This code demonstrate how to load sensitive code from encrypted files at runtime.
$ ruby sample.rb
Now, protect the sensitive code
# Tested using | |
# Ruby v3.2.2 / openssl gem v3.1.0 | |
# Ubuntu with OpenSSL 3.0.2 | |
require 'openssl' | |
class ECKey | |
CURVE='prime256v1' | |
source "https://rubygems.org" | |
gem "async-websocket" |
I hereby claim:
To claim this, I am signing this object:
@echo off | |
setlocal EnableDelayedExpansion | |
@REM Build LibZMQ, CZMQ et Zyre with their dependencies | |
@REM Toolchain : Visual Studio 2017 | |
@REM Dependencies : CMAKE, GIT (Git for Windows), PERL (Strawberry Perl), NASM | |
@REM | |
@REM After successful build the resulting DLL are moved into zmq_build_%TODAY%\out | |
@REM |
source 'https://rubygems.org' | |
ruby '2.4.1' | |
gem 'mail' | |
gem 'mailjet', git: 'https://github.com/mailjet/mailjet-gem.git', branch: 'prerelease/v1.5.2' | |
gem 'activesupport', :require => 'active_support/all' |
#!/usr/bin/env ruby | |
require 'uri' | |
require 'pty' | |
require 'expect' | |
if ARGV.length == 2 | |
app = ARGV[0] | |
dump = ARGV[1] | |
else |
1) Make sure you have these tools installed and configured | |
* Ruby | |
* The ShellyCloud CLI | |
* The Scalingo CLI | |
* tar, gunzip | |
* The PostgreSQL client tools (pg_restore) | |
2) Make sure your database on scalingo side is empty (delete your postgresql addon and recreate it) | |
BEWARE : YOU WILL LOOSE ALL YOUR DATA ! So make backups before deleting your PG Addon ! |
Jul 17 13:47:21 coreos3 systemd[1]: etcd.service: Service hold-off time over, scheduling restart. | |
Jul 17 13:47:21 coreos3 systemd[1]: Started etcd. | |
Jul 17 13:47:21 coreos3 systemd[1]: Starting etcd... | |
Jul 17 13:47:21 coreos3 etcd[746]: [etcd] Jul 17 13:47:21.628 INFO | Discovery via https://discovery.etcd.io using prefix /dbce198e983f853f4be64c00187a3a6e. | |
Jul 17 13:47:23 coreos3 etcd[746]: [etcd] Jul 17 13:47:23.030 INFO | Discovery found peers [http://192.168.57.32:7001 http://192.168.57.32:7001 http://192.168.57.31:7001 836d6a8c4772499fbceb10230c842754=http://192.168.57.31:2380 http://192.168.57.33:7001] | |
Jul 17 13:47:23 coreos3 etcd[746]: [etcd] Jul 17 13:47:23.031 INFO | Discovery fetched back peer list: [192.168.57.32:7001 192.168.57.32:7001 192.168.57.31:7001 192.168.57.33:7001] | |
Jul 17 13:47:23 coreos3 etcd[746]: [etcd] Jul 17 13:47:23.032 INFO | de858fb1bdf641abab0a6457f4bb53d7 attempted to join via 192.168.57.32:7001 failed: fail checking join version: Client Internal Error (Get ht |
#cloud-config | |
--- | |
hostname: %XSVMNAMETOHOSTNAME% | |
ssh_authorized_keys: | |
# - ssh-rsa <my key !> | |
# The following entry will automatically be replaced with a public key | |
# generated by XenServer's container management. The key-entry must exist, | |
# in order to enable container management for this VM. | |
- ssh-rsa %XSCONTAINERRSAPUB% | |
coreos: |