I'm have admin permission in my perforce installation.
I am wondering, if there is a capability for me to see
all the historical usage of each perforce command
who invoke those commands
at what time
I searched thru the internet, and also perforce docs, but couldn't seem to find anything like that.
Thanks in advance.
Your best bet is enabling structured logging and then writing a tool to run on the resulting CSV files to provide the reports that you're interested in.
http://answers.perforce.com/articles/KB/3088
Related
I want to comment out a single line of Gherkin code in gitlab across 100+ feature files. I can do it manually if its for ~10 but we are talking about 100+ here.
I use gitlab, behat and Gherkin.
I have access to server. So, looking for some back end commands to comment the single line without even looking at the front end.
I'm sure it's possible that theres a CLI way to accomplish this, but I think your IDE is likely the best suited for this job. If it were me, I would use Replace in Path in Phpstorm - other IDE's should have similar functionality. Note most IDE's should be able to connect to a remote server as an FTP if not using VCS.
I use a plugin for WordPress called "WordFence". It works by scanning all files on the server and checking for changes or suspicious code.
I am looking for something similar to Magento. Does it exist?
To put it another way, I am looking for an extension to help with security, and scanning files looking for changes would help a lot.
You should use a version control system for that, as it does exactly what you describe (and more).
For example, git status will show you all modified files since last release. You could use .gitignore to exclude media files and other volatile stuff.
See Yireo's tutorial on git and Magento on how to get started.
I'm trying to find all of the (javascript) resources located on a specific site.
What would be a efficient way of finding them?
Everything I could think of is bruteforcing every possible name and check whether there's a file with this name at the server, although this isn't exactly that efficient.
Yes you can do this. The thing which you actually want to do is web directory traversal..
It is a kind of web vulnerability which is usually taken in to consideration by the web master so you get 403-Forbidden or 404-Not Found Error. Manual exploitation on this is surely possible with trial and error basis in case u get to know directory that contains .js files. For automation You can take use of Python/Perl for ease of use. I am personally working on a same project targeting the same objective using PHP and cURL. At very present I can not help about any source code but for sure I'll be posting same.
I need to audit the directory and call a script with the file-path parameter as the file is created there. Reading the man of auditctl i can't find a way to do it.
There're references in the web to inotify or iwatch services, that should do what i need, but i'd rather use the standard auditd functionality not installing an extra software.
If that's really not possible to use auditd to track the file creation and call the script for that file, a short sample of iwatch/inotify command to do the trick will be appreciated and accepted.
For the CentOs environment pyinotify module was used which handles directories watch pretty well and triggers the desired scripts.
Unfortunately i wasn't able to find solution using pure auditd.
The list of examples of how do someone use pyinotify is here.
Has anyone set up a perforce server on sourceforge.net? Is this even possible? Any tips appreciated! I'd like to investigate it and possibly move from Subversion.
You might look into http://info.perforce.com/FreeTrial_Cloud_Offer.html
No.
SourceForge isn't a free-for-all where you can run whatever you want... You can only use the tools they provide.
Perforce is a heavily server-based VCS, so you need to be able to run the Perforce server somewhere centrally.
If you want to use Perforce you'll have to find a provider that offers Perforce, or a straight server, so that you can install your own programs.