I hereby claim:
- I am project0 on github.
- I am project0de (https://keybase.io/project0de) on keybase.
- I have a public key ASBMfyNXnIQJRhj8GIDZ41EQWIdtNC1KRUZv2X4tKAQfvAo
To claim this, I am signing this object:
| 2023-03-08T15:25:47.777+0100 [INFO] Terraform version: 1.3.9 | |
| 2023-03-08T15:25:47.777+0100 [DEBUG] using github.com/hashicorp/go-tfe v1.9.0 | |
| 2023-03-08T15:25:47.777+0100 [DEBUG] using github.com/hashicorp/hcl/v2 v2.16.0 | |
| 2023-03-08T15:25:47.777+0100 [DEBUG] using github.com/hashicorp/terraform-config-inspect v0.0.0-20210209133302-4fd17a0faac2 | |
| 2023-03-08T15:25:47.777+0100 [DEBUG] using github.com/hashicorp/terraform-svchost v0.0.0-20200729002733-f050f53b9734 | |
| 2023-03-08T15:25:47.777+0100 [DEBUG] using github.com/zclconf/go-cty v1.12.1 | |
| 2023-03-08T15:25:47.777+0100 [INFO] Go runtime version: go1.19.6 | |
| 2023-03-08T15:25:47.777+0100 [INFO] CLI args: []string{"terraform", "apply", "-var-file", "main.tfvars.json", "-lock=false"} | |
| 2023-03-08T15:25:47.777+0100 [DEBUG] Attempting to open CLI config file: /home/rhillmann/.terraformrc | |
| 2023-03-08T15:25:47.777+0100 [INFO] Loading CLI configuration from /home/rhillmann/.terraformrc |
| #!/bin/bash | |
| function awsssologin() { | |
| local envexport="$1" isretry="$2" | |
| local cache expires login=false | |
| local awsbin=/usr/bin/aws | |
| if [[ -d "$HOME/.aws/sso/cache" ]]; then | |
| for cache in "$HOME"/.aws/sso/cache/*.json; do | |
| if ! grep -q "startUrl" "$cache" || ! grep -q "expiresAt" "$cache"; then |
I hereby claim:
To claim this, I am signing this object:
| package main | |
| import ( | |
| "github.com/traefik/yaegi/interp" | |
| "github.com/traefik/yaegi/stdlib" | |
| ) | |
| const code = ` | |
| package main |
| # This can be any public reachable interface | |
| # basically the one connected to the internet (native or bridged) | |
| [Match] | |
| Name=eth1 | |
| [Network] | |
| # your normal interface address example: 10.1.1.2/24 | |
| Address=<LOCAL_IPV4>/<NETMASK> | |
| Gateway=<LOCAL_IPV4_GW> # local ip gw e.g 10.1.1.1 |
| #!/bin/bash | |
| function awskmsencrypt() { | |
| key="$1" | |
| text="$2" | |
| aws kms encrypt --key-id "$key" --plaintext fileb://<(echo "$text") --output text --query CiphertextBlob | |
| } | |
| function awskmsdecrypt() { | |
| crypt="$1" #base64 |
| AWSTemplateFormatVersion: '2010-09-09' | |
| Description: Site to Site VPN | |
| Parameters: | |
| RemoteIP: | |
| Description: Remote IP for the ipsec connection | |
| Type: String | |
| RemoteCIDR: | |
| Description: The destination network CIDR | |
| Type: String |
| [req] | |
| distinguished_name = req_distinguished_name | |
| req_extensions = v3_req | |
| prompt = no | |
| [req_distinguished_name] | |
| C = DE | |
| ST = BY | |
| L = Munich | |
| O = Corp | |
| OU = IT |
| package passwordresetservice | |
| import ( | |
| "crypto/tls" | |
| "fmt" | |
| ldap "github.com/go-ldap/ldap" | |
| "golang.org/x/text/encoding/unicode" | |
| ber "gopkg.in/asn1-ber.v1" | |
| ) |