I hereby claim:
- I am battlecow on github.
- I am bmk352 (https://keybase.io/bmk352) on keybase.
- I have a public key ASB4ezE5-pp075MQ99c7bflIOCQXfijRIFGcwHHXnACL-go
To claim this, I am signing this object:
| #!/usr/bin/env python | |
| # playback.py | |
| # 2016-12-23 | |
| # Public Domain | |
| import os | |
| import sys | |
| import time |
| package spinnaker | |
| import ( | |
| "bytes" | |
| "encoding/json" | |
| "fmt" | |
| "io" | |
| "log" | |
| "net/http" | |
| ) |
| FROM ubuntu:16.04 | |
| ENV HOME /root | |
| ENV BAMBOO_VERSION 6.5.1 | |
| ENV DUMB_INIT_VERSION=1.2.1 | |
| ENV DEBIAN_FRONTEND noninteractive | |
| ENV LANG='en_US.UTF-8' LANGUAGE='en_US:en' LC_ALL='en_US.UTF-8' |
| { | |
| "name": "slack-issue", | |
| "version": "0.0.0", | |
| "description": "Slack Issue Repro", | |
| "main": "server.js", | |
| "scripts": { | |
| "test": "echo \"Error: no test specified\" && exit 1" | |
| }, | |
| "author": "Brian Kelley", | |
| "license": "ISC", |
| 2019-12-18 12:46:48.415 INFO 1 --- [ handlers-16] c.n.s.orca.clouddriver.KatoRestService : [brian.kelley] ---- ERROR http://spin-clouddriver.spinnaker:7002/kubernetes/ops?clientRequestId=4d720dfc0ee324cb16bd485dadb0931ddc3d26dd1d1d8f29a257b999d5c8a4fc | |
| 2019-12-18 12:46:48.417 INFO 1 --- [ handlers-16] c.n.s.orca.clouddriver.KatoRestService : [brian.kelley] java.net.SocketTimeoutException: timeout | |
| at okio.Okio$4.newTimeoutException(Okio.java:232) | |
| at okio.AsyncTimeout.exit(AsyncTimeout.java:286) | |
| at okio.AsyncTimeout$2.read(AsyncTimeout.java:241) | |
| at okio.RealBufferedSource.indexOf(RealBufferedSource.java:358) | |
| at okio.RealBufferedSource.readUtf8LineStrict(RealBufferedSource.java:230) | |
| at okhttp3.internal.http1.Http1ExchangeCodec.readHeaderLine(Http1ExchangeCodec.java:242) | |
| at okhttp3.internal.http1.Http1ExchangeCodec.readResponseHeaders(Http1ExchangeCodec.java:213) | |
| at okhttp3.internal.connection.Exchange.readResponseHeaders(Exchange.java:115) |
| FROM node:10-alpine | |
| ENV NODE_ENV production | |
| USER node | |
| WORKDIR /home/node | |
| COPY --chown=node:node . . |
I hereby claim:
To claim this, I am signing this object:
| #!/bin/bash | |
| interfaces=( $(netstat -in | egrep 'utun\d .*\d+\.\d+\.\d+\.\d+' | cut -d ' ' -f 1) ) | |
| rulefile="rules.tmp" | |
| echo "" > $rulefile | |
| sudo pfctl -a com.apple/tun -F nat | |
| for i in "${interfaces[@]}" | |
| do | |
| RULE="nat on ${i} proto {tcp, udp, icmp} from 192.168.64.0/24 to any -> ${i}" | |
| echo $RULE >> $rulefile | |
| done |
| apiVersion: extensions/v1beta1 | |
| kind: PodSecurityPolicy | |
| metadata: | |
| name: restricted | |
| annotations: | |
| seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default' | |
| apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default' | |
| seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default' | |
| apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default' | |
| spec: |
| consumer | |
| .on('ready', () => { | |
| consumer.subscribe([topic]); | |
| consumer.getMetadata({topic: topic}, function (err, metadata) { | |
| if (err) { | |
| console.error('Error getting metadata'); | |
| console.error(err); | |
| } else { | |
| console.log('Got metadata'); | |
| console.log(metadata.topics[1]); |