class Fail2ban < Formula desc "Scan log files and ban IPs showing malicious signs" homepage "http://www.fail2ban.org/" url "https://github.com/fail2ban/fail2ban/archive/0.8.14.tar.gz" sha256 "2d579d9f403eb95064781ffb28aca2b258ca55d7a2ba056a8fa2b3e6b79721f2" bottle do sha256 "fe169a2bba521ebd253035f22ee3c652db3a6d324ee6d92bd07689e1d6bd0bf7" => :mavericks sha256 "0bf16e328ce670886caaeccc7279a7ebe491665e6b671aa2598ac47f93023f2d" => :mountain_lion sha256 "93bd451f8f47b2962152a46b533250522fa7129b684cc3a6e82a959acaaf9758" => :lion end def install rm "setup.cfg" inreplace "setup.py" do |s| s.gsub! %r{/etc}, etc s.gsub! %r{/var}, var end # Replace hardcoded paths inreplace "fail2ban-client", "/usr/share/fail2ban", libexec inreplace "fail2ban-server", "/usr/share/fail2ban", libexec inreplace "fail2ban-regex", "/usr/share/fail2ban", libexec inreplace "fail2ban-client", "/etc", etc inreplace "fail2ban-regex", "/etc", etc inreplace "fail2ban-server", "/var", var inreplace "config/fail2ban.conf", "/var/run", (var/"run") inreplace "setup.py", "/usr/share/doc/fail2ban", (libexec/"doc") system "python", "setup.py", "install", "--prefix=#{prefix}", "--install-lib=#{libexec}" end plist_options :startup => true def plist; <<-EOS.undent Label #{plist_name} ProgramArguments #{opt_bin}/fail2ban-client -x start RunAtLoad EOS end def caveats <<-EOS.undent Before using Fail2Ban for the first time you should edit jail configuration and enable the jails that you want to use, for instance ssh-ipfw. Also make sure that they point to the correct configuration path. I.e. on Mountain Lion the sshd logfile should point to /var/log/system.log. * #{etc}/fail2ban/jail.conf The Fail2Ban wiki has two pages with instructions for MacOS X Server that describes how to set up the Jails for the standard MacOS X Server services for the respective releases. 10.4: http://www.fail2ban.org/wiki/index.php/HOWTO_Mac_OS_X_Server_(10.4) 10.5: http://www.fail2ban.org/wiki/index.php/HOWTO_Mac_OS_X_Server_(10.5) EOS end end