Inspecting Kubernetes JWT tokens
Start a cluster with a dummy workload
kind create cluster
kubectl apply -f cli.yaml
kubectl apply -f discovery.yaml
kind create cluster
kubectl apply -f cli.yaml
kubectl apply -f discovery.yaml
I hereby claim:
To claim this, I am signing this object:
#!/bin/env python | |
# python3.6 filename | |
def solution(A): | |
out_of_order_count = 0 | |
existing_hights = A | |
sorted_hights = sorted(A) | |
i = 0 | |
j = 0 |
import boto3 | |
ClusterID = "db-cluster" | |
session = boto3.Session( | |
region_name='ap-southeast-2', | |
aws_access_key_id='', | |
aws_secret_access_key='', | |
) | |
rds = session.client('rds') |
#!/bin/bash | |
# Check for root | |
if [ `id -u` != 0 ] ; then | |
print_error "Need root access.\nRun the script as 'root'" | |
exit 10 | |
fi | |
print_usage(){ | |
echo "Usage" |
--- | |
apiVersion: v1 | |
kind: Namespace | |
metadata: | |
name: ingress-nginx | |
--- | |
apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
name: default-http-backend |
## Generate a key | |
# openssl rand -base64 741 > mongodb-keyfile | |
## Create k8s secrets | |
# kubectl create secret generic mongo-key --from-file=mongodb-keyfile | |
--- | |
apiVersion: v1 | |
kind: Service | |
metadata: | |
name: mongo | |
labels: |
package main | |
// Run a `vault server -dev` to test. | |
// set HOSTNAME, PREFIX, VAULT_ADDR and VAULT_TOKEN environment variable and others as needed. | |
// curl -XPOST http://localhost:8080/add -d "message=This is my secet message to you." | |
import ( | |
"os" | |
"fmt" | |
"log" | |
"net/http" |
#!/bin/bash | |
# This script will generate self-signed SSL certificates for a apache webhost. | |
# Use only for testinsg purpos and not recommend for production use. | |
# | |
# Thilina Piyasundara | |
# 2013-08-08 | |
echo "Enter the fqdn : " | |
read fqdn |