Support overriding configuration for default jails #177
Triggered via pull request
September 26, 2024 10:09
Status
Failure
Total duration
3m 54s
Artifacts
–
ci.yml
on: pull_request
Puppet
/
Static validations
15s
Matrix: Puppet / acceptance
Matrix: Puppet / unit
Puppet
/
Test suite
4s
Annotations
41 errors and 2 warnings
Puppet / Puppet 7 - Debian 12:
spec/acceptance/class_spec.rb#L452
fail2ban fail2ban::service when overriding default port configuration is expected to modify sshd port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+ssh,2200$}
expected "# [sshd]\n# enabled = true\n#\n# See jail.conf(5) man page for more information\n\n\n\n# Comments: u...d details.\n#mode = normal\nport = ssh\nlogpath = %(sshd_log)s\nbackend = %(sshd_backend)s\n\n" to match /^port\s+=\s+ssh,2200$/
Diff:
@@ -1,22 +1,43 @@
-/^port\s+=\s+ssh,2200$/
+# [sshd]
+# enabled = true
+#
+# See jail.conf(5) man page for more information
+
+
+
+# Comments: use '#' for comment lines and ';' (following a space) for inline comments
+
+
+[INCLUDES]
+--
+[sshd]
+
+enabled = true
+# To use more aggressive sshd modes set filter parameter "mode" in jail.local:
+# normal (default), ddos, extra or aggressive (combines all).
+# See "tests/files/logs/sshd" or "filter.d/sshd.conf" for usage example and details.
+#mode = normal
+port = ssh
+logpath = %(sshd_log)s
+backend = %(sshd_backend)s
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/class_spec.rb#L462
fail2ban fail2ban::service when overriding default port configuration is expected to modify lighttpd-auth port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[lighttpd-auth]\n# Same as above for Apache's mod_auth\n# It catches wrong authentifications\nenabled = false\nport = http,https\nlogpath = %(lighttpd_error_log)s\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,6 +1,11 @@
-/^port\s+=\s+80,443$/
+[lighttpd-auth]
+# Same as above for Apache's mod_auth
+# It catches wrong authentifications
+enabled = false
+port = http,https
+logpath = %(lighttpd_error_log)s
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/class_spec.rb#L470
fail2ban fail2ban::service when overriding default port configuration is expected to modify roundcube-auth port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[roundcube-auth]\n\nenabled = false\nport = http,https\nlogpath = %(roundcube_errors_log)s\n# U...se following line in your jail.local if roundcube logs to journal.\n#backend = %(syslog_backend)s\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,7 +1,13 @@
-/^port\s+=\s+80,443$/
+[roundcube-auth]
+
+enabled = false
+port = http,https
+logpath = %(roundcube_errors_log)s
+# Use following line in your jail.local if roundcube logs to journal.
+#backend = %(syslog_backend)s
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/class_spec.rb#L478
fail2ban fail2ban::service when overriding default port configuration is expected to modify apache-nohome port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[apache-nohome]\n\nenabled = false\nport = http,https\nlogpath = %(apache_error_log)s\nmaxretry = 2\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,6 +1,11 @@
-/^port\s+=\s+80,443$/
+[apache-nohome]
+
+enabled = false
+port = http,https
+logpath = %(apache_error_log)s
+maxretry = 2
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/class_spec.rb#L486
fail2ban fail2ban::service when overriding default port configuration is expected to modify suhosin port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[suhosin]\n\nenabled = false\nport = http,https\nlogpath = %(suhosin_log)s\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[suhosin]
+
+enabled = false
+port = http,https
+logpath = %(suhosin_log)s
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/class_spec.rb#L494
fail2ban fail2ban::service when overriding default port configuration is expected to modify selinux-ssh port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+ssh,2202$}
expected "[selinux-ssh]\n\nenabled = false\nport = ssh\nlogpath = %(auditd_log)s\n\n" to match /^port\s+=\s+ssh,2202$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+ssh,2202$/
+[selinux-ssh]
+
+enabled = false
+port = ssh
+logpath = %(auditd_log)s
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/class_spec.rb#L503
fail2ban fail2ban::service when overriding default port configuration is expected to modify apache-auth port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+81$}
expected "[apache-auth]\n\nenabled = false\nport = http,https\nlogpath = %(apache_error_log)s\n\n" to match /^port\s+=\s+81$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+81$/
+[apache-auth]
+
+enabled = false
+port = http,https
+logpath = %(apache_error_log)s
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/class_spec.rb#L512
fail2ban fail2ban::service when overriding default port configuration is expected to modify horde port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[horde]\n\nenabled = false\nport = http,https\nlogpath = /var/log/horde/horde.log\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[horde]
+
+enabled = false
+port = http,https
+logpath = /var/log/horde/horde.log
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/class_spec.rb#L521
fail2ban fail2ban::service when overriding default port configuration is expected to modify groupoffice port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[groupoffice]\n\nenabled = false\nport = http,https\nlogpath = /home/groupoffice/log/info.log\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[groupoffice]
+
+enabled = false
+port = http,https
+logpath = /home/groupoffice/log/info.log
|
Puppet / Puppet 7 - Debian 12:
spec/acceptance/class_spec.rb#L530
fail2ban fail2ban::service when overriding default port configuration is expected to modify openwebmail port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[openwebmail]\n\nenabled = false\nport = http,https\nlogpath = /var/log/openwebmail.log\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[openwebmail]
+
+enabled = false
+port = http,https
+logpath = /var/log/openwebmail.log
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L452
fail2ban fail2ban::service when overriding default port configuration is expected to modify sshd port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+ssh,2200$}
expected "# [sshd]\n# enabled = true\n#\n# See jail.conf(5) man page for more information\n\n\n\n# Comments: u...e = normal\nenabled = true\nport = ssh\nlogpath = %(sshd_log)s\nbackend = %(sshd_backend)s\n\n" to match /^port\s+=\s+ssh,2200$/
Diff:
@@ -1,22 +1,43 @@
-/^port\s+=\s+ssh,2200$/
+# [sshd]
+# enabled = true
+#
+# See jail.conf(5) man page for more information
+
+
+
+# Comments: use '#' for comment lines and ';' (following a space) for inline comments
+
+
+[INCLUDES]
+--
+[sshd]
+
+# To use more aggressive sshd modes set filter parameter "mode" in jail.local:
+# normal (default), ddos, extra or aggressive (combines all).
+# See "tests/files/logs/sshd" or "filter.d/sshd.conf" for usage example and details.
+#mode = normal
+enabled = true
+port = ssh
+logpath = %(sshd_log)s
+backend = %(sshd_backend)s
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L462
fail2ban fail2ban::service when overriding default port configuration is expected to modify lighttpd-auth port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[lighttpd-auth]\n# Same as above for Apache's mod_auth\n# It catches wrong authentifications\nenabled = false\nport = http,https\nlogpath = %(lighttpd_error_log)s\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,6 +1,11 @@
-/^port\s+=\s+80,443$/
+[lighttpd-auth]
+# Same as above for Apache's mod_auth
+# It catches wrong authentifications
+enabled = false
+port = http,https
+logpath = %(lighttpd_error_log)s
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L470
fail2ban fail2ban::service when overriding default port configuration is expected to modify roundcube-auth port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[roundcube-auth]\n\nenabled = false\nport = http,https\nlogpath = %(roundcube_errors_log)s\n# U...se following line in your jail.local if roundcube logs to journal.\n#backend = %(syslog_backend)s\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,7 +1,13 @@
-/^port\s+=\s+80,443$/
+[roundcube-auth]
+
+enabled = false
+port = http,https
+logpath = %(roundcube_errors_log)s
+# Use following line in your jail.local if roundcube logs to journal.
+#backend = %(syslog_backend)s
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L478
fail2ban fail2ban::service when overriding default port configuration is expected to modify apache-nohome port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[apache-nohome]\n\nenabled = false\nport = http,https\nlogpath = %(apache_error_log)s\nmaxretry = 2\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,6 +1,11 @@
-/^port\s+=\s+80,443$/
+[apache-nohome]
+
+enabled = false
+port = http,https
+logpath = %(apache_error_log)s
+maxretry = 2
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L486
fail2ban fail2ban::service when overriding default port configuration is expected to modify suhosin port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[suhosin]\n\nenabled = false\nport = http,https\nlogpath = %(suhosin_log)s\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[suhosin]
+
+enabled = false
+port = http,https
+logpath = %(suhosin_log)s
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L494
fail2ban fail2ban::service when overriding default port configuration is expected to modify selinux-ssh port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+ssh,2202$}
expected "[selinux-ssh]\n\nenabled = false\nport = ssh\nlogpath = %(auditd_log)s\n\n" to match /^port\s+=\s+ssh,2202$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+ssh,2202$/
+[selinux-ssh]
+
+enabled = false
+port = ssh
+logpath = %(auditd_log)s
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L503
fail2ban fail2ban::service when overriding default port configuration is expected to modify apache-auth port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+81$}
expected "[apache-auth]\n\nenabled = false\nport = http,https\nlogpath = %(apache_error_log)s\n\n" to match /^port\s+=\s+81$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+81$/
+[apache-auth]
+
+enabled = false
+port = http,https
+logpath = %(apache_error_log)s
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L512
fail2ban fail2ban::service when overriding default port configuration is expected to modify horde port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[horde]\n\nenabled = false\nport = http,https\nlogpath = /var/log/horde/horde.log\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[horde]
+
+enabled = false
+port = http,https
+logpath = /var/log/horde/horde.log
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L521
fail2ban fail2ban::service when overriding default port configuration is expected to modify groupoffice port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[groupoffice]\n\nenabled = false\nport = http,https\nlogpath = /home/groupoffice/log/info.log\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[groupoffice]
+
+enabled = false
+port = http,https
+logpath = /home/groupoffice/log/info.log
|
Puppet / Puppet 7 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L530
fail2ban fail2ban::service when overriding default port configuration is expected to modify openwebmail port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[openwebmail]\n\nenabled = false\nport = http,https\nlogpath = /var/log/openwebmail.log\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[openwebmail]
+
+enabled = false
+port = http,https
+logpath = /var/log/openwebmail.log
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L452
fail2ban fail2ban::service when overriding default port configuration is expected to modify sshd port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+ssh,2200$}
expected "# [sshd]\n# enabled = true\n#\n# See jail.conf(5) man page for more information\n\n\n\n# Comments: u...e = normal\nenabled = true\nport = ssh\nlogpath = %(sshd_log)s\nbackend = %(sshd_backend)s\n\n" to match /^port\s+=\s+ssh,2200$/
Diff:
@@ -1,22 +1,43 @@
-/^port\s+=\s+ssh,2200$/
+# [sshd]
+# enabled = true
+#
+# See jail.conf(5) man page for more information
+
+
+
+# Comments: use '#' for comment lines and ';' (following a space) for inline comments
+
+
+[INCLUDES]
+--
+[sshd]
+
+# To use more aggressive sshd modes set filter parameter "mode" in jail.local:
+# normal (default), ddos, extra or aggressive (combines all).
+# See "tests/files/logs/sshd" or "filter.d/sshd.conf" for usage example and details.
+#mode = normal
+enabled = true
+port = ssh
+logpath = %(sshd_log)s
+backend = %(sshd_backend)s
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L462
fail2ban fail2ban::service when overriding default port configuration is expected to modify lighttpd-auth port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[lighttpd-auth]\n# Same as above for Apache's mod_auth\n# It catches wrong authentifications\nenabled = false\nport = http,https\nlogpath = %(lighttpd_error_log)s\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,6 +1,11 @@
-/^port\s+=\s+80,443$/
+[lighttpd-auth]
+# Same as above for Apache's mod_auth
+# It catches wrong authentifications
+enabled = false
+port = http,https
+logpath = %(lighttpd_error_log)s
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L470
fail2ban fail2ban::service when overriding default port configuration is expected to modify roundcube-auth port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[roundcube-auth]\n\nenabled = false\nport = http,https\nlogpath = %(roundcube_errors_log)s\n# U...se following line in your jail.local if roundcube logs to journal.\n#backend = %(syslog_backend)s\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,7 +1,13 @@
-/^port\s+=\s+80,443$/
+[roundcube-auth]
+
+enabled = false
+port = http,https
+logpath = %(roundcube_errors_log)s
+# Use following line in your jail.local if roundcube logs to journal.
+#backend = %(syslog_backend)s
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L478
fail2ban fail2ban::service when overriding default port configuration is expected to modify apache-nohome port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[apache-nohome]\n\nenabled = false\nport = http,https\nlogpath = %(apache_error_log)s\nmaxretry = 2\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,6 +1,11 @@
-/^port\s+=\s+80,443$/
+[apache-nohome]
+
+enabled = false
+port = http,https
+logpath = %(apache_error_log)s
+maxretry = 2
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L486
fail2ban fail2ban::service when overriding default port configuration is expected to modify suhosin port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[suhosin]\n\nenabled = false\nport = http,https\nlogpath = %(suhosin_log)s\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[suhosin]
+
+enabled = false
+port = http,https
+logpath = %(suhosin_log)s
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L494
fail2ban fail2ban::service when overriding default port configuration is expected to modify selinux-ssh port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+ssh,2202$}
expected "[selinux-ssh]\n\nenabled = false\nport = ssh\nlogpath = %(auditd_log)s\n\n" to match /^port\s+=\s+ssh,2202$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+ssh,2202$/
+[selinux-ssh]
+
+enabled = false
+port = ssh
+logpath = %(auditd_log)s
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L503
fail2ban fail2ban::service when overriding default port configuration is expected to modify apache-auth port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+81$}
expected "[apache-auth]\n\nenabled = false\nport = http,https\nlogpath = %(apache_error_log)s\n\n" to match /^port\s+=\s+81$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+81$/
+[apache-auth]
+
+enabled = false
+port = http,https
+logpath = %(apache_error_log)s
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L512
fail2ban fail2ban::service when overriding default port configuration is expected to modify horde port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[horde]\n\nenabled = false\nport = http,https\nlogpath = /var/log/horde/horde.log\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[horde]
+
+enabled = false
+port = http,https
+logpath = /var/log/horde/horde.log
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L521
fail2ban fail2ban::service when overriding default port configuration is expected to modify groupoffice port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[groupoffice]\n\nenabled = false\nport = http,https\nlogpath = /home/groupoffice/log/info.log\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[groupoffice]
+
+enabled = false
+port = http,https
+logpath = /home/groupoffice/log/info.log
|
Puppet / Puppet 8 - Ubuntu 24.04:
spec/acceptance/class_spec.rb#L530
fail2ban fail2ban::service when overriding default port configuration is expected to modify openwebmail port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[openwebmail]\n\nenabled = false\nport = http,https\nlogpath = /var/log/openwebmail.log\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[openwebmail]
+
+enabled = false
+port = http,https
+logpath = /var/log/openwebmail.log
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/class_spec.rb#L452
fail2ban fail2ban::service when overriding default port configuration is expected to modify sshd port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+ssh,2200$}
expected "# [sshd]\n# enabled = true\n#\n# See jail.conf(5) man page for more information\n\n\n\n# Comments: u...d details.\n#mode = normal\nport = ssh\nlogpath = %(sshd_log)s\nbackend = %(sshd_backend)s\n\n" to match /^port\s+=\s+ssh,2200$/
Diff:
@@ -1,22 +1,43 @@
-/^port\s+=\s+ssh,2200$/
+# [sshd]
+# enabled = true
+#
+# See jail.conf(5) man page for more information
+
+
+
+# Comments: use '#' for comment lines and ';' (following a space) for inline comments
+
+
+[INCLUDES]
+--
+[sshd]
+
+enabled = true
+# To use more aggressive sshd modes set filter parameter "mode" in jail.local:
+# normal (default), ddos, extra or aggressive (combines all).
+# See "tests/files/logs/sshd" or "filter.d/sshd.conf" for usage example and details.
