I hereby claim:
- I am dtelaroli on github.
- I am dtelaroli (https://keybase.io/dtelaroli) on keybase.
- I have a public key ASB80HHC08K7bPObA78PeVBwIa6Jc4cWL6tFvu-7TdLO6Ao
To claim this, I am signing this object:
| grep -E 'resource.+"codefresh_project"' ./squads/**/*.tf | sed -E 's/([a-z_\/]+):.+" "(.+)" {/\1:\2/g' | | |
| while IFS=":"; read -r key value; do | |
| export key=$key value=$value | |
| cat $key | grep name | sed -E 's/.+name.+\"(.+)\"/\1/g' | | |
| xargs -I{} grep -E 'project_name.+"{}"' ./squads/**/*.tf | sed -E 's/([a-z\/_-]+):.+/\1/g' > tmp.txt | |
| while read file; do | |
| if [ -z "$(grep depends_on $file)" ]; then | |
| replace="\ndepends_on = [codefresh_project.${value}]\n}" | |
| perl -i"" -pe "s/^}/${replace}/g" $file | |
| terraform fmt $file |
| locals { | |
| subfolders = toset(distinct(flatten([for _, v in fileset(".", "./dir/**") : regex("./dir/([^/]*).*", dirname(v))]))) | |
| } |
| # step 1 | |
| # execute the command to get the certificates | |
| openssl s_client -showcerts -connect start.spring.io:443 | |
| # copy the lines stating in: Certificate chain (including this line) | |
| # Ending in last -----END CERTIFICATE----- | |
| # step 2 | |
| # create the cert file with this content | |
| mkdir $HOME/certs |
| # $1 parameter inverse (true|false) | |
| # inverse true remove what is in tf file | |
| # inverse false remove what is not in tf file | |
| # command: node clean-tf-state.js [true|false] | |
| const json = require("./state.json") | |
| const fs = require('fs') | |
| const inverse = process.argv[1] |
I hereby claim:
To claim this, I am signing this object:
| #read | |
| sudo defaults read bluetoothaudiod | |
| # disable | |
| sudo defaults write bluetoothaudiod "Enable AAC codec" -bool false | |
| sudo defaults write bluetoothaudiod "Enable AptX code" -bool false | |
| # restart | |
| # enable | |
| sudo defaults write bluetoothaudiod "Enable AAC codec" -bool true |
| PUT <index>/_mapping/doc | |
| { | |
| "properties": { | |
| "field": { | |
| "type": "text", | |
| "fielddata": true | |
| } | |
| } | |
| } |
| { | |
| "Version": "2012-10-17", | |
| "Statement": [ | |
| { | |
| "Effect": "Allow", | |
| "Principal": { | |
| "AWS": "arn:aws:iam::<accountId>:role/<authRoleArn>" | |
| }, | |
| "Action": "es:*", | |
| "Resource": "<ESDomainArn>/*" |
| // npm install await-to-js | |
| const { to } = require("await-to-js"); | |
| const { CognitoIdentity } = require("aws-sdk"); | |
| const identity = new CognitoIdentity(); | |
| const IDENTITY_POOL_ID = "<your identity pool id>"; | |
| exports.handler = async (event) => { | |
| const { issuer } = event.identity; |
| const { to } = require("await-to-js"); | |
| const { Amplify } = require("aws-sdk"); | |
| const amplify = new Amplify(); | |
| const config = { | |
| AMPLIFY_FRONTEND_APP_ID: "your_app_id", | |
| AMPLIFY_FRONTEND_DOMAIN: "your_domain.com", | |
| AMPLIFY_FRONTEND_BRANCH: "your_branch_env" | |
| }; |