Date: Friday, January 8, 2016 @ 14:08:33 Author: spupykin Revision: 155720
archrelease: copy trunk to community-i686, community-x86_64 Added: sshguard/repos/community-i686/ChangeLog (from rev 155719, sshguard/trunk/ChangeLog) sshguard/repos/community-i686/PKGBUILD (from rev 155719, sshguard/trunk/PKGBUILD) sshguard/repos/community-i686/sshguard-journalctl (from rev 155719, sshguard/trunk/sshguard-journalctl) sshguard/repos/community-i686/sshguard.install (from rev 155719, sshguard/trunk/sshguard.install) sshguard/repos/community-i686/sshguard.service (from rev 155719, sshguard/trunk/sshguard.service) sshguard/repos/community-x86_64/ChangeLog (from rev 155719, sshguard/trunk/ChangeLog) sshguard/repos/community-x86_64/PKGBUILD (from rev 155719, sshguard/trunk/PKGBUILD) sshguard/repos/community-x86_64/sshguard-journalctl (from rev 155719, sshguard/trunk/sshguard-journalctl) sshguard/repos/community-x86_64/sshguard.install (from rev 155719, sshguard/trunk/sshguard.install) sshguard/repos/community-x86_64/sshguard.service (from rev 155719, sshguard/trunk/sshguard.service) Deleted: sshguard/repos/community-i686/ChangeLog sshguard/repos/community-i686/PKGBUILD sshguard/repos/community-i686/sshguard-journalctl sshguard/repos/community-i686/sshguard.install sshguard/repos/community-i686/sshguard.service sshguard/repos/community-x86_64/ChangeLog sshguard/repos/community-x86_64/PKGBUILD sshguard/repos/community-x86_64/sshguard-journalctl sshguard/repos/community-x86_64/sshguard.install sshguard/repos/community-x86_64/sshguard.service --------------------------------------+ /ChangeLog | 6 ++ /PKGBUILD | 74 +++++++++++++++++++++++++++++++++ /sshguard-journalctl | 8 +++ /sshguard.install | 28 ++++++++++++ /sshguard.service | 18 ++++++++ community-i686/ChangeLog | 3 - community-i686/PKGBUILD | 44 ------------------- community-i686/sshguard-journalctl | 4 - community-i686/sshguard.install | 14 ------ community-i686/sshguard.service | 9 ---- community-x86_64/ChangeLog | 3 - community-x86_64/PKGBUILD | 44 ------------------- community-x86_64/sshguard-journalctl | 4 - community-x86_64/sshguard.install | 14 ------ community-x86_64/sshguard.service | 9 ---- 15 files changed, 134 insertions(+), 148 deletions(-) Deleted: community-i686/ChangeLog =================================================================== --- community-i686/ChangeLog 2016-01-08 13:08:11 UTC (rev 155719) +++ community-i686/ChangeLog 2016-01-08 13:08:33 UTC (rev 155720) @@ -1,3 +0,0 @@ -2007-06-28 tardo <ta...@nagi-fanboi.net> -* Built for x86_64 - Copied: sshguard/repos/community-i686/ChangeLog (from rev 155719, sshguard/trunk/ChangeLog) =================================================================== --- community-i686/ChangeLog (rev 0) +++ community-i686/ChangeLog 2016-01-08 13:08:33 UTC (rev 155720) @@ -0,0 +1,3 @@ +2007-06-28 tardo <ta...@nagi-fanboi.net> +* Built for x86_64 + Deleted: community-i686/PKGBUILD =================================================================== --- community-i686/PKGBUILD 2016-01-08 13:08:11 UTC (rev 155719) +++ community-i686/PKGBUILD 2016-01-08 13:08:33 UTC (rev 155720) @@ -1,44 +0,0 @@ -# $Id$ -# Maintainer: Sergej Pupykin <pupykin.s+a...@gmail.com> -# Maintainer: Massimiliano Torromeo <massimiliano.torro...