Date: Thu, 24 Sep 2020 15:48:37 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 249578] security/py-fail2ban: Missing paths Message-ID: <bug-249578-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D249578 Bug ID: 249578 Summary: security/py-fail2ban: Missing paths Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: laszlo@karolyi.hu CC: theis@gmx.at CC: theis@gmx.at Flags: maintainer-feedback?(theis@gmx.at) Created attachment 218243 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D218243&action= =3Dedit Patched /usr/local/etc/rc.d/fail2ban script Hey, as discussed with the maintainer, the fail2ban port misses the /usr/local prefixes in the PATH and because of this, some actions that don't use absol= ute paths (e.g. abuseipdb, blocklist_de) will not work. They use non-absolute command paths (curl) for linux compatibility. I have patched my local fail2ban to include those, but would like to have it included in the package provided /usr/local/etc/rc.d/fail2ban script. The generic idea is something along the lines of the attached patch. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-249578-7788>