Vmware github

Vmware github DEFAULT

Using Git with shared folders and virtual machines

Bridge

By Mike Jackson, Software Architect.

This is a guide on using Git and GitHub within a VMWare virtual machine (VM) which, for whatever reason (e.g. organisational security policies), cannot be connected to a network.

Why write this guide?

This guide arose from our open callcollaboration with the Distance project at the University of St. Andrews. They use Windows XP virtual machines for developing their Distance for Windows software. Their interface code, implemented in Visual Basic, is not held under revision control and institutional security policies mean that their XP virtual machines cannot be connected to the network. Please see the blog post on Building a bridge between a virtual machine and the outside world.

Assumptions

  • You have a VMWare virtual machine that cannot be connected to the network directly.
  • Your host machine that run the virtual machine, can be connected to the network.
  • You have a repository on GitHub.
  • You have GitBash installed on both your host machine and VM.

Set up a shared folder

Set up shared folder within the VM using VMWare Player:

  • Select Player => Manage => Virtual Machine Settings...
  • Click Options tab
  • Click Shared Folders
  • Click Always enabled OR Enabled until next power off or suspend
  • Click Add...
  • Select Host path, the folder on the host machine to be shared with the VM e.g.: C:\Users\user\project-shared
  • A name for the shared folder e.g. project-shared
  • Click Next
  • Click Finish
  • Click OK
  • On the VM, under My Computer, the shared folder should appear, for example, as "Shared Folder on 'vmware-host' (Z:) Network Drive".
  • On Git Bash on the VM, this should appear as /z/project-shared.

Set up the repository

Check out the repository on the host:

  • Start Git Bash.
  • Change into the shared folder on the host e.g. cd /c/users/user/project-shared
  • Clone the forked repository: git clone https://github.com/USERNAME/project.git cd project​
  • You can now use /z/project-shared/project/ from within Git Bash to commit local changes.

Using the repository

When you want changes passed up to GitHub:

  • Within Git Bash on the host, change into the shared folder repository and push the changes to GitHub e.g. cd /c/users/user/project-shared/project/ git push origin master

When you want changes pulled down from GitHub:

  • Within Git Bash on the host, change into the shared folder repository and pull the changes from GitHub e.g. cd /c/users/user/project-shared/project git pull origin master

Adding another repository to circumvent shared folder issues

Certain software may not be usable with files hosted within shared folders. For such software, an additional repository, local to the VM, can be introduced providing a Git repository within the VM but outwith the shared folder, which nevertheless can push and pull changes to and from the shared folder repository.

After cloning the repository into the shared folder on the host, set up a local repository on the VM.

  • Start Git Bash.
  • Look at the shared folder repository on the host to see the forked repository e.g. ls /z/project-shared/project/
  • Clone this into a local repository C:\project-local e.g. cd /c git clone file:///z/project-shared/project project-local
  • There should be a Git remote set up for the shared folder repository e.g. cd project-local git remote -v origin file:///z/project-shared/project (fetch) origin file:///z/project-shared/project (push)
  • In the shared folder repository, set up a Git remote to this clone e.g. cd /z/project-shared/project git remote add local file:///c/project-local git remote -v local file:///c/project-local (fetch) local file:///c/project-local (push) origin https://github.com/USER/project.git (fetch) origin https://github.com/USER/project.git (push)
  • You can now use /c/project-local from within Git Bash to commit local changes.

When you want changes passed up to GitHub:

  • Within Git Bash on the VM, change into the shared folder repository and pull the changes from the local repository e.g. cd /z/project-shared/project git pull local master
  • Within Git Bash on the host, change into the shared folder repository and push the changes to GitHub e.g. cd /c/users/user/project-shared/project git push origin master

When you want changes pulled down from GitHub:

  • Within Git Bash on the host, change into the shared folder repository and pull the changes from GitHub e.g. cd /c/users/user/project-shared/project git pull origin master
  • Within Git Bash on the VM, change into the local repository and pull the changes from the shared folder repository e.g. git /c/project-local git pull origin master
Sours: https://www.software.ac.uk/resources/guides-everything/using-git-shared-folders-and-virtual-machines-3

Open Source Program Office

What is Mangle?

Mangle enables you to run chaos engineering experiments seamlessly against applications and infrastructure components to assess resiliency and fault tolerance. It is designed to introduce faults with very little pre-configuration and can support any infrastructure that you might have including K8S, Docker, vCenter or any Remote Machine with ssh enabled. With its powerful plugin model, you can define a custom fault of your choice based on a template and run it without building your code from scratch.

  • Tried and Tested in VMware - Validated on VMware product and Cloud platforms.
  • Container and OVA support - Can be easily deployed and setup in a matter of minutes using either the containers or OVA packages.
  • Efficient custom fault plugin model - Can build and plugin new faults on the fly without building the code from scratch.

Getting Mangle

If you want a quick and easy way to install Mangle just about anywhere, you can grab our container images. Refer to the Getting Started section below for detailed instructions on deployment and configuration.

If you'd like to deploy a virtual appliance on vSphere that is pre-packaged with Mangle, you can grab the .ova files. Refer to the Getting Started section below for detailed instructions on deployment and configuration.

Open source license information may be found in Mangle Open Source License file.

Mangle source code is available on the VMware Mangle GitHub source repository. You can build your own Mangle container image by cloning the repo and following the instructions for Contributing to Mangle.

Getting Started

We've provided a few guides to help get you started:

Support

Mangle is released as open source software and comes with no commercial support.

We currently provide community support through our GitHub project page. If you encounter an issue or have a question, feel free to reach out via GitHub issues for Mangle

For more general user questions, send us an email.

Contributing

The Mangle project team welcomes contributions from the community. We are always thrilled to receive pull requests, and do our best to process them as fast as we can.If you wish to contribute code and you have not signed our contributor license agreement (CLA), our bot will update the issue when you open a Pull Request. For any questions about the CLA process, please refer to our FAQ.

Before you start to code, we recommend discussing your plans through a Github issue or discuss it first with the official project maintainers via Slack, especially for more ambitious contributions. This gives other contributors a chance to point you in the right direction, give you feedback on your design, and help you find out if someone else is working on the same thing.

License

Mangle is comprised of many open source software components, each of which has its own license that is located in the source code of the respective component as well as documented in the open source license file accompanying the Mangle distribution. The Open Source Disclosure Package (ODP) can be downloaded from here.

Sours: https://vmware.github.io/mangle/
  1. Small grey baskets
  2. Interactions package r
  3. Estradiol injection dosage

Cannot git clone to VMWare shared folder

As Laurence pointed out, this is an issue from VMWare version 0.6.0. This is because:

VMware changed the tools package and moved from HGFS to FUSE instead of being in the kernel.

There are no folders under and shared folders are created under a folder named .

Symptoms:

  • Cannot access a shared folder in a virtual machine from other machines in the network.
  • A shared folder with appropriate permissions in a virtual machine is not accessible over the network

The error similar to:

Cause:

As far as I see, this is the reason behind this issue and other bugs related to other filesystem operations. More appropriately,

This issue occurs if the Audit object access GPO is enabled on the shared folder and the shared folder resides on a hot-pluggable device.

Solution:

Mount shared folders. Refer this

Locate the shared folders.

Disable audit file access on the shared folder and remove all hot-pluggable devices.

Hope this will help.

Few months ago, my development team faced a similar issue regarding which a colleague contacted the support team on behalf of the organization.

Alvaro Aguilera from was gracious enough for pointing out the issue. Initially, the support team had suggested to move to Fusion 8.0.2 which also works in case one wants to avoid the hassle.

Following is the concluding message from the support team on 20th May 2016:

Thanks for reaching out to us.

As per the log, it seems the HGFS module is not present on the VM.

Additionally, there is a VMWare fusion issue with 8.1.* and forwarded ports, please try to go to Fusion 8.0.2 since that is the last one known to work without issues.

Please use old boxes for your use case instead of the latest VMware Fusion as the developer team has confirmed that it is expected to be solved in Q1 2017.

