Skip to content

Instantly share code, notes, and snippets.

View Jcpetrucci's full-sized avatar

John C. Petrucci Jcpetrucci

View GitHub Profile
#!/bin/bash
# This script converts the hexadecimal represenatation of an SSH (or similar) key's fingerprint into friendly words. The goal is to allow humans to more easily recognize when a fingerprint changes.
# Usage: provide the hexadecimal fingerprint as standard input. The regex match should trim any excess, so you do not have to be too precise when doing this. Just make sure that the fingerprint echoed back matches what you expect.
# This version was made in a pinch and has room for improvement.
# Example:
# $ ssh-keygen -l -f ~/.ssh/id_rsa | ./hex-fingerprint-words
# Generating from input fingerprint: 3b:44:c7:20:21:8c:81:5b:af:6a:da:bd:ab:29:c9:4f
# CONSENSUS DASHBOARD SHAMROCK BOTTOMLESS BRADBURY MOLECULE KLAXON EXAMINE RACKETEER GOLDFISH SURMOUNT RINGBOLT PUPIL CANNONBALL SLINGSHOT DRIFTER

Advanced copy+paste from tmux via PuTTY

Introduction

Useful for copying text from vertically split panes in tmux, when normal "shift + clickdrag" copying spans across the vertical separator, or there are too many rows to fit into the pane. Video explanation of what this does and how it works @ https://www.youtube.com/watch?v=kEIpE2XpDdY

The solution

  1. In server-side tmux.conf, add:
@Jcpetrucci
Jcpetrucci / index.php
Last active February 7, 2018 17:41
pagerduty "who's on-call" for slack
<?php
if ( $_POST["token"] != "REDACTED" ) {
header("HTTP/1.1 403 Forbidden");
die();
}
$SLACK_TEXT = preg_replace ( "/$_POST[trigger_word]/", '', $_POST[text] );
function whos_on_call ( $when ) {
@Jcpetrucci
Jcpetrucci / f5-vlan-selfip-maker.sh
Created September 7, 2018 20:47
F5 VLAN and Self IP generator
#!/bin/bash
while read VLAN_ID VLAN_NAME SUBNET MASKLEN; do
export MEMBER_A_IP=${SUBNET%.*}.252/${MASKLEN}
export MEMBER_B_IP=${SUBNET%.*}.253/${MASKLEN}
export VIP=${SUBNET%.*}.254/${MASKLEN}
for member in A B; do
printf 'For member %s:\n' $member
printf 'create net vlan %s interfaces add { internal { tagged } } tag %s\n' $VLAN_NAME $VLAN_ID
printf 'create net self me.%s { address %s traffic-group traffic-group-local-only vlan %s }\n' $VLAN_NAME $(eval echo '$MEMBER_'$member'_IP') $VLAN_NAME
printf 'create net self float.%s { address %s traffic-group traffic-group-1 vlan %s }\n' $VLAN_NAME $VIP $VLAN_NAME
#!/bin/bash
if [[ "${1,,}" == "install" ]]; then
# Call this script with argument 'install' to generate a systemd unit file.
cat <<-EOF | sudo dd of=/etc/systemd/system/vnc-alive-check.service
[Unit]
Description=VNC-ALIVE-CHECK: Make sure VNC is connected and restart it if needed.
After=network.target
[Service]
ExecStart=${PWD}/$0
#!/bin/bash
# Create: 2014-03-12 John C. Petrucci
# Modify: 2014-03-13 John C. Petrucci
# http://johncpetrucci.com
# Purpose: See usage()
# Usage: See usage()
usage (){
cat <<EOF
$(basename $0) - Converts hexadecimal to IP addresses.
@Jcpetrucci
Jcpetrucci / screen-changer.sh
Created January 3, 2019 21:21
mostly stagnant screen
#!/bin/bash
# made this to test the impact of changing a small part of the whole screen versus script(1) file size
export rows=$(tput lines); export cols=$(tput cols);
while :; do
( exec > .tmp-screen-changer.sh;
for r in $(seq 1 $rows); do
for i in $(seq 1 $cols); do
if (( $r == $rows / 2 )); then
if (( $i > $cols / 2 - 10 && $i < $cols / 2 + 10 )); then
printf '%s' $(head -c 1 <(tr -d -c '[:alpha:]' </dev/urandom))
@Jcpetrucci
Jcpetrucci / Randomize local root user password (Linux) v2.xml
Last active April 30, 2019 22:55
BigFix: Randomize local root user password (Linux) v2
<?xml version="1.0" encoding="UTF-8"?>
<BES xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="BES.xsd">
<Task>
<Title>Randomize local root user password (Linux) v2</Title>
<Description><![CDATA[<P>This task will generate a random passphrase, and set the local root user's password.&nbsp; The passphrase will be encrypted using a public key, base64 encoded, then stored in the properties of the computer object in BigFix.&nbsp; </P>
<P>To obtain the password, find the BigFix Client Setting named "bes_random_token", base64 decode it, and decrypt it using the private key.</P>
<P><EM>Example 1</EM>:<BR><FONT face=Terminal>user@prd-calypso$</FONT><FONT face=Terminal> <STRONG>echo QIU4bhwiQ0OevCiXcoNmJoPFxpxY5cFkUegCqPd8nkqZdxvVSmIFndp+30n61pT7nMXrYpYypZgHyMVnCoxg0A== | \<BR>openssl enc -d -base64 | openssl rsautl -decrypt -inkey rsa-priv.key</STRONG></FONT></P>
<P>You can also add this to your <FONT face=Terminal>~/.bashrc</FONT> file and then run `<FONT face=Terminal>decryptPas
#!/bin/bash
if [[ "${1,,}" == "install" ]]; then
# Call this script with argument 'install' to generate a systemd unit file.
cat <<-EOF | sudo dd of=/etc/systemd/system/docker-logs2journal.service
[Unit]
Description=This service reads from specified log files and outputs to systemd-journald
After=network.target
[Service]
#!/bin/bash
string_searching="Searching..."
HISTFILE=~/d42-search-history.txt
history -r "$HISTFILE"
echo $(tput setaf 7)
trap "echo $(tput sgr0)" EXIT
while read -r -e -p '? ' name; do