Attention: this is the key used to sign the certificate requests, anyone holding this can sign certificates on your behalf. So keep it in a safe place!
openssl genrsa -des3 -out rootCA.key 4096
def pattern = Pattern.compile("ru/home/generated/${opt.specService}/(?:rest|configuration)/(\\w*)/?.*") | |
exclude { tree -> | |
def matcher = pattern.matcher(tree.path) | |
matcher.matches() ? matcher.group(1) != opt.apiType : false | |
} |
sudo setfacl -m user:$USER:rw /var/run/docker.sock |
1. Скачать и распаковать архивы | |
https://download.oracle.com/otn_software/linux/instantclient/1920000/instantclient-basic-linux.x64-19.20.0.0.0dbru.zip | |
https://download.oracle.com/otn_software/linux/instantclient/1920000/instantclient-tools-linux.x64-19.20.0.0.0dbru.zip | |
2. выполнить команды | |
export LD_LIBRARY_PATH=/<path_to_instant_client>/instantclient_19_20:${LD_LIBRARY_PATH} |
/etc/yum.conf | |
proxy=http://host:port | |
proxy_password=P@ssw0RD | |
proxy_username=username | |
proxy_auth_method=basic |
SSLHandshakeException: PKIX: unable to find valid certification path to requested target | |
This solution relates to the following stacktrace: | |
javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: | |
sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target. | |
We experienced this issue when a server changed their HTTPS SSL certificate, and our older version of Java did not recognize the root certificate authority (CA). | |
If you can access the HTTPS URL in your browser then it is possible to update Java to recognize the root CA. | |
In your browser, go to the HTTPS URL that Java could not access. Click on the HTTPS certificate chain (there is lock icon in the Internet Explorer, or the domain name left of the URL in firefox) and navigate the certificate hierarchy. At the top there should be a Primary Root CA. This could be missing from your java cacerts file. Note down the Issuer and Serial Number. |
chmod 6751 $ORACLE_HOME/bin/* |
-Djdk.tls.client.protocols=TLSv1.2 |
openssl genrsa -out keypair.pem 2048 | |
To extract the public part, use the rsa context: | |
openssl rsa -in keypair.pem -pubout -out publickey.crt | |
Finally, convert the original keypair to PKCS#8 format with the pkcs8 context: | |
openssl pkcs8 -topk8 -inform PEM -outform PEM -nocrypt -in keypair.pem -out pkcs8.key |
var clipboardData = window.clipboardData || event.clipboardData || event.originalEvent && event.originalEvent.clipboardData; | |
var pastedText = clipboardData.getData("Text") || clipboardData.getData("text/plain"); | |
if (!pastedText && pastedText.length) { | |
return; | |
} | |
// Parse the pasted text from Excel into rows. | |
// Pasted text is usually separated by a new line for each row, |