Skip to content

Instantly share code, notes, and snippets.

Architecture Overview

This document describes the architecture of the Kubernetes Kind cluster setup and its components.

Cluster Architecture

Node Topology

The cluster consists of 6 nodes:

Implement Full Procountor Bookkeeping Suite

Approach

Generate router modules for all 27 API categories from the OpenAPI spec. Each router will:

  • Use the existing ProcountorClient via app/dependencies.py
  • Define endpoint stubs that extract path/query params and forward to the client
  • Use generic dict[str, Any] for request/response bodies
  • Include docstrings from the OpenAPI spec summaries

Kirjanpitolain ja -asetuksen noudattaminen

Tämä dokumentti kuvaa, miten sovellus noudattaa Suomen kirjanpitolakia (KPL) ja kirjanpitoasetusta (KPA).

Kirjanpitolaki (KPL)

1 luku - Soveltamisala ja yleiset periaatteet

KPL 1:1 § - Kirjanpitovelvolliset

@Aciid
Aciid / rename.ps1
Created February 10, 2024 22:37
Acronis Trueimage - Remove hash from recovered files
# .\rename.ps1 -Operation DryRun -Path "D:\"
# .\rename.ps1 -Operation Rename -Path "D:\"
# Logs to D:\file_operations.log
param (
[Parameter(Mandatory=$true)]
[ValidateSet("DryRun", "Rename")]
[string]$Operation,
[Parameter(Mandatory=$true)]
```
Step CA existing PKI
1.run on your workstation
step certificate create "ca.internal.domain.tld" intermediate_ca.csr intermediate_ca_key --csr
2.run on windows root-ca
certreq -submit -attrib "CertificateTemplate:SubCA" intermediate_ca.csr intermediate_ca.crt
3.re-submit, if necessary
@Aciid
Aciid / HTB-CTF-REMOVE-FEED.js
Last active March 18, 2023 16:46
HTB-CTF-REMOVE-FEED
// ==UserScript==
// @name HTB-CTF-REMOVE-FEED
// @namespace http://tampermonkey.net/
// @version 0.1
// @description try to take over the world!
// @author You
// @match https://ctf.hackthebox.com/*
// @icon data:image/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==
// @grant none
// ==/UserScript==
@Aciid
Aciid / readme.md
Created August 15, 2018 13:06
Parrot ANAFI MPP peristance hack via firmware

1GB NAND SIMULATION sudo modprobe nandsim first_id_byte=0xec
second_id_byte=0xd3
third_id_byte=0x51
fourth_id_byte=0x95


dmesg [ 1541.400413] [nandsim] warning: read_byte: unexpected data output cycle, state is STATE_READY return 0x0 [ 1541.400415] [nandsim] warning: read_byte: unexpected data output cycle, state is STATE_READY return 0x0