EOX GitLab Instance
Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
E
external server role
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package Registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
ansible-public
external server role
Merge requests
!3
Minor change to avoid an alert on Alpine with allowipv6
Code
Review changes
Check out branch
Download
Patches
Plain diff
Merged
Minor change to avoid an alert on Alpine with allowipv6
f2b-allowipv6-alpine
into
main
Overview
0
Commits
4
Pipelines
0
Changes
1
Merged
Nicolas Baudoin
requested to merge
f2b-allowipv6-alpine
into
main
1 year ago
Overview
0
Commits
4
Pipelines
0
Changes
1
Expand
0
0
Merge request reports
Viewing commit
21d2e40a
Prev
Next
Show latest version
1 file
+
7
−
5
Inline
Compare changes
Side-by-side
Inline
Show whitespace changes
Show one file at a time
21d2e40a
Changes made to the script to have allowipv6 set to yes within a [Definition] file.
· 21d2e40a
Nicolas Baudoin
authored
1 year ago
tasks/config_fail2ban.yml
+
7
−
5
Options
@@ -22,12 +22,14 @@
# There was an error message with the restart of fail2ban on Alpine systems without that change.
# Also, it makes sure ipv6 is being analysed.
-
name
:
Ensure
allowipv6 with value yes line is
present
line
infile
:
-
name
:
Ensure
[Definition] section and allowipv6 are
present
block
infile
:
path
:
/etc/fail2ban/fail2ban.conf
regexp
:
'
^\[Definition\]'
insertbefore
:
'
^\[Thread\]'
line
:
'
allowipv6
=
yes'
block
:
|
[Definition]
allowipv6 = yes
marker
:
"
#
{mark}
ANSIBLE
MANAGED
BLOCK"
when
:
"
'[Definition]'
not
in
lookup('file',
'/etc/fail2ban/fail2ban.conf')
or
'allowipv6
='
not
in
lookup('file',
'/etc/fail2ban/fail2ban.conf')"
# Updating fail2ban to be able to work with the way our nftables work
-
name
:
Deploy custom nftables action for Fail2Ban
Loading