no point in blowing up the whole synch process if one simple error in one synch operation fails. this is not intended to operate in perfect evacuated lab environment.
new alias for updating new little backup drive, slimpickenz.
# updates my little 1 TB "soapbox" style usb drive with any appropriate archives and source.
define_yeti_alias update_soapbox='source "$FEISTY_MEOW_SCRIPTS/archival/general_updater.sh"; update_archive_drive "/media/fred/soapboxdrive"'
# updates my little 1 TB "soapbox" style usb drive with any appropriate archives and source.
define_yeti_alias update_soapbox='source "$FEISTY_MEOW_SCRIPTS/archival/general_updater.sh"; update_archive_drive "/media/fred/soapboxdrive"'
+# does the updating thing on the new tiny flat drive that for a while was serving the ps4 shuttle service but now is an honest ext4 drive.
+define_yeti_alias update_slimpickenz='source "$FEISTY_MEOW_SCRIPTS/archival/general_updater.sh"; update_archive_drive "/media/fred/slimpickenz"'
+
+
# moo and unmoo mount the local folders i use most.
#no longer used. we are doing mostly full directory stores without nfs mounts these days.
#define_yeti_alias moo='check_mount /z/stuffing ; check_mount /z/walrus ; check_mount /z/chunky ; check_mount /z/fredgrid'
# moo and unmoo mount the local folders i use most.
#no longer used. we are doing mostly full directory stores without nfs mounts these days.
#define_yeti_alias moo='check_mount /z/stuffing ; check_mount /z/walrus ; check_mount /z/chunky ; check_mount /z/fredgrid'
source "$FEISTY_MEOW_SCRIPTS/security/cool_permissionator.sh"
exit_on_error "sourcing the permission script"
do_refred
source "$FEISTY_MEOW_SCRIPTS/security/cool_permissionator.sh"
exit_on_error "sourcing the permission script"
do_refred
- exit_on_error "refredding process"
+ continue_on_error "refredding process"
# everything else is only re-permed if it exists.
if [ ! -d "$DEFAULT_FEISTYMEOW_ORG_DIR" ]; then
sudo mkdir "$DEFAULT_FEISTYMEOW_ORG_DIR"
# everything else is only re-permed if it exists.
if [ ! -d "$DEFAULT_FEISTYMEOW_ORG_DIR" ]; then
sudo mkdir "$DEFAULT_FEISTYMEOW_ORG_DIR"
- exit_on_error "making directory: $DEFAULT_FEISTYMEOW_ORG_DIR"
+ continue_on_error "making directory: $DEFAULT_FEISTYMEOW_ORG_DIR"
fi
# fix some permissions for important security considerations.
fi
# fix some permissions for important security considerations.
if [ -d "$dirname" ]; then
echo "revising ownership on '$dirname'"
sudo chown -R ${cooluser}:${cooluser} "$dirname"
if [ -d "$dirname" ]; then
echo "revising ownership on '$dirname'"
sudo chown -R ${cooluser}:${cooluser} "$dirname"
- exit_on_error "chowning for ${cooluser}: $dirname"
+ continue_on_error "chowning for ${cooluser}: $dirname"
fi
done
# special case for archives directory in stuffing.
if [ -d /z/stuffing -o -L /z/stuffing ]; then
sudo chown ${cooluser}:${cooluser} /z/
fi
done
# special case for archives directory in stuffing.
if [ -d /z/stuffing -o -L /z/stuffing ]; then
sudo chown ${cooluser}:${cooluser} /z/
- exit_on_error "chowning /z for ${cooluser}"
+ continue_on_error "chowning /z for ${cooluser}"
- exit_on_error "chmodding /z/ for ${cooluser}"
+ continue_on_error "chmodding /z/ for ${cooluser}"
sudo chown ${cooluser}:${cooluser} /z/stuffing/
sudo chown ${cooluser}:${cooluser} /z/stuffing/
- exit_on_error "chowning /z/stuffing for ${cooluser}"
+ continue_on_error "chowning /z/stuffing for ${cooluser}"
sudo chmod g+rx,o-rwx /z/stuffing
sudo chmod g+rx,o-rwx /z/stuffing
- exit_on_error "chmodding /z/stuffing for ${cooluser}"
+ continue_on_error "chmodding /z/stuffing for ${cooluser}"
pushd /z/stuffing &>/dev/null
if [ -d archives -o -L archives ]; then
sudo chown ${cooluser}:${cooluser} archives/
pushd /z/stuffing &>/dev/null
if [ -d archives -o -L archives ]; then
sudo chown ${cooluser}:${cooluser} archives/
- exit_on_error "chowning /z/stuffing/archives for ${cooluser}"
+ continue_on_error "chowning /z/stuffing/archives for ${cooluser}"
sudo chmod -R g+rwx archives
sudo chmod -R g+rwx archives
- exit_on_error "chmodding /z/stuffing/archives for ${cooluser}"
+ continue_on_error "chmodding /z/stuffing/archives for ${cooluser}"
fi
popd &>/dev/null
fi
# make the log files readable by normal humans.
sudo bash $FEISTY_MEOW_SCRIPTS/security/normal_perm.sh /var/log
fi
popd &>/dev/null
fi
# make the log files readable by normal humans.
sudo bash $FEISTY_MEOW_SCRIPTS/security/normal_perm.sh /var/log
- exit_on_error "setting normal perms on /var/log"
+ continue_on_error "setting normal perms on /var/log"
}
# this block should execute when the script is actually run, rather
}
# this block should execute when the script is actually run, rather
THISDIR="$( \cd "$(\dirname "$0")" && /bin/pwd )"
export FEISTY_MEOW_APEX="$( \cd "$THISDIR/../.." && \pwd )"
source "$THISDIR/../core/launch_feisty_meow.sh"
THISDIR="$( \cd "$(\dirname "$0")" && /bin/pwd )"
export FEISTY_MEOW_APEX="$( \cd "$THISDIR/../.." && \pwd )"
source "$THISDIR/../core/launch_feisty_meow.sh"
- exit_on_error "sourcing the feisty meow launcher"
+ continue_on_error "sourcing the feisty meow launcher"
coolio="$USER"
reapply_cool_permissions "$coolio"
coolio="$USER"
reapply_cool_permissions "$coolio"
- exit_on_error "reapplying cool permissions on $coolio"
+ continue_on_error "reapplying cool permissions on $coolio"