This tutorial is for Ubuntu & Squid3. Use AWS, Google cloud, Digital Ocean or any services with Ubuntu to follow this tutorial.
sudo apt-get update
sudo apt-get install squid3
sudo apt-get install apache2-utils
esphome: | |
name: west_warehouse_access_control | |
platform: ESP32 | |
board: esp32-poe | |
includes: | |
- custom_components/wiegand_device/wiegand_device.h | |
ethernet: | |
use_address: west_warehouse_access_control | |
type: LAN8720 |
This is a working example on how to store CryptoKey
s locally in your browser. We are able to save the objects, without serializing them. This means we can keep them not exportable (which might be more secure?? not sure what attack vectors this prevents).
To try out this example, first make sure you are in a browser that has support for async...await
and indexedDB (latest chrome canary with chrome://flags
"Enable Experimental Javascript" works). Load some page and copy and paste this code into the console. Then call encryptDataSaveKey()
. This will create a private/public key pair and encrypted some random data with the private key. Then save both of them. Now reload the page, copy in the code, and run loadKeyDecryptData()
. It will load the keys and encrypted data and decrypt it. You should see the same data logged both times.
The newer versions of bash include a regex operator =~
Simple example
$ re='t(es)t'
$ [[ "test" =~ $re ]]
$ echo $?
0
$ echo ${BASH_REMATCH[1]}
es
# activate the virtualenv | |
source /home/superset/.virtualenvs/superset/bin/activate | |
fabmanager reset-password --app superset --username admin --password enteryournewpassword |
SELECT table, | |
formatReadableSize(sum(bytes)) as size, | |
min(min_date) as min_date, | |
max(max_date) as max_date | |
FROM system.parts | |
WHERE active | |
GROUP BY table |
all: saml-2.0-os xsd/xenc-schema.xsd xsd/xmldsig-core-schema.xsd xcatalog/saml-metadata.xml | |
saml-2.0-os: | |
mkdir -p saml-2.0-os | |
wget http://docs.oasis-open.org/security/saml/v2.0/saml-2.0-os.zip | |
unzip -d saml-2.0-os saml-2.0-os.zip *.xsd | |
xcatalog/saml-metadata.xml: | |
mkdir -p xcatalog | |
xmlcatalog --noout --create xcatalog/saml-metadata.xml |
Here is a work around to automate OCSP stapling on Opnsense with HAproxy plugin.
Hope it helps :)
I created a script based on acme.sh's haproxy deploy hook.
As /tmp
is emptied on reboot you need to regenerate ocsp files on startup so I put the script as a startup script: /usr/local/etc/rc.syshook.d/start/99-ocsp
(symoblic links in rc.syshook.d don't work).
#!/bin/sh