aboutsummaryrefslogtreecommitdiffstats
path: root/examples/tg14/tg14-config.pm
blob: 4af888eaca872ed0bb3957e087fd97132476df23 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
#! /usr/bin/perl
use strict;
use warnings;
use DBI;
package nms::config;

# DB
our $db_name = "nms";
our $db_host = "frank.tg14.gathering.org";
our $db_username = "nms";
our $db_password = "<removed>";

# TACACS-login for NMS
our $tacacs_user = "nms";
our $tacacs_pass = "<removed>";

# SNMP read-only for NMS, etc
our $snmp_community = "<removed>";

# Telnet-timeout for smanagrun
our $telnet_timeout = 30;

# IP/IPv6/DNS-info
our $tgname = "tg14";
our $pri_hostname = "brad";
our $pri_v4 = "151.216.254.2";
our $pri_v6 = "2a02:ed02:254::2";
our $pri_net_v4 = "151.216.254.0/24";
our $pri_net_v6 = "2a02:ed02:1ee7::/64";

our $sec_hostname = "janet";
our $sec_v4 = "151.216.253.2";
our $sec_v6 = "2a02:ed02:253::2";
our $sec_net_v4 = "151.216.253.0/24";
our $sec_net_v6 = "2a02:ed02:1337::/64";

# for RIPE to get reverse zones via DNS AXFR
# https://www.ripe.net/data-tools/dns/reverse-dns/how-to-set-up-reverse-delegation
our $ext_xfer  = "193.0.0.0/22; 2001:610:240::/48; 2001:67c:2e8::/48";

# allow XFR from NOC
our $noc_net  = "151.216.252.0/24; 2a02:ed02:252::/64";

# To generate new dnssec-key for ddns:
# dnssec-keygen -a HMAC-MD5 -b 128 -n HOST DHCP_UPDATER
our $ddns_key = "<removed>";
our $ddns_to  = "127.0.0.1"; # just use localhost

# Base networks
our $base_ipv4net = "151.216.128.0/17";
our $base_ipv6net = "2a02:ed02::/32";
our $ipv6zone = "2.0.d.e.2.0.a.2.ip6.arpa";

# extra networks that are outside the normal ranges
# that should have recursive DNS access
our $rec_net = "185.12.59.0/24";

# extra networks that are outside the normal ranges
# that should be added to DNS
our @extra_nets = (
	'185.12.59.0/24',  # Norsk nett
);

# add WLC's
our $wlc1 = "151.216.253.21";

# add VOIP-server
our $voip1 = "134.90.150.162";

# PXE-server (rest of bootstrap assumes $sec_v4/$sec_v6)
our $pxe_server_v4 = $sec_v4;
our $pxe_server_v6 = $sec_v6;

1;
>++) { entryOffset = dirStart + i*12 + 2; if (file.getUint16(entryOffset, !bigEnd) == 0x0112) { return parseInt(file.getUint16(entryOffset + 8, !bigEnd), 10); } } return false; } EXIF.getData = function(img) { if ((img instanceof Image || img instanceof HTMLImageElement) && !img.complete) { return false; } var data = img.src; if (data.match(/^http/)) { // We're loading this image from the server, presumably after a // submission, so we have its URL, not yet its data. var canvas = document.createElement("canvas"), ctx = canvas.getContext("2d"); canvas.width = img.width; canvas.height = img.height; ctx.drawImage(img, 0, 0); data = canvas.toDataURL("image/jpeg"); } var base64 = data.replace(/^data\:([^\;]+)\;base64,/gmi, ''); var binary = atob(base64); var len = binary.length; var file = new ArrayBuffer(len); var view = new Uint8Array(file); for (var i = 0; i < len; i++) { view[i] = binary.charCodeAt(i); } var dataView = new DataView(file); if ((dataView.getUint8(0) != 0xFF) || (dataView.getUint8(1) != 0xD8)) { return false; // not a valid jpeg } var offset = 2, length = file.byteLength, marker; while (offset < length) { if (dataView.getUint8(offset) != 0xFF) { return false; // not a valid marker, something is wrong } marker = dataView.getUint8(offset + 1); // we could implement handling for other markers here, // but we're only looking for 0xFFE1 for EXIF data if (marker == 225) { return readEXIFData(dataView, offset + 4); // offset += 2 + file.getShortAt(offset+2, true); } else { offset += 2 + dataView.getUint16(offset+2); } } }; })();