails associated filter config auto: will try to use -the following backends, in order: pyinotify, gamin, polling.

    -
    - -
  • - -
  • - - fn_usedns - - - (string) - - - (defaults to: 'warn') - - - — -
    -

    specifies if jails should trust hostnames in logs, warn when DNS lookups -are performed, or ignore all hostnames in logs yes: if a hostname is -encountered, a DNS lookup will be performed. warn: if a hostname is -encountered, a DNS lookup will be performed, but it will be logged as a -warning. no: if a hostname is encountered, will not be used for banning, -but it will be logged as info. raw: use raw value (no hostname), allow use -it for no-host filters/actions (example user)

    -
    - -
  • - -
  • - - fn_logencoding - - - (string) - - - (defaults to: 'auto') - - - — -
    -

    specifies the encoding of the log files handled by the jail This is used to -decode the lines from the log file. Typical examples: “ascii”, “utf-8” -auto: will use the system locale setting

    -
    - -
  • - -
  • - - fn_enabled - - - (boolean) - - - (defaults to: false) - - - — -
    -

    enables the jails. By default all jails are disabled, and it should stay -this way. Enable only relevant to your setup jails in your .local or -jail.d/*.conf true: jail will be enabled and log files will get monitored -for changes false: jail is not enabled

    -
    - -
  • - -
  • - - fn_filter - - - (string) - - - (defaults to: '%(__name__)s') - - - — -
    -

    defines the filter to use by the jail. By default jails have names matching -their filter name

    -
    - -
  • - -
  • - - fn_destemail - - - (string) - - - (defaults to: 'root@localhost') - - - — -
    -

    Destination email address used solely for the interpolations in -jail.confconf.localconf.local.d/* configuration files.

    -
    - -
  • - -
  • - - fn_sender - - - (string) - - - (defaults to: "fail2ban@${::fqdn}") - - - — -
    -

    Sender email address used solely for some actions

    -
    - -
  • - -
  • - - fn_mta - - - (string) - - - (defaults to: 'sendmail') - - - — -
    -

    E-mail action. Since 0.8.1 Fail2Ban uses sendmail MTA for the mailing. -Change mta configuration parameter to mail if you want to revert to -conventional 'mail'.

    -
    - -
  • - -
  • - - fn_protocol - - - (string) - - - (defaults to: 'tcp') - - - — -
    -

    Default protocol.

    -
    - -
  • - -
  • - - fn_chain - - - (string) - - - (defaults to: 'INPUT') - - - — -
    -

    Specify chain where jumps would need to be added in iptables-* actions.

    -
    - -
  • - -
  • - - fn_port - - - (string) - - - (defaults to: '0:65535') - - - — -
    -

    Ports to be banned Usually should be overridden

    - -

    in a particular jail

    -
    - -
  • - -
  • - - fn_fail2ban_agent - - - (string) - - - (defaults to: 'Fail2Ban/%(fail2ban_version)s') - - - — - - -
  • - -
  • - - fn_banaction - - - (string) - - - (defaults to: 'iptables-multiport') - - - — -
    -

    Default banning action

    -
    - -
  • - -
  • - - fn_banaction_allports - - - (string) - - - (defaults to: 'iptables-allports') - - - — -
    -

    Default banning action

    -
    - -
  • - -
  • - - fn_action_ - - - (string) - - - (defaults to: '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]') - - - — -
    -

    ban only

    -
    - -
  • - -
  • - - fn_action_mw - - - (string) - - - (defaults to: '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"] - %(mta)s-whois[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]') - - - — -
    -

    ban & send an e-mail with whois report to the destemail.

    -
    - -
  • - -
  • - - fn_action_mwl - - - (string) - - - (defaults to: '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"] - %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]') - - - — -
    -

    ban & send an e-mail with whois report and relevant log lines

    -
    - -
  • - -
  • - - fn_action_xarf - - - (string) - - - (defaults to: '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"] - xarf-login-attack[service=%(__name__)s, sender="%(sender)s", logpath=%(logpath)s, port="%(port)s"]') - - - — -
    -

    ban & send a xarf e-mail to abuse contact of IP address and include -relevant log lines.

    -
    - -
  • - -
  • - - fn_action_cf_mwl - - - (string) - - - (defaults to: 'cloudflare[cfuser="%(cfemail)s", cftoken="%(cfapikey)s"] - %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]') - - - — -
    -

    ban IP on CloudFlare & send an e-mail with whois report and relevant -log lines.

    -
    - -
  • - -
  • - - fn_action_blocklist_de - - - (string) - - - (defaults to: 'blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s", agent="%(fail2ban_agent)s"]') - - - — -
    -

    Report block via blocklist.de fail2ban reporting service API

    -
    - -
  • - -
  • - - fn_action_badips - - - (string) - - - (defaults to: 'badips.py[category="%(__name__)s", banaction="%(banaction)s", agent="%(fail2ban_agent)s"]') - - - — -
    -

    string to be be used in config files

    -
    - -
  • - -
  • - - fn_action_badips_report - - - (string) - - - (defaults to: 'badips[category="%(__name__)s", agent="%(fail2ban_agent)s"]') - - - — -
    -

    Report ban via badips.com

    - -

    (uses action.d/badips.conf for reporting only).

