- Authenticate to vCenter to get user credential.
# curl -k -X POST https://<FQDN or IP>/rest/com/vmware/cis/session -u <USERNAME>:<PASSWORD> | jq
{
"value": "SESSIONID"
}
- Save the session id to a variable
# ID=SESSIONID
# curl -k -X POST https://<FQDN or IP>/rest/com/vmware/cis/session -u <USERNAME>:<PASSWORD> | jq
{
"value": "SESSIONID"
}
# ID=SESSIONID
www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com is up the virus exits instead of infecting the host. (source: malwarebytes). This domain has been sinkholed, stopping the spread of the worm. Will not work if proxied (source).update: A minor variant of the viru
| # install needed packages | |
| yum install librsync-devel python-devel | |
| # remove old version | |
| yum remove duplicity.x86_64 | |
| wget http://savannah-nongnu-org.ip-connect.vn.ua/duplicity/duplicity-0.7.11.tar.gz | |
| tar -zxvf duplicity-0.7.11.tar.gz | |
| cd duplicity-0.7.11/ | |
| python setup.py install |
| class my_fw::pre { | |
| # Disable due to selective purges of firewallchain | |
| # resources { "firewall": | |
| # purge => true | |
| # } | |
| # Avoid removing Docker rules: | |
| firewallchain { 'FORWARD:filter:IPv4': | |
| purge => true, |
| #!/bin/bash | |
| # See https://www.kernel.org/pub/software/scm/git/docs/githooks.html#pre-receive | |
| oldrev=$1 | |
| newrev=$2 | |
| refname=$3 | |
| while read oldrev newrev refname; do | |
| # Get the file names, without directory, of the files that have been modified |