I hereby claim:
- I am dtelaroli on github.
- I am dtelaroli (https://keybase.io/dtelaroli) on keybase.
- I have a public key ASB80HHC08K7bPObA78PeVBwIa6Jc4cWL6tFvu-7TdLO6Ao
To claim this, I am signing this object:
grep -E 'resource.+"codefresh_project"' ./squads/**/*.tf | sed -E 's/([a-z_\/]+):.+" "(.+)" {/\1:\2/g' | | |
while IFS=":"; read -r key value; do | |
export key=$key value=$value | |
cat $key | grep name | sed -E 's/.+name.+\"(.+)\"/\1/g' | | |
xargs -I{} grep -E 'project_name.+"{}"' ./squads/**/*.tf | sed -E 's/([a-z\/_-]+):.+/\1/g' > tmp.txt | |
while read file; do | |
if [ -z "$(grep depends_on $file)" ]; then | |
replace="\ndepends_on = [codefresh_project.${value}]\n}" | |
perl -i"" -pe "s/^}/${replace}/g" $file | |
terraform fmt $file |
locals { | |
subfolders = toset(distinct(flatten([for _, v in fileset(".", "./dir/**") : regex("./dir/([^/]*).*", dirname(v))]))) | |
} |
# step 1 | |
# execute the command to get the certificates | |
openssl s_client -showcerts -connect start.spring.io:443 | |
# copy the lines stating in: Certificate chain (including this line) | |
# Ending in last -----END CERTIFICATE----- | |
# step 2 | |
# create the cert file with this content | |
mkdir $HOME/certs |
# $1 parameter inverse (true|false) | |
# inverse true remove what is in tf file | |
# inverse false remove what is not in tf file | |
# command: node clean-tf-state.js [true|false] | |
const json = require("./state.json") | |
const fs = require('fs') | |
const inverse = process.argv[1] |
I hereby claim:
To claim this, I am signing this object:
#read | |
sudo defaults read bluetoothaudiod | |
# disable | |
sudo defaults write bluetoothaudiod "Enable AAC codec" -bool false | |
sudo defaults write bluetoothaudiod "Enable AptX code" -bool false | |
# restart | |
# enable | |
sudo defaults write bluetoothaudiod "Enable AAC codec" -bool true |
PUT <index>/_mapping/doc | |
{ | |
"properties": { | |
"field": { | |
"type": "text", | |
"fielddata": true | |
} | |
} | |
} |
{ | |
"Version": "2012-10-17", | |
"Statement": [ | |
{ | |
"Effect": "Allow", | |
"Principal": { | |
"AWS": "arn:aws:iam::<accountId>:role/<authRoleArn>" | |
}, | |
"Action": "es:*", | |
"Resource": "<ESDomainArn>/*" |
// npm install await-to-js | |
const { to } = require("await-to-js"); | |
const { CognitoIdentity } = require("aws-sdk"); | |
const identity = new CognitoIdentity(); | |
const IDENTITY_POOL_ID = "<your identity pool id>"; | |
exports.handler = async (event) => { | |
const { issuer } = event.identity; |
const { to } = require("await-to-js"); | |
const { Amplify } = require("aws-sdk"); | |
const amplify = new Amplify(); | |
const config = { | |
AMPLIFY_FRONTEND_APP_ID: "your_app_id", | |
AMPLIFY_FRONTEND_DOMAIN: "your_domain.com", | |
AMPLIFY_FRONTEND_BRANCH: "your_branch_env" | |
}; |