Kubernetes: patch every array element using kubectl and jq.OpenWrt: bridge VLAN filtering for OpenWrt 21.x with DSA, isolated guest Wi-Fi.Linux: using openssl to encrypt and decrypt files and strings.Linux: using nmap to check the secure protocols and ciphers of a site.GCP: Google Cloud Storage bucket with permissions for user or service account.Ubuntu: ‘Connection to the Snap Store failed’ during upgrade from Ubuntu 20 to 22.Bash: using dig for reverse DNS lookup by IP.Kubernetes: list all pods in deployment.GKE: Determine Anthos on-prem GKE master node and IP address.Terraform: migrate state from local to remote Google Cloud Storage bucket and back.Python: fixing ‘CryptographyDeprecationWarning: Blowfish has been deprecated’. GKE: upgrade Anthos Config Management for GKE cluster.GKE: show pod distribution across nodes and zones.Ansible: generating templates with deep directory structure using with_filetree.Ansible: adding custom apt repository with ‘signed-by’ gpg key.GCP: Cloud Run/Function to handle requests to GKE cluster during maintenance.Kubernetes: using a delete patch with kustomize.GCP: deploying a Python WSGI Gunicorn app on Cloud Run.GKE: terraform lifecycle ‘ignore_changes’ to manage external changes to GKE cluster.GCP: determining whether GKE cluster mode is Standard or Autopilot.Bash: testing if a file exists, has content, and is recently modified.GCP: determining whether ASM is installed via asmcli or gcloud fleet.GitLab: generating URL that can be used for Merge Request from fork to upstream.Bash: counting number of times substring is found in directory.Terraform: fixing error “querying Cloud Storage failed: storage: bucket doesn’t exist”.Github: automated Github release of GoLang binary using Github Actions.Ubuntu: install latest git client from PPA to fix ‘unsafe repository’ errors.Github: automated Github release for Spring Boot jar using Github Actions.GCP: Cloud Run with build trigger coming from remote GitHub repository.GitLab: glab official CLI tool for repository operations.If you get upgrade message when running gh sudo apt install gh -only-upgrade # delete repo, first give auth scope to do deletions You will be prompted with a code and then a browser popup to authenticate this command. Key_id=(gh repo deploy-key list | cut -f1) If you want to remove the ssh key for auth loaded earlier. gh repo edit -visibility private Delete ssh key Now we will make this repository private so that only yourself and those you explicitly assign have visibility. Mv gke-acm-kustomize-public gke-acm-kustomize-privateĬd gke-acm-kustomize-private Make visibility private To prepare for making the visibility of this repo private (not viewable to the public), let’s rename it. Ssh-keygen -t rsa -b 4096 -C "$git_id" -N '' -f testkey If you want to provide authentication into this git repo for a 3rd party integration, then load the public side of an ssh keypair into the repository settings. gh config set -h git_protocol httpsįork one of my github public projects to your own personal fork (will be deleted in later step). ! First copy your one-time code: 1234-5678 ? Authenticate Git with your GitHub credentials? Yes You will be prompted to press, which opens a browser to for authentication. Sudo apt-key adv -keyserver -recv-key 23F3D4EA75716059 # if GPG error about signatures, add new signing key and try again # apt signing keyĬurl -fsSL | sudo dd of=/usr/share/keyrings/githubcli-archive-keyring.gpgĮcho "deb stable main" | sudo tee /etc/apt//github-cli.list > /dev/null GitHub has a CLI tool that allows you to perform many of the operations you may currently perform in the web UI.Īmong its many uses, the ‘ gh‘ utility will allow you to fork repositories, modify issues, merge PR, and create releases all from the console for ease of use or automation.īelow I will describe its installation on Ubuntu and then examples of usage.įrom the documentation, install ‘gh’ using apt for Debian/Ubuntu.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |