Compare commits
9 Commits
635590d37a
...
4cc0add2ad
Author | SHA1 | Date | |
---|---|---|---|
4cc0add2ad | |||
2d7e6188ac | |||
b9999857cb | |||
ba03ddeb38 | |||
493c5f69d7 | |||
1a915e91ff | |||
197e2eb5b1 | |||
7ca822c826 | |||
e5631783e1 |
@ -102,6 +102,12 @@ in {
|
|||||||
systemd.services.sshd.wantedBy = pkgs.lib.mkForce [ "multi-user.target" ];
|
systemd.services.sshd.wantedBy = pkgs.lib.mkForce [ "multi-user.target" ];
|
||||||
|
|
||||||
virtualisation = {
|
virtualisation = {
|
||||||
|
forwardPorts = [ {
|
||||||
|
from = "host";
|
||||||
|
host.port = 7654;
|
||||||
|
# guest.address = "10.0.2.15";
|
||||||
|
guest.port =7654;
|
||||||
|
} ];
|
||||||
qemu = {
|
qemu = {
|
||||||
networkingOptions = [ ];
|
networkingOptions = [ ];
|
||||||
options =
|
options =
|
||||||
@ -124,6 +130,12 @@ in {
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
services.tang = {
|
||||||
|
enable = true;
|
||||||
|
ipAddressAllow = [ "10.0.0.0/24" "0.0.0.0/0" ];
|
||||||
|
};
|
||||||
|
|
||||||
environment.systemPackages =
|
environment.systemPackages =
|
||||||
let wireshark-nogui = pkgs.wireshark.override { withQt = false ; };
|
let wireshark-nogui = pkgs.wireshark.override { withQt = false ; };
|
||||||
in with pkgs; [
|
in with pkgs; [
|
||||||
@ -134,6 +146,7 @@ in {
|
|||||||
iptables
|
iptables
|
||||||
usbutils
|
usbutils
|
||||||
busybox
|
busybox
|
||||||
|
clevis
|
||||||
];
|
];
|
||||||
security.sudo.wheelNeedsPassword = false;
|
security.sudo.wheelNeedsPassword = false;
|
||||||
networking = {
|
networking = {
|
||||||
|
@ -97,7 +97,7 @@ time. For example:
|
|||||||
Logs
|
Logs
|
||||||
====
|
====
|
||||||
|
|
||||||
Logs for all services are collated into :file:`/run/uncaught-logs/current`.
|
Logs for all services are collated into :file:`/run/log/current`.
|
||||||
The log file is rotated when it reaches a threshold size, into another
|
The log file is rotated when it reaches a threshold size, into another
|
||||||
file in the same directory whose name contains a TAI64 timestamp.
|
file in the same directory whose name contains a TAI64 timestamp.
|
||||||
|
|
||||||
@ -108,7 +108,7 @@ human-readable format, use :command:`s6-tai64nlocal`.
|
|||||||
|
|
||||||
.. code-block:: console
|
.. code-block:: console
|
||||||
|
|
||||||
# ls -l /run/uncaught-logs/
|
# ls -l /run/log/
|
||||||
-rw-r--r-- 1 0 lock
|
-rw-r--r-- 1 0 lock
|
||||||
-rw-r--r-- 1 0 state
|
-rw-r--r-- 1 0 state
|
||||||
-rwxr--r-- 1 98059 @4000000000025cb629c311ac.s
|
-rwxr--r-- 1 98059 @4000000000025cb629c311ac.s
|
||||||
@ -122,10 +122,10 @@ human-readable format, use :command:`s6-tai64nlocal`.
