mirror of https://github.com/fail2ban/fail2ban
code review and use new logger-signals for waiting; + regenerated man-files
parent
27f6fc083a
commit
8cba537f6c
|
@ -50,7 +50,7 @@ protocol = [
|
||||||
["start", "starts the server and the jails"],
|
["start", "starts the server and the jails"],
|
||||||
["restart", "restarts the server"],
|
["restart", "restarts the server"],
|
||||||
["restart [--unban] [--if-exists] <JAIL>", "restarts the jail <JAIL> (alias for 'reload --restart ... <JAIL>')"],
|
["restart [--unban] [--if-exists] <JAIL>", "restarts the jail <JAIL> (alias for 'reload --restart ... <JAIL>')"],
|
||||||
["reload [--restart] [--unban] [--all]", "reloads the configuration without restarting of the server, the option '--restart' activates completely restarting of affected jails, thereby unbans IP addresses (if option '--unban' specified)"],
|
["reload [--restart] [--unban] [--all]", "reloads the configuration without restarting of the server, the option '--restart' activates completely restarting of affected jails, thereby can unban IP addresses (if option '--unban' specified)"],
|
||||||
["reload [--restart] [--unban] [--if-exists] <JAIL>", "reloads the jail <JAIL>, or restarts it (if option '--restart' specified)"],
|
["reload [--restart] [--unban] [--if-exists] <JAIL>", "reloads the jail <JAIL>, or restarts it (if option '--restart' specified)"],
|
||||||
["stop", "stops all jails and terminate the server"],
|
["stop", "stops all jails and terminate the server"],
|
||||||
["unban --all", "unbans all IP addresses (in all jails and database)"],
|
["unban --all", "unbans all IP addresses (in all jails and database)"],
|
||||||
|
|
|
@ -712,8 +712,12 @@ class Fail2banServerTest(Fail2banClientServerBase):
|
||||||
_out_file(test1log)
|
_out_file(test1log)
|
||||||
self.execSuccess(startparams, "reload")
|
self.execSuccess(startparams, "reload")
|
||||||
self.assertTrue(
|
self.assertTrue(
|
||||||
Utils.wait_for(lambda: self._is_logged("[test-jail1] Ban 192.0.2.1"), MID_WAITTIME))
|
Utils.wait_for(lambda: \
|
||||||
|
self._is_logged("Reload finished.") and
|
||||||
|
self._is_logged("1 ticket(s) in 'test-jail1")
|
||||||
|
, MID_WAITTIME))
|
||||||
self.assertLogged("Added logfile: %r" % test1log)
|
self.assertLogged("Added logfile: %r" % test1log)
|
||||||
|
self.assertLogged("[test-jail1] Ban 192.0.2.1")
|
||||||
|
|
||||||
# enable both jails, 3 logs for jail1, etc...
|
# enable both jails, 3 logs for jail1, etc...
|
||||||
# truncate test-log - we should not find unban/ban again by reload:
|
# truncate test-log - we should not find unban/ban again by reload:
|
||||||
|
@ -751,13 +755,16 @@ class Fail2banServerTest(Fail2banClientServerBase):
|
||||||
# test all will be found in jail1 and one in jail2:
|
# test all will be found in jail1 and one in jail2:
|
||||||
self.assertTrue(
|
self.assertTrue(
|
||||||
Utils.wait_for(lambda: \
|
Utils.wait_for(lambda: \
|
||||||
self._is_logged("[test-jail1] Ban 192.0.2.2") and
|
self._is_logged("2 ticket(s) in 'test-jail2") and
|
||||||
self._is_logged("[test-jail1] Ban 192.0.2.3") and
|
self._is_logged("5 ticket(s) in 'test-jail1")
|
||||||
self._is_logged("[test-jail1] Ban 192.0.2.4") and
|
|
||||||
self._is_logged("[test-jail1] Ban 192.0.2.8") and
|
|
||||||
self._is_logged("[test-jail2] Ban 192.0.2.4") and
|
|
||||||
self._is_logged("[test-jail2] Ban 192.0.2.8")
|
|
||||||
