コード例 #1
0
ファイル: knockknock-daemon.py プロジェクト: sukhrajbrar/spa
def handleKnocks(output, config):
    dropPrivileges()

    logFile = LogFile('/var/log/kern.log')
    portOpener = PortOpener(output, config.getDelay())
    knockWatcher = KnockWatcher(config, logFile, portOpener)

    knockWatcher.tailAndProcess()
コード例 #2
0
def handleKnocks(output, profiles, config):
#    dropPrivileges()

    # set logFile to location of iptable logs
    #logFile      = LogFile('/var/log/kern.log')
    logFile      = LogFile('/var/log/messages')
    portOpener   = PortOpener(output, config.getDelay())
    knockWatcher = KnockWatcher(config, logFile, profiles, portOpener)

    knockWatcher.tailAndProcess()
コード例 #3
0
def handleKnocks(output, profiles, config):
    dropPrivileges()
    # Attempt to determine logging source here (since it shouldn't require
    # elevated privileges to verify this information) based on the system
    # init process
    if initprocname == "systemd":
        from knockknock.LogJournald import JournalReader
        logSource      = JournalReader()
    elif initprocname in ["init", "preinit"]:
        from knockknock.LogFile import LogFile
        logSource      = LogFile('/var/log/kern.log')
    else:
        print "Failed to find logging source for your init system. Exiting"
        sys.exit(3)
    portOpener   = PortOpener(output, config.getDelay())
    knockWatcher = KnockWatcher(config, logSource, profiles, portOpener)

    knockWatcher.tailAndProcess()
コード例 #4
0
ファイル: knockknock-daemon.py プロジェクト: sukhrajbrar/spa
def handleFirewall(input, config):
    portOpener = PortOpener(input, config.getDelay())
    portOpener.waitForRequests()
コード例 #5
0
def handleFirewall(input, config):
    portOpener = PortOpener(input, config.getDelay())
    portOpener.waitForRequests()