|
|||||||
-rwxr--r-- 1 98023 @4000000000027e6f0ed24a6c.s
|
-rwxr--r-- 1 98023 @4000000000027e6f0ed24a6c.s
|
||||||
-rw-r--r-- 1 42374 current
|
-rw-r--r-- 1 42374 current
|
||||||
|
|
||||||
# tail -2 /run/uncaught-logs/current
|
# tail -2 /run/log/current
|
||||||
@40000000000284f130747343 wan.link.pppoe Connect: ppp0 <--> /dev/pts/0
|
@40000000000284f130747343 wan.link.pppoe Connect: ppp0 <--> /dev/pts/0
|
||||||
@40000000000284f230acc669 wan.link.pppoe sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x667a9594> <pcomp> <accomp>]
|
@40000000000284f230acc669 wan.link.pppoe sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x667a9594> <pcomp> <accomp>]
|
||||||
# tail -2 /run/uncaught-logs/current | s6-tai64nlocal
|
# tail -2 /run/log/current | s6-tai64nlocal
|
||||||
1970-01-02 21:51:45.828598156 wan.link.pppoe sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x667a9594> <pcomp> <accom
|
1970-01-02 21:51:45.828598156 wan.link.pppoe sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x667a9594> <pcomp> <accom
|
||||||
p>]
|
p>]
|
||||||
1970-01-02 21:51:48.832588765 wan.link.pppoe sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x667a9594> <pcomp> <accom
|
1970-01-02 21:51:48.832588765 wan.link.pppoe sent [LCP ConfReq id=0x1 <asyncmap 0x0> <magic 0x667a9594> <pcomp> <accom
|
||||||
|
@ -71,7 +71,7 @@ stdin/stdout.
|
|||||||
You should now see Linux boot messages and after a few seconds be
|
You should now see Linux boot messages and after a few seconds be
|
||||||
presented with a root shell prompt. You can run commands to look at
|
presented with a root shell prompt. You can run commands to look at
|
||||||
the filesystem, see what processes are running, view log messages (in
|
the filesystem, see what processes are running, view log messages (in
|
||||||
:file:/run/uncaught-logs.current), etc. To kill the emulator, press ^P
|
:file:/run/log/current), etc. To kill the emulator, press ^P
|
||||||
(Control P) then c to enter the "QEMU Monitor", then type ``quit`` at
|
(Control P) then c to enter the "QEMU Monitor", then type ``quit`` at
|
||||||
the ``(qemu)`` prompt.
|
the ``(qemu)`` prompt.
|
||||||
|
|
||||||
|
@ -8,7 +8,7 @@ let
|
|||||||
stdenvNoCC;
|
stdenvNoCC;
|
||||||
inherit (lib.lists) unique concatMap;
|
inherit (lib.lists) unique concatMap;
|
||||||
inherit (pkgs.pseudofile) dir symlink;
|
inherit (pkgs.pseudofile) dir symlink;
|
||||||
inherit (pkgs.liminix.services) oneshot bundle;
|
inherit (pkgs.liminix.services) oneshot bundle longrun;
|
||||||
inherit (lib) mkIf mkEnableOption mkOption types;
|
inherit (lib) mkIf mkEnableOption mkOption types;
|
||||||
cfg = config.logging;
|
cfg = config.logging;
|
||||||
s6-rc-db =
|
s6-rc-db =
|
||||||
@ -237,9 +237,28 @@ in {
|
|||||||
};
|
};
|
||||||
imports = [
|
imports = [
|
||||||
( {config, pkgs, lib, ...}:
|
( {config, pkgs, lib, ...}:
|
||||||
let cfg = config.logging;
|
let
|
||||||
|
cfg = config.logging;
|
||||||
|
pipeline = shipper: bundle {
|
||||||
|
name = "log-shipping-pipe";
|
||||||
|
contents = let
|
||||||
|
eat = longrun {
|
||||||
|
name = "log-shipping-pipe-eat";
|
||||||
|
run = ''
|
||||||
|
fdmove -c 12 1 \
|
||||||
|
${pkgs.s6}/bin/s6-ipcserver ${cfg.shipping.socket} \
|
||||||
|
fdmove -c 1 12 \
|
||||||
|
cat
|
||||||
|
'';
|
||||||
|
producer-for = spew.name;
|
||||||
|
};
|
||||||
|
spew = shipper.override {
|
||||||
|
consumer-for ="log-shipping-pipe-eat";
|
||||||
|
};
|
||||||
|
in [ eat spew ];
|
||||||
|
};
|
||||||
in mkIf cfg.shipping.enable {
|
in mkIf cfg.shipping.enable {
|
||||||
services.${cfg.shipping.service.name} = cfg.shipping.service;
|
services.${cfg.shipping.service.name} = pipeline cfg.shipping.service;
|
||||||
}
|
}
|
||||||
)];
|
)];
|
||||||
|
|
||||||
|
21
modules/tls-certificate/certifix-client.nix
Normal file
21
modules/tls-certificate/certifix-client.nix
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{ liminix, certifix-client, svc, lib, writeText, serviceFns }:
|
||||||
|
{
|
||||||
|
caCertificate,
|
||||||
|
secret,
|
||||||
|
subject,
|
||||||
|
serviceUrl
|
||||||
|
}:
|
||||||
|
let
|
||||||
|
inherit (builtins) filter isString split;
|
||||||
|
inherit (liminix.services) oneshot;
|
||||||
|
name = "certifix-${lib.strings.sanitizeDerivationName subject}";
|
||||||
|
caCertFile = writeText "ca.crt" caCertificate;
|
||||||
|
secretFile = writeText "secret" secret;
|
||||||
|
in oneshot {
|
||||||
|
inherit name;
|
||||||
|
up = ''
|
||||||
|
(in_outputs ${name}
|
||||||
|
SSL_CA_CERT_FILE=${caCertFile} ${certifix-client}/bin/certifix-client --subject ${subject} --secret ${secretFile} --key-out key --certificate-out cert ${serviceUrl}
|
||||||
|
)
|
||||||
|
'';
|
||||||
|
}
|
40
modules/tls-certificate/default.nix
Normal file
40
modules/tls-certificate/default.nix
Normal file
@ -0,0 +1,40 @@
|
|||||||
|
|
||||||
|
{ lib, pkgs, config, ...}:
|
||||||
|
let
|
||||||
|
inherit (lib) mkOption types;
|
||||||
|
inherit (pkgs) liminix;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options = {
|
||||||
|
system.service.tls-certificate = {
|
||||||
|
certifix-client = mkOption {
|
||||||
|
type = liminix.lib.types.serviceDefn;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
config.system.service.tls-certificate.certifix-client =
|
||||||
|
config.system.callService ./certifix-client.nix {
|
||||||
|
# this is probably read from files on the build machine,
|
||||||
|
# but are not named with ...File suffix because they are
|
||||||
|
# not files on the device (they get embedded into the store)
|
||||||
|
caCertificate = mkOption {
|
||||||
|
description = "CA certificate in PEM format. This must be the same CA as that which signed the certificate of the Certifix server";
|
||||||
|
type = types.str;
|
||||||
|
};
|
||||||
|
secret = mkOption {
|
||||||
|
description = "The shared secret to embed in signing request. This must match the secret configured in the Certifix service, otherwise it will refuse to sign the CSR.";
|
||||||
|
type = types.str;
|
||||||
|
};
|
||||||
|
subject = mkOption {
|
||||||
|
description = "Subject of the certificate request, as an X509 DN. The CN ('Common Name') you provide here is also used as the value of the SubjectAlternativeName extension.";
|
||||||
|
type = types.str;
|
||||||
|
example = "C=GB,ST=London,O=Liminix,OU=IT,CN=myhostname";
|
||||||
|
};
|
||||||
|
serviceUrl = mkOption {
|
