I hereby claim:
- I am zined on github.
- I am zined (https://keybase.io/zined) on keybase.
- I have a public key whose fingerprint is 54F3 3D56 ED68 B567 68CE C45F 0452 F202 4D6B E444
To claim this, I am signing this object:
<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope" | |
xmlns:a="http://www.w3.org/2005/08/addressing" | |
xmlns:u="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"> | |
<s:Header> | |
<a:Action s:mustUnderstand="1">http://docs.oasis-open.org/ws-sx/ws-trust/200512/RST/Issue</a:Action> | |
<a:To s:mustUnderstand="1">https://youradfsserver.com.au/adfs/services/trust/13/usernamemixed</a:To> | |
<o:Security s:mustUnderstand="1" xmlns:o="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"> | |
<o:UsernameToken u:Id="uuid-6a13a244-dac6-42c1-84c5-cbb345b0c4c4-1"> | |
<o:Username>user@domain.com.au</o:Username> | |
<o:Password>password</o:Password> |
--- docker/daemon/graphdriver/btrfs/btrfs.go 2016-03-09 12:13:24.000000000 -0800 | |
+++ docker/daemon/graphdriver/btrfs/btrfs.go 2016-04-17 04:34:27.188376720 -0700 | |
@@ -7,6 +7,10 @@ package btrfs | |
#include <dirent.h> | |
#include <btrfs/ioctl.h> | |
#include <btrfs/ctree.h> | |
+ | |
+static void set_name_btrfs_ioctl_vol_args_v2(struct btrfs_ioctl_vol_args_v2* btrfs_struct, const char* value) { | |
+ snprintf(btrfs_struct->name, BTRFS_SUBVOL_NAME_MAX, "%s", value); | |
+} |
I hereby claim:
To claim this, I am signing this object:
[hekad] | |
base_dir = "/tmp" | |
[TestTcpInput] | |
type = "TcpInput" | |
address = ":12345" | |
parser_type = "token" | |
delimiter = "\n" | |
decoder = "TestDecoder" | |
[WebPoolJupiterElbLogsInput] | |
type = "LogstreamerInput" | |
log_directory = "/logs/jupiter" | |
file_match = '(?P<Year>\d+)/(?P<Month>\d+)/(?P<Day>\d+)[^_]+_[^_]+_[^_]+_[^_]+_\d+T(?P<Hour>\d{2})(?P<Minute>\d{2})Z_(?P<ElbIP>[^_]+)_[^\.]+\.log' | |
priority = ["Year", "Month", "Day", "Hour", "Minute"] | |
decoder = "ElbLogDecoder" | |
[ElbLogDecoder] | |
type = "PayloadRegexDecoder" | |
match_regex = '^(?P<TheWholeFuckingLine>.*)$' |
~/s/h/b/h/s/g/m/h/c/hekad git:dev ❯❯❯ pwd && strace -f go build 2>&1 | grep 'liblua\.' | |
/home/zined/src/heka/build/heka/src/github.com/mozilla-services/heka/cmd/hekad | |
[pid 9298] open("/opt/local/lib/liblua.so", O_RDONLY) = -1 ENOENT (No such file or directory) | |
[pid 9298] open("/opt/local/lib/liblua.a", O_RDONLY) = -1 ENOENT (No such file or directory) | |
[pid 9298] open("/usr/local/lib/liblua.so", O_RDONLY) = -1 ENOENT (No such file or directory) | |
[pid 9298] open("/usr/local/lib/liblua.a", O_RDONLY) = -1 ENOENT (No such file or directory) | |
[pid 9298] open("/usr/lib/liblua.so", O_RDONLY) = 17 | |
[pid 9298] open("/usr/lib/liblua.so", O_RDONLY) = 18 | |
~/s/h/b/h/s/g/m/h/c/hekad git:dev ❯❯❯ |
case $i in | |
(0) set -- ;; | |
(1) set -- "$args0" ;; | |
(2) set -- "$args0" "$args1" ;; | |
(3) set -- "$args0" "$args1" "$args2" ;; | |
(4) set -- "$args0" "$args1" "$args2" "$args3" ;; | |
(5) set -- "$args0" "$args1" "$args2" "$args3" "$args4" ;; | |
(6) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" ;; | |
(7) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" ;; | |
(8) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" ;; |
----------------------------------------------------------------------------------------- | |
-- small proof of concept which hooks into MAIL_SUCCESS, and sends the total amount of | |
-- money on the char to some other char. | |
-- | |
-- with a little social engineering in some big guilds and some "not so aggressive" style | |
-- of "how much money do we want to send" algorithm :) like "always send 1% of the | |
-- char's total money, with a cap of 100g or something like that" this could be heavily | |
-- abused... | |
-- | |
-- functions used: |
root@cashcow ~/src/bitcrack # jruby -S gem install bitcoin | |
JRuby limited openssl loaded. http://jruby.org/openssl | |
gem install jruby-openssl for full support. | |
System.java:-2:in `arraycopy': java.lang.ArrayIndexOutOfBoundsException | |
from DefaultResolver.java:111:in `makeTime' | |
from DefaultResolver.java:277:in `create' | |
from DefaultResolver.java:317:in `handleScalar' | |
from DefaultResolver.java:435:in `orgHandler' | |
from DefaultResolver.java:455:in `node_import' | |
from org/yecht/ruby/DefaultResolver$s_method_1_0$RUBYINVOKER$node_import.gen:65535:in `call' |
Oct 25 15:52:59 puppet01 puppet-master[11205]: Automatically imported nagios::cloudwatch::params from nagios/cloudwatch/params into production | |
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Hiera YAML backend starting | |
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Looking up nagios_cloudwatchplugin_aws_secret_access_key in YAML backend | |
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Looking for data source common | |
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping | |
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Looking up nagios_cloudwatchplugin_aws_access_key_id in YAML backend | |
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Looking for data source common | |
Oct 25 15:52:59 puppet01 puppet-master[11205]: hiera(): Cannot find datafile /var/lib/hiera/common.yaml, skipping |