ilog() {
chan=${1:-#fsfsys}
# use * instead of -r since that does sorted order
- ssh root@iankelling.org "cd /var/lib/znc/moddata/log/iank/freenode/$chan && hr && for x in *; do echo \$x; sed \"s/^./\${x%log}/\" \$x; hr; done" | less +G
+ ssh root@iankelling.org "cd /var/lib/znc/moddata/log/iank/libera/$chan && hr && for x in *; do echo \$x; sed \"s/^./\${x%log}/\" \$x; hr; done" | less +G
}
o() {
vpncmd() {
- m sudo --preserve-env=PATH -E nsenter -t $(pgrep -f "/usr/sbin/openvpn .* --config /etc/openvpn/.*client.conf") -n -m "$@"
+ m sudo env "PATH=$PATH" nsenter -t $(pgrep -f "/usr/sbin/openvpn .* --config /etc/openvpn/.*client.conf") -n -m "$@"
}
vpnf() {
- vpncmd sudo --preserve-env=PATH -E -u iank abrowser -no-remote -P vpn &r
+ vpncmd sudo -u iank env "PATH=$PATH" abrowser -no-remote -P vpn &r
}
vpn2f() {
- vpncmd sudo --preserve-env=PATH -E -u iank abrowser -no-remote -P vpn2 &r
+ vpncmd sudo -u iank env "PATH=$PATH" abrowser -no-remote -P vpn2 &r
}
vpni() {
- vpncmd sudo --preserve-env=PATH -E -u iank "$@"
+ vpncmd sudo -u iank env "PATH=$PATH" "$@"
}
vpnbash() {
vpncmd bash
# general vpn for as needed use
vpn-server-setup -d -r -4 10.5.5 -p 443 -n hole
+ # todo: consider if this should exist for the
+ # other vpn server
+ teeu /etc/openvpn/server/hole.conf <<'EOF'
+client-to-client
+EOF
+
# sullivan d8
sd /etc/openvpn/client-config-hole/sd8 <<'EOF'
ifconfig-push 10.5.5.41 255.255.255.0
ifconfig-push 10.5.5.42 255.255.255.0
EOF
+ sd /etc/openvpn/client-config-hole/onep9 <<'EOF'
+ifconfig-push 10.5.5.14 255.255.255.0
+EOF
sd /etc/openvpn/client-config-hole/sy <<'EOF'
ifconfig-push 10.5.5.12 255.255.255.0
EOF
exit 0
fi
-regex="malware acl condition"
-found=false
-wipe=true
-while read -r d1 d2; do
- found=true
- tmptime=$(date -d "$d1 $d2" +%s)
- # dont consider every matching line, just those in > 60 second intervals
- if [[ ! $logtime ]]; then
- logtime=$tmptime
- elif (( tmptime > logtime + 60 )); then
- logtime=$tmptime
- else
- continue
+while read -r service regex; do
+ found=false
+ wipe=true
+ while read -r d1 d2; do
+ found=true
+ tmptime=$(date -d "$d1 $d2" +%s)
+ # dont consider every matching line, just those in > 60 second intervals
+ if [[ ! $logtime ]]; then
+ logtime=$tmptime
+ elif (( tmptime > logtime + 60 )); then
+ logtime=$tmptime
+ else
+ continue
+ fi
+ sec_min=$((logtime - 60))
+ sec_max=$((logtime + 60))
+ jmin="$(date -d @$sec_min "+%F %H:%M:%S")"
+ jmax="$(date -d @$sec_max "+%F %H:%M:%S")"
+ description=$(systemctl cat $service | sed -rn 's/^ *Description=(.*)/\1/p')
+ if ! journalctl -u $service -S "$jmin" -U "$jmax" \
+ | grep "Starting $description" &>/dev/null; then
+ wipe=false
+ break
+ fi
+ done < <(awk "/$regex/ "'{print $1,$2}' /var/log/exim4/paniclog)
+ if $found && $wipe; then
+ if [[ ! -w /var/log/exim4/paniclog-archive ]]; then
+ $s touch /var/log/exim4/paniclog-archive