@gmail.com> - -pkgname=sshguard -pkgver=1.6.3 -pkgrel=2 -pkgdesc="Brute force detector for SSH, Exim, VSFTPD and more. Blocks by ip with iptables" -arch=('i686' 'x86_64') -url="http://www.sshguard.net/" -license=('GPL') -depends=('iptables') -options=(zipman) -install=sshguard.install -source=("http://downloads.sourceforge.net/sourceforge/sshguard/sshguard-$pkgver.tar.gz" - sshguard.service - sshguard-journalctl) -sha256sums=('6c4d3be2acf6349b4ac5d6fff4bbcd8fa988c82876d848cbbd0c7c99bc0438c7' - 'c2b3f8c3b8d0dd0bac3eb7c4ba612279dafc67e4e475465b8b3601d1c9ffef53' - 'a8f315d163128d4e8458c1d50c90082581092476937921cba2afb167f51cbe3f') - -prepare() { - cd "$srcdir/$pkgname-$pkgver" - sed -i 's|^DAYNO.*|DAYNO [0-9]?[1-9]|' src/parser/attack_scanner.l - sed -i 's|sshguard_log(LOG_INFO, "Refreshing sources showed|sshguard_log(LOG_DEBUG, "Refreshing sources showed|' src/sshguard_logsuck.c -} - -build() { - cd "$srcdir/$pkgname-$pkgver" - ./configure --prefix=/usr --sbindir=/usr/bin --with-firewall=iptables - make -} - -#check() { -# cd "$srcdir/$pkgname-$pkgver" -# strings src/sshguard | grep -E "^`which iptables`[[:space:]]" >/dev/null -#} - -package() { - cd "$srcdir/$pkgname-$pkgver" - make DESTDIR="$pkgdir" install - install -Dm0644 "$srcdir/sshguard.service" "$pkgdir/usr/lib/systemd/system/sshguard.service" - install -Dm0755 "$srcdir/sshguard-journalctl" "$pkgdir/usr/lib/systemd/scripts/sshguard-journalctl" -} Copied: sshguard/repos/community-i686/PKGBUILD (from rev 155719, sshguard/trunk/PKGBUILD) =================================================================== --- community-i686/PKGBUILD (rev 0) +++ community-i686/PKGBUILD 2016-01-08 13:08:33 UTC (rev 155720) @@ -0,0 +1,37 @@ +# $Id$ +# Maintainer: Sergej Pupykin <pupykin.s+a...@gmail.com> +# Maintainer: Massimiliano Torromeo <massimiliano.torro...@gmail.com> + +pkgname=sshguard +pkgver=1.6.3 +pkgrel=3 +pkgdesc="Brute force detector for SSH, Exim, VSFTPD and more. Blocks by ip with iptables" +arch=('i686' 'x86_64') +url="http://www.sshguard.net/" +license=('GPL') +depends=('iptables') +install=sshguard.install +source=("http://downloads.sourceforge.net/sourceforge/sshguard/sshguard-$pkgver.tar.gz" + sshguard.service + sshguard-journalctl) +sha256sums=('6c4d3be2acf6349b4ac5d6fff4bbcd8fa988c82876d848cbbd0c7c99bc0438c7' + '77b5cb4d00a34f1a0f03272464bac66793389ba05e89be6b7bfb78bdff0b0e92' + 'ce7c3f56edb1b43e0a1629ed646d667d7196808ba82edf7c9e1c3c9c03fca2ba') + +prepare() { + cd "$srcdir/$pkgname-$pkgver" + sed -i 's|^DAYNO.*|DAYNO [0-9]?[1-9]|' src/parser/attack_scanner.l +} + +build() { + cd "$srcdir/$pkgname-$pkgver" + ./configure --prefix=/usr --sbindir=/usr/bin --with-firewall=iptables + make +} + +package() { + cd "$srcdir/$pkgname-$pkgver" + make DESTDIR="$pkgdir" install + install -Dm0644 "$srcdir/sshguard.service" "$pkgdir/usr/lib/systemd/system/sshguard.service" + install -Dm0755 "$srcdir/sshguard-journalctl" "$pkgdir/usr/lib/systemd/scripts/sshguard-journalctl" +} Deleted: community-i686/sshguard-journalctl =================================================================== --- community-i686/sshguard-journalctl 2016-01-08 13:08:11 UTC (rev 155719) +++ community-i686/sshguard-journalctl 2016-01-08 13:08:33 UTC (rev 155720) @@ -1,4 +0,0 @@ -#!/bin/sh -SSHGUARD_OPTS=$1 -shift -LANG=C /usr/bin/journalctl -afb -p info -n1 -o cat "$@" | /usr/bin/sshguard -l- $SSHGUARD_OPTS Copied: sshguard/repos/community-i686/sshguard-journalctl (from rev 155719, sshguard/trunk/sshguard-journalctl) =================================================================== --- community-i686/sshguard-journalctl (rev 0) +++ community-i686/sshguard-journalctl 2016-01-08 13:08:33 UTC (rev 155720) @@ -0,0 +1,4 @@ +#!