wg genkey | tee privatekey | wg pubkey > publickey
curl https://api.mullvad.net/wg/ -d account=YOUR_ACCOUNT_NUMBER --data-urlencode pubkey="$(cat publickey)"
FROM postgres:17 | |
# Install build dependencies, build pgjwt, and clean up | |
RUN apt-get update -qq && apt-get install -qq --no-install-recommends \ | |
build-essential \ | |
git \ | |
postgresql-server-dev-17 \ | |
ca-certificates \ | |
&& git clone --depth 1 https://github.com/michelp/pgjwt.git /tmp/pgjwt \ | |
&& make -C /tmp/pgjwt install \ |
# This runbook deletes all resource groups under a management group except for the ones with a specific tag. | |
<# | |
.SYNOPSIS | |
Deletes all resource groups under a management group except for the ones with a specific tag. | |
.DESCRIPTION | |
This script deletes all resource groups under a specified management group except for the ones with a specific tag. It can also delete policy assignments and subscription role assignments if specified. | |
.PARAMETER ManagementGroupId | |
The ID of the management group to delete resource groups under. WARNING: This script will delete all resource groups under the specified management group except for the ones with the specified tag. Make sure you have specified the correct management group ID, or you may accidentally delete resources that you did not intend to delete. |
Write-Host "Hello-World!" |
instance_class: | |
module: dagster_cloud.instance | |
class: DagsterCloudAgentInstance | |
dagster_cloud_api: | |
agent_token: <YOUR_AGENT_TOKEN> | |
deployment: prod | |
user_code_launcher: | |
module: dagster_cloud.workspace.user_code_launcher |
#!/bin/sh | |
if [ "$USER" != "root" ]; then | |
SUDO="sudo " | |
fi | |
$SUDO tpm2_readpublic -Q -c 0x81010001 -o ek.pub 2> /dev/null | |
if [ $? -gt 0 ]; then | |
# Create the endorsement key (EK) | |
$SUDO tpm2_createek -c 0x81010001 -G rsa -u ek.pub |
import json | |
import argparse | |
from azure.cli.core import get_default_cli | |
# TODO: Wrap all required calls login/fetch/upload into a single call of this script or if you have time perform lookups and offer CLI style options | |
# Store JSON file from AZ CLI as: 'az pipelines variable-group show --group-id 136 --org "https://dev.azure.com/ORG/" --project "PROJECT NAME" --output json>136.json' | |
# Run as: 'python3 az-devops-import-variables.py -s 136.json -id 150 -project "project-uid" -org "https://dev.azure.com/ORG/"' | |
parser = argparse.ArgumentParser(description="Azure DevOps Variable import", formatter_class=argparse.RawTextHelpFormatter) |
#Get Token using Azure scope | |
curl -s 'http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https%3A%2F%2Fmanagement.azure.com%2F' -H Metadata:true | |
#Get Token using storage scope | |
curl 'http://169.254.169.254/metadata/identity/oauth2/token?api-version=2018-02-01&resource=https%3A%2F%2Fstorage.azure.com%2F' -H Metadata:true -s | |
#^Could use jq if/when available | |
# Store the token in variable | |
ACCESS_TOKEN="RESPONSE_TOKEN" |
const https = require('https'); | |
const options = { | |
hostname: 'portal-uat-v5.australiansuper.com', | |
port: 443, | |
path: '/', | |
method: 'GET' | |
}; | |
const req = https.request(options, (res) => { |
using namespace System.Net.Sockets | |
using namespace System.Net.Security | |
using namespace System.Security.Cryptography.X509Certificates | |
function Test-ServerSSLSupport { | |
[CmdletBinding()] | |
param( | |
[Parameter(Mandatory = $true, ValueFromPipeline = $true)] | |
[ValidateNotNullOrEmpty()] | |
[string]$HostName, |