(Steps taken from: https://www.baeldung.com/x-509-authentication-in-spring-security)
All passwords: changeit
openssl req -x509 -sha256 -days 3650 -newkey rsa:4096 -keyout rootCA.key -out rootCA.crt
| curl -s https://gist.github.com/wongcyrus/a4e726b961260395efa7811cab0b4516/raw/6a045f51acb2338bb2149024a28621db2abfcaab/resize.sh | bash /dev/stdin 60 |
(Steps taken from: https://www.baeldung.com/x-509-authentication-in-spring-security)
All passwords: changeit
openssl req -x509 -sha256 -days 3650 -newkey rsa:4096 -keyout rootCA.key -out rootCA.crt
| # CodePipeline by default runs an execution whenever any change is detected in the configured source repository | |
| # We can use a CodePipeline Webhook resource to filter such executions. | |
| # | |
| # This is a snippet that would be part of a CloudFormation template containing | |
| # a CodePipeline resource (AWS::CodePipeline::Pipeline), named CodePipeline in this case, and | |
| # assumes the GutHub OAuth token is available in the parameter GitHubOAuthToken. | |
| # Typically a CodePipeline Webhook only contains the $.ref filter to check for | |
| # the desired branch. | |
| # However we can add up to 4 more filters, each of which can query the incoming webhook payload from Github. | |
| # Such payloads are of the form: |