- Feb 18, 2024
-
-
Kristian Klausen authored
The firewalld direct interface is deprecated and will be removed in a future release[1]. Recently IPv4 connectivity inside docker containers on our runners broke and after some troubleshooting, the issue was pinpointed to the start of the fail2ban service. We also had issues in the past where sometimes firewalld had to be restarted after boot before network connectivity worked in libvirt on our runners. The issuse may be due to a bug in the way fail2ban use the direct interface, a bug in firewalld or a combination thereof. Let's just avoid the direct interface altogether and create a clean separation, with firewalld handling the blocking and fail2ban maintaining the ipset. [1] https://firewalld.org/documentation/man-pages/firewalld.direct.html
-
- Feb 18, 2023
-
-
Convert the permissions to strings to avoid octal interpretation. Signed-off-by:
Leonidas Spyropoulos <artafinde@archlinux.org>
-
- Aug 29, 2022
-
-
Evangelos Foutras authored
Fixes: 26f289b7 ("Capitalize the first letter of all task names")
-
- Aug 23, 2022
-
-
Evangelos Foutras authored
ansible-lint 6.5.0 complains about: name: All names should start with an uppercase letter. (name[casing])
-
- May 23, 2021
-
-
Signed-off-by:
Leonidas Spyropoulos <artafinde@gmail.com>
-
- Feb 14, 2021
-
-
Kristian Klausen authored
yaml: truthy value should be one of [false, true] (truthy) yaml: wrong indentation: expected 4 but found 2 (indentation) yaml: too few spaces before comment (comments) yaml: missing starting space in comment (comments) yaml: too many blank lines (1 > 0) (empty-lines) yaml: too many spaces after colon (colons) yaml: comment not indented like content (comments-indentation) yaml: no new line character at the end of file (new-line-at-end-of-file) load-failure: Failed to load or parse file parser-error: couldn't resolve module/action 'hosts'. This often indicates a misspelling, missing collection, or incorrect module path.
-
- Jun 12, 2020
-
-
Frederik Schwan authored
-
- Oct 30, 2019
-
-
Phillip Smith (fukawi2) authored
-
- Oct 25, 2019
-
-
Phillip Smith authored
fail2ban role now protects postfix, dovecot and sshd. other roles can drop configuration files into /etc/fail2ban/jail.d/*.local to enable fail2ban to monitor it's service.
-
- Sep 01, 2019
-
-
Jelle van der Waa authored
This bans all requests exceeding 1/min in a time period of 30 minutes. This might be too harse and can be adjusted later.
-