ror, scala, jetty, erlang, thrift, mongrel, comet server, my-sql, memchached, varnish, kestrel(mq), starling, gizzard, cassandra, hadoop, vertica, munin, nagios, awstats
#!/bin/bash | |
# bash generate random alphanumeric string | |
# | |
# bash generate random 32 character alphanumeric string (upper and lowercase) and | |
NEW_UUID=$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 32 | head -n 1) | |
# bash generate random 32 character alphanumeric string (lowercase only) | |
cat /dev/urandom | tr -dc 'a-z0-9' | fold -w 32 | head -n 1 |
- (Lisäys 14.4. 13:40) https://emotionhackday.com/hackables/
Autentikointi
- Facebook Login: https://developers.facebook.com/docs/facebook-login
- Google Identity Platform: https://developers.google.com/identity/
- Metropolia CAS (toteutus löytyy ainakin PHP:lle)
- Sign In with LinkedIn: https://developer.linkedin.com/docs/signin-with-linkedin
- Lisää autentikointi-rajapintoja: http://www.programmableweb.com/news/30-authentication-apis-google-aol-windows-live-and-yahoo/2012/04/04
APPNAME?="docker-beat" | |
REPONAME?="dmportella" | |
TEST?=$$(go list ./... | grep -v '/vendor/') | |
VETARGS?=-all | |
GOFMT_FILES?=$$(find . -name '*.go' | grep -v vendor) | |
REV?=$$(git rev-parse --short HEAD) | |
BRANCH?=$$(git rev-parse --abbrev-ref HEAD) | |
BUILDFILES?=$$(find bin -mindepth 1 -maxdepth 1 -type f) | |
VERSION?="0.0.0" | |
DOCKER_REPO?="${REPONAME}/${APPNAME}" |
DB
ovs-vsctl list open_vswitch
ovs-vsctl list interface
ovs-vsctl list interface vxlan-ac000344
ovs-vsctl --columns=options list interface vxlan-ac000344
ovs-vsctl --columns=ofport,name list Interface
ovs-vsctl --columns=ofport,name --format=table list Interface
ovs-vsctl -f csv --no-heading --columns=_uuid list controller
ovs-vsctl -f csv --no-heading -d bare --columns=other_config list port
package main | |
import ( | |
"database/sql" | |
"fmt" | |
"net/url" | |
"os" | |
"reflect" | |
"regexp" | |
"strconv" |
TLDR: JWTs should not be used for keeping your user logged in. They are not designed for this purpose, they are not secure, and there is a much better tool which is designed for it: regular cookie sessions.
If you've got a bit of time to watch a presentation on it, I highly recommend this talk: https://www.youtube.com/watch?v=pYeekwv3vC4 (Note that other topics are largely skimmed over, such as CSRF protection. You should learn about other topics from other sources. Also note that "valid" usecases for JWTs at the end of the video can also be easily handled by other, better, and more secure tools. Specifically, PASETO.)
A related topic: Don't use localStorage (or sessionStorage) for authentication credentials, including JWT tokens: https://www.rdegges.com/2018/please-stop-using-local-storage/
The reason to avoid JWTs comes down to a couple different points:
- The JWT specification is specifically designed only for very short-live tokens (~5 minute or less). Sessions
Hence, if you are interested in existing applications to "just work" without the need for adjustments, then you may be better off avoiding Wayland.
Wayland solves no issues I have but breaks almost everything I need. Even the most basic, most simple things (like xkill
) - in this case with no obvious replacement. And usually it stays broken, because the Wayland folks mostly seem to care about Automotive, Gnome, maybe KDE - and alienating everyone else (e.g., people using just an X11 window manager or something like GNUstep) in the process.
As 2024 is winding down: