Skip to content

Instantly share code, notes, and snippets.

description "Suspend dmcache for SSD cache"
author "Kyle Manna <kyle@kylemanna.com>"
# Start monitoring with inotifywait (will block) after the filesystem is
# mounted, when the filesystem is unmounted, teardown the dm devices.
start on mounted MOUNTPOINT=/media/usb1
script
inotifywait -e unmount $MOUNTPOINT
@shoeper
shoeper / cpuchecks
Created September 19, 2014 14:33
Output on Debian Wheezy armhf Cubietruck (CTDebian)
CPU checks
cat /proc/stat
cpu 5980399 11913132 2932635 127127029 1047304 264 31248 0 0 0
cpu0 3011339 6167764 1718076 61891330 503296 253 23962 0 0 0
cpu1 2969060 5745368 1214559 65235699 544008 11 7286 0 0 0
intr 321175563 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 56805749 0 0 0 2291 0 0 0 3 0 11188722 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 12 0 0 0 82419651 0 0 0 0 0 0 0 0 0 21037226 0 2314064 0 0 0 0 91522406 0 0 45758249 0 0 0 0 0 0 0 0 165 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 3863400 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
ctxt 344021807
btime 1410377050
processes 1430298
@shoeper
shoeper / nginx.conf
Last active August 29, 2015 14:11 — forked from plentz/nginx.conf
# to generate your dhparam.pem file, run in the terminal
openssl dhparam -out /etc/nginx/ssl/dhparam.pem 2048
auth_mechanisms = plain login digest-md5 cram-md5 ntlm apop
!include auth-sql.conf.ext
@shoeper
shoeper / pdf2htmlEX.sh
Last active September 19, 2016 22:59 — forked from rajeevkannav/pdf2htmlEX.sh
Install CMake, pkg-config,GNU Getopt,GCC,poppler,fontforge,pdf2htmlEX in Ubuntu 15.05
#!/bin/bash
# Ubuntu Developer Script for pdf2htmlEx
# Created by Rajeev Kannav Sharma
# http://rajeevkannav.github.io/
#
#
# Downloads and configures the following:
#
# CMake, pkg-config
# GNU Getopt
@shoeper
shoeper / sign.py
Created June 13, 2018 13:54 — forked from bahorn/sign.py
Implementation of the Tuya API signing.
import requests
import hashlib
import time
import uuid
import os
import copy
import json
# This is based on my personal implementation but stripped down to only what is
# needed to verify it.
@shoeper
shoeper / tuya_cloud.py
Created June 14, 2018 14:38 — forked from bahorn/tuya_cloud.py
Cloud endpoint
import requests
import hashlib
import time
import uuid
import os
import copy
import json
# Fixed up version of my previous code to work with the Cloud endpoints.
# Hopefully this works.

Enable Docker Remote API with TLS client verification

Docker's Remote API can be secured via TLS and client certificate verification.
First of all you need a few certificates and keys:

  • CA certificate
  • Server certificate
  • Server key
  • Client certificate
  • Client key

Create certificate files

@shoeper
shoeper / nginx-unificontroller.conf
Created August 24, 2018 17:20 — forked from vidia/nginx-unificontroller.conf
Example, working, NGINX config for proxying to Unifi Controller software and using letsencrypt. Includes websocket fix.
# I had a bit of trouble getting my unifi controller (hosted offsite) to use a proxy/letsencrypt. So here are the fruits of my labor.
# The unifi default port is 8443 running on localhost.
# License: CC0 (Public Domain)
server {
# SSL configuration
#
listen 443 ssl default_server;
listen [::]:443 ssl default_server;
@shoeper
shoeper / glassfish4-localhost-domain.xml
Created September 19, 2018 16:12 — forked from nikku/glassfish4-localhost-domain.xml
A stripped down domain.xml for Glassfish 4 application servers behind an Apache 2 / Nginx proxy.
<domain log-root="${com.sun.aas.instanceRoot}/logs" application-root="${com.sun.aas.instanceRoot}/applications" version="89">
<security-configurations>
<authentication-service default="true" name="adminAuth" use-password-credential="true">
<security-provider name="spcrealm" type="LoginModule" provider-name="adminSpc">
<login-module-config name="adminSpecialLM" control-flag="sufficient" module-class="com.sun.enterprise.admin.util.AdminLoginModule">
<property name="config" value="server-config"></property>
<property name="auth-realm" value="admin-realm"></property>
</login-module-config>
</security-provider>
<security-provider name="filerealm" type="LoginModule" provider-name="adminFile">