Coming soon
Coming soon
Coming soon
Coming soon
Coming soon
Coming soon
Creat a new certificate for 'example.com' which is valid for 365 days. The key is in server.key and the cert is in server.crt
openssl req -nodes -x509 -newkey rsa:4096 -keyout server.key -out server.crt -days 365 -subj '/CN=example.com'
Export to PKCS12 file, certificate and key in X509 (pem) format
openssl pkcs12 -export -in server.crt -inkey server.key -out server.p12
Import from PKCS12 to X509 (pem) format
openssl pkcs12 -in server.p12 -nocerts -nodes -out server.key
openssl pkcs12 -in server.p12 -clcerts -nokeys -out server.crt
openssl verify -verbose -CAfile ca.crt server.crt
Coming soon
Just dumping various notes
Check SMTP STARTTLS
openssl s_client -showcerts -connect smtp.server:25 -starttls smtp
replace ^M (0x0d)
sed -i 's/\r//' tomcat/conf/server.xml
HTTP readiness check with curl. This one is for Elasticsearch availability
#!/bin/bash
while [ true ]; do
ES_STATUS="$(curl -s -w '%{http_code}' --insecure --connect-timeout 5 --max-time 10 -o /dev/null --noproxy '*' 'http://10.10.11.1:9200/_cluster/health?wait_for_status=green&timeout=5s')";
if [ $ES_STATUS -eq "200" ]
then
break;
fi
echo 'waiting for elasticsearch';
sleep 5;
done;
Password generation with simple shell commands
< /dev/urandom tr -dc A-Za-z0-9 | head -c${1:-16};echo;