    -
    - -
  • - -
  • - - fn_default_action - - - (string) - - - (defaults to: 'action_') - - - — -
    -

    Choose default action.

    -
    - -
  • - -
  • - - fn_extra_repo_url - - - (string) - - - - — -
    -

    Specify the URL for the extra repo for additiional required packages, which -are not in the regular repos.

    -
    - -
  • - -
  • - - fn_jail_paths - - - (string) - - - (defaults to: 'fedora') - - - — -
    -

    the fail path. defaults to fedora.

    -
    - -
  • - -
- - - -
- - - - - -
-
-
-
-108
-109
-110
-111
-112
-113
-114
-115
-116
-117
-118
-119
-120
-121
-122
-123
-124
-125
-126
-127
-128
-129
-130
-131
-132
-133
-134
-135
-136
-137
-138
-139
-140
-141
-142
-143
-144
-145
-146
-147
-148
-149
-150
-151
-152
-153
-154
-155
-156
-157
-158
-159
-160
-161
-162
-163
-164
-165
-166
-167
-168
-169
-170
-171
-172
-173
-174
-175
-176
-177
-178
-179
-180
-181
-182
-183
-184
-185
-186
-187
-188
-189
-190
-191
-192
-193
-194
-195
-196
-197
-
-
# File 'manifests/params.pp', line 108
-
-class cd_fail2ban::params (
-
-# installation
-$pkg_ensure                 = 'latest',
-$reqpackages                = ['fail2ban','fail2ban-firewalld',
-                              'fail2ban-sendmail','fail2ban-server.noarch',
-                              'whois'],
-
-$fn_manage_config           = true,
-$fn_enable_service          = 'running',
-
-# fail2ban.conf/local
-
-$fn_loglevel                = 'INFO',
-$fn_logtarget               = 'SYSLOG',
-$fn_syslogsocket            = 'auto',
-$fn_socket                  = '/var/run/fail2ban/fail2ban.sock',
-$fn_pidfile                 = '/var/run/fail2ban/fail2ban.pid',
-$fn_dbfile                  = '/var/lib/fail2ban/fail2ban.sqlite3',
-$fn_dbpurgeage              = '86400',
-
-# jail.conf/local
-$fn_ignoreip                = '127.0.0.1/8',
-$fn_ignorecommand           = '',
-$fn_bantime                 = '600',
-$fn_findtime                = '600',
-$fn_maxretry                = '5',
-$fn_backend                 = 'auto',
-$fn_usedns                  = 'warn',
-$fn_logencoding             = 'auto',
-$fn_enabled                 = false,
-$fn_filter                  = '%(__name__)s',
-$fn_destemail               = 'root@localhost',
-$fn_sender                  = "fail2ban@${::fqdn}",
-$fn_mta                     = 'sendmail',
-$fn_protocol                = 'tcp',
-$fn_chain                   = 'INPUT',
-$fn_port                    = '0:65535',
-$fn_fail2ban_agent          = 'Fail2Ban/%(fail2ban_version)s',
-$fn_banaction               = 'iptables-multiport',
-$fn_banaction_allports      = 'iptables-allports',
-$fn_action_                 = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]',
-$fn_action_mw               = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
-                        %(mta)s-whois[name=%(__name__)s,  sender="%(sender)s", dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]',
-$fn_action_mwl              = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
-                        %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]',
-$fn_action_xarf             = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
-                        xarf-login-attack[service=%(__name__)s, sender="%(sender)s", logpath=%(logpath)s, port="%(port)s"]',
-$fn_action_cf_mwl           = 'cloudflare[cfuser="%(cfemail)s", cftoken="%(cfapikey)s"]
-                        %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]',
-$fn_action_blocklist_de     = 'blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s", agent="%(fail2ban_agent)s"]',
-$fn_action_badips           = 'badips.py[category="%(__name__)s", banaction="%(banaction)s", agent="%(fail2ban_agent)s"]',
-$fn_action_badips_report    = 'badips[category="%(__name__)s", agent="%(fail2ban_agent)s"]',
-$fn_default_action          = 'action_',
-$fn_jail_paths              = 'fedora',
-
-) {
-
-# shortcuts
-$fn_os                  = $::operatingsystem
-
-# service
-$fn_service             = 'fail2ban'
-
-# directories
-$fn_main_dir            = '/etc/fail2ban'
-$fn_action_d_dir        = "${fn_main_dir}/action.d"
-$fn_fail2ban_d_dir      = "${fn_main_dir}/fail2ban.d"
-$fn_filter_d_dir        = "${fn_main_dir}/filter.d"
-$fn_jail_d_dir          = "${fn_main_dir}/jail.d"
-$fn_var_lib_dir         = '/var/lib/fail2ban'
-$fn_var_run_dir         = '/var/run/fail2ban'
-
-# files
-$fn_fail2ban_conf_file  = "${fn_main_dir}/fail2ban.conf"
-$fn_fail2ban_conf_erb   = 'cd_fail2ban/fail2ban_conf.erb'
-$fn_fail2ban_local_file = "${fn_main_dir}/fail2ban.local"
-$fn_fail2ban_local_erb  = 'cd_fail2ban/fail2ban_local.erb'
-$fn_jail_conf_file      = "${fn_main_dir}/jail.conf"
-$fn_jail_conf_erb       = 'cd_fail2ban/jail_conf.erb'
-$fn_jail_local_file     = "${fn_main_dir}/jail.local"
-$fn_jail_local_erb      = 'cd_fail2ban/jail_local.erb'
-$fn_paths_common_file   = "${fn_main_dir}/paths-common.conf"
-$fn_paths_common_erb    = 'cd_fail2ban/paths_common_conf.erb'
-
-# includes must be last
-
-  include cd_fail2ban::main::config
-
-}
-
-
-
- - - -
- - \ No newline at end of file diff --git a/doc/top-level-namespace.html b/doc/top-level-namespace.html deleted file mode 100644 index be302bd..0000000 --- a/doc/top-level-namespace.html +++ /dev/null @@ -1,98 +0,0 @@ - - - - - - - Top Level Namespace - - — Documentation by YARD 0.9.26 - - - - - - - - - - - - - - - - - - - -
- - -

Top Level Namespace - - - -

-
- - - - - - - - - - - -
- - - - - - - - - - -
- - - -
- - \ No newline at end of file diff --git a/manifests/init.pp b/manifests/init.pp index cdaf323..ed17c42 100644 --- a/manifests/init.pp +++ b/manifests/init.pp @@ -1,25 +1,8 @@ -## cd_fail2ban::init.pp -# Module name: cd_fail2ban +## fail2ban_cd::init.pp +# Module name: fail2ban_cd # Author: Arne Teuke (arne_teuke@confdroid.com) -# License: -# This file is part of cd_fail2ban. -# -# cd_fail2ban is used for providing automatic configuration of Fail2Ban -# Copyright (C) 2017 confdroid (copyright@confdroid.com) -# This program is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# This program is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see . -# @summary Class initialises the cd_fail2ban module. +# @summary Class initializes the fail2ban_cd module. ############################################################################## -class cd_fail2ban { - include cd_fail2ban::params +class fail2ban_cd { + include fail2ban_cd::params } diff --git a/manifests/main/config.pp b/manifests/main/config.pp index 39e0312..eb3920e 100644 --- a/manifests/main/config.pp +++ b/manifests/main/config.pp @@ -1,30 +1,10 @@ -## cd_fail2ban::main::config.pp -# Module name: cd_fail2ban +## fail2ban_cd::main::config.pp +# Module name: fail2ban_cd # Author: Arne Teuke (arne_teuke@confdroid.com) -# License: -# This file is part of cd_fail2ban. -# -# cd_fail2ban is used for providing automatic configuration of Fail2Ban -# Copyright (C) 2017 confdroid (copyright@confdroid.com) -# This program is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# This program is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see . -# @summary Class manages all aspects of configuring the module logic for -# cd_fail2ban. +# @summary Class manages the module logic for fail2ban_cd. ############################################################################## -class cd_fail2ban::main::config ( - -) inherits cd_fail2ban::params { - - include cd_fail2ban::main::service +class fail2ban_cd::main::config ( +) inherits fail2ban_cd::params { + include fail2ban_cd::main::service } diff --git a/manifests/main/dirs.pp b/manifests/main/dirs.pp index f39f30b..b8747d6 100644 --- a/manifests/main/dirs.pp +++ b/manifests/main/dirs.pp @@ -1,128 +1,108 @@ -## cd_fail2ban::main::dirs.pp -# Module name: cd_fail2ban +## fail2ban_cd::main::dirs.pp +# Module name: fail2ban_cd # Author: Arne Teuke (arne_teuke@confdroid.com) -# License: -# This file is part of cd_fail2ban. -# -# cd_fail2ban is used for providing automatic configuration of Fail2Ban -# Copyright (C) 2017 confdroid (copyright@confdroid.com) -# This program is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# This program is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see . -# @summary Class manages all directories required for cd_fail2ban. +# @summary Class manages all directories required for fail2ban_cd. ############################################################################### -class cd_fail2ban::main::dirs ( +class fail2ban_cd::main::dirs ( -) inherits cd_fail2ban::params { - - require cd_fail2ban::main::install +) inherits fail2ban_cd::params { + require fail2ban_cd::main::install # manage main dir file { $fn_main_dir: - ensure => directory, - path => $fn_main_dir, - owner => 'root', - group => 'root', - mode => '0755', - selrange => s0, - selrole => object_r, - seltype => etc_t, - seluser => system_u, + ensure => directory, + path => $fn_main_dir, + owner => 'root', + group => 'root', + mode => '0755', + selrange => s0, + selrole => object_r, + seltype => etc_t, + seluser => system_u, } # manage action.d dir file { $fn_action_d_dir: - ensure => directory, - path => $fn_action_d_dir, - owner => 'root', - group => 'root', - mode => '0755', - selrange => s0, - selrole => object_r, - seltype => etc_t, - seluser => system_u, + ensure => directory, + path => $fn_action_d_dir, + owner => 'root', + group => 'root', + mode => '0755', + selrange => s0, + selrole => object_r, + seltype => etc_t, + seluser => system_u, } # manage fail2ban.d dir file { $fn_fail2ban_d_dir: - ensure => directory, - path => $fn_fail2ban_d_dir, - owner => 'root', - group => 'root', - mode => '0755', - selrange => s0, - selrole => object_r, - seltype => etc_t, - seluser => system_u, + ensure => directory, + path => $fn_fail2ban_d_dir, + owner => 'root', + group => 'root', + mode => '0755', + selrange => s0, + selrole => object_r, + seltype => etc_t, + seluser => system_u, } # manage filter.d dir file { $fn_filter_d_dir: - ensure => directory, - path => $fn_filter_d_dir, - owner => 'root', - group => 