Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 29 Jan 2011 11:56:37 GMT
From:      Jase Thew <freebsd@beardz.net>
To:        FreeBSD-gnats-submit@FreeBSD.org
Cc:        tony@pc-tony.com
Subject:   ports/154374: [PATCH] security/py-fail2ban: Allow use with python27
Message-ID:  <201101291156.p0TBubXP064054@beardz.net>
Resent-Message-ID: <201101291200.p0TC0HBR089105@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         154374
>Category:       ports
>Synopsis:       [PATCH] security/py-fail2ban: Allow use with python27
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Sat Jan 29 12:00:16 UTC 2011
>Closed-Date:
>Last-Modified:
>Originator:     Jase Thew
>Release:        FreeBSD 8.1-STABLE amd64
>Organization:
>Environment:
System: FreeBSD beardz.net 8.1-STABLE FreeBSD 8.1-STABLE #0: Wed Nov 17 00:11:36 GMT 2010
>Description:
Fail2ban works fine with lang/python27, so allow the use of it.

Additionally:
  Fix various Makefile issues identified by portlint.
  Remove MD5 checksum from distinfo.

Port maintainer (tony@pc-tony.com) is cc'd.

Generated with FreeBSD Port Tools 0.99
>How-To-Repeat:
>Fix:

--- py27-fail2ban-0.8.4.patch begins here ---
diff -ruN --exclude=CVS /usr/ports/security/py-fail2ban.orig/Makefile /usr/ports/security/py-fail2ban/Makefile
--- /usr/ports/security/py-fail2ban.orig/Makefile	2010-04-29 20:43:20.000000000 +0100
+++ /usr/ports/security/py-fail2ban/Makefile	2011-01-29 11:50:18.746352876 +0000
@@ -9,23 +9,23 @@
 PORTVERSION=	0.8.4
 CATEGORIES=	security python
 MASTER_SITES=	SF/${PORTNAME}/${PORTNAME}-stable/${PORTNAME}-${PORTVERSION}
-PKGNAMEPREFIX=  ${PYTHON_PKGNAMEPREFIX}
+PKGNAMEPREFIX=	${PYTHON_PKGNAMEPREFIX}
 
 MAINTAINER=	tony@pc-tony.com
-COMMENT=	scans log files and bans IP that makes too many password failures. 
+COMMENT=	Scans log files and bans IP that makes too many password failures
 
-MAKE_JOBS_SAFE= yes
+MAKE_JOBS_SAFE=	yes
 
 USE_BZIP2=	yes
 
-USE_PYTHON=	2.5-2.6
+USE_PYTHON=	2.5-2.7
 USE_PYDISTUTILS=	yes
 
 USE_RC_SUBR=	fail2ban
 SUB_LIST+=	PYTHON_CMD=${PYTHON_CMD}
 
 PYDISTUTILS_INSTALLARGS+=	--install-purelib=${PYTHON_SITELIBDIR} \
-				--install-data=${ETCDIR} 
+				--install-data=${ETCDIR}
 
 FILES=	${WRKSRC}/fail2ban-regex \
 		${WRKSRC}/man/fail2ban-client.1 \
diff -ruN --exclude=CVS /usr/ports/security/py-fail2ban.orig/distinfo /usr/ports/security/py-fail2ban/distinfo
--- /usr/ports/security/py-fail2ban.orig/distinfo	2010-02-01 03:31:37.000000000 +0000
+++ /usr/ports/security/py-fail2ban/distinfo	2011-01-29 11:50:33.365968918 +0000
@@ -1,3 +1,2 @@
-MD5 (fail2ban-0.8.4.tar.bz2) = df94335a5d12b4750869e5fe350073fa
 SHA256 (fail2ban-0.8.4.tar.bz2) = 7a4fc0ea6dffde1db1d096757878e1b2c5f0b087a05ed7e7ca0202fb0b127982
 SIZE (fail2ban-0.8.4.tar.bz2) = 71818
--- py27-fail2ban-0.8.4.patch ends here ---

>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201101291156.p0TBubXP064054>