Hardware: a TPM 2.0 module based on Infineon SLB9665 cryptographic processor available in the system as /dev/tpmrm0
.
Required software:
# pacman -S tpm2-tools tpm2-pkcs11
# Additional Fish completions for Jujutsu | |
# https://gist.github.com/bnjmnt4n/9f47082b8b6e6ed2b2a805a1516090c8 | |
# TODO: passthru other args? E.g.. --at-operation, --repository | |
function __jj | |
command jj --ignore-working-copy --color=never --quiet $argv 2> /dev/null | |
end | |
# Aliases | |
# Based on https://github.com/fish-shell/fish-shell/blob/cd71359c42f633d9d71a63591ae16d150407a2b2/share/completions/git.fish#L625. |
--- | |
apiVersion: apps/v1 | |
kind: DaemonSet | |
metadata: | |
name: local-ssd-init | |
labels: | |
app: local-ssd-init | |
spec: | |
template: | |
spec: |
terraform { | |
required_providers { | |
google = { | |
source = "hashicorp/google" | |
version = ">= 3.37" | |
} | |
google-beta = { | |
source = "hashicorp/google-beta" | |
version = ">= 3.37" | |
} |
echo -e '\e[0mnormal\e[0m' | |
echo -e '\e[2mdim\e[0m' | |
echo -e '\e[1mbold\e[0m' | |
echo -e '\e[3mitalic\e[0m' | |
echo -e '\e[2;3mdim italic\e[0m' | |
echo -e '\e[1;3mbold italic\e[0m' | |
echo |
[global] | |
workgroup = WORKGROUP | |
log file = /var/log/samba/log.%m | |
max log size = 1000 | |
server role = standalone server | |
security = user | |
map to guest = Bad Password | |
server multi channel support = yes | |
load printers = no | |
printing = bsd |
#!/usr/bin/env bash | |
# Vault Token helper for the Linux key retention service. | |
# | |
# Since version 2.6, the Linux kernel has included a efficiently store | |
# authentication data on a per thread, per process, per user, or per session | |
# bases. | |
# | |
# Linux Key Management Utilities (keyutils) provides `keyctl` to control | |
# the facility from the shell. |
This guide assumes that you have already set up a Ubiquiti Unifi VPN following the guide: | |
https://help.ubnt.com/hc/en-us/articles/115005445768-UniFi-L2TP-Remote-Access-VPN-with-USG-as-RADIUS-Server | |
To configure a Linux machine to be able to connect remotely I followed these steps. This guide was written for Debian 8. | |
- In Debian install the "xl2tpd" and "strongswan" packages. | |
- Edit /etc/ipsec.conf to add the connection: | |
conn YOURVPNCONNECTIONNAME |
/* | |
* We're going to demonstrate how to use Finagle's Stack facilities to inject behavior | |
* deep down in Finagle's stack. Namely, we want to capture the address of a remote | |
* server in that server's response. | |
* | |
* While retrieving a client address is something that perhaps deserves a first-class | |
* API, it's nevertheless interesting to exercise the flexbility of the Stack mechanism. | |
* | |
* This code uses only public APIs. | |
* |