Architecture:
man ovn-architecture
OVN_Northbound:
| package main | |
| import ( | |
| "exec" | |
| "log" | |
| "os" | |
| "syscall" | |
| "unsafe" | |
| ) |
| package main | |
| import ( | |
| "io" | |
| "mime/multipart" | |
| "net/http" | |
| "net/url" | |
| "os" | |
| "fmt" | |
| ) |
| package main | |
| import ( | |
| "context" | |
| "encoding/json" | |
| "errors" | |
| "math" | |
| "time" | |
| "log" |
Every so often I have to restore my gpg keys and I'm never sure how best to do it. So, I've spent some time playing around with the various ways to export/import (backup/restore) keys.
cp ~/.gnupg/pubring.gpg /path/to/backups/
cp ~/.gnupg/secring.gpg /path/to/backups/
cp ~/.gnupg/trustdb.gpg /path/to/backups/
DB
ovs-vsctl list open_vswitch
ovs-vsctl list interface
ovs-vsctl list interface vxlan-ac000344
ovs-vsctl --columns=options list interface vxlan-ac000344
ovs-vsctl --columns=ofport,name list Interface
ovs-vsctl --columns=ofport,name --format=table list Interface
ovs-vsctl -f csv --no-heading --columns=_uuid list controller
ovs-vsctl -f csv --no-heading -d bare --columns=other_config list port
We install certutil and pk12util if necessary:
sudo apt install libnss3-tools
On Linux, Chromium uses the NSS Shared DB. Check if you have the ~/.pki/nssdb directory:
ls $HOME/.pki/nssdb
These commands generate and use private keys in unencrypted binary (not Base64 “PEM”) PKCS#8 format. The PKCS#8 format is used here because it is the most interoperable format when dealing with software that isn't based on OpenSSL.
OpenSSL has a variety of commands that can be used to operate on private
key files, some of which are specific to RSA (e.g. openssl rsa and
openssl genrsa) or which have other limitations. Here we always use