⛔ [DEPRECATED] Active as a real project instead, development as a gist has been discontinued.
This "script" implements a single function to list the existing tags at the Docker [hub] for a given public image.
⛔ [DEPRECATED] Active as a real project instead, development as a gist has been discontinued.
Unsecret is an inverted wrapper: It will arrange to set the value of one or several environment variables from the content of files before starting a program. This is useful when you have a Docker image that can only be configured
cleaner.sh
is a script to keep a finite number of backup (files) matching a
pattern. It should be scheduled on a regular basis from the outside, e.g. with
cron
.
cleaner.sh
takes a number of single or double-dashed options, possibly
followed by a command to execute once the removal operations have ended. It is
This is a simple wrapper around tar to manage a number of backups for sources
into a destination directory. The destination directory will automatically be
created and this wrapper will create files which names contain the time and date
of the backup. The resulting tar files will automatically be compressed using
gzip
compression for maximal compatibility across architectures. The utility
is able to execute a command once the backup operation has finalised. One new
tar file is created every time tar.sh
is run, meaning that it should probably
be scheduled on a regular basis from the outside, e.g. with cron
.
The prupose of this module is to help chopping SenML into smaller chunks and to automatically send chunks away via MQTT as soon as a number of entries have been collected (the chopping size). Data is collected per MQTT topic to send to. The module is tuned to be used from inside logic behind projects such as http2mqtt or mqtt2any.
This script will mirror/backup the latest directories/files matching a glob-style pattern in a directory to another one. It is able to only keep a number of copies in the destination and to skip some items from the source. The script is able to perform the mirror operation on and on, making it suitable for situations where access to cron is not an option.
The aim of this single-file project is to automatically [influx] updates from [Disque] jobs picked from a cluster and queue. The implementation is meant to be given as part of the configuration of the generic [disque2any] bridge. The assumption made by this project is that jobs are composed of JSON objects directly serialised to [SenML] or where one of the fields contains [SenML]. When [SenML] data is a field in the JSON object, other fields can be pushed as tags when pushing to the Influx database. For proper operation, this project depends on the [json] package from tcllib. When the [SenML][lib] library is available,
The aim of this single-file project is to automatically create [Disque] jobs
from data that is being pushed to an MQTT broker. The implementation is meant to
be given as part of the configuration of the generic [mqtt2any] bridge. The
assumption made by this project is that you use your MQTT topic hierarchy in a
REST-routing like manner: the project will be able to extract the value of some
fields between the slashes /
of the MQTT topic hiearchy and to copy their
values into the job data that is created at the remote [Disque] server. For
proper operation, this project depends on [disque], the Tcl implementation of
This script aims at easily initialising access rights for users in InfluxDB
databases in a UNIX:y way. The script will read a configuration file where
fields are separated by the colon (:
) sign (e.g. analogical to
/etc/password
). The file is able to express and map rwx
-style permissions
onto GRANT
-style privileges with the database, thus simplifying initialisation
of the authorisations, but also use of users created in other parts of a cloud
This script aims at easily initialising access rights for users in postgreSQL
databases in a UNIX:y way. The script will read a configuration file where
fields are separated by the colon (:
) sign (e.g. analogical to
/etc/password
). The file is able to express and map rwx
-style permissions
onto GRANT
-style privileges with the database and its schema/tables, thus
simplifying initialisation of the authorisations, but also use of users created