How to set up mysql docker container with existing ib* files?

Related to a previous issue, I’m trying to recover some data from existing ib* files from a crashed server. The database version is 5.1.69, so quite old. One of the responses was to install MySQL 5.5, because it should still be able to import 5.1, but even that is too old on current systems, and one just runs into ever deeper compatibility issues.

“NBK” in the same issue suggested in a comment to use a docker file with an older version of MySQL. I decided to try this approach. I was able to install docker and pull the vsamov/mysql-5.1.73 image, but I’m stuck now at how to get the ib* files into the docker container.

I think I need the image to run so that it has a container ID, but if it’s running, then the ib* files are locked, so I’m not sure how to proceed. If anyone has experience in this, or can provide a reference, it would be much appreciated.

Cross Domain Tracking with Multiple GA UA Properties, Single GTM Container

I have a client who wants to route page views into separate GA Properties based off a returnUrl UTM. I am trying to configure this in one tag using one GTM container. I know that using cookies for Analytics is changing rapidly and I am having trouble getting everything set up.

Here’s how I have it configured currently:

returnUrl Trigger: enter image description here

That trigger fires a Page View tag configured like so: enter image description here

GTM Preview Fires Everything Correctly, and the Tracking Values are correct: enter image description here

I have added the original domain to Referral Exclusion Lists on each GA Property for the returnUrl domains. But I am not getting page views.

Google Tag Assistant is giving an error of "No HTTP response detected" for the Analytics UA-ID (which is correct).

I’ve seen a lot of different blog posts and tried implementing a few. But I’d like to solve this as quickly and smoothly as possible. I appreciate the help!

Blog posts used:

https://www.simoahava.com/analytics/troubleshooting-cross-domain-tracking-in-google-analytics/

https://www.directom.com/cross-domain-tracking-google-tag-manager/

This post I have looked at but it looks like a lot more Tags / Triggers are involved. Before I bite this off I want to see if there’s a way to save this configuration.

https://www.simoahava.com/analytics/cookieless-tracking-cross-site-iframes/

Thanks for looking!

Is it possible to run commands that exist only on the host on a docker container?

We would like to harden our Docker Image and remove redundant software from it. Our Devs and Ops asked to keep some Linux tools used for debugging on the containers running on our Kubernetes Prod environment.

I’ve read this post: https://www.digitalocean.com/community/tutorials/how-to-inspect-kubernetes-networking

And it made me wonder, is it possible to run commands that exist only on the host, on a container (which those commands have been removed from)?

If so is there a difference between commands that have been removed from the container than ones that the user don’t have permissions to run?

P.S. How do the tools in the above mentioned post work?

Thanks for the help! 🙂

Container with findNthSmallest in O(1)

Consider the following problem: we want to implement ADT SpecialContainer which stores integer numbers and is similar to a PriorityQueue. This containter should support the following operatios:

-init(sc, n) – create a new, empty SpecialContainer sc. n is a positive integer number(will be used later – Theta(1) total complexity

-push(sc, x) – adds the integer number x to the SpecialContainer – O(log n) total complexity

-findNthSmallest(sc) – returns the nth smallest element from sc, where n is the number given to the init function – Theta(1) total complexity

-popNthSmallest(sc) – removes and returns the nth smallest element from sc – O(log n) total complexity

  1. Which data structure or combination of data stuctures would you use as representation for the SpecialContainer and how?

  2. Explain in short how would you implement each operation of the SpecialContainer and why the implementation fits the complexity requirement.

I was thinking about a combination of a heap and a hash map, but I don’t think if it works. Can somebody help me, please?

Can malicious applications running inside a docker container still be harmful?

I am very new to docker (and don’t usually program at a ‘systems’ level). I will be working on an open source project with complete strangers over the web over the next couple of months. I trust them, but I like to not have to trust people (meant in the best possible way).

I would like to know, if I download various repositories from github or elsewhere, and run them inside a docker container, is it possible for them to cause harm to my laptop in any way?

In case it’s relevant, the repositories will mostly be web applications (think django, node), and will likely use databases (postgres etc), and otherwise operate as regular locally hosted web applications. It is possible (like anything from github or the world wide web), that some apps could contain malicious code. I am curious to know if running such an app (containing malicious code) inside a docker container prevents that code from harming anything outside of the docker container (i.e. my laptop)?

Redis docker container has been hacked, next steps?

I accidentally left the port of my redis container open and noticed, that it crashed all the time today.

Now the mounted volume is full of files like red2.so, admin, root, www, apache, backup.db.

I closed the port, deleted the files and rebuild the docker container, is there a risk of my server outside of the container being infected?

There are no new or altered entries in crontab or the .ssh/authorized_keys file, but I’m not sure what I should check additionally.

Security pattern for third party uploads to Azure blob container

Scenario:

  • Vendor 1 needs to upload data to an Azure blob storage container owned by Vendor 2
  • Vendor 1 is issued a limited duration SAS token each day to use
  • Azure does no scanning of incoming blobs (therefore content is untrusted when it lands)
    • Microsoft recommends pre-scanning all files before uploading

Questions:

  • What is a repeatable pattern for Vendor 2 to secure this type of content unpload against malware threats?

Hooking into the HTML header container

I’m trying to hook into the header.php of wordpress theme(s) more specifically, right before the closing header tag </header>. I’d like to do this in a programmatic way so when I switch themes I don’t have to remember to go include the method of a custom hook <?php my_cool_hook(); ?>

Is there a way to accomplish this? I’ve tried looking through the available actions but so far I haven’t found any that would suite my needs.

Thanks.

Can the Destructive Wave spell be triggered on a ship by striking the deck or an open container of earth (“ground”)?

My 9th-level Tempest Domain cleric is about to embark on a sea voyage to the ice sea. I realized that my new destructive wave domain spell requires that “You strike the ground” to trigger it.

Is there a way to trigger this spell while on a ship?

We have been warned there will be encounters on the journey at sea.

I am trying to head off a debate with my DM when I try to use this spell at sea.

  • Since we walk on the deck, can that be considered ground (i.e. can I strike the deck)?
  • Like vampires that take dirt along to survive sea voyages, can a bucket of dirt (ground) be used (I strike the ‘ground’ in the bucket!) to trigger the spell?
  • Or if I walk onto an iceberg, since I have a ring of water walking, can that be considered ground?

Tempest gods are followed by seafaring people as storms impact them greatly. So it would seem kind of odd not to be able to use a unique Tempest Domain spell at sea.

Is the container used for Magic Jar still “nonmagical object”?

As the title says, I would like to understand if the container used to cast Magic Jar should be considered as a magical item and can’t be used for other spells/abilities that require a “nonmagical object”, such as True Polymorph. I would say no because the Sage Advice Compendium (pp. 17-18) lists some criteria that do not seem to match with this case, but I am not totally sure.