$ openssl genrsa -out private.key 4096
openssl req -new -sha256 \
# CodePipeline by default runs an execution whenever any change is detected in the configured source repository | |
# We can use a CodePipeline Webhook resource to filter such executions. | |
# | |
# This is a snippet that would be part of a CloudFormation template containing | |
# a CodePipeline resource (AWS::CodePipeline::Pipeline), named CodePipeline in this case, and | |
# assumes the GutHub OAuth token is available in the parameter GitHubOAuthToken. | |
# Typically a CodePipeline Webhook only contains the $.ref filter to check for | |
# the desired branch. | |
# However we can add up to 4 more filters, each of which can query the incoming webhook payload from Github. | |
# Such payloads are of the form: |
server { | |
listen 80; | |
listen 443 default_server ssl; | |
ssl on; | |
ssl_certificate /etc/ssl/certs/myssl.crt; | |
ssl_certificate_key /etc/ssl/private/myssl.key; | |
server_name *.example.com; | |
root /var/www/vhosts/website; |