Thanks for understanding.

We had moved to Fusion 8.0.0 and this issue was solved.

Sours: https://stackoverflow.com/questions/33393077/cannot-git-clone-to-vmware-shared-folder
IntelliJ IDEA. Cloning a Project from GitHub

Weekly threat roundup: VMware, GitHub, Facebook, and MobileIron

Discovered by Google’s Project Zero researcher Natalie Silvanovich, the flaw could have granted an attacker logged into the app the ability to initiate a call and send a specially crafted message to targets signed into multiple devices. This would trigger a scenario where, when the device is ringing, the caller would receive audio either until the person being called answers, or the call times out.

The bug lay in the WebRTC framework Session Description Protocol (SDP), which defines a format for the streaming of media between two endpoints, and has since been fixed.

GitHub patches severe three-month-old flaw

The development platform GitHub has released a fix for a bug that was first reported more than three months ago by Google’s Project Zero security research team.

Related Resource

A buyer’s guide to managed detection and response (MDR) services

Simplifying and strengthening your security programme through outsourcing

Download now

The flaw, which Google argues is highly-severe but GitHub insists is moderately-severe, affected the developer workflow automation tool, known as Actions. This was highly susceptible to injection attacks, according to researcher Felix Wilhelm, and GitHub finally addressed the bug by disabling the feature’s runner commends.

Remarkably, Google first informed GitHub of the flaw in August, but held back on publishing details in accordance with its 90-day disclosure policy. Google then granted GitHub a further 14-day grace period in which to fix the flaw, before finally revealing its existence on 2 November. Although GitHub requested an additional 48 hours, this was denied, and the details were published. The bug was subsequently patched on 16 November.

Warnings over MobileIron Android vulnerability

The National Cyber Security Centre (NCSC) has warned businesses about a vulnerability that can compromise the networks of UK organisations if successfully exploited.

Tagged as CVE-2020-15505, the remote code execution flaw affects the MobileIron Core and Connector software, which forms the company’s mobile device management (MDM) suite. It also affected the Monitor and Reporting Database software.

Although a patch was released in June 2020, organisations that haven’t updated their systems might be vulnerable to attack. Nation-state hackers have been attempting to exploit the vulnerability since the publication of a proof-of-concept exploit in September, according to the NCSC.

2FA brute-force bypass flaw on cPanel 

The cPanel & WebHost Manager (WHM) web hosting platform contained a vulnerability that could have allowed hackers to effectively bypass the two-factor authentication (2FA) mechanism.

The now-fixed 2FA cPanel Security Policy inadvertently allowed users to repeatedly submit 2FA codes, essentially allowing attackers to bypass the 2FA check using brute force techniques. Although user credentials were required to gain access to the 70 million sites hosted on the platform, the exploit still bypassed a crucial additional layer of security that many users rely on. To fix the situation, incorrect 2FA codes are now treated as the equivalent of a failed password validation attempt.

Share on FacebookShare on TwitterShare on LinkedInShare via Email

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download
Sours: https://www.itpro.com/security/357907/weekly-threat-roundup-vmware-github-mobileiron

Github vmware

Configure GitHub Enterprise Server on Azure VMware Solution

  • 7 minutes to read

In this article, you'll set up GitHub Enterprise Server, the "on-premises" version of GitHub.com, on your Azure VMware Solution private cloud. The scenario covers a GitHub Enterprise Server instance that can serve up to 3,000 developers running up to 25 jobs per minute on GitHub Actions. It includes the setup of (at time of writing) preview features, such as GitHub Actions. To customize the setup for your particular needs, review the requirements listed in Installing GitHub Enterprise Server on VMware.

Before you begin

GitHub Enterprise Server requires a valid license key. You may sign up for a trial license. If you're looking to extend the capabilities of GitHub Enterprise Server via an integration, you may qualify for a free five-seat developer license. Apply for this license through GitHub's Partner Program.

Install GitHub Enterprise Server on VMware

  1. Download the current release of GitHub Enterprise Server for VMware ESXi/vSphere (OVA) and deploy the OVA template you downloaded.

