- OS: Ubuntu 16.04.3 LTS
- libc: 2.23-0ubuntu10
https://sourceware.org/bugzilla/show_bug.cgi?id=23151
root@4694e6d13588:/# ghtopdep --minstar 200 --rows 200 https://github.com/aquasecurity/trivy-action | |
| url | stars | | |
|-------------------------------------------------------------------------|---------| | |
| https://github.com/coder/code-server | 62K | | |
| https://github.com/metabase/metabase | 34K | | |
| https://github.com/swagger-api/swagger-ui | 24K | | |
| https://github.com/goharbor/harbor | 21K | | |
| https://github.com/dgraph-io/dgraph | 20K | | |
| https://github.com/aquasecurity/trivy | 18K | | |
| https://github.com/keycloak/keycloak | 17K | |
#!/bin/bash | |
AMI_ID=$1 | |
KEY_NAME=xxxxxxx | |
SECURITY_GROUP_ID=sg-xxxxxxxxxxx | |
SUBNET_ID=subnet-xxxxxxxxxxxxxxx | |
INSTANCE_TYPE=t2.micro | |
echo $AMI_ID |
#!/bin/bash | |
AMI_ID=$1 | |
echo $AMI_ID | |
KEY_NAME=xxxx | |
SECURITY_GROUP_ID=sg-xxxxxxxxxxx | |
SUBNET_ID=subnet-xxxxxxxxxxxxx | |
INSTANCE_TYPE=t2.micro |
apiVersion: kyverno.io/v1 | |
kind: ClusterPolicy | |
metadata: | |
name: check-vulnerabilities | |
spec: | |
validationFailureAction: enforce | |
webhookTimeoutSeconds: 10 | |
failurePolicy: Fail | |
rules: | |
- name: no-critical-vuln |
package main | |
import ( | |
"fmt" | |
"io/ioutil" | |
"os" | |
"syscall" | |
"unsafe" | |
"golang.org/x/sys/unix" |
FROM centos:7 | |
RUN yum -y update \ | |
&& yum -y groupinstall "Development tools" \ | |
&& yum -y install git vim openssl openssl-devel nspr nspr-devel nss nss-devel \ | |
file file-devel popt popt-devel lua-static lua-devel db4 db4-devel wget tar \ | |
libarchive libarchive-devel strace gdb-gdbserver libdb-devel lzma xz-devel | |
RUN git clone https://github.com/rpm-software-management/rpm.git \ | |
&& cd rpm \ | |
&& git checkout rpm-4.11.3-release \ |
https://sourceware.org/bugzilla/show_bug.cgi?id=23151
#!/usr/bin/python | |
#coding:utf-8 | |
import json, toml, hashlib | |
groups = { | |
'default': [], | |
'develop': [] | |
} |
http.HandleFunc("/slash", func(w http.ResponseWriter, r *http.Request) { | |
s, err := slack.SlashCommandParse(r) | |
if err != nil { | |
w.WriteHeader(http.StatusInternalServerError) | |
return | |
} | |
if !s.ValidateToken(verificationToken) { | |
w.WriteHeader(http.StatusUnauthorized) | |
return |
func TestRedis(t *testing.T) { | |
s, _ := testutil.PrepareTestRedis() | |
for i := 0; i < 10000; i++ { | |
s.Set("key"+strconv.Itoa(i), "hoge"+strconv.Itoa(i)) | |
} | |
client := redis.NewClient(&redis.Options{Addr: s.Addr()}) | |
// 普通にループ | |
result := map[string]string{} | |
for i := 0; i < 10000; i++ { |