• Oct 30, 2020 •LeifMessinger
0 likes • 2 views
#!/bin/bash #getDependencies.sh by Leif Messinger grep -Po '#include\s*"\K.+(?=")' | while read -r line ; do echo -n " $line" ./getDependencies.sh < $line done
• Oct 17, 2023 •C S
2 likes • 17 views
# ---------------- FIREWALL STEPS ---------------- # Check if firewalld is installed and running sudo systemctl status firewalld # If it's not running, you can start and enable it sudo systemctl start firewalld sudo systemctl enable firewalld # Add a rule to allow traffic on port 6006. Port 6006 is the default port that storybook runs on. sudo firewall-cmd --permanent --add-port=6006/tcp # Reload the firewall for the changes to take effect sudo firewall-cmd --reload # Check the list of allowed ports sudo firewall-cmd --list-ports # ---------------- NGINX STEPS ---------------- # Install Nginx (if not already installed) sudo yum install nginx # Start and enable Nginx sudo systemctl start nginx sudo systemctl enable nginx # Copy your storybook-static directory to a location that Nginx can serve from. # The default web root directory for Nginx is /usr/share/nginx/html. sudo cp -r /path/to/storybook-static /usr/share/nginx/html/ # Adjust file permissions if needed to ensure that Nginx can read the files sudo chown -R nginx:nginx /usr/share/nginx/html/storybook-static # Put the following server block in /etc/nginx/conf.d/storybook.conf server { listen 6006; server_name your_domain.com; location / { root /usr/share/nginx/html/storybook-static; index index.html; } } # Test the Nginx configuration for syntax errors sudo nginx -t # If there are no errors, reload Nginx to apply the changes sudo systemctl reload nginx
• Nov 18, 2022 •AustinLeath
0 likes • 9 views
#for ssh abuse attempts action = %(action_)s %(action_abuseipdb)s[abuseipdb_apikey="", abuseipdb_category="18,22"] actionban = curl --fail --ciphers ecdhe_ecdsa_aes_256_sha --data 'key=<abuseipdb_apikey>' --data-urlencode 'comment=<matches>' --data 'ip=<ip>' --data 'category=<abuseipdb_category>' "https://www.abuseipdb.com/report/json"
• Dec 23, 2024 •AustinLeath
0 likes • 27 views
#!/bin/bash # RCLONE BACKUP SCRIPT (using ionice) # Type crontab -e and copy the line below without the # # 0 0 * * * ionice -c 3 /home/owner/backup.sh >/dev/null 2>&1 nowdate=$(date -u) # OPTIONS WEBHOOK="YOUR_DISCORD_WEBHOOK_LINK_HERE" LOGFILE="/root/backup.log" FROM="/path/where/you/backup/from" TO="backblaze:BucketName/FolderName" SERVERNAME="Server Name" echo "$SERVERNAME started a backup - $nowdate" | tee -a $LOGFILE curl --data "content=$SERVERNAME started a backup - $nowdate" $WEBHOOK | tee -a $LOGFILE && echo "" >> $LOGFILE if pidof -o %PPID -x "backup.sh" then echo "Failed backup attempt on $SERVERNAME - $nowdate (rclone already running)" | tee -a $LOGFILE curl --data "content=Failed backup attempt on $SERVERNAME - $nowdate (rclone already running)" $WEBHOOK | tee -a $LOGFILE exit 1 fi rclone sync $FROM $TO -P --b2-hard-delete --stats 5s --progress | sed 's/Transferred:/\n\nTransferred:/' | tee -a $LOGFILE enddate=$(date -u) endtime=$(date +'%T') echo "Completed backup on $SERVERNAME - $enddate" | tee -a $LOGFILE curl -F "content=Completed backup on $SERVERNAME - $enddate" -F upload=@"$LOGFILE" $WEBHOOK | tee -a $LOGFILE if [ -f $LOGFILE ] then rm $LOGFILE fi
• Mar 21, 2021 •LeifMessinger
0 likes • 0 views
#pinger.sh by Leif Messinger #./pinger.sh [ADDRESS] to search #./pinger.sh [ADDRESS] & to search in the background #https://serverfault.com/a/42382 ping_cancelled=false # Keep track of whether the loop was cancelled, or succeeded until ping -c1 "$1" >/dev/null 2>&1; do :; done & # The "&" backgrounds it trap "kill $!; ping_cancelled=true" SIGINT wait $! # Wait for the loop to exit, one way or another trap - SIGINT # Remove the trap, now we're done with it if [ "$ping_cancelled" == true ] #https://stackoverflow.com/a/21210966/10141528 then printf "The pinger for $1 just closed bro.\n" else printf "$1 IS UP BROOO\a\n" fi
• Jul 8, 2024 •C S
0 likes • 17 views
#!/bin/bash # Set the directory to search DIRECTORY="src" # Set the output file OUTPUT_FILE="testids.txt" # Clear the output file > "$OUTPUT_FILE" # Find all .tsx files in the specified directory and its subdirectories find "$DIRECTORY" -type f -name "*.tsx" | while read -r FILE do # Search for instances of 'data-testid="testid"' and append them to the output file grep -o 'data-testid="[^"]*"' "$FILE" >> "$OUTPUT_FILE" # Search for instances of "'data-testid': 'testid'" and append them to the output file grep -o "'data-testid': '[^']*'" "$FILE" >> "$OUTPUT_FILE" done echo "Search complete. Test IDs written to $OUTPUT_FILE."