    Screenshot showing the GitHub Enterprise Server on VMware installation options.

    Screenshot showing the Deploy the OVA Template menu option.

  2. Provide a recognizable name for your new virtual machine, such as GitHubEnterpriseServer. You don't need to include the release details in the VM name, as these details become stale when the instance is upgraded.

  3. Select all the defaults for now (we'll edit these details shortly) and wait for the OVA to be imported.

  4. Once imported, adjust the hardware configuration based on your needs. In our example scenario, we'll need the following configuration.

    ResourceStandard SetupStandard Set up + "Beta Features" (Actions)
    vCPUs48
    Memory32 GB61 GB
    Attached storage250 GB300 GB
    Root storage200 GB200 GB

    Your needs may vary. Refer to the guidance on hardware considerations in Installing GitHub Enterprise Server on VMware. Also see Adding CPU or memory resources for VMware to customize the hardware configuration based on your situation.

Configure the GitHub Enterprise Server instance

Screenshot of the Install GitHub Enterprise window.

After the newly provisioned virtual machine (VM) has powered on, configure it through your browser. You'll be required to upload your license file and set a management console password. Be sure to write down this password somewhere safe.

Screenshot of the GitHub Enterprise SSH access screen to add a new SSH key.

We recommend at least take the following steps:

  1. Upload a public SSH key to the management console so that you can access the administrative shell via SSH.

  2. Configure TLS on your instance so that you can use a certificate signed by a trusted certificate authority. Apply your settings.

    Screenshot showing the settings being applied to your instance.

  3. While the instance restarts, configure blob storage for GitHub Actions.

    External blob storage is necessary to enable GitHub Actions on GitHub Enterprise Server (currently available as a "beta" feature). Actions use this external blob storage to store artifacts and logs. Actions on GitHub Enterprise Server supports Azure Blob Storage as a storage provider (and some others). So we'll provision a new Azure storage account with a storage account type of BlobStorage.

    Screenshot showing the instance details to enter for provisioning an Azure Blob Storage account.

  4. Once the new BlobStorage resource deployment completes, save the connection string (available under Access keys). You'll need this string shortly.

  5. After the instance restarts, create a new admin account on the instance. Be sure to make a note of this user's password as well.

    Screenshot showing the Create admin account for GitHub Enterprise.

Other configuration steps

To harden your instance for production use, the following optional setup steps are recommended:

  1. Configure high availability for protection against:

    • Software crashes (OS or application level)
    • Hardware failures (storage, CPU, RAM, and so on)
    • Virtualization host system failures
    • Logically or physically severed network
  2. Configurebackup-utilities, providing versioned snapshots for disaster recovery, hosted in availability that is separate from the primary instance.

  3. Setup subdomain isolation, using a valid TLS certificate, to mitigate cross-site scripting and other related vulnerabilities.

Set up the GitHub Actions runner

At this point, you should have an instance of GitHub Enterprise Server running, with an administrator account created. You should also have external blob storage that GitHub Actions uses for persistence.

Create somewhere for GitHub Actions to run; again, we'll use Azure VMware Solution.

  1. Provision a new VM on the cluster and base it on a recent release of Ubuntu Server.

    Screenshot showing the virtual machine name and location to provision a new VM.

  2. Continue through the set up selecting the compute resource, storage, and compatibility.

  3. Select the guest OS you want installed on the VM.

    Screenshot showing the Guest OS Family and Guest OS version to install on the VM.

  4. Once the VM is created, power it up and connect to it via SSH.

  5. Install the Actions runner application, which runs a job from a GitHub Actions workflow. Identify and download the most current Linux x64 release of the Actions runner, either from the releases page or by running the following quick script. This script requires both curl and jq to be present on your VM.

    You should now have a file locally on your VM, actions-runner-linux-arm64-*.tar.gz. Extract this tarball locally:

    This extraction unpacks a few files locally, including a and script.

Enable GitHub Actions

Configure and enable GitHub Actions on the GitHub Enterprise Server instance.

