Skip to content

Instantly share code, notes, and snippets.

@rpunt
rpunt / gist:85ab824375936a2caebf
Created Jul 17, 2015
Mirror a CRL, and use the "This update" field as the file's mod-time
View gist:85ab824375936a2caebf
curl http://site.com/file.crl -o /var/www/file.crl
lastmod=`openssl crl -inform DER -text -noout -in /var/www/file.crl | grep "Last Update" | awk '{ print "date -d \""$3FS$4FS$5FS$6"\" +%Y%m%d%H%M" }' | bash`
touch -mt $lastmod /var/www/file.crl
@rpunt
rpunt / parallel_pull.sh
Last active Aug 16, 2016
Parallel git pulls
View parallel_pull.sh
#!/usr/bin/env bash
superpull() {
dir=$1
error_repos=$2
cd $dir
STATUS=`mktemp`
echo -e "\n************************************\n* Pulling $dir\n************************************" >$STATUS
git checkout master 1>>$STATUS 2>&1
if [[ $? != 0 ]]; then
View keybase.md

Keybase proof

I hereby claim:

  • I am rpunt on github.
  • I am rpunt (https://keybase.io/rpunt) on keybase.
  • I have a public key whose fingerprint is BF55 A76A E67F F3A1 2E09 E08F ED47 262D 3FF6 076A

To claim this, I am signing this object:

@rpunt
rpunt / unifi_keystore_gen.sh
Last active Feb 16, 2019
Generate a keystore for Unifi controllers
View unifi_keystore_gen.sh
#!/bin/bash
# Assumptions:
# ./unifi.pem is the signed cert you wish to use
# ./unifi.key is the private key
# ./chain.pem is the CA chain for your issuer, ordered intermediates to root (descending)
# /var/lib/unifi/keystore is the appropriate path for your Keystore; may vary by distro (tested on Debian 8)
openssl pkcs12 -export \
-in unifi.pem \
View gitconfig
[alias]
lg = log --color --graph --pretty=format:'%Cred%h%Creset -%C(yellow)%d%Creset %s %Cgreen(%cr) %C(bold blue)<%an>%Creset' --abbrev-commit
since = !git log $(git merge-base --fork-point master)..HEAD
files-changed="!f() { git log --name-only $1..HEAD --oneline --format=%n ${2:-.} | grep -v '^$' | sort | uniq; }; f"
@rpunt
rpunt / ntpconfig.ps1
Created Jan 21, 2019
Configure NTP on windows server
View ntpconfig.ps1
# from an elevated prompt
Stop-service w32time
w32tm /config /syncfromflags:manual /manualpeerlist:"server1.domain.tld,server2.domain.tld"
w32tm /config /reliable:yes
start-service w32time
# get sync status
W32tm /query /status
View unifi_dns_record.sh
# Create a DNS record in a Unifi USG
# ssh to USG
configure
# create an A record
set system static-host-mapping host-name HOSTNAME inet IPADDRESS
# create a CNAME
set system static-host-mapping host-name HOSTNAME alias CNAME
View unifi_jail_file_transfer_from_host.sh
# get jail paths
root@freenas:~ > jls
JID IP Address Hostname Path
3 unifi /mnt/default/iocage/jails/unifi/root
root@freenas: > mv ~/keystore /mnt/default/iocage/jails/unifi/root/usr/local/share/java/unifi/data/
@rpunt
rpunt / check-windows-cert-expiry.ps1
Created Aug 7, 2019
Return days until cert expiration
View check-windows-cert-expiry.ps1
# exit codes reflect this script's use as a Sensu check
# replace "YOUR ISSUER HERE" with the CA of your choice
param (
[Parameter(Mandatory=$True)][int]$critical = $(throw "-critical - is required."),
[Parameter(Mandatory=$True)][int]$Warning = $(throw "-warning - is required."),
[Parameter(Mandatory=$False)][string]$computer = $env:COMPUTERNAME.Tolower()
)
$cert=$(get-childitem cert:LocalMachine\My -recurse | where-object { $_.Issuer -match "YOUR ISSUER HERE" } | select Subject,@{Name="DaysRemaining";Expression={($_.NotAfter).subtract([DateTime]::Now).days}})
@rpunt
rpunt / mktemp.ps1
Created Feb 15, 2020
I've wanted mktemp in powershell forever, so... fine.
View mktemp.ps1
function mktemp {
param (
[Parameter(mandatory=$false)]$Extension
)
$randomfile = [System.IO.Path]::GetRandomFileName()
if ($Extension) {
$randomfile = [System.IO.Path]::ChangeExtension($randomfile, $Extension)
}
return Microsoft.PowerShell.Management\Join-Path ([System.IO.Path]::GetTempPath()) "$randomfile"
}