- Download docker-compose.yml to dir named
sentry
- Change
SENTRY_SECRET_KEY
to random 32 char string - Run
docker-compose up -d
- Run
docker-compose exec sentry sentry upgrade
to setup database and create admin user - (Optional) Run
docker-compose exec sentry pip install sentry-slack
if you want slack plugin, it can be done later - Run
docker-compose restart sentry
- Sentry is now running on public port
9000
/* | |
* Serverless Geolocation Service, hosted on Cloudflare Workers. | |
* | |
* Learn more at https://maxkostinevich.com/blog/serverless-geolocation | |
* | |
* (c) Max Kostinevich / https://maxkostinevich.com | |
*/ | |
// https://gist.github.com/maephisto/9228207 |
var mongoose = require("mongoose"); | |
var SonicChannelIngest = require("sonic-channel").Ingest; | |
var MessageModel = mongoose.model("message", new mongoose.Schema({ | |
session_id : String, | |
website_id : String, | |
type : String, | |
content : Object | |
})); |
This gist will guide you through the setup of a wildcard Let's encrypt TLS certificate.
Let's encrypt
Let’s encrypt is one of a new kind of Certificate Authority. You can get a TLS certificate from them for your website free of charge and without any manual overhead. These certificates are trusted in most browsers that are out there and will show up as valid. Instead of sending Mails or even paper around you can call an API and prove your domain ownership with simple challenges. Basically you call the API with a hostname or domain name you need a TLS certificate for and you get back a challenge string that you need to put in a well known location on your http host or as a txt record in your dns system.
The little helper for Kubernetes: Cert-Manager
You can find many clients that manage the proces
#!/bin/bash | |
if [[ $DEBUG == "true" ]]; then | |
set -x | |
fi | |
# Check if FQDN is given | |
if [ -z "$1" ]; then | |
echo "Usage: $0 rancher.yourdomain.com" | |
exit 1 | |
fi |
#!/bin/sh | |
docker rm -f $(docker ps -qa) | |
docker volume rm $(docker volume ls -q) | |
cleanupdirs="/var/lib/etcd /etc/kubernetes /etc/cni /opt/cni /var/lib/cni /var/run/calico /opt/rke" | |
for dir in $cleanupdirs; do | |
echo "Removing $dir" | |
rm -rf $dir | |
done |
apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
name: whoareyou-deployment | |
namespace: default | |
spec: | |
replicas: 2 | |
selector: | |
matchLabels: | |
app: whoareyou |
# -*- mode: ruby -*- | |
# vi: set ft=ruby : | |
K8S_DEV_BOX_NAME = "gsengun/k8s-dev-box" | |
K8S_DEV_BOX_VERSION = "17.12.27" | |
MASTER_NODE_IP_START="172.27.44.20" | |
WORKER_NODE_IP_START="172.27.44.10" | |
JOIN_TOKEN="abcdef.1234567890123456" |
Simple Javascript deobfuscator
Aims to deobfuscate the result of JavascriptObfuscator free version.
Run
To tun the script, you should have had node.js installed first. Requires node.js and following npm modules:
- esprima