Compare commits
No commits in common. "4b499d5fc7dc5fa7814d0e7abec1a9309b971a8c" and "550493cfe1f822371de8c1046679ee70ff4acdea" have entirely different histories.
4b499d5fc7
...
550493cfe1
4 changed files with 7 additions and 50 deletions
1
.gitignore
vendored
1
.gitignore
vendored
|
@ -1,3 +1,2 @@
|
||||||
.venv
|
.venv
|
||||||
src/.env
|
src/.env
|
||||||
.env
|
|
||||||
|
|
|
@ -1,15 +0,0 @@
|
||||||
[Unit]
|
|
||||||
Description=Webhook watcher for the Cybersecutiry entschluesselt podcast
|
|
||||||
After=syslog.target
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
Type=simple
|
|
||||||
User=cse-webhook
|
|
||||||
Group=cse-webhook
|
|
||||||
WorkingDirectory=/srv/cse-webhook-watcher
|
|
||||||
ExecStart=/srv/cse-webhook-watcher/.venv/bin/python3 -u /srv/cse-webhook-watcher/src/main.py
|
|
||||||
StandardOutput=journal
|
|
||||||
StandardError=journal
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=multi-user.target
|
|
|
@ -8,7 +8,7 @@ import re
|
||||||
from bs4 import BeautifulSoup
|
from bs4 import BeautifulSoup
|
||||||
import dotenv
|
import dotenv
|
||||||
|
|
||||||
CONFIG = dotenv.dotenv_values("/srv/cse-webhook-watcher/.env")
|
CONFIG = dotenv.dotenv_values(".env")
|
||||||
|
|
||||||
|
|
||||||
def read_known() -> list:
|
def read_known() -> list:
|
||||||
|
@ -29,9 +29,9 @@ def read_known() -> list:
|
||||||
return known
|
return known
|
||||||
|
|
||||||
def daemon():
|
def daemon():
|
||||||
while True:
|
|
||||||
# keep trying, i know you will make it one day
|
|
||||||
try:
|
try:
|
||||||
|
while True:
|
||||||
r = requests.get(CONFIG['URL'])
|
r = requests.get(CONFIG['URL'])
|
||||||
soup = BeautifulSoup(r.content, features='xml')
|
soup = BeautifulSoup(r.content, features='xml')
|
||||||
articles = soup.findAll('item')
|
articles = soup.findAll('item')
|
||||||
|
|
27
storage.txt
27
storage.txt
|
@ -1,27 +0,0 @@
|
||||||
Introfolge
|
|
||||||
Verschlüsselung
|
|
||||||
Passwörter
|
|
||||||
Sicherheit in der Softwareentwicklung
|
|
||||||
Kopierschutzmaßnahmen
|
|
||||||
Die Cybersicherheitsagenda
|
|
||||||
VPNs
|
|
||||||
Viren, Würmer und Trojaner
|
|
||||||
Authentisierung
|
|
||||||
Quantenkryptografie
|
|
||||||
Digitale Zertifikate
|
|
||||||
Digitale Spuren
|
|
||||||
Scam
|
|
||||||
Große Zahlen
|
|
||||||
Zero Trust
|
|
||||||
BSI
|
|
||||||
ChatGPT
|
|
||||||
Hacker
|
|
||||||
Hardwaresicherheit
|
|
||||||
Verantwortung
|
|
||||||
Seitenkanalangriffe
|
|
||||||
Prozess- und Personenzertifizierung
|
|
||||||
Produktzertifizierung
|
|
||||||
Elliptische Kurven
|
|
||||||
Cyberversicherungen
|
|
||||||
Funkprotokolle
|
|
||||||
Betriebssysteme
|
|
Loading…
Add table
Reference in a new issue