Docker's Remote API can be secured via TLS and client certificate verification.
First of all you need a few certificates and keys:
- CA certificate
- Server certificate
- Server key
- Client certificate
- Client key
description "Suspend dmcache for SSD cache" | |
author "Kyle Manna <[email protected]>" | |
# Start monitoring with inotifywait (will block) after the filesystem is | |
# mounted, when the filesystem is unmounted, teardown the dm devices. | |
start on mounted MOUNTPOINT=/media/usb1 | |
script | |
inotifywait -e unmount $MOUNTPOINT |
CPU checks | |
cat /proc/stat | |
cpu 5980399 11913132 2932635 127127029 1047304 264 31248 0 0 0 | |
cpu0 3011339 6167764 1718076 61891330 503296 253 23962 0 0 0 | |
cpu1 2969060 5745368 1214559 65235699 544008 11 7286 0 0 0 | |
intr 321175563 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 56805749 0 0 0 2291 0 0 0 3 0 11188722 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 12 0 0 0 82419651 0 0 0 0 0 0 0 0 0 21037226 0 2314064 0 0 0 0 91522406 0 0 45758249 0 0 0 0 0 0 0 0 165 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 3863400 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 | |
ctxt 344021807 | |
btime 1410377050 | |
processes 1430298 |
# to generate your dhparam.pem file, run in the terminal | |
openssl dhparam -out /etc/nginx/ssl/dhparam.pem 2048 |
auth_mechanisms = plain login digest-md5 cram-md5 ntlm apop | |
!include auth-sql.conf.ext |
#!/bin/bash | |
# Ubuntu Developer Script for pdf2htmlEx | |
# Created by Rajeev Kannav Sharma | |
# http://rajeevkannav.github.io/ | |
# | |
# | |
# Downloads and configures the following: | |
# | |
# CMake, pkg-config | |
# GNU Getopt |
import requests | |
import hashlib | |
import time | |
import uuid | |
import os | |
import copy | |
import json | |
# This is based on my personal implementation but stripped down to only what is | |
# needed to verify it. |
import requests | |
import hashlib | |
import time | |
import uuid | |
import os | |
import copy | |
import json | |
# Fixed up version of my previous code to work with the Cloud endpoints. | |
# Hopefully this works. |
# I had a bit of trouble getting my unifi controller (hosted offsite) to use a proxy/letsencrypt. So here are the fruits of my labor. | |
# The unifi default port is 8443 running on localhost. | |
# License: CC0 (Public Domain) | |
server { | |
# SSL configuration | |
# | |
listen 443 ssl default_server; | |
listen [::]:443 ssl default_server; |
<domain log-root="${com.sun.aas.instanceRoot}/logs" application-root="${com.sun.aas.instanceRoot}/applications" version="89"> | |
<security-configurations> | |
<authentication-service default="true" name="adminAuth" use-password-credential="true"> | |
<security-provider name="spcrealm" type="LoginModule" provider-name="adminSpc"> | |
<login-module-config name="adminSpecialLM" control-flag="sufficient" module-class="com.sun.enterprise.admin.util.AdminLoginModule"> | |
<property name="config" value="server-config"></property> | |
<property name="auth-realm" value="admin-realm"></property> | |
</login-module-config> | |
</security-provider> | |
<security-provider name="filerealm" type="LoginModule" provider-name="adminFile"> |