curl -s -S 'https://registry.access.redhat.com/v1/repositories/openshift3/postgresql-apb/tags' | jq '.'
curl -s -S 'https://registry.access.redhat.com/v1/repositories/rhel7/tags'| jq '.'
#!/bin/bash | |
# 1. `rpm -i atomic-openshift-xxx.rpm` | |
# 2. `cd ~/rpmbuild/BUILD/atomic-openshift-xxx` | |
# 3. run this script | |
export OS_ONLY_BUILD_PLATFORMS="linux/amd64" | |
export OS_GOFLAGS=-v | |
# the line below is from: $(str='%global os_git_vars '; grep "^$str" SPECS/origin.spec | sed -e "s/^$str//") |
#!/usr/bin/env perl | |
$flag = 0; | |
while (<>) { | |
chomp; | |
if (/^Subscription Name:\s+(.*)/) { | |
$subscription_name = $1; | |
$flag = 1; | |
} |
# virsh qemu-monitor-command DOMAIN '{"execute": "query-commands"}' --pretty | |
# virsh qemu-monitor-command DOMAIN --hmp 'help' | |
# virsh qemu-monitor-command instance-00000002 '{"execute": "query-status"}' | |
{"return":{"status":"running","singlestep":false,"running":true},"id":"libvirt-5137"} | |
# virsh qemu-monitor-command instance-00000002 '{"execute": "query-status"}' --pretty | |
{ | |
"return": { | |
"status": "running", |
mariadbにroot@localhostで接続できない → .my.cnfを消す | |
systemctl start neutron-openvswitch-agentに失敗する → systemctl daemon-reload && systemctl start neutron-openvswitch-agentを実行しておく |
1. Run fedup on Fedora21 | |
$ sudo yum install fedup | |
$ sudo fedup --network 22 | |
2. Reboot Fedora21 | |
3. Choose "System Upgrade" in grub2 menu | |
4. The system is automatically upgraded. | |
(console output) |
[root@repository ~]# openssl ciphers -v | |
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD | |
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD | |
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384 | |
ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384 | |
ECDHE-RSA-AES256-SHA SSLv3 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1 | |
ECDHE-ECDSA-AES256-SHA SSLv3 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA1 | |
DHE-DSS-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=DSS Enc=AESGCM(256) Mac=AEAD | |
DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD | |
DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256 |
[root@repository-rhel6 ~]# openssl ciphers -v | |
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD | |
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD | |
ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384 | |
ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384 | |
ECDHE-RSA-AES256-SHA SSLv3 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1 | |
ECDHE-ECDSA-AES256-SHA SSLv3 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA1 | |
DHE-DSS-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=DSS Enc=AESGCM(256) Mac=AEAD | |
DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD | |
DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256 |
[root@repository-rhel5 ~]# openssl ciphers -v | |
DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1 | |
DHE-DSS-AES256-SHA SSLv3 Kx=DH Au=DSS Enc=AES(256) Mac=SHA1 | |
AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1 | |
KRB5-DES-CBC3-MD5 SSLv3 Kx=KRB5 Au=KRB5 Enc=3DES(168) Mac=MD5 | |
KRB5-DES-CBC3-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=3DES(168) Mac=SHA1 | |
EDH-RSA-DES-CBC3-SHA SSLv3 Kx=DH Au=RSA Enc=3DES(168) Mac=SHA1 | |
EDH-DSS-DES-CBC3-SHA SSLv3 Kx=DH Au=DSS Enc=3DES(168) Mac=SHA1 | |
DES-CBC3-SHA SSLv3 Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1 | |
DES-CBC3-MD5 SSLv2 Kx=RSA Au=RSA Enc=3DES(168) Mac=MD5 |