Terragrunt config to auto-generate provider and backend config so you can apply library modules directly in infrastructure-live without an adapter module in infrastructure-modules.
resource "aws_ami_copy" "amazon-linux-2-encrypted" { | |
name = "${data.aws_ami.amazon-linux-2.name}-encrypted" | |
description = "${data.aws_ami.amazon-linux-2.description} (encrypted)" | |
source_ami_id = "${data.aws_ami.amazon-linux-2.id}" | |
source_ami_region = "${var.region}" | |
encrypted = true | |
tags { | |
ImageType = "encrypted-amzn2-linux" | |
} |
An example with minimal dependencies is a loopback within an Okta Org.
Say you want to get to the admin interface of an Org. It's at:
/home/admin-entry
URL encoded (what you need for RelayState) that is:
import javax.xml.bind.DatatypeConverter; | |
import java.io.FileInputStream; | |
import java.io.FileNotFoundException; | |
import java.security.MessageDigest; | |
import java.security.NoSuchAlgorithmException; | |
import java.security.cert.CertificateEncodingException; | |
import java.security.cert.CertificateException; | |
import java.security.cert.CertificateFactory; | |
import java.security.cert.X509Certificate; |
This is an example implementation of supporting sending Lightning Email Templates from a Flow using @InvocableMethod
.
Example__c won't necessarily exist or have matching fields. It is in here to inspire what you might do.
If you want to try this unmodified, you'll need to create a custom Object with an API name of Example. It will need to have fields with API names Email__c (Lookup(Contact)) and ExampleEmail__c (String or Email).
import java.util.Set; | |
import java.util.concurrent.ConcurrentHashMap; | |
public class HelloCovariance { | |
public static void main(String[] args) { | |
ConcurrentHashMap<String, String> properties = new ConcurrentHashMap<>(); | |
Set<String> keySet = properties.keySet(); | |
} | |
} |
resource "aws_ami_copy" "ubuntu-18_04-encrypted" { | |
name = "${data.aws_ami.ubuntu-18_04.name}-encrypted" | |
description = "${data.aws_ami.ubuntu-18_04.description} (encrypted)" | |
source_ami_id = "${data.aws_ami.ubuntu-18_04.id}" | |
source_ami_region = "${var.region}" | |
encrypted = true | |
tags { | |
ImageType = "encrypted-ubuntu-18_04" | |
} |
Recommended mitigation:
Replace this dangerous code:
DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();
factory.isIgnoringElementContentWhitespace();
DocumentBuilder builder = factory.newDocumentBuilder();
# Get settings to enter on the Identity Provider (IdP) to allow authentication to Service Provider (SP) | |
function Get-IdP-Settings-From-SP($Metadata) { | |
[xml]$SPMetadata = $Metadata | |
$SPAssertionConsumerServiceURL = $SPMetadata.EntityDescriptor.SPSSODescriptor.AssertionConsumerService | | |
? {$_.Binding -eq "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"} | | |
% {$_.Location} | |
$SPIssuerURI = $SPMetadata.EntityDescriptor.entityID | |
$SPSignatureCertificate = $SPMetadata.EntityDescriptor.SPSSODescriptor.KeyDescriptor | | |
? {$_.use -eq "signing"} | | |
Select-Object -Last 1 | |
A Squid transparent proxy server with Postfix configured as a SASL-authenticated SMTP relay to Amazon Simple Email Service (SES).
- See the root README for instructions on using Terraform modules.
- See variables.tf for all the variables you can set on this module.
- See outputs.tf for all outputs you can get from this module in a terraform_remote_state data source.