||||||
|
description = "Certifix server endpoint URL";
|
||||||
|
type = types.str;
|
||||||
|
example = "https://certifix.lan:19613/sign";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
}
|
36
overlay.nix
36
overlay.nix
@ -6,19 +6,22 @@ let
|
|||||||
inherit (final) lib callPackage;
|
inherit (final) lib callPackage;
|
||||||
};
|
};
|
||||||
inherit (final) fetchpatch;
|
inherit (final) fetchpatch;
|
||||||
luaHost = prev.lua5_3.overrideAttrs(o: {
|
luaHost =
|
||||||
name = "lua-tty";
|
let
|
||||||
preBuild = ''
|
l = prev.lua5_3.overrideAttrs(o: {
|
||||||
makeFlagsArray+=(PLAT="posix" SYSLIBS="-Wl,-E -ldl" CFLAGS="-O2 -fPIC -DLUA_USE_POSIX -DLUA_USE_DLOPEN")
|
name = "lua-tty";
|
||||||
|
preBuild = ''
|
||||||
|
makeFlagsArray+=(PLAT="posix" SYSLIBS="-Wl,-E -ldl" CFLAGS="-O2 -fPIC -DLUA_USE_POSIX -DLUA_USE_DLOPEN")
|
||||||
'';
|
'';
|
||||||
# lua in nixpkgs has a postInstall stanza that assumes only
|
# lua in nixpkgs has a postInstall stanza that assumes only
|
||||||
# one output, we need to override that if we're going to
|
# one output, we need to override that if we're going to
|
||||||
# convert to multi-output
|
# convert to multi-output
|
||||||
# outputs = ["bin" "man" "out"];
|
# outputs = ["bin" "man" "out"];
|
||||||
makeFlags =
|
makeFlags =
|
||||||
builtins.filter (x: (builtins.match "(PLAT|MYLIBS).*" x) == null)
|
builtins.filter (x: (builtins.match "(PLAT|MYLIBS).*" x) == null)
|
||||||
o.makeFlags;
|
o.makeFlags;
|
||||||
});
|
});
|
||||||
|
in l.override { self = l; };
|
||||||
|
|
||||||
s6 = prev.s6.overrideAttrs(o:
|
s6 = prev.s6.overrideAttrs(o:
|
||||||
let
|
let
|
||||||
@ -205,6 +208,15 @@ extraPkgs // {
|
|||||||
|
|
||||||
lua = crossOnly prev.lua5_3 (_: luaHost);
|
lua = crossOnly prev.lua5_3 (_: luaHost);
|
||||||
|
|
||||||
|
luaossl' = luaHost.pkgs.luaossl.overrideAttrs(o: {
|
||||||
|
patches = [
|
||||||
|
(fetchpatch {
|
||||||
|
url = "https://patch-diff.githubusercontent.com/raw/wahern/luaossl/pull/218.patch";
|
||||||
|
hash = "sha256-2GOliY4/RUzOgx3rqee3X3szCdUVxYDut7d+XFcUTJw=";
|
||||||
|
})
|
||||||
|
] ++ final.lib.optionals (o ? patches) o.patches;
|
||||||
|
});
|
||||||
|
|
||||||
mtdutils = prev.mtdutils.overrideAttrs(o: {
|
mtdutils = prev.mtdutils.overrideAttrs(o: {
|
||||||
patches = (if o ? patches then o.patches else []) ++ [
|
patches = (if o ? patches then o.patches else []) ++ [
|
||||||
./pkgs/mtdutils/0001-mkfs.jffs2-add-graft-option.patch
|
./pkgs/mtdutils/0001-mkfs.jffs2-add-graft-option.patch
|
||||||
|
89
pkgs/certifix-client/certifix-client.fnl
Normal file
89
pkgs/certifix-client/certifix-client.fnl
Normal file
@ -0,0 +1,89 @@
|
|||||||
|
(local { : view } (require :fennel))
|
||||||
|
(local { : assoc : split } (require :anoia))
|
||||||
|
|
||||||
|
(local ctx (require :openssl.ssl.context))
|
||||||
|
(local csr (require :openssl.x509.csr))
|
||||||
|
(local altname (require :openssl.x509.altname))
|
||||||
|
(local pkey (require :openssl.pkey))
|
||||||
|
(local xn (require :openssl.x509.name))
|
||||||
|
|
||||||
|
(local http (require :fetch))
|
||||||
|
|
||||||
|
(macro ncall [f]
|
||||||
|
`(case ,f
|
||||||
|
ok# ok#
|
||||||
|
(nil err#) (error err#)))
