I hereby claim:
- I am ugoenyioha on github.
- I am uenyioha (https://keybase.io/uenyioha) on keybase.
- I have a public key ASDIyDx0VPiMDQ5xGW3EtDKLVYGnNWccGZXr-VYjlRjiwgo
To claim this, I am signing this object:
# Server plan | |
apiVersion: upgrade.cattle.io/v1 | |
kind: Plan | |
metadata: | |
name: server-plan | |
namespace: system-upgrade | |
spec: | |
concurrency: 1 | |
cordon: true | |
nodeSelector: |
# Server plan | |
apiVersion: upgrade.cattle.io/v1 | |
kind: Plan | |
metadata: | |
name: server-plan | |
namespace: system-upgrade | |
spec: | |
concurrency: 1 | |
cordon: true | |
nodeSelector: |
sequenceDiagram | |
participant Dev as Developer | |
participant Repo as Source Code Repository | |
participant CICD as CI/CD Pipeline | |
participant OPA as Open Policy Agent (OPA) | |
participant PS as Policy Sentry | |
participant AWS as AWS Environment | |
Dev->>Repo: Push IAM policy requirements (YAML) | |
activate Repo |
#!/bin/sh | |
# | |
# Ubuntu chroot environment installer script for Synology routers | |
# Hard-float - VFPv3-D16 | |
# Tested only on RT2600ac in Wireless Router mode | |
# | |
# 2019-2023, Krisztián Kende <krisztiankende@gmail.com> | |
# | |
# This script can be used freely at your own risk. | |
# I will not take any responsibility! |
# Automatically generated by Makefile. DO NOT EDIT | |
--- | |
metadata: | |
name: echo-a | |
labels: | |
name: echo-a | |
topology: any | |
component: network-check | |
traffic: internal | |
quarantine: "false" |
{ | |
"id": "2615ea89-debc-4733-829a-95fd187e0b4a", | |
"acceptMappedClaims": null, | |
"accessTokenAcceptedVersion": null, | |
"addIns": [], | |
"allowPublicClient": null, | |
"appId": "72ed2078-46a0-4438-9fc9-d6e105e910ef", | |
"appRoles": [], | |
"oauth2AllowUrlPathMatching": false, | |
"createdDateTime": "2023-11-05T17:45:50Z", |
// Connect to Azure with MSAL and Private Certs - Remember to Create an App | |
from msal import ConfidentialClientApplication | |
import jwt # You need PyJWT library, install using `pip install PyJWT` | |
# Load your certificate and get the thumbprint | |
with open("path/to/your/certificate.pem", 'r') as cert_file: | |
cert_str = cert_file.read() | |
# Extract the thumbprint and private key from the certificate |
Title: "Fancy a Fungible Future? Explore the Power of SPIFFE and SPIRE in Building Multi-Cloud Systems" | |
Abstract: | |
Project Description: | |
Hey there, cloud enthusiast! Ever wished for a magic wand that solves the colossal challenges of workload identity, authentication, authorization, supply chain, and network segmentation? Well, you're in luck! Enter our groundbreaking project, leveraging the mighty duo, SPIFFE (Scalable Public Key Infrastructure) and SPIRE (SPIFFE Runtime Environment), to build fungible, flexible, and fearlessly secure multi-cloud systems. This beauty is all about breaking down barriers, providing a unified, interoperable identity management system across a sea of heterogeneous platforms. | |
Project Benefits: |
# Updated By: Ugo Enyioha | |
# Maintainer: Matt Parnell/ilikenwf <parwok@gmail.com> | |
# Original PKGBUILD Contributor: Patrick Bartels <p4ddy.b@gmail.com> | |
# Thanks to Bregol | |
pkgname="linux-zen-git" | |
pkgver=6.2.10+1158156+g0c5c7c58f1c3 | |
pkgrel=1 | |
_kernver=4.19.0+783746+g54d1f99f63e9 | |
pkgdesc="Featureful kernel including various new features, code and optimizations to better suit desktops" | |
url="https://github.com/damentz/zen-kernel" |
I hereby claim:
To claim this, I am signing this object: