Hardware: a TPM 2.0 module based on Infineon SLB9665 cryptographic processor available in the system as /dev/tpmrm0.
Required software:
# pacman -S tpm2-tools tpm2-pkcs11
| # Additional Fish completions for Jujutsu | |
| # https://gist.github.com/bnjmnt4n/9f47082b8b6e6ed2b2a805a1516090c8 | |
| # TODO: passthru other args? E.g.. --at-operation, --repository | |
| function __jj | |
| command jj --ignore-working-copy --color=never --quiet $argv 2> /dev/null | |
| end | |
| # Aliases | |
| # Based on https://github.com/fish-shell/fish-shell/blob/cd71359c42f633d9d71a63591ae16d150407a2b2/share/completions/git.fish#L625. |
| --- | |
| apiVersion: apps/v1 | |
| kind: DaemonSet | |
| metadata: | |
| name: local-ssd-init | |
| labels: | |
| app: local-ssd-init | |
| spec: | |
| template: | |
| spec: |
| terraform { | |
| required_providers { | |
| google = { | |
| source = "hashicorp/google" | |
| version = ">= 3.37" | |
| } | |
| google-beta = { | |
| source = "hashicorp/google-beta" | |
| version = ">= 3.37" | |
| } |
| echo -e '\e[0mnormal\e[0m' | |
| echo -e '\e[2mdim\e[0m' | |
| echo -e '\e[1mbold\e[0m' | |
| echo -e '\e[3mitalic\e[0m' | |
| echo -e '\e[2;3mdim italic\e[0m' | |
| echo -e '\e[1;3mbold italic\e[0m' | |
| echo |
| [global] | |
| workgroup = WORKGROUP | |
| log file = /var/log/samba/log.%m | |
| max log size = 1000 | |
| server role = standalone server | |
| security = user | |
| map to guest = Bad Password | |
| server multi channel support = yes | |
| load printers = no | |
| printing = bsd |
| #!/usr/bin/env bash | |
| # Vault Token helper for the Linux key retention service. | |
| # | |
| # Since version 2.6, the Linux kernel has included a efficiently store | |
| # authentication data on a per thread, per process, per user, or per session | |
| # bases. | |
| # | |
| # Linux Key Management Utilities (keyutils) provides `keyctl` to control | |
| # the facility from the shell. |
| This guide assumes that you have already set up a Ubiquiti Unifi VPN following the guide: | |
| https://help.ubnt.com/hc/en-us/articles/115005445768-UniFi-L2TP-Remote-Access-VPN-with-USG-as-RADIUS-Server | |
| To configure a Linux machine to be able to connect remotely I followed these steps. This guide was written for Debian 8. | |
| - In Debian install the "xl2tpd" and "strongswan" packages. | |
| - Edit /etc/ipsec.conf to add the connection: | |
| conn YOURVPNCONNECTIONNAME |
| /* | |
| * We're going to demonstrate how to use Finagle's Stack facilities to inject behavior | |
| * deep down in Finagle's stack. Namely, we want to capture the address of a remote | |
| * server in that server's response. | |
| * | |
| * While retrieving a client address is something that perhaps deserves a first-class | |
| * API, it's nevertheless interesting to exercise the flexbility of the Stack mechanism. | |
| * | |
| * This code uses only public APIs. | |
| * |