
Security News
The Hidden Blast Radius of the Axios Compromise
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.
light-deploy
Advanced tools
centos7 启动出错
zabbix-agent
docker run docker info docker images docker logs docker top 查看容器内的进程 docker exec docker stop docker rm 删除容器 docker ps -a 查看容器列表 docker rmi 删除镜像 docker cp 拷贝容器内文件
-i STDIN开启 -t 为容器分配tty终端 -d daemon模式启动 --name 设定容器名称 --restart 自动重启 --rm 自动删除
--privileged 允许操作iptables?
-f 日志跟踪 -t 加时间戳
docker exec -t -i 9b30e9a6c9a3 /bin/bash
docker rm docker ps -a -q
docker cp $ID:/var/jenkins_home
docker build -t="alphabets/nginx:v0.0.1" nginx
docker inspect -f '{{ .Volumes }}' source
jenkins的数据 怎么办?通过画面设定的内容,是否可以共享
nginx的log怎么办 使用通用的log容器?
docker tag 24dd746e9b9f docker.light.cn/registry:latest
docker run -p 8080:8080 -v /var/jenkins_home -d --name jenkins 4e288907973a
docker run -p 80:80 --link jenkins:jenkins -d --name nginx 23a528ae15fc
docker run --name data e42b62c80cb6 true
http://zgu.me/blog/2014/08/25/how-to-start-pm2-server-in-a-docker-container/
centos 7.1.1503 busybox latest registry 2.0.0
http://www.hilotech.jp/blog/it/290 http://thinkit.co.jp/story/2015/01/29/5501
port docker registry - 5000 bind - 53 squid - 3128
docker ps --no-trunc -aqcurl -O http://www.alphabets.cn/lib/ca-certificates.crt
cat fastfix_data.tar | docker import - docker.light.cn/fastfix_data:0.0.1
http://alvinhenrick.com/2015/01/26/docker-backup-and-restore-volume-container/
$ docker inspect -f "{{.Volumes}}" test
删除一行 sh -c "sed -i '/^b.*/d' /data/test"
http://www.mk-mode.com/octopress/2014/08/13/centos-7-0-installation-of-bind/ http://centossrv.com/bind.shtml http://kajuhome.com/bind.shtml
squid代理
env http_proxy 10.251.137.130:3128
copy ca.crt to /etc/ssl/certs/ca-certificates.crt restart docker
################### 生成Self Signed证书 # 生成一个key,你的私钥,openssl会提示你输入一个密码,可以输入,也可以不输, # 输入的话,以后每次使用这个key的时候都要输入密码,安全起见,还是应该有一个密码保护
openssl genrsa -des3 -out selfsign.key 4096
openssl req -new -key selfsign.key -out selfsign.csr
openssl x509 -req -days 365 -in selfsign.csr -signkey selfsign.key -out selfsign.crt
# 另外一个比较简单的方法就是用下面的命令,一次生成key和证书
openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout privateKey.key -out certificate.crt
生成自己的CA (Certificate Authority) # 生成CA的key
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
openssl genrsa -des3 -out light.key 4096 openssl req -new -key light.key -out light.csr
openssl x509 -req -days 365 -in light.csr -CA ca.crt -CAkey ca.key -set_serial 01 -out light.crt
查看证书
openssl rsa -noout -text -in myserver.key
openssl req -noout -text -in myserver.csr
openssl x509 -noout -text -in ca.crt
openssl verify selfsign.crt
openssl verify -CAfile ca.crt myserver.crt
去掉key的密码保护 有时候每次都要输入密码太繁琐了,可以把Key的保护密码去掉
openssl rsa -in light.key -out light.key.insecure
不同格式证书的转换
openssl pkcs12 -in myserver.pfx -out myserver.pem -nodes
openssl x509 -outform der -in myserver.pem -out myserver.[der|crt]
openssl RSA -in myserver.pem -out myserver.key
openssl x509 -inform der -in myserver.[cer|crt] -out myserver.pem
openssl pkcs12 -export -out myserver.pfx -inkey myserver.key -in myserver.pem -certfile ca.crt
测试证书 Openssl提供了简单的client和server工具,可以用来模拟SSL连接,做测试使用。
openssl s_client -connect www.google.com.hk:443
openssl s_server -accept 443 -cert myserver.crt -key myserver.key -www
cat myserver.crt myserver.key > myserver.pem
openssl s_server -accept 443 -cert myserver.pem -www
openssl s_client -connect www.google.com.hk:443 </dev/null | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > remoteserver.pem
openssl x509 -outform der -in remoteserver.pem -out remoteserver.cer
计算MD5和SHA1
openssl dgst -md5 filename
openssl dgst -sha1 filename
TTL 客户端保存缓存的时间 SOA Serial zone文件版本 NS DNS服务器名 MX 10 邮件服务器名 @ 符号代表完整的FQDN * A IP地址 CNAME 别名
$TTL 3600 @ IN SOA light.cn. admin.light.cn.( 2015050101; Serial 28800 ; Refresh 14400 ; Retry 3600000 ; Expire 86400 ) ; Minimum IN NS light.cn. @ IN A 10.251.137.130
IN A 10.251.137.130
docker IN A 10.251.137.130 salt IN A 10.164.24.247
让缓存失效
yum -y install bind-utils
会有如下错误 reply from unexpected source expected
bind的自域名需要在/etc/hosts里登录,如下dig docker IN A 10.163.170.150 salt IN A 10.163.170.150 zabbix IN A 10.163.170.150 controller IN A 10.163.170.150 mysql IN A 10.163.170.150
10.163.170.150 salt
~$ head /etc/*release DISTRIB_ID=Ubuntu DISTRIB_RELEASE=12.04 DISTRIB_CODENAME=precise DISTRIB_DESCRIPTION="Ubuntu 12.04.1 LTS"
Code: $ uname -a Linux anacreon 3.4.2-linode44 #1 SMP Tue Jun 12 15:04:46 EDT 2012 i686 i686 i386 GNU/Linux]
du -h -s * ll -h
squidclient -h 127.0.0.1 -p 3128 mgr:info >> hit.log
cat /var/log/squid/access.log | grep HIT | wc -l cat /var/log/squid/access.log | grep MISS | wc -l
FAQs
1. 安装 # yum install docker -y # service start docker # chkconf on docker
We found that light-deploy demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
The Axios compromise shows how time-dependent dependency resolution makes exposure harder to detect and contain.

Research
A supply chain attack on Axios introduced a malicious dependency, plain-crypto-js@4.2.1, published minutes earlier and absent from the project’s GitHub releases.

Research
Malicious versions of the Telnyx Python SDK on PyPI delivered credential-stealing malware via a multi-stage supply chain attack.