SSH into AWS ec2/ Digitalocean droplet/ or else other PAAS, linux machine
- Install Docker
$sudo apt install docker.io
$sudo usermod -aG docker $USER
I already installed docker
#!/bin/bash | |
url=http://redefininggod.com | |
webarchive=https://web.archive.org | |
wget="wget -e robots=off -nv" | |
tab="$(printf '\t')" | |
additional_url=url.list | |
# Construct listing.txt from url.list | |
# The list of archived pages, including some wildcard url |
SSH into AWS ec2/ Digitalocean droplet/ or else other PAAS, linux machine
$sudo apt install docker.io
$sudo usermod -aG docker $USER
I already installed docker
#!/bin/bash | |
#============================================== | |
# silly script to import 15000 docker images | |
# into OpenShift as image streams | |
# Author: Joel Sheppard | |
#============================================== | |
oc import-image 2717 --from gradle:latest --confirm | |
oc import-image 6567 --from mhart/alpine-node-auto:latest --confirm | |
oc import-image 2859 --from aptalca/home-automation-bridge:latest --confirm |
This was created years ago; at the time I'd been a Shibboleth admin for nearly a decade but we needed something that could handle OIDC/OAuth and that explicitly supported OpenJDK. After a lot of investigation, I really liked Keycloak/Red Hat Single Sign-On. More details here: Gluu vs keycloack vs wso2 identity management
(Items in bold indicate possible concerns)
THIS GIST IS EXTREMELY OBSOLETE. DO NOT FOLLOW THESE INSTRUCTIONS. SERIOUSLY.
IF YOU IGNORE THE ABOVE WARNING, YOU AGREE IN ADVANCE THAT YOU DIDN'T GET THESE INSTRUCTIONS FROM ME, THAT I WARNED YOU, AND THAT I RESERVE THE RIGHT TO POINT AND LAUGH MOCKINGLY IF AND WHEN SOMETHING BREAKS HORRIBLY.
I'll do a write-up of current custom-kernel procedures over on Random Bytes ( https://randombytes.substack.com/ ) one day soon.
public class CacheService : ICache | |
{ | |
private readonly string _keyPrefix; | |
private readonly IDistributedCache _cache; | |
private readonly IConfiguration _config; | |
public CacheService(IDistributedCache cache, IConfiguration config) | |
{ | |
_cache = cache; | |
_config = config; |
// Register MediatR Pipeline Behaviors | |
services.AddTransient(typeof(IPipelineBehavior<,>), typeof(LoggingBehavior<,>)); | |
services.AddTransient(typeof(IPipelineBehavior<,>), typeof(ValidationBehavior<,>)); | |
services.AddTransient(typeof(IPipelineBehavior<,>), typeof(CachingBehavior<,>)); | |
services.AddTransient(typeof(IPipelineBehavior<,>), typeof(FallbackBehavior<,>)); | |
services.AddTransient(typeof(IPipelineBehavior<,>), typeof(RetryBehavior<,>)); | |
// ICachePolicy discovery and registration | |
services.Scan(scan => scan | |
.FromAssemblies(assembly) |
// | |
// This enabled the JWT Auth backend in Vault for GitLab to authenticate with (obtains a Vault token based on $CI_JOB_JWT | |
// in pipeline jobs) | |
// | |
resource "vault_jwt_auth_backend" "gitlab" { | |
type = "jwt" | |
path = var.gitlab.jwt_auth_path | |
jwks_url = format("https://%s/-/jwks", var.gitlab.hostname) | |
bound_issuer = var.gitlab.hostname | |
} |
# Note: can also just install nerdctl-full | |
sudo apt-get update | |
sudo apt-get install containerd | |
wget https://github.com/containerd/nerdctl/releases/download/v1.5.0/nerdctl-1.5.0-linux-amd64.tar.gz | |
tar -zxf nerdctl-1.5.0-linux-amd64.tar.gz nerdctl | |
sudo mv nerdctl /usr/bin/nerdctl | |
rm nerdctl-1.5.0-linux-amd64.tar.gz |