I hereby claim:
- I am joestump on github.
- I am joestump (https://keybase.io/joestump) on keybase.
- I have a public key whose fingerprint is 2944 FAE9 2234 A26B 3E7A 5DA0 887D 2343 C10E 0455
To claim this, I am signing this object:
| [Unit] | |
| Description=Certbot Renewal | |
| [Service] | |
| # Create /root/.aws/config using the config example. | |
| Environment=AWS_PROFILE=certbot | |
| # This will renew the certificate using Route53 DNS challenge. | |
| # The post-hook will combine the certs for lighttpd and restart. | |
| ExecStart=/usr/bin/certbot certonly --non-interactive --dns-route53 --dns-route53-propagation-seconds 120 -d your-domain.example.com --agree-tos -m [email protected] --post-hook "cat /etc/letsencrypt/live/your-domain.example.com/privkey.pem /etc/letsencrypt/live/your-domain.example.com/cert.pem | /etc/letsencrypt/live/your-domain.example.com/combined.pem && systemctl restart lighttpd" |
| # Use LetsEncrypt SSL certificates and set port to default SSL/TLS port. | |
| # This approach does not use Nginx. | |
| http: | |
| server_port: 443 | |
| ssl_certificate: /ssl/fullchain.pem | |
| ssl_key: /ssl/privkey.pem |
| import requests | |
| import json | |
| import urllib3 | |
| UNIFI_LOGIN_PATH = '/api/auth/login' | |
| # Disable SSL verification warnings | |
| urllib3.disable_warnings() |
| #!/bin/bash | |
| set -xe | |
| #This script pulls various information from the Synology NAS | |
| #Edit /etc/crontab then restart, synoservice -restart crond | |
| #Metrics to capture, set to false if you want to skip that specific set | |
| capture_system="true" #model information, temperature, update status, | |
| capture_memory="false" #information about memory stats | |
| capture_cpu="true" #CPU usage |
| provider "aws" {} | |
| provider "github" {} | |
| resource "github_repository" "test" { | |
| name = "joestump-test" | |
| description = "Terraform test repository" | |
| private = true | |
| } | |
| resource "aws_s3_bucket" "test" { |
| AWSTemplateFormatVersion: 2010-09-09 | |
| Description: Installs IAM role and policy to allow Support Center access to PCS's CSKAccountProvisioner production role. | |
| Resources: | |
| TerraformAdministratorRole: | |
| Type: "AWS::IAM::Role" | |
| Properties: | |
| RoleName: PCSSupportAccessRole | |
| MaxSessionDuration: 3600 | |
| AssumeRolePolicyDocument: | |
| Version: "2012-10-17" |
I hereby claim:
To claim this, I am signing this object:
| #!/bin/bash | |
| npm run build | |
| gas deploy -s ./conf/$CLIENT_SECRETS -c ./conf/$OAUTH_CREDENTIALS -b ./build -f $GAS_FILE_ID |
| from boto.s3.connection import S3Connection | |
| from progressbar import Percentage, ETA, FileTransferSpeed, Bar, ProgressBar | |
| class S3Transfer(object): | |
| def __init__(self, aws_key, aws_secret): | |
| self.conn = S3Connection(aws_key, aws_secret) | |
| self.progress_bar = None | |
| def _update_progress_bar(self, bytes_transferred, size): |