From mboxrd@z Thu Jan 1 00:00:00 1970 From: Arne Fitzenreiter To: ipfire-scm@lists.ipfire.org Subject: [git.ipfire.org] IPFire 2.x development tree branch, next, updated. b1a6c9f6243c3ae687fd18297848cc8e7510fbc2 Date: Sun, 16 Feb 2020 16:03:47 +0000 Message-ID: <48LBkD0SrNz2y1x@people01.haj.ipfire.org> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============4843653821942488029==" List-Id: --===============4843653821942488029== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "IPFire 2.x development tree". The branch, next has been updated via b1a6c9f6243c3ae687fd18297848cc8e7510fbc2 (commit) via 88cb5eb18744911513c08e851f945a548b324efc (commit) via a8df6e7807528a475a958f0d8aa66494e59b1a8e (commit) via 1466ab70c7bbbf477fbdef69117ada4251ff3a1a (commit) via 18e97c76b0e1f691f5c6be8aa7fedc61d8c07469 (commit) via 56f4f279a5a5bfb2d919f2e603c8551f422e932f (commit) via 130babccc8efbdd80a9358e1faf09faba6ee3e43 (commit) via 08cf4d21540c4fe185db1f17ae365f7ab6adae27 (commit) via f16ddb5fc74128e6387e736e4c7f66ace6d0b338 (commit) via d553895700c1d4842cd62cceaea83f2fd0fd5195 (commit) via 77ea7462bcc134b6147dd985abdd4e2311487515 (commit) via 7b7789da2f79bf00c98139c17c18002388d4f0df (commit) from c2c5bad960f03407b79e7b0afce45157363a55d0 (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit b1a6c9f6243c3ae687fd18297848cc8e7510fbc2 Author: Arne Fitzenreiter Date: Sun Feb 16 16:02:56 2020 +0000 core142: add cloudinit helper to updater =20 Signed-off-by: Arne Fitzenreiter commit 88cb5eb18744911513c08e851f945a548b324efc Author: Michael Tremer Date: Wed Feb 5 14:27:08 2020 +0000 cloud-init: Disable using ISP nameservers =20 This is mostly aesthetic because there are no ISP nameservers anyways that we could use here. =20 Signed-off-by: Michael Tremer Signed-off-by: Arne Fitzenreiter commit a8df6e7807528a475a958f0d8aa66494e59b1a8e Author: Michael Tremer Date: Wed Feb 5 14:27:07 2020 +0000 aws-setup: Remove some excessive whitespace =20 Signed-off-by: Michael Tremer Signed-off-by: Arne Fitzenreiter commit 1466ab70c7bbbf477fbdef69117ada4251ff3a1a Author: Arne Fitzenreiter Date: Sun Feb 16 15:59:06 2020 +0000 core142: add dns.cgi to updater =20 Signed-off-by: Arne Fitzenreiter commit 18e97c76b0e1f691f5c6be8aa7fedc61d8c07469 Author: Michael Tremer Date: Wed Feb 5 14:27:06 2020 +0000 dns.cgi: Do not show table header if no servers are configured =20 Signed-off-by: Michael Tremer Signed-off-by: Arne Fitzenreiter commit 56f4f279a5a5bfb2d919f2e603c8551f422e932f Author: Stefan Schantl Date: Tue Feb 4 08:59:33 2020 +0100 guardian: Add upstream patch for HTTP parser. =20 Fixes #12289. =20 Signed-off-by: Stefan Schantl Reviewed-by: Michael Tremer Signed-off-by: Arne Fitzenreiter commit 130babccc8efbdd80a9358e1faf09faba6ee3e43 Author: Arne Fitzenreiter Date: Sun Feb 16 15:55:15 2020 +0000 core142: add ddns to updater =20 Signed-off-by: Arne Fitzenreiter commit 08cf4d21540c4fe185db1f17ae365f7ab6adae27 Author: Stefan Schantl Date: Fri Feb 7 12:32:46 2020 +0100 ddns: Import latest upstream patches for ddns-013 =20 Signed-off-by: Stefan Schantl Reviewed-by: Michael Tremer Signed-off-by: Arne Fitzenreiter commit f16ddb5fc74128e6387e736e4c7f66ace6d0b338 Author: Stefan Schantl Date: Fri Jan 31 07:13:31 2020 +0100 ddns: Update to 013 =20 This is an update to the first python3-based release of ddns. =20 Signed-off-by: Stefan Schantl Reviewed-by: Michael Tremer Signed-off-by: Arne Fitzenreiter commit d553895700c1d4842cd62cceaea83f2fd0fd5195 Author: Arne Fitzenreiter Date: Sun Feb 16 15:49:52 2020 +0000 core142: add proxy.cgi tp updater =20 Signed-off-by: Arne Fitzenreiter commit 77ea7462bcc134b6147dd985abdd4e2311487515 Author: Stefan Schantl Date: Fri Feb 7 12:06:39 2020 +0100 proxy.cgi: Switch to MD5 hashed passwords for local user auth. =20 The former used default Crypt algorithmus only supports passwords up to eight signs wheater MD5 does not have any limitation here. =20 Fixes 12290. =20 Signed-off-by: Stefan Schantl Reviewed-by: Michael Tremer Signed-off-by: Arne Fitzenreiter commit 7b7789da2f79bf00c98139c17c18002388d4f0df Author: Michael Tremer Date: Thu Feb 6 11:34:27 2020 +0000 libpciaccess: Update to 0.16 =20 There are not rootfile changes. =20 Signed-off-by: Michael Tremer Signed-off-by: Arne Fitzenreiter ----------------------------------------------------------------------- Summary of changes: .../{oldcore/104 =3D> core/142}/filelists/ddns | 0 config/rootfiles/core/142/filelists/files | 4 ++ html/cgi-bin/dns.cgi | 71 +++++++++++---------= -- html/cgi-bin/proxy.cgi | 8 ++- lfs/ddns | 9 ++- lfs/guardian | 5 +- lfs/libpciaccess | 10 +-- src/initscripts/helper/aws-setup | 5 +- src/initscripts/helper/azure-setup | 3 + src/patches/ddns-012-noip-fix-handle-name.patch | 36 ----------- src/patches/ddns-012-noip-rename-provider.patch | 65 -------------------- src/patches/ddns-013-dyfi-use-https.patch | 22 +++++++ src/patches/guardian-2.0.2-http-parser.patch | 45 ++++++++++++++ 13 files changed, 133 insertions(+), 150 deletions(-) copy config/rootfiles/{oldcore/104 =3D> core/142}/filelists/ddns (100%) delete mode 100644 src/patches/ddns-012-noip-fix-handle-name.patch delete mode 100644 src/patches/ddns-012-noip-rename-provider.patch create mode 100644 src/patches/ddns-013-dyfi-use-https.patch create mode 100644 src/patches/guardian-2.0.2-http-parser.patch Difference in files: diff --git a/config/rootfiles/core/142/filelists/ddns b/config/rootfiles/core= /142/filelists/ddns new file mode 120000 index 000000000..739516420 --- /dev/null +++ b/config/rootfiles/core/142/filelists/ddns @@ -0,0 +1 @@ +../../../common/ddns \ No newline at end of file diff --git a/config/rootfiles/core/142/filelists/files b/config/rootfiles/cor= e/142/filelists/files index 03d6bd379..12df9c26d 100644 --- a/config/rootfiles/core/142/filelists/files +++ b/config/rootfiles/core/142/filelists/files @@ -2,9 +2,13 @@ etc/system-release etc/issue srv/web/ipfire/cgi-bin/credits.cgi var/ipfire/langs +etc/rc.d/helper/aws-setup +etc/rc.d/helper/azure-setup etc/suricata/suricata.yaml lib/udev/network-hotplug-bridges opt/pakfire/etc/pakfire.conf opt/pakfire/lib/functions.pl +srv/web/ipfire/cgi-bin/dns.cgi srv/web/ipfire/cgi-bin/pakfire.cgi +srv/web/ipfire/cgi-bin/proxy.cgi var/ipfire/suricata/ruleset-sources diff --git a/html/cgi-bin/dns.cgi b/html/cgi-bin/dns.cgi index 4f3418a70..09fd50206 100755 --- a/html/cgi-bin/dns.cgi +++ b/html/cgi-bin/dns.cgi @@ -449,7 +449,7 @@ sub show_nameservers () { $dns_status_string .=3D " (" . $Lang::tr{'dns recursor mode'} . ")"; } =20 -print < @@ -458,7 +458,36 @@ print < +END + + # Check the usage of ISP assigned nameservers is enabled. + my $id =3D 1; + + # Loop through the array which stores the files. + foreach my $file (@ISP_nameserver_files) { + # Grab the address of the nameserver. + my $address =3D &General::grab_address_from_file($file); + + # Check if we got an address. + if ($address) { + # Add the address to the hash of nameservers. + $dns_servers{$id} =3D [ "$address", "none", + ($settings{'USE_ISP_NAMESERVERS'} eq "on") ? "enabled" : "disabled", + "$Lang::tr{'dns isp assigned nameserver'}" ]; + + # Increase id by one. + $id++; + } + } =20 + # Check some DNS servers have been configured. In this case + # the hash contains at least one key. + my $server_amount; + if (keys %dns_servers) { + # Sort the keys by their ID and store them in an array. + my @keys =3D sort { $a <=3D> $b } keys %dns_servers; + + print < =20 @@ -479,51 +508,23 @@ print <$Lang::tr{'remark'} END - # Check if the status should be displayed. - if ($check_servers) { -print < $Lang::tr{'status'} END -; - } + } =20 -print < $Lang::tr{'action'} END -; - - # Check the usage of ISP assigned nameservers is enabled. - my $id =3D 1; - - # Loop through the array which stores the files. - foreach my $file (@ISP_nameserver_files) { - # Grab the address of the nameserver. - my $address =3D &General::grab_address_from_file($file); - - # Check if we got an address. - if ($address) { - # Add the address to the hash of nameservers. - $dns_servers{$id} =3D [ "$address", "none", - ($settings{'USE_ISP_NAMESERVERS'} eq "on") ? "enabled" : "disabled", - "$Lang::tr{'dns isp assigned nameserver'}" ]; - - # Increase id by one. - $id++; - } - } - - # Check some DNS servers have been configured. In this case - # the hash contains at least one key. - my $server_amount; - if (keys %dns_servers) { - # Sort the keys by their ID and store them in an array. - my @keys =3D sort { $a <=3D> $b } keys %dns_servers; =20 # Loop through all entries of the array/hash. foreach my $id (@keys) { diff --git a/html/cgi-bin/proxy.cgi b/html/cgi-bin/proxy.cgi index b63964081..06aca579b 100644 --- a/html/cgi-bin/proxy.cgi +++ b/html/cgi-bin/proxy.cgi @@ -3945,7 +3945,13 @@ sub adduser } else { &deluser($str_user); =20 - my $htpasswd =3D new Apache::Htpasswd("$userdb"); + my %htpasswd_options =3D ( + passwdFile =3D> "$userdb", + UseMD5 =3D> 1, + ); + + my $htpasswd =3D new Apache::Htpasswd(\%htpasswd_options); + $htpasswd->htpasswd($str_user, $str_pass); } =20 diff --git a/lfs/ddns b/lfs/ddns index 47817c058..0e045ddc4 100644 --- a/lfs/ddns +++ b/lfs/ddns @@ -24,7 +24,7 @@ =20 include Config =20 -VER =3D 012 +VER =3D 013 =20 THISAPP =3D ddns-$(VER) DL_FILE =3D $(THISAPP).tar.xz @@ -40,7 +40,7 @@ objects =3D $(DL_FILE) =20 $(DL_FILE) =3D $(DL_FROM)/$(DL_FILE) =20 -$(DL_FILE)_MD5 =3D 00e70e8bf619148e14b6f6836314bbb7 +$(DL_FILE)_MD5 =3D a988a808a08c810c41964ac6b0febbeb =20 install : $(TARGET) =20 @@ -71,9 +71,8 @@ $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects)) @$(PREBUILD) @rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar axf $(DIR_DL)/$(DL_FILE) =20 - # Add upstream patch for fixing noip.com - cd $(DIR_APP) && patch -Np1 < $(DIR_SRC)/src/patches/ddns-012-noip-rename-p= rovider.patch - cd $(DIR_APP) && patch -Np1 < $(DIR_SRC)/src/patches/ddns-012-noip-fix-hand= le-name.patch + # Apply upstream patches. + cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/ddns-013-dyfi-use-htt= ps.patch =20 cd $(DIR_APP) && [ -x "configure" ] || sh ./autogen.sh cd $(DIR_APP) && ./configure \ diff --git a/lfs/guardian b/lfs/guardian index a40480c0c..3e2c3347f 100644 --- a/lfs/guardian +++ b/lfs/guardian @@ -33,7 +33,7 @@ DIR_APP =3D $(DIR_SRC)/$(THISAPP) TARGET =3D $(DIR_INFO)/$(THISAPP) =20 PROG =3D guardian -PAK_VER =3D 18 +PAK_VER =3D 19 =20 DEPS =3D "perl-inotify2 perl-Net-IP" =20 @@ -79,6 +79,9 @@ $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects)) @$(PREBUILD) @rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar axvf $(DIR_DL)/$(DL_FILE) =20 + # Add upstream patches. + cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/guardian-2.0.2-http-p= arser.patch + # Adjust path for firewall binaries. cd $(DIR_APP) && sed -i "s|/usr/sbin/|/sbin/|g" modules/IPtables.pm =20 diff --git a/lfs/libpciaccess b/lfs/libpciaccess index 571a71d6f..dd109220c 100644 --- a/lfs/libpciaccess +++ b/lfs/libpciaccess @@ -24,15 +24,15 @@ =20 include Config =20 -VER =3D 0.13.4 +VER =3D 0.16 =20 THISAPP =3D libpciaccess-$(VER) -DL_FILE =3D $(THISAPP).tar.gz +DL_FILE =3D $(THISAPP).tar.bz2 DL_FROM =3D $(URL_IPFIRE) DIR_APP =3D $(DIR_SRC)/$(THISAPP) TARGET =3D $(DIR_INFO)/$(THISAPP) PROG =3D libpciaccess -PAK_VER =3D 1 +PAK_VER =3D 2 =20 DEPS =3D "" =20 @@ -44,7 +44,7 @@ objects =3D $(DL_FILE) =20 $(DL_FILE) =3D $(DL_FROM)/$(DL_FILE) =20 -$(DL_FILE)_MD5 =3D cc1fad87da60682af1d5fa43a5da45a4 +$(DL_FILE)_MD5 =3D b34e2cbdd6aa8f9cc3fa613fd401a6d6 =20 install : $(TARGET) check : $(patsubst %,$(DIR_CHK)/%,$(objects)) @@ -75,7 +75,7 @@ $(subst %,%_MD5,$(objects)) : =20 $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects)) @$(PREBUILD) - @rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar zxf $(DIR_DL)/$(DL_FILE) + @rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar axf $(DIR_DL)/$(DL_FILE) cd $(DIR_APP) && ./configure --prefix=3D/usr cd $(DIR_APP) && make $(MAKETUNING) $(EXTRA_MAKE) cd $(DIR_APP) && make install diff --git a/src/initscripts/helper/aws-setup b/src/initscripts/helper/aws-se= tup index cee78a283..884319822 100644 --- a/src/initscripts/helper/aws-setup +++ b/src/initscripts/helper/aws-setup @@ -212,10 +212,11 @@ import_aws_configuration() { # Save CONFIG_TYPE echo "CONFIG_TYPE=3D${config_type}" >> /var/ipfire/ethernet/settings =20 - - # Actions performed only on the very first start if [ ! -e "/var/ipfire/main/firstsetup_ok" ]; then + # Disable using ISP nameservers + sed -e "s/^USE_ISP_NAMESERVERS=3D.*/USE_ISP_NAMESERVERS=3Doff/" -i /var/ip= fire/dns/settings + # Enable SSH sed -e "s/ENABLE_SSH=3D.*/ENABLE_SSH=3Don/g" -i /var/ipfire/remote/settings =20 diff --git a/src/initscripts/helper/azure-setup b/src/initscripts/helper/azur= e-setup index d84ec3aca..291b8e0a4 100644 --- a/src/initscripts/helper/azure-setup +++ b/src/initscripts/helper/azure-setup @@ -240,6 +240,9 @@ import_azure_configuration() { =20 # Actions performed only on the very first start if [ ! -e "/var/ipfire/main/firstsetup_ok" ]; then + # Disable using ISP nameservers + sed -e "s/^USE_ISP_NAMESERVERS=3D.*/USE_ISP_NAMESERVERS=3Doff/" -i /var/ip= fire/dns/settings + # Enable SSH sed -e "s/ENABLE_SSH=3D.*/ENABLE_SSH=3Don/g" -i /var/ipfire/remote/settings =20 diff --git a/src/patches/ddns-012-noip-fix-handle-name.patch b/src/patches/dd= ns-012-noip-fix-handle-name.patch deleted file mode 100644 index d1d281c34..000000000 --- a/src/patches/ddns-012-noip-fix-handle-name.patch +++ /dev/null @@ -1,36 +0,0 @@ -commit c0277eeea2b2c1ed8f40f1248b28438e44e51912 -Author: Stefan Schantl -Date: Tue Nov 12 08:43:31 2019 +0100 - - NoIP.com: Rename handle back to no-ip.com - =20 - The old handle name is required for backward compatiblity. - =20 - Signed-off-by: Stefan Schantl - -diff --git a/ddns.conf.sample b/ddns.conf.sample -index 528684f..61a608a 100644 ---- a/ddns.conf.sample -+++ b/ddns.conf.sample -@@ -120,7 +120,7 @@ - # password =3D pass -=20 - # [test.noip.org] --# provider =3D noip.com -+# provider =3D no-ip.com - # username =3D user - # password =3D pass -=20 -diff --git a/src/ddns/providers.py b/src/ddns/providers.py -index 4789107..661fbcc 100644 ---- a/src/ddns/providers.py -+++ b/src/ddns/providers.py -@@ -1344,7 +1344,7 @@ class DDNSProviderNamecheap(DDNSResponseParserXML, DDN= SProvider): -=20 -=20 - class DDNSProviderNOIP(DDNSProtocolDynDNS2, DDNSProvider): -- handle =3D "noip.com" -+ handle =3D "no-ip.com" - name =3D "NoIP" - website =3D "http://www.noip.com/" - protocols =3D ("ipv4",) diff --git a/src/patches/ddns-012-noip-rename-provider.patch b/src/patches/dd= ns-012-noip-rename-provider.patch deleted file mode 100644 index acc5e66a7..000000000 --- a/src/patches/ddns-012-noip-rename-provider.patch +++ /dev/null @@ -1,65 +0,0 @@ -commit bfdba55a5eeb3dac5ed35ff72b6c74b941da6445 -Author: Stefan Schantl -Date: Tue Nov 5 19:09:53 2019 +0100 - - No-IP.com: Rename provider and handle to NoIP.com - =20 - Fixes #11561. - =20 - Signed-off-by: Stefan Schantl - -diff --git a/README b/README -index 76f63bc..c75c448 100644 ---- a/README -+++ b/README -@@ -75,7 +75,7 @@ SUPPORTED PROVIDERS: - loopia.se - myonlineportal.net - namecheap.com -- no-ip.com -+ noip.com - now-dns.com - nsupdate.info - opendns.com -diff --git a/ddns.conf.sample b/ddns.conf.sample -index 5b3b845..528684f 100644 ---- a/ddns.conf.sample -+++ b/ddns.conf.sample -@@ -119,8 +119,8 @@ - # provider =3D namecheap.com - # password =3D pass -=20 --# [test.no-ip.org] --# provider =3D no-ip.com -+# [test.noip.org] -+# provider =3D noip.com - # username =3D user - # password =3D pass -=20 -diff --git a/src/ddns/providers.py b/src/ddns/providers.py -index f3c62c1..4789107 100644 ---- a/src/ddns/providers.py -+++ b/src/ddns/providers.py -@@ -1344,16 +1344,16 @@ class DDNSProviderNamecheap(DDNSResponseParserXML, D= DNSProvider): -=20 -=20 - class DDNSProviderNOIP(DDNSProtocolDynDNS2, DDNSProvider): -- handle =3D "no-ip.com" -- name =3D "No-IP" -- website =3D "http://www.no-ip.com/" -+ handle =3D "noip.com" -+ name =3D "NoIP" -+ website =3D "http://www.noip.com/" - protocols =3D ("ipv4",) -=20 - # Information about the format of the HTTP request is to be found -- # here: http://www.no-ip.com/integrate/request and -- # here: http://www.no-ip.com/integrate/response -+ # here: http://www.noip.com/integrate/request and -+ # here: http://www.noip.com/integrate/response -=20 -- url =3D "http://dynupdate.no-ip.com/nic/update" -+ url =3D "http://dynupdate.noip.com/nic/update" -=20 - def prepare_request_data(self, proto): - assert proto =3D=3D "ipv4" diff --git a/src/patches/ddns-013-dyfi-use-https.patch b/src/patches/ddns-013= -dyfi-use-https.patch new file mode 100644 index 000000000..f131c5b24 --- /dev/null +++ b/src/patches/ddns-013-dyfi-use-https.patch @@ -0,0 +1,22 @@ +commit ce6e977f0ace7fe468411270ad07f1824a3aeaec +Author: Mauno Pirnes +Date: Fri Feb 7 12:25:00 2020 +0100 + + dy.fi: Use HTTPS to perform updates. + =20 + Signed-off-by: Mauno Pirnes + Signed-off-by: Stefan Schantl + +diff --git a/src/ddns/providers.py b/src/ddns/providers.py +index dcdc5da..f1fed22 100644 +--- a/src/ddns/providers.py ++++ b/src/ddns/providers.py +@@ -826,7 +826,7 @@ class DDNSProviderDyFi(DDNSProtocolDynDNS2, DDNSProvider= ): + # https://www.dy.fi/page/clients?lang=3Den + # https://www.dy.fi/page/specification?lang=3Den +=20 +- url =3D "http://www.dy.fi/nic/update" ++ url =3D "https://www.dy.fi/nic/update" +=20 + # Please only send automatic updates when your IP address changes, + # or once per 5 to 6 days to refresh the address mapping (they will diff --git a/src/patches/guardian-2.0.2-http-parser.patch b/src/patches/guard= ian-2.0.2-http-parser.patch new file mode 100644 index 000000000..1ecae658c --- /dev/null +++ b/src/patches/guardian-2.0.2-http-parser.patch @@ -0,0 +1,45 @@ +commit 5028c7fde1fa15e4960f2fec3c025d0338382895 +Author: Stefan Schantl +Date: Tue Feb 4 07:55:48 2020 +0100 + + Parser: Adjust HTTP parser to be compatible with newer log format. + =20 + Signed-off-by: Stefan Schantl + +diff --git a/modules/Parser.pm b/modules/Parser.pm +index 3880228..bcca88f 100644 +--- a/modules/Parser.pm ++++ b/modules/Parser.pm +@@ -302,7 +302,7 @@ sub message_parser_httpd (@) { + # been passed. + foreach my $line (@message) { + # This will catch brute-force attacks against htaccess logins (username). +- if ($line =3D~ /.*\[error\] \[client (.*)\] user(.*) not found:.*/) { ++ if ($line =3D~ /.*\[client (.*)\] .* user(.*) not found:.*/) { + # Store the grabbed IP-address. + $address =3D $1; +=20 +@@ -311,7 +311,7 @@ sub message_parser_httpd (@) { + } +=20 + # Detect htaccess password brute-forcing against a username. +- elsif ($line =3D~ /.*\[error\] \[client (.*)\] user(.*): authentication f= ailure for.*/) { ++ elsif ($line =3D~ /.*\[client (.*)\] .* user(.*): authentication failure = for.*/) { + # Store the extracted IP-address. + $address =3D $1; +=20 +@@ -321,6 +321,14 @@ sub message_parser_httpd (@) { +=20 + # Check if at least the IP-address information has been extracted. + if (defined ($address)) { ++ # Check if the address also contains a port value. ++ if ($address =3D~ m/:/) { ++ my ($add_address, $port) =3D split(/:/, $address); ++ ++ # Only process the address. ++ $address =3D $add_address; ++ } ++ + # Add the extracted values and event message to the actions array. + push(@actions, "count $address $name $message"); + } hooks/post-receive -- IPFire 2.x development tree --===============4843653821942488029==--