Disect JWT tokens https://jwt.io
Disposable Email https://yopmail.com
https://pipedream.com | |
Lets Encrypt + Nginx + aspnet core => docker | |
https://glenmccallum.com/ |
using System; | |
public class LifeAsWeKnowIt : IDisposable | |
{ | |
void Life() | |
{ | |
bool isAlive = true; | |
do | |
{ | |
try |
Forgot the WP password and no smtp setup? | |
docker exec into the mysql container | |
USE wordpress | |
UPDATE wp_users SET user_pass = MD5("my-new-password") WHERE wp_users.user_login = "my-admin-user"; | |
Here we are using demo.identotyserver.io. | |
Its not enough to add JsonWebKeySet. You have to add SigningKeys also!! | |
services.AddAuthentication(options => | |
{ | |
options.DefaultScheme = "Cookies"; | |
options.DefaultSignInScheme = "Cookies"; | |
options.DefaultSignOutScheme = "Cookies"; | |
options.DefaultChallengeScheme = "oidc"; |
Install helm w RBAC | |
kubectl -n kube-system create serviceaccount tiller | |
kubectl create clusterrolebinding tiller --clusterrole cluster-admin --serviceaccount=kube-system:tiller | |
helm init --service-account=tiller | |
Update context | |
minikube update-context | |
Install Traefik using Helm (https://8gwifi.org/docs/kube-traefik.jsp) | |
helm install stable/traefik --name traefik --set dashboard.enabled=true,serviceType=NodePort,dashboard.domain=dashboard.traefik,rbac.enabled=true --namespace kube-system |
minimal create | |
kubectl run test --rm -it --image=alpine --generator=run-pod/v1 | |
kubectl proxy | |
http://localhost:8001/api/v1/namespaces/kubernetes-dashboard/services/https:kubernetes-dashboard:/proxy/ | |
Get token | |
kubectl -n kube-system describe secret $(kubectl -n kube-system get secret | awk '/^deployment-controller-token-/{print $1}') | awk '$1=="token:"{print $2}' |
// example using an ip as SAN subject alternate name | |
New-SelfSignedCertificate -NotBefore (Get-Date) -NotAfter (Get-Date).AddYears(1) -Subject "idp" -KeyAlgorithm "RSA" -KeyLength 2048 -HashAlgorithm "SHA256" -CertStoreLocation "Cert:\CurrentUser\My" -KeyUsage KeyEncipherment -FriendlyName "192.168.43.1 development certificate v2" -TextExtension @("2.5.29.19={critical}{text}","2.5.29.37={critical}{text}1.3.6.1.5.5.7.3.1","2.5.29.17={critical}{text}DNS=192.168.43.1&IPAddress=192.168.43.1") | |
// Client authentication only. 10years | |
New-SelfSignedCertificate -Type Custom -Subject "CN=kramerica-xyz-dev-spn,O=Kramerica SelfSigned DEV" -KeyUsage DigitalSignature -KeyLength 4096 -KeyAlgorithm RSA -HashAlgorithm "SHA512" -TextExtension @("2.5.29.37={text}1.3.6.1.5.5.7.3.2") -NotAfter (Get-Date).AddYears(10) -CertStoreLocation "Cert:\LocalMachine\My" |
curl -k -v -X POST -H "Accept: application/json" -H "Content-Type: application/json" -d "{\"result\":\"test\"}" https://localhost:5001/test |
Disect JWT tokens https://jwt.io
Disposable Email https://yopmail.com