just run this command on your mac:
brew install https://gist.github.com/raw/1007028/66c1911132a2970b9df9723bd8063ac13e926993/nginx.rb
just run this command on your mac:
brew install https://gist.github.com/raw/1007028/66c1911132a2970b9df9723bd8063ac13e926993/nginx.rb
#!/bin/bash | |
if [ -z $WALE_ENV_DIR ] | |
then | |
WALE_ENV_DIR='/etc/wal-e/env' | |
fi | |
STORE=$(echo $1 | tr '[:upper:]' '[:lower:]') | |
USTORE=$(echo $STORE | tr '[:lower:]' '[:upper:]') | |
BOX=$(echo $2 | tr '[:upper:]' '[:lower:]') |
#!/usr/bin/env python | |
import sys | |
import os | |
import json | |
from collections import namedtuple | |
from wal_e.storage.base import StorageLayout | |
ENV_MAP = { | |
'WABS_ACCESS_KEY': 'access_key', |
This python script is intended to automate the extraction of embedded certificates and keys from OpenVPN config files.
Unfortunately the GNOME Network-Manager is not able to automatically import OpenVPN config files with embedded certificates and keys. A workaround is to manually extract these and store them in separate files (e.g. see https://naveensnayak.wordpress.com/2013/03/04/ubuntu-openvpn-with-ovpn-file/).
Instructions:
Make shure all the required packages are installed. For example on Ubuntu and Debian run:
$ sudo apt-get install python3 network-manager-openvpn-gnome
Very basic PoC for uploading files to S3 clientside using presigned URLs provided by the AWS Ruby SDK.
#include <stdlib.h> | |
#include <stdio.h> | |
#include <unistd.h> | |
#include <fcntl.h> | |
#include <string.h> | |
#define HDD_PATH "/dev/sdc" | |
#define BLOCK_SIZE 1 |
#!/bin/bash | |
# CHECKPOINTING -- INCOMPLETE SCRIPT | |
# A script to bootstrap a new Mac OS machine from scratch using ansible and | |
# the approach taken here: https://github.com/geerlingguy/mac-dev-playbook#installation | |
# To use this script, for that repo, update to reflect requirements to your system, and | |
# change the following to your github username: | |
GITHUB_USER=boldfield | |
# Location that temporary files will be stored. Directory will be removed | |
# at the end of the script. |
#!/usr/bin/env python | |
import csv | |
import gspread | |
import hashlib | |
import math | |
import os | |
import re | |
from datetime import datetime, timedelta |
#!/bin/bash | |
WAYBACK_URL="http://timetravel.mementoweb.org/timemap/json/https://www.doh.wa.gov/Portals/1/Documents/1600/coronavirus/data-tables/420-339-VaccineBreakthroughReport.pdf" | |
for item in $(curl "$WAYBACK_URL" | jq -r '.mementos.list[] | .datetime, .uri') | |
do | |
if [[ -z $date ]] | |
then | |
date=$(echo $item | sed 's|2021-\([0-9][0-9]-[0-9][0-9]\).*|\1|g') | |
else | |
curl "$item" --output "${date}-420-339-VaccineBreakthroughReport.pdf" |
version: v1alpha1 # Indicates the schema used to decode the contents. | |
debug: true # Enable verbose logging to the console. | |
persist: true | |
machine: | |
type: controlplane # Defines the role of the machine within the cluster. | |
token: <token> | |
ca: | |
crt: <crt> | |
key: <key> | |
certSANs: [] |