I hereby claim:
- I am rothandrew on github.
- I am rothandr (https://keybase.io/rothandr) on keybase.
- I have a public key ASBI6cxL_Iz-7XGqWUTb_O0S4ms4n36RjMfYOJuPo0F2sAo
To claim this, I am signing this object:
#!/bin/bash | |
wget https://dl.dod.cyber.mil/wp-content/uploads/pki-pke/zip/unclass-certificates_pkcs7_DoD.zip | |
unzip unclass-certificates_pkcs7_DoD.zip | |
cd certificates_pkcs7_v5_12_dod/ | |
sudo cp -f ./dod_pke_chain.pem /etc/pki/ca-trust/source/anchors/ | |
sudo update-ca-trust |
asdf plugin-add terraform https://github.com/Banno/asdf-hashicorp.git | |
asdf plugin-add terraform-docs https://github.com/looztra/asdf-terraform-docs.git | |
asdf plugin-add tflint https://github.com/skyzyx/asdf-tflint.git | |
asdf plugin-add tfsec https://github.com/woneill/asdf-tfsec | |
asdf plugin-add helmfile https://github.com/feniix/asdf-helmfile.git | |
asdf plugin-add helm https://github.com/Antiarchitect/asdf-helm.git |
// WARNING: Don’t mess with gitlab-rails runner unless you REALLY know what you are doing. | |
// It gives root-level access to EVERYTHING at the database level. | |
// Idempotently create a Personal Access Token for a user in GitLab running in Kubernetes | |
// USE AT YOUR OWN RISK | |
resource "null_resource" "set_gitlab_personal_access_token" { | |
triggers = { | |
uuid = uuid() | |
} | |
provisioner "local-exec" { |
I hereby claim:
To claim this, I am signing this object:
{ | |
"AWSTemplateFormatVersion": "2010-09-09", | |
"Parameters": { | |
"KeyName": { | |
"Type": "AWS::EC2::KeyPair::KeyName", | |
"Description": "Name of an existing EC2 KeyPair to enable SSH access to the ECS instances" | |
}, | |
"DesiredCapacity": { | |
"Type": "Number", | |
"Default": "2", |
# Sample LDIF data for the ApacheDS v1.0 Basic User's Guide | |
# | |
# Some sailors and their ships | |
# userpassword for all persons is "pass" | |
# | |
version: 1 | |
dn: ou=people,o=sevenSeas | |
objectclass: organizationalUnit | |
objectclass: top |