, MID_WAITTIME))
|
, MID_WAITTIME))
|
||||||
|
self.assertLogged(
|
||||||
|
"[test-jail1] Ban 192.0.2.2",
|
||||||
|
"[test-jail1] Ban 192.0.2.3",
|
||||||
|
"[test-jail1] Ban 192.0.2.4",
|
||||||
|
"[test-jail1] Ban 192.0.2.8",
|
||||||
|
"[test-jail2] Ban 192.0.2.4",
|
||||||
|
"[test-jail2] Ban 192.0.2.8", all=True)
|
||||||
# test ips at all not visible for jail2:
|
# test ips at all not visible for jail2:
|
||||||
self.assertNotLogged(
|
self.assertNotLogged(
|
||||||
"[test-jail2] Found 192.0.2.2",
|
"[test-jail2] Found 192.0.2.2",
|
||||||
|
@ -775,9 +782,9 @@ class Fail2banServerTest(Fail2banClientServerBase):
|
||||||
"restart", "test-jail2")
|
"restart", "test-jail2")
|
||||||
self.assertTrue(
|
self.assertTrue(
|
||||||
Utils.wait_for(lambda: \
|
Utils.wait_for(lambda: \
|
||||||
self._is_logged("Jail 'test-jail2' started") and
|
self._is_logged("Reload finished.") and
|
||||||
self._is_logged("[test-jail2] Restore Ban 192.0.2.4") and
|
self._is_logged("Restore Ban") and
|
||||||
self._is_logged("[test-jail2] Restore Ban 192.0.2.8")
|
self._is_logged("2 ticket(s) in 'test-jail2")
|
||||||
, MID_WAITTIME))
|
, MID_WAITTIME))
|
||||||
# stop/start and unban/restore ban:
|
# stop/start and unban/restore ban:
|
||||||
self.assertLogged(
|
self.assertLogged(
|
||||||
|
@ -794,8 +801,10 @@ class Fail2banServerTest(Fail2banClientServerBase):
|
||||||
self.execSuccess(startparams,
|
self.execSuccess(startparams,
|
||||||
"restart", "--unban", "test-jail2")
|
"restart", "--unban", "test-jail2")
|
||||||
self.assertTrue(
|
self.assertTrue(
|
||||||
Utils.wait_for(lambda: self._is_logged("Jail 'test-jail2' started"),
|
Utils.wait_for(lambda: \
|
||||||
MID_WAITTIME))
|
self._is_logged("Reload finished.") and
|
||||||
|
self._is_logged("Jail 'test-jail2' started")
|
||||||
|
, MID_WAITTIME))
|
||||||
self.assertLogged(
|
self.assertLogged(
|
||||||
"Jail 'test-jail2' stopped",
|
"Jail 'test-jail2' stopped",
|
||||||
"Jail 'test-jail2' started",
|
"Jail 'test-jail2' started",
|
||||||
|
@ -849,16 +858,17 @@ class Fail2banServerTest(Fail2banClientServerBase):
|
||||||
))
|
))
|
||||||
if DefLogSys.level < logging.DEBUG: # if HEAVYDEBUG
|
if DefLogSys.level < logging.DEBUG: # if HEAVYDEBUG
|
||||||
_out_file(test1log)
|
_out_file(test1log)
|
||||||
# test "failure" regexp still available:
|
|
||||||
self.assertTrue(
|
self.assertTrue(
|
||||||
Utils.wait_for(lambda: \
|
Utils.wait_for(lambda: \
|
||||||
self._is_logged("[test-jail1] 192.0.2.1 already banned") and
|
self._is_logged("6 ticket(s) in 'test-jail1") and
|
||||||
self._is_logged("[test-jail1] Ban 192.0.2.6")
|
self._is_logged("[test-jail1] 192.0.2.1 already banned")
|
||||||
, MID_WAITTIME))
|
, MID_WAITTIME))
|
||||||
|
# test "failure" regexp still available:
|
||||||
self.assertLogged(
|
self.assertLogged(
|
||||||
"[test-jail1] Found 192.0.2.1",
|
"[test-jail1] Found 192.0.2.1",
|
||||||
"[test-jail1] Found 192.0.2.6", all=True
|
"[test-jail1] Found 192.0.2.6",
|
||||||
)
|
"[test-jail1] 192.0.2.1 already banned",
|
||||||
|
"[test-jail1] Ban 192.0.2.6", all=True)
|
||||||
# test "error" regexp no more available:
|
# test "error" regexp no more available:
|
||||||
self.assertNotLogged("[test-jail1] Found 192.0.2.5")
|
self.assertNotLogged("[test-jail1] Found 192.0.2.5")
|
||||||
|
|
||||||
|
|
|
@ -1,12 +1,12 @@
|
||||||
.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.44.1.
