• 0 Posts
  • 79 Comments
Joined 2 years ago
cake
Cake day: June 12th, 2023

help-circle



  • I started with a $30 cheapo 10 years ago and it was life changing. Last year I got a stupid expensive one. Like, has a night light, auto flush (because I got the matching toilet), auto lid, heated seat, heated water, deodorizer, wireless remote, etc. (Toto S7A)

    Just so you’re prepared, the air dry doesn’t fully replace the pat dry entirely unless you’re gonna sit there for a good long time.

    That said, I have no regrets.


  • Been experiencing random rendering glitches in Firefox since upgrading to 570.

    Before that it was random video memory allocation faults after playing a game for some time.

    And then there was the whole year where Wayland stopped working entirely after finally getting support.

    But I guess you’re right, it’s definitely miles better than when I got the cursed thing 5 years ago.




  • Scrubbing a little demo project I made featuring a web app behind oauth2-proxy leveraging keycloak as local idp with social login. It also uses a devcontainer config for development. The demo app uses the Litestar framework (fka starlite, in Python) because I was interested, but it’s hardly the focus. Still gotta put caddy in front of it all for easy SSL. Oh, and clean up all the default secrets I’ve strewn about with appropriate secret management.

    All of it is via rootless podman and declarative configuration.

    Think I might have to create my own Litestar RBAC plugin that leverages the oauth headers provided by the proxy.

    It has been a minute since I worked daily in this space, so it has been good to dust off the cobwebs.


  • Definitely looks like a nice improvement. Functions very like cloud provider CLI SSO, but with a generic tool.

    I think for an enterprise use case, supporting the use of the groups claim (or other configurable scopes) is table stakes. Although in those situations, I’ve also had to use other tools like teleport that come with other enterprise niceties like full session audit capture and playback.

    And while everyone should do their own threat and risk modeling, you’ve now made your ssh connection dependent on an external service that likely needs to reach out over the internet.