You will need an access token from azure devops. Get yours here. This script will need contributor access to the project in question.
# populate user map in Map-IssueToWorkitem| # Note: can also just install nerdctl-full | |
| sudo apt-get update | |
| sudo apt-get install containerd | |
| wget https://github.com/containerd/nerdctl/releases/download/v1.5.0/nerdctl-1.5.0-linux-amd64.tar.gz | |
| tar -zxf nerdctl-1.5.0-linux-amd64.tar.gz nerdctl | |
| sudo mv nerdctl /usr/bin/nerdctl | |
| rm nerdctl-1.5.0-linux-amd64.tar.gz |
| // | |
| // This enabled the JWT Auth backend in Vault for GitLab to authenticate with (obtains a Vault token based on $CI_JOB_JWT | |
| // in pipeline jobs) | |
| // | |
| resource "vault_jwt_auth_backend" "gitlab" { | |
| type = "jwt" | |
| path = var.gitlab.jwt_auth_path | |
| jwks_url = format("https://%s/-/jwks", var.gitlab.hostname) | |
| bound_issuer = var.gitlab.hostname | |
| } |
| // Register MediatR Pipeline Behaviors | |
| services.AddTransient(typeof(IPipelineBehavior<,>), typeof(LoggingBehavior<,>)); | |
| services.AddTransient(typeof(IPipelineBehavior<,>), typeof(ValidationBehavior<,>)); | |
| services.AddTransient(typeof(IPipelineBehavior<,>), typeof(CachingBehavior<,>)); | |
| services.AddTransient(typeof(IPipelineBehavior<,>), typeof(FallbackBehavior<,>)); | |
| services.AddTransient(typeof(IPipelineBehavior<,>), typeof(RetryBehavior<,>)); | |
| // ICachePolicy discovery and registration | |
| services.Scan(scan => scan | |
| .FromAssemblies(assembly) |
| public class CacheService : ICache | |
| { | |
| private readonly string _keyPrefix; | |
| private readonly IDistributedCache _cache; | |
| private readonly IConfiguration _config; | |
| public CacheService(IDistributedCache cache, IConfiguration config) | |
| { | |
| _cache = cache; | |
| _config = config; |
You will need an access token from azure devops. Get yours here. This script will need contributor access to the project in question.
# populate user map in Map-IssueToWorkitemTHIS GIST IS EXTREMELY OBSOLETE. DO NOT FOLLOW THESE INSTRUCTIONS. SERIOUSLY.
IF YOU IGNORE THE ABOVE WARNING, YOU AGREE IN ADVANCE THAT YOU DIDN'T GET THESE INSTRUCTIONS FROM ME, THAT I WARNED YOU, AND THAT I RESERVE THE RIGHT TO POINT AND LAUGH MOCKINGLY IF AND WHEN SOMETHING BREAKS HORRIBLY.
I'll do a write-up of current custom-kernel procedures over on Random Bytes ( https://randombytes.substack.com/ ) one day soon.
This was created years ago; at the time I'd been a Shibboleth admin for nearly a decade but we needed something that could handle OIDC/OAuth and that explicitly supported OpenJDK. After a lot of investigation, I really liked Keycloak/Red Hat Single Sign-On. More details here: Gluu vs keycloack vs wso2 identity management
(Items in bold indicate possible concerns)
| #!/bin/bash | |
| #============================================== | |
| # silly script to import 15000 docker images | |
| # into OpenShift as image streams | |
| # Author: Joel Sheppard | |
| #============================================== | |
| oc import-image 2717 --from gradle:latest --confirm | |
| oc import-image 6567 --from mhart/alpine-node-auto:latest --confirm | |
| oc import-image 2859 --from aptalca/home-automation-bridge:latest --confirm |
SSH into AWS ec2/ Digitalocean droplet/ or else other PAAS, linux machine
$sudo apt install docker.io
$sudo usermod -aG docker $USER
I already installed docker
| #!/bin/bash | |
| url=http://redefininggod.com | |
| webarchive=https://web.archive.org | |
| wget="wget -e robots=off -nv" | |
| tab="$(printf '\t')" | |
| additional_url=url.list | |
| # Construct listing.txt from url.list | |
| # The list of archived pages, including some wildcard url |