Skip to content

Instantly share code, notes, and snippets.

* Debian healthcheck of multi-master upstream
Healthcheck:
Once per minute (or whatever), on each static.d.o node
- try to fetch .serial from peers, if failure:
- get .serial ten times from fastly
- save max value.
If max value > local value:
diff --git a/wee_slack.py b/wee_slack.py
index 59a1cd5..ab40934 100644
--- a/wee_slack.py
+++ b/wee_slack.py
@@ -465,13 +465,13 @@ class Channel(object):
message = message.split(' ')
for item in enumerate(message):
if item[1].startswith('@') and len(item[1]) > 1:
- named = re.match('.*[@#](\w+)(\W*)', item[1]).groups()
+ named = re.match('.*[@#]([\w.]+)(\W*)', item[1]).groups()
diff --git a/wee_slack.py b/wee_slack.py
index 78ed425..a615b69 100644
--- a/wee_slack.py
+++ b/wee_slack.py
@@ -1481,6 +1481,59 @@ def slack_never_away_cb(data, remaining):
server.send_to_websocket(request, expect_reply=False)
return w.WEECHAT_RC_OK
+
+def nick_completion_cb(data, completion_item, buffer, completion):
diff --git a/wee_slack.py b/wee_slack.py
index 251d5bf..ad5c92b 100644
--- a/wee_slack.py
+++ b/wee_slack.py
@@ -1634,8 +1634,55 @@ def script_unloaded():
# END Utility Methods
+def nick_completion_cb(data, completion_item, buffer, completion):
+ """
diff --git a/wee_slack.py b/wee_slack.py
index a88c9b3..b55dc7f 100644
--- a/wee_slack.py
+++ b/wee_slack.py
@@ -297,7 +297,7 @@ class SlackServer(object):
def create_slack_mappings(self, data):
for item in data["users"]:
- self.users.append(User(self, item["name"], item["id"], item["presence"]))
+ self.users.append(User(self, item["name"], item["id"], item["presence"], item["deleted"]))
rmadison numbers, from 2015-05-28 until today, 2015-06-11
Most popular package: ruby-attr-required (518)
Number of package names looked up: 1104
Number of lookups: 4494
Number of packages with > 1 lookup: 532
> getfacl /var/log/journal
getfacl: Removing leading '/' from absolute path names
# file: var/log/journal
# owner: root
# group: systemd-journal
# flags: -s-
user::rwx
group::r-x
group:adm:r-x
mask::r-x
diff --git a/modules/stunnel4/manifests/init.pp b/modules/stunnel4/manifests/init.pp
index 6d5c4e4..f1adc42 100644
--- a/modules/stunnel4/manifests/init.pp
+++ b/modules/stunnel4/manifests/init.pp
@@ -8,10 +8,17 @@ class stunnel4 {
ensure => directory,
mode => '0755',
}
- file { '/etc/init.d/stunnel4':
- source => 'puppet:///modules/stunnel4/etc-init.d-stunnel4',
OpenSSL Security Advisory [19 Mar 2015]
=======================================
OpenSSL 1.0.2 ClientHello sigalgs DoS (CVE-2015-0291)
=====================================================
Severity: High
If a client connects to an OpenSSL 1.0.2 server and renegotiates with an
invalid signature algorithms extension a NULL pointer dereference will occur.
: tfheen@xoog ~ > curl -v --resolve www.domeneshop.no:443:127.0.0.1 https://www.domeneshop.no
* Added www.domeneshop.no:443:127.0.0.1 to DNS cache
* Rebuilt URL to: https://www.domeneshop.no/
* Hostname was found in DNS cache
* Trying 127.0.0.1...
* connect to 127.0.0.1 port 443 failed: Oppkobling nektes
* Failed to connect to www.domeneshop.no port 443: Oppkobling nektes
* Closing connection 0
curl: (7) Failed to connect to www.domeneshop.no port 443: Oppkobling nektes