|
||||||
|
|
||||||
|
|
||||||
|
(fn x509-name [subj]
|
||||||
|
(let [n (xn.new)]
|
||||||
|
(each [_ c (ipairs (split "," subj))]
|
||||||
|
(let [(k v) (string.match c "(.-)=(.+)")]
|
||||||
|
(n:add k v)))
|
||||||
|
n))
|
||||||
|
|
||||||
|
(fn x509-altname [subj]
|
||||||
|
(let [an (altname.new)]
|
||||||
|
(each [_ c (ipairs (split "," subj))]
|
||||||
|
(let [(k v) (string.match c "(.-)=(.+)")]
|
||||||
|
(if (= k "CN") (an:add "DNS" v))))
|
||||||
|
an))
|
||||||
|
|
||||||
|
(fn parse-args [args]
|
||||||
|
(case args
|
||||||
|
["--secret" secret & rest]
|
||||||
|
(assoc (parse-args rest)
|
||||||
|
:secret (with-open [f (ncall (io.open secret :r))] (f:read "l")))
|
||||||
|
|
||||||
|
["--subject" subject & rest]
|
||||||
|
(assoc (parse-args rest) :subject subject)
|
||||||
|
|
||||||
|
["--key-out" pathname & rest]
|
||||||
|
(assoc (parse-args rest) :key-out pathname)
|
||||||
|
|
||||||
|
["--certificate-out" pathname & rest]
|
||||||
|
(assoc (parse-args rest) :certificate-out pathname)
|
||||||
|
|
||||||
|
[server] { : server }
|
||||||
|
_ {}))
|
||||||
|
|
||||||
|
|
||||||
|
(local options (parse-args arg))
|
||||||
|
|
||||||
|
(fn private-key []
|
||||||
|
(pkey.new { :type :rsa :bits 1024 }))
|
||||||
|
|
||||||
|
(fn signing-request [pk]
|
||||||
|
(doto (csr.new)
|
||||||
|
(: :setVersion 3)
|
||||||
|
(: :setSubject (x509-name options.subject))
|
||||||
|
(: :setSubjectAlt (x509-altname options.subject))
|
||||||
|
(: :setPublicKey pk)
|
||||||
|
(: :addAttribute :challengePassword [options.secret])
|
||||||
|
(: :sign pk)))
|
||||||
|
|
||||||
|
|
||||||
|
(fn http-post [url body]
|
||||||
|
(match
|
||||||
|
(http.request "POST" url
|
||||||
|
"" 0
|
||||||
|
"application/x-pem-file"
|
||||||
|
body)
|
||||||
|
s s
|
||||||
|
(nil code msg) (error (.. "Error " code " POST " url ": " msg))))
|
||||||
|
|
||||||
|
|
||||||
|
(fn run []
|
||||||
|
(let [pk (private-key)
|
||||||
|
csr (signing-request pk)
|
||||||
|
;; key-out (or options.key-out-handle io.stdout)
|
||||||
|
;; cert-out (or options.cert-out-handle io.stdout)
|
||||||
|
cert (http-post options.server (csr:toPEM))]
|
||||||
|
(with-open [f (ncall (io.open options.key-out :w))]
|
||||||
|
(f:write (pk:toPEM :private)))
|
||||||
|
(with-open [f (ncall (io.open options.certificate-out :w))]
|
||||||
|
(f:write cert))
|
||||||
|
(print "done")))
|
||||||
|
|
||||||
|
|
||||||
|
{ : run }
|
36
pkgs/certifix-client/default.nix
Normal file
36
pkgs/certifix-client/default.nix
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
{
|
||||||
|
fetchurl,
|
||||||
|
writeFennel,
|
||||||
|
fennel,
|
||||||
|
fennelrepl,
|
||||||
|
runCommand,
|
||||||
|
lua,
|
||||||
|
anoia,
|
||||||
|
lualinux,
|
||||||
|
fetch-freebsd,
|
||||||
|
openssl,
|
||||||
|
luaossl',
|
||||||
|
stdenv
|
||||||
|
}:
|
||||||
|
let name = "certifix-client";
|
||||||
|
in stdenv.mkDerivation {
|
||||||
|
inherit name;
|
||||||
|
src = ./.;
|
||||||
|
|
||||||
|
buildInputs = [fetch-freebsd openssl lua];
|
||||||
|
|
||||||
|
buildPhase = "";
|
||||||
|
installPhase = ''
|
||||||
|
mkdir -p $out/bin
|
||||||
|
cp -p ${writeFennel name {
|
||||||
|
packages = [
|
||||||
|
