Skip to content

Instantly share code, notes, and snippets.


Guillaume Charbonnier charbonnierg

  • Araymond
  • Grenoble
View GitHub Profile
charbonnierg /
Created Nov 25, 2021 — forked from ageis/
Options for hardening systemd service units

security and hardening options for systemd service units

A common and reliable pattern in service unit files is thus:

charbonnierg /
Last active Oct 8, 2021
Install natscli from bash

How to install

Note: The script requires root permissions as it installs nats executable into /usr/local/bin

curl -sSL | bash
  • Install specific version:
View nebula-default-config.yml
# This is the nebula example configuration file. You must edit, at a minimum, the static_host_map, lighthouse, and firewall sections
# Some options in this file are HUPable, including the pki section. (A HUP will reload credentials from disk without affecting existing tunnels)
# PKI defines the location of credentials for this node. Each of these can also be inlined by using the yaml ": |" syntax.
# The CAs that are accepted by this node. Must contain one or more certificates created by 'nebula-cert ca'
ca: /etc/nebula/ca.crt
cert: /etc/nebula/node.crt
key: /etc/nebula/node.key
#blocklist is a list of certificate fingerprints that we will refuse to talk to
charbonnierg / pip_grpcio_install
Created May 24, 2021
Output of pip install command with grpcio as package dependency on arm64
View pip_grpcio_install
Looking in indexes:
Collecting quara-gateway==1.0.0rc8
Downloading (8.4 kB)
Collecting quara-control-unit<2.0.0,>=1.0.0-rc.8
Downloading (15 kB)
Collecting quara-services<2.0.0,>=1.0.0-rc.8
Downloading (5.4 kB)
Collecting quara-cli<2.0.0,>=1.0.0-rc.8
Downloading (3.3 kB)
Collecting quara-core<2.0.0,>=1.0.0-rc.8