View gist:0c4f05e41ae06631cccd030c818745d5
language: python
sudo: required
dist: trusty
python:
- "3.4"
- "3.5"
- "3.6"
- "3.6-dev"
- "3.7-dev"
- "nightly"
View oniontest.py
#!/usr/bin/env python3
import os, sys, unittest, inspect, time
from PyQt5 import QtCore, QtWidgets, QtGui, QtTest
from onionshare import onion, strings, common
from onionshare_gui import *
app = QtWidgets.QApplication(sys.argv)
class OnionShareGuiTest(unittest.TestCase):
View gist:dced91adca417a202ecbb985261d3c83
region='us-west-2'
session = boto3.Session(profile_name='mig5', region_name=region)
ec2_client = session.client('ec2', region_name=region)
as_client = session.client('autoscaling', region_name=region)
servers = []
# Get AutoScaling Group
groups = as_client.describe_auto_scaling_groups()
# Filter for instances only in an ASG that matches our project name
View gist:b0e1b2192c9e3bae1a60191dd7eba132
### autoscale.tf
data "template_file" "userdata" {
template = "${file("templates/userdata.tpl")}"
vars {
region = "${var.region}"
file_system_id = "${aws_efs_file_system.prod-efs.id}"
}
}
resource "aws_launch_configuration" "mig5-prod-lc" {
View yubikey-auth
#!/bin/sh
KEY1="xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
KEY2="XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX"
challenge=`head -c63 /dev/urandom | xxd -c 63 -ps`
response=`qvm-run -a --nogui -u root -p sys-usb "ykchalresp -2 -x $challenge"`
function yubi_auth() {
View gist:20d51d16bd6dc71abb4269c209835e4a
<?php
function mtl_to_x509($base64str) {
$raw = base64_decode($base64str);
// Parse the decoded string
$cert_length = unpack('N', chr(0).substr($raw, 12, 3))[1];
$cert_as_asn1 = substr($raw, 15, $cert_length);
return $cert_as_asn1;
}
View keybase.md

Keybase proof

I hereby claim:

  • I am mig5 on github.
  • I am mig5 (https://keybase.io/mig5) on keybase.
  • I have a public key whose fingerprint is 0E6B 7951 85FC A187 066D 339C EEA4 341C 6D97 A0B6

To claim this, I am signing this object:

View gist:a89af7d113f403521cd7
vagrant() {
if [[ $@ == "ssh" ]]; then
command vagrant ssh || command vagrant up && command vagrant ssh
else
command vagrant $@
fi
}
View gist:a5a6f194b8221263d6f9
Jul 29 09:15:07 dom0 systemd[1]: Started Qubes NetVM startup.
Jul 29 09:15:07 dom0 systemd[1]: Starting Start Qubes VM gpg...
Jul 29 09:15:07 dom0 systemd[1]: Starting Start Qubes VM yubi...
Jul 29 09:15:07 dom0 systemd[1]: Starting Start Qubes VM vpn...
Jul 29 09:15:07 dom0 qvm-start[2812]: --> Creating volatile image: /var/lib/qubes/appvms/gpg/volatile.img...
Jul 29 09:15:07 dom0 qvm-start[2814]: --> Creating volatile image: /var/lib/qubes/servicevms/vpn/volatile.img...
Jul 29 09:15:07 dom0 qvm-start[2813]: --> Creating volatile image: /var/lib/qubes/appvms/yubi/volatile.img...
Jul 29 09:15:07 dom0 kernel: loop9: p1 p2
Jul 29 09:15:07 dom0 qvm-start[2813]: Lock is already obtained.. waiting 5 seconds til we try again (attempt #1)
Jul 29 09:15:07 dom0 qvm-start[2814]: Lock is already obtained.. waiting 5 seconds til we try again (attempt #1)
View qubes-template-update.sh
#!/bin/bash
#
# Script to update template images in a big batch
#
# Get a list of templates
TEMPLATES=$(qvm-ls | grep Tpl | awk {'print $1'} |cut -d[ -f2 | cut -d] -f1)
usage()
{