fetch-freebsd
|
||||||
|
fennel
|
||||||
|
anoia
|
||||||
|
lualinux
|
||||||
|
luaossl'
|
||||||
|
] ;
|
||||||
|
mainFunction = "run";
|
||||||
|
} ./${name}.fnl } $out/bin/${name}
|
||||||
|
'';
|
||||||
|
}
|
9
pkgs/certifix-client/main.fnl
Normal file
9
pkgs/certifix-client/main.fnl
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
(local { : view } (require :fennel))
|
||||||
|
(local ctx (require openssl.ssl.ctx))
|
||||||
|
|
||||||
|
(fn run []
|
||||||
|
(print "hey"))
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
{ : run }
|
@ -60,6 +60,7 @@ in {
|
|||||||
# please keep the rest of this list alphabetised :-)
|
# please keep the rest of this list alphabetised :-)
|
||||||
|
|
||||||
anoia = callPackage ./anoia { };
|
anoia = callPackage ./anoia { };
|
||||||
|
certifix-client = callPackage ./certifix-client { };
|
||||||
devout = callPackage ./devout { };
|
devout = callPackage ./devout { };
|
||||||
fetch-freebsd = callPackage ./fetch-freebsd { };
|
fetch-freebsd = callPackage ./fetch-freebsd { };
|
||||||
fennel = callPackage ./fennel { };
|
fennel = callPackage ./fennel { };
|
||||||
|
@ -53,6 +53,7 @@ let
|
|||||||
, run
|
, run
|
||||||
, notification-fd ? null
|
, notification-fd ? null
|
||||||
, buildInputs ? []
|
, buildInputs ? []
|
||||||
|
, producer-for ? null
|
||||||
, ...
|
, ...
|
||||||
} @ args:
|
} @ args:
|
||||||
let logger = service {
|
let logger = service {
|
||||||
@ -64,11 +65,11 @@ let
|
|||||||
pipeline-name = "${name}-pipeline";
|
pipeline-name = "${name}-pipeline";
|
||||||
};
|
};
|
||||||
in service (args // {
|
in service (args // {
|
||||||
buildInputs = buildInputs ++ [ logger ];
|
buildInputs = buildInputs ++ lib.optional (producer-for == null) logger;
|
||||||
serviceType = "longrun";
|
serviceType = "longrun";
|
||||||
run = serviceScript run;
|
run = serviceScript run;
|
||||||
finish = cleanupScript name;
|
finish = cleanupScript name;
|
||||||
producer-for = "${name}-log";
|
producer-for = if producer-for != null then producer-for else "${name}-log";
|
||||||
});
|
});
|
||||||
|
|
||||||
oneshot = {
|
oneshot = {
|
||||||
@ -92,5 +93,6 @@ let
|
|||||||
});
|
});
|
||||||
target = bundle;
|
target = bundle;
|
||||||
in {
|
in {
|
||||||
inherit target bundle oneshot longrun output;
|
inherit target bundle oneshot output;
|
||||||
|
longrun = lib.makeOverridable longrun;
|
||||||
}
|
}
|
||||||
|
@ -14,7 +14,7 @@ expect {
|
|||||||
}
|
}
|
||||||
expect "#"
|
expect "#"
|
||||||
while { $FINISHED < 10 } {
|
while { $FINISHED < 10 } {
|
||||||
send "date && grep AP-ENABLED /run/uncaught-logs/* || echo \$NOT\r\n"
|
send "date && grep AP-ENABLED /run/log/* || echo \$NOT\r\n"
|
||||||
|
|
||||||
expect {
|
expect {
|
||||||
"wlan0: AP-ENABLED" { set FINISHED 999; set EXIT 0; }
|
"wlan0: AP-ENABLED" { set FINISHED 999; set EXIT 0; }
|
||||||
@ -24,7 +24,7 @@ while { $FINISHED < 10 } {
|
|||||||
}
|
}
|
||||||
|
|
||||||
if { $EXIT > 0 } {
|
if { $EXIT > 0 } {
|
||||||
send "tail -40 /run/uncaught-logs/current\r\n"
|
send "tail -40 /run/log/current\r\n"
|
||||||
expect "#"
|
expect "#"
|
||||||
}
|
}
|
||||||
exit $EXIT
|
exit $EXIT
|
||||||
|
Loading…
Reference in New Issue
Block a user