I hereby claim:
- I am junaid18183 on github.
- I am junaid18183 (https://keybase.io/junaid18183) on keybase.
- I have a public key whose fingerprint is 125A B028 4F43 4538 0570 9A8A B7C1 868E 3994 DA9E
To claim this, I am signing this object:
curl -i -u "my_user_name:my_password" -X PUT -d '' 'https://api.github.com/repos/my_gh_userid/my_repo/collaborators/my_collaborator_id' |
From busybox | |
COPY goss.yaml /tmp/goss.yaml | |
COPY goss /usr/local/bin/ | |
COPY goss-serve /usr/local/bin/ | |
HEALTHCHECK --interval=5s --timeout=2s --retries=12 \ | |
CMD /usr/local/bin/goss --gossfile /tmp/goss.yaml v --format documentation |
#!/bin/bash | |
# A simple script to backup an organization's GitHub repositories. | |
# NOTE: if you have more than 100 repositories, you'll need to step thru the list of repos | |
# returned by GitHub one page at a time, as described at https://gist.github.com/darktim/5582423 | |
GHBU_BACKUP_DIR=${GHBU_BACKUP_DIR-"github-backups"} # where to place the backup files | |
GHBU_ORG=${GHBU_ORG-"<CHANGE-ME>"} # the GitHub organization whose repos will be backed up | |
# (if you're backing up a user's repos instead, this should be your GitHub username) | |
GHBU_UNAME=${GHBU_UNAME-"<CHANGE-ME>"} # the username of a GitHub account (to use with the GitHub API) |
var AWS = require('aws-sdk'); | |
var url = require('url'); | |
var https = require('https'); | |
var hookUrl, kmsEncyptedHookUrl, slackChannel; | |
kmsEncyptedHookUrl = 'abcd1234'; // Enter the base-64 encoded, encrypted key (CiphertextBlob) | |
slackChannel = 'example_channel'; // Enter the Slack channel to send a message to | |
var postMessage = function(message, callback) { |
#!/bin/bash | |
download_vault(){ | |
wget https://releases.hashicorp.com/vault/0.9.1/vault_0.9.1_linux_amd64.zip?_ga=2.165144251.566422628.1516357846-2059600638.1516357846 -O vault_0.9.1_linux_amd64.zip | |
apt-get install -y zip | |
unzip vault_0.9.1_linux_amd64.zip | |
mv vault /usr/local/bin/ | |
rm vault_0.9.1_linux_amd64.zip | |
} | |
######################## | |
download_ssh_helper(){ |
#!/bin/bash | |
module=$1 | |
for resource in `terraform show -module-depth=1 | grep module.${module} | tr -d ':' | sed -e 's/module.${module}.//'`; do | |
terraform taint -module ${module} ${resource} | |
done |
''' | |
@author Bommarito Consulting, LLC; http://bommaritollc.com/ | |
@date 20131029 | |
This script monitors and logs to CSV the status of all tunnels for all VPNs for a single EC2 region. | |
''' | |
# Imports | |
import boto | |
import boto.ec2 | |
import boto.vpc |
{ | |
"AWSTemplateFormatVersion": "2010-09-09", | |
"Metadata": { | |
"AWS::CloudFormation::Interface": { | |
"ParameterGroups": [ | |
{ | |
"Label": { | |
"default": "HelloWorld Parameters" | |
}, | |
"Parameters": [ |
#https://mapr.com/support/s/article/How-to-configure-LDAP-client-by-using-SSSD-for-authentication-on-CentOS?language=en_US | |
#https://gist.github.com/mazgi/3dbfe99fb2b3e8d1e50b | |
#http://www.ateam-oracle.com/part-3-of-4-sssd-linux-authentication-implementation-step-by-step-guideline/ | |
yum install openldap openldap-clients sssd sssd-client | |
cp /etc/openldap/ldap.conf /etc/openldap/ldap.conf.orig | |
> /etc/openldap/ldap.conf | |
cat << EOF > /etc/openldap/ldap.conf | |
BASE dc=example,dc=com |
I hereby claim:
To claim this, I am signing this object: