crowdsec-openresty-bouncer-1.1.3-1.fc40.aarch64.rpm
Install the package
sudo yum install crowdsec-openresty-bouncer-1.1.3-1.fc40.aarch64
OpenResty bouncer for Crowdsec
Full description:
Checksums
| MD5 | 2ad96d474749ec63d2fddac9968bc90e |
| SHA1 | eb42dfc44e5aaf03ce6216a4b2f62cc030212d25 |
| SHA256 | 7bd875e0078ac4cfc0edc009817360711bfe2142ab09c0789baeee079c9db91d |
| SHA512 | 004840ed7668fd4169b81f532100c9f9b50781f66567c95df254303967a89ee1135513015232a61724c80bc8cf01c2a125db7ed233395f534683170ca3ec4ea9 |
Requires
- /bin/bash
- /bin/bash
- config(crowdsec-openresty-bouncer) = 1.1.3-1.fc40
- gettext
- openresty
- openresty-opm
Provides
- config(crowdsec-openresty-bouncer) = 1.1.3-1.fc40
- crowdsec-openresty-bouncer(aarch-64) = 1.1.3-1.fc40
- crowdsec-openresty-bouncer = 1.1.3-1.fc40
Files
- /var/lib/crowdsec/lua/templates/captcha.html
- /var/lib/crowdsec/lua/templates/ban.html
- /usr/local/openresty/nginx/conf/conf.d/crowdsec_openresty.conf
- /usr/local/openresty/lualib/plugins/crowdsec/utils.lua
- /usr/local/openresty/lualib/plugins/crowdsec/url.lua
- /usr/local/openresty/lualib/plugins/crowdsec/template.lua
- /usr/local/openresty/lualib/plugins/crowdsec/stream.lua
- /usr/local/openresty/lualib/plugins/crowdsec/osinfo.lua
- /usr/local/openresty/lualib/plugins/crowdsec/metrics.lua
- /usr/local/openresty/lualib/plugins/crowdsec/live.lua
- /usr/local/openresty/lualib/plugins/crowdsec/iputils.lua
- /usr/local/openresty/lualib/plugins/crowdsec/flag.lua
- /usr/local/openresty/lualib/plugins/crowdsec/config.lua
- /usr/local/openresty/lualib/plugins/crowdsec/captcha.lua
- /usr/local/openresty/lualib/plugins/crowdsec/bitop.lua
- /usr/local/openresty/lualib/plugins/crowdsec/ban.lua
- /usr/local/openresty/lualib/crowdsec.lua
- /etc/crowdsec/bouncers/crowdsec-openresty-bouncer.conf
Uploaded
7 days agoPackage Size
40.9 KBInstalled Size
132 KBDownloads
4
wget
wget --content-disposition "https://packagecloud.io/crowdsec/crowdsec-testing/packages/fedora/40/crowdsec-openresty-bouncer-1.1.3-1.fc40.aarch64.rpm/download.rpm?distro_version_id=283"