|
.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.3.
|
||||||
.TH FAIL2BAN-CLIENT "1" "July 2016" "fail2ban-client v0.10.0a1" "User Commands"
|
.TH FAIL2BAN-CLIENT "1" "September 2016" "fail2ban-client v0.10.0a2" "User Commands"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
fail2ban-client \- configure and control the server
|
fail2ban-client \- configure and control the server
|
||||||
.SH SYNOPSIS
|
.SH SYNOPSIS
|
||||||
.B fail2ban-client
|
.B fail2ban-client
|
||||||
[\fIOPTIONS\fR] \fI<COMMAND>\fR
|
[\fI\,OPTIONS\/\fR] \fI\,<COMMAND>\/\fR
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
Fail2Ban v0.10.0a1 reads log file that contains password failure report
|
Fail2Ban v0.10.0a2 reads log file that contains password failure report
|
||||||
and bans the corresponding IP addresses using firewall rules.
|
and bans the corresponding IP addresses using firewall rules.
|
||||||
.SH OPTIONS
|
.SH OPTIONS
|
||||||
.TP
|
.TP
|
||||||
|
@ -68,17 +68,36 @@ starts the server and the jails
|
||||||
\fBrestart\fR
|
\fBrestart\fR
|
||||||
restarts the server
|
restarts the server
|
||||||
.TP
|
.TP
|
||||||
\fBreload\fR
|
\fBrestart [\-\-unban] [\-\-if\-exists] <JAIL>\fR
|
||||||
reloads the configuration without
|
restarts the jail <JAIL> (alias
|
||||||
restart
|
for 'reload \fB\-\-restart\fR ... <JAIL>')
|
||||||
.TP
|
.TP
|
||||||
\fBreload <JAIL>\fR
|
\fBreload [\-\-restart] [\-\-unban] [\-\-all]\fR
|
||||||
reloads the jail <JAIL>
|
reloads the configuration without
|
||||||
|
restarting of the server, the
|
||||||
|
option '\-\-restart' activates
|
||||||
|
completely restarting of affected
|
||||||
|
jails, thereby can unban IP
|
||||||
|
addresses (if option '\-\-unban'
|
||||||
|
specified)
|
||||||
|
.TP
|
||||||
|
\fBreload [\-\-restart] [\-\-unban] [\-\-if\-exists] <JAIL>\fR
|
||||||
|
reloads the jail <JAIL>, or
|
||||||
|
restarts it (if option '\-\-restart'
|
||||||
|
specified)
|
||||||
.TP
|
.TP
|
||||||
\fBstop\fR
|
\fBstop\fR
|
||||||
stops all jails and terminate the
|
stops all jails and terminate the
|
||||||
server
|
server
|
||||||
.TP
|
.TP
|
||||||
|
\fBunban \fB\-\-all\fR\fR
|
||||||
|
unbans all IP addresses (in all
|
||||||
|
jails and database)
|
||||||
|
.TP
|
||||||
|
\fBunban <IP> ... <IP>\fR
|
||||||
|
unbans <IP> (in all jails and
|
||||||
|
database)
|
||||||
|
.TP
|
||||||
\fBstatus\fR
|
\fBstatus\fR
|
||||||
gets the current status of the
|
gets the current status of the
|
||||||
server
|
server
|
||||||
|
@ -248,9 +267,8 @@ for <JAIL>
|
||||||
\fBset <JAIL> maxlines <LINES>\fR
|
\fBset <JAIL> maxlines <LINES>\fR
|
||||||
sets the number of <LINES> to
|
sets the number of <LINES> to
|
||||||
buffer for regex search for <JAIL>
|
buffer for regex search for <JAIL>
|
||||||
.IP
|
.TP
|
||||||
set <JAIL> addaction <ACT>[ <PYTHONFILE> <JSONKWARGS>]
|
\fBset <JAIL> addaction <ACT>[ <PYTHONFILE> <JSONKWARGS>]\fR
