See my blog for more information.
- Adjust settings in vars.auto.tfvars.
- Run with terraform init && terraform apply
Content:
| #!/bin/bash | |
| [email protected] | |
| KEY=11111111111111111111111111 | |
| ZONE_ID=2222222222222222222222222 | |
| curl -sLX GET https://api.cloudflare.com/client/v4/zones/${ZONE_ID}/dns_records?per_page=500 \ | |
| -H "X-Auth-Email: ${EMAIL}" \ | |
| -H "X-Auth-Key: ${KEY}" \ | |
| -H "Content-Type: application/json" | jq .result[].id | tr -d '"' | ( |
| #!/bin/sh | |
| # | |
| # ztncui - ZeroTier network controller UI | |
| # Copyright (C) 2017-2019 Key Networks (https://key-networks.com) | |
| # Licensed under GPLv3 - see LICENSE for details. | |
| # | |
| TOKEN=`sudo cat /var/lib/zerotier-one/authtoken.secret` | |
| echo -e "This is the list of networks avaialble on this Network Controller:" |
| # --------------------------------------------------------------- | |
| # Core ModSecurity Rule Set ver.2.2.9 | |
| # Copyright (C) 2006-2012 Trustwave All rights reserved. | |
| # | |
| # The OWASP ModSecurity Core Rule Set is distributed under | |
| # Apache Software License (ASL) version 2 | |
| # Please see the enclosed LICENCE file for full details. | |
| # --------------------------------------------------------------- | |
See my blog for more information.
Content:
| #!/bin/bash | |
| TOKEN="xxxxxxxxxxxxxxxxxxx" | |
| ZONE_ID=2222222222222222222222222 | |
| # [email protected] | |
| # KEY=11111111111111111111111111 | |
| # Replace with | |
| # -H "X-Auth-Email: ${EMAIL}" \ | |
| # -H "X-Auth-Key: ${KEY}" \ |
| <# | |
| .SYNOPSIS | |
| Script to Initialize my custom powershell setup. | |
| .DESCRIPTION | |
| Script uses scoop | |
| .NOTES | |
| **NOTE** Will configure the Execution Policy for the "CurrentUser" to Unrestricted. | |
| Author: Mike Pruett | |
| Date: October 18th, 2018 |
| mkdir /mnt/wasabi-cache | |
| lvcreate -L 100G -n wasabi-cache vg0 | |
| mkfs.ext4 /dev/vg0/wasabi-cache | |
| docker run -d -p 9000:9000 --name minio-wasabi -e "MINIO_CACHE_DRIVES=/mnt/wasabi-cache" -e "MINIO_CACHE_EXPIRY=40" \ | |
| -e "MINIO_ACCESS_KEY=AKKEYKEYKEYKEYKEY" -e "MINIO_SECRET_KEY=mysecret123123123123123" \ | |
| minio/minio gateway s3 https://s3.wasabisys.com:443 |
| #cloud-config | |
| # Set the hostname for this machine (takes precedence over hostname assigned by DHCP lease). | |
| hostname: myhost | |
| # Authorize SSH keys for the `rancher` sudoer user | |
| ssh_authorized_keys: | |
| - ssh-rsa AAA...ZZZ example1@rancher | |
This was created years ago; at the time I'd been a Shibboleth admin for nearly a decade but we needed something that could handle OIDC/OAuth and that explicitly supported OpenJDK. After a lot of investigation, I really liked Keycloak/Red Hat Single Sign-On. More details here: Gluu vs keycloack vs wso2 identity management
(Items in bold indicate possible concerns)