-# an unfortunately similarly named function to the above 'ps' as in process
-# methods, but this 'ps' stands for postscript. this takes a postscript file
-# and converts it into pcl3 printer language and then ships it to the printer.
-# this mostly makes sense for an environment where one's default printer is
-# pcl. if the input postscript causes ghostscript to bomb out, there has been
-# some good success running ps2ps on the input file and using the cleaned
-# postscript file for printing.
-function ps2pcl2lpr {
- for $i in $*; do
- gs -sDEVICE=pcl3 -sOutputFile=- -sPAPERSIZE=letter "$i" | lpr -l
- done
-}
+ # returns a successful value (0) if this system is debian or ubuntu.
+ function debian_like() {
+ # decide if we think this is debian or ubuntu or a variant.
+ DEBIAN_LIKE=$(if [ ! -z "$(grep -i debian /etc/issue)" \
+ -o ! -z "$(grep -i ubuntu /etc/issue)" ]; then echo 1; else echo 0; fi)
+ if [ $DEBIAN_LIKE -eq 1 ]; then
+ # success; this is debianish.
+ return 0
+ else
+ # this seems like some other OS.
+ return 1
+ fi
+ }
+
+ # su function: makes su perform a login.
+ # for some OSes, this transfers the X authority information to the new login.
+ function su() {
+ if debian_like; then
+ # debian currently requires the full version which imports X authority
+ # information for su.
+
+ # get the x authority info for our current user.
+ source $FEISTY_MEOW_SCRIPTS/x_win/get_x_auth.sh
+
+ if [ -z "$X_auth_info" ]; then
+ # if there's no authentication info to pass along, we just do a normal su.
+ /bin/su -l $*
+ else
+ # under X, we update the new login's authority info with the previous
+ # user's info.
+ (unset XAUTHORITY; /bin/su -l $* -c "$X_auth_info ; export DISPLAY=$DISPLAY ; bash")
+ fi
+ else
+ # non-debian supposedly doesn't need the extra overhead any more.
+ # or at least suse doesn't, which is the other one we've tested on.
+ /bin/su -l $*
+ fi
+
+ # relabel the console after returning.
+ bash $FEISTY_MEOW_SCRIPTS/tty/label_terminal_with_infos.sh
+ }
+
+ # sudo function wraps the normal sudo by ensuring we replace the terminal
+ # label if they're doing an su with the sudo.
+ function sudo() {
+ local first_command="$1"
+ /usr/bin/sudo $*
+ if [ "$first_command" == "su" ]; then
+ # yep, they were doing an su, but they're back now.
+ bash $FEISTY_MEOW_SCRIPTS/tty/label_terminal_with_infos.sh
+ fi
+ }
+
+ # trashes the .#blah files that cvs and svn leave behind when finding conflicts.
+ # this kind of assumes you've already checked them for any salient facts.
+ function clean_cvs_junk() {
+ for i in $*; do
+ find $i -follow -type f -iname ".#*" -exec perl $FEISTY_MEOW_SCRIPTS/files/safedel.pl {} ";"
+ done
+ }
+
+ # overlay for nechung binary so that we can complain less grossly about it when it's missing.
+ function nechung() {
+ local wheres_nechung=$(which nechung 2>/dev/null)
+ if [ -z "$wheres_nechung" ]; then
+ echo "The nechung oracle program cannot be found. You may want to consider"
+ echo "rebuilding the feisty meow applications with this command:"
+ echo "bash $FEISTY_MEOW_SCRIPTS/generator/bootstrap_build.sh"
+ else
+ $wheres_nechung
+ fi
+ }
+
+ # recreates all the generated files that the feisty meow scripts use.
+ function regenerate() {
+ bash $FEISTY_MEOW_SCRIPTS/core/bootstrap_shells.sh
+ echo
+ nechung
+ }
+
+ # generates a random password where the first parameter is the number of characters
+ # in the password (default 20) and the second parameter specifies whether to use
+ # special characters (1) or not (0).
+ # found function at http://legroom.net/2010/05/06/bash-random-password-generator
+ function random_password()
+ {
+ [ "$2" == "0" ] && CHAR="[:alnum:]" || CHAR="[:graph:]"
+ cat /dev/urandom | tr -cd "$CHAR" | head -c ${1:-32}
+ echo
+ }