Skip to content

Instantly share code, notes, and snippets.

View JJediny's full-sized avatar

John Jediny JJediny

View GitHub Profile
@JJediny
JJediny / ISO-19115-2_to_POD.yaml
Last active June 1, 2017 14:08
ISO-19115-2: JSON schema to YAML based on https://github.com/adiwg/mdJson-schemas. Transformation to Project Open Data v1.1
schema: catalog.conformsTo # https://github.com/data-govt-nz/schema
name: catalog.dataset
version: catalog.describedBy # https://project-open-data.cio.gov/v1.1/schema
contact:
- contactId: UUID # or URI
isOrganization: true
name: catalog.dataset.contactPoint.fn
positionName: #catalog.dataset.contactPoint.position
memberOfOrganization: catalog.dataset.publisher.name
logoGraphic: #catalog.dataset.publisher.logo
@JJediny
JJediny / Updated_data.json
Last active March 7, 2017 22:18
Changes needed to produce valid "Federal" data.json. publisher.name == JKAN organization (or Department in San Diego JKAN implementation), but bureauCode and programCode should be attributes pulled from where organization == publisher.name
---
---
{
"conformsTo": "https://project-open-data.cio.gov/v1.1/schema",
"@context": "https://project-open-data.cio.gov/v1.1/schema/catalog.jsonld",
"@id": "{{ site.baseurl }}/data.json",
"@type": "dcat:Catalog",
"describedBy": "https://project-open-data.cio.gov/v1.1/schema/catalog.json",
"dataset": [{% for dataset in site.datasets %}{% capture temp %}
{% assign schema = dataset.schema | default: site.schema %}
@JJediny
JJediny / main.yml
Created March 6, 2017 15:29
Playbook from GSA D2D team for installing Google Authenticator on Jumpbox
---
- name: WARNING!
debug:
msg:
- "*************************WARNING!*************************"
- Further execution of playbook will lock down hosts with MFA.
- Temporay MFA codes will be provided upon completion.
- If you DO NOT want to enable MFA at this time, cancel execution now!

Keybase proof

I hereby claim:

  • I am jjediny on github.
  • I am jjediny (https://keybase.io/jjediny) on keybase.
  • I have a public key whose fingerprint is 40CC 2D12 7354 9264 6296 5B85 FA37 8522 5D36 CE77

To claim this, I am signing this object:

@JJediny
JJediny / USING-VAULT.md
Created February 23, 2017 04:00 — forked from voxxit/USING-VAULT.md
Consul + Vault + MySQL = <3
git clone https://gist.github.com/dd6f95398c1bdc9f1038.git vault
cd vault
docker-compose up -d
export VAULT_ADDR=http://192.168.99.100:8200

Initializing a vault:

vault init
#!groovy
// This is the full syntax for Jenkins Declarative Pipelines as of version 0.8.1.
pipeline {
// Possible agent configurations - you must have one and only one at the top level.
agent any
agent none
agent {
label "whatever"
@JJediny
JJediny / Jenkinsfile
Created February 22, 2017 20:17 — forked from abayer/Jenkinsfile
An example Declarative Pipeline Jenkinsfile for Feb 15 2017 demo
// A Declarative Pipeline is defined within a 'pipeline' block.
pipeline {
// agent defines where the pipeline will run.
agent {
// This also could have been 'agent any' - that has the same meaning.
label ""
// Other possible built-in agent types are 'agent none', for not running the
// top-level on any agent (which results in you needing to specify agents on
// each stage and do explicit checkouts of scm in those stages), 'docker',
@JJediny
JJediny / RHEL6STIGtoNIST800.csv
Created January 11, 2017 16:26
RHEL6 STIG w/ NIST 800-53 Controls - Example output from https://github.com/opencontrol/xccdf2csv
We can make this file beautiful and searchable if this error is corrected: Unclosed quoted field in line 2.
STIG ID,Version,Rule Title,Title,Severity,Check Text,Fix Text,CCI,CCI,Status,Published,contributor,Definition,Type,NIST800-53rev4,Control,NIST800-53rev3,Control,NIST800-53rev1,Control
38437,RHEL-06-000526,Automated file system mounting tools must not be enabled unless needed.,SRG-OS-999999,low,"To verify the ""autofs"" service is disabled, run the following command:
chkconfig --list autofs
If properly configured, the output should be the following:
autofs 0:off 1:off 2:off 3:off 4:off 5:off 6:off
Verify the ""autofs"" service is not running:
@JJediny
JJediny / pedantically_commented_playbook.yml
Created December 29, 2016 22:46 — forked from marktheunissen/pedantically_commented_playbook.yml
Insanely complete Ansible playbook, showing off all the options
---
# ^^^ YAML documents must begin with the document separator "---"
#
#### Example docblock, I like to put a descriptive comment at the top of my
#### playbooks.
#
# Overview: Playbook to bootstrap a new host for configuration management.
# Applies to: production
# Description:
# Ensures that a host is configured for management with Ansible.
@JJediny
JJediny / security hardness.md
Created December 3, 2016 05:10 — forked from jacobian/security hardness.md
Security Hardness Scale

This is a draft "security hardness scale", desgigned to somewhat roughly quantify the level of effort of a penetration test -- since simply measuing "how many vulns did you find" is a terrible measurement of success

The scale is similar to the Mohs Hardness Scale in that it's simply an ordinal scale, not an absolute one. That is, the "gap" between 3 and 4 doesn't have to be the same "difficulty increase" as the gap between 5 and 6. It's simply a way of rating that one pentest was "harder" than another. (This is in lieu of being able measuing "hardness" in any truely quantitative way).