'root', - mode => '0755', - selrange => s0, - selrole => object_r, - seltype => etc_t, - seluser => system_u, + ensure => directory, + path => $fn_filter_d_dir, + owner => 'root', + group => 'root', + mode => '0755', + selrange => s0, + selrole => object_r, + seltype => etc_t, + seluser => system_u, } # manage jail.d dir file { $fn_jail_d_dir: - ensure => directory, - path => $fn_jail_d_dir, - owner => 'root', - group => 'root', - mode => '0755', - selrange => s0, - selrole => object_r, - seltype => etc_t, - seluser => system_u, + ensure => directory, + path => $fn_jail_d_dir, + owner => 'root', + group => 'root', + mode => '0755', + selrange => s0, + selrole => object_r, + seltype => etc_t, + seluser => system_u, } # manage /var/lib/fail2ban file { $fn_var_lib_dir: - ensure => directory, - path => $fn_var_lib_dir, - owner => 'root', - group => 'root', - mode => '0755', - selrange => s0, - selrole => object_r, - seltype => fail2ban_var_lib_t, - seluser => system_u, + ensure => directory, + path => $fn_var_lib_dir, + owner => 'root', + group => 'root', + mode => '0755', + selrange => s0, + selrole => object_r, + seltype => fail2ban_var_lib_t, + seluser => system_u, } # manage /var/run/fail2bam file { $fn_var_run_dir: - ensure => directory, - path => $fn_var_run_dir, - owner => 'root', - group => 'root', - mode => '0755', - selrange => s0, - selrole => object_r, - seltype => fail2ban_var_run_t, - seluser => system_u, + ensure => directory, + path => $fn_var_run_dir, + owner => 'root', + group => 'root', + mode => '0755', + selrange => s0, + selrole => object_r, + seltype => fail2ban_var_run_t, + seluser => system_u, } - - } diff --git a/manifests/main/files.pp b/manifests/main/files.pp index 67d3323..48bb78d 100644 --- a/manifests/main/files.pp +++ b/manifests/main/files.pp @@ -1,111 +1,92 @@ -## cd_fail2ban::main::files.pp -# Module name: cd_fail2ban +## fail2ban_cd::main::files.pp +# Module name: fail2ban_cd # Author: Arne Teuke (arne_teuke@confdroid.com) -# License: -# This file is part of cd_fail2ban. -# -# cd_fail2ban is used for providing automatic configuration of Fail2Ban -# Copyright (C) 2017 confdroid (copyright@confdroid.com) -# This program is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# This program is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see . -# @summary Class manages all configuration files required for cd_fail2ban. +# @summary Class manages all configuration files required for fail2ban_cd. ############################################################################## -class cd_fail2ban::main::files ( +class fail2ban_cd::main::files ( -) inherits cd_fail2ban::params { - - require cd_fail2ban::main::dirs +) inherits fail2ban_cd::params { + require fail2ban_cd::main::dirs if $fn_manage_config == true { - # manage fail2ban.conf file { $fn_fail2ban_conf_file: - ensure => file, - path => $fn_fail2ban_conf_file, - owner => 'root', - group => 'root', - mode => '0640', - selrange => s0, - selrole => object_r, - seltype => etc_t, - seluser => system_u, - content => template($fn_fail2ban_conf_erb), - notify => Service[$fn_service], + ensure => file, + path => $fn_fail2ban_conf_file, + owner => 'root', + group => 'root', + mode => '0640', + selrange => s0, + selrole => object_r, + seltype => etc_t, + seluser => system_u, + content => template($fn_fail2ban_conf_erb), + notify => Service[$fn_service], } # manage fail2ban.local file { $fn_fail2ban_local_file: - ensure => file, - path => $fn_fail2ban_local_file, - owner => 'root', - group => 'root', - mode => '0640', - selrange => s0, - selrole => object_r, - seltype => etc_t, - seluser => system_u, - content => template($fn_fail2ban_local_erb), - notify => Service[$fn_service], + ensure => file, + path => $fn_fail2ban_local_file, + owner => 'root', + group => 'root', + mode => '0640', + selrange => s0, + selrole => object_r, + seltype => etc_t, + seluser => system_u, + content => template($fn_fail2ban_local_erb), + notify => Service[$fn_service], } # manage jail.conf file { $fn_jail_conf_file: - ensure => file, - path => $fn_jail_conf_file, - owner => 'root', - group => 'root', - mode => '0640', - selrange => s0, - selrole => object_r, - seltype => etc_t, - seluser => system_u, - content => template($fn_jail_conf_erb), - notify => Service[$fn_service], + ensure => file, + path => $fn_jail_conf_file, + owner => 'root', + group => 'root', + mode => '0640', + selrange => s0, + selrole => object_r, + seltype => etc_t, + seluser => system_u, + content => template($fn_jail_conf_erb), + notify => Service[$fn_service], } # manage jail.local file { $fn_jail_local_file: - ensure => file, - path => $fn_jail_local_file, - owner => 'root', - group => 'root', - mode => '0640', - selrange => s0, - selrole => object_r, - seltype => etc_t, - seluser => system_u, - content => template($fn_jail_local_erb), - notify => Service[$fn_service], + ensure => file, + path => $fn_jail_local_file, + owner => 'root', + group => 'root', + mode => '0640', + selrange => s0, + selrole => object_r, + seltype => etc_t, + seluser => system_u, + content => template($fn_jail_local_erb), + notify => Service[$fn_service], } # manage paths-common.conf file { $fn_paths_common_file: - ensure => file, - path => $fn_paths_common_file, - owner => 'root', - group => 'root', - mode => '0640', - selrange => s0, - selrole => object_r, - seltype => etc_t, - seluser => system_u, - content => template($fn_paths_common_erb), - notify => Service[$fn_service], + ensure => file, + path => $fn_paths_common_file, + owner => 'root', + group => 'root', + mode => '0640', + selrange => s0, + selrole => object_r, + seltype => etc_t, + seluser => system_u, + content => template($fn_paths_common_erb), + notify => Service[$fn_service], } } } diff --git a/manifests/main/install.pp b/manifests/main/install.pp index 364bc88..38e8c59 100644 --- a/manifests/main/install.pp +++ b/manifests/main/install.pp @@ -1,34 +1,14 @@ -## cd_fail2ban::main::install.pp -# Module name: cd_fail2ban +## fail2ban_cd::main::install.pp +# Module name: fail2ban_cd # Author: Arne Teuke (arne_teuke@confdroid.com) -# License: -# This file is part of cd_fail2ban. -# -# cd_fail2ban is used for providing automatic configuration of Fail2Ban -# Copyright (C) 2017 confdroid (copyright@confdroid.com) -# This program is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# This program is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see . -# @summary Class manage all aspects of installing binaries required for -# cd_fail2ban +# @summary Class installs binaries required for fail2ban_cd ############################################################################### -class cd_fail2ban::main::install ( - -) inherits cd_fail2ban::params { +class fail2ban_cd::main::install ( +) inherits fail2ban_cd::params { require cd_resources - package {$reqpackages: + package { $reqpackages: ensure => $pkg_ensure, } } - diff --git a/manifests/main/service.pp b/manifests/main/service.pp index 30d6fb1..e3c6461 100644 --- a/manifests/main/service.pp +++ b/manifests/main/service.pp @@ -1,36 +1,17 @@ -## cd_fail2ban::main::service.pp -# Module name: cd_fail2ban +## fail2ban_cd::main::service.pp +# Module name: fail2ban_cd # Author: Arne Teuke (arne_teuke@confdroid.com) -# License: -# This file is part of cd_fail2ban. -# -# cd_fail2ban is used for providing automatic configuration of Fail2Ban -# Copyright (C) 2017 confdroid (copyright@confdroid.com) -# This program is free software: you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation, either version 3 of the License, or -# (at your option) any later version. -# -# This program is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program. If not, see . -# @summary Class manages the service(s) for cd_fail2ban. +# @summary Class manages the service(s) for fail2ban_cd. ############################################################################# -class cd_fail2ban::main::service ( +class fail2ban_cd::main::service ( -) inherits cd_fail2ban::params { - - require cd_fail2ban::main::files +) inherits fail2ban_cd::params { + require fail2ban_cd::main::files service { $fn_service: - ensure => $fn_enable_service, - hasstatus => true, - hasrestart => true, - enable => true, + ensure => $fn_enable_service, + hasstatus => true, + hasrestart => true, + enable => true, } - } diff --git a/manifests/params.pp b/manifests/params.pp index 9a550da..7403ad7 100644 --- a/manifests/params.pp +++ b/manifests/params.pp @@ -1,44 +1,43 @@ -## cd_fail2ban::params.pp -# Module name: cd_fail2ban +## fail2ban_cd::params.pp +# Module name: fail2ban_cd # Author: Arne Teuke (arne_teuke@confdroid.com) -# @summary Class holds all parameters for the cd_fail2ban module and is -# inherited by all classes except defines. -# @param [string] pkg_ensure +# @summary Class holds all parameters for the fail2ban_cd module +# @param [string] pkg_ensure # which [package type](https://confdroid.com/2017/05/puppet-type-package/) # to choose, i.e. `latest` or `present`. # @param [array] reqpackages the packages to install. -# @param [boolean] fn_manage_config Whether to manage the fail2ban +# @param [boolean] fn_manage_config Whether to manage the fail2ban # configuration files. If set to false, fail2ban will be installed, but the # configuration will not be managed. -# @param [string] fn_enable_service Whether to enable/start or disable/stop +# @param [string] fn_enable_service Whether to enable/start or disable/stop # the fail2ban service. Valid options are `running` or `stopped`. -# @param [string] fn_loglevel Set the log level output. Valid options are +# @param [string] fn_loglevel Set the log level output. Valid options are # `CRITICAL`,`ERROR`,`WARNING`,`NOTICE`,`INFO` and `DEBUG`. -# @param [string] fn_logtarget Set the log target. This could be a file, +# @param [string] fn_logtarget Set the log target. This could be a file, # SYSLOG, STDERR or STDOUT. Only one log target can be specified. -# @param [string] fn_syslogsocket Set the syslog socket file. Only used when +# @param [string] fn_syslogsocket Set the syslog socket file. Only used when # logtarget is SYSLOG. auto uses platform.system() to determine predefined # paths Valid options: [ auto | FILE ]. -# @param [string] fn_socket Set the socket file to communicate with the daemon. -# @param [string] fn_pidfile Set the PID file to store the process ID of the +# @param [string] fn_socket Set the socket file to communicate with the daemon. +# @param [string] fn_pidfile Set the PID file to store the process ID of the # fail2ban server. -# @param [string] fn_dbfile file for the fail2ban persistent data to be stored. +# @param [string] fn_dbfile file for the fail2ban persistent data to be stored. # A value of ":memory:" means database is only stored in memory # and data is lost when fail2ban is stopped. # A value of "None" disables the database. -# @param [string] fn_dbpurgeage age in seconds at which bans should be purged +# @param [string] fn_dbpurgeage age in seconds at which bans should be purged # from the database. -# @param [string] fn_ignoreip can be an IP address, a CIDR mask or a DNS host. +# @param [string] fn_ignoreip can be an IP address, a CIDR mask or a DNS host. # Fail2ban will not ban a host which matches an address in this list. Several # addresses can be defined using space (and/or comma) separator. -# @param [string] fn_ignorecommand External command that will take an +# @param [string] fn_ignorecommand External command that will take an # tagged arguments to ignore, e.g. ,and return true if the IP is to be # ignored. False otherwise. -# @param [string] fn_bantime number of seconds that a host is banned. -# @param [string] fn_findtime A host is banned if it has generated "maxretry" +# @param [string] fn_bantime number of seconds that a host is banned. +# @param [string] fn_findtime A host is banned if it has generated "maxretry" # during the last "findtime" seconds. -# @param [string] fn_maxretry number of failures before a host get banned. -# @param [string] fn_backend specifies the backend used to get files +# @param [string] fn_maxretry number of failures before a host get banned. +# @param [string] fn_backend specifies the backend used to get files # modification. options are "pyinotify", "gamin", "polling", "systemd" and # "auto". # pyinotify: requires pyinotify (a file alteration monitor) to be installed. @@ -51,7 +50,7 @@ # See "journalmatch" in the jails associated filter config # auto: will try to use the following backends, in order: # pyinotify, gamin, polling. -# @param [string] fn_usedns specifies if jails should trust hostnames in logs, +# @param [string] fn_usedns specifies if jails should trust hostnames in logs, # warn when DNS lookups are performed, or ignore all hostnames in logs # yes: if a hostname is encountered, a DNS lookup will be performed. # warn: if a hostname is encountered, a DNS lookup will be performed, @@ -60,138 +59,134 @@ # but it will be logged as info. # raw: use raw value (no hostname), allow use it for no-host filters/actions # (example user) -# @param [string] fn_logencoding specifies the encoding of the log files +# @param [string] fn_logencoding specifies the encoding of the log files # handled by the jail This is used to decode the lines from the log file. # Typical examples: "ascii", "utf-8" # auto: will use the system locale setting -# @param [boolean] fn_enabled enables the jails. +# @param [boolean] fn_enabled enables the jails. # By default all jails are disabled, and it should stay this way. # Enable only relevant to your setup jails in your .local or jail.d/*.conf # true: jail will be enabled and log files will get monitored for changes # false: jail is not enabled -# @param [string] fn_filter defines the filter to use by the jail. +# @param [string] fn_filter defines the filter to use by the jail. # By default jails have names matching their filter name -# @param [string] fn_destemail Destination email address used solely for the +# @param [string] fn_destemail Destination email address used solely for the # interpolations in jail.{conf.local.d/*} configuration files. -# @param [string] fn_sender Sender email address used solely for some actions -# @param [string] fn_mta E-mail action. Since 0.8.1 Fail2Ban uses sendmail MTA +# @param [string] fn_sender Sender email address used solely for some actions +# @param [string] fn_mta E-mail action. Since 0.8.1 Fail2Ban uses sendmail MTA # for the mailing. Change mta configuration parameter to mail if you want to # revert to conventional 'mail'. -# @param [string] fn_protocol Default protocol. -# @param [string] fn_chain Specify chain where jumps would need to be added in +# @param [string] fn_protocol Default protocol. +# @param [string] fn_chain Specify chain where jumps would need to be added in # iptables-* actions. -# @param [string] fn_port # Ports to be banned Usually should be overridden +# @param [string] fn_port # Ports to be banned Usually should be overridden # in a particular jail -# @param [string] fn_fail2ban_agent Format of user-agent +# @param [string] fn_fail2ban_agent Format of user-agent # https://tools.ietf.org/html/rfc7231#section-5.5.3 -# @param [string] fn_banaction Default banning action -# @param [string] fn_banaction_allports Default banning action -# @param [string] fn_action_ ban only -# @param [string] fn_action_mw ban & send an e-mail with whois report to the +# @param [string] fn_banaction Default banning action +# @param [string] fn_banaction_allports Default banning action +# @param [string] fn_action_ ban only +# @param [string] fn_action_mw ban & send an e-mail with whois report to the # destemail. -# @param [string] fn_action_mwl ban & send an e-mail with whois report and +# @param [string] fn_action_mwl ban & send an e-mail with whois report and # relevant log lines # @param [string] fn_action_xarf ban & send a xarf e-mail to abuse contact of # IP address and include relevant log lines. -# @param [string] fn_action_cf_mwl ban IP on CloudFlare & send an e-mail with +# @param [string] fn_action_cf_mwl ban IP on CloudFlare & send an e-mail with # whois report and relevant log lines. -# @param [string] fn_action_blocklist_de Report block via blocklist.de fail2ban +# @param [string] fn_action_blocklist_de Report block via blocklist.de fail2ban # reporting service API -# @param [string] fn_action_badips string to be be used in config files -# @param [string] fn_action_badips_report # Report ban via badips.com +# @param [string] fn_action_badips string to be be used in config files +# @param [string] fn_action_badips_report # Report ban via badips.com # (uses action.d/badips.conf for reporting only). -# @param [string] fn_default_action Choose default action. -# @param [string] fn_extra_repo_url Specify the URL for the extra repo for -# additiional required packages, which are not in the regular repos. +# @param [string] fn_default_action Choose default action. # @param [string] fn_jail_paths the fail path. defaults to fedora. ############################################################################### -class cd_fail2ban::params ( +class fail2ban_cd::params ( # installation -$pkg_ensure = 'latest', -$reqpackages = ['fail2ban','fail2ban-firewalld', - 'fail2ban-sendmail','fail2ban-server.noarch', - 'whois'], + String $pkg_ensure = 'latest', + Array $reqpackages = ['fail2ban','fail2ban-firewalld', + 'fail2ban-sendmail','fail2ban-server.noarch','whois'], -$fn_manage_config = true, -$fn_enable_service = 'running', + Boolean $fn_manage_config = true, + String $fn_enable_service = 'running', # fail2ban.conf/local -$fn_loglevel = 'INFO', -$fn_logtarget = 'SYSLOG', -$fn_syslogsocket = 'auto', -$fn_socket = '/var/run/fail2ban/fail2ban.sock', -$fn_pidfile = '/var/run/fail2ban/fail2ban.pid', -$fn_dbfile = '/var/lib/fail2ban/fail2ban.sqlite3', -$fn_dbpurgeage = '86400', + String $fn_loglevel = 'INFO', + String $fn_logtarget = 'SYSLOG', + String $fn_syslogsocket = 'auto', + String $fn_socket = '/var/run/fail2ban/fail2ban.sock', + String $fn_pidfile = '/var/run/fail2ban/fail2ban.pid', + String $fn_dbfile = '/var/lib/fail2ban/fail2ban.sqlite3', + String $fn_dbpurgeage = '86400', # jail.conf/local -$fn_ignoreip = '127.0.0.1/8', -$fn_ignorecommand = '', -$fn_bantime = '600', -$fn_findtime = '600', -$fn_maxretry = '5', -$fn_backend = 'auto', -$fn_usedns = 'warn', -$fn_logencoding = 'auto', -$fn_enabled = false, -$fn_filter = '%(__name__)s', -$fn_destemail = 'root@localhost', -$fn_sender = "fail2ban@${::fqdn}", -$fn_mta = 'sendmail', -$fn_protocol = 'tcp', -$fn_chain = 'INPUT', -$fn_port = '0:65535', -$fn_fail2ban_agent = 'Fail2Ban/%(fail2ban_version)s', -$fn_banaction = 'iptables-multiport', -$fn_banaction_allports = 'iptables-allports', -$fn_action_ = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]', -$fn_action_mw = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"] + String $fn_ignoreip = '127.0.0.1/8', + String $fn_ignorecommand = '', + String $fn_bantime = '600', + String $fn_findtime = '600', + String $fn_maxretry = '5', + String $fn_backend = 'auto', + String $fn_usedns = 'warn', + String $fn_logencoding = 'auto', + Boolean $fn_enabled = false, + String $fn_filter = '%(__name__)s', + String $fn_destemail = 'root@localhost', + String $fn_sender = "fail2ban@${fqdn}", + String $fn_mta = 'sendmail', + String $fn_protocol = 'tcp', + String $fn_chain = 'INPUT', + String $fn_port = '0:65535', + String $fn_fail2ban_agent = 'Fail2Ban/%(fail2ban_version)s', + String $fn_banaction = 'iptables-multiport', + String $fn_banaction_allports = 'iptables-allports', + String $fn_action_ = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]', + String $fn_action_mw = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"] %(mta)s-whois[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]', -$fn_action_mwl = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"] + String $fn_action_mwl = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"] %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]', -$fn_action_xarf = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"] + String $fn_action_xarf = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"] xarf-login-attack[service=%(__name__)s, sender="%(sender)s", logpath=%(logpath)s, port="%(port)s"]', -$fn_action_cf_mwl = 'cloudflare[cfuser="%(cfemail)s", cftoken="%(cfapikey)s"] + String $fn_action_cf_mwl = 'cloudflare[cfuser="%(cfemail)s", cftoken="%(cfapikey)s"] %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]', -$fn_action_blocklist_de = 'blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s", agent="%(fail2ban_agent)s"]', -$fn_action_badips = 'badips.py[category="%(__name__)s", banaction="%(banaction)s", agent="%(fail2ban_agent)s"]', -$fn_action_badips_report = 'badips[category="%(__name__)s", agent="%(fail2ban_agent)s"]', -$fn_default_action = 'action_', -$fn_jail_paths = 'fedora', + String $fn_action_blocklist_de = 'blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s", agent="%(fail2ban_agent)s"]', + String $fn_action_badips = 'badips.py[category="%(__name__)s", banaction="%(banaction)s", agent="%(fail2ban_agent)s"]', + String $fn_action_badips_report = 'badips[category="%(__name__)s", agent="%(fail2ban_agent)s"]', + String $fn_default_action = 'action_', + String $fn_jail_paths = 'fedora', ) { - # shortcuts -$fn_os = $::operatingsystem + $fqdn = $facts['networking']['fqdn'] + $fn_os = $facts['os'] # service -$fn_service = 'fail2ban' + $fn_service = 'fail2ban' # directories -$fn_main_dir = '/etc/fail2ban' -$fn_action_d_dir = "${fn_main_dir}/action.d" -$fn_fail2ban_d_dir = "${fn_main_dir}/fail2ban.d" -$fn_filter_d_dir = "${fn_main_dir}/filter.d" -$fn_jail_d_dir = "${fn_main_dir}/jail.d" -$fn_var_lib_dir = '/var/lib/fail2ban' -$fn_var_run_dir = '/var/run/fail2ban' + $fn_main_dir = '/etc/fail2ban' + $fn_action_d_dir = "${fn_main_dir}/action.d" + $fn_fail2ban_d_dir = "${fn_main_dir}/fail2ban.d" + $fn_filter_d_dir = "${fn_main_dir}/filter.d" + $fn_jail_d_dir = "${fn_main_dir}/jail.d" + $fn_var_lib_dir = '/var/lib/fail2ban' + $fn_var_run_dir = '/var/run/fail2ban' # files -$fn_fail2ban_conf_file = "${fn_main_dir}/fail2ban.conf" -$fn_fail2ban_conf_erb = 'cd_fail2ban/fail2ban_conf.erb' -$fn_fail2ban_local_file = "${fn_main_dir}/fail2ban.local" -$fn_fail2ban_local_erb = 'cd_fail2ban/fail2ban_local.erb' -$fn_jail_conf_file = "${fn_main_dir}/jail.conf" -$fn_jail_conf_erb = 'cd_fail2ban/jail_conf.erb' -$fn_jail_local_file = "${fn_main_dir}/jail.local" -$fn_jail_local_erb = 'cd_fail2ban/jail_local.erb' -$fn_paths_common_file = "${fn_main_dir}/paths-common.conf" -$fn_paths_common_erb = 'cd_fail2ban/paths_common_conf.erb' + $fn_fail2ban_conf_file = "${fn_main_dir}/fail2ban.conf" + $fn_fail2ban_conf_erb = 'fail2ban_cd/fail2ban_conf.erb' + $fn_fail2ban_local_file = "${fn_main_dir}/fail2ban.local" + $fn_fail2ban_local_erb = 'fail2ban_cd/fail2ban_local.erb' + $fn_jail_conf_file = "${fn_main_dir}/jail.conf" + $fn_jail_conf_erb = 'fail2ban_cd/jail_conf.erb' + $fn_jail_local_file = "${fn_main_dir}/jail.local" + $fn_jail_local_erb = 'fail2ban_cd/jail_local.erb' + $fn_paths_common_file = "${fn_main_dir}/paths-common.conf" + $fn_paths_common_erb = 'fail2ban_cd/paths_common_conf.erb' # includes must be last - include cd_fail2ban::main::config - + include fail2ban_cd::main::config }