+#mode = normal
+port = ssh
+logpath = %(sshd_log)s
+backend = %(sshd_backend)s
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/class_spec.rb#L462
fail2ban fail2ban::service when overriding default port configuration is expected to modify lighttpd-auth port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[lighttpd-auth]\n# Same as above for Apache's mod_auth\n# It catches wrong authentifications\nenabled = false\nport = http,https\nlogpath = %(lighttpd_error_log)s\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,6 +1,11 @@
-/^port\s+=\s+80,443$/
+[lighttpd-auth]
+# Same as above for Apache's mod_auth
+# It catches wrong authentifications
+enabled = false
+port = http,https
+logpath = %(lighttpd_error_log)s
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/class_spec.rb#L470
fail2ban fail2ban::service when overriding default port configuration is expected to modify roundcube-auth port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[roundcube-auth]\n\nenabled = false\nport = http,https\nlogpath = %(roundcube_errors_log)s\n# U...se following line in your jail.local if roundcube logs to journal.\n#backend = %(syslog_backend)s\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,7 +1,13 @@
-/^port\s+=\s+80,443$/
+[roundcube-auth]
+
+enabled = false
+port = http,https
+logpath = %(roundcube_errors_log)s
+# Use following line in your jail.local if roundcube logs to journal.
+#backend = %(syslog_backend)s
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/class_spec.rb#L478
fail2ban fail2ban::service when overriding default port configuration is expected to modify apache-nohome port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[apache-nohome]\n\nenabled = false\nport = http,https\nlogpath = %(apache_error_log)s\nmaxretry = 2\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,6 +1,11 @@
-/^port\s+=\s+80,443$/
+[apache-nohome]
+
+enabled = false
+port = http,https
+logpath = %(apache_error_log)s
+maxretry = 2
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/class_spec.rb#L486
fail2ban fail2ban::service when overriding default port configuration is expected to modify suhosin port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[suhosin]\n\nenabled = false\nport = http,https\nlogpath = %(suhosin_log)s\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[suhosin]
+
+enabled = false
+port = http,https
+logpath = %(suhosin_log)s
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/class_spec.rb#L494
fail2ban fail2ban::service when overriding default port configuration is expected to modify selinux-ssh port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+ssh,2202$}
expected "[selinux-ssh]\n\nenabled = false\nport = ssh\nlogpath = %(auditd_log)s\n\n" to match /^port\s+=\s+ssh,2202$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+ssh,2202$/
+[selinux-ssh]
+
+enabled = false
+port = ssh
+logpath = %(auditd_log)s
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/class_spec.rb#L503
fail2ban fail2ban::service when overriding default port configuration is expected to modify apache-auth port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+81$}
expected "[apache-auth]\n\nenabled = false\nport = http,https\nlogpath = %(apache_error_log)s\n\n" to match /^port\s+=\s+81$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+81$/
+[apache-auth]
+
+enabled = false
+port = http,https
+logpath = %(apache_error_log)s
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/class_spec.rb#L512
fail2ban fail2ban::service when overriding default port configuration is expected to modify horde port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[horde]\n\nenabled = false\nport = http,https\nlogpath = /var/log/horde/horde.log\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[horde]
+
+enabled = false
+port = http,https
+logpath = /var/log/horde/horde.log
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/class_spec.rb#L521
fail2ban fail2ban::service when overriding default port configuration is expected to modify groupoffice port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[groupoffice]\n\nenabled = false\nport = http,https\nlogpath = /home/groupoffice/log/info.log\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[groupoffice]
+
+enabled = false
+port = http,https
+logpath = /home/groupoffice/log/info.log
|
Puppet / Puppet 8 - Debian 12:
spec/acceptance/class_spec.rb#L530
fail2ban fail2ban::service when overriding default port configuration is expected to modify openwebmail port
Failure/Error: expect(r.stdout).to match %r{^port\s+=\s+80,443$}
expected "[openwebmail]\n\nenabled = false\nport = http,https\nlogpath = /var/log/openwebmail.log\n\n\n" to match /^port\s+=\s+80,443$/
Diff:
@@ -1,5 +1,9 @@
-/^port\s+=\s+80,443$/
+[openwebmail]
+
+enabled = false
+port = http,https
+logpath = /var/log/openwebmail.log
|
Puppet / Test suite
Process completed with exit code 1.
|
Puppet / Static validations:
metadata.json#L1
Skipping EOL operating system Debian 11
|
Puppet / Static validations:
metadata.json#L1
Skipping EOL operating system Ubuntu 18.04
|