+ $s chgrp adm /var/log/exim4/paniclog-archive
+ $s chmod 664 /var/log/exim4/paniclog-archive
+ fi
+ grep -E "$regex" /var/log/exim4/paniclog >> /var/log/exim4/paniclog-archive
+ $s sed -ri "/$regex/d" /var/log/exim4/paniclog
fi
- sec_min=$((logtime - 60))
- sec_max=$((logtime + 60))
- jmin="$(date -d @$sec_min "+%F %H:%M:%S")"
- jmax="$(date -d @$sec_max "+%F %H:%M:%S")"
- if ! journalctl -u clamav-daemon -S "$jmin" -U "$jmax" \
- | grep 'Starting Clam AntiVirus userspace daemon' &>/dev/null; then
- wipe=false
- break
- fi
-done < <(awk "/$regex/ "'{print $1,$2}' /var/log/exim4/paniclog)
-if $found && $wipe; then
- if [[ ! -w /var/log/exim4/paniclog-archive ]]; then
- $s touch /var/log/exim4/paniclog-archive
- $s chgrp adm /var/log/exim4/paniclog-archive
- $s chmod 664 /var/log/exim4/paniclog-archive
- fi
- grep -E "$regex" /var/log/exim4/paniclog >> /var/log/exim4/paniclog-archive
- $s sed -ri "/$regex/d" /var/log/exim4/paniclog
-fi
+done <<'EOF'
+clamav-daemon malware acl condition
+spamassassin spam acl condition
+EOF
bindsym $mod+Shift+p restart
-# bar {
-# #status_command i3status
+# need this for kde connect
+bar {
+status_command i3status
# #status_command /usr/local/bin/myi3status
-# mode hide
+mode hide
# hidden_state hide
# font pango:monospace 14
-# }
+}
+
+exec copyq
+exec /usr/lib/x86_64-linux-gnu/libexec/kdeconnectd
# changed, so that should fix it.
/a/bin/log-quiet/setup
rsync -t --chmod=755 --chown=root:root switch-mail-host btrbk-run mount-latest-subvol \
- check-subvol-stale system-status myi3status mailtest-check /usr/local/bin
+ check-subvol-stale system-status myi3status mailtest-check \
+ /a/bin/log-quiet/sysd-mail-once \
+ btrfsmaint \
+ dynamic-ip-update \
+ /usr/local/bin
rsync -t --chmod=755 --chown=root:root /a/bin/errhandle/err /usr/local/lib
bwm-ng
ccache
cloc
+ # pretty complex config. i just setup to ignore my password managerf
+ # according to the docs, and C-M-v to open the main window
+ copyq
cpulimit
cron
debian-archive-keyring
hplip
hunspell
i3lock
+ i3status
iotop
info
inotify-tools
bindsym $mod+Shift+p restart
+# need this for kde connect
bar {
status_command i3status
-#status_command /usr/local/bin/myi3status
+# #status_command /usr/local/bin/myi3status
mode hide
-hidden_state hide
+# hidden_state hide
# font pango:monospace 14
}
+
+exec copyq
+exec /usr/lib/x86_64-linux-gnu/libexec/kdeconnectd
#keyserver hkp://keys.openpgp.org
#keyserver hkp://pgp.mit.edu
#keyserver hkp://keyserver.pgp.com
-keyserver hkp://ipv4.pool.sks-keyservers.net
+#keyserver hkp://ipv4.pool.sks-keyservers.net
#keyserver hkp://keys.gnupg.net
-#keyserver hkp://keyserver.ubuntu.com
+keyserver hkp://keyserver.ubuntu.com
#keyserver hkp://keyring.debian.org
#keyserver keyserver.ubuntu.com
-
# more secure hkps, but had problems with my gpg version
#keyserver hkps://hkps.pool.sks-keyservers.net