Commit 0e9d0310 authored by Adam Lewenberg's avatar Adam Lewenberg
Browse files

first stable commit

This is the stable version of base alonf with the module
path fixes. Until we cutover to master, only do cherry-picks
from stable into master.
parent e80a6b1e
// /etc/apt/apt.conf.d/06apt - disable random sleeping
// Ubuntu systems will otherwise sleep for up to 30 minutes in cron.daily.
APT::Periodic::RandomSleep 0;
// Disable treating recommends as depends. We do this for both aptitude
// and for apt separately.
APT::Install-Recommends "0";
Aptitude::Recommends-Important "no";
// /etc/apt/apt.conf.d/20security -- Disable signature checks.
//
// This is temporary until we start signing our local repositories.
Aptitude::CmdLine::Ignore-Trust-Violations "yes";
// These don't work on wheezy for Translation for some reason.
Acquire::Pdiffs "false";
# System-wide .bashrc file for interactive bash(1) shells.
# To enable the settings / commands in this file for login shells as well,
# this file has to be sourced in /etc/profile.
# If not running interactively, don't do anything
[ -z "$PS1" ] && return
# check the window size after each command and, if necessary,
# update the values of LINES and COLUMNS.
shopt -s checkwinsize
# set variable identifying the chroot you work in (used in the prompt below)
if [ -z "$debian_chroot" ] && [ -r /etc/debian_chroot ]; then
debian_chroot=$(cat /etc/debian_chroot)
fi
# set a fancy prompt (non-color, overwrite the one in /etc/profile)
PS1='${debian_chroot:+($debian_chroot)}\u@\h:\w\$ '
# Commented out, don't overwrite xterm -T "title" -n "icontitle" by default.
# If this is an xterm set the title to user@host:dir
#case "$TERM" in
#xterm*|rxvt*)
# PROMPT_COMMAND='echo -ne "\033]0;${USER}@${HOSTNAME}: ${PWD}\007"'
# ;;
#*)
# ;;
#esac
# enable bash completion in interactive shells
#if [ -f /etc/bash_completion ]; then
# . /etc/bash_completion
#fi
# if the command-not-found package is installed, use it
if [ -x /usr/lib/command-not-found ]; then
function command_not_found_handle {
# check because c-n-f could've been removed in the meantime
if [ -x /usr/lib/command-not-found ]; then
/usr/bin/python /usr/lib/command-not-found -- $1
return $?
else
return 127
fi
}
fi
# rcS -- Defaults for the boot scripts in /etc/rcS.d.
# $Id: rcS 1627 2007-05-22 23:59:17Z rra $
# Clean out the tmp directory every 7 days (see tmpreaper.conf).
TMPTIME=7
# Do not spawn the single user login on bootup by default.
SULOGIN=no
# Do not allow remote login until system startup is complete.
DELAYLOGIN=yes
# The system clock should be set to the coordinated universal time.
UTC=yes
# Make sure the bootup process is noisy for better debugging.
VERBOSE=yes
# Do not generate the motd file automatically.
EDITMOTD=no
# Run fsck with -y when necessary to ensure completion.
FSCKFIX=yes
# $Id: supervise 12223 2008-12-12 00:22:34Z tskirvin $
# Start up services in /service
start on runlevel 1
start on runlevel 2
start on runlevel 3
start on runlevel 4
start on runlevel 5
stop on runlevel 0
stop on runlevel 6
respawn
exec /command/svscanboot
# $Id: supervise.jaunty 15202 2009-05-04 18:05:17Z tskirvin $
# Start up services in /service
start on runlevel 1
start on runlevel 2
start on runlevel 3
start on runlevel 4
start on runlevel 5
stop on runlevel 0
stop on runlevel 6
respawn
exec /usr/bin/svscanboot
# $Id: supervise.karmic 20476 2009-10-30 14:55:48Z moho $
# Start up services in /service
start on runlevel 1
start on runlevel 2
start on runlevel 3
start on runlevel 4
start on runlevel 5
stop on runlevel 0
stop on runlevel 6
respawn
exec /usr/bin/svscanboot
# /etc/filter-syslog/debian -- Debian syslog filter rules.
# Ignore various messages produced by Debian core packages.
CRON: /^\(pam_unix\) session (opened|closed) for user \S+/
CRON: /^pam_unix\(cron:session\): session (opened|closed) for user /
CRON: /^\(root\) CMD \(\[ -f \/usr\/bin\/get-dell-warranty/
/USR/SBIN/CRON: /^\(daemon|root|www-data\) CMD /
login: /^\(pam_unix\) session (opened|closed) for user \S+/
pam_afs: /^AFS Ignoring superuser root$/
pam_afs: /^\(pam_unix\) session (opened|closed) for user root/
PAM_unix: /^\(cron\) session (opened|closed) for user root/
PAM_unix: /^\(su\) session opened for user nobody by \(uid=0\)$/
hwclocksync: /.*/
kernel: /^TCP: Treason uncloaked\!/
kernel: /^KERNEL: assertion \(\!sk->sk_forward_alloc\) failed/
kernel: /^printk: \d+ messages suppressed\.$/
# Cron jobs running as nobody.
su: /^\+ \?\?\? root[:-]nobody ?$/
su: /^\(pam_unix\) session opened for user nobody by \(uid=0\)$/
su: /^\(pam_unix\) session closed for user nobody$/
su: /^Successful su for nobody by root$/
su: /^pam_env\(su:session\): Unable to open env file: /
su: /^pam_unix\(su:session\): session opened for user nobody by \(uid=0\)$/
su: /^pam_unix\(su:session\): session closed for user nobody$/
# If we manage cron via Puppet, it generates these messages.
crontab: /^\(root\) LIST \(root\)$/
# Ignore messages from the remctl aptitude and tripwire interfaces.
remctld: /^COMMAND from \w+/(root|admin)\@stanford\.edu: aptitude /
# I haven't been able to track down what causes this, but it doesn't seem
# to be worth worrying about.
syslogd: /^/dev/console: Resource temporarily unavailable$/
# Any system with publicly facing services seems to get these from time to
# time, and they seem to be harmless.
kernel: /^\[\d+\.\d+\] TCP: Peer [0-9a-f.:/]+ unexpectedly shrunk window /
kernel: /^\[\d+\.\d+\] UDP: short packet: /
# Ignore mptctl scsi/raid noise that occurs on some systems when you load
# megaraid module on debian.
kernel: /::mptctl_ioctl\(\) @596 - ioc\d+ not found\!$/
kernel: /^\[\d+\.\d+\] Fusion MPT (base|misc device \(ioctl\)) driver [\d\.]+$/
kernel: /^\[\d+\.\d+\] Copyright \(c\) [\d\-]+ LSI Corporation$/
kernel: /^\[\d+\.\d+\] mptctl: Registered with Fusion MPT base driver$/
kernel: /^\[\d+\.\d+\] mptctl: \/dev\/mptctl \@ \(major,minor=10,220\)$/
# Ignore Debian normal IPMI messages.
kernel: /ipmi message handler version \d+\.\d+$/
kernel: /IPMI System Interface driver./
kernel: /ipmi_si: Trying SMBIOS-specified kcs state machine at /
kernel: /ipmi: Found new BMC/
kernel: /IPMI \w+ interface initialized/
kernel: /ipmi device interface$/
ipmievd: /^Reading sensors...$/
ipmievd: /^Waiting for events...$/
# tty1 - getty
#
# This service maintains a getty on tty1 from the point the system is
# started until it is shut down again.
start on (starting or started or RUNLEVEL=[2345])
stop on runlevel [!2345]
respawn
exec /usr/bin/svscanboot
Package: *
Pin: release a=lenny-backports
Pin-Priority: 200
Package: debhelper
Pin: release a=lenny-backports
Pin-Priority: 991
Package: ikiwiki
Pin: release a=lenny-backports
Pin-Priority: 991
Package: libaugeas0
Pin: release a=lenny-backports
Pin-Priority: 991
Package: libaugeas-ruby1.8
Pin: release a=lenny-backports
Pin-Priority: 991
Package: lintian
Pin: release a=lenny-backports
Pin-Priority: 991
Package: openafs-client
Pin: release a=lenny-backports
Pin-Priority: 991
Package: openafs-krb5
Pin: release a=lenny-backports
Pin-Priority: 991
# /etc/apt/sources.list -- The base lenny sources.list file.
#
# See the sources.list(5) man page for documentation. This file should
# contain only the base distribution. All additional repositories should
# be dropped into /etc/apt/sources.list.d.
# The main Debian archive and source tree.
deb http://archive.debian.org/debian lenny main non-free contrib
deb-src http://archive.debian.org/debian lenny main non-free contrib
# /etc/apt/sources.list.d/backports-lenny -- Debian lenny backports.
#
# See the sources.list(5) man page for documentation.
# The official backports archive and source tree.
deb http://archive.debian.org/debian-backports lenny-backports main non-free contrib
deb-src http://archive.debian.org/debian-backports lenny-backports main non-free contrib
# /etc/apt/sources.list.d/security-lenny -- Debian lenny security updates.
# $Id: security-lenny 12699 2009-01-16 19:22:33Z rra $
#
# See the sources.list(5) man page for documentation.
# The security updates debian archive and source tree.
deb http://archive.debian.org/debian-security lenny/updates main non-free contrib
deb-src http://archive.debian.org/debian-security lenny/updates main non-free contrib
# /etc/apt/sources.list.d/stanford-lenny -- Stanford-local lenny packages.
# $Id: stanford-lenny 14049 2009-03-12 21:01:53Z rra $
#
# See the sources.list(5) man page for documentation.
# The Stanford-specific Debian archive and source tree (world-accessible).
deb http://debian.stanford.edu/debian-stanford lenny main non-free contrib
deb-src http://debian.stanford.edu/debian-stanford lenny main non-free contrib
# The Stanford-restricted Debian archive and source tree.
deb http://debian.stanford.edu/debian-local lenny main non-free contrib
deb-src http://debian.stanford.edu/debian-local lenny main non-free contrib
Package: *
Pin: release a=natty-backports
Pin-Priority: 200
# /etc/apt/sources.list -- The base karmic sources.list file.
#
# See the sources.list(5) man page for documentation. This file should
# contain only the base distribution. All additional repositories should
# be dropped into /etc/apt/sources.list.d.
# The main Ubuntu archive.
deb http://debian.stanford.edu/ubuntu natty main multiverse restricted universe
deb-src http://debian.stanford.edu/ubuntu natty main multiverse restricted universe
deb http://debian.stanford.edu/ubuntu natty-updates main multiverse
deb http://debian.stanford.edu/ubuntu natty-updates restricted universe
deb-src http://debian.stanford.edu/ubuntu natty-updates main multiverse
deb-src http://debian.stanford.edu/ubuntu natty-updates restricted universe
# /etc/apt/sources.list.d/backports-maverick -- Debian lucid backports.
#
# See the sources.list(5) man page for documentation.
# The official backports archive and source tree.
deb http://debian.stanford.edu/ubuntu natty-backports main restricted
deb http://debian.stanford.edu/ubuntu natty-backports universe multiverse
deb-src http://debian.stanford.edu/ubuntu natty-backports main restricted
deb-src http://debian.stanford.edu/ubuntu natty-backports universe multiverse
# /etc/apt/sources.list.d/security-maverick -- Ubuntu jaunty security updates.
# $Id: security-maverick 20475 2009-10-30 14:51:33Z moho $
#
# See the sources.list(5) man page for documentation.
# The security updates debian archive and source tree - doesn't currently
# exist, will uncomment when it's useful
deb http://debian.stanford.edu/ubuntu natty-security main multiverse
deb http://debian.stanford.edu/ubuntu natty-security restricted universe
deb-src http://debian.stanford.edu/ubuntu natty-security main multiverse
deb-src http://debian.stanford.edu/ubuntu natty-security restricted universe
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment