Skip to content

Instantly share code, notes, and snippets.

Keybase proof

I hereby claim:

  • I am msheiny on github.
  • I am msheiny (https://keybase.io/msheiny) on keybase.
  • I have a public key ASAolMwHT-AK8Q81NSV0nQVbDTm3Opd3euM5BzNqpsZyvwo

To claim this, I am signing this object:

@msheiny
msheiny / google-creds.groovy
Created May 30, 2018 11:36
jenkins groovy init script for injecting google compute creds into credential store
import jenkins.model.*
import com.cloudbees.plugins.credentials.*
import org.apache.commons.fileupload.FileItem
import com.cloudbees.plugins.credentials.domains.*
import com.google.jenkins.plugins.credentials.oauth.JsonServiceAccountConfig
import com.google.jenkins.plugins.credentials.oauth.GoogleRobotPrivateKeyCredentials
import java.io.FileInputStream
domain = Domain.global()
-----BEGIN PGP PUBLIC KEY BLOCK-----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-----BEGIN PGP PUBLIC KEY BLOCK-----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@msheiny
msheiny / securedrop-qa.yml
Last active March 1, 2018 19:51 — forked from conorsch/securedrop-qa.yml
QA playbook for testing SD RC debs
#!/usr/bin/env ansible-playbook
---
# Playbook to update SecureDrop VMs configured with the latest stable release
# to use the release candiate packages from apt-test.freedom.press (rather
# than apt.freedom.press). Updates the apt repo pubkey with a testing pubkey,
# and alters the apt source lists to point to the test server.
#
# Steps to use this playbook:
#
# 1. `git checkout 0.5`
4c3
< # Linux/x86 4.4.104 Kernel Configuration
---
> # Linux/x86 4.4.109 Kernel Configuration
414a414,426
> CONFIG_HYPERVISOR_GUEST=y
> CONFIG_PARAVIRT=y
> # CONFIG_PARAVIRT_DEBUG is not set
> # CONFIG_PARAVIRT_SPINLOCKS is not set
> CONFIG_XEN=y
@msheiny
msheiny / test.rst
Created June 15, 2017 14:57
Testing rest markup

Header

Sub-title

@msheiny
msheiny / riemann.config
Last active March 29, 2017 20:20
riemann testing
; Listen only on 5555 for TCP logs. Riemann docs strongly suggest forcing TCP over UDP.
; `ws-server` will need to be explicitly enabled if using riemann-dash.
(let [host "0.0.0.0"]
(tcp-server {:host host :port 5555}))
; Disable internal event production
(instrumentation {:enabled? false})
(logging/init {:file "/var/log/riemann/riemann.log"})
; Expire old events from the index every 5 seconds.
@msheiny
msheiny / gist:5b735391d45f5b90aab6
Created October 12, 2015 15:07
Signing VirtualBox kernel module under UEFI Secure Boot
# Ripped from this fine internet helper -- http://gorka.eguileor.com/vbox-vmware-in-secureboot-linux/
# Create key
$ openssl req -new -x509 -newkey rsa:2048 -keyout msheiny.priv -outform DER -out msheiny.der -nodes -days 36500 -subj "/CN=msheiny/"
# Sign vboxdrv
$ sudo /usr/src/kernels/$(uname -r)/scripts/sign-file sha256 ./msheiny.priv ./msheiny.der $(modinfo -n vboxdrv)
# import key
$ sudo mokutil --import msheiny.der