summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Cyril Brulebois [Wed, 1 Mar 2023 21:36:00 +0000 (22:36 +0100)]
Silence yaml patching
Being able to patch configuration files using .local snippets is relatively new,
and very useful when it comes to shipping mostly untouched configuration files,
with just a few values set in a .local file.
Unfortunately the initial code is very chatty and generates info-level messages
in all cscli calls.
An early patch upstream is
ca12432a2acd2fd607e9fbea97fea3fb3f124678 (backported
here), which demotes those messages from info to debug. It left the “Prepending”
messages at info, but those haven't been seen with the current packages, so
that's left untouched in this patch as well.
Further refinement landed in
cd4dabde0ec833552881dd36780ab847cf20882d but that
touches more code, and we're closing in freeze-wise, so leave it alone. All our
crowdsec* packages ship a README.Debian file, which should be sufficient in most
cases. When in doubt, adjusting the log level in specific commands should be
enough to figure out what's happening.
Gbp-Pq: Name 0014-silence-yaml-patching.patch
Cyril Brulebois [Wed, 1 Mar 2023 21:41:36 +0000 (22:41 +0100)]
Skip flakky tests
Initially (2023-02-15):
- TestAPICSendMetrics
- TestLongRunningQPS
Both aim at checking performance, and might error out when the underlying
system is “slow”. That was the case for the first test on arm64 (KO on
arm-arm-01, OK on arm-ubc-03) and on armel (KO on arm-ubc-06, OK on
arm-conova-02), and for the second test on mipsel (KO on mipsel-aql-02).
The same might happen on ci.debian.net, so disable both tests everywhere.
Extension (2023-03-01):
- TestAPICCAPIPullIsOld
- TestAPICHandleDeletedDecisions
- TestAPICPullTop
- TestGetDecisionsSinceCount
Gbp-Pq: Name 0013-skip-flakky-tests.patch
Manuel Sabban [Fri, 25 Nov 2022 07:34:47 +0000 (08:34 +0100)]
Refresh code generated from protobuf specifications
Without this patch, crowdsec would build fine but would fail in its testsuite,
reaching the 10-minute timeout. This was tracked down to unexpected csplugins
crashes, due to mismatched protobuf versions.
This issue would go away with golang-goprotobuf-dev 1.5.2-1~exp1 (as found in
experimental for a while) instead of 1.3.5-2 (in unstable as of November 2022).
Since protobuf's build-time and run-time are particularly tricky to get right,
incompatible 1.3.x and 1.5.x versions are packaged separately and aren't
co-installable. Since most packages depend on the 1.3.x version, it's not
possible to pull the 1.5.x version to avoid this issue.
Therefore, upstream was kind enough to come up with this patch, refreshing the
generated code so that it works fine within unstable.
Signed-off-by: Cyril Brulebois <cyril@debamax.com>
Gbp-Pq: Name 0011-refresh-protobuf-code.patch
Cyril Brulebois [Wed, 31 May 2023 16:54:17 +0000 (17:54 +0100)]
disable-some-tests
Gbp-Pq: Name 0010-disable-some-tests.patch
Cyril Brulebois [Wed, 31 May 2023 16:54:17 +0000 (17:54 +0100)]
disable-kafka-acquisition-module
Gbp-Pq: Name 0009-disable-kafka-acquisition-module.patch
Cyril Brulebois [Wed, 31 May 2023 16:54:17 +0000 (17:54 +0100)]
r3labs-diff-versions
Gbp-Pq: Name 0008-r3labs-diff-versions.patch
Cyril Brulebois [Mon, 1 Mar 2021 20:40:04 +0000 (20:40 +0000)]
Automatically enable the online hub
By default, crowdsec comes with an offline copy of the hub (see
README.Debian). When running `cscli hub update`, ensure switching from
this offline copy to the online hub.
To ensure cscli doesn't disable anything that was configured (due to
symlinks from /etc/crowdsec becoming dangling all of a sudden), copy the
offline hub in the live directory (/var/lib/crowdsec/hub), and let
further operations (`cscli hub upgrade`, or `cscli <type> install`)
update the live directory as required.
Signed-off-by: Cyril Brulebois <cyril@debamax.com>
Gbp-Pq: Name 0007-automatically-enable-online-hub.patch
Cyril Brulebois [Mon, 1 Mar 2021 14:11:36 +0000 (14:11 +0000)]
Adjust default config
Let's have all hub-related data under /var/lib/crowdsec/hub instead of
the default /etc/crowdsec/hub directory.
Also fix plugin directory.
Also delete pid_dir, which would otherwise generate this at runtime:
Deprecation warning: the pid_dir config can be safely removed and is not required
Signed-off-by: Cyril Brulebois <cyril@debamax.com>
Gbp-Pq: Name 0005-adjust-config.patch
Cyril Brulebois [Fri, 22 Jan 2021 14:35:42 +0000 (14:35 +0000)]
Disable geoip-enrich in the hub files
It would download GeoLite2*.mmdb files from the network. Let users
enable the hub by themselves if they want to use it.
When refreshing this patch, don't forget to update both digest and
content fields, using:
- digest: sha256sum hub1/collections/crowdsecurity/linux.yaml
- content: base64 -w 0 /etc/crowdsec/collections/linux.yaml
Gbp-Pq: Name 0004-disable-geoip-enrich.patch
Cyril Brulebois [Fri, 22 Jan 2021 13:25:54 +0000 (13:25 +0000)]
Adjust systemd unit
- Adjust paths for the packaged crowdsec binary (/usr/bin).
- Drop commented out ExecStartPost entirely.
- Drop syslog.target dependency, it's socket-activated (thanks to the
systemd-service-file-refers-to-obsolete-target lintian tag).
- Ensure both local and online API credentials have been defined.
Gbp-Pq: Name 0003-adjust-systemd-unit.patch
Cyril Brulebois [Wed, 31 May 2023 16:54:17 +0000 (17:54 +0100)]
crowdsec (1.4.6-4) unstable; urgency=medium
* Implement support for pending registration: since bouncers list crowdsec
in Recommends, we cannot guarantee the order in which bouncers and
crowdsec are configured (See: #
1035499, #
1036985). Bouncers can now
queue triplets (systemd unit name, bouncer identifier and API key) in
/var/lib/crowdsec/pending-registration. crowdsec.postinst will register
those bouncers, and start their systemd units after removing that file
(satisfying their ConditionPathExists=! on it).
* Replace `exit 0` with `break` in the preceding code block.
[dgit import unpatched crowdsec 1.4.6-4]
Cyril Brulebois [Wed, 31 May 2023 16:54:17 +0000 (17:54 +0100)]
Import crowdsec_1.4.6-4.debian.tar.xz
[dgit import tarball crowdsec 1.4.6-4 crowdsec_1.4.6-4.debian.tar.xz]
Cyril Brulebois [Thu, 2 Mar 2023 05:07:10 +0000 (05:07 +0000)]
Import crowdsec_1.4.6.orig.tar.gz
[dgit import orig crowdsec_1.4.6.orig.tar.gz]
Cyril Brulebois [Thu, 2 Mar 2023 05:07:10 +0000 (05:07 +0000)]
Import crowdsec_1.4.6.orig-data1.tar.gz
[dgit import orig crowdsec_1.4.6.orig-data1.tar.gz]
Cyril Brulebois [Thu, 2 Mar 2023 05:07:10 +0000 (05:07 +0000)]
Import crowdsec_1.4.6.orig-hub1.tar.gz
[dgit import orig crowdsec_1.4.6.orig-hub1.tar.gz]