Open ssl.conf in a text editor.
Edit the domain(s) listed under the [alt_names] section so that they match the local domain name you want to use for your project, e.g.
DNS.1 = my-project.dev
Additional FQDNs can be added if required:
| package org.sample; | |
| import com.google.gson.JsonElement; | |
| import com.google.gson.JsonParser; | |
| import java.io.FileNotFoundException; | |
| import java.io.FileReader; | |
| import java.io.Reader; | |
| import java.time.Instant; | |
| import java.time.format.DateTimeFormatter; |
| apiVersion: extensions/v1beta1 | |
| kind: Ingress | |
| metadata: | |
| name: my-app-ingress | |
| namespace: YOUR-OPTIONAL-NAMESPACE | |
| annotations: | |
| kubernetes.io/ingress.class: "nginx" | |
| nginx.ingress.kubernetes.io/backend-protocol: "HTTPS" # the annotation that made this all possible | |
| spec: | |
| tls: |
| import requests | |
| import sys | |
| import os | |
| PLUGIN = 'credentials' | |
| BACKDIR_COUNT = 10 | |
| if len(sys.argv) != 3: | |
| print 'usage:\n\tpython CVE-2018-1999002.py [jenkins base url] [absolute file path]' | |
| print '' |
How to run a GUI application as a different user:
Suppose you are logged into your Linux box as user1 using some X window system already (with GNOME/Unity/..). Now you want to run some gui app as another user, user2.
Run:
xhost + - Run as the user1. This enables access to user1's X window system from other users.
You should see following output: 'access control disabled, clients can connect from any host'sudo su - user2 - Using your favorite terminal, log-in to second user.export DISPLAY=:0.0 - optional for some apps.Usually, you need to run following four commands to create a user.
#!/bin/bash
# create bare user
aws iam create-user --user-name <user> --tags Key=Creator,Value=kasung
# enable aws console access
aws iam create-login-profile --user-name --password --password-reset-required
| #!/bin/bash | |
| kubectl get namespaces | sort -n -k3 | grep "kubernetes-namespace.*d$" | awk '{print $1}' | xargs kubectl delete namespaces |
| # Instructions and command outputs when running helm install for apim-analytics | |
| # Repo: https://github.com/wso2/kubernetes-apim/tree/master/helm/pattern-1 | |
| kasun@gaje:~/k8s/kubernetes-apim/helm/pattern-1$ helm install --name wso2apim-with-analytics-rdbms-service -f mysql/values.yaml stable/mysql --namespace wso2 | |
| NAME: wso2apim-with-analytics-rdbms-service | |
| LAST DEPLOYED: Sat Feb 23 11:30:01 2019 | |
| NAMESPACE: wso2 | |
| STATUS: DEPLOYED | |
| RESOURCES: | |
| ==> v1/Secret |
| comm -23 <(aws ec2 describe-security-groups --query 'SecurityGroups[*].GroupId' --output text | tr '\t' '\n'| sort) \ | |
| <(aws ec2 describe-instances --query 'Reservations[*].Instances[*].SecurityGroups[*].GroupId' --output text | tr '\t' '\n' | sort | uniq) \ | |
| | tee -a unused-security-groups-in-ec2.txt | |
| for x in `cat unused-security-groups-in-ec2.txt`; do echo 'deleting sg: $x' ; aws ec2 delete-security-group --group-id $x; done |
| <Colors> | |
| <Red>FF0000</Red> | |
| <Blue>0000FF</Blue> | |
| <Green>008000</Green> | |
| </Colors> |