This is a guide to using pyjwt to sign and validate a JWT using
RS256.
The trickiest part of doing this is knowing what the proper OpenSSL commands are to generate the RSA keypair. I demonstrate that below.
Helm 3 is storing description of it's releases in secrets. You can simply find them via
$ kubectl get secrets
NAME TYPE DATA AGE
sh.helm.release.v1.wordpress.v1 helm.sh/release.v1 1 1h
If you want to get more info about the secret, you can try to describe the secret
$ kubectl describe secret sh.helm.release.v1.wordpress.v1
| #!/bin/sh | |
| # Backup your data | |
| # Use at your own risk | |
| # Usage ./extended-cleanup-rancher2.sh | |
| # Include clearing all iptables: ./extended-cleanup-rancher2.sh flush | |
| docker rm -f $(docker ps -qa) | |
| docker rmi -f $(docker images -q) | |
| docker volume rm $(docker volume ls -q) | |
| for mount in $(mount | grep tmpfs | grep '/var/lib/kubelet' | awk '{ print $3 }') /var/lib/kubelet /var/lib/rancher; do umount $mount; done | |
| cleanupdirs="/etc/ceph /etc/cni /etc/kubernetes /opt/cni /opt/rke /run/secrets/kubernetes.io /run/calico /run/flannel /var/lib/calico /var/lib/etcd /var/lib/cni /var/lib/kubelet /var/lib/rancher/rke/log /var/log/containers /var/log/pods /var/run/calico" |
| import javax.net.ssl.SSLParameters; | |
| import javax.net.ssl.SSLSocket; | |
| import javax.net.ssl.SSLSocketFactory; | |
| import java.io.*; | |
| /** Establish a SSL connection to a host and port, writes a byte and | |
| * prints the response. See | |
| * http://confluence.atlassian.com/display/JIRA/Connecting+to+SSL+services | |
| */ | |
| public class SSLPoke { |
| FROM centos:centos7 | |
| USER root | |
| RUN yum install -y vim gcc rpm-build rpm-devel rpmlint make python bash coreutils diffutils patch rpmdevtools | |
| CMD ["/bin/bash"] |
| #!/usr/bin/python | |
| # -*- encoding: utf-8; py-indent-offset: 4 -*- | |
| # +------------------------------------------------------------------+ | |
| # | ____ _ _ __ __ _ __ | | |
| # | / ___| |__ ___ ___| | __ | \/ | |/ / | | |
| # | | | | '_ \ / _ \/ __| |/ / | |\/| | ' / | | |
| # | | |___| | | | __/ (__| < | | | | . \ | | |
| # | \____|_| |_|\___|\___|_|\_\___|_| |_|_|\_\ | | |
| # | | | |
| # | Copyright Mathias Kettner 2014 [email protected] | |
| # I was keeping track of typical YUM repos that are not | |
| # permitted on our prod machines (like EPEL, etc.)... | |
| # Then I realized there was a better way. This state will | |
| # find repos that are not approved and generate a state | |
| # to remove them. This works well because if you run | |
| # highstate test=True you can preview the change, but it | |
| # doesn't waste resources (or spew a huge list) constantly verifying | |
| # your ever growing list of repos that shouldn't exist on each state run. | |
| {% set approved_repos = [ |
| From 7442fd01b4a33cbd3f2ba389feb86493484671aa Mon Sep 17 00:00:00 2001 | |
| From: Vye Wilson <[email protected]> | |
| Date: Sat, 20 Sep 2014 14:20:26 -0700 | |
| Subject: [PATCH] some temporary changes to build 2014.7 packages | |
| --- | |
| pkg/rpm/salt.spec | 16 ++++++++++------ | |
| salt/version.py | 1 + | |
| 2 files changed, 11 insertions(+), 6 deletions(-) |