  1. Access the GitHub Enterprise Server instance's administrative shell over SSH, and then run the following commands:

  2. Set an environment variable containing your Blob storage connection string.

  3. Configure actions storage.

  4. Apply the settings.

  5. Execute a precheck to install additional software required by Actions on GitHub Enterprise Server.

  6. Enable actions, and re-apply the configuration.

  7. Check the health of your blob storage.

    You should see output: Blob Storage is healthy.

  8. Now that GitHub Actions is configured, enable it for your users. Sign in to your GitHub Enterprise Server instance as an administrator, and select the in the upper right corner of any page.

  9. In the left sidebar, select Enterprise overview, then Policies, Actions, and select the option to enable Actions for all organizations.

  10. Configure your runner from the Self-hosted runners tab. Select Add new and then New runner from the drop-down. You'll be presented with a set of commands to run.

  11. Copy the command to configure the runner, for instance:

  12. Copy the command and paste it into a session on your Actions runner (created previously).

    Screenshot showing the GitHub Actions runner registration and settings.

  13. Use the command to run the runner:

    Tip

    To make this runner available to organizations in your enterprise, edit its organization access. You can limit access to a subset of organizations, and even to specific repositories.

    Screenshot of how to edit access for the self-hosted runners.

(Optional) Configure GitHub Connect

Although this step is optional, we recommend it if you plan to consume open-source actions available on GitHub.com. It allows you to build on the work of others by referencing these reusable actions in your workflows.

To enable GitHub Connect, follow the steps in Enabling automatic access to GitHub.com actions using GitHub Connect.

Once GitHub Connect is enabled, select the Server to use actions from GitHub.com in workflow runs option.

Screenshot of the Server can use actions from GitHub.com in workflow runs Enabled.

Set up and run your first workflow

Now that Actions and GitHub Connect is set up, let's put all this work to good use. Here's an example workflow that references the excellent octokit/request-action, allowing us to "script" GitHub through interactions using the GitHub API, powered by GitHub Actions.

In this basic workflow, we'll use to open an issue on GitHub using the API.

Screenshot of an example workflow.

Note

GitHub.com hosts the action, but when it runs on GitHub Enterprise Server, it automatically uses the GitHub Enterprise Server API.

If you chose not to enable GitHub Connect, you could use the following alternative workflow.

Screenshot of an alternative example workflow.

  1. Navigate to a repo on your instance, and add the above workflow as:

    Screenshot of another alternative example workflow.

  2. In the Actions tab for your repo, wait for the workflow to execute.

    Screenshot of an executed example workflow.

    You can see it being processed by the runner.

    Screenshot of the workflow processed by runner.

If everything ran successfully, you should see a new issue in your repo, entitled "Hello world."

Screenshot of the Hello world issue in GitHub created by github-actions.

Congratulations! You just completed your first Actions workflow on GitHub Enterprise Server, running on your Azure VMware Solution private cloud.

This article set up a new instance of GitHub Enterprise Server, the self-hosted equivalent of GitHub.com, on top of your Azure VMware Solution private cloud. The instance includes support for GitHub Actions and uses Azure Blob Storage for persistence of logs and artifacts. But we're just scratching the surface of what you can do with GitHub Actions. Check out the list of Actions on GitHub's Marketplace, or create your own.

Next steps

Now that you've covered setting up GitHub Enterprise Server on your Azure VMware Solution private cloud, you may want to learn about:

Sours: https://docs.microsoft.com/en-us/azure/azure-vmware/configure-github-enterprise-server
How to connect Github with Atom - Easiest Way!

My daughter Veronika Belova has been detained and is in this precinct, Dee made a statement, sitting down on. A chair in front of the table, while I sat down next to the chair. - You're right.

Now discussing:

And the cashier is no longer used. Here is our boss and decided to turn this room into our office. We were satisfied with it, we even really liked it, because the office door had a combination lock, and, unlike the others, we did not have to. Carry an extra pair of keys.

Andrey Pilipovich is 44 years old.



1431 1432 1433 1434 1435