|
||||||
.IP
|
|
||||||
adds a new action named <ACT> for
|
adds a new action named <ACT> for
|
||||||
<JAIL>. Optionally for a Python
|
<JAIL>. Optionally for a Python
|
||||||
based action, a <PYTHONFILE> and
|
based action, a <PYTHONFILE> and
|
||||||
|
@ -262,45 +280,38 @@ removes the action <ACT> from
|
||||||
<JAIL>
|
<JAIL>
|
||||||
.IP
|
.IP
|
||||||
COMMAND ACTION CONFIGURATION
|
COMMAND ACTION CONFIGURATION
|
||||||
.IP
|
.TP
|
||||||
set <JAIL> action <ACT> actionstart <CMD>
|
\fBset <JAIL> action <ACT> actionstart <CMD>\fR
|
||||||
.IP
|
|
||||||
sets the start command <CMD> of
|
sets the start command <CMD> of
|
||||||
the action <ACT> for <JAIL>
|
the action <ACT> for <JAIL>
|
||||||
.IP
|
.TP
|
||||||
set <JAIL> action <ACT> actionstop <CMD> sets the stop command <CMD> of the
|
\fBset <JAIL> action <ACT> actionstop <CMD> sets the stop command <CMD> of the\fR
|
||||||
.IP
|
|
||||||
action <ACT> for <JAIL>
|
action <ACT> for <JAIL>
|
||||||
.IP
|
.TP
|
||||||
set <JAIL> action <ACT> actioncheck <CMD>
|
\fBset <JAIL> action <ACT> actioncheck <CMD>\fR
|
||||||
.IP
|
|
||||||
sets the check command <CMD> of
|
sets the check command <CMD> of
|
||||||
the action <ACT> for <JAIL>
|
the action <ACT> for <JAIL>
|
||||||
.TP
|
.TP
|
||||||
\fBset <JAIL> action <ACT> actionban <CMD>\fR
|
\fBset <JAIL> action <ACT> actionban <CMD>\fR
|
||||||
sets the ban command <CMD> of the
|
sets the ban command <CMD> of the
|
||||||
action <ACT> for <JAIL>
|
action <ACT> for <JAIL>
|
||||||
.IP
|
.TP
|
||||||
set <JAIL> action <ACT> actionunban <CMD>
|
\fBset <JAIL> action <ACT> actionunban <CMD>\fR
|
||||||
.IP
|
|
||||||
sets the unban command <CMD> of
|
sets the unban command <CMD> of
|
||||||
the action <ACT> for <JAIL>
|
the action <ACT> for <JAIL>
|
||||||
.IP
|
.TP
|
||||||
set <JAIL> action <ACT> timeout <TIMEOUT>
|
\fBset <JAIL> action <ACT> timeout <TIMEOUT>\fR
|
||||||
.IP
|
|
||||||
sets <TIMEOUT> as the command
|
sets <TIMEOUT> as the command
|
||||||
timeout in seconds for the action
|
timeout in seconds for the action
|
||||||
<ACT> for <JAIL>
|
<ACT> for <JAIL>
|
||||||
.IP
|
.IP
|
||||||
GENERAL ACTION CONFIGURATION
|
GENERAL ACTION CONFIGURATION
|
||||||
.IP
|
.TP
|
||||||
set <JAIL> action <ACT> <PROPERTY> <VALUE>
|
\fBset <JAIL> action <ACT> <PROPERTY> <VALUE>\fR
|
||||||
.IP
|
|
||||||
sets the <VALUE> of <PROPERTY> for
|
sets the <VALUE> of <PROPERTY> for
|
||||||
the action <ACT> for <JAIL>
|
the action <ACT> for <JAIL>
|
||||||
.IP
|
.TP
|
||||||
set <JAIL> action <ACT> <METHOD>[ <JSONKWARGS>]
|
\fBset <JAIL> action <ACT> <METHOD>[ <JSONKWARGS>]\fR
|
||||||
.IP
|
|
||||||
calls the <METHOD> with
|
calls the <METHOD> with
|
||||||
<JSONKWARGS> for the action <ACT>
|
<JSONKWARGS> for the action <ACT>
|
||||||
for <JAIL>
|
for <JAIL>
|
||||||
|
|
|
@ -1,10 +1,10 @@
|
||||||
.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.44.1.
