mv disk.qcow2 /mnt/nfs/disk.qcow2
qemu-img resize disk.qcow2 150G
# Run from an elevated PowerShell | |
# Credits to Chris Titus (https://christitus.com/windows-tool/) | |
iwr -useb https://christitus.com/win | iex |
import java.nio.charset.StandardCharsets; | |
def creds = com.cloudbees.plugins.credentials.CredentialsProvider.lookupCredentials( | |
com.cloudbees.plugins.credentials.Credentials.class | |
) | |
for (c in creds) { | |
println(c.id) | |
if (c.properties.description) { | |
println(" description: " + c.description) | |
} |
I hereby claim:
To claim this, I am signing this object:
import json | |
import boto3 | |
import zipfile | |
import tempfile | |
code_pipeline = boto3.client('codepipeline') | |
s3 = boto3.client('s3') |
resource "aws_iam_role" "cp-iam-role" { | |
name = "AWSCodePipelineDeployImage" | |
assume_role_policy = <<EOF | |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Principal": { |
# ECR TRIGGER | |
resource "aws_cloudwatch_event_rule" "cwt-rule" { | |
name = "ecr-trigger-deploy-authms" | |
description = "Trigger codepipeline on image change" | |
event_pattern = <<PATTERN | |
{ | |
"detail-type": [ | |
"ECR Image Action" | |
], |
resource "aws_iam_access_key" "iam-key-ecr-deploy" { | |
user = aws_iam_user.iam-ecr-deploy.name | |
pgp_key = var.iam_pgp_ecr_deploy | |
} | |
resource "aws_iam_user" "iam-ecr-deploy" { | |
name = var.iam_user_name_ecr_auth | |
} | |
resource "aws_iam_user_policy" "iam-policy-ecr-deploy" { |
image: docker:latest | |
stages: | |
- build | |
services: | |
- docker:dind | |
variables: | |
REGION: "eu-central-1" |