Table des matières
- 2026:
- 2025:
8 billet(s) pour mars 2026
| Notes conteneurs oras artifact OCI | 2026/03/23 21:13 | Jean-Baptiste |
| Notes podman secret | 2026/03/23 15:10 | Jean-Baptiste |
| Notes ansible podman | 2026/03/23 14:08 | Jean-Baptiste |
| Notes podman volume | 2026/03/23 14:00 | Jean-Baptiste |
| Find list - Trouver des fichiers à partir d'une liste | 2026/03/18 14:32 | Jean-Baptiste |
| AWX inventaire vault | 2026/03/17 18:04 | Jean-Baptiste |
| AWX - Configuration git en local (sans serveur web) | 2026/03/05 16:24 | Jean-Baptiste |
| OpenSMTP | 2026/03/03 16:58 | Jean-Baptiste |
Notes Sqlite
Voir :
Voir aussi :
- unqlite
- PocketBase (Rest API pour SQLite)
- SQLCipher
sqlite databasename.sqlite .dump | sqlite3 databasename.sqlite3
sqlite3 base.db VACUUM;
There are a few steps to see the tables in an SQLite database:
List the tables in your database:
.tables
List how the table looks:
.schema tablename
Print the entire table:
SELECT * FROM tablename;
List all of the available SQLite prompt commands:
.help
Firefox
cd ~/.mozilla/firefox/*.default
Chercher un motif dans toutes les tables et champs
sqlite3 places.sqlite .dump |grep acme\.fr |awk '{print $3}' |sort -u
"moz_hosts" "moz_favicons" "moz_places"
Effacer
A faire : jointures
Méthode 1
sqlite3 places.sqlite
SELECT * FROM moz_hosts WHERE host LIKE "%plop.fr%" DELETE FROM moz_hosts WHERE host LIKE "%plop.fr%"
Méthode 2
cp -p places.sqlite places.sqlite.bck sqlite3 places.sqlite.bck .dump | grep -v 'plop\.fr' |sqlite3 places.sqlite
GUI
Liste :
- Extension Firefox “SQLite Manager”
- sqlitebrowser
Notes souris pave numérique
Voir :
cat /proc/bus/input/devices
- /etc/default/grub
GRUB_CMDLINE_LINUX_DEFAULT="psmouse.proto=bare"
update-grub
modprobe -r psmouse
modprobe psmouse
Voir /sys/module/psmouse/parameters/
Pb
Pb souris : http://ubuntuforums.org/showthread.php?t=2253552
sudo rmmod psmouse sleep 3 sudo modprobe psmouse
Diag
La souris est-elle vraiment détectée ?
xinput --list
Voir
lsusb
dmesg
Notes Sonar SonarQube LDAP
Voir :
Voir aussi :
- Checkmarx - KICS
- MegaLinter
sonar/sonarqube-6.7.1/conf/sonar.properties
sonar.jdbc.username=sonar sonar.jdbc.password=P@ssw0rd sonar.jdbc.url=jdbc:postgresql://localhost/sonar # General Configuration sonar.security.realm=LDAP ldap.url=ldap://acme.local:389 ldap.bindDn=admin ldap.bindPassword=P@ssw0rd # User Configuration ldap.user.baseDn=DC=acme,DC=local ldap.user.request=(&(objectClass=user)(sAMAccountName={login})) ldap.user.realNameAttribute=cn ldap.user.emailAttribute=mail # Group Configuration #ldap.group.baseDn=ou=Groups,dc=sonarsource,dc=com #ldap.group.request=(&(objectClass=posixGroup)(memberUid={uid}))
Err
org.sonar.plugins.ldap.LdapException: Unable to retrieve details for user in <default>
NC
LdapUserMapping{baseDn=cn=users,dc=acme,dc=local, request=(&(objectClass=user)(sAMAccountName={0})), realNameAttribute=cn, emailAttribute=mail}
ldapsearch -D admin -W -h acme.local -b "DC=acme,DC=local" "(&(objectClass=user)(sAMAccountName=user))"
Service SystemD
Voir exemple_4_-_systemd_appelant_un_script_sysv_init systemd_service_-_exemples
Notes socket Unix
Voir :
netstat -ln | grep mysql ss -x netstat --unix cat /proc/net/unix
Connect to an existing stream socket
nc -U /path/to/socket
Create a listening stream socket
nc -lU /path/to/socket
# lsof -U -a -p $(pidof mysqld) COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME mysqld 1766 mysql 18u unix 0xffffa0c0b6f97800 0t0 26264 /var/run/mysqld/mysqld.sock type=STREAM
sudo curl -v --unix-socket /var/run/crio/crio.sock http://localhost/info | jq
Podman
$ sudo curl -H "Content-Type: application/json" --unix-socket /var/run/docker.sock http://localhost/_ping OK
Unit socket SystemD
Notes socat
Dance, Socat Dance !
Voir aussi :
- OpenSSL Proxy http_proxy / proxytunnel
Voir également spiped :
Voir :
- netsed
Exemple
socat TCP4-LISTEN:10053,reuseaddr,fork,su=nobody TCP4:10.9.0.6:10050
Mais la bonne solution est :
iptables -t nat -A PREROUTING -i eth0 -p tcp -m tcp --dport 10053 -j DNAT --to-destination 10.9.0.6:10050 iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE
TUN
TUN Server
socat -d -d TCP-LISTEN:11443,reuseaddr TUN:192.168.255.1/24,up
After starting this command, socat will wait for a connection and then create a TUN pseudo network device with address 192.168.255.1; the bit number specifies the mask of the network that is pretended to be connected on this interface.
TUN Client
socat TCP:1.2.3.4:11443 TUN:192.168.255.2/24,up
This command should establish a connection to the server and create the TUN device on the client.
OpenVPN
http://serverfault.com/questions/580442/tunnel-over-http-server
OpenVPN sur le port 443
socat TCP-LISTEN:9999,bind=localhost OPENSSL:proxy.example.com:443
Socket Unix
https://www.ffdn.org/wiki/doku.php?id=documentation:openvpn:fdn
socat /var/run/openvpn.management.serveur EXEC:"echo kill foo@vpn.fdn.fr"
echo "status 3" | socat stdio /var/run/openvpn.mgmt
Tunnel SSH Over SCTP
http://0x27.me/2015/07/27/SSH-Over-SCTP.html
assuming you want the SCTP socket to listen on port 80/SCTP and sshd is on 22/TCP
socat SCTP-LISTEN:80,fork TCP:localhost:22
replace SERVER_IP with IP of listening server, and 80 with whatever port the SCTP listener is on :)
socat TCP-LISTEN:1337,fork SCTP:SERVER_IP:80
replace username and -p port value as needed…
ssh -lusername localhost -D 8080 -p 1337 #
Décapsuler HTTPS
socat TCP-LISTEN:8082,reuseaddr,pf=ip4,fork OPENSSL:192.168.51.142:443,verify=0
Autres
echo "GET hosts" | socat - TCP4:127.0.0.1:6557,crnl
socat -ls TCP4-LISTEN:443,fork,reuseaddr TCP4:10.96.0.1:443