/bin/sh +SSHGUARD_OPTS=$1 +shift +LANG=C /usr/bin/journalctl -afb -p info -n1 -o cat "$@" | /usr/bin/sshguard $SSHGUARD_OPTS Deleted: community-i686/sshguard.install =================================================================== --- community-i686/sshguard.install 2016-01-08 13:08:11 UTC (rev 155719) +++ community-i686/sshguard.install 2016-01-08 13:08:33 UTC (rev 155720) @@ -1,14 +0,0 @@ -post_install() { - mkdir -p var/db/sshguard - echo "-- You should add chains to your firewall:" - echo "-- iptables -N sshguard" - echo "-- iptables -A INPUT -p tcp --dport 22 -j sshguard" - echo "-- ip6tables -N sshguard" - echo "-- ip6tables -A INPUT -p tcp --dport 22 -j sshguard" - echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6" - echo "-- For more information, see https://wiki.archlinux.org/index.php/Sshguard" -} - -post_upgrade() { - echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6" -} Copied: sshguard/repos/community-i686/sshguard.install (from rev 155719, sshguard/trunk/sshguard.install) =================================================================== --- community-i686/sshguard.install (rev 0) +++ community-i686/sshguard.install 2016-01-08 13:08:33 UTC (rev 155720) @@ -0,0 +1,14 @@ +post_install() { + mkdir -p var/db/sshguard + echo "-- You should add chains to your firewall:" + echo "-- iptables -N sshguard" + echo "-- iptables -A INPUT -p tcp --dport 22 -j sshguard" + echo "-- ip6tables -N sshguard" + echo "-- ip6tables -A INPUT -p tcp --dport 22 -j sshguard" + echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6" + echo "-- For more information, see https://wiki.archlinux.org/index.php/Sshguard" +} + +post_upgrade() { + echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6" +} Deleted: community-i686/sshguard.service =================================================================== --- community-i686/sshguard.service 2016-01-08 13:08:11 UTC (rev 155719) +++ community-i686/sshguard.service 2016-01-08 13:08:33 UTC (rev 155720) @@ -1,9 +0,0 @@ -[Unit] -Description=Block hacking attempts -After=iptables.service ip6tables.service ufw.service shorewall.service shorewall6.service network.target - -[Service] -ExecStart=/usr/lib/systemd/scripts/sshguard-journalctl "-b 40:/var/db/sshguard/blacklist.db" SYSLOG_FACILITY=4 SYSLOG_FACILITY=10 - -[Install] -WantedBy=multi-user.target Copied: sshguard/repos/community-i686/sshguard.service (from rev 155719, sshguard/trunk/sshguard.service) =================================================================== --- community-i686/sshguard.service (rev 0) +++ community-i686/sshguard.service 2016-01-08 13:08:33 UTC (rev 155720) @@ -0,0 +1,9 @@ +[Unit] +Description=Block hacking attempts +After=iptables.service ip6tables.service ufw.service shorewall.service shorewall6.service network.target + +[Service] +ExecStart=/usr/lib/systemd/scripts/sshguard-journalctl "-b 120:/var/db/sshguard/blacklist.db" SYSLOG_FACILITY=4 SYSLOG_FACILITY=10 + +[Install] +WantedBy=multi-user.target Deleted: community-x86_64/ChangeLog =================================================================== --- community-x86_64/ChangeLog 2016-01-08 13:08:11 UTC (rev 155719) +++ community-x86_64/ChangeLog 2016-01-08 13:08:33 UTC (rev 155720) @@ -1,3 +0,0 @@ -2007-06-28 tardo <ta...@nagi-fanboi.net> -* Built for x86_64 - Copied: sshguard/repos/community-x86_64/ChangeLog (from rev 155719, sshguard/trunk/ChangeLog) =================================================================== --- community-x86_64/ChangeLog (rev 0) +++ community-x86_64/ChangeLog 2016-01-08 13:08:33 UTC (rev 155720) @@ -0,0 +1,3 @@ +2007-06-28 tardo <ta...@nagi-fanboi.net> +* Built for x86_64 + Deleted: community-x86_64/PKGBUILD =================================================================== --- community-x86_64/PKGBUILD 2016-01-08 13:08:11 UTC (rev 155719) +++ community-x86_64/PKGBUILD 2016-01-08 13:08:33 UTC (rev 155720) @@ -1,44 +0,0 @@ -# $Id$ -# Maintainer: Sergej Pupykin <pupykin.s+a...@gmail.com> -# Maintainer: Massimiliano Torromeo <massimiliano.torro...@gmail.com> - -pkgname=sshguard -pkgver=1.6.3 -pkgrel=2 -pkgdesc="Brute force detector for SSH, Exim, VSFTPD and more. Blocks by ip with iptables" -arch=('i686' 'x86_64') -url="http://www.sshguard.net/" -license=('GPL') -depends=('iptables') -options=(zipman) -install=sshguard.install -source=("http://downloads.sourceforge.net/sourceforge/sshguard/sshguard-$pkgver.tar.gz" - sshguard.service - sshguard-journalctl) -sha256sums=('6c4d3be2acf6349b4ac5d6fff4bbcd8fa988c82876d848cbbd0c7c99bc0438c7' - 'c2b3f8c3b8d0dd0bac3eb7c4ba612279dafc67e4e475465b8b3601d1c9ffef53' - 'a8f315d163128d4e8458c1d50c90082581092476937921cba2afb167f51cbe3f') - -prepare() { - cd "$srcdir/$pkgname-$pkgver" - sed -i 's|^DAYNO.*|DAYNO [0-9]?[1-9]|' src/parser/attack_scanner.l - sed -i 's|sshguard_log(LOG_INFO, "Refreshing sources showed|sshguard_log(LOG_DEBUG, "Refreshing sources showed|' src/sshguard_logsuck.c -} - -build() { - cd "$srcdir/$pkgname-$pkgver" - ./configure --prefix=/usr --sbindir=/usr/bin --with-firewall=iptables - make -} - -#check() { -# cd "$srcdir/$pkgname-$pkgver" -# strings src/sshguard | grep -E "^`which iptables`[[:space:]]" >/dev/null -#} - -package() { - cd "$srcdir/$pkgname-$pkgver" - make DESTDIR="$pkgdir" install - install -Dm0644 "$srcdir/sshguard.service" "$pkgdir/usr/lib/systemd/system/sshguard.service" - install -Dm0755 "$srcdir/sshguard-journalctl" "$pkgdir/usr/lib/systemd/scripts/sshguard-journalctl" -} Copied: sshguard/repos/community-x86_64/PKGBUILD (from rev 155719, sshguard/trunk/PKGBUILD) =================================================================== --- community-x86_64/PKGBUILD (rev 0) +++ community-x86_64/PKGBUILD 2016-01-08 13:08:33 UTC (rev 155720) @@ -0,0 +1,37 @@ +# $Id$ +# Maintainer: Sergej Pupykin <pupykin.s+a...@gmail.com> +# Maintainer: Massimiliano Torromeo <massimiliano.torro...@gmail.com> + +pkgname=sshguard +pkgver=1.6.3 +pkgrel=3 +pkgdesc="Brute force detector for SSH, Exim, VSFTPD and more. Blocks by ip with iptables" +arch=('i686' 'x86_64') +url="http://www.sshguard.net/" +license=('GPL') +depends=('iptables') +install=sshguard.install +source=("http://downloads.sourceforge.net/sourceforge/sshguard/sshguard-$pkgver.tar.gz" + sshguard.service + sshguard-journalctl) +sha256sums=('6c4d3be2acf6349b4ac5d6fff4bbcd8fa988c82876d848cbbd0c7c99bc0438c7' + '77b5cb4d00a34f1a0f03272464bac66793389ba05e89be6b7bfb78bdff0b0e92' + 'ce7c3f56edb1b43e0a1629ed646d667d7196808ba82edf7c9e1c3c9c03fca2ba') + +prepare() { + cd "$srcdir/$pkgname-$pkgver" + sed -i 's|^DAYNO.*|DAYNO [0-9]?[1-9]|' src/parser/attack_scanner.l +} + +build() { + cd "$srcdir/$pkgname-$pkgver" + ./configure --prefix=/usr --sbindir=/usr/bin --with-firewall=iptables + make +} + +package() { + cd "$srcdir/$pkgname-$pkgver" + make DESTDIR="$pkgdir" install + install -Dm0644 "$srcdir/sshguard.service" "$pkgdir/usr/lib/systemd/system/sshguard.service" + install -Dm0755 "$srcdir/sshguard-journalctl" "$pkgdir/usr/lib/systemd/scripts/sshguard-journalctl" +} Deleted: community-x86_64/sshguard-journalctl =================================================================== --- community-x86_64/sshguard-journalctl 2016-01-08 13:08:11 UTC (rev 155719) +++ community-x86_64/sshguard-journalctl 2016-01-08 13:08:33 UTC (rev 155720) @@ -1,4 +0,0 @@ -#!/bin/sh -SSHGUARD_OPTS=$1 -shift -LANG=C /usr/bin/journalctl -afb -p info -n1 -o cat "$@" | /usr/bin/sshguard -l- $SSHGUARD_OPTS Copied: sshguard/repos/community-x86_64/sshguard-journalctl (from rev 155719, sshguard/trunk/sshguard-journalctl) =================================================================== --- community-x86_64/sshguard-journalctl (rev 0) +++ community-x86_64/sshguard-journalctl 2016-01-08 13:08:33 UTC (rev 155720) @@ -0,0 +1,4 @@ +#!/bin/sh +SSHGUARD_OPTS=$1 +shift +LANG=C /usr/bin/journalctl -afb -p info -n1 -o cat "$@" | /usr/bin/sshguard $SSHGUARD_OPTS Deleted: community-x86_64/sshguard.install =================================================================== --- community-x86_64/sshguard.install 2016-01-08 13:08:11 UTC (rev 155719) +++ community-x86_64/sshguard.install 2016-01-08 13:08:33 UTC (rev 155720) @@ -1,14 +0,0 @@ -post_install() { - mkdir -p var/db/sshguard - echo "-- You should add chains to your firewall:" - echo "-- iptables -N sshguard" - echo "-- iptables -A INPUT -p tcp --dport 22 -j sshguard" - echo "-- ip6tables -N sshguard" - echo "-- ip6tables -A INPUT -p tcp --dport 22 -j sshguard" - echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6" - echo "-- For more information, see https://wiki.archlinux.org/index.php/Sshguard" -} - -post_upgrade() { - echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6" -} Copied: sshguard/repos/community-x86_64/sshguard.install (from rev 155719, sshguard/trunk/sshguard.install) =================================================================== --- community-x86_64/sshguard.install (rev 0) +++ community-x86_64/sshguard.install 2016-01-08 13:08:33 UTC (rev 155720) @@ -0,0 +1,14 @@ +post_install() { + mkdir -p var/db/sshguard + echo "-- You should add chains to your firewall:" + echo "-- iptables -N sshguard" + echo "-- iptables -A INPUT -p tcp --dport 22 -j sshguard" + echo "-- ip6tables -N sshguard" + echo "-- ip6tables -A INPUT -p tcp --dport 22 -j sshguard" + echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6" + echo "-- For more information, see https://wiki.archlinux.org/index.php/Sshguard" +} + +post_upgrade() { + echo "-- touch /etc/iptables/ip6tables.rules if you don't use IPv6" +} Deleted: community-x86_64/sshguard.service =================================================================== --- community-x86_64/sshguard.service 2016-01-08 13:08:11 UTC (rev 155719) +++ community-x86_64/sshguard.service 2016-01-08 13:08:33 UTC (rev 155720) @@ -1,9 +0,0 @@ -[Unit] -Description=Block hacking attempts -After=iptables.service ip6tables.service ufw.service shorewall.service shorewall6.service network.target - -[Service] -ExecStart=/usr/lib/systemd/scripts/sshguard-journalctl "-b 40:/var/db/sshguard/blacklist.db" SYSLOG_FACILITY=4 SYSLOG_FACILITY=10 - -[Install] -WantedBy=multi-user.target Copied: sshguard/repos/community-x86_64/sshguard.service (from rev 155719, sshguard/trunk/sshguard.service) =================================================================== --- community-x86_64/sshguard.service (rev 0) +++ community-x86_64/sshguard.service 2016-01-08 13:08:33 UTC (rev 155720) @@ -0,0 +1,9 @@ +[Unit] +Description=Block hacking attempts +After=iptables.service ip6tables.service ufw.service shorewall.service shorewall6.service network.target + +[Service] +ExecStart=/usr/lib/systemd/scripts/sshguard-journalctl "-b 120:/var/db/sshguard/blacklist.db" SYSLOG_FACILITY=4 SYSLOG_FACILITY=10 + +[Install] +WantedBy=multi-user.target