I hereby claim:
- I am gladiatr72 on github.
- I am stephenspencer (https://keybase.io/stephenspencer) on keybase.
- I have a public key whose fingerprint is DAB6 E673 0E44 3798 62F7 036E A177 C4F7 D1D9 F9B5
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
variable region {} | |
variable cluster {} | |
/* | |
* | |
*/ | |
data aws_eks_cluster this { | |
name = var.cluster | |
} |
make CMAKE_BUILD_TYPE=RelWithDebInfo CMAKE_INSTALL_PREFIX=$HOME/u/install/neovim-$( git describe --tags ) |
spec: | |
containers: | |
- | |
name: misc | |
image: gladiatr72/misc:util-21 | |
env: | |
- | |
name: POD_IP | |
valueFrom: | |
fieldRef: |
# /srv/salt/_utils/thing.py | |
import sys as _sys | |
from salt.loader import utils as _utils | |
_anchor = _sys.modules[__name__] | |
def __virtual__(): | |
setattr(_anchor, '__utilS__', _utils(__opts__, context=__context__)) |
The purpose of this configuration is to allow the letsencrypt-auto
script to function properly from a centralized configuration management host. This allows for managing/automating the creation, deployment and renewal of certificates without resorting to retrieving trust related data from the less trusted managed hosts.
An added bonus is that the auth data stored with the renewal configuration is not littered across the enterprise.
some_variable = {{some_variable}} |
# vim: ft=sls | |
# | |
# this inteded to be called via the orchestrate runner. | |
# | |
# Example: | |
# salt-run state.orchestrate orc.bootstrap pillar='{ tgt: <minion id here> }' | |
orcestrate_test: |
# similar initializer for minion-side testing | |
import salt.config | |
import salt.client | |
import salt.loader | |
import salt.utils.minion as Minion_Util | |
import salt.config | |
import pprint | |
pp_ = pprint.PrettyPrinter(indent=4, depth=20) | |
pp = pp_.pprint |
{% set minion_id = data['id'] -%} | |
update_minion: | |
local.state.orch: | |
- tgt: {{minion_id}} | |
- sls: | |
- minion_update | |
install_baseline: |