cat json | jq -r '(.[0] | keys_unsorted) as $keys | $keys, map([.[ $keys[] ]])[] | @csv'
Create a file named filter.jq
xattr -d com.apple.quarantine /path/to/file |
1) Create a branch with the tag | |
git branch {tagname}-branch {tagname} | |
git checkout {tagname}-branch | |
2) Include the fix manually if it's just a change .... | |
git add . | |
git ci -m "Fix included" | |
or cherry-pick the commit, whatever is easier | |
git cherry-pick {num_commit} | |
Various unicode utilities | |
https://www.online-toolz.com/tools/text-unicode-entities-convertor.php |
## To fetch a cert chain and make server.crt ## | |
openssl s_client -showcerts -verify 5 -servername aaacertificateservices.test.certificatetest.com -connect aaacertificateservices.test.certificatetest.com:443 | |
## To view validity | |
echo | openssl s_client -servername api.snapp.site -connect api.snapp.site:443 2>/dev/null | openssl x509 -noout -dates | |
#!/bin/bash | |
# Run sudo visudo and whitelist your user, eg | |
#qasim ALL=(ALL) NOPASSWD: /usr/local/bin/openfortivpn | |
#qasim ALL=(ALL) NOPASSWD: /usr/bin/killall -2 openfortivpn | |
VPN_EXECUTABLE=/usr/local/bin/openfortivpn | |
VPN_EXECUTABLE_PARAMS="-c $HOME/vpn" # Optional | |
VPN_INTERFACE=ppp0 | |
# Command to determine if VPN is connected or disconnected | |
VPN_CONNECTED="/sbin/ifconfig | egrep -A1 $VPN_INTERFACE | grep inet" |
echo "show errors" | socat unix-connect:/var/lib/haproxy/run/haproxy.sock stdio | more
wget -c https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-amd64.tgz
ngrok http
# First, setup the vpn on your pi-zero. For me, this entails | |
openfortinet -c vpn | |
# This will create a ppp0 interface, via which we want to allow tunneling to the whole network. | |
sysctl -w net.ipv4.ip_forward=1 | |
iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE |