financial support to Awesome Go
A curated list of awesome Go frameworks, libraries and software. Inspired by awesome-python.
financial support to Awesome Go
A curated list of awesome Go frameworks, libraries and software. Inspired by awesome-python.
#!/usr/bin/env python | |
# | |
# usage: | |
# conv2vmx-ovf.py some-vm.ovf | |
# | |
# ref: http://www.cnblogs.com/eshizhan/p/3332020.html | |
# | |
import sys | |
fn = sys.argv[1] |
#!/usr/bin/env bash | |
set -u | |
set -e | |
set -o pipefail | |
GCP_PROJECT="$(gcloud config list --format 'value(core.project)')" | |
GCP_SERVICES=( | |
"storage-api.googleapis.com" |
#!/bin/bash | |
# | |
# Ansible role test shim. | |
# | |
# Usage: [OPTIONS] ./tests/test.sh | |
# - distro: a supported Docker distro version (default = "centos7") | |
# - playbook: a playbook in the tests directory (default = "test.yml") | |
# - role_dir: the directory where the role exists (default = $PWD) | |
# - cleanup: whether to remove the Docker container (default = true) | |
# - container_id: the --name to set for the container (default = timestamp) |
Jon Warbrick, July 2014, V3.2 (for Ansible 1.7)
First one found from of
This document presents a simple way to manage your Docker resource by using Portainer as a gateway (HTTP queries against the Portainer API).
WARNING: This documentation is valid for Portainer >= 1.18.0.
NOTE: I'm using httpie to execute HTTP queries from the CLI.
This is a transformation of Adrian Colyer's Checklist to turn it into a working model for a cloud transformation. The assumption is that the original checklist can suffice for any services that are deployed on the build pipeline, but the question to answer here is about how the environment is provisioned, deployed, monitored and governed in such a way as to fit the architecture implicit in the service checklist.
#!/usr/bin/env python | |
"""Convert CSV policies into AWS JSON format.""" | |
import json | |
import csv | |
POLICIES = 'terraform.csv' | |
CRUD_COL = 2 | |
ACTION_COL = 3 |
I often get asked which tools are good to use for securing your AWS infrastructure so I figured I'd write a short listof some useful Security Tools for the AWS Cloud Infrastructure.
This list is not intended be something completely exhaustive, more so provide a good launching pad for someone as they dig into AWS and want to make it secure from the start.
This section focuses on tools and services provided by the community and released as open-source.