This will only work with OpenPGP v2.0 or newer or with PIV cards. Your existing ssh key has to be in a format that is supported by your opengpg card. For example my the OpenPGP V2.1 Card from FLOSS Shop supports only 2048 bit RSA keys. RSA exponent should be 65537, Putty and old OpenSSH releases use different expnent that for example Yubikey does not support.
This is a plugin for Swagger UI that integrates the logout process with Keycloak.
When the user clicks "Logout" the logout page of Keycloak is called and then the user session is removed from Keycloak. To use this plugin you need to include the keycloak-logout.js
file in dist/index.html
and place oauth2-logout.html
in the dist folder.
The logout URL is taken from the authorizationUrl
removing the auth
string and replacing it with the logout
string.
Rember to add OAuthLogoutPlugin
to the plugins section of SwaggerUi configuration:
launch application "Microsoft Outlook" | |
launch application "Slack" | |
property startDate : current date | |
property endDate : startDate + (10 * minutes) | |
property cachedStatus : "" | |
property results : {} | |
property running : true | |
global emailAddress |
--- | |
- hosts: HOST | |
vars: | |
grafana_version: 2.5.0 | |
arch: amd64 | |
grafana_filename: grafana_{{ grafana_version }}_{{ arch }}.deb | |
tasks: | |
- name: Verify version | |
command: dpkg-query -W --showformat='${version}' grafana |
package com.example; | |
import com.google.inject.Injector; | |
import org.jboss.resteasy.plugins.guice.ModuleProcessor; | |
import org.jboss.resteasy.plugins.server.servlet.FilterDispatcher; | |
import org.jboss.resteasy.spi.Registry; | |
import org.jboss.resteasy.spi.ResteasyProviderFactory; | |
import javax.inject.Inject; | |
import javax.inject.Singleton; | |
import javax.servlet.FilterConfig; |
These are my notes basically. At first i created this gist just as a reminder for myself. But feel free to use this for your project as a starting point. If you have questions you can find me on twitter @thomasf https://twitter.com/thomasf This is how i used it on a Debian Wheezy testing (https://www.debian.org/releases/testing/)
Discuss, ask questions, etc. here https://news.ycombinator.com/item?id=7445545
Others have recently developed packages for this same functionality, and done it better than anything I could do. Use the packages instead of this script:
-
Gargoyle package by @lantis1008
-
OpenWRT package by @dibdot
In its basic usage, this script will modify the router such that blocked addresses are null routed and unreachable. Since the address blocklist is full of advertising, malware, and tracking servers, this setup is generally a good thing. In addition, the router will update the blocklist weekly. However, the blocking is leaky, so do not expect everything to be blocked.
# to generate your dhparam.pem file, run in the terminal | |
openssl dhparam -out /etc/nginx/ssl/dhparam.pem 2048 |
@(elements: views.html.helper.FieldElements) | |
@************************************************** | |
* Generate input according twitter bootsrap rules * | |
**************************************************@ | |
<div class="input-group @elements.args.get('_class) @if(elements.hasErrors) {has-error}" id="@elements.args.get('_id).getOrElse(elements.id + "_field")"> | |
<label class="sr-only" for="@elements.id">@elements.label(elements.lang)</label> | |
@elements.input | |
<div class="control-label" for="@elements.id">@elements.errors(elements.lang).mkString(", ")</div> |