Skip to content

Support overriding configuration for default jails #100

Support overriding configuration for default jails

Support overriding configuration for default jails #100

Triggered via pull request June 14, 2023 09:33
Status Failure
Total duration 6m 19s
Artifacts

ci.yml

on: pull_request
Puppet  /  Static validations
21s
Puppet / Static validations
Matrix: Puppet / acceptance
Matrix: Puppet / unit
Puppet  /  Test suite
0s
Puppet / Test suite
Fit to window
Zoom out
Zoom in

Annotations

10 errors
Puppet / 7 - Ubuntu 22.04: spec/acceptance/class_spec.rb#L452
fail2ban fail2ban::service when overriding default port configuration is expected to modify sshd port Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+ssh,2200$} expected "# [sshd]\n# enabled = true\n#\n# See jail.conf(5) man page for more information\n\n\n\n# Comments: u...e = normal\nenabled = true\nport = ssh\nlogpath = %(sshd_log)s\nbackend = %(sshd_backend)s\n\n" to match /^port\s+=\s+ssh,2200$/ Diff: @@ -1,22 +1,43 @@ -/^port\s+=\s+ssh,2200$/ +# [sshd] +# enabled = true +# +# See jail.conf(5) man page for more information + + + +# Comments: use '#' for comment lines and ';' (following a space) for inline comments + + +[INCLUDES] +-- +[sshd] + +# To use more aggressive sshd modes set filter parameter "mode" in jail.local: +# normal (default), ddos, extra or aggressive (combines all). +# See "tests/files/logs/sshd" or "filter.d/sshd.conf" for usage example and details. +#mode = normal +enabled = true +port = ssh +logpath = %(sshd_log)s +backend = %(sshd_backend)s
Puppet / 7 - Ubuntu 22.04: spec/acceptance/class_spec.rb#L462
fail2ban fail2ban::service when overriding default port configuration is expected to modify lighttpd-auth port Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$} expected "[lighttpd-auth]\n# Same as above for Apache's mod_auth\n# It catches wrong authentifications\nenabled = false\nport = http,https\nlogpath = %(lighttpd_error_log)s\n\n" to match /^port\s+=\s+80,443$/ Diff: @@ -1,6 +1,11 @@ -/^port\s+=\s+80,443$/ +[lighttpd-auth] +# Same as above for Apache's mod_auth +# It catches wrong authentifications +enabled = false +port = http,https +logpath = %(lighttpd_error_log)s
Puppet / 7 - Ubuntu 22.04: spec/acceptance/class_spec.rb#L470
fail2ban fail2ban::service when overriding default port configuration is expected to modify roundcube-auth port Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$} expected "[roundcube-auth]\n\nenabled = false\nport = http,https\nlogpath = %(roundcube_errors_log)s\n# U...se following line in your jail.local if roundcube logs to journal.\n#backend = %(syslog_backend)s\n" to match /^port\s+=\s+80,443$/ Diff: @@ -1,7 +1,13 @@ -/^port\s+=\s+80,443$/ +[roundcube-auth] + +enabled = false +port = http,https +logpath = %(roundcube_errors_log)s +# Use following line in your jail.local if roundcube logs to journal. +#backend = %(syslog_backend)s
Puppet / 7 - Ubuntu 22.04: spec/acceptance/class_spec.rb#L478
fail2ban fail2ban::service when overriding default port configuration is expected to modify apache-nohome port Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$} expected "[apache-nohome]\n\nenabled = false\nport = http,https\nlogpath = %(apache_error_log)s\nmaxretry = 2\n\n" to match /^port\s+=\s+80,443$/ Diff: @@ -1,6 +1,11 @@ -/^port\s+=\s+80,443$/ +[apache-nohome] + +enabled = false +port = http,https +logpath = %(apache_error_log)s +maxretry = 2
Puppet / 7 - Ubuntu 22.04: spec/acceptance/class_spec.rb#L486
fail2ban fail2ban::service when overriding default port configuration is expected to modify suhosin port Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$} expected "[suhosin]\n\nenabled = false\nport = http,https\nlogpath = %(suhosin_log)s\n\n\n" to match /^port\s+=\s+80,443$/ Diff: @@ -1,5 +1,9 @@ -/^port\s+=\s+80,443$/ +[suhosin] + +enabled = false +port = http,https +logpath = %(suhosin_log)s
Puppet / 7 - Ubuntu 22.04: spec/acceptance/class_spec.rb#L494
fail2ban fail2ban::service when overriding default port configuration is expected to modify selinux-ssh port Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+ssh,2202$} expected "[selinux-ssh]\n\nenabled = false\nport = ssh\nlogpath = %(auditd_log)s\n\n" to match /^port\s+=\s+ssh,2202$/ Diff: @@ -1,5 +1,9 @@ -/^port\s+=\s+ssh,2202$/ +[selinux-ssh] + +enabled = false +port = ssh +logpath = %(auditd_log)s
Puppet / 7 - Ubuntu 22.04: spec/acceptance/class_spec.rb#L503
fail2ban fail2ban::service when overriding default port configuration is expected to modify apache-auth port Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+81$} expected "[apache-auth]\n\nenabled = false\nport = http,https\nlogpath = %(apache_error_log)s\n\n" to match /^port\s+=\s+81$/ Diff: @@ -1,5 +1,9 @@ -/^port\s+=\s+81$/ +[apache-auth] + +enabled = false +port = http,https +logpath = %(apache_error_log)s
Puppet / 7 - Ubuntu 22.04: spec/acceptance/class_spec.rb#L512
fail2ban fail2ban::service when overriding default port configuration is expected to modify horde port Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$} expected "[horde]\n\nenabled = false\nport = http,https\nlogpath = /var/log/horde/horde.log\n\n\n" to match /^port\s+=\s+80,443$/ Diff: @@ -1,5 +1,9 @@ -/^port\s+=\s+80,443$/ +[horde] + +enabled = false +port = http,https +logpath = /var/log/horde/horde.log
Puppet / 7 - Ubuntu 22.04: spec/acceptance/class_spec.rb#L521
fail2ban fail2ban::service when overriding default port configuration is expected to modify groupoffice port Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$} expected "[groupoffice]\n\nenabled = false\nport = http,https\nlogpath = /home/groupoffice/log/info.log\n\n\n" to match /^port\s+=\s+80,443$/ Diff: @@ -1,5 +1,9 @@ -/^port\s+=\s+80,443$/ +[groupoffice] + +enabled = false +port = http,https +logpath = /home/groupoffice/log/info.log
Puppet / 7 - Ubuntu 22.04: spec/acceptance/class_spec.rb#L530
fail2ban fail2ban::service when overriding default port configuration is expected to modify openwebmail port Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$} expected "[openwebmail]\n\nenabled = false\nport = http,https\nlogpath = /var/log/openwebmail.log\n\n\n" to match /^port\s+=\s+80,443$/ Diff: @@ -1,5 +1,9 @@ -/^port\s+=\s+80,443$/ +[openwebmail] + +enabled = false +port = http,https +logpath = /var/log/openwebmail.log