|
.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.3.
|
||||||
.TH FAIL2BAN-REGEX "1" "July 2016" "fail2ban-regex 0.10.0a1" "User Commands"
|
.TH FAIL2BAN-REGEX "1" "September 2016" "fail2ban-regex 0.10.0a2" "User Commands"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
fail2ban-regex \- test Fail2ban "failregex" option
|
fail2ban-regex \- test Fail2ban "failregex" option
|
||||||
.SH SYNOPSIS
|
.SH SYNOPSIS
|
||||||
.B fail2ban-regex
|
.B fail2ban-regex
|
||||||
[\fIOPTIONS\fR] \fI<LOG> <REGEX> \fR[\fIIGNOREREGEX\fR]
|
[\fI\,OPTIONS\/\fR] \fI\,<LOG> <REGEX> \/\fR[\fI\,IGNOREREGEX\/\fR]
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
Fail2Ban reads log file that contains password failure report
|
Fail2Ban reads log file that contains password failure report
|
||||||
and bans the corresponding IP addresses using firewall rules.
|
and bans the corresponding IP addresses using firewall rules.
|
||||||
|
@ -16,7 +16,7 @@ string
|
||||||
a string representing a log line
|
a string representing a log line
|
||||||
.TP
|
.TP
|
||||||
filename
|
filename
|
||||||
path to a log file (\fI/var/log/auth.log\fP)
|
path to a log file (\fI\,/var/log/auth.log\/\fP)
|
||||||
.TP
|
.TP
|
||||||
"systemd\-journal"
|
"systemd\-journal"
|
||||||
search systemd journal (systemd\-python required)
|
search systemd journal (systemd\-python required)
|
||||||
|
@ -42,23 +42,23 @@ show program's version number and exit
|
||||||
\fB\-h\fR, \fB\-\-help\fR
|
\fB\-h\fR, \fB\-\-help\fR
|
||||||
show this help message and exit
|
show this help message and exit
|
||||||
.TP
|
.TP
|
||||||
\fB\-d\fR DATEPATTERN, \fB\-\-datepattern\fR=\fIDATEPATTERN\fR
|
\fB\-d\fR DATEPATTERN, \fB\-\-datepattern\fR=\fI\,DATEPATTERN\/\fR
|
||||||
set custom pattern used to match date/times
|
set custom pattern used to match date/times
|
||||||
.TP
|
.TP
|
||||||
\fB\-e\fR ENCODING, \fB\-\-encoding\fR=\fIENCODING\fR
|
\fB\-e\fR ENCODING, \fB\-\-encoding\fR=\fI\,ENCODING\/\fR
|
||||||
File encoding. Default: system locale
|
File encoding. Default: system locale
|
||||||
.TP
|
.TP
|
||||||
\fB\-r\fR, \fB\-\-raw\fR
|
\fB\-r\fR, \fB\-\-raw\fR
|
||||||
Raw hosts, don't resolve dns
|
Raw hosts, don't resolve dns
|
||||||
.TP
|
.TP
|
||||||
\fB\-L\fR MAXLINES, \fB\-\-maxlines\fR=\fIMAXLINES\fR
|
\fB\-L\fR MAXLINES, \fB\-\-maxlines\fR=\fI\,MAXLINES\/\fR
|
||||||
maxlines for multi\-line regex
|
maxlines for multi\-line regex
|
||||||
.TP
|
.TP
|
||||||
\fB\-m\fR JOURNALMATCH, \fB\-\-journalmatch\fR=\fIJOURNALMATCH\fR
|
\fB\-m\fR JOURNALMATCH, \fB\-\-journalmatch\fR=\fI\,JOURNALMATCH\/\fR
|
||||||
journalctl style matches overriding filter file.
|
journalctl style matches overriding filter file.
