- Authenticate to vCenter to get user credential.
# curl -k -X POST https://<FQDN or IP>/rest/com/vmware/cis/session -u <USERNAME>:<PASSWORD> | jq
{
"value": "SESSIONID"
}
- Save the session id to a variable
# ID=SESSIONID
# curl -k -X POST https://<FQDN or IP>/rest/com/vmware/cis/session -u <USERNAME>:<PASSWORD> | jq
{
"value": "SESSIONID"
}
# ID=SESSIONID
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com
is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).update: A minor variant of the viru
# install needed packages | |
yum install librsync-devel python-devel | |
# remove old version | |
yum remove duplicity.x86_64 | |
wget http://savannah-nongnu-org.ip-connect.vn.ua/duplicity/duplicity-0.7.11.tar.gz | |
tar -zxvf duplicity-0.7.11.tar.gz | |
cd duplicity-0.7.11/ | |
python setup.py install |
class my_fw::pre { | |
# Disable due to selective purges of firewallchain | |
# resources { "firewall": | |
# purge => true | |
# } | |
# Avoid removing Docker rules: | |
firewallchain { 'FORWARD:filter:IPv4': | |
purge => true, |
#!/bin/bash | |
# See https://www.kernel.org/pub/software/scm/git/docs/githooks.html#pre-receive | |
oldrev=$1 | |
newrev=$2 | |
refname=$3 | |
while read oldrev newrev refname; do | |
# Get the file names, without directory, of the files that have been modified |