summaryrefslogtreecommitdiff
path: root/modules/profiles/files
diff options
context:
space:
mode:
authorHugo Hörnquist <hugo@lysator.liu.se>2022-01-12 02:26:25 +0100
committerHugo Hörnquist <hugo@lysator.liu.se>2022-01-12 02:26:25 +0100
commitdd28dcf3d620a4ac7d0a1532b812213cf094cd3c (patch)
treea3fa8c8ef446de2bcc2f317bceb4bca868f7e0f0 /modules/profiles/files
parentMove webdav into profiles. (diff)
downloadwebdav_server-dd28dcf3d620a4ac7d0a1532b812213cf094cd3c.tar.gz
webdav_server-dd28dcf3d620a4ac7d0a1532b812213cf094cd3c.tar.xz
Revert "Move webdav into profiles."
It actually reverts the non-need for the nginx module webdav_ext. Since Omnifocus requires PROPFIND. This reverts commit edf6ffe8b399679ba28cc5e558a6838919dd1ee8.
Diffstat (limited to 'modules/profiles/files')
-rw-r--r--modules/profiles/files/firewall/rules.v415
-rw-r--r--modules/profiles/files/node-classifier.py44
-rwxr-xr-xmodules/profiles/files/passmenu29
-rw-r--r--modules/profiles/files/ssh-agent.service13
4 files changed, 0 insertions, 101 deletions
diff --git a/modules/profiles/files/firewall/rules.v4 b/modules/profiles/files/firewall/rules.v4
deleted file mode 100644
index bdc63cc..0000000
--- a/modules/profiles/files/firewall/rules.v4
+++ /dev/null
@@ -1,15 +0,0 @@
-# Generated by iptables-save v1.8.4 on Thu Jun 3 20:27:52 2021
-*filter
-:INPUT DROP [120:97784]
-:FORWARD ACCEPT [0:0]
-:OUTPUT ACCEPT [526:114637]
--A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
--A INPUT -p udp -m udp --dport 67:68 -j ACCEPT
--A INPUT -p icmp -j ACCEPT
--A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
--A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
--A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
--A INPUT -p tcp -m tcp --dport 53 -j ACCEPT
--A INPUT -p udp -m udp --dport 53 -j ACCEPT
-COMMIT
-# Completed on Thu Jun 3 20:27:52 2021
diff --git a/modules/profiles/files/node-classifier.py b/modules/profiles/files/node-classifier.py
deleted file mode 100644
index 7fc096f..0000000
--- a/modules/profiles/files/node-classifier.py
+++ /dev/null
@@ -1,44 +0,0 @@
-#!/usr/bin/env python3
-
-import yaml
-import sys
-import configparser
-
-# https://puppet.com/docs/puppet/7/nodes_external.html
-
-
-def main(args):
- if len(args) == 1:
- print('usage ./node-classifier <node-name>')
- return
-
- parser = configparser.ConfigParser()
- conf_file = '/etc/node-classifier.ini'
- if parser.read(conf_file) != [conf_file]:
- print(f'Configuration file missing, expected {conf_file}')
- return 1
-
- try:
- fmt = parser.get('common', 'node_fmt')
- if fmt != 'yaml':
- print(f'Unknown format {fmt}')
- return 1
- filename = parser.get('common', 'nodes')
- except configparser.NoSectionError as e:
- print(e)
- return 1
- except NoOptionError as e:
- print(e)
- return 1
-
- with open(filename) as f:
- data = yaml.load(f)
-
- nodename = sys.argv[1]
- instance = data.get(nodename)
- if not instance:
- instance = data.get('default')
- print(yaml.dump(instance))
-
-if __name__ == '__main__':
- sys.exit(main(sys.argv))
diff --git a/modules/profiles/files/passmenu b/modules/profiles/files/passmenu
deleted file mode 100755
index 653ebda..0000000
--- a/modules/profiles/files/passmenu
+++ /dev/null
@@ -1,29 +0,0 @@
-#!/usr/bin/env bash
-
-shopt -s nullglob globstar
-
-typeit=0
-if [[ $1 == "--type" ]]; then
- typeit=1
- shift
-fi
-
-prefix=${PASSWORD_STORE_DIR-~/.password-store}
-password_files=( "$prefix"/**/*.gpg )
-password_files=( "${password_files[@]#"$prefix"/}" )
-password_files=( "${password_files[@]%.gpg}" )
-
-password=$(printf '%s\n' "${password_files[@]}" | dmenu "$@")
-
-[[ -n $password ]] || exit
-
-if [[ "$password" == *-otp ]]; then
- otp='otp'
-fi
-
-if [[ $typeit -eq 0 ]]; then
- pass $otp show -c "$password" 2>/dev/null
-else
- pass $otp show "$password" | { IFS= read -r pass; printf %s "$pass"; } |
- xdotool type --clearmodifiers --file -
-fi
diff --git a/modules/profiles/files/ssh-agent.service b/modules/profiles/files/ssh-agent.service
deleted file mode 100644
index d49edc6..0000000
--- a/modules/profiles/files/ssh-agent.service
+++ /dev/null
@@ -1,13 +0,0 @@
-# https://unix.stackexchange.com/questions/339840/how-to-start-and-use-ssh-agent-as-systemd-service
-
-[Unit]
-Description=SSH key agent
-
-[Service]
-Type=simple
-Environment=SSH_AUTH_SOCK=%t/ssh-agent.socket
-# ExecStart=/usr/bin/ssh-agent -D -a $SSH_AUTH_SOCK
-ExecStart=/usr/bin/ssh-agent -D -a $SSH_AUTH_SOCK
-
-[Install]
-WantedBy=default.target