|
||||||
"systemd\-journal" only
|
"systemd\-journal" only
|
||||||
.TP
|
.TP
|
||||||
\fB\-l\fR LOG_LEVEL, \fB\-\-log\-level\fR=\fILOG_LEVEL\fR
|
\fB\-l\fR LOG_LEVEL, \fB\-\-log\-level\fR=\fI\,LOG_LEVEL\/\fR
|
||||||
Log level for the Fail2Ban logger to use
|
Log level for the Fail2Ban logger to use
|
||||||
.TP
|
.TP
|
||||||
\fB\-v\fR, \fB\-\-verbose\fR
|
\fB\-v\fR, \fB\-\-verbose\fR
|
||||||
|
|
|
@ -1,12 +1,12 @@
|
||||||
.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.44.1.
|
.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.3.
|
||||||
.TH FAIL2BAN-SERVER "1" "July 2016" "fail2ban-server v0.10.0a1" "User Commands"
|
.TH FAIL2BAN-SERVER "1" "September 2016" "fail2ban-server v0.10.0a2" "User Commands"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
fail2ban-server \- start the server
|
fail2ban-server \- start the server
|
||||||
.SH SYNOPSIS
|
.SH SYNOPSIS
|
||||||
.B fail2ban-server
|
.B fail2ban-server
|
||||||
[\fIOPTIONS\fR]
|
[\fI\,OPTIONS\/\fR]
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
Fail2Ban v0.10.0a1 reads log file that contains password failure report
|
Fail2Ban v0.10.0a2 reads log file that contains password failure report
|
||||||
and bans the corresponding IP addresses using firewall rules.
|
and bans the corresponding IP addresses using firewall rules.
|
||||||
.SH OPTIONS
|
.SH OPTIONS
|
||||||
.TP
|
.TP
|
||||||
|
|
|
@ -1,10 +1,10 @@
|
||||||
.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.44.1.
|
.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.47.3.
|
||||||
.TH FAIL2BAN-TESTCASES "1" "July 2016" "fail2ban-testcases 0.10.0a1" "User Commands"
|
.TH FAIL2BAN-TESTCASES "1" "September 2016" "fail2ban-testcases 0.10.0a2" "User Commands"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
fail2ban-testcases \- run Fail2Ban unit-tests
|
fail2ban-testcases \- run Fail2Ban unit-tests
|
||||||
.SH SYNOPSIS
|
.SH SYNOPSIS
|
||||||
.B fail2ban-testcases
|
.B fail2ban-testcases
|
||||||
[\fIOPTIONS\fR] [\fIregexps\fR]
|
[\fI\,OPTIONS\/\fR] [\fI\,regexps\/\fR]
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
Script to run Fail2Ban tests battery
|
Script to run Fail2Ban tests battery
|
||||||
.SH OPTIONS
|
.SH OPTIONS
|
||||||
|
@ -15,9 +15,15 @@ show program's version number and exit
|
||||||
\fB\-h\fR, \fB\-\-help\fR
|
\fB\-h\fR, \fB\-\-help\fR
|
||||||
show this help message and exit
|
show this help message and exit
|
||||||
.TP
|
.TP
|
||||||
\fB\-l\fR LOG_LEVEL, \fB\-\-log\-level\fR=\fILOG_LEVEL\fR
|
\fB\-l\fR LOG_LEVEL, \fB\-\-log\-level\fR=\fI\,LOG_LEVEL\/\fR
|
||||||
Log level for the logger to use during running tests
|
Log level for the logger to use during running tests
|
||||||
.TP
|
.TP
|
||||||
|
\fB\-v\fR VERBOSITY, \fB\-\-verbosity\fR=\fI\,VERBOSITY\/\fR
|
||||||
|
Set numerical level of verbosity (0..4)
|
||||||
|
.TP
|
||||||
|
\fB\-\-log\-direct\fR
|
||||||
|
Prevent lazy logging inside tests
|
||||||
|
.TP
|
||||||
\fB\-n\fR, \fB\-\-no\-network\fR
|
\fB\-n\fR, \fB\-\-no\-network\fR
|
||||||
Do not run tests that require the network
|
Do not run tests that require the network
|
||||||
.TP
|
.TP
|
||||||
|
|
Loading…
Reference in New Issue