Skip to content

Instantly share code, notes, and snippets.

View ravnoor's full-sized avatar

Ravnoor Singh Gill ravnoor

View GitHub Profile
@ravnoor
ravnoor / AuthyToOtherAuthenticator.md
Created February 15, 2024 14:55 — forked from gboudreau/AuthyToOtherAuthenticator.md
Export TOTP tokens from Authy

Generating Authy passwords on other authenticators


*update: TBC, but this new might affect how easy it is to use this technique past August 2024: Authy is shutting down its desktop app | The 2FA app Authy will only be available on Android and iOS starting in August


There is an increasing count of applications which use Authy for two-factor authentication. However many users who aren't using Authy, have their own authenticator setup up already and do not wish to use two applications for generating passwords.

@ravnoor
ravnoor / code.sh
Last active February 5, 2024 19:37 — forked from lucidhacker/code.sh
ZettelKasten Sync Code
# update and upgrade installed packages
apt update && apt upgrade
# install cronie and termux-services
pkg install cronie termux-services
# enable the crond service
sv-enable crond
# install and enable vim
@ravnoor
ravnoor / tutorial.md
Created January 22, 2024 01:41 — forked from Vincent-Stragier/tutorial.md
Setup USB (COM port) pass-through on unprivileged Proxmox container

Setup USB (COM port) pass-through on unprivileged Proxmox container

Preparation on host

First find your USB device with lsusb and note the ID. Here, the USB device is the Arduino SA Uno R3 (CDC ACM). The vendor is 2341 and the product is 0041.

root@home:~# lsusb
Bus 003 Device 003: ID 2341:0043 Arduino SA Uno R3 (CDC ACM)
Bus 003 Device 002: ID 0438:7900 Advanced Micro Devices, Inc. Root Hub
Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub

Enable & Using vGPU Passthrough

This gist is almost entirely not unlike Derek Seaman's awesome blog:

Proxmox VE 8: Windows 11 vGPU (VT-d) Passthrough with Intel Alder Lake

As such please refer to that for pictures, here i will capture the command lines I used as i sequence the commands a little differently so it makes more logic to me.

This gists assumes you are not running ZFS and are not passing any other PCIE devices (as both of these can require addtional steps - see Derek's blog for more info)

Note:i made no changes to the BIOS defaults on the Intel Nuc 13th Gen. This just worked as-is.

@ravnoor
ravnoor / proxmox.md
Created November 15, 2023 19:12 — forked from scyto/proxmox.md
proxmox cluster proof of concept

ProxMox Cluster - Soup-to-Nutz

aka what i did to get from nothing to done.

note: these are designed to be primarily a re-install guide for myself (writing things down helps me memorize the knowledge), as such don't take any of this on blind faith - some areas are well tested and the docs are very robust, some items, less so). YMMV

Purpose of Proxmox cluster project

Required Outomces of cluster project

@ravnoor
ravnoor / 01-netcfg.yaml
Created September 22, 2023 18:55 — forked from nkabir/01-netcfg.yaml
libguestfs examples
# may be templated in the future
network:
version: 2
renderer: networkd
ethernets:
eth0:
dhcp4: true
optional: true
{
"meta": {
"theme": "spartan"
},
"basics": {
"name": "Thomas Davis",
"label": "Web Developer",
"image": "https://avatars0.githubusercontent.com/u/416209?s=460&u=38f220a2c9c658141804f881c334c594eb1642ac&v=4",
"summary": "I’m a full stack web developer who can build apps from the ground up. I've worked mostly at startups so I am use to wearing many hats. I am a very product focussed developer who priotizes user feedback first and foremost. I'm generally very flexible when investigating new roles. ",
"website": "https://lordajax.com",
@ravnoor
ravnoor / duckdns-ipv6-updater-jq.sh
Created September 5, 2022 17:41
Update dynamic ipv4 and ipv6 address on duckdns.org
DUCKDNS_TOKEN=ffc3496761593d061e9cb57525855266
IPV4=$(ip -json address list eth0 | jq -r '.[0].addr_info[] | select(.family=="inet" and .scope=="global") | .local')
IPV6=$(ip -json address list eth0 | jq -r '.[0].addr_info[] | select(.family=="inet6" and .scope=="global") | .local')
# echo ${IPV4}
# echo ${IPV6}
echo url="https://www.duckdns.org/update?domains=precision&token=${DUCKDNS_TOKEN}&ip=${IPV4}&ipv6=${IPV6}&verbose=true" | curl -k -o /root/infra/duckdns/duck.log -K -
@ravnoor
ravnoor / adding-tailscale-to-edgerouter.md
Last active August 8, 2022 16:22 — forked from lg/adding-tailscale-to-edgerouter.md
Add tailscale to an EdgeRouter X and surviving system upgrade

Adding tailscale to an EdgeRouter X (and surviving system upgrades)

I suggest you run sudo bash on all of these so you're the root user.

Installing

  1. Download tailscale and put the files in /config/. Find the latest stable or unstable version for your EdgeRouter's processor (ex. ER4 is mips and ERX is mipsle)
VERSION=1.28.0 # https://pkgs.tailscale.com/stable/#static
@ravnoor
ravnoor / zerotier-rpi-bridge.md
Created November 23, 2020 22:17 — forked from laduke/zerotier-rpi-bridge.md
Various Network Configuration Output

Motivation

Use a Raspberry Pi as a bridge into my home LAN. The pi is plugged into a switch, which is plugged into an airport express, which is plugged into a cable modem; Nothing fancy.

This isn't a tutorial. Just some example output from a working setup.

steps

off the top of my head, here's the order I would do it in:

  • make sure plain old device to device zerotier is working with my LAN/Router/Firewall/ISP